Next Article in Journal
Detection and Classification of Defective Hard Candies Based on Image Processing and Convolutional Neural Networks
Next Article in Special Issue
Novel Hybrid Intelligent Secure Cloud Internet of Things Based Disease Prediction and Diagnosis
Previous Article in Journal
Estimating the Memory Consumption of a Hardware IP Defragmentation Block
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Fuzzy Based Handover Decision Scheme for Mobile Devices Using Predictive Model

by
Amit Kumar Gupta
1,
Vikas Goel
2,
Ruchi Rani Garg
3,
Dasarada Rajagopalan Thirupurasundari
4,
Ankit Verma
1 and
Mangal Sain
5,*
1
Department of Computer Applications, KIET Group of Institutions, Delhi-NCR, Ghaziabad 201206, India
2
Department of Information Technology, KIET Group of Institutions, Delhi-NCR, Ghaziabad 201206, India
3
Department of Applied Science, Meerut Institute of Engineering &Technology, Meerut 250005, India
4
Department of Computer Science & Engineering, Meenakshi College of Engineering, Chennai 600078, India
5
Division of Computer Engineering, Dongseo University, 47 Jurye-Ro, Sasang-Gu, Busan 47011, Korea
*
Author to whom correspondence should be addressed.
Submission received: 7 July 2021 / Revised: 13 August 2021 / Accepted: 16 August 2021 / Published: 20 August 2021

Abstract

:
Handover usually deals with the mobility of the end users in a mobile network to assure about the ongoing session of a user. It is observed that frequent handover results in call dropping due to latency. In order to overcome this issue, a fuzzy based handover decision scheme for mobile devices using a predictive model is proposed. First, an MFNN (Multi-layer Feed Forward Network) is used to determine the next cell of the user along with best hand off time. To obtain the best access network, multiple-attribute Access Network Selection Function (ANSF) is used. The fuzzy rule is applied by considering the parameter data rate, reliability, signal strength, battery power and mobility as input and the output obtained is the optimal network. The proposed scheme selects the best access network and enhances the quality of services.

1. Introduction

4G is the extreme network provided rate of data (100 Mb/s), expands multimedia services and gives about 2.8 GHz frequency. 4G is a collection of technologies and protocols which generate packet-switched networks which are optimized for data [1]. The fourth generation (4G) wireless networks possess specific characteristics like higher usability anywhere, anytime and with any kind of technology and they also assist services intelligently at making the transmission cost low [2]. It has a wide area of applications in extensive wireless multimedia services, full-motion video applications and wireless teleconferencing [3]. The numerous measures of voice traffic in 3G harden the undertaking of roaming and interoperating while 4G gives worldwide portability and service portability by its advanced packet network. The inabilities and downsides of 3G propel the deploying of 4G [3]. The network architecture has a core component of system integration [2]. The existing wireless technologies are coherently integrated in 4G and this provides fast and extensive access and service for the cellular user. By combining mobility and networking, it can develop a new class of amazing applications [4].
5G enables a variety of connections such as the Internet of Things (IoT), Machine to Machine (M2M), Device to Device (D2D), Vehicle to Everything (V2X) and Bluetooth. Collectively, they influence corporate governance and interaction with customers in the physical world [5,6]. Connections have grown dramatically over time as the benefits of connecting devices have been recognized in Internet access by customers, businesses and governments. Over the next decade, these aforementioned services will become a key element of the larger market of devices in the world [7]. The 5G networks connected simultaneously by the hundreds of thousands that are considered essential for the massive deployment of these services. These different types of connected services require more system capacity and higher data rates, but some of them require lower latency. All this led to the development of 5G systems.
Recently, several studies have been carried out in terms of mobility prediction, autonomous vertical handoff, security, software-defined network (SDN), software-defined network virtualization (SDNV), network function virtualization (NFV) and battery consumption patterns. mobility management issues [8,9]. In addition, a survey based on actual measurement data conducted shows how the LTE-A (Long-Term Evolution-Advanced) network works during user mobility compared to the first phase of the LTE version. This study analyzed turnaround times, coverage and transfer times [10]. However, each survey provided a different perspective. Therefore, an investigation is needed to uncover the challenges, problems, mobility solutions and determinants of the future direction of the network in mobility.
Handover considers the end user’s mobility in a mobile network and assures the continuity of the wireless services if the mobile user varies its position across the cellular boundaries. The moving of a mobile’s association starting with one base station then onto the next is called handover. Handover provides the following:
  • Continuity of call
  • Optimum radio link selection
  • Traffic distribution
The main aim of 3GPP-WLAN internetworking is coherent mobility that can reduce data loss and latency (i.e., the time spent in handover) during the handover. 3G access procedures consist of two procedures: namely, a context activation packet data protocol procedure with allocation of IP address and a service request process along with authentication of the subscriber. Handover latency is increased when the procedure takes a long time to complete. This may cause service failure. The prediction of handover for triggering a link is very important for coherent mobility; because previously, when the link layer predicts WLAN signal loss and when the 3G network connection was made before the link interruption, the break time of the link was reduced and services were continued with no disruption.
In a wireless network, there are two forms of handover: horizontal handover and vertical handover. Horizontal handover is a handover process (within the device handover) that happens between the same network’s access points and base stations. It occurs between the homogeneous cells of a wireless access system at the end of the day. Vertical handover (outside framework handover) is characterized as a handover instrument that happens between the various purposes of connection of various networks. In any case, it might influence the connection, network and transport layers [11]. The three phases of the vertical handover process are network exploration, handover judgement and handover execution. During the handover decision stage, access focuses can choose when to play out the vertical handover, and it can locate the best handover competitor access network. Contingent upon serving of base station, the handover is grouped into soft and hard handover.
Hard handover implies that all old radio connections are ended before setting up new radio connections. Hard handover can be either coherent or non-coherent. Coherent hard handover isn’t noticeable to the client and requires a difference in the bearer frequency (between frequency handover) [12], whereas in soft handover, radio links are joined and removed in a radio link and this is performed with the help of macro diversity when several radio links are active concurrently. If the cells operating in the same frequency change, soft handover can be preferred.
Requirements of handover mechanisms are network cost, handover latency, energy consumption, velocity, bandwidth, network throughput, load-balancing, security, received signal strength, etc. [12].
However, handover management in a 3G network has several challenges.
The vertical handover among different wireless communication systems is very hard to understand while satisfying QoS requirements.
The major challenge of handover with high user mobility is call dropping, which occurs due to frequent handover, and the resources are not available in the target base station [13]. If handover latency is long, the packets could be disconnected or lost during the handover [14].
Mobility Rate: The important criterion to be considered in research on the mobility of wireless networks is mobility rate. Many UEs may have different speeds and have different effects on the received signal strength during UE mobility, which may have different effects on the stability of the communication. The maximum user speeds supported by wireless communications systems with mobility capabilities vary. For example, 4G in, the maximum supported speed per hour 350 km [15] It was the case, the 5G cellular system per hour 500 km can support up to [16]. As the maximum speed increases, not only the required transfer process, but also the decision making of high-speed transfer becomes an essential requirement.

