Telecommunication Engineering
Permanent URI for this collection
Browse
Browsing Telecommunication Engineering by Issue Date
Now showing 1 - 20 of 168
Results Per Page
Sort Options
Item Comparison of Machine Learning Techniques For Intrusion Detection System(2018-10) Kelem, Birhane; Henock, Mulugeta (PhD)The rapid growth in the ubiquity and sophistication of Information Communication Technology (ICT) and the emergence of new networking paradigms such as Cloud Computing (CC), and Internet of Things (IoT) have made vital changes in the globe. Computer network security is one of the most critical issue as attackers are also evolving dynamically. There should be a mechanism that fill the security vulnerability. One of the promising technique to ensure computer network security is the use of hybrid machine learning (ML) techniques which automate the process of intrusion detection in computer networks. In this research, six hybrid ML models were developed based on the Knowledge Discovery in Database (KDD) process model. The dataset used in this study has been taken from University of New Brunswick Institute (Canada Institute of Cyber Security). After selecting the dataset, preprocessing techniques such as filling missing records, reduce dimension, selecting the most relevant features, and finally normalize the dataset input using features scaling are performed. The hybrid ML models for intrusion detection systems (IDS) are implemented using Python programming language. In this work, a total of 274208 dataset records are used for the ML models evaluation. Out of this, 191945 datasets are used for training and a separate 82263 records are used as a testing set. The decision tree (DT) and neural network (NN) algorithms as supervised and K-means algorithm as unsupervised algorithms are applied in both without feature selection and with feature selection. The principal component analysis and decision tree (PCA-DT) model showed the best results in all performance parameters. The model has a prediction accuracy of 99.89% and the lowest false positive rate of 0.027%. Results confirm the effectiveness of our proposed methods.Item Comparison and Fine Tuning Empirical Pathloss Models at 1800MHZ and 2100MHZ Bands for Addis Ababa, Ethiopia(AAU, 2018-10) Esayas, Andarge; Dereje, Hailemariam (PhD)Pathloss models play a very important role in wireless communications in coverage planning, interference estimations, frequency assignments, Location Based Services (LBS), etc. They are used to estimate the average pathloss a signal experience at a particular distance from a transmitter. Inaccurate propagation models may result in poor coverage, poor quality of service or high investment cost. Both second generation (2G) and third generation (3G) networks in the city of Addis Ababa (AA), Ethiopia, have problems like poor coverage, low data throughput, call drops and others. One of the root causes of these problems is the use of untuned pathloss model during network planning. So, it is mandatory for the operators to select the best fit pathloss model and tune it according to the specific situation the pathloss model is used. This thesis compares three pathloss models; namely, COST231, ECC-33 and SUI and tunes the one that performs best in the specific area type. At 1800MHZ band, COST231 was best in estimating the measured path loss in urban areas with a Root Mean Squared Error (RMSE) of 3.27dB before tuning and the RMSE could improve to 3.25dB after tuning. COST231 was also best in suburban areas with an RMSE of 5.27dB. Tuning the model could improve the RMSE to 4.18dB. SUI was best in open areas. It has an RMSE value of 6.0dB before tuning. Tuning has improved the RMSE value to 4.91dB. At 2100MHZ, 25 sites are used to collect path loss data. Similar analysis was done in the three path loss models. Based on the analysis, SUI is found to be best in predicting the path loss for all the three morphology types. Although ECC-33 was equally competent for urban area sites, SUI could predict the path loss better for the overall all average measured path loss with an RMSE of 4.27dB. Tuning the model could improve the RMSE to 2.23dB. The measured path loss for suburban areas could also be better predicted by SUI with an RMSE value of 5.75dB before tuning and 2.57dB after tuning. Path loss in open areas can also be better predicted by SUI. It has an RMSE value of 6.53dB before tuning. An improvement in RMSE to 3.38dB could be achieved after tuning.Item Techno-economic Analysis of LTE Deployment Scenarios for Emerging City: A Case of Adama, Ethiopia(AAU, 2018-10) Dechasa, Negash; Beneyam, Berehanu (PhD)The exponential growth of demand for mobile broadband access in emerging cities has been pushing deployment of long-term evolution (LTE) mobile technology. However, technological advancement towards LTE alone cannot show the performance, acceptance, and economic viability of an investment without detail technical and economic feasibility assessment of possible LTE deployment alternatives. In this thesis, first potential LTE deployment scenarios analyzed and formulated through scenario planning method for emerging city. Then, techno-economic analysis consists of marketing forecast, radio access network dimensioning, cost and revenue modeling, and economic feasibility