WorldWideScience

Sample records for mobile cellular networks

  1. Increasing cellular coverage within integrated terrestrial/satellite mobile networks

    Science.gov (United States)

    Castro, Jonathan P.

    1995-01-01

    When applying the hierarchical cellular concept, the satellite acts as giant umbrella cell covering a region with some terrestrial cells. If a mobile terminal traversing the region arrives to the border-line or limits of a regular cellular ground service, network transition occurs and the satellite system continues the mobile coverage. To adequately assess the boundaries of service of a mobile satellite system an a cellular network within an integrated environment, this paper provides an optimized scheme to predict when a network transition may be necessary. Under the assumption of a classified propagation phenomenon and Lognormal shadowing, the study applies an analytical approach to estimate the location of a mobile terminal based on a reception of the signal strength emitted by a base station.

  2. Performance Evaluation Of Mobile Cellular Networks In Nigeria

    OpenAIRE

    Shoewu, O.O

    2018-01-01

    The aim of this paper is to evaluate the performance of mobile networks such as MTN, GLO, and ETISALAT in Nigeria and suggest ways the performance of digital cellular networks can improve to minimize some of its present short comings or limitations. This paper discusses the performance improvement of digital cellular networks. A non- CDMA cellular network is use in an overall wireless environment for the purpose of this paper. This paper also discusses the performance assessment of three mobi...

  3. Assessing the implications of cellular network performance on mobile content access

    DEFF Research Database (Denmark)

    Kaup, Fabian; Michelinakis, Foivos; Bui, Nicola

    2016-01-01

    Mobile applications such as VoIP, (live) gaming, or video streaming have diverse QoS requirements ranging from low delay to high throughput. The optimization of the network quality experienced by end-users requires detailed knowledge of the expected network performance. Also, the achieved service...... of cellular network measurements, focused on analyzing root causes of mobile network performance variability. Measurements conducted on a 4G cellular network in Germany show that management and configuration decisions have a substantial impact on the performance. Specifically, it is observed...

  4. Design mobile satellite system architecture as an integral part of the cellular access digital network

    Science.gov (United States)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  5. Analysis of Blocking Rate and Bandwidth Usage of Mobile IPTV Services in Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Mingfu Li

    2014-01-01

    Full Text Available Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  6. Analysis of blocking rate and bandwidth usage of mobile IPTV services in wireless cellular networks.

    Science.gov (United States)

    Li, Mingfu

    2014-01-01

    Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  7. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  8. Mobility-Aware User Association in Uplink Cellular Networks

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Alouini, Mohamed-Slim; Al-Naffouri, Tareq Y.

    2017-01-01

    This letter studies the mobility aware user-to-BS association policies, within a stochastic geometry framework, in two tier uplink cellular networks with fractional channel inversion power control. Particularly, we model the base stations’ locations using the widely accepted poisson point process and obtain the coverage probability and handover cost expressions for the coupled and decoupled uplink and downlink associations. To this end, we compute the average throughput for the mobile users and study the merits and demerits of each association strategy.

  9. Mobility-Aware User Association in Uplink Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-07-20

    This letter studies the mobility aware user-to-BS association policies, within a stochastic geometry framework, in two tier uplink cellular networks with fractional channel inversion power control. Particularly, we model the base stations’ locations using the widely accepted poisson point process and obtain the coverage probability and handover cost expressions for the coupled and decoupled uplink and downlink associations. To this end, we compute the average throughput for the mobile users and study the merits and demerits of each association strategy.

  10. Radio resource management for mobile traffic offloading in heterogeneous cellular networks

    CERN Document Server

    Wu, Yuan; Huang, Jianwei; Shen, Xuemin (Sherman)

    2017-01-01

    This SpringerBrief offers two concrete design examples for traffic offloading. The first is an optimal resource allocation for small-cell based traffic offloading that aims at minimizing mobile users’ data cost. The second is an optimal resource allocation for device-to-device assisted traffic offloading that also minimizes the total energy consumption and cellular link usage (while providing an overview of the challenging issues). Both examples illustrate the importance of proper resource allocation to the success of traffic offloading, show the consequent performance advantages of executing optimal resource allocation, and present the methodologies to achieve the corresponding optimal offloading solution for traffic offloading in heterogeneous cellular networks. The authors also include an overview of heterogeneous cellular networks and explain different traffic offloading paradigms ranging from uplink traffic offloading through small cells to downlink traffic offloading via mobile device-to-device cooper...

  11. Mobility-Aware Modeling and Analysis of Dense Cellular Networks With $C$ -Plane/ $U$ -Plane Split Architecture

    KAUST Repository

    Ibrahim, Hazem

    2016-09-19

    The unrelenting increase in the population of mobile users and their traffic demands drive cellular network operators to densify their network infrastructure. Network densification shrinks the footprint of base stations (BSs) and reduces the number of users associated with each BS, leading to an improved spatial frequency reuse and spectral efficiency, and thus, higher network capacity. However, the densification gain comes at the expense of higher handover rates and network control overhead. Hence, user’s mobility can diminish or even nullifies the foreseen densification gain. In this context, splitting the control plane ( C -plane) and user plane ( U -plane) is proposed as a potential solution to harvest densification gain with reduced cost in terms of handover rate and network control overhead. In this paper, we use stochastic geometry to develop a tractable mobility-aware model for a two-tier downlink cellular network with ultra-dense small cells and C -plane/ U -plane split architecture. The developed model is then used to quantify the effect of mobility on the foreseen densification gain with and without C -plane/ U -plane split. To this end, we shed light on the handover problem in dense cellular environments, show scenarios where the network fails to support certain mobility profiles, and obtain network design insights.

  12. Heterogeneous cellular networks

    CERN Document Server

    Hu, Rose Qingyang

    2013-01-01

    A timely publication providing coverage of radio resource management, mobility management and standardization in heterogeneous cellular networks The topic of heterogeneous cellular networks has gained momentum in industry and the research community, attracting the attention of standardization bodies such as 3GPP LTE and IEEE 802.16j, whose objectives are looking into increasing the capacity and coverage of the cellular networks. This book focuses on recent progresses,  covering the related topics including scenarios of heterogeneous network deployment, interference management i

  13. Wireless Cellular Mobile Communications

    OpenAIRE

    Zalud, V.

    2002-01-01

    In this article is briefly reviewed the history of wireless cellular mobile communications, examined the progress in current second generation (2G) cellular standards and discussed their migration to the third generation (3G). The European 2G cellular standard GSM and its evolution phases GPRS and EDGE are described somewhat in detail. The third generation standard UMTS taking up on GSM/GPRS core network and equipped with a new advanced access network on the basis of code division multiple ac...

  14. Environment Aware Cellular Networks

    KAUST Repository

    Ghazzai, Hakim

    2015-02-01

    The unprecedented rise of mobile user demand over the years have led to an enormous growth of the energy consumption of wireless networks as well as the greenhouse gas emissions which are estimated currently to be around 70 million tons per year. This significant growth of energy consumption impels network companies to pay huge bills which represent around half of their operating expenditures. Therefore, many service providers, including mobile operators, are looking for new and modern green solutions to help reduce their expenses as well as the level of their CO2 emissions. Base stations are the most power greedy element in cellular networks: they drain around 80% of the total network energy consumption even during low traffic periods. Thus, there is a growing need to develop more energy-efficient techniques to enhance the green performance of future 4G/5G cellular networks. Due to the problem of traffic load fluctuations in cellular networks during different periods of the day and between different areas (shopping or business districts and residential areas), the base station sleeping strategy has been one of the main popular research topics in green communications. In this presentation, we present several practical green techniques that provide significant gains for mobile operators. Indeed, combined with the base station sleeping strategy, these techniques achieve not only a minimization of the fossil fuel consumption but also an enhancement of mobile operator profits. We start with an optimized cell planning method that considers varying spatial and temporal user densities. We then use the optimal transport theory in order to define the cell boundaries such that the network total transmit power is reduced. Afterwards, we exploit the features of the modern electrical grid, the smart grid, as a new tool of power management for cellular networks and we optimize the energy procurement from multiple energy retailers characterized by different prices and pollutant

  15. Mobility-Aware Modeling and Analysis of Dense Cellular Networks With $C$ -Plane/ $U$ -Plane Split Architecture

    KAUST Repository

    Ibrahim, Hazem; Elsawy, Hesham; Nguyen, Uyen Trang; Alouini, Mohamed-Slim

    2016-01-01

    The unrelenting increase in the population of mobile users and their traffic demands drive cellular network operators to densify their network infrastructure. Network densification shrinks the footprint of base stations (BSs) and reduces the number

  16. MSAT and cellular hybrid networking

    Science.gov (United States)

    Baranowsky, Patrick W., II

    Westinghouse Electric Corporation is developing both the Communications Ground Segment and the Series 1000 Mobile Phone for American Mobile Satellite Corporation's (AMSC's) Mobile Satellite (MSAT) system. The success of the voice services portion of this system depends, to some extent, upon the interoperability of the cellular network and the satellite communication circuit switched communication channels. This paper will describe the set of user-selectable cellular interoperable modes (cellular first/satellite second, etc.) provided by the Mobile Phone and described how they are implemented with the ground segment. Topics including roaming registration and cellular-to-satellite 'seamless' call handoff will be discussed, along with the relevant Interim Standard IS-41 Revision B Cellular Radiotelecommunications Intersystem Operations and IOS-553 Mobile Station - Land Station Compatibility Specification.

  17. Wireless Cellular Mobile Communications

    Directory of Open Access Journals (Sweden)

    V. Zalud

    2002-12-01

    Full Text Available In this article is briefly reviewed the history of wireless cellularmobile communications, examined the progress in current secondgeneration (2G cellular standards and discussed their migration to thethird generation (3G. The European 2G cellular standard GSM and itsevolution phases GPRS and EDGE are described somewhat in detail. Thethird generation standard UMTS taking up on GSM/GPRS core network andequipped with a new advanced access network on the basis of codedivision multiple access (CDMA is investigated too. A sketch of theperspective of mobile communication beyond 3G concludes this article.

  18. Issues for the integration of satellite and terrestrial cellular networks for mobile communications

    Science.gov (United States)

    Delre, Enrico; Mistretta, Ignazio; Dellipriscoli, Francesco; Settimo, Franco

    1991-01-01

    Satellite and terrestrial cellular systems naturally complement each other for land mobile communications, even though present systems have been developed independently. The main advantages of the integrated system are a faster wide area coverage, a better management of overloading traffic conditions, an extension to geographical areas not covered by the terrestrial network and, in perspective, the provision of only one integrated system for all mobile communications (land, aeronautical, and maritime). To achieve these goals, as far as possible the same protocols of the terrestrial network should be used also for the satellite network. Discussed here are the main issues arising from the requirements of the main integrated system. Some results are illustrated, and possible future improvements due to technical solutions are presented.

  19. The Digital Age of Mobile Cellular Network in Germany and China :Policies, Technologies and Markets (PartⅠ)

    Institute of Scientific and Technical Information of China (English)

    Mingtao Shi

    2009-01-01

    The German Postal Reform Ⅰ in 1989 introduced competition in the mobile cellular market. German cellular operators, DeTeMobil, Mannesmann, E-Plus and VIAG Interkom, built DI-, D2-, El- and E2-Netze based on GSM standards made in Europe. China Unicom was created in 1994 and China Telecom was separated from MPT in 1995. China Telecom and China Unicorn competed in a duopoly from the mid-1990s onwards and the cellular services provided by them also rely on GSM standards. China Telecom additionally deployed XLT technology (PHS) from the late 1990s onwards. While DeTeMobil and Mannesmarm conquered approximately 80%-90% of the market throughout the 1990s and were the two dominant market players in Germany, China's cellular market was mainly controlled by China Mobile. In Germany, prices related to cellular technology continued the downwards trend as a major result of the process of deregulation, liberalisation and competition. In China, price wars bad led to significant price reductions in the cellular market. Although network operators in both countries strived to deliver differentiated cellular Services, the two national markets in the 1990s were visibly shaped by product homogeneity.

  20. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  1. Energy-Efficient Crowdsensing of Human Mobility and Signal Levels in Cellular Networks

    Science.gov (United States)

    Foremski, Paweł; Gorawski, Michał; Grochla, Krzysztof; Polys, Konrad

    2015-01-01

    The paper presents a practical application of the crowdsensing idea to measure human mobility and signal coverage in cellular networks. Currently, virtually everyone is carrying a mobile phone, which may be used as a sensor to gather research data by measuring, e.g., human mobility and radio signal levels. However, many users are unwilling to participate in crowdsensing experiments. This work begins with the analysis of the barriers for engaging people in crowdsensing. A survey showed that people who agree to participate in crowdsensing expect a minimum impact on their battery lifetime and phone usage habits. To address these requirements, this paper proposes an application for measuring the location and signal strength data based on energy-efficient GPS tracking, which allows one to perform the measurements of human mobility and radio signal levels with minimum energy utilization and without any engagement of the user. The method described combines measurements from the accelerometer with effective management of the GPS to monitor the user mobility with the decrease in battery lifetime by approximately 20%. To show the applicability of the proposed platform, the sample results of signal level distribution and coverage maps gathered for an LTE network and representing human mobility are shown. PMID:26340633

  2. The Digital Age of Mobile Cellular Network in Germany and China: Policies, Technologies and Markets (Part Ⅱ)

    Institute of Scientific and Technical Information of China (English)

    Mingtao Shi

    2009-01-01

    The German Postal Reform Ⅰ in 1989 introduced competition in the mobile cellular market. German cellular operators, DeTeMobil, Mannesmann, E-Plus and VIAG Interkom, built D1-, D2-, El-and E2-Netze based on GSM standards made in Europe. China Unicom was created in 1994 and China Telecom was separated from MPT in 1995. China Telecom and China Unicom competed in a duopoly from the mid-1990s onwards and the cellular services provided by them also rely on GSM standards. China Telecom additionally deployed XLT technology (PHS) from the late 1990s onwards. While DeTeMobil and Mannesmann conquered approximately 80%-90% of the market throughout the 1990s and were the two dominant market players in Germany, China's cellular market was mainly controlled by China Mobile. In Germany, prices related to cellular technology continued the downwards trend as a major result of the process of deregulation, liberalisation and competition. In China, price wars had led to significant price reductions in the cellular market. Although network operators in both countries strived to deliver differentiated cellular services, the two national markets in the 1990s were visibly shaped by product homogeneity.

  3. Evaluating a Novel Cellular Automata-Based Distributed Power Management Approach for Mobile Wireless Sensor Networks

    Science.gov (United States)

    Adabi, Sepideh; Adabi, Sahar; Rezaee, Ali

    According to the traditional definition of Wireless Sensor Networks (WSNs), static sensors have limited the feasibility of WSNs in some kind of approaches, so the mobility was introduced in WSN. Mobile nodes in a WSN come equipped with battery and from the point of deployment, this battery reserve becomes a valuable resource since it cannot be replenished. Hence, maximizing the network lifetime by minimizing the energy is an important challenge in Mobile WSN. Energy conservation can be accomplished by different approaches. In this paper, we presented an energy conservation solution based on Cellular Automata. The main objective of this solution is based on dynamically adjusting the transmission range and switching between operational states of the sensor nodes.

  4. Prediction Based Energy Balancing Forwarding in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yang Jian-Jun

    2017-01-01

    Full Text Available In the recent cellular network technologies, relay stations extend cell coverage and enhance signal strength for mobile users. However, busy traffic makes the relay stations in hot area run out of energy quickly. Energy is a very important factor in the forwarding of cellular network since mobile users(cell phones in hot cells often suffer from low throughput due to energy lack problems. In many situations, the energy lack problems take place because the energy loading is not balanced. In this paper, we present a prediction based forwarding algorithm to let a mobile node dynamically select the next relay station with highest potential energy capacity to resume communication. Key to this strategy is that a relay station only maintains three past status, and then it is able to predict the potential energy capacity. Then, the node selects the next hop with potential maximal energy. Moreover, a location based algorithm is developed to let the mobile node figure out the target region in order to avoid flooding. Simulations demonstrate that our approach significantly increase the aggregate throughput and decrease the delay in cellular network environment.

  5. Uncovering the footprints of malicious traffic in cellular data networks

    OpenAIRE

    Raghuramu, A; Zang, H; Chuah, CN

    2015-01-01

    © Springer International Publishing Switzerland 2015. In this paper, we present a comprehensive characterization of malicious traffic generated by mobile devices using Deep Packet Inspection (DPI) records and security event logs from a large US based cellular provider network. Our analysis reveals that 0.17% of mobile devices in the cellular network are affected by security threats. This proportion, while small, is orders of magnitude higher than the last reported (in 2013) infection rate of ...

  6. DURIP: Mitigating Attacks on Mobile Devices and Critical Cellular Infrastructure

    Science.gov (United States)

    2016-03-03

    services. From mobile banking and location- based services to the real-time streaming of music and video, cellular networks now provide advanced voice...time streaming of music and video, cellular networks now provide advanced voice and data services to more than 4.5 billion subscribers around the world...will receive scholarships or fellowships for further studies in science , mathematics, engineering or technology fields: Student Metrics This section

  7. Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.

    Science.gov (United States)

    Pierre, Samuel

    2001-01-01

    Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…

  8. Velocity-Aware Handover Management in Two-Tier Cellular Networks

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    by network densification. Hence, user mobility imposes a nontrivial challenge to harvest capacity gains via network densification. In this paper, we propose a velocity-aware HO management scheme for two-tier downlink cellular network to mitigate the HO effect

  9. Multi-operator collaboration for green cellular networks under roaming price consideration

    KAUST Repository

    Ghazzai, Hakim; Yaacoub, Elias E.; Alouini, Mohamed-Slim

    2014-01-01

    This paper investigates the collaboration between multiple mobile operators to optimize the energy efficiency of cellular networks. Our framework studies the case of LTE-Advanced networks deployed in the same area and owning renewable energy generators. The objective is to reduce the CO2 emissions of cellular networks via collaborative techniques and using base station sleeping strategy while respecting the network quality of service. Low complexity and practical algorithm is employed to achieve green goals during low traffic periods. Cooperation decision criteria are also established basing on derived roaming prices and profit gains of competitive mobile operators. Our numerical results show a significant save in terms of CO2 compared to the non-collaboration case and that cooperative mobile operator exploiting renewables are more awarded than traditional operators.

  10. Multi-operator collaboration for green cellular networks under roaming price consideration

    KAUST Repository

    Ghazzai, Hakim

    2014-09-01

    This paper investigates the collaboration between multiple mobile operators to optimize the energy efficiency of cellular networks. Our framework studies the case of LTE-Advanced networks deployed in the same area and owning renewable energy generators. The objective is to reduce the CO2 emissions of cellular networks via collaborative techniques and using base station sleeping strategy while respecting the network quality of service. Low complexity and practical algorithm is employed to achieve green goals during low traffic periods. Cooperation decision criteria are also established basing on derived roaming prices and profit gains of competitive mobile operators. Our numerical results show a significant save in terms of CO2 compared to the non-collaboration case and that cooperative mobile operator exploiting renewables are more awarded than traditional operators.

  11. Enhancement of Localization Accuracy in Cellular Networks via Cooperative AdHoc Links

    DEFF Research Database (Denmark)

    Lhomme, Edouard; Frattasi, Simone; Figueiras, Joao

    2006-01-01

    Positioning information enables new applications for cellular phones, personal communication systems, and specialized mobile radios. The network heterogeneity emerging in the fourth generation (4G) of mobile networks can be utilized for enhancements of the location estimation accuracy...

  12. Energy Cost Minimization in Heterogeneous Cellular Networks with Hybrid Energy Supplies

    Directory of Open Access Journals (Sweden)

    Bang Wang

    2016-01-01

    Full Text Available The ever increasing data demand has led to the significant increase of energy consumption in cellular mobile networks. Recent advancements in heterogeneous cellular networks and green energy supplied base stations provide promising solutions for cellular communications industry. In this article, we first review the motivations and challenges as well as approaches to address the energy cost minimization problem for such green heterogeneous networks. Owing to the diversities of mobile traffic and renewable energy, the energy cost minimization problem involves both temporal and spatial optimization of resource allocation. We next present a new solution to illustrate how to combine the optimization of the temporal green energy allocation and spatial mobile traffic distribution. The whole optimization problem is decomposed into four subproblems, and correspondingly our proposed solution is divided into four parts: energy consumption estimation, green energy allocation, user association, and green energy reallocation. Simulation results demonstrate that our proposed algorithm can significantly reduce the total energy cost.

  13. Future cooperative communication systems driven by social mobile networks

    DEFF Research Database (Denmark)

    Blázovics, L.; Varga, C.; Bamford, W.

    2011-01-01

    In this work we are underlining the importance of social mobile networks for upcoming cooperative communication systems. The assumption of this work is that future mobile communication systems will incorporate user cooperation, i.e. a combination of cellular access in parallel with ongoing short...... cases. By the example of the Gedda-Headz gaming community, possible links between cooperative mobile communication and social mobile networks are shown....

  14. Cellular Controlled Short-Range Communication for Cooperative P2P Networking

    DEFF Research Database (Denmark)

    Fitzek, Frank H. P.; Katz, Marcos; Zhang, Qi

    2009-01-01

    -range communication network among cooperating mobile and wireless devices. The role of the mobile device will change, from being an agnostic entity in respect to the surrounding world to a cognitive device. This cognitive device is capable of being aware of the neighboring devices as well as on the possibility......This article advocates a novel communication architecture and associated collaborative framework for future wireless communication systems. In contrast to the dominating cellular architecture and the upcoming peer-to-peer architecture, the new approach envisions a cellular controlled short...... to establish cooperation with them. The novel architecture together with several possible cooperative strategies will bring clear benefits for the network and service providers, mobile device manufacturers and also end users....

  15. 47 CFR 32.5003 - Cellular mobile revenue.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Cellular mobile revenue. 32.5003 Section 32... SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Instructions For Revenue Accounts § 32.5003 Cellular mobile revenue. This account shall include message revenue derived from cellular mobile...

  16. Handover management in dense cellular networks: A stochastic geometry approach

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2016-01-01

    Cellular operators are continuously densifying their networks to cope with the ever-increasing capacity demand. Furthermore, an extreme densification phase for cellular networks is foreseen to fulfill the ambitious fifth generation (5G) performance requirements. Network densification improves spectrum utilization and network capacity by shrinking base stations' (BSs) footprints and reusing the same spectrum more frequently over the spatial domain. However, network densification also increases the handover (HO) rate, which may diminish the capacity gains for mobile users due to HO delays. In highly dense 5G cellular networks, HO delays may neutralize or even negate the gains offered by network densification. In this paper, we present an analytical paradigm, based on stochastic geometry, to quantify the effect of HO delay on the average user rate in cellular networks. To this end, we propose a flexible handover scheme to reduce HO delay in case of highly dense cellular networks. This scheme allows skipping the HO procedure with some BSs along users' trajectories. The performance evaluation and testing of this scheme for only single HO skipping shows considerable gains in many practical scenarios. © 2016 IEEE.

  17. Handover management in dense cellular networks: A stochastic geometry approach

    KAUST Repository

    Arshad, Rabe

    2016-07-26

    Cellular operators are continuously densifying their networks to cope with the ever-increasing capacity demand. Furthermore, an extreme densification phase for cellular networks is foreseen to fulfill the ambitious fifth generation (5G) performance requirements. Network densification improves spectrum utilization and network capacity by shrinking base stations\\' (BSs) footprints and reusing the same spectrum more frequently over the spatial domain. However, network densification also increases the handover (HO) rate, which may diminish the capacity gains for mobile users due to HO delays. In highly dense 5G cellular networks, HO delays may neutralize or even negate the gains offered by network densification. In this paper, we present an analytical paradigm, based on stochastic geometry, to quantify the effect of HO delay on the average user rate in cellular networks. To this end, we propose a flexible handover scheme to reduce HO delay in case of highly dense cellular networks. This scheme allows skipping the HO procedure with some BSs along users\\' trajectories. The performance evaluation and testing of this scheme for only single HO skipping shows considerable gains in many practical scenarios. © 2016 IEEE.

  18. Mobility Management of Mobile IP Based on Multi-tier Cellular Systems%基于多层小区结构的移动IP移动性管理

    Institute of Scientific and Technical Information of China (English)

    唐宏; 吴中福; 聂能; 赵军; 熊思民

    2003-01-01

    In this paper,several currently existed Mobility Management Schemes of Mobile IP are simply analyzed,and so does the network structure of multi-tier cellular which nowadays is easily seen. Then we propose a few promo-tions on the strategies of mobility management when realizing mobile IP in multi-tier cellular network structure. Thekey of the promotions is that the required type of cell for a MN is determined based on the classification of its mobilitypattern. Consequently,the capacity of system may be increased while the frequency of handoff is decreased.

  19. Evolution of Positioning Techniques in Cellular Networks, from 2G to 4G

    Directory of Open Access Journals (Sweden)

    Rafael Saraiva Campos

    2017-01-01

    Full Text Available This review paper presents within a common framework the mobile station positioning methods applied in 2G, 3G, and 4G cellular networks, as well as the structure of the related 3GPP technical specifications. The evolution path through the generations is explored in three steps at each level: first, the new network elements supporting localization features are introduced; then, the standard localization methods are described; finally, the protocols providing specific support to mobile station positioning are studied. To allow a better understanding, this paper also brings a brief review of the cellular networks evolution paths.

  20. Next-Generation Environment-Aware Cellular Networks: Modern Green Techniques and Implementation Challenges

    KAUST Repository

    Ghazzai, Hakim

    2016-09-16

    Over the last decade, mobile communications have been witnessing a noteworthy increase of data traffic demand that is causing an enormous energy consumption in cellular networks. The reduction of their fossil fuel consumption in addition to the huge energy bills paid by mobile operators is considered as the most important challenges for the next-generation cellular networks. Although most of the proposed studies were focusing on individual physical layer power optimizations, there is a growing necessity to meet the green objective of fifth-generation cellular networks while respecting the user\\'s quality of service. This paper investigates four important techniques that could be exploited separately or together in order to enable wireless operators achieve significant economic benefits and environmental savings: 1) the base station sleeping strategy; 2) the optimized energy procurement from the smart grid; 3) the base station energy sharing; and 4) the green networking collaboration between competitive mobile operators. The presented simulation results measure the gain that could be obtained using these techniques compared with that of traditional scenarios. Finally, this paper discusses the issues and challenges related to the implementations of these techniques in real environments. © 2016 IEEE.

  1. Mobile Position Estimation using Artificial Neural Network in CDMA Cellular Systems

    Directory of Open Access Journals (Sweden)

    Omar Waleed Abdulwahhab

    2017-01-01

    Full Text Available Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA and received signal strength (RSS are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The results show that the neural network has good performance compared with two other analytical methods which are average positioning method and optimal positioning method.

  2. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  3. On the area spectral efficiency improvement of heterogeneous network by exploiting the integration of macro-femto cellular networks

    KAUST Repository

    Shakir, Muhammad

    2012-06-01

    Heterogeneous networks are an attractive means of expanding mobile network capacity. A heterogeneous network is typically composed of multiple radio access technologies (RATs) where the base stations are transmitting with variable power. In this paper, we consider a Heterogeneous network where we complement the macrocell network with low-power low-cost user deployed nodes, such as femtocell base stations to increase the mean achievable capacity of the system. In this context, we integrate macro-femto cellular networks and derive the area spectral efficiency of the proposed two tier Heterogeneous network. We consider the deployment of femtocell base stations around the edge of the macrocell such that this configuration is referred to as femto-on-edge (FOE) configuration. Moreover, FOE configuration mandates reduction in intercell interference due to the mobile users which are located around the edge of the macrocell since these femtocell base stations are low-power nodes which has significantly lower transmission power than macrocell base stations. We present a mathematical analysis to calculate the instantaneous carrier to interference ratio (CIR) of the desired mobile user in macro and femto cellular networks and determine the total area spectral efficiency of the Heterogeneous network. Details of the simulation processes are included to support the analysis and show the efficacy of the proposed deployment. It has been shown that the proposed setup of the Heterogeneous network offers higher area spectral efficiency which aims to fulfill the expected demand of the future mobile users. © 2012 IEEE.

  4. Security for 5G Mobile Wireless Networks

    OpenAIRE

    Fang, Dongfeng; Qian, Yi; Qingyang Hu, Rose

    2017-01-01

    The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use ca...

  5. Modems for emerging digital cellular-mobile radio system

    Science.gov (United States)

    Feher, Kamilo

    1991-01-01

    Digital modem techniques for emerging digital cellular telecommunications-mobile radio system applications are described and analyzed. In particular, theoretical performance, experimental results, principles of operation, and various architectures of pi/4-QPSK (pi/4-shifted coherent or differential QPSK) modems for second-generation US digital cellular radio system applications are presented. The spectral/power efficiency and performance of the pi/4-QPSK modems (American and Japanese digital cellular emerging standards) are studied and briefly compared to GMSK (Gaussian minimum-shift keying) modems (proposed for European DECT and GSM cellular standards). Improved filtering strategies and digital pilot-aided (digital channel sounding) techniques are also considered for pi/4-QPSK and other digital modems. These techniques could significantly improve the performance of digital cellular and other digital land mobile and satellite mobile radio systems. More spectrally efficient modem trends for future cellular/mobile (land mobile) and satellite communication systems applications are also highlighted.

  6. Velocity-Aware Handover Management in Two-Tier Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-01-19

    While network densification is considered an important solution to cater the ever-increasing capacity demand, its effect on the handover (HO) rate is overlooked. In dense 5G networks, HO delays may neutralize or even negate the gains offered by network densification. Hence, user mobility imposes a nontrivial challenge to harvest capacity gains via network densification. In this paper, we propose a velocity-aware HO management scheme for two-tier downlink cellular network to mitigate the HO effect on the foreseen densification throughput gains. The proposed HO scheme sacrifices the best base station (BS) connectivity, by skipping HO to some BSs along the user trajectory, to maintain longer connection durations and reduce HO rates. Furthermore, the proposed scheme enables cooperative BS service and strongest interference cancellation to compensate for skipping the best connectivity. To this end, we consider different HO skipping scenarios and develop a velocity-aware mathematical model, via stochastic geometry, to quantify the performance of the proposed HO schemes in terms of the coverage probability and user throughput. The results highlight the HO rate problem in dense cellular environments and show the importance of the proposed HO schemes. Finally, the value of BS cooperation along with handover skipping is quantified for different user mobility profiles.

  7. Modeling virtualized downlink cellular networks with ultra-dense small cells

    KAUST Repository

    Ibrahim, Hazem

    2015-09-11

    The unrelenting increase in the mobile users\\' populations and traffic demand drive cellular network operators to densify their infrastructure. Network densification increases the spatial frequency reuse efficiency while maintaining the signal-to-interference-plus-noise-ratio (SINR) performance, hence, increases the spatial spectral efficiency and improves the overall network performance. However, control signaling in such dense networks consumes considerable bandwidth and limits the densification gain. Radio access network (RAN) virtualization via control plane (C-plane) and user plane (U-plane) splitting has been recently proposed to lighten the control signaling burden and improve the network throughput. In this paper, we present a tractable analytical model for virtualized downlink cellular networks, using tools from stochastic geometry. We then apply the developed modeling framework to obtain design insights for virtualized RANs and quantify associated performance improvement. © 2015 IEEE.

  8. Energy efficiency in hybrid mobile and wireless networks

    Energy Technology Data Exchange (ETDEWEB)

    Abbas, Ziaul Haq

    2012-07-01

    Wireless Internet access is almost pervasive nowadays, and many types of wireless networks can be used to access the Internet. However, along with this growth, there is an even greater concern about the energy consumption and efficiency of mobile devices as well as of the supporting networks, triggering the appearance of the concept of green communication. While some efforts have been made towards this direction, challenges still exist and need to be tackled from diverse perspectives. Cellular networks, WLANs, and ad hoc networks in the form of wireless mesh networks are the most popular technologies for wireless Internet access. The availability of such a variety of access networks has also paved the way to explore synergistic approaches for Internet access, leading to the concept of hybrid networks and relay communications. In addition, many mobile devices are being equipped with multiple interfaces, enabling them to operate in hybrid networks. In contrast, the improvements in the battery technology itself have not matched the pace of the emerging mobile applications. The situation becomes more sophisticated when a mobile device functions also as a relay node to forward other station's data. In the literature, energy efficiency of mobile devices has been addressed from various perspectives such as protocol-level efforts, battery management efforts, etc. However, there is little work on energy efficiency in hybrid mobile and wireless networks and devices with heterogeneous connections. For example, when there are multiple networks available to a mobile device, how to achieve optimum long-term energy consumption of such a device is an open question. Furthermore, in today's cellular networks, micro-, pico-, and femto-cells are the most popular network topologies in order to support high data rate services and high user density. With the growth of such small-cell solutions, the energy consumption of these networks is also becoming an important concern for operators

  9. Area Green Efficiency (AGE) of Two Tier Heterogeneous Cellular Networks

    KAUST Repository

    Tabassum, Hina

    2012-10-03

    Small cell networks are becoming standard part of the future heterogeneous networks. In this paper, we consider a two tier heterogeneous network which promises energy savings by integrating the femto and macro cellular networks and thereby reducing CO2 emissions, operational and capital expenditures (OPEX and CAPEX) whilst enhancing the area spectral efficiency (ASE) of the network. In this context, we define a performance metric which characterize the aggregate energy savings per unit macrocell area and is referred to as area green efficiency (AGE) of the two tier heterogeneous network where the femto base stations are arranged around the edge of the reference macrocell such that the configuration is referred to as femto-on-edge (FOE). The mobile users in macro and femto cellular networks are transmitting with the adaptive power while maintaining the desired link quality such that the energy aware FOE configuration mandates to (i) save energy, and (ii) reduce the co-channel interference. We present a mathematical analysis to incorporate the uplink power control mechanism adopted by the mobile users and calibrate the uplink ASE and AGE of the energy aware FOE configuration. Next, we derive analytical expressions to compute the bounds on the uplink ASE of energy aware FOE configuration and demonstrate that the derived bounds are useful in evaluating the ASE under worst and best case interference scenarios. Simulation results are produced to demonstrate the ASE and AGE improvements in comparison to macro-only and macro-femto configuration with uniformly distributed femtocells.

  10. Comparison of neural network applications for channel assignment in cellular TDMA networks and dynamically sectored PCS networks

    Science.gov (United States)

    Hortos, William S.

    1997-04-01

    The use of artificial neural networks (NNs) to address the channel assignment problem (CAP) for cellular time-division multiple access and code-division multiple access networks has previously been investigated by this author and many others. The investigations to date have been based on a hexagonal cell structure established by omnidirectional antennas at the base stations. No account was taken of the use of spatial isolation enabled by directional antennas to reduce interference between mobiles. Any reduction in interference translates into increased capacity and consequently alters the performance of the NNs. Previous studies have sought to improve the performance of Hopfield- Tank network algorithms and self-organizing feature map algorithms applied primarily to static channel assignment (SCA) for cellular networks that handle uniformly distributed, stationary traffic in each cell for a single type of service. The resulting algorithms minimize energy functions representing interference constraint and ad hoc conditions that promote convergence to optimal solutions. While the structures of the derived neural network algorithms (NNAs) offer the potential advantages of inherent parallelism and adaptability to changing system conditions, this potential has yet to be fulfilled the CAP for emerging mobile networks. The next-generation communication infrastructures must accommodate dynamic operating conditions. Macrocell topologies are being refined to microcells and picocells that can be dynamically sectored by adaptively controlled, directional antennas and programmable transceivers. These networks must support the time-varying demands for personal communication services (PCS) that simultaneously carry voice, data and video and, thus, require new dynamic channel assignment (DCA) algorithms. This paper examines the impact of dynamic cell sectoring and geometric conditioning on NNAs developed for SCA in omnicell networks with stationary traffic to improve the metrics

  11. Analysis of Human Mobility Based on Cellular Data

    Science.gov (United States)

    Arifiansyah, F.; Saptawati, G. A. P.

    2017-01-01

    Nowadays not only adult but even teenager and children have then own mobile phones. This phenomena indicates that the mobile phone becomes an important part of everyday’s life. Based on these indication, the amount of cellular data also increased rapidly. Cellular data defined as the data that records communication among mobile phone users. Cellular data is easy to obtain because the telecommunications company had made a record of the data for the billing system of the company. Billing data keeps a log of the users cellular data usage each time. We can obtained information from the data about communication between users. Through data visualization process, an interesting pattern can be seen in the raw cellular data, so that users can obtain prior knowledge to perform data analysis. Cellular data processing can be done using data mining to find out human mobility patterns and on the existing data. In this paper, we use frequent pattern mining and finding association rules to observe the relation between attributes in cellular data and then visualize them. We used weka tools for finding the rules in stage of data mining. Generally, the utilization of cellular data can provide supporting information for the decision making process and become a data support to provide solutions and information needed by the decision makers.

  12. The effect of mobile cellular network performance and contextual factors on smartphone users’ satisfaction : A study on QoE evaluation for YouTube video streaming via CrowdSourcing

    OpenAIRE

    Zhen, Zuguang

    2015-01-01

    Mobile data traffic will continue to show rapid growth in the coming years; however the data revenue is not rising fast enough to ensure the operators’ profitability. Therefore, mobile operators must seek new approaches to find out what service does the customers need and what quality makes the customers satisfied in order to keep their increasingly sophisticated customers satisfied at the same time minimizing their revenue gap. This paper investigate the effect of mobile cellular network per...

  13. Wireless traffic steering for green cellular networks

    CERN Document Server

    Zhang, Shan; Zhou, Sheng; Niu, Zhisheng; Shen, Xuemin (Sherman)

    2016-01-01

    This book introduces wireless traffic steering as a paradigm to realize green communication in multi-tier heterogeneous cellular networks. By matching network resources and dynamic mobile traffic demand, traffic steering helps to reduce on-grid power consumption with on-demand services provided. This book reviews existing solutions from the perspectives of energy consumption reduction and renewable energy harvesting. Specifically, it explains how traffic steering can improve energy efficiency through intelligent traffic-resource matching. Several promising traffic steering approaches for dynamic network planning and renewable energy demand-supply balancing are discussed. This book presents an energy-aware traffic steering method for networks with energy harvesting, which optimizes the traffic allocated to each cell based on the renewable energy status. Renewable energy demand-supply balancing is a key factor in energy dynamics, aimed at enhancing renewable energy sustainability to reduce on-grid energy consum...

  14. Admission Control Threshold in Cellular Relay Networks with Power Adjustment

    Directory of Open Access Journals (Sweden)

    Lee Ki-Dong

    2009-01-01

    Full Text Available Abstract In the cellular network with relays, the mobile station can benefit from both coverage extension and capacity enhancement. However, the operation complexity increases as the number of relays grows up. Furthermore, in the cellular network with cooperative relays, it is even more complex because of an increased dimension of signal-to-noise ratios (SNRs formed in the cooperative wireless transmission links. In this paper, we propose a new method for admission capacity planning in a cellular network using a cooperative relaying mechanism called decode-and-forward. We mathematically formulate the dropping ratio using the randomness of "channel gain." With this, we formulate an admission threshold planning problem as a simple optimization problem, where we maximize the accommodation capacity (in number of connections subject to two types of constraints. (1 A constraint that the sum of the transmit powers of the source node and relay node is upper-bounded where both nodes can jointly adjust the transmit power. (2 A constraint that the dropping ratio is upper-bounded by a certain threshold value. The simplicity of the problem formulation facilitates its solution in real-time. We believe that the proposed planning method can provide an attractive guideline for dimensioning a cellular relay network with cooperative relays.

  15. MIMO Communication for Cellular Networks

    CERN Document Server

    Huang, Howard; Venkatesan, Sivarama

    2012-01-01

    As the theoretical foundations of multiple-antenna techniques evolve and as these multiple-input multiple-output (MIMO) techniques become essential for providing high data rates in wireless systems, there is a growing need to understand the performance limits of MIMO in practical networks. To address this need, MIMO Communication for Cellular Networks presents a systematic description of MIMO technology classes and a framework for MIMO system design that takes into account the essential physical-layer features of practical cellular networks. In contrast to works that focus on the theoretical performance of abstract MIMO channels, MIMO Communication for Cellular Networks emphasizes the practical performance of realistic MIMO systems. A unified set of system simulation results highlights relative performance gains of different MIMO techniques and provides insights into how best to use multiple antennas in cellular networks under various conditions. MIMO Communication for Cellular Networks describes single-user,...

  16. Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Parmeet Kaur Jaggi

    2015-10-01

    Full Text Available Mobile ad hoc networks (MANETs have significantly enhanced the wireless networks by eliminating the need for any fixed infrastructure. Hence, these are increasingly being used for expanding the computing capacity of existing networks or for implementation of autonomous mobile computing Grids. However, the fragile nature of MANETs makes the constituent nodes susceptible to failures and the computing potential of these networks can be utilized only if they are fault tolerant. The technique of checkpointing based rollback recovery has been used effectively for fault tolerance in static and cellular mobile systems; yet, the implementation of existing protocols for MANETs is not straightforward. The paper presents a novel rollback recovery protocol for handling the failures of mobile nodes in a MANET using checkpointing and sender based message logging. The proposed protocol utilizes the routing protocol existing in the network for implementing a low overhead recovery mechanism. The presented recovery procedure at a node is completely domino-free and asynchronous. The protocol is resilient to the dynamic characteristics of the MANET; allowing a distributed application to be executed independently without access to any wired Grid or cellular network access points. We also present an algorithm to record a consistent global snapshot of the MANET.

  17. Performance Evaluation Of Macro amp Micro Mobility In HMIP Networks

    Directory of Open Access Journals (Sweden)

    Osama Ali Abdelgadir

    2015-08-01

    Full Text Available Abstract Changing the location of mobile node during transmission or receiving of data always caused changing of the address of the mobile node which results in packet loss as well as delay in time taken to locate the new address of the Mobile Node therefore delay of data receiving is caused this problem was known as micro-mobility issue. To resolve this problem and ascurrently mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of mobile IP which supports quality of service minimum packet loss limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of mobile IP and micro mobility protocols where mobile IP handles macro mobility and HMIP cellular IP HAWAII handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed.HIERARCHICAL MICRO MOBILITY PROTOCOL is used. To identify the impact of micro-mobility in IP based Wireless Network to implement selected micro-mobility model of Hierarchal Micro Mobility Protocol in network simulator and for more analysis and measurements results and for the purpose of performance comparison between both Macro and Micro mobility Protocol Management.. Simulation results presented in this paper are based on ns 2

  18. Benefits of Self-Organizing Networks (SON for Mobile Operators

    Directory of Open Access Journals (Sweden)

    Olav Østerbø

    2012-01-01

    Full Text Available Self-Organizing Networks (SON is a collection of functions for automatic configuration, optimization, diagnostisation and healing of cellular networks. It is considered to be a necessity in future mobile networks and operations due to the increased cost pressure. The main drivers are essentially to reduce CAPEX and OPEX, which would otherwise increase dramatically due to increased number of network parameters that has to be monitored and set, the rapidly increasing numbers of base stations in the network and parallel operation of 2G, 3G and Evolved Packet Core (EPC infrastructures. This paper presents evaluations on the use of some of the most important SON components. Mobile networks are getting more complex to configure, optimize and maintain. Many SON functions will give cost savings and performance benefits from the very beginning of a network deployment and these should be prioritized now. But even if many functions are already available and can give large benefits, the field is still in its infancy and more advanced functions are either not yet implemented or have immature implementations. It is therefore necessary to have a strategy for how and when different SON functions should be introduced in mobile networks.

  19. Application of Digital Cellular Radio for Mobile Location Estimation

    Directory of Open Access Journals (Sweden)

    Farhat Anwar

    2012-08-01

    Full Text Available The capability to locate the position of mobiles is a prerequisite to implement a wide range of evolving ITS services. Radiolocation has the potential to serve a wide geographical area. This paper reports an investigation regarding the feasibility of utilizing cellular radio for the purpose of mobile location estimation. Basic strategies to be utilized for location estimation are elaborated. Two possible approaches for cellular based location estimation are investigated with the help of computer simulation. Their effectiveness and relative merits and demerits are identified. An algorithm specifically adapted for cellular environment is reported with specific features where mobiles, irrespective of their numbers, can locate their position without adversely loading the cellular system.Key Words: ITS, GSM, Cellular Radio, DRGS, GPS.

  20. Best Signal Quality in Cellular Networks: Asymptotic Properties and Applications to Mobility Management in Small Cell Networks

    Directory of Open Access Journals (Sweden)

    Baccelli François

    2010-01-01

    Full Text Available The quickly increasing data traffic and the user demand for a full coverage of mobile services anywhere and anytime are leading mobile networking into a future of small cell networks. However, due to the high-density and randomness of small cell networks, there are several technical challenges. In this paper, we investigate two critical issues: best signal quality and mobility management. Under the assumptions that base stations are uniformly distributed in a ring-shaped region and that shadowings are lognormal, independent, and identically distributed, we prove that when the number of sites in the ring tends to infinity, then (i the maximum signal strength received at the center of the ring tends in distribution to a Gumbel distribution when properly renormalized, and (ii it is asymptotically independent of the interference. Using these properties, we derive the distribution of the best signal quality. Furthermore, an optimized random cell scanning scheme is proposed, based on the evaluation of the optimal number of sites to be scanned for maximizing the user data throughput.

  1. Green mobile networks a networking perspective

    CERN Document Server

    Ansari, Nirwan

    2016-01-01

    Combines the hot topics of energy efficiency and next generation mobile networking, examining techniques and solutions. Green communications is a very hot topic. Ever increasing mobile network bandwidth rates significantly impacts on operating costs due to aggregate network energy consumption. As such, design on 4G networks and beyond has increasingly started to focus on 'energy efficiency' or so-called 'green' networks. Many techniques and solutions have been proposed to enhance the energy efficiency of mobile networks, yet no book has provided an in-depth analysis of the energy consumption issues in mobile networks nor offers detailed theories, tools and solutions for solving the energy efficiency problems.