2. Related Work

An adaptive multiple attribute vertical handover decision algorithm has been developed by Yaw and Agbinya. This algorithm allows for the selection of a wireless access network at a mobile terminal using fuzzy logic and a genetic algorithm. The vertical handover decision algorithm will be used to choose the best access network when a handover is needed. The chosen network can be tailored to network conditions including QoS specifications, mobile terminal state, service cost, and customer expectations [17].
Toni Janevski and Kire Jakimoski [18] have proposed a solution for improving the QoS during vertical handovers between UMTS and WiMAX networks for real time video applications. The analyses had shown that performance parameters, such as delay and throughput, are strongly dependent upon the speed of the mobile terminals, showing higher delays and bigger throughput gap as the velocity increases. The proposed optimized solution for vertical handovers between WiMAX and UMTS networks for video traffic has been tested for different video traffic types. This approach will increase the control and signaling traffic in the wireless networks.
In [19], a fuzzy based handover algorithm is proposed to improve the capacity as well as QoS of the network using the ratio of declination of normal signal loss to the actual signal loss. The problem is supported by the analytical solution which is based on a fuzzy network.
Various systems are formulated based on these mobility models, but the majority of them suffer from high packet loss, repeated handovers, too early and late handovers, insufficient network selection, and so on. To address these issues, a generalized vertical handover control system for heterogeneous wireless networks is introduced in [20].
In paper [21], the research initiatives are described under Mechanism of vertical handover decision for heterogeneous networks with cellular, with a good mix of unconventional and conventional. Recent approaches have been developed to assist in the decision-making process for vertical handover.
The authors of paper [22] increased the network performance in terms of the number of handovers and the handover delay by using an LTE-SDN architecture and a novel handover decision algorithm focused on predicting the potential locations of a moving car. The suggested algorithm divides the handover process into two stages: preparation and implementation.
Paper [23] proposes fuzzy logic-based vertical handover decision making to solve the smooth vertical handover problem. The paper uses the network simulator ns-3 and the fuzzylite library to conduct the required performance evaluation and facilitate the development of real-time scenarios. The suggested solution is quicker than the average rank for the setup in question, eliminates ping pong handovers, and boosts overall performance.
For handover optimization, article [24] introduces an intelligent mobility management system based on the Enhanced Multi-Objective Optimization Method by Ratio Analysis (E-MOORA) and the Q-learning method. The E-MOORA approach incorporates vector normalization by combining the modified entropy weighting methodology with the Multi-Objective Optimization Method by Ratio Analysis (MOORA). When selecting a HO target cell, the suggested E-MOORA technique judiciously utilizes the performance factors and thereby decreases ranking abnormality. The best triggering locations are selected using a Q-learning technique to reduce the effect of frequent unwanted handovers while meeting user QoS requirements.
The article [25] proposes a 5G Ultra-Dense Networks handover decision solution for connected cars (5G-UDN). Its main goal is to treat high vehicular mobility and provide performance gains in vehicle handover, because cellular network densification causes difficulties in cell selection, a higher number of failed and unnecessary handovers (ping-pong effect), longer delays and energy consumption, and high packet losses, despite the expected capacity gain. Virtual Cells are the foundation of the solution (V-Cells). To build a V-Cell, sophisticated network metrics, as well as additional factors such as signal intensity, distance, and speed, are used to choose the optimal cells.
Based on Q-learning frameworks and subtractive clustering approaches, article [26] offers an intelligent handover triggering system for UE. Subtractive clustering is used to transform the input measurements to state vectors, which can increase the training process’s efficiency and efficacy. Following that, the Q-learning framework learns from the environment the best handover triggering policy. To start the handover procedure, the trained Q table is deployed to UE.
The authors of [27] paper has discussed about the mobility management in 5G Networks. In 5G technology, the use of millimeter waves [28,29] is a major factor affecting mobility. This is due to high path loss when millimeter wave frequency bands are used, which reduces cell coverage. This greatly increases the probability of transfer and increases mobility issues such as high transfer failures, transfer ping-pong effects, and wireless link failures. In addition, new types of mobile connectivity systems are expected to be implemented in future networks. The implementation of these systems also contributes to increasing mobility problems. These issues will lead to a future increase in mobile data traffic. This rapid growth also contributes to the high probability of transfer rates.

