Analysis of load dependency of handover strategies in mobile multiaccess Ambient Networks

Petteri Pöyhönen, Daniel Hollos, Haitao Tang, Oliver Blume, Ramón Agüero, Kostas Pentikousis

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

3 Citations (Scopus)

Abstract

Wireless operators incorporate multiradio access technologies aiming at expanding their customer base and benefiting from synergies of existing and planned infrastructure. The result is areas with overlapping radio access technologies, enabling users to select from a large pool of available connections, based on several criteria. In these increasingly complex scenar­ios the importance of handover decisions cannot be underestimated. We study three different handover decision strategies, focusing on the tradeoff between continuous connectivity, network utilization and per­formance, and the associated costs, and compare them to the optimal strategy. We motivate the need for a distributed algorithm, especially when considering the deployment of multimedia applications, and reflect on the effective network capacity as a function of the handover strategy employed and the permitted offline time for the active mobile nodes in the network.
Original languageEnglish
Title of host publication2007 12th IEEE Symposium on Computers and Communications
PublisherIEEE Institute of Electrical and Electronic Engineers
PagesMW 15 – MW 20
ISBN (Electronic)978-1-4244-1521-2
ISBN (Print)978-1-4244-1520-5
DOIs
Publication statusPublished - 2007
MoE publication typeA4 Article in a conference publication
Event12th IEEE International Symposium on Computers and Communications, ISCC '07 - Aveiro, Portugal
Duration: 1 Jul 20074 Jul 2007
Conference number: 12

Conference

Conference12th IEEE International Symposium on Computers and Communications, ISCC '07
Abbreviated titleISCC '07
Country/TerritoryPortugal
CityAveiro
Period1/07/074/07/07

Fingerprint

Dive into the research topics of 'Analysis of load dependency of handover strategies in mobile multiaccess Ambient Networks'. Together they form a unique fingerprint.

Cite this