WorldWideScience

Sample records for mobile telecommunication networks

  1. Estimating network effects in China's mobile telecommunications

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    A model is proposed along with empirical investigation to prove the existence of network effects in China's mobile telecommunications market. Futhernore, network effects on China's mobile telecommunications are estimated with a dynamic model. The structural parameters are identified from regression coefficients and the results are analyzed and compared with another literature. Data and estimation issues are also discussed. Conclusions are drawn that network effects are significant in China's mobile telecommunications market, and that ignoring network effects leads to bad policy making.

  2. Mobile telecommunication networks choice among Ghanaians

    Directory of Open Access Journals (Sweden)

    Boateng Henry

    2013-07-01

    Full Text Available The paper investigates the factors influencing customers choice of telecommunication network in Ghana. The survey design was employed to enable the researchers perform statistical analysis. Questionnaire consisting of Likert scale question was used to collect the primary data. Multiple regression analysis was performed to ascertain the factors influencing customers’ choice of telecommunication networks. The study found six factors that influence customers to choose a particular network. These factors include; brand awareness, brand image, perceived quality, price, convenience and brand loyalty. The study concludes that all the six factors contribute to the factors that drive consumer choice of telecommunications service in Ghana.

  3. Optimisation of radio transmitter locations in mobile telecommunications networks

    Directory of Open Access Journals (Sweden)

    Schmidt-Dumont, Thorsten

    2016-08-01

    Full Text Available Multiple factors have to be taken into account when mobile telecommunication network providers make decisions about radio transmitter placement. Generally, area coverage and the average signal level provided are of prime importance in these decisions. These criteria give rise to a bi-objective problem of facility location, with the goal of achieving an acceptable trade-off between maximising the total area coverage and maximising the average signal level provided to the demand region by a network of radio transmitters. This paper establishes a mathematical modelling framework, based on these two placement criteria, for evaluating the effectiveness of a given set of radio transmitter locations. In the framework, coverage is measured according to the degree of obstruction of the so-called ‘Fresnel zone’ that is formed between handset and base station, while signal strength is modelled taking radio wave propagation loss into account. This framework is used to formulate a novel bi-objective facility location model that may form the basis for decision support aimed at identifying high-quality transmitter location trade-off solutions for mobile telecommunication network providers. But it may also find application in various other contexts (such as radar, watchtower, or surveillance camera placement optimisation.

  4. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  5. Telecommunication Networks

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Balachandran, Kartheepan; Hald, Sara Ligaard

    2014-01-01

    , etc. First, the role of basic communication is examined with a focus on critical infrastructures. We look at heterogenic networks and standards for smart grids, to give some insight into what has been done to ensure inter-operability in this direction. We then go to the physical network, and look...... at the deployment of the physical layout of the communication network and the related costs. This is an important aspect as one option to use existing networks is to deploy dedicated networks. Following this, we look at some generic models that describe reliability for accessing dynamic information. This part......In this chapter, we look into the role of telecommunication networks and their capability of supporting critical infrastructure systems and applications. The focus is on smart grids as the key driving example, bearing in mind that other such systems do exist, e.g., water management, traffic control...

  6. Telecommunication Value Network in Malaysia

    OpenAIRE

    2009-01-01

    Business network is believed to offer a superior way of managing the challenges related to the uncertainty and complexity of the contemporary business environment in Malaysia telecommunication industry. This study strives to analyze the value business network in Malaysia telecommunication industry with emphasize on the market leader, Maxis Communication Bhd in its mobile content services. The business network represents the form of organization where the focal company focuses on certain key a...

  7. The Nordic Mobile Telecommunication Cluster

    DEFF Research Database (Denmark)

    Jørgensen, Ulrik

    2000-01-01

    A study of the historic role of the Nordic mobile telephone and telecommunications cluster and its background in both coordinated innovation policies and societal developments in Scandinavia.......A study of the historic role of the Nordic mobile telephone and telecommunications cluster and its background in both coordinated innovation policies and societal developments in Scandinavia....

  8. The Nordic Mobile Telecommunication Cluster

    DEFF Research Database (Denmark)

    Jørgensen, Ulrik

    2000-01-01

    A study of the historic role of the Nordic mobile telephone and telecommunications cluster and its background in both coordinated innovation policies and societal developments in Scandinavia.......A study of the historic role of the Nordic mobile telephone and telecommunications cluster and its background in both coordinated innovation policies and societal developments in Scandinavia....

  9. Understanding telecommunications networks

    CERN Document Server

    Valdar, Andy

    2017-01-01

    A telecommunications network is an electronic system of links, nodes and the controls that govern their operations to allow voice and data transfer among users and devices. This fully revised, updated and expanded second edition covers all aspects of today's networks, including how they are planned, formed and operated.

  10. Effect of call-clubs to institute local network effects in mobile telecommunication and its′ implications on brand loyalty

    Directory of Open Access Journals (Sweden)

    Karunarathne E. A .C. P

    2017-03-01

    Full Text Available As a result of rapid technological advancements in the mobile telecommunication industry, many firms have set their strategies to target larger customer bases since it forecasts extensive future profit generation. Due to severe competition, while employing successful customer loyalty strategies, customer locked-in strategies are also commonly used in the telecommunication industry to retain their customers within the firm. Call-clubs benefits are one of the commonly used strategies used to create local network effects in the mobile telecommunication market place. Thus, this paper targets to provide insight on the implication of subscriber’s involvement in call-clubs on their loyalty towards service providers. A survey based quantitative approach was followed for this study and the data was gathered through a structured off-line questionnaire from randomly selected mobile users in Sri Lanka. Based on collected valid responses, analysis was carried out to answer the designed research hypotheses and structural equation modelling techniques were mainly used for statistical analysis. As per the analysis, research model shows a fairly high level of explanatory power with customer loyalty and perceived call-clubs benefits which indicate customers′ preference towards the service provider when most frequently contacting parties are using the same network. Further analysis was carried out to investigate the moderating effect on call-clubs benefits and customer loyalty relationships due to two main technological advancements; namely, Internet based voice calling facility and multiple connection access facility. Based on the analysis results recommendations were made to track the value of call-clubs strategies accordingly.

  11. Exposure to mobile telecommunication networks assessed using personal dosimetry and well-being in children and adolescents: the German MobilEe-study.

    Science.gov (United States)

    Thomas, Silke; Kühnlein, Anja; Heinrich, Sabine; Praml, Georg; von Kries, Rüdiger; Radon, Katja

    2008-11-04

    Despite the increase of mobile phone use in the last decade and the growing concern whether mobile telecommunication networks adversely affect health and well-being, only few studies have been published that focussed on children and adolescents. Especially children and adolescents are important in the discussion of adverse health effects because of their possibly higher vulnerability to radio frequency electromagnetic fields. We investigated a possible association between exposure to mobile telecommunication networks and well-being in children and adolescents using personal dosimetry. A population-based sample of 1.498 children and 1.524 adolescents was assembled for the study (response 52%). Participants were randomly selected from the population registries of four Bavarian (South of Germany) cities and towns with different population sizes. During a Computer Assisted Personal Interview data on participants' well-being, socio-demographic characteristics and potential confounder were collected. Acute symptoms were assessed three times during the study day (morning, noon, evening).Using a dosimeter (ESM-140 Maschek Electronics), we obtained an exposure profile over 24 hours for three mobile phone frequency ranges (measurement interval 1 second, limit of determination 0.05 V/m) for each of the participants. Exposure levels over waking hours were summed up and expressed as mean percentage of the ICNIRP (International Commission on Non-Ionizing Radiation Protection) reference level. In comparison to non-participants, parents and adolescents with a higher level of education who possessed a mobile phone and were interested in the topic of possible adverse health effects caused by mobile telecommunication network frequencies were more willing to participate in the study. The median exposure to radio frequency electromagnetic fields of children and adolescents was 0.18% and 0.19% of the ICNIRP reference level respectively. In comparison to previous studies this is one of

  12. Exposure to mobile telecommunication networks assessed using personal dosimetry and well-being in children and adolescents: the German MobilEe-study

    Directory of Open Access Journals (Sweden)

    von Kries Rüdiger

    2008-11-01

    Full Text Available Abstract Background Despite the increase of mobile phone use in the last decade and the growing concern whether mobile telecommunication networks adversely affect health and well-being, only few studies have been published that focussed on children and adolescents. Especially children and adolescents are important in the discussion of adverse health effects because of their possibly higher vulnerability to radio frequency electromagnetic fields. Methods We investigated a possible association between exposure to mobile telecommunication networks and well-being in children and adolescents using personal dosimetry. A population-based sample of 1.498 children and 1.524 adolescents was assembled for the study (response 52%. Participants were randomly selected from the population registries of four Bavarian (South of Germany cities and towns with different population sizes. During a Computer Assisted Personal Interview data on participants' well-being, socio-demographic characteristics and potential confounder were collected. Acute symptoms were assessed three times during the study day (morning, noon, evening. Using a dosimeter (ESM-140 Maschek Electronics, we obtained an exposure profile over 24 hours for three mobile phone frequency ranges (measurement interval 1 second, limit of determination 0.05 V/m for each of the participants. Exposure levels over waking hours were summed up and expressed as mean percentage of the ICNIRP (International Commission on Non-Ionizing Radiation Protection reference level. Results In comparison to non-participants, parents and adolescents with a higher level of education who possessed a mobile phone and were interested in the topic of possible adverse health effects caused by mobile telecommunication network frequencies were more willing to participate in the study. The median exposure to radio frequency electromagnetic fields of children and adolescents was 0.18% and 0.19% of the ICNIRP reference level respectively

  13. Exposure to mobile telecommunication networks assessed using personal dosimetry and well-being in children and adolescents: the German MobilEe-study

    Science.gov (United States)

    Thomas, Silke; Kühnlein, Anja; Heinrich, Sabine; Praml, Georg; von Kries, Rüdiger; Radon, Katja

    2008-01-01

    Background Despite the increase of mobile phone use in the last decade and the growing concern whether mobile telecommunication networks adversely affect health and well-being, only few studies have been published that focussed on children and adolescents. Especially children and adolescents are important in the discussion of adverse health effects because of their possibly higher vulnerability to radio frequency electromagnetic fields. Methods We investigated a possible association between exposure to mobile telecommunication networks and well-being in children and adolescents using personal dosimetry. A population-based sample of 1.498 children and 1.524 adolescents was assembled for the study (response 52%). Participants were randomly selected from the population registries of four Bavarian (South of Germany) cities and towns with different population sizes. During a Computer Assisted Personal Interview data on participants' well-being, socio-demographic characteristics and potential confounder were collected. Acute symptoms were assessed three times during the study day (morning, noon, evening). Using a dosimeter (ESM-140 Maschek Electronics), we obtained an exposure profile over 24 hours for three mobile phone frequency ranges (measurement interval 1 second, limit of determination 0.05 V/m) for each of the participants. Exposure levels over waking hours were summed up and expressed as mean percentage of the ICNIRP (International Commission on Non-Ionizing Radiation Protection) reference level. Results In comparison to non-participants, parents and adolescents with a higher level of education who possessed a mobile phone and were interested in the topic of possible adverse health effects caused by mobile telecommunication network frequencies were more willing to participate in the study. The median exposure to radio frequency electromagnetic fields of children and adolescents was 0.18% and 0.19% of the ICNIRP reference level respectively. Conclusion In

  14. Mobile telecommunications networks restructuring as a response to a challenging environment

    CERN Document Server

    Curwen, P

    2014-01-01

    During the past decade, no industry has grown faster than that of mobile communications, yet coverage of its operations remains scarce. This state-of-the-art book examines the evolving structure and strategic behaviour of the thirty largest operators in the mobile communications industry.

  15. 47 CFR 54.519 - State telecommunications networks.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false State telecommunications networks. 54.519 Section 54.519 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES... telecommunications networks. (a) Telecommunications services. State telecommunications networks may secure...

  16. Transition States of Telecommunication Network

    Directory of Open Access Journals (Sweden)

    Gustav Cepciansky

    2004-01-01

    Full Text Available The dimensioning and performance of the telecommunication network take place according to the theory of teletrafficalways taking into account the stable state. But the utterance of the network being in an unstable state is less known. In this paper, wewould like to remind the network performance in the unstable state and to draw attention to the practical consequences of transitionstates.

  17. Reputation-based Telecommunication Network Selection

    CERN Document Server

    Seigneur, Jean-Marc

    2010-01-01

    Nowadays, mobile users can switch between different available networks, for example, nearby WiFi networks or their standard mobile operator network. Soon it will be extended to other operators. However, unless telecommunication operators can directly benefit from allowing a user to switch to another operator, operators have an incentive to keep their network quality of service confidential to avoid that their users decide to switch to another network. In contrast, in a user-centric way, the users should be allowed to share their observations regarding the networks that they have used. In this paper, we present our work in progress towards attack-resistant sharing of quality of service information and network provider reputation among mobile users.

  18. Synthesis of Reliable Telecommunication Networks

    Directory of Open Access Journals (Sweden)

    Dusan Trstensky

    2005-01-01

    Full Text Available In many application, the network designer may to know to senthesise a reliable telecommunication network. Assume that a network, denoted Gm,e has the number of nodes n and the number of edges e, and the operational probability of each edge is known. The system reliability of the network is defined to be the reliability that every pair of nodes can communicate with each other. A network synthesis problem considered in this paper is to find a network G*n,e, that maximises system reliability over the class of all networks for the classes of networks Gn,n-1, Gn,m and Gn,n+1 respectively. In addition an upper bound of maximum reliability for the networks with n-node and e-edge (e>n+2 is derived in terms of node. Computational experiments for the reliability upper are also presented. the results show, that the proposed reliability upper bound is effective.

  19. Studies of an application of a mobile communication system to the private telecommunication network. Part 1. Present condition of mobile communication system and proposal of the customer information network by PHS; Idotai tsushin system no denryoku tsushinmo eno tekiyo. 1. Idotai tsushin system no genjo to PHS ni yoru juyo kakei network no teian

    Energy Technology Data Exchange (ETDEWEB)

    Iwasaki, H. [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1996-03-01

    An application of various mobile communication systems to the electric power telecommunication network has been investigated. Among these, the customer information network by PHS (personal handy-phone system) has been proposed. Although great numbers of base stations are required for PHS, it can be applied as the customer information network by connecting to the power controller developed by the Central Research Institute of Electric Power Industry. The geostationary satellite telecommunication has been positively utilized by the electric power industry since the Hanshin-Awaji Great Earthquake. It can be used as the customer information network in the future. Since the radio access is a one-way communication, it cannot be applied to the electric power telecommunication network at present. It can be applied to the simple message communication or relatively low-speed data communication through the two-way communication. Public ground mobile telecommunication in the future includes various mobile telecommunication systems. To start the operation in 2000, the ITU (International Telecommunication Union) is making specifications common in the world. It is required to investigate the utilization as multipurpose systems. The network for PHS can be applied to the telecommunication network without optical cable. 20 refs., 5 figs., 3 tabs.

  20. Telecommunications network modelling, planning and design

    CERN Document Server

    Evans, Sharon

    2003-01-01

    Telecommunication Network Modelling, Planning and Design addresses sophisticated modelling techniques from the perspective of the communications industry and covers some of the major issues facing telecommunications network engineers and managers today. Topics covered include network planning for transmission systems, modelling of SDH transport network structures and telecommunications network design and performance modelling, as well as network costs and ROI modelling and QoS in 3G networks.

  1. Medical device integration using mobile telecommunications infrastructure.

    Science.gov (United States)

    Moorman, Bridget A; Cockle, Richard A

    2013-01-01

    Financial pressures, an aging population, and a rising number of patients with chronic diseases, have encouraged the use of remote monitoring technologies. This usually entails at least one physiological parameter measurement for a clinician. Mobile telecommunication technologies lend themselves to this functionality, and in some cases, avoid some of the issues encountered with device integration. Moreover, the inherent characteristics of the mobile telecommunications infrastructure allow a coupling of business and clinical functions that were not possible before. Table I compares and contrasts some key aspect of device integration in and out of a healthcare facility. An HTM professional may be part of the team that acquires and/or manages a system using a mobile telecommunications technology. It is important for HTM professionals to ensure the data is in a standard format so that the interfaces across this system don't become brittle and break easily if one part changes. Moreover, the security and safety considerations of the system and the data should be a primary consideration in and y purchase, with attention given to the proper environmental and encryption mechanisms. Clinical engineers and other HTM professionals are unique in that they understand the patient/clinician/device interface and the need to ensure its safety and effectiveness regardless of geographical environment.

  2. Effect of call-clubs to institute local network effects in mobile telecommunication and its′ implications on brand loyalty

    National Research Council Canada - National Science Library

    E. A .C. P Karunarathne; Zhang Jing

    2017-01-01

    .... Due to severe competition, while employing successful customer loyalty strategies, customer locked-in strategies are also commonly used in the telecommunication industry to retain their customers within the firm...

  3. Mobile networks architecture

    CERN Document Server

    Perez, Andre

    2013-01-01

    This book explains the evolutions of architecture for mobiles and summarizes the different technologies:- 2G: the GSM (Global System for Mobile) network, the GPRS (General Packet Radio Service) network and the EDGE (Enhanced Data for Global Evolution) evolution;- 3G: the UMTS (Universal Mobile Telecommunications System) network and the HSPA (High Speed Packet Access) evolutions:- HSDPA (High Speed Downlink Packet Access),- HSUPA (High Speed Uplink Packet Access),- HSPA+;- 4G: the EPS (Evolved Packet System) network.The telephone service and data transmission are the

  4. CULTURAL INFLUENCES ON PRE-PAY MOBILE TELECOMMUNICATIONS SERVICES USERS

    Directory of Open Access Journals (Sweden)

    Georgeta-Madalina MEGHISAN

    2015-06-01

    Full Text Available Purpose: The purpose of this research paper is to identify the preferences of the pre-pay mobile telecommunications services young users from Romania. Approach/ methodology: The analysis of the pre-pay mobile telecommunications services was made using statistical functions: descriptive statistics, t test, correlation and factor analysis. Results: According to the analysis made, we could underline the habits of usage from the part of pre-pay mobile telecommunications services consumers. Originality: The paper drew an objective analysis on the pre-pay mobile telecommunications services from the perspective of young consumers.

  5. RATIONAL SOLUTIONS FOR DEVELOPMENT OF TELECOMMUNICATIONS NETWORKS

    OpenAIRE

    Sokolov, A.; Sokolov, N.

    2014-01-01

    The number of complicated problems has to be solved during modernization of the telecommunication networks. Some problems can be defined as a search for rational solutions instead of the traditional approach that consists in finding the cost function optimum. This new approach minimizes the risk that inevitably arises when elaborating a long term plan for the telecommunication networks development. The article discusses the proposed methodological approach of finding rational solutions. Probl...

  6. Voice Quality in Mobile Telecommunication System

    Directory of Open Access Journals (Sweden)

    Evaldas Stankevičius

    2013-05-01

    Full Text Available The article deals with methods measuring the quality of voice transmitted over the mobile network as well as related problem, algorithms and options. It presents the created voice quality measurement system and discusses its adequacy as well as efficiency. Besides, the author presents the results of system application under the optimal hardware configuration. Under almost ideal conditions, the system evaluates the voice quality with MOS 3.85 average estimate; while the standardized TEMS Investigation 9.0 has 4.05 average MOS estimate. Next, the article presents the discussion of voice quality predictor implementation and investigates the predictor using nonlinear and linear prediction methods of voice quality dependence on the mobile network settings. Nonlinear prediction using artificial neural network resulted in the correlation coefficient of 0.62. While the linear prediction method using the least mean squares resulted in the correlation coefficient of 0.57. The analytical expression of voice quality features from the three network parameters: BER, C / I, RSSI is given as well.Article in Lithuanian

  7. A new regime for future telecommunication network operations

    NARCIS (Netherlands)

    Gustafsson, S.; Trommelen, P.H.; Vos, C. de

    2010-01-01

    The increasingly crucial role that telecommunications plays in today's information society calls for a new regime for telecommunication network operations. An unbundling of business roles and associated responsibilities is proposed, providing more economic network operations and higher availability

  8. 77 FR 14012 - Eligible Telecommunications Carrier Designation for Participation in Mobility Fund Phase I

    Science.gov (United States)

    2012-03-08

    ... Telecommunications Carrier Designation for Participation in Mobility Fund Phase I AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: In this document, the Commission's Wireless Telecommunications and... Telecommunications Carrier (ETC) Designation from the Commission for participation in Mobility Fund Phase I...

  9. Queuing theory and telecommunications networks and applications

    CERN Document Server

    Giambene, Giovanni

    2014-01-01

    This book provides a basic description of current networking technologies and protocols as well as important tools for network performance analysis based on queuing theory. The second edition adds selected contents in the first part of the book for what concerns: (i) the token bucket regulator and traffic shaping issues; (ii) the TCP protocol congestion control that has a significant part in current networking; (iii) basic satellite networking issues; (iv) adding details on QoS support in IP networks. The book is organized so that networking technologies and protocols (Part I) are first and are then followed by theory and exercises with applications to the different technologies and protocols (Part II). This book is intended as a textbook for master level courses in networking and telecommunications sectors.

  10. Architectures of fiber optic network in telecommunications

    Science.gov (United States)

    Vasile, Irina B.; Vasile, Alexandru; Filip, Luminita E.

    2005-08-01

    The operators of telecommunications have targeted their efforts towards realizing applications using broad band fiber optics systems in the access network. Thus, a new concept related to the implementation of fiber optic transmission systems, named FITL (Fiber In The Loop) has appeared. The fiber optic transmission systems have been extensively used for realizing the transport and intercommunication of the public telecommunication network, as well as for assuring the access to the telecommunication systems of the great corporations. Still, the segment of the residential users and small corporations did not benefit on large scale of this technology implementation. For the purpose of defining fiber optic applications, more types of architectures were conceived, like: bus, ring, star, tree. In the case of tree-like networks passive splitters (that"s where the name of PON comes from - Passive Optical Network-), which reduce significantly the costs of the fiber optic access, by separating the costs of the optical electronic components. That's why the passive fiber optics architectures (PON represent a viable solution for realizing the access at the user's loop. The main types of fiber optics architectures included in this work are: FTTC (Fiber To The Curb); FTTB (Fiber To The Building); FTTH (Fiber To The Home).