  2. A Fluid Model for Performance Analysis in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Coupechoux Marceau

    2010-01-01

    Full Text Available We propose a new framework to study the performance of cellular networks using a fluid model and we derive from this model analytical formulas for interference, outage probability, and spatial outage probability. The key idea of the fluid model is to consider the discrete base station (BS entities as a continuum of transmitters that are spatially distributed in the network. This model allows us to obtain simple analytical expressions to reveal main characteristics of the network. In this paper, we focus on the downlink other-cell interference factor (OCIF, which is defined for a given user as the ratio of its outer cell received power to its inner cell received power. A closed-form formula of the OCIF is provided in this paper. From this formula, we are able to obtain the global outage probability as well as the spatial outage probability, which depends on the location of a mobile station (MS initiating a new call. Our analytical results are compared to Monte Carlo simulations performed in a traditional hexagonal network. Furthermore, we demonstrate an application of the outage probability related to cell breathing and densification of cellular networks.

  3. A game theoretical approach for cooperative environmentally friendly cellular networks powered by the smart grid

    KAUST Repository

    Ghazzai, Hakim

    2014-11-01

    This paper investigates the collaboration between multiple mobile operators to optimize the energy efficiency of cellular networks, maximize their profits or achieve or tradeoff between both objectives. Mobile operators cooperate together by eliminating redundant base stations (BSs) using a low complexity algorithm that aims to maximize their objective functions subject to a quality of service constraint. The problem is modeled as a two-level Stackelberg game: a mobile operator level and a smart grid level. Indeed, in our framework, we assume that cellular networks are powered by multiple energy providers existing in the smart grid characterized by different pollutant levels in addition to renewable energy source deployed in BS sites. The objective is to find the best active BS combination and the optimal procurement decision needed to the network operation during collaboration by considering electricity real-time pricing. Our study includes the daily traffic variation in addition to the daily green energy availability. Our simulation results show a significant saving in terms of CO2 emissions compared to the non-collaboration case and that cooperative mobile operators exploiting renewables are more awarded than traditional operators. © 2014 IEEE.

  4. Distributed Velocity-Dependent Protocol for Multihop Cellular Sensor Networks

    Directory of Open Access Journals (Sweden)

    Deepthi Chander

    2009-01-01

    Full Text Available Cell phones are embedded with sensors form a Cellular Sensor Network which can be used to localize a moving event. The inherent mobility of the application and of the cell phone users warrants distributed structure-free data aggregation and on-the-fly routing. We propose a Distributed Velocity-Dependent (DVD protocol to localize a moving event using a Multihop Cellular Sensor Network (MCSN. DVD is based on a novel form of connectivity determined by the waiting time of nodes for a Random Waypoint (RWP distribution of cell phone users. This paper analyzes the time-stationary and spatial distribution of the proposed waiting time to explain the superior event localization and delay performances of DVD over the existing Randomized Waiting (RW protocol. A sensitivity analysis is also performed to compare the performance of DVD with RW and the existing Centralized approach.

  5. Plugging 3G mobile networks into the internet : a prototype-based evaluation

    NARCIS (Netherlands)

    Oredope, A.; Liotta, A.

    2006-01-01

    The third generation mobile network aims at providing present and future Internet services everywhere and at anytime using cellular technologies. This is based on its all-IP core network known as the IP multimedia subsystem which provides end-users with better QoS, charging and integration of

  6. Radio-location of mobile stations in third generation networks

    Directory of Open Access Journals (Sweden)

    Milan Manojle Šunjevarić

    2013-06-01

    Full Text Available Mobile station localization in mobile networks started with simple methods (e.g. Cell-ID method which required only slight modifications of network infrastructures. Principally, it was about network localization by which a localization service became available to all types of mobile phones. Due to low precision, the initiated development of more sophisticated methods has not been finished yet. Among the advanced location-based methods are those based on the measurement of location parameters in the time domain. In this paper the general consideration of radio location methods in 3G (UMTS radio networks is presented. The use of time based measurement methods was analysed in detail. Due to the limited article length, the use of other locating methods in 3G networks (based on power measurements, on radio direction measurement, and on cells identification – Cell ID and global positioning system - GPS are not described. Introduction Mobile station localization within modern cellular networks increases the level of user security and opens wide opportunities for commercial operators who provide this service. The major obstacle for the implementation of this service, which also prevents its practical usage, is the modification of the existing network infrastructure. In general, depending on the infrastructure used, positioning methods can be divided into two groups: integrated and independent. Integrated methods are primarily created for communication networks. A possibility to locate users represents just an additional service within a radio network. Independent methods are totally detached from the communication network in which the user whose location is being determined is. Radio location methods Determining the location of a mobile radio station is performed by determining the intersection of two or more lines of position. These lines represent the position of the set of points at which the mobile station may be located. These lines can be: (a

  7. The Data Age of Mobile Cellular Network in Germany and China: Policies, Technologies and Markets (Part Ⅱ)

    Institute of Scientific and Technical Information of China (English)

    Shi Mingtao

    2009-01-01

    The UMTS auction in 2000 brought approximately 100 billion DM (Deutsche Mark) for the German National Treasury. T-Mobile (D1-Netz), Vodafone (D2-Netz), E-Plus (E1-Netz) and 02 (E2-Netz) have gradually evolved from GSM to full-fledged UMTS operators over the past years. The conglomerate of China Telecom was split twice. China acceded to WTO and promulgated the FITE Provisions. MIIT (Ministry of Industry and Information Technology) became the regulator and China Netcom was incorporated into China Unicorn in 2008. Most recently the layout of 3G future has been reconfirmed by MIIT. Voice service has remained the main source of income in both countries and operators have continued to focus on voice quality and network availability in their respective 2G networks. Because value-added and higher-speed data applications have been gaining market attention, 2.5G and 3G infrastructure has increasingly become the focal network strategy for the operators since the beginning of the new century. Germany has rolled out WCDMA/UMTS services on a large scale in the consumer market, while China has adopted all three 3G standards (TD-SCDMA, WCDMA/UMTS, CDMA2000), which shall gradually capture a wider 3G subscriber base. The summary shows that the development of the cellular technology and market in Germany and China can be discussed in three distinct historical periods. The conclusion suggests that the case of the cellular technology appears to be consistent with and applicable to a number of arguments widely disputed in economics and management related to technology and innovation, such as dominant design, technology waves/ S-Curve, disruptive technologies, Technology Adoption Life Cycle.

  8. Deploying IPv6 in 3GPP networks evolving mobile broadband from 2G to LTE and beyond

    CERN Document Server

    Korhonen, Jouni; Soininen, Jonne

    2013-01-01

    Deploying IPv6 in 3GPP Networks - Evolving Mobile Broadband from 2G to LTE and Beyond  A practical guide enabling mobile operators to deploy IPv6 with confidence The most widely used cellular mobile broadband network technology is based on the 3GPP standards. The history and background of the 3GPP technology is in the Global Mobile Service (GSM) technology and the work done in European Telecommunications Standards Institute (ETSI). This primary voice service network has evolved to be the dominant mobile Internet access technology. Deploying IPv6 in

  9. Distributed Velocity-Dependent Protocol for Multihop Cellular Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jagyasi Bhushan

    2009-01-01

    Full Text Available Abstract Cell phones are embedded with sensors form a Cellular Sensor Network which can be used to localize a moving event. The inherent mobility of the application and of the cell phone users warrants distributed structure-free data aggregation and on-the-fly routing. We propose a Distributed Velocity-Dependent (DVD protocol to localize a moving event using a Multihop Cellular Sensor Network (MCSN. DVD is based on a novel form of connectivity determined by the waiting time of nodes for a Random Waypoint (RWP distribution of cell phone users. This paper analyzes the time-stationary and spatial distribution of the proposed waiting time to explain the superior event localization and delay performances of DVD over the existing Randomized Waiting (RW protocol. A sensitivity analysis is also performed to compare the performance of DVD with RW and the existing Centralized approach.

  10. Fuzzy-cellular neural network for face recognition HCI Authentication

    Science.gov (United States)

    Hoomod, Haider K.; ali, Ahmed abd

    2018-05-01

    Because of the rapid development of mobile devices technology, ease of use and interact with humans. May have found a mobile device most uses in our communications. Mobile devices can carry large amounts of personal and sensitive data, but often left not guaranteed (pin) locks are inconvenient to use and thus have seen low adoption while biometrics is more convenient and less susceptible to fraud and manipulation. Were propose in this paper authentication technique for using a mobile face recognition based on cellular neural networks [1] and fuzzy rules control. The good speed and get recognition rate from applied the proposed system in Android system. The images obtained in real time for 60 persons each person has 20 t0 60 different shot face images (about 3600 images), were the results for (FAR = 0), (FRR = 1.66%), (FER = 1.66) and accuracy = 98.34

  11. Estimating cellular network performance during hurricanes

    International Nuclear Information System (INIS)

    Booker, Graham; Torres, Jacob; Guikema, Seth; Sprintson, Alex; Brumbelow, Kelly

    2010-01-01

    Cellular networks serve a critical role during and immediately after a hurricane, allowing citizens to contact emergency services when land-line communication is lost and serving as a backup communication channel for emergency responders. However, due to their ubiquitous deployment and limited design for extreme loading events, basic network elements, such as cellular towers and antennas are prone to failures during adverse weather conditions such as hurricanes. Accordingly, a systematic and computationally feasible approach is required for assessing and improving the reliability of cellular networks during hurricanes. In this paper we develop a new multi-disciplinary approach to efficiently and accurately assess cellular network reliability during hurricanes. We show how the performance of a cellular network during and immediately after future hurricanes can be estimated based on a combination of hurricane wind field models, structural reliability analysis, Monte Carlo simulation, and cellular network models and simulation tools. We then demonstrate the use of this approach for assessing the improvement in system reliability that can be achieved with discrete topological changes in the system. Our results suggest that adding redundancy, particularly through a mesh topology or through the addition of an optical fiber ring around the perimeter of the system can be an effective way to significantly increase the reliability of some cellular systems during hurricanes.

  12. Mobile networks architecture

    CERN Document Server

    Perez, Andre

    2013-01-01

    This book explains the evolutions of architecture for mobiles and summarizes the different technologies:- 2G: the GSM (Global System for Mobile) network, the GPRS (General Packet Radio Service) network and the EDGE (Enhanced Data for Global Evolution) evolution;- 3G: the UMTS (Universal Mobile Telecommunications System) network and the HSPA (High Speed Packet Access) evolutions:- HSDPA (High Speed Downlink Packet Access),- HSUPA (High Speed Uplink Packet Access),- HSPA+;- 4G: the EPS (Evolved Packet System) network.The telephone service and data transmission are the

  13. Service-Aware Retransmission Control in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Nadhir Ben Halima

    2010-01-01

    Full Text Available This paper proposes a service-aware cross-layer approach between application/transport layers on the mobile terminal and link layer on the wireless base station to enable dynamic control on the level of per-packet error protection for multimedia data streams. Specifically, in the context of cellular networks, the proposed scheme enables the mobile terminal to specify to the base station the desired level of Hybrid ARQ (HARQ protection by using an in-band control feedback channel. Such protection is dynamically adapted on a per-packet basis and depends on the perceptual importance of different packets as well as on the reception history of the flow. Experimental results demonstrate the potential benefits deriving from the proposed strategy either for audio and video real-time streams as well as for TCP-based data transfers.

  14. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6.

    Science.gov (United States)

    Samuelraj, Ananthi Jebaseeli; Jayapal, Sundararajan

    2015-01-01

    Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  15. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6

    Directory of Open Access Journals (Sweden)

    Ananthi Jebaseeli Samuelraj

    2015-01-01

    Full Text Available Proxy Mobile IPV6 (PMIPV6 is a network based mobility management protocol which supports node’s mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node’s mobility should be modified to support group nodes’ mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  16. UMA/GAN network architecture analysis

    Science.gov (United States)

    Yang, Liang; Li, Wensheng; Deng, Chunjian; Lv, Yi

    2009-07-01

    This paper is to critically analyze the architecture of UMA which is one of Fix Mobile Convergence (FMC) solutions, and also included by the third generation partnership project(3GPP). In UMA/GAN network architecture, UMA Network Controller (UNC) is the key equipment which connects with cellular core network and mobile station (MS). UMA network could be easily integrated into the existing cellular networks without influencing mobile core network, and could provides high-quality mobile services with preferentially priced indoor voice and data usage. This helps to improve subscriber's experience. On the other hand, UMA/GAN architecture helps to integrate other radio technique into cellular network which includes WiFi, Bluetooth, and WiMax and so on. This offers the traditional mobile operators an opportunity to integrate WiMax technique into cellular network. In the end of this article, we also give an analysis of potential influence on the cellular core networks ,which is pulled by UMA network.

  17. LTE-A cellular networks multi-hop relay for coverage, capacity and performance enhancement

    CERN Document Server

    Yahya, Abid

    2017-01-01

    In this book, three different methods are presented to enhance the capacity and coverage area in LTE-A cellular networks. The scope involves the evaluation of the effect of the RN location in terms of capacity and the determination of the optimum location of the relay that provides maximum achievable data rate for users with limited interference at the cell boundaries. This book presents a new model to enhance both capacity and coverage area in LTE-A cellular network by determining the optimum location for the RN with limited interference. The new model is designed to enhance the capacity of the relay link by employing two antennas in RN. This design enables the relay link to absorb more users at cell edge regions. An algorithm called the Balance Power Algorithm (BPA) is developed to reduce MR power consumption. The book pertains to postgraduate students and researchers in wireless & mobile communications. Provides a variety of methods for enhancing capacity and coverage in LTE-A cellular networks Develop...

  18. Connecting Mobile Users Through Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Faisal Alkhateeb

    2012-10-01

    Full Text Available Nowadays, social networks become popular with the emerging of web-based social networking services. Recently, several mobile services are developed to connect users to their favourite social networks such as Facebook, Twitter, Flickr, etc. However, these services depends upon the existing web-based social networks. In this paper, we present a mobile service for joining groups across communities. The originality of the work is that the framework of the service allows creating and joining social networks that are self-contained for mobile company servers. The service consists of several sub-services such as users invitation, group finding and others. Users, regardless of their disability, can use the service and its sub-services without the need to create their own accounts on social web sites and thus their own groups. We also propose a privacy control policy for mobile social networks.

  19. A Biologically-Inspired Power Control Algorithm for Energy-Efficient Cellular Networks

    Directory of Open Access Journals (Sweden)

    Hyun-Ho Choi

    2016-03-01

    Full Text Available Most of the energy used to operate a cellular network is consumed by a base station (BS, and reducing the transmission power of a BS can therefore afford a substantial reduction in the amount of energy used in a network. In this paper, we propose a distributed transmit power control (TPC algorithm inspired by bird flocking behavior as a means of improving the energy efficiency of a cellular network. Just as each bird in a flock attempts to match its velocity with the average velocity of adjacent birds, in the proposed algorithm, each mobile station (MS in a cell matches its rate with the average rate of the co-channel MSs in adjacent cells by controlling the transmit power of its serving BS. We verify that this bio-inspired TPC algorithm using a local rate-average process achieves an exponential convergence and maximizes the minimum rate of the MSs concerned. Simulation results show that the proposed TPC algorithm follows the same convergence properties as the flocking algorithm and also effectively reduces the power consumption at the BSs while maintaining a low outage probability as the inter-cell interference increases; in so doing, it significantly improves the energy efficiency of a cellular network.

  20. An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.

    Science.gov (United States)

    Chao, Han-Chieh

    2001-01-01

    Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…

  1. Energy optimization in mobile sensor networks

    Science.gov (United States)

    Yu, Shengwei

    Mobile sensor networks are considered to consist of a network of mobile robots, each of which has computation, communication and sensing capabilities. Energy efficiency is a critical issue in mobile sensor networks, especially when mobility (i.e., locomotion control), routing (i.e., communications) and sensing are unique characteristics of mobile robots for energy optimization. This thesis focuses on the problem of energy optimization of mobile robotic sensor networks, and the research results can be extended to energy optimization of a network of mobile robots that monitors the environment, or a team of mobile robots that transports materials from stations to stations in a manufacturing environment. On the energy optimization of mobile robotic sensor networks, our research focuses on the investigation and development of distributed optimization algorithms to exploit the mobility of robotic sensor nodes for network lifetime maximization. In particular, the thesis studies these five problems: 1. Network-lifetime maximization by controlling positions of networked mobile sensor robots based on local information with distributed optimization algorithms; 2. Lifetime maximization of mobile sensor networks with energy harvesting modules; 3. Lifetime maximization using joint design of mobility and routing; 4. Optimal control for network energy minimization; 5. Network lifetime maximization in mobile visual sensor networks. In addressing the first problem, we consider only the mobility strategies of the robotic relay nodes in a mobile sensor network in order to maximize its network lifetime. By using variable substitutions, the original problem is converted into a convex problem, and a variant of the sub-gradient method for saddle-point computation is developed for solving this problem. An optimal solution is obtained by the method. Computer simulations show that mobility of robotic sensors can significantly prolong the lifetime of the whole robotic sensor network while

  2. Mobility Network and Safety

    Directory of Open Access Journals (Sweden)

    Adriana Galderisi

    2010-04-01

    Full Text Available Mobility network is crucial for ensuring territorial safety with respect to natural and technological hazards. They represent a basic support to community’s everyday life although being exposed elements often characterized by high vulnerability to different hazards and, in the meanwhile, strategic equipments for emergency management. Physical damages or the lack in functioning of those networks may greatly increase the loss of human lives caused by hazardous events as well as produce relevant economic damages at medium and long term. Although the relevance of the mobility networks in assuring territorial safety is at present largely recognized, risk analyses have been long focused on buildings’ vulnerability or, even where they have paid attention to mobility network, they have been mainly focused on the physical damages that a given hazard could may induce on individual elements of such network. It is recent the awareness that mobility network represents a system, characterized by relevant interdependences both among its elements and among network infrastructures and urban systems. Based on these assumptions, this paper points out the heterogeneous aspects of the mobility network vulnerability and their relevance in increasing the overall territorial or urban vulnerability to hazardous events. Therefore, an in-depth investigation of the concept of mobility network vulnerability is provided, in order to highlight the aspects mostly investigated and more recent research perspectives. Finally, a case study in the Campania Region is presented in order to point out how traditional risk analyses, generally referred to individual hazards, can sometimes led to invest in the mobility network improvement or development which, targeted to increase the security of a territory result, on the opposite, in an increase of the territorial vulnerability.

  3. Transparent settlement model between mobile network operator and mobile voice over Internet protocol operator

    Directory of Open Access Journals (Sweden)

    Luzango Pangani Mfupe

    2014-12-01

    Full Text Available Advances in technology have enabled network-less mobile voice over internet protocol operator (MVoIPO to offer data services (i.e. voice, text and video to mobile network operator's (MNO's subscribers through an application enabled on subscriber's user equipment using MNO's packet-based cellular network infrastructure. However, this raises the problem of how to handle interconnection settlements between the two types of operators, particularly how to deal with users who now have the ability to make ‘free’ on-net MVoIP calls among themselves within the MNO's network. This study proposes a service level agreement-based transparent settlement model (TSM to solve this problem. The model is based on concepts of achievement and reward, not violation and punishment. The TSM calculates the MVoIPO's throughput distribution by monitoring the variations of peaks and troughs at the edge of a network. This facilitates the determination of conformance and non-conformance levels to the pre-set throughput thresholds and, subsequently, the issuing of compensation to the MVoIPO by the MNO as a result of generating an economically acceptable volume of data traffic.

  4. Robust Nash Dynamic Game Strategy for User Cooperation Energy Efficiency in Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Shuhuan Wen

    2012-01-01

    Full Text Available Recently, there is an emerging trend of addressing “energy efficiency” aspect of wireless communications. It has been shown that cooperating users relay each other's information to improve data rates. The energy is limited in the wireless cellular network, but the mobile users refuse to relay. This paper presents an approach that encourages user cooperation in order to improve the energy efficiency. The game theory is an efficient method to solve such conflicts. We present a cellular framework in which two mobile users, who desire to communicate with a common base station, may cooperate via decode-and-forward relaying. In the case of imperfect information assumption, cooperative Nash dynamic game is used between the two users' cooperation to tackle the decision making problems: whether to cooperate and how to cooperate in wireless networks. The scheme based on “cooperative game theory” can achieve general pareto-optimal performance for cooperative games, and thus, maximize the entire system payoff while maintaining fairness.

  5. Optimizing network connectivity for mobile health technologies in sub-Saharan Africa.

    Science.gov (United States)

    Siedner, Mark J; Lankowski, Alexander; Musinga, Derrick; Jackson, Jonathon; Muzoora, Conrad; Hunt, Peter W; Martin, Jeffrey N; Bangsberg, David R; Haberer, Jessica E

    2012-01-01

    Mobile health (mHealth) technologies hold incredible promise to improve healthcare delivery in resource-limited settings. Network reliability across large catchment areas can be a major challenge. We performed an analysis of network failure frequency as part of a study of real-time adherence monitoring in rural Uganda. We hypothesized that the addition of short messaging service (SMS+GPRS) to the standard cellular network modality (GPRS) would reduce network disruptions and improve transmission of data. Participants were enrolled in a study of real-time adherence monitoring in southwest Uganda. In June 2011, we began using Wisepill devices that transmit data each time the pill bottle is opened. We defined network failures as medication interruptions of >48 hours duration that were transmitted when network connectivity was re-established. During the course of the study, we upgraded devices from GPRS to GPRS+SMS compatibility. We compared network failure rates between GPRS and GPRS+SMS periods and created geospatial maps to graphically demonstrate patterns of connectivity. One hundred fifty-seven participants met inclusion criteria of seven days of SMS and seven days of SMS+GPRS observation time. Seventy-three percent were female, median age was 40 years (IQR 33-46), 39% reported >1-hour travel time to clinic and 17% had home electricity. One hundred one had GPS coordinates recorded and were included in the geospatial maps. The median number of network failures per person-month for the GPRS and GPRS+SMS modalities were 1.5 (IQR 1.0-2.2) and 0.3 (IQR 0-0.9) respectively, (mean difference 1.2, 95%CI 1.0-1.3, p-valueImprovements in network connectivity were notable throughout the region. Study costs increased by approximately $1USD per person-month. Addition of SMS to standard GPRS cellular network connectivity can significantly reduce network connection failures for mobile health applications in remote areas. Projects depending on mobile health data in resource

  6. Flexible Aperture Tuning Solution for Cellular Main Antenna in Metallic Back Cover Mobile Phone

    Directory of Open Access Journals (Sweden)

    Yew Choon Mark Tan

    2017-10-01

    Full Text Available Metal housing has been used extensively on portable communication devices such as on mobile phones and tablets. The choice of metal housing ranges from metallic rim to metallic back cover. This metal housing tends to improve the outlook appearance of the mobile devices, and add mechanical strength towards the mobile devices. However, from the aspect of the communication antenna, the metal housing often posts great challenges towards the flexibility in antenna design and reduction in antenna performance. This paper presents an approach to overcome the challenges by integrating the metal housing of the mobile phone as part of the antenna, along with the introduction of tunable antenna concept to provide different forms of Aperture Tuning to the Cellular Main Antenna, to satisfy its wide frequency band coverages for the 2nd, 3rd and 4th Generation (2G, 3G and 4G mobile network.

  7. Probabilistic Mobility Models for Mobile and Wireless Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2010-01-01

    In this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a message...... from a location it will evolve to a network distribution depending on whether nodes at other locations receive the message or not. Mobility of locations is not arbitrary but guarded by a probabilistic mobility function (PMF) and we also define the notion of a weak bisimulation given a PMF...

  8. Virtualized cognitive network architecture for 5G cellular networks

    KAUST Repository

    Elsawy, Hesham

    2015-07-17

    Cellular networks have preserved an application agnostic and base station (BS) centric architecture1 for decades. Network functionalities (e.g. user association) are decided and performed regardless of the underlying application (e.g. automation, tactile Internet, online gaming, multimedia). Such an ossified architecture imposes several hurdles against achieving the ambitious metrics of next generation cellular systems. This article first highlights the features and drawbacks of such architectural ossification. Then the article proposes a virtualized and cognitive network architecture, wherein network functionalities are implemented via software instances in the cloud, and the underlying architecture can adapt to the application of interest as well as to changes in channels and traffic conditions. The adaptation is done in terms of the network topology by manipulating connectivities and steering traffic via different paths, so as to attain the applications\\' requirements and network design objectives. The article presents cognitive strategies to implement some of the classical network functionalities, along with their related implementation challenges. The article further presents a case study illustrating the performance improvement of the proposed architecture as compared to conventional cellular networks, both in terms of outage probability and handover rate.

  9. Investigation of Load Sharing in Hybrid (2G/3G) Mobile Networks

    OpenAIRE

    Martynas Stirbys; Karolis Žvinys

    2015-01-01

    The main purpose of this work is to investigate load sharing methods for 2G/3G cellular networks in order to determine their impact on the network and users. One of the study aims is to analyze the performance of the methods. Moreover the paper provides an overview of the methods circumstances, limitations. Directed Retry and Load Based Handover methods were chosen. Data was obtained from real Lithuanian mobile operator’s network. The paper also discusses the changes in Key Performance Indica...

  10. The Impact of Mobile Offloading on Energy Consumption and Capacity of Radio Access Networks – Case of Finland

    Directory of Open Access Journals (Sweden)

    Michail Katsigiannis

    2015-08-01

    Full Text Available The Finnish Mobile Operators face two main challenges: (i mobile data subscriptions penetration and traffic are experiencing rapid growth; and (ii government intervenes in the market to attain contradictory goals related to extensive high-speed mobile networks and energy consumption reduction. The mobile operators have to increase the capacity in their networks, taking energy efficiency into account. The reduction of energy consumption in mobile networks results to the reducing carbon emissions, and possibly to cost savings. The purpose of this study is to investigate the wide-to-local area offloading in urban regions in Finland and examine the impact of such a network on the wide area access network in terms of energy and capacity. The results show that the capacity relief ranges from 9.7 to 38.7 %, depending on the penetration of local area service, but the energy savings in macro cellular network are negligible.

  11. Advanced Networks in Motion Mobile Sensorweb

    Science.gov (United States)

    Ivancic, William D.; Stewart, David H.

    2011-01-01

    Advanced mobile networking technology applicable to mobile sensor platforms was developed, deployed and demonstrated. A two-tier sensorweb design was developed. The first tier utilized mobile network technology to provide mobility. The second tier, which sits above the first tier, utilizes 6LowPAN (Internet Protocol version 6 Low Power Wireless Personal Area Networks) sensors. The entire network was IPv6 enabled. Successful mobile sensorweb system field tests took place in late August and early September of 2009. The entire network utilized IPv6 and was monitored and controlled using a remote Web browser via IPv6 technology. This paper describes the mobile networking and 6LowPAN sensorweb design, implementation, deployment and testing as well as wireless systems and network monitoring software developed to support testing and validation.

  12. Capacity on wireless quantum cellular communication system

    Science.gov (United States)

    Zhou, Xiang-Zhen; Yu, Xu-Tao; Zhang, Zai-Chen

    2018-03-01

    Quantum technology is making excellent prospects in future communication networks. Entanglement generation and purification are two major components in quantum networks. Combining these two techniques with classical cellular mobile communication, we proposed a novel wireless quantum cellular(WQC) communication system which is possible to realize commercial mobile quantum communication. In this paper, the architecture and network topology of WQC communication system are discussed, the mathematical model of WQC system is extracted and the serving capacity, indicating the ability to serve customers, is defined and calculated under certain circumstances.

  13. Virtual target tracking (VTT) as applied to mobile satellite communication networks

    Science.gov (United States)

    Amoozegar, Farid

    1999-08-01

    Traditionally, target tracking has been used for aerospace applications, such as, tracking highly maneuvering targets in a cluttered environment for missile-to-target intercept scenarios. Although the speed and maneuvering capability of current aerospace targets demand more efficient algorithms, many complex techniques have already been proposed in the literature, which primarily cover the defense applications of tracking methods. On the other hand, the rapid growth of Global Communication Systems, Global Information Systems (GIS), and Global Positioning Systems (GPS) is creating new and more diverse challenges for multi-target tracking applications. Mobile communication and computing can very well appreciate a huge market for Cellular Communication and Tracking Devices (CCTD), which will be tracking networked devices at the cellular level. The objective of this paper is to introduce a new concept, i.e., Virtual Target Tracking (VTT) for commercial applications of multi-target tracking algorithms and techniques as applied to mobile satellite communication networks. It would be discussed how Virtual Target Tracking would bring more diversity to target tracking research.

  14. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  15. Softwarization of Mobile Network Functions towards Agile and Energy Efficient 5G Architectures: A Survey

    Directory of Open Access Journals (Sweden)

    Dlamini Thembelihle

    2017-01-01

    Full Text Available Future mobile networks (MNs are required to be flexible with minimal infrastructure complexity, unlike current ones that rely on proprietary network elements to offer their services. Moreover, they are expected to make use of renewable energy to decrease their carbon footprint and of virtualization technologies for improved adaptability and flexibility, thus resulting in green and self-organized systems. In this article, we discuss the application of software defined networking (SDN and network function virtualization (NFV technologies towards softwarization of the mobile network functions, taking into account different architectural proposals. In addition, we elaborate on whether mobile edge computing (MEC, a new architectural concept that uses NFV techniques, can enhance communication in 5G cellular networks, reducing latency due to its proximity deployment. Besides discussing existing techniques, expounding their pros and cons and comparing state-of-the-art architectural proposals, we examine the role of machine learning and data mining tools, analyzing their use within fully SDN- and NFV-enabled mobile systems. Finally, we outline the challenges and the open issues related to evolved packet core (EPC and MEC architectures.

  16. Investigation of Load Sharing in Hybrid (2G/3G Mobile Networks

    Directory of Open Access Journals (Sweden)

    Martynas Stirbys

    2015-07-01

    Full Text Available The main purpose of this work is to investigate load sharing methods for 2G/3G cellular networks in order to determine their impact on the network and users. One of the study aims is to analyze the performance of the methods. Moreover the paper provides an overview of the methods circumstances, limitations. Directed Retry and Load Based Handover methods were chosen. Data was obtained from real Lithuanian mobile operator’s network. The paper also discusses the changes in Key Performance Indicators.

  17. Mobile social networking an innovative approach

    CERN Document Server

    Zhang, Daqing

    2014-01-01

    The use of contextually aware, pervasive, distributed computing, and sensor networks to bridge the gap between the physical and online worlds is the basis of mobile social networking. This book shows how applications can be built to provide mobile social networking, the research issues that need to be solved to enable this vision, and how mobile social networking can be used to provide computational intelligence that will improve daily life. With contributions from the fields of sociology, computer science, human-computer interaction and design, this book demonstrates how mobile social networks can be inferred from users' physical interactions both with the environment and with others, as well as how users behave around them and how their behavior differs on mobile vs. traditional online social networks.

  18. Mobile Social Network in a Cultural Context

    DEFF Research Database (Denmark)

    Liu, Jun

    2010-01-01

    , and mobile phone rumours, this study observes that mobile social networks are a way that Chinese people cultivate, maintain and strengthen their guanxi networks. Embedding the reliability of guanxi, the message spreading via mobile communication always enjoys high credibility, while mutual obligation...... of mobile social network in China therefore emanate not only from Information and Communication Technologies, but also from the socio-cultural source - guanxi - deeply rooted in Chinese society.......the chapter “Mobile Social Network in a Cultural Context” examines the guanxi-embedded mobile social network in China. By focusing on three concrete case studies with 56 in-depth interviews, including New Year text message greetings, mobile social networks for job allocations among migrant workers...

  19. Optimizing Cellular Networks Enabled with Renewal Energy via Strategic Learning.

    Science.gov (United States)

    Sohn, Insoo; Liu, Huaping; Ansari, Nirwan

    2015-01-01

    An important issue in the cellular industry is the rising energy cost and carbon footprint due to the rapid expansion of the cellular infrastructure. Greening cellular networks has thus attracted attention. Among the promising green cellular network techniques, the renewable energy-powered cellular network has drawn increasing attention as a critical element towards reducing carbon emissions due to massive energy consumption in the base stations deployed in cellular networks. Game theory is a branch of mathematics that is used to evaluate and optimize systems with multiple players with conflicting objectives and has been successfully used to solve various problems in cellular networks. In this paper, we model the green energy utilization and power consumption optimization problem of a green cellular network as a pilot power selection strategic game and propose a novel distributed algorithm based on a strategic learning method. The simulation results indicate that the proposed algorithm achieves correlated equilibrium of the pilot power selection game, resulting in optimum green energy utilization and power consumption reduction.

  20. Game-Theoretic Social-Aware Resource Allocation for Device-to-Device Communications Underlaying Cellular Network

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2018-01-01

    Full Text Available Device-to-Device communication underlaying cellular network can increase the spectrum efficiency due to direct proximity communication and frequency reuse. However, such performance improvement is influenced by the power interference caused by spectrum sharing and social characteristics in each social community jointly. In this investigation, we present a dynamic game theory with complete information based D2D resource allocation scheme for D2D communication underlaying cellular network. In this resource allocation method, we quantify both the rate influence from the power interference caused by the D2D transmitter to cellular users and rate enhancement brought by the social relationships between mobile users. Then, the utility function maximization game is formulated to optimize the overall transmission rate performance of the network, which synthetically measures the final influence from both power interference and sociality enhancement. Simultaneously, we discuss the Nash Equilibrium of the proposed utility function maximization game from a theoretical point of view and further put forward a utility priority searching algorithm based resource allocation scheme. Simulation results show that our proposed scheme attains better performance compared with the other two advanced proposals.

  1. Mobile Support For Logistics

    Science.gov (United States)

    2016-03-01

    support wireless capabilities, such as Wi-Fi or LTE -based 4G cellular infrastructures, into the DOD’s enterprise software, GCSS-MC could be a large...fielded mobile devices through ViaSat Inc. ViaSat’s goal is to provide secure communications over 3G/4G/ LTE cellular and Wi-Fi networks, secure...or commercial carrier network. While these measures are not all encompassing for protecting mobile devices, they are a ways that drastically improve

  2. Multi-Hop Link Capacity of Multi-Route Multi-Hop MRC Diversity for a Virtual Cellular Network

    Science.gov (United States)

    Daou, Imane; Kudoh, Eisuke; Adachi, Fumiyuki

    In virtual cellular network (VCN), proposed for high-speed mobile communications, the signal transmitted from a mobile terminal is received by some wireless ports distributed in each virtual cell and relayed to the central port that acts as a gateway to the core network. In this paper, we apply the multi-route MHMRC diversity in order to decrease the transmit power and increase the multi-hop link capacity. The transmit power, the interference power and the link capacity are evaluated for DS-CDMA multi-hop VCN by computer simulation. The multi-route MHMRC diversity can be applied to not only DS-CDMA but also other access schemes (i. e. MC-CDMA, OFDM, etc.).

  3. Massive MIMO 5G Cellular Networks:mm-Wave vs.μ-Wave Frequencies

    Institute of Scientific and Technical Information of China (English)

    Stefano Buzzi; Carmen D'Andrea

    2017-01-01

    Enhanced mobile broadband (eMBB) is one of the key use-cases for the development of the new standard 5G New Radio for the next generation of mobile wireless networks. Large-scale antenna arrays, a.k.a. massive multiple-input multiple-output (MIMO), the usage of carrier frequencies in the range 10-100 GHz, the so-called millimeter wave (mm-Wave) band, and the network densifica-tion with the introduction of small-sized cells are the three technologies that will permit implementing eMBB services and realiz-ing the Gbit/s mobile wireless experience. This paper is focused on the massive MIMO technology. Initially conceived for conven-tional cellular frequencies in the sub-6 GHz range (μ-Wave), the massive MIMO concept has been then progressively extended to the case in which mm-Wave frequencies are used. However, due to different propagation mechanisms in urban scenarios, the re-sulting MIMO channel models at μ-Wave and mm-Wave are radically different. Six key basic differences are pinpointed in this paper, along with the implications that they have on the architecture and algorithms of the communication transceivers and on the attainable performance in terms of reliability and multiplexing capabilities.

  4. Dynamic spectrum management in green cognitive radio cellular networks

    KAUST Repository

    Sboui, Lokman; Ghazzai, Hakim; Rezki, Zouheir; Alouini, Mohamed-Slim

    2018-01-01

    In this paper, we propose a new cellular network operation scheme fulfilling the 5G requirements related to spectrum management and green communications. We focus on cognitive radio cellular networks in which both the primary network (PN

  5. The Space Mobile Network

    Science.gov (United States)

    Israel, David

    2017-01-01

    The definition and development of the next generation space communications and navigation architecture is underway. The primary goals are to remove communications and navigations constraints from missions and to enable increased autonomy. The Space Mobile Network (SMN) is an architectural concept that includes new technology and operations that will provide flight systems with an similar user experience to terrestrial wireless mobile networks. This talk will describe the SMN and its proposed new features, such as Disruption Tolerant Networking (DTN), optical communications, and User Initiated Services (UIS).

  6. Securing Mobile Networks in an Operational Setting

    Science.gov (United States)

    Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Paulsen, Phillip E.; Shell, Dan

    2004-01-01

    This paper describes a network demonstration and three month field trial of mobile networking using mobile-IPv4. The network was implemented as part of the US Coast Guard operational network which is a ".mil" network and requires stringent levels of security. The initial demonstrations took place in November 2002 and a three month field trial took place from July through September of 2003. The mobile network utilized encryptors capable of NSA-approved Type 1 algorithms, mobile router from Cisco Systems and 802.11 and satellite wireless links. This paper also describes a conceptual architecture for wide-scale deployment of secure mobile networking in operational environments where both private and public infrastructure is used. Additional issues presented include link costs, placement of encryptors and running routing protocols over layer-3 encryption devices.

  7. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  8. Using satellite communications for a mobile computer network

    Science.gov (United States)

    Wyman, Douglas J.

    1993-01-01

    The topics discussed include the following: patrol car automation, mobile computer network, network requirements, network design overview, MCN mobile network software, MCN hub operation, mobile satellite software, hub satellite software, the benefits of patrol car automation, the benefits of satellite mobile computing, and national law enforcement satellite.

  9. Optimising TCP for cloud-based mobile networks

    DEFF Research Database (Denmark)

    Artuso, Matteo; Christiansen, Henrik Lehrmann

    2016-01-01

    Cloud-based mobile networks are foreseen to be a technological enabler for the next generation of mobile networks. Their design requires substantial research as they pose unique challenges, especially from the point of view of additional delays in the fronthaul network. Commonly used network...... implementations of 3 popular operating systems are investigated in our network model. The results on the most influential parameters are used to design an optimized TCP for cloud-based mobile networks....

  10. Proceedings of the Workshop on Advanced Network and Technology Concepts for Mobile, Micro, and Personal Communications

    Science.gov (United States)

    Paul, Lori (Editor)

    1991-01-01

    The Workshop on Advanced Network and Technology Concepts for Mobile, Micro, and Personal Communications was held at NASA's JPL Laboratory on 30-31 May 1991. It provided a forum for reviewing the development of advanced network and technology concepts for turn-of-the-century telecommunications. The workshop was organized into three main categories: (1) Satellite-Based Networks (L-band, C-band, Ku-band, and Ka-band); (2) Terrestrial-Based Networks (cellular, CT2, PCN, GSM, and other networks); and (3) Hybrid Satellite/Terrestrial Networks. The proceedings contain presentation papers from each of the above categories.

  11. Environment Aware Cellular Networks

    KAUST Repository

    Ghazzai, Hakim

    2015-01-01

    . This significant growth of energy consumption impels network companies to pay huge bills which represent around half of their operating expenditures. Therefore, many service providers, including mobile operators, are looking for new and modern green solutions

  12. Cooperative Handover Management in Dense Cellular Networks

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    Network densification has always been an important factor to cope with the ever increasing capacity demand. Deploying more base stations (BSs) improves the spatial frequency utilization, which increases the network capacity. However, such improvement comes at the expense of shrinking the BSs' footprints, which increases the handover (HO) rate and may diminish the foreseen capacity gains. In this paper, we propose a cooperative HO management scheme to mitigate the HO effect on throughput gains achieved via cellular network densification. The proposed HO scheme relies on skipping HO to the nearest BS at some instances along the user's trajectory while enabling cooperative BS service during HO execution at other instances. To this end, we develop a mathematical model, via stochastic geometry, to quantify the performance of the proposed HO scheme in terms of coverage probability and user throughput. The results show that the proposed cooperative HO scheme outperforms the always best connected based association at high mobility. Also, the value of BS cooperation along with handover skipping is quantified with respect to the HO skipping only that has recently appeared in the literature. Particularly, the proposed cooperative HO scheme shows throughput gains of 12% to 27% and 17% on average, when compared to the always best connected and HO skipping only schemes at user velocity ranging from 80 km/h to 160 Km/h, respectively.

  13. Cooperative Handover Management in Dense Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-02-07

    Network densification has always been an important factor to cope with the ever increasing capacity demand. Deploying more base stations (BSs) improves the spatial frequency utilization, which increases the network capacity. However, such improvement comes at the expense of shrinking the BSs\\' footprints, which increases the handover (HO) rate and may diminish the foreseen capacity gains. In this paper, we propose a cooperative HO management scheme to mitigate the HO effect on throughput gains achieved via cellular network densification. The proposed HO scheme relies on skipping HO to the nearest BS at some instances along the user\\'s trajectory while enabling cooperative BS service during HO execution at other instances. To this end, we develop a mathematical model, via stochastic geometry, to quantify the performance of the proposed HO scheme in terms of coverage probability and user throughput. The results show that the proposed cooperative HO scheme outperforms the always best connected based association at high mobility. Also, the value of BS cooperation along with handover skipping is quantified with respect to the HO skipping only that has recently appeared in the literature. Particularly, the proposed cooperative HO scheme shows throughput gains of 12% to 27% and 17% on average, when compared to the always best connected and HO skipping only schemes at user velocity ranging from 80 km/h to 160 Km/h, respectively.

  14. Mobile environmental radiation monitoring station

    International Nuclear Information System (INIS)

    Assido, H.; Shemesh, Y.; Mazor, T.; Tal, N.; Barak, D.

    1997-01-01

    A mobile environmental radiation monitoring station has been developed and established for the Israeli Ministry of Environment. The radiation monitoring station is ready for immediate placing in any required location, or can be operated from a vehicle. The station collects data Tom the detector and transfers it via cellular communication network to a Computerized Control Center for data storage, processing, and display . The mobile station is fully controlled from the. Routinely, the mobile station responses to the data request accumulated since the last communication session. In case of fault or alarm condition in the mobile station, a local claim is activated and immediately initiates communication with the via cellular communication network. (authors)

  15. Interworking evolution of mobile satellite and terrestrial networks

    Science.gov (United States)

    Matyas, R.; Kelleher, P.; Moller, P.; Jones, T.

    1993-01-01

    There is considerable interest among mobile satellite service providers in interworking with terrestrial networks to provide a universal global network. With such interworking, subscribers may be provided a common set of services such as those planned for the Public Switched Telephone Network (PSTN), the Integrated Services Digital Network (ISDN), and future Intelligent Networks (IN's). This paper first reviews issues in satellite interworking. Next the status and interworking plans of terrestrial mobile communications service providers are examined with early examples of mobile satellite interworking including a discussion of the anticipated evolution towards full interworking between mobile satellite and both fixed and mobile terrestrial networks.

  16. Energy-Efficient Caching for Mobile Edge Computing in 5G Networks

    Directory of Open Access Journals (Sweden)

    Zhaohui Luo

    2017-05-01

    Full Text Available Mobile Edge Computing (MEC, which is considered a promising and emerging paradigm to provide caching capabilities in proximity to mobile devices in 5G networks, enables fast, popular content delivery of delay-sensitive applications at the backhaul capacity of limited mobile networks. Most existing studies focus on cache allocation, mechanism design and coding design for caching. However, grid power supply with fixed power uninterruptedly in support of a MEC server (MECS is costly and even infeasible, especially when the load changes dynamically over time. In this paper, we investigate the energy consumption of the MECS problem in cellular networks. Given the average download latency constraints, we take the MECS’s energy consumption, backhaul capacities and content popularity distributions into account and formulate a joint optimization framework to minimize the energy consumption of the system. As a complicated joint optimization problem, we apply a genetic algorithm to solve it. Simulation results show that the proposed solution can effectively determine the near-optimal caching placement to obtain better performance in terms of energy efficiency gains compared with conventional caching placement strategies. In particular, it is shown that the proposed scheme can significantly reduce the joint cost when backhaul capacity is low.

  17. Energy Management Optimization for Cellular Networks under Renewable Energy Generation Uncertainty

    KAUST Repository

    Rached, Nadhir B.

    2017-03-28

    The integration of renewable energy (RE) as an alternative power source for cellular networks has been deeply investigated in literature. However, RE generation is often assumed to be deterministic; an impractical assumption for realistic scenarios. In this paper, an efficient energy procurement strategy for cellular networks powered simultaneously by the smart grid (SG) and locally deployed RE sources characterized by uncertain processes is proposed. For a one-day operation cycle, the mobile operator aims to reduce its total energy cost by optimizing the amounts of energy to be procured from the local RE sources and SG at each time period. Additionally, it aims to determine the amount of extra generated RE to be sold back to SG. A chance constrained optimization is first proposed to deal with the RE generation uncertainty. Then, two convex approximation approaches: Chernoff and Chebyshev methods, characterized by different levels of knowledge about the RE generation, are developed to determine the energy procurement strategy for different risk levels. In addition, their performances are analyzed for various daily scenarios through selected simulation results. It is shown that the higher complex Chernoff method outperforms the Chebyshev one for different risk levels set by the operator.