analysis for seven years study period assuming a monopoly telecom market using modified TERA model performed. For techno-economic evaluation, modified TERA model is implemented in the MATLAB. Results show that market potential and operating frequency have a great impact on network capacity, coverage and number of sites in the area which in turn influences the rate of return on investment. Deployment of LTE in 1800Mhz band under high and low demand capacity, and deployment of LTE in 2100Mhz band under high demand capacity are feasible with the payback period of less than 3.5 years for emerging city. From specially formulated deployments scenarios techno-economic results, coverage favored LTE deployment scenario (in 1800Mhz under low demand capacity) is technically and economically feasible for Adama city of Ethiopia in a monopoly telecom operator market with payback period of 3.25 years.Item Traffic Modeling using Power Consumption of Base Station: The case of Ethio telecom(AAU, 2018-10) Tesfu, Hagos; Dereje, Hailemariam (PhD)Wireless telecommunication networks have become fundamental to daily activities. The mobile telecommunication market in Ethiopia is grown significantly in the past few years. Recently there are about 67.5 million mobile subscribers served by 7,353 base stations. Now a day’s optimizing the energy consumption of wireless telecommunications infrastructure has become a new challenge for the research community, governments and industries in order to reduce CO2 emission and operational energy cost. In view of the above problems, operators should have to have proper strategy to own energy efficient network. Studying the relationship between traffic load and power consumption at a Base Station (BS) could help to have proper strategy. The real time hourly data of the power consumption and traffic load have been obtained from servers where measurement is performed on a fully operated base stations. In this thesis, we analyze and model traffic load based on power consumption at a BS using MATLAB, R-studio and Excel. The analysis show a direct relationship is obtained between base station traffic load and power consumption. According to the relationship, we develop a piecewise linear model for base stations serving GUL (GSM, UMTS and LTE) and GU (GSM and UMTS) technologies. This result can be input for energy saving techniques. This thesis also analyzes the power consumption data has lognormal distribution and the traffic load data has Weibull distribution.Item Quality of Experience Evaluation for Addis Ababa UMTS Enterprise Data Customers(AAU, 2018-10) Abera, Reesom; Beneyam, Berehanu (PhD)Penetration of high-speed mobile data services including social media and video services has been significantly increased across the globe due to fast development of mobile network and smartphone technologies. A similar trend has also been seen in Ethiopia mainly due to large mobile network expansion projects of the sole incumbent operator ethio telecom, particularly for Universal Mobile Telecommunications System (UMTS) network. To achieve a successful business, mobile operators need to continuously monitor satisfaction of their customers and the quality of their networks to take timely marketing, network optimization and other relevant decisions. While traditionally the focus has been towards network Quality of Service (QoS), operators recently also provide attention to the aggregate user quality perception – Quality of Experience (QoE). Yet, a combined quality analysis for mobile networks in Ethiopia, particularly for the popular UMTS data service, has not been performed. In this thesis work, the detailed QoS and QoE evaluation for Addis Ababa UMTS data service including both network quality perspectives and user side perception focused on selected enterprise customers are presented. Assessment of quality monitoring process in ethio telecom has been done before conducting the evaluation on QoS and QoE. The evaluation is made based on download throughput, upload throughput and latency quality metrics collected from network management system (NMS), indoor walk test, crowdsourcing test using RTR-NetTest tool and contextually formulated survey questionnaire. In general, achieved throughput and latency results show that both QoS and QoE are not good and there is dissatisfaction of customers. For instance, the average download throughput results are 0.57 Mbps from NMS, 0.86 Mbps from indoor walk test and 2.53 Mbps from RTR-NetTest. These quantitative results are reflected in the perception result of the participants where a Mean Opinion Score value of 2.65 for the satisfaction of downloading files or video/music is achievedItem Enhancing Mobile Banking Service Availability Using Machine Learning(2018-10) Said, Ahmed Said; Murad, Ridwan (PhD)One of the main obstacles for adoption of mobile banking is that of security concern. This concern is becoming a reality in the case of mobile core inter-node protocol, Signaling System number 7 (SS7). SS7 was developed with the assumption of trusted network within and among operators. With growing number of value-added service providers and roaming partners connecting to operators, the trusted network is no longer a closed network. Attackers continue to exploit vulnerabilities of SS7 