Gsm and Umts Mobility Simulator a Thesis Submitted to the Department of Electrical and Electronics Engineering and the Institute of Engineering and Sciences of Bilkent University in Partial Fulfillment of the Requirements for the Degree of Master of Science
نویسندگان
چکیده
2 I certify that I have read this thesis and that in my opinion it is fully adequate, in scope and in quality, as a thesis for the degree of Master of Science. I certify that I have read this thesis and that in my opinion it is fully adequate, in scope and in quality, as a thesis for the degree of Master of Science. I certify that I have read this thesis and that in my opinion it is fully adequate, in scope and in quality, as a thesis for the degree of Master of Science. In this thesis, a mobility simulator for GSM and UMTS has been designed and implemented using Visual C#.Net. The objective has been to design and implement such a simulator that can be used to create and study different traffic load scenarios and mobility patterns that can cause congestion situations. The modular approach adopted for the GSM and UMTS simulator allow us to evaluate the performance of new services. The simulator uses propagation simulation results and terrain profile data to produce capacity and performance metrics related to GSM and UMTS networks. The capacity and the service quality of the network are assessed in a long-term system level simulation scheme. Mobility generation is the core of the simulator program. It generates random paths for the mobile users in the simulation. Then the effects of the mobility patterns of the users on the system capacity are investigated. In GSM mobility simulator, mobility, traffic generation, call-admission and handover are implemented. In UMTS, in addition to GSM modules, power control and soft handover generation is implemented. programında, trasmisyon güç kontrolü ve soft-handoff kullanılmıştır.
منابع مشابه
Thesis Submitted in Partial Fulfillment of the requirement for the Degree of M.A/M. Sc In School consultant
Goal: The aim of this study is assess and compare emotional ability of deaf. Semi _ deaf and hearing students (14 _ 20) in Mashhad. Method: To do this experiment out of studies evidence generally 105 students selecting randomly. From each group, choose the number of normal boys and girls 35, deaf boys and girls and semi deaf boys and girls .this article is useful and explanatory .in this stud...
متن کاملAnalysis and Design of Scalable Software as a Service Architectures a Thesis Submitted to the Graduate School of Engineering and Science of Bilkent University in Partial Fulfillment of the Requirements for the Degree of Master of Science
...................................................................................................... iii ÖZET ...................................................................................................................v Acknowledgement ........................................................................................... vii
متن کاملSpatio - Temporal fMRI Signal Analysis Using Information
Using Information Theory by Junmo Kim B.S., Seoul National University (1998) Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Science in Electrical Engineering at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY Au ust 2000 © Massachusetts Institute of Technology 2000. All rights reserved. MASSACHUSETTS IN...
متن کاملQuantum Computation: Theory and Implementation
Submitted to the Department of Physics in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Physics and to the Department of Electrical Engineering and Computer Science in Partial Fulfillment of the Requirements for the Degrees of Bachelor of Science in Electrical Engineering and Computer Science and Master of Engineering in Electrical Engineering and Computer Sci...
متن کاملThe Idea Of Using The Steganography As Encryption Tool
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005