WorldWideScience

Sample records for mobile 3g networks

  1. Downlink power distributions for 2G and 3G mobile communication networks.

    Science.gov (United States)

    Colombi, Davide; Thors, Björn; Persson, Tomas; Wirén, Niklas; Larsson, Lars-Eric; Jonsson, Mikael; Törnevik, Christer

    2013-12-01

    Knowledge of realistic power levels is key when conducting accurate EMF exposure assessments. In this study, downlink output power distributions for radio base stations in 2G and 3G mobile communication networks have been assessed. The distributions were obtained from network measurement data collected from the Operations Support System, which normally is used for network monitoring and management. Significant amounts of data were gathered simultaneously for large sets of radio base stations covering wide geographical areas and different environments. The method was validated with in situ measurements. For the 3G network, the 90th percentile of the averaged output power during high traffic hours was found to be 43 % of the maximum available power. The corresponding number for 2G, with two or more transceivers installed, was 65 % or below.

  2. Investigation of Load Sharing in Hybrid (2G/3G) Mobile Networks

    OpenAIRE

    Martynas Stirbys; Karolis Žvinys

    2015-01-01

    The main purpose of this work is to investigate load sharing methods for 2G/3G cellular networks in order to determine their impact on the network and users. One of the study aims is to analyze the performance of the methods. Moreover the paper provides an overview of the methods circumstances, limitations. Directed Retry and Load Based Handover methods were chosen. Data was obtained from real Lithuanian mobile operator’s network. The paper also discusses the changes in Key Performance Indica...

  3. Investigation of Load Sharing in Hybrid (2G/3G Mobile Networks

    Directory of Open Access Journals (Sweden)

    Martynas Stirbys

    2015-07-01

    Full Text Available The main purpose of this work is to investigate load sharing methods for 2G/3G cellular networks in order to determine their impact on the network and users. One of the study aims is to analyze the performance of the methods. Moreover the paper provides an overview of the methods circumstances, limitations. Directed Retry and Load Based Handover methods were chosen. Data was obtained from real Lithuanian mobile operator’s network. The paper also discusses the changes in Key Performance Indicators.

  4. Down-link power distributions for 2G and 3G mobile communication networks

    International Nuclear Information System (INIS)

    Colombi, D.; Thors, B.; Persson, T.; Wiren, N.; Larsson, L. E.; Jonsson, M.; Toernevik, C.

    2013-01-01

    Knowledge of realistic power levels is key when conducting accurate EMF exposure assessments. In this study, down-link output power distributions for radio base stations in 2G and 3G mobile communication networks have been assessed. The distributions were obtained from network measurement data collected from the Operations Support System, which normally is used for network monitoring and management. Significant amounts of data were gathered simultaneously for large sets of radio base stations covering wide geographical areas and different environments. The method was validated with in situ measurements. For the 3G network, the 90. percentile of the averaged output power during high traffic hours was found to be 43 % of the maximum available power. The corresponding number for 2G, with two or more transceivers installed, was 65 % or below. (authors)

  5. Deploying IPv6 in 3GPP networks evolving mobile broadband from 2G to LTE and beyond

    CERN Document Server

    Korhonen, Jouni; Soininen, Jonne

    2013-01-01

    Deploying IPv6 in 3GPP Networks - Evolving Mobile Broadband from 2G to LTE and Beyond  A practical guide enabling mobile operators to deploy IPv6 with confidence The most widely used cellular mobile broadband network technology is based on the 3GPP standards. The history and background of the 3GPP technology is in the Global Mobile Service (GSM) technology and the work done in European Telecommunications Standards Institute (ETSI). This primary voice service network has evolved to be the dominant mobile Internet access technology. Deploying IPv6 in

  6. Power consumption analysis of constant bit rate data transmission over 3G mobile wireless networks

    DEFF Research Database (Denmark)

    Wang, Le; Ukhanova, Ann; Belyaev, Evgeny

    2011-01-01

    This paper presents the analysis of the power consumption of data transmission with constant bit rate over 3G mobile wireless networks. Our work includes the description of the transition state machine in 3G networks, followed by the detailed energy consumption analysis and measurement results...... of the radio link power consumption. Based on these description and analysis, we propose power consumption model. The power model was evaluated on the smartphone Nokia N900, which follows a 3GPP Release 5 and 6 supporting HSDPA/HSPA data bearers. Further we propose method of parameters selection for 3GPP...... transition state machine that allows to decrease power consumption on the mobile device....

  7. Output power distributions of terminals in a 3G mobile communication network.

    Science.gov (United States)

    Persson, Tomas; Törnevik, Christer; Larsson, Lars-Eric; Lovén, Jan

    2012-05-01

    The objective of this study was to examine the distribution of the output power of mobile phones and other terminals connected to a 3G network in Sweden. It is well known that 3G terminals can operate with very low output power, particularly for voice calls. Measurements of terminal output power were conducted in the Swedish TeliaSonera 3G network in November 2008 by recording network statistics. In the analysis, discrimination was made between rural, suburban, urban, and dedicated indoor networks. In addition, information about terminal output power was possible to collect separately for voice and data traffic. Information from six different Radio Network Controllers (RNCs) was collected during at least 1 week. In total, more than 800000 h of voice calls were collected and in addition to that a substantial amount of data traffic. The average terminal output power for 3G voice calls was below 1 mW for any environment including rural, urban, and dedicated indoor networks. This is <1% of the maximum available output power. For data applications the average output power was about 6-8 dB higher than for voice calls. For rural areas the output power was about 2 dB higher, on average, than in urban areas. Copyright © 2011 Wiley Periodicals, Inc.

  8. Fundamentals of 5G mobile networks

    CERN Document Server

    Rodriguez, Jonathan

    2015-01-01

    Fundamentals of 5G Mobile Networks provides an overview of the key features of the 5th Generation (5G) mobile networks,  discussing the motivation for 5G and the main challenges in developing this new technology. This book provides an insight into the key areas of research that will define this new system technology paving the path towards future research and development.  The book is multi-disciplinary in nature, and aims to cover a whole host of intertwined subjects that will predominantly influence the 5G landscape, including the future Internet, cloud computing, small cells and self-organ

  9. Security for 5G Mobile Wireless Networks

    OpenAIRE

    Fang, Dongfeng; Qian, Yi; Qingyang Hu, Rose

    2017-01-01

    The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use ca...

  10. Network planning study of the metro-optical-network-oriented 3G application

    Science.gov (United States)

    Gong, Qian; Xu, Rong; Lin, Jin Tong

    2005-02-01

    To compare with the 2G mobile communication, 3G technologies can supply the perfect service scope and performance. 3G is the trend of the mobile communication. So now to build the transmission network, it is needed to consider how the transmission network to support the 3G applications. For the 3G network architecture, it include the 2 part: Utran access network and core network. So the metro optical network should consider how to build the network to adapt the 3G applications. Include the metro core and access layer. In the metro core, we should consider the network should evolved towards the Mesh architecture with ASON function to realize the fast protection and restoration, quick end-to-end service provision, and high capacity cross-connect matrix etc. In the access layer, the network should have the ability to access the 3G services such as ATM interface with IMA function. In addition, the traffic grooming should be provided to improve the bandwidth utility. In this paper, first we present the MCC network situation, the network planning model will be introduced. Then we present the topology architecture, node capacity and traffic forecast. At last, based on our analysis, we will give a total solution to MCC to build their metro optical network toward to the mesh network with the consideration of 3G services.

  11. Key technologies and concepts for beyond-3G networks

    Science.gov (United States)

    Pehkonen, Kari; Uskela, Sami; Kalliojarvi, Kari; Oksanen, Lauri; Rikkinen, Kari

    2001-10-01

    Standardization of 3rd Generation (3G) mobile communication systems has produced the first specification releases and the commercial deployment of the 3G systems has started. Whereas 1G and 2G focused on efficiently providing voice services, in 3G a lot of attention has been devoted to solutions that support both Circuit Switched (CS) and Packet Switched (PS) communication. That has called for very flexible air interface and network solutions. 3G will continue to evolve and there are already on-going standardization activities that will, for example, boost the peak data rates up to 5-10 Mbps and improve spectral efficiency by 2-4 times. In the future, 3G evolution will be going towards 10/100 Mbps peak data rates in wide/local are coverage, respectively. This will take place partly because of technical improvements of 3G radio interface solutions, but also due to network evolution which will allow the integration other radio access methods like radio LANs into the 3G system. In longer term the 3G network evolution will be going towards ALL-IP networks. As 3G evolution seems to be going towards 10 Mbps/100 Mbps peak data rates and ALL-IP networks any beyond 3G air interface or network solution should be clearly better in order to justify its technical and commercial feasibility. Given the long evolution time of 3G and integration of other radio access schemes with 3G radio we may not even see a new, complete beyond 3G system being developed. Maybe we will just witness the emergence of a new, more advanced radio access solution which will then be connected to the evolving 3G network. As 3G evolution will continue for several years to come the research targets for any beyond 3G solutions must be set very high. When it comes to air interface, we should aim at 100 Mbps peak data rates for wide area access with high mobility, and at 1 Gbps for local area access with low mobility. Regarding possible commercial launches of any beyond 3G systems or solutions they could then

  12. 3GPP SA2 architecture and functions for 5G mobile communication system

    Directory of Open Access Journals (Sweden)

    Junseok Kim

    2017-03-01

    Full Text Available The on-going development of Fifth Generation (5G mobile communication technology will be the cornerstone for applying Information and Communication Technology (ICT to various fields, e.g., smart city, smart home, connected car, etc. The 3rd Generation Partnership Project (3GPP, which has developed the most successful standard technologies in the mobile communication market such as Universal Mobile Telecommunication System (UMTS and Long Term Evolution (LTE, is currently carrying out the standardization of both 5G access network system and 5G core network system at the same time. Within 3GPP, Service and System Aspects Working Group 2 (SA2 is responsible for identifying the main functions and entities of the network. In December 2016, the 3GPP SA2 group finalized the first phase of study for the architecture and main functions of 5G mobile communication system under the study item of Next Generation system (NextGen. Currently, normative standardization is on-going based on the agreements made in the NextGen Phase 1 study. In this paper, we present the architecture and functions of 5G mobile communication system agreed in the NextGen study.

  13. Cloud Radio Access Network architecture. Towards 5G mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base...... stations into radio and baseband parts, and pool the Baseband Units (BBUs) from multiple base stations into a centralized and virtualized BBU Pool. This gives a number of benefits in terms of cost and capacity. However, the challenge is then to find an optimal functionality splitting point as well...... as to design the socalled fronthaul network, interconnecting those parts. This thesis focuses on quantifying those benefits and proposing a flexible and capacity-optimized fronthaul network. It is shown that a C-RAN with a functional split resulting in a variable bit rate on the fronthaul links brings cost...

  14. Mobile networks architecture

    CERN Document Server

    Perez, Andre

    2013-01-01

    This book explains the evolutions of architecture for mobiles and summarizes the different technologies:- 2G: the GSM (Global System for Mobile) network, the GPRS (General Packet Radio Service) network and the EDGE (Enhanced Data for Global Evolution) evolution;- 3G: the UMTS (Universal Mobile Telecommunications System) network and the HSPA (High Speed Packet Access) evolutions:- HSDPA (High Speed Downlink Packet Access),- HSUPA (High Speed Uplink Packet Access),- HSPA+;- 4G: the EPS (Evolved Packet System) network.The telephone service and data transmission are the

  15. Evolution to 3G Mobile Communication - Second Generation ...

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 9. Evolution to 3G Mobile Communication - Second Generation Cellular Systems. R Ramachandran. General Article Volume 8 Issue 9 September 2003 pp 60-72 ... Keywords. Wireless communication; cellular networks; GSM; CdmaOne; TDMA ...

  16. An Integrated Mobile Phone Payment System Based on 3G Network

    OpenAIRE

    Weihui Dai; Xiang Cai; Haifeng Wu; Weidong Zhao; Xuan Li

    2011-01-01

    Along with globally approaching of the 3G era, the progress of mobile communication technology and the development of mobile terminal devices will rapidly promote the mobilization development of traditional E-commerce. In order to ensure it to achieve further development, secure, flexible and reliable mobile payment system is becoming more and more important. Compared with the payment pattern of ordinary commerce, there will be profound changes in the mobile payment, such as special payment c...

  17. What is 5G? Emerging 5G Mobile Services and Network Requirements

    Directory of Open Access Journals (Sweden)

    Heejung Yu

    2017-10-01

    Full Text Available In this paper, emerging 5G mobile services are investigated and categorized from the perspective of not service providers, but end-users. The development of 5G mobile services is based on an intensive analysis of the global trends in mobile services. Additionally, several indispensable service requirements, essential for realizing service scenarios presented, are described. To illustrate the changes in societies and in daily life in the 5G era, five megatrends, including the explosion of mobile data traffic, the rapid increase in connected devices, everything on the cloud, hyper-realistic media for convergence services and knowledge as a service enabled by big-data analysis, are examined. Based on such trends, we classify the new 5G services into five categories in terms of the end-users’ experience as follows: immersive 5G services, intelligent 5G services, omnipresent 5G services, autonomous 5G services and public 5G services. Moreover, several 5G service scenarios in each service category are presented, and essential technical requirements for realizing the aforementioned 5G services are suggested, along with a competitiveness analysis on 5G services/devices/network industries and the current condition of 5G technologies.

  18. Random Linear Network Coding for 5G Mobile Video Delivery

    Directory of Open Access Journals (Sweden)

    Dejan Vukobratovic

    2018-03-01

    Full Text Available An exponential increase in mobile video delivery will continue with the demand for higher resolution, multi-view and large-scale multicast video services. Novel fifth generation (5G 3GPP New Radio (NR standard will bring a number of new opportunities for optimizing video delivery across both 5G core and radio access networks. One of the promising approaches for video quality adaptation, throughput enhancement and erasure protection is the use of packet-level random linear network coding (RLNC. In this review paper, we discuss the integration of RLNC into the 5G NR standard, building upon the ideas and opportunities identified in 4G LTE. We explicitly identify and discuss in detail novel 5G NR features that provide support for RLNC-based video delivery in 5G, thus pointing out to the promising avenues for future research.

  19. Mobile telephones: a comparison of radiated power between 3G VoIP calls and 3G VoCS calls.

    Science.gov (United States)

    Jovanovic, Dragan; Bragard, Guillaume; Picard, Dominique; Chauvin, Sébastien

    2015-01-01

    The purpose of this study is to assess the mean RF power radiated by mobile telephones during voice calls in 3G VoIP (Voice over Internet Protocol) using an application well known to mobile Internet users, and to compare it with the mean power radiated during voice calls in 3G VoCS (Voice over Circuit Switch) on a traditional network. Knowing that the specific absorption rate (SAR) is proportional to the mean radiated power, the user's exposure could be clearly identified at the same time. Three 3G (High Speed Packet Access) smartphones from three different manufacturers, all dual-band for GSM (900 MHz, 1800 MHz) and dual-band for UMTS (900 MHz, 1950 MHz), were used between 28 July and 04 August 2011 in Paris (France) to make 220 two-minute calls on a mobile telephone network with national coverage. The places where the calls were made were selected in such a way as to describe the whole range of usage situations of the mobile telephone. The measuring equipment, called "SYRPOM", recorded the radiation power levels and the frequency bands used during the calls with a sampling rate of 20,000 per second. In the framework of this study, the mean normalised power radiated by a telephone in 3G VoIP calls was evaluated at 0.75% maximum power of the smartphone, compared with 0.22% in 3G VoCS calls. The very low average power levels associated with use of 3G devices with VoIP or VoCS support the view that RF exposure resulting from their use is far from exceeding the basic restrictions of current exposure limits in terms of SAR.

  20. COMPARATIVE STUDY OF 3G / 4G NETWORK SERVICE

    OpenAIRE

    Gulshan Kumar; Sheenam Bhola; Manisha Batra

    2015-01-01

    Modern technology is evolving so fast, that it can be very difficult to keep follow everything new. Cellular Communication is one of the most recent areas which is developing tremendously fast at present times, it is only due to the advancement of technology in all the fields of cellular and wireless communications. Networks are used basically in business and home applications, mobile users, and in all social concerns. At the present time, the use of 3rd Generation (3G) cellular communication...

  1. Comparative Study of 3G / 4G Network Service

    OpenAIRE

    Gulshan Kumar; Sheenam Bhola; Manisha Batra

    2014-01-01

    Modern technology is evolving so fast, that it can be very difficult to keep follow everything new. Cellular Communication is one of the most recent areas which is developing tremendously fast at present times, it is only due to the advancement of technology in all the fields of cellular and wireless communications. Networks are used basically in business and home applications, mobile users, and in all social concerns. At the present time, the use of 3 rd Generation (3G) cel...

  2. Providing QoS guarantee in 3G wireless networks

    Science.gov (United States)

    Chuah, MooiChoo; Huang, Min; Kumar, Suresh

    2001-07-01

    The third generation networks and services present opportunities to offer multimedia applications and services that meet end-to-end quality of service requirements. In this article, we present UMTS QoS architecture and its requirements. This includes the definition of QoS parameters, traffic classes, the end-to-end data delivery model, and the mapping of end-to-end services to the services provided by the network elements of the UMTS. End-to-end QoS of a user flow is achieved by the combination of the QoS control over UMTS Domain and the IP core Network. In the Third Generation Wireless network, UMTS bearer service manager is responsible to manage radio and transport resources to QoS-enabled applications. The UMTS bearer service consists of the Radio Access Bearer Service between Mobile Terminal and SGSN and Core Network bearer service between SGSN and GGSN. The Radio Access Bearer Service is further realized by the Radio Bearer Service (mostly air interface) and Iu bearer service. For the 3G air interface, one can provide differentiated QoS via intelligent burst allocation scheme, adaptive spreading factor control and weighted fair queueing scheduling algorithms. Next, we discuss the requirements for the transport technologies in the radio access network to provide differentiated QoS to multiple classes of traffic. We discuss both ATM based and IP based transport solutions. Last but not least, we discuss how QoS mechanism is provided in the core network to ensure e2e quality of service requirements. We discuss how mobile terminals that use RSVP as QoS signaling mechanisms can be are supported in the 3G network which may implement only IETF diffserv mechanism. . We discuss how one can map UMTS QoS classes with IETF diffserv code points. We also discuss 2G/3G handover scenarios and how the 2G/3G QoS parameters can be mapped.

  3. Goodput Analysis of 3G wireless networks supporting m-health services

    NARCIS (Netherlands)

    Bults, Richard G.A.; Wac, K.E.; van Halteren, Aart; Nicola, V.F.; Konstantas, D.; Matijasevic, M.

    2005-01-01

    The introduction of third generation (3G) public wireless network infrastructures, such as the Universal Mobile Telecommunications System (UMTS), enable the development of innovative mobile services. For example, deploying m-health services which embed tele-monitoring and tele-treatment services

  4. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  5. Mobile Applications and 4G Wireless Networks: A Framework for Analysis

    Science.gov (United States)

    Yang, Samuel C.

    2012-01-01

    Purpose: The use of mobile wireless data services continues to increase worldwide. New fourth-generation (4G) wireless networks can deliver data rates exceeding 2 Mbps. The purpose of this paper is to develop a framework of 4G mobile applications that utilize such high data rates and run on small form-factor devices. Design/methodology/approach:…

  6. Life cycle assessment of second generation (2G) and third generation (3G) mobile phone networks.

    Science.gov (United States)

    Scharnhorst, Wolfram; Hilty, Lorenz M; Jolliet, Olivier

    2006-07-01

    The environmental performance of presently operated GSM and UMTS networks was analysed concentrating on the environmental effects of the End-of-Life (EOL) phase using the Life Cycle Assessment (LCA) method. The study was performed based on comprehensive life cycle inventory and life cycle modelling. The environmental effects were quantified using the IMPACT2002+ method. Based on technological forecasts, the environmental effects of forthcoming mobile telephone networks were approximated. The results indicate that a parallel operation of GSM and UMTS networks is environmentally detrimental and the transition phase should be kept as short as possible. The use phase (i.e. the operation) of the radio network components account for a large fraction of the total environmental impact. In particular, there is a need to lower the energy consumption of those network components. Seen in relation to each other, UMTS networks provide an environmentally more efficient mobile communication technology than GSM networks. In assessing the EOL phase, recycling the electronic scrap of mobile phone networks was shown to have clear environmental benefits. Under the present conditions, material recycling could help lower the environmental impact of the production phase by up to 50%.

  7. Ethernet-based mobility architecture for 5G

    DEFF Research Database (Denmark)

    Cattoni, Andrea Fabio; Mogensen, Preben; Vesterinen, Seppo

    2014-01-01

    of mobile devices and sensors. In this paper we propose a paradigm shift for the evolved Packet Core for the future 5G system. By leveraging on the economy of scale of software–based ICT technologies, namely Software Defined Networking and cloud computing, we propose a hierarchically cloudified mobile...... network. In particular, in this paper we focus on the mobility aspects within such new architecture, proposing low latency Layer 2 solutions for the Access Network, while exploiting aggregating Layer 3 mobility functionalities in the regional and national clouds....

  8. Reflection on Migration Scenarios 2G and 3G Mobile Networks to Fourth Generation in Colombia

    Directory of Open Access Journals (Sweden)

    Sergio A. Sepúlveda-Leiva

    2013-11-01

    Full Text Available In the development of the following article is an analysis of some of the migration scenarios third generation mobile technologies for fourth generation mobile technologies, in order to select which is the most suitable migration scenario for mobile operators Colombia, taking into account the characteristics of the market and the needs that are more optimally suited for the needs of mobile operators in the country, the whole development of the article is based on operators with own infrastructure is not analyzed migration characteristics of mobile virtual network operators.

  9. Plugging 3G mobile networks into the internet : a prototype-based evaluation

    NARCIS (Netherlands)

    Oredope, A.; Liotta, A.

    2006-01-01

    The third generation mobile network aims at providing present and future Internet services everywhere and at anytime using cellular technologies. This is based on its all-IP core network known as the IP multimedia subsystem which provides end-users with better QoS, charging and integration of

  10. Evolution of Positioning Techniques in Cellular Networks, from 2G to 4G

    Directory of Open Access Journals (Sweden)

    Rafael Saraiva Campos

    2017-01-01

    Full Text Available This review paper presents within a common framework the mobile station positioning methods applied in 2G, 3G, and 4G cellular networks, as well as the structure of the related 3GPP technical specifications. The evolution path through the generations is explored in three steps at each level: first, the new network elements supporting localization features are introduced; then, the standard localization methods are described; finally, the protocols providing specific support to mobile station positioning are studied. To allow a better understanding, this paper also brings a brief review of the cellular networks evolution paths.

  11. DIDERO 3G: herramienta para la planificación estratégica de redes móviles híbridas 2G/3G

    OpenAIRE

    Portilla Figueras, José Antonio; Hackbarth Planeta, Klaus Dietrich; Fuente Cosío, Luis P. de la

    2002-01-01

    This paper presents the project DIDERO 3G that the Telematic Engineering Group of the University of Cantabria is going to develop. The aim of DIDERO is to perform strategic network planning for an hybrid 2G/3G Mobile network to provide as a result of this planning tecno-economical reports that could guide a mobile operator to take decissions about when and where to deploy 3G. DIDERO 3G can also serve the National Regulatory Atuhtorities as an objetvive basis to perform mo...

  12. Coexistence of 3G repeaters with LTE base stations.

    Science.gov (United States)

    Yeo, Woon-Young; Lee, Sang-Min; Hwang, Gyung-Ho; Kim, Jae-Hoon

    2013-01-01

    Repeaters have been an attractive solution for mobile operators to upgrade their wireless networks at low cost and to extend network coverage effectively. Since the first LTE commercial deployment in 2009, many mobile operators have launched LTE networks by upgrading their 3G and legacy networks. Because all 3G frequency bands are shared with the frequency bands for LTE deployment and 3G mobile operators have an enormous number of repeaters, reusing 3G repeaters in LTE networks is definitely a practical and cost-efficient solution. However, 3G repeaters usually do not support spatial multiplexing with multiple antennas, and thus it is difficult to reuse them directly in LTE networks. In order to support spatial multiplexing of LTE, the role of 3G repeaters should be replaced with small LTE base stations or MIMO-capable repeaters. In this paper, a repeater network is proposed to reuse 3G repeaters in LTE deployment while still supporting multilayer transmission of LTE. Interestingly, the proposed network has a higher cluster throughput than an LTE network with MIMO-capable repeaters.

  13. The Research on Handoff Strategy in Beyond 3G Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    CUI Hong-yan; TIAN Hui; XU Hai-bo; ZHANG Ping

    2006-01-01

    One of the major challenges for beyond third generation mobile systems is efficient mobility management. This paper proposes a distributed dynamic management scheme of handoff based on B3G networks. This .scheme can reduce the co.st of update signalling and transmitting packets, and improve the system capability. In this .scheme, the dynamic building network approach is adopted to deduce the update signalling cost. We implement the distributed dynamic management scheme of handoff in a simulation platform and compare its performance with that of general centralized handoff management schemes. Our simulation results indicate that our .scheme is capable of reducing the update handoff latency, and enhancing the performance.

  14. Mobile Technology Waiting for the 3G Rush

    Institute of Scientific and Technical Information of China (English)

    HAYET SELLAMI

    2006-01-01

    @@ China is potentially the biggest third generation (3G) mobile market in the world, and everyone is eager to grab a piece of the pie. Foreign carriers are still not allowed to apply for licences since China's decision regarding licensing and adoption of 3G mobile services is still pending, but the waiting list is long. Both Chinese officials and industry executives have stated that they want 3G in place in time for the August 2008 Olympic Games held in Beijing. This tight deadline leaves no room for failure.

  15. Green mobile networks a networking perspective

    CERN Document Server

    Ansari, Nirwan

    2016-01-01

    Combines the hot topics of energy efficiency and next generation mobile networking, examining techniques and solutions. Green communications is a very hot topic. Ever increasing mobile network bandwidth rates significantly impacts on operating costs due to aggregate network energy consumption. As such, design on 4G networks and beyond has increasingly started to focus on 'energy efficiency' or so-called 'green' networks. Many techniques and solutions have been proposed to enhance the energy efficiency of mobile networks, yet no book has provided an in-depth analysis of the energy consumption issues in mobile networks nor offers detailed theories, tools and solutions for solving the energy efficiency problems.

  16. Multi Service Proxy: Mobile Web Traffic Entitlement Point in 4G Core Network

    Directory of Open Access Journals (Sweden)

    Dalibor Uhlir

    2015-05-01

    Full Text Available Core part of state-of-the-art mobile networks is composed of several standard elements like GGSN (Gateway General Packet Radio Service Support Node, SGSN (Serving GPRS Support Node, F5 or MSP (Multi Service Proxy. Each node handles network traffic from a slightly different perspective, and with various goals. In this article we will focus only on the MSP, its key features and especially on related security issues. MSP handles all HTTP traffic in the mobile network and therefore it is a suitable point for the implementation of different optimization functions, e.g. to reduce the volume of data generated by YouTube or similar HTTP-based service. This article will introduce basic features and functions of MSP as well as ways of remote access and security mechanisms of this key element in state-of-the-art mobile networks.

  17. On the analysis of human mobility model for content broadcasting in 5G networks

    KAUST Repository

    Lau, Chun Pong

    2018-02-15

    Today\\'s mobile service providers aim at ensuring end-to-end performance guarantees. Hence, ensuring an efficient content delivery to end users is highly required. Currently, transmitting popular contents in modern mobile networks rely on unicast transmission. This result into a huge underutilization of the wireless bandwidth. The urban scale mobility of users is beneficial for mobile networks to allocate radio resources spatially and temporally for broadcasting contents. In this paper, we conduct a comprehensive analysis on a human activity/mobility model and the content broadcasting system in 5G mobile networks. The objective of this work is to describe how human daily activities could improve the content broadcasting efficiency. We achieve the objective by analyzing the transition probabilities of a user traveling over several places according to the change of states of daily human activities. Using a reallife simulation, we demonstrate the relationship between the human mobility and the optimization objective of the content broadcasting system.

  18. Content Delivery in Future Mobile Communication Networks

    Science.gov (United States)

    Jonas, Karl; Raber, Sergey

    2003-07-01

    With the fast progress in the deployment of wireless networks during the last few years, the global communication market requires the development of new methods for content delivery towards mobile users. It is currently characterised by the introduction of the 3rd generation of terrestrial mobile networks based on 3GPP's UMTS standard. It is expected that this will eventually lead to integrated all-IP-based infrastructures supporting a variety of radio access technologies (so-called beyond-3G-networks or 4th Generation networks). The integration of mobility support, security and accounting and provisioning of differentiated qualities of service are among the issues which are currently researched in the 4G framework.Since it is not possible to change network protocols and infrastructure at once in order to optimize them for mobile services, it is very important to find an appropriate way for the migration from the current infrastructure towards an integrated architecture, where fixed and mobile networks coexist and interoperate in the most effective and flexible way.The integration of satellite communication networks into the terrestrial mobile communication environment is the focus of R&D activities at the Competence Centre for Advanced Satellite Communication of the FhG FOKUS institute. These activities are presented in this article, with a focus on the CoDeSat Content Delivery over Satellite project.In the remainder of this article we first summarize services and service requirements as they are considered in our work. We then discuss the challenges derived from these requirements with respect to current network and protocol architectures. Finally, we describe our approach, and the current status of our prototype implementation.

  19. Power consumption analysis of constant bit rate video transmission over 3G networks

    DEFF Research Database (Denmark)

    Ukhanova, Ann; Belyaev, Evgeny; Wang, Le

    2012-01-01

    This paper presents an analysis of the power consumption of video data transmission with constant bit rate over 3G mobile wireless networks. The work includes the description of the radio resource control transition state machine in 3G networks, followed by a detailed power consumption analysis...... and measurements of the radio link power consumption. Based on this description and analysis, we propose our power consumption model. The power model was evaluated on a smartphone Nokia N900, which follows 3GPP Release 5 and 6 supporting HSDPA/HSUPA data bearers. We also propose a method for parameter selection...... for the 3GPP transition state machine that allows to decrease power consumption on a mobile device taking signaling traffic, buffer size and latency restrictions into account. Furthermore, we discuss the gain in power consumption vs. PSNR for transmitted video and show the possibility of performing power...

  20. 5G: rethink mobile communications for 2020+.

    Science.gov (United States)

    Chih-Lin, I; Han, Shuangfeng; Xu, Zhikun; Sun, Qi; Pan, Zhengang

    2016-03-06

    The 5G network is anticipated to meet the challenging requirements of mobile traffic in the 2020s, which are characterized by super high data rate, low latency, high mobility, high energy efficiency and high traffic density. This paper provides an overview of China Mobile's 5G vision and potential solutions. Three key characteristics of 5G are analysed, i.e. super fast, soft and green. The main 5G R&D themes are further elaborated, which include five fundamental rethinkings of the traditional design methodologies. The 5G network design considerations are also discussed, with cloud radio access network, ultra-dense network, software defined network and network function virtualization examined as key potential solutions towards a green and soft 5G network. The paradigm shift to user-centric network operation from the traditional cell-centric operation is also investigated, where the decoupled downlink and uplink, control and data, and adaptive multiple connections provide sufficient means to achieve a user-centric 5G network with 'no more cells'. The software defined air interface is investigated under a uniform framework and can adaptively adapt the parameters to well satisfy various requirements in different 5G scenarios. © 2016 The Author(s).

  1. In-Band full-duplex transceiver technology for 5G mobile networks

    NARCIS (Netherlands)

    Deballie, B.; van Liempd, B.; Hershberg, B.; Craninckx, J.; Rikkinen, K.; van den Broek, Dirk-Jan; Klumperink, Eric A.M.; Nauta, Bram

    2015-01-01

    In-band full-duplex is a promising air interface technique to tackle several of the key challenges of next generation (5G)mobile networks. Simultaneous transmission and reception in the same frequency band increases the throughput and spectral efficiency, and reduces the air interface delay. Its

  2. 4G Mobile Networks

    DEFF Research Database (Denmark)

    Lanzani, Christian Fabio Alessandro

    This thesis has investigated 4G radio access networks covering spectrum allocation methodologies, eNB software radios and architectures including interfacing performance aspects relevant for IMT-Advanced requirements. Dynamic spectrum allocation is an alternative to xed allocation methodologies. Al.......7-2.6 GHz bands. Likewise, SingleRAN low-power congurations will operate in the 2.6-3.8 GHz bands allowing equipment manu- factures to focus on a limited number of systems and congurations. An SCR architecture is proposed based on SoC integration of both digital and analog functions allowing mod- ularity...

  3. Performance Evaluation of an Enhanced Uplink 3.5G System for Mobile Healthcare Applications

    Directory of Open Access Journals (Sweden)

    Dimitris Komnakos

    2008-01-01

    Full Text Available The present paper studies the prospective and the performance of a forthcoming high-speed third generation (3.5G networking technology, called enhanced uplink, for delivering mobile health (m-health applications. The performance of 3.5G networks is a critical factor for successful development of m-health services perceived by end users. In this paper, we propose a methodology for performance assessment based on the joint uplink transmission of voice, real-time video, biological data (such as electrocardiogram, vital signals, and heart sounds, and healthcare records file transfer. Various scenarios were concerned in terms of real-time, nonreal-time, and emergency applications in random locations, where no other system but 3.5G is available. The accomplishment of quality of service (QoS was explored through a step-by-step improvement of enhanced uplink system's parameters, attributing the network system for the best performance in the context of the desired m-health services.

  4. Performance Evaluation of an Enhanced Uplink 3.5G System for Mobile Healthcare Applications.

    Science.gov (United States)

    Komnakos, Dimitris; Vouyioukas, Demosthenes; Maglogiannis, Ilias; Constantinou, Philip

    2008-01-01

    The present paper studies the prospective and the performance of a forthcoming high-speed third generation (3.5G) networking technology, called enhanced uplink, for delivering mobile health (m-health) applications. The performance of 3.5G networks is a critical factor for successful development of m-health services perceived by end users. In this paper, we propose a methodology for performance assessment based on the joint uplink transmission of voice, real-time video, biological data (such as electrocardiogram, vital signals, and heart sounds), and healthcare records file transfer. Various scenarios were concerned in terms of real-time, nonreal-time, and emergency applications in random locations, where no other system but 3.5G is available. The accomplishment of quality of service (QoS) was explored through a step-by-step improvement of enhanced uplink system's parameters, attributing the network system for the best performance in the context of the desired m-health services.

  5. Evolution to 3G Mobile Communication

    Indian Academy of Sciences (India)

    introduced to allow for high-speed data packet transmission. IS-. 9SB supports .... tors not only to expand the wireless data market in preparation for the introduction of 3G ... A mobile terminal can save power by supporting. 8PSK only when RF ...

  6. 3G, 4G and beyond bringing networks, devices and the web together

    CERN Document Server

    Sauter, Martin

    2012-01-01

    Extensively updated evaluation of current and future network technologies, applications and devices  This book follows on from its successful predecessor with an introduction to next generation network technologies, mobile devices, voice and multimedia services and the mobile web 2.0.  Giving a sound technical introduction to 3GPP wireless systems, this book explains the decisions taken during standardization of the most popular wireless network standards today, LTE, LTE-Advanced and HSPA+.  It discusses how these elements strongly influence each other and how network ca

  7. Softwarization of Mobile Network Functions towards Agile and Energy Efficient 5G Architectures: A Survey

    Directory of Open Access Journals (Sweden)

    Dlamini Thembelihle

    2017-01-01

    Full Text Available Future mobile networks (MNs are required to be flexible with minimal infrastructure complexity, unlike current ones that rely on proprietary network elements to offer their services. Moreover, they are expected to make use of renewable energy to decrease their carbon footprint and of virtualization technologies for improved adaptability and flexibility, thus resulting in green and self-organized systems. In this article, we discuss the application of software defined networking (SDN and network function virtualization (NFV technologies towards softwarization of the mobile network functions, taking into account different architectural proposals. In addition, we elaborate on whether mobile edge computing (MEC, a new architectural concept that uses NFV techniques, can enhance communication in 5G cellular networks, reducing latency due to its proximity deployment. Besides discussing existing techniques, expounding their pros and cons and comparing state-of-the-art architectural proposals, we examine the role of machine learning and data mining tools, analyzing their use within fully SDN- and NFV-enabled mobile systems. Finally, we outline the challenges and the open issues related to evolved packet core (EPC and MEC architectures.

  8. A super base station based centralized network architecture for 5G mobile communication systems

    Directory of Open Access Journals (Sweden)

    Manli Qian

    2015-04-01

    Full Text Available To meet the ever increasing mobile data traffic demand, the mobile operators are deploying a heterogeneous network with multiple access technologies and more and more base stations to increase the network coverage and capacity. However, the base stations are isolated from each other, so different types of radio resources and hardware resources cannot be shared and allocated within the overall network in a cooperative way. The mobile operators are thus facing increasing network operational expenses and a high system power consumption. In this paper, a centralized radio access network architecture, referred to as the super base station (super BS, is proposed, as a possible solution for an energy-efficient fifth-generation (5G mobile system. The super base station decouples the logical functions and physical entities of traditional base stations, so different types of system resources can be horizontally shared and statistically multiplexed among all the virtual base stations throughout the entire system. The system framework and main functionalities of the super BS are described. Some key technologies for system implementation, i.e., the resource pooling, real-time virtualization, adaptive hardware resource allocation are also highlighted.

  9. Energy-Efficient Caching for Mobile Edge Computing in 5G Networks

    Directory of Open Access Journals (Sweden)

    Zhaohui Luo

    2017-05-01

    Full Text Available Mobile Edge Computing (MEC, which is considered a promising and emerging paradigm to provide caching capabilities in proximity to mobile devices in 5G networks, enables fast, popular content delivery of delay-sensitive applications at the backhaul capacity of limited mobile networks. Most existing studies focus on cache allocation, mechanism design and coding design for caching. However, grid power supply with fixed power uninterruptedly in support of a MEC server (MECS is costly and even infeasible, especially when the load changes dynamically over time. In this paper, we investigate the energy consumption of the MECS problem in cellular networks. Given the average download latency constraints, we take the MECS’s energy consumption, backhaul capacities and content popularity distributions into account and formulate a joint optimization framework to minimize the energy consumption of the system. As a complicated joint optimization problem, we apply a genetic algorithm to solve it. Simulation results show that the proposed solution can effectively determine the near-optimal caching placement to obtain better performance in terms of energy efficiency gains compared with conventional caching placement strategies. In particular, it is shown that the proposed scheme can significantly reduce the joint cost when backhaul capacity is low.

  10. Special Issue on 5G Communications and Experimental Trials with Heterogeneous and Agile Mobile networks

    OpenAIRE

    Sejun Song; KyungHi Chang; Chanho Yoon; Jong‐Moon Chung

    2018-01-01

    5th generation mobile networks, 5G, are the proposed next‐generation communication network standards. In addition to providing more than 1 Gb per second faster speeds, 5G will be a global game changer from technological, economic, societal, and environmental perspectives by integrating multiple networks in diverse sectors for various up to date applications such as the Internet of Things (IoT), device‐to‐device direct communication (D2D), vehicular communications (V2X), and disaster resilient...

  11. Cloud and fog computing in 5G mobile networks emerging advances and applications

    CERN Document Server

    Markakis, Evangelos; Mavromoustakis, Constandinos X; Pallis, Evangelos

    2017-01-01

    This book focuses on the challenges and solutions related to cloud and fog computing for 5G mobile networks, and presents novel approaches to the frameworks and schemes that carry out storage, communication, computation and control in the fog/cloud paradigm.

  12. What is 5G? Emerging 5G Mobile Services and Network Requirements

    OpenAIRE

    Heejung Yu; Howon Lee; Hongbeom Jeon

    2017-01-01

    In this paper, emerging 5G mobile services are investigated and categorized from the perspective of not service providers, but end-users. The development of 5G mobile services is based on an intensive analysis of the global trends in mobile services. Additionally, several indispensable service requirements, essential for realizing service scenarios presented, are described. To illustrate the changes in societies and in daily life in the 5G era, five megatrends, including the explosion of mobi...

  13. Web Services in 3G Service Platforms

    NARCIS (Netherlands)

    Lagerberg, Ko; Plas, Dirk-Jaap; Wegdam, M.

    2002-01-01

    In third-generation (3G) networks, third-party service developers will have access to the mobile network resources using open network interfaces, such as the 3rd Generation Partnership Project's (3GPP's) Open Service Access (OSA). The service platforms that offer these interfaces provide

  14. H.264/AVC error resilience tools suitable for 3G mobile video services

    Institute of Scientific and Technical Information of China (English)

    LIU Lin; YE Xiu-zi; ZHANG San-yuan; ZHANG Yin

    2005-01-01

    The emergence of third generation mobile system (3G) makes video transmission in wireless environment possible,and the latest 3GPP/3GPP2 standards require 3G terminals support H.264/AVC. Due to high packet loss rate in wireless environment, error resilience for 3G terminals is necessary. Moreover, because of the hardware restrictions, 3G mobile terminals support only part of H.264/AVC error resilience tool. This paper analyzes various error resilience tools and their functions, and presents 2 error resilience strategies for 3G mobile streaming video services and mobile conversational services. Performances of the proposed error resilience strategies were tested using off-line common test conditions. Experiments showed that the proposed error resilience strategies can yield reasonably satisfactory results.

  15. Application of Blue Ocean Strategy to Chinese 3G Mobile Telecom Industry

    OpenAIRE

    Wang, Zang; Yang, Jin Wei

    2010-01-01

    The purpose of this study was to apply “Blue Ocean” strategy to Chinese 3G mobile telecom industry. Chinese 3G mobile telecom industry is a rapidly growing multiple industry which served a lot of services to customers. The thesis tries to find whether all services are important to Chinese 3G operators’ competiveness and how to create a blue ocean for Chinese 3G operators, help Chinese 3G operators to find their core service from the customers’ opinion and create a new blue ocean industry of m...

  16. Mobility management in the future mobile network

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza

    2018-01-01

    The current mobile network architectures are heavily hierarchical, which implies that all traffic must be traversed through a centralized core entity. This makes the network prone to several limitations, e.g., suboptimal communication paths, low scalability, signaling overhead, and single point of

  17. Mobile network architecture of the long-range WindScanner system

    DEFF Research Database (Denmark)

    Vasiljevic, Nikola; Lea, Guillaume; Hansen, Per

    to the acquisition of the mobile network connections with static public IP addresses. The architecture consists of a hardware VPN solution based on the network appliances Z1 and MX60 from Cisco Meraki with additional 3G or 4G dongles. With the presented network architecture and appropriate configuration, we fulfill...

  18. Indoor radio planning a practical guide for 2G, 3G and 4G

    CERN Document Server

    Tolstrup, Morten

    2015-01-01

    Why is high performance indoor wireless service needed, and how is it best implemented? As the challenge of providing better service and higher data speeds and quality for mobile applications intensifies, ensuring adequate in-building and tunnel coverage and capacity is increasingly important. A unique, single-source reference on the theoretical and practical knowledge behind indoor and tunnel radio planning, this book provides a detailed overview of mobile networks systems, coverage and capacity solutions with 2G, 3G and 4G cellular system technologies as a backdrop.  All of the available s

  19. Special Issue on 5G Communications and Experimental Trials with Heterogeneous and Agile Mobile networks

    Directory of Open Access Journals (Sweden)

    Sejun Song

    2018-02-01

    Full Text Available 5th generation mobile networks, 5G, are the proposed next‐generation communication network standards. In addition to providing more than 1 Gb per second faster speeds, 5G will be a global game changer from technological, economic, societal, and environmental perspectives by integrating multiple networks in diverse sectors for various up to date applications such as the Internet of Things (IoT, device‐to‐device direct communication (D2D, vehicular communications (V2X, and disaster resilient communication. Currently, millimeter‐wave (mmWave radio spectrum between 30 GHz and 300 GHz is critical for 5G rollout. Regulatory bodies around the world are now working towards opening up new spectrum bands from 6 GHz–100 GHz, and new technologies to overcome the challenges of these mmWave bands have been developed. It is envisioned that advanced 5G network infrastructure includes ultra‐broadband access, high‐speed backhaul and relay, softwarized flexible evolved packet core solutions for efficient system management, and satellite communications as an inherent component of 5G systems.

  20. A Robust Optimization Based Energy-Aware Virtual Network Function Placement Proposal for Small Cell 5G Networks with Mobile Edge Computing Capabilities

    OpenAIRE

    Blanco, Bego; Taboada, Ianire; Fajardo, Jose Oscar; Liberal, Fidel

    2017-01-01

    In the context of cloud-enabled 5G radio access networks with network function virtualization capabilities, we focus on the virtual network function placement problem for a multitenant cluster of small cells that provide mobile edge computing services. Under an emerging distributed network architecture and hardware infrastructure, we employ cloud-enabled small cells that integrate microservers for virtualization execution, equipped with additional hardware appliances. We develop an energy-awa...

  1. A Survey on 5G: The Next Generation of Mobile Communication

    OpenAIRE

    Panwar, Nisha; Sharma, Shantanu; Singh, Awadhesh Kumar

    2015-01-01

    The rapidly increasing number of mobile devices, voluminous data, and higher data rate are pushing to rethink the current generation of the cellular mobile communication. The next or fifth generation (5G) cellular networks are expected to meet high-end requirements. The 5G networks are broadly characterized by three unique features: ubiquitous connectivity, extremely low latency, and very high-speed data transfer. The 5G networks would provide novel architectures and technologies beyond state...