  11. Aeronautical telecommunications network advances, challenges, and modeling

    CERN Document Server

    Musa, Sarhan M

    2015-01-01

    Addresses the Challenges of Modern-Day Air Traffic Air traffic control (ATC) directs aircraft in the sky and on the ground to safety, while the Aeronautical Telecommunications Network (ATN) comprises all systems and phases that assist in aircraft departure and landing. The Aeronautical Telecommunications Network: Advances, Challenges, and Modeling focuses on the development of ATN and examines the role of the various systems that link aircraft with the ground. The book places special emphasis on ATC-introducing the modern ATC system from the perspective of the user and the developer-and provides a thorough understanding of the operating mechanism of the ATC system. It discusses the evolution of ATC, explaining its structure and how it works; includes design examples; and describes all subsystems of the ATC system. In addition, the book covers relevant tools, techniques, protocols, and architectures in ATN, including MIPv6, air traffic control (ATC), security of air traffic management (ATM), very-high-frequenc...

  12. A telecommunications journey rural health network.

    Science.gov (United States)

    Moore, Joe

    2012-01-01

    Utilizing a multi-gigabit statewide fiber healthcare network, Radiology Consultants of Iowa (RCI) set out to provide instantaneous service to their rural, critical access, hospital partners. RCIs idea was to assemble a collection of technologies and services that would even out workflow, reduce time on the road, and provide superior service. These technologies included PACS, voice recognition enabled dictation, HL7 interface technology, an imaging system for digitizing paper and prior films, and modern communication networks. The Iowa Rural Health Telecommunication Project was undertaken to form a system that all critical access hospitals would participate in, allowing RCI radiologists the efficiency of "any image, anywhere, anytime".

  13. Analysis And Mathematical Modeling Of Consumer Behavior In Mobile Telecommunications Industry

    Directory of Open Access Journals (Sweden)

    Saranga Gunasekara

    2015-06-01

    Full Text Available Abstract The mobile telecommunications industry is capital intensive by nature. With the rapid advancement of technology and changing consumer behaviors mobile network operators has had to adapt their product and service portfolio in quick succession. The main implication of the need for high capital investments is the risk associated with the investment. Therefore it is essential that mobile telcos follow up technological investments with the correct service provisioning to the customers. This requires a thorough understanding of the behavior of the consumers. Through this paper the author attempts to identify evaluate and quantify the effects of a number of traits of consumers that determine the consumer preference to a particular mobile network brand. The author also provides recommendations on strategy formulation. The evaluation has been carried out in the context of the Sri Lankan Mobile Telecommunications Industry.

  14. Gigabit-capable Passive Optical Network in Telecommunication Networks

    Science.gov (United States)

    Selmanović, Faruk; Skaljo, Edvin; Nemsic, Boris

    2012-04-01

    The main application and usage of a gigabit-capable passive optical network in a telecommunication network is for providing triple-play services to resident users. However, the gigabit-capable passive optical network itself has more bandwidth than triple-play users need, as well as other mechanisms like the ability to provide quality of service. This excess bandwidth and these advance mechanisms can be utilized for other services and applications inside the same telecommunication network. Some of these advanced applications that use this excess bandwidth and capability of providing quality of service are described, and results of tests are presented in this article.

  15. A Scoping Study of the Mobile Telecommunications Industry in Uganda

    OpenAIRE

    Shinyekwa, Isaac

    2012-01-01

    The paper aims at mapping out the Mobile Telecommunications Industry in Uganda with a view to identify areas for further research in a systematic and more detailed way. The economic and social upgrading/downgrading conceptual framework to guide the Capturing the Gains research agenda was used in this process. The paper briefly presents the mobile phone domains, emphasising the relevant parts for Uganda, which include; software development, sales and marketing, mobile service provision and end...

  16. Simulating Autonomous Telecommunication Networks for Space Exploration

    Science.gov (United States)

    Segui, John S.; Jennings, Esther H.

    2008-01-01

    Currently, most interplanetary telecommunication systems require human intervention for command and control. However, considering the range from near Earth to deep space missions, combined with the increase in the number of nodes and advancements in processing capabilities, the benefits from communication autonomy will be immense. Likewise, greater mission science autonomy brings the need for unscheduled, unpredictable communication and network routing. While the terrestrial Internet protocols are highly developed their suitability for space exploration has been questioned. JPL has developed the Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE) tool to help characterize network designs and protocols. The results will allow future mission planners to better understand the trade offs of communication protocols. This paper discusses various issues with interplanetary network and simulation results of interplanetary networking protocols.

  17. Simulating Autonomous Telecommunication Networks for Space Exploration

    Science.gov (United States)

    Segui, John S.; Jennings, Esther H.

    2008-01-01

    Currently, most interplanetary telecommunication systems require human intervention for command and control. However, considering the range from near Earth to deep space missions, combined with the increase in the number of nodes and advancements in processing capabilities, the benefits from communication autonomy will be immense. Likewise, greater mission science autonomy brings the need for unscheduled, unpredictable communication and network routing. While the terrestrial Internet protocols are highly developed their suitability for space exploration has been questioned. JPL has developed the Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE) tool to help characterize network designs and protocols. The results will allow future mission planners to better understand the trade offs of communication protocols. This paper discusses various issues with interplanetary network and simulation results of interplanetary networking protocols.

  18. Quantum teleportation over the Swisscom telecommunication network

    CERN Document Server

    Landry, O; Beveratos, A; Zbinden, H; Gisin, Nicolas; Landry, Olivier; Beveratos, Alexios; Zbinden, Hugo; Gisin, Nicolas

    2006-01-01

    We present a quantum teleportation experiment in the quantum relay configuration using the installed telecommunication network of Swisscom. In this experiment, the Bell state measurement occurs well after the entanglement has been distributed, at a point where the photon upon which data is teleported is already far away, and the entangled qubits are photons created from a different crystal and laser pulse than the teleported qubit. A raw fidelity of 0.93+/-0.04 has been achieved using a heralded single-photon source.

  19. Optical fiber telecommunications systems and networks

    CERN Document Server

    Kaminow, Ivan; Willner, Alan E

    2013-01-01

    Optical Fiber Telecommunications VI (A&B) is the sixth in a series that has chronicled the progress in the R&D of lightwave communications since the early 1970s. Written by active authorities from academia and industry, this edition brings a fresh look to many essential topics, including devices, subsystems, systems and networks. A central theme is the enabling of high-bandwidth communications in a cost-effective manner for the development of customer applications. These volumes are an ideal reference for R&D engineers and managers, optical systems implementers, university researchers and s

  20. Factors Affecting Customer Satisfaction in Mobile Telecommunication Industry in Bangladesh

    Directory of Open Access Journals (Sweden)

    Md. Rahman

    2014-06-01

    Full Text Available Identification of factors responsible for customer satisfaction is a key concern of marketing scholars and marketers in now a days and it will remain in the future. There is considerable evidence that quality factors affecting customer satisfaction in numerous ways. However, this empirical study is initiated to find out what particular factors responsible for customer satisfaction in the mobile tel- ecommunication industry in Bangladesh. 282 samples have been collected through structured questionnaire; study reveals that service innovativeness, service reli- ability, service competitiveness and service consistency have significant influence on making customer satisfied and the operator’s network/signal coverage, pricing, offering, fulfillment of customer demand, value added service, brand value and op - erators contribution for society have insignificant influences on making customer satisfied at five percent level of significant at multiple regression analysis. On the basis of these findings; study concludes that in promoting customer satisfaction mobile service providers should be concerned for factors responsible for insignifi- cant influence on customer satisfaction and care of those factors have significant influence on promoting customer satisfaction in telecommunication industry in Bangladesh.

  1. The diffusion of mobile telecommunication services in the European Union

    NARCIS (Netherlands)

    Gruber, H.; Verboven, F.L.

    2001-01-01

    We study the technological and regulatory determinants of the diffusion of mobile telecommunications services in the European Union, using a logistic model of diffusion. We find that the transition from the analogue to the digital technology during the early 1990s, and the corresponding increase in

  2. MARKETING STUDY REGARDING THE ROMANIAN MOBILE TELECOMMUNICATIONS COMPANIES’ OFFER

    OpenAIRE

    Meghişan Georgeta-Mădălina

    2009-01-01

    The fight of the mobile telecommunication companies to attract clients trends to be much more powerful, because the numbers portability has become a reality. The very competitive market goes to the growth of the price importance in choosing an operator. The short term gain of the operators becomes a long term image risk. The choice of some mobile telephony services is sometimes difficult to be made because of the offer’s complexity. The young people represent an important segment in the curre...

  3. Network Mobiles

    Directory of Open Access Journals (Sweden)

    Alhamali Masoud Alfrgani .Ali

    2015-07-01

    Full Text Available Mobile devices are becoming increasingly popular for delivering multimedia content, particularly by means of streaming. The main disadvantage of these devices is their limited battery life. Unfortunately, streaming of multimedia content causes the battery of the device to discharge very fast, often causing the battery to deplete before the streaming task finishes, resulting in user dissatisfaction. It is generally not possible to charge the device while on the go as electricity socket and charger are required. Therefore, to avoid this user dissatisfaction, it is necessary to find ways to prolong the battery lifetime and to support the completion of the multimedia streaming tasks. A typical architecture for mobile multimedia streaming is presented In this architecture, a wired server streams multimedia content over a wireless IP network to a number of client devices. These devices could be PDAs, smartphones or any other mobile device with 802.11 connectivity. In relation to possible power savings, the multimedia streaming process can be described as consisting of three stages: reception, decoding and playing. Other researchers have shown that energy savings can be made in each stage, for example by using pre-buffering in the reception stage, feedback control during decoding and backlight adjustment for playing. However, it is not a common practice to combine energy savings in the three stages in order to achieve the best

  4. Fuzzy Classification of Customer Insolvency in Mobile Telecommunication

    OpenAIRE

    Walid Moudani; Grace Zaarour; Félix Mora-Camino

    2014-01-01

    This paper proposes a predictive model to handle customer insolvency in advance for large mobile telecommunication companies for the purpose of minimizing their losses while preserving an overall satisfaction of the customers which may have important consequences on the quality and on the consume return of the operations. A new mathematical formulation taking into consideration a set of business rules and the satisfaction of the customers is proposed. However, the customer insolvency is defin...

  5. Impedance matching and DC-DC converter designs for tunable radio frequency based mobile telecommunication systems

    OpenAIRE

    Wong, Yan Chiew

    2014-01-01

    Tunability and adaptability for radio frequency (RF) front-ends are highly desirable because they not only enhance functionality and performance but also reduce the circuit size and cost. This thesis presents a number of novel design strategies in DC-DC converters, impedance networks and adaptive algorithms for tunable and adaptable RF based mobile telecommunication systems. Specifically, the studies are divided into three major directions: (a) high voltage switch controller ba...

  6. Operational performance of the primary transport telecommunication network of Ukraine

    Directory of Open Access Journals (Sweden)

    Bondarenko O. V.

    2013-12-01

    Full Text Available The paper presents statistical data on the number, nature and causes of the damage to underground fiber-optic communication lines, on which the transport telecommunication primary network is based, using an example of Donetsk and Lugansk regions for the period between 2001 and 2010. Comparison of these characteristics with the values of similar parameters over 2001—2005 allows to develop recommendations for the improvement of the reliability of telecommunication networks.

  7. LTE mobile network technology

    OpenAIRE

    Sladič, Klemen

    2012-01-01

    The main purpose of this thesis is an introduction to long term evolution of fourth generation mobile networks based on LTE mobile network standard. Fourth generation mobile networks are currently one of the most developed technology in the world of mobile communications and are somewhere already available for commercial use. At the beginning is a short history of mobile networks evolution, for easier understanding. In the history you can find information from first researches of magnetic...

  8. Mobility Robustness in 5G Networks

    OpenAIRE

    2016-01-01

    5G is the 5th Generation of Mobile telecommunication system. 5G networks will cater to the needs of very diverse user equipment, from millions of stationary sensors per square kilometer to bullet trains running at over 500 km/h. Presence of users with such varied mobility requirements entails us to build a robust mobility architecture for 5G. Two of the important requirements for 5G networks are a lower latency and a higher reliability than in existing generations of mobile networks. To a...

  9. Investigating the quality of video consultations performed using fourth generation (4G) mobile telecommunications.

    Science.gov (United States)

    Caffery, Liam J; Smith, Anthony C

    2015-09-01

    The use of fourth-generation (4G) mobile telecommunications to provide real-time video consultations were investigated in this study with the aims of determining if 4G is a suitable telecommunications technology; and secondly, to identify if variation in perceived audio and video quality were due to underlying network performance. Three patient end-points that used 4G Internet connections were evaluated. Consulting clinicians recorded their perception of audio and video quality using the International Telecommunications Union scales during clinics with these patient end-points. These scores were used to calculate a mean opinion score (MOS). The network performance metrics were obtained for each session and the relationships between these metrics and the session's quality scores were tested. Clinicians scored the quality of 50 hours of video consultations, involving 36 clinic sessions. The MOS for audio was 4.1 ± 0.62 and the MOS for video was 4.4 ± 0.22. Image impairment and effort to listen were also rated favourably. There was no correlation between audio or video quality and the network metrics of packet loss or jitter. These findings suggest that 4G networks are an appropriate telecommunication technology to deliver real-time video consultations. Variations in quality scores observed during this study were not explained by the packet loss and jitter in the underlying network. Before establishing a telemedicine service, the performance of the 4G network should be assessed at the location of the proposed service. This is due to known variability in performance of 4G networks. © The Author(s) 2015.

  10. The applications of mobile telecommunications in new rural areas

    Science.gov (United States)

    Chen, Xia; Lu, Ting-jie

    2009-07-01

    With the current popularity of information and telecommunication technologies, more and more farmers recognize the important role of information. The urgent need for Chinese farmers is how to make use of information to get rich. Contrast in the newspapers, television, radio and other traditional media, mobile information services have unmatched advantages, such as wide spread in very low cost, spread source of widely dispersed, and diverse forms of communication, simple and easy to operate, with strong participatory and interactive, and so on. The paper proposes that Mobile operators can supply different information in accordance with personalized demands of farmers with various agencies, such as government departments, supply and marketing cooperatives, hospitals, banks, veterinary clinics, agricultural stations. They can unite to supply a number of convenience people, rich people, and love for the people's business through the message, voice, WAP and other forms to meet the needs of farmers. Besides, the paper points out that those farmers can order information on personalized service.

  11. ON MOBILE MESH NETWORKS

    OpenAIRE

    2015-01-01

    With the advances in mobile computing technologies and the growth of the Net, mobile mesh networks are going through a set of important evolutionary steps. In this paper, we survey architectural aspects of mobile mesh networks and their use cases and deployment models. Also, we survey challenging areas of mobile mesh networks and describe our vision of promising mobile services. This paper presents a basic introductory material for Masters of Open Information Technologies Lab, interested in m...

  12. An Analytic Hierarchy Process Analysis: Application to Subscriber Retention Decisions in the Nigerian Mobile Telecommunications

    Directory of Open Access Journals (Sweden)

    Adebiyi Sulaimon Olanrewaju

    2015-12-01

    Full Text Available The introduction of mobile number portability (MNP in the Nigerian telecommunications industry has brought a new challenge for mobile operators. This study investigates the use of Analytic Hierarchy Process (AHP in customer retention decisions in the Nigerian telecommunication industry using a cross-sectional survey design. Primary data were obtained through questionnaires administered to 480 mobile telecommunications subscribers in six tertiary institutions located in Lagos State, Nigeria. These educational institutions were chosen using a multistage sampling technique. Of 438 questionnaires received from subscribers, 408 were valid. Based on this sample data an AHP model was built to assess the determinants of customer retention decisions. Next, eigen values, an eigen vector and maximum lambda (λMax were obtained using the AHP analysis for the matrices. This analysis shows that customers considered call quality as the important in the retention decision. We conclude that AHP is a meaningful tool for determining what motivates retention decisions, that can help network operators formulate effective customer retention strategies.

  13. Disaster prevention of telecommunication network; Tsushinmo no bosai taisaku

    Energy Technology Data Exchange (ETDEWEB)

    Maki, H.; Niwa, M. [Nippon Telegraph and Telephone Corp., Tokyo (Japan)

    1995-06-05

    A large scale earthquake was frequently occurred in 1993, 94 causing many damages. Based on the consideration that the telecommunication network has an important role in such the disasters, various measures have been taken from the past. The basic ideas in taking measures for the telecommunication network against disasters are; (1) `Upgrading of system reliability` which includes the strengthening of equipment itself and the redundant composition of network, (2) `Prevention of communication stoppage` which enables to allow communication even when the system is damaged, and (3) `Early reactivation of telecommunication service` when the system is physically damaged. Some examples proved that these approaches taken from the past are effective in the recent seismic disaster. 5 figs., 1 tab.

  14. Information technology -- Telecommunications and information exchange between systems -- Corporate telecommunication networks -- Signalling interworking between QSIG and H.323 -- Generic functional protocol for the support of supplementary services

    CERN Document Server

    International Organization for Standardization. Geneva

    2001-01-01

    Information technology -- Telecommunications and information exchange between systems -- Corporate telecommunication networks -- Signalling interworking between QSIG and H.323 -- Generic functional protocol for the support of supplementary services

  15. Discovering Mobile Social Networks by Semantic Technologies

    Science.gov (United States)

    Jung, Jason J.; Choi, Kwang Sun; Park, Sung Hyuk

    It has been important for telecommunication companies to discover social networks from mobile subscribers. They have attempted to provide a number of recommendation services, but they realized that the services were not successful. In this chapter, we present semantic technologies for discovering social networks. The process is mainly composed of two steps; (1) profile identification and (2) context understanding. Through developing a Next generation Contents dElivery (NICE) platform, we were able to generate various services based on the discovered social networks.

  16. Model of Customer Buying Behavior in the CZ Mobile Telecommunication Market

    OpenAIRE

    Ondrej Grünwald

    2012-01-01

    The Czech mobile telecommunication market constitutes an oligopoly of three operators, who have built a privileged position and effectively crush any competition. The entry of a new operator has been considered by the government since the end of 2009. The new mobile operator should push down the prices of services, which are the highest in Europe and also affect the development of new mobile services. This paper analyzes consumer behavior in the mobile telecommunication market. It reveals how...

  17. A Functional Complexity Framework for the Analysis of Telecommunication Networks

    CERN Document Server

    Dzaferagic, Merim; Macaluso, Irene; Marchetti, Nicola

    2016-01-01

    The rapid evolution of network services demands new paradigms for studying and designing networks. In order to understand the underlying mechanisms that provide network functions, we propose a framework which enables the functional analysis of telecommunication networks. This framework allows us to isolate and analyse a network function as a complex system. We propose functional topologies to visualise the relationships between system entities and enable the systematic study of interactions between them. We also define a complexity metric $C_F$ (functional complexity) which quantifies the variety of structural patterns and roles of nodes in the topology. This complexity metric provides a wholly new approach to study the operation of telecommunication networks. We study the relationship between $C_F$ and different graph structures by analysing graph theory metrics in order to recognize complex organisations. $C_F$ is equal to zero for both a full mesh topology and a disconnected topology. We show that complexi...

  18. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  19. Mobile networks and computing

    CERN Document Server

    Rajasekaran, Sanguthevar; Hsu, D Frank

    2000-01-01

    Advances in the technologies of networking, wireless communications, and miniaturization of computers have lead to rapid development in mobile communication infrastructure and have engendered a new paradigm of computing. Users carrying portable devices can now move freely about while remaining connected to the network. This "portability" allows for access to information from anywhere and at any time. The flexibility has resulted in new levels of complexity not encountered previously in software and protocol design for wired networking. New challenges in designing software systems for mobile networks include location and mobility management, channel allocation, power conservation, and more. In this book, renowned researchers in the field address these aspects of mobile networking.

  20. QKD in Standard Optical Telecommunications Networks

    CERN Document Server

    Lancho, D; Elkouss, D; Soto, M; Martin, V; 10.1007/978-3-642-11731-2_18

    2010-01-01

    To perform Quantum Key Distribution, the mastering of the extremely weak signals carried by the quantum channel is required. Transporting these signals without disturbance is customarily done by isolating the quantum channel from any noise sources using a dedicated physical channel. However, to really profit from this technology, a full integration with conventional network technologies would be highly desirable. Trying to use single photon signals with others that carry an average power many orders of magnitude bigger while sharing as much infrastructure with a conventional network as possible brings obvious problems. The purpose of the present paper is to report our efforts in researching the limits of the integration of QKD in modern optical networks scenarios. We have built a full metropolitan area network testbed comprising a backbone and an access network. The emphasis is put in using as much as possible the same industrial grade technology that is actually used in already installed networks, in order t...

  1. Ad hoc networks telecommunications and game theory

    CERN Document Server

    Benslama, Malek; Batatia, Hadj

    2015-01-01

    Random SALOHA and CSMA protocols that are used to access MAC in ad hoc networks are very small compared to the multiple and spontaneous use of the transmission channel. So they have low immunity to the problems of packet collisions. Indeed, the transmission time is the critical factor in the operation of such networks. The simulations demonstrate the positive impact of erasure codes on the throughput of the transmission in ad hoc networks. However, the network still suffers from the intermittency and volatility of its efficiency throughout its operation, and it switches quickly to the satura

  2. Network Asymmetries and Access Pricing in Cellular Telecommunications

    NARCIS (Netherlands)

    V. Kocsis

    2005-01-01

    textabstractNetwork shares and retail prices are not symmetric in the telecommunications market with multiple bottlenecks which give rise to new questions of access fee regulation. In this paper we consider a model with two types of asymmetry arising from different entry timing, i.e. a larger reputa

  3. Network Asymmetries and Access Pricing in Cellular Telecommunications

    NARCIS (Netherlands)

    V. Kocsis

    2005-01-01

    textabstractNetwork shares and retail prices are not symmetric in the telecommunications market with multiple bottlenecks which give rise to new questions of access fee regulation. In this paper we consider a model with two types of asymmetry arising from different entry timing, i.e. a larger reputa

  4. Countrywide rainfall maps from a commercial cellular telecommunication network

    Science.gov (United States)

    Overeem, A.; Leijnse, H.; Uijlenhoet, R.