3. Problem Statement

There are some of the issues in the existing works of Handover management in 4G networks. Handover management technique [13] is used to reduce handover delay and call dropping. Here, the prediction component of the MFNN (Multi-layer Feed Forward Network) is used to record the mobility pattern of the user. The data cleaning component of the PTSMA (Prefix Tree Sequence Mining Algorithm) filters only relevant patterns from the predictive model. Handover may fail, though, when prediction of the target base station is not in the neighbor of the source base station. If the predicted cell is not suitable for the user requirements, then it will degrade the quality of service (QoS).
In [17], the primary downside of expanding the lifetime of the Mobile Terminal inside the WLAN is expanding the packet delay coming about because of channel condition corruption. For the decision creation of a network, the fuzzy based decision making is clever; however, increasingly, a number of fuzzy standard sets ought to be framed. In QoS based VHO decision algorithm [10], the frequent vertical handover can cause wastage of network resources. Additionally, this is suitable only for soft vertical handover.
The Vehicular Handover Decision (VHD) algorithm [30] increases the dropping rate to choose the good network from the present network. The drawback of the HNE (Handover Necessity Estimation) [31] is that the throughput metrics for the mobility management technique were not considered. In [32], if the speed will increase, the number of packets dropped will also increase. A new location in which the mobile does not receive packets from the old base station is the settling time in which packet loss occurs.

4. Proposed Methodology

4.1. Overview

In this paper, a Vertical Handover Decision Algorithm based on Fuzzy is proposed along with mobility prediction. MFNN (Multi-layer Feed Forward Network) is used for user mobility prediction. Once the mobility of the user is predicted and the next cell is determined; mobile terminal conditions, network conditions are checked against the user preferences and application requirements. If the predicted cell does not fulfill the preferences and requirements, then the best access network has to be selected. To do so, a multi-attribute Access Network Selection Function (ANSF) [33] is used to select the best access network. It is efficient for utilizing radio resources and improves quality of service. The parameters included are Data rate, reliability, signal strength, battery power and mobility. The parameters are input for the Fuzzy logic-based decision making and as an output, the best network is selected.
Figure 1 represents the proposed block diagram. First, mobility prediction is done using Multi-layer Feed Forward Network (MFNN) to obtain the next cell along with network condition. In case the predicted cell does not fulfill the requirement, then the best network selection is selected by applying the Multiple-attribute Access Network Selection Function. The attribute data rate, reliability, signal strength, battery power and mobility are taken as input for the fuzzy logic decision making engine and the output is taken as best network.

4.2. Generation of Input Data for Mobility Prediction

Mobility profiles are generated by collecting input data and reducing the size by removing the outliers. The reduced data are transmitted to each base station which in turn predicts the next cell.

4.3. Collection of Input Data

Mobility management entity maintains the records of entry. Additionally, exit times of each user entity (UE) are maintained at Base Station (BS). At each cell, UE’s dwell time Ti is computed.
T i = E x i t T i m e c e l l m E n t r y T i m e c e l l m
The format of the input data is given in Table 1 which contains the information of all visited base stations (BSs) at a given time interval.
Assume the mobility pattern as X m = { x 1 , x 2 x m } recorded for a user entity (UE). The movement of a UE is denoted by x i during a time interval t i  during which a call is made by UE. The mobility pattern X m is defined as the cell number and the time duration spent in that particular cell.
Xi represents a combination of u i , t i . Here, u i represents the cell number and ti represents the duration of time spent.
For example, a mobility pattern is recorded for m = 3: i.e., transition from cell 1 to cell 3. The time spent is 10, 20, and 12 min in each cell, respectively. The mobility pattern may be written as:
X 3 = { x 1 , x 2 , x 3 } = { ( u 1 , t 1 ) , ( u 2 , t 2 ) , ( u 3 , t 3 ) } = { ( 1 , 10 ) , ( 2 , 20 ) , ( 3 , 12 ) }