  2. Load balancing in 5G Networks

    Directory of Open Access Journals (Sweden)

    Tsirakis Christos

    2017-01-01

    Full Text Available The expected huge increase of mobile devices and user data demand by 2020 will stress the current mobile network in an unprecedented way. The future mobile networks must meet several strong requirements regarding the data rate, latency, quality of service and experience, mobility, spectrum and energy efficiency. Therefore, efforts for more efficient mobile network solutions have been recently initiated. To this direction, load balancing has attracted much attention as a promising solution for higher resource utilization, improved system performance and decreased operational cost. It is an effective method for balancing the traffic and alleviating the congestion among heterogeneous networks in the upcoming 5G networks. In this paper, we focus on an offloading scenario for load balancing among LTE and Wi-Fi networks. Additionally, network graphs methodology and its abstracted parameters are investigated in order to better manage wireless resource allocation among multiple connections. The COHERENT architectural framework, which consists of two main control components, makes use of such abstracted network graphs for controlling or managing various tasks such as traffic steering, load balancing, spectrum sharing and RAN sharing. As a result, the COHERENT project eventually develops a unified programmable control framework used to efficiently coordinate the underlying heterogeneous mobile networks as a whole.

  3. Benefits of Self-Organizing Networks (SON for Mobile Operators

    Directory of Open Access Journals (Sweden)

    Olav Østerbø

    2012-01-01

    Full Text Available Self-Organizing Networks (SON is a collection of functions for automatic configuration, optimization, diagnostisation and healing of cellular networks. It is considered to be a necessity in future mobile networks and operations due to the increased cost pressure. The main drivers are essentially to reduce CAPEX and OPEX, which would otherwise increase dramatically due to increased number of network parameters that has to be monitored and set, the rapidly increasing numbers of base stations in the network and parallel operation of 2G, 3G and Evolved Packet Core (EPC infrastructures. This paper presents evaluations on the use of some of the most important SON components. Mobile networks are getting more complex to configure, optimize and maintain. Many SON functions will give cost savings and performance benefits from the very beginning of a network deployment and these should be prioritized now. But even if many functions are already available and can give large benefits, the field is still in its infancy and more advanced functions are either not yet implemented or have immature implementations. It is therefore necessary to have a strategy for how and when different SON functions should be introduced in mobile networks.

  4. Practical End-to-End Performance Testing Tool for High Speed 3G-Based Networks

    Science.gov (United States)

    Shinbo, Hiroyuki; Tagami, Atsushi; Ano, Shigehiro; Hasegawa, Toru; Suzuki, Kenji

    High speed IP communication is a killer application for 3rd generation (3G) mobile systems. Thus 3G network operators should perform extensive tests to check whether expected end-to-end performances are provided to customers under various environments. An important objective of such tests is to check whether network nodes fulfill requirements to durations of processing packets because a long duration of such processing causes performance degradation. This requires testers (persons who do tests) to precisely know how long a packet is hold by various network nodes. Without any tool's help, this task is time-consuming and error prone. Thus we propose a multi-point packet header analysis tool which extracts and records packet headers with synchronized timestamps at multiple observation points. Such recorded packet headers enable testers to calculate such holding durations. The notable feature of this tool is that it is implemented on off-the shelf hardware platforms, i.e., lap-top personal computers. The key challenges of the implementation are precise clock synchronization without any special hardware and a sophisticated header extraction algorithm without any drop.

  5. Traffic Dimensioning and Performance Modeling of 4G LTE Networks

    Science.gov (United States)

    Ouyang, Ye

    2011-01-01

    Rapid changes in mobile techniques have always been evolutionary, and the deployment of 4G Long Term Evolution (LTE) networks will be the same. It will be another transition from Third Generation (3G) to Fourth Generation (4G) over a period of several years, as is the case still with the transition from Second Generation (2G) to 3G. As a result,…

  6. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  7. Nonorthogonal multiple access and carrierless amplitude phase modulation for flexible multiuser provisioning in 5G mobile networks

    NARCIS (Netherlands)

    Altabas, J.A.; Rommel, S.; Puerta, R.; Izquierdo, D.; Ignacio Garces, J.; Antonio Lazaro, J.; Vegas Olmos, J.J.; Tafur Monroy, I.

    2017-01-01

    In this paper, a combined nonorthogonal multiple access (NOMA) and multiband carrierless amplitude phase modulation (multiCAP) scheme is proposed for capacity enhancement of and flexible resource provisioning in 5G mobile networks. The proposed scheme is experimentally evaluated over a W-band

  8. Cooperative localization in 5G networks: A survey

    Directory of Open Access Journals (Sweden)

    Ping Zhang

    2017-03-01

    Full Text Available In upcoming 5G networks, key prospects such as increased bandwidth, smaller cells, higher mobile terminal (MT densities, multiple radio access technologies, and the capability of device-to-device communication are beneficial for localization. Meanwhile, technologies suggested in 5G, such as massive multiple-in multiple-out, would also benefit from the accurate locations of MTs. Therefore, an opportunity to develop and integrate mobile localization technology in 5G networks has presented itself at this early stage. This paper reviews recent literature relating to localization in 5G networks, and emphasizes the prospect for implementing cooperative localization, which exploits the location information from additional measurements between MTs. To evaluate the accuracy of cooperative localization, a performance evaluation approach is also suggested.

  9. Coexistence of Terrestrial and HAP 3G Networks during Disaster Scenarios

    Directory of Open Access Journals (Sweden)

    P. Pechac

    2008-12-01

    Full Text Available The aim of this paper is to show the possible coexistence of an HAP and a terrestrial component of 3G networks at a single carrier frequency. The main goal is to compare the basic parameters of terrestrial and HAP com-ponent 3G networks modeled in suburban (macrocell and urban (macro/microcell areas and to demonstrate the way they impact on each other. This study should present what we assume are the better capabilities of HAP 3G networks compared to their terrestrial counterparts. The parameters of the HAP and terrestrial component of 3G networks, were the terrestrial cells to be disabled during disasters, are also presented.

  10. Radio-location of mobile stations in third generation networks

    Directory of Open Access Journals (Sweden)

    Milan Manojle Šunjevarić

    2013-06-01

    Full Text Available Mobile station localization in mobile networks started with simple methods (e.g. Cell-ID method which required only slight modifications of network infrastructures. Principally, it was about network localization by which a localization service became available to all types of mobile phones. Due to low precision, the initiated development of more sophisticated methods has not been finished yet. Among the advanced location-based methods are those based on the measurement of location parameters in the time domain. In this paper the general consideration of radio location methods in 3G (UMTS radio networks is presented. The use of time based measurement methods was analysed in detail. Due to the limited article length, the use of other locating methods in 3G networks (based on power measurements, on radio direction measurement, and on cells identification – Cell ID and global positioning system - GPS are not described. Introduction Mobile station localization within modern cellular networks increases the level of user security and opens wide opportunities for commercial operators who provide this service. The major obstacle for the implementation of this service, which also prevents its practical usage, is the modification of the existing network infrastructure. In general, depending on the infrastructure used, positioning methods can be divided into two groups: integrated and independent. Integrated methods are primarily created for communication networks. A possibility to locate users represents just an additional service within a radio network. Independent methods are totally detached from the communication network in which the user whose location is being determined is. Radio location methods Determining the location of a mobile radio station is performed by determining the intersection of two or more lines of position. These lines represent the position of the set of points at which the mobile station may be located. These lines can be: (a

  11. An approach to efficient mobility management in intelligent networks

    Science.gov (United States)

    Murthy, K. M. S.

    1995-01-01

    Providing personal communication systems supporting full mobility require intelligent networks for tracking mobile users and facilitating outgoing and incoming calls over different physical and network environments. In realizing the intelligent network functionalities, databases play a major role. Currently proposed network architectures envision using the SS7-based signaling network for linking these DB's and also for interconnecting DB's with switches. If the network has to support ubiquitous, seamless mobile services, then it has to support additionally mobile application parts, viz., mobile origination calls, mobile destination calls, mobile location updates and inter-switch handovers. These functions will generate significant amount of data and require them to be transferred between databases (HLR, VLR) and switches (MSC's) very efficiently. In the future, the users (fixed or mobile) may use and communicate with sophisticated CPE's (e.g. multimedia, multipoint and multisession calls) which may require complex signaling functions. This will generate volumness service handling data and require efficient transfer of these message between databases and switches. Consequently, the network providers would be able to add new services and capabilities to their networks incrementally, quickly and cost-effectively.

  12. Software-Defined Radio Global System for Mobile Communications Transmitter Development for Heterogeneous Network Vulnerability Testing

    Science.gov (United States)

    2013-12-01

    AbdelWahab, “ 2G / 3G Inter-RAT Handover Performance Analysis,” Second European Conference on Antennas and Propagation, pp. 1, 8, 11–16, Nov. 2007. [19] J...RADIO GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS TRANSMITTER DEVELOPMENT FOR HETEROGENEOUS NETWORK VULNERABILITY TESTING by Carson C. McAbee... MOBILE COMMUNICATIONS TRANSMITTER DEVELOPMENT FOR HETEROGENEOUS NETWORK VULNERABILITY TESTING 5. FUNDING NUMBERS 6. AUTHOR(S) Carson C. McAbee

  13. Effects of 2G and 3G mobile phones on performance and electrophysiology in adolescents, young adults and older adults.

    Science.gov (United States)

    Leung, S; Croft, R J; McKenzie, R J; Iskra, S; Silber, B; Cooper, N R; O'Neill, B; Cropley, V; Diaz-Trujillo, A; Hamblin, D; Simpson, D

    2011-11-01

    This study examined sensory and cognitive processing in adolescents, young adults and older adults, when exposed to 2nd (2G) and 3rd (3G) generation mobile phone signals. Tests employed were the auditory 3-stimulus oddball and the N-back. Forty-one 13-15 year olds, forty-two 19-40 year olds and twenty 55-70 year olds were tested using a double-blind cross-over design, where each participant received Sham, 2G and 3G exposures, separated by at least 4 days. 3-Stimulus oddball task: Behavioural: accuracy and reaction time of responses to targets were not affected by exposure. Electrophysiological: augmented N1 was found in the 2G condition (independent of age group). N-back task: Behavioural: the combined groups performed less accurately during the 3G exposure (compared to Sham), with post hoc tests finding this effect separately in the adolescents only. Electrophysiological: delayed ERD/ERS responses of the alpha power were found in both 3G and 2G conditions (compared to Sham; independent of age group). Employing tasks tailored to each individual's ability level, this study provides support for an effect of acute 2G and 3G exposure on human cognitive function. The subtlety of mobile phone effect on cognition in our study suggests that it is important to account for individual differences in future mobile phone research. Copyright © 2011 International Federation of Clinical Neurophysiology. All rights reserved.

  14. Survey of Promising Technologies for 5G Networks

    Directory of Open Access Journals (Sweden)

    Nam Tuan Le

    2016-01-01

    Full Text Available As an enhancement of cellular networks, the future-generation 5G network can be considered an ultra-high-speed technology. The proposed 5G network might include all types of advanced dominant technologies to provide remarkable services. Consequently, new architectures and service management schemes for different applications of the emerging technologies need to be recommended to solve issues related to data traffic capacity, high data rate, and reliability for ensuring QoS. Cloud computing, Internet of things (IoT, and software-defined networking (SDN have become some of the core technologies for the 5G network. Cloud-based services provide flexible and efficient solutions for information and communications technology by reducing the cost of investing in and managing information technology infrastructure. In terms of functionality, SDN is a promising architecture that decouples control planes and data planes to support programmability, adaptability, and flexibility in ever-changing network architectures. However, IoT combines cloud computing and SDN to achieve greater productivity for evolving technologies in 5G by facilitating interaction between the physical and human world. The major objective of this study provides a lawless vision on comprehensive works related to enabling technologies for the next generation of mobile systems and networks, mainly focusing on 5G mobile communications.

  15. A Robust Optimization Based Energy-Aware Virtual Network Function Placement Proposal for Small Cell 5G Networks with Mobile Edge Computing Capabilities

    Directory of Open Access Journals (Sweden)

    Bego Blanco

    2017-01-01

    Full Text Available In the context of cloud-enabled 5G radio access networks with network function virtualization capabilities, we focus on the virtual network function placement problem for a multitenant cluster of small cells that provide mobile edge computing services. Under an emerging distributed network architecture and hardware infrastructure, we employ cloud-enabled small cells that integrate microservers for virtualization execution, equipped with additional hardware appliances. We develop an energy-aware placement solution using a robust optimization approach based on service demand uncertainty in order to minimize the power consumption in the system constrained by network service latency requirements and infrastructure terms. Then, we discuss the results of the proposed placement mechanism in 5G scenarios that combine several service flavours and robust protection values. Once the impact of the service flavour and robust protection on the global power consumption of the system is analyzed, numerical results indicate that our proposal succeeds in efficiently placing the virtual network functions that compose the network services in the available hardware infrastructure while fulfilling service constraints.

  16. Energy optimization in mobile sensor networks

    Science.gov (United States)

    Yu, Shengwei

    Mobile sensor networks are considered to consist of a network of mobile robots, each of which has computation, communication and sensing capabilities. Energy efficiency is a critical issue in mobile sensor networks, especially when mobility (i.e., locomotion control), routing (i.e., communications) and sensing are unique characteristics of mobile robots for energy optimization. This thesis focuses on the problem of energy optimization of mobile robotic sensor networks, and the research results can be extended to energy optimization of a network of mobile robots that monitors the environment, or a team of mobile robots that transports materials from stations to stations in a manufacturing environment. On the energy optimization of mobile robotic sensor networks, our research focuses on the investigation and development of distributed optimization algorithms to exploit the mobility of robotic sensor nodes for network lifetime maximization. In particular, the thesis studies these five problems: 1. Network-lifetime maximization by controlling positions of networked mobile sensor robots based on local information with distributed optimization algorithms; 2. Lifetime maximization of mobile sensor networks with energy harvesting modules; 3. Lifetime maximization using joint design of mobility and routing; 4. Optimal control for network energy minimization; 5. Network lifetime maximization in mobile visual sensor networks. In addressing the first problem, we consider only the mobility strategies of the robotic relay nodes in a mobile sensor network in order to maximize its network lifetime. By using variable substitutions, the original problem is converted into a convex problem, and a variant of the sub-gradient method for saddle-point computation is developed for solving this problem. An optimal solution is obtained by the method. Computer simulations show that mobility of robotic sensors can significantly prolong the lifetime of the whole robotic sensor network while

  17. Voice over LTE via Generic access (Volga) as a possible solution of mobile networks transformation

    OpenAIRE

    Stepaniuk, Oleg

    2010-01-01

    This paper is focused on Voice over LTE via Generic Access Network, which concept is to connect the already existing Mobile Switching Centers to the LTE network via a gateway supporting 2G or 3G voice environment.

  18. Output power distributions of mobile radio base stations based on network measurements

    International Nuclear Information System (INIS)

    Colombi, D; Thors, B; Persson, T; Törnevik, C; Wirén, N; Larsson, L-E

    2013-01-01

    In this work output power distributions of mobile radio base stations have been analyzed for 2G and 3G telecommunication systems. The approach is based on measurements in selected networks using performance surveillance tools part of the network Operational Support System (OSS). For the 3G network considered, direct measurements of output power levels were possible, while for the 2G networks, output power levels were estimated from measurements of traffic volumes. Both voice and data services were included in the investigation. Measurements were conducted for large geographical areas, to ensure good overall statistics, as well as for smaller areas to investigate the impact of different environments. For high traffic hours, the 90th percentile of the averaged output power was found to be below 65% and 45% of the available output power for the 2G and 3G systems, respectively.

  19. Output power distributions of mobile radio base stations based on network measurements

    Science.gov (United States)

    Colombi, D.; Thors, B.; Persson, T.; Wirén, N.; Larsson, L.-E.; Törnevik, C.

    2013-04-01

    In this work output power distributions of mobile radio base stations have been analyzed for 2G and 3G telecommunication systems. The approach is based on measurements in selected networks using performance surveillance tools part of the network Operational Support System (OSS). For the 3G network considered, direct measurements of output power levels were possible, while for the 2G networks, output power levels were estimated from measurements of traffic volumes. Both voice and data services were included in the investigation. Measurements were conducted for large geographical areas, to ensure good overall statistics, as well as for smaller areas to investigate the impact of different environments. For high traffic hours, the 90th percentile of the averaged output power was found to be below 65% and 45% of the available output power for the 2G and 3G systems, respectively.

  20. Optimising TCP for cloud-based mobile networks

    DEFF Research Database (Denmark)

    Artuso, Matteo; Christiansen, Henrik Lehrmann

    2016-01-01

    Cloud-based mobile networks are foreseen to be a technological enabler for the next generation of mobile networks. Their design requires substantial research as they pose unique challenges, especially from the point of view of additional delays in the fronthaul network. Commonly used network...... implementations of 3 popular operating systems are investigated in our network model. The results on the most influential parameters are used to design an optimized TCP for cloud-based mobile networks....

  1. Community Based Networks and 5G Wi-Fi

    DEFF Research Database (Denmark)

    Williams, Idongesit

    2018-01-01

    This paper argues on why Community Based Networks should be recognized as potential 5G providers using 5G Wi-Fi. The argument is hinged on findings in a research to understand why Community Based Networks deploy telecom and Broadband infrastructure. The study was a qualitative study carried out...... inductively using Grounded Theory. Six cases were investigated. Two Community Based Network Mobilization Models were identified. The findings indicate that 5G Wi-Fi deployment by Community Based Networks is possible if policy initiatives and the 5G Wi-Fi standards are developed to facilitate the causal...

  2. Analysis of Blocking Rate and Bandwidth Usage of Mobile IPTV Services in Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Mingfu Li

    2014-01-01

    Full Text Available Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  3. Analysis of blocking rate and bandwidth usage of mobile IPTV services in wireless cellular networks.

    Science.gov (United States)

    Li, Mingfu

    2014-01-01

    Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  4. A mobile network-based multimedia teleconference system for homecare services.

    Science.gov (United States)

    Zhang, Zhaomin; He, Aiguo; Wei, Daming

    2008-03-01

    Because most research and development for homecare services have focused on providing connections between home and service centers, the goal of the present work is to develop techniques and create realtime communications to connect service centers and homecare workers in mobile environments. A key technical issue for this research is how to overcome the limitation of bandwidth in mobile media and networks. An effort has been made to balance performance of communication and basic demands in telehealth through optimized system design and technical implementation. Implementations using third generation (3G) Freedom Of Mobile multimedia Access (FOMA) and Personal Handyphone System (PHS) were developed and evaluated. We conclude that the system we developed based on 3G FOMA provides sufficient and satisfactory functions for use in homecare services.

  5. 4G and Beyond - Exploiting Heterogeneity in Mobile Networks

    DEFF Research Database (Denmark)

    Zakrzewska, Anna

    of mobile networks and focuses on the main challenges resulting from their heterogeneity. To effectively manage this diversity, a novel hierarchical approach considering all types of resources, spectral, optical and computational is proposed. The generic framework covers all kinds of network heterogeneity...... and can be beneficial at any stage of network deployment or operation. Furthermore, a dedicated study of RAT selection and resource allocation is performed and a new optimisation model is introduced and evaluated. The results show a significant reduction of number of handovers at the cost of a slight...... throughput degradation, which leads to a more stable connectivity in multi-RAT environments. A new HetNet architecture with control and user plane separation is thoroughly evaluated. The study focuses on the soft-pilot requirements and assignment problem, which is solved using a proposed optimisation model...

  6. Dynamic optical resource allocation for mobile core networks with software defined elastic optical networking.

    Science.gov (United States)

    Zhao, Yongli; Chen, Zhendong; Zhang, Jie; Wang, Xinbo

    2016-07-25

    Driven by the forthcoming of 5G mobile communications, the all-IP architecture of mobile core networks, i.e. evolved packet core (EPC) proposed by 3GPP, has been greatly challenged by the users' demands for higher data rate and more reliable end-to-end connection, as well as operators' demands for low operational cost. These challenges can be potentially met by software defined optical networking (SDON), which enables dynamic resource allocation according to the users' requirement. In this article, a novel network architecture for mobile core network is proposed based on SDON. A software defined network (SDN) controller is designed to realize the coordinated control over different entities in EPC networks. We analyze the requirement of EPC-lightpath (EPCL) in data plane and propose an optical switch load balancing (OSLB) algorithm for resource allocation in optical layer. The procedure of establishment and adjustment of EPCLs is demonstrated on a SDON-based EPC testbed with extended OpenFlow protocol. We also evaluate the OSLB algorithm through simulation in terms of bandwidth blocking ratio, traffic load distribution, and resource utilization ratio compared with link-based load balancing (LLB) and MinHops algorithms.

  7. Securing Mobile Networks in an Operational Setting

    Science.gov (United States)

    Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Paulsen, Phillip E.; Shell, Dan

    2004-01-01

    This paper describes a network demonstration and three month field trial of mobile networking using mobile-IPv4. The network was implemented as part of the US Coast Guard operational network which is a ".mil" network and requires stringent levels of security. The initial demonstrations took place in November 2002 and a three month field trial took place from July through September of 2003. The mobile network utilized encryptors capable of NSA-approved Type 1 algorithms, mobile router from Cisco Systems and 802.11 and satellite wireless links. This paper also describes a conceptual architecture for wide-scale deployment of secure mobile networking in operational environments where both private and public infrastructure is used. Additional issues presented include link costs, placement of encryptors and running routing protocols over layer-3 encryption devices.

  8. An investigation into the use of 3G mobile communications to provide telehealth services in rural KwaZulu-Natal.

    Science.gov (United States)

    Clarke, Malcolm; Mars, Maurice

    2015-02-01

    We investigated the use of third-generation (3G) mobile communications to provide telehealth services in remote health clinics in rural KwaZulu-Natal, South Africa. We specified a minimal set of services as our use case that would be representative of typical activity and to provide a baseline for analysis of network performance. Services included database access to manage chronic disease, local support and management of patients (to reduce unnecessary travel to the hospital), emergency care (up to 8 h for an ambulance to arrive), e-mail, access to up-to-date information (Web), and teleclinics. We made site measurements at a representative set of health clinics to determine the type of coverage (general packet radio service [GPRS]/3G), its capabilities to support videoconferencing (H323 and Skype™ [Microsoft, Redmond, WA]) and audio (Skype), and throughput for transmission control protocol (TCP) to gain a measure of application performance. We found that none of the remote health clinics had 3G service. The GPRS service provided typical upload speed of 44 kilobits per second (Kbps) and download speed of 64 Kbps. This was not sufficient to support any form of videoconferencing. We also observed that GPRS had significant round trip time (RTT), in some cases in excess of 750 ms, and this led to slow start-up for TCP applications. We found audio was always so broken as to be unusable and further observed that many applications such as Web access would fail under conditions of very high RTT. We found some health clinics were so remote that they had no mobile service. 3G, where available, had measured upload speed of 331 Kbps and download speed of 446 Kbps and supported videoconferencing and audio at all sites, but we frequently experienced 3G changing to GPRS. We conclude that mobile communications currently provide insufficient coverage and capability to provide reliable clinical services and would advocate dedicated wireless services where reliable

  9. A security architecture for 5G networks

    OpenAIRE

    Arfaoui, Ghada; Bisson, Pascal; Blom, Rolf; Borgaonkar, Ravishankar; Englund, Håkan; Félix, Edith; Klaedtke, Felix; Nakarmi, Prajwol Kumar; Näslund, Mats; O’Hanlon, Piers; Papay, Juri; Suomalainen, Jani; Surridge, Mike; Wary, Jean-Philippe; Zahariev, Alexander

    2018-01-01

    5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for different vertical markets having varying service and security requirements, and involving a large number of actors. Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defi...

  10. A Switchable 3D-Coverage Phased Array Antenna Package for 5G Mobile Terminals

    DEFF Research Database (Denmark)

    Ojaroudiparchin, Naser; Shen, Ming; Zhang, Shuai

    2016-01-01

    This manuscript proposes a new design of a millimeter-wave (mm-Wave) array antenna package with beam steering characteristic for the fifth generation (5G) mobile applications. In order to achieve a broad 3D scanning coverage of the space with high-gain beams, three identical sub arrays of patch a...... and efficiency, which is suitable for 5G mobile communications. In addition, the impact of user’s hand on the antenna performance has been investigated....... antennas have been compactly arranged along the edge region of the mobile phone PCB to form the antenna package. By switching the feeding to one of the sub arrays, the desired direction of coverage can be achieved. The proposed design has >10 dB gain in the upper spherical space, good directivity......This manuscript proposes a new design of a millimeter-wave (mm-Wave) array antenna package with beam steering characteristic for the fifth generation (5G) mobile applications. In order to achieve a broad 3D scanning coverage of the space with high-gain beams, three identical sub arrays of patch...

  11. An investigation into the use of 3G mobile communications to provide telehealth services in rural KwaZulu-Natal

    OpenAIRE

    Clarke, M; Mars, M

    2014-01-01

    This article has been made available through the Brunel Open Access Publishing Fund. Abstract Background: We investigated the use of third-generation (3G) mobile communications to provide telehealth services in remote health clinics in rural KwaZulu-Natal, South Africa. Materials and Methods: We specified a minimal set of services as our use case that would be representative of typical activity and to provide a baseline for analysis of network performance. Services included database access...

  12. Evolution to 3G Mobile Communication

    Indian Academy of Sciences (India)

    and an overview of data transfer in cellular networks for first generation (lG) analog systems .... especially in big cities, on the other hand, led to the develop- ment of the .... zation channel, paging channels and traffic channels. Direct. Sequence ...

  13. Mobile Low Latency Services in 5G

    DEFF Research Database (Denmark)

    Cattoni, Andrea Fabio; Chandramouli, Devaki; Sartori, Cinzia

    2015-01-01

    Networks beyond 2020 will experience 10000-fold increase in wireless traffic, connect 10-100 times more devices and support the most diverse use cases. Thus, the 5G architecture needs to be flexible and cater for both traffic volumes and diversity of service requirements. Among the set of new use...... cases, support of delay sensitive "mobile" applications, such as vehicular communications (V2X, where X stands for either Vehicle or Infrastructure), require architecture enhancements to natively offer low latency and high mobility. In this paper we propose the necessary technology enablers...

  14. An overview of 5G network slicing architecture

    Science.gov (United States)

    Chen, Qiang; Wang, Xiaolei; Lv, Yingying

    2018-05-01

    With the development of mobile communication technology, the traditional single network model has been unable to meet the needs of users, and the demand for differentiated services is increasing. In order to solve this problem, the fifth generation of mobile communication technology came into being, and as one of the key technologies of 5G, network slice is the core technology of network virtualization and software defined network, enabling network slices to flexibly provide one or more network services according to users' needs[1]. Each slice can independently tailor the network functions according to the requirements of the business scene and the traffic model and manage the layout of the corresponding network resources, to improve the flexibility of network services and the utilization of resources, and enhance the robustness and reliability of the whole network [2].

  15. Game-theoretic pricing for video streaming in mobile networks.

    Science.gov (United States)

    Lin, W Sabrina; Liu, K J Ray

    2012-05-01

    Mobile phones are among the most popular consumer devices, and the recent developments of 3G networks and smart phones enable users to watch video programs by subscribing data plans from service providers. Due to the ubiquity of mobile phones and phone-to-phone communication technologies, data-plan subscribers can redistribute the video content to nonsubscribers. Such a redistribution mechanism is a potential competitor for the mobile service provider and is very difficult to trace given users' high mobility. The service provider has to set a reasonable price for the data plan to prevent such unauthorized redistribution behavior to protect or maximize his/her own profit. In this paper, we analyze the optimal price setting for the service provider by investigating the equilibrium between the subscribers and the secondary buyers in the content-redistribution network. We model the behavior between the subscribers and the secondary buyers as a noncooperative game and find the optimal price and quantity for both groups of users. Based on the behavior of users in the redistribution network, we investigate the evolutionarily stable ratio of mobile users who decide to subscribe to the data plan. Such an analysis can help the service provider preserve his/her profit under the threat of the redistribution networks and can improve the quality of service for end users.

  16. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6.

    Science.gov (United States)

    Samuelraj, Ananthi Jebaseeli; Jayapal, Sundararajan

    2015-01-01

    Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  17. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6

    Directory of Open Access Journals (Sweden)

    Ananthi Jebaseeli Samuelraj

    2015-01-01

    Full Text Available Proxy Mobile IPV6 (PMIPV6 is a network based mobility management protocol which supports node’s mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node’s mobility should be modified to support group nodes’ mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  18. 5G Terminals with Multi-Streaming Features for Real-Time Mobile Broadband Applications

    Directory of Open Access Journals (Sweden)

    T. Shuminoski

    2017-06-01

    Full Text Available In this paper we present a novel QoS framework on the network layer for 5G terminals with vertical multi-homing and multi-streaming capabilities by using radio networks aggregation. The proposed framework is leading to high performance utility networks with QoS provisioning for real-time multimedia services by achieving low packet delays, stochastic queuing network stability and highest mobile broadband capabilities i.e. bitrates. The proposed QoS algorithm is implemented within the mobile terminals on one side, and in dedicated proxy servers on mobile core network side. It is based on Lyapunov optimization techniques and it is targeted to handle simultaneously multiple multimedia service flows via multiple radio network interfaces in parallel.

  19. Advances in mobile cloud computing and big data in the 5G era

    CERN Document Server

    Mastorakis, George; Dobre, Ciprian

    2017-01-01

    This book reports on the latest advances on the theories, practices, standards and strategies that are related to the modern technology paradigms, the Mobile Cloud computing (MCC) and Big Data, as the pillars and their association with the emerging 5G mobile networks. The book includes 15 rigorously refereed chapters written by leading international researchers, providing the readers with technical and scientific information about various aspects of Big Data and Mobile Cloud Computing, from basic concepts to advanced findings, reporting the state-of-the-art on Big Data management. It demonstrates and discusses methods and practices to improve multi-source Big Data manipulation techniques, as well as the integration of resources availability through the 3As (Anywhere, Anything, Anytime) paradigm, using the 5G access technologies.

  20. Connecting Mobile Users Through Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Faisal Alkhateeb

    2012-10-01

    Full Text Available Nowadays, social networks become popular with the emerging of web-based social networking services. Recently, several mobile services are developed to connect users to their favourite social networks such as Facebook, Twitter, Flickr, etc. However, these services depends upon the existing web-based social networks. In this paper, we present a mobile service for joining groups across communities. The originality of the work is that the framework of the service allows creating and joining social networks that are self-contained for mobile company servers. The service consists of several sub-services such as users invitation, group finding and others. Users, regardless of their disability, can use the service and its sub-services without the need to create their own accounts on social web sites and thus their own groups. We also propose a privacy control policy for mobile social networks.

  1. Internet of things (IoT) in 5G mobile technologies

    CERN Document Server

    Mastorakis, George; Batalla, Jordi

    2016-01-01

    This book reports on the latest advances in the modeling, analysis and efficient management of information in Internet of Things (IoT) applications in the context of 5G access technologies. It presents cutting-edge applications made possible by the implementation of femtocell networks and millimeter wave communications solutions, examining them from the perspective of the universally and constantly connected IoT. Moreover, it describes novel architectural approaches to the IoT and presents the new framework possibilities offered by 5G mobile networks, including middleware requirements, node-centrality and the location of extensive functionalities at the edge. By providing researchers and professionals with a timely snapshot of emerging mobile communication systems, and highlighting the main pitfalls and potential solutions, the book fills an important gap in the literature and will foster the further developments of 5G hosting IoT devices.

  2. Reconfigurable Robust Routing for Mobile Outreach Network

    Science.gov (United States)

    Lin, Ching-Fang

    2010-01-01

    The Reconfigurable Robust Routing for Mobile Outreach Network (R3MOO N) provides advanced communications networking technologies suitable for the lunar surface environment and applications. The R3MOON techn ology is based on a detailed concept of operations tailored for luna r surface networks, and includes intelligent routing algorithms and wireless mesh network implementation on AGNC's Coremicro Robots. The product's features include an integrated communication solution inco rporating energy efficiency and disruption-tolerance in a mobile ad h oc network, and a real-time control module to provide researchers an d engineers a convenient tool for reconfiguration, investigation, an d management.

  3. Security aspects of 3G-WLAN interworking

    DEFF Research Database (Denmark)

    Køien, Geir M.

    2003-01-01

    to roaming and mobility support. In short, WLAN systems are great for hot spot coverage, while 3G systems provide global coverage and the necessary network and management infrastructure to cater for security, roaming, and charging requirements. The focus of the article is on security aspects of 3GPP......Third-generation cellular systems will provide wide coverage and nearly universal roaming, but will not realistically live up to the bit rate expectations placed on them. On the other hand, WLAN systems already offer bit rates surpassing those of 3G systems, but are often found lacking with respect...

  4. Mobility Network and Safety

    Directory of Open Access Journals (Sweden)

    Adriana Galderisi

    2010-04-01

    Full Text Available Mobility network is crucial for ensuring territorial safety with respect to natural and technological hazards. They represent a basic support to community’s everyday life although being exposed elements often characterized by high vulnerability to different hazards and, in the meanwhile, strategic equipments for emergency management. Physical damages or the lack in functioning of those networks may greatly increase the loss of human lives caused by hazardous events as well as produce relevant economic damages at medium and long term. Although the relevance of the mobility networks in assuring territorial safety is at present largely recognized, risk analyses have been long focused on buildings’ vulnerability or, even where they have paid attention to mobility network, they have been mainly focused on the physical damages that a given hazard could may induce on individual elements of such network. It is recent the awareness that mobility network represents a system, characterized by relevant interdependences both among its elements and among network infrastructures and urban systems. Based on these assumptions, this paper points out the heterogeneous aspects of the mobility network vulnerability and their relevance in increasing the overall territorial or urban vulnerability to hazardous events. Therefore, an in-depth investigation of the concept of mobility network vulnerability is provided, in order to highlight the aspects mostly investigated and more recent research perspectives. Finally, a case study in the Campania Region is presented in order to point out how traditional risk analyses, generally referred to individual hazards, can sometimes led to invest in the mobility network improvement or development which, targeted to increase the security of a territory result, on the opposite, in an increase of the territorial vulnerability.

  5. Mobility management in LTE heterogeneous networks

    CERN Document Server

    Karandikar, Abhay; Mehta, Mahima

    2017-01-01

    This book is the first of its kind, compiling information on the Long-Term Evolution (LTE) standards, which are enhanced to address new mobility-related challenges in Heterogeneous Networks (HetNets). It identifies the related challenges and discusses solutions and the simulation methodology for modeling HetNet mobility – cutting-edge information that was previously accessible only in the form of 3GPP specifications and documents, and research papers. The book reviews the current LTE mobility framework and discusses some of the changes for enhancing mobility management in HetNets. It describes the measurement procedures, handover (HO) mechanisms and HO success/failure scenarios. HetNets are intended to provide very high spectral efficiency while ensuring seamless coverage by deploying low-power nodes within the umbrella macrocell network. While mobility management in homogeneous networks is well understood, LTE standards are being enhanced to address the HetNet-specific mobility management challenges emergi...

  6. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).

  7. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN). PMID:27907113

  8. Extensible framework for elastic orchestration of service function chains in 5G networks

    OpenAIRE

    Medhat, Ahmed M.; Carella, Guiseppe Antonio; Pauls, Michael; Magedanz, Thomas

    2017-01-01

    With the evolution towards the Fifth Generation of Mobile Communications (5G), Software-based Networks are paving the way to a radical transformation of Network Operators infrastructures. Novel technologies like Network Function Virtualisation (NFV) and Software Defined Network (SDN) are enabling new way of managing on-demand network resources. Focusing on the Mobile Core Network architecture, Service Function Chaining (SFC) is foreseen to be the solution for dynamically routing traffic acros...

  9. Threat Landscape and Good Practice Guide for Software Defined Networks/5G

    OpenAIRE

    Belmonte Martin, A.; Marinos, L.; Rekleitis, E.; Spanoudakis, G.; Petroulakis, N. E.

    2015-01-01

    5G represents the next major phase of mobile telecommunication systems and network architectures beyond the current 4G standards, aiming at extreme broadband and ultra-robust, low latency connectivity, to enable the programmable connectivity for the Internet of Everything2. Despite the significant debate on the technical specifications and the technological maturity of 5G, which are under discussion in various fora3, 5G is expected to affect positively and significantly several industry secto...

  10. Probabilistic Mobility Models for Mobile and Wireless Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2010-01-01

    In this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a message...... from a location it will evolve to a network distribution depending on whether nodes at other locations receive the message or not. Mobility of locations is not arbitrary but guarded by a probabilistic mobility function (PMF) and we also define the notion of a weak bisimulation given a PMF...

  11. Assessing the implications of cellular network performance on mobile content access

    DEFF Research Database (Denmark)

    Kaup, Fabian; Michelinakis, Foivos; Bui, Nicola

    2016-01-01

    Mobile applications such as VoIP, (live) gaming, or video streaming have diverse QoS requirements ranging from low delay to high throughput. The optimization of the network quality experienced by end-users requires detailed knowledge of the expected network performance. Also, the achieved service...... of cellular network measurements, focused on analyzing root causes of mobile network performance variability. Measurements conducted on a 4G cellular network in Germany show that management and configuration decisions have a substantial impact on the performance. Specifically, it is observed...

  12. 3D IC and RF SiPs advanced stacking and planar solutions for 5G mobility

    CERN Document Server

    Hwang, Lih-Tyng

    2017-01-01

    An interdisciplinary guide to enabling technologies for 3D ICs and 5G mobility, covering packaging, design to product life and reliability assessments * Features an interdisciplinary approach to the enabling technologies and hardware for 3D ICs and 5G mobility * Presents statistical treatments and examples with tools that are easily accessible, such as Microsoft's Excel and Minitab * Fundamental design topics such as electromagnetic design for logic and RF/passives centric circuits are explained in detail * Provides chapter-wise review questions and powerpoint slides as teaching tools

  13. Security Awareness in Software-Defined Multi-Domain 5G Networks

    Directory of Open Access Journals (Sweden)

    Jani Suomalainen

    2018-03-01

    Full Text Available Fifth generation (5G technologies will boost the capacity and ease the management of mobile networks. Emerging virtualization and softwarization technologies enable more flexible customization of network services and facilitate cooperation between different actors. However, solutions are needed to enable users, operators, and service providers to gain an up-to-date awareness of the security and trustworthiness of 5G systems. We describe a novel framework and enablers for security monitoring, inferencing, and trust measuring. The framework leverages software-defined networking and big data technologies to customize monitoring for different applications. We present an approach for sharing security measurements across administrative domains. We describe scenarios where the correlation of multi-domain information improves the accuracy of security measures with respect to two threats: end-user location tracking and Internet of things (IoT authentication storms. We explore the security characteristics of data flows in software networks dedicated to different applications with a mobile network testbed.

  14. An extra power saving scheme for prolonging lifetime of mobile handset in the 4G mobile networks.

    Science.gov (United States)

    Chen, Jenhui; Tarn, Woei-Hwa; Lee, Jiann-Der

    2014-01-01

    In the fourth generation or next generation networks, services of non-real-time variable bit rate (NRT-VBR) and best effort (BE) will dominate over 85% of the total traffic in the networks. In this paper, we study the power saving mechanism of NRT-VBR and BE services for mobile handsets (MHs) to prolong their battery lifetime (i.e., the sustained operation duration) in the fourth generation networks. Because the priority of NRT-VBR and BE is lower than that of real-time VBR (RT-VBR) or guaranteed bit rate (GBR) services, we investigate an extended sleep mode for lower priority services (e.g., NRT-VBR and BE) in an MH to conserve the energy. The extended sleep mode is used when the MH wakes up from the sleep mode but it cannot obtain the bandwidth from base station (BS). The proposed mechanism, named extra power saving scheme (EPSS), uses the M/M/k/k Markovian queuing model to estimate the extended sleep duration to let MHs conserve their battery energy when the networks traffic is congested. To study the performance of EPSS, an accurate analysis model of energy is presented and validated by taking a series of simulations. Numerical experiments show that EPSS can achieve 43% extra energy conservation at most when downlink resource is saturated. We conclude that the energy of MHs can be conserved further by applying EPSS when the traffic load is saturated. The effect of energy saving becomes more obvious when the portion of NRT-VBR and BE services is greater than that of RT-VBR and GBR services.

  15. Advanced Networks in Motion Mobile Sensorweb

    Science.gov (United States)

    Ivancic, William D.; Stewart, David H.

    2011-01-01

    Advanced mobile networking technology applicable to mobile sensor platforms was developed, deployed and demonstrated. A two-tier sensorweb design was developed. The first tier utilized mobile network technology to provide mobility. The second tier, which sits above the first tier, utilizes 6LowPAN (Internet Protocol version 6 Low Power Wireless Personal Area Networks) sensors. The entire network was IPv6 enabled. Successful mobile sensorweb system field tests took place in late August and early September of 2009. The entire network utilized IPv6 and was monitored and controlled using a remote Web browser via IPv6 technology. This paper describes the mobile networking and 6LowPAN sensorweb design, implementation, deployment and testing as well as wireless systems and network monitoring software developed to support testing and validation.

  16. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  17. 5G: Vision and Requirements for Mobile Communication System towards Year 2020

    OpenAIRE

    Liu, Guangyi; Jiang, Dajie

    2016-01-01

    The forecast for future 10 years’ traffic demand shows an increase in 1000 scales and more than 100 billion connections of Internet of Things, which imposes a big challenge for future mobile communication technology beyond year 2020. The mobile industry is struggling in the challenges of high capacity demand but low cost for future mobile network when it starts to enable a connected mobile world. 5G is targeted to shed light on these contradictory demands towards year 2020. This paper firstly...

  18. Comparison of average global exposure of population induced by a macro 3G network in different geographical areas in France and Serbia.

    Science.gov (United States)

    Huang, Yuanyuan; Varsier, Nadège; Niksic, Stevan; Kocan, Enis; Pejanovic-Djurisic, Milica; Popovic, Milica; Koprivica, Mladen; Neskovic, Aleksandar; Milinkovic, Jelena; Gati, Azeddine; Person, Christian; Wiart, Joe

    2016-09-01

    This article is the first thorough study of average population exposure to third generation network (3G)-induced electromagnetic fields (EMFs), from both uplink and downlink radio emissions in different countries, geographical areas, and for different wireless device usages. Indeed, previous publications in the framework of exposure to EMFs generally focused on individual exposure coming from either personal devices or base stations. Results, derived from device usage statistics collected in France and Serbia, show a strong heterogeneity of exposure, both in time, that is, the traffic distribution over 24 h was found highly variable, and space, that is, the exposure to 3G networks in France was found to be roughly two times higher than in Serbia. Such heterogeneity is further explained based on real data and network architecture. Among those results, authors show that, contrary to popular belief, exposure to 3G EMFs is dominated by uplink radio emissions, resulting from voice and data traffic, and average population EMF exposure differs from one geographical area to another, as well as from one country to another, due to the different cellular network architectures and variability of mobile usage. Bioelectromagnetics. 37:382-390, 2016. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  19. LTE Adaptation for Mobile Broadband Satellite Networks

    Directory of Open Access Journals (Sweden)

    Bastia Francesco

    2009-01-01

    Full Text Available One of the key factors for the successful deployment of mobile satellite systems in 4G networks is the maximization of the technology commonalities with the terrestrial systems. An effective way of achieving this objective consists in considering the terrestrial radio interface as the baseline for the satellite radio interface. Since the 3GPP Long Term Evolution (LTE standard will be one of the main players in the 4G scenario, along with other emerging technologies, such as mobile WiMAX; this paper analyzes the possible applicability of the 3GPP LTE interface to satellite transmission, presenting several enabling techniques for this adaptation. In particular, we propose the introduction of an inter-TTI interleaving technique that exploits the existing H-ARQ facilities provided by the LTE physical layer, the use of PAPR reduction techniques to increase the resilience of the OFDM waveform to non linear distortion, and the design of the sequences for Random Access, taking into account the requirements deriving from the large round trip times. The outcomes of this analysis show that, with the required proposed enablers, it is possible to reuse the existing terrestrial air interface to transmit over the satellite link.

  20. EEG Changes Due to Experimentally Induced 3G Mobile Phone Radiation.

    Science.gov (United States)

    Roggeveen, Suzanne; van Os, Jim; Viechtbauer, Wolfgang; Lousberg, Richel

    2015-01-01

    The aim of this study was to investigate whether a 15-minute placement of a 3G dialing mobile phone causes direct changes in EEG activity compared to the placement of a sham phone. Furthermore, it was investigated whether placement of the mobile phone on the ear or the heart would result in different outcomes. Thirty-one healthy females participated. All subjects were measured twice: on one of the two days the mobile phone was attached to the ear, the other day to the chest. In this single-blind, cross-over design, assessments in the sham phone condition were conducted directly preceding and following the mobile phone exposure. During each assessment, EEG activity and radiofrequency radiation were recorded jointly. Delta, theta, alpha, slowbeta, fastbeta, and gamma activity was computed. The association between radiation exposure and the EEG was tested using multilevel random regression analyses with radiation as predictor of main interest. Significant radiation effects were found for the alpha, slowbeta, fastbeta, and gamma bands. When analyzed separately, ear location of the phone was associated with significant results, while chest placement was not. The results support the notion that EEG alterations are associated with mobile phone usage and that the effect is dependent on site of placement. Further studies are required to demonstrate the physiological relevance of these findings.

  1. Mobile social networking an innovative approach

    CERN Document Server

    Zhang, Daqing

    2014-01-01

    The use of contextually aware, pervasive, distributed computing, and sensor networks to bridge the gap between the physical and online worlds is the basis of mobile social networking. This book shows how applications can be built to provide mobile social networking, the research issues that need to be solved to enable this vision, and how mobile social networking can be used to provide computational intelligence that will improve daily life. With contributions from the fields of sociology, computer science, human-computer interaction and design, this book demonstrates how mobile social networks can be inferred from users' physical interactions both with the environment and with others, as well as how users behave around them and how their behavior differs on mobile vs. traditional online social networks.