network to conduct attacks that compromise confidentiality, integrity and availability of mobile banking users and mobile network operators. In Ethiopia, Short Message Service (SMS) and Unstructured Supplementary Service Data (USSD) are mainly used for mobile banking. These services are both vulnerable to availability attacks. This thesis is an effort to detect SMS availability attacks on Mobile Application Part (MAP) layer of SS7. To mitigate these attacks, machine learning techniques using real SMS traffic data from ethio telecom is used for adaptive detection of abnormal SMS. A novel approach of using aggregation of Message Origination (MO) error codes is proposed for class feature extraction. A combination of expert judgments, literature reviews and information gain are used for optimal feature selection. As a result, it is recommended to use origination, destination, and mobile switching center address and write time as optimal features. To solve the problem of attack message detection, PART, Random Forest and J48 algorithms are compared. It is found that J48 has a superior performance with an accuracy of 98.6465% and model build time of 3.71 seconds.Item Performance Evaluation of Server Cluster Load balancing Algorithms Using SDN Open Flow Model(AAU, 2018-10) Wubshet, Abebe; Yalemzewud, Negash (PhD)Due to the growth in the network usage, there is huge traffic pressure to server clusters in the datacenters. To manage incoming traffic, operators choose a load balancing technology to assign the incoming traffic to server clusters. However, this classical load balancing technology has complexity and challenge in scalability, flexibility and manageability. But, the emerging software defined networking having application, control and infrastructure layers offers an advantage of low cost, scalable, programmable and easy management to server clusters load balancing activity by abstracting the low level functionality of the network. This study evaluates the performance of round robin, weighted round robin and least load server cluster load balancing algorithms using software defined networking open Flow model by providing ethio telecom’s enterprise shop customers relation Management system users’ data as input in order to answer a research question of which load balancing algorithms is better in terms of network performance parameters such as response time, transaction per second, throughput in SDN platform. Simulation has been used as a methodology to evaluate server load balancing algorithms using Open Flow model by creating a virtual environment with oracle virtual box. In addition, mininet simulation tool has used to create the network topology and POX controller used in the control layer of the open Flow model to do the performance evaluation of the load balancing algorithms. The simulation result shows that round robin algorithm is better than weighted round robin and least load server load balancing algorithms interms of response time (sec), transaction rate (trans/sec), throughput (MB/sec).Item An Improved Technique for Enterprise Service Bus Data Transformation: The Case of ethio telecom(AAU, 2018-10-19) Alemtsehay, Kebede; Mesfin, Kifle (PhD)Service Oriented Architecture (SOA) is an integration architecture approach that is based on the concept of a service and addresses, the requirements of loosely coupled, standards-based, and protocol independent distributed computing. SOA used Enterprise Service Bus (ESB) to realize its principle. ESB is architecture to overcome the limitation of traditional architectures. One of its main functions is Data Transformation, which is the conversion process of data structure among heterogeneous systems during integration. Data transformation consists of four data transformation functions which are name and value transformation, attribute aggregation and splitting. Its performance depends on the data exchange format and transformation functions complexity. Most ESB platforms adopt XML-based format as their common data model, which is quite time consuming on data transformation. The performance of XML based format is affecting the real time communication performance, mainly as complexity increases. The objective of this research is to analyze the performance of ESB data transformation functions and propose an improved technique for ESB data transformation data exchange formats. We used various research methods including literature review, informal interview and focus group discussion for gathering and analyzing relevant data. An improved technique for ESB data exchange formats is proposed that uses both XML and JSON formats based on complexity matrix in Complexity Analyses Algorithm (CAA). CAA uses JSON format for high complexity and XML for low complexity level. From the experiment result we have observed that JSON data format requires less time than XML data format while data complexities increases. So by implemented this improved technique we can enhance the performance of ESB data transformation.Item Hybrid SARIMA-ELM-based Data Traffic Forecasting: The Case of UMTS Network in Addis Ababa, Ethiopia(AAU, 2018-10-25) Getinet, Tesfaye; Dereje, Hailemariam (PhD)In Universal Mobile Telecommunications Service (UMTS) network planning, data traffic demand is one critical input in