  18. Energy Management Optimization for Cellular Networks under Renewable Energy Generation Uncertainty

    KAUST Repository

    Rached, Nadhir B.; Ghazzai, Hakim; Kadri, Abdullah; Alouini, Mohamed-Slim

    2017-01-01

    The integration of renewable energy (RE) as an alternative power source for cellular networks has been deeply investigated in literature. However, RE generation is often assumed to be deterministic; an impractical assumption for realistic scenarios. In this paper, an efficient energy procurement strategy for cellular networks powered simultaneously by the smart grid (SG) and locally deployed RE sources characterized by uncertain processes is proposed. For a one-day operation cycle, the mobile operator aims to reduce its total energy cost by optimizing the amounts of energy to be procured from the local RE sources and SG at each time period. Additionally, it aims to determine the amount of extra generated RE to be sold back to SG. A chance constrained optimization is first proposed to deal with the RE generation uncertainty. Then, two convex approximation approaches: Chernoff and Chebyshev methods, characterized by different levels of knowledge about the RE generation, are developed to determine the energy procurement strategy for different risk levels. In addition, their performances are analyzed for various daily scenarios through selected simulation results. It is shown that the higher complex Chernoff method outperforms the Chebyshev one for different risk levels set by the operator.

  19. Base Station Ordering for Emergency Call Localization in Ultra-dense Cellular Networks

    KAUST Repository

    Elsawy, Hesham

    2017-10-04

    This paper proposes the base station ordering localization technique (BoLT) for emergency call localization in cellular networks. Exploiting the foreseen ultra-densification of the next-generation (5G and beyond) cellular networks, we utilize higher-order Voronoi tessellations to provide ubiquitous localization services that are in compliance to the public safety standards in cellular networks. The proposed localization algorithm runs at the base stations (BSs) and requires minimal operation from agents (i.e., mobile users). Particularly, BoLT requires each agent to feedback a neighbor cell list (NCL) that contains the order of neighboring BSs based on the received signal power in the pilots sent from these BSs. Moreover, this paper utilizes stochastic geometry to develop a tractable mathematical model to assess the performance of BoLT in a general network setting. The goal of this paper is to answer the following two fundamental questions: i) how many BSs should be ordered and reported by the agent to achieve a desirable localization accuracy? and ii) what is the localization error probability given that the pilot signals are subject to shadowing? Assuming that the BSs are deployed according to a Poisson point process (PPP), we answer these two questions via characterizing the tradeoff between the area of location region (ALR) and the localization error probability in terms of the number of BSs ordered by the agent. The results show that reporting the order of six neighboring BSs is sufficient to localize the agent within 10% of the cell area. Increasing the number of reported BSs to ten confines the location region to 1% of the cell area. This would translate to the range of a few meters to decimeters in the foreseen ultra-dense 5G networks.

  20. Base Station Ordering for Emergency Call Localization in Ultra-dense Cellular Networks

    KAUST Repository

    Elsawy, Hesham; Dai, Wenhan; Alouini, Mohamed-Slim; Win, Moe Z.

    2017-01-01

    This paper proposes the base station ordering localization technique (BoLT) for emergency call localization in cellular networks. Exploiting the foreseen ultra-densification of the next-generation (5G and beyond) cellular networks, we utilize higher-order Voronoi tessellations to provide ubiquitous localization services that are in compliance to the public safety standards in cellular networks. The proposed localization algorithm runs at the base stations (BSs) and requires minimal operation from agents (i.e., mobile users). Particularly, BoLT requires each agent to feedback a neighbor cell list (NCL) that contains the order of neighboring BSs based on the received signal power in the pilots sent from these BSs. Moreover, this paper utilizes stochastic geometry to develop a tractable mathematical model to assess the performance of BoLT in a general network setting. The goal of this paper is to answer the following two fundamental questions: i) how many BSs should be ordered and reported by the agent to achieve a desirable localization accuracy? and ii) what is the localization error probability given that the pilot signals are subject to shadowing? Assuming that the BSs are deployed according to a Poisson point process (PPP), we answer these two questions via characterizing the tradeoff between the area of location region (ALR) and the localization error probability in terms of the number of BSs ordered by the agent. The results show that reporting the order of six neighboring BSs is sufficient to localize the agent within 10% of the cell area. Increasing the number of reported BSs to ten confines the location region to 1% of the cell area. This would translate to the range of a few meters to decimeters in the foreseen ultra-dense 5G networks.

  1. Error performance analysis in downlink cellular networks with interference management

    KAUST Repository

    Afify, Laila H.; Elsawy, Hesham; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    Modeling aggregate network interference in cellular networks has recently gained immense attention both in academia and industry. While stochastic geometry based models have succeeded to account for the cellular network geometry, they mostly

  2. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  3. Disease containment strategies based on mobility and information dissemination

    OpenAIRE

    Pejović, Veljko; Lima, Antonio; De Domenico, Manlio; Musolesi, Mirco

    2016-01-01

    Human mobility and social structure are at the basis of disease spreading. Disease containment strategies are usually devised from coarse-grained assumptions about human mobility. Cellular networks data, however, provides finer-grained information, not only about how people move, but also about how they communicate. In this paper we analyze the behavior of a large number of individuals in Ivory Coast using cellular network data. We model mobility and communication between individuals by means...

  4. Lifesavers and Samaritans: emergency use of cellular (mobile) phones in Australia.

    Science.gov (United States)

    Chapman, S; Schofield, W N

    1998-11-01

    There has been highly publicised concern about possible radiation health effects from mobile phones and towers, but scant attention has been paid to the use of mobile phones in reducing notification times in emergencies. National random telephone survey of Australian mobile phone users (n = 720) and extrapolation to national user population (n = 5.1 million). Using a cellular phone, 1 in 8 users have reported a traffic accident; 1 in 4 a dangerous situation; 1 in 16 a non-road medical emergency; 1 in 20 a crime; and 1 in 45 being lost in the bush or being in difficulty at sea. Any debate about the net health impact of mobile phone proliferation must balance possible negative effects (cancer, driving incidents) with the benefits from what appears to be their widespread use in rapidly reporting emergencies and in numerous acts of often health-relevant 'cellular Samaritanism'.

  5. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  6. Efficient Radio Resource Allocation in a GSM and GPRS Cellular Network

    Directory of Open Access Journals (Sweden)

    David Vannucci

    2004-10-01

    Full Text Available This paper investigates the effect of various radio resource allocation strategies in a GSM/GPRS cellular network. The most efficient resource allocation is analysed as a function of the proportion of circuit switched voice and packet switched data load. The Grade of Service and average packet delay is investigated as a function of the load, packet size and call duration. Additionally, the feasibility of using voice over Internet Protocol as opposed to circuit switched voice is investigated as a means to increase subscriber capacity per base station. The work is motivated firstly by the complexity of having both circuit switched and packet switched connectivity on GSM/GPRS mobile cellular system and secondly that an exclusively packet based access on GSM/GPRS has the potential to increase the efficiency of resource utilisation by suitably varying the channel allocation to exploit the characteristics of voice and data traffic.

  7. Mobility management in the future mobile network

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza

    2018-01-01

    The current mobile network architectures are heavily hierarchical, which implies that all traffic must be traversed through a centralized core entity. This makes the network prone to several limitations, e.g., suboptimal communication paths, low scalability, signaling overhead, and single point of

  8. Image Encryption and Chaotic Cellular Neural Network

    Science.gov (United States)

    Peng, Jun; Zhang, Du

    Machine learning has been playing an increasingly important role in information security and assurance. One of the areas of new applications is to design cryptographic systems by using chaotic neural network due to the fact that chaotic systems have several appealing features for information security applications. In this chapter, we describe a novel image encryption algorithm that is based on a chaotic cellular neural network. We start by giving an introduction to the concept of image encryption and its main technologies, and an overview of the chaotic cellular neural network. We then discuss the proposed image encryption algorithm in details, which is followed by a number of security analyses (key space analysis, sensitivity analysis, information entropy analysis and statistical analysis). The comparison with the most recently reported chaos-based image encryption algorithms indicates that the algorithm proposed in this chapter has a better security performance. Finally, we conclude the chapter with possible future work and application prospects of the chaotic cellular neural network in other information assurance and security areas.

  9. Modeling and Performance Analysis for Cell Access and Handoff Schemes in Two-Tier Cellular Networks

    Directory of Open Access Journals (Sweden)

    Kyungkoo Jun

    2014-01-01

    Full Text Available We investigate the effects of handoff on system performance in two-tier cellular networks. Two of the main performance metrics are new call blocking probability and handoff drop rate. We develop analytical models to evaluate the performance of two different handoff schemes. One scheme considers only femto-to-macrocell handoff while the other is bidirectional including macro-to-femtocell handoff. Our model is more elaborate than existing ones which have not considered the mobility of mobile stations. Numerical results show that the bidirectional scheme performs better than the femto-to-macrocell handoff as it achieves lower blocking probability and drop rate.

  10. Using OpenSSH to secure mobile LAN network traffic

    Science.gov (United States)

    Luu, Brian B.; Gopaul, Richard D.

    2002-08-01

    Mobile Internet Protocol (IP) Local Area Network (LAN) is a technique, developed by the U.S. Army Research Laboratory, which allows a LAN to be IP mobile when attaching to a foreign IP-based network and using this network as a means to retain connectivity to its home network. In this paper, we describe a technique that uses Open Secure Shell (OpenSSH) software to ensure secure, encrypted transmission of a mobile LAN's network traffic. Whenever a mobile LAN, implemented with Mobile IP LAN, moves to a foreign network, its gateway (router) obtains an IP address from the new network. IP tunnels, using IP encapsulation, are then established from the gateway through the foreign network to a home agent on its home network. These tunnels provide a virtual two-way connection to the home network for the mobile LAN as if the LAN were connected directly to its home network. Hence, when IP mobile, a mobile LAN's tunneled network traffic must traverse one or more foreign networks that may not be trusted. This traffic could be subject to eavesdropping, interception, modification, or redirection by malicious nodes in these foreign networks. To protect network traffic passing through the tunnels, OpenSSH is used as a means of encryption because it prevents surveillance, modification, and redirection of mobile LAN traffic passing across foreign networks. Since the software is found in the public domain, is available for most current operating systems, and is commonly used to provide secure network communications, OpenSSH is the software of choice.

  11. Estimating network effects in China's mobile telecommunications

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    A model is proposed along with empirical investigation to prove the existence of network effects in China's mobile telecommunications market. Futhernore, network effects on China's mobile telecommunications are estimated with a dynamic model. The structural parameters are identified from regression coefficients and the results are analyzed and compared with another literature. Data and estimation issues are also discussed. Conclusions are drawn that network effects are significant in China's mobile telecommunications market, and that ignoring network effects leads to bad policy making.

  12. Mobile Agents in Networking and Distributed Computing

    CERN Document Server

    Cao, Jiannong

    2012-01-01

    The book focuses on mobile agents, which are computer programs that can autonomously migrate between network sites. This text introduces the concepts and principles of mobile agents, provides an overview of mobile agent technology, and focuses on applications in networking and distributed computing.

  13. Mobility management in LTE heterogeneous networks

    CERN Document Server

    Karandikar, Abhay; Mehta, Mahima

    2017-01-01

    This book is the first of its kind, compiling information on the Long-Term Evolution (LTE) standards, which are enhanced to address new mobility-related challenges in Heterogeneous Networks (HetNets). It identifies the related challenges and discusses solutions and the simulation methodology for modeling HetNet mobility – cutting-edge information that was previously accessible only in the form of 3GPP specifications and documents, and research papers. The book reviews the current LTE mobility framework and discusses some of the changes for enhancing mobility management in HetNets. It describes the measurement procedures, handover (HO) mechanisms and HO success/failure scenarios. HetNets are intended to provide very high spectral efficiency while ensuring seamless coverage by deploying low-power nodes within the umbrella macrocell network. While mobility management in homogeneous networks is well understood, LTE standards are being enhanced to address the HetNet-specific mobility management challenges emergi...

  14. Towards Massive Machine Type Cellular Communications

    OpenAIRE

    Dawy, Zaher; Saad, Walid; Ghosh, Arunabha; Andrews, Jeffrey G.; Yaacoub, Elias

    2015-01-01

    Cellular networks have been engineered and optimized to carrying ever-increasing amounts of mobile data, but over the last few years, a new class of applications based on machine-centric communications has begun to emerge. Automated devices such as sensors, tracking devices, and meters - often referred to as machine-to-machine (M2M) or machine-type communications (MTC) - introduce an attractive revenue stream for mobile network operators, if a massive number of them can be efficiently support...

  15. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  16. An approach to efficient mobility management in intelligent networks

    Science.gov (United States)

    Murthy, K. M. S.

    1995-01-01

    Providing personal communication systems supporting full mobility require intelligent networks for tracking mobile users and facilitating outgoing and incoming calls over different physical and network environments. In realizing the intelligent network functionalities, databases play a major role. Currently proposed network architectures envision using the SS7-based signaling network for linking these DB's and also for interconnecting DB's with switches. If the network has to support ubiquitous, seamless mobile services, then it has to support additionally mobile application parts, viz., mobile origination calls, mobile destination calls, mobile location updates and inter-switch handovers. These functions will generate significant amount of data and require them to be transferred between databases (HLR, VLR) and switches (MSC's) very efficiently. In the future, the users (fixed or mobile) may use and communicate with sophisticated CPE's (e.g. multimedia, multipoint and multisession calls) which may require complex signaling functions. This will generate volumness service handling data and require efficient transfer of these message between databases and switches. Consequently, the network providers would be able to add new services and capabilities to their networks incrementally, quickly and cost-effectively.

  17. On the Need of Network coding for Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Heide, Janus; Pedersen, Morten Videbæk

    for mobile clouds. The paper will list the benefits of network coding for mobile clouds as well as introduce both concepts in a tutorial way. The results used throughout this paper are collaborative work of different research institutes, but mainly taken from the mobile device group at Aalborg University.......This paper advocates the need of network coding for mobile clouds. Mobile clouds as well as network coding are describing two novel concepts. The concept of mobile clouds describes the potential of mobile devices to communicate with each other and form a cooperative cluster in which new services...... and potentials are created. Network coding on the other side enables the mobile cloud to communicate in a very efficient and secure way in terms of energy and bandwidth usage. Even though network coding can be applied in a variety of communication networks, it has some inherent features that makes it suitable...

  18. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  19. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  20. Collaborative Multi-Layer Network Coding in Hybrid Cellular Cognitive Radio Networks

    KAUST Repository

    Moubayed, Abdallah J.; Sorour, Sameh; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    In this paper, as an extension to [1], we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in hybrid (interweave and underlay) cellular cognitive radio networks. This scheme allows the uncoordinated

  1. Collaborative Multi-Layer Network Coding For Hybrid Cellular Cognitive Radio Networks

    KAUST Repository

    Moubayed, Abdallah J.

    2014-01-01

    In this thesis, as an extension to [1], we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in hybrid (interweave and underlay) cellular cognitive radio networks. This scheme allows the uncoordinated

  2. Internet-Based Mobile Ad Hoc Networking (Preprint)

    National Research Council Canada - National Science Library

    Corson, M. S; Macker, Joseph P; Cirincione, Gregory H

    1999-01-01

    Internet-based Mobile Ad Hoc Networking is an emerging technology that supports self-organizing, mobile networking infrastructures, and is one which appears well-suited for use in future commercial...

  3. Proof-of-Concept of a Millimeter-Wave Integrated Heterogeneous Network for 5G Cellular.

    Science.gov (United States)

    Okasaka, Shozo; Weiler, Richard J; Keusgen, Wilhelm; Pudeyev, Andrey; Maltsev, Alexander; Karls, Ingolf; Sakaguchi, Kei

    2016-08-25

    The fifth-generation mobile networks (5G) will not only enhance mobile broadband services, but also enable connectivity for a massive number of Internet-of-Things devices, such as wireless sensors, meters or actuators. Thus, 5G is expected to achieve a 1000-fold or more increase in capacity over 4G. The use of the millimeter-wave (mmWave) spectrum is a key enabler to allowing 5G to achieve such enhancement in capacity. To fully utilize the mmWave spectrum, 5G is expected to adopt a heterogeneous network (HetNet) architecture, wherein mmWave small cells are overlaid onto a conventional macro-cellular network. In the mmWave-integrated HetNet, splitting of the control plane (CP) and user plane (UP) will allow continuous connectivity and increase the capacity of the mmWave small cells. mmWave communication can be used not only for access linking, but also for wireless backhaul linking, which will facilitate the installation of mmWave small cells. In this study, a proof-of-concept (PoC) was conducted to demonstrate the practicality of a prototype mmWave-integrated HetNet, using mmWave technologies for both backhaul and access.

  4. Alleviate Cellular Congestion Through Opportunistic Trough Filling

    Directory of Open Access Journals (Sweden)

    Yichuan Wang

    2014-04-01

    Full Text Available The demand for cellular data service has been skyrocketing since the debut of data-intensive smart phones and touchpads. However, not all data are created equal. Many popular applications on mobile devices, such as email synchronization and social network updates, are delay tolerant. In addition, cellular load varies significantly in both large and small time scales. To alleviate network congestion and improve network performance, we present a set of opportunistic trough filling schemes that leverage the time-variation of network congestion and delay-tolerance of certain traffic in this paper. We consider average delay, deadline, and clearance time as the performance metrics. Simulation results show promising performance improvement over the standard schemes. The work shed lights on addressing the pressing issue of cellular overload.

  5. Increasing the coverage area through relay node deployment in long term evolution advanced cellular networks

    Science.gov (United States)

    Aldhaibani, Jaafar A.; Ahmad, R. B.; Yahya, A.; Azeez, Suzan A.

    2015-05-01

    Wireless multi-hop relay networks have become very important technologies in mobile communications. These networks ensure high throughput and coverage extension with a low cost. The poor capacity at cell edges is not enough to meet with growing demand of high capacity and throughput irrespective of user's placement in the cellular network. In this paper we propose optimal placement of relay node that provides maximum achievable rate at users and enhances the throughput and coverage at cell edge region. The proposed scheme is based on the outage probability at users and taken on account the interference between nodes. Numerical analyses along with simulation results indicated there are an improvement in capacity for users at the cell edge is 40% increment from all cell capacity.

  6. Dynamic Video Streaming in Caching-enabled Wireless Mobile Networks

    OpenAIRE

    Liang, C.; Hu, S.

    2017-01-01

    Recent advances in software-defined mobile networks (SDMNs), in-network caching, and mobile edge computing (MEC) can have great effects on video services in next generation mobile networks. In this paper, we jointly consider SDMNs, in-network caching, and MEC to enhance the video service in next generation mobile networks. With the objective of maximizing the mean measurement of video quality, an optimization problem is formulated. Due to the coupling of video data rate, computing resource, a...

  7. Reversing the Energy Trend in Mobile Networks

    DEFF Research Database (Denmark)

    Micallef, Gilbert; Mogensen, Preben; Scheck, Hans-Otto

    2011-01-01

    In order to meet the expected boost in mobile data traffic, mobile network operators are planning and upgrading the capacity of their networks. Through a previous study it has been shown that over a period of eight years, different network upgrade strategies have a different impact on the energy ...

  8. Composing Networks: Writing Practices on Mobile Devices

    Science.gov (United States)

    Swarts, Jason

    2016-01-01

    This article is an investigation of composing practices through which people create networks with mobile phones. By looking through the lens of actor-network theory, the author portrays the networking activity of mobile phone users as translation, what Latour describes as an infralanguage to which different disciplinary perspectives can be…

  9. Mobile cloud networking: mobile network, compute, and storage as one service on-demand

    NARCIS (Netherlands)

    Jamakovic, Almerima; Bohnert, Thomas Michael; Karagiannis, Georgios; Galis, A.; Gavras, A.

    2013-01-01

    The Future Communication Architecture for Mobile Cloud Services: Mobile Cloud Networking (MCN)1 is a EU FP7 Large scale Integrating Project (IP) funded by the European Commission. MCN project was launched in November 2012 for the period of 36 month. In total top-tier 19 partners from industry and

  10. Assessment of general public exposure to lte signals compared to other cellular networks present in Thessaloniki, Greece

    International Nuclear Information System (INIS)

    Gkonis, Fotios; Boursianis, Achilles; Samaras, Theodoros

    2017-01-01

    To assess general public exposure to electromagnetic fields from Long Term Evolution (LTE) base stations, measurements at 10 sites in Thessaloniki, Greece were performed. Results are compared with other mobile cellular networks currently in use. All exposure values satisfy the guidelines for general public exposure of the International Commission on Non-Ionizing Radiation Protection (ICNIRP), as well as the reference levels by the Greek legislation at all sites. LTE electric field measurements were recorded up to 0.645 V/m. By applying the ICNIRP guidelines, the exposure ratio for all LTE signals is between 2.9 x 10"-"5 and 2.8 x 10"-"2. From the measurements results it is concluded that the average and maximum power density contribution of LTE down-link signals to the overall cellular networks signals are 7.8% and 36.7%, respectively. (authors)

  11. Modeling and Analysis of Cellular Networks using Stochastic Geometry: A Tutorial

    KAUST Repository

    Elsawy, Hesham; Salem, Ahmed Sultan; Alouini, Mohamed-Slim; Win, Moe Z.

    2016-01-01

    This paper presents a tutorial on stochastic geometry (SG) based analysis for cellular networks. This tutorial is distinguished by its depth with respect to wireless communication details and its focus on cellular networks. The paper starts by modeling and analyzing the baseband interference in a baseline single-tier downlink cellular network with single antenna base stations and universal frequency reuse. Then, it characterizes signal-to-interference-plus-noise-ratio (SINR) and its related performance metrics. In particular, a unified approach to conduct error probability, outage probability, and transmission rate analysis is presented. Although the main focus of the paper is on cellular networks, the presented unified approach applies for other types of wireless networks that impose interference protection around receivers. The paper then extends the unified approach to capture cellular network characteristics (e.g., frequency reuse, multiple antenna, power control, etc.). It also presents numerical examples associated with demonstrations and discussions. To this end, the paper highlights the state-of-the- art research and points out future research directions.

  12. Modeling and Analysis of Cellular Networks using Stochastic Geometry: A Tutorial

    KAUST Repository

    Elsawy, Hesham

    2016-11-03

    This paper presents a tutorial on stochastic geometry (SG) based analysis for cellular networks. This tutorial is distinguished by its depth with respect to wireless communication details and its focus on cellular networks. The paper starts by modeling and analyzing the baseband interference in a baseline single-tier downlink cellular network with single antenna base stations and universal frequency reuse. Then, it characterizes signal-to-interference-plus-noise-ratio (SINR) and its related performance metrics. In particular, a unified approach to conduct error probability, outage probability, and transmission rate analysis is presented. Although the main focus of the paper is on cellular networks, the presented unified approach applies for other types of wireless networks that impose interference protection around receivers. The paper then extends the unified approach to capture cellular network characteristics (e.g., frequency reuse, multiple antenna, power control, etc.). It also presents numerical examples associated with demonstrations and discussions. To this end, the paper highlights the state-of-the- art research and points out future research directions.

  13. A Survey on 5G: The Next Generation of Mobile Communication

    OpenAIRE

    Panwar, Nisha; Sharma, Shantanu; Singh, Awadhesh Kumar

    2015-01-01

    The rapidly increasing number of mobile devices, voluminous data, and higher data rate are pushing to rethink the current generation of the cellular mobile communication. The next or fifth generation (5G) cellular networks are expected to meet high-end requirements. The 5G networks are broadly characterized by three unique features: ubiquitous connectivity, extremely low latency, and very high-speed data transfer. The 5G networks would provide novel architectures and technologies beyond state...

  14. Cloud Radio Access Network architecture. Towards 5G mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base...... stations into radio and baseband parts, and pool the Baseband Units (BBUs) from multiple base stations into a centralized and virtualized BBU Pool. This gives a number of benefits in terms of cost and capacity. However, the challenge is then to find an optimal functionality splitting point as well...... as to design the socalled fronthaul network, interconnecting those parts. This thesis focuses on quantifying those benefits and proposing a flexible and capacity-optimized fronthaul network. It is shown that a C-RAN with a functional split resulting in a variable bit rate on the fronthaul links brings cost...

  15. Content Delivery in Future Mobile Communication Networks

    Science.gov (United States)

    Jonas, Karl; Raber, Sergey

    2003-07-01

    With the fast progress in the deployment of wireless networks during the last few years, the global communication market requires the development of new methods for content delivery towards mobile users. It is currently characterised by the introduction of the 3rd generation of terrestrial mobile networks based on 3GPP's UMTS standard. It is expected that this will eventually lead to integrated all-IP-based infrastructures supporting a variety of radio access technologies (so-called beyond-3G-networks or 4th Generation networks). The integration of mobility support, security and accounting and provisioning of differentiated qualities of service are among the issues which are currently researched in the 4G framework.Since it is not possible to change network protocols and infrastructure at once in order to optimize them for mobile services, it is very important to find an appropriate way for the migration from the current infrastructure towards an integrated architecture, where fixed and mobile networks coexist and interoperate in the most effective and flexible way.The integration of satellite communication networks into the terrestrial mobile communication environment is the focus of R&D activities at the Competence Centre for Advanced Satellite Communication of the FhG FOKUS institute. These activities are presented in this article, with a focus on the CoDeSat Content Delivery over Satellite project.In the remainder of this article we first summarize services and service requirements as they are considered in our work. We then discuss the challenges derived from these requirements with respect to current network and protocol architectures. Finally, we describe our approach, and the current status of our prototype implementation.

  16. Tension and robustness in multitasking cellular networks.

    Directory of Open Access Journals (Sweden)

    Jeffrey V Wong

    Full Text Available Cellular networks multitask by exhibiting distinct, context-dependent dynamics. However, network states (parameters that generate a particular dynamic are often sub-optimal for others, defining a source of "tension" between them. Though multitasking is pervasive, it is not clear where tension arises, what consequences it has, and how it is resolved. We developed a generic computational framework to examine the source and consequences of tension between pairs of dynamics exhibited by the well-studied RB-E2F switch regulating cell cycle entry. We found that tension arose from task-dependent shifts in parameters associated with network modules. Although parameter sets common to distinct dynamics did exist, tension reduced both their accessibility and resilience to perturbation, indicating a trade-off between "one-size-fits-all" solutions and robustness. With high tension, robustness can be preserved by dynamic shifting of modules, enabling the network to toggle between tasks, and by increasing network complexity, in this case by gene duplication. We propose that tension is a general constraint on the architecture and operation of multitasking biological networks. To this end, our work provides a framework to quantify the extent of tension between any network dynamics and how it affects network robustness. Such analysis would suggest new ways to interfere with network elements to elucidate the design principles of cellular networks.

  17. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  18. Nation-Wide Mobile Network Energy Evolution Analysis

    DEFF Research Database (Denmark)

    Perez, Eva; Frank, Philipp; Micallef, Gilbert

    2013-01-01

    Mobile network operators are facing a challenging dilemma. While on the one hand they are committed to reducing their carbon emissions, and energy consumption, they are also required to continuously upgrade existing networks, ensuring that the relentless growth in data traffic can still be suppor......Mobile network operators are facing a challenging dilemma. While on the one hand they are committed to reducing their carbon emissions, and energy consumption, they are also required to continuously upgrade existing networks, ensuring that the relentless growth in data traffic can still...... be supported. In most cases, these upgrades increase the energy consumption of the network even further. This paper presents a nation-wide case study, based on a commercial network of a leading European operator, intended to provide a clear understanding of how the energy consumption of mobile networks...... is expected to evolve from 2012 until 2020. The study also considers an efficient network capacity evolution path, including base station equipment improvement forecasts....

  19. Health aspects of cellular mobile telephones

    International Nuclear Information System (INIS)

    Garn, H.

    1996-01-01

    Cellular mobile telephones are one of the main topics among health aspects of electromagnetic fields. In many countries, the number of people opposing communication towers is on the rise. Lawsuits against telecommunication and power line companies have been filed. All this makes people doubt the safety of electromagnetic fields. With respect to cellular phones, there are two scenarios: * Exposure of the operators of hand-held terminals (HHT). * Exposure of the general public from base stations (BS). In the first case, the transmit antenna of the HHT is very close to the human body. For normal operation, the distance will roughly be 2 - 3 cm. The transmitter power of the HHT is comparatively low, but there is a considerable fraction of the radiated electromagnetic energy penetrating the tissue. Considering the second case, BS transmitter powers are by a factor of 100-1000 higher, but the distance between antenna and the human body is by a factor of 1000-100,000 greater, as far as areas of unrestricted public access are concerned. As the power density of an electromagnetic wave decreases inversely proportional to the square of the distance, exposure of the public is always significantly (by many orders of magnitude) lower than exposure of operators of HHTs. Some well-known interaction mechanisms of microwave radiation with the human body have been very well-established today. In some other areas, there is still a need for further research. This paper summarizes present knowledge on human safety with mobile telephone systems. (author)

  20. Modeling integrated cellular machinery using hybrid Petri-Boolean networks.

    Directory of Open Access Journals (Sweden)

    Natalie Berestovsky

    Full Text Available The behavior and phenotypic changes of cells are governed by a cellular circuitry that represents a set of biochemical reactions. Based on biological functions, this circuitry is divided into three types of networks, each encoding for a major biological process: signal transduction, transcription regulation, and metabolism. This division has generally enabled taming computational complexity dealing with the entire system, allowed for using modeling techniques that are specific to each of the components, and achieved separation of the different time scales at which reactions in each of the three networks occur. Nonetheless, with this division comes loss of information and power needed to elucidate certain cellular phenomena. Within the cell, these three types of networks work in tandem, and each produces signals and/or substances that are used by the others to process information and operate normally. Therefore, computational techniques for modeling integrated cellular machinery are needed. In this work, we propose an integrated hybrid model (IHM that combines Petri nets and Boolean networks to model integrated cellular networks. Coupled with a stochastic simulation mechanism, the model simulates the dynamics of the integrated network, and can be perturbed to generate testable hypotheses. Our model is qualitative and is mostly built upon knowledge from the literature and requires fine-tuning of very few parameters. We validated our model on two systems: the transcriptional regulation of glucose metabolism in human cells, and cellular osmoregulation in S. cerevisiae. The model produced results that are in very good agreement with experimental data, and produces valid hypotheses. The abstract nature of our model and the ease of its construction makes it a very good candidate for modeling integrated networks from qualitative data. The results it produces can guide the practitioner to zoom into components and interconnections and investigate them

  1. SDN-Based Mobile Data Offloading Scheme Using a Femtocell and WiFi Networks

    Directory of Open Access Journals (Sweden)

    Chang-Woo Ahn

    2017-01-01

    Full Text Available Because of the many applications running on smartphones, the load of mobile data traffic on cellular networks is increasing rapidly. A femtocell is a solution to increase the cellular network capacity and coverage. However, because it uses the same frequency bands as a macrocell, interference problems have prevented its widespread adoption. In this paper, we propose a scheme for traffic offloading between femtocells and WiFi networks utilizing software-defined networking (SDN technology. In the proposed offloading scheme, the SDN technology allows a terminal to maintain existing sessions after offloading through a centralized control of the SDN-based equipment. We also propose an offloading target selection scheme based on available bandwidth estimation and an association control mechanism to reduce the femtocell load while ensuring quality of service (QoS in terms of throughput. Experimental results on an actual testbed showed that the proposed offloading scheme provides seamless connectivity and reduces the femtocell load by up to 46% with the aid of the proposed target selection scheme, while ensuring QoS after offloading. We also observed that the proposed target selection scheme offloads 28% more traffic to WiFi networks compared to received signal strength indicator-based target selection in a low background traffic environment.

  2. Security of Mobile Devices and Wi-Fi Networks

    OpenAIRE

    Hong, Zimeng

    2015-01-01

    Along with the progress of times and the development of science and technology, mobile devices have become more and more popular. At the same time, an increasing number of Wi-Fi networks are being built for the demand of mobile devices. Therefore, the security between mobile devices and Wi-Fi networks became a main object in the IT area. The purpose of the thesis is to analyze security threats and give relative advises for all the mobile device and Wi-Fi network users. The thesis mainly ta...

  3. A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mobile Ad Hoc and Sensor Networks

    OpenAIRE

    Francesco Beritelli; Aurelio La Corte; Corrado Rametta; Francesco Scaglione

    2018-01-01

    As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet access networks are not designed to support real-time data traffic because of several drawbacks concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc., which impact directly such parameters as delay, jitter, and packet loss rate that are...

  4. Mobile network maintenance (GSM)

    CERN Multimedia

    IT Department

    2009-01-01

    Maintenance work will be carried out on the CERN mobile network infrastructure (GSM) on the 23 and 24 July from 6 p.m. to 6 a.m. in order to replace discontinued equipment and to increase the bandwidth capacity of the GSM mobile network. All CERN GSM emitters (40 units) will be moved one by one to the new infrastructure during the maintenance. The call of a user connected to an emitter at the time of its maintenance will be cut off. However, the general overlapping of the GSM radio coverage should mean that users are able immediately to call again should their call be interrupted. IT/CS/CS

  5. Accuracy Enhancements for Positioning of Mobile Devices in Wireless Communication Networks

    DEFF Research Database (Denmark)

    Figueiras, Joao

    of the physical length of the communication links. Since these solutions do not require integration of additional hardware into the mobile nodes, they are cheap and simple to implement. As a price to pay, accuracy is typically lower in comparison to dedicated positioning systems. Thus, an important challenge...... communication among users, cooperative positioning strategies aim at localizing devices as a group and not as individuals. In order to reach this goal it is necessary to combine measurements from two domains: device-to-device links and cellular links. Since this combination of information......Positioning of mobile devices in wireless communication networks is nowadays being intensively investigated due to the combined benefit of location information and communication. Typical solutions for such scenario rely on robust algorithms that estimate position from indirect measurements...

  6. Hybrid Multicast-Unicast Video Streaming over Heterogeneous Cellular Networks

    OpenAIRE

    Almowuena, Saleh Abdullah

    2016-01-01

    The demand for multimedia streaming over mobile networks has been steadily increasing in the past several years. For instance, it has become common for mobile users to stream full TV episodes, sports events, and movies while on the go. Unfortunately, this growth in demand has strained the wireless networks despite the significant increase in their capacities with recent generations. It has also caused a significant increase in the energy consumption at mobile terminals. To overcome these chal...

  7. Energy efficient evolution of mobile broadband networks

    Energy Technology Data Exchange (ETDEWEB)

    Micallef, G.

    2013-04-15

    Over the last decade, the mobile communications industry has broken through some remarkable barriers, pushing further and transforming the way people communicate and access information. As the volume of traffic carried by mobile networks maintains an insatiable growth, mobile network operators are required to ensure that networks can scale accordingly. In addition to upgrading existing networks, a number of operators have already started to rollout a further radio access technology layer, Long Term Evolution, or LTE. In addition to enhancing network capacity, operators are also required to adhere to public commitments for reducing their energy and carbon footprint. In 2008 Vodafone stated that by the year 2020, efforts for reducing emissions are expected to halve emissions registered in the year 2006/7. In addition to presenting a more environmentally conscious brand, this is also hoped to reduce costs, which, based on increasing energy prices and necessary network upgrades are likely to increase. Since base station sites make up for about 75% of the power consumption in mobile networks, studies are focused on this specific network element. A number of factors believed to play a role in the power consumption of mobile networks are separately investigated and later combined, providing a realistic indication of how the consumption is expected to evolve. This is also used as an indication to determine how likely it is for operators to achieve power consumption and emission targets. In order for mobile network operators to upgrade existing infrastructure different options are available. Irrespective of the selected option, capacity upgrades are bound to increase the power consumption of the network. Carried through case studies, a first analysis compares a number of network evolution strategies, determining which provides the necessary performance while limiting the increase in power consumption. Overall, it is noted that a hybrid solution involving the upgrade of

  8. Energy efficient evolution of mobile broadband networks

    Energy Technology Data Exchange (ETDEWEB)

    Micallef, G.

    2013-04-15

    Over the last decade, the mobile communications industry has broken through some remarkable barriers, pushing further and transforming the way people communicate and access information. As the volume of traffic carried by mobile networks maintains an insatiable growth, mobile network operators are required to ensure that networks can scale accordingly. In addition to upgrading existing networks, a number of operators have already started to rollout a further radio access technology layer, Long Term Evolution, or LTE. In addition to enhancing network capacity, operators are also required to adhere to public commitments for reducing their energy and carbon footprint. In 2008 Vodafone stated that by the year 2020, efforts for reducing emissions are expected to halve emissions registered in the year 2006/7. In addition to presenting a more environmentally conscious brand, this is also hoped to reduce costs, which, based on increasing energy prices and necessary network upgrades are likely to increase. Since base station sites make up for about 75% of the power consumption in mobile networks, studies are focused on this specific network element. A number of factors believed to play a role in the power consumption of mobile networks are separately investigated and later combined, providing a realistic indication of how the consumption is expected to evolve. This is also used as an indication to determine how likely it is for operators to achieve power consumption and emission targets. In order for mobile network operators to upgrade existing infrastructure different options are available. Irrespective of the selected option, capacity upgrades are bound to increase the power consumption of the network. Carried through case studies, a first analysis compares a number of network evolution strategies, determining which provides the necessary performance while limiting the increase in power consumption. Overall, it is noted that a hybrid solution involving the upgrade of

  9. Evaluation of QoS supported in Network Mobility NEMO environments

    International Nuclear Information System (INIS)

    Hussien, L F; Abdalla, A H; Habaebi, M H; Khalifa, O O; Hassan, W H

    2013-01-01

    Network mobility basic support (NEMO BS) protocol is an entire network, roaming as a unit which changes its point of attachment to the Internet and consequently its reachability in the network topology. NEMO BS doesn't provide QoS guarantees to its users same as traditional Internet IP and Mobile IPv6 as well. Typically, all the users will have same level of services without considering about their application requirements. This poses a problem to real-time applications that required QoS guarantees. To gain more effective control of the network, incorporated QoS is needed. Within QoS-enabled network the traffic flow can be distributed to various priorities. Also, the network bandwidth and resources can be allocated to different applications and users. Internet Engineering Task Force (IETF) working group has proposed several QoS solutions for static network such as IntServ, DiffServ and MPLS. These QoS solutions are designed in the context of a static environment (i.e. fixed hosts and networks). However, they are not fully adapted to mobile environments. They essentially demands to be extended and adjusted to meet up various challenges involved in mobile environments. With existing QoS mechanisms many proposals have been developed to provide QoS for individual mobile nodes (i.e. host mobility). In contrary, research based on the movement of the whole mobile network in IPv6 is still undertaking by the IETF working groups (i.e. network mobility). Few researches have been done in the area of providing QoS for roaming networks. Therefore, this paper aims to review and investigate (previous /and current) related works that have been developed to provide QoS in mobile network. Consequently, a new proposed scheme will be introduced to enhance QoS within NEMO environment, achieving by which seamless mobility to users of mobile network node (MNN)

  10. Looking for Sustainable Urban Mobility through Bayesian Networks

    Directory of Open Access Journals (Sweden)

    Giovanni Fusco

    2004-11-01

    Full Text Available There is no formalised theory of sustainable urban mobility systems. Observed patterns of urban mobility are often considered unsustainable. But we don’t know what a city with sustainable mobility should look like. It is nevertheless increasingly apparent that the urban mobility system plays an important role in the achievement of the city’s wider sustainability objectives.In this paper we explore the characteristics of sustainable urban mobility systems through the technique of Bayesian networks. At the frontier between multivariate statistics and artificial intelligence, Bayesian networks provide powerful models of causal knowledge in an uncertain context. Using data on urban structure, transportation offer, mobility demand, resource consumption and environmental externalities from seventy-five world cities, we developed a systemic model of the city-transportation-environment interaction in the form of a Bayesian network. The network could then be used to infer the features of the city with sustainable mobility.The Bayesian model indicates that the city with sustainable mobility is most probably a dense city with highly efficient transit and multimodal mobility. It produces high levels of accessibility without relying on a fast road network. The achievement of sustainability objectives for urban mobility is probably compatible with all socioeconomic contexts.By measuring the distance of world cities from the inferred sustainability profile, we finally derive a geography of sustainability for mobility systems. The cities closest to the sustainability profile are in Central Europe as well as in affluent countries of the Far East. Car-dependent American cities are the farthest from the desired sustainability profile.

  11. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  12. Mobile data offloading addressing the service quality vs. resource utilisation dilemma

    OpenAIRE

    Whittier, Alicia; Kulkarni, Parag; Cao, Fengming; Armour, Simon

    2016-01-01

    Mobile operators are integrating WiFi into their cellular networks as a way to address the issue of mobile data deluge. Although prominently used for its high data rates and unlicensed frequency band of operation, WiFi's contention based medium access does not guarantee that a user's quality of service will necessarily be met, especially if mobile devices simply `offload' to WiFi in preference to cellular. A network selection algorithm offers a way to enhance user experience, by always select...

  13. LinkMind: link optimization in swarming mobile sensor networks.

    Science.gov (United States)

    Ngo, Trung Dung

    2011-01-01

    A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  14. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Trung Dung Ngo

    2011-08-01

    Full Text Available A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  15. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  16. Proof-of-Concept of a Millimeter-Wave Integrated Heterogeneous Network for 5G Cellular

    Directory of Open Access Journals (Sweden)

    Shozo Okasaka

    2016-08-01

    Full Text Available The fifth-generation mobile networks (5G will not only enhance mobile broadband services, but also enable connectivity for a massive number of Internet-of-Things devices, such as wireless sensors, meters or actuators. Thus, 5G is expected to achieve a 1000-fold or more increase in capacity over 4G. The use of the millimeter-wave (mmWave spectrum is a key enabler to allowing 5G to achieve such enhancement in capacity. To fully utilize the mmWave spectrum, 5G is expected to adopt a heterogeneous network (HetNet architecture, wherein mmWave small cells are overlaid onto a conventional macro-cellular network. In the mmWave-integrated HetNet, splitting of the control plane (CP and user plane (UP will allow continuous connectivity and increase the capacity of the mmWave small cells. mmWave communication can be used not only for access linking, but also for wireless backhaul linking, which will facilitate the installation of mmWave small cells. In this study, a proof-of-concept (PoC was conducted to demonstrate the practicality of a prototype mmWave-integrated HetNet, using mmWave technologies for both backhaul and access.

  17. Methods for the Analysis of Protein Phosphorylation-Mediated Cellular Signaling Networks

    Science.gov (United States)

    White, Forest M.; Wolf-Yadlin, Alejandro

    2016-06-01

    Protein phosphorylation-mediated cellular signaling networks regulate almost all aspects of cell biology, including the responses to cellular stimulation and environmental alterations. These networks are highly complex and comprise hundreds of proteins and potentially thousands of phosphorylation sites. Multiple analytical methods have been developed over the past several decades to identify proteins and protein phosphorylation sites regulating cellular signaling, and to quantify the dynamic response of these sites to different cellular stimulation. Here we provide an overview of these methods, including the fundamental principles governing each method, their relative strengths and weaknesses, and some examples of how each method has been applied to the analysis of complex signaling networks. When applied correctly, each of these techniques can provide insight into the topology, dynamics, and regulation of protein phosphorylation signaling networks.

  18. Capacity of Heterogeneous Mobile Wireless Networks with D-Delay Transmission Strategy.

    Science.gov (United States)

    Wu, Feng; Zhu, Jiang; Xi, Zhipeng; Gao, Kai

    2016-03-25

    This paper investigates the capacity problem of heterogeneous wireless networks in mobility scenarios. A heterogeneous network model which consists of n normal nodes and m helping nodes is proposed. Moreover, we propose a D-delay transmission strategy to ensure that every packet can be delivered to its destination nodes with limited delay. Different from most existing network schemes, our network model has a novel two-tier architecture. The existence of helping nodes greatly improves the network capacity. Four types of mobile networks are studied in this paper: i.i.d. fast mobility model and slow mobility model in two-dimensional space, i.i.d. fast mobility model and slow mobility model in three-dimensional space. Using the virtual channel model, we present an intuitive analysis of the capacity of two-dimensional mobile networks and three-dimensional mobile networks, respectively. Given a delay constraint D, we derive the asymptotic expressions for the capacity of the four types of mobile networks. Furthermore, the impact of D and m to the capacity of the whole network is analyzed. Our findings provide great guidance for the future design of the next generation of networks.

  19. A Hybrid Energy Sharing Framework for Green Cellular Networks

    KAUST Repository

    Farooq, Muhammad Junaid

    2016-12-09

    Cellular operators are increasingly turning towards renewable energy (RE) as an alternative to using traditional electricity in order to reduce operational expenditure and carbon footprint. Due to the randomness in both RE generation and mobile traffic at each base station (BS), a surplus or shortfall of energy may occur at any given time. To increase energy selfreliance and minimize the network’s energy cost, the operator needs to efficiently exploit the RE generated across all BSs. In this paper, a hybrid energy sharing framework for cellular network is proposed, where a combination of physical power lines and energy trading with other BSs using smart grid is used. Algorithms for physical power lines deployment between BSs, based on average and complete statistics of the net RE available, are developed. Afterwards, an energy management framework is formulated to optimally determine the quantities of electricity and RE to be procured and exchanged among BSs, respectively, while considering battery capacities and real-time energy pricing. Three cases are investigated where RE generation is unknown, perfectly known, and partially known ahead of time. Results investigate the time varying energy management of BSs and demonstrate considerable reduction in average energy cost thanks to the hybrid energy sharing scheme.

  20. Evidence That Calls-Based and Mobility Networks Are Isomorphic.

    Directory of Open Access Journals (Sweden)

    Michele Coscia

    Full Text Available Social relations involve both face-to-face interaction as well as telecommunications. We can observe the geography of phone calls and of the mobility of cell phones in space. These two phenomena can be described as networks of connections between different points in space. We use a dataset that includes billions of phone calls made in Colombia during a six-month period. We draw the two networks and find that the call-based network resembles a higher order aggregation of the mobility network and that both are isomorphic except for a higher spatial decay coefficient of the mobility network relative to the call-based network: when we discount distance effects on the call connections with the same decay observed for mobility connections, the two networks are virtually indistinguishable.