  2. Mobile Social Network in a Cultural Context

    DEFF Research Database (Denmark)

    Liu, Jun

    2010-01-01

    , and mobile phone rumours, this study observes that mobile social networks are a way that Chinese people cultivate, maintain and strengthen their guanxi networks. Embedding the reliability of guanxi, the message spreading via mobile communication always enjoys high credibility, while mutual obligation...... of mobile social network in China therefore emanate not only from Information and Communication Technologies, but also from the socio-cultural source - guanxi - deeply rooted in Chinese society.......the chapter “Mobile Social Network in a Cultural Context” examines the guanxi-embedded mobile social network in China. By focusing on three concrete case studies with 56 in-depth interviews, including New Year text message greetings, mobile social networks for job allocations among migrant workers...

  3. Cross-layer ultrasound video streaming over mobile WiMAX and HSUPA networks.

    Science.gov (United States)

    Alinejad, Ali; Philip, Nada Y; Istepanian, Robert S H

    2012-01-01

    It is well known that the evolution of 4G-based mobile multimedia network systems will contribute significantly to future mobile healthcare (m-health) applications that require high bandwidth and fast data rates. Central to the success of such emerging applications is the compatibility of broadband networks, such as mobile Worldwide Interoperability For Microwave Access (WiMAX) and High-Speed Uplink Packet Access (HSUPA), and especially their rate adaption issues combined with the acceptable real-time medical quality of service requirements. In this paper, we address the relevant challenges of cross-layer design requirements for real-time rate adaptation of ultrasound video streaming in mobile WiMAX and HSUPA networks. A comparative performance analysis of such approach is validated in two experimental m-health test bed systems for both mobile WiMAX and HSUPA networks. The experimental results have shown an improved performance of mobile WiMAX compared to the HSUPA using the same cross-layer optimization approach.

  4. Synchronization challenges in packet-based Cloud-RAN fronthaul for mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra; Juul, Anders Christian; Christiansen, Henrik Lehrmann

    2015-01-01

    In this paper, we look at reusing existing packet-based network (e.g. Ethernet) to possibly decrease deployment costs of fronthaul Cloud Radio Access Network (C-RAN) network and cost of Baseband Unit (BBU) resources. The challenge of this solution is that it requires mobile traffic (until now...... transmitted over synchronous protocols) to traverse the asynchronous Ethernet without losing synchronization. We analyze synchronization requirements of mobile networks and present an overview of solutions that fulfill them in traditional mobile networks. Then we elaborate on challenges that packet-based...... fronthaul imposes. We analyze possible contributions to frequency and phase error. We verify the feasibility of using the IEEE 1588v2 also know as Precision Time Protocol (PTP) for providing accurate phase and frequency synchronization. The study is based on simulations made in OPNET modeler. Thereby we...

  5. fraud detection in mobile communications networks using user

    African Journals Online (AJOL)

    DEPT OF AGRICULTURAL ENGINEERING

    testing the methods with data from real mobile communications networks. Keywords: Call .... System. Monitoring. Database. Database. Fig. 3: Mobile communication detection tools ..... receiver operating characteristic curve (ROC). ROC is a ...

  6. On the Development Trend of the Mobile Advertisement in 3G Era%浅谈3G时代手机广告的发展趋势

    Institute of Scientific and Technical Information of China (English)

    张超

    2012-01-01

    本文在国内3G手机广告发展现状的基础上,充分的参考国外3G手机广告的发展情况,对我国3G手机广告的形式、内容以及收费方式等做了大胆的预测。%Based on the present situation of the domestic 3G mobile advertisement,while refer to the development of the foreign 3G mobile advertisement,this paper tries to make a prediction on the form,the content and the charge way of 3G mobile advertisement in China.

  7. A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets

    Directory of Open Access Journals (Sweden)

    Han Kyusuk

    2011-01-01

    Full Text Available This paper introduces novel attack detection approaches on mobile and wireless device security and network which consider temporal relations between internet packets. In this paper we first present a field selection technique using a Genetic Algorithm and generate a Packet-based Mining Association Rule from an original Mining Association Rule for Support Vector Machine in mobile and wireless network environment. Through the preprocessing with PMAR, SVM inputs can account for time variation between packets in mobile and wireless network. Third, we present Gaussian observation Hidden Markov Model to exploit the hidden relationships between packets based on probabilistic estimation. In our G-HMM approach, we also apply G-HMM feature reduction for better initialization. We demonstrate the usefulness of our SVM and G-HMM approaches with GA on MIT Lincoln Lab datasets and a live dataset that we captured on a real mobile and wireless network. Moreover, experimental results are verified by -fold cross-validation test.

  8. Mobile Support For Logistics

    Science.gov (United States)

    2016-03-01

    support wireless capabilities, such as Wi-Fi or LTE -based 4G cellular infrastructures, into the DOD’s enterprise software, GCSS-MC could be a large...fielded mobile devices through ViaSat Inc. ViaSat’s goal is to provide secure communications over 3G/4G/ LTE cellular and Wi-Fi networks, secure...or commercial carrier network. While these measures are not all encompassing for protecting mobile devices, they are a ways that drastically improve

  9. The Space Mobile Network

    Science.gov (United States)

    Israel, David

    2017-01-01

    The definition and development of the next generation space communications and navigation architecture is underway. The primary goals are to remove communications and navigations constraints from missions and to enable increased autonomy. The Space Mobile Network (SMN) is an architectural concept that includes new technology and operations that will provide flight systems with an similar user experience to terrestrial wireless mobile networks. This talk will describe the SMN and its proposed new features, such as Disruption Tolerant Networking (DTN), optical communications, and User Initiated Services (UIS).

  10. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  11. Using satellite communications for a mobile computer network

    Science.gov (United States)

    Wyman, Douglas J.

    1993-01-01

    The topics discussed include the following: patrol car automation, mobile computer network, network requirements, network design overview, MCN mobile network software, MCN hub operation, mobile satellite software, hub satellite software, the benefits of patrol car automation, the benefits of satellite mobile computing, and national law enforcement satellite.

  12. Verification of 3G and 4G Received Power Measurements in a Crowdsourcing Android App

    DEFF Research Database (Denmark)

    Lauridsen, Mads; Rodriguez, Ignacio; Mikkelsen, Lars Møller

    2016-01-01

    . In this paper we verify the crowdsourcing Android application NetMap’s ability to measure LTE Reference Signal Received Power by analyzing the Root Mean Squared Error, being 2-3 dB, and cross-correlation coefficient, being above 0.8, with measurements obtained by use of a professional radio network scanner......Many crowdsourcing Android applications are available for measuring network Key Performance Indicators such as received power, latency, and throughput. The data is useful for end-users, researchers, and Mobile Network Operators, but unfortunately the applications’ accuracy are rarely verified...... and measurement phones. In addition, the application is applicable, but less accurate, for 3G Received Signal Code Power measurements. The studies are made for various device speeds and in different scenarios including indoor, urban, and highway, where the NetMap application is showed to perform well....

  13. Principles of mobile computing and communications

    CERN Document Server

    Othman, Mazliza

    2007-01-01

    Introduction Mobile Computing Applications Evolution of Wireless Networks and Services Summary Cellular Network Architecture UMTS Architecture Public Land Mobile Network Interfaces User Authentication Frequency Reuse Channel Assignment Location Registration and Update Handover Procedures CDMA The Move toward 3G Networks Wireless Local Area Networks IEEE 802.11 Standard IEEE 802.11b Standard (Wi-Fi) IEEE 802.11a Standard IEEE 802.11g Standard HIPERLAN/2 IEEE 802.1x Standard IEEE 802.11i Standard IEEE 802.11e Standard Security Issues IP over 802.11 WLAN Integrating 802.11 WLAN and UMTS Summary Wireless Personal Area Networks HomeRF Bluetooth Technology IEEE 802.15.3 Standard Home Area Networks Summary Wireless Sensor Networks Applications of WSNs Requirements for WSNs WSN Architecture The 802.15.4 Standard The ZigBee Protocol Power Conservation Techniques Network and Communications Configuration of Sensor Networks WSN and Emergency Response Applications Summary Mobile Ad Hoc Networks AODV DSR OLSR TBRPF Summary...

  14. 3G Bet

    Institute of Scientific and Technical Information of China (English)

    DAN; STEINBOCK

    2006-01-01

    Since the late 1990s, Chinese mobile players have caught up rapidly with cutting-edge mobile services, while the Chinese marketplace has become an R&D hub for multinational companies and a test laboratory for large-scale ad campaigns by global marketers. As China prepares to enter the third-generation (3G) industry, it is faced with both great challenges and great opportunities. Scale and mobile services In late summer 2002, Coca-Cola ran a short message service (SMS) ad campaign, featuring

  15. Interworking evolution of mobile satellite and terrestrial networks

    Science.gov (United States)

    Matyas, R.; Kelleher, P.; Moller, P.; Jones, T.

    1993-01-01

    There is considerable interest among mobile satellite service providers in interworking with terrestrial networks to provide a universal global network. With such interworking, subscribers may be provided a common set of services such as those planned for the Public Switched Telephone Network (PSTN), the Integrated Services Digital Network (ISDN), and future Intelligent Networks (IN's). This paper first reviews issues in satellite interworking. Next the status and interworking plans of terrestrial mobile communications service providers are examined with early examples of mobile satellite interworking including a discussion of the anticipated evolution towards full interworking between mobile satellite and both fixed and mobile terrestrial networks.

  16. The promise of downlink MU-MIMO for high-capacity next generation mobile broadband networks based on IEEE 802.16 m

    OpenAIRE

    Papathanassiou Apostolos; Davydov Alexei

    2011-01-01

    Abstract The dramatic increase of the demand for mobile broadband services poses stringent requirements on the performance evolution of currently deployed mobile broadband networks, such as Mobile WiMAX Release 1 and 3GPP LTE Release 8. Although the combination of single-user multiple-input multiple-output (SU-MIMO) and orthogonal frequency division multiple access (OFDMA) provide the appropriate technologies for improving the downlink performance of third generation (3G) code division multip...

  17. Interference from the Deep Space Network's 70-m High Power Transmitter in Goldstone, CA to 3G Mobile Users Operating in the Surrounding Area

    Science.gov (United States)

    Ho, Christian

    2004-01-01

    The International Telecommunications Union (ITU) has allocated 2110-2200 MHz for the third generation (3G) mobile services. Part of the spectrum (2110-2120 MHz) is allocated for space research service and has been used by the DSN for years for sending command uplinks to deep space missions. Due to the extremely high power transmitted, potential interference to 3G users in areas surrounding DSN Goldstone exists. To address this issue, a preliminary analytical study has been performed and computer models have been developed. The goal is to provide theoretical foundation and tools to estimate the strength of interference as a function of distance from the transmitter for various interference mechanisms, (or propagation modes), and then determine the size of the area in which 3G users are susceptible to interference from the 400-kW transmitter in Goldstone. The focus is non-line-of-sight interference, taking into account of terrain shielding, anomalous propagation mechanisms, and technical and operational characteristics of the DSN and the 3G services.

  18. Complex human mobility dynamics on a network

    International Nuclear Information System (INIS)

    Szell, M.

    2010-01-01

    Massive multiplayer online games provide a fascinating new way of observing hundreds of thousands of simultaneously interacting individuals engaged in virtual socio-economic activities. We have compiled a data set consisting of practically all actions of all players over a period of four years from an online game played by over 350,000 people. The universe of this online world is a lattice-like network on which players move in order to interact with other players. We focus on the mobility of human players on this network over a time-period of 500 days. We take a number of mobility measurements and compare them with measures of simulated random walkers on the same topology. Mobility of players is sub-diffusive - the mean squared displacement follows a power law with exponent 0.4 - and significantly deviates from mobility patterns of random walkers. Mean first passage times and transition counts relate via a power-law with slope -1/3. We compare our results with studies where human mobility was measured via mobile phone data and find striking similarities. (author)

  19. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  20. Mobile Videoconferencing Apps for Telemedicine.

    Science.gov (United States)

    Zhang, Kai; Liu, Wei-Li; Locatis, Craig; Ackerman, Michael

    2016-01-01

    The quality and performance of several videoconferencing applications (apps) tested on iOS (Apple, Cupertino, CA) and Android (Google, Mountain View, CA) mobile platforms using Wi-Fi (802.11), third-generation (3G), and fourth-generation (4G) cellular networks are described. The tests were done to determine how well apps perform compared with videoconferencing software installed on computers or with more traditional videoconferencing using dedicated hardware. The rationale for app assessment and the testing methodology are described. Findings are discussed in relation to operating system platform (iOS or Android) for which the apps were designed and the type of network (Wi-Fi, 3G, or 4G) used. The platform, network, and apps interact, and it is impossible to discuss videoconferencing experienced on mobile devices in relation to one of these factors without referencing the others. Apps for mobile devices can vary significantly from other videoconferencing software or hardware. App performance increased over the testing period due to improvements in network infrastructure and how apps manage bandwidth.

  1. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  2. An Optimal Routing Algorithm in Service Customized 5G Networks

    Directory of Open Access Journals (Sweden)

    Haipeng Yao

    2016-01-01

    Full Text Available With the widespread use of Internet, the scale of mobile data traffic grows explosively, which makes 5G networks in cellular networks become a growing concern. Recently, the ideas related to future network, for example, Software Defined Networking (SDN, Content-Centric Networking (CCN, and Big Data, have drawn more and more attention. In this paper, we propose a service-customized 5G network architecture by introducing the ideas of separation between control plane and data plane, in-network caching, and Big Data processing and analysis to resolve the problems traditional cellular radio networks face. Moreover, we design an optimal routing algorithm for this architecture, which can minimize average response hops in the network. Simulation results reveal that, by introducing the cache, the network performance can be obviously improved in different network conditions compared to the scenario without a cache. In addition, we explore the change of cache hit rate and average response hops under different cache replacement policies, cache sizes, content popularity, and network topologies, respectively.

  3. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  4. 5G technologies boosting efficient mobile learning

    Directory of Open Access Journals (Sweden)

    Leligou Helen C.

    2017-01-01

    Full Text Available The needs for education, learning and training proliferate primarily due to the facts that economy becomes more and more knowledge based (mandating continuous lifelong learning and people migrate among countries, which introduces the need for learning other languages, for training on different skills and learning about the new cultural and societal framework. Given that in parallel, time schedules continuously become tighter, learning through mobile devices continuously gains in popularity as it allows for learning anytime, anywhere. To increase the learning efficiency, personalisation (in terms of selecting the learning content, type and presentation and adaptation of the learning experience in real time based on the experienced affect state are key instruments. All these user requirements challenge the current network architectures and technologies. In this paper, we investigate the requirements implied by efficient mobile learning scenarios and we explore how 5G technologies currently under design/testing/validation and standardisation meet these requirements.

  5. Remote radio heads and the evolution towards 4G networks

    DEFF Research Database (Denmark)

    Lanzani, Christian; Kardaras, Georgios; Boppana, Deepak

    2009-01-01

    Distributed base stations with remote radio head (RRH) capability greatly help mobile operators to resolve cost, performance, and efficiency challenges when deploying new base stations on the road to fully developed 4G networks. Multi-mode radios capable of operating according to GSM, HSPA, LTE...

  6. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shibo Luo

    2015-12-01

    Full Text Available Software-Defined Networking-based Mobile Networks (SDN-MNs are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  7. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.

    Science.gov (United States)

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-12-17

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  8. Using OpenSSH to secure mobile LAN network traffic

    Science.gov (United States)

    Luu, Brian B.; Gopaul, Richard D.

    2002-08-01

    Mobile Internet Protocol (IP) Local Area Network (LAN) is a technique, developed by the U.S. Army Research Laboratory, which allows a LAN to be IP mobile when attaching to a foreign IP-based network and using this network as a means to retain connectivity to its home network. In this paper, we describe a technique that uses Open Secure Shell (OpenSSH) software to ensure secure, encrypted transmission of a mobile LAN's network traffic. Whenever a mobile LAN, implemented with Mobile IP LAN, moves to a foreign network, its gateway (router) obtains an IP address from the new network. IP tunnels, using IP encapsulation, are then established from the gateway through the foreign network to a home agent on its home network. These tunnels provide a virtual two-way connection to the home network for the mobile LAN as if the LAN were connected directly to its home network. Hence, when IP mobile, a mobile LAN's tunneled network traffic must traverse one or more foreign networks that may not be trusted. This traffic could be subject to eavesdropping, interception, modification, or redirection by malicious nodes in these foreign networks. To protect network traffic passing through the tunnels, OpenSSH is used as a means of encryption because it prevents surveillance, modification, and redirection of mobile LAN traffic passing across foreign networks. Since the software is found in the public domain, is available for most current operating systems, and is commonly used to provide secure network communications, OpenSSH is the software of choice.

  9. Network Coding is the 5G Key Enabling Technology

    DEFF Research Database (Denmark)

    Compta, Pol Torres; Fitzek, Frank; Roetter, Daniel Enrique Lucani

    2015-01-01

    The exponential growth of the mobile devices market, not only smartphones, but also tablets, laptops or wearables, poses a serious challenge for 5G communications. Random Linear Network Coding (RLNC) is a promising solution for present and future networks as it has been shown to provide increased...... throughput, security, and robustness for the transmission of data through the network. Most of the analysis and the demonstrators have focused on the study of data packets with the same size (number of bytes). This constitutes a best case scenario as coded packets will incur little overhead to handle...

  10. Estimating network effects in China's mobile telecommunications

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    A model is proposed along with empirical investigation to prove the existence of network effects in China's mobile telecommunications market. Futhernore, network effects on China's mobile telecommunications are estimated with a dynamic model. The structural parameters are identified from regression coefficients and the results are analyzed and compared with another literature. Data and estimation issues are also discussed. Conclusions are drawn that network effects are significant in China's mobile telecommunications market, and that ignoring network effects leads to bad policy making.

  11. Mobile Agents in Networking and Distributed Computing

    CERN Document Server

    Cao, Jiannong

    2012-01-01

    The book focuses on mobile agents, which are computer programs that can autonomously migrate between network sites. This text introduces the concepts and principles of mobile agents, provides an overview of mobile agent technology, and focuses on applications in networking and distributed computing.

  12. Who's calling? Social networks and mobile phone use among motorcyclists.

    Science.gov (United States)

    De Gruyter, Chris; Truong, Long T; Nguyen, Hang T T

    2017-06-01

    Mobile phone use while riding a motorcycle poses a key safety risk, particularly among younger people who have been found to be more susceptible to distracted driving. While previous research has examined the influence of social networks on mobile phone use while driving a car, no research has explored this association in the context of motorcycle use. Using a survey of university students in Vietnam, this research explores the association between social networks and mobile phone use among motorcyclists and the links this has to reported crashes/falls. Results show that the majority of students are most likely to use a mobile phone to communicate with a friend while riding, either through talking (56.5%) or text messaging (62.0%). However, respondents who frequently talk to a girlfriend/boyfriend or spouse while riding were more likely to experience a crash/fall than those who frequently talk with others while riding (e.g. parent, brother/sister). In addition, those who frequently text message a friend while riding were more likely to experience a crash/fall than those who frequently text message others while riding. The results highlight a clear association between social networks and mobile phone use while riding a motorcycle. Developing a culture of societal norms, where mobile phone use while riding a motorcycle is considered socially unacceptable, will help to reduce the prevalence and ultimate crash risk associated with mobile phone use while riding. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  14. Multichannel MAC Layer In Mobile Ad—Hoc Network

    Science.gov (United States)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  15. Towards a Mobile Ecogenomic sensor: the Third Generation Environmental Sample Processor (3G-ESP).

    Science.gov (United States)

    Birch, J. M.; Pargett, D.; Jensen, S.; Roman, B.; Preston, C. M.; Ussler, W.; Yamahara, K.; Marin, R., III; Hobson, B.; Zhang, Y.; Ryan, J. P.; Scholin, C. A.

    2016-02-01

    Researchers are increasingly using one or more autonomous platforms to characterize ocean processes that change in both space and time. Conceptually, studying processes that change quickly both spatially and temporally seems relatively straightforward. One needs to sample in many locations synoptically over time, or follow a coherent water mass and sample it repeatedly. However, implementing either approach presents many challenges. For example, acquiring samples over days to weeks far from shore, without human intervention, requires multiple systems to work together seamlessly, and the level of autonomy, navigation and communications needed to conduct the work exposes the complexity of these requirements. We are addressing these challenges by developing a new generation of robotic systems that are primarily aimed at studies of microbial-mediated processes. As a step towards realizing this new capability, we have taken lessons learned from our second-generation Environmental Sample Processor (2G-ESP), a robotic microbiology "lab-in-a-can" and have re-engineered the system for use on a Tethys-class Long Range AUV (LRAUV). The new instrument is called the third-generation ESP (3G-ESP), and its integration with the LRAUV provides mobility and a persistent presence not seen before in microbial oceanography. The 3G-ESP autonomously filters a water sample and then either preserves that material for eventual return to a laboratory, or processes the sample in real-time for further downstream molecular analytical analyses. The 3G ESP modularizes hardware needed for the collection and preparation of a sample from subsequent molecular analyses by the use of self-contained "cartridges". Cartridges currently come in two forms: one for the preservation of a sample, and the other for onboard homogenization and handoff for downstream processing via one or more analytical devices. The 3G-ESP is designed as a stand-alone instrument, and thus could be deployed on a variety of

  16. On the Need of Network coding for Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Heide, Janus; Pedersen, Morten Videbæk

    for mobile clouds. The paper will list the benefits of network coding for mobile clouds as well as introduce both concepts in a tutorial way. The results used throughout this paper are collaborative work of different research institutes, but mainly taken from the mobile device group at Aalborg University.......This paper advocates the need of network coding for mobile clouds. Mobile clouds as well as network coding are describing two novel concepts. The concept of mobile clouds describes the potential of mobile devices to communicate with each other and form a cooperative cluster in which new services...... and potentials are created. Network coding on the other side enables the mobile cloud to communicate in a very efficient and secure way in terms of energy and bandwidth usage. Even though network coding can be applied in a variety of communication networks, it has some inherent features that makes it suitable...

  17. Data upload capability of 3G mobile phones.

    Science.gov (United States)

    Moon, Jon K; Barden, Charles M; Wohlers, Erica M

    2009-01-01

    Mobile phones are becoming an important platform to measure free-living energy balance and to support weight management therapies. Sensor data, camera images and user input are needed by clinicians and researchers in close to real time. We assessed upload (reverse link) data transport rates for 2007-2008 model mobile phones on two major US wireless systems. Even the slowest phone (EVDO Rev 0) reliably uploaded 40 MB of data in less than 1 h. More than 95% of file uploads were successful in tests that simulated normal phone use over 3 d. Practical bandwidth and data currency from typical smart phones will likely keep pace with the data needs of energy balance studies and weight management therapy.

  18. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  19. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  20. Internet-Based Mobile Ad Hoc Networking (Preprint)

    National Research Council Canada - National Science Library

    Corson, M. S; Macker, Joseph P; Cirincione, Gregory H

    1999-01-01

    Internet-based Mobile Ad Hoc Networking is an emerging technology that supports self-organizing, mobile networking infrastructures, and is one which appears well-suited for use in future commercial...

  1. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  2. Dynamic Video Streaming in Caching-enabled Wireless Mobile Networks

    OpenAIRE

    Liang, C.; Hu, S.

    2017-01-01

    Recent advances in software-defined mobile networks (SDMNs), in-network caching, and mobile edge computing (MEC) can have great effects on video services in next generation mobile networks. In this paper, we jointly consider SDMNs, in-network caching, and MEC to enhance the video service in next generation mobile networks. With the objective of maximizing the mean measurement of video quality, an optimization problem is formulated. Due to the coupling of video data rate, computing resource, a...

  3. Reversing the Energy Trend in Mobile Networks

    DEFF Research Database (Denmark)

    Micallef, Gilbert; Mogensen, Preben; Scheck, Hans-Otto

    2011-01-01

    In order to meet the expected boost in mobile data traffic, mobile network operators are planning and upgrading the capacity of their networks. Through a previous study it has been shown that over a period of eight years, different network upgrade strategies have a different impact on the energy ...

  4. Composing Networks: Writing Practices on Mobile Devices

    Science.gov (United States)

    Swarts, Jason

    2016-01-01

    This article is an investigation of composing practices through which people create networks with mobile phones. By looking through the lens of actor-network theory, the author portrays the networking activity of mobile phone users as translation, what Latour describes as an infralanguage to which different disciplinary perspectives can be…

  5. Mobile cloud networking: mobile network, compute, and storage as one service on-demand

    NARCIS (Netherlands)

    Jamakovic, Almerima; Bohnert, Thomas Michael; Karagiannis, Georgios; Galis, A.; Gavras, A.

    2013-01-01

    The Future Communication Architecture for Mobile Cloud Services: Mobile Cloud Networking (MCN)1 is a EU FP7 Large scale Integrating Project (IP) funded by the European Commission. MCN project was launched in November 2012 for the period of 36 month. In total top-tier 19 partners from industry and

  6. Stem Cell Mobilization with G-CSF versus Cyclophosphamide plus G-CSF in Mexican Children.

    Science.gov (United States)

    Meraz, José Eugenio Vázquez; Arellano-Galindo, José; Avalos, Armando Martínez; Mendoza-García, Emma; Jiménez-Hernández, Elva

    2016-01-01

    Fifty-six aphaereses were performed in 23 pediatric patients with malignant hematological and solid tumors, following three different protocols for PBPC mobilization and distributed as follows: A: seventeen mobilized with 4 g/m(2) of cyclophosphamide (CFA) and 10 μg/kg/day of granulocyte colony stimulating factor (G-CSF), B: nineteen with CFA + G-CSF, and C: twenty only with G-CSF when the WBC count exceeded 10 × 10(9)/L. The average number of MNC/kg body weight (BW)/aphaeresis was 0.4 × 10(8) (0.1-1.4), 2.25 × 10(8) (0.56-6.28), and 1.02 × 10(8) (0.34-2.5) whereas the average number of CD34+ cells/kg BW/aphaeresis was 0.18 × 10(6)/kg (0.09-0.34), 1.04 × 10(6) (0.19-9.3), and 0.59 × 10(6) (0.17-0.87) and the count of CFU/kg BW/aphaeresis was 1.11 × 10(5) (0.31-2.12), 1.16 × 10(5) (0.64-2.97), and 1.12 × 10(5) (0.3-6.63) in groups A, B, and C, respectively. The collection was better in group B versus group A (p = 0.007 and p = 0.05, resp.) and in group C versus group A (p = 0.08 and p = 0.05, resp.). The collection of PBPCs was more effective in the group mobilized with CFM + G-CSF when the WBC exceeded 10 × 10(3)/μL in terms of MNC and CD34+ cells and there was no toxicity of the chemotherapy.

  7. Proof-of-Concept of a Millimeter-Wave Integrated Heterogeneous Network for 5G Cellular.

    Science.gov (United States)

    Okasaka, Shozo; Weiler, Richard J; Keusgen, Wilhelm; Pudeyev, Andrey; Maltsev, Alexander; Karls, Ingolf; Sakaguchi, Kei

    2016-08-25

    The fifth-generation mobile networks (5G) will not only enhance mobile broadband services, but also enable connectivity for a massive number of Internet-of-Things devices, such as wireless sensors, meters or actuators. Thus, 5G is expected to achieve a 1000-fold or more increase in capacity over 4G. The use of the millimeter-wave (mmWave) spectrum is a key enabler to allowing 5G to achieve such enhancement in capacity. To fully utilize the mmWave spectrum, 5G is expected to adopt a heterogeneous network (HetNet) architecture, wherein mmWave small cells are overlaid onto a conventional macro-cellular network. In the mmWave-integrated HetNet, splitting of the control plane (CP) and user plane (UP) will allow continuous connectivity and increase the capacity of the mmWave small cells. mmWave communication can be used not only for access linking, but also for wireless backhaul linking, which will facilitate the installation of mmWave small cells. In this study, a proof-of-concept (PoC) was conducted to demonstrate the practicality of a prototype mmWave-integrated HetNet, using mmWave technologies for both backhaul and access.

  8. Energy efficiency in hybrid mobile and wireless networks

    Energy Technology Data Exchange (ETDEWEB)

    Abbas, Ziaul Haq

    2012-07-01

    Wireless Internet access is almost pervasive nowadays, and many types of wireless networks can be used to access the Internet. However, along with this growth, there is an even greater concern about the energy consumption and efficiency of mobile devices as well as of the supporting networks, triggering the appearance of the concept of green communication. While some efforts have been made towards this direction, challenges still exist and need to be tackled from diverse perspectives. Cellular networks, WLANs, and ad hoc networks in the form of wireless mesh networks are the most popular technologies for wireless Internet access. The availability of such a variety of access networks has also paved the way to explore synergistic approaches for Internet access, leading to the concept of hybrid networks and relay communications. In addition, many mobile devices are being equipped with multiple interfaces, enabling them to operate in hybrid networks. In contrast, the improvements in the battery technology itself have not matched the pace of the emerging mobile applications. The situation becomes more sophisticated when a mobile device functions also as a relay node to forward other station's data. In the literature, energy efficiency of mobile devices has been addressed from various perspectives such as protocol-level efforts, battery management efforts, etc. However, there is little work on energy efficiency in hybrid mobile and wireless networks and devices with heterogeneous connections. For example, when there are multiple networks available to a mobile device, how to achieve optimum long-term energy consumption of such a device is an open question. Furthermore, in today's cellular networks, micro-, pico-, and femto-cells are the most popular network topologies in order to support high data rate services and high user density. With the growth of such small-cell solutions, the energy consumption of these networks is also becoming an important concern for operators

  9. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  10. Nation-Wide Mobile Network Energy Evolution Analysis

    DEFF Research Database (Denmark)

    Perez, Eva; Frank, Philipp; Micallef, Gilbert

    2013-01-01

    Mobile network operators are facing a challenging dilemma. While on the one hand they are committed to reducing their carbon emissions, and energy consumption, they are also required to continuously upgrade existing networks, ensuring that the relentless growth in data traffic can still be suppor......Mobile network operators are facing a challenging dilemma. While on the one hand they are committed to reducing their carbon emissions, and energy consumption, they are also required to continuously upgrade existing networks, ensuring that the relentless growth in data traffic can still...... be supported. In most cases, these upgrades increase the energy consumption of the network even further. This paper presents a nation-wide case study, based on a commercial network of a leading European operator, intended to provide a clear understanding of how the energy consumption of mobile networks...... is expected to evolve from 2012 until 2020. The study also considers an efficient network capacity evolution path, including base station equipment improvement forecasts....

  11. Security of Mobile Devices and Wi-Fi Networks

    OpenAIRE

    Hong, Zimeng

    2015-01-01

    Along with the progress of times and the development of science and technology, mobile devices have become more and more popular. At the same time, an increasing number of Wi-Fi networks are being built for the demand of mobile devices. Therefore, the security between mobile devices and Wi-Fi networks became a main object in the IT area. The purpose of the thesis is to analyze security threats and give relative advises for all the mobile device and Wi-Fi network users. The thesis mainly ta...

  12. Mobile network maintenance (GSM)

    CERN Multimedia

    IT Department

    2009-01-01

    Maintenance work will be carried out on the CERN mobile network infrastructure (GSM) on the 23 and 24 July from 6 p.m. to 6 a.m. in order to replace discontinued equipment and to increase the bandwidth capacity of the GSM mobile network. All CERN GSM emitters (40 units) will be moved one by one to the new infrastructure during the maintenance. The call of a user connected to an emitter at the time of its maintenance will be cut off. However, the general overlapping of the GSM radio coverage should mean that users are able immediately to call again should their call be interrupted. IT/CS/CS

  13. Challenges for coexistence of machine to machine and human to human applications in mobile network

    DEFF Research Database (Denmark)

    Sanyal, R.; Cianca, E.; Prasad, Ramjee

    2012-01-01

    A key factor for the evolution of the mobile networks towards 4G is to bring to fruition high bandwidth per mobile node. Eventually, due to the advent of a new class of applications, namely, Machine-to-Machine, we foresee new challenges where bandwidth per user is no more the primal driver...... be evolved to address various nuances of the mobile devices used by man and machines. The bigger question is as follows. Is the state-of-the-art mobile network designed optimally to cater both the Human-to-Human and Machine-to-Machine applications? This paper presents the primary challenges....... As an immediate impact of the high penetration of M2M devices, we envisage a surge in the signaling messages for mobility and location management. The cell size will shrivel due to high tele-density resulting in even more signaling messages related to handoff and location updates. The mobile network should...

  14. Energy efficient evolution of mobile broadband networks

    Energy Technology Data Exchange (ETDEWEB)

    Micallef, G.

    2013-04-15

    Over the last decade, the mobile communications industry has broken through some remarkable barriers, pushing further and transforming the way people communicate and access information. As the volume of traffic carried by mobile networks maintains an insatiable growth, mobile network operators are required to ensure that networks can scale accordingly. In addition to upgrading existing networks, a number of operators have already started to rollout a further radio access technology layer, Long Term Evolution, or LTE. In addition to enhancing network capacity, operators are also required to adhere to public commitments for reducing their energy and carbon footprint. In 2008 Vodafone stated that by the year 2020, efforts for reducing emissions are expected to halve emissions registered in the year 2006/7. In addition to presenting a more environmentally conscious brand, this is also hoped to reduce costs, which, based on increasing energy prices and necessary network upgrades are likely to increase. Since base station sites make up for about 75% of the power consumption in mobile networks, studies are focused on this specific network element. A number of factors believed to play a role in the power consumption of mobile networks are separately investigated and later combined, providing a realistic indication of how the consumption is expected to evolve. This is also used as an indication to determine how likely it is for operators to achieve power consumption and emission targets. In order for mobile network operators to upgrade existing infrastructure different options are available. Irrespective of the selected option, capacity upgrades are bound to increase the power consumption of the network. Carried through case studies, a first analysis compares a number of network evolution strategies, determining which provides the necessary performance while limiting the increase in power consumption. Overall, it is noted that a hybrid solution involving the upgrade of

  15. Energy efficient evolution of mobile broadband networks

    Energy Technology Data Exchange (ETDEWEB)

    Micallef, G.

    2013-04-15

    Over the last decade, the mobile communications industry has broken through some remarkable barriers, pushing further and transforming the way people communicate and access information. As the volume of traffic carried by mobile networks maintains an insatiable growth, mobile network operators are required to ensure that networks can scale accordingly. In addition to upgrading existing networks, a number of operators have already started to rollout a further radio access technology layer, Long Term Evolution, or LTE. In addition to enhancing network capacity, operators are also required to adhere to public commitments for reducing their energy and carbon footprint. In 2008 Vodafone stated that by the year 2020, efforts for reducing emissions are expected to halve emissions registered in the year 2006/7. In addition to presenting a more environmentally conscious brand, this is also hoped to reduce costs, which, based on increasing energy prices and necessary network upgrades are likely to increase. Since base station sites make up for about 75% of the power consumption in mobile networks, studies are focused on this specific network element. A number of factors believed to play a role in the power consumption of mobile networks are separately investigated and later combined, providing a realistic indication of how the consumption is expected to evolve. This is also used as an indication to determine how likely it is for operators to achieve power consumption and emission targets. In order for mobile network operators to upgrade existing infrastructure different options are available. Irrespective of the selected option, capacity upgrades are bound to increase the power consumption of the network. Carried through case studies, a first analysis compares a number of network evolution strategies, determining which provides the necessary performance while limiting the increase in power consumption. Overall, it is noted that a hybrid solution involving the upgrade of

  16. Evaluation of QoS supported in Network Mobility NEMO environments

    International Nuclear Information System (INIS)

    Hussien, L F; Abdalla, A H; Habaebi, M H; Khalifa, O O; Hassan, W H

    2013-01-01

    Network mobility basic support (NEMO BS) protocol is an entire network, roaming as a unit which changes its point of attachment to the Internet and consequently its reachability in the network topology. NEMO BS doesn't provide QoS guarantees to its users same as traditional Internet IP and Mobile IPv6 as well. Typically, all the users will have same level of services without considering about their application requirements. This poses a problem to real-time applications that required QoS guarantees. To gain more effective control of the network, incorporated QoS is needed. Within QoS-enabled network the traffic flow can be distributed to various priorities. Also, the network bandwidth and resources can be allocated to different applications and users. Internet Engineering Task Force (IETF) working group has proposed several QoS solutions for static network such as IntServ, DiffServ and MPLS. These QoS solutions are designed in the context of a static environment (i.e. fixed hosts and networks). However, they are not fully adapted to mobile environments. They essentially demands to be extended and adjusted to meet up various challenges involved in mobile environments. With existing QoS mechanisms many proposals have been developed to provide QoS for individual mobile nodes (i.e. host mobility). In contrary, research based on the movement of the whole mobile network in IPv6 is still undertaking by the IETF working groups (i.e. network mobility). Few researches have been done in the area of providing QoS for roaming networks. Therefore, this paper aims to review and investigate (previous /and current) related works that have been developed to provide QoS in mobile network. Consequently, a new proposed scheme will be introduced to enhance QoS within NEMO environment, achieving by which seamless mobility to users of mobile network node (MNN)

  17. Looking for Sustainable Urban Mobility through Bayesian Networks

    Directory of Open Access Journals (Sweden)

    Giovanni Fusco

    2004-11-01

    Full Text Available There is no formalised theory of sustainable urban mobility systems. Observed patterns of urban mobility are often considered unsustainable. But we don’t know what a city with sustainable mobility should look like. It is nevertheless increasingly apparent that the urban mobility system plays an important role in the achievement of the city’s wider sustainability objectives.In this paper we explore the characteristics of sustainable urban mobility systems through the technique of Bayesian networks. At the frontier between multivariate statistics and artificial intelligence, Bayesian networks provide powerful models of causal knowledge in an uncertain context. Using data on urban structure, transportation offer, mobility demand, resource consumption and environmental externalities from seventy-five world cities, we developed a systemic model of the city-transportation-environment interaction in the form of a Bayesian network. The network could then be used to infer the features of the city with sustainable mobility.The Bayesian model indicates that the city with sustainable mobility is most probably a dense city with highly efficient transit and multimodal mobility. It produces high levels of accessibility without relying on a fast road network. The achievement of sustainability objectives for urban mobility is probably compatible with all socioeconomic contexts.By measuring the distance of world cities from the inferred sustainability profile, we finally derive a geography of sustainability for mobility systems. The cities closest to the sustainability profile are in Central Europe as well as in affluent countries of the Far East. Car-dependent American cities are the farthest from the desired sustainability profile.

  18. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  19. A performance based evaluation of SIP signalling across converged networks

    NARCIS (Netherlands)

    Oredope, A.; Liotta, A.

    2007-01-01

    As wireless networks evolves towards the 3G and 4G architectures the mobile core networks provides a platform for all-IP convergence of mobile and fixed networks allowing for better integration of the Internet and cellular networks, providing better quality of service, charging mechanisms and

  20. Detection of Traffic Initiated by Mobile Malware Targeting Android Devices in 3GPP Networks

    OpenAIRE

    Kühnel, Marián

    2017-01-01

    Android devices have become the most popular of mobile devices; omnipresent in both business and private use. They are virtually always on and offer functionalities exceeding those of desktop computers. These properties, as well as sensitive information stored on Android devices, render them an attractive target for mobile malware authors. As the volume of mobile malware increases, analysis is becoming challenging and, sometimes, infeasible. Additionally, current network-based intrusion detec...

  1. LinkMind: link optimization in swarming mobile sensor networks.

    Science.gov (United States)

    Ngo, Trung Dung

    2011-01-01

    A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  2. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Trung Dung Ngo

    2011-08-01

    Full Text Available A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  3. Multivariate Multiple Regression Models for a Big Data-Empowered SON Framework in Mobile Wireless Networks

    Directory of Open Access Journals (Sweden)

    Yoonsu Shin

    2016-01-01

    Full Text Available In the 5G era, the operational cost of mobile wireless networks will significantly increase. Further, massive network capacity and zero latency will be needed because everything will be connected to mobile networks. Thus, self-organizing networks (SON are needed, which expedite automatic operation of mobile wireless networks, but have challenges to satisfy the 5G requirements. Therefore, researchers have proposed a framework to empower SON using big data. The recent framework of a big data-empowered SON analyzes the relationship between key performance indicators (KPIs and related network parameters (NPs using machine-learning tools, and it develops regression models using a Gaussian process with those parameters. The problem, however, is that the methods of finding the NPs related to the KPIs differ individually. Moreover, the Gaussian process regression model cannot determine the relationship between a KPI and its various related NPs. In this paper, to solve these problems, we proposed multivariate multiple regression models to determine the relationship between various KPIs and NPs. If we assume one KPI and multiple NPs as one set, the proposed models help us process multiple sets at one time. Also, we can find out whether some KPIs are conflicting or not. We implement the proposed models using MapReduce.

  4. Wireless Cellular Mobile Communications

    Directory of Open Access Journals (Sweden)

    V. Zalud

    2002-12-01

    Full Text Available In this article is briefly reviewed the history of wireless cellularmobile communications, examined the progress in current secondgeneration (2G cellular standards and discussed their migration to thethird generation (3G. The European 2G cellular standard GSM and itsevolution phases GPRS and EDGE are described somewhat in detail. Thethird generation standard UMTS taking up on GSM/GPRS core network andequipped with a new advanced access network on the basis of codedivision multiple access (CDMA is investigated too. A sketch of theperspective of mobile communication beyond 3G concludes this article.

  5. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  6. The promise of downlink MU-MIMO for high-capacity next generation mobile broadband networks based on IEEE 802.16 m

    Directory of Open Access Journals (Sweden)

    Papathanassiou Apostolos

    2011-01-01

    Full Text Available Abstract The dramatic increase of the demand for mobile broadband services poses stringent requirements on the performance evolution of currently deployed mobile broadband networks, such as Mobile WiMAX Release 1 and 3GPP LTE Release 8. Although the combination of single-user multiple-input multiple-output (SU-MIMO and orthogonal frequency division multiple access (OFDMA provide the appropriate technologies for improving the downlink performance of third generation (3G code division multiple access (CDMA-based mobile radio systems and, thus, address the current mobile internet requirements, a fundamental paradigm shift is required to cope with the constantly increasing mobile broadband data rate and spectral efficiency requirements. Among the different technologies available for making the paradigm shift from current to next-generation mobile broadband networks, multiuser MIMO (MU-MIMO constitutes the most promising technology because of its significant performance improvement advantages. In this article, we analyze the performance of MU-MIMO under a multitude of deployment scenarios and system parameters through extensive system-level simulations which are based on widely used system-level evaluation methodologies. The target mobile broadband system used in the simulations is IEEE 802.16 m which was recently adopted by ITU-R as an IMT-Advanced technology along with 3GPP LTE-Advanced. The results provide insights into different aspects of MU-MIMO with respect to system-level performance, parameter sensitivity, and deployment scenarios, and they can be used by the mobile broadband network designer for maximizing the benefits of MU-MIMO in a scenario with specific deployment requirements and goals.

  7. How to Put Marketing Strategies of 3G Mobile Phones into Practice?%如何让移动3G手机营销落地

    Institute of Scientific and Technical Information of China (English)

    王勇

    2012-01-01

    Such is common knowledge that 3G mobile phones have not only opened up a completely new era,but also turned a page for mobile phone markets.However,there are still some problems in the marketing strategies in 3G mobile phone markets.Having done a lot of field investigations as well as field visits,the author summarizes the major racking problems and encloses the paper with several corresponding treatments.%3G手机开辟了手机新时代,她传递者一种新的生活标准,创造一种新的生活品质,提升了人们的生活品位,所以,移动3G手机开启了手机营销的新篇章。不过,移动3G手机在营销策略的实施方面还存在一些问题,文章依据实际的调研,分析了具体存在的问题,基于此,提出了相应的对策。

  8. Unjuk Kerja Jaringan Seluler 2G dan 3G PT. XL Axiata di Area Jawa Tengah Bagian Utara setelah Proyek Swap dan Modernisasi

    Directory of Open Access Journals (Sweden)

    Eva Yovita Dwi Utami

    2015-04-01

    Full Text Available The increasing number of customers and the need for reliable communication require the availability of coverage, sufficient capacity and good quality of mobile communications networks. New BTS implementation is required to cover a wider area with good network quality. However, it often requires high cost and long time to get permission from the government and local residents. Swap and Modernization Project is a project that swap the previous 3G equipment using BTS 3900 Huawei with Ericsson RBS 6000 and modernize the 2G RBS 2000 to RBS 6000 and then carry out parameter settings to optimize the network. In this paper, we report the results of mobile network performance after Swap and Modernization projects had been done in terms of the signal strength improvements, which are showed by Rx Level, RSCP and CDD Dump parameters. The study was conducted in PT XL Axiata Northern Areas of Central Java with D5 cluster as a sample. The results show improvement of Rx Level that increased by 89.93 %, and RSCP value increased by 58.36 %. The swap and modernization of the BTS and parameter settings are able to improve CDD Dump parameters. These improvements are able to expand the coverage area of cluster D5 sites.

  9. 3G Standards

    DEFF Research Database (Denmark)

    Saugstrup, Dan; Henten, Anders

    2006-01-01

    Purpose – The main purpose of this paper is to analyze which standard/technology will win the 3G mobile markets. In addition, two sub topics are examined. First, which kind of victory will it be – will one technological solution be all-dominating or is co-existence more likely? Second, which....... Originality/value – The paper is based on the understanding that a vast array of different factors in a complex dynamic environment goes into the determination of the outcome of such standardization games. However, the battle between 3G standards has already reached a level, where relatively certain...... predictions can be made. And, the paper contributes with a methodologically based discussion concerning the outcome of the battle between 3G standards....