    2012-12-01

    Accurate rainfall observations with high spatial and temporal resolutions are needed for hydrological applications, agriculture, meteorology, and climate monitoring. However, the majority of the land surface of the earth lacks accurate rainfall information. Many countries do not have continuously operating weather radars, and have no or few rain gauges. A new development is rainfall estimation from microwave links of commercial cellular telecommunication networks. Such networks cover large parts of the land surface of the earth and have a high density, especially in urban areas. The estimation of rainfall using commercial microwave links could therefore become a valuable source of information. The data produced by microwave links is essentially a by-product of the communication between mobile telephones. Rainfall attenuates the electromagnetic signals transmitted from one telephone tower to another. By measuring the received power at one end of a microwave link as a function of time, the path-integrated attenuation due to rainfall can be calculated. Previous studies have shown that average rainfall intensities over the length of a link can be derived from the path-integrated attenuation. A dataset from a commercial microwave link network over the Netherlands is analyzed, containing data from an unprecedented number of links (1500) covering the land surface of the Netherlands (35500 km2). This dataset consists of 24 days with substantial rainfall in June - September 2011. A rainfall retrieval algorithm is presented to derive rainfall intensities from the microwave link data, which have a temporal resolution of 15 min. Rainfall maps (1 km spatial resolution) are generated from these rainfall intensities using Kriging. This algorithm is suited for real-time application, and is calibrated on a subset (12 days) of the dataset. The other 12 days in the dataset are used to validate the algorithm. Both calibration and validation are done using gauge-adjusted radar data

  5. NETWORK MOBILITY SUPPORTED PROXY MOBILE IPV6

    Directory of Open Access Journals (Sweden)

    Ananthi Jebaseeli SamuelRaj

    2014-01-01

    Full Text Available Proxy Mobile IPV6 (PMIPV6 is a network-based mobility management protocol, designed to keep track of individual mobile node’s movement. So a mobile node can easily roam in PMIPV6 network without changing it’s IP address. Network Mobility-Basic Support Protocol (NEMO-BSP, based on MIPV6, is the protocol designed for mobility management of NEMO in MPIV6 network. But NEMO-BSP cannot be directly used in PMIPV6 due to differences in the underlying protocols. To make PMIPV6 as a complete mobility management protocol, functionality of PMIPV6 should be enhanced to support network mobility in PMIPV6. This work enhances functionality of PMIPV6 and NEMO-BSP protocols and proposes a new architecture called NEMO supported PMIPV6 that supports movement of mobile nodes as well as network mobility in PMIPV6 network.

  6. TRENDS IN THE ROMANIAN MOBILE TELECOMMUNICATION SERVICES MARKET

    Directory of Open Access Journals (Sweden)

    CECILIA IRINA RABONTU

    2015-12-01

    Full Text Available Managing space and especially time are perhaps the most important challenges accepted in the economy of the immaterial. The telecommunication services, by their volatile nature, unlimited as potential and relational by definition, found the solutions that transform time into an economic variable, differentiated and easy handled. Information technology, audiovisual and telecommunication contributed individually, but mostly focused, on domination and compressing time, even canceling space. The logical support of techniques for transmitting images, sounds and information is provided through telecommunications. The most dynamic and perishable services in the contemporary period are found in the telecommunications area, which is facing an exacerbated instability of the market and the need for a financial power increasingly larger. We have proposed in this paper to analyze the current state of this category of services and to determine the trends regarding the evolution of Romanian telecommunications market.

  7. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  8. Mobile Subscription, Penetration and Coverage Trends in Kenya’s Telecommunication Sector

    Directory of Open Access Journals (Sweden)

    Omae Malack Oteri

    2015-01-01

    Full Text Available Communication is the activity of conveying information through the exchange of thoughts, messages, or information, as by speech, visuals, signals, writing, or behavior. In Kenya the mobile subscription, penetration and coverage have been growing since the first mobile operators started operating in 1999. The current mobile operators in Kenya are given by Safaricom Ltd, Airtel Networks Kenya Ltd, Essar Telecom Kenya Ltd and Telkom Kenya Ltd (TKL-Orange. This paper discusses the present condition of the telecommunication sector in Kenya and the trends in subscription, penetration and coverage since 1999 when the first two mobile operators (Safaricom Ltd and Celtel now as Airtel Networks Kenya Ltd started their operations and later the introduction of two other operators Essar Telecom Kenya Ltd and Telkom Kenya Ltd (Orange brand in 2008. The paper also tries to find out what is likely to happen in a few years to come and provision of a set of recommendations based on the analysis. The study was based on extensive literature review and secondary data sources mainly from Communication Authority of Kenya (CAK. The data obtained was analyzed using Matlab and Microsoft excel to obtain the relevant graphical representations as given in results and discussions.

  9. A Flexible System for Simulating Aeronautical Telecommunication Network

    Science.gov (United States)

    Maly, Kurt; Overstreet, C. M.; Andey, R.

    1998-01-01

    At Old Dominion University, we have built Aeronautical Telecommunication Network (ATN) Simulator with NASA being the fund provider. It provides a means to evaluate the impact of modified router scheduling algorithms on the network efficiency, to perform capacity studies on various network topologies and to monitor and study various aspects of ATN through graphical user interface (GUI). In this paper we describe briefly about the proposed ATN model and our abstraction of this model. Later we describe our simulator architecture highlighting some of the design specifications, scheduling algorithms and user interface. At the end, we have provided the results of performance studies on this simulator.

  10. IDS in Telecommunication Network using PCA

    Directory of Open Access Journals (Sweden)

    T. K. Abdelhamid

    2013-07-01

    Full Text Available Data Security has become a very serious part of any organizational information system.Internet threatshavebecome moreintelligentso itcan deceivethe basic security solutions such as firewalls and antivirusscanners.To enhance the overall security of the networkan additional security layer such asintrusiondetection system(IDShas to be added.The anomaly detection IDSisa typeof IDS thatcandifferentiatebetweennormal and abnormal in thedata monitored. This paper proposes two types of IDS, oneof themcanbeusedasa network intrusion detection system(NIDS with overallsuccess (0.9161 and highdetection rate (0.9288 andtheothertypecanalso beusedasa host intrusion detection system(HIDS withoverall success (0.8493 and very high detection rate (0.9628using NSL-KDD data set

  11. Low energy air conditioning of shelters for telecommunication networks

    Energy Technology Data Exchange (ETDEWEB)

    Romagnoni, P. [Ist. Univ. di Architettura, Venezia (Italy); Scattolin, M. [Liebert Hiross, Piove di Sacco (PD) (Italy); Zecchin, R. [Dipt. di Fisica Tecnica, Padova (Italy)

    2000-07-01

    The control of the air temperature in a shelter for telecommunication networks is an important task for the correct operation of its electronic equipment. Different technical solutions have been studied in order to improve the energy performances of air conditioning plants: for this purpose direct free cooling allows to reduce the energy consumption to maintain the internal air temperature below the prescribed values. Nowadays the internal air temperature may rise up to 60 C, due to the high technology of the electronic equipment, and new solutions for the air temperature control can be proposed. This paper analyses the dynamic thermal performances of a shelter used in telecommunication networks, fitted up with an ''air - to air'' plate heat exchanger without mixing between internal and external air flows. Useful information, concerning the thermal and energy performances of this system is given for design purposes. (orig.)

  12. Model of Customer Buying Behavior in the CZ Mobile Telecommunication Market

    Directory of Open Access Journals (Sweden)

    Ondrej Grünwald

    2012-01-01

    Full Text Available The Czech mobile telecommunication market constitutes an oligopoly of three operators, who have built a privileged position and effectively crush any competition. The entry of a new operator has been considered by the government since the end of 2009. The new mobile operator should push down the prices of services, which are the highest in Europe and also affect the development of new mobile services. This paper analyzes consumer behavior in the mobile telecommunication market. It reveals how different elements are considered by customers and what is important when choosing a mobile tariff. With use conjoint analysis, we obtained empirical arguments about the preferences of customersin the Czech Republic. The analysis shows that the relatively high price of services greatly reduces the unsaturated demand in the mobile telecommunication market, and proves that the price is crucial in customer decision-making.

  13. Improvement in Energy Optimization in Telecommunication Network Service

    Directory of Open Access Journals (Sweden)

    Kadiri Kamoru. O

    2014-09-01

    Full Text Available Energy-efficient operation is an important issue today in telecommunication networks and in the near future. Due to the fact that the energy consumption rises with the increased in demand for capacity and network speed, this arises a strategies for a sustainable network management. It is a well-known fact that traffic demands vary significantly over periods and areas, most notably in day/night- and in weekly cycles. This provides the main potential for energy-saving strategies. Here is the question of how much power is necessary to operate a network during peak or low-traffic times? How much energy is spent in the core and in metro regions of the network and how big are the savings in low-demand scenarios if we always assume the system power-minimum in these situations? The study respects realistic side constraints, such as protection requirements and routing schemes, and takes the special structure of an extensive nation-wide optical network, including backbone and regional sections, into account. This paper presents a comprehensive summary of recent work addressing energy efficient and low-power design within all layers of the telecommunication network

  14. AN APPLICATION FOR EFFICIENT TELECOMMUNICATION NETWORKS PROVISIONING USING LINEAR PROGRAMMING

    Directory of Open Access Journals (Sweden)

    Maria Augusta Soares Machado

    2015-03-01

    Full Text Available This paper presents a practical proposition for the application of the Linear Programming quantitative method in order to assist planning and control of customer circuit delivery activities in telecommunications companies working with the corporative market. Based upon data provided for by a telecom company operating in Brazil, the Linear Programming method was employed for one of the classical problems of determining the optimum mix of production quantities for a set of five products of that company: Private Telephone Network, Internet Network, Intranet Network, Low Speed Data Network, and High Speed Data Network, in face of several limitations of the productive resources, seeking to maximize the company’s monthly revenue. By fitting the production data available into a primary model, observation was made as to what number of monthly activations for each product would be mostly optimized in order to achieve maximum revenues in the company. The final delivery of a complete network was not observed but the delivery of the circuits that make it up, and this was a limiting factor for the study herein, which, however, brings an innovative proposition for the planning of private telecommunications network provisioning.

  15. Photovoltaic power supply for telecommunication network components in remote areas

    Energy Technology Data Exchange (ETDEWEB)

    Steinhueser, A.; Schulz, W.; Schmidt, H.; Roth, W. [Fraunhofer Inst. for Solar Energy Systems ISE, Freiburg (Germany)

    2000-07-01

    In general, telecommunication facilities do not allow much flexibility in the choice of location; the main criterion is that the facility must work with 100% availability and reliability. Corresponding to the wide spectrum of locations, the applied power supply technologies are very diverse: grid connection, diesel generators, photovoltaics (PV), fuel cells, thermoelectric converters and wind generators. The first three types of technology have been used by the telecommunications industry for decades. The other options are at developmental stages between laboratory samples and limited series production. The traditional approach to supply power remote from the grid is by using diesel generators and storage batteries. This means high power ratings, but also high prices and a high maintenance demand. The convergence of telecommunications networks, i.e. overlap of the cabled network and radio cellular networks, with its enormous demand for installation sites, introduces new demands on power supplies: they must be reliable, maintenance-free, inexpensive, flexibly adaptable to widely divergent technologies. At two examples, a PV-hybrid system for a repeater station for cellular phones and a PV powered intelligent information system, the advantages that offer PV off-grid solutions in the system design are shown. (orig.)

  16. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  17. Actual Question of Telecommunication Systems and Networks Research Actual Question of Telecommunication Systems and Networks Research

    Directory of Open Access Journals (Sweden)

    D. Ju. Jurcenko

    2006-01-01

    Full Text Available

     

    This contribution aims to inform readers about topics of scientific research performed at the Department of Radioand Communication Engineering (Kafedra radiotechniki i elektrosvjazi, the Institute of Control Systems, Telecommunications and Electrification, Moscow State University of Communication Means (MIIT. The paper contains brief descriptions of papers written by PhD students of the given Department that are available at.

     

    This contribution aims to inform readers about topics of scientific research performed at the Department of Radioand Communication Engineering (Kafedra radiotechniki i elektrosvjazi, the Institute of Control Systems, Telecommunications and Electrification, Moscow State University of Communication Means (MIIT. The paper contains brief descriptions of papers written by PhD students of the given Department that are available at.

  18. Satellite communications for the next generation telecommunication services and networks

    Science.gov (United States)

    Chitre, D. M.

    1991-01-01

    Satellite communications can play an important role in provisioning the next-generation telecommunication services and networks, provided the protocols specifying these services and networks are satellite-compatible and the satellite subnetworks, consisting of earth stations interconnected by the processor and the switch on board the satellite, interwork effectively with the terrestrial networks. The specific parameters and procedures of frame relay and broadband integrated services digital network (B-ISDN) protocols which are impacted by a satellite delay. Congestion and resource management functions for frame relay and B-ISDN are discussed in detail, describing the division of these functions between earth stations and on board the satellite. Specific onboard and ground functions are identified as potential candidates for their implementation via neural network technology.

  19. Novel anomaly detection approach for telecommunication network proactive performance monitoring

    Institute of Scientific and Technical Information of China (English)

    Yanhua YU; Jun WANG; Xiaosu ZHAN; Junde SONG

    2009-01-01

    The mode of telecommunication network management is changing from "network oriented" to "subscriber oriented". Aimed at enhancing subscribers'feeling, proactive performance monitoring (PPM) can enable a fast fault correction by detecting anomalies designating performance degradation. In this paper, a novel anomaly detection approach is the proposed taking advantage of time series prediction and the associated confidence interval based on multiplicative autoregressive integrated moving average (ARIMA). Furthermore, under the assumption that the training residual is a white noise process following a normal distribution, the associated confidence interval of prediction can be figured out under any given confidence degree 1-α by constructing random variables satisfying t distribution. Experimental results verify the method's effectiveness.

  20. Mobility Network and Safety

    Directory of Open Access Journals (Sweden)

    Adriana Galderisi

    2010-04-01

    Full Text Available Mobility network is crucial for ensuring territorial safety with respect to natural and technological hazards. They represent a basic support to community’s everyday life although being exposed elements often characterized by high vulnerability to different hazards and, in the meanwhile, strategic equipments for emergency management. Physical damages or the lack in functioning of those networks may greatly increase the loss of human lives caused by hazardous events as well as produce relevant economic damages at medium and long term. Although the relevance of the mobility networks in assuring territorial safety is at present largely recognized, risk analyses have been long focused on buildings’ vulnerability or, even where they have paid attention to mobility network, they have been mainly focused on the physical damages that a given hazard could may induce on individual elements of such network. It is recent the awareness that mobility network represents a system, characterized by relevant interdependences both among its elements and among network infrastructures and urban systems. Based on these assumptions, this paper points out the heterogeneous aspects of the mobility network vulnerability and their relevance in increasing the overall territorial or urban vulnerability to hazardous events. Therefore, an in-depth investigation of the concept of mobility network vulnerability is provided, in order to highlight the aspects mostly investigated and more recent research perspectives. Finally, a case study in the Campania Region is presented in order to point out how traditional risk analyses, generally referred to individual hazards, can sometimes led to invest in the mobility network improvement or development which, targeted to increase the security of a territory result, on the opposite, in an increase of the territorial vulnerability.

  1. Network technologies for O-band quantum telecommunications

    Science.gov (United States)

    Hall, Matthew A.

    We have developed and characterized the preliminary network components necessary to realize practical quantum telecommunications in the 1310-nm O-band of the existing fiber optic infrastructure. Quantum network components available, at classical-telecommunicationsspeed, in the O-band would allow single-photon-level quantum data to be multiplexed with the bright 1550-nm C-band data that the telecommunications infrastructure already supports, therefore enabling quantum information---be it for quantum computing, cryptography, games or other purposes---to be easily distributed to remote parties. Two necessary network components are presented: a high-quality source of O-band entangled photon pairs and a switch capable of routing single photons while preserving the entanglement between the photon and its partner. The pairs are created in standard optical fiber, allowing for near-lossless coupling to the existing telecommunications infrastructure. The method used is also scalable, both in creating future identical sources and operating at much higher repetition rates. Such higher rates will ensure that a meaningful number of entangled photon pairs survive distribution, which is inherently lossy (though fiber optics minimize this loss over long distances). The other component required to establish a network more advanced than a point-to-point link is a single-photon switch. In order to successfully implement such a switch for the quantum data of interest, the design must be able to switch single-photon level signals with very low loss and near unity probability of success. It is capable of operating at network speeds while preserving the photon's quantum state.

  2. The Space Mobile Network

    Science.gov (United States)

    Israel, David

    2017-01-01

    The definition and development of the next generation space communications and navigation architecture is underway. The primary goals are to remove communications and navigations constraints from missions and to enable increased autonomy. The Space Mobile Network (SMN) is an architectural concept that includes new technology and operations that will provide flight systems with an similar user experience to terrestrial wireless mobile networks. This talk will describe the SMN and its proposed new features, such as Disruption Tolerant Networking (DTN), optical communications, and User Initiated Services (UIS).

  3. Comparison of VDL Modes in the Aeronautical Telecommunications Network

    Science.gov (United States)

    Bretmersky, Steven; Konangi, Vijay K.; Kerczewski, Robert J.

    2002-01-01

    VHF Digital Link (VDL) has been identified as a method of communication between aircraft and ground stations in the Aeronautical Telecommunications Network (ATN). Three different modes of VDL have been suggested for implementation. Simulations were conducted to compare the data transfer capabilities of VDL Modes 2, 3, and 4. These simulations focus on up to 50 aircraft communicating with a single VDL ground station. The data traffic is generated by the standard File Transfer Protocol (FTP) and Hyper Text Transfer Protocol (HTTP) applications in the aircraft. Comparisons of the modes are based on the number of files and pages transferred and the response time.

  4. A Model-Driven Approach for Telecommunications Network Services Definition

    Science.gov (United States)

    Chiprianov, Vanea; Kermarrec, Yvon; Alff, Patrick D.

    Present day Telecommunications market imposes a short concept-to-market time for service providers. To reduce it, we propose a computer-aided, model-driven, service-specific tool, with support for collaborative work and for checking properties on models. We started by defining a prototype of the Meta-model (MM) of the service domain. Using this prototype, we defined a simple graphical modeling language specific for service designers. We are currently enlarging the MM of the domain using model transformations from Network Abstractions Layers (NALs). In the future, we will investigate approaches to ensure the support for collaborative work and for checking properties on models.

  5. Automation in Developing Technical Documentation of Telecommunication Networks

    Directory of Open Access Journals (Sweden)

    Slavko Šarić

    2004-09-01

    Full Text Available During the last decade of the 20th century, intensive developmentof telecommunication infrastructure set high requirementsregarding technical documentation that started to haveproblems in following the changes in the network. In the lastseveral years HT made a great shift regarding automation andpresentation of technical documentation, that is introductionof GIS (Geographic Information System, as precondition forthe introduction of DIS (Documentation Information System,thus realising the necessary preconditions to use the gatheredand organised spatial and atllibute data, for higher quality ofanalysis, processing and repair of interference in the telecommunicationnetwork The aim of this paper is to inform aboutthe segments and computer programs used for the developmentof technical documentation.

  6. Optical ground wire for Hydro-Quebec`s telecommunication network

    Energy Technology Data Exchange (ETDEWEB)

    Ghannoum, E.; Chouteau, J.P.; Miron, M.; Yaacoub, S. [Hydro-Quebec, Montreal, Quebec (Canada); Yoshida, K.

    1995-10-01

    An extensive telecommunication network of 6,000 km of Optical Ground Wire (OPGW) is currently planned by Hydro-Quebec for progressive installation from 1992 to 2004. By 1994, about 1,600 km of OPGW have already been purchased and installed mostly on new 735 kV lines. This document provides information relative to the OPGW selection, characteristics, design, fabrication, and testing. Other sections are devoted to the installation experience, description of current and future R and D OPGW projects, and Authors` biography.

  7. Decomposition method for zonal resource allocation problems in telecommunication networks

    Science.gov (United States)

    Konnov, I. V.; Kashuba, A. Yu

    2016-11-01

    We consider problems of optimal resource allocation in telecommunication networks. We first give an optimization formulation for the case where the network manager aims to distribute some homogeneous resource (bandwidth) among users of one region with quadratic charge and fee functions and present simple and efficient solution methods. Next, we consider a more general problem for a provider of a wireless communication network divided into zones (clusters) with common capacity constraints. We obtain a convex quadratic optimization problem involving capacity and balance constraints. By using the dual Lagrangian method with respect to the capacity constraint, we suggest to reduce the initial problem to a single-dimensional optimization problem, but calculation of the cost function value leads to independent solution of zonal problems, which coincide with the above single region problem. Some results of computational experiments confirm the applicability of the new methods.

  8. Test using communication satellite for security telecommunication network

    Energy Technology Data Exchange (ETDEWEB)

    Kimura, M.

    1988-01-01

    The authors confirmed by their experiment results that the satellite communication could be practically used for remote monitoring and control in gas distribution systems and data communication not only in emergency but also as the reinforced means of communication network. This report deals with the general description of the security communication network, our experiment of satellite operating system, the results and further plan for the practical application. Their company has started the test on the utilization of a communication satellite (CS-2 Japanese domestic communication satellite) since July, 1984, for the purpose of securing the telecommunication network in case of disaster and applying the satellite communications to data communication suitable for the information age, as for a gas utility industry.

  9. Assessment of Renewable Energy Technology and a Case of Sustainable Energy in Mobile Telecommunication Sector

    Science.gov (United States)

    Okundamiya, Michael S.; Emagbetere, Joy O.; Ogujor, Emmanuel A.