deciding dimension of network elements. Past data collected from deployed UMTS network can be used to forecast future demand. In the context of ethio telecom, the sole telecom service provider in Ethiopia, the future demand forecast is, however, based on number of subscribers growth forecast obtained from marketing section. This approach assumes uniform data demand per subscriber to obtain the total data demand. Understandably, it does not utilize the data growth information which is already available in the network. Forecasting the traffic demand based on historical data from network can enhance the marketing inputs and the traffic model accuracy. In this regard, taking data from ethio telecom’s UMTS network, a prior research has used Seasonal Autoregressive Integrated Moving Average (SARIMA) model to forecast a one month data traffic demand. However, the research did not consider the non-linearity observed in the data traffic. This thesis handles this non-linearity via a hybrid model that accounts the linearity with SARIMA model and the non-linearity via Extreme Learning Machine (ELM) model; here after called the hybrid SARIMA-ELM model. A one and half year (i.e., from April 2015 – June 2016) data traffic collected from five Radio Network Controllers (RNCs) of the UMTS network in the city of Addis Ababa is used for the forecast. The forecasting performance metrics are: Root Mean Square Error (RMSE), Mean Absolute Error (MAE), Mean Absolute Percentage Error (MAPE) and Mean Absolute Square Error (MASE). The results indicate that the hybrid SARIMA-ELM model with SARIMA order of (0,1,1) (1,0,1)7 is selected with 3.75% increase in forecast than SARIMA only model. The outperform SARIMA-MLP, which has the second lower error, with 24.8% percentage error reduction.Item Analysing Impact of Seamless MPLS on QoS(AAU, 2018-11) Habtamu, Kumera; Yalemzewd, Negash (PhD)The need for timely delivery of real time and mission-critical applications has led to a high demand for end-to-end QoS guarantees. Service providers, including Ethio telecom, have deployed mobile backhaul in addition to IP core network with separate MPLS domains for each network. Internal network topology of one domain and its policy implementations are proprietary information and inter-domain routing must be done without detailed knowledge of the entire network topology, policies and performance of the other domains. Lacks of global coordination between policies used in different domains, limitations of BGP for implementing end-toend QoS in inter-domain routing and its slow convergence during network failure are major challenges of the current inter-domain routing architecture. As stated by different authors such as in RFC 8277 (Using BGP to Bind MPLS Labels to Address Prefixes), Seamless MPLS provides framework for taking MPLS end-to-end in a scalable fashion, extending benefits of traffic engineering (TE) and guaranteed service-level agreements (SLAs) with deterministic network resiliency. It offers an alternative for implementing end-toend MPLS networks by integrating different domains into a single MPLS domain. The motivation of this thesis is to investigate and analyze impacts of implementing Seamless MPLS on QoS parameters. The impact on QoS parameters is analyzed by using two scenarios; MPLS with multiple domains and Seamless MPLS integrating three domains in to single MPLS domain. Simulation tools such as eNSP, Ostinato, NQA and MATLAB are used to compare performances of the two scenarios. The analysis results show that in Seamless MPLS throughput is improved by 36.87%, latency is improved by 15.98%, packet loss is improved by 20% and jitter is improved by 12.5% compared to MPLS. From the results one can understand that any service provider can benefit from deploying Seamless MPLS.Item Short Message Service Fraud Mitigation Taxonomy: The Case of ethio telecom(AAU, 2018-11) Tarikua, Worku; Mesfin, Kifle (PhD)Telecommunication fraud is remaining challenging since the beginning of commercial telecom service. There are various reasons that makes telecom fraud mitigation inefficient. Some of them are; integration of new technologies without evaluating the security hole, lack of knowledges on the fraud root causes, the changing behavior of fraud and effective use of mitigation techniques. Short Message Service (SMS) is one of the main and victim telecom services. A variety of technologies, services and actors are involved on SMS ecosystem. This technology diversity makes the service vulnerable for different type of messaging frauds. In this study SMS fraud mitigation taxonomy is proposed to improve fraud mitigation deployment method. The taxonomy is constructed from four main nodes namely Technology (Which), Vulnerability (Where), Fraud (How) and Mitigation (What) as a cause and effect way. These main nodes are also categorized in to three sub technological layers which are network/protocol, service and actor. In addition to this classification the mitigation techniques are characterized as technical and none technical. The evaluation process is done first selecting 100,000 fraudulent short message records from ethio telecom. Then taking appropriate mitigation techniques from Network /protocol, Service and Actor layers. Finally, the selected records are examined