  1. Full-Duplex Communications in Large-Scale Cellular Networks

    KAUST Repository

    Alammouri, Ahmad

    2016-01-01

    /downlink interference. This thesis presents a tractable framework, based on stochastic geometry, to study FD communications in multi-tier cellular networks. Particularly, we assess the FD communications effect on the network performance and quantify the associated gains

  2. Robust and Cost-Efficient Communication Based on SNMP in Mobile Networks

    Science.gov (United States)

    Ryu, Sang-Hoon; Baik, Doo-Kwon

    A main challenge in the design of this mobile network is the development of dynamic routing protocols that can efficiently find routes between two communicating nodes. Multimedia streaming services are receiving considerable interest in the mobile network business. An entire mobile network may change its point of attachment to the Internet. The mobile network is operated by a basic specification to support network mobility called Network Mobility (NEMO) Basic Support. However, NEMO basic Support mechanism has some problem in continuous communication. In this paper, we propose robust and cost-efficient algorithm. And we simulate proposed method and conclude some remarks.

  3. Virtual Stationary Automata for Mobile Networks

    National Research Council Canada - National Science Library

    Dolev, Shlomi; Gilbert, Seth; Lahiani, Limor; Lynch, Nancy; Nolte, Tina

    2005-01-01

    We define a programming abstraction for mobile networks called the Virtual Stationary Automata programming layer, consisting of real mobile clients, virtual timed I/O automata called virtual stationary automata (VSAs...

  4. Network Coding Applications and Implementations on Mobile Devices

    DEFF Research Database (Denmark)

    Fitzek, Frank; Pedersen, Morten Videbæk; Heide, Janus

    2010-01-01

    Network coding has attracted a lot of attention lately. The goal of this paper is to demonstrate that the implementation of network coding is feasible on mobile platforms. The paper will guide the reader through some examples and demonstrate uses for network coding. Furthermore the paper will also...... show that the implementation of network coding is feasible today on commercial mobile platforms....

  5. Using social media data to understand mobile customer experience and behavior

    OpenAIRE

    Hsu, Wenling; Jacobsen, Guy; Jin, Yu; Skudlark, Ann

    2011-01-01

    Understanding mobile customer experience and behavior is an important task for cellular service providers to improve the satisfaction of their customers. To that end, cellular service providers regularly measure the properties of their mobile network, such as signal strength, dropped calls, call blockage, and radio interface failures (RIFs). In addition to these passive measurements collected within the network, understanding customer sentiment from direct customer feedback is also an importa...

  6. Agent-Based Modeling of Mitochondria Links Sub-Cellular Dynamics to Cellular Homeostasis and Heterogeneity.

    Directory of Open Access Journals (Sweden)

    Giovanni Dalmasso

    Full Text Available Mitochondria are semi-autonomous organelles that supply energy for cellular biochemistry through oxidative phosphorylation. Within a cell, hundreds of mobile mitochondria undergo fusion and fission events to form a dynamic network. These morphological and mobility dynamics are essential for maintaining mitochondrial functional homeostasis, and alterations both impact and reflect cellular stress states. Mitochondrial homeostasis is further dependent on production (biogenesis and the removal of damaged mitochondria by selective autophagy (mitophagy. While mitochondrial function, dynamics, biogenesis and mitophagy are highly-integrated processes, it is not fully understood how systemic control in the cell is established to maintain homeostasis, or respond to bioenergetic demands. Here we used agent-based modeling (ABM to integrate molecular and imaging knowledge sets, and simulate population dynamics of mitochondria and their response to environmental energy demand. Using high-dimensional parameter searches we integrated experimentally-measured rates of mitochondrial biogenesis and mitophagy, and using sensitivity analysis we identified parameter influences on population homeostasis. By studying the dynamics of cellular subpopulations with distinct mitochondrial masses, our approach uncovered system properties of mitochondrial populations: (1 mitochondrial fusion and fission activities rapidly establish mitochondrial sub-population homeostasis, and total cellular levels of mitochondria alter fusion and fission activities and subpopulation distributions; (2 restricting the directionality of mitochondrial mobility does not alter morphology subpopulation distributions, but increases network transmission dynamics; and (3 maintaining mitochondrial mass homeostasis and responding to bioenergetic stress requires the integration of mitochondrial dynamics with the cellular bioenergetic state. Finally, (4 our model suggests sources of, and stress conditions

  7. Modeling and analysis of mobility management in mobile communication networks.

    Science.gov (United States)

    Baek, Woon Min; Yoon, Ji Hyun; Kim, Chesoong

    2014-01-01

    Many strategies have been proposed to reduce the mobility management cost in mobile communication networks. This paper studies the zone-based registration methods that have been adopted by most mobile communication networks. We focus on two special zone-based registration methods, called two-zone registration (2Z) and two-zone registration with implicit registration by outgoing calls (2Zi). We provide a new mathematical model to analyze the exact performance of 2Z and 2Zi. We also present various numerical results, to compare the performance of 2Zi with those of 2Z and one-zone registration (1Z), and show that 2Zi is superior to 2Z as well as 1Z in most cases.

  8. Energy management in wireless cellular and ad-hoc networks

    CERN Document Server

    Imran, Muhammad; Qaraqe, Khalid; Alouini, Mohamed-Slim; Vasilakos, Athanasios

    2016-01-01

    This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services. .

  9. Discrete dynamic modeling of cellular signaling networks.

    Science.gov (United States)

    Albert, Réka; Wang, Rui-Sheng

    2009-01-01

    Understanding signal transduction in cellular systems is a central issue in systems biology. Numerous experiments from different laboratories generate an abundance of individual components and causal interactions mediating environmental and developmental signals. However, for many signal transduction systems there is insufficient information on the overall structure and the molecular mechanisms involved in the signaling network. Moreover, lack of kinetic and temporal information makes it difficult to construct quantitative models of signal transduction pathways. Discrete dynamic modeling, combined with network analysis, provides an effective way to integrate fragmentary knowledge of regulatory interactions into a predictive mathematical model which is able to describe the time evolution of the system without the requirement for kinetic parameters. This chapter introduces the fundamental concepts of discrete dynamic modeling, particularly focusing on Boolean dynamic models. We describe this method step-by-step in the context of cellular signaling networks. Several variants of Boolean dynamic models including threshold Boolean networks and piecewise linear systems are also covered, followed by two examples of successful application of discrete dynamic modeling in cell biology.

  10. Optimized Energy Procurement for Cellular Networks with Uncertain Renewable Energy Generation

    KAUST Repository

    Rached, Nadhir B.; Ghazzai, Hakim; Kadri, Abdullah; Alouini, Mohamed-Slim

    2017-01-01

    Renewable energy (RE) is an emerging solution for reducing carbon dioxide (CO2) emissions from cellular networks. One of the challenges of using RE sources is to handle its inherent uncertainty. In this paper, a RE powered cellular network

  11. Reconfigurable Robust Routing for Mobile Outreach Network

    Science.gov (United States)

    Lin, Ching-Fang

    2010-01-01

    The Reconfigurable Robust Routing for Mobile Outreach Network (R3MOO N) provides advanced communications networking technologies suitable for the lunar surface environment and applications. The R3MOON techn ology is based on a detailed concept of operations tailored for luna r surface networks, and includes intelligent routing algorithms and wireless mesh network implementation on AGNC's Coremicro Robots. The product's features include an integrated communication solution inco rporating energy efficiency and disruption-tolerance in a mobile ad h oc network, and a real-time control module to provide researchers an d engineers a convenient tool for reconfiguration, investigation, an d management.

  12. Mobilization and Adaptation of a Rural Cradle-to-Career Network

    Directory of Open Access Journals (Sweden)

    Sarah J. Zuckerman

    2016-10-01

    Full Text Available This case study explored the development of a rural cradle-to-career network with a dual focus on the initial mobilization of network members and subsequent adaptations made to maintain mobilization, while meeting local needs. Data sources included interviews with network members, observations of meetings, and documentary evidence. Network-based social capital facilitated mobilization. Where networks were absent and where distrust and different values were evident, mobilization faltered. Three network adaptations were discovered: Special rural community organizing strategies, district-level action planning, and a theory of action focused on out-of-school factors. All three were attributable to the composition of mobilized stakeholders and this network’s rural social geography. These findings illuminate the importance of social geography in the development and advancement of rural cradle-to-career networks.

  13. Mobile location services over the next generation IP core network

    DEFF Research Database (Denmark)

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    network is changing from circuit-switched to packet-switched technology and evolving to an IP core network based on IPv6. The IP core network will allow all IP devices to be connected seamlessly. Due to the movement detection mechanism of Mobile IPv6, mobile terminals will periodically update....... The concept of mobile location services over the next generation IP networks is described. We also discuss the effectiveness of the short-range wireless network regarding a mobile user's position inside buildings and hotspot areas....

  14. Location Assisted Handover Optimization for Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2011-01-01

    Mobile users typically experience better connectivity if their mobile device performs handover to an available WiFi network rather than using a cellular network. For a moving user the window of opportunity is limited and the timing of the handover is therefore crucial. In this work we propose two...... of these algorithms for a mobile user in an urban scenario with ubiquitous cellular coverage and 250 WiFi APs/km2, and compared the results to a hysteresis-based greedy algorithm and the case of ”always cellular-connected”. Our results show that the proposed look-ahead algorithms outperform the hysteresis...

  15. Autonomous distributed self-organization for mobile wireless sensor networks.

    Science.gov (United States)

    Wen, Chih-Yu; Tang, Hung-Kai

    2009-01-01

    This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.

  16. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network

    OpenAIRE

    Bush, Stephen F.

    1999-01-01

    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dyna...

  17. Error performance analysis in downlink cellular networks with interference management

    KAUST Repository

    Afify, Laila H.

    2015-05-01

    Modeling aggregate network interference in cellular networks has recently gained immense attention both in academia and industry. While stochastic geometry based models have succeeded to account for the cellular network geometry, they mostly abstract many important wireless communication system aspects (e.g., modulation techniques, signal recovery techniques). Recently, a novel stochastic geometry model, based on the Equivalent-in-Distribution (EiD) approach, succeeded to capture the aforementioned communication system aspects and extend the analysis to averaged error performance, however, on the expense of increasing the modeling complexity. Inspired by the EiD approach, the analysis developed in [1] takes into consideration the key system parameters, while providing a simple tractable analysis. In this paper, we extend this framework to study the effect of different interference management techniques in downlink cellular network. The accuracy of the proposed analysis is verified via Monte Carlo simulations.

  18. A Mobile Sensor Network System for Monitoring of Unfriendly Environments.

    Science.gov (United States)

    Song, Guangming; Zhou, Yaoxin; Ding, Fei; Song, Aiguo

    2008-11-14

    Observing microclimate changes is one of the most popular applications of wireless sensor networks. However, some target environments are often too dangerous or inaccessible to humans or large robots and there are many challenges for deploying and maintaining wireless sensor networks in those unfriendly environments. This paper presents a mobile sensor network system for solving this problem. The system architecture, the mobile node design, the basic behaviors and advanced network capabilities have been investigated respectively. A wheel-based robotic node architecture is proposed here that can add controlled mobility to wireless sensor networks. A testbed including some prototype nodes has also been created for validating the basic functions of the proposed mobile sensor network system. Motion performance tests have been done to get the positioning errors and power consumption model of the mobile nodes. Results of the autonomous deployment experiment show that the mobile nodes can be distributed evenly into the previously unknown environments. It provides powerful support for network deployment and maintenance and can ensure that the sensor network will work properly in unfriendly environments.

  19. Assessment of General Public Exposure to LTE signals compared to other Cellular Networks Present in Thessaloniki, Greece.

    Science.gov (United States)

    Gkonis, Fotios; Boursianis, Achilles; Samaras, Theodoros

    2017-07-01

    To assess general public exposure to electromagnetic fields from Long Term Evolution (LTE) base stations, measurements at 10 sites in Thessaloniki, Greece were performed. Results are compared with other mobile cellular networks currently in use. All exposure values satisfy the guidelines for general public exposure of the International Commission on Non-Ionizing Radiation Protection (ICNIRP), as well as the reference levels by the Greek legislation at all sites. LTE electric field measurements were recorded up to 0.645 V/m. By applying the ICNIRP guidelines, the exposure ratio for all LTE signals is between 2.9 × 10-5 and 2.8 × 10-2. From the measurements results it is concluded that the average and maximum power density contribution of LTE downlink signals to the overall cellular networks signals are 7.8% and 36.7%, respectively. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  20. Spectral and Energy Efficiencies in mmWave Cellular Networks for Optimal Utilization

    Directory of Open Access Journals (Sweden)

    Abdulbaset M. Hamed

    2018-01-01

    Full Text Available Millimeter wave (mmWave spectrum has been proposed for use in commercial cellular networks to relieve the already severely congested microwave spectrum. Thus, the design of an efficient mmWave cellular network has gained considerable importance and has to take into account regulations imposed by government agencies with regard to global warming and sustainable development. In this paper, a dense mmWave hexagonal cellular network with each cell consisting of a number of smaller cells with their own Base Stations (BSs is presented as a solution to meet the increasing demand for a variety of high data rate services and growing number of users of cellular networks. Since spectrum and power are critical resources in the design of such a network, a framework is presented that addresses efficient utilization of these resources in mmWave cellular networks in the 28 and 73 GHz bands. These bands are already an integral part of well-known standards such as IEEE 802.15.3c, IEEE 802.11ad, and IEEE 802.16.1. In the analysis, a well-known accurate mmWave channel model for Line of Sight (LOS and Non-Line of Sight (NLOS links is used. The cellular network is analyzed in terms of spectral efficiency, bit/s, energy efficiency, bit/J, area spectral efficiency, bit/s/m2, area energy efficiency, bit/J/m2, and network latency, s/bit. These efficiency metrics are illustrated, using Monte Carlo simulation, as a function of Signal-to-Noise Ratio (SNR, channel model parameters, user distance from BS, and BS transmission power. The efficiency metrics for optimum deployment of cellular networks in 28 and 73 GHz bands are identified. Results show that 73 GHz band achieves better spectrum efficiency and the 28 GHz band is superior in terms of energy efficiency. It is observed that while the latter band is expedient for indoor networks, the former band is appropriate for outdoor networks.

  1. Topology of the Erasmus student mobility network

    Science.gov (United States)

    Derzsi, A.; Derzsy, N.; Káptalan, E.; Néda, Z.

    2011-07-01

    The collaboration network generated by the Erasmus student mobilities in the year 2003 is analyzed and modeled. Nodes of this bipartite network are European universities and links are the Erasmus mobilities between these universities. This network is a complex directed and weighted graph. The non-directed and non-weighted projection of this network does not exhibit a scale-free nature, but proves to be a small-word type random network with a giant component. The connectivity data indicates an exponential degree distribution, a relatively high clustering coefficient and a small radius. It can be easily modeled by using a simple configuration model and arguing the exponential degree distribution. The weighted and directed version of the network can also be described by means of simple random network models.

  2. Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Yilei Wang

    2015-01-01

    Full Text Available With the rapid development of mobile devices and wireless technologies, mobile social networks become increasingly available. People can implement many applications on the basis of mobile social networks. Secure computation, like exchanging information and file sharing, is one of such applications. Fairness in secure computation, which means that either all parties implement the application or none of them does, is deemed as an impossible task in traditional secure computation without mobile social networks. Here we regard the applications in mobile social networks as specific functions and stress on the achievement of fairness on these functions within mobile social networks in the presence of two rational parties. Rational parties value their utilities when they participate in secure computation protocol in mobile social networks. Therefore, we introduce reputation derived from mobile social networks into the utility definition such that rational parties have incentives to implement the applications for a higher utility. To the best of our knowledge, the protocol is the first fair secure computation in mobile social networks. Furthermore, it finishes within constant rounds and allows both parties to know the terminal round.

  3. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  4. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  5. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  6. Autonomous Distributed Self-Organization for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chih-Yu Wen

    2009-11-01

    Full Text Available This paper presents an adaptive combined-metrics-based clustering scheme for mobile wireless sensor networks, which manages the mobile sensors by utilizing the hierarchical network structure and allocates network resources efficiently. A local criteria is used to help mobile sensors form a new cluster or join a current cluster. The messages transmitted during hierarchical clustering are applied to choose distributed gateways such that communication for adjacent clusters and distributed topology control can be achieved. In order to balance the load among clusters and govern the topology change, a cluster reformation scheme using localized criterions is implemented. The proposed scheme is simulated and analyzed to abstract the network behaviors in a number of settings. The experimental results show that the proposed algorithm provides efficient network topology management and achieves high scalability in mobile sensor networks.

  7. SON for LTE-WLAN access network selection : design and performance

    NARCIS (Netherlands)

    Willemen, P.; Laselva, D.; Wang, Y.; Kovács, I.; Djapic, R.; Moerman, I.

    2016-01-01

    Mobile network operators (MNOs) are deploying carrier-grade Wireless Local Area Network (WLAN) as an important complementary system to cellular networks. Access network selection (ANS) between cellular and WLAN is an essential component to improve network performance and user quality-of-service

  8. Software defined networking to improve mobility management performance

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Sperotto, Anna; Pras, Aiko; Sperotto, Anna; Doyen, Guillaume; Latré, Steven; Charalambides, Marinos; Stiller, Burkhard

    2014-01-01

    n mobile networks, efficient IP mobility management is a crucial issue for the mobile users changing their mobility anchor points during handover. In this regard several mobility management methods have been proposed. However, those are insufficient for the future mobile Internet in terms of

  9. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    DEFF Research Database (Denmark)

    Ngo, Trung Dung

    2012-01-01

    of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link...... optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm...

  10. Selfish cellular networks and the evolution of complex organisms.

    Science.gov (United States)

    Kourilsky, Philippe

    2012-03-01

    Human gametogenesis takes years and involves many cellular divisions, particularly in males. Consequently, gametogenesis provides the opportunity to acquire multiple de novo mutations. A significant portion of these is likely to impact the cellular networks linking genes, proteins, RNA and metabolites, which constitute the functional units of cells. A wealth of literature shows that these individual cellular networks are complex, robust and evolvable. To some extent, they are able to monitor their own performance, and display sufficient autonomy to be termed "selfish". Their robustness is linked to quality control mechanisms which are embedded in and act upon the individual networks, thereby providing a basis for selection during gametogenesis. These selective processes are equally likely to affect cellular functions that are not gamete-specific, and the evolution of the most complex organisms, including man, is therefore likely to occur via two pathways: essential housekeeping functions would be regulated and evolve during gametogenesis within the parents before being transmitted to their progeny, while classical selection would operate on other traits of the organisms that shape their fitness with respect to the environment. Copyright © 2012 Académie des sciences. Published by Elsevier SAS. All rights reserved.

  11. Design of Hybrid Mobile Communication Networks for Planetary Exploration

    Science.gov (United States)

    Alena, Richard L.; Ossenfort, John; Lee, Charles; Walker, Edward; Stone, Thom

    2004-01-01

    The Mobile Exploration System Project (MEX) at NASA Ames Research Center has been conducting studies into hybrid communication networks for future planetary missions. These networks consist of space-based communication assets connected to ground-based Internets and planetary surface-based mobile wireless networks. These hybrid mobile networks have been deployed in rugged field locations in the American desert and the Canadian arctic for support of science and simulation activities on at least six occasions. This work has been conducted over the past five years resulting in evolving architectural complexity, improved component characteristics and better analysis and test methods. A rich set of data and techniques have resulted from the development and field testing of the communication network during field expeditions such as the Haughton Mars Project and NASA Mobile Agents Project.

  12. Evaluation of constrained mobility for programmability in network management

    NARCIS (Netherlands)

    Bohoris, C.; Liotta, A.; Pavlou, G.; Ambler, A.P.; Calo, S.B.; Kar, G.

    2000-01-01

    In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobility and argue that constrained mobility offers a natural and easy approach to network management programmability. While

  13. Various cellular stress components change as the rat ages: An insight into the putative overall age-related cellular stress network.

    Science.gov (United States)

    Cueno, Marni E; Imai, Kenichi

    2018-02-01

    Cellular stress is mainly comprised of oxidative, nitrosative, and endoplasmic reticulum stresses and has long been correlated to the ageing process. Surprisingly, the age-related difference among the various components in each independent stress pathway and the possible significance of these components in relation to the overall cellular stress network remain to be clearly elucidated. In this study, we obtained blood from ageing rats upon reaching 20-, 40-, and 72-wk.-old. Subsequently, we measured representative cellular stress-linked biomolecules (H 2 O 2 , glutathione reductase, heme, NADPH, NADP, nitric oxide, GADD153) and cell signals [substance P (SP), free fatty acid, calcium, NF-κB] in either or both blood serum and cytosol. Subsequently, network analysis of the overall cellular stress network was performed. Our results show that there are changes affecting stress-linked biomolecules and cell signals as the rat ages. Additionally, based on our network analysis data, we postulate that NADPH, H 2 O 2 , GADD153, and SP are the key components and the interactions between these components are central to the overall age-related cellular stress network in the rat blood. Thus, we propose that the main pathway affecting the overall age-related cellular stress network in the rat blood would entail NADPH-related oxidative stress (involving H 2 O 2 ) triggering GADD153 activation leading to SP induction which in-turn affects other cell signals. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  15. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  16. Path searching in switching networks using cellular algorithm

    Energy Technology Data Exchange (ETDEWEB)

    Koczy, L T; Langer, J; Legendi, T

    1981-01-01

    After a survey of the important statements in the paper A Mathematical Model of Path Searching in General Type Switching Networks (see IBID., vol.25, no.1, p.31-43, 1981) the authors consider the possible implementation for cellular automata of the algorithm introduced there. The cellular field used consists of 5 neighbour 8 state cells. Running times required by a traditional serial processor and by the cellular field, respectively, are compared. By parallel processing this running time can be reduced. 5 references.

  17. Traffic Steering Framework for Mobile-Assisted Resource Management in Heterogeneous Networks

    DEFF Research Database (Denmark)

    Dogadaev, Anton Konstantinovich; Checko, Aleksandra; Popovska Avramova, Andrijana

    2013-01-01

    With the expected growth of mobile data traffic it is essential to manage the network resources efficiently. In order to undertake this challenge, we propose a framework for network-centric, mobile-assisted resource management, which facilitates traffic offloading from mobile network to Wi-Fi...... to the network backbone. What is more, we give an overview of existing standardization activities on offloading the mobile traffic through Wi-Fi....

  18. Service Level Agreement for the QoS Guaranteed Mobile IPTV Services over Mobile WiMAX Networks

    OpenAIRE

    Chowdhury, Mostafa Zaman; Trung, Bui Minh; Jang, Yeong Min; Kim, Young-Il; Ryu, Won

    2011-01-01

    While mobile IPTV services are supported through the mobile WiMAX networks, there must need some guaranteed bandwidth for the IPTV services especially if IPTV and non-IPTV services are simultaneously supported by the mobile WiMAX networks. The quality of an IPTV service definitely depends on the allocated bandwidth for that channel. However, due to the high quality IPTV services and to support of huge non-IPTV traffic over mobile WiMAX networks, it is not possible to guarantee the sufficient ...

  19. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  20. Mobile-ip Aeronautical Network Simulation Study

    Science.gov (United States)

    Ivancic, William D.; Tran, Diepchi T.

    2001-01-01

    NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.

  1. Cellular network entropy as the energy potential in Waddington's differentiation landscape

    Science.gov (United States)

    Banerji, Christopher R. S.; Miranda-Saavedra, Diego; Severini, Simone; Widschwendter, Martin; Enver, Tariq; Zhou, Joseph X.; Teschendorff, Andrew E.

    2013-01-01

    Differentiation is a key cellular process in normal tissue development that is significantly altered in cancer. Although molecular signatures characterising pluripotency and multipotency exist, there is, as yet, no single quantitative mark of a cellular sample's position in the global differentiation hierarchy. Here we adopt a systems view and consider the sample's network entropy, a measure of signaling pathway promiscuity, computable from a sample's genome-wide expression profile. We demonstrate that network entropy provides a quantitative, in-silico, readout of the average undifferentiated state of the profiled cells, recapitulating the known hierarchy of pluripotent, multipotent and differentiated cell types. Network entropy further exhibits dynamic changes in time course differentiation data, and in line with a sample's differentiation stage. In disease, network entropy predicts a higher level of cellular plasticity in cancer stem cell populations compared to ordinary cancer cells. Importantly, network entropy also allows identification of key differentiation pathways. Our results are consistent with the view that pluripotency is a statistical property defined at the cellular population level, correlating with intra-sample heterogeneity, and driven by the degree of signaling promiscuity in cells. In summary, network entropy provides a quantitative measure of a cell's undifferentiated state, defining its elevation in Waddington's landscape. PMID:24154593

  2. User cooperation, virality and gaming in a social mobile network

    DEFF Research Database (Denmark)

    Varga, C; Blazovics, L; Charaf, H

    2012-01-01

    Social networks and mobile systems are both rapidly developing areas nowadays. In this chapter, we will introduce Gedda-Headz, a novel social mobile gaming concept that brings these two areas together. Gedda-Headz is a social mobile network that mainly focuses on multiplayer mobile gaming. First we...

  3. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  4. Low Computational Complexity Network Coding For Mobile Networks

    DEFF Research Database (Denmark)

    Heide, Janus

    2012-01-01

    Network Coding (NC) is a technique that can provide benefits in many types of networks, some examples from wireless networks are: In relay networks, either the physical or the data link layer, to reduce the number of transmissions. In reliable multicast, to reduce the amount of signaling and enable......-flow coding technique. One of the key challenges of this technique is its inherent computational complexity which can lead to high computational load and energy consumption in particular on the mobile platforms that are the target platform in this work. To increase the coding throughput several...

  5. Mobile satellite business networks: A part of the European mobile system

    Science.gov (United States)

    deMateo, M. L.; Jongejans, A.; Loisy, C.; VanHimbeeck, C.; Marchal, J. P.; Borella, A.; Sartori, M.

    1995-01-01

    The European Space Agency (ESA) is presently procuring an L-band payload EMS, to be embarked on the ITALSAT-2 satellite due for launch in early 1996, in order to promote a regional European mobile system. One of the Land Mobile Communication systems supported by EMS is the MSBN (Mobile Satellite Business Network) voice and data system which will offer the services of a business network on a seamless European coverage. This paper will first recall the characteristics of the MSBN system, which is based on quasi-synchronized CDMA (Code Division Multiple Access) techniques in both directions, and then describe the CDMA receivers implementation. Main validation test results will also be reported confirming predicted performances.

  6. Community Core Evolution in Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Hao Xu

    2013-01-01

    Full Text Available Community detection in social networks attracts a lot of attention in the recent years. Existing methods always depict the relationship of two nodes using the temporary connection. However, these temporary connections cannot be fully recognized as the real relationships when the history connections among nodes are considered. For example, a casual visit in Facebook cannot be seen as an establishment of friendship. Hence, our question is the following: how to cluster the real friends in mobile social networks? In this paper, we study the problem of detecting the stable community core in mobile social networks. The cumulative stable contact is proposed to depict the relationship among nodes. The whole process is divided into timestamps. Nodes and their connections can be added or removed at each timestamp, and historical contacts are considered when detecting the community core. Also, community cores can be tracked through the incremental computing, which can help to recognize the evolving of community structure. Empirical studies on real-world social networks demonstrate that our proposed method can effectively detect stable community cores in mobile social networks.

  7. Community core evolution in mobile social networks.

    Science.gov (United States)

    Xu, Hao; Xiao, Weidong; Tang, Daquan; Tang, Jiuyang; Wang, Zhenwen

    2013-01-01

    Community detection in social networks attracts a lot of attention in the recent years. Existing methods always depict the relationship of two nodes using the temporary connection. However, these temporary connections cannot be fully recognized as the real relationships when the history connections among nodes are considered. For example, a casual visit in Facebook cannot be seen as an establishment of friendship. Hence, our question is the following: how to cluster the real friends in mobile social networks? In this paper, we study the problem of detecting the stable community core in mobile social networks. The cumulative stable contact is proposed to depict the relationship among nodes. The whole process is divided into timestamps. Nodes and their connections can be added or removed at each timestamp, and historical contacts are considered when detecting the community core. Also, community cores can be tracked through the incremental computing, which can help to recognize the evolving of community structure. Empirical studies on real-world social networks demonstrate that our proposed method can effectively detect stable community cores in mobile social networks.

  8. Mobility-aware Hybrid Synchronization for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2015-01-01

    Random mobility of node causes the frequent changes in the network dynamics causing the increased cost in terms of energy and bandwidth. It needs the additional efforts to synchronize the activities of nodes during data collection and transmission in Wireless Sensor Networks (WSNs). A key challenge...... in maintaining the effective data collection and transmission is to schedule and synchronize the activities of the nodes with the global clock. This paper proposes the Mobility-aware Hybrid Synchronization Algorithm (MHS) which works on the formation of cluster based on spanning tree mechanism (SPT). Nodes used...... for formation of the network have random mobility and heterogeneous in terms of energy with static sink. The nodes in the cluster and cluster heads in the network are synchronized with the notion of global time scale. In the initial stage, the algorithm establishes the hierarchical structure of the network...

  9. Data-Driven Handover Optimization in Next Generation Mobile Communication Networks

    Directory of Open Access Journals (Sweden)

    Po-Chiang Lin

    2016-01-01

    Full Text Available Network densification is regarded as one of the important ingredients to increase capacity for next generation mobile communication networks. However, it also leads to mobility problems since users are more likely to hand over to another cell in dense or even ultradense mobile communication networks. Therefore, supporting seamless and robust connectivity through such networks becomes a very important issue. In this paper, we investigate handover (HO optimization in next generation mobile communication networks. We propose a data-driven handover optimization (DHO approach, which aims to mitigate mobility problems including too-late HO, too-early HO, HO to wrong cell, ping-pong HO, and unnecessary HO. The key performance indicator (KPI is defined as the weighted average of the ratios of these mobility problems. The DHO approach collects data from the mobile communication measurement results and provides a model to estimate the relationship between the KPI and features from the collected dataset. Based on the model, the handover parameters, including the handover margin and time-to-trigger, are optimized to minimize the KPI. Simulation results show that the proposed DHO approach could effectively mitigate mobility problems.

  10. Knowledge Creation Through Mobile Social Networks and Its Impact on Intentions to Use Innovative Mobile Services

    NARCIS (Netherlands)

    Kleijnen, M.H.P.; Lievens, A.; de Ruyter, K.; Wetzels, M.G.M.

    2009-01-01

    Taking a social network perspective, the authors investigate consumers' intentions to use innovative mobile services. With a sociometric survey, they empirically assess how consumers integrate and connect through mobile social networks, as well as how their network position influences knowledge

  11. Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    Recently, context awareness in Intermittently Connected Mobile Networks (ICMNs) has gained popularity in order to discover social similarities among mobile entities. Nevertheless, most of the contextual methods depend on network knowledge obtained with unrealistic scenarios. Mobile entities should

  12. Principles of mobile computing and communications

    CERN Document Server

    Othman, Mazliza

    2007-01-01

    Introduction Mobile Computing Applications Evolution of Wireless Networks and Services Summary Cellular Network Architecture UMTS Architecture Public Land Mobile Network Interfaces User Authentication Frequency Reuse Channel Assignment Location Registration and Update Handover Procedures CDMA The Move toward 3G Networks Wireless Local Area Networks IEEE 802.11 Standard IEEE 802.11b Standard (Wi-Fi) IEEE 802.11a Standard IEEE 802.11g Standard HIPERLAN/2 IEEE 802.1x Standard IEEE 802.11i Standard IEEE 802.11e Standard Security Issues IP over 802.11 WLAN Integrating 802.11 WLAN and UMTS Summary Wireless Personal Area Networks HomeRF Bluetooth Technology IEEE 802.15.3 Standard Home Area Networks Summary Wireless Sensor Networks Applications of WSNs Requirements for WSNs WSN Architecture The 802.15.4 Standard The ZigBee Protocol Power Conservation Techniques Network and Communications Configuration of Sensor Networks WSN and Emergency Response Applications Summary Mobile Ad Hoc Networks AODV DSR OLSR TBRPF Summary...

  13. Resource allocation for phantom cellular networks: Energy efficiency vs spectral efficiency

    KAUST Repository

    Abdelhady, Amr Mohamed Abdelaziz; Amin, Osama; Alouini, Mohamed-Slim

    2016-01-01

    Multi-tier heterogeneous networks have become an essential constituent for next generation cellular networks. Mean-while, energy efficiency (EE) has been considered a critical design criterion along with the traditional spectral efficiency (SE) metric. In this context, we study power and spectrum allocation for the recently proposed two-tier network architecture known as phantom cellular networks. The optimization framework includes both EE and SE, where we propose an algorithm that finds the SE and EE resource allocation strategies for phantom cellular networks. Then, we compare the performance of both design strategies versus the number of users, and phantom cells share of the total number of available resource blocks. We aim to investigate the effect of some system parameters to achieve improved SE performance at a non-significant loss in EE performance, or vice versa. It was found that increasing phantom cells share of resource blocks decreases the SE performance loss due to EE optimization when compared with the optimized SE performance. © 2016 IEEE.

  14. Resource allocation for phantom cellular networks: Energy efficiency vs spectral efficiency

    KAUST Repository

    Abdelhady, Amr M.

    2016-07-26

    Multi-tier heterogeneous networks have become an essential constituent for next generation cellular networks. Mean-while, energy efficiency (EE) has been considered a critical design criterion along with the traditional spectral efficiency (SE) metric. In this context, we study power and spectrum allocation for the recently proposed two-tier network architecture known as phantom cellular networks. The optimization framework includes both EE and SE, where we propose an algorithm that finds the SE and EE resource allocation strategies for phantom cellular networks. Then, we compare the performance of both design strategies versus the number of users, and phantom cells share of the total number of available resource blocks. We aim to investigate the effect of some system parameters to achieve improved SE performance at a non-significant loss in EE performance, or vice versa. It was found that increasing phantom cells share of resource blocks decreases the SE performance loss due to EE optimization when compared with the optimized SE performance. © 2016 IEEE.

  15. Rural medicine via mobile network

    International Nuclear Information System (INIS)

    Srivastava, Shikha; Bharade, Sandeep; Sinha, Vineet; Ananthakrishnan, T.S.; Jindal, G.D.; Prakash, C.

    2009-01-01

    Bhabha Atomic Research Centre (BARC) has developed a handheld Tele-ECG system for providing optimum cardiac care and a Mobile Network Based Telemedicine (MNBT) utility for providing telemedicine services to isolated rural population. The handheld Tele-ECG acquires, saves and transfers the electrocardiographic signal to the expert's mobile for his advice in dealing with cardiac emergencies. Similarly, MNBT utility transfers the medical images and relevant patient data from a PC based instrument to a mobile phone for further transmission to an expert for his advice. This paper summarizes these developments. (author)

  16. Real-time video streaming in mobile cloud over heterogeneous wireless networks

    Science.gov (United States)

    Abdallah-Saleh, Saleh; Wang, Qi; Grecos, Christos

    2012-06-01

    Recently, the concept of Mobile Cloud Computing (MCC) has been proposed to offload the resource requirements in computational capabilities, storage and security from mobile devices into the cloud. Internet video applications such as real-time streaming are expected to be ubiquitously deployed and supported over the cloud for mobile users, who typically encounter a range of wireless networks of diverse radio access technologies during their roaming. However, real-time video streaming for mobile cloud users across heterogeneous wireless networks presents multiple challenges. The network-layer quality of service (QoS) provision to support high-quality mobile video delivery in this demanding scenario remains an open research question, and this in turn affects the application-level visual quality and impedes mobile users' perceived quality of experience (QoE). In this paper, we devise a framework to support real-time video streaming in this new mobile video networking paradigm and evaluate the performance of the proposed framework empirically through a lab-based yet realistic testing platform. One particular issue we focus on is the effect of users' mobility on the QoS of video streaming over the cloud. We design and implement a hybrid platform comprising of a test-bed and an emulator, on which our concept of mobile cloud computing, video streaming and heterogeneous wireless networks are implemented and integrated to allow the testing of our framework. As representative heterogeneous wireless networks, the popular WLAN (Wi-Fi) and MAN (WiMAX) networks are incorporated in order to evaluate effects of handovers between these different radio access technologies. The H.264/AVC (Advanced Video Coding) standard is employed for real-time video streaming from a server to mobile users (client nodes) in the networks. Mobility support is introduced to enable continuous streaming experience for a mobile user across the heterogeneous wireless network. Real-time video stream packets

  17. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  18. The Network of International Student Mobility (Working Title)

    Energy Technology Data Exchange (ETDEWEB)

    Voegtle, E.; Windzio, M.

    2016-07-01

    In a previous paper (see Vögtle and Windzio 2016) we investigated the impact of membership in the Bologna Process on patterns and driving forces of cross-national student mobility. Student exchange flows were analysed for almost all Bologna Process member states and nonBologna OECD members over a ten-year period (from 2000 to 2009). We applied a Social Network Approach focusing on outbound diploma-mobility to identify positions of countries in the network of cross-national student exchange. Based on social network analyses, we first visualized the exchange patterns between sampled countries. In doing so, we analysed the student exchange linkages to gain descriptive insights into the development of the network (see Figure 1). Second, we used Exponential Random Graph Models (ERGM) to test which factors determine patterns of transnational student mobility. The results of this network analyses reveal that cross-national student exchange networks are stable over time. At the core of these networks are the United States, Great Britain, France, and Germany; they attract the highest shares of students from the remaining countries in our sample. Moreover, the results of the ERGM demonstrate that homophily between countries determines student exchange patterns. The most relevant ties exist between bordering countries. Moreover, membership in the Bologna Process impacts on mobility patterns, and the effect size increases over the periods investigated. (Author)

  19. Performance of WLAN RSS-based SON for LTE/WLAN access network selection

    NARCIS (Netherlands)

    Wang, Y.; Djapic, R.; Bergström, A.; Kovács, I.Z.; Laselva, D.; Spaey, K.; Sas, B.

    2014-01-01

    Mobile Network Operators (MNOs) are integrating carrier-grade Wireless Local Area Network (WLAN) to cellular networks to improve network performance and user experience. Access network selection (ANS) between cellular and WLAN plays a key role in the integration. Given the complexity of

  20. Adaptive Data Gathering in Mobile Sensor Networks Using Speedy Mobile Elements

    Science.gov (United States)

    Lai, Yongxuan; Xie, Jinshan; Lin, Ziyu; Wang, Tian; Liao, Minghong

    2015-01-01

    Data gathering is a key operator for applications in wireless sensor networks; yet it is also a challenging problem in mobile sensor networks when considering that all nodes are mobile and the communications among them are opportunistic. This paper proposes an efficient data gathering scheme called ADG that adopts speedy mobile elements as the mobile data collector and takes advantage of the movement patterns of the network. ADG first extracts the network meta-data at initial epochs, and calculates a set of proxy nodes based on the meta-data. Data gathering is then mapped into the Proxy node Time Slot Allocation (PTSA) problem that schedules the time slots and orders, according to which the data collector could gather the maximal amount of data within a limited period. Finally, the collector follows the schedule and picks up the sensed data from the proxy nodes through one hop of message transmissions. ADG learns the period when nodes are relatively stationary, so that the collector is able to pick up the data from them during the limited data gathering period. Moreover, proxy nodes and data gathering points could also be timely updated so that the collector could adapt to the change of node movements. Extensive experimental results show that the proposed scheme outperforms other data gathering schemes on the cost of message transmissions and the data gathering rate, especially under the constraint of limited data gathering period. PMID:26389903

  1. Adaptive Data Gathering in Mobile Sensor Networks Using Speedy Mobile Elements.

    Science.gov (United States)

    Lai, Yongxuan; Xie, Jinshan; Lin, Ziyu; Wang, Tian; Liao, Minghong

    2015-09-15

    Data gathering is a key operator for applications in wireless sensor networks; yet it is also a challenging problem in mobile sensor networks when considering that all nodes are mobile and the communications among them are opportunistic. This paper proposes an efficient data gathering scheme called ADG that adopts speedy mobile elements as the mobile data collector and takes advantage of the movement patterns of the network. ADG first extracts the network meta-data at initial epochs, and calculates a set of proxy nodes based on the meta-data. Data gathering is then mapped into the Proxy node Time Slot Allocation (PTSA) problem that schedules the time slots and orders, according to which the data collector could gather the maximal amount of data within a limited period. Finally, the collector follows the schedule and picks up the sensed data from the proxy nodes through one hop of message transmissions. ADG learns the period when nodes are relatively stationary, so that the collector is able to pick up the data from them during the limited data gathering period. Moreover, proxy nodes and data gathering points could also be timely updated so that the collector could adapt to the change of node movements. Extensive experimental results show that the proposed scheme outperforms other data gathering schemes on the cost of message transmissions and the data gathering rate, especially under the constraint of limited data gathering period.

  2. The Future of Africa is Mobile

    International Development Research Centre (IDRC) Digital Library (Canada)

    electricity — particularly if the PDAs had wireless connectivity. The Idea: Harness wireless technology. Local Global System for Mobile. Communications (GSM) cellular networks have become well-established in Uganda. In fact, national teledensity has increased by. 350% since the first network went live in early. 1995.

  3. REDISTRIBUTION OF BASE STATIONS LOAD IN MOBILE COMMUNICATION NETWORKS

    Directory of Open Access Journals (Sweden)

    Igor Ruban

    2017-09-01

    Full Text Available The subject matter of the article is the processes of load distribution in mobile communication networks. The object of research is the handover. The goal is to develop a method for redistributing the load between neighboring areas for mobile nodes. The considered base stations are supposed to have the signal-to-noise ratios that are equal or close. The methods that are used: methods of system analysis, methods of digital signal processing. The following results are obtained. The method that allows mobile nodes, whose signal-to-noise ratios are equal or close, to switch to a less loaded base station. This method allows the base station to launch the handover process enabling more even distribution of the load from mobile nodes among neighboring base stations in wireless and mobile networks. In the suggested modification of the method, the function assessing the bandwidth of the uplink channel is added to the base stations, as well a threshold value for using its bandwidth. Thus, when the current value of bandwidth reaches the threshold, the base station starts sending out a message to all mobile nodes and verifies free neighboring areas for switching over mobile nodes. If there are adjacent areas with a lower load, the base station notifies all potential candidates about the necessity of their switching over. The handover process is launched when the available bandwidth of the base station decreases below a certain threshold. Therefore, it is possible to optimize the operation of the WiMAX network with respect to the criterion of the total bandwidth capacity of the base stations. Besides, the results of the comparative analysis of the handover process in networks based on the WiMAX technology that are obtained using the OpNet simulation environment are presented. Conclusions.The suggested approach can be used to improve the basic software of mobile communication networks. When moving a node from one area to another one in access servers, the

  4. A performance based evaluation of SIP signalling across converged networks

    NARCIS (Netherlands)

    Oredope, A.; Liotta, A.

    2007-01-01

    As wireless networks evolves towards the 3G and 4G architectures the mobile core networks provides a platform for all-IP convergence of mobile and fixed networks allowing for better integration of the Internet and cellular networks, providing better quality of service, charging mechanisms and

  5. Modeling the propagation of mobile malware on complex networks

    Science.gov (United States)

    Liu, Wanping; Liu, Chao; Yang, Zheng; Liu, Xiaoyang; Zhang, Yihao; Wei, Zuxue

    2016-08-01

    In this paper, the spreading behavior of malware across mobile devices is addressed. By introducing complex networks to model mobile networks, which follows the power-law degree distribution, a novel epidemic model for mobile malware propagation is proposed. The spreading threshold that guarantees the dynamics of the model is calculated. Theoretically, the asymptotic stability of the malware-free equilibrium is confirmed when the threshold is below the unity, and the global stability is further proved under some sufficient conditions. The influences of different model parameters as well as the network topology on malware propagation are also analyzed. Our theoretical studies and numerical simulations show that networks with higher heterogeneity conduce to the diffusion of malware, and complex networks with lower power-law exponents benefit malware spreading.

  6. Look-Ahead Strategies Based on Store-Carry and Forward Relaying for Energy Efficient Cellular Communications

    Directory of Open Access Journals (Sweden)

    Panayiotis Kolios

    2010-11-01

    Full Text Available With the increasing availability of Internet type services on mobile devices and the attractive flat rate all-you-can-eat billing system, cellular telecommunication networks are experiencing a tremendous growth in data usage demand. However, there are increasing concerns that current network deployment trends (including more efficient radio access techniques and increased spectrum allocation strategies, will be unable to support the increased Internet traffic in a sustainable way. The delay tolerant nature of mobile Internet traffic allows for a large degree of flexibility in optimizing network performance to meet different design objectives and it’s a feature that has mostly gone unexplored by the research community. In this paper, we introduce a novel message forwarding mechanism in cellular networks that benefits from the inherent delay tolerance of Internet type services to provide flexible and adjustable forwarding strategies for efficient network operation while guaranteeing timely deliveries. By capitalizing on the elasticity of message delivery deadlines and the actual mobility of nodes inside the cell, considerable performance gains can be achieved by physically propagating information messages within the network.

  7. Capacity Enhancement of Uni‐directional In‐band Full‐Duplex Cellular Networks through Co‐channel Interference Cancellation

    Directory of Open Access Journals (Sweden)

    Hyungsik Ju

    2018-03-01

    Full Text Available As implementation of the in‐band full duplex (IFD transceiver becomes feasible, research interest is growing with respect to using IFD communication with cellular networks. However, the cellular network in which the IFD communication is applied inevitably suffers from an increase of the co‐channel interference (CCI due to IFD simultaneous transmission and reception. In this paper, we analyze the performance of a cellular network based on uni‐directional IFD (UD‐IFD communication, wherein an IFD base station simultaneously supports downlink and uplink transmissions of half‐duplex (HD users. In addition, a multi‐pair CCI cancellation (MP‐CCIC method combining CCIC and user pairing is proposed to improve the performance of the UD‐IFD network. Simulation results showed that, compared to a conventional HD cellular network without using CCIC, capacity gain was not obtained in the UD‐IFD cellular network. On the other hand, when applying the proposed MP‐CCIC, the capacity of the UD‐IFD cellular network greatly improved compared to that of an HD cellular network.