  10. Capacity of Heterogeneous Mobile Wireless Networks with D-Delay Transmission Strategy.

    Science.gov (United States)

    Wu, Feng; Zhu, Jiang; Xi, Zhipeng; Gao, Kai

    2016-03-25

    This paper investigates the capacity problem of heterogeneous wireless networks in mobility scenarios. A heterogeneous network model which consists of n normal nodes and m helping nodes is proposed. Moreover, we propose a D-delay transmission strategy to ensure that every packet can be delivered to its destination nodes with limited delay. Different from most existing network schemes, our network model has a novel two-tier architecture. The existence of helping nodes greatly improves the network capacity. Four types of mobile networks are studied in this paper: i.i.d. fast mobility model and slow mobility model in two-dimensional space, i.i.d. fast mobility model and slow mobility model in three-dimensional space. Using the virtual channel model, we present an intuitive analysis of the capacity of two-dimensional mobile networks and three-dimensional mobile networks, respectively. Given a delay constraint D, we derive the asymptotic expressions for the capacity of the four types of mobile networks. Furthermore, the impact of D and m to the capacity of the whole network is analyzed. Our findings provide great guidance for the future design of the next generation of networks.

  11. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things.

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-09-18

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified.

  12. Effects of 2G and 3G mobile phones on human alpha rhythms: Resting EEG in adolescents, young adults, and the elderly.

    Science.gov (United States)

    Croft, R J; Leung, S; McKenzie, R J; Loughran, S P; Iskra, S; Hamblin, D L; Cooper, N R

    2010-09-01

    The present study was conducted to determine whether adolescents and/or the elderly are more sensitive to mobile phone (MP)-related bioeffects than young adults, and to determine this for both 2nd generation (2G) GSM, and 3rd generation (3G) W-CDMA exposures. To test this, resting alpha activity (8-12 Hz band of the electroencephalogram) was assessed because numerous studies have now reported it to be enhanced by MP exposure. Forty-one 13-15 year olds, forty-two 19-40 year olds, and twenty 55-70 year olds were tested using a double-blind crossover design, where each participant received Sham, 2G and 3G exposures, separated by at least 4 days. Alpha activity, during exposure relative to baseline, was recorded and compared between conditions. Consistent with previous research, the young adults' alpha was greater in the 2G compared to Sham condition, however, no effect was seen in the adolescent or the elderly groups, and no effect of 3G exposures was found in any group. The results provide further support for an effect of 2G exposures on resting alpha activity in young adults, but fail to support a similar enhancement in adolescents or the elderly, or in any age group as a function of 3G exposure. 2010 Wiley-Liss, Inc.

  13. Portable emergency telemedicine system over wireless broadband and 3G networks.

    Science.gov (United States)

    Hong, SungHye; Kim, SangYong; Kim, JungChae; Lim, DongKyu; Jung, SeokMyung; Kim, DongKeun; Yoo, Sun K

    2009-01-01

    The telemedicine system aims at monitoring patients remotely without limit in time and space. However the existing telemedicine systems exchange medical information simply in a specified location. Due to increasing speed in processing data and expanding bandwidth of wireless networks, it is possible to perform telemedicine services on personal digital assistants (PDA). In this paper, a telemedicine system on PDA was developed using wideband mobile networks such as Wi-Fi, HSDPA, and WiBro for high speed bandwidths. This system enables to utilize and exchange variety and reliable patient information of video, biosignals, chatting messages, and triage data. By measuring bandwidths of individual data of the system over wireless networks, and evaluating the performance of this system using PDA, we demonstrated the feasibility of the designed portable emergency telemedicine system.

  14. Evidence That Calls-Based and Mobility Networks Are Isomorphic.

    Directory of Open Access Journals (Sweden)

    Michele Coscia

    Full Text Available Social relations involve both face-to-face interaction as well as telecommunications. We can observe the geography of phone calls and of the mobility of cell phones in space. These two phenomena can be described as networks of connections between different points in space. We use a dataset that includes billions of phone calls made in Colombia during a six-month period. We draw the two networks and find that the call-based network resembles a higher order aggregation of the mobility network and that both are isomorphic except for a higher spatial decay coefficient of the mobility network relative to the call-based network: when we discount distance effects on the call connections with the same decay observed for mobility connections, the two networks are virtually indistinguishable.

  15. Agile Management and Interoperability Testing of SDN/NFV‐Enriched 5G Core Networks

    Directory of Open Access Journals (Sweden)

    Taesang Choi

    2018-02-01

    Full Text Available In the fifth generation (5G era, the radio internet protocol capacity is expected to reach 20 Gb/s per sector, and ultralarge content traffic will travel across a faster wireless/wireline access network and packet core network. Moreover, the massive and mission‐critical Internet of Things is the main differentiator of 5G services. These types of real‐time and large‐bandwidth‐consuming services require a radio latency of less than 1 ms and an end‐to‐end latency of less than a few milliseconds. By distributing 5G core nodes closer to cell sites, the backhaul traffic volume and latency can be significantly reduced by having mobile devices download content immediately from a closer content server. In this paper, we propose a novel solution based on software‐defined network and network function virtualization technologies in order to achieve agile management of 5G core network functionalities with a proof‐of‐concept implementation targeted for the PyeongChang Winter Olympics and describe the results of interoperability testing experiences between two core networks.

  16. Stem Cell Mobilization with G-CSF versus Cyclophosphamide plus G-CSF in Mexican Children

    Directory of Open Access Journals (Sweden)

    José Eugenio Vázquez Meraz

    2016-01-01

    Full Text Available Fifty-six aphaereses were performed in 23 pediatric patients with malignant hematological and solid tumors, following three different protocols for PBPC mobilization and distributed as follows: A: seventeen mobilized with 4 g/m2 of cyclophosphamide (CFA and 10 μg/kg/day of granulocyte colony stimulating factor (G-CSF, B: nineteen with CFA + G-CSF, and C: twenty only with G-CSF when the WBC count exceeded 10 × 109/L. The average number of MNC/kg body weight (BW/aphaeresis was 0.4 × 108 (0.1–1.4, 2.25 × 108 (0.56–6.28, and 1.02 × 108 (0.34–2.5 whereas the average number of CD34+ cells/kg BW/aphaeresis was 0.18 × 106/kg (0.09–0.34, 1.04 × 106 (0.19–9.3, and 0.59 × 106 (0.17–0.87 and the count of CFU/kg BW/aphaeresis was 1.11 × 105 (0.31–2.12, 1.16 × 105 (0.64–2.97, and 1.12 × 105 (0.3–6.63 in groups A, B, and C, respectively. The collection was better in group B versus group A (p=0.007 and p=0.05, resp. and in group C versus group A (p=0.08 and p=0.05, resp.. The collection of PBPCs was more effective in the group mobilized with CFM + G-CSF when the WBC exceeded 10 × 103/μL in terms of MNC and CD34+ cells and there was no toxicity of the chemotherapy.

  17. Efficient Smart Antenna Systems (4G) For CDMA Wireless Communication

    OpenAIRE

    Singla, Brahm Mohinder; Kumar, Ashish

    2012-01-01

    Today, mobile communications play a central role in the voice/data network arena. With the deployment of mass scale 3G just around the corner, new directions are already being researched. In this paper we address about the 4TH G mobile communications.The Fourth Generation (4G) Mobile Communications should not focus only on the data-rate increase and new air interface.4G Mobile should instead con-verge the advanced wireless mobile communications and high-speed wireless access systems into an O...

  18. Robust and Cost-Efficient Communication Based on SNMP in Mobile Networks

    Science.gov (United States)

    Ryu, Sang-Hoon; Baik, Doo-Kwon

    A main challenge in the design of this mobile network is the development of dynamic routing protocols that can efficiently find routes between two communicating nodes. Multimedia streaming services are receiving considerable interest in the mobile network business. An entire mobile network may change its point of attachment to the Internet. The mobile network is operated by a basic specification to support network mobility called Network Mobility (NEMO) Basic Support. However, NEMO basic Support mechanism has some problem in continuous communication. In this paper, we propose robust and cost-efficient algorithm. And we simulate proposed method and conclude some remarks.

  19. Proof-of-Concept of a Millimeter-Wave Integrated Heterogeneous Network for 5G Cellular

    Directory of Open Access Journals (Sweden)

    Shozo Okasaka

    2016-08-01

    Full Text Available The fifth-generation mobile networks (5G will not only enhance mobile broadband services, but also enable connectivity for a massive number of Internet-of-Things devices, such as wireless sensors, meters or actuators. Thus, 5G is expected to achieve a 1000-fold or more increase in capacity over 4G. The use of the millimeter-wave (mmWave spectrum is a key enabler to allowing 5G to achieve such enhancement in capacity. To fully utilize the mmWave spectrum, 5G is expected to adopt a heterogeneous network (HetNet architecture, wherein mmWave small cells are overlaid onto a conventional macro-cellular network. In the mmWave-integrated HetNet, splitting of the control plane (CP and user plane (UP will allow continuous connectivity and increase the capacity of the mmWave small cells. mmWave communication can be used not only for access linking, but also for wireless backhaul linking, which will facilitate the installation of mmWave small cells. In this study, a proof-of-concept (PoC was conducted to demonstrate the practicality of a prototype mmWave-integrated HetNet, using mmWave technologies for both backhaul and access.

  20. Virtual Stationary Automata for Mobile Networks

    National Research Council Canada - National Science Library

    Dolev, Shlomi; Gilbert, Seth; Lahiani, Limor; Lynch, Nancy; Nolte, Tina

    2005-01-01

    We define a programming abstraction for mobile networks called the Virtual Stationary Automata programming layer, consisting of real mobile clients, virtual timed I/O automata called virtual stationary automata (VSAs...

  1. Network Coding Applications and Implementations on Mobile Devices

    DEFF Research Database (Denmark)

    Fitzek, Frank; Pedersen, Morten Videbæk; Heide, Janus

    2010-01-01

    Network coding has attracted a lot of attention lately. The goal of this paper is to demonstrate that the implementation of network coding is feasible on mobile platforms. The paper will guide the reader through some examples and demonstrate uses for network coding. Furthermore the paper will also...... show that the implementation of network coding is feasible today on commercial mobile platforms....

  2. Fuzzy Systems: An Approach to 5G Networks Under the SDN Paradigm/ Sistemas Difusos: Una Aproximación a las redes 5G bajo el Paradigma SDN

    Directory of Open Access Journals (Sweden)

    Luis Felipe Albarracin Sanchez

    2018-01-01

    Full Text Available The exploitation that has had the fuzzy systems related to advances of 5G networks (Fifth Generation Mobile Networks and how this development has been framed by the paradigm of SDN (Software Defined Networks architectures are reviewed in this article. The first part will review terms required for understanding the technologies and their evolution; on which different scenarios are evaluated because they have contributed to the development of the definition of 5G networks. Following, the research and development of the fuzzy systems applied to telecommunications, specifically 5G technology and SDN architectures will be described. Finally, the respective conclusions of the fuzzy systems in the 5G networks and SDN architectures will be exposed.

  3. Lifelink: 3G-based mobile telemedicine system.

    Science.gov (United States)

    Alis, Christian; del Rosario, Carlos; Buenaobra, Bernardino; Mar Blanca, Carlo

    2009-04-01

    Current wired telemedicine systems encounter difficulties when implemented in archipelagic developing countries because of the high cost of fixed infrastructure. In this research, we devised Lifelink, a mobile real-time telemonitoring and diagnostic facility to command and control remote medical devices through mobile phones. The whole process is phone-based, effectively freeing offsite medical specialists from stationary monitoring consoles and endowing the system with the potential to increase the number participating consultants. The electrocardiogram (ECG) readings are analyzed using a detrended fluctuation technique and classified into pathological cases using an unassisted K-means clustering algorithm. We analyzed 30 batches of 2-hour ECG signals taken from cardiac patients (20 males, 10 females, mean age 46.7 years) with pre-diagnosed pathologies. The method successfully categorized the 30 subjects without user intervention into the following cases: normal (at 86.7% accuracy), congestive heart failure (86.7%), and atrial fibrillation (80.0%). The synergy of mobile monitoring and fluctuation analysis presents a powerful platform to reach remote, underserved communities with poor or nonexistent wired communication structures. It is likely to be essential in the development of new mobile diagnostic and prognostic measures.

  4. An Approach to Data Analysis in 5G Networks

    Directory of Open Access Journals (Sweden)

    Lorena Isabel Barona López

    2017-02-01

    Full Text Available 5G networks expect to provide significant advances in network management compared to traditional mobile infrastructures by leveraging intelligence capabilities such as data analysis, prediction, pattern recognition and artificial intelligence. The key idea behind these actions is to facilitate the decision-making process in order to solve or mitigate common network problems in a dynamic and proactive way. In this context, this paper presents the design of Self-Organized Network Management in Virtualized and Software Defined Networks (SELFNET Analyzer Module, which main objective is to identify suspicious or unexpected situations based on metrics provided by different network components and sensors. The SELFNET Analyzer Module provides a modular architecture driven by use cases where analytic functions can be easily extended. This paper also proposes the data specification to define the data inputs to be taking into account in diagnosis process. This data specification has been implemented with different use cases within SELFNET Project, proving its effectiveness.

  5. A Structural Equation Modeling for the Mobile Network Behavior%移动网络行为的结构方程模型

    Institute of Scientific and Technical Information of China (English)

    郭俊辉; 胡华敏; 蔡文聪

    2011-01-01

    The popularity of mobile phones and other mobile media, introduction of 3G wireless, increased consumer usage rate for mobile network , rising mobile family what they are instant joyful, instant communication and instant consumption. This article focuses on Relations between values and mobile networks attitude, mobile networks applications of mobile groups.Through investigation and analysis to college students ,confirmed that the values-the mobile networks attitude-the mobile web applications have intrinsic relationship and have correlation mechanism, which can provide strategic guidance for consumer analysis, advertising and brand positioning in mobile marketing.%手机等移动媒体的普及和无线3G的导入,提高了人们对于移动网络的利用率,兴起了"即时沟通"、"即时消费"和"即时兴乐"的移动一族.本文聚焦于移动群体的价值观与移动网络态度、移动网络应用之间的关联性.通过对于在校大学生的调查分析,确认了"价值观-移动网络态度-移动网络应用"之间的内在关联性以及关联机制,这能够为移动营销的消费者分析、广告投放和品牌定位提供战略导向.

  6. Modeling and analysis of mobility management in mobile communication networks.

    Science.gov (United States)

    Baek, Woon Min; Yoon, Ji Hyun; Kim, Chesoong

    2014-01-01

    Many strategies have been proposed to reduce the mobility management cost in mobile communication networks. This paper studies the zone-based registration methods that have been adopted by most mobile communication networks. We focus on two special zone-based registration methods, called two-zone registration (2Z) and two-zone registration with implicit registration by outgoing calls (2Zi). We provide a new mathematical model to analyze the exact performance of 2Z and 2Zi. We also present various numerical results, to compare the performance of 2Zi with those of 2Z and one-zone registration (1Z), and show that 2Zi is superior to 2Z as well as 1Z in most cases.

  7. A medical application integrating remote 3D visualization tools to access picture archiving and communication system on mobile devices.

    Science.gov (United States)

    He, Longjun; Ming, Xing; Liu, Qian

    2014-04-01

    With computing capability and display size growing, the mobile device has been used as a tool to help clinicians view patient information and medical images anywhere and anytime. However, for direct interactive 3D visualization, which plays an important role in radiological diagnosis, the mobile device cannot provide a satisfactory quality of experience for radiologists. This paper developed a medical system that can get medical images from the picture archiving and communication system on the mobile device over the wireless network. In the proposed application, the mobile device got patient information and medical images through a proxy server connecting to the PACS server. Meanwhile, the proxy server integrated a range of 3D visualization techniques, including maximum intensity projection, multi-planar reconstruction and direct volume rendering, to providing shape, brightness, depth and location information generated from the original sectional images for radiologists. Furthermore, an algorithm that changes remote render parameters automatically to adapt to the network status was employed to improve the quality of experience. Finally, performance issues regarding the remote 3D visualization of the medical images over the wireless network of the proposed application were also discussed. The results demonstrated that this proposed medical application could provide a smooth interactive experience in the WLAN and 3G networks.

  8. Mobilization and Adaptation of a Rural Cradle-to-Career Network

    Directory of Open Access Journals (Sweden)

    Sarah J. Zuckerman

    2016-10-01

    Full Text Available This case study explored the development of a rural cradle-to-career network with a dual focus on the initial mobilization of network members and subsequent adaptations made to maintain mobilization, while meeting local needs. Data sources included interviews with network members, observations of meetings, and documentary evidence. Network-based social capital facilitated mobilization. Where networks were absent and where distrust and different values were evident, mobilization faltered. Three network adaptations were discovered: Special rural community organizing strategies, district-level action planning, and a theory of action focused on out-of-school factors. All three were attributable to the composition of mobilized stakeholders and this network’s rural social geography. These findings illuminate the importance of social geography in the development and advancement of rural cradle-to-career networks.

  9. Mobile location services over the next generation IP core network

    DEFF Research Database (Denmark)

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    network is changing from circuit-switched to packet-switched technology and evolving to an IP core network based on IPv6. The IP core network will allow all IP devices to be connected seamlessly. Due to the movement detection mechanism of Mobile IPv6, mobile terminals will periodically update....... The concept of mobile location services over the next generation IP networks is described. We also discuss the effectiveness of the short-range wireless network regarding a mobile user's position inside buildings and hotspot areas....

  10. Millimetre-Wave Backhaul for 5G Networks: Challenges and Solutions

    Directory of Open Access Journals (Sweden)

    Wei Feng

    2016-06-01

    Full Text Available The trend for dense deployment in future 5G mobile communication networks makes current wired backhaul infeasible owing to the high cost. Millimetre-wave (mm-wave communication, a promising technique with the capability of providing a multi-gigabit transmission rate, offers a flexible and cost-effective candidate for 5G backhauling. By exploiting highly directional antennas, it becomes practical to cope with explosive traffic demands and to deal with interference problems. Several advancements in physical layer technology, such as hybrid beamforming and full duplexing, bring new challenges and opportunities for mm-wave backhaul. This article introduces a design framework for 5G mm-wave backhaul, including routing, spatial reuse scheduling and physical layer techniques. The associated optimization model, open problems and potential solutions are discussed to fully exploit the throughput gain of the backhaul network. Extensive simulations are conducted to verify the potential benefits of the proposed method for the 5G mm-wave backhaul design.

  11. Autonomous distributed self-organization for mobile wireless sensor networks.

    Science.gov (United States)

    Wen, Chih-Yu; Tang, Hung-Kai

    2009-01-01

    This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.

  12. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  13. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network

    OpenAIRE

    Bush, Stephen F.

    1999-01-01

    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dyna...

  14. A Mobile Sensor Network System for Monitoring of Unfriendly Environments.

    Science.gov (United States)

    Song, Guangming; Zhou, Yaoxin; Ding, Fei; Song, Aiguo

    2008-11-14

    Observing microclimate changes is one of the most popular applications of wireless sensor networks. However, some target environments are often too dangerous or inaccessible to humans or large robots and there are many challenges for deploying and maintaining wireless sensor networks in those unfriendly environments. This paper presents a mobile sensor network system for solving this problem. The system architecture, the mobile node design, the basic behaviors and advanced network capabilities have been investigated respectively. A wheel-based robotic node architecture is proposed here that can add controlled mobility to wireless sensor networks. A testbed including some prototype nodes has also been created for validating the basic functions of the proposed mobile sensor network system. Motion performance tests have been done to get the positioning errors and power consumption model of the mobile nodes. Results of the autonomous deployment experiment show that the mobile nodes can be distributed evenly into the previously unknown environments. It provides powerful support for network deployment and maintenance and can ensure that the sensor network will work properly in unfriendly environments.

  15. AN OVERVIEW OF UMTS AND WIMAX NETWORKS INTEGRATION

    Directory of Open Access Journals (Sweden)

    Dewi Wirastuti

    2010-12-01

    Full Text Available This paper gives an overview of the network integration of UMTS (Universal Mobile TelecommunicationSystem with WiMAX (Wordwide Interoperability of Microwave Access. A few proposed interworking solutionsand seamless integration of both networks are explained. The best architecture and key procedures that will enablethe integration both networks and handover mechanism for the seamless mobility are presented. Considering thetrend of the current network evolution, which is the convergence between the telecommunications and broadcastworlds, an integration of mobile WiMAX with present 2G, 2.5G or 3G accesses into a homogeneous architecturegoes a long way to achieve the reality of mobile broadband networks. With the advent of mobile WiMAX, a mobilebroadband wireless access solution and based on all-IP (Internet Protocol based OFDMA (Orthogonal FrequencyDivision Multiple Access technology, an UMTS-WiMAX

  16. Mobile Phone Assessment in Egocentric Networks: A Pilot Study on Gay Men and Their Peers.

    Science.gov (United States)

    Comulada, W Scott

    2014-12-01

    Mobile phone-based data collection encompasses the richness of social network research. Both individual-level and network-level measures can be recorded. For example, health-related behaviors can be reported via mobile assessment. Social interactions can be assessed by phone-log data. Yet the potential of mobile phone data collection has largely been untapped. This is especially true of egocentric studies in public health settings where mobile phones can enhance both data collection and intervention delivery, e.g. mobile users can video chat with counselors. This is due in part to privacy issues and other barriers that are more difficult to address outside of academic settings where most mobile research to date has taken place. In this article, we aim to inform a broader discussion on mobile research. In particular, benefits and challenges to mobile phone-based data collection are highlighted through our mobile phone-based pilot study that was conducted on egocentric networks of 12 gay men (n = 44 total participants). HIV-transmission and general health behaviors were reported through a mobile phone-based daily assessment that was administered through study participants' own mobile phones. Phone log information was collected from gay men with Android phones. Benefits and challenges to mobile implementation are discussed, along with the application of multi-level models to the type of longitudinal egocentric data that we collected.

  17. Mobile Phone Assessment in Egocentric Networks: A Pilot Study on Gay Men and Their Peers

    Science.gov (United States)

    Comulada, W. Scott

    2015-01-01

    Mobile phone-based data collection encompasses the richness of social network research. Both individual-level and network-level measures can be recorded. For example, health-related behaviors can be reported via mobile assessment. Social interactions can be assessed by phone-log data. Yet the potential of mobile phone data collection has largely been untapped. This is especially true of egocentric studies in public health settings where mobile phones can enhance both data collection and intervention delivery, e.g. mobile users can video chat with counselors. This is due in part to privacy issues and other barriers that are more difficult to address outside of academic settings where most mobile research to date has taken place. In this article, we aim to inform a broader discussion on mobile research. In particular, benefits and challenges to mobile phone-based data collection are highlighted through our mobile phone-based pilot study that was conducted on egocentric networks of 12 gay men (n = 44 total participants). HIV-transmission and general health behaviors were reported through a mobile phone-based daily assessment that was administered through study participants’ own mobile phones. Phone log information was collected from gay men with Android phones. Benefits and challenges to mobile implementation are discussed, along with the application of multi-level models to the type of longitudinal egocentric data that we collected. PMID:25844003

  18. Topology of the Erasmus student mobility network

    Science.gov (United States)

    Derzsi, A.; Derzsy, N.; Káptalan, E.; Néda, Z.

    2011-07-01

    The collaboration network generated by the Erasmus student mobilities in the year 2003 is analyzed and modeled. Nodes of this bipartite network are European universities and links are the Erasmus mobilities between these universities. This network is a complex directed and weighted graph. The non-directed and non-weighted projection of this network does not exhibit a scale-free nature, but proves to be a small-word type random network with a giant component. The connectivity data indicates an exponential degree distribution, a relatively high clustering coefficient and a small radius. It can be easily modeled by using a simple configuration model and arguing the exponential degree distribution. The weighted and directed version of the network can also be described by means of simple random network models.

  19. Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Yilei Wang

    2015-01-01

    Full Text Available With the rapid development of mobile devices and wireless technologies, mobile social networks become increasingly available. People can implement many applications on the basis of mobile social networks. Secure computation, like exchanging information and file sharing, is one of such applications. Fairness in secure computation, which means that either all parties implement the application or none of them does, is deemed as an impossible task in traditional secure computation without mobile social networks. Here we regard the applications in mobile social networks as specific functions and stress on the achievement of fairness on these functions within mobile social networks in the presence of two rational parties. Rational parties value their utilities when they participate in secure computation protocol in mobile social networks. Therefore, we introduce reputation derived from mobile social networks into the utility definition such that rational parties have incentives to implement the applications for a higher utility. To the best of our knowledge, the protocol is the first fair secure computation in mobile social networks. Furthermore, it finishes within constant rounds and allows both parties to know the terminal round.

  20. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  1. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  2. An energy efficient multiple mobile sinks based routing algorithm for wireless sensor networks

    Science.gov (United States)

    Zhong, Peijun; Ruan, Feng

    2018-03-01

    With the fast development of wireless sensor networks (WSNs), more and more energy efficient routing algorithms have been proposed. However, one of the research challenges is how to alleviate the hot spot problem since nodes close to static sink (or base station) tend to die earlier than other sensors. The introduction of mobile sink node can effectively alleviate this problem since sink node can move along certain trajectories, causing hot spot nodes more evenly distributed. In this paper, we mainly study the energy efficient routing method with multiple mobile sinks support. We divide the whole network into several clusters and study the influence of mobile sink number on network lifetime. Simulation results show that the best network performance appears when mobile sink number is about 3 under our simulation environment.

  3. Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.

    Science.gov (United States)

    Pierre, Samuel

    2001-01-01

    Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…

  4. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  5. Mobile Health Care over 3G Networks: the MobiHealth Pilot System and Service

    NARCIS (Netherlands)

    Wac, K.E.; Bults, Richard G.A.; Konstantas, D.; van Halteren, Aart; Jones, Valerie M.; Widya, I.A.; Herzog, Rainer

    2004-01-01

    Health care is one of the most prominent areas for the application of wireless technologies. New services and applications are today under research and development targeting different areas of health care, from high risk and chronic patients’ remote monitoring to mobility tools for the medical

  6. Autonomous Distributed Self-Organization for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chih-Yu Wen

    2009-11-01

    Full Text Available This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently. A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.

  7. Dynamic Task Allocation in Multi-Hop Multimedia Wireless Sensor Networks with Low Mobility

    Directory of Open Access Journals (Sweden)

    Klaus Moessner

    2013-10-01

    Full Text Available This paper presents a task allocation-oriented framework to enable efficient in-network processing and cost-effective multi-hop resource sharing for dynamic multi-hop multimedia wireless sensor networks with low node mobility, e.g., pedestrian speeds. The proposed system incorporates a fast task reallocation algorithm to quickly recover from possible network service disruptions, such as node or link failures. An evolutional self-learning mechanism based on a genetic algorithm continuously adapts the system parameters in order to meet the desired application delay requirements, while also achieving a sufficiently long network lifetime. Since the algorithm runtime incurs considerable time delay while updating task assignments, we introduce an adaptive window size to limit the delay periods and ensure an up-to-date solution based on node mobility patterns and device processing capabilities. To the best of our knowledge, this is the first study that yields multi-objective task allocation in a mobile multi-hop wireless environment under dynamic conditions. Simulations are performed in various settings, and the results show considerable performance improvement in extending network lifetime compared to heuristic mechanisms. Furthermore, the proposed framework provides noticeable reduction in the frequency of missing application deadlines.

  8. Software defined networking to improve mobility management performance

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Sperotto, Anna; Pras, Aiko; Sperotto, Anna; Doyen, Guillaume; Latré, Steven; Charalambides, Marinos; Stiller, Burkhard

    2014-01-01

    n mobile networks, efficient IP mobility management is a crucial issue for the mobile users changing their mobility anchor points during handover. In this regard several mobility management methods have been proposed. However, those are insufficient for the future mobile Internet in terms of

  9. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-01-01

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified. PMID:26393617

  10. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Directory of Open Access Journals (Sweden)

    Lusheng Wang

    2015-09-01

    Full Text Available With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI. In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG, forming a congestion game with ICI (CGI and a congestion game with capacity (CGC. For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE. Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell is profoundly revealed, and the collapse points are identified.

  11. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    DEFF Research Database (Denmark)

    Ngo, Trung Dung

    2012-01-01

    of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link...... optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm...

  12. Design of Hybrid Mobile Communication Networks for Planetary Exploration

    Science.gov (United States)

    Alena, Richard L.; Ossenfort, John; Lee, Charles; Walker, Edward; Stone, Thom

    2004-01-01

    The Mobile Exploration System Project (MEX) at NASA Ames Research Center has been conducting studies into hybrid communication networks for future planetary missions. These networks consist of space-based communication assets connected to ground-based Internets and planetary surface-based mobile wireless networks. These hybrid mobile networks have been deployed in rugged field locations in the American desert and the Canadian arctic for support of science and simulation activities on at least six occasions. This work has been conducted over the past five years resulting in evolving architectural complexity, improved component characteristics and better analysis and test methods. A rich set of data and techniques have resulted from the development and field testing of the communication network during field expeditions such as the Haughton Mars Project and NASA Mobile Agents Project.

  13. Evaluation of constrained mobility for programmability in network management

    NARCIS (Netherlands)

    Bohoris, C.; Liotta, A.; Pavlou, G.; Ambler, A.P.; Calo, S.B.; Kar, G.

    2000-01-01

    In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobility and argue that constrained mobility offers a natural and easy approach to network management programmability. While

  14. Efficient Data Gathering in 3D Linear Underwater Wireless Sensor Networks Using Sink Mobility.

    Science.gov (United States)

    Akbar, Mariam; Javaid, Nadeem; Khan, Ayesha Hussain; Imran, Muhammad; Shoaib, Muhammad; Vasilakos, Athanasios

    2016-03-19

    Due to the unpleasant and unpredictable underwater environment, designing an energy-efficient routing protocol for underwater wireless sensor networks (UWSNs) demands more accuracy and extra computations. In the proposed scheme, we introduce a mobile sink (MS), i.e., an autonomous underwater vehicle (AUV), and also courier nodes (CNs), to minimize the energy consumption of nodes. MS and CNs stop at specific stops for data gathering; later on, CNs forward the received data to the MS for further transmission. By the mobility of CNs and MS, the overall energy consumption of nodes is minimized. We perform simulations to investigate the performance of the proposed scheme and compare it to preexisting techniques. Simulation results are compared in terms of network lifetime, throughput, path loss, transmission loss and packet drop ratio. The results show that the proposed technique performs better in terms of network lifetime, throughput, path loss and scalability.

  15. Efficient Data Gathering in 3D Linear Underwater Wireless Sensor Networks Using Sink Mobility

    Directory of Open Access Journals (Sweden)

    Mariam Akbar

    2016-03-01

    Full Text Available Due to the unpleasant and unpredictable underwater environment, designing an energy-efficient routing protocol for underwater wireless sensor networks (UWSNs demands more accuracy and extra computations. In the proposed scheme, we introduce a mobile sink (MS, i.e., an autonomous underwater vehicle (AUV, and also courier nodes (CNs, to minimize the energy consumption of nodes. MS and CNs stop at specific stops for data gathering; later on, CNs forward the received data to the MS for further transmission. By the mobility of CNs and MS, the overall energy consumption of nodes is minimized. We perform simulations to investigate the performance of the proposed scheme and compare it to preexisting techniques. Simulation results are compared in terms of network lifetime, throughput, path loss, transmission loss and packet drop ratio. The results show that the proposed technique performs better in terms of network lifetime, throughput, path loss and scalability.

  16. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  17. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  18. Traffic Steering Framework for Mobile-Assisted Resource Management in Heterogeneous Networks

    DEFF Research Database (Denmark)

    Dogadaev, Anton Konstantinovich; Checko, Aleksandra; Popovska Avramova, Andrijana

    2013-01-01

    With the expected growth of mobile data traffic it is essential to manage the network resources efficiently. In order to undertake this challenge, we propose a framework for network-centric, mobile-assisted resource management, which facilitates traffic offloading from mobile network to Wi-Fi...... to the network backbone. What is more, we give an overview of existing standardization activities on offloading the mobile traffic through Wi-Fi....

  19. Service Level Agreement for the QoS Guaranteed Mobile IPTV Services over Mobile WiMAX Networks

    OpenAIRE

    Chowdhury, Mostafa Zaman; Trung, Bui Minh; Jang, Yeong Min; Kim, Young-Il; Ryu, Won

    2011-01-01

    While mobile IPTV services are supported through the mobile WiMAX networks, there must need some guaranteed bandwidth for the IPTV services especially if IPTV and non-IPTV services are simultaneously supported by the mobile WiMAX networks. The quality of an IPTV service definitely depends on the allocated bandwidth for that channel. However, due to the high quality IPTV services and to support of huge non-IPTV traffic over mobile WiMAX networks, it is not possible to guarantee the sufficient ...

  20. Investigating the quality of video consultations performed using fourth generation (4G) mobile telecommunications.

    Science.gov (United States)

    Caffery, Liam J; Smith, Anthony C

    2015-09-01

    The use of fourth-generation (4G) mobile telecommunications to provide real-time video consultations were investigated in this study with the aims of determining if 4G is a suitable telecommunications technology; and secondly, to identify if variation in perceived audio and video quality were due to underlying network performance. Three patient end-points that used 4G Internet connections were evaluated. Consulting clinicians recorded their perception of audio and video quality using the International Telecommunications Union scales during clinics with these patient end-points. These scores were used to calculate a mean opinion score (MOS). The network performance metrics were obtained for each session and the relationships between these metrics and the session's quality scores were tested. Clinicians scored the quality of 50 hours of video consultations, involving 36 clinic sessions. The MOS for audio was 4.1 ± 0.62 and the MOS for video was 4.4 ± 0.22. Image impairment and effort to listen were also rated favourably. There was no correlation between audio or video quality and the network metrics of packet loss or jitter. These findings suggest that 4G networks are an appropriate telecommunication technology to deliver real-time video consultations. Variations in quality scores observed during this study were not explained by the packet loss and jitter in the underlying network. Before establishing a telemedicine service, the performance of the 4G network should be assessed at the location of the proposed service. This is due to known variability in performance of 4G networks. © The Author(s) 2015.

  1. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  2. Wireless Cellular Mobile Communications

    OpenAIRE

    Zalud, V.

    2002-01-01

    In this article is briefly reviewed the history of wireless cellular mobile communications, examined the progress in current second generation (2G) cellular standards and discussed their migration to the third generation (3G). The European 2G cellular standard GSM and its evolution phases GPRS and EDGE are described somewhat in detail. The third generation standard UMTS taking up on GSM/GPRS core network and equipped with a new advanced access network on the basis of code division multiple ac...

  3. Future cooperative communication systems driven by social mobile networks

    DEFF Research Database (Denmark)

    Blázovics, L.; Varga, C.; Bamford, W.

    2011-01-01

    In this work we are underlining the importance of social mobile networks for upcoming cooperative communication systems. The assumption of this work is that future mobile communication systems will incorporate user cooperation, i.e. a combination of cellular access in parallel with ongoing short...... cases. By the example of the Gedda-Headz gaming community, possible links between cooperative mobile communication and social mobile networks are shown....

  4. Mobile-ip Aeronautical Network Simulation Study

    Science.gov (United States)

    Ivancic, William D.; Tran, Diepchi T.

    2001-01-01

    NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.

  5. User cooperation, virality and gaming in a social mobile network

    DEFF Research Database (Denmark)

    Varga, C; Blazovics, L; Charaf, H

    2012-01-01

    Social networks and mobile systems are both rapidly developing areas nowadays. In this chapter, we will introduce Gedda-Headz, a novel social mobile gaming concept that brings these two areas together. Gedda-Headz is a social mobile network that mainly focuses on multiplayer mobile gaming. First we...

  6. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  7. Low Computational Complexity Network Coding For Mobile Networks

    DEFF Research Database (Denmark)

    Heide, Janus

    2012-01-01

    Network Coding (NC) is a technique that can provide benefits in many types of networks, some examples from wireless networks are: In relay networks, either the physical or the data link layer, to reduce the number of transmissions. In reliable multicast, to reduce the amount of signaling and enable......-flow coding technique. One of the key challenges of this technique is its inherent computational complexity which can lead to high computational load and energy consumption in particular on the mobile platforms that are the target platform in this work. To increase the coding throughput several...

  8. Mobile satellite business networks: A part of the European mobile system

    Science.gov (United States)

    deMateo, M. L.; Jongejans, A.; Loisy, C.; VanHimbeeck, C.; Marchal, J. P.; Borella, A.; Sartori, M.

    1995-01-01

    The European Space Agency (ESA) is presently procuring an L-band payload EMS, to be embarked on the ITALSAT-2 satellite due for launch in early 1996, in order to promote a regional European mobile system. One of the Land Mobile Communication systems supported by EMS is the MSBN (Mobile Satellite Business Network) voice and data system which will offer the services of a business network on a seamless European coverage. This paper will first recall the characteristics of the MSBN system, which is based on quasi-synchronized CDMA (Code Division Multiple Access) techniques in both directions, and then describe the CDMA receivers implementation. Main validation test results will also be reported confirming predicted performances.

  9. Community Core Evolution in Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Hao Xu

    2013-01-01

    Full Text Available Community detection in social networks attracts a lot of attention in the recent years. Existing methods always depict the relationship of two nodes using the temporary connection. However, these temporary connections cannot be fully recognized as the real relationships when the history connections among nodes are considered. For example, a casual visit in Facebook cannot be seen as an establishment of friendship. Hence, our question is the following: how to cluster the real friends in mobile social networks? In this paper, we study the problem of detecting the stable community core in mobile social networks. The cumulative stable contact is proposed to depict the relationship among nodes. The whole process is divided into timestamps. Nodes and their connections can be added or removed at each timestamp, and historical contacts are considered when detecting the community core. Also, community cores can be tracked through the incremental computing, which can help to recognize the evolving of community structure. Empirical studies on real-world social networks demonstrate that our proposed method can effectively detect stable community cores in mobile social networks.

  10. Community core evolution in mobile social networks.

    Science.gov (United States)

    Xu, Hao; Xiao, Weidong; Tang, Daquan; Tang, Jiuyang; Wang, Zhenwen

    2013-01-01

    Community detection in social networks attracts a lot of attention in the recent years. Existing methods always depict the relationship of two nodes using the temporary connection. However, these temporary connections cannot be fully recognized as the real relationships when the history connections among nodes are considered. For example, a casual visit in Facebook cannot be seen as an establishment of friendship. Hence, our question is the following: how to cluster the real friends in mobile social networks? In this paper, we study the problem of detecting the stable community core in mobile social networks. The cumulative stable contact is proposed to depict the relationship among nodes. The whole process is divided into timestamps. Nodes and their connections can be added or removed at each timestamp, and historical contacts are considered when detecting the community core. Also, community cores can be tracked through the incremental computing, which can help to recognize the evolving of community structure. Empirical studies on real-world social networks demonstrate that our proposed method can effectively detect stable community cores in mobile social networks.

  11. Virtual Social Networks Online and Mobile Systems

    Directory of Open Access Journals (Sweden)

    Maytham Safar

    2009-01-01

    Full Text Available Location-based applications are one of the most anticipated new segments of the mobile industry. These new applications are enabled by GPS-equipped phones (e.g., emergency applications, buddy finders, games, location-based advertising, etc.. These services are designed to give consumers instant access to personalized, local content of their immediate location. Some applications couple LBS with notification services, automatically alerting users when they are close to a pre-selected destination. With the advances in the Internet and communications/mobile technology, it became vital to analyze the effect of such technologies on human communications. This work studies how humans can construct social networks as a method for group communications using the available technologies. We constructed and analyzed a friends network using different parameters. The parameters that were calculated to analyze the network are the distribution sequence, characteristic path length, clustering coefficient and centrality measures. In addition, we built a PDA application that implements the concept of LBS using two system modules. In the first module, we have developed an application for entertainment purpose; an application program which enables end users to send their birth year and get their horoscope in return. The second part of the project was, to build an application, which helps people to stay in touch with their friends and family members (Find Friend. It helps users to find which of their buddies are within the same area they are in.

  12. Mobility-aware Hybrid Synchronization for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2015-01-01

    Random mobility of node causes the frequent changes in the network dynamics causing the increased cost in terms of energy and bandwidth. It needs the additional efforts to synchronize the activities of nodes during data collection and transmission in Wireless Sensor Networks (WSNs). A key challenge...... in maintaining the effective data collection and transmission is to schedule and synchronize the activities of the nodes with the global clock. This paper proposes the Mobility-aware Hybrid Synchronization Algorithm (MHS) which works on the formation of cluster based on spanning tree mechanism (SPT). Nodes used...... for formation of the network have random mobility and heterogeneous in terms of energy with static sink. The nodes in the cluster and cluster heads in the network are synchronized with the notion of global time scale. In the initial stage, the algorithm establishes the hierarchical structure of the network...

  13. Data-Driven Handover Optimization in Next Generation Mobile Communication Networks

    Directory of Open Access Journals (Sweden)

    Po-Chiang Lin

    2016-01-01

    Full Text Available Network densification is regarded as one of the important ingredients to increase capacity for next generation mobile communication networks. However, it also leads to mobility problems since users are more likely to hand over to another cell in dense or even ultradense mobile communication networks. Therefore, supporting seamless and robust connectivity through such networks becomes a very important issue. In this paper, we investigate handover (HO optimization in next generation mobile communication networks. We propose a data-driven handover optimization (DHO approach, which aims to mitigate mobility problems including too-late HO, too-early HO, HO to wrong cell, ping-pong HO, and unnecessary HO. The key performance indicator (KPI is defined as the weighted average of the ratios of these mobility problems. The DHO approach collects data from the mobile communication measurement results and provides a model to estimate the relationship between the KPI and features from the collected dataset. Based on the model, the handover parameters, including the handover margin and time-to-trigger, are optimized to minimize the KPI. Simulation results show that the proposed DHO approach could effectively mitigate mobility problems.

  14. Knowledge Creation Through Mobile Social Networks and Its Impact on Intentions to Use Innovative Mobile Services

    NARCIS (Netherlands)

    Kleijnen, M.H.P.; Lievens, A.; de Ruyter, K.; Wetzels, M.G.M.

    2009-01-01

    Taking a social network perspective, the authors investigate consumers' intentions to use innovative mobile services. With a sociometric survey, they empirically assess how consumers integrate and connect through mobile social networks, as well as how their network position influences knowledge

  15. Medical reliable network using concatenated channel codes through GSM network.

    Science.gov (United States)

    Ahmed, Emtithal; Kohno, Ryuji

    2013-01-01

    Although the 4(th) generation (4G) of global mobile communication network, i.e. Long Term Evolution (LTE) coexisting with the 3(rd) generation (3G) has successfully started; the 2(nd) generation (2G), i.e. Global System for Mobile communication (GSM) still playing an important role in many developing countries. Without any other reliable network infrastructure, GSM can be applied for tele-monitoring applications, where high mobility and low cost are necessary. A core objective of this paper is to introduce the design of a more reliable and dependable Medical Network Channel Code system (MNCC) through GSM Network. MNCC design based on simple concatenated channel code, which is cascade of an inner code (GSM) and an extra outer code (Convolution Code) in order to protect medical data more robust against channel errors than other data using the existing GSM network. In this paper, the MNCC system will provide Bit Error Rate (BER) equivalent to the BER for medical tele monitoring of physiological signals, which is 10(-5) or less. The performance of the MNCC has been proven and investigated using computer simulations under different channels condition such as, Additive White Gaussian Noise (AWGN), Rayleigh noise and burst noise. Generally the MNCC system has been providing better performance as compared to GSM.

  16. Energy-Efficient Crowdsensing of Human Mobility and Signal Levels in Cellular Networks

    Science.gov (United States)

    Foremski, Paweł; Gorawski, Michał; Grochla, Krzysztof; Polys, Konrad

    2015-01-01

    The paper presents a practical application of the crowdsensing idea to measure human mobility and signal coverage in cellular networks. Currently, virtually everyone is carrying a mobile phone, which may be used as a sensor to gather research data by measuring, e.g., human mobility and radio signal levels. However, many users are unwilling to participate in crowdsensing experiments. This work begins with the analysis of the barriers for engaging people in crowdsensing. A survey showed that people who agree to participate in crowdsensing expect a minimum impact on their battery lifetime and phone usage habits. To address these requirements, this paper proposes an application for measuring the location and signal strength data based on energy-efficient GPS tracking, which allows one to perform the measurements of human mobility and radio signal levels with minimum energy utilization and without any engagement of the user. The method described combines measurements from the accelerometer with effective management of the GPS to monitor the user mobility with the decrease in battery lifetime by approximately 20%. To show the applicability of the proposed platform, the sample results of signal level distribution and coverage maps gathered for an LTE network and representing human mobility are shown. PMID:26340633

  17. A Full-Duplex MAC Tailored for 5G Wireless Networks

    Directory of Open Access Journals (Sweden)

    Lucas de Melo Guimarães

    2018-01-01

    Full Text Available The increasing demands for high-data rate traffic stimulated the development of the fifth-generation (5G mobile networks. The envisioned 5G network is expected to meet its challenge by devising means to further improve spectrum usage. Many alternatives to enhance spectrum usage are being researched, such as massive MIMO, operation in mmWave frequency, cognitive radio, and the employment of full-duplex antennas. Efficient utilization of the potential of any of these technologies faces a set of challenges related to medium access control (MAC schemes. This work focuses on MAC schemes tailored for full-duplex antennas, since they are expected to play a major role in the foreseeable 5G networks. In this context, this paper presents a MAC layer technique to improve total transmission time when full-duplex antennas are employed. Several evaluations in different scenarios are conducted to assess the proposed MAC scheme. Numerical results show that the proposed scheme provides gains up to 156% when compared to a state-of-the-art full-duplex antenna MAC protocol. Compared to traditional half-duplex antenna MAC protocols, the proposed scheme yields gain up to 412%.