4.4. MFNN Model

For mobility prediction, the Multi-layer Feed Forward Network (MFNN) model is acknowledged. It contains input, hidden, and output layers. The sub pattern is a training data pair with cell number and time spent as input and the next cell location with time as a desired output. In Table 2, for example, the training sub pattern x1, x2, …, xk represents input, whereas xk + 1 is the intended output. The prediction order, k, is determined by the UE’s movement characteristics as well as the magnitude of the recorded mobility patterns. In other words, the intended output is assigned to the final element of the sequence. Table 2 assumes that the number of node movement examined in the input training data is four: i.e., z = 4, and Xj—each movement requires 2 quantities for representing User entity’s cell number and time.
In the proposed technique, one neuron contains the cell number and time. As a result, there are four neurons in the input layer and three in the hidden layer. The neuron’s no. at hidden layer is equal to the pattern’s no. used for training and length of the sub-pattern. At output layer, neuron’s no. depends on two parameters: cell number and time.
On the basis of trial and error, the value of each parameter can be decided. In the case of designed MFNN, the learning parameters are set as 0.8 and 0.008 from input layer to hidden layer and hidden layer to output layer, respectively. Tanh is used as an activation function. The number of iterations is selected as 20,000 to avoid jam for MFNN at local minima.

4.5. Prediction Based Model

The way toward anticipating UE’s next cell area is depicted with a model that is given as follows.
Consider an array of seven cells with mobile network topology depicted in Figure 2. The BS-1 is at the center which is surrounded by 6 BSs from BS2 to BS-7.
For each handoff, the cell number and time spent in that cell are considered. UE advancements are recorded and pre-executed to get the case of portability. According to cell-based portability structure, the model for UE1 and UE10 is induced for desire as follows:
The mobility pattern is given as below for UE 3:
X i = { ( 1 , t 1 ) , ( 7 , t 2 ) , ( 2 , t 3 ) , ( 3 , t 4 ) , ( 4 , t 5 ) , ( 5 , t 6 ) , ( 6 , t 7 ) }
with seven hands-off.
For UE13, the mobility pattern is
X i = { ( 5 , t 1 ) , ( 4 , t 2 ) , ( 3 , t 3 ) , ( 4 , t 4 ) , ( 5 , t 5 ) }
with five hands-offs.
The corresponding sub-patterns are achieved by monitoring each user’s pattern which is recorded for a certain period. The obtained sub-patterns are used to train the mobility prediction model. The example of portability of UE 1 is masterminded as in Table 2, which is fitting for training the prescient model. This training informational collection is then taken care of to the predictive model. In the proposed example, consider Pattern 1 and Pattern 2 that represent the training pattern, whereas Pattern 3 represents the test pattern. P 1   to   P 4 are given as input to the predictive model, whereas P 5 will be considered as the required output. We accept that over three examples happen for various occasions in the recorded versatility history of UE1. For prediction of mobility, the network is tried on the testing information.

4.6. Optimal Network Selection Algorithm

In case the predicted cell is unable to satisfy the requirement, then the best access network is selected by applying Access Network Selection Function (ANSF) as shown in Figure 3.
ANSF is a neutral function used to compute the efficiency of using a radio resource. It enhances QoS of mobile users acquired by performing handover to a particular network. It represented all elective objective connectivity networks that could serve a mobile client’s coverage area. The network with the highest ANSF value would be deemed the best choice for transitioning from the current access network.
The following events occur during the initiation of ANSF:
  • Initiation of new service request.
  • The MT discover the availability of new network
  • A user alters his preferences
  • Critical signal degradation or complete signal loss of current radio link
The network selection calculation requires input information from client and framework both. An ideal wireless access network is chosen for excellent service that can fulfill the accompanying targets:
  • Strong signal quality implies the accessibility of a network. Accessible network is identified if its signal quality is strong.
  • If a network with high optimal data rate is selected, it will reduce time of service delivery of non-real time system and improves the QoS of real-time system.
  • A network with high reliability does not have an error and offers a high level of performance.
  • Handover should be performed to a network where the battery power requirement is low.
Mobile clients are associated with the upper layers and get favorable position of more prominent coverage region.

4.7. Fuzzy Logic Technique

This section describes the fuzzy logic technique to determine the best network. The fuzzy rules and attributes used in fuzzy logic are convenient to modify. Users can easily modify the fuzzy member function as well as the fuzzy rules to obtain the most suitable output for the considered network environment.
The basic steps of the fuzzy logic technique are:
  • The burst inputs are taken from chosen attributes and degree to which inputs of info have a place with each appropriate fuzzy set is resolved. This process is called fuzzification.
  • At that point, this fuzzified input is taken and applied to the predecessor of the fuzzy principle and applied to ensuing part work.
  • Aggregation is the step in which all the inputs are considered and merged.
  • The output of the joined fuzzy set might be taken as input for defuzzification, and a single burst number is acquired as yield.
To start with, the fuzzy logic engine analyzes routing layer to determine the best network. The information is collected and is stored in the LSPs packet in the format shown in Table 3: Network Condition.