  8. PC Mobile Warrior with a built-in cellular phone; Keitai denwa naizogata PC 'Mobile warrior

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    A PC Mobile Warrior with a built-in cellular phone has been developed from PC Libretto through cooperation with the NTT DoCoMo. The new personal computer incorporates into itself some distinguished mobile PC features such as Wake On Radio and Wake On Ring which are defined by MCPC (Mobile Computing Promotion Consortium). Wake On Radio is a function that activates the PC upon entry into the zone from outside, and Wake On Ring is another function that does the same upon arrival of a phone call. Installed on these lower order functions are an application program for automatic transmission of stored e-mails making use of the former function and another for automatic reception of FAX messages making use of the latter function. (translated by NEDO)

  9. Dual-Level Game-Based Energy Efficiency and Fairness for Green Cellular Networks

    Directory of Open Access Journals (Sweden)

    Sungwook Kim

    2016-01-01

    Full Text Available In the recent decades, cellular networks have revolutionized the way of next generation communication networks. However, due to the global climate change, reducing the energy consumption of cellular infrastructures is an important and urgent problem. In this study, we propose a novel two-level cooperative game framework for improving the energy efficiency and fairness in cellular networks. For the energy efficiency, base stations (BSs constantly monitor the current traffic load and cooperate with each other to maximize the energy saving. For the energy fairness, renewable energy can be shared dynamically while ensuring the fairness among BSs. To achieve an excellent cellular network performance, the concepts of the Raiffa Bargaining Solution and Jain’s fairness are extended and practically applied to our dual-level cooperative game model. Through system level simulations, the proposed scheme is evaluated and compared with other existing schemes. The simulation results show that our two-level game approach outperforms the existing schemes in providing a better fair-efficient system performance.

  10. Advanced wireless mobile collaborative sensing network for tactical and strategic missions

    Science.gov (United States)

    Xu, Hao

    2017-05-01

    In this paper, an advanced wireless mobile collaborative sensing network will be developed. Through properly combining wireless sensor network, emerging mobile robots and multi-antenna sensing/communication techniques, we could demonstrate superiority of developed sensing network. To be concrete, heterogeneous mobile robots including unmanned aerial vehicle (UAV) and unmanned ground vehicle (UGV) are equipped with multi-model sensors and wireless transceiver antennas. Through real-time collaborative formation control, multiple mobile robots can team the best formation that can provide most accurate sensing results. Also, formatting multiple mobile robots can also construct a multiple-input multiple-output (MIMO) communication system that can provide a reliable and high performance communication network.

  11. Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

  12. Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability Analysis

    KAUST Repository

    Gharbieh, Mohammad

    2017-05-02

    The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, will play fundamental rule in delivering the first-mile access for the data tsunami to be generated by the IoT. However, cellular networks may have scalability problems to provide uplink connectivity to massive numbers of connected things. To characterize the scalability of cellular uplink in the context of IoT networks, this paper develops a traffic-aware spatiotemporal mathematical model for IoT devices supported by cellular uplink connectivity. The developed model is based on stochastic geometry and queueing theory to account for the traffic requirement per IoT device, the different transmission strategies, and the mutual interference between the IoT devices. To this end, the developed model is utilized to characterize the extent to which cellular networks can accommodate IoT traffic as well as to assess and compare three different transmission strategies that incorporate a combination of transmission persistency, backoff, and power-ramping. The analysis and the results clearly illustrate the scalability problem imposed by IoT on cellular network and offer insights into effective scenarios for each transmission strategy.

  13. Assessment of the energy efficiency enhancement of future mobile networks

    NARCIS (Netherlands)

    Litjens, R.; Toh, Y.; Zhang, H.; Blume, O.

    2014-01-01

    We assess the energy efficiency of mobile networks in 2020, and compare it with a 2010 baseline. A comprehensive assessment approach is taken, considering all relevant scenario aspects such as data traffic growth, hardware evolutions, mobile network deployments and operations including network

  14. Efficient Uplink Modeling for Dynamic System-Level Simulations of Cellular and Mobile Networks

    Directory of Open Access Journals (Sweden)

    Lobinger Andreas

    2010-01-01

    Full Text Available A novel theoretical framework for uplink simulations is proposed. It allows investigations which have to cover a very long (real- time and which at the same time require a certain level of accuracy in terms of radio resource management, quality of service, and mobility. This is of particular importance for simulations of self-organizing networks. For this purpose, conventional system level simulators are not suitable due to slow simulation speeds far beyond real-time. Simpler, snapshot-based tools are lacking the aforementioned accuracy. The runtime improvements are achieved by deriving abstract theoretical models for the MAC layer behavior. The focus in this work is long term evolution, and the most important uplink effects such as fluctuating interference, power control, power limitation, adaptive transmission bandwidth, and control channel limitations are considered. Limitations of the abstract models will be discussed as well. Exemplary results are given at the end to demonstrate the capability of the derived framework.

  15. Complex human mobility dynamics on a network

    International Nuclear Information System (INIS)

    Szell, M.

    2010-01-01

    Massive multiplayer online games provide a fascinating new way of observing hundreds of thousands of simultaneously interacting individuals engaged in virtual socio-economic activities. We have compiled a data set consisting of practically all actions of all players over a period of four years from an online game played by over 350,000 people. The universe of this online world is a lattice-like network on which players move in order to interact with other players. We focus on the mobility of human players on this network over a time-period of 500 days. We take a number of mobility measurements and compare them with measures of simulated random walkers on the same topology. Mobility of players is sub-diffusive - the mean squared displacement follows a power law with exponent 0.4 - and significantly deviates from mobility patterns of random walkers. Mean first passage times and transition counts relate via a power-law with slope -1/3. We compare our results with studies where human mobility was measured via mobile phone data and find striking similarities. (author)

  16. Image processing with a cellular nonlinear network

    International Nuclear Information System (INIS)

    Morfu, S.

    2005-01-01

    A cellular nonlinear network (CNN) based on uncoupled nonlinear oscillators is proposed for image processing purposes. It is shown theoretically and numerically that the contrast of an image loaded at the nodes of the CNN is strongly enhanced, even if this one is initially weak. An image inversion can be also obtained without reconfiguration of the network whereas a gray levels extraction can be performed with an additional threshold filtering. Lastly, an electronic implementation of this CNN is presented

  17. Fundamentals of 5G mobile networks

    CERN Document Server

    Rodriguez, Jonathan

    2015-01-01

    Fundamentals of 5G Mobile Networks provides an overview of the key features of the 5th Generation (5G) mobile networks,  discussing the motivation for 5G and the main challenges in developing this new technology. This book provides an insight into the key areas of research that will define this new system technology paving the path towards future research and development.  The book is multi-disciplinary in nature, and aims to cover a whole host of intertwined subjects that will predominantly influence the 5G landscape, including the future Internet, cloud computing, small cells and self-organ

  18. On Optimizing Radio Resource Usage in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Bogdan Ciobanu

    2011-01-01

    Full Text Available The control of the interference between mobile terminals and radio access points inside the network represented since always a challenge for all mobile telecommunications service providers. The present paper represents a study regarding the optimum utilization of radio resources in order to obtain a system with as high a capacity as possible for a certain available bandwidth.

  19. Evolution to 3G Mobile Communication - Second Generation ...

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 9. Evolution to 3G Mobile Communication - Second Generation Cellular Systems. R Ramachandran. General Article Volume 8 Issue 9 September 2003 pp 60-72 ... Keywords. Wireless communication; cellular networks; GSM; CdmaOne; TDMA ...

  20. Measurement campaign on connectivity of mesh networks formed by mobile devices

    DEFF Research Database (Denmark)

    Pietrarca, Beatrice; Sasso, Giovanni; Perrucci, Gian Paolo

    2007-01-01

    This paper reports the results of a measurement campaign on the connectivity level of mobile devices using Bluetooth (BT) to form cooperative mobile mesh networks. Such mobile mesh networks composed of mobile devices are the basis for any peer-to-peer communication like wireless grids or social...

  1. Mobility Management Algorithms for the Client-Driven Mobility Frame System–Mobility from a Brand New Point of View

    Directory of Open Access Journals (Sweden)

    Péter Fülöp

    2009-01-01

    Full Text Available In this paper a new mobility management is introduced. The main idea in this approach is that the mobil node should manage the mobility for itself not the network. The network nodes provide only basic services for mobile entities: connectivity and administration. We construct a framework called the Client-based Mobility Frame System (CMFS for this mobility environment. We developed the CMFS protocol as a solution over IPv4 and we show how to use Mobile IPv6 to realize our concept. We propose some basic mobility management solutions that can be implemented into the mobile clients and give details about a working simulation of a complete Mobility Management System. Example mobility management approaches such as the centralized- and hierarchical- or cellular-like ones are also defined and hints are given what kind of algorithms might be implemented upon the Client-based Mobility Frame System over IPv4 and IPv6 as well. We introduce some example algorithms that can work with the CMFS making mobility management efficient by minimizing signalling load on the network. In the present work modeling and detailed discussion on the parameters of the algorithms is given and comparison to existing mobility approaches and protocols is done. We prepared a simulation to test our protocol and to back up the proposals we provide the reader with simulation results. We stress that still one the most important benefit of our findings is that all the MNs can run different management strategies and can optimize mobility for themselves.

  2. Contention aware mobility prediction routing for intermittently connected mobile networks

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Shihada, Basem

    2013-01-01

    This paper introduces a novel multi-copy routing protocol, called predict and forward (PF), for delay tolerant networks, which aims to explore the possibility of using mobile nodes as message carriers for end-to-end delivery of the messages. With PF, the message forwarding decision is made by manipulating the probability distribution of future inter-contact and contact durations based on the network status, including wireless link condition and nodal buffer availability. In particular, PF is based on the observations that the node mobility behavior is semi-deterministic and could be predicted once there is sufficient mobility history information. We implemented the proposed protocol and compared it with a number of existing encounter-based routing approaches in terms of delivery delay, delivery ratio, and the number of transmissions required for message delivery. The simulation results show that PF outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.

  3. Contention aware mobility prediction routing for intermittently connected mobile networks

    KAUST Repository

    Elwhishi, Ahmed

    2013-04-26

    This paper introduces a novel multi-copy routing protocol, called predict and forward (PF), for delay tolerant networks, which aims to explore the possibility of using mobile nodes as message carriers for end-to-end delivery of the messages. With PF, the message forwarding decision is made by manipulating the probability distribution of future inter-contact and contact durations based on the network status, including wireless link condition and nodal buffer availability. In particular, PF is based on the observations that the node mobility behavior is semi-deterministic and could be predicted once there is sufficient mobility history information. We implemented the proposed protocol and compared it with a number of existing encounter-based routing approaches in terms of delivery delay, delivery ratio, and the number of transmissions required for message delivery. The simulation results show that PF outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.

  4. Collaborative multi-layer network coding for cellular cognitive radio networks

    KAUST Repository

    Sorour, Sameh

    2013-06-01

    In this paper, we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in underlay cellular cognitive radio networks. This scheme allows the collocated primary and cognitive radio base-stations to collaborate with each other, in order to minimize their own and each other\\'s packet recovery overheads, and thus improve their throughput, without any coordination between them. This non-coordinated collaboration is done using a novel multi-layer instantly decodable network coding scheme, which guarantees that each network\\'s help to the other network does not result in any degradation in its own performance. It also does not cause any violation to the primary networks interference thresholds in the same and adjacent cells. Yet, our proposed scheme both guarantees the reduction of the recovery overhead in collocated primary and cognitive radio networks, and allows early recovery of their packets compared to non-collaborative schemes. Simulation results show that a recovery overhead reduction of 15% and 40% can be achieved by our proposed scheme in the primary and cognitive radio networks, respectively, compared to the corresponding non-collaborative scheme. © 2013 IEEE.

  5. Definition of a parameter for a typical specific absorption rate under real boundary conditions of cellular phones in a GSM networkd

    Science.gov (United States)

    Gerhardt, D.

    2003-05-01

    Using cellular phones the specific absorption rate (SAR) as a physical value must observe established and internationally defined levels to guarantee human protection. To assess human protection it is necessary to guarantee safety under worst-case conditions (especially maximum transmitting power) using cellular phones. To evaluate the exposure to electromagnetic fields under normal terms of use of cellular phones the limitations of the specific absorption rate must be pointed out. In a mobile radio network normal terms of use of cellular phones, i.e. in interconnection with a fixed radio transmitter of a mobile radio network, power control of the cellular phone as well as the antenna diagram regarding a head phantom are also significant for the real exposure. Based on the specific absorption rate, the antenna diagram regarding a head phantom and taking into consideration the power control a new parameter, the typical absorption rate (SARtyp), is defined in this contribution. This parameter indicates the specific absorption rate under average normal conditions of use. Constant radio link attenuation between a cellular phone and a fixed radio transmitter for all mobile models tested was assumed in order to achieve constant field strength at the receiving antenna of the fixed radio transmitter as a result of power control. The typical specific absorption rate is a characteristic physical value of every mobile model. The typical absorption rate was calculated for 16 different mobile models and compared with the absorption rate at maximum transmitting power. The results confirm the relevance of the definition of this parameter (SARtyp) as opposed to the specific absorption rate as a competent and applicable method to establish the real mean exposure from a cellular phone in a mobile radio network. The typical absorption rate provides a parameter to assess electromagnetic fields of a cellular phone that is more relevant to the consumer.

  6. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  7. Cognitive resource management for heterogeneous cellular networks

    CERN Document Server

    Liu, Yongkang

    2014-01-01

    This Springer Brief focuses on cognitive resource management in heterogeneous cellular networks (Het Net) with small cell deployment for the LTE-Advanced system. It introduces the Het Net features, presents practical approaches using cognitive radio technology in accommodating small cell data relay and optimizing resource allocation and examines the effectiveness of resource management among small cells given limited coordination bandwidth and wireless channel uncertainty. The authors introduce different network characteristics of small cell, investigate the mesh of small cell access points in

  8. Radio Channel Modelling for UAV Communication over Cellular Networks

    DEFF Research Database (Denmark)

    Amorim, Rafhael Medeiros de; Nguyen, Huan Cong; Mogensen, Preben Elgaard

    2017-01-01

    The main goal of this paper is to obtain models for path loss exponents and shadowing for the radio channel between airborne Unmanned Aerial Vehicles (UAVs) and cellular networks. In this pursuit, field measurements were conducted in live LTE networks at the 800 MHz frequency band, using a commer...

  9. Optimal Design of Gravitational Sewer Networks with General Cellular Automata

    Directory of Open Access Journals (Sweden)

    Mohammad Hadi Afshar

    2014-05-01

    Full Text Available In this paper, a Cellular Automata method is applied for the optimal design of sewer networks. The solution of sewer network optimization problems requires the determination of pipe diameters and average pipe cover depths, minimizing the total cost of the sewer network subject to operational constraints. In this paper, the network nodes and upstream and downstream pipe cover depths are considered as CA cells and cell states, respectively, and the links around each cell are taken into account as neighborhood. The proposed method is a general and flexible method for the optimization of sewer networks as it can be used to optimally design both gravity and pumped network due to the use of pipe nodal cover depths as the decision variables. The proposed method is tested against two  gravitational sewer networks and the  comparison of results with other methods such as  Genetic algorithm, Cellular Automata, Ant Colony Optimization Algorithm and Particle Swarm Optimization show the efficiency and effectiveness of the proposed method.

  10. An Efficient Patch Dissemination Strategy for Mobile Networks

    OpenAIRE

    Zhao, Dawei; Peng, Haipeng; Li, Lixiang; Yang, Yixian; Li, Shudong

    2013-01-01

    Mobile phones and personal digital assistants are becoming increasingly important in our daily life since they enable us to access a large variety of ubiquitous services. Mobile networks, formed by the connection of mobile devices following some relationships among mobile users, provide good platforms for mobile virus spread. Quick and efficient security patch dissemination strategy is necessary for the update of antivirus software so that it can detect mobile virus, especially the new vir...

  11. Pinning synchronization of a mobile agent network

    International Nuclear Information System (INIS)

    Wang, Lei; Sun, You-xian

    2009-01-01

    We investigate the problem of controlling a group of mobile agents in a plane in order to move them towards a desired orbit via pinning control, in which each agent is associated with a chaotic oscillator coupled with those of neighboring agents, and the pinning strategy is to have the common linear feedback acting on a small fraction of agents by random selection. We explore the effects of the pinning probability, feedback gains and agent density in the pinning synchronization of a mobile agent network under a fast-switching constraint, and perform numerical simulations for validation. In particular, we show that there exists a critical pinning density for network synchronization with an unbounded region: above the threshold, the dynamical network can be controlled by pinning; below it, anarchy prevails. And for the network with a single bounded synchronization region, pinning control has little effect as regards enhancing network synchronizability

  12. Disease Containment Strategies based on Mobility and Information Dissemination.

    Science.gov (United States)

    Lima, A; De Domenico, M; Pejovic, V; Musolesi, M

    2015-06-02

    Human mobility and social structure are at the basis of disease spreading. Disease containment strategies are usually devised from coarse-grained assumptions about human mobility. Cellular networks data, however, provides finer-grained information, not only about how people move, but also about how they communicate. In this paper we analyze the behavior of a large number of individuals in Ivory Coast using cellular network data. We model mobility and communication between individuals by means of an interconnected multiplex structure where each node represents the population in a geographic area (i.e., a sous-préfecture, a third-level administrative region). We present a model that describes how diseases circulate around the country as people move between regions. We extend the model with a concurrent process of relevant information spreading. This process corresponds to people disseminating disease prevention information, e.g., hygiene practices, vaccination campaign notices and other, within their social network. Thus, this process interferes with the epidemic. We then evaluate how restricting the mobility or using preventive information spreading process affects the epidemic. We find that restricting mobility does not delay the occurrence of an endemic state and that an information campaign might be an effective countermeasure.

  13. Studi kepuasan pelanggan terhadap kualitas layanan pitalebar pada jaringan bergerak seluler [The study of subscriber satisfaction on quality of broadband service on cellular mobile network

    Directory of Open Access Journals (Sweden)

    Kasmad Ariansyah

    2016-12-01

    Full Text Available Teknologi telekomunikasi seluler terus berevolusi. Dimulai dari teknologi seluler generasi pertama (1G yang berbasis teknologi analog, kini kita dapat menikmat layanan pitalebar nirkabel berbasis teknologi seluler generasi keempat (4G. Studi ini dilakukan untuk mengukur kepuasan pelanggan terhadap kualitas layanan pitalebar pada jaringan bergerak (mobile baik kualitas layanan yang bersifat teknis maupun non-teknis, dengan cara menyebarkan kuesioner kepada pelanggan 3G dan 4G di 12 lokasi survei. Analisis dilakukan dengan menggunakan indeks kepuasan konsumen dan analisis kepentingan dan kinerja. Hasil analisis menunjukkan bahwa pada umumnya pelanggan puas dengan kualitas layanan data yang diberikan oleh pihak penyedia layanan. Namun demikian, masih diperlukan perbaikan-perbaikan mengingat indeks kepuasan konsumen lebih mendekati batas bawah dari kategori puas tersebut. Berdasarkan hasil analisis kepentingan dan kinerja terhadap diketahui bahwa pada skala 5(lima, rata-rata tingkat kepentingan dan kinerja untuk semua parameter kualitas layanan berturut-turut sebesar 4,04 dan 3,43. Terdapat dua parameter masuk kuadran tingkatkan kinerja,  empat parameter berada di kuadran pertahankan kinerja, dua parameter  memiliki kinerja yang dianggap berlebihan dan sisanya yaitu dua parameter masuk dalam kategori prioritas rendah. Penyedia layanan harus memprioritaskan perbaikan pada parameter-parameter yang masuk dalam kategori tingkatkan kinerja, yaitu kehandalan jaringan dan kecepatan perbaikan jaringan ketika jaringan mengalami gangguan.*****Mobile telecommunications technology continues to evolve. Starting from the first-generation mobile technology (1G, we are now able to enjoy wireless broadband service based on fourth-generation cellular technology (4G. This study was conducted to measure customer satisfaction against quality of service (QoS parameters of broadband on mobile networks, including technical QoS as well as non-technical QoS. Data

  14. Physical-Layer Design for Next-Generation Cellular Wireless Systems

    NARCIS (Netherlands)

    Foschini, Gerard J.; Huang, Howard C.; Mullender, Sape J.; Venkatesan, Sivarama; Viswanathan, Harish

    The conventional cellular architecture will remain an integral part of nextgeneration wireless systems, providing high-speed packet data services directly to mobile users and also backhaul service for local area networks. In this paper, we present several proposals addressing the challenges

  15. Adaptive algorithm for mobile user positioning based on environment estimation

    Directory of Open Access Journals (Sweden)

    Grujović Darko

    2014-01-01

    Full Text Available This paper analyzes the challenges to realize an infrastructure independent and a low-cost positioning method in cellular networks based on RSS (Received Signal Strength parameter, auxiliary timing parameter and environment estimation. The proposed algorithm has been evaluated using field measurements collected from GSM (Global System for Mobile Communications network, but it is technology independent and can be applied in UMTS (Universal Mobile Telecommunication Systems and LTE (Long-Term Evolution networks, also.

  16. Software agent constrained mobility for network performance monitoring

    NARCIS (Netherlands)

    Bohoris, C.; Liotta, A.; Pavlou, G.

    2000-01-01

    During the recent years of research on mobile agents, significant effort has been directed towards the identification of models of agent mobility suitable for network management applications. Also, a lot of research work is currently being carried out trying to provide an assessment of mobile agent

  17. Energy-Efficient Resource Allocation for Phantom Cellular Networks with Imperfect CSI

    KAUST Repository

    Abdelhady, Amr Mohamed Abdelaziz

    2017-03-28

    Multi-tier heterogeneous networks have become an essential constituent for next generation cellular networks. Meanwhile, energy efficiency (EE) has been considered a critical design criterion along with the traditional spectral efficiency (SE) metric. In this context, we study power and spectrum allocation for a two-tier phantom cellular network, The optimization framework includes both EE and SE. We consider densely deployed phantom cellular networks and model the EE optimization problem taking into consideration the inevitable interference in this setup and imperfect channel estimation impairments. To this end, we propose three resource allocation strategies aiming at optimizing this network EE performance metric. Furthermore, we investigate the effect of changing some system parameters on the performance of these strategies, such as phantom cells resource units share, number of deployed phantom cells within a macro cell , number of pilots, and the phantom cells transmission power budget. It is found that increasing the number of pilots will deteriorate the EE performance of the whole setup, while increasing phantom cells transmission power budget will not affect the EE of the whole setup significantly. In addition, we observed that it is always useful to allocate most of the network resource units to the phantom cells tier.

  18. Energy-Efficient Resource Allocation for Phantom Cellular Networks with Imperfect CSI

    KAUST Repository

    Abdelhady, Amr Mohamed Abdelaziz; Amin, Osama; Alouini, Mohamed-Slim

    2017-01-01

    Multi-tier heterogeneous networks have become an essential constituent for next generation cellular networks. Meanwhile, energy efficiency (EE) has been considered a critical design criterion along with the traditional spectral efficiency (SE) metric. In this context, we study power and spectrum allocation for a two-tier phantom cellular network, The optimization framework includes both EE and SE. We consider densely deployed phantom cellular networks and model the EE optimization problem taking into consideration the inevitable interference in this setup and imperfect channel estimation impairments. To this end, we propose three resource allocation strategies aiming at optimizing this network EE performance metric. Furthermore, we investigate the effect of changing some system parameters on the performance of these strategies, such as phantom cells resource units share, number of deployed phantom cells within a macro cell , number of pilots, and the phantom cells transmission power budget. It is found that increasing the number of pilots will deteriorate the EE performance of the whole setup, while increasing phantom cells transmission power budget will not affect the EE of the whole setup significantly. In addition, we observed that it is always useful to allocate most of the network resource units to the phantom cells tier.

  19. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    In the simulation of mobile ad-hoc networks (MANETs), the probability distribution governing the movement of nodes typically varies over time and converges to a steady state distribution, known as the stationary distribution. This paper presents and evaluates the stationary distribution for location, speed and pause time of a ...

  20. Energy Efficient Resource Allocation for Phantom Cellular Networks

    KAUST Repository

    Abdelhady, Amr

    2016-04-01

    Multi-tier heterogeneous networks have become an essential constituent for next generation cellular networks. Meanwhile, energy efficiency (EE) has been considered a critical design criterion along with the traditional spectral efficiency (SE) metric. In this context, we study power and spectrum allocation for the recently proposed two-tier network architecture known as phantom cellular networks. The optimization framework includes both EE and SE. First, we consider sparsely deployed cells experiencing negligible interference and assume perfect channel state information (CSI). For this setting, we propose an algorithm that finds the SE and EE resource allocation strategies. Then, we compare the performance of both design strategies versus number of users, and phantom cells share of the total available resource units (RUs). We aim to investigate the effect of some system parameters to achieve improved SE performance at a non-significant loss in EE performance, or vice versa. It is found that increasing phantom cells share of RUs decreases the SE performance loss due to EE optimization when compared with the optimized SE performance. Second, we consider the densely deployed phantom cellular networks and model the EE optimization problem having into consideration the inevitable interference and imperfect channel estimation. To this end, we propose three resource allocation strategies aiming at optimizing the EE performance metric of this network. Furthermore, we investigate the effect of changing some of the system parameters on the performance of the proposed strategies, such as phantom cells share of RUs, number of deployed phantom cells within a macro cell coverage, number of pilots and the maximum power available for transmission by the phantom cells BSs. It is found that increasing the number of pilots deteriorates the EE performance of the whole setup, while increasing maximum power available for phantom cells transmissions reduces the EE of the whole setup in a

  1. A Mobile Application Prototype using Network Coding

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank

    2010-01-01

    This paper looks into implementation details of network coding for a mobile application running on commercial mobile phones. We describe the necessary coding operations and algorithms that implements them. The coding algorithms forms the basis for a implementation in C++ and Symbian C++. We report...

  2. Physical-layer Network Coding in Two-Way Heterogeneous Cellular Networks with Power Imbalance

    OpenAIRE

    Thampi, Ajay K; Liew, Soung Chang; Armour, Simon M D; Fan, Zhong; You, Lizhao; Kaleshi, Dritan

    2016-01-01

    The growing demand for high-speed data, quality of service (QoS) assurance and energy efficiency has triggered the evolution of 4G LTE-A networks to 5G and beyond. Interference is still a major performance bottleneck. This paper studies the application of physical-layer network coding (PNC), a technique that exploits interference, in heterogeneous cellular networks. In particular, we propose a rate-maximising relay selection algorithm for a single cell with multiple relays assuming the decode...

  3. Network reliability assessment using a cellular automata approach

    International Nuclear Information System (INIS)

    Rocco S, Claudio M.; Moreno, Jose Ali

    2002-01-01

    Two cellular automata (CA) models that evaluate the s-t connectedness and shortest path in a network are presented. CA based algorithms enhance the performance of classical algorithms, since they allow a more reliable and straightforward parallel implementation resulting in a dynamic network evaluation, where changes in the connectivity and/or link costs can readily be incorporated avoiding recalculation from scratch. The paper also demonstrates how these algorithms can be applied for network reliability evaluation (based on Monte-Carlo approach) and for finding s-t path with maximal reliability

  4. Multimedia information processing in the SWAN mobile networked computing system

    Science.gov (United States)

    Agrawal, Prathima; Hyden, Eoin; Krzyzanowsji, Paul; Srivastava, Mani B.; Trotter, John

    1996-03-01

    Anytime anywhere wireless access to databases, such as medical and inventory records, can simplify workflow management in a business, and reduce or even eliminate the cost of moving paper documents. Moreover, continual progress in wireless access technology promises to provide per-user bandwidths of the order of a few Mbps, at least in indoor environments. When combined with the emerging high-speed integrated service wired networks, it enables ubiquitous and tetherless access to and processing of multimedia information by mobile users. To leverage on this synergy an indoor wireless network based on room-sized cells and multimedia mobile end-points is being developed at AT&T Bell Laboratories. This research network, called SWAN (Seamless Wireless ATM Networking), allows users carrying multimedia end-points such as PDAs, laptops, and portable multimedia terminals, to seamlessly roam while accessing multimedia data streams from the wired backbone network. A distinguishing feature of the SWAN network is its use of end-to-end ATM connectivity as opposed to the connectionless mobile-IP connectivity used by present day wireless data LANs. This choice allows the wireless resource in a cell to be intelligently allocated amongst various ATM virtual circuits according to their quality of service requirements. But an efficient implementation of ATM in a wireless environment requires a proper mobile network architecture. In particular, the wireless link and medium-access layers need to be cognizant of the ATM traffic, while the ATM layers need to be cognizant of the mobility enabled by the wireless layers. This paper presents an overview of SWAN's network architecture, briefly discusses the issues in making ATM mobile and wireless, and describes initial multimedia applications for SWAN.

  5. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network

    Science.gov (United States)

    Bush, Stephen F.

    1999-05-01

    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dynamic and continuous process. Factors such as load, distance, capacity and topology are all constantly changing in a mobile environment. The VNC algorithm anticipates configuration changes and speeds the reconfiguration process by pre-computing and caching results. VNC propagates local prediction results throughout the VNC enhanced system. The Global Positioning System is an enabling technology for the use of VNC in mobile networks because it provides location information and accurate time for each node. This research has resulted in well defined structures for the encapsulation of physical processes within Logical Processes and a generic library for enhancing a system with VNC. Enhancing an existing system with VNC is straight forward assuming the existing physical processes do not have side effects. The benefit of prediction is gained at the cost of additional traffic and processing. This research includes an analysis of VNC and suggestions for optimization of the VNC algorithm and its parameters.

  6. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  7. fraud detection in mobile communications networks using user

    African Journals Online (AJOL)

    DEPT OF AGRICULTURAL ENGINEERING

    testing the methods with data from real mobile communications networks. Keywords: Call .... System. Monitoring. Database. Database. Fig. 3: Mobile communication detection tools ..... receiver operating characteristic curve (ROC). ROC is a ...

  8. Utilization of Concurrent Buffers to Facilitate Seamless Data Transition in Tactical Cellular Communications

    Science.gov (United States)

    2015-09-01

    INTENTIONALLY LEFT BLANK xiii LIST OF ACRONYMS AND ABBREVIATIONS 2G 2nd Generation 3G 3rd Generation 3GPP 3rd Generation Partnership Project 4G 4th...System (UMTS) is the standard that governs 3rd Generation ( 3G ) migration of Global Services for Mobile (GSM) networks. It defines packet-based...network may assist or mitigate. 14. SUBJECT TERMS IEEE, 802.21, Media Independent Handover, mobile , communications, cyber, tactical, buffer, cellular

  9. Participatory sensing as an enabler for self-organisation in future cellular networks

    International Nuclear Information System (INIS)

    Imran, Muhammad Ali; Onireti, Oluwakayode; Imran, Ali

    2013-01-01

    In this short review paper we summarise the emerging challenges in the field of participatory sensing for the self-organisation of the next generation of wireless cellular networks. We identify the potential of participatory sensing in enabling the self-organisation, deployment optimisation and radio resource management of wireless cellular networks. We also highlight how this approach can meet the future goals for the next generation of cellular system in terms of infrastructure sharing, management of multiple radio access techniques, flexible usage of spectrum and efficient management of very small data cells

  10. A Mobile Satellite Experiment (MSAT-X) network definition

    Science.gov (United States)

    Wang, Charles C.; Yan, Tsun-Yee

    1990-01-01

    The network architecture development of the Mobile Satellite Experiment (MSAT-X) project for the past few years is described. The results and findings of the network research activities carried out under the MSAT-X project are summarized. A framework is presented upon which the Mobile Satellite Systems (MSSs) operator can design a commercial network. A sample network configuration and its capability are also included under the projected scenario. The Communication Interconnection aspect of the MSAT-X network is discussed. In the MSAT-X network structure two basic protocols are presented: the channel access protocol, and the link connection protocol. The error-control techniques used in the MSAT-X project and the packet structure are also discussed. A description of two testbeds developed for experimentally simulating the channel access protocol and link control protocol, respectively, is presented. A sample network configuration and some future network activities of the MSAT-X project are also presented.

  11. Dynamic Pathloss Model for Future Mobile Communication Networks

    DEFF Research Database (Denmark)

    Kumar, Ambuj; Mihovska, Albena Dimitrova; Prasad, Ramjee

    2016-01-01

    that are essentially static. Therefore, once the signal level drops beyond the predicted values due to any variance in the environmental conditions, very crowded areas may not be catered well enough by the deployed network that had been designed with the static path loss model. This paper proposes an approach......— Future mobile communication networks (MCNs) are expected to be more intelligent and proactive based on new capabilities that increase agility and performance. However, for any successful mobile network service, the dexterity in network deployment is a key factor. The efficiency of the network...... planning depends on how congruent the chosen path loss model and real propagation are. Various path loss models have been developed that predict the signal propagation in various morphological and climatic environments; however they consider only those physical parameters of the network environment...

  12. Dynamic spectrum management in green cognitive radio cellular networks

    KAUST Repository

    Sboui, Lokman

    2018-02-15

    In this paper, we propose a new cellular network operation scheme fulfilling the 5G requirements related to spectrum management and green communications. We focus on cognitive radio cellular networks in which both the primary network (PN) and the secondary network (SN) are maximizing their operational profits. The PN and the SN are required to respect a CO emissions threshold by switching off one or more lightly loaded base stations (BSs). In addition, the PN accepts to cooperate with the SN by leasing its spectrum in the cells where the PN is turned off. In return, the corresponding SN BSs host the PN users and impose extra roaming fees to the PN. We propose a low-complexity algorithm that maximizes the profit per CO emissions metric while switching on/off the BSs. In the simulations, we show that our proposed algorithm achieves performances close to the exhaustive search method. In addition, we find that the roaming price is a key parameter that affects both PN and SN profits.

  13. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    Results are reported for basic research in mobile wireless communication networks for tactical applications including investigations of new methods for error-control coding and decoding, modulation...

  14. On the interference suppression capabilities of cognitive enabled femto cellular networks

    KAUST Repository

    Shakir, Muhammad; Atat, Rachad; Alouini, Mohamed-Slim

    2012-01-01

    Cognitive Radios are considered as a standard part of future Heterogeneous mobile network architecture. In this paper, we consider a two tier Heterogeneous network with multiple radio access technologies (RATS) namely; (i) the secondary network

  15. Hybrid Mobile Communication Networks for Planetary Exploration

    Science.gov (United States)

    Alena, Richard; Lee, Charles; Walker, Edward; Osenfort, John; Stone, Thom

    2007-01-01

    A paper discusses the continuing work of the Mobile Exploration System Project, which has been performing studies toward the design of hybrid communication networks for future exploratory missions to remote planets. A typical network could include stationary radio transceivers on a remote planet, mobile radio transceivers carried by humans and robots on the planet, terrestrial units connected via the Internet to an interplanetary communication system, and radio relay transceivers aboard spacecraft in orbit about the planet. Prior studies have included tests on prototypes of these networks deployed in Arctic and desert regions chosen to approximate environmental conditions on Mars. Starting from the findings of the prior studies, the paper discusses methods of analysis, design, and testing of the hybrid communication networks. It identifies key radio-frequency (RF) and network engineering issues. Notable among these issues is the study of wireless LAN throughput loss due to repeater use, RF signal strength, and network latency variations. Another major issue is that of using RF-link analysis to ensure adequate link margin in the face of statistical variations in signal strengths.

  16. Unified Stochastic Geometry Model for MIMO Cellular Networks with Retransmissions

    KAUST Repository

    Afify, Laila H.

    2016-10-11

    This paper presents a unified mathematical paradigm, based on stochastic geometry, for downlink cellular networks with multiple-input-multiple-output (MIMO) base stations (BSs). The developed paradigm accounts for signal retransmission upon decoding errors, in which the temporal correlation among the signal-to-interference-plus-noise-ratio (SINR) of the original and retransmitted signals is captured. In addition to modeling the effect of retransmission on the network performance, the developed mathematical model presents twofold analysis unification for MIMO cellular networks literature. First, it integrates the tangible decoding error probability and the abstracted (i.e., modulation scheme and receiver type agnostic) outage probability analysis, which are largely disjoint in the literature. Second, it unifies the analysis for different MIMO configurations. The unified MIMO analysis is achieved by abstracting unnecessary information conveyed within the interfering signals by Gaussian signaling approximation along with an equivalent SISO representation for the per-data stream SINR in MIMO cellular networks. We show that the proposed unification simplifies the analysis without sacrificing the model accuracy. To this end, we discuss the diversity-multiplexing tradeoff imposed by different MIMO schemes and shed light on the diversity loss due to the temporal correlation among the SINRs of the original and retransmitted signals. Finally, several design insights are highlighted.

  17. Unified Stochastic Geometry Model for MIMO Cellular Networks with Retransmissions

    KAUST Repository

    Afify, Laila H.; Elsawy, Hesham; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2016-01-01

    This paper presents a unified mathematical paradigm, based on stochastic geometry, for downlink cellular networks with multiple-input-multiple-output (MIMO) base stations (BSs). The developed paradigm accounts for signal retransmission upon decoding errors, in which the temporal correlation among the signal-to-interference-plus-noise-ratio (SINR) of the original and retransmitted signals is captured. In addition to modeling the effect of retransmission on the network performance, the developed mathematical model presents twofold analysis unification for MIMO cellular networks literature. First, it integrates the tangible decoding error probability and the abstracted (i.e., modulation scheme and receiver type agnostic) outage probability analysis, which are largely disjoint in the literature. Second, it unifies the analysis for different MIMO configurations. The unified MIMO analysis is achieved by abstracting unnecessary information conveyed within the interfering signals by Gaussian signaling approximation along with an equivalent SISO representation for the per-data stream SINR in MIMO cellular networks. We show that the proposed unification simplifies the analysis without sacrificing the model accuracy. To this end, we discuss the diversity-multiplexing tradeoff imposed by different MIMO schemes and shed light on the diversity loss due to the temporal correlation among the SINRs of the original and retransmitted signals. Finally, several design insights are highlighted.

  18. Network-Assisted Distributed Fairness-Aware Interference Coordination for Device-to-Device Communication Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Francis Boabang

    2017-01-01

    Full Text Available Device-to-device (D2D communication underlaid cellular network is considered a key integration feature in future cellular network. However, without properly designed interference management, the interference from D2D transmission tends to degrade the performance of cellular users and D2D pairs. In this work, we proposed a network-assisted distributed interference mitigation scheme to address this issue. Specifically, the base station (BS acts as a control agent that coordinates the cross-tier interference from D2D transmission through a taxation scheme. The cotier interference is controlled by noncooperative game amongst D2D pairs. In general, the outcome of noncooperative game is inefficient due to the selfishness of each player. In our game formulation, reference user who is the victim of cotier interference is factored into the payoff function of each player to obtain fair and efficient outcome. The existence, uniqueness of the Nash Equilibrium (NE, and the convergence of the proposed algorithm are characterized using Variational Inequality theory. Finally, we provide simulation results to evaluate the efficiency of the proposed algorithm.

  19. Bluetooth telemedicine processor for multichannel biomedical signal transmission via mobile cellular networks.

    Science.gov (United States)

    Rasid, Mohd Fadlee A; Woodward, Bryan

    2005-03-01

    One of the emerging issues in m-Health is how best to exploit the mobile communications technologies that are now almost globally available. The challenge is to produce a system to transmit a patient's biomedical signals directly to a hospital for monitoring or diagnosis, using an unmodified mobile telephone. The paper focuses on the design of a processor, which samples signals from sensors on the patient. It then transmits digital data over a Bluetooth link to a mobile telephone that uses the General Packet Radio Service. The modular design adopted is intended to provide a "future-proofed" system, whose functionality may be upgraded by modifying the software.

  20. Analysis and Testing of Mobile Wireless Networks

    Science.gov (United States)

    Alena, Richard; Evenson, Darin; Rundquist, Victor; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Wireless networks are being used to connect mobile computing elements in more applications as the technology matures. There are now many products (such as 802.11 and 802.11b) which ran in the ISM frequency band and comply with wireless network standards. They are being used increasingly to link mobile Intranet into Wired networks. Standard methods of analyzing and testing their performance and compatibility are needed to determine the limits of the technology. This paper presents analytical and experimental methods of determining network throughput, range and coverage, and interference sources. Both radio frequency (BE) domain and network domain analysis have been applied to determine wireless network throughput and range in the outdoor environment- Comparison of field test data taken under optimal conditions, with performance predicted from RF analysis, yielded quantitative results applicable to future designs. Layering multiple wireless network- sooners can increase performance. Wireless network components can be set to different radio frequency-hopping sequences or spreading functions, allowing more than one sooner to coexist. Therefore, we ran multiple 802.11-compliant systems concurrently in the same geographical area to determine interference effects and scalability, The results can be used to design of more robust networks which have multiple layers of wireless data communication paths and provide increased throughput overall.

  1. QoE-Driven D2D Media Services Distribution Scheme in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Mingkai Chen

    2017-01-01

    Full Text Available Device-to-device (D2D communication has been widely studied to improve network performance and considered as a potential technological component for the next generation communication. Considering the diverse users’ demand, Quality of Experience (QoE is recognized as a new degree of user’s satisfaction for media service transmissions in the wireless communication. Furthermore, we aim at promoting user’s Mean of Score (MOS value to quantify and analyze user’s QoE in the dynamic cellular networks. In this paper, we explore the heterogeneous media service distribution in D2D communications underlaying cellular networks to improve the total users’ QoE. We propose a novel media service scheme based on different QoE models that jointly solve the massive media content dissemination issue for cellular networks. Moreover, we also investigate the so-called Media Service Adaptive Update Scheme (MSAUS framework to maximize users’ QoE satisfaction and we derive the popularity and priority function of different media service QoE expression. Then, we further design Media Service Resource Allocation (MSRA algorithm to schedule limited cellular networks resource, which is based on the popularity function to optimize the total users’ QoE satisfaction and avoid D2D interference. In addition, numerical simulation results indicate that the proposed scheme is more effective in cellular network content delivery, which makes it suitable for various media service propagation.

  2. Cellular neural networks for the stereo matching problem

    International Nuclear Information System (INIS)

    Taraglio, S.; Zanela, A.

    1997-03-01

    The applicability of the Cellular Neural Network (CNN) paradigm to the problem of recovering information on the tridimensional structure of the environment is investigated. The approach proposed is the stereo matching of video images. The starting point of this work is the Zhou-Chellappa neural network implementation for the same problem. The CNN based system we present here yields the same results as the previous approach, but without the many existing drawbacks

  3. Envisioning Networked Urban Mobilities : Art, Performances, Impacts

    NARCIS (Netherlands)

    Kjaerulf, Aslak Aamot; Kesselring, Sven; Peters, Peter; Hannam, Kevin

    2017-01-01

    Envisioning Networked Urban Mobilities brings together scientific reflections on the relations of art and urban mobilities and artistic research on the topic. The editors open the book by setting out the concept grounded in the exhibition curated by Aslak Aamot Kjærulff and refers to earlier work on

  4. Context-Aware Community Construction in Proximity-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Na Yu

    2015-01-01

    Full Text Available Sensor-equipped mobile devices have allowed users to participate in various social networking services. We focus on proximity-based mobile social networking environments where users can share information obtained from different places via their mobile devices when they are in proximity. Since people are more likely to share information if they can benefit from the sharing or if they think the information is of interest to others, there might exist community structures where users who share information more often are grouped together. Communities in proximity-based mobile networks represent social groups where connections are built when people are in proximity. We consider information influence (i.e., specify who shares information with whom as the connection and the space and time related to the shared information as the contexts. To model the potential information influences, we construct an influence graph by integrating the space and time contexts into the proximity-based contacts of mobile users. Further, we propose a two-phase strategy to detect and track context-aware communities based on the influence graph and show how the context-aware community structure improves the performance of two types of mobile social applications.

  5. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    OpenAIRE

    Santosh Kumar S C Sharma Bhupendra Suman

    2011-01-01

    A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices) to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories-...

  6. Modeling the Propagation of Mobile Phone Virus under Complex Network

    Science.gov (United States)

    Yang, Wei; Wei, Xi-liang; Guo, Hao; An, Gang; Guo, Lei

    2014-01-01

    Mobile phone virus is a rogue program written to propagate from one phone to another, which can take control of a mobile device by exploiting its vulnerabilities. In this paper the propagation model of mobile phone virus is tackled to understand how particular factors can affect its propagation and design effective containment strategies to suppress mobile phone virus. Two different propagation models of mobile phone viruses under the complex network are proposed in this paper. One is intended to describe the propagation of user-tricking virus, and the other is to describe the propagation of the vulnerability-exploiting virus. Based on the traditional epidemic models, the characteristics of mobile phone viruses and the network topology structure are incorporated into our models. A detailed analysis is conducted to analyze the propagation models. Through analysis, the stable infection-free equilibrium point and the stability condition are derived. Finally, considering the network topology, the numerical and simulation experiments are carried out. Results indicate that both models are correct and suitable for describing the spread of two different mobile phone viruses, respectively. PMID:25133209

  7. Networked Mobilities and Performative Urban Environments

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    , an increasing number of such mobile practices are mediated by technologies of tangible and less tangible sorts. Thus by focusing on the complex relationship between material and virtual technologies within the sphere of mobility it is shown that we need to move beyond dichotomies of; global or local, nomad...... or sedentary, digital or material. The paper investigates the meaning of mobility and the potential in mediation and technologies to enhance the experiences and interaction in relation to urban transit spaces. In understanding the importance of mediation, global-local interactions, networks....... By studying embedded technologies and ‘ambient environments' we increase our knowledge about the over layering of the material environment with digital technologies. The presences of GPS, mediated surfaces, mobile agents (robots), RFID and other technologies that all relate to contemporary mobility practices...

  8. Improving Network Performance with Affinity based Mobility Model in Opportunistic Network

    OpenAIRE

    Suvadip Batabyal; Parama Bhaumik

    2012-01-01

    Opportunistic network is a type of Delay Tolerant Network which is characterized by intermittent connectivity amongst the nodes and communication largely depends upon the mobility of the participating nodes. The network being highly dynamic, traditional MANET protocols cannot be applied and the nodes must adhere to store-carry-forward mechanism. Nodes do not have the information about the network topology, number of participating nodes and the location of the destination node. Hence, message ...

