2015 Second International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T) 2015
DOI: 10.1109/infocommst.2015.7357335
|View full text |Cite
|
Sign up to set email alerts
|

LTE EPS network with self-similar traffic modeling for performance analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 5 publications
1
3
0
Order By: Relevance
“…Previous articles have pointed out that the lack of coherent policy frameworks can stifle innovation and hinder the deployment of these technologies. The present study reaffirms the importance of adaptive and forward-thinking regulatory approaches to ensure that telecommunications infrastructure remains robust and compliant with emerging technological standards [29] Furthermore, this research contributes to the academic and practical understanding of how telecommunication technologies can be synergistically combined to enhance network capabilities. Unlike some previous studies that treated these technologies in isolation, this study provides a holistic view of their interdependencies and the cumulative effects on network performance and reliability [30] The discussions in this article resonate with the broader academic discourse on telecommunications, providing both confirmatory evidence of previous findings and novel insights into the integration of LTE, 5G, UAVs, IoT, and cloud computing.…”
Section: Discussionsupporting
confidence: 72%
“…Previous articles have pointed out that the lack of coherent policy frameworks can stifle innovation and hinder the deployment of these technologies. The present study reaffirms the importance of adaptive and forward-thinking regulatory approaches to ensure that telecommunications infrastructure remains robust and compliant with emerging technological standards [29] Furthermore, this research contributes to the academic and practical understanding of how telecommunication technologies can be synergistically combined to enhance network capabilities. Unlike some previous studies that treated these technologies in isolation, this study provides a holistic view of their interdependencies and the cumulative effects on network performance and reliability [30] The discussions in this article resonate with the broader academic discourse on telecommunications, providing both confirmatory evidence of previous findings and novel insights into the integration of LTE, 5G, UAVs, IoT, and cloud computing.…”
Section: Discussionsupporting
confidence: 72%
“…Although the cited paper aims to improve 5g radio signals, it lacks bandwidth data when changing the trajectory of the UAV receiver/ transmitter. In [2,3], the model implemented and processed self-driving traffic using the Pareto distribution function and took into consideration the time used in traffic management using M/M/1 and the Weibull distribution. The disadvantage in [2,3] is the lack of information about the response of the channel quality indicator (CQI) in the frequency range exceeding the throughput intended for the equipment of the transmitter-receiver channel.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…In [2,3], the model implemented and processed self-driving traffic using the Pareto distribution function and took into consideration the time used in traffic management using M/M/1 and the Weibull distribution. The disadvantage in [2,3] is the lack of information about the response of the channel quality indicator (CQI) in the frequency range exceeding the throughput intended for the equipment of the transmitter-receiver channel. Industrial traffic requires microsecond latency for IoT communication [4].…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Currently, there are works aimed at solving the problem of load balancing in Network Intrusion Detection System (NIDS) [3][4][5]. In [6] the parallel architecture of NIDS is considered, which overcomes the restriction on intrusion detection, distributing network traffic load on an array of sensor nodes.…”
Section: Introductionmentioning
confidence: 99%