    2014-01-01

    The rapid growth of the mobile telecommunication sectors of many emerging countries creates a number of problems such as network congestion and poor service delivery for network operators. This results primarily from the lack of a reliable and cost-effective power solution within such regions. This study presents a comprehensive review of the underlying principles of the renewable energy technology (RET) with the objective of ensuring a reliable and cost-effective energy solution for a sustainable development in the emerging world. The grid-connected hybrid renewable energy system incorporating a power conversion and battery storage unit has been proposed based on the availability, dynamism, and technoeconomic viability of energy resources within the region. The proposed system's performance validation applied a simulation model developed in MATLAB, using a practical load data for different locations with varying climatic conditions in Nigeria. Results indicate that, apart from being environmentally friendly, the increase in the overall energy throughput of about 4 kWh/$ of the proposed system would not only improve the quality of mobile services, by making the operations of GSM base stations more reliable and cost effective, but also better the living standards of the host communities. PMID:24578673

  10. Assessment of renewable energy technology and a case of sustainable energy in mobile telecommunication sector.

    Science.gov (United States)

    Okundamiya, Michael S; Emagbetere, Joy O; Ogujor, Emmanuel A

    2014-01-01

    The rapid growth of the mobile telecommunication sectors of many emerging countries creates a number of problems such as network congestion and poor service delivery for network operators. This results primarily from the lack of a reliable and cost-effective power solution within such regions. This study presents a comprehensive review of the underlying principles of the renewable energy technology (RET) with the objective of ensuring a reliable and cost-effective energy solution for a sustainable development in the emerging world. The grid-connected hybrid renewable energy system incorporating a power conversion and battery storage unit has been proposed based on the availability, dynamism, and technoeconomic viability of energy resources within the region. The proposed system's performance validation applied a simulation model developed in MATLAB, using a practical load data for different locations with varying climatic conditions in Nigeria. Results indicate that, apart from being environmentally friendly, the increase in the overall energy throughput of about 4 kWh/$ of the proposed system would not only improve the quality of mobile services, by making the operations of GSM base stations more reliable and cost effective, but also better the living standards of the host communities.

  11. Strategi Persaingan Operator Telekomunikasi Seluler [The Competition Strategy Of Mobile Telecommunication Operators

    Directory of Open Access Journals (Sweden)

    Azwar Aziz

    2015-06-01

    Full Text Available Jumlah pelanggan ketiga operator telekomunikasi seluler pada akhir tahun 2013, yaitu PT. Telkomsel Tbk, PT. XL Axiata Tbk, dan PT. Indosat Tbk, sebanyak 251,285 juta. Jumlah pelanggan telekomunikasi seluler ini telah melebihi jumlah penduduk Indonesia  sebesar 242,013 juta pada akhir tahun 2013. Ketiga operator telekomunikasi seluler tersebut mendominasi pangsa pasar seluler di Indonesia dan sangat menentukan tingkat harga, kualitas layanan dan strategi persaingan lainnya. Persaingan di telekomunikasi seluler saat ini sudah masuk ke masa jenuh untuk suara dan SMS, tetapi sudah beralih ke layanan data atau menggunaan internet. Para operator telekomunikasi seluler berlomba-lomba untuk meningkatkan kualitas layanan internet kepada pelanggan yang menggunakan prabayar dan pascabayar untuk suara dan SMS.Kajian ini menggunakan metodologi penelitian kualitatif, dengan melakukan observasi atau pengamatan langsung ke lapangan kepada Telkomsel, XL Axiata dan Indosat.Teknik analisis data menggunakan teknik analisis deskritif. Berdasarkan hasil analisis  diperoleh bahwa strategi persaingan ketiga operator tersebut dari aspekcore competence, time based competition, disiplin nilai sama-sama mengimplementasikannya. Dari aspek expeditionary marketing sangat tergantung pada luas jaringan yang dimiliki, aspek standar produk, memiliki sertifikat ISO yang lebih baik dan kompetensi manajemen fokus pada sumber daya manusia dengan belajar ke luar negeri. *****The number of subscribers of three mobile telecommunication operators by the end of 2013, namely PT. Telkomsel Tbk,  PT. XL Axiata Tbk,  and PT. Indosat Tbk is 251.285 million. The number of mobile telecommunication subscribers has exceeded the population of Indonesia amounted to 242.013 million at the end of 2013. Those  operators dominate the market in Indonesia  and determine the level of price, quality of service and other competitive strategies. Competition in the mobile telecommunications currently

  12. Mobile network maintenance (GSM)

    CERN Multimedia

    IT Department

    2009-01-01

    Maintenance work will be carried out on the CERN mobile network infrastructure (GSM) on the 23 and 24 July from 6 p.m. to 6 a.m. in order to replace discontinued equipment and to increase the bandwidth capacity of the GSM mobile network. All CERN GSM emitters (40 units) will be moved one by one to the new infrastructure during the maintenance. The call of a user connected to an emitter at the time of its maintenance will be cut off. However, the general overlapping of the GSM radio coverage should mean that users are able immediately to call again should their call be interrupted. IT/CS/CS

  13. Ethernet Time Transfer through a U.S. Commercial Optical Telecommunications Network

    Science.gov (United States)

    2014-12-01

    Ethernet Time Transfer through a U.S. Commercial Optical Telecommunications Network M. Weiss, NIST Time and Frequency Division, mweiss... telecommunications and data networks through precision synchronization.” Marc founded and has led WSTS, the Workshop on Sync in Telecom Systems...signals through a telecommunication network. This experiment connects UTC(NIST) in Boulder, Colorado with UTC(USNO) at the Alternate Master Clock at

  14. Application of the ETOM framework for defining processes in the telecommunication systems management network of the Serbian Army

    Directory of Open Access Journals (Sweden)

    Vladimir B. Suša

    2013-10-01

    resources management. Planning and development of a TMN includes development and services management processes, as well as development and resources management processes (applications and network elements. Managed telecommunication networks in the Serbian Army The managed telecommunication  system which is currently in use in the Serbian Army can be divided, considering the purpose of each element, into the following: commutation subsystem, WAN and access subsystem, radio subsystem, infrastructural subsystem (power supply, etc. and TMN subsystem. These elements represent independent managed subsystems which are controlled and overviewed by various applications. Within the Serbian Army structural organization, there has been a need for centralized management which would optimize heterogeneous TMN and administrator management functions. To achieve this, necessary TMN functions and services have to be defined. This process starts with the TMN functions and services defined for each of the subsystems. TMN end-to-end processes defining Considering TMN functions and services (ITU-T M.3050, several factors with a considerable influence on TMN functioning can be mentioned. These are the variety of installed telecommunication devices, the diversity of TMN applications, the amount of customer demands for configuration modification (new customers, new connections, new services, etc. and the quantity of system errors which demand the administrator reaction (different weight alarms  coming from the system. Each subsystem produced by a different manufacturer requires the interconnection access points between the TMN and the network equipment as well as a special group of administrators that manage that entity. Therefore, the division of the TMN functions has to depend on the characteristics of equipment to be managed. The nature of military telecommunication networks is to have a vast amount of demands for system configuration changing. The mobile component of the network is quite a

  15. Green mobile networks a networking perspective

    CERN Document Server

    Ansari, Nirwan

    2016-01-01

    Combines the hot topics of energy efficiency and next generation mobile networking, examining techniques and solutions. Green communications is a very hot topic. Ever increasing mobile network bandwidth rates significantly impacts on operating costs due to aggregate network energy consumption. As such, design on 4G networks and beyond has increasingly started to focus on 'energy efficiency' or so-called 'green' networks. Many techniques and solutions have been proposed to enhance the energy efficiency of mobile networks, yet no book has provided an in-depth analysis of the energy consumption issues in mobile networks nor offers detailed theories, tools and solutions for solving the energy efficiency problems.

  16. Telecommunication reform in Ghana

    OpenAIRE

    Haggarty, Luke; Mary M. Shirley; Wallsten, Scott

    2003-01-01

    In 1996 Ghana privatized its incumbent telecommunications firm by selling 30 percent of Ghana Telecom to Telekom Malaysia, licensing a second network operator, and allowing multiple mobile firms to enter the market. The reforms yielded mixed results. Landline telephone penetration increased dramatically while the number of mobile subscribers surpassed even this higher level of fixed line s...

  17. Networking a mobile robot

    Science.gov (United States)

    McKee, Gerard T.

    1994-10-01

    Conventional mobile robotic systems are `stand alone'. Program development involves loading programs into the mobile, via an umbilical. Autonomous operation, in this context, means `isolation': the user cannot interact with the program as the robot is moving around. Recent research in `swarm robotics' has exploited wireless networks as a means of providing inter- robot communication, but the population is still isolated from the human user. In this paper we report on research we are conducting into the provision of mobile robots as resources on a local area computer network, and thus breaking the isolation barrier. We are making use of new multimedia workstation and wireless networking technology to link the robots to the network in order to provide a new type of resource for the user. We model the robot as a set of resources and propose a client-server architecture as the basis for providing user access to the robots. We describe the types of resources each robot can provide and we outline the potential for cooperative robotics, human-robot cooperation, and teleoperation and autonomous robot behavior within this context.

  18. Quality of service management efficient scheme for the universal mobile telecommunications system

    Directory of Open Access Journals (Sweden)

    E. Zaleta–Alejandre

    2008-04-01

    Full Text Available This research work proposes a new Radio Resource Management (RRM scheme in order to accomplish the Quality of Service (QoS management for the Universal Mobile Telecommunications System (UMTS. The solution is based on UMTS standardization and a performance evaluation is presented to demonstrate its efficiency.

  19. Measuring customer satisfaction on perceived service quality : case mobile telecommunications service of Bouygues Telecom, France

    OpenAIRE

    Nguyen, Thien Phuc

    2014-01-01

    The incessant development of service industries always predisposes customers to their new level of satisfaction. Gaining customer satisfaction is one of the key factors that help companies remain competitive and sustainable. Therefore, measuring customer satisfaction is a perpetual topic conducted by many marketers, as well as researchers from time to time. The objectives of this thesis are to elucidate customers’ perceptions regarding mobile telecommunication services in French mobil...

  20. ROMANIAN MOBILE TELECOMMUNICATIONS CLIENTS’ CONSUMPTION BEHAVIOUR WITHIN THE CURRENT ECONOMIC-FINANCIAL CRISIS

    Directory of Open Access Journals (Sweden)

    Meghisan Georgeta-Madalina

    2012-07-01

    Full Text Available The paper will analyze the consumption behaviour of the Orange mobile telephony company’s clients towards its services’ characteristics within the current economic financial crisis, taking into consideration the following elements: the low tariffs (for calls/ subscriptions/ other services, the quality of calls/ of sound, the network coverage within the territory, the company’s reputation, the negotiated offer, the quality and availability of the customer care service, the diversity of the auxiliary services, the range and prices of the mobile telephones, the costs that pay those who make calls towards this network, the loyalty programs, the usage of a last generation technology, the friends have subscriptions in the same network and the promotional offers. For a thorough research we will divide the operator’s clients into natural persons clients and legal persons clients, each group having its specificities. The data gathering method was the questionnaire sent by post office to all the Orange Romania branches (a total of 225 branches. We received a number of 64 responses, what means a responses rate of 28.4%, which were analyzed using the SPSS informatics program focusing on the correlation analysis and factor analysis. The main results emphasize the fact that the fight to attract clients becomes more and more powerful. The very competitive market leads to the growth of the importance of the price in choosing a provider. The operators’ short term gains from the clients that prefer low prices represent a long term risk of image. Choosing some services packages is sometimes very difficult due to the complexity of the offer. The clients expect the service to work, be simple and easy to use. They want to benefit from rapid and efficient assistance if errors occur and the operator respects the clauses of the contract. The results obtained through this study, allowed us to make an opinion on the perspective that the

  1. DEVELOPMENT APPROACHES AND STRATEGIC MOVEMENTS WITHIN THE MOBILE TELECOMMUNICATION FIELD

    OpenAIRE

    Gheorghe MEGHISAN; Georgeta - Madalina MEGHISAN

    2008-01-01

    In February 2000, when Vodafone took control of the British operatorOrange, they had to split, because Vodafone owned two mobile telephonylicenses in the same country – Great Britain – fact that was interdicted by theEuropean legislation. So, on 30th of May 2000, France Telecom announcedthe purchase of the mobile telephony operator – Orange public limitedcompany (plc) – from Vodafone for the amount of 40 billion euro.Focusing on the fusion – acquisition as a way of development for the mobilet...

  2. DEVELOPMENT approaches AND STRATEGIC MOVEMENTS WITHIN THE MOBILE TELECOMMUNICATION FIELD

    OpenAIRE

    Gheorghe MEGHISAN

    2008-01-01

    In February 2000, when Vodafone took control of the British operator Orange, they had to split, because Vodafone owned two mobile telephony licenses in the same country – Great Britain – fact that was interdicted by the European legislation. So, on 30th of May 2000, France Telecom announced the purchase of the mobile telephony operator – Orange public limited company (plc) – from Vodafone for the amount of 40 billion euro. Focusing on the fusion – acquisition as a way of development for the m...

  3. Performance Implications of Outsourcing in the Mobile Telecommunications Industry

    DEFF Research Database (Denmark)

    Claussen, Jörg; Kretschmer, Tobias; Oehling, Daniel

    We examine how outsourcing of a core service affects firm performance in the context of the mobile telephony industry. We develop hypotheses based on economies of scale, transaction costs, quality advantages from specialization, and bargaining power and test these using a ten-year panel with 50 m...

  4. DEVELOPMENT APPROACHES AND STRATEGIC MOVEMENTS WITHIN THE MOBILE TELECOMMUNICATION FIELD

    Directory of Open Access Journals (Sweden)

    Gheorghe MEGHISAN

    2008-01-01

    Full Text Available In February 2000, when Vodafone took control of the British operatorOrange, they had to split, because Vodafone owned two mobile telephonylicenses in the same country – Great Britain – fact that was interdicted by theEuropean legislation. So, on 30th of May 2000, France Telecom announcedthe purchase of the mobile telephony operator – Orange public limitedcompany (plc – from Vodafone for the amount of 40 billion euro.Focusing on the fusion – acquisition as a way of development for the mobiletelecommunication companies, this paper begins with a theoretical analyze ofsome concepts related to the external growth. The example taken reveals theadvantages and disadvantages of the fusion – acquisition France Telecom –Orange as well as the dangers that an enterprise has to face when it decidesto appeal to the external growth.

  5. Evidence That Calls-Based and Mobility Networks Are Isomorphic.

    Directory of Open Access Journals (Sweden)

    Michele Coscia

    Full Text Available Social relations involve both face-to-face interaction as well as telecommunications. We can observe the geography of phone calls and of the mobility of cell phones in space. These two phenomena can be described as networks of connections between different points in space. We use a dataset that includes billions of phone calls made in Colombia during a six-month period. We draw the two networks and find that the call-based network resembles a higher order aggregation of the mobility network and that both are isomorphic except for a higher spatial decay coefficient of the mobility network relative to the call-based network: when we discount distance effects on the call connections with the same decay observed for mobility connections, the two networks are virtually indistinguishable.

  6. Mobile Node Localization in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yasir Malik

    2012-01-01

    Full Text Available Location information is the major component in location based applications. This information is used in different safety and service oriented applications to provide users with services according to their Geolocation. There are many approaches to locate mobile nodes in indoor and outdoor environments. In thispaper, we are interested in outdoor localization particularly in cellular networks of mobile nodes andpresented a localization method based on cell and user location information. Our localization method is based on hello message delay (sending and receiving time and coordinate information of Base Transceiver Station (BTSs. To validate our method across cellular network, we implemented and simulated our method in two scenarios i.e. maintaining database of base stations in centralize and distributed system. Simulation results show the effectiveness of our approach and its implementation applicability in telecommunication systems.

  7. Mobile node localization in cellular networks

    CERN Document Server

    Malik, Yasir; Abdulrazak, Bessam; Tariq, Usman; 10.5121/ijwmn.2011.3607

    2012-01-01

    Location information is the major component in location based applications. This information is used in different safety and service oriented applications to provide users with services according to their Geolocation. There are many approaches to locate mobile nodes in indoor and outdoor environments. In this paper, we are interested in outdoor localization particularly in cellular networks of mobile nodes and presented a localization method based on cell and user location information. Our localization method is based on hello message delay (sending and receiving time) and coordinate information of Base Transceiver Station (BTSs). To validate our method across cellular network, we implemented and simulated our method in two scenarios i.e. maintaining database of base stations in centralize and distributed system. Simulation results show the effectiveness of our approach and its implementation applicability in telecommunication systems.

  8. Mobile Zigbee Sensor Networks

    CERN Document Server

    Anantdeep, Er; Kaur, Er Balpreet

    2010-01-01

    OPNET Modeler accelerates network R&D and improves product quality through high-fidelity modeling and scalable simulation. It provides a virtual environment for designing protocols and devices, and for testing and demonstrating designs in realistic scenarios prior to production. OPNET Modeler supports 802.15.4 standard and has been used to make a model of PAN. Iterations have been performed by changing the Power of the transmitter and the throughput will has been analyzed to arrive at optimal values.An energy-efficient wireless home network based on IEEE 802.15.4, a novel architecture has been proposed. In this architecture, all nodes are classified into stationary nodes and mobile nodes according to the functionality of each node. Mobile nodes are usually battery-powered, and therefore need low-power operation. In order to improve power consumption of mobile nodes, effective handover sequence based on MAC broadcast and transmission power control based on LQ (link quality) are employed. Experimental resul...

  9. Relevant Drivers for Customers` Churn and Retention Decision in the Nigerian Mobile Telecommunication Industry

    Directory of Open Access Journals (Sweden)

    Sulaimon Olanrewaju Adebiyi

    2016-09-01

    Full Text Available The need for better support marketing decision on customers who are likely to leave a service provider for a competitor is very essential to the survival of most telecommunication firms. The application of logistic regression to the study of customer churn and retention decision in the Nigerian telecommunication industry falls into proactive methods, which helps in a better understanding of the needs of subscribers, to be able to predict their churn and retention decision in the industry and enhance better marketing strategies with a research driven policy guide for the operators in the industry. The purpose of this study is to ascertain the relevant drivers of customers` churn and retention in the growing Nigerian mobile telecommunication industry. Considering this issue, the logistic regression models have been used as the evaluating method. Four hundred and eight questionnaires have been used in this study. The population of this questionnaire consists of subscribers of mobile telecommunication in the six selected campuses of higher institution of learning in Lagos-state, Nigeria. The data collected was analysed by STATA 12 software. The results showed that the coefficients of mobile number portability (MNP services and dubious promotions are positive and significant. Furthermore, low coverage and unwanted calls and SMS are positive and significant. This implies that the better the availability of MNP services, the greater the likelihood of customers’ churn. More so, an increase in quality of calls provided by mobile telecom firms will increase the likelihood of customers’ loyalty by retention. The study recommends strong institutional measures for the overhaul of mobile services provision towards an improved service delivery in Nigeria.

  10. Interference of mobile phones and digitally enhanced cordless telecommunications mobile phones in renal scintigraphy.

    Science.gov (United States)

    Stegmayr, Armin; Fessl, Benjamin; Hörtnagl, Richard; Marcadella, Michael; Perkhofer, Susanne

    2013-08-01

    The aim of the study was to assess the potential negative impact of cellular phones and digitally enhanced cordless telecommunication (DECT) devices on the quality of static and dynamic scintigraphy to avoid repeated testing in infant and teenage patients to protect them from unnecessary radiation exposure. The assessment was conducted by performing phantom measurements under real conditions. A functional renal-phantom acting as a pair of kidneys in dynamic scans was created. Data were collected using the setup of cellular phones and DECT phones placed in different positions in relation to a camera head to test the potential interference of cellular phones and DECT phones with the cameras. Cellular phones reproducibly interfered with the oldest type of gamma camera, which, because of its single-head specification, is the device most often used for renal examinations. Curves indicating the renal function were considerably disrupted; cellular phones as well as DECT phones showed a disturbance concerning static acquisition. Variable electromagnetic tolerance in different types of γ-cameras could be identified. Moreover, a straightforward, low-cost method of testing the susceptibility of equipment to interference caused by cellular phones and DECT phones was generated. Even though some departments use newer models of γ-cameras, which are less susceptible to electromagnetic interference, we recommend testing examination rooms to avoid any interference caused by cellular phones. The potential electromagnetic interference should be taken into account when the purchase of new sensitive medical equipment is being considered, not least because the technology of mobile communication is developing fast, which also means that different standards of wave bands will be issued in the future.

  11. INFLUENCE OF CUSTOMER SATISFACTION ON LOYALTY: A STUDY ON MOBILE TELECOMMUNICATION INDUSTRY

    OpenAIRE

    Md. Motaher Hossain; Nusrat Jahan Suchy

    2013-01-01

    The mobile telecommunication companies uphold their service quality and change their marketing core strategies to retain their existing customers by enhancing and optimizing the customer loyalty. Therefore, it becomes significant for telecom companies to identify factors of services that influence customer loyalty and in turn creates loyal customers by satisfying them. This present study aims to explore the influence of customer satisfaction on customer loyalty in the context of Bangladesh. T...

  12. Is there a level of competition intensity that maximizes investment in the mobile telecommunications industry?

    OpenAIRE

    Houngbonon, Georges Vivien; Jeanjean, Francois

    2014-01-01

    This paper empirically assesses the impact of the intensity of competition on investment in new technologies within the mobile telecommunications industry. Using firm level panel data and an instrumental variable estimation it finds an inverted-U relationship between competition intensity and investment. The intermediate level of competition intensity that maximizes investment stands at 62 percent, whereby competition intensity is measured by 1-Lerner index at the firm level. This means that ...

  13. Future vision of advanced telecommunication networks on electronic utilities. Part 1. Present and subjects of utility telecommunication network; Denki jigyo ni okeru joho tsushin network no shirai vision. 1. Joho tsushin network no genjo to kadai

    Energy Technology Data Exchange (ETDEWEB)

    Sakaki, S.; Manabe, S.; Ono, K.; Kawai, Y.; Miki, Y. [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1994-04-01

    It is predicted that there will be many changes in environment of electric utilities such as expansion of electric power demand, spread of distributed power sources, and changes in market structures due to deregulation. As a first step to think about future telecommunication networks which respond to these changes and adopt technical innovation of telecommunication, present conditions and problems of the current utility telecommunication network are outlined. The utility telecommunication is characterized by high reliability and existence of the information that requires strict transmission delay restriction. The following points are given as the future subjects: although most utility telecommunication networks currently consist of leased lines, they have to be changed to the switched networks for diversifying telecommunication service. It should be considered that the leased line network, which has a hierarchical structure based on a geographical extent, will have a hierarchical structure that is able to correspond to the future telecommunication service. It is better for the current individual loop shape with dual telecommunication circuits to be changed into the overall link shape. In introducing the ATM transmission to improve the path efficiency, it is a premise to secure reliability. 8 refs., 7 figs., 7 tabs.