  9. Collaborative Multi-Layer Network Coding in Hybrid Cellular Cognitive Radio Networks

    KAUST Repository

    Moubayed, Abdallah J.

    2015-05-01

    In this paper, as an extension to [1], we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in hybrid (interweave and underlay) cellular cognitive radio networks. This scheme allows the uncoordinated collaboration between the collocated primary and cognitive radio base-stations in order to minimize their own as well as each other\\'s packet recovery overheads, thus by improving their throughput. The proposed scheme ensures that each network\\'s performance is not degraded by its help to the other network. Moreover, it guarantees that the primary network\\'s interference threshold is not violated in the same and adjacent cells. Yet, the scheme allows the reduction of the recovery overhead in the collocated primary and cognitive radio networks. The reduction in the cognitive radio network is further amplified due to the perfect detection of spectrum holes which allows the cognitive radio base station to transmit at higher power without fear of violating the interference threshold of the primary network. For the secondary network, simulation results show reductions of 20% and 34% in the packet recovery overhead, compared to the non-collaborative scheme, for low and high probabilities of primary packet arrivals, respectively. For the primary network, this reduction was found to be 12%. © 2015 IEEE.

  10. Sunrise deploys mobile network for CERN

    CERN Multimedia

    2004-01-01

    Sunrise, the alternative telecoms provider in Switzerland, is finalizing the installation of a mobile network comprising about forty sites located around the new particle accelerator at CERN (1 paragraph)

  11. Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications

    Directory of Open Access Journals (Sweden)

    Yong Deng

    2016-01-01

    Full Text Available The explosive use of smart devices enabled the emergence of collective resource sharing among mobile individuals. Mobile users need to cooperate with each other to improve the whole network’s quality of service. By modeling the cooperative behaviors in a mobile crowd into an evolutionary Prisoner’s dilemma game, we investigate the relationships between cooperation rate and some main influence factors, including crowd density, communication range, temptation to defect, and mobility attributes. Using evolutionary game theory, our analysis on the cooperative behaviors of mobile takes a deep insight into the cooperation promotion in a dynamical network with selfish autonomous users. The experiment results show that mobile user’s features, including speed, moving probability, and reaction radius, have an obvious influence on the formation of a cooperative mobile social network. We also found some optimal status when the crowd’s cooperation rate reaches the best. These findings are important if we want to establish a mobile social network with a good performance.

  12. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  13. Detection of silent cells, synchronization and modulatory activity in developing cellular networks.

    Science.gov (United States)

    Hjorth, Johannes J J; Dawitz, Julia; Kroon, Tim; Pires, Johny; Dassen, Valerie J; Berkhout, Janna A; Emperador Melero, Javier; Nadadhur, Aish G; Alevra, Mihai; Toonen, Ruud F; Heine, Vivi M; Mansvelder, Huibert D; Meredith, Rhiannon M

    2016-04-01

    Developing networks in the immature nervous system and in cellular cultures are characterized by waves of synchronous activity in restricted clusters of cells. Synchronized activity in immature networks is proposed to regulate many different developmental processes, from neuron growth and cell migration, to the refinement of synapses, topographic maps, and the mature composition of ion channels. These emergent activity patterns are not present in all cells simultaneously within the network and more immature "silent" cells, potentially correlated with the presence of silent synapses, are prominent in different networks during early developmental periods. Many current network analyses for detection of synchronous cellular activity utilize activity-based pixel correlations to identify cellular-based regions of interest (ROIs) and coincident cell activity. However, using activity-based correlations, these methods first underestimate or ignore the inactive silent cells within the developing network and second, are difficult to apply within cell-dense regions commonly found in developing brain networks. In addition, previous methods may ignore ROIs within a network that shows transient activity patterns comprising both inactive and active periods. We developed analysis software to semi-automatically detect cells within developing neuronal networks that were imaged using calcium-sensitive reporter dyes. Using an iterative threshold, modulation of activity was tracked within individual cells across the network. The distribution pattern of both inactive and active, including synchronous cells, could be determined based on distance measures to neighboring cells and according to different anatomical layers. © 2015 Wiley Periodicals, Inc.

  14. Mobile network architecture of the long-range WindScanner system

    OpenAIRE

    Vasiljevic, Nikola; Lea, Guillaume; Hansen, Per; Jensen, Henrik M.

    2016-01-01

    In this report we have presented the network architecture of the long-range WindScanner system that allows utilization of mobile network connections without the use of static public IP addresses. The architecture mitigates the issues of additional fees and contractual obligations that are linked to the acquisition of the mobile network connections with static public IP addresses. The architecture consists of a hardware VPN solution based on the network appliances Z1 and MX60 from Cisco Meraki...

  15. Optimized Energy Procurement for Cellular Networks with Uncertain Renewable Energy Generation

    KAUST Repository

    Rached, Nadhir B.

    2017-02-07

    Renewable energy (RE) is an emerging solution for reducing carbon dioxide (CO2) emissions from cellular networks. One of the challenges of using RE sources is to handle its inherent uncertainty. In this paper, a RE powered cellular network is investigated. For a one-day operation cycle, the cellular network aims to reduce energy procurement costs from the smart grid by optimizing the amounts of energy procured from their locally deployed RE sources as well as from the smart grid. In addition to that, it aims to determine the extra amount of energy to be sold to the electrical grid at each time period. Chance constrained optimization is first proposed to deal with the randomness in the RE generation. Then, to make the optimization problem tractable, two well- know convex approximation methods, namely; Chernoff and Chebyshev based-approaches, are analyzed in details. Numerical results investigate the optimized energy procurement for various daily scenarios and compare between the performances of the employed convex approximation approaches.

  16. On Optimal Geographical Caching in Heterogeneous Cellular Networks

    NARCIS (Netherlands)

    Serbetci, Berksan; Goseling, Jasper

    2017-01-01

    In this work we investigate optimal geographical caching in heterogeneous cellular networks where different types of base stations (BSs) have different cache capacities. Users request files from a content library according to a known probability distribution. The performance metric is the total hit

  17. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  18. Decentralized coverage control problems for mobile robotic sensor and actuator networks

    CERN Document Server

    Savkin, A; Xi, Z; Javed, F; Matveev, A; Nguyen, H

    2015-01-01

    This book introduces various coverage control problems for mobile sensor networks including barrier, sweep and blanket. Unlike many existing algorithms, all of the robotic sensor and actuator motion algorithms developed in the book are fully decentralized or distributed, computationally efficient, easily implementable in engineering practice and based only on information on the closest neighbours of each mobile sensor and actuator and local information about the environment. Moreover, the mobile robotic sensors have no prior information about the environment in which they operation. These various types of coverage problems have never been covered before by a single book in a systematic way. Another topic of this book is the study of mobile robotic sensor and actuator networks. Many modern engineering applications include the use of sensor and actuator networks to provide efficient and effective monitoring and control of industrial and environmental processes. Such mobile sensor and actuator networks are abl...

  19. RoCoMAR: Robots' Controllable Mobility Aided Routing and Relay Architecture for Mobile Sensor Networks

    Science.gov (United States)

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2013-01-01

    In a practical deployment, mobile sensor network (MSN) suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots' Controllable Mobility Aided Routing) that uses robotic nodes' controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay. PMID:23881134

  20. RoCoMAR: Robots’ Controllable Mobility Aided Routing and Relay Architecture for Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Seokhoon Yoon

    2013-07-01

    Full Text Available In a practical deployment, mobile sensor network (MSN suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots’ Controllable Mobility Aided Routing that uses robotic nodes’ controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay.

  1. Hierarchical Trust Management of COI in Heterogeneous Mobile Networks

    Science.gov (United States)

    2017-08-01

    Report: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks The views, opinions and/or findings contained in this report are those of...Institute & State University Title: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks Report Term: 0-Other Email: irchen@vt.edu...Reconfigurability, Survivability and Intrusion Tolerance for Community of Interest (COI) Applications – Our proposed COI trust management protocol will

  2. [Cellular adhesion signal transduction network of tumor necrosis factor-alpha induced hepatocellular carcinoma cells].

    Science.gov (United States)

    Zheng, Yongchang; Du, Shunda; Xu, Haifeng; Xu, Yiyao; Zhao, Haitao; Chi, Tianyi; Lu, Xin; Sang, Xinting; Mao, Yilei

    2014-11-18

    To systemically explore the cellular adhesion signal transduction network of tumor necrosis factor-alpha (TNF-α)-induced hepatocellular carcinoma cells with bioinformatics tools. Published microarray dataset of TNF-α-induced HepG2, human transcription factor database HTRI and human protein-protein interaction database HPRD were used to construct and analyze the signal transduction network. In the signal transduction network, MYC and SP1 were the key nodes of signaling transduction. Several genes from the network were closely related with cellular adhesion.Epidermal growth factor receptor (EGFR) is a possible key gene of effectively regulating cellular adhesion during the induction of TNF-α. EGFR is a possible key gene for TNF-α-induced metastasis of hepatocellular carcinoma.

  3. Meeting fronthaul challenges of future mobile network deployments — The HARP approach

    DEFF Research Database (Denmark)

    Dittmann, Lars; Christiansen, Henrik Lehrmann; Checko, Aleksandra

    2014-01-01

    In future mobile networks aggregation at different levels is necessary but at the same time imposes challenges that mandate looking into new architectures. This paper presents the design consideration approach for a C-RAN based mobile aggregation network used in the EU HARP project....... With this architecture fronthaul aggregation is performed which might be an option for future generation of mobile networks....

  4. Virtual Private Networks for mobile environments. Development of protocol for mobile security and algorithms for location update.

    OpenAIRE

    Tzvetkov, Vesselin Dimitrov

    2010-01-01

    The classical networks for broadcast, telephony and data are converging to services on the Next Generation Networks (NGN), which are introduced by all major Service Providers (SP). Major requirements on the future IP network are security and mobility, which are reflection of the Internet’s importance and wide use of portable smart devices. Secure IP mobility is the focus of this thesis, i.e. how the user can move through different access networks whilst maintaining uninterrupted and secure IP...

  5. Boltzmann learning of parameters in cellular neural networks

    DEFF Research Database (Denmark)

    Hansen, Lars Kai

    1992-01-01

    The use of Bayesian methods to design cellular neural networks for signal processing tasks and the Boltzmann machine learning rule for parameter estimation is discussed. The learning rule can be used for models with hidden units, or for completely unsupervised learning. The latter is exemplified...

  6. Game-theoretic pricing for video streaming in mobile networks.

    Science.gov (United States)

    Lin, W Sabrina; Liu, K J Ray

    2012-05-01

    Mobile phones are among the most popular consumer devices, and the recent developments of 3G networks and smart phones enable users to watch video programs by subscribing data plans from service providers. Due to the ubiquity of mobile phones and phone-to-phone communication technologies, data-plan subscribers can redistribute the video content to nonsubscribers. Such a redistribution mechanism is a potential competitor for the mobile service provider and is very difficult to trace given users' high mobility. The service provider has to set a reasonable price for the data plan to prevent such unauthorized redistribution behavior to protect or maximize his/her own profit. In this paper, we analyze the optimal price setting for the service provider by investigating the equilibrium between the subscribers and the secondary buyers in the content-redistribution network. We model the behavior between the subscribers and the secondary buyers as a noncooperative game and find the optimal price and quantity for both groups of users. Based on the behavior of users in the redistribution network, we investigate the evolutionarily stable ratio of mobile users who decide to subscribe to the data plan. Such an analysis can help the service provider preserve his/her profit under the threat of the redistribution networks and can improve the quality of service for end users.

  7. Dynamic optical resource allocation for mobile core networks with software defined elastic optical networking.

    Science.gov (United States)

    Zhao, Yongli; Chen, Zhendong; Zhang, Jie; Wang, Xinbo

    2016-07-25

    Driven by the forthcoming of 5G mobile communications, the all-IP architecture of mobile core networks, i.e. evolved packet core (EPC) proposed by 3GPP, has been greatly challenged by the users' demands for higher data rate and more reliable end-to-end connection, as well as operators' demands for low operational cost. These challenges can be potentially met by software defined optical networking (SDON), which enables dynamic resource allocation according to the users' requirement. In this article, a novel network architecture for mobile core network is proposed based on SDON. A software defined network (SDN) controller is designed to realize the coordinated control over different entities in EPC networks. We analyze the requirement of EPC-lightpath (EPCL) in data plane and propose an optical switch load balancing (OSLB) algorithm for resource allocation in optical layer. The procedure of establishment and adjustment of EPCLs is demonstrated on a SDON-based EPC testbed with extended OpenFlow protocol. We also evaluate the OSLB algorithm through simulation in terms of bandwidth blocking ratio, traffic load distribution, and resource utilization ratio compared with link-based load balancing (LLB) and MinHops algorithms.

  8. Cooperative beamforming for dual-hop amplify-and-forward multi-antenna relaying cellular networks

    KAUST Repository

    Xing, Chengwen; Ma, Shaodan; Xia, Minghua; Wu, Yikchung

    2012-01-01

    In this paper, linear beamforming design for amplify-and-forward relaying cellular networks is considered, in which base station, relay station and mobile terminals are all equipped with multiple antennas. The design is based on minimum mean-square-error criterion, and both uplink and downlink scenarios are considered. It is found that the downlink and uplink beamforming design problems are in the same form, and iterative algorithms with the same structure can be used to solve the design problems. For the specific cases of fully loaded or overloaded uplink systems, a novel algorithm is derived and its relationships with several existing beamforming design algorithms for conventional MIMO or multiuser systems are revealed. Simulation results are presented to demonstrate the performance advantage of the proposed design algorithms. © 2012 Published by Elsevier B.V. All rights reserved.

  9. Cooperative beamforming for dual-hop amplify-and-forward multi-antenna relaying cellular networks

    KAUST Repository

    Xing, Chengwen

    2012-11-01

    In this paper, linear beamforming design for amplify-and-forward relaying cellular networks is considered, in which base station, relay station and mobile terminals are all equipped with multiple antennas. The design is based on minimum mean-square-error criterion, and both uplink and downlink scenarios are considered. It is found that the downlink and uplink beamforming design problems are in the same form, and iterative algorithms with the same structure can be used to solve the design problems. For the specific cases of fully loaded or overloaded uplink systems, a novel algorithm is derived and its relationships with several existing beamforming design algorithms for conventional MIMO or multiuser systems are revealed. Simulation results are presented to demonstrate the performance advantage of the proposed design algorithms. © 2012 Published by Elsevier B.V. All rights reserved.

  10. Power Control for D2D Underlay Cellular Networks With Channel Uncertainty

    KAUST Repository

    Memmi, Amen; Rezki, Zouheir; Alouini, Mohamed-Slim

    2016-01-01

    Device-to-device (D2D) communications underlying the cellular infrastructure are a technology that have been proposed recently as a promising solution to enhance cellular network capabilities. It improves spectrum utilization, overall throughput

  11. Stability analysis for cellular neural networks with variable delays

    International Nuclear Information System (INIS)

    Zhang Qiang; Wei Xiaopeng; Xu Jin

    2006-01-01

    Some sufficient conditions for the global exponential stability of cellular neural networks with variable delay are obtained by means of a method based on delay differential inequality. The method, which does not make use of Lyapunov functionals, is simple and effective for the stability analysis of neural networks with delay. Some previously established results in the literature are shown to be special cases of the presented result

  12. SMR-Based Adaptive Mobility Management Scheme in Hierarchical SIP Networks

    Directory of Open Access Journals (Sweden)

    KwangHee Choi

    2014-10-01

    Full Text Available In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR, which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks.

  13. Detection of mobile user location on next generation wireless networks

    DEFF Research Database (Denmark)

    Schou, Saowanee; Olesen, Henning

    2005-01-01

    This paper proposes a novel conceptual mechanism for detecting the location of a mobile user on next generation wireless networks. This mechanism can provide location information of a mobile user at different levels of accuracy, by applying the movement detection mechanism of Mobile IPv6 at both...... macro- and micromobility level. In this scheme, an intradomain mobility management protocol (IDMP) is applied to manage the location of the mobile terminal. The mobile terminal needs two care-of addresses, a global care-of address (GCoA) and a local care-of address (LCoA). The current location...... of a Mobile IPv6 device can be determined by mapping the geographical location information with the two care-of-addresses and the physical address of the access point where the user is connected. Such a mechanism makes location services for mobile entities available on a global IP network. The end-users can...

  14. Behind the NAT – A Measurement Based Evaluation of Cellular Service Quality

    OpenAIRE

    Kaup, Fabian; Michelinakis, Foivos; Bui, Nicola; Widmer, Joerg; Wac, Katarzyna; Hausheer, David

    2015-01-01

    Abstract—Mobile applications such as VoIP, (live) gaming, or video streaming have diverse QoS requirements ranging from low delay to high throughput. The optimization of the network quality experienced by end-users requires detailed knowledge of the expected network performance. Also, the achieved service quality is affected by a number of factors, including network operator and available technologies. However, most studies focusing on measuring the cellular network do not consider the perfor...

  15. An access alternative for mobile satellite networks

    Science.gov (United States)

    Wu, W. W.

    1988-01-01

    Conceptually, this paper discusses strategies of digital satellite communication networks for a very large number of low density traffic stations. These stations can be either aeronautical, land mobile, or maritime. The techniques can be applied to international, domestic, regional, and special purpose satellite networks. The applications can be commercial, scientific, military, emergency, navigational or educational. The key strategy is the use of a non-orthogonal access method, which tolerates overlapping signals. With n being either time or frequency partitions, and with a single overlapping signal allowed, a low cost mobile satellite system can be designed with n squared (n squared + n + 1) number of terminals.

  16. Mobile agents affect worm spreading in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Huang, Zi-Gang; Sun, Jin-Tu; Wang, Ying-Hai; Wang, Sheng-Jun; Xu, Xin-Jian

    2009-01-01

    Considering the dynamic nature of portable computing devices with wireless communication capability, an extended model is introduced for worm spreading in the wireless ad hoc network, with a population of mobile agents in a planar distribution, starting from an initial infected seed. The effect of agents' mobility on worm spreading is investigated via extensive Monte Carlo simulations. The threshold behavior and the dynamics of worm epidemics in the wireless networks are greatly affected by both agents' mobility and spatial and temporal correlations. The medium access control mechanism for the wireless communication promotes the sensitivity of the spreading dynamics to agents' mobility

  17. A network analytical approach to the study of labour market mobility

    DEFF Research Database (Denmark)

    Toubøl, Jonas; Larsen, Anton Grau; Jensen, Carsten Strøby

    (RR), which enable us to identify clusters of inter-mobile categories. We apply the method to data of the labour market mobility in Denmark 2000-2007 and demonstrate how this new method can overcome some long standing obstacles to the advance of labour market segmentation theory: Instead...... of the typical theory driven definition of the labour market segments, the use of social network analysis enable a data driven definition of the segments based on the direct observation of mobility between job-positions, which reveals a number of new findings.......The aim of this paper is to present a new network analytical method for analysis of social mobility between categories like occupations or industries. The method consists of two core components; the algorithm MONECA (Mobility Network Clustering Algorithm), and the intensity measure of Relative Risk...

  18. fraud detection in mobile communications networks using user

    African Journals Online (AJOL)

    DEPT OF AGRICULTURAL ENGINEERING

    Fraud detection is an important application, since network operators lose a relevant portion of their revenue to fraud. ... testing the methods with data from real mobile communications networks. Keywords: Call data, fraud ...... Ph. D. thesis. Pur-.

  19. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  20. CAC DPLB MCN: A Distributed Load Balancing Scheme in Multimedia Mobile Cellular Networks

    Directory of Open Access Journals (Sweden)

    Sharma Abhijit

    2016-11-01

    Full Text Available The problem of non-uniform traffic demand in different cells of a cellular network may lead to a gross imbalance in the system performance. Thus, the users in hot cells may suffer from low throughput. In this paper, an effective and simple load balancing scheme CAC_DPLB_MCN is proposed that can effectively reduce the overall call blocking. This model considers dealing with multi-media traffic as well as time-varying geographical traffic distribution. The proposed scheme uses the concept of cell-tiering thereby creating fractional frequency reuse environment. A message exchange based distributed scheme instead of centralized one is used which help the proposed scheme be implemented in a multiple hot cell environment also. Furthermore, concept of dynamic pricing is used to serve the best interest of the users as well as for the service providers. The performance of the proposed scheme is compared with two other existing schemes in terms of call blocking probability and bandwidth utilization. Simulation results show that the proposed scheme can reduce the call blocking significantly in highly congested cell with highest bandwidth utilization. Use of dynamic pricing also makes the scheme useful to increase revenue of the service providers in contrast with compared schemes.

  1. Cross-layer ultrasound video streaming over mobile WiMAX and HSUPA networks.

    Science.gov (United States)

    Alinejad, Ali; Philip, Nada Y; Istepanian, Robert S H

    2012-01-01

    It is well known that the evolution of 4G-based mobile multimedia network systems will contribute significantly to future mobile healthcare (m-health) applications that require high bandwidth and fast data rates. Central to the success of such emerging applications is the compatibility of broadband networks, such as mobile Worldwide Interoperability For Microwave Access (WiMAX) and High-Speed Uplink Packet Access (HSUPA), and especially their rate adaption issues combined with the acceptable real-time medical quality of service requirements. In this paper, we address the relevant challenges of cross-layer design requirements for real-time rate adaptation of ultrasound video streaming in mobile WiMAX and HSUPA networks. A comparative performance analysis of such approach is validated in two experimental m-health test bed systems for both mobile WiMAX and HSUPA networks. The experimental results have shown an improved performance of mobile WiMAX compared to the HSUPA using the same cross-layer optimization approach.

  2. Composite Social Network for Predicting Mobile Apps Installation

    Science.gov (United States)

    2011-06-02

    Social network tools (such as the Facebook app and the Twitter app) can observe users’ online friendship network . In this work, our key idea is...the friendship network from phones by collecting data from social networking apps such as the Facebook and Twitter apps. We summarize all the networks ...ar X iv :1 10 6. 03 59 v1 [ cs .S I] 2 J un 2 01 1 Composite Social Network for Predicting Mobile Apps Installation Wei Pan

  3. OFDM AF Variable Gain Relay System for the Next Generation Mobile Cellular

    Directory of Open Access Journals (Sweden)

    E. Kocan

    2012-06-01

    Full Text Available In this paper we present analytical performance evaluation of a dual-hop OFDM amplify-andforward (AF variable gain (VG relay system implementing ordered subcarrier mapping (SCM at the relay station (R, considered to be a very interesting solution for the next generation mobile cellular networks. A scenario with no direct communication between the source of information (S and destination terminal (D, with the Rayleigh fading statistics on both hops is assumed. A closed form analytical expression for the bit error rate (BER performance of the considered system with DPSK modulation is derived, while for its ergodic capacity performance, a tight upper bound expression is obtained. The accuracy of the undertaken analytical approach is confirmed through comparison with simulation results. It is shown that significant capacity enhancement can be achieved through SCM implementation at R, for all the signal-to-noise ratio (SNR values on both hops, but especially in the region of small SNRs on hops. BER analysis reveals that in the region of small and medium average SNRs on both hops BER performance may also be improved with SCM at R station.

  4. Land mobile satellite services in Europe

    Science.gov (United States)

    Bartholomé, P.; Berretta, G.; Rogard, R.

    The demand for land-mobile communications on a Europe-wide basis is an important and pressing problem. The pan-European cellular network now in the planning stage will be slow in coming and it will have its limitations. A regional satellite system for Europe to complement the cellular network is the only practical way to satisfy a specialised market that encompasses a population of several hundred thousand mobiles, including road vehicles, merchant shipping, fishing boats, and trains. The deployment of a regional system would take place in a number of phases, the first being based on a simple payload embarked on a host satellite belonging to a European organisation. Further phases will involve the development of more advanced payloads on dedicated satellites. For the long-term future, the use of satellites in highly inclined orbits is being considered as a means of improving their visibility and hence the service quality.

  5. An Intelligent Cooperative Visual Sensor Network for Urban Mobility.

    Science.gov (United States)

    Leone, Giuseppe Riccardo; Moroni, Davide; Pieri, Gabriele; Petracca, Matteo; Salvetti, Ovidio; Azzarà, Andrea; Marino, Francesco

    2017-11-10

    Smart cities are demanding solutions for improved traffic efficiency, in order to guarantee optimal access to mobility resources available in urban areas. Intelligent video analytics deployed directly on board embedded sensors offers great opportunities to gather highly informative data about traffic and transport, allowing reconstruction of a real-time neat picture of urban mobility patterns. In this paper, we present a visual sensor network in which each node embeds computer vision logics for analyzing in real time urban traffic. The nodes in the network share their perceptions and build a global and comprehensive interpretation of the analyzed scenes in a cooperative and adaptive fashion. This is possible thanks to an especially designed Internet of Things (IoT) compliant middleware which encompasses in-network event composition as well as full support of Machine-2-Machine (M2M) communication mechanism. The potential of the proposed cooperative visual sensor network is shown with two sample applications in urban mobility connected to the estimation of vehicular flows and parking management. Besides providing detailed results of each key component of the proposed solution, the validity of the approach is demonstrated by extensive field tests that proved the suitability of the system in providing a scalable, adaptable and extensible data collection layer for managing and understanding mobility in smart cities.

  6. ASH : Tackling node mobility in large-scale networks

    NARCIS (Netherlands)

    Pruteanu, A.; Dulman, S.

    2012-01-01

    With the increased adoption of technologies likewireless sensor networks by real-world applications, dynamic network topologies are becoming the rule rather than the exception. Node mobility, however, introduces a range of problems (communication interference, path uncertainty, low quality of

  7. Accessing data transfer reliability for duty cycled mobile wireless sensor network

    International Nuclear Information System (INIS)

    Shaikh, F.K.

    2014-01-01

    Mobility in WSNs (Wireless Sensor Networks) introduces significant challenges which do not arise in static WSNs. Reliable data transport is an important aspect of attaining consistency and QoS (Quality of Service) in several applications of MWSNs (Mobile Wireless Sensor Networks). It is important to understand how each of the wireless sensor networking characteristics such as duty cycling, collisions, contention and mobility affects the reliability of data transfer. If reliability is not managed well, the MWSN can suffer from overheads which reduce its applicability in the real world. In this paper, reliability assessment is being studied by deploying MWSN in different indoor and outdoor scenarios with various duty cycles of the motes and speeds of the mobile mote. Results show that the reliability is greatly affected by the duty cycled motes and the mobility using inherent broadcast mechanisms. (author)

  8. Securing DSR with mobile agents in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Abosamra

    2011-03-01

    Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.

  9. GIS Mapping and Monitoring of Cellular Communication Quality in Terms of Crowdsourcing

    Directory of Open Access Journals (Sweden)

    Zanozin Viktor Valeryevich

    2015-09-01

    Full Text Available At the present day the monitoring of mobile services quality is carried out in the framework of the internal audit of the enterprise communications. The Federal Service for Supervision of Communications, Information Technology and Mass Communications (Roskomnadzor does not yet have high-quality assurance techniques of services and conducts partial spot checks on the basis of existing normative legal acts (NLA. One of cellular communication quality monitoring method is Netmonitoring. Netmonitoring, as one of the possible types of quality control services provided by mobile operators, is described in this article. Netmonitoring is provided in the Astrakhan city on the Kirova street, Savushkina street, Kubanskya street, Magistralnaya street and other large streets of the city. There are more than 150 cellular level measurements. Netmonitoring is based on crowdsourcing and mobile mapping. Mobile mapping is the process of collecting geospatial data using mapping sensors mounted on a mobile platform. The search of base stations was carried out by means of such programs as Netmonitoring, Network Signal Info and Antennas. The resulting data, namely the network code, “cell ID” and local area code, were used for geo-information programs creation. The experience in designing KML and Visual Basic languages programs Netmonitoring and AstraNetMonitoring is described in this paper.

  10. Analytical modeling of mode selection and power control for underlay D2D communication in cellular networks

    KAUST Repository

    Elsawy, Hesham

    2014-11-01

    Device-to-device (D2D) communication enables the user equipments (UEs) located in close proximity to bypass the cellular base stations (BSs) and directly connect to each other, and thereby, offload traffic from the cellular infrastructure. D2D communication can improve spatial frequency reuse and energy efficiency in cellular networks. This paper presents a comprehensive and tractable analytical framework for D2D-enabled uplink cellular networks with a flexible mode selection scheme along with truncated channel inversion power control. The developed framework is used to analyze and understand how the underlaying D2D communication affects the cellular network performance. Through comprehensive numerical analysis, we investigate the expected performance gains and provide guidelines for selecting the network parameters.

  11. DRO: domain-based route optimization scheme for nested mobile networks

    Directory of Open Access Journals (Sweden)

    Chuang Ming-Chin

    2011-01-01

    Full Text Available Abstract The network mobility (NEMO basic support protocol is designed to support NEMO management, and to ensure communication continuity between nodes in mobile networks. However, in nested mobile networks, NEMO suffers from the pinball routing problem, which results in long packet transmission delays. To solve the problem, we propose a domain-based route optimization (DRO scheme that incorporates a domain-based network architecture and ad hoc routing protocols for route optimization. DRO also improves the intra-domain handoff performance, reduces the convergence time during route optimization, and avoids the out-of-sequence packet problem. A detailed performance analysis and simulations were conducted to evaluate the scheme. The results demonstrate that DRO outperforms existing mechanisms in terms of packet transmission delay (i.e., better route-optimization, intra-domain handoff latency, convergence time, and packet tunneling overhead.

  12. Epidemic transmission on random mobile network with diverse infection periods

    Science.gov (United States)

    Li, Kezan; Yu, Hong; Zeng, Zhaorong; Ding, Yong; Ma, Zhongjun

    2015-05-01

    The heterogeneity of individual susceptibility and infectivity and time-varying topological structure are two realistic factors when we study epidemics on complex networks. Current research results have shown that the heterogeneity of individual susceptibility and infectivity can increase the epidemic threshold in a random mobile dynamical network with the same infection period. In this paper, we will focus on random mobile dynamical networks with diverse infection periods due to people's different constitutions and external circumstances. Theoretical results indicate that the epidemic threshold of the random mobile network with diverse infection periods is larger than the counterpart with the same infection period. Moreover, the heterogeneity of individual susceptibility and infectivity can play a significant impact on disease transmission. In particular, the homogeneity of individuals will avail to the spreading of epidemics. Numerical examples verify further our theoretical results very well.

  13. Global exponential stability for nonautonomous cellular neural networks with delays

    International Nuclear Information System (INIS)

    Zhang Qiang; Wei Xiaopeng; Xu Jin

    2006-01-01

    In this Letter, by utilizing Lyapunov functional method and Halanay inequalities, we analyze global exponential stability of nonautonomous cellular neural networks with delay. Several new sufficient conditions ensuring global exponential stability of the network are obtained. The results given here extend and improve the earlier publications. An example is given to demonstrate the effectiveness of the obtained results

  14. Fundamental Tradeoffs among Reliability, Latency and Throughput in Cellular Networks

    DEFF Research Database (Denmark)

    Soret, Beatriz; Mogensen, Preben; Pedersen, Klaus I.

    2014-01-01

    We address the fundamental tradeoffs among latency, reliability and throughput in a cellular network. The most important elements influencing the KPIs in a 4G network are identified, and the inter-relationships among them is discussed. We use the effective bandwidth and the effective capacity......, in which latency and reliability will be two of the principal KPIs....

  15. Handover Based IMS Registration Scheme for Next Generation Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shireen Tahira

    2017-01-01

    Full Text Available Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming and massive data sharing in social and communication networks. In these networks, user equipment has to register with IP Multimedia Subsystem (IMS which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers. We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries.

  16. Mobile human network management and recommendation by probabilistic social mining.

    Science.gov (United States)

    Min, Jun-Ki; Cho, Sung-Bae

    2011-06-01

    Recently, inferring or sharing of mobile contexts has been actively investigated as cell phones have become more than a communication device. However, most of them focused on utilizing the contexts on social network services, while the means in mining or managing the human network itself were barely considered. In this paper, the SmartPhonebook, which mines users' social connections to manage their relationships by reasoning social and personal contexts, is presented. It works like an artificial assistant which recommends the candidate callees whom the users probably would like to contact in a certain situation. Moreover, it visualizes their social contexts like closeness and relationship with others in order to let the users know their social situations. The proposed method infers the social contexts based on the contact patterns, while it extracts the personal contexts such as the users' emotional states and behaviors from the mobile logs. Here, Bayesian networks are exploited to handle the uncertainties in the mobile environment. The proposed system has been implemented with the MS Windows Mobile 2003 SE Platform on Samsung SPH-M4650 smartphone and has been tested on real-world data. The experimental results showed that the system provides an efficient and informative way for mobile social networking.

  17. Optimized Energy Efficiency and Spectral Efficiency Resource Allocation Strategies for Phantom Cellular Networks

    KAUST Repository

    Abdelhady, Amr, M.; Amin, Osama; Alouini, Mohamed-Slim

    2016-01-01

    Multi-teir hetrogeneous networks have become an essential constituent for next generation cellular networks. Meanwhile, energy efficiency (EE) has been considered a critical design criterion along with the traditional spectral efficiency (SE) metric. In this context, we study power and spectrum allocation for the recently proposed two-teir architecture known as Phantom cellular networks. The optimization framework includes both EE and SE, where we propose an algorithm that computes the SE and EE resource allocation for Phantom cellular networks. Then, we compare the performance of both design strategies versus the number of users, and the ration of Phantom cellresource blocks to the total number or resource blocks. We aim to investigate the effect of some system parameters to acheive improved SE or EE performance at a non-significant loss in EE or SE performance, respectively. It was found that the system parameters can be tuned so that the EE solution does not yield a significant loss in the SE performance.

  18. Optimized Energy Efficiency and Spectral Efficiency Resource Allocation Strategies for Phantom Cellular Networks

    KAUST Repository

    Abdelhady, Amr, M.

    2016-01-06

    Multi-teir hetrogeneous networks have become an essential constituent for next generation cellular networks. Meanwhile, energy efficiency (EE) has been considered a critical design criterion along with the traditional spectral efficiency (SE) metric. In this context, we study power and spectrum allocation for the recently proposed two-teir architecture known as Phantom cellular networks. The optimization framework includes both EE and SE, where we propose an algorithm that computes the SE and EE resource allocation for Phantom cellular networks. Then, we compare the performance of both design strategies versus the number of users, and the ration of Phantom cellresource blocks to the total number or resource blocks. We aim to investigate the effect of some system parameters to acheive improved SE or EE performance at a non-significant loss in EE or SE performance, respectively. It was found that the system parameters can be tuned so that the EE solution does not yield a significant loss in the SE performance.

  19. Cell Identification based on Received Signal Strength Fingerprints: Concept and Application towards Energy Saving in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Elke Roth-Mandutz

    2014-09-01

    Full Text Available The increasing deployment of small cells aimed at off-loading data traffic from macrocells in heterogeneous networks has resulted in a drastic increase in energy consumption in cellular networks. Energy consumption can be optimized in a selforganized way by adapting the number of active cells in response to the current traffic demand. In this paper we concentrate on the complex problem of how to identify small cells to be reactivated in situations where multiple cells are concurrently inactive. Solely based on the received signal strength, we present cell-specific patterns for the generation of unique cell fingerprints. The cell fingerprints of the deactivated cells are matched with measurements from a high data rate demanding mobile device to identify the most appropriate candidate. Our scheme results in a matching success rate of up to 100% to identify the best cell depending on the number of cells to be activated.

  20. 47 CFR 22.923 - Cellular system configuration.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Cellular system configuration. 22.923 Section... MOBILE SERVICES Cellular Radiotelephone Service § 22.923 Cellular system configuration. Mobile stations... directly or through cellular repeaters. Auxiliary test stations may communicate with base or mobile...

  1. Mobility management principle, technology and applications

    CERN Document Server

    Chen, Shanzhi; Hu, Bo; Ai, Ming

    2016-01-01

    This is the first book devoted to mobility management, covering the important principles, technologies and applications of mobility management based on years of academic research and industry experiences. The content is organized according to the reference models proposed by the authors, and emphasizes on technical principles rather than protocol details; a systematic and comprehensive introduction is presented yet without losing focuses; the existing technologies in cellular system, mobile Internet and IMS/SIP are also extensively compared. This book can be an indispensable reference for mobile communication engineers, computer network engineers, researchers and anyone else involved in academic, industrial and standardization activities on mobility management.

  2. Mobile Videoconferencing Apps for Telemedicine.

    Science.gov (United States)

    Zhang, Kai; Liu, Wei-Li; Locatis, Craig; Ackerman, Michael

    2016-01-01

    The quality and performance of several videoconferencing applications (apps) tested on iOS (Apple, Cupertino, CA) and Android (Google, Mountain View, CA) mobile platforms using Wi-Fi (802.11), third-generation (3G), and fourth-generation (4G) cellular networks are described. The tests were done to determine how well apps perform compared with videoconferencing software installed on computers or with more traditional videoconferencing using dedicated hardware. The rationale for app assessment and the testing methodology are described. Findings are discussed in relation to operating system platform (iOS or Android) for which the apps were designed and the type of network (Wi-Fi, 3G, or 4G) used. The platform, network, and apps interact, and it is impossible to discuss videoconferencing experienced on mobile devices in relation to one of these factors without referencing the others. Apps for mobile devices can vary significantly from other videoconferencing software or hardware. App performance increased over the testing period due to improvements in network infrastructure and how apps manage bandwidth.

  3. Spatial spreading of infectious disease via local and national mobility networks in South Korea

    Science.gov (United States)

    Kwon, Okyu; Son, Woo-Sik

    2017-12-01

    We study the spread of infectious disease based on local- and national-scale mobility networks. We construct a local mobility network using data on urban bus services to estimate local-scale movement of people. We also construct a national mobility network from orientation-destination data of vehicular traffic between highway tollgates to evaluate national-scale movement of people. A metapopulation model is used to simulate the spread of epidemics. Thus, the number of infected people is simulated using a susceptible-infectious-recovered (SIR) model within the administrative division, and inter-division spread of infected people is determined through local and national mobility networks. In this paper, we consider two scenarios for epidemic spread. In the first, the infectious disease only spreads through local-scale movement of people, that is, the local mobility network. In the second, it spreads via both local and national mobility networks. For the former, the simulation results show infected people sequentially spread to neighboring divisions. Yet for the latter, we observe a faster spreading pattern to distant divisions. Thus, we confirm the national mobility network enhances synchronization among the incidence profiles of all administrative divisions.

  4. Solar PV powered mobile cellular base station: Models and use cases in South Africa

    CSIR Research Space (South Africa)

    Aderemi, BA

    2017-09-01

    Full Text Available The huge costs of operating a mobile cellular base station, and the negative impact of greenhouse gasses on the environment have made the solar PV renewable energy source a sought after. In addition to cost and environmental factor, abundant supply...

  5. Behind the NAT??? A measurement based evaluation of cellular service quality

    DEFF Research Database (Denmark)

    Kaup, F.; Michelinakis, F.; Bui, N.

    2015-01-01

    Mobile applications such as VoIP, (live) gaming, or video streaming have diverse QoS requirements ranging from low delay to high throughput. The optimization of the network quality experienced by end-users requires detailed knowledge of the expected network performance. Also, the achieved service...... quality is affected by a number of factors, including network operator and available technologies. However, most studies focusing on measuring the cellular network do not consider the performance implications of network configuration and management. To this end, this paper reports about an extensive data...

  6. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS FOR MOBILE WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R. Maivizhi

    2015-06-01

    Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.

  7. Adapting Mobile Beacon-Assisted Localization in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wei Dong

    2009-04-01

    Full Text Available The ability to automatically locate sensor nodes is essential in many Wireless Sensor Network (WSN applications. To reduce the number of beacons, many mobile-assisted approaches have been proposed. Current mobile-assisted approaches for localization require special hardware or belong to centralized localization algorithms involving some deterministic approaches due to the fact that they explicitly consider the impreciseness of location estimates. In this paper, we first propose a range-free, distributed and probabilistic Mobile Beacon-assisted Localization (MBL approach for static WSNs. Then, we propose another approach based on MBL, called Adapting MBL (A-MBL, to increase the efficiency and accuracy of MBL by adapting the size of sample sets and the parameter of the dynamic model during the estimation process. Evaluation results show that the accuracy of MBL and A-MBL outperform both Mobile and Static sensor network Localization (MSL and Arrival and Departure Overlap (ADO when both of them use only a single mobile beacon for localization in static WSNs.

  8. Adapting mobile beacon-assisted localization in wireless sensor networks.

    Science.gov (United States)

    Teng, Guodong; Zheng, Kougen; Dong, Wei

    2009-01-01

    The ability to automatically locate sensor nodes is essential in many Wireless Sensor Network (WSN) applications. To reduce the number of beacons, many mobile-assisted approaches have been proposed. Current mobile-assisted approaches for localization require special hardware or belong to centralized localization algorithms involving some deterministic approaches due to the fact that they explicitly consider the impreciseness of location estimates. In this paper, we first propose a range-free, distributed and probabilistic Mobile Beacon-assisted Localization (MBL) approach for static WSNs. Then, we propose another approach based on MBL, called Adapting MBL (A-MBL), to increase the efficiency and accuracy of MBL by adapting the size of sample sets and the parameter of the dynamic model during the estimation process. Evaluation results show that the accuracy of MBL and A-MBL outperform both Mobile and Static sensor network Localization (MSL) and Arrival and Departure Overlap (ADO) when both of them use only a single mobile beacon for localization in static WSNs.

  9. Networked Mobilities and new sites of mediated interaction

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2008-01-01

    everyday life experiences the movement is much more than a travel from point A to point B. The mobile experiences of the contemporary society are practices that are meaningful and normatively embedded. That is to say, mobility is seen as a cultural phenomenon shaping notions of self and other as well......This paper takes point of departure in an understanding of mobility as an important cultural dimension to contemporary life. The movement of objects, signs, and people constitutes material sites of networked relationships. However, as an increasing number of mobility practices are making up our...

  10. A Novel Cache Invalidation Scheme for Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In this paper, we propose a strategy of maintaining cache consistency in wireless mobile environments, which adds a validation server (VS) into the GPRS network, utilizes the location information of mobile terminal in SGSN located at GPRS backbone, just sends invalidation information to mobile terminal which is online in accordance with the cached data, and reduces the information amount in asynchronous transmission. This strategy enables mobile terminal to access cached data with very little computing amount, little delay and arbitrary disconnection intervals, and excels the synchronous IR and asynchronous state (AS) in the total performances.

  11. TNF-α inhibits trophoblast integration into endothelial cellular networks.

    Science.gov (United States)

    Xu, B; Nakhla, S; Makris, A; Hennessy, A

    2011-03-01

    Preeclampsia has been linked to shallow trophoblast invasion and failure of uterine spiral artery transformation. Interaction between trophoblast cells and maternal uterine endothelium is critically important for this remodelling. The aim of our study was to investigate the effect of TNF-α on the interactions of trophoblast-derived JEG-3 cells into capillary-like cellular networks. We have employed an in vitro trophoblast-endothelial cell co-culture model to quantify trophoblast integration into endothelial cellular networks and to investigate the effects of TNF-α. Controlled co-cultures were also treated with anti-TNF-α antibody (5 μg/ml) to specifically block the effect of TNF-α. The invasion was evaluated by performing quantitative PCR (Q-PCR) to analyse gene expression of matrix metalloproteinases-2 (MMP-2), MMP-9, tissue inhibitor of matrix metalloproteinase (TIMP)-1, integrins (α(1)β(1) and α(6)β(4)), plasminogen activator inhibitor (PAI)-1, E-cadherin and VE-cadherin. JEG-3 cell integration into endothelial networks was significantly inhibited by exogenous TNF-α. The inhibition was observed in the range of 0.2-5 ng/ml, to a maximum 56% inhibition at the highest concentration. This inhibition was reversed by anti-TNF-α antibody. Q-PCR analysis showed that mRNA expression of integrins α(1)β(1) and MMP-2 was significantly decreased. VE-cadherin mRNA expression was significantly up-regulated (32-80%, p integration into maternal endothelial cellular networks, and this process involves the inhibition of MMP-2 and a failure of integrins switch from α(6)β(4) to α(1)β(1.) These molecular correlations reflect the changes identified in human preeclampsia. Copyright © 2011 Elsevier Ltd. All rights reserved.

  12. A Review of Anti- Podal Vivaldi Antenna Operating in Cellular Mobile Communications

    Directory of Open Access Journals (Sweden)

    Asim Alkhaibari

    2017-12-01

    Full Text Available The antenna proposed is a new geomantic structure of Ultra-Wideband (UWB Anti- Podal Vivaldi antenna (AVA. It remarkably offers an attractive performance over the bands of cellular networks. However, its benefits are not limited only in particular applications, whereas radar imaging, mining detection, the biomedical science in the heating of brain cancer tumor and treatment, and the wireless communication are considered as the main applications suitable for utilization. Therefore, the focus on this paper is to spot the light illuminating into the cellular communications network Systems. On the other hands, several characteristics of Vivaldi antenna have been provided such as the gain, return loss, Voltage Standing Wave Ratio (VSWR, current distribution and E- fields. Finally, the results illustrate the capability and feasibility of the designed antenna.

  13. Fractal Analysis of Mobile Social Networks

    International Nuclear Information System (INIS)

    Zheng Wei; Pan Qian; Sun Chen; Deng Yu-Fan; Zhao Xiao-Kang; Kang Zhao

    2016-01-01

    Fractal and self similarity of complex networks have attracted much attention in recent years. The fractal dimension is a useful method to describe the fractal property of networks. However, the fractal features of mobile social networks (MSNs) are inadequately investigated. In this work, a box-covering method based on the ratio of excluded mass to closeness centrality is presented to investigate the fractal feature of MSNs. Using this method, we find that some MSNs are fractal at different time intervals. Our simulation results indicate that the proposed method is available for analyzing the fractal property of MSNs. (paper)

  14. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  15. Synchronization challenges in packet-based Cloud-RAN fronthaul for mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra; Juul, Anders Christian; Christiansen, Henrik Lehrmann

    2015-01-01

    In this paper, we look at reusing existing packet-based network (e.g. Ethernet) to possibly decrease deployment costs of fronthaul Cloud Radio Access Network (C-RAN) network and cost of Baseband Unit (BBU) resources. The challenge of this solution is that it requires mobile traffic (until now...... transmitted over synchronous protocols) to traverse the asynchronous Ethernet without losing synchronization. We analyze synchronization requirements of mobile networks and present an overview of solutions that fulfill them in traditional mobile networks. Then we elaborate on challenges that packet-based...... fronthaul imposes. We analyze possible contributions to frequency and phase error. We verify the feasibility of using the IEEE 1588v2 also know as Precision Time Protocol (PTP) for providing accurate phase and frequency synchronization. The study is based on simulations made in OPNET modeler. Thereby we...