  18. Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    Recently, context awareness in Intermittently Connected Mobile Networks (ICMNs) has gained popularity in order to discover social similarities among mobile entities. Nevertheless, most of the contextual methods depend on network knowledge obtained with unrealistic scenarios. Mobile entities should

  19. Biologically based neural network for mobile robot navigation

    Science.gov (United States)

    Torres Muniz, Raul E.

    1999-01-01

    The new tendency in mobile robots is to crete non-Cartesian system based on reactions to their environment. This emerging technology is known as Evolutionary Robotics, which is combined with the Biorobotic field. This new approach brings cost-effective solutions, flexibility, robustness, and dynamism into the design of mobile robots. It also provides fast reactions to the sensory inputs, and new interpretation of the environment or surroundings of the mobile robot. The Subsumption Architecture (SA) and the action selection dynamics developed by Brooks and Maes, respectively, have successfully obtained autonomous mobile robots initiating this new trend of the Evolutionary Robotics. Their design keeps the mobile robot control simple. This work present a biologically inspired modification of these schemes. The hippocampal-CA3-based neural network developed by Williams Levy is used to implement the SA, while the action selection dynamics emerge from iterations of the levels of competence implemented with the HCA3. This replacement by the HCA3 results in a closer biological model than the SA, combining the Behavior-based intelligence theory with neuroscience. The design is kept simple, and it is implemented in the Khepera Miniature Mobile Robot. The used control scheme obtains an autonomous mobile robot that can be used to execute a mail delivery system and surveillance task inside a building floor.

  20. Rural medicine via mobile network

    International Nuclear Information System (INIS)

    Srivastava, Shikha; Bharade, Sandeep; Sinha, Vineet; Ananthakrishnan, T.S.; Jindal, G.D.; Prakash, C.

    2009-01-01

    Bhabha Atomic Research Centre (BARC) has developed a handheld Tele-ECG system for providing optimum cardiac care and a Mobile Network Based Telemedicine (MNBT) utility for providing telemedicine services to isolated rural population. The handheld Tele-ECG acquires, saves and transfers the electrocardiographic signal to the expert's mobile for his advice in dealing with cardiac emergencies. Similarly, MNBT utility transfers the medical images and relevant patient data from a PC based instrument to a mobile phone for further transmission to an expert for his advice. This paper summarizes these developments. (author)

  1. Real-time video streaming in mobile cloud over heterogeneous wireless networks

    Science.gov (United States)

    Abdallah-Saleh, Saleh; Wang, Qi; Grecos, Christos

    2012-06-01

    Recently, the concept of Mobile Cloud Computing (MCC) has been proposed to offload the resource requirements in computational capabilities, storage and security from mobile devices into the cloud. Internet video applications such as real-time streaming are expected to be ubiquitously deployed and supported over the cloud for mobile users, who typically encounter a range of wireless networks of diverse radio access technologies during their roaming. However, real-time video streaming for mobile cloud users across heterogeneous wireless networks presents multiple challenges. The network-layer quality of service (QoS) provision to support high-quality mobile video delivery in this demanding scenario remains an open research question, and this in turn affects the application-level visual quality and impedes mobile users' perceived quality of experience (QoE). In this paper, we devise a framework to support real-time video streaming in this new mobile video networking paradigm and evaluate the performance of the proposed framework empirically through a lab-based yet realistic testing platform. One particular issue we focus on is the effect of users' mobility on the QoS of video streaming over the cloud. We design and implement a hybrid platform comprising of a test-bed and an emulator, on which our concept of mobile cloud computing, video streaming and heterogeneous wireless networks are implemented and integrated to allow the testing of our framework. As representative heterogeneous wireless networks, the popular WLAN (Wi-Fi) and MAN (WiMAX) networks are incorporated in order to evaluate effects of handovers between these different radio access technologies. The H.264/AVC (Advanced Video Coding) standard is employed for real-time video streaming from a server to mobile users (client nodes) in the networks. Mobility support is introduced to enable continuous streaming experience for a mobile user across the heterogeneous wireless network. Real-time video stream packets

  2. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  3. Cognitive Radio Networks for Tactical Wireless Communications

    Science.gov (United States)

    2014-12-01

    exists. Instead, security is an evolving process, as we have seen in the context of WLANs and 2G / 3G networks. New system vulnerabilities continue to...in the network configuration and radio parameters take place due to mobility of platforms, and variation in other users of the RF environment. CRNs...dynamic spectrum access experimentally, and it represents the largest military Mobile Ad hoc Network (MANET) as of today. The WNaN demonstrator has been

  4. The Network of International Student Mobility (Working Title)

    Energy Technology Data Exchange (ETDEWEB)

    Voegtle, E.; Windzio, M.

    2016-07-01

    In a previous paper (see Vögtle and Windzio 2016) we investigated the impact of membership in the Bologna Process on patterns and driving forces of cross-national student mobility. Student exchange flows were analysed for almost all Bologna Process member states and nonBologna OECD members over a ten-year period (from 2000 to 2009). We applied a Social Network Approach focusing on outbound diploma-mobility to identify positions of countries in the network of cross-national student exchange. Based on social network analyses, we first visualized the exchange patterns between sampled countries. In doing so, we analysed the student exchange linkages to gain descriptive insights into the development of the network (see Figure 1). Second, we used Exponential Random Graph Models (ERGM) to test which factors determine patterns of transnational student mobility. The results of this network analyses reveal that cross-national student exchange networks are stable over time. At the core of these networks are the United States, Great Britain, France, and Germany; they attract the highest shares of students from the remaining countries in our sample. Moreover, the results of the ERGM demonstrate that homophily between countries determines student exchange patterns. The most relevant ties exist between bordering countries. Moreover, membership in the Bologna Process impacts on mobility patterns, and the effect size increases over the periods investigated. (Author)

  5. Stem Cell Mobilization with G-CSF versus Cyclophosphamide plus G-CSF in Mexican Children

    OpenAIRE

    Meraz, Jos? Eugenio V?zquez; Arellano-Galindo, Jos?; Avalos, Armando Mart?nez; Mendoza-Garc?a, Emma; Jim?nez-Hern?ndez, Elva

    2016-01-01

    Fifty-six aphaereses were performed in 23 pediatric patients with malignant hematological and solid tumors, following three different protocols for PBPC mobilization and distributed as follows: A: seventeen mobilized with 4?g/m2 of cyclophosphamide (CFA) and 10??g/kg/day of granulocyte colony stimulating factor (G-CSF), B: nineteen with CFA + G-CSF, and C: twenty only with G-CSF when the WBC count exceeded 10 ? 109/L. The average number of MNC/kg body weight (BW)/aphaeresis was 0.4 ? 108 (0.1...

  6. 5G: The Convergence of Wireless Communications.

    Science.gov (United States)

    Chávez-Santiago, Raúl; Szydełko, Michał; Kliks, Adrian; Foukalas, Fotis; Haddad, Yoram; Nolan, Keith E; Kelly, Mark Y; Masonta, Moshe T; Balasingham, Ilangko

    As the rollout of 4G mobile communication networks takes place, representatives of industry and academia have started to look into the technological developments toward the next generation (5G). Several research projects involving key international mobile network operators, infrastructure manufacturers, and academic institutions, have been launched recently to set the technological foundations of 5G. However, the architecture of future 5G systems, their performance, and mobile services to be provided have not been clearly defined. In this paper, we put forth the vision for 5G as the convergence of evolved versions of current cellular networks with other complementary radio access technologies. Therefore, 5G may not be a single radio access interface but rather a "network of networks". Evidently, the seamless integration of a variety of air interfaces, protocols, and frequency bands, requires paradigm shifts in the way networks cooperate and complement each other to deliver data rates of several Gigabits per second with end-to-end latency of a few milliseconds. We provide an overview of the key radio technologies that will play a key role in the realization of this vision for the next generation of mobile communication networks. We also introduce some of the research challenges that need to be addressed.

  7. Adaptive Data Gathering in Mobile Sensor Networks Using Speedy Mobile Elements

    Science.gov (United States)

    Lai, Yongxuan; Xie, Jinshan; Lin, Ziyu; Wang, Tian; Liao, Minghong

    2015-01-01

    Data gathering is a key operator for applications in wireless sensor networks; yet it is also a challenging problem in mobile sensor networks when considering that all nodes are mobile and the communications among them are opportunistic. This paper proposes an efficient data gathering scheme called ADG that adopts speedy mobile elements as the mobile data collector and takes advantage of the movement patterns of the network. ADG first extracts the network meta-data at initial epochs, and calculates a set of proxy nodes based on the meta-data. Data gathering is then mapped into the Proxy node Time Slot Allocation (PTSA) problem that schedules the time slots and orders, according to which the data collector could gather the maximal amount of data within a limited period. Finally, the collector follows the schedule and picks up the sensed data from the proxy nodes through one hop of message transmissions. ADG learns the period when nodes are relatively stationary, so that the collector is able to pick up the data from them during the limited data gathering period. Moreover, proxy nodes and data gathering points could also be timely updated so that the collector could adapt to the change of node movements. Extensive experimental results show that the proposed scheme outperforms other data gathering schemes on the cost of message transmissions and the data gathering rate, especially under the constraint of limited data gathering period. PMID:26389903

  8. Adaptive Data Gathering in Mobile Sensor Networks Using Speedy Mobile Elements.

    Science.gov (United States)

    Lai, Yongxuan; Xie, Jinshan; Lin, Ziyu; Wang, Tian; Liao, Minghong

    2015-09-15

    Data gathering is a key operator for applications in wireless sensor networks; yet it is also a challenging problem in mobile sensor networks when considering that all nodes are mobile and the communications among them are opportunistic. This paper proposes an efficient data gathering scheme called ADG that adopts speedy mobile elements as the mobile data collector and takes advantage of the movement patterns of the network. ADG first extracts the network meta-data at initial epochs, and calculates a set of proxy nodes based on the meta-data. Data gathering is then mapped into the Proxy node Time Slot Allocation (PTSA) problem that schedules the time slots and orders, according to which the data collector could gather the maximal amount of data within a limited period. Finally, the collector follows the schedule and picks up the sensed data from the proxy nodes through one hop of message transmissions. ADG learns the period when nodes are relatively stationary, so that the collector is able to pick up the data from them during the limited data gathering period. Moreover, proxy nodes and data gathering points could also be timely updated so that the collector could adapt to the change of node movements. Extensive experimental results show that the proposed scheme outperforms other data gathering schemes on the cost of message transmissions and the data gathering rate, especially under the constraint of limited data gathering period.

  9. REDISTRIBUTION OF BASE STATIONS LOAD IN MOBILE COMMUNICATION NETWORKS

    Directory of Open Access Journals (Sweden)

    Igor Ruban

    2017-09-01

    Full Text Available The subject matter of the article is the processes of load distribution in mobile communication networks. The object of research is the handover. The goal is to develop a method for redistributing the load between neighboring areas for mobile nodes. The considered base stations are supposed to have the signal-to-noise ratios that are equal or close. The methods that are used: methods of system analysis, methods of digital signal processing. The following results are obtained. The method that allows mobile nodes, whose signal-to-noise ratios are equal or close, to switch to a less loaded base station. This method allows the base station to launch the handover process enabling more even distribution of the load from mobile nodes among neighboring base stations in wireless and mobile networks. In the suggested modification of the method, the function assessing the bandwidth of the uplink channel is added to the base stations, as well a threshold value for using its bandwidth. Thus, when the current value of bandwidth reaches the threshold, the base station starts sending out a message to all mobile nodes and verifies free neighboring areas for switching over mobile nodes. If there are adjacent areas with a lower load, the base station notifies all potential candidates about the necessity of their switching over. The handover process is launched when the available bandwidth of the base station decreases below a certain threshold. Therefore, it is possible to optimize the operation of the WiMAX network with respect to the criterion of the total bandwidth capacity of the base stations. Besides, the results of the comparative analysis of the handover process in networks based on the WiMAX technology that are obtained using the OpNet simulation environment are presented. Conclusions.The suggested approach can be used to improve the basic software of mobile communication networks. When moving a node from one area to another one in access servers, the

  10. Modeling the propagation of mobile malware on complex networks

    Science.gov (United States)

    Liu, Wanping; Liu, Chao; Yang, Zheng; Liu, Xiaoyang; Zhang, Yihao; Wei, Zuxue

    2016-08-01

    In this paper, the spreading behavior of malware across mobile devices is addressed. By introducing complex networks to model mobile networks, which follows the power-law degree distribution, a novel epidemic model for mobile malware propagation is proposed. The spreading threshold that guarantees the dynamics of the model is calculated. Theoretically, the asymptotic stability of the malware-free equilibrium is confirmed when the threshold is below the unity, and the global stability is further proved under some sufficient conditions. The influences of different model parameters as well as the network topology on malware propagation are also analyzed. Our theoretical studies and numerical simulations show that networks with higher heterogeneity conduce to the diffusion of malware, and complex networks with lower power-law exponents benefit malware spreading.

  11. A Small Planar Antenna for 4G Mobile Phone Application

    Directory of Open Access Journals (Sweden)

    Hu Jian-rong

    2016-01-01

    Full Text Available The analysis and design of a small planar multiband antenna operating in the 4G frequency bands are presented. The numerical and experimental results demonstrated that the proposed antenna satisfies the requirement of 6 dB return loss for the impedance bandwidth of the LTE700/LTE2300/LTE2500 and WiMAX3500 bands. The gains at 750 MHz/2.3 GHz/2.6 GHz/3.5 GHz are 2.1 dBi/4.9 dBi/4.7 dBi/4.3 dBi, respectively. The measured radiation patterns verify the suitability of the antenna to be employed in mobile phones. The dimensions of the radiant patch are 49 × 10 mm2. The proposed antenna can be easily fabricated and customized to various 4G mobile phones as a compact internal antenna.

  12. SDN-controlled topology-reconfigurable optical mobile fronthaul architecture for bidirectional CoMP and low latency inter-cell D2D in the 5G mobile era.

    Science.gov (United States)

    Cvijetic, Neda; Tanaka, Akihiro; Kanonakis, Konstantinos; Wang, Ting

    2014-08-25

    We demonstrate the first SDN-controlled optical topology-reconfigurable mobile fronthaul (MFH) architecture for bidirectional coordinated multipoint (CoMP) and low latency inter-cell device-to-device (D2D) connectivity in the 5G mobile networking era. SDN-based OpenFlow control is used to dynamically instantiate the CoMP and inter-cell D2D features as match/action combinations in control plane flow tables of software-defined optical and electrical switching elements. Dynamic re-configurability is thereby introduced into the optical MFH topology, while maintaining back-compatibility with legacy fiber deployments. 10 Gb/s peak rates with <7 μs back-to-back transmission latency and 29.6 dB total power budget are experimentally demonstrated, confirming the attractiveness of the new approach for optical MFH of future 5G mobile systems.

  13. ON INFORMATION SECURITY SOLUTIONS APPLICABLE TO D2D COMMUNICATIONS WITHIN THE 5G DOMAIN: ANALYZING THE INFLUENCE OF USER MOBILITY

    Directory of Open Access Journals (Sweden)

    A. Y. Ometov

    2017-01-01

    Full Text Available The paper deals with the problems of peer-to-peer systems such as Device-to-Device (D2D operating in 5G networks. First, we consider the task of ensuring secure, direct connections between mobile users by utilizing the developed simulator. We present results of the dynamic user clustering in geographical proximity exchanging packet data and Levy flight mobility model. The study results give the possibility to determine benefits of the technology integration in the 3GPP LTE network in terms of throughput. We have shown that technology implementation provides a system capacity increase up to 30% with a slight growth in the time required for the initialization of direct connections. The results may be useful for the academy and industrial experts working in the field of telecommunication systems and information security

  14. Advanced wireless mobile collaborative sensing network for tactical and strategic missions

    Science.gov (United States)

    Xu, Hao

    2017-05-01

    In this paper, an advanced wireless mobile collaborative sensing network will be developed. Through properly combining wireless sensor network, emerging mobile robots and multi-antenna sensing/communication techniques, we could demonstrate superiority of developed sensing network. To be concrete, heterogeneous mobile robots including unmanned aerial vehicle (UAV) and unmanned ground vehicle (UGV) are equipped with multi-model sensors and wireless transceiver antennas. Through real-time collaborative formation control, multiple mobile robots can team the best formation that can provide most accurate sensing results. Also, formatting multiple mobile robots can also construct a multiple-input multiple-output (MIMO) communication system that can provide a reliable and high performance communication network.

  15. Assessment of the energy efficiency enhancement of future mobile networks

    NARCIS (Netherlands)

    Litjens, R.; Toh, Y.; Zhang, H.; Blume, O.

    2014-01-01

    We assess the energy efficiency of mobile networks in 2020, and compare it with a 2010 baseline. A comprehensive assessment approach is taken, considering all relevant scenario aspects such as data traffic growth, hardware evolutions, mobile network deployments and operations including network

  16. Performance Evaluation Of Macro amp Micro Mobility In HMIP Networks

    Directory of Open Access Journals (Sweden)

    Osama Ali Abdelgadir

    2015-08-01

    Full Text Available Abstract Changing the location of mobile node during transmission or receiving of data always caused changing of the address of the mobile node which results in packet loss as well as delay in time taken to locate the new address of the Mobile Node therefore delay of data receiving is caused this problem was known as micro-mobility issue. To resolve this problem and ascurrently mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of mobile IP which supports quality of service minimum packet loss limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of mobile IP and micro mobility protocols where mobile IP handles macro mobility and HMIP cellular IP HAWAII handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed.HIERARCHICAL MICRO MOBILITY PROTOCOL is used. To identify the impact of micro-mobility in IP based Wireless Network to implement selected micro-mobility model of Hierarchal Micro Mobility Protocol in network simulator and for more analysis and measurements results and for the purpose of performance comparison between both Macro and Micro mobility Protocol Management.. Simulation results presented in this paper are based on ns 2

  17. Measurement campaign on connectivity of mesh networks formed by mobile devices

    DEFF Research Database (Denmark)

    Pietrarca, Beatrice; Sasso, Giovanni; Perrucci, Gian Paolo

    2007-01-01

    This paper reports the results of a measurement campaign on the connectivity level of mobile devices using Bluetooth (BT) to form cooperative mobile mesh networks. Such mobile mesh networks composed of mobile devices are the basis for any peer-to-peer communication like wireless grids or social...

  18. Contention aware mobility prediction routing for intermittently connected mobile networks

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Shihada, Basem

    2013-01-01

    This paper introduces a novel multi-copy routing protocol, called predict and forward (PF), for delay tolerant networks, which aims to explore the possibility of using mobile nodes as message carriers for end-to-end delivery of the messages. With PF, the message forwarding decision is made by manipulating the probability distribution of future inter-contact and contact durations based on the network status, including wireless link condition and nodal buffer availability. In particular, PF is based on the observations that the node mobility behavior is semi-deterministic and could be predicted once there is sufficient mobility history information. We implemented the proposed protocol and compared it with a number of existing encounter-based routing approaches in terms of delivery delay, delivery ratio, and the number of transmissions required for message delivery. The simulation results show that PF outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.

  19. Contention aware mobility prediction routing for intermittently connected mobile networks

    KAUST Repository

    Elwhishi, Ahmed

    2013-04-26

    This paper introduces a novel multi-copy routing protocol, called predict and forward (PF), for delay tolerant networks, which aims to explore the possibility of using mobile nodes as message carriers for end-to-end delivery of the messages. With PF, the message forwarding decision is made by manipulating the probability distribution of future inter-contact and contact durations based on the network status, including wireless link condition and nodal buffer availability. In particular, PF is based on the observations that the node mobility behavior is semi-deterministic and could be predicted once there is sufficient mobility history information. We implemented the proposed protocol and compared it with a number of existing encounter-based routing approaches in terms of delivery delay, delivery ratio, and the number of transmissions required for message delivery. The simulation results show that PF outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.

  20. Increasing cellular coverage within integrated terrestrial/satellite mobile networks

    Science.gov (United States)

    Castro, Jonathan P.

    1995-01-01

    When applying the hierarchical cellular concept, the satellite acts as giant umbrella cell covering a region with some terrestrial cells. If a mobile terminal traversing the region arrives to the border-line or limits of a regular cellular ground service, network transition occurs and the satellite system continues the mobile coverage. To adequately assess the boundaries of service of a mobile satellite system an a cellular network within an integrated environment, this paper provides an optimized scheme to predict when a network transition may be necessary. Under the assumption of a classified propagation phenomenon and Lognormal shadowing, the study applies an analytical approach to estimate the location of a mobile terminal based on a reception of the signal strength emitted by a base station.

  1. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  2. An Efficient Patch Dissemination Strategy for Mobile Networks

    OpenAIRE

    Zhao, Dawei; Peng, Haipeng; Li, Lixiang; Yang, Yixian; Li, Shudong

    2013-01-01

    Mobile phones and personal digital assistants are becoming increasingly important in our daily life since they enable us to access a large variety of ubiquitous services. Mobile networks, formed by the connection of mobile devices following some relationships among mobile users, provide good platforms for mobile virus spread. Quick and efficient security patch dissemination strategy is necessary for the update of antivirus software so that it can detect mobile virus, especially the new vir...

  3. Multi-Layer Mobility Load Balancing in a Heterogeneous LTE Network

    DEFF Research Database (Denmark)

    Fotiadis, Panagiotis; Polignano, Michele; Laselva, Daniela

    2012-01-01

    This paper analyzes the behavior of a distributed Mobility Load Balancing (MLB) scheme in a multi-layer 3GPP (3rd Generation Partnership Project) Long Term Evolution (LTE) deployment with different User Equipment (UE) densities in certain network areas covered with pico cells. Target of the study...

  4. Energy efficient smart phones for 5G networks

    CERN Document Server

    Rodriguez, Jonathan

    2015-01-01

    This book addresses current technology trends and requirements leading towards the next era in mobile communication handsets; and beyond that the book proposes innovative solutions that could be candidate solutions for 5G phones. It adopts a multidisciplinary and interdisciplinary stance towards handset design, a necessary ingredient if 5th Generation handset and services are to really take-off. Therefore the scope of the book targets a broad range of subjects, including energy efficiency, RF design, cooperation, context-aware systems, roaming, and short-range networking, all of which working in synergy to provide seamless mobility and high speed connectivity within a HetNet environment. Specifically, the authors investigate how we can exploit the cooperation paradigm and context-aware mechanism working in synergy to provide energy compliant phones that can introduce power savings of up to 50% on state-of-the-art. Going beyond this, a chapter on business modeling approaches is also included, based on incentiv...

  5. Pinning synchronization of a mobile agent network

    International Nuclear Information System (INIS)

    Wang, Lei; Sun, You-xian

    2009-01-01

    We investigate the problem of controlling a group of mobile agents in a plane in order to move them towards a desired orbit via pinning control, in which each agent is associated with a chaotic oscillator coupled with those of neighboring agents, and the pinning strategy is to have the common linear feedback acting on a small fraction of agents by random selection. We explore the effects of the pinning probability, feedback gains and agent density in the pinning synchronization of a mobile agent network under a fast-switching constraint, and perform numerical simulations for validation. In particular, we show that there exists a critical pinning density for network synchronization with an unbounded region: above the threshold, the dynamical network can be controlled by pinning; below it, anarchy prevails. And for the network with a single bounded synchronization region, pinning control has little effect as regards enhancing network synchronizability

  6. Development of an electronic medical report delivery system to 3G GSM mobile (cellular) phones for a medical imaging department.

    Science.gov (United States)

    Lim, Eugene Y; Lee, Chiang; Cai, Weidong; Feng, Dagan; Fulham, Michael

    2007-01-01

    Medical practice is characterized by a high degree of heterogeneity in collaborative and cooperative patient care. Fast and effective communication between medical practitioners can improve patient care. In medical imaging, the fast delivery of medical reports to referring medical practitioners is a major component of cooperative patient care. Recently, mobile phones have been actively deployed in telemedicine applications. The mobile phone is an ideal medium to achieve faster delivery of reports to the referring medical practitioners. In this study, we developed an electronic medical report delivery system from a medical imaging department to the mobile phones of the referring doctors. The system extracts a text summary of medical report and a screen capture of diagnostic medical image in JPEG format, which are transmitted to 3G GSM mobile phones.

  7. 5G heterogeneous networks self-organizing and optimization

    CERN Document Server

    Rong, Bo; Kadoch, Michel; Sun, Songlin; Li, Wenjing

    2016-01-01

    This SpringerBrief provides state-of-the-art technical reviews on self-organizing and optimization in 5G systems. It covers the latest research results from physical-layer channel modeling to software defined network (SDN) architecture. This book focuses on the cutting-edge wireless technologies such as heterogeneous networks (HetNets), self-organizing network (SON), smart low power node (LPN), 3D-MIMO, and more. It will help researchers from both the academic and industrial worlds to better understand the technical momentum of 5G key technologies.

  8. Software agent constrained mobility for network performance monitoring

    NARCIS (Netherlands)

    Bohoris, C.; Liotta, A.; Pavlou, G.

    2000-01-01

    During the recent years of research on mobile agents, significant effort has been directed towards the identification of models of agent mobility suitable for network management applications. Also, a lot of research work is currently being carried out trying to provide an assessment of mobile agent

  9. Throughput Analysis on 3-Dimensional Underwater Acoustic Network with One-Hop Mobile Relay

    Science.gov (United States)

    Zhong, Xuefeng; Fan, Jiasheng; Guan, Quansheng; Ji, Fei; Yu, Hua

    2018-01-01

    Underwater acoustic communication network (UACN) has been considered as an essential infrastructure for ocean exploitation. Performance analysis of UACN is important in underwater acoustic network deployment and management. In this paper, we analyze the network throughput of three-dimensional randomly deployed transmitter–receiver pairs. Due to the long delay of acoustic channels, complicated networking protocols with heavy signaling overhead may not be appropriate. In this paper, we consider only one-hop or two-hop transmission, to save the signaling cost. That is, we assume the transmitter sends the data packet to the receiver by one-hop direct transmission, or by two-hop transmission via mobile relays. We derive the closed-form formulation of packet delivery rate with respect to the transmission delay and the number of transmitter–receiver pairs. The correctness of the derivation results are verified by computer simulations. Our analysis indicates how to obtain a precise tradeoff between the delay constraint and the network capacity. PMID:29337911

  10. Throughput Analysis on 3-Dimensional Underwater Acoustic Network with One-Hop Mobile Relay.

    Science.gov (United States)

    Zhong, Xuefeng; Chen, Fangjiong; Fan, Jiasheng; Guan, Quansheng; Ji, Fei; Yu, Hua

    2018-01-16

    Underwater acoustic communication network (UACN) has been considered as an essential infrastructure for ocean exploitation. Performance analysis of UACN is important in underwater acoustic network deployment and management. In this paper, we analyze the network throughput of three-dimensional randomly deployed transmitter-receiver pairs. Due to the long delay of acoustic channels, complicated networking protocols with heavy signaling overhead may not be appropriate. In this paper, we consider only one-hop or two-hop transmission, to save the signaling cost. That is, we assume the transmitter sends the data packet to the receiver by one-hop direct transmission, or by two-hop transmission via mobile relays. We derive the closed-form formulation of packet delivery rate with respect to the transmission delay and the number of transmitter-receiver pairs. The correctness of the derivation results are verified by computer simulations. Our analysis indicates how to obtain a precise tradeoff between the delay constraint and the network capacity.

  11. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    In the simulation of mobile ad-hoc networks (MANETs), the probability distribution governing the movement of nodes typically varies over time and converges to a steady state distribution, known as the stationary distribution. This paper presents and evaluates the stationary distribution for location, speed and pause time of a ...

  12. A Mobile Application Prototype using Network Coding

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank

    2010-01-01

    This paper looks into implementation details of network coding for a mobile application running on commercial mobile phones. We describe the necessary coding operations and algorithms that implements them. The coding algorithms forms the basis for a implementation in C++ and Symbian C++. We report...

  13. 我国农村3G移动电子商务发展现状及对策探析%Analysis on Development Situation and Strategies of 3G Mobile E-commerce in Rural Area of China

    Institute of Scientific and Technical Information of China (English)

    秦绪杰

    2011-01-01

    Aiming at the current situation of mobile intemet,the existing problems of rural mobile e-commerce application in 3G times were analyzed,the strategies of 3G mobile e-commerce application in rural area were put forward.%针对我国移动互联网的现状,分析3G时代农村移动电子商务应用存在的问题,并提出农村3G移动电子商务应用的对策.

  14. Mobilization of hematopoietic stem cells with highest self-renewal by G-CSF precedes clonogenic cell mobilization peak.

    Science.gov (United States)

    Winkler, Ingrid G; Wiercinska, Eliza; Barbier, Valerie; Nowlan, Bianca; Bonig, Halvard; Levesque, Jean-Pierre

    2016-04-01

    Harvest of granulocyte colony-stimulating factor (G-CSF)-mobilized hematopoietic stem cells (HSCs) begins at day 5 of G-CSF administration, when most donors have achieved maximal mobilization. This is based on surrogate markers for HSC mobilization, such as CD34(+) cells and colony-forming activity in blood. However, CD34(+) cells or colony-forming units in culture (CFU-C) are heterogeneous cell populations with hugely divergent long-term repopulation potential on transplantation. HSC behavior is influenced by the vascular bed in the vicinity of which they reside. We hypothesized that G-CSF may mobilize sequentially cells proximal and more distal to bone marrow venous sinuses where HSCs enter the blood. We addressed this question with functional serial transplantation assays using blood and bone marrow after specific time points of G-CSF treatment in mice. We found that in mice, blood collected after only 48 hours of G-CSF administration was as enriched in serially reconstituting HSCs as blood collected at 5 days of G-CSF treatment. Similarly, mobilized Lin(-)CD34(+) cells were relatively enriched in more primitive Lin(-)CD34(+)CD38(-) cells at day 2 of G-CSF treatment compared with later points in half of human donors tested (n = 6). This suggests that in both humans and mice, hematopoietic progenitor and stem cells do not mobilize uniformly according to their maturation stage, with most potent HSCs mobilizing as early as day 2 of G-CSF. Copyright © 2016 ISEH - International Society for Experimental Hematology. Published by Elsevier Inc. All rights reserved.

  15. Optimizing network connectivity for mobile health technologies in sub-Saharan Africa.

    Science.gov (United States)

    Siedner, Mark J; Lankowski, Alexander; Musinga, Derrick; Jackson, Jonathon; Muzoora, Conrad; Hunt, Peter W; Martin, Jeffrey N; Bangsberg, David R; Haberer, Jessica E

    2012-01-01

    Mobile health (mHealth) technologies hold incredible promise to improve healthcare delivery in resource-limited settings. Network reliability across large catchment areas can be a major challenge. We performed an analysis of network failure frequency as part of a study of real-time adherence monitoring in rural Uganda. We hypothesized that the addition of short messaging service (SMS+GPRS) to the standard cellular network modality (GPRS) would reduce network disruptions and improve transmission of data. Participants were enrolled in a study of real-time adherence monitoring in southwest Uganda. In June 2011, we began using Wisepill devices that transmit data each time the pill bottle is opened. We defined network failures as medication interruptions of >48 hours duration that were transmitted when network connectivity was re-established. During the course of the study, we upgraded devices from GPRS to GPRS+SMS compatibility. We compared network failure rates between GPRS and GPRS+SMS periods and created geospatial maps to graphically demonstrate patterns of connectivity. One hundred fifty-seven participants met inclusion criteria of seven days of SMS and seven days of SMS+GPRS observation time. Seventy-three percent were female, median age was 40 years (IQR 33-46), 39% reported >1-hour travel time to clinic and 17% had home electricity. One hundred one had GPS coordinates recorded and were included in the geospatial maps. The median number of network failures per person-month for the GPRS and GPRS+SMS modalities were 1.5 (IQR 1.0-2.2) and 0.3 (IQR 0-0.9) respectively, (mean difference 1.2, 95%CI 1.0-1.3, p-valueImprovements in network connectivity were notable throughout the region. Study costs increased by approximately $1USD per person-month. Addition of SMS to standard GPRS cellular network connectivity can significantly reduce network connection failures for mobile health applications in remote areas. Projects depending on mobile health data in resource

  16. Multimedia information processing in the SWAN mobile networked computing system

    Science.gov (United States)

    Agrawal, Prathima; Hyden, Eoin; Krzyzanowsji, Paul; Srivastava, Mani B.; Trotter, John

    1996-03-01

    Anytime anywhere wireless access to databases, such as medical and inventory records, can simplify workflow management in a business, and reduce or even eliminate the cost of moving paper documents. Moreover, continual progress in wireless access technology promises to provide per-user bandwidths of the order of a few Mbps, at least in indoor environments. When combined with the emerging high-speed integrated service wired networks, it enables ubiquitous and tetherless access to and processing of multimedia information by mobile users. To leverage on this synergy an indoor wireless network based on room-sized cells and multimedia mobile end-points is being developed at AT&T Bell Laboratories. This research network, called SWAN (Seamless Wireless ATM Networking), allows users carrying multimedia end-points such as PDAs, laptops, and portable multimedia terminals, to seamlessly roam while accessing multimedia data streams from the wired backbone network. A distinguishing feature of the SWAN network is its use of end-to-end ATM connectivity as opposed to the connectionless mobile-IP connectivity used by present day wireless data LANs. This choice allows the wireless resource in a cell to be intelligently allocated amongst various ATM virtual circuits according to their quality of service requirements. But an efficient implementation of ATM in a wireless environment requires a proper mobile network architecture. In particular, the wireless link and medium-access layers need to be cognizant of the ATM traffic, while the ATM layers need to be cognizant of the mobility enabled by the wireless layers. This paper presents an overview of SWAN's network architecture, briefly discusses the issues in making ATM mobile and wireless, and describes initial multimedia applications for SWAN.

  17. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network

    Science.gov (United States)

    Bush, Stephen F.

    1999-05-01

    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dynamic and continuous process. Factors such as load, distance, capacity and topology are all constantly changing in a mobile environment. The VNC algorithm anticipates configuration changes and speeds the reconfiguration process by pre-computing and caching results. VNC propagates local prediction results throughout the VNC enhanced system. The Global Positioning System is an enabling technology for the use of VNC in mobile networks because it provides location information and accurate time for each node. This research has resulted in well defined structures for the encapsulation of physical processes within Logical Processes and a generic library for enhancing a system with VNC. Enhancing an existing system with VNC is straight forward assuming the existing physical processes do not have side effects. The benefit of prediction is gained at the cost of additional traffic and processing. This research includes an analysis of VNC and suggestions for optimization of the VNC algorithm and its parameters.

  18. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  19. A method of mobile video transmission based on J2ee

    Science.gov (United States)

    Guo, Jian-xin; Zhao, Ji-chun; Gong, Jing; Chun, Yang

    2013-03-01

    As 3G (3rd-generation) networks evolve worldwide, the rising demand for mobile video services and the enormous growth of video on the internet is creating major new revenue opportunities for mobile network operators and application developers. The text introduced a method of mobile video transmission based on J2ME, giving the method of video compressing, then describing the video compressing standard, and then describing the software design. The proposed mobile video method based on J2EE is a typical mobile multimedia application, which has a higher availability and a wide range of applications. The users can get the video through terminal devices such as phone.

  20. Army Instructors’ Use of Mobile Devices in the Infantry Advanced Leaders Course

    Science.gov (United States)

    2014-08-01

    attenuate 3G /4G signal strength. When network access is inhibited, so too is the usefulness of the mobile device. Therefore, if cellular service is...Benning? Do you have 2G , 3G , or 4G connectivity? Do you have the same connectivity at the other installations where MTTs are usually conducted? Are there...Research Report 1975 Army Instructors’ Use of Mobile Devices in the Infantry Advanced Leaders Course Richard L

  1. A Mobile Satellite Experiment (MSAT-X) network definition

    Science.gov (United States)

    Wang, Charles C.; Yan, Tsun-Yee

    1990-01-01

    The network architecture development of the Mobile Satellite Experiment (MSAT-X) project for the past few years is described. The results and findings of the network research activities carried out under the MSAT-X project are summarized. A framework is presented upon which the Mobile Satellite Systems (MSSs) operator can design a commercial network. A sample network configuration and its capability are also included under the projected scenario. The Communication Interconnection aspect of the MSAT-X network is discussed. In the MSAT-X network structure two basic protocols are presented: the channel access protocol, and the link connection protocol. The error-control techniques used in the MSAT-X project and the packet structure are also discussed. A description of two testbeds developed for experimentally simulating the channel access protocol and link control protocol, respectively, is presented. A sample network configuration and some future network activities of the MSAT-X project are also presented.

  2. Community Based Networks and 5G

    DEFF Research Database (Denmark)

    Williams, Idongesit

    2016-01-01

    The deployment of previous wireless standards has provided more benefits for urban dwellers than rural dwellers. 5G deployment may not be different. This paper identifies that Community Based Networks as carriers that deserve recognition as potential 5G providers may change this. The argument....... The findings indicate that 5G connectivity can be extended to rural areas by these networks, via heterogenous networks. Hence the delivery of 5G data rates delivery via Wireless WAN in rural areas can be achieved by utilizing the causal factors of the identified models for Community Based Networks....

  3. Dynamic Pathloss Model for Future Mobile Communication Networks

    DEFF Research Database (Denmark)

    Kumar, Ambuj; Mihovska, Albena Dimitrova; Prasad, Ramjee

    2016-01-01

    that are essentially static. Therefore, once the signal level drops beyond the predicted values due to any variance in the environmental conditions, very crowded areas may not be catered well enough by the deployed network that had been designed with the static path loss model. This paper proposes an approach......— Future mobile communication networks (MCNs) are expected to be more intelligent and proactive based on new capabilities that increase agility and performance. However, for any successful mobile network service, the dexterity in network deployment is a key factor. The efficiency of the network...... planning depends on how congruent the chosen path loss model and real propagation are. Various path loss models have been developed that predict the signal propagation in various morphological and climatic environments; however they consider only those physical parameters of the network environment...

  4. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    Results are reported for basic research in mobile wireless communication networks for tactical applications including investigations of new methods for error-control coding and decoding, modulation...

  5. Hybrid Mobile Communication Networks for Planetary Exploration

    Science.gov (United States)

    Alena, Richard; Lee, Charles; Walker, Edward; Osenfort, John; Stone, Thom

    2007-01-01

    A paper discusses the continuing work of the Mobile Exploration System Project, which has been performing studies toward the design of hybrid communication networks for future exploratory missions to remote planets. A typical network could include stationary radio transceivers on a remote planet, mobile radio transceivers carried by humans and robots on the planet, terrestrial units connected via the Internet to an interplanetary communication system, and radio relay transceivers aboard spacecraft in orbit about the planet. Prior studies have included tests on prototypes of these networks deployed in Arctic and desert regions chosen to approximate environmental conditions on Mars. Starting from the findings of the prior studies, the paper discusses methods of analysis, design, and testing of the hybrid communication networks. It identifies key radio-frequency (RF) and network engineering issues. Notable among these issues is the study of wireless LAN throughput loss due to repeater use, RF signal strength, and network latency variations. Another major issue is that of using RF-link analysis to ensure adequate link margin in the face of statistical variations in signal strengths.

  6. Capacity Dimensioning for 5G Mobile Heterogeneous Networks

    DEFF Research Database (Denmark)

    Marcano, Andrea

    2018-01-01

    , special emphasis is done in how to mitigate the effects of the intra-cell interference. From the simulations results it is shown that such interference can diminish the capacity benefits of NOMA if adequate methods are not used to account for it, especially in scenarios where NOMA coexist with other...... multiple access schemes. An approach considering transmission parameters adjustments done at the base station for NOMA is proposed; showing that with such type of adjustments the network can significantly benefit from the high capacity that NOMA offers. The importance of the user pairing method...... in the performance of NOMA is also addressed, confirming that the increase in the network capacity is directly related to the user-pairing algorithm. Moreover, it is shown that a flexible selection of the pairing algorithm subject to the load conditions in the network is preferred, since it can provide a balance...

  7. Massive MIMO 5G Cellular Networks:mm-Wave vs.μ-Wave Frequencies

    Institute of Scientific and Technical Information of China (English)

    Stefano Buzzi; Carmen D'Andrea

    2017-01-01

    Enhanced mobile broadband (eMBB) is one of the key use-cases for the development of the new standard 5G New Radio for the next generation of mobile wireless networks. Large-scale antenna arrays, a.k.a. massive multiple-input multiple-output (MIMO), the usage of carrier frequencies in the range 10-100 GHz, the so-called millimeter wave (mm-Wave) band, and the network densifica-tion with the introduction of small-sized cells are the three technologies that will permit implementing eMBB services and realiz-ing the Gbit/s mobile wireless experience. This paper is focused on the massive MIMO technology. Initially conceived for conven-tional cellular frequencies in the sub-6 GHz range (μ-Wave), the massive MIMO concept has been then progressively extended to the case in which mm-Wave frequencies are used. However, due to different propagation mechanisms in urban scenarios, the re-sulting MIMO channel models at μ-Wave and mm-Wave are radically different. Six key basic differences are pinpointed in this paper, along with the implications that they have on the architecture and algorithms of the communication transceivers and on the attainable performance in terms of reliability and multiplexing capabilities.

  8. Analysis and Testing of Mobile Wireless Networks

    Science.gov (United States)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  9. Envisioning Networked Urban Mobilities : Art, Performances, Impacts

    NARCIS (Netherlands)

    Kjaerulf, Aslak Aamot; Kesselring, Sven; Peters, Peter; Hannam, Kevin

    2017-01-01

    Envisioning Networked Urban Mobilities brings together scientific reflections on the relations of art and urban mobilities and artistic research on the topic. The editors open the book by setting out the concept grounded in the exhibition curated by Aslak Aamot Kjærulff and refers to earlier work on

  10. Context-Aware Community Construction in Proximity-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Na Yu

    2015-01-01

    Full Text Available Sensor-equipped mobile devices have allowed users to participate in various social networking services. We focus on proximity-based mobile social networking environments where users can share information obtained from different places via their mobile devices when they are in proximity. Since people are more likely to share information if they can benefit from the sharing or if they think the information is of interest to others, there might exist community structures where users who share information more often are grouped together. Communities in proximity-based mobile networks represent social groups where connections are built when people are in proximity. We consider information influence (i.e., specify who shares information with whom as the connection and the space and time related to the shared information as the contexts. To model the potential information influences, we construct an influence graph by integrating the space and time contexts into the proximity-based contacts of mobile users. Further, we propose a two-phase strategy to detect and track context-aware communities based on the influence graph and show how the context-aware community structure improves the performance of two types of mobile social applications.

  11. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    OpenAIRE

    Santosh Kumar S C Sharma Bhupendra Suman

    2011-01-01

    A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices) to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories-...

  12. The Data Age of Mobile Cellular Network in Germany and China: Policies, Technologies and Markets (Part Ⅱ)

    Institute of Scientific and Technical Information of China (English)

    Shi Mingtao

    2009-01-01

    The UMTS auction in 2000 brought approximately 100 billion DM (Deutsche Mark) for the German National Treasury. T-Mobile (D1-Netz), Vodafone (D2-Netz), E-Plus (E1-Netz) and 02 (E2-Netz) have gradually evolved from GSM to full-fledged UMTS operators over the past years. The conglomerate of China Telecom was split twice. China acceded to WTO and promulgated the FITE Provisions. MIIT (Ministry of Industry and Information Technology) became the regulator and China Netcom was incorporated into China Unicorn in 2008. Most recently the layout of 3G future has been reconfirmed by MIIT. Voice service has remained the main source of income in both countries and operators have continued to focus on voice quality and network availability in their respective 2G networks. Because value-added and higher-speed data applications have been gaining market attention, 2.5G and 3G infrastructure has increasingly become the focal network strategy for the operators since the beginning of the new century. Germany has rolled out WCDMA/UMTS services on a large scale in the consumer market, while China has adopted all three 3G standards (TD-SCDMA, WCDMA/UMTS, CDMA2000), which shall gradually capture a wider 3G subscriber base. The summary shows that the development of the cellular technology and market in Germany and China can be discussed in three distinct historical periods. The conclusion suggests that the case of the cellular technology appears to be consistent with and applicable to a number of arguments widely disputed in economics and management related to technology and innovation, such as dominant design, technology waves/ S-Curve, disruptive technologies, Technology Adoption Life Cycle.

  13. Modeling the Propagation of Mobile Phone Virus under Complex Network

    Science.gov (United States)

    Yang, Wei; Wei, Xi-liang; Guo, Hao; An, Gang; Guo, Lei

    2014-01-01

    Mobile phone virus is a rogue program written to propagate from one phone to another, which can take control of a mobile device by exploiting its vulnerabilities. In this paper the propagation model of mobile phone virus is tackled to understand how particular factors can affect its propagation and design effective containment strategies to suppress mobile phone virus. Two different propagation models of mobile phone viruses under the complex network are proposed in this paper. One is intended to describe the propagation of user-tricking virus, and the other is to describe the propagation of the vulnerability-exploiting virus. Based on the traditional epidemic models, the characteristics of mobile phone viruses and the network topology structure are incorporated into our models. A detailed analysis is conducted to analyze the propagation models. Through analysis, the stable infection-free equilibrium point and the stability condition are derived. Finally, considering the network topology, the numerical and simulation experiments are carried out. Results indicate that both models are correct and suitable for describing the spread of two different mobile phone viruses, respectively. PMID:25133209

  14. Networked Mobilities and Performative Urban Environments

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    , an increasing number of such mobile practices are mediated by technologies of tangible and less tangible sorts. Thus by focusing on the complex relationship between material and virtual technologies within the sphere of mobility it is shown that we need to move beyond dichotomies of; global or local, nomad...... or sedentary, digital or material. The paper investigates the meaning of mobility and the potential in mediation and technologies to enhance the experiences and interaction in relation to urban transit spaces. In understanding the importance of mediation, global-local interactions, networks....... By studying embedded technologies and ‘ambient environments' we increase our knowledge about the over layering of the material environment with digital technologies. The presences of GPS, mediated surfaces, mobile agents (robots), RFID and other technologies that all relate to contemporary mobility practices...

