CHAPTER 4
SYSTEM IMPLEMENTATION
4.1 INTRODUCTION
The most important part of any project i.e., implementation. It describes the
various functionalities step by step under each module with their outputs.
4.1.1 CREATE A NETWORK
It is a process to find out mobile infrastructure utilization level of a specific
region. The service determination involves the registered user and the non-
registered user. The users are classified as follows:
a. Home User: The user belongs to the same cluster.
b. Visitor: The user belonging to other clusters but utilizing the specified
clustered area.
c. Registered: The users registered with the service provider and utilizing the
same service providers network.
d. Non registered: The users are utilizing service from other than their
registered service provider.
e. Others - Home: They are not the registered users of mobile network but
getting the services from the specified clusters.
f. Others – Visitors: They are not the registered users of mobile network but
getting the service from the clusters other than the specified cluster.
32
According to the above classification the users are classified as follows:
a. Home-user-registered: registered and utilizing the same
network.Example: Aircel Chennai registered user communicating to the
same Aircel Chennai mobile.
b. Visitor-user : registered and utilizing the same network in different
clusters.Example Aircel Chennai registered user communicating Aircel
network while he is travelling other than Chennai Aircel network.This is
normally called as roaming.
c. Home-user-non registered: They are registered with other network and
utilizing different network services. Example: A Aircel mobile
communicating with non Aircel mobile in Chennai city itself.
d. Visitor–non registered: They are registered with other network and
utilizing networks other than their specified cluster. Example: A Chennai
based registered Aircel mobile user communicating to other users
through service providers other than Aircel.
e. Home others: They are not receiving any mobile network services but
connected with network through other communication system from the
same cluster. Example: Aircel mobile user communicating to any land
line in Chennai itself.
33
f. Visitor - others: They are not receiving any mobile network services but
connected with network through other communicating systems from
different clusters. Example: Chennai based registered Aircel user
communicating to any land line other than Chennai.
g. Non – registered – visitor: Other network registered users accessing the
mobile infrastructure while visiting the specified cluster. Example: non
Chennai based other mobilenetwork users communicating to the Aircel
mobile network via Aircel network at Chennai.
h. Non – registered- others: Other mobile network non registered users
accessing the mobile network infrastructure while visiting the specified
cluster. Example: non Chennai based othermobile network users
communicating to any mobile network via Aircel network at Chennai.
In this research work the mobile users are observed based on their call
transformation via., base cluster . Whenever the call is routed from the
same network or from other network and passed through this network; it
is encountered as a network utilization system. The initiated call, on
going call and passing calls are taken into the account for the service
determination. For this process various registers are used to determine the
originality of the call. The basic concept of mobile network system and
various registers and its functionalities are described as follows:
34
4.2 Mobile Station
The mobile station (MS) consists of the mobile equipment (the terminal) and
a smart card called the Subscriber Identity Module (SIM). The SIM provides
personal mobility, so that the user can have access to subscribed services
irrespective of a specific terminal. By inserting the SIM card into another GSM
terminal, the user is able to receive calls at that terminal, make calls from that
terminal, and receive other subscribed services.
The mobile equipment is uniquely identified by the International Mobile
Equipment Identity (IMEI). The SIM card contains the International Mobile
Subscriber Identity (IMSI) used to identify the subscriber to the system, a secret
key for authentication, and other information. The IMEI and the IMSI are
independent, thereby allowing personal mobility. The SIM card may be protected
against unauthorized use by a password or personal identity number.
4.2.1 Base Station Subsystem
The Base Station Subsystem is composed of two parts, the Base
Transceiver Station (BTS) and the Base Station Controller (BSC). These
communicate across the standardized Abis interface, allowing (as in the rest of the
system) operation between components made by different suppliers.
The Base Transceiver Station houses the radio tranceivers that define a cell and
handles the radio-link protocols with the Mobile Station. In a large urban area,
35
there will potentially be a large number of BTSs deployed, thus the requirements
for a BTS are ruggedness, reliability, portability, and minimum cost.