by each layer mitigation techniques based on the fraud scheme. The layered evaluation result confirmed the proposed approach can mitigate 70% of the fraud messages at network and protocol level, 57.2% at service level, and 84% at actor level before any impact. So that overall efficiency of this taxonomy based layered mitigation approach is recommended to use, instead of detecting the fraud after impacting the service.Item Telecom Engineering (Information Systems (TIS) Stream)(AAU, 2018-11) Werku, Melesse; Mesfin, Kifle (PhD)In the rapid development of information technology, many enterprises are challenged by seamless information exchange and resource sharing requirement in a heterogeneous enterprise environment. However, service-oriented middleware technologies can provide a better solution in facilitating seamless resource sharing and information exchange among integrated enterprise applications. It is important to carefully design flexible and scalable integration architecture to create and support a well-performing enterprise system. In this research, a Data Synchronization Solution Model (DSSM) is designed and implemented to overcome a data synchronization problem in a heterogeneous enterprise environment. The case study and the research idea are initialized based on existing real problems in ethiotelecom working environment. The company faces data synchronization problem between integrated applications. The data in the different application databases have mismatch; for example, for the same customer its service status could be active in one application and barring in another. As a solution, a data synchronization solution model is proposed based on middleware and knowledgebase. The middleware is a message processing part that receives the incoming message, processes and forwarded the message to a destination suitable data format. The knowledgebase is a database for the common data exchanged among integrated applications; which becomes a common data reference for integrated applications. To implement and validate the data synchronization solution model we simulate a heterogeneous enterprise environment using virtual machines, with different operating systems and databases. The implementation and validation is performed based on the company’s SIM card replacement business process. To simulate the message processing, we design Simple Object Access Protocol (SOAP) message with similar message structure in the company. The message processor is designed and implemented using open source WSO2 enterprise integrator tool. The validation result indicates, the practicality of DSSM hypothesis to creating consistency and synchronize data among integrated applications in a heterogeneous environment. The result also shows the features and components of DSSM are functioning per the design specified in the research document. Moreover, unlike the existing system in which the case study is based upon, the new solution is flexible for maintenance and redesign.Item Spatiotemporal Mobile Data Traffic Modeling: The Case of UMTS Network in Addis Ababa, Ethiopia(AAU, 2018-11) Yosef, Abera; Dereje, Hailemariam (PhD)The exponential growth in mobile data traffic is forcing telecom operators to invest on new infrastructures. But devising techniques for optimum network utilization, which can be provided by traffic modeling, has the potential to reduce investment costs. Modeling traffic variation in different service areas and time can also be applicable for energy efficient network planning, understanding customers’ data traffic usage behavior and dynamic resource allocation. In this thesis, based on the data collected from 734 Base Stations located in Addis Ababa, Ethiopia, the real traffic is modeled in space and time with a tunable accuracy. Firstly, a rectangle that can inscribe the geographical area of the city is selected and divided equally in to N by M smaller groups. Secondly, to understand the temporal behavior in the data, the time-series data traffic of each group is transformed to spectral domain by using Fast Fourier Transform where it is observed that all groups have the same four major frequency components but with different magnitude of coefficients and phases. Then, matrices corresponding to coefficient and phase values are transformed from spatial to spectral domain by applying Two Dimensional Discrete Cosine Transform. In spectral domain higher frequency components that contain less information are removed out and the remaining are used for the reverse transform that made the model to be complete in time and space. The different application areas of the model for the operator require a varying level of accuracy which in turn is dependent on the truncation level of frequency components. As a result, a relation between model performance and truncation level is developed which formed the model as a tunable around accuracy. Finally, by defining parameters that use the model as an input, the network performance is analyzed and suggestions for the observed gaps are presented.Item SIM-Box Fraud Detection Using Data Mining Techniques: The Case of ethio telecom(AAU, 2018-11) Kahsu, Hagos; Ephrem, Teshale (PhD)Telecommunication fraud is one of the threat of telecom operators as it drives telecom operators to loose a portion of their