  15. Improving Network Performance with Affinity based Mobility Model in Opportunistic Network

    OpenAIRE

    Suvadip Batabyal; Parama Bhaumik

    2012-01-01

    Opportunistic network is a type of Delay Tolerant Network which is characterized by intermittent connectivity amongst the nodes and communication largely depends upon the mobility of the participating nodes. The network being highly dynamic, traditional MANET protocols cannot be applied and the nodes must adhere to store-carry-forward mechanism. Nodes do not have the information about the network topology, number of participating nodes and the location of the destination node. Hence, message ...

  16. Providing end-to-end QoS for multimedia applications in 3G wireless networks

    Science.gov (United States)

    Guo, Katherine; Rangarajan, Samapth; Siddiqui, M. A.; Paul, Sanjoy

    2003-11-01

    As the usage of wireless packet data services increases, wireless carriers today are faced with the challenge of offering multimedia applications with QoS requirements within current 3G data networks. End-to-end QoS requires support at the application, network, link and medium access control (MAC) layers. We discuss existing CDMA2000 network architecture and show its shortcomings that prevent supporting multiple classes of traffic at the Radio Access Network (RAN). We then propose changes in RAN within the standards framework that enable support for multiple traffic classes. In addition, we discuss how Session Initiation Protocol (SIP) can be augmented with QoS signaling for supporting end-to-end QoS. We also review state of the art scheduling algorithms at the base station and provide possible extensions to these algorithms to support different classes of traffic as well as different classes of users.

  17. Sunrise deploys mobile network for CERN

    CERN Multimedia

    2004-01-01

    Sunrise, the alternative telecoms provider in Switzerland, is finalizing the installation of a mobile network comprising about forty sites located around the new particle accelerator at CERN (1 paragraph)

  18. Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications

    Directory of Open Access Journals (Sweden)

    Yong Deng

    2016-01-01

    Full Text Available The explosive use of smart devices enabled the emergence of collective resource sharing among mobile individuals. Mobile users need to cooperate with each other to improve the whole network’s quality of service. By modeling the cooperative behaviors in a mobile crowd into an evolutionary Prisoner’s dilemma game, we investigate the relationships between cooperation rate and some main influence factors, including crowd density, communication range, temptation to defect, and mobility attributes. Using evolutionary game theory, our analysis on the cooperative behaviors of mobile takes a deep insight into the cooperation promotion in a dynamical network with selfish autonomous users. The experiment results show that mobile user’s features, including speed, moving probability, and reaction radius, have an obvious influence on the formation of a cooperative mobile social network. We also found some optimal status when the crowd’s cooperation rate reaches the best. These findings are important if we want to establish a mobile social network with a good performance.

  19. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  20. Mobile network architecture of the long-range WindScanner system

    OpenAIRE

    Vasiljevic, Nikola; Lea, Guillaume; Hansen, Per; Jensen, Henrik M.

    2016-01-01

    In this report we have presented the network architecture of the long-range WindScanner system that allows utilization of mobile network connections without the use of static public IP addresses. The architecture mitigates the issues of additional fees and contractual obligations that are linked to the acquisition of the mobile network connections with static public IP addresses. The architecture consists of a hardware VPN solution based on the network appliances Z1 and MX60 from Cisco Meraki...

  1. 4G Mobile Broadband Networks

    DEFF Research Database (Denmark)

    Kardaras, Georgios

    This thesis has investigated a number of methods for optimizing energy and spectrum performance for 4G commercial radio access applications. The research interest is narrowed down to distributed base station architectures and in particular the remote radio module. Designing energy efficient radio...... and a comparison with conventional base station architectures was realized. This analysis demonstrated that efficient hardware, intelligent software and self-organized subsystems can result in decreasing substantially power wastes. The advantages of optical fiber as transport medium for relaying baseband modulated...... digital predistortion block is proposed based on cartesian to polar conversion. It has been designed and implemented on a low-cost FPGA, overcoming the challenges imposed by the logical size and timing constraints....

  2. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  3. Decentralized coverage control problems for mobile robotic sensor and actuator networks

    CERN Document Server

    Savkin, A; Xi, Z; Javed, F; Matveev, A; Nguyen, H

    2015-01-01

    This book introduces various coverage control problems for mobile sensor networks including barrier, sweep and blanket. Unlike many existing algorithms, all of the robotic sensor and actuator motion algorithms developed in the book are fully decentralized or distributed, computationally efficient, easily implementable in engineering practice and based only on information on the closest neighbours of each mobile sensor and actuator and local information about the environment. Moreover, the mobile robotic sensors have no prior information about the environment in which they operation. These various types of coverage problems have never been covered before by a single book in a systematic way. Another topic of this book is the study of mobile robotic sensor and actuator networks. Many modern engineering applications include the use of sensor and actuator networks to provide efficient and effective monitoring and control of industrial and environmental processes. Such mobile sensor and actuator networks are abl...

  4. [Mobile-phone e-mail use, social networks, and loneliness among Japanese high school students].

    Science.gov (United States)

    Ogata, Yasuko; Izumi, Yukiko; Kitaike, Tadashi

    2006-07-01

    The purposes of this study were to assess the loneliness of Japanese high school students who own and use a mobile phone, to clarify the relationships between students' loneliness and their social network and frequency of use of e-mail feature, and to demonstrate relationships with a student's social network and recognition of the benefits and drawbacks of mobile phone use. The participants were 227 students from two classes in each grade of a high school in the Kanto region of Japan. Participants answered a questionnaire covering the UCLA Loneliness Scale as well as questions pertaining to the circumstances of use of their mobile phones, their social networks (e.g., number of friends), and their perceptions of the benefits and drawbacks of mobile phone use. The questionnaires of students owning a mobile phone were analyzed. Total scores for the UCLA Loneliness Scale were calculated, and factor analysis was performed for the benefits and drawbacks. A total of 220 questionnaires were returned, for which 94.1 percent of respondents owned a mobile phone. The percentages of male and female respondents were 58% and 42%. Chronbach's alpha for the UCLA Loneliness Scale (total score) was 0.87, a result similar to previous studies with high school and university students. Factor analysis revealed five factors associated with the benefits and drawbacks of mobile phone use. Multiple-regression analysis showed that 42.9% of the variance in "frequency of e-mail use" was explained by grade level, frequency of mobile phone use, and two of the five factors from the benefits and drawbacks ("difficulty of communication," and "possible sleep loss due to nighttime e-mailing"). Stepwise multiple-regression analysis revealed that 24.4% of the variance in UCLA Loneliness Score was explained by gender, the frequency of e-mail use, the number of friends and the presence/absence of a girlfriend or boyfriend. Presence of an active social network and frequent e-mailing by mobile phone reduced

  5. No effects of a single 3G UMTS mobile phone exposure on spontaneous EEG activity, ERP correlates, and automatic deviance detection.

    Science.gov (United States)

    Trunk, Attila; Stefanics, Gábor; Zentai, Norbert; Kovács-Bálint, Zsófia; Thuróczy, György; Hernádi, István

    2013-01-01

    Potential effects of a 30 min exposure to third generation (3G) Universal Mobile Telecommunications System (UMTS) mobile phone-like electromagnetic fields (EMFs) were investigated on human brain electrical activity in two experiments. In the first experiment, spontaneous electroencephalography (sEEG) was analyzed (n = 17); in the second experiment, auditory event-related potentials (ERPs) and automatic deviance detection processes reflected by mismatch negativity (MMN) were investigated in a passive oddball paradigm (n = 26). Both sEEG and ERP experiments followed a double-blind protocol where subjects were exposed to either genuine or sham irradiation in two separate sessions. In both experiments, electroencephalograms (EEG) were recorded at midline electrode sites before and after exposure while subjects were watching a silent documentary. Spectral power of sEEG data was analyzed in the delta, theta, alpha, and beta frequency bands. In the ERP experiment, subjects were presented with a random series of standard (90%) and frequency-deviant (10%) tones in a passive binaural oddball paradigm. The amplitude and latency of the P50, N100, P200, MMN, and P3a components were analyzed. We found no measurable effects of a 30 min 3G mobile phone irradiation on the EEG spectral power in any frequency band studied. Also, we found no significant effects of EMF irradiation on the amplitude and latency of any of the ERP components. In summary, the present results do not support the notion that a 30 min unilateral 3G EMF exposure interferes with human sEEG activity, auditory evoked potentials or automatic deviance detection indexed by MMN. Copyright © 2012 Wiley Periodicals, Inc.

  6. RoCoMAR: Robots' Controllable Mobility Aided Routing and Relay Architecture for Mobile Sensor Networks

    Science.gov (United States)

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2013-01-01

    In a practical deployment, mobile sensor network (MSN) suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots' Controllable Mobility Aided Routing) that uses robotic nodes' controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay. PMID:23881134

  7. RoCoMAR: Robots’ Controllable Mobility Aided Routing and Relay Architecture for Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Seokhoon Yoon

    2013-07-01

    Full Text Available In a practical deployment, mobile sensor network (MSN suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots’ Controllable Mobility Aided Routing that uses robotic nodes’ controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay.

  8. Hierarchical Trust Management of COI in Heterogeneous Mobile Networks

    Science.gov (United States)

    2017-08-01

    Report: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks The views, opinions and/or findings contained in this report are those of...Institute & State University Title: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks Report Term: 0-Other Email: irchen@vt.edu...Reconfigurability, Survivability and Intrusion Tolerance for Community of Interest (COI) Applications – Our proposed COI trust management protocol will

  9. Meeting fronthaul challenges of future mobile network deployments — The HARP approach

    DEFF Research Database (Denmark)

    Dittmann, Lars; Christiansen, Henrik Lehrmann; Checko, Aleksandra

    2014-01-01

    In future mobile networks aggregation at different levels is necessary but at the same time imposes challenges that mandate looking into new architectures. This paper presents the design consideration approach for a C-RAN based mobile aggregation network used in the EU HARP project....... With this architecture fronthaul aggregation is performed which might be an option for future generation of mobile networks....

  10. Virtual Private Networks for mobile environments. Development of protocol for mobile security and algorithms for location update.

    OpenAIRE

    Tzvetkov, Vesselin Dimitrov

    2010-01-01

    The classical networks for broadcast, telephony and data are converging to services on the Next Generation Networks (NGN), which are introduced by all major Service Providers (SP). Major requirements on the future IP network are security and mobility, which are reflection of the Internet’s importance and wide use of portable smart devices. Secure IP mobility is the focus of this thesis, i.e. how the user can move through different access networks whilst maintaining uninterrupted and secure IP...

  11. An improved network layer protocol based on mobile IPv6

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The mobile [Pv6 proposed by the IETF aims at providing mobility support on the next generation Internet. First, the authors described the basic principle of mobile lPv6 in brief and analyzed the advantages and disadvantages of it, presented a new idea of allocating a specific address space for mobile node ( MN ) and developed a new extension header and two ICMP message types for mobile IPv6. Lastly the authors proposed an optimization strategy, for mobile IPv6 based on these extensions of protocol, which has the following advantages:1 ) It is more convenient to manage the MNs because MN can be judged from its IP address; 2) When the correspondent node (CN) is not actively communicating with a MN, the MN and its home agent (HA) need not send Binding Update to tire CN, and the CN need not send Binding Request to the MN. Only when the CN really wants to send a packet to the MN, will the CN voluntarily send a MN Discover Request message to acquire the MN's care-of address. In this way, the transmission of Binding Update and Binding Request is greatly reduced, consequently the network overhead is also decreased; 3) While sending packets, the CN simply uses a MN Home Address Extension Header without using IPinlP encapsulation and routing header, which can reduce the redundant information in the packet and the message delay; 4) All the packets sent by the CN can be directly routed to the MN and the triangle routing can be completely avoided. By using these protocol extensions, the overhead of the network is greatly reduced and the network quality of services (QoS) is improved.

  12. 双卡双待移动终端锁网方案研究%Research on network locking scheme for DCDS mobile terminal

    Institute of Scientific and Technical Information of China (English)

    高杰; 张岳彤; 包志祥

    2015-01-01

    Since the competition of mobile communication market becomes more intense with the arrival of 3G & 4G mobile communication era,communication operators launch series marketing strategies including charging phone calls for free mobile phone or cheap sale of mobile phone. In this situation,to ensure operators′ legal rights and interests,network locking function has become the operators′ basic requirements for customized mobile terminal gradually. How to meet the demands of customers′personalization and intelligentization to the utmost while ensuring operators′ legal rights and interests,becomes the important problem that the DCDS mobile terminal network locking is faced. As for current DCDS mobile terminal network locking tech⁃niques,three different kinds of network locking technologies were formed. In this paper,three DCDS network locking schemes are introduced,and a new DCDS network locking scheme based on them is proposed.%随着3G乃至4G移动通信时代的到来,移动通信市场的竞争越来越激烈,各运营商推出了充话费送手机或廉价出售手机等一系列的营销策略。这种情况下,为了充分保证自己的合法权益,锁网功能逐渐成为运营商定制移动终端的基本需求。同时,双卡双待移动终端在整个终端市场上的占比也越来越高。如何能在满足运营商合法权益的前提下,最大限度地兼顾到客户的个性化和智能化需求,成为双卡双待移动终端锁网所面临的重要问题。就当前双卡双待移动终端锁网技术领域的发展而言,形成了三种方式各异的锁网技术,对这三种锁网技术方案进行了介绍,并在此基础上提出了一种新的双卡双待移动终端锁网方案。

  13. The association between socioeconomic status and exposure to mobile telecommunication networks in children and adolescents.

    Science.gov (United States)

    Thomas, Silke; Heinrich, Sabine; Kühnlein, Anja; Radon, Katja

    2010-01-01

    A potential association between socioeconomic status (SES) and self-reported use of mobile phones has been investigated in a few studies. If measured exposure to mobile phone networks differs by SES in children, it has not yet been studied. Interview data of 1,481 children and 1,505 adolescents on participants' mobile phone use, socio-demographic characteristics and potential confounders were taken from the German MobilEe-study. Sociodemographic data was used to stratify participants into three "status groups" (low, middle, high). Using a personal dosimeter, we obtained an exposure profile over 24 h for each of the participants. Exposure levels during waking hours were expressed as mean percentage of the reference level. Children with a low SES were more likely to own a mobile phone (OR 2.1; 95% CI: 1.1-3.9) and also reported to use their mobile phone longer per day (OR 2.4; 95% CI: 1.1-5.4) than children with a high SES. For adolescents, self-reported duration of mobile phone use per day was also higher with a low SES (OR: 3.4; 95% CI: 1.4-8.4) compared with a high SES. No association between SES and measured exposure to mobile telecommunication networks was seen for children or adolescents. Mobile phone use may differ between status groups with higher use among disadvantaged groups. However, this does not result in higher overall exposure to mobile telecommunication networks. Whether short duration of own mobile phone use or the small numbers of participants with a low SES are causal, have to be investigated in further studies. (c) 2009 Wiley-Liss, Inc.

  14. SMR-Based Adaptive Mobility Management Scheme in Hierarchical SIP Networks

    Directory of Open Access Journals (Sweden)

    KwangHee Choi

    2014-10-01

    Full Text Available In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR, which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks.

  15. Detection of mobile user location on next generation wireless networks

    DEFF Research Database (Denmark)

    Schou, Saowanee; Olesen, Henning

    2005-01-01

    This paper proposes a novel conceptual mechanism for detecting the location of a mobile user on next generation wireless networks. This mechanism can provide location information of a mobile user at different levels of accuracy, by applying the movement detection mechanism of Mobile IPv6 at both...... macro- and micromobility level. In this scheme, an intradomain mobility management protocol (IDMP) is applied to manage the location of the mobile terminal. The mobile terminal needs two care-of addresses, a global care-of address (GCoA) and a local care-of address (LCoA). The current location...... of a Mobile IPv6 device can be determined by mapping the geographical location information with the two care-of-addresses and the physical address of the access point where the user is connected. Such a mechanism makes location services for mobile entities available on a global IP network. The end-users can...

  16. Mobile Networked Sensors for Environmental Observatories

    Science.gov (United States)

    Kaiser, W. J.

    2005-12-01

    carried by NIMS include sensors for visible wavelength imaging, thermal infrared temperature mapping, microclimate, solar radiation, and for water quality and physical characterization of aquatic systems. NIMS devices include compact embedded computing, wireless network connectivity to surrounding static sensors, and remote Internet access. Exploiting this onboard computing allows NIMS devices to follow precise scanning protocols and self-calibration procedures. This presentation will describe permanent facility NIMS systems deployed at the James San Jacinto Mountains Reserve. Rapidly deployable NIMS permitting short term, highly mobile experiments will also be discussed. This includes the Thermal Mapper system that simultaneously samples plant physical structure (using laser position sensing and imaging) along with plant surface temperature (using high spatial resolution thermal infrared sensing). This compact system has been applied to the investigation of thermal characteristics of alpine plants in varying soil surfaces at the White Mountains Research Station. Other NIMS applications and results to be described include novel spatial mapping of nitrate concentration and other variables in flowing streams. Finally, this presentation will also address the many future applications of observatories linking investigators with remote mobile and static sensor networks. This research is supported by the NSF0331481 ITR program. Research has been performed in collaboration with R. Ambrose, K. Bible, D. Estrin, E. Graham, M. Hamilton, M. Hanson, T. Harmon, G. Pottie, P. Rundel, M. Srivastava, and G. Sukhatme

  17. Traffic sharing algorithms for hybrid mobile networks

    Science.gov (United States)

    Arcand, S.; Murthy, K. M. S.; Hafez, R.

    1995-01-01

    In a hybrid (terrestrial + satellite) mobile personal communications networks environment, a large size satellite footprint (supercell) overlays on a large number of smaller size, contiguous terrestrial cells. We assume that the users have either a terrestrial only single mode terminal (SMT) or a terrestrial/satellite dual mode terminal (DMT) and the ratio of DMT to the total terminals is defined gamma. It is assumed that the call assignments to and handovers between terrestrial cells and satellite supercells take place in a dynamic fashion when necessary. The objectives of this paper are twofold, (1) to propose and define a class of traffic sharing algorithms to manage terrestrial and satellite network resources efficiently by handling call handovers dynamically, and (2) to analyze and evaluate the algorithms by maximizing the traffic load handling capability (defined in erl/cell) over a wide range of terminal ratios (gamma) given an acceptable range of blocking probabilities. Two of the algorithms (G & S) in the proposed class perform extremely well for a wide range of gamma.

  18. SDN Controlled mmWave Massive MIMO Hybrid Precoding for 5G Heterogeneous Mobile Systems

    Directory of Open Access Journals (Sweden)

    Na Chen

    2016-01-01

    Full Text Available In 5G mobile network, millimeter wave (mmWave and heterogeneous networks (Hetnets are significant techniques to sustain coverage and spectral efficiency. In this paper, we utilize the hybrid precoding to overcome hardware constraints on the analog-only beamforming in mmWave systems. Particularly, we identify the complicated antenna coordination and vast spatial domain information as the outstanding challenges in mmWave Hetnets. In our work, we employ software defined network (SDN to accomplish radio resource management (RRM and achieve flexible spacial coordination in mmWave Hetnets. In our proposed scheme, SDN controller is responsible for collecting the user channel state information (CSI and applying hybrid precoding based on the calculated null-space of victim users. Simulation results show that our design can effectively reduce the interference to victim users and support high quality of service.

  19. An access alternative for mobile satellite networks

    Science.gov (United States)

    Wu, W. W.

    1988-01-01

    Conceptually, this paper discusses strategies of digital satellite communication networks for a very large number of low density traffic stations. These stations can be either aeronautical, land mobile, or maritime. The techniques can be applied to international, domestic, regional, and special purpose satellite networks. The applications can be commercial, scientific, military, emergency, navigational or educational. The key strategy is the use of a non-orthogonal access method, which tolerates overlapping signals. With n being either time or frequency partitions, and with a single overlapping signal allowed, a low cost mobile satellite system can be designed with n squared (n squared + n + 1) number of terminals.

  20. Mobile agents affect worm spreading in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Huang, Zi-Gang; Sun, Jin-Tu; Wang, Ying-Hai; Wang, Sheng-Jun; Xu, Xin-Jian

    2009-01-01

    Considering the dynamic nature of portable computing devices with wireless communication capability, an extended model is introduced for worm spreading in the wireless ad hoc network, with a population of mobile agents in a planar distribution, starting from an initial infected seed. The effect of agents' mobility on worm spreading is investigated via extensive Monte Carlo simulations. The threshold behavior and the dynamics of worm epidemics in the wireless networks are greatly affected by both agents' mobility and spatial and temporal correlations. The medium access control mechanism for the wireless communication promotes the sensitivity of the spreading dynamics to agents' mobility

  1. A network analytical approach to the study of labour market mobility

    DEFF Research Database (Denmark)

    Toubøl, Jonas; Larsen, Anton Grau; Jensen, Carsten Strøby

    (RR), which enable us to identify clusters of inter-mobile categories. We apply the method to data of the labour market mobility in Denmark 2000-2007 and demonstrate how this new method can overcome some long standing obstacles to the advance of labour market segmentation theory: Instead...... of the typical theory driven definition of the labour market segments, the use of social network analysis enable a data driven definition of the segments based on the direct observation of mobility between job-positions, which reveals a number of new findings.......The aim of this paper is to present a new network analytical method for analysis of social mobility between categories like occupations or industries. The method consists of two core components; the algorithm MONECA (Mobility Network Clustering Algorithm), and the intensity measure of Relative Risk...

  2. fraud detection in mobile communications networks using user

    African Journals Online (AJOL)

    DEPT OF AGRICULTURAL ENGINEERING

    Fraud detection is an important application, since network operators lose a relevant portion of their revenue to fraud. ... testing the methods with data from real mobile communications networks. Keywords: Call data, fraud ...... Ph. D. thesis. Pur-.

  3. Autophagy is required for stem cell mobilization by G-CSF

    DEFF Research Database (Denmark)

    Leveque-El Mouttie, Lucie; Vu, Therese; Lineburg, Katie E.

    2015-01-01

    Granulocyte colony-stimulating factor (G-CSF) is widely used clinically to prevent neutropenia after cytotoxic chemotherapy and to mobilize hematopoietic stem cells (HSCs) for transplantation. Autophagy, a process of cytoplasmic component recycling, maintains cellular homeostasis and protects...... the cell during periods of metabolic stress or nutrient deprivation. We have observed that G-CSF activates autophagy in neutrophils and HSCs from both mouse and human donors. Furthermore, G-CSF-induced neutrophil and HSC mobilization is impaired in the absence of autophagy. In contrast, autophagy...... is dispensable for direct HSC mobilization in response to the CXCR4 antagonist AMD3100. Altogether, these data demonstrate an important role for G-CSF in invoking autophagy within hematopoietic and myeloid cells and suggest that this pathway is critical for ensuring cell survival in response to clinically...

  4. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  5. Composite Social Network for Predicting Mobile Apps Installation

    Science.gov (United States)

    2011-06-02

    Social network tools (such as the Facebook app and the Twitter app) can observe users’ online friendship network . In this work, our key idea is...the friendship network from phones by collecting data from social networking apps such as the Facebook and Twitter apps. We summarize all the networks ...ar X iv :1 10 6. 03 59 v1 [ cs .S I] 2 J un 2 01 1 Composite Social Network for Predicting Mobile Apps Installation Wei Pan

  6. Enabling technologies for millimeter-wave radio-over-fiber systems in next generation heterogeneous mobile access networks

    Science.gov (United States)

    Zhang, Junwen; Yu, Jianjun; Wang, Jing; Xu, Mu; Cheng, Lin; Lu, Feng; Shen, Shuyi; Yan, Yan; Cho, Hyunwoo; Guidotti, Daniel; Chang, Gee-kung

    2017-01-01

    Fifth-generation (5G) wireless access network promises to support higher access data rate with more than 1,000 times capacity with respect to current long-term evolution (LTE) systems. New radio-access-technologies (RATs) based on higher carrier frequencies to millimeter-wave (MMW) radio-over-fiber, and carrier-aggregation (CA) using multi-band resources are intensively studied to support the high data rate access and effectively use of frequency resources in heterogeneous mobile network (Het-Net). In this paper, we investigate several enabling technologies for MMW RoF systems in 5G Het-Net. Efficient mobile fronthaul (MFH) solutions for 5G centralized radio access network (C-RAN) and beyond are proposed, analyzed and experimentally demonstrated based on the analog scheme. Digital predistortion based on memory polynomial for analog MFH linearization are presented with improved EVM performances and receiver sensitivity. We also propose and experimentally demonstrate a novel inter-/intra- RAT CA scheme for 5G Het- Net. The real-time standard 4G-LTE signal is carrier-aggregated with three broadband 60GHz MMW signals based on proposed optical-domain band-mapping method. RATs based on new waveforms have also been studied here to achieve higher spectral-efficiency (SE) in asynchronous environments. Full-duplex asynchronous quasi-gapless carrier aggregation scheme for MMW ROF inter-/intra-RAT based on the FBMC is also presented with 4G-LTE signals. Compared with OFDM-based signals with large guard-bands, FBMC achieves higher spectral-efficiency with better EVM performance at less received power and smaller guard-bands.

  7. An Intelligent Cooperative Visual Sensor Network for Urban Mobility.

    Science.gov (United States)

    Leone, Giuseppe Riccardo; Moroni, Davide; Pieri, Gabriele; Petracca, Matteo; Salvetti, Ovidio; Azzarà, Andrea; Marino, Francesco

    2017-11-10

    Smart cities are demanding solutions for improved traffic efficiency, in order to guarantee optimal access to mobility resources available in urban areas. Intelligent video analytics deployed directly on board embedded sensors offers great opportunities to gather highly informative data about traffic and transport, allowing reconstruction of a real-time neat picture of urban mobility patterns. In this paper, we present a visual sensor network in which each node embeds computer vision logics for analyzing in real time urban traffic. The nodes in the network share their perceptions and build a global and comprehensive interpretation of the analyzed scenes in a cooperative and adaptive fashion. This is possible thanks to an especially designed Internet of Things (IoT) compliant middleware which encompasses in-network event composition as well as full support of Machine-2-Machine (M2M) communication mechanism. The potential of the proposed cooperative visual sensor network is shown with two sample applications in urban mobility connected to the estimation of vehicular flows and parking management. Besides providing detailed results of each key component of the proposed solution, the validity of the approach is demonstrated by extensive field tests that proved the suitability of the system in providing a scalable, adaptable and extensible data collection layer for managing and understanding mobility in smart cities.

  8. ASH : Tackling node mobility in large-scale networks

    NARCIS (Netherlands)

    Pruteanu, A.; Dulman, S.

    2012-01-01

    With the increased adoption of technologies likewireless sensor networks by real-world applications, dynamic network topologies are becoming the rule rather than the exception. Node mobility, however, introduces a range of problems (communication interference, path uncertainty, low quality of

  9. Accessing data transfer reliability for duty cycled mobile wireless sensor network

    International Nuclear Information System (INIS)

    Shaikh, F.K.

    2014-01-01

    Mobility in WSNs (Wireless Sensor Networks) introduces significant challenges which do not arise in static WSNs. Reliable data transport is an important aspect of attaining consistency and QoS (Quality of Service) in several applications of MWSNs (Mobile Wireless Sensor Networks). It is important to understand how each of the wireless sensor networking characteristics such as duty cycling, collisions, contention and mobility affects the reliability of data transfer. If reliability is not managed well, the MWSN can suffer from overheads which reduce its applicability in the real world. In this paper, reliability assessment is being studied by deploying MWSN in different indoor and outdoor scenarios with various duty cycles of the motes and speeds of the mobile mote. Results show that the reliability is greatly affected by the duty cycled motes and the mobility using inherent broadcast mechanisms. (author)

  10. Securing DSR with mobile agents in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Abosamra

    2011-03-01

    Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.

  11. DRO: domain-based route optimization scheme for nested mobile networks

    Directory of Open Access Journals (Sweden)

    Chuang Ming-Chin

    2011-01-01

    Full Text Available Abstract The network mobility (NEMO basic support protocol is designed to support NEMO management, and to ensure communication continuity between nodes in mobile networks. However, in nested mobile networks, NEMO suffers from the pinball routing problem, which results in long packet transmission delays. To solve the problem, we propose a domain-based route optimization (DRO scheme that incorporates a domain-based network architecture and ad hoc routing protocols for route optimization. DRO also improves the intra-domain handoff performance, reduces the convergence time during route optimization, and avoids the out-of-sequence packet problem. A detailed performance analysis and simulations were conducted to evaluate the scheme. The results demonstrate that DRO outperforms existing mechanisms in terms of packet transmission delay (i.e., better route-optimization, intra-domain handoff latency, convergence time, and packet tunneling overhead.

  12. Epidemic transmission on random mobile network with diverse infection periods

    Science.gov (United States)

    Li, Kezan; Yu, Hong; Zeng, Zhaorong; Ding, Yong; Ma, Zhongjun

    2015-05-01

    The heterogeneity of individual susceptibility and infectivity and time-varying topological structure are two realistic factors when we study epidemics on complex networks. Current research results have shown that the heterogeneity of individual susceptibility and infectivity can increase the epidemic threshold in a random mobile dynamical network with the same infection period. In this paper, we will focus on random mobile dynamical networks with diverse infection periods due to people's different constitutions and external circumstances. Theoretical results indicate that the epidemic threshold of the random mobile network with diverse infection periods is larger than the counterpart with the same infection period. Moreover, the heterogeneity of individual susceptibility and infectivity can play a significant impact on disease transmission. In particular, the homogeneity of individuals will avail to the spreading of epidemics. Numerical examples verify further our theoretical results very well.

  13. Handover Based IMS Registration Scheme for Next Generation Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shireen Tahira

    2017-01-01

    Full Text Available Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming and massive data sharing in social and communication networks. In these networks, user equipment has to register with IP Multimedia Subsystem (IMS which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers. We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries.

  14. Mobile human network management and recommendation by probabilistic social mining.

    Science.gov (United States)

    Min, Jun-Ki; Cho, Sung-Bae

    2011-06-01

    Recently, inferring or sharing of mobile contexts has been actively investigated as cell phones have become more than a communication device. However, most of them focused on utilizing the contexts on social network services, while the means in mining or managing the human network itself were barely considered. In this paper, the SmartPhonebook, which mines users' social connections to manage their relationships by reasoning social and personal contexts, is presented. It works like an artificial assistant which recommends the candidate callees whom the users probably would like to contact in a certain situation. Moreover, it visualizes their social contexts like closeness and relationship with others in order to let the users know their social situations. The proposed method infers the social contexts based on the contact patterns, while it extracts the personal contexts such as the users' emotional states and behaviors from the mobile logs. Here, Bayesian networks are exploited to handle the uncertainties in the mobile environment. The proposed system has been implemented with the MS Windows Mobile 2003 SE Platform on Samsung SPH-M4650 smartphone and has been tested on real-world data. The experimental results showed that the system provides an efficient and informative way for mobile social networking.

  15. Optimization Techniques for 3D Graphics Deployment on Mobile Devices

    Science.gov (United States)

    Koskela, Timo; Vatjus-Anttila, Jarkko

    2015-03-01

    3D Internet technologies are becoming essential enablers in many application areas including games, education, collaboration, navigation and social networking. The use of 3D Internet applications with mobile devices provides location-independent access and richer use context, but also performance issues. Therefore, one of the important challenges facing 3D Internet applications is the deployment of 3D graphics on mobile devices. In this article, we present an extensive survey on optimization techniques for 3D graphics deployment on mobile devices and qualitatively analyze the applicability of each technique from the standpoints of visual quality, performance and energy consumption. The analysis focuses on optimization techniques related to data-driven 3D graphics deployment, because it supports off-line use, multi-user interaction, user-created 3D graphics and creation of arbitrary 3D graphics. The outcome of the analysis facilitates the development and deployment of 3D Internet applications on mobile devices and provides guidelines for future research.

  16. Spatial spreading of infectious disease via local and national mobility networks in South Korea

    Science.gov (United States)

    Kwon, Okyu; Son, Woo-Sik

    2017-12-01

    We study the spread of infectious disease based on local- and national-scale mobility networks. We construct a local mobility network using data on urban bus services to estimate local-scale movement of people. We also construct a national mobility network from orientation-destination data of vehicular traffic between highway tollgates to evaluate national-scale movement of people. A metapopulation model is used to simulate the spread of epidemics. Thus, the number of infected people is simulated using a susceptible-infectious-recovered (SIR) model within the administrative division, and inter-division spread of infected people is determined through local and national mobility networks. In this paper, we consider two scenarios for epidemic spread. In the first, the infectious disease only spreads through local-scale movement of people, that is, the local mobility network. In the second, it spreads via both local and national mobility networks. For the former, the simulation results show infected people sequentially spread to neighboring divisions. Yet for the latter, we observe a faster spreading pattern to distant divisions. Thus, we confirm the national mobility network enhances synchronization among the incidence profiles of all administrative divisions.

  17. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS FOR MOBILE WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R. Maivizhi

    2015-06-01

    Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.

  18. Adapting Mobile Beacon-Assisted Localization in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wei Dong

    2009-04-01

    Full Text Available The ability to automatically locate sensor nodes is essential in many Wireless Sensor Network (WSN applications. To reduce the number of beacons, many mobile-assisted approaches have been proposed. Current mobile-assisted approaches for localization require special hardware or belong to centralized localization algorithms involving some deterministic approaches due to the fact that they explicitly consider the impreciseness of location estimates. In this paper, we first propose a range-free, distributed and probabilistic Mobile Beacon-assisted Localization (MBL approach for static WSNs. Then, we propose another approach based on MBL, called Adapting MBL (A-MBL, to increase the efficiency and accuracy of MBL by adapting the size of sample sets and the parameter of the dynamic model during the estimation process. Evaluation results show that the accuracy of MBL and A-MBL outperform both Mobile and Static sensor network Localization (MSL and Arrival and Departure Overlap (ADO when both of them use only a single mobile beacon for localization in static WSNs.

  19. Adapting mobile beacon-assisted localization in wireless sensor networks.

    Science.gov (United States)

    Teng, Guodong; Zheng, Kougen; Dong, Wei

    2009-01-01

    The ability to automatically locate sensor nodes is essential in many Wireless Sensor Network (WSN) applications. To reduce the number of beacons, many mobile-assisted approaches have been proposed. Current mobile-assisted approaches for localization require special hardware or belong to centralized localization algorithms involving some deterministic approaches due to the fact that they explicitly consider the impreciseness of location estimates. In this paper, we first propose a range-free, distributed and probabilistic Mobile Beacon-assisted Localization (MBL) approach for static WSNs. Then, we propose another approach based on MBL, called Adapting MBL (A-MBL), to increase the efficiency and accuracy of MBL by adapting the size of sample sets and the parameter of the dynamic model during the estimation process. Evaluation results show that the accuracy of MBL and A-MBL outperform both Mobile and Static sensor network Localization (MSL) and Arrival and Departure Overlap (ADO) when both of them use only a single mobile beacon for localization in static WSNs.

  20. Networked Mobilities and new sites of mediated interaction

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2008-01-01

    everyday life experiences the movement is much more than a travel from point A to point B. The mobile experiences of the contemporary society are practices that are meaningful and normatively embedded. That is to say, mobility is seen as a cultural phenomenon shaping notions of self and other as well......This paper takes point of departure in an understanding of mobility as an important cultural dimension to contemporary life. The movement of objects, signs, and people constitutes material sites of networked relationships. However, as an increasing number of mobility practices are making up our...

  1. A Novel Cache Invalidation Scheme for Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In this paper, we propose a strategy of maintaining cache consistency in wireless mobile environments, which adds a validation server (VS) into the GPRS network, utilizes the location information of mobile terminal in SGSN located at GPRS backbone, just sends invalidation information to mobile terminal which is online in accordance with the cached data, and reduces the information amount in asynchronous transmission. This strategy enables mobile terminal to access cached data with very little computing amount, little delay and arbitrary disconnection intervals, and excels the synchronous IR and asynchronous state (AS) in the total performances.

  2. Review of Key Technologies of 5G Wireless Communication System

    Directory of Open Access Journals (Sweden)

    Shi Sha

    2015-01-01

    Full Text Available The 5th generation mobile communication system (5G is oriented towards a new generation of mobile communication system to the year of 2020 and beyond, and its development is still at the exploratory stage. Combining the latest trends in mobile communication development at home and abroad, in this article, we describe the key technologies of driving the 5G research direction. Furthermore, the technical innovation of 5G comes from both wireless and network technologies. In the field of wireless technologies, massive multiple-input multiple-output (MIMO, ultra-wideband spectral, ultra-dense heterogeneous networks, have already become the focus of global industry. In the field of network technologies, a new network architecture based on software-defined networking (SDN becomes the prevailing view worldwide. Additionally, there are some other potential technologies for 5G, such as NOMA, FBMC, mm Waves, and Multi-carrier technology aggregation.

  3. Fractal Analysis of Mobile Social Networks

    International Nuclear Information System (INIS)

    Zheng Wei; Pan Qian; Sun Chen; Deng Yu-Fan; Zhao Xiao-Kang; Kang Zhao

    2016-01-01

    Fractal and self similarity of complex networks have attracted much attention in recent years. The fractal dimension is a useful method to describe the fractal property of networks. However, the fractal features of mobile social networks (MSNs) are inadequately investigated. In this work, a box-covering method based on the ratio of excluded mass to closeness centrality is presented to investigate the fractal feature of MSNs. Using this method, we find that some MSNs are fractal at different time intervals. Our simulation results indicate that the proposed method is available for analyzing the fractal property of MSNs. (paper)

  4. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  5. Network design consideration of a satellite-based mobile communications system

    Science.gov (United States)

    Yan, T.-Y.

    1986-01-01

    Technical considerations for the Mobile Satellite Experiment (MSAT-X), the ground segment testbed for the low-cost spectral efficient satellite-based mobile communications technologies being developed for the 1990's, are discussed. The Network Management Center contains a flexible resource sharing algorithm, the Demand Assigned Multiple Access scheme, which partitions the satellite transponder bandwidth among voice, data, and request channels. Satellite use of multiple UHF beams permits frequency reuse. The backhaul communications and the Telemetry, Tracking and Control traffic are provided through a single full-coverage SHF beam. Mobile Terminals communicate with the satellite using UHF. All communications including SHF-SHF between Base Stations and/or Gateways, are routed through the satellite. Because MSAT-X is an experimental network, higher level network protocols (which are service-specific) will be developed only to test the operation of the lowest three levels, the physical, data link, and network layers.

  6. Specific absorption rate variation in a brain phantom due to exposure by a 3G mobile phone: problems in dosimetry.

    Science.gov (United States)

    Behari, J; Nirala, Jay Prakash

    2013-12-01

    A specific absorption rate (SAR) measurements system has been developed for compliance testing of personal mobile phone in a brain phantom material contained in a Perspex box. The volume of the box has been chosen corresponding to the volume of a small rat and illuminated by a 3G mobile phone frequency (1718.5 MHz), and the emitted radiation directed toward brain phantom .The induced fields in the phantom material are measured. Set up to lift the plane carrying the mobile phone is run by a pulley whose motion is controlled by a stepper motor. The platform is made to move at a pre-determined rate of 2 degrees per min limited up to 20 degrees. The measured data for induced fields in various locations are used to compute corresponding SAR values and inter comparison obtained. These data are also compared with those when the mobile phone is placed horizontally with respect to the position of the animal. The SAR data is also experimentally obtained by measuring a rise in temperature due to this mobile exposures and data compared with those obtained in the previous set. To seek a comparison with the safety criteria same set of measurements are performed in 10 g phantom material contained in a cubical box. These results are higher than those obtained with the knowledge of induced field measurements. It is concluded that SAR values are sensitive to the angular position of the moving platform and are well below the safety criteria prescribed for human exposure. The data are suggestive of having a fresh look to understand the mode of electromagnetic field -bio interaction.

  7. Finding the Sweet Spot: Network Structures and Processes for Increased Knowledge Mobilization

    Science.gov (United States)

    Briscoe, Patricia; Pollock, Katina; Campbell, Carol; Carr-Harris, Shasta

    2015-01-01

    The use of networks in public education is one of many knowledge mobilization (KMb) strategies utilized to promote evidence-based research into practice. However, challenges exist in the ability to mobilize knowledge through networks. The purpose of this paper is to explore how networks work. Data were collected from virtual discussions for an…

  8. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks.

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-02-10

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches.

  9. Source Authentication for Multicast in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Ramachandran, Prabha

    2003-01-01

    Recent emergence and popularity of mobile ad hoc networks in a host of current-day applications has instigated a suite of research challenges, primarily in routing and security issues for such networks...

  10. Development of a HTS transceiver sub-system for 3G mobile communication TD-SCDMA base station

    Science.gov (United States)

    Zhang, Xueqiang; He, Xiaofeng; Wang, Yuehui; Duan, Tao; Wang, Guizhen; Zhang, Yan; Li, Chunguang; Zhang, Qiang; Li, Hong; He, Yusheng

    2010-02-01

    A prototype of a high temperature superconducting (HTS) transceiver sub-system for applications in a TD-SCDMA, one of the third generation (3G) communication standards, base station has been developed. Both the HTS sub-system and the conventional counterpart have been implemented into a TD-SCDMA commercial communication network and comparison test studies were carried out. The measured results showed that the HTS sub-system could remarkably improve the RF performance of both transmitting and receiving chains.

  11. Development of a HTS transceiver sub-system for 3G mobile communication TD-SCDMA base station

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Xueqiang; He Xiaofeng; Wang Yuehui; Li Chunguang; Zhang Qiang; Li Hong; He Yusheng [National Laboratory for Superconductivity, Institute of Physics, Chinese Academy of Sciences, Beijing 100190 (China); Duan Tao; Wang Guizhen; Zhang Yan [Datang Mobile Communications Equipment Co., Ltd, Beijing 100190 (China)

    2010-02-15

    A prototype of a high temperature superconducting (HTS) transceiver sub-system for applications in a TD-SCDMA, one of the third generation (3G) communication standards, base station has been developed. Both the HTS sub-system and the conventional counterpart have been implemented into a TD-SCDMA commercial communication network and comparison test studies were carried out. The measured results showed that the HTS sub-system could remarkably improve the RF performance of both transmitting and receiving chains.

  12. Development of a HTS transceiver sub-system for 3G mobile communication TD-SCDMA base station

    International Nuclear Information System (INIS)

    Zhang Xueqiang; He Xiaofeng; Wang Yuehui; Li Chunguang; Zhang Qiang; Li Hong; He Yusheng; Duan Tao; Wang Guizhen; Zhang Yan

    2010-01-01

    A prototype of a high temperature superconducting (HTS) transceiver sub-system for applications in a TD-SCDMA, one of the third generation (3G) communication standards, base station has been developed. Both the HTS sub-system and the conventional counterpart have been implemented into a TD-SCDMA commercial communication network and comparison test studies were carried out. The measured results showed that the HTS sub-system could remarkably improve the RF performance of both transmitting and receiving chains.

  13. An Intelligent Cooperative Visual Sensor Network for Urban Mobility

    Science.gov (United States)

    Leone, Giuseppe Riccardo; Petracca, Matteo; Salvetti, Ovidio; Azzarà, Andrea

    2017-01-01

    Smart cities are demanding solutions for improved traffic efficiency, in order to guarantee optimal access to mobility resources available in urban areas. Intelligent video analytics deployed directly on board embedded sensors offers great opportunities to gather highly informative data about traffic and transport, allowing reconstruction of a real-time neat picture of urban mobility patterns. In this paper, we present a visual sensor network in which each node embeds computer vision logics for analyzing in real time urban traffic. The nodes in the network share their perceptions and build a global and comprehensive interpretation of the analyzed scenes in a cooperative and adaptive fashion. This is possible thanks to an especially designed Internet of Things (IoT) compliant middleware which encompasses in-network event composition as well as full support of Machine-2-Machine (M2M) communication mechanism. The potential of the proposed cooperative visual sensor network is shown with two sample applications in urban mobility connected to the estimation of vehicular flows and parking management. Besides providing detailed results of each key component of the proposed solution, the validity of the approach is demonstrated by extensive field tests that proved the suitability of the system in providing a scalable, adaptable and extensible data collection layer for managing and understanding mobility in smart cities. PMID:29125535

  14. An Intelligent Cooperative Visual Sensor Network for Urban Mobility

    Directory of Open Access Journals (Sweden)

    Giuseppe Riccardo Leone

    2017-11-01

    Full Text Available Smart cities are demanding solutions for improved traffic efficiency, in order to guarantee optimal access to mobility resources available in urban areas. Intelligent video analytics deployed directly on board embedded sensors offers great opportunities to gather highly informative data about traffic and transport, allowing reconstruction of a real-time neat picture of urban mobility patterns. In this paper, we present a visual sensor network in which each node embeds computer vision logics for analyzing in real time urban traffic. The nodes in the network share their perceptions and build a global and comprehensive interpretation of the analyzed scenes in a cooperative and adaptive fashion. This is possible thanks to an especially designed Internet of Things (IoT compliant middleware which encompasses in-network event composition as well as full support of Machine-2-Machine (M2M communication mechanism. The potential of the proposed cooperative visual sensor network is shown with two sample applications in urban mobility connected to the estimation of vehicular flows and parking management. Besides providing detailed results of each key component of the proposed solution, the validity of the approach is demonstrated by extensive field tests that proved the suitability of the system in providing a scalable, adaptable and extensible data collection layer for managing and understanding mobility in smart cities.