  14. Connecting Stories: Telecommunication Brands, their Narratives and the Paradigm in Mobile Phone Advertising

    Directory of Open Access Journals (Sweden)

    Paul Springer

    2015-11-01

    Full Text Available This paper considers the narratives in mobile phone commercials during a period of unprecedented market expansion. How was the fastest growing global sector in 2012 sold to consumers in different countries and cultures, and how have mobile brands, that differentiate themselves on service personality, conveyed their uniqueness within different global markets? The following research identifies regional characteristics in genres of mobile telecommunications advertising, including motivations and modes of address deployed for different geographic territories. By tracking narrative patterns through a significant sample of mobile commercials we have chartered the variety of message types, identified how brands have used localised customer insights and adjusted to regional variations. Conclusions highlight storytelling techniques used within glocal creative strategies of multinational campaigns, plus the nuances and patterns of targeted and generic campaigns.

  15. Discourse and policy making on consumer protection in the areas of mobile telecommunication and tanning.

    Science.gov (United States)

    Schweikardt, Christoph; Rosentreter, Michael; Gross, Dominik

    2012-01-01

    Perceived health risks from electromagnetic fields in mobile telecommunication and from UV radiation in tanning have become regulation issues in Germany during the last decade. Health risk messages from government expert bodies and the main stakeholders in these areas as well as subsequent consumer protection policy making are investigated. Publications and websites of government expert bodies and the main stakeholders as well as debates in Federal Parliament were analysed to compare argumentation patterns and parliamentary decision-making processes. In both areas, the public received competing health risk messages from the industries and their critics. As a government expert body, the Federal Office for Radiation Protection (BfS) held the view that alleged health risks from electromagnetic telecommunication were not proven, and propagated the precautionary principle. This opinion did not endanger the agreement of 2001 between the government and mobile telecommunication operators. After the failure to obtain voluntary commitment from the tanning industry, by contrast, the BfS recommended stricter consumer protection legislation, which was subsequently implemented. The BfS was in a key position to demand the prerogative of interpretation concerning mutually excluding health risk messages and to provide the argumentation which led the way to non-ionic radiation health protection measures.

  16. Relationship Marketing Tactics and Customer Loyalty-A Case of the Mobile Telecommunication Industry in Ghana

    Directory of Open Access Journals (Sweden)

    Godfred Yaw Koi-Akrofi

    2013-01-01

    Full Text Available The study was aimed at assessing the impact of relationship marketing tactics on customer loyalty in the Ghanaian mobile industry where deregulation has led to intense competition and scramble for market share. Marketers in the industry are employing variety of relationship marketing tactics to attract and retain customers. This research study adopted four relationship marketing tactics (service quality, price perception, brand image and value offered typical of a service industry and examined their impact on customer loyalty in the Ghanaian mobile industry. A self-completion questionnaire with a total of 40 closed questions was developed to gather field data. All of the items were measured by using a five-point Likert-type response scales, defined with 5 as strongly agree and 1 as strongly disagrees. Reliability test and some parametric and non-parametric tests were conducted and the results showed that there exist a positive significant relationship between each of the four relationship marketing tactics (namely service quality, price, value offered and brand image and customer loyalty. The results are consistent with evidence in the extant literature. The study provides insight and significant feedback from mobile phone users to the telecommunication operators. As the competitive environment increasingly becomes fierce, the voice and preferences of the customers are also becoming the priority. This finding is expected to serve as a guide and help to telecommunication managers in making informed judgment about the relationship marketing mix relevant to the present customer’s need that yields increase in revenue and profit.

  17. Route Optimization in Network Mobility

    Directory of Open Access Journals (Sweden)

    Md. Hasan Tareque

    2013-01-01

    Full Text Available NEtwork MObility (NEMO controls mobility of a number of mobile nodes in a comprehensive way using one or more mobile routers. To choose a route optimization scheme, it is very important to have a quantitative comparison of the available route optimization schemes. The focus of this paper is to analyze the degree of Route Optimization (RO, deploy-ability and type of RO supported by each class in general. The comparison shows the differences among the schemes in terms of issues, such as additional header, signaling and memory requirement. We classify the schemes established on the basic method for route optimization, and equal the schemes based on protocol overhead, such as header overhead, amount of signaling, and memory requirements. Lastly the performance of the classes of different schemes has to be estimated under norms such as available bandwidth, topology of the mobile network and mobility type.

  18. Intellectual mobile Ad Hoc networks

    OpenAIRE

    Sova, Oleg; Romanjuk, Valeriy; Bunin, Sergey; Zhuk, Pavlo

    2012-01-01

    In this article intellectualization of Mobile Ad Hoc Networks resources management is offered. It was proposed decomposition of the primary goal of MANET functioning into easy subgoals, and fragment of the MANET node target structure is presented.

  19. An architecture for design and planning of mobile television networks

    Directory of Open Access Journals (Sweden)

    R. Tamayo-Fernández

    2011-12-01

    Full Text Available Mobile television (TV, made possible by the convergence of media, telecommunications and consumer electronicsindustries, is one of the most hyped new mobile services in several countries [1]. The advertised key features ofmobile TV are personalization, interactivity, and most importantly, the ability to watch TV programming while on thego. The deployment of a mobile TV network consists of several stages that require careful planning. There are available simulation packages for designing wireless technologies, however, for mobile TV there are still planning and simulations concerns that have to be addressed in order to identify its design challenges. This article reviews the main parameters that should be taken into account to support the design and planning of a mobile TV network andproposes an architecture for its implementation.

  20. A MULTI-AGENT SYSTEM FOR MANAGING THE QUALITY OF SERVICE IN TELECOMMUNICATIONS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Pasquale DE MEO; Antonio IERA; Giorgio TERRACINA; Domenico URSINO

    2005-01-01

    In this paper we propose X-MAQoS, a novel XML-based multi-agent system for the QoS management in telecommunications networks. This system is characterized by the following features:(i) it handles a user profile and exploits it jointly with suitable network resource management techniques to maximize user satisfaction; (ii) it is capable of operating in a large variety of telecommunications networks; (iii) it is semi-automatic; (iv) it exploits XML for guaranteeing a light,versatile and standard mechanism for information representation, storing and exchange. In this paper the basic features of the system are discussed in details. Furthermore, the main results of a performance evaluation study in UMTS environment, aiming at comparing X-MAQoS with alternative agent-based approaches for handling user access to telecommunications networks, are reported.

  1. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Specification, functional model and information flows - Call interception additional network feature

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Specification, functional model and information flows - Call interception additional network feature

  2. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Path replacement additional network feature

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Path replacement additional network feature

  3. Information technology - Telecommunications and information exchange between systems - Private Integrated Services Network - Inter-exchange signalling protocol - Call interception additional network feature

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private Integrated Services Network - Inter-exchange signalling protocol - Call interception additional network feature

  4. Mobile Subscription, Penetration and Coverage Trends in Kenya’s Telecommunication Sector

    OpenAIRE

    Omae Malack Oteri; Langat Philip Kibet; Ndung’u Edward N.

    2015-01-01

    Communication is the activity of conveying information through the exchange of thoughts, messages, or information, as by speech, visuals, signals, writing, or behavior. In Kenya the mobile subscription, penetration and coverage have been growing since the first mobile operators started operating in 1999. The current mobile operators in Kenya are given by Safaricom Ltd, Airtel Networks Kenya Ltd, Essar Telecom Kenya Ltd and Telkom Kenya Ltd (TKL-Orange). This paper discusses the present condit...

  5. 4G Mobile Broadband Networks

    DEFF Research Database (Denmark)

    Kardaras, Georgios

    access radio networks becomes a necessity not only due to the high operation and maintenance cost but also because of the major trend of providing ecofriendly solutions across the industry. The benefits of incorporating remote radio modules in next-generation mobile networks were investigated...

  6. Determination of Test Sequence for Intrusive Measurement of VTQoS in Environment Offixed Telecommunication Network

    Directory of Open Access Journals (Sweden)

    Peter Pocta

    2006-01-01

    Full Text Available This paper describes simulations of test sequences transmission for intrusive measurement of VTQoS inenvironment of fixed telecommunication network. The aim of simulations was a detection on the influence of this environment on the quality of transmission sequences. Evaluation the generated sequences was based on the calculation of mean square measure and correlation coefficient. These measures were used as a criterion for suitable test sequences selection. Reconsideration of a convenience of the given test sequence, which is composed from simple signals, on intrusive measurement of VTQoS in the environment of fixed telecommunication networks is the aim of this paper.

  7. Long-distance remote characterization of ultrastable lasers via commercial telecommunication fiber network

    CERN Document Server

    Pape, Andre; Friebe, Jan; Riedmann, Matthias; Wübbena, Temmo; Rasel, Ernst-Maria; Predehl, Katharina; Lipphardt, Burghard; Schnatz, Harald; Grosche, Gesine

    2009-01-01

    We demonstrate a fully optical, remote characterization of independent ultrastable lasers separated by a geographical distance of more than 50 km via a 73 km long phase-stabilized fiber in a commercial telecommunication network. The phase-coherent comparison shows a fractional frequency instability between the independent ultrastable laser systems of s_y = 4E-15 for averaging times > 2 s; the remote analog transfer beat note shows a linewidth of 1 Hz. This demonstrates the potential of long-distance remote comparisons of ultrastable optical frequencies using commercial telecommunication fiber networks.

  8. Coalescence for Mobile Sensor Networks

    OpenAIRE

    Poduri, Sameera; Sukhatme, Gaurav S.

    2007-01-01

    Coalescence is the problem of isolated mobile robots independently searching for peers with the goal of forming a single connected network. This paper analyzes coalescence time for a worst-case scenario where the robots do not have any knowledge about the environment or positions of other robots and perform independent, memory less search. Using the random direction mobility model, we show that coalescence time has an exponential distribution which is a function of the number of robots, speed...

  9. INFLUENCE OF CUSTOMER SATISFACTION ON LOYALTY: A STUDY ON MOBILE TELECOMMUNICATION INDUSTRY

    Directory of Open Access Journals (Sweden)

    Md. Motaher Hossain

    2013-01-01

    Full Text Available The mobile telecommunication companies uphold their service quality and change their marketing core strategies to retain their existing customers by enhancing and optimizing the customer loyalty. Therefore, it becomes significant for telecom companies to identify factors of services that influence customer loyalty and in turn creates loyal customers by satisfying them. This present study aims to explore the influence of customer satisfaction on customer loyalty in the context of Bangladesh. This study focused on six factors such as communication, price structure, value-added service, convenience, sales-promotions and customer service. Both primary and secondary information were collected to test the pre-set hypotheses. Descriptive statistics and simple linear regression were employed to analyze the data. Result shows that five factors: communication, price structure, value-added services, convenience and customer service/care have positive correlations with customer loyalty.

  10. Design and control strategy for a hybrid green energy system for mobile telecommunication sites

    Science.gov (United States)

    Okundamiya, Michael S.; Emagbetere, Joy O.; Ogujor, Emmanuel A.

    2014-07-01

    The rising energy costs and carbon footprint of operating mobile telecommunication sites in the emerging world have increased research interests in green technology. The intermittent nature of most green energy sources creates the problem of designing the optimum configuration for a given location. This study presents the design analysis and control strategy for a cost effective and reliable operation of the hybrid green energy system (HGES) for GSM base transceiver station (BTS) sites in isolated regions. The design constrains the generation and distribution of power to reliably satisfy the energy demand while ensuring safe operation of the system. The overall process control applies the genetic algorithm-based technique for optimal techno-economic sizing of system's components. The process simulation utilized meteorological data for 3 locations (Abuja, Benin City and Sokoto) with varying climatic conditions in Nigeria. Simulation results presented for green GSM BTS sites are discussed and compared with existing approaches.

  11. Security management of next generation telecommunications networks and services

    CERN Document Server

    Jacobs, Stuart

    2014-01-01

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to enc

  12. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6.

    Science.gov (United States)

    Samuelraj, Ananthi Jebaseeli; Jayapal, Sundararajan

    2015-01-01

    Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  13. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6

    Directory of Open Access Journals (Sweden)

    Ananthi Jebaseeli Samuelraj

    2015-01-01

    Full Text Available Proxy Mobile IPV6 (PMIPV6 is a network based mobility management protocol which supports node’s mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node’s mobility should be modified to support group nodes’ mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  14. The impact of capacity growth in national telecommunications networks.

    Science.gov (United States)

    Lord, Andrew; Soppera, Andrea; Jacquet, Arnaud

    2016-03-06

    This paper discusses both UK-based and global Internet data bandwidth growth, beginning with historical data for the BT network. We examine the time variations in consumer behaviour and how this is statistically aggregated into larger traffic loads on national core fibre communications networks. The random nature of consumer Internet behaviour, where very few consumers require maximum bandwidth simultaneously, provides the opportunity for a significant statistical gain. The paper looks at predictions for how this growth might continue over the next 10-20 years, giving estimates for the amount of bandwidth that networks should support in the future. The paper then explains how national networks are designed to accommodate these traffic levels, and the various network roles, including access, metro and core, are described. The physical layer network is put into the context of how the packet and service layers are designed and the applications and location of content are also included in an overall network overview. The specific role of content servers in alleviating core network traffic loads is highlighted. The status of the relevant transmission technologies in the access, metro and core is given, showing that these technologies, with adequate research, should be sufficient to provide bandwidth for consumers in the next 10-20 years.

  15. Mobility and QoS Support in Mobile IP Networks

    Institute of Scientific and Technical Information of China (English)

    DUAN Lian; WU Wei-ling

    2004-01-01

    This paper presents the state of the art of the Quality of Service (QoS) and mobility support mechanisms for mobile IP networks, which includes the issues and challenges in QoS support, an overview of the Mobile IP protocol, a general description of the QoS and Mobility framework, and the End-To-End QoS architecture in the next-generation all-IP mobile network.

  16. Reference model of future ubiquitous convergent network and context-aware telecommunication service platform

    Institute of Scientific and Technical Information of China (English)

    QIAO Xiu-quan; LI Xiao-feng; LIANG Shou-qing

    2006-01-01

    A reference model for future ubiquitous convergent network is analyzed. To provide user-centric, intelligent,personalized service, this article presents a context-aware telecommunication service platform (CaTSP) to adapt to dynamically changing context. This article focuses on the new design method of context-aware telecommunication service platform and its architecture. Through the use of model-driven architecture (MDA) and semantic web technologies, CaTSP can enable context reasoning and service personalization adaption.This article explores a new approach for service intelligence,personalization, and adaptability in the semantic web service computing era.

  17. 4G Mobile Networks

    DEFF Research Database (Denmark)

    Lanzani, Christian Fabio Alessandro

    This thesis has investigated 4G radio access networks covering spectrum allocation methodologies, eNB software radios and architectures including interfacing performance aspects relevant for IMT-Advanced requirements. Dynamic spectrum allocation is an alternative to xed allocation methodologies. Al...

  18. Secure real-time wireless video streaming in the aeronautical telecommunications network

    Science.gov (United States)

    Czernik, Pawel; Olszyna, Jakub

    2010-09-01

    As Air Traffic Control Systems move from a voice only environment to one in which clearances are issued via data link, there is a risk that an unauthorized entity may attempt to masquerade as either the pilot or controller. In order to protect against this and related attacks, air-ground communications must be secured. The challenge is to add security in an environment in which bandwidth is limited. The Aeronautical Telecommunications Network (ATN) is an enabling digital network communications technology that addresses capacity and efficiency issues associated with current aeronautical voice communication systems. Equally important, the ATN facilitates migration to free flight, where direct computer-to-computer communication will automate air traffic management, minimize controller and pilot workload, and improve overall aircraft routing efficiency. Protecting ATN communications is critical since safety-of-flight is seriously affected if an unauthorized entity, a hacker for example, is able to penetrate an otherwise reliable communications system and accidentally or maliciously introduce erroneous information that jeopardizes the overall safety and integrity of a given airspace. However, an ATN security implementation must address the challenges associated with aircraft mobility, limited bandwidth communication channels, and uninterrupted operation across organizational and geopolitical boundaries. This paper provides a brief overview of the ATN, the ATN security concept, and begins a basic introduction to the relevant security concepts of security threats, security services and security mechanisms. Security mechanisms are further examined by presenting the fundamental building blocks of symmetric encipherment, asymmetric encipherment, and hash functions. The second part of this paper presents the project of cryptographiclly secure wireless communication between Unmanned Aerial Vehicles (UAV) and the ground station in the ATM system, based on the ARM9 processor

  19. Mobile Zigbee Sensor Networks

    OpenAIRE

    Anantdeep, Er.; Kaur, Er. Sandeep; Kaur, Er. Balpreet

    2010-01-01

    OPNET Modeler accelerates network R&D and improves product quality through high-fidelity modeling and scalable simulation. It provides a virtual environment for designing protocols and devices, and for testing and demonstrating designs in realistic scenarios prior to production. OPNET Modeler supports 802.15.4 standard and has been used to make a model of PAN. Iterations have been performed by changing the Power of the transmitter and the throughput will has been analyzed to arrive at optimal...

  20. Optimizations in Heterogeneous Mobile Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana

    in providing efficient flow control, and investigates an optimal traffic rate allocation method. Cloud Radio Access Network (C-RAN) designates a leading technology for the Radio Access Network (RAN) architecture that is able to support dense deployments, while ensuring network level energy and cost efficiency...... with the densification of the base stations, bring into a very complex network management and operation control for the mobile operators. Furthermore, the need to provide always best connection and service with high quality demands for a joint overall network resource management. This thesis addresses this challenge...... significant performance improvement to the achieved user throughput in low as well as in high loads in the cell. The flow control of the data between the nodes is another challenge for effective aggregation of the resources in case of dual connectivity. As such, this thesis discusses the challenges...

  1. Study of the ionizing radiation effects on the swedish telecommunications network. Studie av telekommunikationernas talighet mot joniserande stralning

    Energy Technology Data Exchange (ETDEWEB)

    Goeransson, G.; Liljegren, T.

    1992-11-01

    The aim of the study is to form a basis for decisions on possible protective measures concerning the ionizing radiation effects on the Swedish telecommunications from nuclear weapon explosions outside Sweden. The report contains a brief survey of analysis and the experimental investigations of the ionizing radiation effects on optical fibers, repeaters and microwave radio-link equipments. It also deals with the Swedish Telecommunication Network buildings and their ionizing radiation protection as well as with some specially selected telecommunication objects.

  2. Pb-free production of telecommunication network equipment: Technological and logistical challenges

    Energy Technology Data Exchange (ETDEWEB)

    Michel, H.J. [Siemens AG, ICN M and L TDC CE MC, Bruchsal (Germany)

    2004-07-01

    Legislation in Europe and China will ban the use of SnPb solder in electronic devices by July 2006. Even though there will be an exemption for telecommunication network infrastructure equipment, component market and supply chain issues will nevertheless affect such high-tech products, and strongly influence logistics during the transition to ''Pb-free.'' The Siemens group ''Information and Communication Networks'' (ICN) produces high-technology modules for telecommunication networks. To prepare for cost-effective conversion to lead-free within ICN, an interdisciplinary team was formed. The presentation highlights critical issues and shows how the team is proceeding to confront them. (orig.)

  3. Experimental Evaluation of the Local Packing Distributed Dynamic Channel Allocation Strategy Application for AI-Madar Telephone Telecommunication Network in Libya

    Directory of Open Access Journals (Sweden)

    Mohamed Yousef Ahmed Abou-Hussein

    2014-06-01

    Full Text Available The great challenge of the remarkably growing demand for personal communication mobile service in Libya has actively motivated Al-Madar Telephone Telecommunication Company to adopt various techniques in order to substantially improve its network capacity. An efficient allocation strategy of communication channels that could ensure good performance of the cellular network is critically needed, given the limited spectrum currently available that uses the Fixed Channel Allocation (FCA strategy. In this study, experimental investigations were conducted to improve Al-Madar Company network by proposing the evaluation of the adoption of the Local Packing Distributed Dynamic Channel Allocation (LP-DDCA strategy. The main reasons for proposing the adoption of the LP-DDCA strategy are; to minimize the call blocking probability, enhancing the network performance and increasing the number of network subscribers. This work has been done by applying actual data from an existing cellular network of Al-Madar Company in to the experimental simulation program. The results demonstrated clearly the superiority of the proposed the LP-DDCA strategy in the investigated locations (cells compared with the currently used FCA strategy. Conclusion: Application of the LP-DDCA strategy could give rise to substantial improvement in Al-Madar telecommunication mobile network performance and it will considerably increase the number of network subscribers.

  4. Practical Network-Based Techniques for Mobile Positioning in UMTS

    Directory of Open Access Journals (Sweden)

    Borkowski Jakub

    2006-01-01

    Full Text Available This paper presents results of research on network-based positioning for UMTS (universal mobile telecommunication system. Two new applicable network-based cellular location methods are proposed and assessed by field measurements and simulations. The obtained results indicate that estimation of the position at a sufficient accuracy for most of the location-based services does not have to involve significant changes in the terminals and in the network infrastructure. In particular, regular UMTS terminals can be used in the presented PCM (pilot correlation method, while the other proposed method - the ECID+RTT (cell identification + round trip time requires only minor software updates in the network and user equipment. The performed field measurements of the PCM reveal that in an urban network, of users can be located with an accuracy of m. In turn, simulations of the ECID+RTT report accuracy of m– m for of the location estimates in an urban scenario.

  5. System-level design methodologies for telecommunication

    CERN Document Server

    Sklavos, Nicolas; Goehringer, Diana; Kitsos, Paris

    2013-01-01

    This book provides a comprehensive overview of modern networks design, from specifications and modeling to implementations and test procedures, including the design and implementation of modern networks on chip, in both wireless and mobile applications.  Topical coverage includes algorithms and methodologies, telecommunications, hardware (including networks on chip), security and privacy, wireless and mobile networks and a variety of modern applications, such as VoLTE and the internet of things.

