American Journal of Mathematical and Computer Modelling
Volume 2, Issue 1, February 2017, Pages: 1-5

Hook Replacement Method for Mobile Receiver in the Soft Handover Region

Ammar Odeh1, Ibrahim Al Otoum1, Bilal AL-Bataineh2

1Department of Computer Science and Information Systems, Al Maarefa College for Science & Technology, Riyadh, Kingdom of Saudi Arabia

2Department of Computer Science Shaqra University Riyadh, Riyadh, Kingdom of Saudi Arabia

Email address:

(I. A. Otoum)
(B. AL-Bataineh)

To cite this article:

Ammar Odeh, Ibrahim Al Otoum, Bilal AL-Bataineh. Hook Replacement Method for Mobile Receiver in the Soft Handover Region. American Journal of Mathematical and Computer Modelling. Vol. 2, No. 1, 2017, pp. 1-5. doi: 10.11648/j.ajmcm.20170201.11

Received: October 30, 2016; Accepted: November 10, 2016; Published: January 4, 2017


Abstract: The proposed work analyses there are many techniques already available for the soft handover region. Here the paper comes up with the new hook replacement technology for mobile receiver in the soft handover region. In our proposal, the receiver receive the signal from all available base station (BS) around the mobile and hooks to the base station which provides proper and strongest path while it comes to the fall of signal to noise ratio below pre-decided threshold level. Receiver compare the weakest hook of path concern with base station and remove it from the currently considerable hooks and with the sum of the strong and proper responsive hooks it creates proper and better group. Then after analysing all the hooks from the group it starts communicating with strongest hook. This paper describes this process in this paper by showing error performance, average no of considerable paths offered by this newly hook replacement scheme which is depend on Mobile Controlled Hand (MCHO). Which is applicable to GSM as well as CDMA (IS-95 and CDMA2000).

Keywords: Lacking of Channel, Techniques of Diversity, Hand Over Event Analysis


1. Introduction

The Mobility in communication occurs because of the synchronisation of the transmitter and receivers. Mobiles are communicating with the B.S. than B.S to MSC and MSC to data centres and Data centres to PSTN and so on the process continues. The BS are the main centre for the one cell (cell is particular geographical area). In each cell contains their particular frequencies by which they are communicating with the mobile drives. Now mobile devices are always in motion. They are like non-steady thing and sometimes these mobiles are like changing the cells to one cell to another. The cell in this kind of situation the mobile device has to change the communicating frequency from the old cell to new cell and that’s the particular process called "Hand Over". There are mostly two types of hand over process 1st: Hard handover: The process in which mobile device brake the old frequency connection before it makes the connection with new frequency from the new cell where it is going towards. This type of handover is known as "brake-before-make". 2nd: soft handover in which the users not get affected by the frequencies change process and can continue uses service. Mobile station makes the connection with the new base station before it breaks the connection with the old cell. This process is known as "make-before-brake". This paper deals with the soft handover process done by the smooth "Hook Replacement Technique". For the increment of signal to noise ratio and to lower the deep fades, combination of reasonable path is done by receiver. In the hand over region, availability of all resolvable paths can be quite more as off they come from the adjacent BS and the target BS. Main benefits that are trying to archive are low complexity and low processing power for the instrument while it move from one cell to another cell and look up for the new strongest frequency to get connected and to communicate. Many of researches have been conducted to the study of hook replacement issue and those from the target B.S has seldom been consider before. [1].

This paper proposes an alternative Hook Replacement scheme to reduce the SHO overhead and at the cost of certain degradation in performance. With this scheme when the output of SNR goes lower than the targeted SNR, the receiver starts the scanning for the additional La paths from the target BS, than receiver does the comparison of the sum of the SNRs of the Ls; which is nothing but the grater than equal the Lc, the strongest paths from the target BS to the sum of Ls SNRs which is weakest from the Lc paths. Then again it got connected with the best and strongest group to form Lc paths. In this scheme it just compare those blocks which containing only equal size of Ls and avoids rearranging all the paths which are essential for the full GSC scheme, so reduction in SNR comparison to SHO overhead can be obtained. More specifically our derivation tackle the joint probability density function (PDF) for two adjacent partial sums of order statistics of the receiver output SNR. [2].

2. Related Work of Soft Handover

Many researchers have been dedicated their study for this soft handover process and they out with also a new techniques which can distinguish the resolvable paths from the serving BS and some are from the Target BS. [3].