  16. Network design consideration of a satellite-based mobile communications system

    Science.gov (United States)

    Yan, T.-Y.

    1986-01-01

    Technical considerations for the Mobile Satellite Experiment (MSAT-X), the ground segment testbed for the low-cost spectral efficient satellite-based mobile communications technologies being developed for the 1990's, are discussed. The Network Management Center contains a flexible resource sharing algorithm, the Demand Assigned Multiple Access scheme, which partitions the satellite transponder bandwidth among voice, data, and request channels. Satellite use of multiple UHF beams permits frequency reuse. The backhaul communications and the Telemetry, Tracking and Control traffic are provided through a single full-coverage SHF beam. Mobile Terminals communicate with the satellite using UHF. All communications including SHF-SHF between Base Stations and/or Gateways, are routed through the satellite. Because MSAT-X is an experimental network, higher level network protocols (which are service-specific) will be developed only to test the operation of the lowest three levels, the physical, data link, and network layers.

  17. Neural networks and cellular automata in experimental high energy physics

    Energy Technology Data Exchange (ETDEWEB)

    Denby, B

    1988-06-01

    Within the past few years, two novel computing techniques, cellular automata and neural networks, have shown considerable promise in the solution of problems of a very high degree of complexity, such as turbulent fluid flow, image processing, and pattern recognition. Many of the problems faced in experimental high energy physics are also of this nature. Track reconstruction in wire chambers and cluster finding in cellular calorimeters, for instance, involve pattern recognition and high combinatorial complexity since many combinations of hits or cells must be considered in order to arrive at the final tracks or clusters. Here we examine in what way connective network methods can be applied to some of the problems of experimental high energy physics. It is found that such problems as track and cluster finding adapt naturally to these approaches. When large scale hard-wired connective networks become available, it will be possible to realize solutions to such problems in a fraction of the time required by traditional methods. For certain types of problems, faster solutions are already possible using model networks implemented on vector or other massively parallel machines. It should also be possible, using existing technology, to build simplified networks that will allow detailed reconstructed event information to be used in fast trigger decisions.

  18. Neural networks and cellular automata in experimental high energy physics

    International Nuclear Information System (INIS)

    Denby, B.

    1987-11-01

    Within the past few years, two novel computing techniques, cellular automata and neural networks, have shown considerable promise in the solution of problems of a very high degree of complexity, such as turbulent fluid flow, image processing, and pattern recognition. Many of the problems faced in experimental high energy physics are also of this nature. Track reconstruction in wire chambers and cluster finding in cellular calorimeters, for instance, involve pattern recognition and high combinatorial complexity since many combinations of hits or cells must be considered in order to arrive at the final tracks or clusters. Here we examine in what way connective network methods can be applied to some of the problems of experimental high physics. It is found that such problems as track and cluster finding adapt naturally to these approaches. When large scale hardwired connective networks become available, it will be possible to realize solutions to such problems in a fraction of the time required by traditional methods. For certain types of problems, faster solutions are already possible using model networks implemented on vector or other massively parallel machines. It should also be possible, using existing technology, to build simplified networks that will allow detailed reconstructed event information to be used in fast trigger decisions

  19. Neural networks and cellular automata in experimental high energy physics

    International Nuclear Information System (INIS)

    Denby, B.

    1988-01-01

    Within the past few years, two novel computing techniques, cellular automata and neural networks, have shown considerable promise in the solution of problems of a very high degree of complexity, such as turbulent fluid flow, image processing, and pattern recognition. Many of the problems faced in experimental high energy physics are also of this nature. Track reconstruction in wire chambers and cluster finding in cellular calorimeters, for instance, involve pattern recognition and high combinatorial complexity since many combinations of hits or cells must be considered in order to arrive at the final tracks or clusters. Here we examine in what way connective network methods can be applied to some of the problems of experimental high energy physics. It is found that such problems as track and cluster finding adapt naturally to these approaches. When large scale hard-wired connective networks become available, it will be possible to realize solutions to such problems in a fraction of the time required by traditional methods. For certain types of problems, faster solutions are already possible using model networks implemented on vector or other massively parallel machines. It should also be possible, using existing technology, to build simplified networks that will allow detailed reconstructed event information to be used in fast trigger decisions. (orig.)

  20. Limits on the Capacity of In-Band Full Duplex Communication in Uplink Cellular Networks

    KAUST Repository

    Randrianantenaina, Itsikiantsoa

    2016-02-26

    Simultaneous co-channel transmission and reception, denoted as in-band full duplex (FD) communication, has been promoted as an attractive solution to improve the spectral efficiency of cellular networks. However, in addition to the selfinterference problem, cross-mode interference (i.e., between uplink and downlink) imposes a major obstacle for the deployment of FD communication in cellular networks. More specifically, the downlink to uplink interference represents the performance bottleneck for FD operation due to the uplink limited transmission power and venerable operation when compared to the downlink counterpart. While the positive impact of FD communication to the downlink performance has been proved in the literature, its effect on the uplink transmission has been neglected. This paper focuses on the effect of downlink interference on the uplink transmission in FD cellular networks in order to see whether FD communication is beneficial for the uplink transmission or not, and if yes for which type of network. To quantify the expected performance gains, we derive a closed form expression of the maximum achievable uplink capacity in FD cellular networks. In contrast to the downlink capacity which always improves with FD communication, our results show that the uplink performance may improves or degrades depending on the associated network parameters. Particularly, we show that the intensity of base stations (BSs) has a more prominent effect on the uplink performance than their transmission power.

  1. Limits on the Capacity of In-Band Full Duplex Communication in Uplink Cellular Networks

    KAUST Repository

    Randrianantenaina, Itsikiantsoa; Elsawy, Hesham; Alouini, Mohamed-Slim

    2016-01-01

    Simultaneous co-channel transmission and reception, denoted as in-band full duplex (FD) communication, has been promoted as an attractive solution to improve the spectral efficiency of cellular networks. However, in addition to the selfinterference problem, cross-mode interference (i.e., between uplink and downlink) imposes a major obstacle for the deployment of FD communication in cellular networks. More specifically, the downlink to uplink interference represents the performance bottleneck for FD operation due to the uplink limited transmission power and venerable operation when compared to the downlink counterpart. While the positive impact of FD communication to the downlink performance has been proved in the literature, its effect on the uplink transmission has been neglected. This paper focuses on the effect of downlink interference on the uplink transmission in FD cellular networks in order to see whether FD communication is beneficial for the uplink transmission or not, and if yes for which type of network. To quantify the expected performance gains, we derive a closed form expression of the maximum achievable uplink capacity in FD cellular networks. In contrast to the downlink capacity which always improves with FD communication, our results show that the uplink performance may improves or degrades depending on the associated network parameters. Particularly, we show that the intensity of base stations (BSs) has a more prominent effect on the uplink performance than their transmission power.

  2. Collaborative Multi-Layer Network Coding For Hybrid Cellular Cognitive Radio Networks

    KAUST Repository

    Moubayed, Abdallah J.

    2014-05-01

    In this thesis, as an extension to [1], we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in hybrid (interweave and underlay) cellular cognitive radio networks. This scheme allows the uncoordinated collaboration between the collocated primary and cognitive radio base-stations in order to minimize their own as well as each other’s packet recovery overheads, thus by improving their throughput. The proposed scheme ensures that each network’s performance is not degraded by its help to the other network. Moreover, it guarantees that the primary network’s interference threshold is not violated in the same and adjacent cells. Yet, the scheme allows the reduction of the recovery overhead in the collocated primary and cognitive radio networks. The reduction in the cognitive radio network is further amplified due to the perfect detection of spectrum holes which allows the cognitive radio base station to transmit at higher power without fear of violating the interference threshold of the primary network. For the secondary network, simulation results show reductions of 20% and 34% in the packet recovery overhead, compared to the non-collaborative scheme, for low and high probabilities of primary packet arrivals, respectively. For the primary network, this reduction was found to be 12%. Furthermore, with the use of fractional cooperation, the average recovery overhead is further reduced by around 5% for the primary network and around 10% for the secondary network when a high fractional cooperation probability is used.

  3. Finding the Sweet Spot: Network Structures and Processes for Increased Knowledge Mobilization

    Science.gov (United States)

    Briscoe, Patricia; Pollock, Katina; Campbell, Carol; Carr-Harris, Shasta

    2015-01-01

    The use of networks in public education is one of many knowledge mobilization (KMb) strategies utilized to promote evidence-based research into practice. However, challenges exist in the ability to mobilize knowledge through networks. The purpose of this paper is to explore how networks work. Data were collected from virtual discussions for an…

  4. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  5. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks.

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-02-10

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches.

  6. Source Authentication for Multicast in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Ramachandran, Prabha

    2003-01-01

    Recent emergence and popularity of mobile ad hoc networks in a host of current-day applications has instigated a suite of research challenges, primarily in routing and security issues for such networks...

  7. An Intelligent Cooperative Visual Sensor Network for Urban Mobility

    Science.gov (United States)

    Leone, Giuseppe Riccardo; Petracca, Matteo; Salvetti, Ovidio; Azzarà, Andrea

    2017-01-01

    Smart cities are demanding solutions for improved traffic efficiency, in order to guarantee optimal access to mobility resources available in urban areas. Intelligent video analytics deployed directly on board embedded sensors offers great opportunities to gather highly informative data about traffic and transport, allowing reconstruction of a real-time neat picture of urban mobility patterns. In this paper, we present a visual sensor network in which each node embeds computer vision logics for analyzing in real time urban traffic. The nodes in the network share their perceptions and build a global and comprehensive interpretation of the analyzed scenes in a cooperative and adaptive fashion. This is possible thanks to an especially designed Internet of Things (IoT) compliant middleware which encompasses in-network event composition as well as full support of Machine-2-Machine (M2M) communication mechanism. The potential of the proposed cooperative visual sensor network is shown with two sample applications in urban mobility connected to the estimation of vehicular flows and parking management. Besides providing detailed results of each key component of the proposed solution, the validity of the approach is demonstrated by extensive field tests that proved the suitability of the system in providing a scalable, adaptable and extensible data collection layer for managing and understanding mobility in smart cities. PMID:29125535

  8. An Intelligent Cooperative Visual Sensor Network for Urban Mobility

    Directory of Open Access Journals (Sweden)

    Giuseppe Riccardo Leone

    2017-11-01

    Full Text Available Smart cities are demanding solutions for improved traffic efficiency, in order to guarantee optimal access to mobility resources available in urban areas. Intelligent video analytics deployed directly on board embedded sensors offers great opportunities to gather highly informative data about traffic and transport, allowing reconstruction of a real-time neat picture of urban mobility patterns. In this paper, we present a visual sensor network in which each node embeds computer vision logics for analyzing in real time urban traffic. The nodes in the network share their perceptions and build a global and comprehensive interpretation of the analyzed scenes in a cooperative and adaptive fashion. This is possible thanks to an especially designed Internet of Things (IoT compliant middleware which encompasses in-network event composition as well as full support of Machine-2-Machine (M2M communication mechanism. The potential of the proposed cooperative visual sensor network is shown with two sample applications in urban mobility connected to the estimation of vehicular flows and parking management. Besides providing detailed results of each key component of the proposed solution, the validity of the approach is demonstrated by extensive field tests that proved the suitability of the system in providing a scalable, adaptable and extensible data collection layer for managing and understanding mobility in smart cities.

  9. A comparative analysis of the statistical properties of large mobile phone calling networks.

    Science.gov (United States)

    Li, Ming-Xia; Jiang, Zhi-Qiang; Xie, Wen-Jie; Miccichè, Salvatore; Tumminello, Michele; Zhou, Wei-Xing; Mantegna, Rosario N

    2014-05-30

    Mobile phone calling is one of the most widely used communication methods in modern society. The records of calls among mobile phone users provide us a valuable proxy for the understanding of human communication patterns embedded in social networks. Mobile phone users call each other forming a directed calling network. If only reciprocal calls are considered, we obtain an undirected mutual calling network. The preferential communication behavior between two connected users can be statistically tested and it results in two Bonferroni networks with statistically validated edges. We perform a comparative analysis of the statistical properties of these four networks, which are constructed from the calling records of more than nine million individuals in Shanghai over a period of 110 days. We find that these networks share many common structural properties and also exhibit idiosyncratic features when compared with previously studied large mobile calling networks. The empirical findings provide us an intriguing picture of a representative large social network that might shed new lights on the modelling of large social networks.

  10. Cost Benefit Analysis of Utilising Mobile Nodes in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2015-01-01

    Mobile nodes have been found useful for improving performance of network parameters such as coverage, data latency and load balancing in wireless sensor networks (WSNs). In spite of the benets which mobile nodes could oer when used in WSNs, they have been often stated as infeasible for use...

  11. Green collaboration in cognitive radio cellular networks with roaming and spectrum trading

    KAUST Repository

    Sboui, Lokman; Ghazzai, Hakim; Rezki, Zouheir; Alouini, Mohamed-Slim

    2015-01-01

    In this paper, we propose a new cognitive cellular network architecture based on the coexistence of primary and secondary networks, (PN) and (SN), respectively. The PN aims to minimize its energy consumption by switching off the maximum number

  12. The wireless networking system of Earthquake precursor mobile field observation

    Science.gov (United States)

    Wang, C.; Teng, Y.; Wang, X.; Fan, X.; Wang, X.

    2012-12-01

    The mobile field observation network could be real-time, reliably record and transmit large amounts of data, strengthen the physical signal observations in specific regions and specific period, it can improve the monitoring capacity and abnormal tracking capability. According to the features of scatter everywhere, a large number of current earthquake precursor observation measuring points, networking technology is based on wireless broadband accessing McWILL system, the communication system of earthquake precursor mobile field observation would real-time, reliably transmit large amounts of data to the monitoring center from measuring points through the connection about equipment and wireless accessing system, broadband wireless access system and precursor mobile observation management center system, thereby implementing remote instrument monitoring and data transmition. At present, the earthquake precursor field mobile observation network technology has been applied to fluxgate magnetometer array geomagnetic observations of Tianzhu, Xichang,and Xinjiang, it can be real-time monitoring the working status of the observational instruments of large area laid after the last two or three years, large scale field operation. Therefore, it can get geomagnetic field data of the local refinement regions and provide high-quality observational data for impending earthquake tracking forecast. Although, wireless networking technology is very suitable for mobile field observation with the features of simple, flexible networking etc, it also has the phenomenon of packet loss etc when transmitting a large number of observational data due to the wireless relatively weak signal and narrow bandwidth. In view of high sampling rate instruments, this project uses data compression and effectively solves the problem of data transmission packet loss; Control commands, status data and observational data transmission use different priorities and means, which control the packet loss rate within

  13. Space Mobile Network: A Near Earth Communication and Navigation Architecture

    Science.gov (United States)

    Israel, Dave J.; Heckler, Greg; Menrad, Robert J.

    2016-01-01

    This paper describes a Space Mobile Network architecture, the result of a recently completed NASA study exploring architectural concepts to produce a vision for the future Near Earth communications and navigation systems. The Space Mobile Network (SMN) incorporates technologies, such as Disruption Tolerant Networking (DTN) and optical communications, and new operations concepts, such as User Initiated Services, to provide user services analogous to a terrestrial smartphone user. The paper will describe the SMN Architecture, envisioned future operations concepts, opportunities for industry and international collaboration and interoperability, and technology development areas and goals.

  14. A Novel WLAN Roaming Decision and Selection Scheme for Mobile Data Offloading

    Directory of Open Access Journals (Sweden)

    Nam Nguyen

    2015-01-01

    Full Text Available The existing IEEE and 3GPP standards have laid the foundation for integrating cellular and WiFi network to deliver a seamless experience for the end-users when roaming across multiple access networks. However, in recent studies, the issue of making roaming decision and intelligently selecting the most preferable Point of Service to optimize network resource and improve end user’s experience has not been considered properly. In this paper, we propose a novel cellular and WiFi roaming decision and AP selection scheme based on state of the art, 3GPP TS24.312 and IEEE 802.11u, k standards. Our proposed scheme assists the mobile nodes to decide the right timing to make roaming decision and select preferable point of service based on the operator’s policies and real-time network condition. We also introduce our simulation model of a heterogeneous network with cellular and WiFi interworking as well as 3GPP ANDSF, TS24.312. It is a complete end-to-end system model from application to physical layer with considering user’s mobility and realistic traffic model. The proposed scheme outperformed the conventional WiFi selection scheme in terms of dynamically steering mobile node’s data traffic from macrocell to available Access Points. The proposed scheme increased the utilization and balanced the traffic load of access points and improved user’s experienced throughput.

  15. Role of Distance-Based Routing in Traffic Dynamics on Mobile Networks

    Science.gov (United States)

    Yang, Han-Xin; Wang, Wen-Xu

    2013-06-01

    Despite of intensive investigations on transportation dynamics taking place on complex networks with fixed structures, a deep understanding of networks consisting of mobile nodes is challenging yet, especially the lacking of insight into the effects of routing strategies on transmission efficiency. We introduce a distance-based routing strategy for networks of mobile agents toward enhancing the network throughput and the transmission efficiency. We study the transportation capacity and delivering time of data packets associated with mobility and communication ability. Interestingly, we find that the transportation capacity is optimized at moderate moving speed, which is quite different from random routing strategy. In addition, both continuous and discontinuous transitions from free flow to congestions are observed. Degree distributions are explored in order to explain the enhancement of network throughput and other observations. Our work is valuable toward understanding complex transportation dynamics and designing effective routing protocols.

  16. PV-Powered CoMP-Based Green Cellular Networks with a Standby Grid Supply

    Directory of Open Access Journals (Sweden)

    Abu Jahid

    2017-01-01

    Full Text Available This paper proposes a novel framework for PV-powered cellular networks with a standby grid supply and an essential energy management technique for achieving envisaged green networks. The proposal considers an emerging cellular network architecture employing two types of coordinated multipoint (CoMP transmission techniques for serving the subscribers. Under the proposed framework, each base station (BS is powered by an individual PV solar energy module having an independent storage device. BSs are also connected to the conventional grid supply for meeting additional energy demand. We also propose a dynamic inter-BS solar energy sharing policy through a transmission line for further greening the proposed network by minimizing the consumption from the grid supply. An extensive simulation-based study in the downlink of a Long-Term Evolution (LTE cellular system is carried out for evaluating the energy efficiency performance of the proposed framework. System performance is also investigated for identifying the impact of various system parameters including storage factor, storage capacity, solar generation capacity, transmission line loss, and different CoMP techniques.

  17. Finding the Sweet Spot: Network Structures and Processes for Increased Knowledge Mobilization

    Directory of Open Access Journals (Sweden)

    Patricia Briscoe

    2016-06-01

    Full Text Available The use of networks in public education is one of a number of knowledge mobilization (KMb strategies utilized to promote evidence-based research into practice. However, challenges exist in the ability to effectively mobilizing knowledge through external partnership networks. The purpose of this paper is to further explore how networks work. Data was collected from virtual discussions for an interim report for a province-wide government initiative. A secondary analysis of the data was performed. The findings present network structures and processes that partners were engaged in when building a network within education. The implications of this study show that building a network for successful outcomes is complex and metaphorically similar to finding the “sweet spot.” It is challenging but networks that used strategies to align structures and processes proved to achieve more success in mobilizing research to practice.

  18. Detection of silent cells, synchronization and modulatory activity in developing cellular networks.

    NARCIS (Netherlands)

    Hjorth, J.J.J.; Dawitz, J.; Kroon, T.; da Silva Dias Pires, J.H.; Dassen, V.J.; Berkhout, J.A.; Emperador Melero, J.; Nadadhur, A.G.; Alevra, M.; Toonen, R.F.G.; Heine, V.M.; Mansvelder, H.D.; Meredith, R.M.

    2016-01-01

    Developing networks in the immature nervous system and in cellular cultures are characterized by waves of synchronous activity in restricted clusters of cells. Synchronized activity in immature networks is proposed to regulate many different developmental processes, from neuron growth and cell

  19. Mobility support and networking for women in STEM

    Science.gov (United States)

    Avellis, Giovanna; Didenkulova, Ira

    2017-04-01

    Mobility support for women in STEM (Science, Technology, Engineering and Mathematics) career is an increasingly important issue in today's world. Cutting edge research tends to be undertaken via international collaboration, often within networks built up by moving to a new country. In addition, many of today's funding opportunities are geared towards international cooperation. There have been quite a few debates and several projects based on extended surveys to understand the role and impact of mobility on a scientific career. Although in general it is true that these issues are sensitive to the country and the scientific field for example, it is believed by the scientific community at least, that there is a connection between mobility and scientific excellence. Rewarding mobility is becoming a concern at the European level because mechanisms to measure in the best and objective way possible scientific excellence are not homogeneous. But still mobility is a key issue to strengthen a researcher's scientific curriculum and be recognised at the international level. Women have been widely recognised as a source of untapped potential. Different steps have been taken so far for a deeper understanding of barriers and different obstacles faced by women in the Science field. Present calls in the Science in Society panel in HORIZON 2020 deal with the horizontal and vertical segregation experienced by women in their careers and best practices to manage these issues. The general aim is to foster women participation in all scientific fields with particular regard to male dominated disciplines as STEM and increase the number and the effective representation of women in decision-making positions, to help also speed up the whole process. Mobility has demonstrated to be partly gender sensitive and this needs to be addressed in some way in order to ensure at least equal opportunities to male and female scientists regarding possibilities and benefits offered by mobility programmes

  20. Java-based mobile agent platforms for wireless sensor networks

    NARCIS (Netherlands)

    Aiello, F.; Carbone, A.; Fortino, G.; Galzarano, S.; Ganzha, M.; Paprzycki, M.

    2010-01-01

    This paper proposes an overview and comparison of mobile agent platforms for the development of wireless sensor network applications. In particular, the architecture, programming model and basic performance of two Java-based agent platforms, Mobile Agent Platform for Sun SPOT (MAPS) and Agent

  1. Capacity, delay and mobility in wireless ad-hoc networks

    NARCIS (Netherlands)

    Bansal, N.; Liu, Z.

    2003-01-01

    Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been shown to increase the capacity of a network, it is not clear whether the delay can be kept low without trading off the throughput. We

  2. A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications

    OpenAIRE

    Wang, Shuo; Zhang, Xing; Zhang, Yan; Wang, Lin; Yang, Juwo; Wang, Wenbo

    2017-01-01

    As the explosive growth of smart devices and the advent of many new applications, traffic volume has been growing exponentially. The traditional centralized network architecture cannot accommodate such user demands due to heavy burden on the backhaul links and long latency. Therefore, new architectures which bring network functions and contents to the network edge are proposed, i.e., mobile edge computing and caching. Mobile edge networks provide cloud computing and caching capabilities at th...

  3. IF-MANET: Interoperable framework for heterogeneous mobile ad hoc networks

    OpenAIRE

    Hassan, H.

    2015-01-01

    The advances in low power micro-processors, wireless networks and embedded systems have raised the need to utilize the significant resources of mobile devices. These devices for example, smart phones, tablets, laptops, wearables, and sensors are gaining enormous processing power, storage capacity and wireless bandwidth. In addition, the advancement in wireless mobile technology has created a new communication paradigm via which a wireless network can be created without any priori infrastructu...

  4. Fast Deploy Radiation Monitoring Array Emergency Solution Based on GPS and Cellular Network

    International Nuclear Information System (INIS)

    Vax, E.; Broide, A.; Manor, A.; Marcus, E.; Seif, R.; Nir, J.; Kadmon, Y.; Sattinger, D.; Levinson, S.; Tal, N.

    2004-01-01

    Radiation monitoring of a possible contaminating source is highly important for safety and risk analysis. Since the monitoring must cover the whole contaminated area, the standard solution is to scatter an array of numerous fixed detectors in advance. The Fast Deploy Radiation Monitoring Array (FDRMA) is a solution that does not require coverage of the entire area. The FDRMA is a compact, world wide applicative, seamless and novel solution, designed for emergency cases. The system consists of GPS and IP cellular network, which make it mobile and therefore suitable for global use. The most significant advantage of the FDRMA system is minimizing the exposure time of the monitoring teams, while maintaining flexibility of the deployment area, as opposed to the Vehicle Monitoring System (VMS) [1] or the standard solution mentioned above. A detailed description of the proposed FDRMA system and its comparison to a fixed detectors' array is presented in this work

  5. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-01-01

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches. PMID:29439439

  6. Who's calling? Social networks and mobile phone use among motorcyclists.

    Science.gov (United States)

    De Gruyter, Chris; Truong, Long T; Nguyen, Hang T T

    2017-06-01

    Mobile phone use while riding a motorcycle poses a key safety risk, particularly among younger people who have been found to be more susceptible to distracted driving. While previous research has examined the influence of social networks on mobile phone use while driving a car, no research has explored this association in the context of motorcycle use. Using a survey of university students in Vietnam, this research explores the association between social networks and mobile phone use among motorcyclists and the links this has to reported crashes/falls. Results show that the majority of students are most likely to use a mobile phone to communicate with a friend while riding, either through talking (56.5%) or text messaging (62.0%). However, respondents who frequently talk to a girlfriend/boyfriend or spouse while riding were more likely to experience a crash/fall than those who frequently talk with others while riding (e.g. parent, brother/sister). In addition, those who frequently text message a friend while riding were more likely to experience a crash/fall than those who frequently text message others while riding. The results highlight a clear association between social networks and mobile phone use while riding a motorcycle. Developing a culture of societal norms, where mobile phone use while riding a motorcycle is considered socially unacceptable, will help to reduce the prevalence and ultimate crash risk associated with mobile phone use while riding. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shibo Luo

    2015-12-01

    Full Text Available Software-Defined Networking-based Mobile Networks (SDN-MNs are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  8. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.

    Science.gov (United States)

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-12-17

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  9. Biomedical sensing analyzer (BSA) for mobile-health (mHealth)-LTE.

    Science.gov (United States)

    Adibi, Sasan

    2014-01-01

    The rapid expansion of mobile-based systems, the capabilities of smartphone devices, as well as the radio access and cellular network technologies are the wind beneath the wing of mobile health (mHealth). In this paper, the concept of biomedical sensing analyzer (BSA) is presented, which is a novel framework, devised for sensor-based mHealth applications. The BSA is capable of formulating the Quality of Service (QoS) measurements in an end-to-end sense, covering the entire communication path (wearable sensors, link-technology, smartphone, cell-towers, mobile-cloud, and the end-users). The characterization and formulation of BSA depend on a number of factors, including the deployment of application-specific biomedical sensors, generic link-technologies, collection, aggregation, and prioritization of mHealth data, cellular network based on the Long-Term Evolution (LTE) access technology, and extensive multidimensional delay analyses. The results are studied and analyzed in a LabView 8.5 programming environment.

  10. Improving the security of the Hwang-Su protocol for mobile networks ...

    African Journals Online (AJOL)

    The mobile networks are experiencing a growing success. This success is mainly due to the fact that these networks providing the mobility of users, the transmission of data through open air and the requirement of low power. But, it is threatened by weak security, especially at the level of authentication. Hwang and Su have ...

  11. Cloud RAN for Mobile Networks - a Technology Overview

    DEFF Research Database (Denmark)

    Checko, Aleksandra; Christiansen, Henrik Lehrmann; Yan, Ying

    2014-01-01

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges the operators face while trying to support growing end-user’s needs. The main idea behind C-RAN is to pool the Baseband Units (BBUs) from multiple base stations into centralized BBU...

  12. On the holistic approach in cellular and cancer biology: nonlinearity, complexity, and quasi-determinism of the dynamic cellular network.

    Science.gov (United States)

    Waliszewski, P; Molski, M; Konarski, J

    1998-06-01

    A keystone of the molecular reductionist approach to cellular biology is a specific deductive strategy relating genotype to phenotype-two distinct categories. This relationship is based on the assumption that the intermediary cellular network of actively transcribed genes and their regulatory elements is deterministic (i.e., a link between expression of a gene and a phenotypic trait can always be identified, and evolution of the network in time is predetermined). However, experimental data suggest that the relationship between genotype and phenotype is nonbijective (i.e., a gene can contribute to the emergence of more than just one phenotypic trait or a phenotypic trait can be determined by expression of several genes). This implies nonlinearity (i.e., lack of the proportional relationship between input and the outcome), complexity (i.e. emergence of the hierarchical network of multiple cross-interacting elements that is sensitive to initial conditions, possesses multiple equilibria, organizes spontaneously into different morphological patterns, and is controlled in dispersed rather than centralized manner), and quasi-determinism (i.e., coexistence of deterministic and nondeterministic events) of the network. Nonlinearity within the space of the cellular molecular events underlies the existence of a fractal structure within a number of metabolic processes, and patterns of tissue growth, which is measured experimentally as a fractal dimension. Because of its complexity, the same phenotype can be associated with a number of alternative sequences of cellular events. Moreover, the primary cause initiating phenotypic evolution of cells such as malignant transformation can be favored probabilistically, but not identified unequivocally. Thermodynamic fluctuations of energy rather than gene mutations, the material traits of the fluctuations alter both the molecular and informational structure of the network. Then, the interplay between deterministic chaos, complexity, self

  13. Efficient priority queueing routing strategy on networks of mobile agents

    Science.gov (United States)

    Wu, Gan-Hua; Yang, Hui-Jie; Pan, Jia-Hui

    2018-03-01

    As a consequence of their practical implications for communications networks, traffic dynamics on complex networks have recently captivated researchers. Previous routing strategies for improving transport efficiency have paid little attention to the orders in which the packets should be forwarded, just simply used first-in-first-out queue discipline. Here, we apply a priority queuing discipline and propose a shortest-distance-first routing strategy on networks of mobile agents. Numerical experiments reveal that the proposed scheme remarkably improves both the network throughput and the packet arrival rate and reduces both the average traveling time and the rate of waiting time to traveling time. Moreover, we find that the network capacity increases with an increase in both the communication radius and the number of agents. Our work may be helpful for the design of routing strategies on networks of mobile agents.

  14. Two-terminal reliability analyses for a mobile ad hoc wireless network

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2007-01-01

    Reliability is one of the most important performance measures for emerging technologies. For these systems, shortcomings are often overlooked in early releases as the cutting edge technology overshadows a fragile design. Currently, the proliferation of the mobile ad hoc wireless networks (MAWN) is moving from cutting edge to commodity and thus, reliable performance will be expected. Generally, ad hoc networking is applied for the flexibility and mobility it provides. As a result, military and first responders employ this network scheme and the reliability of the network becomes paramount. To ensure reliability is achieved, one must first be able to analyze and calculate the reliability of the MAWN. This work describes the unique attributes of the MAWN and how the classical analysis of network reliability, where the network configuration is known a priori, can be adjusted to model and analyze this type of network. The methods developed acknowledge the dynamic and scalable nature of the MAWN along with its absence of infrastructure. Thus, the methods rely on a modeling approach that considers the probabilistic formation of different network configurations in a MAWN. Hence, this paper proposes reliability analysis methods that consider the effect of node mobility and the continuous changes in the network's connectivity

  15. Resource Optimization of Mobile Intelligent System with heart MPLS network

    Directory of Open Access Journals (Sweden)

    Mohammed Elkoutbi

    2009-10-01

    Full Text Available In this paper, we introduce the original Mobile Intelligent System (MIS in embeded FPGA architecture. This node will allow the construction of autonomous mobile network units which can move in unknowns, inaccessible or hostile environnement for human being, in order to collect data by various sensors and transmits them by routing to a unit of distant process. In the sake of improving the performance of transmission, we propose a global schema of QoS management using DiffServ/MPLS backbones. We provide an evaluation of several scenarios for combining QoS IP networks with MIS access network. We conclude with a study on interoperability between QoS patterns in access and backbone networks.

  16. Exponential stability of delayed fuzzy cellular neural networks with diffusion

    International Nuclear Information System (INIS)

    Huang Tingwen

    2007-01-01

    The exponential stability of delayed fuzzy cellular neural networks (FCNN) with diffusion is investigated. Exponential stability, significant for applications of neural networks, is obtained under conditions that are easily verified by a new approach. Earlier results on the exponential stability of FCNN with time-dependent delay, a special case of the model studied in this paper, are improved without using the time-varying term condition: dτ(t)/dt < μ

  17. Mobile infostation network technology

    Science.gov (United States)

    Rajappan, Gowri; Acharya, Joydeep; Liu, Hongbo; Mandayam, Narayan; Seskar, Ivan; Yates, Roy

    2006-05-01

    Inefficient use of network resources on the battlefield is a serious liability: if an asset communicates with the network command for data-a terrain map, for instance-it ties up the end-to-end network resources. When many such assets contend for data simultaneously, traffic is limited by the slowest link along the path from the network command to the asset. A better approach is for a local server, known as an infostation, to download data on an anticipated-need basis when the network load is low. The infostation can then dump data when needed to the assets over a high-speed wireless connection. The infostation serves the local assets over an OFDM-based wireless data link that has MIMO enhancements for high data rate and robustness. We aim for data rate in excess of 100 Mbps, spectral efficiency in excess of 5 bits/sec/Hz, and robustness to poor channel conditions and jammers. We propose an adaptive physical layer that determines power levels, modulation schemes, and the MIMO enhancements to use based on the channel state and the level of interference in the system. We also incorporate the idea of superuser: a user who is allowed preferential use of the high data rate link. We propose a MAC that allows for this priority-based bandwidth allocation scheme. The proposed infostation MAC is integrated tightly with the physical layer through a cross-layer design. We call the proposed infostation PHY, MAC, and network technology, collectively, as the Mobile Infostation Network Technology (MINT).

  18. Performance Analysis of SINEMO: Seamless IP-diversity Based Network Mobility

    National Research Council Canada - National Science Library

    Chowdhury, Pulak K; Reaz, Abu S; Atiquzzaman, Mohammed; Ivancic, William

    2007-01-01

    ...) to support network mobility. NEMO BSP inherits all the drawbacks of Mobile IPv6, such as inefficient routing path, single point of failure, high handover latency and packet loss, and high packet overhead...

  19. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  20. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents.

    Science.gov (United States)

    Wu, Chunxue; Wu, Wenliang; Wan, Caihua; Bekkering, Ernst; Xiong, Naixue

    2017-11-03

    Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  1. Mobility and power in networked European space

    DEFF Research Database (Denmark)

    Richardson, Tim; Jensen, Ole B.

    This paper seeks to contribute to debates about how urban, social and critical theory can conceptualise the socio-technologies of connection, resilience, mobility, and collapse in contemporary urban space. The paper offers a theoretical frame for conceptualising this New Urban Condition, focusing...... on themes of mobility, power, flow, network and scale. The analysis suggests the importance of close atention to the knowledge claims which are deployed in multi-level struggles to assert smooth futures in face of dysfunction....

  2. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    Science.gov (United States)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  3. Validation of Bosch' Mobile Communication NetworkArchitecture with SPIN

    NARCIS (Netherlands)

    Ruys, T.C.; Langerak, Romanus

    This paper discusses validation projects carried out for the Mobile Communication Division of Robert Bosch GmbH. We verified parts of their Mobile Communication Network (MCNet), a communication system which is to be used in infotainment systems of future cars. The protocols of the MCNet have been

  4. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2015-09-01

    Full Text Available Network security is one of the most important issues in mobile sensor networks (MSNs. Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA is proposed to resist malicious attacks by using mobile nodes’ dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  5. RACOON: a multiuser QoS design for mobile wireless body area networks.

    Science.gov (United States)

    Cheng, Shihheng; Huang, Chingyao; Tu, Chun Chen

    2011-10-01

    In this study, Random Contention-based Resource Allocation (RACOON) medium access control (MAC) protocol is proposed to support the quality of service (QoS) for multi-user mobile wireless body area networks (WBANs). Different from existing QoS designs that focus on a single WBAN, a multiuser WBAN QoS should further consider both inter-WBAN interference and inter-WBAN priorities. Similar problems have been studied in both overlapped wireless local area networks (WLANs) and Bluetooth piconets that need QoS supports. However, these solutions are designed for non-medical transmissions that do not consider any priority scheme for medical applications. Most importantly, these studies focus on only static or low mobility networks. Network mobility of WBANs will introduce unnecessary inter-network collisions and energy waste, which are not considered by these solutions. The proposed multiuser-QoS protocol, RACOON, simultaneously satisfies the inter WBAN QoS requirements and overcomes the performance degradation caused by WBAN mobility. Simulation results verify that RACOON provides better latency and energy control, as compared with WBAN QoS protocols without considering the inter-WBAN requirements.

  6. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    Science.gov (United States)

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  7. Design of Optimized Multimedia Data Streaming Management Using OMDSM over Mobile Networks

    Directory of Open Access Journals (Sweden)

    Byungjoo Park

    2017-01-01

    Full Text Available Mobility management is an essential challenge for supporting reliable multimedia data streaming over wireless and mobile networks in the Internet of Things (IoT for location-based mobile marketing applications. The communications among mobile nodes for IoT need to have a seamless handover for delivering high quality multimedia services. The Internet Engineering Task Force (IETF mobility management schemes are the proposals for handling the routing of IPv6 packets to mobile nodes that have moved away from their home network. However, the standard mobility management scheme cannot prevent packet losses due to longer handover latency. In this article, a new enhanced data streaming route optimization scheme is introduced that uses an optimized Transmission Control Protocol (TCP realignment algorithm in order to prevent the packet disordering problem whenever the nodes in the IoT environment are communicating with each other. With the proposed scheme, data packets sequence realignment can be prevented, the packet traffic speed can be controlled, and the TCP performance can be improved. The experimental results show that managing the packet order in proposed new scheme remarkably increases the overall TCP performance over mobile networks within the IoT environment thus ensuring the high quality of service (QoS for multimedia data streaming in location-based mobile marketing applications.

  8. STUDY OF PRESERVING PRIVACY IN MOBILE SOCIAL NETWORK BY PERSONALIZATION OF FINE GRAINED SPAM FILTERING SCHEME

    OpenAIRE

    S. B. GHATTE , A. B. RAJMANE

    2018-01-01

    Mobile social-networking is a social networking where people with similar interests connect to their social communities with a mobile device. Mobile users share various types of information, such as newsletters, advertisements, experiences, interests, opinions and personal content through their mobile devices. Because of Mobile social network (MSN) it is possible for mobile users to share information in the near area and makes their cyber–physical–social interaction easier.

  9. A learning algorithm for oscillatory cellular neural networks.

    Science.gov (United States)

    Ho, C Y.; Kurokawa, H

    1999-07-01

    We present a cellular type oscillatory neural network for temporal segregation of stationary input patterns. The model comprises an array of locally connected neural oscillators with connections limited to a 4-connected neighborhood. The architecture is reminiscent of the well-known cellular neural network that consists of local connection for feature extraction. By means of a novel learning rule and an initialization scheme, global synchronization can be accomplished without incurring any erroneous synchrony among uncorrelated objects. Each oscillator comprises two mutually coupled neurons, and neurons share a piecewise-linear activation function characteristic. The dynamics of traditional oscillatory models is simplified by using only one plastic synapse, and the overall complexity for hardware implementation is reduced. Based on the connectedness of image segments, it is shown that global synchronization and desynchronization can be achieved by means of locally connected synapses, and this opens up a tremendous application potential for the proposed architecture. Furthermore, by using special grouping synapses it is demonstrated that temporal segregation of overlapping gray-level and color segments can also be achieved. Finally, simulation results show that the learning rule proposed circumvents the problem of component mismatches, and hence facilitates a large-scale integration.

  10. Strategies for a better performance of RPL under mobility in wireless sensor networks

    Science.gov (United States)

    Latib, Z. A.; Jamil, A.; Alduais, N. A. M.; Abdullah, J.; Audah, L. H. M.; Alias, R.

    2017-09-01

    A Wireless Sensor Network (WSN) is usually stationary, which the network comprises of static nodes. The increase demand for mobility in various applications such as environmental monitoring, medical, home automation, and military, raises the question how IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) would perform under these mobility applications. This paper aims to understand performance of RPL and come out with strategies for a better performance of RPL in mobility scenarios. Because of this, this paper evaluates the performance of the RPL protocol under three different scenarios: sink and sensor nodes are static, static sink and mobile sensor nodes, and sink and sensor nodes are mobile. The network scenarios are implemented in Cooja simulator. A WSN consists of 25 sensor nodes and one sink node is configured in the simulation environment. The simulation is varied over different packet rates and ContikiMAC's Clear Channel Assessment (CCA) rate. As the performance metric, RPL is evaluated in term of packet delivery ratio (PDR), power consumption and packet rates. The simulation results show RPL provides a poor PDR in the mobility scenarios when compared to the static scenario. In addition, RPL consumes more power and increases duty-cycle rate to support mobility when compared to the static scenario. Based on the findings, we suggest three strategies for a better performance of RPL in mobility scenarios. First, RPL should operates at a lower packet rates when implemented in the mobility scenarios. Second, RPL should be implemented with a higher duty-cycle rate. Lastly, the sink node should be positioned as much as possible in the center of the mobile network.

  11. On mode selection and power control for uplink D2D communication in cellular networks

    KAUST Repository

    Ali, Konpal S.

    2015-06-08

    Device-to-device (D2D) communication enables users lying in close proximity to bypass the cellular base station (BS) and transmit to one another directly. This offloads traffic from the cellular network, improves spatial frequency reuse and energy efficiency in the network. We present a comprehensive and tractable analytical framework for D2D-enabled uplink cellular networks with two different flexible mode-selection schemes. The power-control cutoff thresholds of the two communication modes have been decoupled unlike past work on the subject. We find that for a given network, an optimal value exists not only for the biased mode selection criterion, but also for r, the ratio of the power-control cutoff thresholds of the two communication modes, which maximizes spatial spectral efficiency. Also, r turns out to be a more robust parameter for optimizing network performance. Further, it is shown that the second scheme, which prioritizes spatial frequency reuse over the per-user achievable performance compared to the first scheme, achieves almost the same overall network performance; thereby trading per user performance to serve a larger number of users.

  12. On mode selection and power control for uplink D2D communication in cellular networks

    KAUST Repository

    Ali, Konpal S.; Elsawy, Hesham; Alouini, Mohamed-Slim

    2015-01-01

    Device-to-device (D2D) communication enables users lying in close proximity to bypass the cellular base station (BS) and transmit to one another directly. This offloads traffic from the cellular network, improves spatial frequency reuse and energy efficiency in the network. We present a comprehensive and tractable analytical framework for D2D-enabled uplink cellular networks with two different flexible mode-selection schemes. The power-control cutoff thresholds of the two communication modes have been decoupled unlike past work on the subject. We find that for a given network, an optimal value exists not only for the biased mode selection criterion, but also for r, the ratio of the power-control cutoff thresholds of the two communication modes, which maximizes spatial spectral efficiency. Also, r turns out to be a more robust parameter for optimizing network performance. Further, it is shown that the second scheme, which prioritizes spatial frequency reuse over the per-user achievable performance compared to the first scheme, achieves almost the same overall network performance; thereby trading per user performance to serve a larger number of users.

  13. Energy Efficient Evolution of Mobile Networks

    DEFF Research Database (Denmark)

    Micallef, Gilbert; Mogensen, Preben

    2011-01-01

    options for how to evolve their networks, allowing them to carry the expected increase in traffic. The best solution is generally selected based on two main criteria, performance and cost. However, pushed by a variety of environmental and energy challenges, MNOs are now also showing interest...... in understanding the impact that different options can have on the energy consumption of their networks. This paper investigates the possible energy gains of evolving a mobile network through a joint pico deployment and macro upgrade solution over a period of 8 years. Besides the network energy consumption, energy...... efficiency in Mbps/kWh is also analyzed. Furthermore, a cost analysis is carried out, to give a more complete picture of the different options being considered. Focusing on the last year of the evolution analysis, results show that deploying more pico sites reduces the energy consumption of the network...

  14. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    OpenAIRE

    Bonné, Bram; Rovelo Ruiz, Gustavo; Quax, Peter; Lamotte, Wim

    2017-01-01

    Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the partici...

  15. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  16. Near-Optimal Resource Allocation in Cooperative Cellular Networks Using Genetic Algorithms

    OpenAIRE

    Luo, Zihan; Armour, Simon; McGeehan, Joe

    2015-01-01

    This paper shows how a genetic algorithm can be used as a method of obtaining the near-optimal solution of the resource block scheduling problem in a cooperative cellular network. An exhaustive search is initially implementedto guarantee that the optimal result, in terms of maximizing the bandwidth efficiency of the overall network, is found, and then the genetic algorithm with the properly selected termination conditions is used in the same network. The simulation results show that the genet...

  17. An energy efficient multiple mobile sinks based routing algorithm for wireless sensor networks

    Science.gov (United States)

    Zhong, Peijun; Ruan, Feng

    2018-03-01

    With the fast development of wireless sensor networks (WSNs), more and more energy efficient routing algorithms have been proposed. However, one of the research challenges is how to alleviate the hot spot problem since nodes close to static sink (or base station) tend to die earlier than other sensors. The introduction of mobile sink node can effectively alleviate this problem since sink node can move along certain trajectories, causing hot spot nodes more evenly distributed. In this paper, we mainly study the energy efficient routing method with multiple mobile sinks support. We divide the whole network into several clusters and study the influence of mobile sink number on network lifetime. Simulation results show that the best network performance appears when mobile sink number is about 3 under our simulation environment.