  6. AN INSTITUTIONAL AND NETWORK PERSPECTIVE OF ORGANISATIONAL LEGITIMACY: EMPIRICAL EVIDENCE FROM CHINA′S TELECOMMUNICATIONS MARKET

    Directory of Open Access Journals (Sweden)

    Brian Low

    2010-07-01

    Full Text Available This perspective paper combines institutional and industrial network theory to develop a framework for analysing organisational legitimacy. The main subject, Nokia China, is found to be sensitive to network-legitimating initiatives, with consequences that accommodate multiple, conflicting stakeholders′ interests in China′s politically sensitive and protective telecommunications market. This paper offers new insights into institutional isomorphism that is manifested empirically as incremental conformity to regulative processes, institutional norms and cognitive knowledge and meanings within the environment, thereby extending commonly held views of institutional theory to include organisational legitimacy in industrial networks.

  7. Policy Creation Model for Policy-Based Management in Telecommunications Networks

    CERN Document Server

    Astudillo, Carlos A; Calderón, Oscar J

    2011-01-01

    Policy-based management (PBM) is being used as technological solution on the managing and controlling complex networks and systems. One of the most important issues involved in the life-cycle of PBM is the policies creation because the future decisions made by the management system depend on this, and therefore, the network behavior. In this paper we present a novel model for creating management policies in telecommunications networks. We propose a model which includes a Policy Creation Process, Actors, Policy Abstraction Levels and a Procedure for Creating Policies. An implementation of the proposed model over the Technology Division at University of Cauca is included.

  8. MOVING TOWARD SYNCHRONOUS OPTICAL NETWORK STRATEGIES FOR EFFICIENT TELECOMMUNICATIONS TRANSPORT WITH INCREASED CONFIGURATION FLEXIBILITY AND BANDWIDTH AVAILABILITY

    Directory of Open Access Journals (Sweden)

    Dr.S.S.Riaz Ahamed

    2010-07-01

    Full Text Available Optical networks are high-capacity telecommunications networks based on optical technologies and components that provide routing, grooming, and restoration at the wavelength level as well as wavelength-based services. As networks face increasing bandwidth demand and diminishing fiber availability, network providers are moving towards a crucial milestone in network evolution: the optical network. Optical networks, based on the emergence of the optical layer in transport networks, provide higher capacity and reduced costs for new applications such as the Internet, video and multimedia interaction, and advanced digital services. Synchronous optical network (SONET is a standard for optical telecommunications transport. The increased configuration flexibility and bandwidth availability of SONET provides significant advantages over the older telecommunications system.

  9. The telecommunications handbook engineering guidelines for fixed, mobile and satellite systems

    CERN Document Server

    Penttinen, Jyrki T J

    2015-01-01

    This practical handbook and reference provides a complete understanding of the telecommunications field supported by descriptions and case examples throughout Taking a practical approach, The Telecommunications Handbook examines the principles and details of all of the major and modern telecommunications systems currently available to industry and to end-users. It gives essential information about usage, architectures, functioning, planning, construction, measurements and optimisation. The structure of the book is modular, giving both overall descriptions of the architectures and functionali

  10. Energy optimization in mobile sensor networks

    Science.gov (United States)

    Yu, Shengwei

    Mobile sensor networks are considered to consist of a network of mobile robots, each of which has computation, communication and sensing capabilities. Energy efficiency is a critical issue in mobile sensor networks, especially when mobility (i.e., locomotion control), routing (i.e., communications) and sensing are unique characteristics of mobile robots for energy optimization. This thesis focuses on the problem of energy optimization of mobile robotic sensor networks, and the research results can be extended to energy optimization of a network of mobile robots that monitors the environment, or a team of mobile robots that transports materials from stations to stations in a manufacturing environment. On the energy optimization of mobile robotic sensor networks, our research focuses on the investigation and development of distributed optimization algorithms to exploit the mobility of robotic sensor nodes for network lifetime maximization. In particular, the thesis studies these five problems: 1. Network-lifetime maximization by controlling positions of networked mobile sensor robots based on local information with distributed optimization algorithms; 2. Lifetime maximization of mobile sensor networks with energy harvesting modules; 3. Lifetime maximization using joint design of mobility and routing; 4. Optimal control for network energy minimization; 5. Network lifetime maximization in mobile visual sensor networks. In addressing the first problem, we consider only the mobility strategies of the robotic relay nodes in a mobile sensor network in order to maximize its network lifetime. By using variable substitutions, the original problem is converted into a convex problem, and a variant of the sub-gradient method for saddle-point computation is developed for solving this problem. An optimal solution is obtained by the method. Computer simulations show that mobility of robotic sensors can significantly prolong the lifetime of the whole robotic sensor network while

  11. The Deployment of the Future Mobile Network

    OpenAIRE

    Eba’ Hamad AlMousa; Feda’ AlShahwan; Rana Alhajri

    2016-01-01

    With the explosion of mobile services and the continuouse increase demand for a higher data traffic, a new high speed communication networks are required. Mobile networks are developing to increase the data speed and channels bandwidth inorder to meet the subscriber needs. Many attempts have been carried out to achieve the main demands of faster connectivity and download. 5G technolgy which refers to the 5th Generation Mobile Tecnology is the new mobile network that will provide the users wit...

  12. Optical disk toxic information online system at Sumitomo Chemical Co. through telecommunication network in Japan

    Science.gov (United States)

    Kishida, Fumio; Omodaka, Hisakata; Ishihara, Koichiro; Yamada, Yoshinori; Kato, Hiromi

    Toxicity data about several hundred chemicals, handled and commercialized by Sumitomo Chemical Co., have been collected and estimated. These data are stored in an optical disk filing system "sanfile 8500D". Because the system is mounted with a keyword input panel "Word selecter", information retrieval system is simplified but precised. Online system through telecommunication network is extended between Sumitomo Chemical's works, laboratories, and others. Image informations are mailed from installed facsimili in sanfile 8500D directly.

  13. Sellers on the street : the human infrastructure of the mobile phone network in Kigali, Rwanda

    NARCIS (Netherlands)

    Mann, L.; Nzayisenga, E.

    2015-01-01

    This paper looks in detail at the social and economic background of mobile airtime sellers on the streets of Kigali. While informal networks have proved to be an invaluable resource for large multinational telecommunication companies seeking to penetrate African markets, changing technological capab

  14. Sellers on the street : the human infrastructure of the mobile phone network in Kigali, Rwanda

    NARCIS (Netherlands)

    Mann, L.E.; Nzayisenga, E.

    2015-01-01

    This paper looks in detail at the social and economic background of mobile airtime sellers on the streets of Kigali. While informal networks have proved to be an invaluable resource for large multinational telecommunication companies seeking to penetrate African markets, changing technological

  15. Comparison of Available Bandwidth Estimation Techniques in Packet-Switched Mobile Networks

    DEFF Research Database (Denmark)

    López Villa, Dimas; Ubeda Castellanos, Carlos; Teyeb, Oumer Mohammed;

    2006-01-01

    The relative contribution of the transport network towards the per-user capacity in mobile telecommunication systems is becoming very important due to the ever increasing air-interface data rates. Thus, resource management procedures such as admission, load and handover control can make use of in...

  16. Decentralized network management based on mobile agent

    Institute of Scientific and Technical Information of China (English)

    李锋; 冯珊

    2004-01-01

    The mobile agent technology can be employed effectively for the decentralized management of complex networks. We show how the integration of mobile agent with legacy management protocol, such as simple network management protocol (SNMP), leads to decentralized management architecture. HostWatcher is a framework that allows mobile agents to roam network, collect and process data, and perform certain adaptive actions. A prototype system is built and a quantitative analysis underlines the benefits in respect to reducing network load.

  17. A Dynamic Mobile Grid System for 4G Networks

    Science.gov (United States)

    Abdelkader, Manel; Boudriga, Mohamed Hamdi Noureddine

    Future networks specially International Mobile Telecommunications-advanced, better known as 4G, will come up with a panoply of services so as to provide a comprehensive and secure IP-based solution where facilities such as voice, data and stremed multimedia will be provided to users anywhere at anytime. This solution will also provide much higher data rates compared to previous generations. More importantly, the 4G architecture will strongly promote ubiquitous computing, which involves many computational devices and systems simultaneously. Such devices and systems can even be unaware that they are contributing to computational process.

  18. Mobile Social Network in a Cultural Context

    DEFF Research Database (Denmark)

    Liu, Jun

    2010-01-01

    the chapter “Mobile Social Network in a Cultural Context” examines the guanxi-embedded mobile social network in China. By focusing on three concrete case studies with 56 in-depth interviews, including New Year text message greetings, mobile social networks for job allocations among migrant workers......, and mobile phone rumours, this study observes that mobile social networks are a way that Chinese people cultivate, maintain and strengthen their guanxi networks. Embedding the reliability of guanxi, the message spreading via mobile communication always enjoys high credibility, while mutual obligation...... of mobile social network in China therefore emanate not only from Information and Communication Technologies, but also from the socio-cultural source - guanxi - deeply rooted in Chinese society....

  19. Mobile Agents in Networking and Distributed Computing

    CERN Document Server

    Cao, Jiannong

    2012-01-01

    The book focuses on mobile agents, which are computer programs that can autonomously migrate between network sites. This text introduces the concepts and principles of mobile agents, provides an overview of mobile agent technology, and focuses on applications in networking and distributed computing.

  20. Protection using telecommunications

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    Deregulation in both the telecommunication and electric power industry, together with new telecommunication network technologies and advances in numerical protection, has resulted in the need to reconsider traditional methods of delivering tele-protection schemes and their associated bearer services. Fibre-optic technology is commonly deployed in new telecommunication networks for inter-station communication and utility-owned and public telecommunication networks from third parties are available for protection purposes. (author)

  1. Advanced Networks in Motion Mobile Sensorweb

    Science.gov (United States)

    Ivancic, William D.; Stewart, David H.

    2011-01-01

    Advanced mobile networking technology applicable to mobile sensor platforms was developed, deployed and demonstrated. A two-tier sensorweb design was developed. The first tier utilized mobile network technology to provide mobility. The second tier, which sits above the first tier, utilizes 6LowPAN (Internet Protocol version 6 Low Power Wireless Personal Area Networks) sensors. The entire network was IPv6 enabled. Successful mobile sensorweb system field tests took place in late August and early September of 2009. The entire network utilized IPv6 and was monitored and controlled using a remote Web browser via IPv6 technology. This paper describes the mobile networking and 6LowPAN sensorweb design, implementation, deployment and testing as well as wireless systems and network monitoring software developed to support testing and validation.

  2. Frequency and time transfer for metrology and beyond using telecommunication network fibres

    CERN Document Server

    Lopez, Olivier; Jiang, Haifeng; Haboucha, Adil; Bercy, Anthony; Stefani, Fabio; Chanteau, Bruno; Kanj, Amale; Rovera, Daniele; Achkar, Joseph; Chardonnet, Christian; Pottie, Paul-Eric; Amy-Klein, Anne; Santarelli, Giorgio

    2015-01-01

    The distribution and the comparison of an ultra-stable optical frequency and accurate time using optical fibres have been greatly improved in the last ten years. The frequency stability and accuracy of optical links surpass well-established methods using the global navigation satellite system and geostationary satellites. In this paper, we present a review of the methods and the results obtained. We show that public telecommunication network carrying Internet data can be used to compare and distribute ultra-stable metrological signals over long distances. This novel technique paves the way for the deployment of a national and continental ultra-stable metrological optical network.

  3. Deploying IPv6 in 3GPP networks evolving mobile broadband from 2G to LTE and beyond

    CERN Document Server

    Korhonen, Jouni; Soininen, Jonne

    2013-01-01

    Deploying IPv6 in 3GPP Networks - Evolving Mobile Broadband from 2G to LTE and Beyond  A practical guide enabling mobile operators to deploy IPv6 with confidence The most widely used cellular mobile broadband network technology is based on the 3GPP standards. The history and background of the 3GPP technology is in the Global Mobile Service (GSM) technology and the work done in European Telecommunications Standards Institute (ETSI). This primary voice service network has evolved to be the dominant mobile Internet access technology. Deploying IPv6 in

  4. Analysis on the Impacts of MVNO on Domestic Mobile Telecommunications Markets%虚拟运营商对国内移动通信市场的影响刍议

    Institute of Scientific and Technical Information of China (English)

    石靖宁

    2015-01-01

    通过虚拟运营商的业务定义和海外发展实践阐述了虚拟运营商的生存条件,并在对国内移动通信市场现状的认识基础上,分析了虚拟运营商对国内移动通信的整体市场格局、微观市场份额、ARPU、渠道体系和政府管制等带来的影响。%The living conditions of mobile network virtual operator (MNVO) are discussed based on the business definitions and the overseas development practices of MNVO. According to the status of domestic mobile telecommunications markets, the impacts of MNVO on the market pattern, micro market share, ARPU, channel system and government regulation of domestic mobile telecommunications is analyzed in this paper.

  5. Reversing the Energy Trend in Mobile Networks

    DEFF Research Database (Denmark)

    Micallef, Gilbert; Mogensen, Preben; Scheck, Hans-Otto

    2011-01-01

    In order to meet the expected boost in mobile data traffic, mobile network operators are planning and upgrading the capacity of their networks. Through a previous study it has been shown that over a period of eight years, different network upgrade strategies have a different impact on the energy ...

  6. Challenges for Mobile Social Networking Applications

    Science.gov (United States)

    Rana, Juwel; Kristiansson, Johan; Hallberg, Josef; Synnes, Kåre

    This paper presents work in progress regarding utilization of social network information for mobile applications. Primarily a number of challenges are identified, such as how to mine data from multiple social networks, how to integrate and consolidate social networks, and how to manage semantic information for mobile applications. The challenges are discussed from a semantic Web perspective using a driving scenario as motivation.

  7. Optimization of the telecommunication network of a gas utility; Optimisation d'un reseau de telecommunications d'un operateur gazier

    Energy Technology Data Exchange (ETDEWEB)

    Vinas, Ch.; Abadie, J. [GSO, Gaz Sud-Ouest, 64 - Pau (France)

    2001-07-01

    The information system of Gaz du Sud-Ouest (GSO) utility, which includes the real time systems for the exploitation of the gas transport and distribution system and its management, is based on heterogenous and separated telecommunication infrastructures. A project has been started which aims at optimizing the architecture of this communication network taking into consideration the technical aspects but also the security and costs constraints. (J.S.)

  8. Science-Related Telecommunication.

    Science.gov (United States)

    Anderson, Norm

    1993-01-01

    A physics teacher at rural Cedar Falls High School (Iowa) describes how teacher telecommunication networks provided ongoing support following summer teacher workshops, his inability to get fellow teachers engaged in telecommunication, and the benefits of a telecommunication network to rural teachers. (SV)

  9. Proceedings of the Workshop on Advanced Network and Technology Concepts for Mobile, Micro, and Personal Communications

    Science.gov (United States)

    Paul, Lori (Editor)

    1991-01-01

    The Workshop on Advanced Network and Technology Concepts for Mobile, Micro, and Personal Communications was held at NASA's JPL Laboratory on 30-31 May 1991. It provided a forum for reviewing the development of advanced network and technology concepts for turn-of-the-century telecommunications. The workshop was organized into three main categories: (1) Satellite-Based Networks (L-band, C-band, Ku-band, and Ka-band); (2) Terrestrial-Based Networks (cellular, CT2, PCN, GSM, and other networks); and (3) Hybrid Satellite/Terrestrial Networks. The proceedings contain presentation papers from each of the above categories.

  10. Mobility Prediction in Wireless Ad Hoc Networks using Neural Networks

    CERN Document Server

    Kaaniche, Heni

    2010-01-01

    Mobility prediction allows estimating the stability of paths in a mobile wireless Ad Hoc networks. Identifying stable paths helps to improve routing by reducing the overhead and the number of connection interruptions. In this paper, we introduce a neural network based method for mobility prediction in Ad Hoc networks. This method consists of a multi-layer and recurrent neural network using back propagation through time algorithm for training.

  11. Securing Mobile Networks in an Operational Setting

    Science.gov (United States)

    Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Paulsen, Phillip E.; Shell, Dan

    2004-01-01

    This paper describes a network demonstration and three month field trial of mobile networking using mobile-IPv4. The network was implemented as part of the US Coast Guard operational network which is a ".mil" network and requires stringent levels of security. The initial demonstrations took place in November 2002 and a three month field trial took place from July through September of 2003. The mobile network utilized encryptors capable of NSA-approved Type 1 algorithms, mobile router from Cisco Systems and 802.11 and satellite wireless links. This paper also describes a conceptual architecture for wide-scale deployment of secure mobile networking in operational environments where both private and public infrastructure is used. Additional issues presented include link costs, placement of encryptors and running routing protocols over layer-3 encryption devices.

  12. Interplay between telecommunications and face-to-face interactions: a study using mobile phone data

    National Research Council Canada - National Science Library

    Calabrese, Francesco; Smoreda, Zbigniew; Blondel, Vincent D; Ratti, Carlo

    2011-01-01

    In this study we analyze one year of anonymized telecommunications data for over one million customers from a large European cellphone operator, and we investigate the relationship between people's...

  13. Mobile Social Network in a Cultural Context

    DEFF Research Database (Denmark)

    Liu, Jun

    2010-01-01

    the chapter “Mobile Social Network in a Cultural Context” examines the guanxi-embedded mobile social network in China. By focusing on three concrete case studies with 56 in-depth interviews, including New Year text message greetings, mobile social networks for job allocations among migrant workers...... contributes to the explosive growth of the message within mobile social networks under special circumstances, such as during festivals and holidays and social disturbances. This circulation in turn increases both the dissemination and credibility of messages, and rumours. The characteristics and strength...

  14. Studies of an application of mobile communication system to the private telecommunication network. Part 2. Trend of mobile communication systems and application to power utility; Idotai tsushin system no denryoku tsushinmo eno tekiyo. 2. Idotai tsushin system no genjo to denki jigyo eno tekiyo

    Energy Technology Data Exchange (ETDEWEB)

    Iwasaki, H. [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-06-01

    This paper presents future prospects on development of different mobile communication systems operated by public communications operators, and discusses their application to power utilities. For automobile and cellular telephones, discussions are being made on the code division multiple access (CDMA) system which multiplexes and transmits information by using tally codes. Influence of noise decreases, and so does the need of retransmission due to code errors. Higher speed transmission than conventional systems may be expected. The system can be utilized for transmitting still images, such as for status of construction being carried out by power utility companies. For PHS, a discussion will start on 32 to 64-kbps transmission in fiscal 1997. By using the system together with an image compression technology, the system may be expected of utilization as a moving image transmission method for supporting site works by utility companies. The low and medium orbit satellite communications whose use is scheduled to start shortly can be utilized as construction and emergency disaster communication networks for mountainous areas and islands. Movements around the frequency band utilization and communication systems of IMT-2000 are becoming more complex. The Japanese proposal plans transmission of moving images, whereas more diverse utilization can be expected, such as for voice, data and images, in areas where no ground communication facilities are available for electric power operations. 16 refs., 4 figs., 3 tabs.

  15. Mobility and Handoff Management in Wireless Networks

    CERN Document Server

    Sen, Jaydip

    2010-01-01

    With the increasing demands for new data and real-time services, wireless networks should support calls with different traffic characteristics and different Quality of Service (QoS)guarantees. In addition, various wireless technologies and networks exist currently that can satisfy different needs and requirements of mobile users. Since these different wireless networks act as complementary to each other in terms of their capabilities and suitability for different applications, integration of these networks will enable the mobile users to be always connected to the best available access network depending on their requirements. This integration of heterogeneous networks will, however, lead to heterogeneities in access technologies and network protocols. To meet the requirements of mobile users under this heterogeneous environment, a common infrastructure to interconnect multiple access networks will be needed. In this chapter, the design issues of a number of mobility management schemes have been presented. Eac...

  16. Predicting Customer Churn and Retention Rates in Nigeria’s Mobile Telecommunication Industry Using Markov Chain Modelling

    Directory of Open Access Journals (Sweden)

    Adebiyi Sulaimon Olanrewaju

    2015-12-01

    Full Text Available The telecommunication industry is one of the service industries that is most affected by the problem of subscribers’ churn. Although several techniques have been used to predict customer churn in developed countries, many of those studies used secondary data which are not readily available in Nigeria for researchers. This study investigates how Markov chains help in modelling and predicting the customer churn and retention rate in the Nigerian mobile telecommunication industry. The data generated through the survey were input in the Windows-based Quantitative System for Business (WinQSB for analysis. The results reveal that in the study area MTN has the highest retention rate (86.11%, followed by GLO (70.51%, Airtel (67%, and Etisalat (67.5%. This result has implications for telecom firms’ strategies for competitive advantage in particular and survival in general.

  17. Difference-less mobility management network

    Institute of Scientific and Technical Information of China (English)

    Xinrong LV; Jianxin LIAO; Xiaomin ZHU; Jiachun WU

    2009-01-01

    Core system technology is a key factor in the next generation network (NGN).A difference-less mobility man-agement network is proposed to better support the mobility of an IP multimedia subsystem (IMS).This kind of network can provide good service and user mobility,enabling local user access to the network anywhere.User location manage-ment and session creation are analyzed.The results show that under this network architecture,the cost of the user location registration and session creation is lower than that of the home control model employed by the IMS.

  18. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  19. Mobile social networking an innovative approach

    CERN Document Server

    Zhang, Daqing

    2014-01-01

    The use of contextually aware, pervasive, distributed computing, and sensor networks to bridge the gap between the physical and online worlds is the basis of mobile social networking. This book shows how applications can be built to provide mobile social networking, the research issues that need to be solved to enable this vision, and how mobile social networking can be used to provide computational intelligence that will improve daily life. With contributions from the fields of sociology, computer science, human-computer interaction and design, this book demonstrates how mobile social networks can be inferred from users' physical interactions both with the environment and with others, as well as how users behave around them and how their behavior differs on mobile vs. traditional online social networks.