In their research they did work on the Rack Receiver regarding the with the finger replacement technique which offers comprehensive framework and with very slight performance loss compared to the previously proposed scheme.

In their research they proposed Soft Handover algorithms for the UMTS which covers IS-95 and CDMA2000 respectively.

In the paper they con worked on four different algorithms and performance of all of those four algorithms in a different operating environments and conditions. They realize that performance of all four algorithms follow the same trend though operating environments were different i.e. vehicular and pedestrian, and all four algorithms are –User Speed, -Cell Radius, -Pilot transmit power per block, and –No of Blocks covered by a Cell. [2] [4]

3. Mode of Operations

This paper proposes an alternative to of Hook Replacement by combining scheme that is also applicable to SHO region and reduces SHO overhead by making Soft Handover process under MCHO (Mobile Controlled Handover).

Figure 1. Flow Chart of Process-flow.

Figure 1 explains the process flow of concept, and focusing on the MCHO technique. In addition, the proposed work concentrates on the mobile receiver unit. The MS unit is moving from the host cell area to target cell area. The time at MS enters in the SHO area mobile starts collecting the information of nearest cell, its frequency, and stats comparing the SNR of host BS to new BS. In the beginning of every time slot MS compares the received SNR to certain target SNR.MS starts with the Lc/L-GSC, now considering Гx:y be the sum of the x largest SNRs among y paths. So, [5].

Where  is zth order of calculation of then the total received SNR after GSC is given by ГLc: L. In the of starting of every time slot MS compares the received SNR with the minimum level of SNR which can be considered as target SNR and denoted by γt. If ГLc: L goes below γt a two way SHO occurs. [6].

Figure 2. Action of control channel's during MCHO handoff.

In this scenario Figure 2 explain MS receiver compares two smallest past from currently serving BS and sum of the strongest path from BS, then receiver transfer the smallest path which is currently used with the best path. There is no transfer take place if the final sum of all the path is less than the sum of the weakest paths from the serving BS. [7].

Let’s see,

, K,

And,

Now, from the above concept the final combined SNT,  is given by

(1)

4. Statistics of Combined SNR

In this section of statistics combined SNR of the proposed method.

Now from the equation (a) the cumulative distribution function (CDF) of , [8] [9-11].

(2)

Now here Pr [ ≤ J+ K < i] can easily calculated from the cumulative distribution function of Lc/L-GSC where H is independent of J and K so the proposed algorithm can obtain the probabilities of (b) as, [5, 12]

Pr [K≥ H, J+ K < i]                        (3)

= J, K (j, k) H (h) dkdhdj

Pr [K< H, J+ K < i]                         (4)

=  J, K (j, k) H (h) dkdhdj

Pr [K≥H, J+ K <]                           (5)

=  J, K (j, k) H (h) dkdhdj

Pr [K<H, J+ K < i, J+ K<]                     (6)

=  J, K (j, k) H (h) dkdhdj [1-8, 12-14]

5. Proposed Work

Now focusing on finding the joint probability define function of J and K, J, K (j, k). Now considering  and . Now the calculation for the L resolvable paths as

(7)

Now starting with joint probability distribution function (PDF) of . Applying the Bayesian rule, define the joint PDF as,

(8)

=.

Obtaining all PDF in (8)

By writing close-form expression for the joint PDF,

(9)

X

X

X

X

Here , so trying to obtain joint PDF of J and K,  from (g) by taking integral at ,

(10)

Here (h) includes only finite integrations of elementary functions and such joint probability can be calculated by software like mathematica. Even (h) is valid only for  and  and for the other cases can be calculated by considering (h) together with (c) –(f), the cumulative distributive function of γt,  in (b), and can be obtained by using Leibnitz’s rule and differentiating (b) with respect to I, can obtain generic expression for PDF of the combine SNR, γt.

(11)

6. Complexity Comparison

In the previous section discussions, the path with strongest signal to noise ratio values are selected by the mobile whenever it necessary, the mobile controlled handover scheme always provides better performance than the block change scheme. This section discusses the complexity tradeoff by analysing average number of path calculation, average number of signal to noise ratio comparison and the soft handover overhead. [9-11,15-22].

7. Average Number of Path Calculation

With the hook replacement scheme the mobile receiver calculates the L paths in scenario of

 In the scenario of . So the average number of path calculation of the Block change is same as that of hook replacement with full generalized selection combining (GSC). [9-11, 15-22].

8. Average Number of SNR Comparison

Here while comparing the average number of required SNR and GSC, GSC can be denoted as

So,

(12)

Now we can express this comparison for the full GSC scheme.