annual revenue. Bypass fraud is most worrying fraud type in today’s telecom business. The advent of new technologies provided fraudsters new techniques to device bypass fraud. Subscriber Identity Module box (SIM box) fraud is the popular type of bypass fraud, that has emerged with the use of Voice Over Internet Protocol (VoIP) technologies. SIM box is used to terminate international calls by diverting away from the legitimate interconnect gateway route. SIM box fraud is more common in the operators where their tari of international call termination is much higher than the local call tari . This high tari is a common method of subsidizing telecom infrastructure in the developing world. However, it creates strong motivation for fraudsters. Among various fraud prevention approaches, the use of monitoring call patterns and pro les through Fraud Management Systems and Test Call Generators are common one. Yet, both approaches have drawbacks which make them insu cient because they are easily overcome by fraudsters. Therefore, the need for more sophisticated techniques is inevitable. In recent years, datamining techniques have gained popularity in fraud detection. In this research, models were developed to classify Call Detail Records (CDRs) to propose a model that di erentiate fraudulent from legitimate subscribers with better performance. Three classi cation techniques, Random Forest (RF), Arti cial Neural Network (ANN) and Support Vector Machine (SVM), and three user pro ling datasets, 4 hour, daily and monthly aggregated were proposed. These three algorithms along with the three datasets were applied in building the models. Results of the work show that RF performed better among the three algorithms with accuracy of 95.99% and a lesser false-positive on the 4 hour aggregated dataset.Item Constraint-Based Hybrid Resiliency Mechanisms for Better Resource Utilization and Service Performance Quality in ASON SLA(AAU, 2018-11) Wondale, Kebede; Yalemzewd, Negash (PhD)In optical transport networks, contents of service level agreement (SLA) are not standardized yet. There is a general recommendation to include network resiliency mechanisms in SLA contracts by considering trade-off between resource utilization and service performance quality. This research work proposes two solutions to fulfil these trade-off requirements in network resiliency mechanisms. The first solution is employing a Routing and Wavelength Assignment (RWA) algorithm that can utilize network resources efficiently in Automatically Switched Optical Network (ASON) service provisioning. The research work conducts blocking probability and network availability comparison simulations for Shared Risk Group (SRG)-Disjoint Aware First-Fit Routing, Alternate Routing, Least Congested Routing and Load Sharing routing algorithms coordinated with First-Fit wavelength assignment algorithm in 1+1 Dedicated Path Protection (DPP) and Restoration schemes. The simulations performed on Net2Plan tool show that Alternate Routing algorithm has best overall results in blocking probability and network availability for both protection and restoration. The second solution is enhancing service performance qualities by combining protection and restoration. This research work proposes new constraint-based hybrid resiliency mechanisms (1+1 Link-Disjoint + Restoration, 1+1 Node-Disjoint + Restoration and 1+1 SRG-Disjoint + Restoration). The performance of these hybrid resiliency mechanisms is evaluated using Net2plan simulation tool. The results show that the network availability and recoverability performances are improved when it is compared to non-combined counter parts. 1+1 Node-Disjoint + Restoration shows best recoverability at lower traffic loads during link or SRG failures. At higher traffic loads, 1+1 SRG-Disjoint + Restoration performs best in recoverability during SRG failures. For instance, 1+1 SRG-Disjoint + Restoration has on average 16.8% higher recoverability than 1+1 Link-Disjoint + Restoration, at higher traffic loads. These performance enhancements are obtained with cost of relatively higher blocking probability.Item Empirical Outdoor-to-Indoor Propagation Path Loss Models Investigation and Tuning for 900, 1800 & 2100 MHz Frequencies: the Case of Addis Ababa City(AAU, 2018-11) Zerihun, Teshome; Dereje, Hailemariam (PhD)As trend of cellular traffic shifts from voice dominant to data and most of this traffic is being generated from indoor environment, providing optimal indoor solutions is becoming prime target of a radio planning task. But, it is a challenging task to meet the radio signal coverage target that ensures signal quality required by data traffic in indoor environment as radio propagation is impacted by building penetration loss (BPL) and in building propagation path loss. Hence, to ensure radio signal coverage target in such environment it is required to closely investigate and characterize these two losses. Investigating and characterizing these losses is prominently important for vertically expanding cities like Addis Ababa, Ethiopia, where outdoor macro sites are predominant solution to avail indoor environment signal coverage targets. This thesis aims to accomplish this critical task for city of Addis Ababa. Representative sample buildings based on