The Base Station Controller manages the radio resources for one or more BTSs. It
handles radio-channel setup, frequency hopping, and handovers, as described
below. The BSC is the connection between the mobile station and the Mobile
service Switching Center (MSC).
4.2.2 Network Subsystem
The central component of the Network Subsystem is the Mobile services
Switching Center (MSC). It acts like a normal switching node of the PSTN or
ISDN, and additionally provides all the functionality needed to handle a mobile
subscriber, such as registration, authentication, location updating, handovers, and
call routing to a roaming subscriber. These services are provided in conjuction with
several functional entities, which together form the Network Subsystem. The MSC
provides the connection to the fixed networks (such as the PSTN or ISDN).
Signalling between functional entities in the Network Subsystem uses Signalling
System Number 7 (SS7), used for trunk signalling in ISDN and widely used in
current public networks.
The Home Location Register (HLR) and Visitor Location Register (VLR),
together with the MSC, provide the call-routing and roaming capabilities of GSM.
36
The HLR contains all the administrative information of each subscriber registered
in the corresponding GSM network, along with the current location of the mobile.
The location of the mobile is typically in the form of the signalling address of the
VLR associated with the mobile station. The actual routing procedure will be
described later. There is logically one HLR per GSM network, although it may be
implemented as a distributed database.
The Visitor Location Register (VLR) contains selected administrative
information from the HLR, necessary for call control and provision of the
subscribed services, for each mobile currently located in the geographical area
controlled by the VLR. Although each functional entity can be implemented as an
independent unit, all manufacturers of switching equipment to date implement the
VLR together with the MSC, so that the geographical area controlled by the MSC
corresponds to that controlled by the VLR, thus simplifying the signalling required.
Note that the MSC contains no information about particular mobile clusters --- this
information is stored in the location registers.
The other two registers are used for authentication and security purposes.
The Equipment Identity Register (EIR) is a database that contains a list of all
valid mobile equipment on the network, where each mobile cluster is identified by
37
its International Mobile Equipment Identity (IMEI). An IMEI is marked as
invalid if it has been reported stolen or is not type approved. The Authentication
Center (AuC) is a protected database that stores a copy of the secret key stored in
each subscriber's SIM card, which is used for authentication and encryption over
the radio channel.
a. The gathered data is represented according to clustering concepts.
b. The clustered data is used to calculate mobile location
c. The standard utilization for the particular instance aid to determine
the base station accessability using user accessability using
algorithm. The graphical representation is also generated for
classified users.
4.3 System Design parameters
4.3.1 Network Construction
The registered mobile users are added in the mobile network construction .
The mobile user network cluster also enter with its possible traveling path . The
current location and its weighted system adopted .
4.3.1 Mobile Path
Each mobile system the home cluster and the path is entered . This is used to
identify the current location of the mobile object . this mobile object move from
38
one cluster to another in the tracking system . The network neighbor algorithm
used to used to find the path of the mobile
4.3.3 Network Weight
All the mobile which is registered and getting service is involved the cost of
the service. This service is based on the utilization and existence of the cluster.
This cluster position is determined from the access of the cluster and its service.
The communication system the cluster has value for the home user and the visited
users. The cost between the cluster and the service cost are determined according
to the distance. The home and visited user to the cluster in the network predefined .
4.3.4 Packet Traveling
The communication system between the mobile object based on the path .
The path may be peer to per or single link process. One node will communicate to
another node. But the another system is a broad casting system . Instead of one
cluster that will broadcast to all the remaining cluster depends on the request .
The path will be determine depends on the request of the cluster
communication or the availability of the infrastructure. The availability is
determined using adjacent matrix process in the network
The neighborhood process cluster and its availability to consider to
determine the path specification . Travelling process executed in the specified path
.
After determined path using adjacent matrix it adopts the algorithm for
packet traveling . During the transmission the distance alone consider to calculate
39
the cost for this project . The traffic and the size or consider in the uniform value o
one in this implementation.