  20. Collocational Networks Supporting Strategic Planning of Brand Communication: Analysis of Quarterly Reports of Telecommunication Companies

    Directory of Open Access Journals (Sweden)

    Pentti Järvi

    2004-10-01

    Full Text Available This study addresses analysing quarterly reports from a brandtheoretical viewpoint. The study addresses the issue through a method which introduces both a quantitative tool based on linguistic theory and qualitative decisions of the researchers. The research objects of this study are two quarterly reports each of three telecommunications companies: Ericsson, Motorola and Nokia. The method used is a collocational network. The analyses show that there are differences in communication and message strategies among investigated companies and also changes during a quite short period in each company

  1. Cascaded multiplexed optical link on a telecommunication network for frequency dissemination.

    Science.gov (United States)

    Lopez, Olivier; Haboucha, Adil; Kéfélian, Fabien; Jiang, Haifeng; Chanteau, Bruno; Roncin, Vincent; Chardonnet, Christian; Amy-Klein, Anne; Santarelli, Giorgio

    2010-08-01

    We demonstrate a cascaded optical link for ultrastable frequency dissemination comprised of two compensated links of 150 km and a repeater station. Each link includes 114 km of Internet fiber simultaneously carrying data traffic through a dense wavelength division multiplexing technology, and passes through two routing centers of the telecommunication network. The optical reference signal is inserted in and extracted from the communication network using bidirectional optical add-drop multiplexers. The repeater station operates autonomously ensuring noise compensation on the two links and the ultra-stable signal optical regeneration. The compensated link shows a fractional frequency instability of 3 x 10(-15) at one second measurement time and 5 x 10(-20) at 20 hours. This work paves the way to a wide dissemination of ultra-stable optical clock signals between distant laboratories via the Internet network.

  2. Cascaded multiplexed optical link on a telecommunication network for frequency dissemination

    CERN Document Server

    Lopez, Olivier; Kéfélian, Fabien; Jiang, Haifeng; Chanteau, Bruno; Roncin, Vincent; Chardonnet, Christian; Amy-Klein, Anne; Santarelli, Georgio

    2010-01-01

    We demonstrate a cascaded optical link for ultrastable frequency dissemination comprised of two compensated links of 150 km and a repeater station. Each link includes 114 km of Internet fiber simultaneously carrying data traffic through a dense wavelength division multiplexing technology, and passes through two routing centers of the telecommunication network. The optical reference signal is inserted in and extracted from the communication network using bidirectional optical add-drop multiplexers. The repeater station operates autonomously ensuring noise compensation on the two links and the ultra-stable signal optical regeneration. The compensated link shows a fractional frequency instability of 3 \\times 10-15 at one second measurement time and 5 \\times 10-20 at 20 hours. This work paves the way to a wide dissemination of ultra-stable optical clock signals between distant laboratories via the Internet network.

  3. Framework for Development of Advanced Telecommunication Services in Current and Future Converged Networks

    DEFF Research Database (Denmark)

    Soler-Lucas, José

    2006-01-01

    This thesis presents different experiences related to architectures and mechanisms for deployment of telephony services, understood as especial features complementing the basic voice service. The context for these experiences is the transition of telecommunication (telephony) networks from circuit...... switched based systems towards packet based ones. Service deployment in a specific hybrid PSTN/IN/VoIP architecture is presented as well as a description of the enabling technologies. Discussion on service implementation examples is provided. The convenience of network neutral service invocation...... is introduced and how this has been achieved, by means of Web Services-based mechanisms. A single-request / single response protocol for invocation of a specific set of services is presented and a decoupling mechanism between signalling network protocols and service logic invocation demonstrated. Services, have...

  4. Energy Efficient Evolution of Mobile Broadband Networks

    DEFF Research Database (Denmark)

    Micallef, Gilbert

    costs, which, based on increasing energy prices and necessary network upgrades are likely to increase. Since base station sites make up for about 75% of the power consumption in mobile networks, studies are focused on this specific network element. A number of factors believed to play a role...... the v impact of replacing old equipment. Results show that an aggressive replacement strategy and the upgrade of sites to remote radio head can restrain the increase in power consumption of the network to just 17%. In addition to upgrading equipment, mobile network operators can further reduce power...... network capacity evolution path, replacing old and less efficient equipment, and enabling power saving features, can all considerably reduce the power consumption of future mobile broadband networks. Studies and recommendations presented within this thesis demonstrate that it is realistic for mobile...

  5. Time Synchronization for Mobile Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ying Guo

    2013-01-01

    Full Text Available Time synchronization is very crucial for the implementation of energy constricted underwater wireless sensor networks (UWSN. The purpose of this paper is to present a time synchronization algorithm which is suitable to UWSN. Although several time synchronization protocols have been developed, most of them tend to break down when implemented on mobile underwater sensor networks. In this paper, we analyze the effect of node mobility, and propose a Mobile Counteracted Time Synchronization approach, called “Mc-Sync”, which is a novel time synchronization scheme for mobile underwater acoustic sensor networks. It makes use of two mobile reference nodes to counteract the effect of node mobility. We also analyze and design the optimized trajectories of the two mobile reference nodes in underwater environment. We show through analysis and simulation that Mc-Sync provides much better performance than existing schemes.

  6. Design and Evaluation of a Novel HIP-Based Network Mobility Protocol

    Directory of Open Access Journals (Sweden)

    Szabolcs Nováczki

    2008-01-01

    Full Text Available The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and changes its point of attachment to the Internet. The main goal of any protocol supporting network mobility is to provide continuous, optimal and secure Internet access to all nodes and even recursively nested mobile subnetworks inside a moving network. For this purpose, the IETF (Internet Engineering Task Force has developed the NEtwork MObility Basic Support (NEMO BS protocol which extends the operation of Mobile IPv6 (MIPv6. In order to bypass the same problems suffered by MIPv6 and NEMO BS, a novel Host Identity Protocol (HIP extension called HIP-NEMO is introduced, proposed and evaluated in this paper. Our proposal is based on hierarchical topology of mobile RVSs (mRVS, signaling delegation and inter-mRVS communication to enable secure and efficient network mobility support in the HIP layer. The method provides secure connectivity and reachability for every node and nested subnet in the moving network and supports multihomed scenarios as well. Moreover, HIPNEMO reduces signaling and packet overhead during network mobility management by achieving route optimization inside any moving network even in nested scenarios. To evaluate the proposed scheme we present a simulation model implemented in OMNeT++ and discuss the results of our simulation based analysis to show the efficiency of the approach compared to the NEMO BS protocol formulated by the IETF.

  7. Active Network Supports for Mobile IP

    Institute of Scientific and Technical Information of China (English)

    LU Yueming; QIAN Depei; XU Bin; WANG Lei

    2001-01-01

    The basic mobile IP protocol is difficult to implement on the traditional IP network and not flexible and efficient under certain conditions. For example, firewalls or boundary routers may drop packets sent by mobile nodes for security reasons. Traditional networking devices such as routers cannot dynamically load and unload extended services to achieve different qualities of services. In this paper, a new scheme of using the active network to support the mobile IP is presented. The Softnet, a prototype of active networks based on mobile agents,is introduced. The active network is characterized by the programmability of its intermediatenodes and therefore presents dynamic and flexible behaviors. Special services can be dynamically deployed onto the active nodes in the Softnet. This property is definitely required in implementing the mobile IP protocols. The Softnet supports not only the basic mobile IP protocol but also other extended mobile IP protocols. Virtual networks for mobile IP services are dynamically formed by mobile agents in the Softnet to provide different qualities of services.

  8. Two-Way Optical Frequency Comparisons Over 100km Telecommunication Network Fibers

    CERN Document Server

    Bercy, Anthony; Lopez, Olivier; Chardonnet, Christian; Pottie, Paul-Eric; Amy-Klein, Anne

    2014-01-01

    By using two-way frequency transfer, we demonstrate ultra-high resolution comparison of optical frequencies over a telecommunication fiber link of 100 km operating simultaneously digital data transfer. We first propose and experiment a bi-directional scheme using a single fiber. We show that the relative stability at 1 s integration time is 7 10^18 and scales down to 5 10^21. The same level of performance is reached when an optical link is implemented with an active compensation of the fiber noise. We also implement a real-time two-way frequency comparison over a uni-directional telecommunication network using a pair of parallel fibers. The relative frequency stability is 10^15 at 1 s integration time and reaches 2 10^17 at 40 000 s. The fractional uncertainty of the frequency comparisons was evaluated for the best case to 2 10^20. These results open the way to accurate and high resolution frequency comparison of optical clocks over intercontinental fiber networks.

  9. Achieving QoS for Aeronautical Telecommunication Networks over Differentiated Services

    Science.gov (United States)

    Bai, Haowei; Atiquzzaman, Mohammed; Ivancic, William

    2001-01-01

    Aeronautical Telecommunication Network (ATN) has been developed by the International Civil Aviation Organization to integrate Air-Ground and Ground-Ground data communication for aeronautical applications into a single network serving Air Traffic Control and Aeronautical Operational Communications. To carry time critical information required for aeronautical applications, ATN provides different Quality of Services (QoS) to applications. ATN has therefore, been designed as a standalone network which implies building an expensive separate network for ATN. However, the cost of operating ATN can be reduced if it can be run over a public network such as the Internet. Although the current Internet does not provide QoS, the next generation Internet is expected to provide QoS to applications. The objective of this paper is to investigate the possibility of providing QoS to ATN applications when it is run over the next generation Internet. Differentiated Services (DiffServ), one of the protocols proposed for the next generation Internet, will allow network service providers to offer different QoS to customers. Our results show that it is possible to provide QoS to ATN applications when they run over a DiffServ backbone.

  10. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Message waiting indication supplementary service

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Message waiting indication supplementary service

  11. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Specification, functional model and information flows - Call priority interruption and call priority interruption protection supplementary services

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Specification, functional model and information flows - Call priority interruption and call priority interruption protection supplementary services

  12. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Call priority interruption and call priority interruption protection supplementary services

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Call priority interruption and call priority interruption protection supplementary services

  13. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Wireless terminal authentication supplementary services

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Wireless terminal authentication supplementary services

  14. Information technology - Telecommunications and information exchange between systems - Private Integrated Services Network - Specification, functional model and information flows - Call transfer supplementary service

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private Integrated Services Network - Specification, functional model and information flows - Call transfer supplementary service

  15. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Specification, functional model and information flows - Recall supplementary service

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Specification, functional model and information flows - Recall supplementary service

  16. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Name identification supplementary services

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Name identification supplementary services

  17. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Single step call transfer supplementary service

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Single step call transfer supplementary service

  18. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  19. An integrated service digital network (ISDN)-based international telecommunication between Samsung Medical Center and Hokkaido University using telecommunication helped radiotherapy planning and information system (THERAPIS).

    Science.gov (United States)

    Huh, S J; Shirato, H; Hashimoto, S; Shimizu, S; Kim, D Y; Ahn, Y C; Choi, D; Miyasaka, K; Mizuno, J

    2000-07-01

    This study introduces the integrated service digital network (ISDN)-based international teleradiotherapy system (THERAPIS) in radiation oncology between hospitals in Seoul, South Korea and in Sapporo, Japan. THERAPIS has the following functions: (1) exchange of patient's image data, (2) real-time teleconference, and (3) communication of the treatment planning, dose calculation and distribution, and of portal verification images between the remote hospitals. Our preliminary results of applications on eight patients demonstrated that the international telecommunication using THERAPIS was clinically useful and satisfactory with sufficient bandwidth for the transfer of patient data for clinical use in radiation oncology.

  20. Mobility management in LTE heterogeneous networks

    CERN Document Server

    Karandikar, Abhay; Mehta, Mahima

    2017-01-01

    This book is the first of its kind, compiling information on the Long-Term Evolution (LTE) standards, which are enhanced to address new mobility-related challenges in Heterogeneous Networks (HetNets). It identifies the related challenges and discusses solutions and the simulation methodology for modeling HetNet mobility – cutting-edge information that was previously accessible only in the form of 3GPP specifications and documents, and research papers. The book reviews the current LTE mobility framework and discusses some of the changes for enhancing mobility management in HetNets. It describes the measurement procedures, handover (HO) mechanisms and HO success/failure scenarios. HetNets are intended to provide very high spectral efficiency while ensuring seamless coverage by deploying low-power nodes within the umbrella macrocell network. While mobility management in homogeneous networks is well understood, LTE standards are being enhanced to address the HetNet-specific mobility management challenges emergi...

  1. Mobile Botnet Detection Using Network Forensics

    Science.gov (United States)

    Vural, Ickin; Venter, Hein

    Malicious software (malware) infects large numbers of computers around the world. This malware can be used to promote unwanted products, disseminate offensive content, or provide unauthorized access to personal and financial information. Until recently mobile networks have been relatively isolated from the Internet, so there has been little need to protect them against Botnets. Mobile networks are now well integrated with the internet, so threats on the internet such as Botnets have started to migrate onto mobile networks. Botnets on mobile devices will probably appear very soon, there are already signs that this is happening. This paper studies the potential threat of Botnets based on mobile networks, and proposes the use of computational intelligence techniques to detect Botnets. We then simulate anomaly detection followed by an interpretation of the simulated values.

  2. The Deployment of the Future Mobile Network

    Directory of Open Access Journals (Sweden)

    Eba’ Hamad AlMousa

    2016-04-01

    Full Text Available With the explosion of mobile services and the continuouse increase demand for a higher data traffic, a new high speed communication networks are required. Mobile networks are developing to increase the data speed and channels bandwidth inorder to meet the subscriber needs. Many attempts have been carried out to achieve the main demands of faster connectivity and download. 5G technolgy which refers to the 5th Generation Mobile Tecnology is the new mobile network that will provide the users with more features and effeciency at the finest QoS (Quality of Service. This study presents most of the experemints  and researches to deploy the new Mobile Network 5G, however it is still in its infancy stage and lacks standardization. Some of the proposed potential architecture for 5G are described in this article.

  3. Drive to miniaturization: integrated optical networks on mobile platforms

    Science.gov (United States)

    Salour, Michael M.; Batayneh, Marwan; Figueroa, Luis

    2011-11-01

    With rapid growth of the Internet, bandwidth demand for data traffic is continuing to explode. In addition, emerging and future applications are becoming more and more network centric. With the proliferation of data communication platforms and data-intensive applications (e.g. cloud computing), high-bandwidth materials such as video clips dominating the Internet, and social networking tools, a networking technology is very desirable which can scale the Internet's capability (particularly its bandwidth) by two to three orders of magnitude. As the limits of Moore's law are approached, optical mesh networks based on wavelength-division multiplexing (WDM) have the ability to satisfy the large- and scalable-bandwidth requirements of our future backbone telecommunication networks. In addition, this trend is also affecting other special-purpose systems in applications such as mobile platforms, automobiles, aircraft, ships, tanks, and micro unmanned air vehicles (UAVs) which are becoming independent systems roaming the sky while sensing data, processing, making decisions, and even communicating and networking with other heterogeneous systems. Recently, WDM optical technologies have seen advances in its transmission speeds, switching technologies, routing protocols, and control systems. Such advances have made WDM optical technology an appealing choice for the design of future Internet architectures. Along these lines, scientists across the entire spectrum of the network architectures from physical layer to applications have been working on developing devices and communication protocols which can take full advantage of the rapid advances in WDM technology. Nevertheless, the focus has always been on large-scale telecommunication networks that span hundreds and even thousands of miles. Given these advances, we investigate the vision and applicability of integrating the traditionally large-scale WDM optical networks into miniaturized mobile platforms such as UAVs. We explain

  4. IPv6 Network Mobility Route Optimization Survey

    Directory of Open Access Journals (Sweden)

    Samer S. Hassan

    2011-01-01

    Full Text Available Problem statement: This study describes that the Next Generation of Networks (NGN communication will supports multiple technologies, handles the mobility of end users to move through heterogeneous access networks, with ability to connect to different networks. Where the Internet Engineer Task Force maintain (IETF the Mobile IPv6 (MIPv6 to handles the mobility of networks (NEMO, to provide wide band and more scalable network services. One of the MIPv6 built-in features is Route Optimization (RO to solve the inefficient route problem. Conclusion/Recommendations: The main objective of this article is to survey, classify and make a compression between the available schemes for route optimization over the last years depends on the basic criteria generated from the published articles within different network topology. This article presents the problem of suboptimal route which is further increased with increasing of nesting levels and there is no such one scheme is perfect for all network environments.

  5. Probabilistic Mobility Models for Mobile and Wireless Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2010-01-01

    In this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a message....... It is possible to have weak bisimular networks which have different probabilistic connectivity information. We also examine the relation between our weak bisimulation and a minor variant of PCTL*. Finally we apply our calculus on a small example called the ZeroConf protocol....

  6. Probabilistic Mobility Models for Mobile and Wireless Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2010-01-01

    In this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a message....... It is possible to have weak bisimular networks which have different probabilistic connectivity information. We also examine the relation between our weak bisimulation and a minor variant of PCTL*. Finally we apply our calculus on a small example called the ZeroConf protocol....

  7. Reconfigurable Robust Routing for Mobile Outreach Network

    Science.gov (United States)

    Lin, Ching-Fang

    2010-01-01

    The Reconfigurable Robust Routing for Mobile Outreach Network (R3MOO N) provides advanced communications networking technologies suitable for the lunar surface environment and applications. The R3MOON techn ology is based on a detailed concept of operations tailored for luna r surface networks, and includes intelligent routing algorithms and wireless mesh network implementation on AGNC's Coremicro Robots. The product's features include an integrated communication solution inco rporating energy efficiency and disruption-tolerance in a mobile ad h oc network, and a real-time control module to provide researchers an d engineers a convenient tool for reconfiguration, investigation, an d management.

  8. A Distributed Network Mobility Management Scheme for Hierarchical Mobile IPv6 Networks

    Science.gov (United States)

    Kawano, Keita; Kinoshita, Kazuhiko; Yamai, Nariyoshi

    Route optimization for network mobility is a key technique for providing a node in a mobile network (Mobile Network Node or MNN) with high quality broadband communications. Many schemes adding route optimization function to Network Mobility (NEMO) Basic Support protocol, the standardized network mobility management protocol from the IETF nemo working group, have already been proposed in recent years. One such scheme, a scheme using Hierarchical Mobile IPv6 (HMIPv6) aims to overcome micromobility management issues as well by applying a mechanism based on HMIPv6. The traditional scheme, however, suffers from a significant number of signaling messages as the number of MNNs and/or the number of their Correspondent Nodes (CNs) increase, because many messages notifying the MNNs' Home Agents (HAMNNs) and the CNs of the mobile network's movement are generated simultaneously each time the mobile network moves to the domain of another micromobility management router (Mobility Anchor Point or MAP). This paper proposes a scheme to overcome this problem. Our scheme reduces the number of signaling messages generated at the same time by managing the mobility of MNNs using multiple MAPs distributed within a network for load sharing. The results of simulation experiments show that our scheme works efficiently compared to the traditional scheme when a mobile network has many MNNs and/or these MNNs communicate with many CNs.

  9. Interplay between telecommunications and face-to-face interactions: a study using mobile phone data.

    Directory of Open Access Journals (Sweden)

    Francesco Calabrese

    Full Text Available In this study we analyze one year of anonymized telecommunications data for over one million customers from a large European cellphone operator, and we investigate the relationship between people's calls and their physical location. We discover that more than 90% of users who have called each other have also shared the same space (cell tower, even if they live far apart. Moreover, we find that close to 70% of users who call each other frequently (at least once per month on average have shared the same space at the same time--an instance that we call co-location. Co-locations appear indicative of coordination calls, which occur just before face-to-face meetings. Their number is highly predictable based on the amount of calls between two users and the distance between their home locations--suggesting a new way to quantify the interplay between telecommunications and face-to-face interactions.

  10. Interplay between telecommunications and face-to-face interactions: a study using mobile phone data.

    Science.gov (United States)

    Calabrese, Francesco; Smoreda, Zbigniew; Blondel, Vincent D; Ratti, Carlo

    2011-01-01

    In this study we analyze one year of anonymized telecommunications data for over one million customers from a large European cellphone operator, and we investigate the relationship between people's calls and their physical location. We discover that more than 90% of users who have called each other have also shared the same space (cell tower), even if they live far apart. Moreover, we find that close to 70% of users who call each other frequently (at least once per month on average) have shared the same space at the same time--an instance that we call co-location. Co-locations appear indicative of coordination calls, which occur just before face-to-face meetings. Their number is highly predictable based on the amount of calls between two users and the distance between their home locations--suggesting a new way to quantify the interplay between telecommunications and face-to-face interactions.

  11. Deploying SIP-based Mobile Exam Application onto Next Generation Network testbed

    CERN Document Server

    Barnawi, Ahmed; Emran, Muhammad; Khan, Asif Irshad; 10.1109/SIECPC.2011.5876936

    2012-01-01

    Over the past few years, mobile operators are faced with enormous challenges. Of such challenges, evolved user demands on personalized applications. Telecommunications industry as well as research community have paid enormous attention to Next Generation Networks (NGN) to address this challenge. NGN is perceived as a sophisticated platform where both application developers and mobile operators cooperate to develop user applications with enhanced quality of experience. The objective of this paper is twofold: first we present an introduction to state-of-the-art NGN testbed to be developed at KAU, and second we provide initial analysis for deploying a mobile application on top of the testbed.

  12. Survey on Opportunistic Networks in Delay Tolerant Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Koushik.C.P

    2016-02-01

    Full Text Available Delay Tolerant Network is an emerging research field in Mobile sensor network. It use forwarding technique to transmit the message from source to destination, there is no complete path between sources to destination. Due to mobility of nodes there is frequent change in node paten and difficult to find the path, there is chance that message keep on forwarded inside the network. In this paper we made detail survey on Opportunistic Routing Protocol in mobile network, and in that node getting the message form neighbor node and moving away from Sink. We proposed a technique in Gradient based Routing Protocol to solve node moving away from sink with message.

  13. Data Confidentiality in Mobile Ad hoc Networks

    CERN Document Server

    Aldabbas, Hamza; Janicke, Helge; Al-Bayatti, Ali; 10.5121/ijwmn.2012.4117

    2012-01-01

    Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nod...

  14. Location-allocation models and new solution methodologies in telecommunication networks

    Science.gov (United States)

    Dinu, S.; Ciucur, V.

