The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, the mobile phone base stations are situated everywhere due to huge increment in mobile phone usage around the world. However, these mobile base stations have increased the radio frequency exposure level creating issue of health symptoms as the scientific studies has investigated. So a triple band stop frequency selective surface has been proposed with single sided FR-4 substrate inbuilt...
Software-defined networking (SDN) is an approach to computer networking that allows network administrators to manage network services through abstraction of higher-level functionality. This is done to achieve more centralized control and standardized interfaces. This is useful for military networks and is addressed in two articles in this Feature Topic on military communications The article by Wrona...
Mobile communication in today's world means a lot to the human kind, many deals are made and others are broken, within seconds. That is because of our sophisticated methods of transporting the data at very high speeds and to very long distances. That is also because we kept on improving the method of serving the connections as the no of connections kept on increasing. Methods like TDMA, CDMA, and...
In some extraordinary situations like natural disasters or terrorist attacks, cellular mobile networks may face dramatically increased network traffics. Due to GSM network architecture, the number of available radio traffic channels within a cell is limited and this limitation may cause traffic congestions on such conditions. These congestions may drop the quality of mobile subscriber service channels...
Mobile telecom services have tremendous impact on social and economic development of people of rural areas of developing and the least developed countries (LDCs). However, designing a mobile network architecture for rural areas of LDCs is a challenging task. In this paper, we propose a mobile network architecture for providing mobile telecommunication services in rural areas of LDCs. The proposed...
The paper proposes the integration of new cognitive capabilities within the well known OpenBTS architecture in order to make the system able to react in a smart way to the changes of the radio channel. In particular, the proposed spectrum sensing strategy allows the OpenBTS system to be aware of other active transmissions by forcing to choose a new radio channel, within the GSM frequency band, when...
This paper presents MoCCA — a cellular cloud architecture for building mobile clouds using small-footprint micro-servers running on cell phones. We provide details of this architecture which is based on GSM standard, discuss several challenges, and include performance results to validate the assumptions that a mobile cellular cloud can indeed be in the realm of possibilities.
GSM and UMTS radio network will coexist for a long time. Interoperation of GSM and UMTS network will be a more important issue in the future. The authentication mechanism is key problem in GSM/UMTS inter-system. The verification method based on finite state machine is an important method to describe the state changes of complex and interactive system. It is simple formally and easy to describe target...
The use of mobile devices has become a part of our daily routine. Recently, mobile devices like mobile phones or portable digital displays (PDAs) are equipped with global positioning system (GPS) receptors that allow us to get the device's geographic position in real time. Location Based Services (LBS) are regarded as a key feature of many future mobile applications. GPS serves well for most outdoor...
In mobile multi-network multi-domain environments services can be anything and can have any name. This poses problems for the service availability and consequently service continuity since services may not be discovered in time for being used. Services offering equivalent functions and capabilities such as GSM voice, IP telephony, etc. are usually considered as different by the network system and...
The contribution outlines basic principles of mobile architecture M client M client server. This architecture comprises ideas of the new proposal/design of communication between/among mobile devices in common wireless networks and is not restricted to GSM networks only. Basic architecture elements of this model are described in the article. Similarities with other systems (for example multi agent...
So far, engineers have proposed many authentication protocols to repair drawbacks of GSM system. Among them, Peinado's method can solve those and provide an anonymous channel for mobile users, an intruder therefore is unable to trace the identity and the location of the user. However, we find that authenticating VLR does not be performed at the first time when MS joins into a new visiting VLR to ask...
Data captured from a live cellular network with the real users during their common daily routine help to understand how the users move within the network. Unlike the simulations with limited potential or expensive experimental studies, the research in user-mobility or spatio-temporal user behavior can be conducted on publicly available datasets such as the Reality Mining Dataset. These data have been...
Wise resource allocation is necessary to increase the quality of service (QoS), the system capacity, the network performance, and also decrease the power consumption and connection cost. This paper, first, investigates the located global system for mobile (GSM) network in a region of Tehran province in Iran as a case of study and then proposes a novel approach to minimize the connection cost among...
The use of mobile devices has become part of our daily routine. Recently, mobile devices like mobile phones or portable digital displays (PDAs) are equipped with global positioning system (GPS) receptors that allow us to get the device geographic position in real time. This paper describes a tracking application tool, called mobile tracker, which uses location-based services (LBs) like GPS or global...
The operators of the mobile telephony are more and more demanding towards their applications. They wait for a big reliability, for a number ceaselessly increasing of services, the respect for the constraints of conviviality, for cost, etc. Therefore, the size and the complexity of the applications increase. The current techniques do not allow protecting us from problems of conception. That is why...
The global system for mobile communication was introduced in 1992 as a European standard, it has achieved much worldwide success and has had tremendous impacts on our daily lives. Mobile phones have become an integral part of the modern world, and SMS messaging is becoming a widely used communication mechanism for mobile phone users. While the 3G standards are being drafted, and equipment for third-generation...
Peer to peer (P2P) file sharing on mobile device has attracted great attention in both academia and industry. Current P2P file sharing applications for mobile users is expensive and still remains a substantial problem for the transmission of the large shared files. In this paper, we discuss the current file sharing possibilities on a 3G network environment. A mobile P2P file sharing solution to facilitate...
This paper presents vulnerabilities of UMTS access domain security architecture. The security architecture of UMTS offers some protection against known threats including false base station attacks, man-in-the-middle attacks and replay attacks. The system also successfully ensures user data confidentiality and signaling data integrity. However, a few novel vulnerabilities have been identified in this...
An easy way to determine the state of a cell phone without the ownerpsilas knowledge is presented in this paper. The described method, combined with a form of patterning mobile userpsilas behavior (in terms of evaluating the mobile phonepsilas state in a tactical way) could lead to privacy compromise revealing his whereabouts. The technical part of the paper is based on the Short Messaging Service...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.