The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: satellite communications systems; E-and M-commerce; military application; information security; optical communications; MIMO; beam forming; OFDM; intelligent transportation systems; dynamic spectrum access networks; Internet applications; optical passive and active components; ultra wide band; RFID; wireless communication; network management; WLAN and mobile WiMax,...
WiMAX is the latest technology that has promised to offer broadband wireless access over long distance. The throughput of wireless communication such as WIMAX depends on number of parameters. These parameters include: packet size, transmission rate, signal to noise ratio, modulation techniques and channel conditions. All these variables are discussed using simulation, certain graphs have obtain optimum...
Mobile WiMAX is a rapidly growing broadband wireless access (BWA) technology that is very applicable for the emerging mobile multimedia applications due to its packet based approach. In order to improve the performance of mobility, the concept of ASN anchored mobility is proposed by WiMAX Forum to keep the routing path prior to the anchor point unchanged during handover. However, the key management...
This paper investigates different caching strategies proposed in the recent past and tries to highlight the merits of proposed methods. The major issues on which emphasis is given in this paper is co-operative caching which allows the sharing and coordination of cached data among multiple nodes, can further explore the potential of the caching techniques. Due to mobility and resource constraints of...
Several customary forms for cellular phone communication have been developed through out the planet. Each mobile standard has been developed to meet the particular requirements of the country or interest involved in its specification. The wireless communication system has grown extremely fast, with the demand doubling roughly every two years. The increasing number of wireless users has spurred communications...
A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. One of the principal routing protocols used in Ad hoc networks is AODV (Ad hoc on demand Distance Vector) protocol. The security of the...
Mobile IP gives solutions to wireless applications to maintain the connectivity while handover is occurred. However, a remote home agent can result in poor efficiency. Dynamic home agent reassignment model is proposed to reduce both the signalling traffic and the data traffic to the home network. Therefore, it has to be assured that there are enough home agents available; otherwise, it is hardly to...
Authentication of mobile subscribers and network are a challenging issue to the researchers due to increasing security threats and attacks with the enhanced population of wireless traffic. 3-G or advanced mobile communication system has been developed to speed up the data communication. 3-G mobile communications use two different switching techniques: circuit switching for voice and low speed data...
Jiter is referred as the variability of latency in packets over a period of time. In mobile network, topology changes rapidly which causes a reconfiguration of network. Therefore the latency of transmission also varies. It gives rise to a QOS problem as predicting exact latency is difficult. Hence time bound or real time packets can not be guaranteed highest QOS in MANET. It this paper we propose...
Packet scheduling has been a very popular paradigm to ensure maximum throughput and bounded delay access for packet flows. This work proposes packet scheduling approach to QOS provisioning in multihop wireless networks. Our scheduling mechanism achieves fair and maximum allocation of the shared wireless channel bandwidth for MANET's that consist of General nodes and Backbone nodes. Backbone nodes...
This paper mainly explores interference of multi-hop ad-hoc networks for two cases of antennas in two dimensional areas. We make a comparison of omni-directional antenna which radiates power in one plane with directional antenna using beamforming or sectoring technique, and calculate interference and carrier to interference ratio (C/I) for both cases. Subsequently, we show that using directional antennas...
The recent digital transmission systems impose the application of channel equalizers with short training time and high tracking rate. These requirements turn our attention to channel equalization algorithms. Interference cancellation scheme assisted by an adaptive channel estimation and equalization is developed for the effective use of radio frequency in the existing or on-going mobile communication...
Multiple-input multiple-output (MIMO) technology using orthogonal frequency division multiplexing (OFDM) together called MIMO-OFDM has emerged as the viable alterative to meet the demands of greater bandwidth and quality of service of the ever expanding mobile communication networks. For MIMO-OFDM systems channel estimation is one of the challenging issues. Statistical characteristics of wireless...
Analyzing the fascinating evolution of wireless communication, the much anticipated 4G standard promises wonders. This paper explores the trends in the evolution of wireless communication. This paper outlines the requirements that are to be met by the 4G standard. It also attempts to analyze the technical challenges that demand solutions during the course of the development and implementation of the...
Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.