4.8. Fuzzification

In fuzzification, input variables like signal strength (T), Reliability (R), Battery power (B), Mobile terminal velocity (U), Data Rate (V) are given a degree of suitable fuzzy sets. The burst inputs are a combination of T, R, B, U and V.
The different possibilities for each attribute are given as below:
  • Signal Strength: (Good, Medium, Bad)
  • Reliability: (High, Medium, Low)
  • Battery Power: (Good, Medium, Bad)
  • Mobile Terminal Velocity: (Good, Medium, Bad)
  • Data rate: (Very fast, fast, slow)
To input and output variables, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8 and Figure 9 represent member function. For efficient computation, triangulation functions are used to design member function that gives excellent result.
In Table 4, T, R, B, U and V are taken as input and the output represents best network in the routing layer. The following are the fuzzy sets with combination as depicted in Table 4:
  • Signal strength (T)
  • Reliability (R)
  • Battery Power (B)
  • Mobile terminal velocity (U)
  • Data Rate (V)
If all the conditions satisfy, then it gives the best network.
If any one condition is low, or medium, then the result gives a fair network.
If any one condition satisfies, but the remaining is low or medium, then it gives the result as a bad network.

4.9. Defuzzification

The method of obtaining a numerical result based on a defined fuzzy set and on an output member function is called defuzzification. The output member function is shown in Figure 6. The center of gravity technique is considered to defuzzify the fuzzy result. The following formula describes the defuzzifier technique:
F u z z y _ C o s t = [ a l l   r u l e s R i * η ( R i ) ] / [ a l l   r u l e s η ( k i ) ]
where Fuzzy_Cost represents the degree of deciding factor R i denotes all fuzzy rules and variables and η ( R i ) its member function. The output of the Fuzzy_Cost function is changed to numerical result based on the above described defuzzification method.

4.10. The Overall Algorithm

  • Function Mobility_Prediction ()
  • Initially, collection of Input data is done
  • Apply sequence mining technique
  • Collect training data set
  • Determine the next cell
  • If predicted cell is unable to satisfy requirement
  • Then
  • Apply function Multiple-attribute Access Network Selection ()
  • consider values of parameters attribute, signal strength, reliability, battery power, mobility terminal velocity and data rate
  • Apply function fuzzy logic decision () to decide the network
  • Return the best network

5. Performance Evaluation

5.1. Experiment Setup

The evaluation of execution of Fuzzy based Vertical Handover Decision Algorithm (FVHDA) is done by Network simulator (NS-2) [34]. Consider a zone of 1000 × 1000 m of irregular network conveyed. The administration demand is fluctuated as 50 Kb/s, 100 Kb/s, 150 Kb/s, 200 Kb/s and 250 Kb/s. IEEE-Distributed Coordination Function (DCF) is utilized as the MAC layer convention for wireless LANs. The reenacted traffic is CBR with UDP source and sink. Figure 10 shows the simulation topology and Table 5 summarizes the simulation parameters used. In the topology, BS1 to BS4 belongs to the WiMAX network and BS5 and BS6 belongs to UMTS networks.

5.2. Metrics for Performance Analysis

In the performance analysis, the metrics of FVHDA are compared with vertical handover decision algorithm (VHDA) [21,22,23]. The metrics for performance analysis is evaluated according to the following metrics.
Average Handover Delay: Average of end-to-end delay from the origin to the destinations for all remaining data packets.
Average Packet Delivery Ratio: The average packet delivery ratio is calculated by dividing the number of successfully received packets by the total number of packets sent.

6. Experimental Results

The experiments are conducted for two scenarios. In scenario 1, handover from WiMAX network to UMTS network is considered, and in scenario 2, handover from UMTS network to WiMAX network is considered. In both scenarios, the number of service request is varied as 50, 100, 150, 200, and 250, and the performance metrics are evaluated for both the techniques.

6.1. Scenario 1 (WiMAX to UMTS)

Figure 11, Figure 12 and Figure 13 depict the results of handover_delay, delivery ratio, and bandwidth utilization for the service request 50, 100, 150, 200, and 250 in FVHDA and VHDA protocols. The performance of the two protocols is compared. From that comparison, we may infer that FVHDA executes better from VHDA by 14.2% in handover_delay, 18% in delivery ratio, and 17% bandwidth utilization.

6.2. Scenario 2 (UMTS to WiMAX)

Figure 14, Figure 15 and Figure 16 depict the outcome of handover_delay, delivery ratio, and bandwidth utilization for the service request 50, 100, 150, 200, and 250 in FVHDA and VHDA protocols. The performance of the two protocols is compared. From that comparison, we may infer that FVHDA outperforms VHDA by 6.14% in handover_delay, 3.24% in delivery ratio, and 3.32% in bandwidth utilization.

7. Conclusions

A Fuzzy based Vertical Handover Decision Algorithm Using Predictive Model for Next Generation network is proposed by us in this paper. A MFNN (Multi-layer Feed Forward Network) technique has been used to determine the next cell of the user along with best hand off time. In the case that the predicted cell does not satisfy the requirement, then the multiple-attribute Access Network Selection Function (ANSF) is used to obtain a suitable access network. A fuzzy logic decision is used to obtain the best network and assure the user about the ongoing session.
In the case of handover from WiMAX network to UMTS network, FVHDA execute better from VHDA by 14.2% in handover_delay, 18% in delivery ratio, and 17% bandwidth utilization. In the case of handover from UMTS network to WiMAX network, FVHDA outperforms VHDA by 6.14% in handover_delay, 3.24% in delivery ratio, and 3.32% in bandwidth utilization. In both the cases of handover, FVHDA outperforms VHDA.