morphology, purpose, building material types and building to transmitter antenna height relation are selected. Moreover, commonly used indoor propagation models are identified. Measurement is undertaken, based on measurement it is attempted to estimate BPL and tuned model parameters for the selected propagation models for various categories of indoor environments to determine unified outdoor-to-indoor propagation model. The results indicate that for a frequency of 900MHz, BPL for buildings made from hollow concrete blocks/bricks is identified as 12.01dB to 17.7dB; for building made from stone masonry the value ranges from 15.11dB to 17.81dB; and from 2.46dB to 8.81dB for buildings mainly made from glass. For 1800MHz frequency the identified BPL results are: 13.7dB to 17.51dB for buildings made from hollow concrete blocks/bricks; 16.38dB to 25.41dB for buildings made from stone masonry; and 0.89dB to 8.14dB for buildings mainly made from glass. Similarly, BPL for 2100MHz frequency is identified as 12.22dB to 13.36dB for buildings made from hollow concrete blocks/bricks; 14.16dB to 19..66dB for buildings made from stone masonry; and 6.25dB to 10.36dB for buildings mainly made from glass. Then, for the measured indoor path loss, parameters of the Path Loss Slope (PLS) model were tuned to capture radio signal propagation characteristics in the indoor environments. The results indicate that, the path loss exponent is found out to be in the range of 0.52 to 2.09 depending on the indoor environment considered. To validate the models, Root Mean Square Error (RMSE) is computed and it is found out it ranges from 1.06dB to 5.25dB depending on different building environments and selected models. The resulting outdoor-to-indoor propagation models can be used for coverage planning in the city of Addis Ababa.Item Neural Network based 3G Mobile Sites Fault Prediction: A Case Study in Addis Ababa, Ethiopia(AAU, 2018-11) Asmelash, Tesfay; Yihenew, Wondie (PhD)As cellular mobile networks are evolving in technology and service type, the number of mobile network site infrastructure is increasing. Nowadays, faulty cellular mobile network sites per day in ethio telecom are significant in number and have big impact to customers and operator in QoS, revenue and maintenance cost. Fault maintenance techniques commonly applied by ethio telecom is corrective maintenance approach. This only helps to recover services after interruption. However, it is important to implement the proactive maintenance approach to make mobile sites reliable and available. This helps to provide services according to standards and improve the quality of service delivery to customers. To mitigate mobile network site faults before happening, fault occurrence time prediction is an important technique for the implementation of proactive maintenance strategy. This Neural Network based 3G Mobile Fault Occurrence Prediction research work is conducted based on the Nonlinear Auto regressive (NAR) Neural Network time series prediction method using Addis Ababa 3G mobile sites in a case study. To train the neural network 15,950 actual fault occurrence time data are used. The algorithm used to train the neural network is Levenberg-Marquardt which is fast and efficient, and an iterative approach of hidden layer neuron number selection is applied. Finally, the best model is selected with minimum value of mean square error of prediction. Also, the model is tested with actual fault occurrence time which was not used in the training and achieved 90.71% in prediction. Therefore, it is efficient in prediction accuracy, fast and adaptive with future data.Item Techno-Economic Investigation of LTE-Advanced Deployment for Addis Ababa, Ethiopia(AAU, 2018-11) Gizachew, Hailegebriel; Beneyam, Berehanu (PhD)Due to innovative data services, the number of mobile subscriptions and amount of mobile data traffic will increase significantly globally. According to Ericsson mobility report, in 2022 the number of mobile data subscribers and traffic is forecasted to reach 9 billion and 71 Exabyte per month, respectively, from the current 7.5 billion and 8.8 Exabyte per month. Likewise, the report presented that Sub-Saharan Africa will also show a faster growth rate than any other region in the globe. 2018’s Ericsson interim mobility report shows, Ethiopia is among five countries in the world that score high in mobile subscription growth. In addition, when we see historical records, market potential, and various telecom expansion plans of the country, mobile subscriber and traffic growth is expected in Ethiopia, particularly in Addis Ababa city. To accommodate the increasing mobile traffic, beside Long Term Evolution (LTE), several operators are deploying and optimizing LTE-Advanced and LTEAdvanced Pro mobile technologies. Having partially deployed LTE network in Addis Ababa, ethio telecom has not yet moved to LTE-Advanced but now considers to accommodate significantly increasing mobile subscribers, traffic and future demand of the city. To that end, there is a need of understanding techno-economically viable LTE-Advanced deployment scenarios for the local context. In this thesis, feasible LTE-Advanced deployment options are developed using scenario planning method. Following, TERA Techno-economic Analysis framework