  15. A comparative analysis of the statistical properties of large mobile phone calling networks.

    Science.gov (United States)

    Li, Ming-Xia; Jiang, Zhi-Qiang; Xie, Wen-Jie; Miccichè, Salvatore; Tumminello, Michele; Zhou, Wei-Xing; Mantegna, Rosario N

    2014-05-30

    Mobile phone calling is one of the most widely used communication methods in modern society. The records of calls among mobile phone users provide us a valuable proxy for the understanding of human communication patterns embedded in social networks. Mobile phone users call each other forming a directed calling network. If only reciprocal calls are considered, we obtain an undirected mutual calling network. The preferential communication behavior between two connected users can be statistically tested and it results in two Bonferroni networks with statistically validated edges. We perform a comparative analysis of the statistical properties of these four networks, which are constructed from the calling records of more than nine million individuals in Shanghai over a period of 110 days. We find that these networks share many common structural properties and also exhibit idiosyncratic features when compared with previously studied large mobile calling networks. The empirical findings provide us an intriguing picture of a representative large social network that might shed new lights on the modelling of large social networks.

  16. Cost Benefit Analysis of Utilising Mobile Nodes in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2015-01-01

    Mobile nodes have been found useful for improving performance of network parameters such as coverage, data latency and load balancing in wireless sensor networks (WSNs). In spite of the benets which mobile nodes could oer when used in WSNs, they have been often stated as infeasible for use...

  17. Shielding Efficiency of a Fabric Based on Amorphous Glass-Covered Magnetic Microwires to Radiation Emitted by a Mobile Phone in 2G and 3G Communication Technologies

    Directory of Open Access Journals (Sweden)

    Miclăuş Simona

    2017-12-01

    Full Text Available A dual band mobile phone model was used to check the shielding properties of an amorphous ferromagnetic textile against the radiation emitted by the handset. Two frequencies belonging to the 2nd and 3rd generation of mobile emission technologies were used, 897 MHz and 1950 MHz. The specific absorption rate (SAR of energy deposition in a human head phantom was measured in standardized conditions. The textile contained micrometric-diameter wires of a ferromagnetic mixture embedded in a thin glass coat and weaved in a specific way. A set of fabric orientations and configurations (layering were provided in the experiment in order to achieve a better shielding to the phone’s radiation. Compared with the non-shielded handset, SAR deposited in the head while using the fabric-covered phone could be decreased up to 30 % of its initial value – in case of 2G technology and up to 24 % – in case of 3G technology. This type of material shows one of the highest shielding efficiencies of the electric-field component in near-field exposure conditions reported until now. A cubic curve of SAR decrease in depth of the head was revealed in both uncovered and covered handset, the effect of shielding being larger at the higher frequency.

  18. Research on Image Transmission System Based on 3G Communication Platform

    Directory of Open Access Journals (Sweden)

    Jingfeng Zang

    2014-07-01

    Full Text Available A wireless image real-time transmission system is designed by using 3G wireless communication platform and ARM + DSP embedded system. In the environment of 3G networks, the embedded equipment has realized the functions of coding, acquisition, network transmission, decoding and playing. It is realized for real-time video of intelligent control and video compression, storage and playback in the 3G embedded image transmission system. It is especially suitable for remote location or irregular cable network transmission conditions applications. It is shown that in the 3G network video files are transferred quickly. The real-time transmission of H.264 video is broadcasted smoothly, and color distortion is less. The server can control client by remote intelligent units.

  19. The wireless networking system of Earthquake precursor mobile field observation

    Science.gov (United States)

    Wang, C.; Teng, Y.; Wang, X.; Fan, X.; Wang, X.

    2012-12-01

    The mobile field observation network could be real-time, reliably record and transmit large amounts of data, strengthen the physical signal observations in specific regions and specific period, it can improve the monitoring capacity and abnormal tracking capability. According to the features of scatter everywhere, a large number of current earthquake precursor observation measuring points, networking technology is based on wireless broadband accessing McWILL system, the communication system of earthquake precursor mobile field observation would real-time, reliably transmit large amounts of data to the monitoring center from measuring points through the connection about equipment and wireless accessing system, broadband wireless access system and precursor mobile observation management center system, thereby implementing remote instrument monitoring and data transmition. At present, the earthquake precursor field mobile observation network technology has been applied to fluxgate magnetometer array geomagnetic observations of Tianzhu, Xichang,and Xinjiang, it can be real-time monitoring the working status of the observational instruments of large area laid after the last two or three years, large scale field operation. Therefore, it can get geomagnetic field data of the local refinement regions and provide high-quality observational data for impending earthquake tracking forecast. Although, wireless networking technology is very suitable for mobile field observation with the features of simple, flexible networking etc, it also has the phenomenon of packet loss etc when transmitting a large number of observational data due to the wireless relatively weak signal and narrow bandwidth. In view of high sampling rate instruments, this project uses data compression and effectively solves the problem of data transmission packet loss; Control commands, status data and observational data transmission use different priorities and means, which control the packet loss rate within

  20. Space Mobile Network: A Near Earth Communication and Navigation Architecture

    Science.gov (United States)

    Israel, Dave J.; Heckler, Greg; Menrad, Robert J.

    2016-01-01

    This paper describes a Space Mobile Network architecture, the result of a recently completed NASA study exploring architectural concepts to produce a vision for the future Near Earth communications and navigation systems. The Space Mobile Network (SMN) incorporates technologies, such as Disruption Tolerant Networking (DTN) and optical communications, and new operations concepts, such as User Initiated Services, to provide user services analogous to a terrestrial smartphone user. The paper will describe the SMN Architecture, envisioned future operations concepts, opportunities for industry and international collaboration and interoperability, and technology development areas and goals.

  1. An Agent-Based Approach To Nodes Misbehaviour Detection In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Otor Samera U.

    2017-02-01

    Full Text Available Existing Misbehaviour Detection Systems in Mobile Ad-hoc Networks MANETs are challenged with routing overhead and high latency resulting from complexity and failure to isolate and block misbehaving nodes for the reason that it is difficult to detect them as they participate fully in route finding. In this work a Mobile Agent-Based Acknowledgement scheme MAACK was formulated to address this problem using an object oriented algorithm deployed to report misbehaving nodes to the source and destination by registering the Internet Protocol IP address of misbehaving nodes in their header. The scheme was simulated using Network Simulator-3 NS-3 and results benchmarked with an existing scheme the Enhanced Adaptive Acknowledgment EAACK using packet delivery ratio routing overhead and latency as performance metrics in the two scenarios. The results showed that the MAACK paradigm guaranteed a higher packet delivery ratio lower latency and routing overhead than the EAACK scheme. The model can be adapted by Ad-Hoc network protocol developers.

  2. Role of Distance-Based Routing in Traffic Dynamics on Mobile Networks

    Science.gov (United States)

    Yang, Han-Xin; Wang, Wen-Xu

    2013-06-01

    Despite of intensive investigations on transportation dynamics taking place on complex networks with fixed structures, a deep understanding of networks consisting of mobile nodes is challenging yet, especially the lacking of insight into the effects of routing strategies on transmission efficiency. We introduce a distance-based routing strategy for networks of mobile agents toward enhancing the network throughput and the transmission efficiency. We study the transportation capacity and delivering time of data packets associated with mobility and communication ability. Interestingly, we find that the transportation capacity is optimized at moderate moving speed, which is quite different from random routing strategy. In addition, both continuous and discontinuous transitions from free flow to congestions are observed. Degree distributions are explored in order to explain the enhancement of network throughput and other observations. Our work is valuable toward understanding complex transportation dynamics and designing effective routing protocols.

  3. Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems

    Directory of Open Access Journals (Sweden)

    Kambourakis Georgios

    2004-01-01

    Full Text Available While mobile hosts are evolving into full-IP enabled devices, there is a greater demand to provide a more flexible, reconfigurable, and scalable security mechanism in mobile communication systems beyond 3G (B3G. Work has already begun on such an “all-IP” end-to-end solution, commonly referred to as 4G systems. Fully fledged integration between heterogeneous networks, such as 2.5G, UMTS, WLAN, Bluetooth, and the Internet, demands fully compatible, time-tested, and reliable mechanisms to depend on. SSL protocol has proved its effectiveness in the wired Internet and it will probably be the most promising candidate for future wireless environments. In this paper, we discuss existing problems related to authentication and key agreement (AKA procedures, such as compromised authentication vectors attacks, as they appear in current 2/2.5G/3G mobile communication systems, and propose how SSL, combined with public key infrastructure (PKI elements, can be used to overcome these vulnerabilities. In this B3G environment, we perceive authentication as a service, which has to be performed at the higher protocol layers irrespective of the underlying network technology. Furthermore, we analyze the effectiveness of such a solution, based on measurements of a “prototype” implementation. Performance measurements indicate that SSL-based authentication can be possible in terms of service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users.

  4. Delivering service adaptation with 3G technology

    NARCIS (Netherlands)

    Liotta, A.; Yew, A.; Bohoris, C.; Pavlou, G.; Feridun, M.; Kropf, P.G.; Babin, G.

    2002-01-01

    Now that 3G technologies have reached their maturity, newly advanced services can be delivered to the mobile user. These include context- aware services, adaptable services and Virtual Home Environment (VHE)-like services. Important research issues relate, however, to managing such services through

  5. Finding the Sweet Spot: Network Structures and Processes for Increased Knowledge Mobilization

    Directory of Open Access Journals (Sweden)

    Patricia Briscoe

    2016-06-01

    Full Text Available The use of networks in public education is one of a number of knowledge mobilization (KMb strategies utilized to promote evidence-based research into practice. However, challenges exist in the ability to effectively mobilizing knowledge through external partnership networks. The purpose of this paper is to further explore how networks work. Data was collected from virtual discussions for an interim report for a province-wide government initiative. A secondary analysis of the data was performed. The findings present network structures and processes that partners were engaged in when building a network within education. The implications of this study show that building a network for successful outcomes is complex and metaphorically similar to finding the “sweet spot.” It is challenging but networks that used strategies to align structures and processes proved to achieve more success in mobilizing research to practice.

  6. Mobility support and networking for women in STEM

    Science.gov (United States)

    Avellis, Giovanna; Didenkulova, Ira

    2017-04-01

    Mobility support for women in STEM (Science, Technology, Engineering and Mathematics) career is an increasingly important issue in today's world. Cutting edge research tends to be undertaken via international collaboration, often within networks built up by moving to a new country. In addition, many of today's funding opportunities are geared towards international cooperation. There have been quite a few debates and several projects based on extended surveys to understand the role and impact of mobility on a scientific career. Although in general it is true that these issues are sensitive to the country and the scientific field for example, it is believed by the scientific community at least, that there is a connection between mobility and scientific excellence. Rewarding mobility is becoming a concern at the European level because mechanisms to measure in the best and objective way possible scientific excellence are not homogeneous. But still mobility is a key issue to strengthen a researcher's scientific curriculum and be recognised at the international level. Women have been widely recognised as a source of untapped potential. Different steps have been taken so far for a deeper understanding of barriers and different obstacles faced by women in the Science field. Present calls in the Science in Society panel in HORIZON 2020 deal with the horizontal and vertical segregation experienced by women in their careers and best practices to manage these issues. The general aim is to foster women participation in all scientific fields with particular regard to male dominated disciplines as STEM and increase the number and the effective representation of women in decision-making positions, to help also speed up the whole process. Mobility has demonstrated to be partly gender sensitive and this needs to be addressed in some way in order to ensure at least equal opportunities to male and female scientists regarding possibilities and benefits offered by mobility programmes

  7. Java-based mobile agent platforms for wireless sensor networks

    NARCIS (Netherlands)

    Aiello, F.; Carbone, A.; Fortino, G.; Galzarano, S.; Ganzha, M.; Paprzycki, M.

    2010-01-01

    This paper proposes an overview and comparison of mobile agent platforms for the development of wireless sensor network applications. In particular, the architecture, programming model and basic performance of two Java-based agent platforms, Mobile Agent Platform for Sun SPOT (MAPS) and Agent

  8. Upfront plerixafor plus G-CSF versus cyclophosphamide plus G-CSF for stem cell mobilization in multiple myeloma: efficacy and cost analysis study.

    Science.gov (United States)

    Afifi, S; Adel, N G; Devlin, S; Duck, E; Vanak, J; Landau, H; Chung, D J; Lendvai, N; Lesokhin, A; Korde, N; Reich, L; Landgren, O; Giralt, S; Hassoun, H

    2016-04-01

    Cyclophosphamide plus G-CSF (C+G-CSF) is one of the most widely used stem cell (SC) mobilization regimens for patients with multiple myeloma (MM). Plerixafor plus G-CSF (P+G-CSF) has demonstrated superior SC mobilization efficacy when compared with G-CSF alone and has been shown to rescue patients who fail mobilization with G-CSF or C+G-CSF. Despite the proven efficacy of P+G-CSF in upfront SC mobilization, its use has been limited, mostly due to concerns of high price of the drug. However, a comprehensive comparison of the efficacy and cost effectiveness of SC mobilization using C+G-CSF versus P+G-CSF is not available. In this study, we compared 111 patients receiving C+G-CSF to 112 patients receiving P+G-CSF. The use of P+G-CSF was associated with a higher success rate of SC collection defined as ⩾5 × 10(6) CD34+ cells/kg (94 versus 83%, P=0.013) and less toxicities. Thirteen patients in the C+G-CSF arm were hospitalized owing to complications while none in the P+G-CSF group. C+G-CSF was associated with higher financial burden as assessed using institutional-specific costs and charges (P<0.001) as well as using Medicare reimbursement rates (P=0.27). Higher rate of hospitalization, increased need for salvage mobilization, and increased G-CSF use account for these differences.

  9. Capacity, delay and mobility in wireless ad-hoc networks

    NARCIS (Netherlands)

    Bansal, N.; Liu, Z.

    2003-01-01

    Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been shown to increase the capacity of a network, it is not clear whether the delay can be kept low without trading off the throughput. We

  10. Open-Source Based Testbed for Multioperator 4G/5G Infrastructure Sharing in Virtual Environments

    Directory of Open Access Journals (Sweden)

    Ricardo Marco Alaez

    2017-01-01

    Full Text Available Fourth-Generation (4G mobile networks are based on Long-Term Evolution (LTE technologies and are being deployed worldwide, while research on further evolution towards the Fifth Generation (5G has been recently initiated. 5G will be featured with advanced network infrastructure sharing capabilities among different operators. Therefore, an open-source implementation of 4G/5G networks with this capability is crucial to enable early research in this area. The main contribution of this paper is the design and implementation of such a 4G/5G open-source testbed to investigate multioperator infrastructure sharing capabilities executed in virtual architectures. The proposed design and implementation enable the virtualization and sharing of some of the components of the LTE architecture. A testbed has been implemented and validated with intensive empirical experiments conducted to validate the suitability of virtualizing LTE components in virtual infrastructures (i.e., infrastructures with multitenancy sharing capabilities. The impact of the proposed technologies can lead to significant saving of both capital and operational costs for mobile telecommunication operators.

  11. A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications

    OpenAIRE

    Wang, Shuo; Zhang, Xing; Zhang, Yan; Wang, Lin; Yang, Juwo; Wang, Wenbo

    2017-01-01

    As the explosive growth of smart devices and the advent of many new applications, traffic volume has been growing exponentially. The traditional centralized network architecture cannot accommodate such user demands due to heavy burden on the backhaul links and long latency. Therefore, new architectures which bring network functions and contents to the network edge are proposed, i.e., mobile edge computing and caching. Mobile edge networks provide cloud computing and caching capabilities at th...

  12. The LHC goes 3G

    CERN Multimedia

    Anaïs Schaeffer

    2013-01-01

    A new telecommunications network has been installed in the LHC tunnel to facilitate operations during the long shutdown. Anyone using a smartphone, tablet or laptop computer will now be able to access the Internet from the tunnel.   Results of a download (green) and upload (yellow) test carried out in the LHC tunnel using the new Universal Mobile Telecommunications System (UMTS). The first long shutdown has officially begun, and the teams are about to enter the various tunnels around the Laboratory. It’s a good opportunity to talk telecommunications. As you can well imagine, even the highest of high-tech smartphones remains stubbornly silent and unresponsive 100 metres below the ground. Except at CERN… The IT-CS Group has implemented an impressive state-of-the-art solution to tackle this problem - a new Universal Mobile Telecommunications System (UMTS), better known as “3G”, covering the entire 27-km circumference of the LHC tunnel. Established on th...

  13. IF-MANET: Interoperable framework for heterogeneous mobile ad hoc networks

    OpenAIRE

    Hassan, H.

    2015-01-01

    The advances in low power micro-processors, wireless networks and embedded systems have raised the need to utilize the significant resources of mobile devices. These devices for example, smart phones, tablets, laptops, wearables, and sensors are gaining enormous processing power, storage capacity and wireless bandwidth. In addition, the advancement in wireless mobile technology has created a new communication paradigm via which a wireless network can be created without any priori infrastructu...

  14. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-01-01

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches. PMID:29439439

  15. Improving the security of the Hwang-Su protocol for mobile networks ...

    African Journals Online (AJOL)

    The mobile networks are experiencing a growing success. This success is mainly due to the fact that these networks providing the mobility of users, the transmission of data through open air and the requirement of low power. But, it is threatened by weak security, especially at the level of authentication. Hwang and Su have ...

  16. Cloud RAN for Mobile Networks - a Technology Overview

    DEFF Research Database (Denmark)

    Checko, Aleksandra; Christiansen, Henrik Lehrmann; Yan, Ying

    2014-01-01

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges the operators face while trying to support growing end-user’s needs. The main idea behind C-RAN is to pool the Baseband Units (BBUs) from multiple base stations into centralized BBU...

  17. Efficient priority queueing routing strategy on networks of mobile agents

    Science.gov (United States)

    Wu, Gan-Hua; Yang, Hui-Jie; Pan, Jia-Hui

    2018-03-01

    As a consequence of their practical implications for communications networks, traffic dynamics on complex networks have recently captivated researchers. Previous routing strategies for improving transport efficiency have paid little attention to the orders in which the packets should be forwarded, just simply used first-in-first-out queue discipline. Here, we apply a priority queuing discipline and propose a shortest-distance-first routing strategy on networks of mobile agents. Numerical experiments reveal that the proposed scheme remarkably improves both the network throughput and the packet arrival rate and reduces both the average traveling time and the rate of waiting time to traveling time. Moreover, we find that the network capacity increases with an increase in both the communication radius and the number of agents. Our work may be helpful for the design of routing strategies on networks of mobile agents.

  18. Performance Evaluation Of Mobile Cellular Networks In Nigeria

    OpenAIRE

    Shoewu, O.O

    2018-01-01

    The aim of this paper is to evaluate the performance of mobile networks such as MTN, GLO, and ETISALAT in Nigeria and suggest ways the performance of digital cellular networks can improve to minimize some of its present short comings or limitations. This paper discusses the performance improvement of digital cellular networks. A non- CDMA cellular network is use in an overall wireless environment for the purpose of this paper. This paper also discusses the performance assessment of three mobi...

  19. Two-terminal reliability analyses for a mobile ad hoc wireless network

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2007-01-01

    Reliability is one of the most important performance measures for emerging technologies. For these systems, shortcomings are often overlooked in early releases as the cutting edge technology overshadows a fragile design. Currently, the proliferation of the mobile ad hoc wireless networks (MAWN) is moving from cutting edge to commodity and thus, reliable performance will be expected. Generally, ad hoc networking is applied for the flexibility and mobility it provides. As a result, military and first responders employ this network scheme and the reliability of the network becomes paramount. To ensure reliability is achieved, one must first be able to analyze and calculate the reliability of the MAWN. This work describes the unique attributes of the MAWN and how the classical analysis of network reliability, where the network configuration is known a priori, can be adjusted to model and analyze this type of network. The methods developed acknowledge the dynamic and scalable nature of the MAWN along with its absence of infrastructure. Thus, the methods rely on a modeling approach that considers the probabilistic formation of different network configurations in a MAWN. Hence, this paper proposes reliability analysis methods that consider the effect of node mobility and the continuous changes in the network's connectivity

  20. Resource Optimization of Mobile Intelligent System with heart MPLS network

    Directory of Open Access Journals (Sweden)

    Mohammed Elkoutbi

    2009-10-01

    Full Text Available In this paper, we introduce the original Mobile Intelligent System (MIS in embeded FPGA architecture. This node will allow the construction of autonomous mobile network units which can move in unknowns, inaccessible or hostile environnement for human being, in order to collect data by various sensors and transmits them by routing to a unit of distant process. In the sake of improving the performance of transmission, we propose a global schema of QoS management using DiffServ/MPLS backbones. We provide an evaluation of several scenarios for combining QoS IP networks with MIS access network. We conclude with a study on interoperability between QoS patterns in access and backbone networks.

  1. Mobile 3D tomograph

    International Nuclear Information System (INIS)

    Illerhaus, Bernhard; Goebbels, Juergen; Onel, Yener; Sauerwein, Christoph

    2008-01-01

    Mobile tomographs often have the problem that high spatial resolution is impossible owing to the position or setup of the tomograph. While the tree tomograph developed by Messrs. Isotopenforschung Dr. Sauerwein GmbH worked well in practice, it is no longer used as the spatial resolution and measuring time are insufficient for many modern applications. The paper shows that the mechanical base of the method is sufficient for 3D CT measurements with modern detectors and X-ray tubes. CT measurements with very good statistics take less than 10 min. This means that mobile systems can be used, e.g. in examinations of non-transportable cultural objects or monuments. Enhancement of the spatial resolution of mobile tomographs capable of measuring in any position is made difficult by the fact that the tomograph has moving parts and will therefore have weight shifts. With the aid of tomographies whose spatial resolution is far higher than the mechanical accuracy, a correction method is presented for direct integration of the Feldkamp algorithm [de

  2. Mobile infostation network technology

    Science.gov (United States)

    Rajappan, Gowri; Acharya, Joydeep; Liu, Hongbo; Mandayam, Narayan; Seskar, Ivan; Yates, Roy

    2006-05-01

    Inefficient use of network resources on the battlefield is a serious liability: if an asset communicates with the network command for data-a terrain map, for instance-it ties up the end-to-end network resources. When many such assets contend for data simultaneously, traffic is limited by the slowest link along the path from the network command to the asset. A better approach is for a local server, known as an infostation, to download data on an anticipated-need basis when the network load is low. The infostation can then dump data when needed to the assets over a high-speed wireless connection. The infostation serves the local assets over an OFDM-based wireless data link that has MIMO enhancements for high data rate and robustness. We aim for data rate in excess of 100 Mbps, spectral efficiency in excess of 5 bits/sec/Hz, and robustness to poor channel conditions and jammers. We propose an adaptive physical layer that determines power levels, modulation schemes, and the MIMO enhancements to use based on the channel state and the level of interference in the system. We also incorporate the idea of superuser: a user who is allowed preferential use of the high data rate link. We propose a MAC that allows for this priority-based bandwidth allocation scheme. The proposed infostation MAC is integrated tightly with the physical layer through a cross-layer design. We call the proposed infostation PHY, MAC, and network technology, collectively, as the Mobile Infostation Network Technology (MINT).

  3. Performance Analysis of SINEMO: Seamless IP-diversity Based Network Mobility

    National Research Council Canada - National Science Library

    Chowdhury, Pulak K; Reaz, Abu S; Atiquzzaman, Mohammed; Ivancic, William

    2007-01-01

    ...) to support network mobility. NEMO BSP inherits all the drawbacks of Mobile IPv6, such as inefficient routing path, single point of failure, high handover latency and packet loss, and high packet overhead...

  4. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  5. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents.

    Science.gov (United States)

    Wu, Chunxue; Wu, Wenliang; Wan, Caihua; Bekkering, Ernst; Xiong, Naixue

    2017-11-03

    Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  6. Simulation of devices mobility to estimate wireless channel quality metrics in 5G networks

    Science.gov (United States)

    Orlov, Yu.; Fedorov, S.; Samuylov, A.; Gaidamaka, Yu.; Molchanov, D.

    2017-07-01

    The problem of channel quality estimation for devices in a wireless 5G network is formulated. As a performance metrics of interest we choose the signal-to-interference-plus-noise ratio, which depends essentially on the distance between the communicating devices. A model with a plurality of moving devices in a bounded three-dimensional space and a simulation algorithm to determine the distances between the devices for a given motion model are devised.

  7. Mobility and power in networked European space

    DEFF Research Database (Denmark)

    Richardson, Tim; Jensen, Ole B.

    This paper seeks to contribute to debates about how urban, social and critical theory can conceptualise the socio-technologies of connection, resilience, mobility, and collapse in contemporary urban space. The paper offers a theoretical frame for conceptualising this New Urban Condition, focusing...... on themes of mobility, power, flow, network and scale. The analysis suggests the importance of close atention to the knowledge claims which are deployed in multi-level struggles to assert smooth futures in face of dysfunction....

  8. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    Science.gov (United States)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  9. Validation of Bosch' Mobile Communication NetworkArchitecture with SPIN

    NARCIS (Netherlands)

    Ruys, T.C.; Langerak, Romanus

    This paper discusses validation projects carried out for the Mobile Communication Division of Robert Bosch GmbH. We verified parts of their Mobile Communication Network (MCNet), a communication system which is to be used in infotainment systems of future cars. The protocols of the MCNet have been

  10. Studi kepuasan pelanggan terhadap kualitas layanan pitalebar pada jaringan bergerak seluler [The study of subscriber satisfaction on quality of broadband service on cellular mobile network

    Directory of Open Access Journals (Sweden)

    Kasmad Ariansyah

    2016-12-01

    Full Text Available Teknologi telekomunikasi seluler terus berevolusi. Dimulai dari teknologi seluler generasi pertama (1G yang berbasis teknologi analog, kini kita dapat menikmat layanan pitalebar nirkabel berbasis teknologi seluler generasi keempat (4G. Studi ini dilakukan untuk mengukur kepuasan pelanggan terhadap kualitas layanan pitalebar pada jaringan bergerak (mobile baik kualitas layanan yang bersifat teknis maupun non-teknis, dengan cara menyebarkan kuesioner kepada pelanggan 3G dan 4G di 12 lokasi survei. Analisis dilakukan dengan menggunakan indeks kepuasan konsumen dan analisis kepentingan dan kinerja. Hasil analisis menunjukkan bahwa pada umumnya pelanggan puas dengan kualitas layanan data yang diberikan oleh pihak penyedia layanan. Namun demikian, masih diperlukan perbaikan-perbaikan mengingat indeks kepuasan konsumen lebih mendekati batas bawah dari kategori puas tersebut. Berdasarkan hasil analisis kepentingan dan kinerja terhadap diketahui bahwa pada skala 5(lima, rata-rata tingkat kepentingan dan kinerja untuk semua parameter kualitas layanan berturut-turut sebesar 4,04 dan 3,43. Terdapat dua parameter masuk kuadran tingkatkan kinerja,  empat parameter berada di kuadran pertahankan kinerja, dua parameter  memiliki kinerja yang dianggap berlebihan dan sisanya yaitu dua parameter masuk dalam kategori prioritas rendah. Penyedia layanan harus memprioritaskan perbaikan pada parameter-parameter yang masuk dalam kategori tingkatkan kinerja, yaitu kehandalan jaringan dan kecepatan perbaikan jaringan ketika jaringan mengalami gangguan.*****Mobile telecommunications technology continues to evolve. Starting from the first-generation mobile technology (1G, we are now able to enjoy wireless broadband service based on fourth-generation cellular technology (4G. This study was conducted to measure customer satisfaction against quality of service (QoS parameters of broadband on mobile networks, including technical QoS as well as non-technical QoS. Data

  11. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2015-09-01

    Full Text Available Network security is one of the most important issues in mobile sensor networks (MSNs. Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA is proposed to resist malicious attacks by using mobile nodes’ dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  12. RACOON: a multiuser QoS design for mobile wireless body area networks.

    Science.gov (United States)

    Cheng, Shihheng; Huang, Chingyao; Tu, Chun Chen

    2011-10-01

    In this study, Random Contention-based Resource Allocation (RACOON) medium access control (MAC) protocol is proposed to support the quality of service (QoS) for multi-user mobile wireless body area networks (WBANs). Different from existing QoS designs that focus on a single WBAN, a multiuser WBAN QoS should further consider both inter-WBAN interference and inter-WBAN priorities. Similar problems have been studied in both overlapped wireless local area networks (WLANs) and Bluetooth piconets that need QoS supports. However, these solutions are designed for non-medical transmissions that do not consider any priority scheme for medical applications. Most importantly, these studies focus on only static or low mobility networks. Network mobility of WBANs will introduce unnecessary inter-network collisions and energy waste, which are not considered by these solutions. The proposed multiuser-QoS protocol, RACOON, simultaneously satisfies the inter WBAN QoS requirements and overcomes the performance degradation caused by WBAN mobility. Simulation results verify that RACOON provides better latency and energy control, as compared with WBAN QoS protocols without considering the inter-WBAN requirements.

  13. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    Science.gov (United States)

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  14. Design of Optimized Multimedia Data Streaming Management Using OMDSM over Mobile Networks

    Directory of Open Access Journals (Sweden)

    Byungjoo Park

    2017-01-01

    Full Text Available Mobility management is an essential challenge for supporting reliable multimedia data streaming over wireless and mobile networks in the Internet of Things (IoT for location-based mobile marketing applications. The communications among mobile nodes for IoT need to have a seamless handover for delivering high quality multimedia services. The Internet Engineering Task Force (IETF mobility management schemes are the proposals for handling the routing of IPv6 packets to mobile nodes that have moved away from their home network. However, the standard mobility management scheme cannot prevent packet losses due to longer handover latency. In this article, a new enhanced data streaming route optimization scheme is introduced that uses an optimized Transmission Control Protocol (TCP realignment algorithm in order to prevent the packet disordering problem whenever the nodes in the IoT environment are communicating with each other. With the proposed scheme, data packets sequence realignment can be prevented, the packet traffic speed can be controlled, and the TCP performance can be improved. The experimental results show that managing the packet order in proposed new scheme remarkably increases the overall TCP performance over mobile networks within the IoT environment thus ensuring the high quality of service (QoS for multimedia data streaming in location-based mobile marketing applications.

  15. Virtualized cognitive network architecture for 5G cellular networks

    KAUST Repository

    Elsawy, Hesham

    2015-07-17

    Cellular networks have preserved an application agnostic and base station (BS) centric architecture1 for decades. Network functionalities (e.g. user association) are decided and performed regardless of the underlying application (e.g. automation, tactile Internet, online gaming, multimedia). Such an ossified architecture imposes several hurdles against achieving the ambitious metrics of next generation cellular systems. This article first highlights the features and drawbacks of such architectural ossification. Then the article proposes a virtualized and cognitive network architecture, wherein network functionalities are implemented via software instances in the cloud, and the underlying architecture can adapt to the application of interest as well as to changes in channels and traffic conditions. The adaptation is done in terms of the network topology by manipulating connectivities and steering traffic via different paths, so as to attain the applications\\' requirements and network design objectives. The article presents cognitive strategies to implement some of the classical network functionalities, along with their related implementation challenges. The article further presents a case study illustrating the performance improvement of the proposed architecture as compared to conventional cellular networks, both in terms of outage probability and handover rate.

  16. STUDY OF PRESERVING PRIVACY IN MOBILE SOCIAL NETWORK BY PERSONALIZATION OF FINE GRAINED SPAM FILTERING SCHEME

    OpenAIRE

    S. B. GHATTE , A. B. RAJMANE

    2018-01-01

    Mobile social-networking is a social networking where people with similar interests connect to their social communities with a mobile device. Mobile users share various types of information, such as newsletters, advertisements, experiences, interests, opinions and personal content through their mobile devices. Because of Mobile social network (MSN) it is possible for mobile users to share information in the near area and makes their cyber–physical–social interaction easier.

  17. Strategies for a better performance of RPL under mobility in wireless sensor networks

    Science.gov (United States)

    Latib, Z. A.; Jamil, A.; Alduais, N. A. M.; Abdullah, J.; Audah, L. H. M.; Alias, R.

    2017-09-01

    A Wireless Sensor Network (WSN) is usually stationary, which the network comprises of static nodes. The increase demand for mobility in various applications such as environmental monitoring, medical, home automation, and military, raises the question how IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) would perform under these mobility applications. This paper aims to understand performance of RPL and come out with strategies for a better performance of RPL in mobility scenarios. Because of this, this paper evaluates the performance of the RPL protocol under three different scenarios: sink and sensor nodes are static, static sink and mobile sensor nodes, and sink and sensor nodes are mobile. The network scenarios are implemented in Cooja simulator. A WSN consists of 25 sensor nodes and one sink node is configured in the simulation environment. The simulation is varied over different packet rates and ContikiMAC's Clear Channel Assessment (CCA) rate. As the performance metric, RPL is evaluated in term of packet delivery ratio (PDR), power consumption and packet rates. The simulation results show RPL provides a poor PDR in the mobility scenarios when compared to the static scenario. In addition, RPL consumes more power and increases duty-cycle rate to support mobility when compared to the static scenario. Based on the findings, we suggest three strategies for a better performance of RPL in mobility scenarios. First, RPL should operates at a lower packet rates when implemented in the mobility scenarios. Second, RPL should be implemented with a higher duty-cycle rate. Lastly, the sink node should be positioned as much as possible in the center of the mobile network.

  18. Energy Efficient Evolution of Mobile Networks

    DEFF Research Database (Denmark)

    Micallef, Gilbert; Mogensen, Preben

    2011-01-01

    options for how to evolve their networks, allowing them to carry the expected increase in traffic. The best solution is generally selected based on two main criteria, performance and cost. However, pushed by a variety of environmental and energy challenges, MNOs are now also showing interest...... in understanding the impact that different options can have on the energy consumption of their networks. This paper investigates the possible energy gains of evolving a mobile network through a joint pico deployment and macro upgrade solution over a period of 8 years. Besides the network energy consumption, energy...... efficiency in Mbps/kWh is also analyzed. Furthermore, a cost analysis is carried out, to give a more complete picture of the different options being considered. Focusing on the last year of the evolution analysis, results show that deploying more pico sites reduces the energy consumption of the network...

  19. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    OpenAIRE

    Bonné, Bram; Rovelo Ruiz, Gustavo; Quax, Peter; Lamotte, Wim

    2017-01-01

    Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the partici...

  20. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  1. Large Scale Experiments of Multihop Networks in Mobile Scenarios

    Directory of Open Access Journals (Sweden)

    Yacine Benchaïb

    2016-03-01

    Full Text Available This paper presents the latest advances in our research work focused on VIRMANEL and SILUMOD, a couple of tools developed for research in wireless mobile multihop networks. SILUMOD is a domain specific language dedicated to the definition of mobility models. This language contains key- words and special operators that make it easy to define a mobility model and calculate the positions of a trajectory. These positions are sent to VIRMANEL, a tool that man- ages virtual machines corresponding to mobile nodes, emu- lates their movements and the resulting connections and dis- connections, and displays the network evolution to the user, thanks to its graphical user interface. The virtualization ap- proach we take here allows to run real code and to test real protocol implementations without deploying an important experimental platform. For the experimentation of a large number of virtual mobile nodes, we defined and implemented a new algorithm for the nearest neighbor search to find the nodes that are within communication range. We then car- ried out a considerable measurement campaign in order to evaluate the performance of this algorithm. The results show that even with an experiment using a large number of mobile nodes, our algorithm make it possible to evaluate the state of connectivity between mobile nodes within a reasonable time and number of operations.

  2. Effects of electromagnetic radiation from 3G mobile phone on heart rate, blood pressure and ECG parameters in rats.

    Science.gov (United States)

    Colak, Cengiz; Parlakpinar, Hakan; Ermis, Necip; Tagluk, Mehmet Emin; Colak, Cemil; Sarihan, Ediz; Dilek, Omer Faruk; Turan, Bahadir; Bakir, Sevtap; Acet, Ahmet

    2012-08-01

    Effects of electromagnetic energy radiated from mobile phones (MPs) on heart is one of the research interests. The current study was designed to investigate the effects of electromagnetic radiation (EMR) from third-generation (3G) MP on the heart rate (HR), blood pressure (BP) and ECG parameters and also to investigate whether exogenous melatonin can exert any protective effect on these parameters. In this study 36 rats were randomized and evenly categorized into 4 groups: group 1 (3G-EMR exposed); group 2 (3G-EMR exposed + melatonin); group 3 (control) and group 4 (control + melatonin). The rats in groups 1 and 2 were exposed to 3G-specific MP's EMR for 20 days (40 min/day; 20 min active (speech position) and 20 min passive (listening position)). Group 2 was also administered with melatonin for 20 days (5 mg/kg daily during the experimental period). ECG signals were recorded from cannulated carotid artery both before and after the experiment, and BP and HR were calculated on 1st, 3rd and 5th min of recordings. ECG signals were processed and statistically evaluated. In our experience, the obtained results did not show significant differences in the BP, HR and ECG parameters among the groups both before and after the experiment. Melatonin, also, did not exhibit any additional effects, neither beneficial nor hazardous, on the heart hemodynamics of rats. Therefore, the strategy (noncontact) of using a 3G MP could be the reason for ineffectiveness; and use of 3G MP, in this perspective, seems to be safer compared to the ones used in close contact with the head. However, further study is needed for standardization of such an assumption.

  3. IMPROVING THE TRANSMISSION PERFORMANCE BASED ON MINIMIZING ENERGY IN MOBILE ADHOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Gundala Swathi

    2015-06-01

    Full Text Available Networking is collectively no of mobile nodes allocate users to correctly detect a distant environment. These wireless mobile networks want strong but simple, scalable, energy efficient and also self organize routing algorithms. In Mobile technology small quantity of power electronics and less power radio frequency have permit the expansion of small, comparatively economical and less power nodes, are associated in a wireless mobile networkIn this study we proposed method are: energy effectiveness, energetic occurrence zone and multiple hop TRANSMIT, taking into concern between the energy of transmit nodes and distance from the transmit node to the trusted neighbor node, link weight energy utilization and distance are measured as most important constraint for decide on greatest possible path from Zone Head (ZH to the neighbor node. In this we use the different constraints and lessen the quantity of distribution messages during the Transmit node choice point to decrease the energy utilization of the complete network.

  4. The potential of FBMC over OFDM for the future 5G mobile communication technology

    Science.gov (United States)

    Ibrahim, A. N.; Abdullah, M. F. L.

    2017-09-01

    Fifth Generation (5G) is the new evolution of mobile communication technology and will be launched soon in many countries. The researchers and designers of mobile communication technology have been facing the increasing demand of the mobile consumers, high data rates and mobility requirements needed by new wireless applications. Most of the countries have started research on 5G mobile communication technology that is predictable to be launched on 2020 in conjunction with the Olympic Games in Tokyo. Filterbank Multicarrier (FBMC) is one of the modulation techniques for the future 5G mobile communication technology. It uses the multicarrier techniques that are immune to fading caused by transmission of more than one path at a time and also immune to intersymbol interference besides able to function effectively compared to Orthogonal Frequency Division Multiplexing (OFDM) which is used in Fourth Generation (4G) mobile communications technology. This paper discusses the performance of FBMC over OFDM based on the previous journals that were investigated by researchers.

  5. Verification of mobile ad hoc networks : an algebraic approach

    NARCIS (Netherlands)

    Ghassemi, F.; Fokkink, W.J.; Movaghar, A.

    2011-01-01

    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled

  6. Transparent settlement model between mobile network operator and mobile voice over Internet protocol operator

    Directory of Open Access Journals (Sweden)

    Luzango Pangani Mfupe

    2014-12-01

    Full Text Available Advances in technology have enabled network-less mobile voice over internet protocol operator (MVoIPO to offer data services (i.e. voice, text and video to mobile network operator's (MNO's subscribers through an application enabled on subscriber's user equipment using MNO's packet-based cellular network infrastructure. However, this raises the problem of how to handle interconnection settlements between the two types of operators, particularly how to deal with users who now have the ability to make ‘free’ on-net MVoIP calls among themselves within the MNO's network. This study proposes a service level agreement-based transparent settlement model (TSM to solve this problem. The model is based on concepts of achievement and reward, not violation and punishment. The TSM calculates the MVoIPO's throughput distribution by monitoring the variations of peaks and troughs at the edge of a network. This facilitates the determination of conformance and non-conformance levels to the pre-set throughput thresholds and, subsequently, the issuing of compensation to the MVoIPO by the MNO as a result of generating an economically acceptable volume of data traffic.

  7. A novel approach to Service Discovery in Mobile Adhoc Network

    OpenAIRE

    Islam, Noman; Shaikh, Zubair A.

    2015-01-01

    Mobile Adhoc Network (MANET) is a network of a number of mobile routers and associated hosts, organized in a random fashion via wireless links. During recent years MANET has gained enormous amount of attention and has been widely used for not only military purposes but for search-and-rescue operations, intelligent transportation system, data collection, virtual classrooms and ubiquitous computing. Service Discovery is one of the most important issues in MANET. It is defined as the process of ...

  8. Scripted Mobile Network Routing in a Contested Environment

    National Research Council Canada - National Science Library

    Otto, Anthony R

    2008-01-01

    Mobile wireless network protocols currently run on optimistic routing algorithms, adjusting node connectivity only when the chosen connectivity metrics, such as signal strength, pass beyond minimum thresholds...

  9. A proposed architecture for a satellite-based mobile communications network - The lowest three layers

    Science.gov (United States)

    Yan, T. Y.; Naderi, F. M.

    1986-01-01

    Architecture for a commercial mobile satellite network is proposed. The mobile satellite system (MSS) is composed of a network management center, mobile terminals, base stations, and gateways; the functions of each component are described. The satellite is a 'bent pipe' that performs frequency translations, and it has multiple UHF beams. The development of the MSS design based on the seven-layer open system interconnection model is examined. Consideration is given to the functions of the physical, data link, and network layers and the integrated adaptive mobile access protocol.

  10. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  11. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  12. Neural Networks in Mobile Robot Motion

    Directory of Open Access Journals (Sweden)

    Danica Janglová

    2004-03-01

    Full Text Available This paper deals with a path planning and intelligent control of an autonomous robot which should move safely in partially structured environment. This environment may involve any number of obstacles of arbitrary shape and size; some of them are allowed to move. We describe our approach to solving the motion-planning problem in mobile robot control using neural networks-based technique. Our method of the construction of a collision-free path for moving robot among obstacles is based on two neural networks. The first neural network is used to determine the “free” space using ultrasound range finder data. The second neural network “finds” a safe direction for the next robot section of the path in the workspace while avoiding the nearest obstacles. Simulation examples of generated path with proposed techniques will be presented.

  13. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  14. Effects of electromagnetic radiation produced by 3G mobile phones on rat brains: magnetic resonance spectroscopy, biochemical, and histopathological evaluation.

    Science.gov (United States)

    Dogan, M; Turtay, M G; Oguzturk, H; Samdanci, E; Turkoz, Y; Tasdemir, S; Alkan, A; Bakir, S

    2012-06-01

    The effects of electromagnetic radiation (EMR) produced by a third-generation (3G) mobile phone (MP) on rat brain tissues were investigated in terms of magnetic resonance spectroscopy (MRS), biochemistry, and histopathological evaluations. The rats were randomly assigned to two groups: Group 1 is composed of 3G-EMR-exposed rats (n = 9) and Group 2 is the control group (n = 9). The first group was subjected to EMR for 20 days. The control group was not exposed to EMR. Choline (Cho), creatinin (Cr), and N-acetylaspartate (NAA) levels were evaluated by MRS. Catalase (CAT) and glutathione peroxidase (GSH-Px) enzyme activities were measured by spectrophotometric method. Histopathological analyses were carried out to evaluate apoptosis in the brain tissues of both groups. In MRS, NAA/Cr, Cho/Cr, and NAA/Cho ratios were not significantly different between Groups 1 and 2. Neither the oxidative stress parameters, CAT and GSH-Px, nor the number of apoptotic cells were significantly different between Groups 1 and 2. Usage of short-term 3G MP does not seem to have a harmful effect on rat brain tissue.

  15. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents

    Directory of Open Access Journals (Sweden)

    Chunxue Wu

    2017-11-01

    Full Text Available Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  16. AN ANALYSIS OF THE APPLICATION END TO END QUALITY OF SERVICE ON 3G TELECOMMUNICATION NETWORK

    Directory of Open Access Journals (Sweden)

    Cahya Lukito

    2012-05-01

    Full Text Available End to End Quality of Service is a way to provide data package service in a telecommunication network that based on Right Price, Right Service Level, and Right Quality. The goal of this research is to analyze the impact of End to End QoS use on 3G telecommunication network for voice service and data. This research uses an analysis method by doing the application on the lab. The result that is achieved in this research shows that End to End QoS is very influental to the Service Level Agreement to the users of the telecommunication service.Keywords: End to End Qos, SLA, Diffserv

  17. Balanced Bipartite Graph Based Register Allocation for Network Processors in Mobile and Wireless Networks

    Directory of Open Access Journals (Sweden)

    Feilong Tang

    2010-01-01

    Full Text Available Mobile and wireless networks are the integrant infrastructure of mobile and pervasive computing that aims at providing transparent and preferred information and services for people anytime anywhere. In such environments, end-to-end network bandwidth is crucial to improve user's transparent experience when providing on-demand services such as mobile video playing. As a result, powerful computing power is required for networked nodes, especially for routers. General-purpose processors cannot meet such requirements due to their limited processing ability, and poor programmability and scalability. Intel's network processor IXP is specially designed for fast packet processing to achieve a broad bandwidth. IXP provides a large number of registers to reduce the number of memory accesses. Registers in an IXP are physically partitioned as two banks so that two source operands in an instruction have to come from the two banks respectively, which makes the IXP register allocation tricky and different from conventional ones. In this paper, we investigate an approach for efficiently generating balanced bipartite graph and register allocation algorithms for the dual-bank register allocation in IXPs. The paper presents a graph uniform 2-way partition algorithm (FPT, which provides an optimal solution to the graph partition, and a heuristic algorithm for generating balanced bipartite graph. Finally, we design a framework for IXP register allocation. Experimental results demonstrate the framework and the algorithms are efficient in register allocation for IXP network processors.