  18. Large Scale Experiments of Multihop Networks in Mobile Scenarios

    Directory of Open Access Journals (Sweden)

    Yacine Benchaïb

    2016-03-01

    Full Text Available This paper presents the latest advances in our research work focused on VIRMANEL and SILUMOD, a couple of tools developed for research in wireless mobile multihop networks. SILUMOD is a domain specific language dedicated to the definition of mobility models. This language contains key- words and special operators that make it easy to define a mobility model and calculate the positions of a trajectory. These positions are sent to VIRMANEL, a tool that man- ages virtual machines corresponding to mobile nodes, emu- lates their movements and the resulting connections and dis- connections, and displays the network evolution to the user, thanks to its graphical user interface. The virtualization ap- proach we take here allows to run real code and to test real protocol implementations without deploying an important experimental platform. For the experimentation of a large number of virtual mobile nodes, we defined and implemented a new algorithm for the nearest neighbor search to find the nodes that are within communication range. We then car- ried out a considerable measurement campaign in order to evaluate the performance of this algorithm. The results show that even with an experiment using a large number of mobile nodes, our algorithm make it possible to evaluate the state of connectivity between mobile nodes within a reasonable time and number of operations.

  19. IMPROVING THE TRANSMISSION PERFORMANCE BASED ON MINIMIZING ENERGY IN MOBILE ADHOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Gundala Swathi

    2015-06-01

    Full Text Available Networking is collectively no of mobile nodes allocate users to correctly detect a distant environment. These wireless mobile networks want strong but simple, scalable, energy efficient and also self organize routing algorithms. In Mobile technology small quantity of power electronics and less power radio frequency have permit the expansion of small, comparatively economical and less power nodes, are associated in a wireless mobile networkIn this study we proposed method are: energy effectiveness, energetic occurrence zone and multiple hop TRANSMIT, taking into concern between the energy of transmit nodes and distance from the transmit node to the trusted neighbor node, link weight energy utilization and distance are measured as most important constraint for decide on greatest possible path from Zone Head (ZH to the neighbor node. In this we use the different constraints and lessen the quantity of distribution messages during the Transmit node choice point to decrease the energy utilization of the complete network.

  20. Modeling and Analysis of Hybrid Cellular/WLAN Systems with Integrated Service-Based Vertical Handoff Schemes

    Science.gov (United States)

    Xia, Weiwei; Shen, Lianfeng

    We propose two vertical handoff schemes for cellular network and wireless local area network (WLAN) integration: integrated service-based handoff (ISH) and integrated service-based handoff with queue capabilities (ISHQ). Compared with existing handoff schemes in integrated cellular/WLAN networks, the proposed schemes consider a more comprehensive set of system characteristics such as different features of voice and data services, dynamic information about the admitted calls, user mobility and vertical handoffs in two directions. The code division multiple access (CDMA) cellular network and IEEE 802.11e WLAN are taken into account in the proposed schemes. We model the integrated networks by using multi-dimensional Markov chains and the major performance measures are derived for voice and data services. The important system parameters such as thresholds to prioritize handoff voice calls and queue sizes are optimized. Numerical results demonstrate that the proposed ISHQ scheme can maximize the utilization of overall bandwidth resources with the best quality of service (QoS) provisioning for voice and data services.

  1. Handoff Rate and Coverage Analysis in Multi-tier Heterogeneous Networks

    OpenAIRE

    Sadr, Sanam; Adve, Raviraj S.

    2015-01-01

    This paper analyzes the impact of user mobility in multi-tier heterogeneous networks. We begin by obtaining the handoff rate for a mobile user in an irregular cellular network with the access point locations modeled as a homogeneous Poisson point process. The received signal-to-interference-ratio (SIR) distribution along with a chosen SIR threshold is then used to obtain the probability of coverage. To capture potential connection failures due to mobility, we assume that a fraction of handoff...

  2. Verification of mobile ad hoc networks : an algebraic approach

    NARCIS (Netherlands)

    Ghassemi, F.; Fokkink, W.J.; Movaghar, A.

    2011-01-01

    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled

  3. A novel approach to Service Discovery in Mobile Adhoc Network

    OpenAIRE

    Islam, Noman; Shaikh, Zubair A.

    2015-01-01

    Mobile Adhoc Network (MANET) is a network of a number of mobile routers and associated hosts, organized in a random fashion via wireless links. During recent years MANET has gained enormous amount of attention and has been widely used for not only military purposes but for search-and-rescue operations, intelligent transportation system, data collection, virtual classrooms and ubiquitous computing. Service Discovery is one of the most important issues in MANET. It is defined as the process of ...

  4. Modeling cellular networks in fading environments with dominant specular components

    KAUST Repository

    Alammouri, Ahmad; Elsawy, Hesham; Salem, Ahmed Sultan; Di Renzo, Marco; Alouini, Mohamed-Slim

    2016-01-01

    to the Nakagami-m fading in some special cases. However, neither the Rayleigh nor the Nakagami-m accounts for dominant specular components (DSCs) which may appear in realistic fading channels. In this paper, we present a tractable model for cellular networks

  5. Global exponential stability of fuzzy cellular neural networks with delays and reaction-diffusion terms

    International Nuclear Information System (INIS)

    Wang Jian; Lu Junguo

    2008-01-01

    In this paper, we study the global exponential stability of fuzzy cellular neural networks with delays and reaction-diffusion terms. By constructing a suitable Lyapunov functional and utilizing some inequality techniques, we obtain a sufficient condition for the uniqueness and global exponential stability of the equilibrium solution for a class of fuzzy cellular neural networks with delays and reaction-diffusion terms. The result imposes constraint conditions on the network parameters independently of the delay parameter. The result is also easy to check and plays an important role in the design and application of globally exponentially stable fuzzy neural circuits

  6. Scripted Mobile Network Routing in a Contested Environment

    National Research Council Canada - National Science Library

    Otto, Anthony R

    2008-01-01

    Mobile wireless network protocols currently run on optimistic routing algorithms, adjusting node connectivity only when the chosen connectivity metrics, such as signal strength, pass beyond minimum thresholds...

  7. A proposed architecture for a satellite-based mobile communications network - The lowest three layers

    Science.gov (United States)

    Yan, T. Y.; Naderi, F. M.

    1986-01-01

    Architecture for a commercial mobile satellite network is proposed. The mobile satellite system (MSS) is composed of a network management center, mobile terminals, base stations, and gateways; the functions of each component are described. The satellite is a 'bent pipe' that performs frequency translations, and it has multiple UHF beams. The development of the MSS design based on the seven-layer open system interconnection model is examined. Consideration is given to the functions of the physical, data link, and network layers and the integrated adaptive mobile access protocol.

  8. User-Adapted Recommendation of Content on Mobile Devices Using Bayesian Networks

    Science.gov (United States)

    Iwasaki, Hirotoshi; Mizuno, Nobuhiro; Hara, Kousuke; Motomura, Yoichi

    Mobile devices, such as cellular phones and car navigation systems, are essential to daily life. People acquire necessary information and preferred content over communication networks anywhere, anytime. However, usability issues arise from the simplicity of user interfaces themselves. Thus, a recommendation of content that is adapted to a user's preference and situation will help the user select content. In this paper, we describe a method to realize such a system using Bayesian networks. This user-adapted mobile system is based on a user model that provides recommendation of content (i.e., restaurants, shops, and music that are suitable to the user and situation) and that learns incrementally based on accumulated usage history data. However, sufficient samples are not always guaranteed, since a user model would require combined dependency among users, situations, and contents. Therefore, we propose the LK method for modeling, which complements incomplete and insufficient samples using knowledge data, and CPT incremental learning for adaptation based on a small number of samples. In order to evaluate the methods proposed, we applied them to restaurant recommendations made on car navigation systems. The evaluation results confirmed that our model based on the LK method can be expected to provide better generalization performance than that of the conventional method. Furthermore, our system would require much less operation than current car navigation systems from the beginning of use. Our evaluation results also indicate that learning a user's individual preference through CPT incremental learning would be beneficial to many users, even with only a few samples. As a result, we have developed the technology of a system that becomes more adapted to a user the more it is used.

  9. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  10. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  11. Device-to-Device Underlay Cellular Networks with Uncertain Channel State Information

    KAUST Repository

    Memmi, Amen

    2016-01-06

    Device-to-Device (D2D) communications underlying the cellular infrastructure is a technology that has recently been proposed as a promising solution to enhance cellular network capabilities: It improves spectrum utilization, overall throughput and energy efficiency while enabling new peer-to-peer and location-based applications and services. However, interference is the major challenge since the same resources are shared by both systems. Therefore, interference management techniques are required to keep the interference under control. In this work, in order to mitigate interference, we consider centralized and distributed power control algorithms in a one-cell random network model. Differently from previous works, we are assuming that the channel state information (CSI) may be imperfect and include estimation errors. We evaluate how this uncertainty impacts performances.

  12. A Reinforcement Sensor Embedded Vertical Handoff Controller for Vehicular Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Lin Ma

    2013-11-01

    Full Text Available Vehicular communication platforms that provide real-time access to wireless networks have drawn more and more attention in recent years. IEEE 802.11p is the main radio access technology that supports communication for high mobility terminals, however, due to its limited coverage, IEEE 802.11p is usually deployed by coupling with cellular networks to achieve seamless mobility. In a heterogeneous cellular/802.11p network, vehicular communication is characterized by its short time span in association with a wireless local area network (WLAN. Moreover, for the media access control (MAC scheme used for WLAN, the network throughput dramatically decreases with increasing user quantity. In response to these compelling problems, we propose a reinforcement sensor (RFS embedded vertical handoff control strategy to support mobility management. The RFS has online learning capability and can provide optimal handoff decisions in an adaptive fashion without prior knowledge. The algorithm integrates considerations including vehicular mobility, traffic load, handoff latency, and network status. Simulation results verify that the proposed algorithm can adaptively adjust the handoff strategy, allowing users to stay connected to the best network. Furthermore, the algorithm can ensure that RSUs are adequate, thereby guaranteeing a high quality user experience.

  13. Analyzing the impact of relay station characteristics on uplink performance in cellular network

    NARCIS (Netherlands)

    Dimitrova, D.C.; van den Berg, Hans Leo; Heijenk, Geert

    2009-01-01

    Uplink users in cellular networks, such as UMTS/ HSPA, located at the edge of the cell generally suffer from poor channel conditions. Deploying intermediate relay nodes is seen as a promising approach towards extending cell coverage. This paper focuses on the role of packet scheduling in cellular

  14. Neural Networks in Mobile Robot Motion

    Directory of Open Access Journals (Sweden)

    Danica Janglová

    2004-03-01

    Full Text Available This paper deals with a path planning and intelligent control of an autonomous robot which should move safely in partially structured environment. This environment may involve any number of obstacles of arbitrary shape and size; some of them are allowed to move. We describe our approach to solving the motion-planning problem in mobile robot control using neural networks-based technique. Our method of the construction of a collision-free path for moving robot among obstacles is based on two neural networks. The first neural network is used to determine the “free” space using ultrasound range finder data. The second neural network “finds” a safe direction for the next robot section of the path in the workspace while avoiding the nearest obstacles. Simulation examples of generated path with proposed techniques will be presented.

  15. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  16. Power Control for D2D Underlay Cellular Networks with Imperfect CSI

    KAUST Repository

    Memmi, Amen

    2017-02-09

    Device-to-Device communications underlying the cellular infrastructure is a technology that has recently been proposed as a promising solution to enhance cellular network capabilities. However, interference is the major challenge since the same resources are shared by both systems. Therefore, interference management techniques are required to keep the interference under control. In this work, in order to mitigate interference, we consider centralized and distributed power control algorithms in a one-cell random network model. Differently from previous works, we are assuming that the channel state information may be imperfect and include estimation errors. We evaluate how this uncertainty impacts performances. In the centralized approach, we derive the optimal powers that maximize the coverage probability and the rate of the cellular user while scheduling as many D2D links as possible. These powers are computed at the base station (BS) and then delivered to the users, and hence the name

  17. An Asynchronous Recurrent Network of Cellular Automaton-Based Neurons and Its Reproduction of Spiking Neural Network Activities.

    Science.gov (United States)

    Matsubara, Takashi; Torikai, Hiroyuki

    2016-04-01

    Modeling and implementation approaches for the reproduction of input-output relationships in biological nervous tissues contribute to the development of engineering and clinical applications. However, because of high nonlinearity, the traditional modeling and implementation approaches encounter difficulties in terms of generalization ability (i.e., performance when reproducing an unknown data set) and computational resources (i.e., computation time and circuit elements). To overcome these difficulties, asynchronous cellular automaton-based neuron (ACAN) models, which are described as special kinds of cellular automata that can be implemented as small asynchronous sequential logic circuits have been proposed. This paper presents a novel type of such ACAN and a theoretical analysis of its excitability. This paper also presents a novel network of such neurons, which can mimic input-output relationships of biological and nonlinear ordinary differential equation model neural networks. Numerical analyses confirm that the presented network has a higher generalization ability than other major modeling and implementation approaches. In addition, Field-Programmable Gate Array-implementations confirm that the presented network requires lower computational resources.

  18. Network-Coded Content Delivery in Femtocaching-Assisted Cellular Networks

    KAUST Repository

    Shnaiwer, Yousef N.; Sorour, Sameh; Aboutorab, Neda; Sadeghi, Parastoo; Al-Naffouri, Tareq Y.

    2015-01-01

    Next-generation cellular networks are expected to be assisted by femtocaches (FCs), which collectively store the most popular files for the clients. Given any arbitrary non-fragmented placement of such files, a strict no-latency constraint, and clients' prior knowledge, new file download requests could be efficiently handled by both the FCs and the macrocell base station (MBS) using opportunistic network coding (ONC). In this paper, we aim to find the best allocation of coded file downloads to the FCs so as to minimize the MBS involvement in this download process. We first formulate this optimization problem over an ONC graph, and show that it is NP-hard. We then propose a greedy approach that maximizes the number of files downloaded by the FCs, with the goal to reduce the download share of the MBS. This allocation is performed using a dual conflict ONC graph to avoid conflicts among the FC downloads. Simulations show that our proposed scheme almost achieves the optimal performance and significantly saves on the MBS bandwidth.

  19. Network-Coded Content Delivery in Femtocaching-Assisted Cellular Networks

    KAUST Repository

    Shnaiwer, Yousef N.

    2015-12-06

    Next-generation cellular networks are expected to be assisted by femtocaches (FCs), which collectively store the most popular files for the clients. Given any arbitrary non-fragmented placement of such files, a strict no-latency constraint, and clients\\' prior knowledge, new file download requests could be efficiently handled by both the FCs and the macrocell base station (MBS) using opportunistic network coding (ONC). In this paper, we aim to find the best allocation of coded file downloads to the FCs so as to minimize the MBS involvement in this download process. We first formulate this optimization problem over an ONC graph, and show that it is NP-hard. We then propose a greedy approach that maximizes the number of files downloaded by the FCs, with the goal to reduce the download share of the MBS. This allocation is performed using a dual conflict ONC graph to avoid conflicts among the FC downloads. Simulations show that our proposed scheme almost achieves the optimal performance and significantly saves on the MBS bandwidth.

  20. Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents

    Directory of Open Access Journals (Sweden)

    Chunxue Wu

    2017-11-01

    Full Text Available Sensors are increasingly used in mobile environments with wireless network connections. Multiple sensor types measure distinct aspects of the same event. Their measurements are then combined to produce integrated, reliable results. As the number of sensors in networks increases, low energy requirements and changing network connections complicate event detection and measurement. We present a data fusion scheme for use in mobile wireless sensor networks with high energy efficiency and low network delays, that still produces reliable results. In the first phase, we used a network simulation where mobile agents dynamically select the next hop migration node based on the stability parameter of the link, and perform the data fusion at the migration node. Agents use the fusion results to decide if it should return the fusion results to the processing center or continue to collect more data. In the second phase. The feasibility of data fusion at the node level is confirmed by an experimental design where fused data from color sensors show near-identical results to actual physical temperatures. These results are potentially important for new large-scale sensor network applications.

  1. Balanced Bipartite Graph Based Register Allocation for Network Processors in Mobile and Wireless Networks

    Directory of Open Access Journals (Sweden)

    Feilong Tang

    2010-01-01

    Full Text Available Mobile and wireless networks are the integrant infrastructure of mobile and pervasive computing that aims at providing transparent and preferred information and services for people anytime anywhere. In such environments, end-to-end network bandwidth is crucial to improve user's transparent experience when providing on-demand services such as mobile video playing. As a result, powerful computing power is required for networked nodes, especially for routers. General-purpose processors cannot meet such requirements due to their limited processing ability, and poor programmability and scalability. Intel's network processor IXP is specially designed for fast packet processing to achieve a broad bandwidth. IXP provides a large number of registers to reduce the number of memory accesses. Registers in an IXP are physically partitioned as two banks so that two source operands in an instruction have to come from the two banks respectively, which makes the IXP register allocation tricky and different from conventional ones. In this paper, we investigate an approach for efficiently generating balanced bipartite graph and register allocation algorithms for the dual-bank register allocation in IXPs. The paper presents a graph uniform 2-way partition algorithm (FPT, which provides an optimal solution to the graph partition, and a heuristic algorithm for generating balanced bipartite graph. Finally, we design a framework for IXP register allocation. Experimental results demonstrate the framework and the algorithms are efficient in register allocation for IXP network processors.

  2. Modeling cellular networks in fading environments with dominant specular components

    KAUST Repository

    AlAmmouri, Ahmad

    2016-07-26

    Stochastic geometry (SG) has been widely accepted as a fundamental tool for modeling and analyzing cellular networks. However, the fading models used with SG analysis are mainly confined to the simplistic Rayleigh fading, which is extended to the Nakagami-m fading in some special cases. However, neither the Rayleigh nor the Nakagami-m accounts for dominant specular components (DSCs) which may appear in realistic fading channels. In this paper, we present a tractable model for cellular networks with generalized two-ray (GTR) fading channel. The GTR fading explicitly accounts for two DSCs in addition to the diffuse components and offers high flexibility to capture diverse fading channels that appear in realistic outdoor/indoor wireless communication scenarios. It also encompasses the famous Rayleigh and Rician fading as special cases. To this end, the prominent effect of DSCs is highlighted in terms of average spectral efficiency. © 2016 IEEE.

  3. Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Networks

    OpenAIRE

    Shayeji, Mohammad H. Al; Al-Azmi, AbdulRahman R.; Al-Azmi, AbdulAziz R.; Samrajesh, M. D.

    2012-01-01

    Mobile Ad Hoc networks (MANET), distinct from traditional distributed systems, are dynamic and self-organizing networks. MANET requires a leader to coordinate and organize tasks. The challenge is to have the right election algorithm that chooses the right leader based on various factors in MANET. In this paper, we analyze four leader election algorithms used in mobile Ad Hoc Networks. Factors considered in our analysis are time complexity, message complexity, assumptions considered, fault tol...

  4. Universal Intelligent Small Cell (UnISCell for next generation cellular networks

    Directory of Open Access Journals (Sweden)

    Mohammad Patwary

    2016-11-01

    Full Text Available Exploring innovative cellular architectures to achieve enhanced system capacity and good coverage has become a critical issue towards realizing the next generation of wireless communications. In this context, this paper proposes a novel concept of Universal Intelligent Small Cell (UnISCell for enabling the densification of the next generation of cellular networks. The proposed novel concept envisions an integrated platform of providing a strong linkage between different stakeholders such as street lighting networks, landline telephone networks and future wireless networks, and is universal in nature being independent of the operating frequency bands and traffic types. The main motivating factors for the proposed small cell concept are the need of public infrastructure re-engineering, and the recent advances in several enabling technologies. First, we highlight the main concepts of the proposed UnISCell platform. Subsequently, we present two deployment scenarios for the proposed UnISCell concept considering infrastructure sharing and service sharing as important aspects. We then describe the key future technologies for enabling the proposed UnISCell concept and present a use case example with the help of numerical results. Finally, we conclude this article by providing some interesting future recommendations.

  5. Measuring sustainable accessibility potential using the mobility infrastructure's network configuration

    NARCIS (Netherlands)

    Gil, J.; Read, S.

    2012-01-01

    This paper is an exploration into the analysis of public transport networks using space syntax approaches combined with concepts of sustainable accessibility. Present urban development policy aims to achieve sustainable mobility patterns, shifting mobility to soft transportation modes such as

  6. Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2017-01-01

    Full Text Available The node replication attack is one of the notorious attacks that can be easily launched by adversaries in wireless sensor networks. A lot of literatures have studied mitigating the node replication attack in static wireless sensor networks. However, it is more difficult to detect the replicas in mobile sensor networks because of their node mobility. Considering the limitations of centralized detection schemes for static wireless sensor networks, a few distributed solutions have been recently proposed. Some existing schemes identified replicated attacks by sensing mobile nodes with identical ID but different locations. To facilitate the discovery of contradictory conflicts, we propose a hybrid local and global detection method. The local detection is performed in a local area smaller than the whole deployed area to improve the meeting probability of contradictory nodes, while the distant replicated nodes in larger area can also be efficiently detected by the global detection. The complementary two levels of detection achieve quick discovery by searching of the replicas with reasonable overhead.

  7. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  8. A mobile-agent-based wireless sensing network for structural monitoring applications

    International Nuclear Information System (INIS)

    Taylor, Stuart G; Farinholt, Kevin M; Figueiredo, Eloi; Moro, Erik A; Park, Gyuhae; Farrar, Charles R; Flynn, Eric B; Mascarenas, David L; Todd, Michael D

    2009-01-01

    A new wireless sensing network paradigm is presented for structural monitoring applications. In this approach, both power and data interrogation commands are conveyed via a mobile agent that is sent to sensor nodes to perform intended interrogations, which can alleviate several limitations of the traditional sensing networks. Furthermore, the mobile agent provides computational power to make near real-time assessments on the structural conditions. This paper will discuss such prototype systems, which are used to interrogate impedance-based sensors for structural health monitoring applications. Our wireless sensor node is specifically designed to accept various energy sources, including wireless energy transmission, and to be wirelessly triggered on an as-needed basis by the mobile agent or other sensor nodes. The capabilities of this proposed sensing network paradigm are demonstrated in the laboratory and the field

  9. Spectrum Reorganization and Bundling for Power Efficient Mobile Networks

    DEFF Research Database (Denmark)

    Micallef, Gilbert; Mogensen, Preben; Scheck, Hans-Otto

    2012-01-01

    are still required for supporting legacy devices and providing wider network coverage. In order to facilitate and reduce the cost of rolling out a new network, mobile operators often reuse existing sites. Radio frequency modules in base station sites house power amplifiers, which are designed to operate...

  10. PERFORMANCE EVALUATION OF INTEGRATED MACRO AND MICRO MOBILITY PROTOCOLS FOR WIDE AREA WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R.Gunasundari

    2010-03-01

    Full Text Available The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, Mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of Mobile IP and Micro mobility protocols where Mobile IP handles macro mobility and micro mobility protocols handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed. Simulation results presented in this paper are based on ns 2.

  11. Towards the prediction of essential genes by integration of network topology, cellular localization and biological process information

    Directory of Open Access Journals (Sweden)

    Lemke Ney

    2009-09-01

    Full Text Available Abstract Background The identification of essential genes is important for the understanding of the minimal requirements for cellular life and for practical purposes, such as drug design. However, the experimental techniques for essential genes discovery are labor-intensive and time-consuming. Considering these experimental constraints, a computational approach capable of accurately predicting essential genes would be of great value. We therefore present here a machine learning-based computational approach relying on network topological features, cellular localization and biological process information for prediction of essential genes. Results We constructed a decision tree-based meta-classifier and trained it on datasets with individual and grouped attributes-network topological features, cellular compartments and biological processes-to generate various predictors of essential genes. We showed that the predictors with better performances are those generated by datasets with integrated attributes. Using the predictor with all attributes, i.e., network topological features, cellular compartments and biological processes, we obtained the best predictor of essential genes that was then used to classify yeast genes with unknown essentiality status. Finally, we generated decision trees by training the J48 algorithm on datasets with all network topological features, cellular localization and biological process information to discover cellular rules for essentiality. We found that the number of protein physical interactions, the nuclear localization of proteins and the number of regulating transcription factors are the most important factors determining gene essentiality. Conclusion We were able to demonstrate that network topological features, cellular localization and biological process information are reliable predictors of essential genes. Moreover, by constructing decision trees based on these data, we could discover cellular rules governing

  12. Discursive Deployments: Mobilizing Support for Municipal and Community Wireless Networks in the U.S.

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Rosio; Rodriguez, Juana Maria

    2008-08-16

    This paper examines Municipal Wireless (MW) deployments in the United States. In particular, the interest is in understanding how discourse has worked to mobilize widespread support for MW networks. We explore how local governments discursively deploy the language of social movements to create a shared understanding of the networking needs of communities. Through the process of"framing" local governments assign meaning to the MW networks in ways intended to mobilize support anddemobilize opposition. The mobilizing potential of a frame varies and is dependent on its centrality and cultural resonance. We examine the framing efforts of MW networks by using a sample of Request for Proposals for community wireless networks, semi-structured interviews and local media sources. Prominent values that are central to a majority of the projects and others that are culturally specific are identified and analyzed for their mobilizing potency.

  13. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Maltz, David A

    2001-01-01

    .... Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth...

  14. Network-aware support for mobile distributed teams

    NARCIS (Netherlands)

    Kleij, R. van der; Jong, A. de; Brake, G.M. te; Greefe, T.E.

    2009-01-01

    An experiment evaluated network-aware support to increase understanding of the factors that are important for successful teamwork in mobile geographically dispersed teams of first responders. Participants performed a simulated search and rescue team task and were equipped with a digitized map and

  15. CDMA coverage under mobile heterogeneous network load

    NARCIS (Netherlands)

    Saban, D.; van den Berg, Hans Leo; Boucherie, Richardus J.; Endrayanto, A.I.

    2002-01-01

    We analytically investigate coverage (determined by the uplink) under non-homogeneous and moving traffic load of third generation UMTS mobile networks. In particular, for different call assignment policies, we investigate cell breathing and the movement of the coverage gap occurring between cells

  16. Predictors of Mobile Phone and Social Networking Site Dependency in Adulthood.

    Science.gov (United States)

    Burnell, Kaitlyn; Kuther, Tara L

    2016-10-01

    The present study explored social and psychological predictors of social networking site (SNS) and mobile phone dependency in a sample of emerging adults (ages 18-25, n = 159, M = 21.87, SD = 2.08) and young adults (ages 26-40, n = 97, M = 31.21, SD = 4.11). Path analysis revealed that SNS dependency mediated the relationship of social comparison, SNS support, and impulsivity on mobile phone dependency. Impulsivity also showed direct links to mobile phone dependency. The present findings suggest that individuals with a strong orientation toward social comparison, who perceive a strong sense of support through SNS networks, or who show difficulty with self-regulation may be at risk for SNS and mobile phone dependency.

  17. Cloud RAN for Mobile Networks - a Technology Overview

    OpenAIRE

    Checko, Aleksandra; Christiansen, Henrik Lehrmann; Yan, Ying; Scolari, Lara; Kardaras, Georgios; Berger, Michael Stübert; Dittmann, Lars

    2014-01-01

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges the operators face while trying to support growing end-user’s needs. The main idea behind C-RAN is to pool the Baseband Units (BBUs) from multiple base stations into centralized BBU Pool for statistical multiplexing gain, while shifting the burden to the high-speed wireline transmission of In-phase and Quadrature (IQ) data. C-RAN enables energy efficient network operation and pos...

  18. Almost sure exponential stability of stochastic fuzzy cellular neural networks with delays

    International Nuclear Information System (INIS)

    Zhao Hongyong; Ding Nan; Chen Ling

    2009-01-01

    This paper is concerned with the problem of exponential stability analysis for fuzzy cellular neural network with delays. By constructing suitable Lyapunov functional and using stochastic analysis we present some sufficient conditions ensuring almost sure exponential stability for the network. Moreover, an example is given to demonstrate the advantages of our method.

  19. Mathematical model on malicious attacks in a mobile wireless network with clustering

    International Nuclear Information System (INIS)

    Haldar, Kaushik; Mishra, Bimal Kumar

    2015-01-01

    A mathematical model has been formulated for the analysis of a wireless epidemic on a clustered heterogeneous network. The model introduces mobility into the epidemic framework assuming that the component nodes have a tendency to be attached with a frequently visited home cluster. This underlines the inherent regularity in the mobility pattern of mobile nodes in a wireless network. The analysis focuses primarily on features that arise because of the mobility considerations compared in the larger scenario formed by the epidemic aspects. A result on the invariance of the home cluster populations with respect to time provides an important view-point of the long-term behavior of the system. The analysis also focuses on obtaining a basic threshold condition that guides the epidemic behavior of the system. Analytical as well as numerical results have also been obtained to establish the asymptotic behavior of the connected components of the network, and that of the whole network when the underlying graph turns out to be irreducible. Applications to proximity based attacks and to scenarios with high cluster density have also been outlined

  20. A Survey on Mobility Support in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Beom-Su Kim

    2017-04-01

    Full Text Available Wireless Body Area Networks (WBANs have attracted research interests from the community, as more promising healthcare applications have a tendency to employ them as underlying network technology. While taking design issues, such as small size hardware as well as low power computing, into account, a lot of research has been proposed to accomplish the given tasks in WBAN. However, since most of the existing works are basically developed by assuming all nodes in the static state, these schemes therefore cannot be applied in real scenarios where network topology between sensor nodes changes frequently and unexpectedly according to human moving behavior. However, as far as the authors know, there is no survey paper to focus on research challenges for mobility support in WBAN yet. To address this deficiency, in this paper, we present the state-of-the-art approaches and discuss the important features of related to mobility in WBAN. We give an overview of mobility model and categorize the models as individual and group. Furthermore, an overview of networking techniques in the recent literature and summary are compiled for comparison in several aspects. The article also suggests potential directions for future research in the field.

  1. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  2. Mobile Messaging Services-Based Personal Electrocardiogram Monitoring System

    Directory of Open Access Journals (Sweden)

    Ashraf A. Tahat

    2009-01-01

    Full Text Available A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.

  3. Mobile messaging services-based personal electrocardiogram monitoring system.

    Science.gov (United States)

    Tahat, Ashraf A

    2009-01-01

    A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs) with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG) signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.

  4. Linear matrix inequality approach for synchronization control of fuzzy cellular neural networks with mixed time delays

    International Nuclear Information System (INIS)

    Balasubramaniam, P.; Kalpana, M.; Rakkiyappan, R.

    2012-01-01

    Fuzzy cellular neural networks (FCNNs) are special kinds of cellular neural networks (CNNs). Each cell in an FCNN contains fuzzy operating abilities. The entire network is governed by cellular computing laws. The design of FCNNs is based on fuzzy local rules. In this paper, a linear matrix inequality (LMI) approach for synchronization control of FCNNs with mixed delays is investigated. Mixed delays include discrete time-varying delays and unbounded distributed delays. A dynamic control scheme is proposed to achieve the synchronization between a drive network and a response network. By constructing the Lyapunov—Krasovskii functional which contains a triple-integral term and the free-weighting matrices method an improved delay-dependent stability criterion is derived in terms of LMIs. The controller can be easily obtained by solving the derived LMIs. A numerical example and its simulations are presented to illustrate the effectiveness of the proposed method. (interdisciplinary physics and related areas of science and technology)

  5. Throughput of Cellular Systems with Conferencing Mobiles and Cooperative Base Stations

    Directory of Open Access Journals (Sweden)

    Somekh O

    2008-01-01

    Full Text Available This paper considers an enhancement to multicell processing for the uplink of a cellular system, whereby the mobile stations are allowed to exchange messages on orthogonal channels of fixed capacity (conferencing. Both conferencing among mobile stations in different cells and in the same cell (inter- and intracell conferencing, resp. are studied. For both cases, it is shown that a rate-splitting transmission strategy, where part of the message is exchanged on the conferencing channels and then transmitted cooperatively to the base stations, is capacity achieving for sufficiently large conferencing capacity. In case of intercell conferencing, this strategy performs convolutional pre-equalization of the signal encoding the common messages in the spatial domain, where the number of taps of the finite-impulse response equalizer depends on the number of conferencing rounds. Analysis in the low signal-to-noise ratio regime and numerical results validate the advantages of conferencing as a complementary technology to multicell processing.

  6. Assessing the weather monitoring capabilities of cellular microwave link networks

    Science.gov (United States)

    Fencl, Martin; Vrzba, Miroslav; Rieckermann, Jörg; Bareš, Vojtěch

    2016-04-01

    Using of microwave links for rainfall monitoring was suggested already by (Atlas and Ulbrich, 1977). However, this technique attracted broader attention of scientific community only in the recent decade, with the extensive growth of cellular microwave link (CML) networks, which form the backbone of today's cellular telecommunication infrastructure. Several studies have already shown that CMLs can be conveniently used as weather sensors and have potential to provide near-ground path-integrated observations of rainfall but also humidity or fog. However, although research is still focusing on algorithms to improve the weather sensing capabilities (Fencl et al., 2015), it is not clear how to convince cellular operators to provide the power levels of their network. One step in this direction is to show in which regions or municipalities the networks are sufficiently dense to provide/develop good services. In this contribution we suggest a standardized approach to evaluate CML networks in terms of rainfall observation and to identify suitable regions for CML rainfall monitoring. We estimate precision of single CML based on its sensitivity to rainfall, i.e. as a function of frequency, polarization and path length. Capability of a network to capture rainfall spatial patterns is estimated from the CML coverage and path lengths considering that single CML provides path-integrated rain rates. We also search for suitable predictors for regions where no network topologies are available. We test our approach on several European networks and discuss the results. Our results show that CMLs are very dense in urban areas (> 1 CML/km2), but less in rural areas (online tool. In summary, our results demonstrate that CML represent promising environmental observation network, suitable especially for urban rainfall monitoring. The developed approach integrated into an open source online tool can be conveniently used e.g. by local operators or authorities to evaluate the suitability of

  7. Supersampling and Network Reconstruction of Urban Mobility.

    Directory of Open Access Journals (Sweden)

    Oleguer Sagarra

    Full Text Available Understanding human mobility is of vital importance for urban planning, epidemiology, and many other fields that draw policies from the activities of humans in space. Despite the recent availability of large-scale data sets of GPS traces or mobile phone records capturing human mobility, typically only a subsample of the population of interest is represented, giving a possibly incomplete picture of the entire system under study. Methods to reliably extract mobility information from such reduced data and to assess their sampling biases are lacking. To that end, we analyzed a data set of millions of taxi movements in New York City. We first show that, once they are appropriately transformed, mobility patterns are highly stable over long time scales. Based on this observation, we develop a supersampling methodology to reliably extrapolate mobility records from a reduced sample based on an entropy maximization procedure, and we propose a number of network-based metrics to assess the accuracy of the predicted vehicle flows. Our approach provides a well founded way to exploit temporal patterns to save effort in recording mobility data, and opens the possibility to scale up data from limited records when information on the full system is required.

  8. Social-Driven Information Dissemination for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Basim MAHMOOD

    2015-06-01

    Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.

  9. PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Mansour Sheikhan

    2012-06-01

    Full Text Available Mobile ad-hoc network (MANET is a dynamic collection of mobile computers without the need for any existing infrastructure. Nodes in a MANET act as hosts and routers. Designing of robust routing algorithms for MANETs is a challenging task. Disjoint multipath routing protocols address this problem and increase the reliability, security and lifetime of network. However, selecting an optimal multipath is an NP-complete problem. In this paper, Hopfield neural network (HNN which its parameters are optimized by particle swarm optimization (PSO algorithm is proposed as multipath routing algorithm. Link expiration time (LET between each two nodes is used as the link reliability estimation metric. This approach can find either node-disjoint or link-disjoint paths in singlephase route discovery. Simulation results confirm that PSO-HNN routing algorithm has better performance as compared to backup path set selection algorithm (BPSA in terms of the path set reliability and number of paths in the set.

  10. On the interference suppression capabilities of cognitive enabled femto cellular networks

    KAUST Repository

    Shakir, Muhammad

    2012-06-01

    Cognitive Radios are considered as a standard part of future Heterogeneous mobile network architecture. In this paper, we consider a two tier Heterogeneous network with multiple radio access technologies (RATS) namely; (i) the secondary network which comprises of cognitive enabled femto base stations which are referred to as cognitive-femto BS (CFBS) such that each of the BS are equipped with a single antenna and (ii) the macrocell network which is considered as a primary network. The effectiveness of the cognitive transmission is based on the efficient spectrum sensing algorithms which determine the availability of the spectrum holes. However, it is equally important for the cognitive network to minimize the cross-tier interference particularly during (i) the spectrum sensing and (ii) the cognitive transmission if spectrum is available. By exploiting the cooperation among the CFBS, the multiple CFBS can be considered as a single base station with multiple geographically dispersed antennas. In this context, we proposed a smart network where CFBS collaborates to reduce the cross-tier interference level by directing the main beam toward the desired femtocell mobile user and creating toward the cross-tier interference. The resultant network is referred to as Smart cognitive-femto network (SCFN) which requires the CFBS to be self-aware such that the CFBS are aware of their surroundings and adapt accordingly to maintain a reliable and efficient communication link. In order to determine the effectiveness of the proposed smart network, we study the interference rejection (or suppression) capabilities of the SCFN. It has been shown that the proposed smart network offers significant performance improvements in interference suppression and signal to interference ratio (SIR) and may be considered as a promising solution to the interference management problems in Heterogeneous network. © 2012 IEEE.

  11. The Influence of Gaussian Signaling Approximation on Error Performance in Cellular Networks

    KAUST Repository

    Afify, Laila H.; Elsawy, Hesham; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    Stochastic geometry analysis for cellular networks is mostly limited to outage probability and ergodic rate, which abstracts many important wireless communication aspects. Recently, a novel technique based on the Equivalent-in-Distribution (EiD) approach is proposed to extend the analysis to capture these metrics and analyze bit error probability (BEP) and symbol error probability (SEP). However, the EiD approach considerably increases the complexity of the analysis. In this paper, we propose an approximate yet accurate framework, that is also able to capture fine wireless communication details similar to the EiD approach, but with simpler analysis. The proposed methodology is verified against the exact EiD analysis in both downlink and uplink cellular networks scenarios.

  12. The Influence of Gaussian Signaling Approximation on Error Performance in Cellular Networks

    KAUST Repository

    Afify, Laila H.

    2015-08-18

    Stochastic geometry analysis for cellular networks is mostly limited to outage probability and ergodic rate, which abstracts many important wireless communication aspects. Recently, a novel technique based on the Equivalent-in-Distribution (EiD) approach is proposed to extend the analysis to capture these metrics and analyze bit error probability (BEP) and symbol error probability (SEP). However, the EiD approach considerably increases the complexity of the analysis. In this paper, we propose an approximate yet accurate framework, that is also able to capture fine wireless communication details similar to the EiD approach, but with simpler analysis. The proposed methodology is verified against the exact EiD analysis in both downlink and uplink cellular networks scenarios.

  13. Mobile network architecture of the long-range WindScanner system

    DEFF Research Database (Denmark)

    Vasiljevic, Nikola; Lea, Guillaume; Hansen, Per

    to the acquisition of the mobile network connections with static public IP addresses. The architecture consists of a hardware VPN solution based on the network appliances Z1 and MX60 from Cisco Meraki with additional 3G or 4G dongles. With the presented network architecture and appropriate configuration, we fulfill...

  14. The Bacterial Mobile Resistome Transfer Network Connecting the Animal and Human Microbiomes.

    Science.gov (United States)

    Hu, Yongfei; Yang, Xi; Li, Jing; Lv, Na; Liu, Fei; Wu, Jun; Lin, Ivan Y C; Wu, Na; Weimer, Bart C; Gao, George F; Liu, Yulan; Zhu, Baoli

    2016-11-15

    Horizontally acquired antibiotic resistance genes (ARGs) in bacteria are highly mobile and have been ranked as principal risk resistance determinants. However, the transfer network of the mobile resistome and the forces driving mobile ARG transfer are largely unknown. Here, we present the whole profile of the mobile resistome in 23,425 bacterial genomes and explore the effects of phylogeny and ecology on the recent transfer (≥99% nucleotide identity) of mobile ARGs. We found that mobile ARGs are mainly present in four bacterial phyla and are significantly enriched in Proteobacteria The recent mobile ARG transfer network, which comprises 703 bacterial species and 16,859 species pairs, is shaped by the bacterial phylogeny, while an ecological barrier also exists, especially when interrogating bacteria colonizing different human body sites. Phylogeny is still a driving force for the transfer of mobile ARGs between farm animals and the human gut, and, interestingly, the mobile ARGs that are shared between the human and animal gut microbiomes are also harbored by diverse human pathogens. Taking these results together, we suggest that phylogeny and ecology are complementary in shaping the bacterial mobile resistome and exert synergistic effects on the development of antibiotic resistance in human pathogens. The development of antibiotic resistance threatens our modern medical achievements. The dissemination of antibiotic resistance can be largely attributed to the transfer of bacterial mobile antibiotic resistance genes (ARGs). Revealing the transfer network of these genes in bacteria and the forces driving the gene flow is of great importance for controlling and predicting the emergence of antibiotic resistance in the clinic. Here, by analyzing tens of thousands of bacterial genomes and millions of human and animal gut bacterial genes, we reveal that the transfer of mobile ARGs is mainly controlled by bacterial phylogeny but under ecological constraints. We also found

  15. A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

    Directory of Open Access Journals (Sweden)

    Mohammed Ramadan

    2016-08-01

    Full Text Available Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into different generations according to the communication and security techniques such as A3, A5 and A8 algorithms for 2G-GSM cellular system, 3G-authentication and key agreement (AKA, evolved packet system-authentication and key agreement (EPS-AKA, and long term evolution-authentication and key agreement (LTE-AKA algorithms for 3rd generation partnership project (3GPP systems. Furthermore, these generations have many vulnerabilities, and huge security work is involved to solve such problems. Some of them are in the field of the public key cryptography (PKC which requires a high computational cost and more network flexibility to be achieved. As such, the public key infrastructure (PKI is more compatible with the modern generations due to the superior communications features. This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI. Firstly, we present the security issues for each generation of mobile communication systems, then we study and analyze the latest proposed schemes and give some comparisons. Finally, we introduce some new directions for the future scope. This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving.

  16. Integration between terrestrial-based and satellite-based land mobile communications systems

    Science.gov (United States)

    Arcidiancono, Antonio

    1990-01-01

    A survey is given of several approaches to improving the performance and marketability of mobile satellite systems (MSS). The provision of voice/data services in the future regional European Land Mobile Satellite System (LMSS), network integration between the Digital Cellular Mobile System (GSM) and LMSS, the identification of critical areas for the implementation of integrated GSM/LMSS areas, space segment scenarios, LMSS for digital trunked private mobile radio (PMR) services, and code division multiple access (CDMA) techniques for a terrestrial/satellite system are covered.

  17. 5G and Cellular Networks in the Smart Grid

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Jorguseski, Ljupco; Zhang, Haibin

    2018-01-01

    grid. In the present chapter, we present the main features of both the non-3GPP technologies, IEEE 802.11ah, SigFox and LoRa, and the main features of past, current and future 3GPP technologies, namely releases High rate), 12-14 (IoT extensions) and 15-16 (5G). Additionally, we present......Wireless cellular networks will help Distribution System Operators (DSOs) to achieve observability below the substation level, which is needed to ensure stable operation in the smart grid. Both existing and upcoming cellular technologies are considered as candidates for helping to enable the smart...... the challenges and possible solutions for ensuring end-to-end security in smart grid systems....

  18. Self-deployable mobile sensor networks for on-demand surveillance

    Science.gov (United States)

    Miao, Lidan; Qi, Hairong; Wang, Feiyi

    2005-05-01

    This paper studies two interconnected problems in mobile sensor network deployment, the optimal placement of heterogeneous mobile sensor platforms for cost-efficient and reliable coverage purposes, and the self-organizable deployment. We first develop an optimal placement algorithm based on a "mosaicked technology" such that different types of mobile sensors form a mosaicked pattern uniquely determined by the popularity of different types of sensor nodes. The initial state is assumed to be random. In order to converge to the optimal state, we investigate the swarm intelligence (SI)-based sensor movement strategy, through which the randomly deployed sensors can self-organize themselves to reach the optimal placement state. The proposed algorithm is compared with the random movement and the centralized method using performance metrics such as network coverage, convergence time, and energy consumption. Simulation results are presented to demonstrate the effectiveness of the mosaic placement and the SI-based movement.

  19. Connection adaption for control of networked mobile chaotic agents.

    Science.gov (United States)

    Zhou, Jie; Zou, Yong; Guan, Shuguang; Liu, Zonghua; Xiao, Gaoxi; Boccaletti, S

    2017-11-22

    In this paper, we propose a strategy for the control of mobile chaotic oscillators by adaptively rewiring connections between nearby agents with local information. In contrast to the dominant adaptive control schemes where coupling strength is adjusted continuously according to the states of the oscillators, our method does not request adaption of coupling strength. As the resulting interaction structure generated by this proposed strategy is strongly related to unidirectional chains, by investigating synchronization property of unidirectional chains, we reveal that there exists a certain coupling range in which the agents could be controlled regardless of the length of the chain. This feature enables the adaptive strategy to control the mobile oscillators regardless of their moving speed. Compared with existing adaptive control strategies for networked mobile agents, our proposed strategy is simpler for implementation where the resulting interaction networks are kept unweighted at all time.

  20. Cell Deployment Optimization for Cloud Radio Access Networks using Teletraffic Theory

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Christiansen, Henrik Lehrmann; Iversen, Villy Bæk

    2015-01-01

    Cloud Radio Access Network (C-RAN) is a new mobile radio access network design based on centralized and pooled processing. It offers potential cost savings by utilizing the so-called tidal effect due to user mobility in cellular networks. This paper provides a quantitative analysis...... to dynamically re-assign cells to a pool of baseband units. The re-assignment is based on the cell load and traffic characteristics such that effective utilization of the baseband resources is assured....