(13)

And

(14)

Respectively

9. Conclusion

In cellular systems, handover is a key factor that affects customer satisfaction. This paper proposed a new hook replacement technique; and provided general comprehensive work of proposed scheme and its mathematical assessment. Because of the high performance and continuous tracking by the MS; Ms required more power source to continue. In conclusion this technique gives a more efficient handover but it reduces the battery life of mobile instrument.


References

  1. H. Holma and A. Toskala, Wcdma for Umts vol. 2006: Wiley Online Library, 2000.
  2. M.-S. Alouini and M. K. Simon, "An MGF-based performance analysis of generalized selection combining over Rayleigh fading channels," Communications, IEEE Transactions on, vol. 48, pp. 401-415, 2000.
  3. S. Choi, et al., "Soft handover overhead reduction by RAKE reception with finger reassignment," Communications, IEEE Transactions on, vol. 56, pp. 213-221, 2008.
  4. A. Papoulis and S. U. Pillai, Probability, random variables, and stochastic processes: Tata McGraw-Hill Education, 2002.
  5. S. CHOI, et al., "Soft Handover Overhead Reduction by RAKE Reception with Finger Reassignment," IEEE transactions on communications, vol. 56, pp. 213-221, 2008.
  6. T. J. L. Daniel Wong, "Soft Handoffs in CDMA Mobile Systems," IEEE, 1997.
  7. S. Choi, et al., "Finger replacement method for RAKE receivers in the soft handover region," Wireless Communications, IEEE Transactions on, vol. 7, pp. 1152-1156, 2008.
  8. T. Eng, et al., "Correction to" Comparison of diversity combining techniques for Rayleigh-fading channels"," Communications, IEEE Transactions on, vol. 46, p. 1111, 1998.
  9. A. Odeh, et al., "Steganography in Arabic text using Kashida variation algorithm (KVA)," in Systems, Applications and Technology Conference (LISAT), 2013 IEEE Long Island, 2013, pp. 1-6.
  10. A. Odeh, et al., "Fast real-time hardware engine for ZWC text steganography," in Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2014 4th International Conference on, 2014, pp. 1-5.
  11. A. Odeh, et al., "Steganography in text by using MS word symbols," in American Society for Engineering Education (ASEE Zone 1), 2014 Zone 1 Conference of the, 2014, pp. 1-5.
  12. M. Z. Win and J. H. Winters, "Virtual branch analysis of symbol error probability for hybrid selection/maximal-ratio combining in Rayleigh fading," Communications, IEEE Transactions on, vol. 49, pp. 1926-1934, 2001.
  13. M. K. Simon and M.-S. Alouini, Digital communication over fading channels vol. 95: John Wiley & Sons, 2005.
  14. G. L. Stüber, Principles of Mobile Communications, 2nd ed ed. Norwell, MA: Kluwer Academic Publisher, 2001.
  15. A. Odeh, "Robust Text Steganography Algorithms for Secure Data Communications," UNIVERSITY OF BRIDGEPORT, 2015.
  16. A. Odeh and E. Abdelfattah, "Quantum sort algorithm based on entanglement qubits {00, 11}," in Long Island Systems, Applications and Technology Conference (LISAT), 2016 IEEE, 2016, pp. 1-5.
  17. A. Odeh, et al., "Performance evaluation of AODV and DSR routing protocols in MANET networks," 2012.
  18. A. Odeh, et al., "Steganography by multipoint Arabic letters," in Systems, Applications and Technology Conference (LISAT), 2012 IEEE Long Island, 2012, pp. 1-7.
  19. A. Odeh and K. Elleithy, "Steganography in arabic text using zero width and kashidha letters," International Journal of Computer Science & Information Technology, vol. 4, p. 1, 2012.
  20. A. Odeh, et al., "Sorting N elements using quantum entanglement sets," in Innovative Computing Technology (INTECH), 2013 Third International Conference on, 2013, pp. 213-216.
  21. A. Odeh, et al., "Quantum key distribution by using public key algorithm (rsa)," in Innovative Computing Technology (INTECH), 2013 Third International Conference on, 2013, pp. 83-86.
  22. A. Odeh, et al., "Fast Real Hardware Engine for Multipoint Text Steganography".

Article Tools
  Abstract
  PDF(305K)
Follow on us
ADDRESS
Science Publishing Group
548 FASHION AVENUE
NEW YORK, NY 10018
U.S.A.
Tel: (001)347-688-8931