  18. The 2100MHz radiofrequency radiation of a 3G-mobile phone and the DNA oxidative damage in brain.

    Science.gov (United States)

    Sahin, Duygu; Ozgur, Elcin; Guler, Goknur; Tomruk, Arın; Unlu, Ilhan; Sepici-Dinçel, Aylin; Seyhan, Nesrin

    2016-09-01

    We aimed to evaluate the effect of 2100MHz radiofrequency radiation emitted by a generator, simulating a 3G-mobile phone on the brain of rats during 10 and 40 days of exposure. The female rats were randomly divided into four groups. Group I; exposed to 3G modulated 2100MHz RFR signal for 6h/day, 5 consecutive days/wk for 2 weeks, group II; control 10 days, were kept in an inactive exposure set-up for 6h/day, 5 consecutive days/wk for 2 weeks, group III; exposed to 3G modulated 2100MHz RFR signal for 6h/day, 5 consecutive days/wk for 8 weeks and group IV; control 40 days, were kept in an inactive exposure set-up for 6h/day, 5 consecutive days/wk for 8 weeks. After the genomic DNA content of brain was extracted, oxidative DNA damage (8-hydroxy-2'deoxyguanosine, pg/mL) and malondialdehyde (MDA, nmoL/g tissue) levels were determined. Our main finding was the increased oxidative DNA damage to brain after 10 days of exposure with the decreased oxidative DNA damage following 40 days of exposure compared to their control groups. Besides decreased lipid peroxidation end product, MDA, was observed after 40 days of exposure. The measured decreased quantities of damage during the 40 days of exposure could be the means of adapted and increased DNA repair mechanisms. Copyright © 2016 Elsevier B.V. All rights reserved.

  19. Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Networks

    OpenAIRE

    Shayeji, Mohammad H. Al; Al-Azmi, AbdulRahman R.; Al-Azmi, AbdulAziz R.; Samrajesh, M. D.

    2012-01-01

    Mobile Ad Hoc networks (MANET), distinct from traditional distributed systems, are dynamic and self-organizing networks. MANET requires a leader to coordinate and organize tasks. The challenge is to have the right election algorithm that chooses the right leader based on various factors in MANET. In this paper, we analyze four leader election algorithms used in mobile Ad Hoc Networks. Factors considered in our analysis are time complexity, message complexity, assumptions considered, fault tol...

  20. Measuring sustainable accessibility potential using the mobility infrastructure's network configuration

    NARCIS (Netherlands)

    Gil, J.; Read, S.

    2012-01-01

    This paper is an exploration into the analysis of public transport networks using space syntax approaches combined with concepts of sustainable accessibility. Present urban development policy aims to achieve sustainable mobility patterns, shifting mobility to soft transportation modes such as

  1. Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2017-01-01

    Full Text Available The node replication attack is one of the notorious attacks that can be easily launched by adversaries in wireless sensor networks. A lot of literatures have studied mitigating the node replication attack in static wireless sensor networks. However, it is more difficult to detect the replicas in mobile sensor networks because of their node mobility. Considering the limitations of centralized detection schemes for static wireless sensor networks, a few distributed solutions have been recently proposed. Some existing schemes identified replicated attacks by sensing mobile nodes with identical ID but different locations. To facilitate the discovery of contradictory conflicts, we propose a hybrid local and global detection method. The local detection is performed in a local area smaller than the whole deployed area to improve the meeting probability of contradictory nodes, while the distant replicated nodes in larger area can also be efficiently detected by the global detection. The complementary two levels of detection achieve quick discovery by searching of the replicas with reasonable overhead.

  2. Analysis and Relative Evaluation of Connectivity of a Mobile Multi-Hop Network

    Science.gov (United States)

    Nakano, Keisuke; Miyakita, Kazuyuki; Sengoku, Masakazu; Shinoda, Shoji

    In mobile multi-hop networks, a source node S and a destination node D sometimes encounter a situation where there is no multi-hop path between them when a message M, destined for D, arrives at S. In this situation, we cannot send M from S to D immediately; however, we can deliver M to D after waiting some time with the help of two capabilities of mobility. One of the capabilities is to construct a connected multi-hop path by changing the topology of the network during the waiting time (Capability 1), and the other is to move M closer to D during the waiting time (Capability 2). In this paper, we consider three methods to deliver M from S to D by using these capabilities in different ways. Method 1 uses Capability 1 and sends M from S to D after waiting until a connected multi-hop path appears between S and D. Method 2 uses Capability 2 and delivers M to D by allowing a mobile node to carry M from S to D. Method 3 is a combination of Methods 1 and 2 and minimizes the waiting time. We evaluate and compare these three methods in terms of the mean waiting time, from the time when M arrives at S to the time when D starts receiving M, as a new approach to connectivity evaluation. We consider a one-dimensional mobile multi-hop network consisting of mobile nodes flowing in opposite directions along a street. First, we derive some approximate equations and propose an estimation method to compute the mean waiting time of Method 1. Second, we theoretically analyze the mean waiting time of Method 2, and compute a lower bound of that of Method 3. By comparing the three methods under the same assumptions using results of the analyses and some simulation results, we show relations between the mean waiting times of these methods and show how Capabilities 1 and 2 differently affect the mean waiting time.

  3. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  4. A mobile-agent-based wireless sensing network for structural monitoring applications

    International Nuclear Information System (INIS)

    Taylor, Stuart G; Farinholt, Kevin M; Figueiredo, Eloi; Moro, Erik A; Park, Gyuhae; Farrar, Charles R; Flynn, Eric B; Mascarenas, David L; Todd, Michael D

    2009-01-01

    A new wireless sensing network paradigm is presented for structural monitoring applications. In this approach, both power and data interrogation commands are conveyed via a mobile agent that is sent to sensor nodes to perform intended interrogations, which can alleviate several limitations of the traditional sensing networks. Furthermore, the mobile agent provides computational power to make near real-time assessments on the structural conditions. This paper will discuss such prototype systems, which are used to interrogate impedance-based sensors for structural health monitoring applications. Our wireless sensor node is specifically designed to accept various energy sources, including wireless energy transmission, and to be wirelessly triggered on an as-needed basis by the mobile agent or other sensor nodes. The capabilities of this proposed sensing network paradigm are demonstrated in the laboratory and the field

  5. Spectrum Reorganization and Bundling for Power Efficient Mobile Networks

    DEFF Research Database (Denmark)

    Micallef, Gilbert; Mogensen, Preben; Scheck, Hans-Otto

    2012-01-01

    are still required for supporting legacy devices and providing wider network coverage. In order to facilitate and reduce the cost of rolling out a new network, mobile operators often reuse existing sites. Radio frequency modules in base station sites house power amplifiers, which are designed to operate...

  6. PERFORMANCE EVALUATION OF INTEGRATED MACRO AND MICRO MOBILITY PROTOCOLS FOR WIDE AREA WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R.Gunasundari

    2010-03-01

    Full Text Available The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, Mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of Mobile IP and Micro mobility protocols where Mobile IP handles macro mobility and micro mobility protocols handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed. Simulation results presented in this paper are based on ns 2.

  7. Discursive Deployments: Mobilizing Support for Municipal and Community Wireless Networks in the U.S.

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Rosio; Rodriguez, Juana Maria

    2008-08-16

    This paper examines Municipal Wireless (MW) deployments in the United States. In particular, the interest is in understanding how discourse has worked to mobilize widespread support for MW networks. We explore how local governments discursively deploy the language of social movements to create a shared understanding of the networking needs of communities. Through the process of"framing" local governments assign meaning to the MW networks in ways intended to mobilize support anddemobilize opposition. The mobilizing potential of a frame varies and is dependent on its centrality and cultural resonance. We examine the framing efforts of MW networks by using a sample of Request for Proposals for community wireless networks, semi-structured interviews and local media sources. Prominent values that are central to a majority of the projects and others that are culturally specific are identified and analyzed for their mobilizing potency.

  8. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Maltz, David A

    2001-01-01

    .... Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth...

  9. Network-aware support for mobile distributed teams

    NARCIS (Netherlands)

    Kleij, R. van der; Jong, A. de; Brake, G.M. te; Greefe, T.E.

    2009-01-01

    An experiment evaluated network-aware support to increase understanding of the factors that are important for successful teamwork in mobile geographically dispersed teams of first responders. Participants performed a simulated search and rescue team task and were equipped with a digitized map and

  10. CDMA coverage under mobile heterogeneous network load

    NARCIS (Netherlands)

    Saban, D.; van den Berg, Hans Leo; Boucherie, Richardus J.; Endrayanto, A.I.

    2002-01-01

    We analytically investigate coverage (determined by the uplink) under non-homogeneous and moving traffic load of third generation UMTS mobile networks. In particular, for different call assignment policies, we investigate cell breathing and the movement of the coverage gap occurring between cells

  11. How IMS Enables Converged Services for Cable and 3G Technologies: A Survey

    Directory of Open Access Journals (Sweden)

    Noël Crespi

    2008-04-01

    Full Text Available The IP multimedia subsystem (IMS is a service control overlay standardized by the 3GPP. The IMS is based on session initiation protocol (SIP to establish, modify, and terminate the sessions. It provides a clean separation between services, signaling, and media with the potential to enable control and management of services over multiple transport technologies. In the scope of fixed-mobile convergence, this paper is dedicated to presenting a review of how cable networks can be integrated into IMS technology to achieve 3G-cable horizontal convergence. Cable networks, as one of the major fixed broadband access technologies with PacketCable architecture, are able to provide broadband internet access and VoIP in addition to cable TV. In this article, we review the evolution in PacketCable architecture to take up IMS. In this way, we consider the standardization and research activities to address this integration. We review some important challenges such as SIP protocol compatibility, defining unique user profile, required enhancement in authentication process, QoS and charging system.

  12. How IMS Enables Converged Services for Cable and 3G Technologies: A Survey

    Directory of Open Access Journals (Sweden)

    Mani Mehdi

    2008-01-01

    Full Text Available The IP multimedia subsystem (IMS is a service control overlay standardized by the 3GPP. The IMS is based on session initiation protocol (SIP to establish, modify, and terminate the sessions. It provides a clean separation between services, signaling, and media with the potential to enable control and management of services over multiple transport technologies. In the scope of fixed-mobile convergence, this paper is dedicated to presenting a review of how cable networks can be integrated into IMS technology to achieve 3G-cable horizontal convergence. Cable networks, as one of the major fixed broadband access technologies with PacketCable architecture, are able to provide broadband internet access and VoIP in addition to cable TV. In this article, we review the evolution in PacketCable architecture to take up IMS. In this way, we consider the standardization and research activities to address this integration. We review some important challenges such as SIP protocol compatibility, defining unique user profile, required enhancement in authentication process, QoS and charging system.

  13. Predictors of Mobile Phone and Social Networking Site Dependency in Adulthood.

    Science.gov (United States)

    Burnell, Kaitlyn; Kuther, Tara L

    2016-10-01

    The present study explored social and psychological predictors of social networking site (SNS) and mobile phone dependency in a sample of emerging adults (ages 18-25, n = 159, M = 21.87, SD = 2.08) and young adults (ages 26-40, n = 97, M = 31.21, SD = 4.11). Path analysis revealed that SNS dependency mediated the relationship of social comparison, SNS support, and impulsivity on mobile phone dependency. Impulsivity also showed direct links to mobile phone dependency. The present findings suggest that individuals with a strong orientation toward social comparison, who perceive a strong sense of support through SNS networks, or who show difficulty with self-regulation may be at risk for SNS and mobile phone dependency.

  14. Cloud RAN for Mobile Networks - a Technology Overview

    OpenAIRE

    Checko, Aleksandra; Christiansen, Henrik Lehrmann; Yan, Ying; Scolari, Lara; Kardaras, Georgios; Berger, Michael Stübert; Dittmann, Lars

    2014-01-01

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges the operators face while trying to support growing end-user’s needs. The main idea behind C-RAN is to pool the Baseband Units (BBUs) from multiple base stations into centralized BBU Pool for statistical multiplexing gain, while shifting the burden to the high-speed wireline transmission of In-phase and Quadrature (IQ) data. C-RAN enables energy efficient network operation and pos...

  15. Effects of twenty-minute 3G mobile phone irradiation on event related potential components and early gamma synchronization in auditory oddball paradigm.

    Science.gov (United States)

    Stefanics, G; Thuróczy, G; Kellényi, L; Hernádi, I

    2008-11-19

    We investigated the potential effects of 20 min irradiation from a new generation Universal Mobile Telecommunication System (UMTS) 3G mobile phone on human event related potentials (ERPs) in an auditory oddball paradigm. In a double-blind task design, subjects were exposed to either genuine or sham irradiation in two separate sessions. Before and after irradiation subjects were presented with a random series of 50 ms tone burst (frequent standards: 1 kHz, P=0.8, rare deviants: 1.5 kHz, P=0.2) at a mean repetition rate of 1500 ms while electroencephalogram (EEG) was recorded. The subjects' task was to silently count the appearance of targets. The amplitude and latency of the N100, N200, P200 and P300 components for targets and standards were analyzed in 29 subjects. We found no significant effects of electromagnetic field (EMF) irradiation on the amplitude and latency of the above ERP components. In order to study possible effects of EMF on attentional processes, we applied a wavelet-based time-frequency method to analyze the early gamma component of brain responses to auditory stimuli. We found that the early evoked gamma activity was insensitive to UMTS RF exposition. Our results support the notion, that a single 20 min irradiation from new generation 3G mobile phones does not induce measurable changes in latency or amplitude of ERP components or in oscillatory gamma-band activity in an auditory oddball paradigm.

  16. Mathematical model on malicious attacks in a mobile wireless network with clustering

    International Nuclear Information System (INIS)

    Haldar, Kaushik; Mishra, Bimal Kumar

    2015-01-01

    A mathematical model has been formulated for the analysis of a wireless epidemic on a clustered heterogeneous network. The model introduces mobility into the epidemic framework assuming that the component nodes have a tendency to be attached with a frequently visited home cluster. This underlines the inherent regularity in the mobility pattern of mobile nodes in a wireless network. The analysis focuses primarily on features that arise because of the mobility considerations compared in the larger scenario formed by the epidemic aspects. A result on the invariance of the home cluster populations with respect to time provides an important view-point of the long-term behavior of the system. The analysis also focuses on obtaining a basic threshold condition that guides the epidemic behavior of the system. Analytical as well as numerical results have also been obtained to establish the asymptotic behavior of the connected components of the network, and that of the whole network when the underlying graph turns out to be irreducible. Applications to proximity based attacks and to scenarios with high cluster density have also been outlined

  17. A Survey on Mobility Support in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Beom-Su Kim

    2017-04-01

    Full Text Available Wireless Body Area Networks (WBANs have attracted research interests from the community, as more promising healthcare applications have a tendency to employ them as underlying network technology. While taking design issues, such as small size hardware as well as low power computing, into account, a lot of research has been proposed to accomplish the given tasks in WBAN. However, since most of the existing works are basically developed by assuming all nodes in the static state, these schemes therefore cannot be applied in real scenarios where network topology between sensor nodes changes frequently and unexpectedly according to human moving behavior. However, as far as the authors know, there is no survey paper to focus on research challenges for mobility support in WBAN yet. To address this deficiency, in this paper, we present the state-of-the-art approaches and discuss the important features of related to mobility in WBAN. We give an overview of mobility model and categorize the models as individual and group. Furthermore, an overview of networking techniques in the recent literature and summary are compiled for comparison in several aspects. The article also suggests potential directions for future research in the field.

  18. Design mobile satellite system architecture as an integral part of the cellular access digital network

    Science.gov (United States)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  19. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  20. Modeling the energy performance of event-driven wireless sensor network by using static sink and mobile sink.

    Science.gov (United States)

    Chen, Jiehui; Salim, Mariam B; Matsumoto, Mitsuji

    2010-01-01

    Wireless Sensor Networks (WSNs) designed for mission-critical applications suffer from limited sensing capacities, particularly fast energy depletion. Regarding this, mobile sinks can be used to balance the energy consumption in WSNs, but the frequent location updates of the mobile sinks can lead to data collisions and rapid energy consumption for some specific sensors. This paper explores an optimal barrier coverage based sensor deployment for event driven WSNs where a dual-sink model was designed to evaluate the energy performance of not only static sensors, but Static Sink (SS) and Mobile Sinks (MSs) simultaneously, based on parameters such as sensor transmission range r and the velocity of the mobile sink v, etc. Moreover, a MS mobility model was developed to enable SS and MSs to effectively collaborate, while achieving spatiotemporal energy performance efficiency by using the knowledge of the cumulative density function (cdf), Poisson process and M/G/1 queue. The simulation results verified that the improved energy performance of the whole network was demonstrated clearly and our eDSA algorithm is more efficient than the static-sink model, reducing energy consumption approximately in half. Moreover, we demonstrate that our results are robust to realistic sensing models and also validate the correctness of our results through extensive simulations.

  1. Modeling the Energy Performance of Event-Driven Wireless Sensor Network by Using Static Sink and Mobile Sink

    Science.gov (United States)

    Chen, Jiehui; Salim, Mariam B.; Matsumoto, Mitsuji

    2010-01-01

    Wireless Sensor Networks (WSNs) designed for mission-critical applications suffer from limited sensing capacities, particularly fast energy depletion. Regarding this, mobile sinks can be used to balance the energy consumption in WSNs, but the frequent location updates of the mobile sinks can lead to data collisions and rapid energy consumption for some specific sensors. This paper explores an optimal barrier coverage based sensor deployment for event driven WSNs where a dual-sink model was designed to evaluate the energy performance of not only static sensors, but Static Sink (SS) and Mobile Sinks (MSs) simultaneously, based on parameters such as sensor transmission range r and the velocity of the mobile sink v, etc. Moreover, a MS mobility model was developed to enable SS and MSs to effectively collaborate, while achieving spatiotemporal energy performance efficiency by using the knowledge of the cumulative density function (cdf), Poisson process and M/G/1 queue. The simulation results verified that the improved energy performance of the whole network was demonstrated clearly and our eDSA algorithm is more efficient than the static-sink model, reducing energy consumption approximately in half. Moreover, we demonstrate that our results are robust to realistic sensing models and also validate the correctness of our results through extensive simulations. PMID:22163503

  2. Supersampling and Network Reconstruction of Urban Mobility.

    Directory of Open Access Journals (Sweden)

    Oleguer Sagarra

    Full Text Available Understanding human mobility is of vital importance for urban planning, epidemiology, and many other fields that draw policies from the activities of humans in space. Despite the recent availability of large-scale data sets of GPS traces or mobile phone records capturing human mobility, typically only a subsample of the population of interest is represented, giving a possibly incomplete picture of the entire system under study. Methods to reliably extract mobility information from such reduced data and to assess their sampling biases are lacking. To that end, we analyzed a data set of millions of taxi movements in New York City. We first show that, once they are appropriately transformed, mobility patterns are highly stable over long time scales. Based on this observation, we develop a supersampling methodology to reliably extrapolate mobility records from a reduced sample based on an entropy maximization procedure, and we propose a number of network-based metrics to assess the accuracy of the predicted vehicle flows. Our approach provides a well founded way to exploit temporal patterns to save effort in recording mobility data, and opens the possibility to scale up data from limited records when information on the full system is required.

  3. Social-Driven Information Dissemination for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Basim MAHMOOD

    2015-06-01

    Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.

  4. PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Mansour Sheikhan

    2012-06-01

    Full Text Available Mobile ad-hoc network (MANET is a dynamic collection of mobile computers without the need for any existing infrastructure. Nodes in a MANET act as hosts and routers. Designing of robust routing algorithms for MANETs is a challenging task. Disjoint multipath routing protocols address this problem and increase the reliability, security and lifetime of network. However, selecting an optimal multipath is an NP-complete problem. In this paper, Hopfield neural network (HNN which its parameters are optimized by particle swarm optimization (PSO algorithm is proposed as multipath routing algorithm. Link expiration time (LET between each two nodes is used as the link reliability estimation metric. This approach can find either node-disjoint or link-disjoint paths in singlephase route discovery. Simulation results confirm that PSO-HNN routing algorithm has better performance as compared to backup path set selection algorithm (BPSA in terms of the path set reliability and number of paths in the set.

  5. The Bacterial Mobile Resistome Transfer Network Connecting the Animal and Human Microbiomes.

    Science.gov (United States)

    Hu, Yongfei; Yang, Xi; Li, Jing; Lv, Na; Liu, Fei; Wu, Jun; Lin, Ivan Y C; Wu, Na; Weimer, Bart C; Gao, George F; Liu, Yulan; Zhu, Baoli

    2016-11-15

    Horizontally acquired antibiotic resistance genes (ARGs) in bacteria are highly mobile and have been ranked as principal risk resistance determinants. However, the transfer network of the mobile resistome and the forces driving mobile ARG transfer are largely unknown. Here, we present the whole profile of the mobile resistome in 23,425 bacterial genomes and explore the effects of phylogeny and ecology on the recent transfer (≥99% nucleotide identity) of mobile ARGs. We found that mobile ARGs are mainly present in four bacterial phyla and are significantly enriched in Proteobacteria The recent mobile ARG transfer network, which comprises 703 bacterial species and 16,859 species pairs, is shaped by the bacterial phylogeny, while an ecological barrier also exists, especially when interrogating bacteria colonizing different human body sites. Phylogeny is still a driving force for the transfer of mobile ARGs between farm animals and the human gut, and, interestingly, the mobile ARGs that are shared between the human and animal gut microbiomes are also harbored by diverse human pathogens. Taking these results together, we suggest that phylogeny and ecology are complementary in shaping the bacterial mobile resistome and exert synergistic effects on the development of antibiotic resistance in human pathogens. The development of antibiotic resistance threatens our modern medical achievements. The dissemination of antibiotic resistance can be largely attributed to the transfer of bacterial mobile antibiotic resistance genes (ARGs). Revealing the transfer network of these genes in bacteria and the forces driving the gene flow is of great importance for controlling and predicting the emergence of antibiotic resistance in the clinic. Here, by analyzing tens of thousands of bacterial genomes and millions of human and animal gut bacterial genes, we reveal that the transfer of mobile ARGs is mainly controlled by bacterial phylogeny but under ecological constraints. We also found

  6. Survey on Monitoring and Quality Controlling of the Mobile Biosignal Delivery.

    Science.gov (United States)

    Pawar, Pravin A; Edla, Damodar R; Edoh, Thierry; Shinde, Vijay; van Beijnum, Bert-Jan

    2017-10-31

    A Mobile Patient Monitoring System (MPMS) acquires patient's biosignals and transmits them using wireless network connection to the decision-making module or healthcare professional for the assessment of patient's condition. A variety of wireless network technologies such as wireless personal area networks (e.g., Bluetooth), mobile ad-hoc networks (MANET), and infrastructure-based networks (e.g., WLAN and cellular networks) are in practice for biosignals delivery. The wireless network quality-of-service (QoS) requirements of biosignals delivery are mainly specified in terms of required bandwidth, acceptable delay, and tolerable error rate. An important research challenge in the MPMS is how to satisfy QoS requirements of biosignals delivery in the environment characterized by patient mobility, deployment of multiple wireless network technologies, and variable QoS characteristics of the wireless networks. QoS requirements are mainly application specific, while available QoS is largely dependent on QoS provided by wireless network in use. QoS provisioning refers to providing support for improving QoS experience of networked applications. In resource poor conditions, application adaptation may also be required to make maximum use of available wireless network QoS. This survey paper presents a survey of recent developments in the area of QoS provisioning for MPMS. In particular, our contributions are as follows: (1) overview of wireless networks and network QoS requirements of biosignals delivery; (2) survey of wireless networks' QoS performance evaluation for the transmission of biosignals; and (3) survey of QoS provisioning mechanisms for biosignals delivery in MPMS. We also propose integrating end-to-end QoS monitoring and QoS provisioning strategies in a mobile patient monitoring system infrastructure to support optimal delivery of biosignals to the healthcare professionals.

  7. Self-deployable mobile sensor networks for on-demand surveillance

    Science.gov (United States)

    Miao, Lidan; Qi, Hairong; Wang, Feiyi

    2005-05-01

    This paper studies two interconnected problems in mobile sensor network deployment, the optimal placement of heterogeneous mobile sensor platforms for cost-efficient and reliable coverage purposes, and the self-organizable deployment. We first develop an optimal placement algorithm based on a "mosaicked technology" such that different types of mobile sensors form a mosaicked pattern uniquely determined by the popularity of different types of sensor nodes. The initial state is assumed to be random. In order to converge to the optimal state, we investigate the swarm intelligence (SI)-based sensor movement strategy, through which the randomly deployed sensors can self-organize themselves to reach the optimal placement state. The proposed algorithm is compared with the random movement and the centralized method using performance metrics such as network coverage, convergence time, and energy consumption. Simulation results are presented to demonstrate the effectiveness of the mosaic placement and the SI-based movement.

  8. Connection adaption for control of networked mobile chaotic agents.

    Science.gov (United States)

    Zhou, Jie; Zou, Yong; Guan, Shuguang; Liu, Zonghua; Xiao, Gaoxi; Boccaletti, S

    2017-11-22

    In this paper, we propose a strategy for the control of mobile chaotic oscillators by adaptively rewiring connections between nearby agents with local information. In contrast to the dominant adaptive control schemes where coupling strength is adjusted continuously according to the states of the oscillators, our method does not request adaption of coupling strength. As the resulting interaction structure generated by this proposed strategy is strongly related to unidirectional chains, by investigating synchronization property of unidirectional chains, we reveal that there exists a certain coupling range in which the agents could be controlled regardless of the length of the chain. This feature enables the adaptive strategy to control the mobile oscillators regardless of their moving speed. Compared with existing adaptive control strategies for networked mobile agents, our proposed strategy is simpler for implementation where the resulting interaction networks are kept unweighted at all time.

  9. On the Secrecy Capacity of 5G New Radio Networks

    Directory of Open Access Journals (Sweden)

    Ke Xiao

    2018-01-01

    Full Text Available The new radio technology for the fifth-generation wireless system has been extensively studied all over the world. Specifically, the air interface protocols for 5G radio access network will be standardized by the 3GPP in the coming years. In the next-generation 5G new radio (NR networks, millimeter wave (mmWave communications will definitely play a critical role, as new NR air interface (AI is up to 100 GHz just like mmWave. The rapid growth of mmWave systems poses a variety of challenges in physical layer (PHY security. This paper investigates those challenges in the context of several 5G new radio communication technologies, including multiple-input multiple-output (MIMO and nonorthogonal multiple access (NOMA. In particular, we introduce a ray-tracing (RT based 5G NR network channel model and reveal that the secrecy capacity in mmWave band widely depends on the richness of radio frequency (RF environment through numerical experiments.

  10. Energy-efficient peer-to-peer networking for constrained-capacity mobile environments

    OpenAIRE

    Harjula, E. (Erkki)

    2016-01-01

    Abstract Energy efficiency is a powerful measure for promoting sustainability in technological evolution and ensuring feasible battery life of end-user devices in mobile computing. Peer-to-peer technology provides decentralized and self-organizing architecture for distributing content between devices in networks that scale up almost infinitely. However, peer-to-peer networking may require lots of resources from peer nodes, which in turn may lead to increased energy consumption on mobile d...

  11. Graceful Degradation in 3GPP MBMS Mobile TV Services Using H.264/AVC Temporal Scalability

    Directory of Open Access Journals (Sweden)

    Thomas Wiegand

    2009-01-01

    Full Text Available These days, there is an increasing interest in Mobile TV broadcast services shown by customers as well as service providers. One general problem of Mobile TV broadcast services is to maximize the coverage of users receiving an acceptable service quality, which is mainly influenced by the user's position and mobility within the cell. In this paper, graceful degradation is considered as an approach for improved service availability and coverage. We present a layered transmission approach for 3GPP's Release 6 Multimedia and Broadcast Service (MBMS based on temporal scalability using H.264/AVC Baseline Profile. A differentiation in robustness between temporal quality layers is achieved by unequal error protection approach based on either application layer Forward Error Correction (FEC or unequal transmit power for the layers or even a combination of both. We discuss the corresponding MBMS service as well as network settings and define measures allowing for evaluating the amount of users reached with a certain mobile terminal play-out quality while considering the network cell capacity usage. Using simulated 3GPP Rel. 6 network conditions, we show that if the service and network settings are chosen carefully, a noticeable extension of the coverage of the MBMS service can be achieved.

  12. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  13. Research on the Construction Strategy of the Mobile Phone Archives Based on the 3G Technology%基于3G技术的手机档案馆构建策略研究

    Institute of Scientific and Technical Information of China (English)

    肖春红

    2011-01-01

    文章在探讨3G手机和手机档案馆概念的基础上,分析了建设手机档案馆的必要性。从档案资源、服务方式与技术条件保障三个方面提出了构建手机档案馆的策略,并对手机档案馆的未来进行了展望。%This article analyzed the necessity of building a Mobile Phone Archives based on investigating the concepts of 3G phone and Mobile Phone Archives. And then put forward the strategy of building Mobile Phone Archives fi-om the archival resources, services and technical condition support. At last, it also prospected the future of mobile phone archives.

  14. Simplified Multicast Forwarding in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Macker, Joseph P; Dean, Justin; Chao, William

    2004-01-01

    ...) based upon flooding mechanisms. We present the design of a working experimental prototype and some initial performance results using the NRL mobile network emulation system and various optional flooding approaches within the design framework...

  15. Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 GeoNetworking

    OpenAIRE

    Noguchi, Satoru; Matsuura, Satoshi; Inomata, Atsuo; Fujikawa, Kazutoshi; Sunahara, Hideki

    2013-01-01

    Resource discovery is an essential function for distributed mobile applications integrated in vehicular communication systems. Key requirements of the mobile resource discovery are wide-area geographic-based discovery and scalable resource discovery not only inside a vehicular ad-hoc network but also through the Internet. While a number of resource discovery solutions have been proposed, most of them have focused on specific scale of network. Furthermore, managing a large number of mobile res...

  16. Energy saving techniques applied over a nation-wide mobile network

    DEFF Research Database (Denmark)

    Perez, Eva; Frank, Philipp; Micallef, Gilbert

    2014-01-01

    Traffic carried over wireless networks has grown significantly in recent years and actual forecasts show that this trend is expected to continue. However, the rapid mobile data explosion and the need for higher data rates comes at a cost of increased complexity and energy consumption of the mobil...

  17. TV Broadcast Efficiency in 5G Networks from Subscriber Prospective

    KAUST Repository

    Lau, Chun Pong

    2015-12-06

    The flexibility of radio access network facilitated by 5G networks opens the gateway of deploying dynamic strategies for broadcasting TV channels in an efficient way. Currently, spectrum efficiency and bandwidth efficiency are the two common metrics measuring the efficiency of a system. These metrics assess the net bitrate for a unit of spectrum bandwidth. However, there is a lack of measurement, quantifying the effectiveness of a broadcasting strategy from the user perspective. In this paper, we introduce a novel measurement approach, called broadcast efficiency which considers the mobile user as a main reference. Broadcast efficiency is calculated as the number of served audiences per unit of radio resource. From numerical analysis, we show that broadcasting unpopular TV channels dramatically decreases the broadcast efficiency. This finding is evaluated by employing multiple distributions on the size of audience among TV channels. Furthermore, by conducting a real-life simulation, we discover that a high broadcast efficiency may result in a low percentage of served audiences if the audiences of TV channels are quite evenly distributed.

  18. Leveraging Mobile Network Big Data for Developmental Policy ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Some argue that big data and big data users offer advantages to generate evidence. ... Supported by IDRC, this research focused on transportation planning in urban ... Using mobile network big data for land use classification CPRsouth 2015.

  19. Mobile Position Estimation using Artificial Neural Network in CDMA Cellular Systems

    Directory of Open Access Journals (Sweden)

    Omar Waleed Abdulwahhab

    2017-01-01

    Full Text Available Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA and received signal strength (RSS are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The results show that the neural network has good performance compared with two other analytical methods which are average positioning method and optimal positioning method.

  20. Structural equation modelling of determinants of customer satisfaction of mobile network providers: Case of Kolkata, India

    Directory of Open Access Journals (Sweden)

    Shibashish Chakraborty

    2014-12-01

    Full Text Available The Indian market of mobile network providers is growing rapidly. India is the second largest market of mobile network providers in the world and there is intense competition among existing players. In such a competitive market, customer satisfaction becomes a key issue. The objective of this paper is to develop a customer satisfaction model of mobile network providers in Kolkata. The results indicate that generic requirements (an aggregation of output quality and perceived value, flexibility, and price are the determinants of customer satisfaction. This study offers insights for mobile network providers to understand the determinants of customer satisfaction.

  1. Mobile Sensor Networks for Inspection Tasks in Harsh Industrial Environments

    NARCIS (Netherlands)

    Mulder, Jacob; Wang, Xinyu; Ferwerda, Franke; Cao, Ming

    Recent advances in sensor technology have enabled the fast development of mobile sensor networks operating in various unknown and sometimes hazardous environments. In this paper, we introduce one integrative approach to design, analyze and test distributed control algorithms to coordinate a network

  2. Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Parmeet Kaur Jaggi

    2015-10-01

    Full Text Available Mobile ad hoc networks (MANETs have significantly enhanced the wireless networks by eliminating the need for any fixed infrastructure. Hence, these are increasingly being used for expanding the computing capacity of existing networks or for implementation of autonomous mobile computing Grids. However, the fragile nature of MANETs makes the constituent nodes susceptible to failures and the computing potential of these networks can be utilized only if they are fault tolerant. The technique of checkpointing based rollback recovery has been used effectively for fault tolerance in static and cellular mobile systems; yet, the implementation of existing protocols for MANETs is not straightforward. The paper presents a novel rollback recovery protocol for handling the failures of mobile nodes in a MANET using checkpointing and sender based message logging. The proposed protocol utilizes the routing protocol existing in the network for implementing a low overhead recovery mechanism. The presented recovery procedure at a node is completely domino-free and asynchronous. The protocol is resilient to the dynamic characteristics of the MANET; allowing a distributed application to be executed independently without access to any wired Grid or cellular network access points. We also present an algorithm to record a consistent global snapshot of the MANET.

  3. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    Directory of Open Access Journals (Sweden)

    Bram Bonné

    2017-07-01

    Full Text Available Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the participants’ devices connect to and the connections made by apps on these devices, for a period of 30 days. Afterwards, participants are surveyed about their awareness and privacy sensitiveness. We show that while a higher expertise in computer networks corresponds to more awareness about the connections made by apps, neither this expertise nor the actual privacy stance of the participant translates to better security habits. Moreover, participants in general were unaware about a significant part of connections made by apps on their devices, a matter that is worsened by the fact that one third of Wi-Fi networks that participants connect to do not have any security enabled. Based on our results, we provide recommendations to network providers, developers and users on how to improve Wi-Fi security for mobile devices.

  4. Duplicate Address Detection Table in IPv6 Mobile Networks

    Science.gov (United States)

    Alisherov, Farkhod; Kim, Taihoon

    In IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet protocol IPv6 is used in next generatoion mobile communication. Although IPv6 improves the existing IPv4 Internet protocol, Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to ensure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet. In this paper, the author proposes a new DAD mechanism to speed up the DAD procedure. A DAD table is created in access or mobility routers in IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search in the DAD table to confirm the uniqueness of the address.

  5. Mobility and Bandwidth prediction in virtualized LTE systems: architecture and challenges

    NARCIS (Netherlands)

    Karagiannis, Georgios; Jamakovic, Almerima; Briggs, Keith; Karimzadeh Motallebi Azar, Morteza; Parada, Carlos; Iulian Corici, Marius; Taleb, Tarik; Edmonds, Andy; Bohnert, Thomas Michael

    2014-01-01

    Long Term Evolution (LTE) represents the fourth generation (4G) technology which is capable of providing high data rates as well as support of high speed mobility. The EU FP7 Mobile Cloud Networking (MCN) project integrates the use of cloud computing concepts in LTE mobile networks in order to

  6. Experimental Investigation of Compression with Fixed-length Code Quantization for Convergent Access-Mobile Networks

    OpenAIRE

    L. Anet Neto; P. Chanclou; Z. Tayq; B. C. Zabada; F. Saliou; G. Simon

    2016-01-01

    We experimentally assess compression with scalar and vector quantization for fixed-mobile convergent networks. We show that four-dimensional vector quantization allows 73% compression compliant with 3GPP EVM recommendations for transmissions over 25 km SSMF with 1:16 split ratio.

  7. To share or not to share? Business aspects of network sharing for Mobile Network Operators

    NARCIS (Netherlands)

    Berkers, F.T.H.M.; Hendrix, G.; Chatzicharistou, I.; Haas, T. de; Hamera, D.

    2010-01-01

    Radio spectrum and network infrastructure are two essential resources for mobile service delivery, which are both costly and increasingly scarce. In this paper we consider drivers and barriers of network sharing, which is seen as a potential solution for scarcity in these resources. We considered a

  8. Energy Efficient and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Amine Dahane

    2015-01-01

    Full Text Available The main concern of clustering approaches for mobile wireless sensor networks (WSNs is to prolong the battery life of the individual sensors and the network lifetime. For a successful clustering approach the need of a powerful mechanism to safely elect a cluster head remains a challenging task in many research works that take into account the mobility of the network. The approach based on the computing of the weight of each node in the network is one of the proposed techniques to deal with this problem. In this paper, we propose an energy efficient and safe weighted clustering algorithm (ES-WCA for mobile WSNs using a combination of five metrics. Among these metrics lies the behavioral level metric which promotes a safe choice of a cluster head in the sense where this last one will never be a malicious node. Moreover, the highlight of our work is summarized in a comprehensive strategy for monitoring the network, in order to detect and remove the malicious nodes. We use simulation study to demonstrate the performance of the proposed algorithm.

  9. Flexible Aperture Tuning Solution for Cellular Main Antenna in Metallic Back Cover Mobile Phone

    Directory of Open Access Journals (Sweden)

    Yew Choon Mark Tan

    2017-10-01

    Full Text Available Metal housing has been used extensively on portable communication devices such as on mobile phones and tablets. The choice of metal housing ranges from metallic rim to metallic back cover. This metal housing tends to improve the outlook appearance of the mobile devices, and add mechanical strength towards the mobile devices. However, from the aspect of the communication antenna, the metal housing often posts great challenges towards the flexibility in antenna design and reduction in antenna performance. This paper presents an approach to overcome the challenges by integrating the metal housing of the mobile phone as part of the antenna, along with the introduction of tunable antenna concept to provide different forms of Aperture Tuning to the Cellular Main Antenna, to satisfy its wide frequency band coverages for the 2nd, 3rd and 4th Generation (2G, 3G and 4G mobile network.

  10. Research of using mobile agents for information discovery in P2P networks

    International Nuclear Information System (INIS)

    Lan Yan; Yao Qing

    2003-01-01

    The technology of P2P is a new network-computing model that has great value of commerce and technology. After analyzing the current information discovery technology in P2P network, a new solution that is based on mobile agent is proposed. The mobile agent solution can reduce the need of bandwidth, be adapt to the dynamic of P2P network, and be asynchronous and be very fault tolerant. (authors)

  11. 78 FR 69018 - Improving the Resiliency of Mobile Wireless Communications Networks; Reliability and Continuity...

    Science.gov (United States)

    2013-11-18

    ... consumers value overall network reliability and quality in selecting mobile wireless service providers, they...-125] Improving the Resiliency of Mobile Wireless Communications Networks; Reliability and Continuity... (Reliability NOI) in 2011 to ``initiate a comprehensive examination of issues regarding the reliability...

  12. A Reliable Handoff Mechanism for Mobile Industrial Wireless Sensor Networks.

    Science.gov (United States)

    Ma, Jian; Yang, Dong; Zhang, Hongke; Gidlund, Mikael

    2017-08-04

    With the prevalence of low-power wireless devices in industrial applications, concerns about timeliness and reliability are bound to continue despite the best efforts of researchers to design Industrial Wireless Sensor Networks (IWSNs) to improve the performance of monitoring and control systems. As mobile devices have a major role to play in industrial production, IWSNs should support mobility. However, research on mobile IWSNs and practical tests have been limited due to the complicated resource scheduling and rescheduling compared with traditional wireless sensor networks. This paper proposes an effective mechanism to guarantee the performance of handoff, including a mobility-aware scheme, temporary connection and quick registration. The main contribution of this paper is that the proposed mechanism is implemented not only in our testbed but in a real industrial environment. The results indicate that our mechanism not only improves the accuracy of handoff triggering, but also solves the problem of ping-pong effect during handoff. Compared with the WirelessHART standard and the RSSI-based approach, our mechanism facilitates real-time communication while being more reliable, which can help end-to-end packet delivery remain an average of 98.5% in the scenario of mobile IWSNs.

  13. Proceedings of the Workshop on Advanced Network and Technology Concepts for Mobile, Micro, and Personal Communications

    Science.gov (United States)

    Paul, Lori (Editor)

    1991-01-01

    The Workshop on Advanced Network and Technology Concepts for Mobile, Micro, and Personal Communications was held at NASA's JPL Laboratory on 30-31 May 1991. It provided a forum for reviewing the development of advanced network and technology concepts for turn-of-the-century telecommunications. The workshop was organized into three main categories: (1) Satellite-Based Networks (L-band, C-band, Ku-band, and Ka-band); (2) Terrestrial-Based Networks (cellular, CT2, PCN, GSM, and other networks); and (3) Hybrid Satellite/Terrestrial Networks. The proceedings contain presentation papers from each of the above categories.

  14. Monitoring and classifying animal behavior using ZigBee-based mobile ad hoc wireless sensor networks and artificial neural networks

    DEFF Research Database (Denmark)

    S. Nadimi, Esmaeil; Nyholm Jørgensen, Rasmus; Blanes-Vidal, Victoria

    2012-01-01

    Animal welfare is an issue of great importance in modern food production systems. Because animal behavior provides reliable information about animal health and welfare, recent research has aimed at designing monitoring systems capable of measuring behavioral parameters and transforming them...... into their corresponding behavioral modes. However, network unreliability and high-energy consumption have limited the applicability of those systems. In this study, a 2.4-GHz ZigBee-based mobile ad hoc wireless sensor network (MANET) that is able to overcome those problems is presented. The designed MANET showed high...... communication reliability, low energy consumption and low packet loss rate (14.8%) due to the deployment of modern communication protocols (e.g. multi-hop communication and handshaking protocol). The measured behavioral parameters were transformed into the corresponding behavioral modes using a multilayer...

  15. Mobility-Aware User Association in Uplink Cellular Networks

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Alouini, Mohamed-Slim; Al-Naffouri, Tareq Y.

    2017-01-01

    This letter studies the mobility aware user-to-BS association policies, within a stochastic geometry framework, in two tier uplink cellular networks with fractional channel inversion power control. Particularly, we model the base stations’ locations using the widely accepted poisson point process and obtain the coverage probability and handover cost expressions for the coupled and decoupled uplink and downlink associations. To this end, we compute the average throughput for the mobile users and study the merits and demerits of each association strategy.

  16. Mobility-Aware User Association in Uplink Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-07-20

    This letter studies the mobility aware user-to-BS association policies, within a stochastic geometry framework, in two tier uplink cellular networks with fractional channel inversion power control. Particularly, we model the base stations’ locations using the widely accepted poisson point process and obtain the coverage probability and handover cost expressions for the coupled and decoupled uplink and downlink associations. To this end, we compute the average throughput for the mobile users and study the merits and demerits of each association strategy.

  17. PERFORMANCE ANALYSIS OF DSR ROUTING PROTOCOL UNDER ENERGY BASED SELFISH ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    T.V.P.Sundararajan

    2010-06-01

    Full Text Available Mobile Ad hoc Networks (MANETs rely on the cooperation of all participating nodes to provide the fundamental operations such as routing and data forwarding. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist.[1]. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. This paper pointed out Energy based selfish nodes (EBSN where these selfish nodes tend to use the network but do not cooperate, saving battery life for their own communications [2],[3]. We present a simulation study of the effects of Energy based selfish nodes (EBSN on DSR routing protocol and its impact over network performance in terms of throughput and delay of a mobile ad hoc network where a defined percentage of nodes were misbehaving.

  18. Voice over IP in the WiFi Network business models: Will voice be a killer application for WiFi Public Networks?

    OpenAIRE

    Infante, Jorge; Bellalta, Boris

    2013-01-01

    The stunning growth of WiFi networks, together with the spreading of mobile telephony and the increasing use of Voice over IP (VoIP) on top of Internet, pose relevant questions on the application of WiFi networks to support VoIP services that could be used as a complement and/or competition to the 2G/3G cellular networks. The paper explores the state of the art on the capability of WiFi networks to support voice services in a user itinerant context, identifying actual and future strengths, we...

  19. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    Science.gov (United States)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  20. Routing in Mobile Wireless Sensor Networks: A Leader-Based Approach.

    Science.gov (United States)

    Burgos, Unai; Amozarrain, Ugaitz; Gómez-Calzado, Carlos; Lafuente, Alberto

    2017-07-07

    This paper presents a leader-based approach to routing in Mobile Wireless Sensor Networks (MWSN). Using local information from neighbour nodes, a leader election mechanism maintains a spanning tree in order to provide the necessary adaptations for efficient routing upon the connectivity changes resulting from the mobility of sensors or sink nodes. We present two protocols following the leader election approach, which have been implemented using Castalia and OMNeT++. The protocols have been evaluated, besides other reference MWSN routing protocols, to analyse the impact of network size and node velocity on performance, which has demonstrated the validity of our approach.