Author Contributions

A.K.G. and V.G. contributed to the main idea and the methodology of the research. A.V., D.R.T. and R.R.G. designed the experiment, performed the simulations, and wrote the original manuscript. A.K.G., M.S. and A.V. contributed significantly to improving the technical and grammatical contents of the manuscript. M.S., A.V. and A.K.G., reviewed the manuscript and provided valuable suggestions to further refine the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Dongseo University, “Dongseo Cluster Project” Research Fund of 2021 (DSU-20210004).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Arunkumar, S.; Rajkumar, P. Fast Re-Authentication for Efficient and Coherent Handover in 4G Networks. Int. J. Adv. Res. Comput. Eng. Technol. IJARCET 2014, 3, 1353–1358. [Google Scholar]
  2. Lee, M.; Park, S. A Secure Context Management for QoS-Aware Vertical Handovers in 4G Networks. Commun. Multimed. Secur. 2005, 3677, 220–229. [Google Scholar]
  3. Dhar, T.; Koner, C. Password and Biometric Based Mutual Authentication Technique for 4-G Mobile Communications. IRACST Int. J. Comput. Sci. Inform. Technol. Secur. (IJCSITS) 2013, 3, 2. [Google Scholar]
  4. Bhattacharjee, P.K.; Kumar Pal, R. Mutual Authentication Technique Applying Three Entities in 4-G Mobile Communications. Int. J. Comput. Theory Eng. 2011, 3, 6. [Google Scholar]
  5. Li, S.; Xu, L.D.; Zhao, S. 5G Internet of Things: A survey. J. Ind. Inf. Integr. 2018, 10, 1–9. [Google Scholar] [CrossRef]
  6. Schröder, F. Future Telco. New York; Springer: Berlin/Heidelberg, Germany, 2019; pp. 63–74. [Google Scholar] [CrossRef]
  7. Patil, H.J.; Patil, D.T. Internet of Things & its application to the libraries. In Proceedings of the Internet of Things and Current Trends Libraries (ITCTL), Mehsana, India, 18–20 January 2018; pp. 1–12. [Google Scholar]
  8. Stamou, A.; Dimitriou, K.; Kontovasilis, K.; Papavassiliou, S. Autonomic handover management for heterogeneous networks in a future Internet context: A survey. IEEE Commun. Surveys Tuts. 2019, 21, 3274–3297. [Google Scholar] [CrossRef]
  9. Reddy, S.; Venkatarama, S. A comprehensive survey on seamless mobility management in 5G communications. Int. J. Future Gener. Commun. Netw. 2018, 11, 33–48. [Google Scholar]
  10. Alsaeedy, R.; Chong, E.K.P. A review of mobility management entity in LTE networks: Power consumption and signaling overhead. Int. J. Netw. Manag. 2020, 30. [Google Scholar] [CrossRef]
  11. Abhinav, K.; Purohit, H. A Comparative Study of Different Types of Handover Strategies in Cellular Systems. Int. J. Adv. Res. Comput. Commun. Eng. 2013, 2, 4278–4287. [Google Scholar]
  12. Gondara, M.K.; Kadam, S. Requirements of Vertical Handover Mechanism in 4G Wireless Networks. Int. J. Wirel. Mobile Netw. IJWMN 2011, 3, 18–27. [Google Scholar]
  13. Meetei, K.P.; George, A. Handover Management in Wireless Networks Using Predictive Modelling. In Proceedings of the National Conference on Communications, Bangalore, India, 28–30 January 2011; pp. 1–5. [Google Scholar]
  14. Liu, C.; Zhou, C. Challenges and Solutions for Handover Issues in 4G Wireless Systems-An Overview. In Proceedings of the International Latin American and Caribbean for Engineering and Technology, Miami, FL, USA, 2–4 June 2004; pp. 1–6. [Google Scholar]
  15. Lauridsen, M.; Gimenez, L.C.; Rodriguez, I.; Sorensen, T.B.; Mogensen, P. From LTE to 5G for connected mobility. IEEE Commun. Mag. 2017, 55, 156–162. [Google Scholar] [CrossRef]
  16. Yuan, G.; Zhang, X.; Wang, W.; Yang, Y. Carrier aggregation for LTE-advanced mobile communication systems. IEEE Commun. Mag. 2010, 48, 88–93. [Google Scholar] [CrossRef]
  17. Nkansah-Gyekye, Y.; Agbinya, J. An Optimum Vertical Handover Decision Algorithm for UMTS-WiMAX. In Proceedings of the 2nd IFIP International. Symposium on Wireless Communications and Information Technology in Developing Countries, Pretoria, South Africa, 6–7 October 2008; pp. 1–6. [Google Scholar]