and methodologies are investigated and modified to evaluate possible LTE-Advanced deployment scenarios techno-economically assuming 6 years study period and 10% discount rate. In the framework market analysis and LTE-Advanced radio network dimensioning performed using COST-231 Hata model; existing LTE traffic, standard and demography analysis is conducted for macro and small cells, respectively. In addition, the required bandwidth for the study period is forecasted and determined. Based on resulted Net Present Value and Payback Period of techno-economic evaluation, an LTE-Advanced scenario that applies progressive deployment with out-of-band small cells is feasible for Addis Ababa but not the case for a scenario that applies full deployment with out-of-band small cells. In both scenarios it is shown that LTE-Advanced is feasible if deployed in dense urban and urban areas.Item An Integration Pattern Selection Framework for ethio telecom Enterprise Systems(AAU, 2018-11) Thomas, Abebe; Mesfin, Kifle (PhD)Enterprise Application Integration (EAI) as a solution combines processes, standards, software and hardware for the seamless integration of different enterprise systems in order to operate and function as one. The success of EAI deployment is highly dependent on a proper selection of EAI solution patterns. ethio telecom’s enterprise systems are integrated and interoperated using EAI techniques. However, many organizations including ethio telecom, have the difficulty of selecting proper EAI solution patterns. Thus, several EAI solution pattern projects fail to deliver the service that the business is expecting. The objective of this thesis is to develop an integration pattern selection framework, which is used for the selection of an appropriate EAI solution pattern from the available real world’s design decisions. The research therefore studied the company’s end-to-end enterprise systems’ business scenario, by conducting interviews and group discussions with selected staffs, and also referred world’s scientific related works and literatures. Case study for validating the framework is also implemented. The proposed framework has the basic activities like: describing business process requirements for integration, studding the environments’ development context and integration purpose, examining the integration data and interfaces, modeling of data, mapping of those models, defining of EAI requirements specification, and finally selection of optimal EAI solution pattern, from the available EAI solutions’ patterns based on studied evaluation criteria. The framework has been evaluated using three different case studies; by taking ethio telecom’s existing integrated enterprise systems and also the forthcoming integration technology parameters. It is then reviewed and evaluated by the internal experts of the company. The main contribution of this research is: to support the company in choosing a suitable EAI solution pattern accommodating both technical and organizational measures, and to increase its’ level of success by implementing appropriate EAI solution, which avoids some drawbacks between packaged and third party systems in relation to interoperability, and flexibility issues.Item Application-Aware Data Center Network Bandwidth Utilization: the case of ethio telecom(AAU, 2018-11) Zerihun, Mamo; Mesfin, Kifle (PhD)The existing ethio telecom data center network (DCN) is the traditional model which provides only the Best Effort (BE) traffic delivery service on a layer three links with the same priorities for all applications traffic. A diversity of applications is running on the data centers, the scarcity innetwork bandwidth of data centers become the performance bottleneck for the integration of enterprise systems. The most important point is that the existing network has not a dynamic bandwidth management strategy, which lacks of flexible bandwidth utilization among different types of applications. To guarantee the network performance for system integration, an efficient in-network bandwidth management should be considered. In this thesis work, a QoS model for an aggregated applications traffic in the DCN with a constrained bandwidth and with a consideration of the business criticality of the applications has been designed. The model nearly supports guarantees of QoS to real-time traffic without reserved bandwidth, and it assured forwarding high priority class traffic for business and mission critical applications. The design approach is based on the Internet Engineering Task Force (IETF) Differentiated Service(DS) Per-Hop-Behavior (PHB) group. Different types of Active queue management(AQM) and packet scheduler algorithms have been compared on the proposed design to minimize the packet loss and delay of each aggregated traffic class. In addition, the dynamic Benefit weighted scheduling (DB-WS) algorithm is modified to adapt with our solution, the algorithm dynamically allocated bandwidth based on the average queue length of each service class. Extensive simulation results have shown that our proposed design is capable of improving the bandwidth utilization as well as providing desirable network performance for real-time and business-critical applications on a bottleneck link and also reduce the total packet loss by 1.34 %.