[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Volume 4, Issue 1 (9-2015) ::
منادی 2015, 4(1): 59-78 Back to browse issues page
a review of vertical handover in wireless networks:concept, protocols, Algorithms.
Abstract:   (5143 Views)

The next generation of heterogeneous wireless access network technologies are  include such as wireless networks (WiFi and WiMax) and cellular networks (such as WCDMA and HSPA and 4G). One of the major issues in heterogeneous wireless network design, support for mobile users is vertically integrated handover. handover process between different wireless technology, called vertical handover. The wireless technology of different features, services, pricing, and offer different regional coverage. Vertical handover can be combined with the benefits of mobile networks to obtain user satisfaction and improve efficiency, can be used. So concepts and review the measures taken are necessary. The main purpose of this article we discribe the basic concepts related to handover, classification, algorithms, protocols, and features favorable factors in handover for Next Generation Networks.

Keywords: handover algorithms, authentication protocol, hard handover, soft handover, heterogeneous networks.
Full-Text [PDF 3154 kb]   (1717 Downloads)    
Type of Study: Review Article | Subject: Special
Received: 2016/02/16 | Accepted: 2016/08/14 | Published: 2016/08/14
Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

a review of vertical handover in wireless networks:concept, protocols, Algorithms.. منادی 2015; 4 (1) :59-78
URL: http://monadi.isc.org.ir/article-1-51-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 4, Issue 1 (9-2015) Back to browse issues page
دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.05 seconds with 39 queries by YEKTAWEB 4660