  18. Janevski, T.; Jakimoski, K. Improving Vertical Handovers for Real-Time Video Traffic between UMTS and WiMAX Networks. Int. J. Res. Rev. Next Gener. Netw. 2011, 1. Available online: https://www.researchgate.net/publication/228894985_Improving_Vertical_Handovers_for_Real-Time_Video_Traffic_between_UMTS_and_WiMAX_Networks (accessed on 1 October 2020).
  19. Pattnaik, L.; Mohanty, M.N.; Mohanty, B. An Intelligent Method for Handover Decision in Next Generation Wireless Network; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2013; Volume 8298, pp. 465–475. [Google Scholar]
  20. Khan, M.; Ahmad, A.; Khalid, S.; Ahmed, S.H.; Jabbar, S.; Ahmad, J. Fuzzy Based Multi-Criteria Vertical Handover Decision Modeling in Heterogeneous Wireless Networks. Multimed. Tools Appl. 2017, 76, 24649–24674. [Google Scholar] [CrossRef]
  21. Malathy, E.M.; Muthuswamy, V. State of art: Vertical handover decision schemes in next-generation wireless network. J. Commun. Inform. Netw. 2018, 3, 43–52. [Google Scholar] [CrossRef]
  22. Ahmadi, K.; Miralavy, S.P.; Ghassemian, M. Software-defined networking to improve handover in mobile edge networks. Int. J. Commun. Syst. 2020, 33, 25–33. [Google Scholar] [CrossRef]
  23. Driouache, S.; Naja, N.; Jamali, A. Fuzzy Logic Based Intelligent Vertical Handover Decision in Heterogeneous Networks. In Artificial Intelligence and Industrial Applications; Masrour, T., El Hassani, I., Cherrafi, A., Eds.; Springer: Berlin/Heidelberg, Germany; Cham, Switzerland, 2020; p. 144. [Google Scholar] [CrossRef]
  24. Palas, M.R.; Islam, M.R.; Roy, P.; Razzaque, M.A.; Alsanad, A.; AlQahtani, S.A.; Hassan, M.M. Multi-criteria handover mobility management in 5G cellular network. Comput. Commun. 2021, 174, 81–91. [Google Scholar] [CrossRef]
  25. Storck, C.R.; Efrem, E.D.O.; Guilherme, G.D.O.; Mini, R.A.; Duarte-Figueiredo, F. FiVH: A Solution of Inter-V-Cell Handover Decision for Connected Vehicles in Ultra-Dense 5G Networks. Veh. Commun. 2021, 28, 100307. [Google Scholar]
  26. Liu, Q.; Kwong, C.F.; Wei, S.; Li, L.; Zhang, S. Intelligent Handover Triggering Mechanism in 5G Ultra-Dense Networks via Clustering-Based Reinforcement Learning. Mobile Netw. Appl. 2021, 26, 27–39. [Google Scholar] [CrossRef]
  27. Shayea, I.; Ergen, M.; Azmi, M.H.; Çolak, S.A.; Nordin, R.; Daradkeh, Y.I. Key Challenges, Drivers and Solutions for Mobility Management in 5G Networks: A Survey. IEEE Access 2020, 8, 172534–172552. [Google Scholar] [CrossRef]
  28. Minimum Requirements Related to Technical Performance for IMT-2020 Radio Interface(s), Document ITU-R M.2410-0. 2017. Available online: https://www.itu.int/dms_pub/itu-r/opb/rep/R-REP-M.2410-2017-PDF-E.pdf (accessed on 3 September 2020).
  29. Pi, Z.; Khan, F. An introduction to millimeter-wave mobile broadband systems. IEEE Commun. Mag. 2011, 49, 101–107. [Google Scholar] [CrossRef]
  30. Lee, S.K.; Sriram, K.; Kim, K.; Kim, Y.H.; Golmie, N. Vertical Handover Decision Algorithms for Providing Optimized Performance in Heterogeneous Wireless Networks. IEEE Trans. Veh. Technol. 2009, 58, 865–881. [Google Scholar]
  31. Abdoulaziz, I.H.; Renfa, L.; Fanzi, Z. Handover Necessity Estimation for 4G Heterogeneous Networks. Int. J. Inform. Sci. Tech. 2012, 2, 1–13. [Google Scholar] [CrossRef]
  32. Aitmansour, A.; Enneya, N.; Ouadou, M.; Aboutajdine, D. Handover between WiMAX and WiFi Networks. In Proceedings of the Second International Conference on Innovative Computing Technology, Casablanca, Morocco, 18–20 September 2012; pp. 69–74. [Google Scholar]
  33. Miyim, A.M.; Ismail, M.; Nordin, R.; Ismail, M.T. Technique for Cross-layer Vertical Handover Prediction in 4G Wireless Networks. Procedia Technol. 2013, 11, 114–121. [Google Scholar] [CrossRef]
  34. Network Simulator. Available online: http://www.isi.edu/nsnam/ns (accessed on 12 March 2021).
Figure 1. Block Diagram of Proposed System.
Figure 1. Block Diagram of Proposed System.
Electronics 10 02016 g001
Figure 2. Representation of Mobility Prediction Model.
Figure 2. Representation of Mobility Prediction Model.
Electronics 10 02016 g002
Figure 3. Representation of Block Diagram for Selection of best Network.
