The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Relay is one of the key features being considered for IMT-Advanced systems. The relay architectures defined in IEEE 802.16m and 3GPP LTE-Advanced are optimized only for non-mobile relay, i.e., the Relay Station is attached to a designated Base Station and becomes a part of the fixed access network. A mobile relay architecture, where relay may switch attached BS according to operation demand, will...
The tremendous growth in mobile and wireless communications comes with more pervasive applications. Current mobile device platform does not allow a local or remote user to attest the target platform. The limitation of using existing software-based protection alone can be easily affected by malicious codes and it cannot assure its own integrity. In this paper, we explore a new approach of anonymity...
This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which do not matter. The study uses qualitative techniques to explore how the speed of technological obsolescence, market share dominance, and the black boxing of technology influence...
The hybrid networks of WLAN and WMAN can provide high data rate and enhanced multimedia services, but there are many challenges to obtain handover decision based dynamic QoS information. IEEE 802.21 aims at providing a framework that defines media independent handover (MIH) mechanism that supports seamless handover across hetero geneous networks. In this paper, we propose a new approach network selection...
To support battery powered mobile broadband wireless access devices efficiently, IEEE 802.16e defines a sleep mode operation for conserving the power of mobile terminals. In this paper, a linear hybrid algorithm is proposed based on the adjustment of sleep window under circumstances of low service traffic, aiming for reducing the response time and energy consumption of mobile subscribe station (MSS)...
As IEEE 802.11 matures and other wireless access technologies are introduced (such as IEEE 802.16e), the emergence of Internet Protocol as a de facto standard for transport allows users to have increasing choice about their mobile access. This effect will not only increase competition amongst cellular network providers it will also increase competition with other stakeholders and operators in the...
Femtocell is said to be the next ldquohappening thingrdquo in the wireless scenario. A femtocell is an indoor base station using wide area network (WAN) radio access technology, such as Universal Mobile Telecommunications System (UMTS). These data access points are deployed in a residential or small business unit building. Voice and data communications are relayed back and forth utilizing cellular...
The following topics are dealt with: operational research; computational intelligence; medical image processing; wireless communication; mobile IPv6; optical communication links; WiMax; Rayleigh fading channel; wireless sensor network; information management; knowledge management; computer simulation; software engineering; and embedded system.
The move towards an increasingly heterogeneous infrastructure has been one of the directions followed by most mobile operators in recent years. Here, one of the problems still waiting for a solution is how to enable multi-mode mobile terminals to freely roam between the different wireless systems used by the network operator for providing access to its users. The IEEE 802.21 is just one of the standardization...
In heterogeneous wireless networks, rank aggregation based on multiple decision factors has recently been proposed as a useful approach for network selection. For each decision factor, a rank of the candidate networks is derived according to the value of this decision factor. Then these decision factor dependent ranks are aggregated into a single rank and the top one is considered as a favorite network...
WiFi networks have been deployed in many regions such as buildings and campuses to provide wireless Internet access. However, to support ubiquitous wireless service, one possibility is to integrate these narrow-range WiFi networks with a wide-range network such as WiMAX. Under this WiMAX-WiFi integrated network, how to conduct energy-efficient handovers is a critical issue. In this paper, we propose...
The growing demand for wireless Internet services is accelerating the evolution of wireless networks toward all-IP architecture, and the mobile WiMAX network is a prominent example. Although currently deployed mobile WiMAX networks use hierarchical architecture, flat architecture is feasible and specified as a design alternative in the mobile WiMAX standard. In flat architecture the functionalities...
Wireless mesh networks have been studied as the next generation technology to solve problems of conventional wireless networks. Particularly, mobile WiMAX based wireless mesh networks are noticed due to many advantages. In this paper, we propose a layer-2 handover scheme for mobile WiMAX based wireless mesh networks. A layer-2 handover scheme based on mobile WiMAX causes many handover failures over...
This paper addresses the issue of wireless bandwidth partitioning of a mobile WiMAX cell. We consider a complete partitioning strategy, where the wireless bandwidth capacity of a cell is divided into trunks. Each partition is strictly reserved to a particular type of connection. Precisely, we distinguish four IEEE 802.16e 2005 service classes: UGS, rtPS, nrtPS and ErtPS. As we consider mobility, we...
Users in peer-to-peer (P2P) content sharing can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand,...
In this paper, we consider an interworking architecture of wireless mesh backbone and propose an effective vertical handoff scheme between 802.11 and 802.16 wireless access networks. The proposed vertical handoff scheme aims at reducing handoff signaling overhead on the wireless backbone and providing a lower handoff delay to mobile nodes. The handoff signaling procedure in different scenarios is...
Providing end-to-end communication in heterogeneous Internet working environments is a challenge. Handover delay is one of the problematic issues that users are face in the heterogynous networks. However, in the case of both WiMAX and WiFi technologies located at the same base station (BS); the vertical handover (VHO) delay will be less compared with two conventional WiMAX/WiFi heterogonous networks...
Indoor wireless communication systems have been developed to improve cell coverage and throughput with low cost in indoor environment. Among several indoor wireless communication systems such as mobile WiMAX (worldwide interoperability for microwave access) system, WPAN (wireless personal area network) and WLAN (wireless local area network), the mobile WiMAX is one of the promising next-generation...
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication scheme based on trusted third party; its security was analyzed by two means of technical realization and formal analysis; the protocol was implemented by devising an integrated security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.