4.4 Screen Shots
The constructed network and its screen shots are represented below :
4.4.1 User Menu Screens
The network created by getting number of mobiles, path limits and path
values, which are given by the users.
FIGURE : 4.1
40
FIGURE : 4.2 , 4.3
41
4.4.2 Network Information
FIGURE : 4.4,4.5
42
4.4.3 Cluster Information
FIGURE : 4.6,4.7
43
4.4.4 Mobile Status
FIGURE : 4.8,4.9
44
THE DESIGNED SYSTEM HAS FOLLOWING MODULES :
4.5 MODULE 1: PACKET TRAVELING ALGORITHMS
4.5.1 SINGLE LINKAGE ALGORITHM
FIGURE : 4.10,4.11,4.12
45
FIGURE : 4.13,4.14
46
FIGURE : 4.15
47
4.5.2 K-MEANS CLUSTERING ALGORITHM
FIGURE : 4.16,4.17
48
FIGURE : 4.18,4.19
49
4.6 MODULE 2: PACKET SCHEDULING ALGORITHMS
4.6.1 CONFORMATION OF SOURCES
FIGURE : 4.20,4.21
50
4.6.2 WEIGHTED-DISTANCE SCHEDULING
FIGURE : 4.22,4.23
51
FIGURE : 4.24,4.25
52
4.6.3 GREEDY SCHEDULING
FIGURE : 4.26,4.27
53
4.6.4 WEIGHTED-HOP SCHEDULING
54
FIGURE : 4.30,4.31
55
4.7 MODULE 3: COMPARISON AND RECOMMENDATIONS
FIGURE : 4.33,4.34
56
FIGURE : 4.35
57
The above research work has been done to achieve the following parameters that
will enhance effective packet traveling and scheduling for a quality mobile service.
The parameters are :
a) Utilization Level.
b) Density and Signal Control.
c) Cost analysis.
a) Utiilization Level
In this observation, when the network object nodes are increased, the utilization
also increased. The association matrix non-zero element value and network
weightage is increased. This shows that the utilization level of the network is
increased.
b) Density and Signal Control
This depends on Utilization or capacity of base station and Square Area
[Cluster] number of users accessing the service.
Signal control is established by giving priority to home users on First in First
Serve basis and other users .By this way, density and signal control is achieved.
c) Cost Analysis
For analyzing the cost, three algorithms are used,
(i)Weighted Distance Algorithm [ For billing purpose]
(ii)Greedy Algorithm [Only for Cost Minimization and for rendering
best services ]
(iii)Weighted hops [ For routing purpose]
58
.
Out of the three above algorithms discussed , we have suggested for
Greedy algorithm as it is able to reduce the cost most effectively and
also renders best services for the network.
But, Weighted distance Algorithm is applied for billing purpose as it
give appreciated cost for mobile network , which enables the mobile
network provider to derive profits and Weighted HOPS is mainly
meant for Effective Routing only.
Since the above research is on Analysis of Effective Packet Traveling
and Scheduling Algorithm for Quality Mobile Service, it is always
best to adopt Greedy Algorithm
5. Conclusion
The research work observed the mobile station data flow and its operation
based on the services. The gathered information represented based on the
clustering model . The data classified and the cumulative result obtained for the
calculation for cluster location and the distance . It is used to determine the
decision for the packet travel path and scheduling process.
Learning’s
The researcher learned the concept of Mobile network architecture and its
functionality . The researcher identified the demands of the mobile service users
59
and services of mobile service providers. The concept of the cluster, Network
neighbor hood process, path determination and traveling process are understood
and implemented. The research work leads to learn the technology and its real time
implementation.
Future enhancement
This research process implemented with the simulated process. This may be
incorporated with the real time environment . This process consider only the
distance vector cluster and the cost. The traffic, size path routing are to included to
determine the efficiency of Quality of Mobile services.
The research work initiated the interest towards the scientific approach of
visualizing the real time day to day application. This is the stating point of the
research to procure research method and its implementation. The technology
learning and its application process will be the continuous process of the researcher
and leads the research activity for further level which leads into the higher research
and involve the research society .
60