Figure 3. Representation of Block Diagram for Selection of best Network.
Electronics 10 02016 g003
Figure 4. Signal Strength.
Figure 4. Signal Strength.
Electronics 10 02016 g004
Figure 5. Reliability’s Degree Member Function.
Figure 5. Reliability’s Degree Member Function.
Electronics 10 02016 g005
Figure 6. Battery Power’s Degree Member Function.
Figure 6. Battery Power’s Degree Member Function.
Electronics 10 02016 g006
Figure 7. Mobile terminal velocity’s Degree Member Function.
Figure 7. Mobile terminal velocity’s Degree Member Function.
Electronics 10 02016 g007
Figure 8. Data rate’s Degree Member Function.
Figure 8. Data rate’s Degree Member Function.
Electronics 10 02016 g008
Figure 9. Output Member Function.
Figure 9. Output Member Function.
Electronics 10 02016 g009
Figure 10. Simulation Topology.
Figure 10. Simulation Topology.
Electronics 10 02016 g010
Figure 11. Service Request vs. Handover_Delay.
Figure 11. Service Request vs. Handover_Delay.
Electronics 10 02016 g011
Figure 12. Service Request vs. Delivery Ratio.
Figure 12. Service Request vs. Delivery Ratio.
Electronics 10 02016 g012
Figure 13. Service Request vs. Bw_Utilization.
Figure 13. Service Request vs. Bw_Utilization.
Electronics 10 02016 g013
Figure 14. Service Request vs. Handover_Delay.
Figure 14. Service Request vs. Handover_Delay.
Electronics 10 02016 g014
Figure 15. Service Request vs. Delivery Ratio.
Figure 15. Service Request vs. Delivery Ratio.
Electronics 10 02016 g015
Figure 16. Service Request vs. Bw_Utilization.
Figure 16. Service Request vs. Bw_Utilization.
Electronics 10 02016 g016
Table 1. Format of Collected Data.
Table 1. Format of Collected Data.
UEID1Cell
ID1
Dwell Time1Cell
ID2
Dwell Time2Cell
ID3
Dwell
Time3
Table 2. Movement of Input Training Data.
Table 2. Movement of Input Training Data.
Sub-PatternInput Training Data 1Input Training Data 2Input Training Data 3Input Training Data 4Desired Output
1 x 1 x 2 x 3 x 4 x 5
2 x 2 x 3 x 4 x 5 x 6
3 x 3 x 4 x 5 x 6 x 7
Table 3. Network Condition.
Table 3. Network Condition.
LayerSignal StrengthReliabilityBattery PowerMobile Terminal VelocityData Rate
Routing layerTRBUV
Table 4. Fuzzy Rule Base.
Table 4. Fuzzy Rule Base.
RuleTRBUVN (o/P)
1GoodMediumLowBadSlowBad
2MediumMediumLowBadSlowBad
3BadLowHighBadSlowBad
4MediumMediumHighMediumFastFair
5MediumMediumLowMediumFastFair
6GoodMediumMediumMediumFastFair
7GoodMediumMediumMediumSlowFair
8MediumMediumHighGoodFastFair
9MediumHighHighMediumFastFair
10MediumHighLowMediumVery fastFair
11MediumMediumHighMediumFastFair
12GoodHighLowMediumFastFair
13BadHighLowBadSlowBad
14BadLowLowBadSlowBad
15BadLowMediumMediumFastFair
16MediumLowHighGoodVery fastFair
17MediumMediumMediumMediumFastFair
18GoodMediumLowBadBadBad
19GoodMediumMediumGoodFastFair
20GoodHighHighGoodVery FastBest
Table 5. Used Parameters.
Table 5. Used Parameters.
Mobile Nodes No.30
Network Size 1000 × 1000
Mac standardIEEE 802.11
Time 35 sec
Simulation TrafficCBR
Packet Size100
Rate50 Kb/s, 100 Kb/s, 150 Kb/s, 200 Kb/s and 250 Kb/s.
Propagation ModelTwoRayGround
Antenna typeOmniAntenna
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Gupta, A.K.; Goel, V.; Garg, R.R.; Thirupurasundari, D.R.; Verma, A.; Sain, M. A Fuzzy Based Handover Decision Scheme for Mobile Devices Using Predictive Model. Electronics 2021, 10, 2016. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics10162016

AMA Style

Gupta AK, Goel V, Garg RR, Thirupurasundari DR, Verma A, Sain M. A Fuzzy Based Handover Decision Scheme for Mobile Devices Using Predictive Model. Electronics. 2021; 10(16):2016. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics10162016

Chicago/Turabian Style

Gupta, Amit Kumar, Vikas Goel, Ruchi Rani Garg, Dasarada Rajagopalan Thirupurasundari, Ankit Verma, and Mangal Sain. 2021. "A Fuzzy Based Handover Decision Scheme for Mobile Devices Using Predictive Model" Electronics 10, no. 16: 2016. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics10162016

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop