Share This Article:

Evaluating Throughput and Delay in 3G and 4G Mobile Architectures

DOI: 10.4236/jcc.2014.210001    3,820 Downloads   4,690 Views   Citations

ABSTRACT

All mobile carriers these days have provided 3G and 4G services to their customers. The evolution of cellular networks from 3G to 4G has improved several performance metrics of the data communications. The focus of this paper is to evaluate two of the most important performance metrics: throughput and delay. We consider the cellular network as an integrate infrastructure that includes mobile and fixed nodes. Based on this model we calculate and analyze the throughput and delay. Our results illustrate that the throughput is increased while the delay is decreased in 4G data network compared to the previous 3G architecture. In addition, we evaluate how the delay affects the security of the network.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Caushaj, E. , Ivanov, I. , Fu, H. , Sethi, I. and Zhu, Y. (2014) Evaluating Throughput and Delay in 3G and 4G Mobile Architectures. Journal of Computer and Communications, 2, 1-8. doi: 10.4236/jcc.2014.210001.

References

[1] Akyildiz, I., Gutierrez-Estevez, D.M. and Reyes, E. (2010) The Evolution to 4G Cellular Systems: LTE-Advanced. Physical Communication, 3, 217-244. http://dx.doi.org/10.1016/j.phycom.2010.08.001
[2] Stanley, S. (2010) LTE Technology and Components.
http://www.iphase.com/downloads/LTE_Technology_and_Components_2010_LRWebinar.pdf
[3] Gupta, P. and Kumar, P.R. (2000) The Capacity of Wireless Networks. IEEE Transactions on Information Theory, 46, 388-404. http://dx.doi.org/10.1109/18.825799
[4] Gamal, A., Mammen, J., Prabhakar, B. and Shah, D. (2204) Throughput-Delay Trade-Off in Wireless Networks. INFOCOM, Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies, 475-485.
[5] Venkataram, P. and Satish, B. (2010) Wireless and Mobile Network Security. Tata McGraw-Hill Education, New Dehli.
[6] Caushaj, E., Fu, H., Sethi, I., Badih, H., Watson, D., Zhu, Y. and Leng, S. (2013) Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications. IJITN.
[7] Kurose, J. and Ross, K. (2012) Computer Networking: A Top-Down Approach. Pearson, 6th Edition.
[8] Beaubrun, R., Moulin, B. and Jabeur, N. (2007) Architecture for Delivering Location-Based Services. IJCSNS International Journal of Computer Science and Network Security, 7.
[9] Gudipati, A., Perry, D., Erran, L. and Katti, S. (2013) SoftRAN: Software Defined Radio Access Network. HotSDN 2013 Proceedings of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 25-30.
[10] Cox, C. (2012) An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications. Wiley, 151. http://dx.doi.org/10.1002/9781119942825.ch9
[11] Bhadrapur, P.K. (2012) HSS Front-End Implementation for a Large Scale Common HLR/HSS.
http://uu.diva-portal.org/smash/get/diva2:559134/FULLTEXT01.pdf

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.