    2016-08-01

    When designing a telecommunications network topology, three types of interdependent decisions are combined: location, allocation and routing, which are expressed by the following design considerations: how many interconnection devices - consolidation points/concentrators should be used and where should they be located; how to allocate terminal nodes to concentrators; how should the voice, video or data traffic be routed and what transmission links (capacitated or not) should be built into the network. Including these three components of the decision into a single model generates a problem whose complexity makes it difficult to solve. A first method to address the overall problem is the sequential one, whereby the first step deals with the location-allocation problem and based on this solution the subsequent sub-problem (routing the network traffic) shall be solved. The issue of location and allocation in a telecommunications network, called "The capacitated concentrator location- allocation - CCLA problem" is based on one of the general location models on a network in which clients/demand nodes are the terminals and facilities are the concentrators. Like in a location model, each client node has a demand traffic, which must be served, and the facilities can serve these demands within their capacity limit. In this study, the CCLA problem is modeled as a single-source capacitated location-allocation model whose optimization objective is to determine the minimum network cost consisting of fixed costs for establishing the locations of concentrators, costs for operating concentrators and costs for allocating terminals to concentrators. The problem is known as a difficult combinatorial optimization problem for which powerful algorithms are required. Our approach proposes a Fuzzy Genetic Algorithm combined with a local search procedure to calculate the optimal values of the location and allocation variables. To confirm the efficiency of the proposed algorithm with respect

  15. Software-Defined Cellular Mobile Network Solutions

    Institute of Scientific and Technical Information of China (English)

    Jiandong Li; Peng Liu; Hongyan Li

    2014-01-01

    The emergency relating to software-defined networking (SDN), especially in terms of the prototype associated with OpenFlow, pro-vides new possibilities for innovating on network design. Researchers have started to extend SDN to cellular networks. Such new programmable architecture is beneficial to the evolution of mobile networks and allows operators to provide better services. The typical cellular network comprises radio access network (RAN) and core network (CN); hence, the technique roadmap diverges in two ways. In this paper, we investigate SoftRAN, the latest SDN solution for RAN, and SoftCell and MobileFlow, the latest solu-tions for CN. We also define a series of control functions for CROWD. Unlike in the other literature, we emphasize only software-defined cellular network solutions and specifications in order to provide possible research directions.

  16. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  17. Sunrise deploys mobile network for CERN

    CERN Multimedia

    2004-01-01

    Sunrise, the alternative telecoms provider in Switzerland, is finalizing the installation of a mobile network comprising about forty sites located around the new particle accelerator at CERN (1 paragraph)

  18. A Mobile Application Prototype using Network Coding

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank

    2010-01-01

    This paper looks into implementation details of network coding for a mobile application running on commercial mobile phones. We describe the necessary coding operations and algorithms that implements them. The coding algorithms forms the basis for a implementation in C++ and Symbian C++. We report...

  19. Adaptation Methods in Mobile Communication Networks

    OpenAIRE

    Vladimir Wieser

    2003-01-01

    Adaptation methods are the main tool for transmission rate maximization through the mobile channel and today the great attention is directed to them not only in theoretical domain but in standardization process, too. The review of adaptation methods for system and technical parameters of mobile cellular networks (2.5G and 3G) is carricd out.

  20. Discovering Typed Communities in Mobile Social Networks

    Institute of Scientific and Technical Information of China (English)

    Huai-Yu Wan; You-Fang Lin; Zhi-Hao Wu; Hou-Kuan Huang

    2012-01-01

    Mobile social networks,which consist of mobile users who communicate with each other using cell phones,are reflections of people's interactions in social lives.Discovering typed communities (e.g.,family communities or corporate communities) in mobile social networks is a very promising problem.For example,it can help mobile operators to determine the target users for precision marketing.In this paper we propose discovering typed communities in mobile social networks by utilizing the labels of relationships between users.We use the user logs stored by mobile operators,including communication and user movement records,to collectively label all the relationships in a network,by employing an undirected probabilistic graphical model,i.e.,conditional random fields.Then we use two methods to discover typed communities based on the results of relationship labeling:one is simply retaining or cutting relationships according to their labels,and the other is using sophisticated weighted community detection algorithms.The experimental results show that our proposed framework performs well in terms of the accuracy of typed community detection in mobile social networks.

  1. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  2. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ali Safa Sadiq

    2014-01-01

    Full Text Available We propose an Advanced Mobility Handover scheme (AMH in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  3. A Feedback Control Mechanism of QoS Management for IP Telecommunication Network

    Institute of Scientific and Technical Information of China (English)

    CUI Yi-dong; JIAO Li; LIN Yu; WANG Wen-dong

    2005-01-01

    In this paper a feedback control mechanism of Quality of Service (QoS) management is proposed. By measuring and monitoring the operational information of the IP telecommunication network, the feedback control-loops tune the network according to the trends of the traffic characteristics in order to gain a favorable network status. With theoretical analysis, it is concluded that the QoS of an arbitrary k-class flow can be guaranteed when the capacity of the k-class traffic is not fully filled. Thus by distributing the bandwidth of the egress bottleneck link among the ingress links, the congestion can be relieved. Moreover, the capacity of each traffic class that shares the same link affects one another. Therefore, the feedback control also aims at adjusting the capacity proportion among the traffic classes. In order to realize the goals, three feedback control-loops are designed in the QoS management system. A CORBA-based implementation is deployed on the testbed.

  4. To The Question Of Information Security During Rendering State And Municipal Services Through The Global Information And Telecommunication Network Internet

    Directory of Open Access Journals (Sweden)

    Alexander A. Galushkin

    2015-01-01

    Full Text Available In the present article author analyzes some aspects of providing the state and municipal services by means of the global information and telecommunication network Internet. Author proves the need of ensuring information security and counteraction of cyberespionage, gives own offers.

  5. Energy efficient evolution of mobile broadband networks

    Energy Technology Data Exchange (ETDEWEB)

    Micallef, G.

    2013-04-15

    Over the last decade, the mobile communications industry has broken through some remarkable barriers, pushing further and transforming the way people communicate and access information. As the volume of traffic carried by mobile networks maintains an insatiable growth, mobile network operators are required to ensure that networks can scale accordingly. In addition to upgrading existing networks, a number of operators have already started to rollout a further radio access technology layer, Long Term Evolution, or LTE. In addition to enhancing network capacity, operators are also required to adhere to public commitments for reducing their energy and carbon footprint. In 2008 Vodafone stated that by the year 2020, efforts for reducing emissions are expected to halve emissions registered in the year 2006/7. In addition to presenting a more environmentally conscious brand, this is also hoped to reduce costs, which, based on increasing energy prices and necessary network upgrades are likely to increase. Since base station sites make up for about 75% of the power consumption in mobile networks, studies are focused on this specific network element. A number of factors believed to play a role in the power consumption of mobile networks are separately investigated and later combined, providing a realistic indication of how the consumption is expected to evolve. This is also used as an indication to determine how likely it is for operators to achieve power consumption and emission targets. In order for mobile network operators to upgrade existing infrastructure different options are available. Irrespective of the selected option, capacity upgrades are bound to increase the power consumption of the network. Carried through case studies, a first analysis compares a number of network evolution strategies, determining which provides the necessary performance while limiting the increase in power consumption. Overall, it is noted that a hybrid solution involving the upgrade of

  6. Effect of mobility models on infrastructure based wireless networks ...

    African Journals Online (AJOL)

    Effect of mobility models on infrastructure based wireless networks. ... In this paper, the effect of handoff procedure on the performance of random mobile nodes in wireless networks was investigated. Mobility of node is defined ... Article Metrics.

  7. Intermittently connected mobile ad hoc networks

    CERN Document Server

    Jamalipour, Abbas

    2011-01-01

    In the last few years, there has been extensive research activity in the emerging area of Intermittently Connected Mobile Ad Hoc Networks (ICMANs). By considering the nature of intermittent connectivity in most real word mobile environments without any restrictions placed on users' behavior, ICMANs are eventually formed without any assumption with regard to the existence of a end-to-end path between two nodes wishing to communicate. It is different from the conventional Mobile Ad Hoc Networks (MANETs), which have been implicitly viewed as a connected graph with established complete paths betwe

  8. Privacy Preservation over Untrusted Mobile Networks

    Science.gov (United States)

    Ardagna, Claudio A.; Jajodia, Sushil; Samarati, Pierangela; Stavrou, Angelos

    The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile network operators. These operators are typically assumed to be trusted and to manage the information they collect in a privacy-preserving way. Such information, however, is extremely sensitive and coveted by many companies, which may use it to improve their business. In this context, safeguarding the users’ privacy against the prying eyes of the network operators is an emerging requirement.

  9. The Ongoing Accomplishment of the Mobile Telecommunication: An Ethnomethodological Study of “Talking on a Mobile Phone”

    OpenAIRE

    Chia-Rong Tsao

    2015-01-01

    This paper attempts to explore the practices of “talking on a mobile phone” through the ethnomethodological approach. Instead of paying attention to the influences of the prevalence of mobile phones, this paper focuses on the ongoing accomplishment of the practices of cellphone-using. This paper contends that the mobile phone users accomplish the practices of “talking on a mobile phone” continuously by methods such as “reading hermeneutically”, “embodying”, “the documentary method of interpre...

  10. MOBILTEL - Mobile Multimodal Telecommunications dialogue system based on VoIP telephony

    Directory of Open Access Journals (Sweden)

    Anton Čižmár

    2009-10-01

    Full Text Available In this paper the project MobilTel ispresented. The communication itself is becoming amultimodal interactive process. The MobilTel projectprovides research and development activities inmultimodal interfaces area. The result is a functionalarchitecture for mobile multimodal telecommunicationsystem running on handheld device. The MobilTelcommunicator is a multimodal Slovak speech andgraphical interface with integrated VoIP client. Theother possible modalities are pen – touch screeninteraction, keyboard, and display on which theinformation is more user friendly presented (icons,emoticons, etc., and provides hyperlink and scrollingmenu availability.We describe the method of interaction between mobileterminal (PDA and MobilTel multimodal PCcommunicator over a VoIP WLAN connection basedon SIP protocol. We also present the graphicalexamples of services that enable users to obtaininformation about weather or information about trainconnection between two train stations.

  11. MotionCast for mobile wireless networks

    CERN Document Server

    Wang, Xinbing

    2013-01-01

    MotionCast for Mobile Wireless Networks provides an overview on the research for mobile ad-hoc networks regarding capacity and connectivity. Wireless ad-hoc networks are useful when there is a lack of infrastructure for communication. The proposed notion “MotionCast” is for the capacity analysis of multicast in MANET. A new kind of connectivity (k;m)-connectivity, is also defined, and its critical transmission range for i.i.d. (independently and identically distributed) and random walk mobility models are derived respectively. This book also investigates the related issues of connectivity in mobile and static circumstances. In addition, it provides a survey of the capacity scaling research, which gives a good summary of this field.

  12. Security Service Technology for Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    Aiqun Hu; Tao Li; Mingfu Xue

    2011-01-01

    As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes security threats and the needs of 3G/4G mobile networks, and then proposes a novel protection scheme for them based on their whole structure. In this scheme, a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control. At the security management center, security services such as validity verification and integrity check are provided to mobile terminals. In this way, terminals and the network as a whole are secured to a much greater extent. This paper also highlights problems to be addressed in future research and development.

  13. A decision support system for telemedicine through the mobile telecommunications platform.

    Science.gov (United States)

    Eren, Ali; Subasi, Abdulhamit; Coskun, Osman

    2008-02-01

    In this paper we have discussed the application of artificial intelligence in telemedicine using mobile device. The main goal of our research is to develop methods and systems to collect, analyze, distribute and use medical diagnostics information from multiple knowledge sources and areas of expertise. Physicians may collect and analyze information obtained from experts worldwide with the help of a medical decision support system. In this information retrieval system, modern communication tools such as computers and mobile phones can be used efficiently. In this work we propose a medical decision support system using the general packet radio service (GPRS). GPRS, a data extension of the mobile telephony standard Global system for mobile communications (GSM) is emerging as the first true packet-switched architecture to allow mobile subscribers to benefit from high-speed transmission rates and run JAVA based applications from their mobile terminals. An academic prototype of a medical decision support system using mobile device was implemented. The results reveal that the system could find acceptance from the medical community and it could be an effective means of providing quality health care in developing countries.

  14. Experiencing Networked Mobilities - book chapter

    DEFF Research Database (Denmark)

    Lissandrello, Enza

    2017-01-01

    of urban social life and metaphors of the radical change that mobilities (Sheller and Urry 2006) require in urban planning. Shared spaces are here interpreted as the ‘meetingness’ of mobility patterns and as a manifestation of the shift to a post-car era in which the complexity of urban movements......, different mobility patterns and contingent ordering (Urry 2007:9) are questioned. This issue is approached from the perspective of how planners understand and conceive shared spaces in the context of a changing paradigm in which stasis, structure and social order are changing....

  15. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  16. Contention aware mobility prediction routing for intermittently connected mobile networks

    KAUST Repository

    Elwhishi, Ahmed

    2013-04-26

    This paper introduces a novel multi-copy routing protocol, called predict and forward (PF), for delay tolerant networks, which aims to explore the possibility of using mobile nodes as message carriers for end-to-end delivery of the messages. With PF, the message forwarding decision is made by manipulating the probability distribution of future inter-contact and contact durations based on the network status, including wireless link condition and nodal buffer availability. In particular, PF is based on the observations that the node mobility behavior is semi-deterministic and could be predicted once there is sufficient mobility history information. We implemented the proposed protocol and compared it with a number of existing encounter-based routing approaches in terms of delivery delay, delivery ratio, and the number of transmissions required for message delivery. The simulation results show that PF outperforms all the counterpart multi-copy encounter-based routing protocols considered in the study.

  17. Communication cliques in mobile phone calling networks

    CERN Document Server

    Li, Ming-Xia; Jiang, Zhi-Qiang; Zhou, Wei-Xing

    2015-01-01

    People in modern societies form different social networks through numerous means of communication. These communication networks reflect different aspects of human's societal structure. The billing records of calls among mobile phone users enable us to construct a directed calling network (DCN) and its Bonferroni network (SVDCN) in which the preferential communications are statistically validated. Here we perform a comparative investigation of the cliques of the original DCN and its SVDCN constructed from the calling records of more than nine million individuals in Shanghai over a period of 110 days. We find that the statistical properties of the cliques of the two calling networks are qualitatively similar and the clique members in the DCN and the SVDCN exhibit idiosyncratic behaviors quantitatively. Members in large cliques are found to be spatially close to each other. Based on the clique degree profile of each mobile phone user, the most active users in the two calling networks can be classified in to seve...

  18. Outflow dynamics in modeling oligopoly markets: the case of the mobile telecommunications market in Poland

    Science.gov (United States)

    Sznajd-Weron, Katarzyna; Weron, Rafał; Włoszczowska, Maja

    2008-11-01

    In this paper we introduce two models of opinion dynamics in oligopoly markets and apply them to a situation where a new entrant challenges two incumbents of the same size. The models differ in the way in which the two forces influencing consumer choice—(local) social interactions and (global) advertising—interact. We study the general behavior of the models using the mean field approach and Monte Carlo simulations and calibrate the models using data from the Polish telecommunications market. For one of the models criticality is observed—below a certain critical level of advertising the market approaches a lock-in situation, where one market leader dominates the market and all other brands disappear. Interestingly, for both models the best fits to real data are obtained for conformity level p \\in (0.3,0.4) . This agrees very well with the conformity level found by Solomon Asch in his famous social experiment.

  19. Networked Mobilities and Performative Urban Environments

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    Physical mobility has an important cultural dimension to contemporary life. The movement of objects, signs, and people constitutes material sites of networked relationships. However, as an increasing number of mobility practices are making up our everyday life experiences the movement is much more...... than a travel from point A to point B. The mobile experiences of the contemporary society are practices that are meaningful and normatively embedded. That is to say, mobility is seen as a cultural phenomenon shaping notions of self and other as well as the relationship to sites and places. Furthermore......, an increasing number of such mobile practices are mediated by technologies of tangible and less tangible sorts. Thus by focusing on the complex relationship between material and virtual technologies within the sphere of mobility it is shown that we need to move beyond dichotomies of; global or local, nomad...

  20. Towards operational rainfall monitoring with microwave links from cellular telecommunication networks

    Science.gov (United States)

    Overeem, Aart; Leijnse, Hidde; Uijlenhoet, Remko

    2017-04-01

    The basic principle of rainfall estimation using microwave links is as follows. Rainfall attenuates the electromagnetic signals transmitted from one telephone tower to another. By measuring the received power at one end of a microwave link as a function of time, the path-integrated attenuation due to rainfall can be calculated, which can be converted to average rainfall intensities over the length of a link. Microwave links from cellular communication networks have been proposed as a promising new rainfall measurement technique since one decade. They are particularly interesting for those countries where few surface rainfall observations are available. Yet too date no operational (real-time) link-based rainfall products are available. To advance the process towards operational application and upscaling of this technique, long time series should be analyzed for different networks and climates. Here the potential for long-term large-scale operational rainfall monitoring is demonstrated by utilizing a 2.5-year data set from a cellular communication network. The data set consists of roughly 2,000 links covering the land surface of the Netherlands (35,500 square kilometers). The quality of link rainfall maps is thoroughly quantified by an extensive validation against independent gauge-adjusted radar rainfall maps for, among others, different seasons and extremes. One of the goals is to quantify whether the cellular telecommunication network can yield rainfall maps of comparable quality as those based on automatic rain gauge data (with a density of 1 gauge per 1000 square kilometers). Developing countries will usually have rain gauge networks with a lower density (and little or no weather radars). This helps to assess the possibly added value of link-based rainfall estimates with respect to those from existing rain gauge networks. Moreover, this shows the possibly added value of link rainfall estimates for adjustment of radar rainfall images. The results further confirm

  1. Cloud Radio Access Network architecture. Towards 5G mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra

    rate in the fronthaul. For the analyzed data sets, in deployments where diverse traffic types are mixed (bursty, e.g., web browsing and constant bit rate, e.g., video streaming) and cells from various geographical areas (e.g., office and residential) are connected to the BBU pool, the multiplexing gain......Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base...... as to design the socalled fronthaul network, interconnecting those parts. This thesis focuses on quantifying those benefits and proposing a flexible and capacity-optimized fronthaul network. It is shown that a C-RAN with a functional split resulting in a variable bit rate on the fronthaul links brings cost...

  2. Content replication and placement in mobile networks

    CERN Document Server

    La, Chi-Anh; Casetti, Claudio; Chiasserini, Carla-Fabiana; Fiore, Marco

    2011-01-01

    Performance and reliability of content access in mobile networks is conditioned by the number and location of content replicas deployed at the network nodes. Location theory has been the traditional, centralized approach to study content replication: computing the number and placement of replicas in a static network can be cast as a facility location problem. The endeavor of this work is to design a practical solution to the above joint optimization problem that is suitable for mobile wireless environments. We thus seek a replication algorithm that is lightweight, distributed, and reactive to network dynamics. We devise a solution that lets nodes (i) share the burden of storing and providing content, so as to achieve load balancing, and (ii) autonomously decide whether to replicate or drop the information, so as to adapt the content availability to dynamic demands and time-varying network topologies. We evaluate our mechanism through simulation, by exploring a wide range of settings, including different node ...

  3. NETWORK MANAGEMENT WITH SECURED MOBILE AGENT

    Institute of Scientific and Technical Information of China (English)

    迈克尔; 徐良贤

    2002-01-01

    Network management scheme must consider security challenges for the Mobile Agent paradigm to be accepted in the Internet computing world. Techniques to provide security solutions have been proposed and some have achieved good results. For example, it is possible to launch a code with a guarantee that it cannot attack the hosting sites. The main problem remaining, however, is protecting the mobile code against malicious service providers, the host problem. This paper proposed a Mobile Agent management scheme in a hierarchical level that provides to user a reliable and flexible global access to internet/network information services. We further described a protection mechanism to Mobile Agents against malicious hosts. As an effort to address host problems we first identify the kinds of attack that may be performed by malicious hosts, and propose a mechanism to prevent these attacks. At each agent host we introduce a trusted third party entity on each server called Secure Service Station (SSS) to carry out security actions.

  4. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  5. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  6. Ad Hoc networks and wireless sensor networks in telecommunications application%Ad Hoc网络与无线传感器网络在电信中的应用

    Institute of Scientific and Technical Information of China (English)

    赵锴

    2009-01-01

    重点介绍Ad Hoc网络与其它传统通信网络相比具有的显著特点,这些特点使得Ad Hoc组网成为无线网络和移动计算领域最集中研究的热点,以及Ad Hoc网络在电信业的应用,除本身具有的重要价值外, 还具有大规模电信级服务.同时介绍无线传感器网络,介绍其特点,对WSN在电信中的应用前景进行分析.%This article puts emphasis on the Ad Hoc networks compared to other traditional communications networks with a notable feature,which make Ad Hoc networks into the wireless network and mobile computing research in the field with the highest concentration of hot spots, and Ad Hoc network applications in the telecommunications industry, in addition to the important value in itself, but also has a large-scale carrier-class service. At the same time, it introduces WSN with a comparative analysis of its characteristics,and analyzes WSN in telecommunications applications.

  7. Telecommunications is Dead, Long Live Networking : The Effect of the Information Revolution on the Telecom Industry

    OpenAIRE

    Bond, James

    1997-01-01

    The author looks at how the drivers of the information revolution are transforming the structure of the telecommunications industry. The end of natural monopoly, the breakdown of the old pricing mechanisms, the increasing competition from new operators and new products, and the globalization of the industry are forcing radical change. This spells trouble for incumbent telecommunications op...

  8. Uncovering the spatial structure of mobility networks

    CERN Document Server

    Louail, Thomas; Picornell, Miguel; Cantú, Oliva García; Herranz, Ricardo; Frias-Martinez, Enrique; Ramasco, José J; Barthelemy, Marc

    2015-01-01

    The extraction of a clear and simple footprint of the structure of large, weighted and directed networks is a general problem that has many applications. An important example is given by origin-destination matrices which contain the complete information on commuting flows, but are difficult to analyze and compare. We propose here a versatile method which extracts a coarse-grained signature of mobility networks, under the form of a $2\\times 2$ matrix that separates the flows into four categories. We apply this method to origin-destination matrices extracted from mobile phone data recorded in thirty-one Spanish cities. We show that these cities essentially differ by their proportion of two types of flows: integrated (between residential and employment hotspots) and random flows, whose importance increases with city size. Finally the method allows to determine categories of networks, and in the mobility case to classify cities according to their commuting structure.

  9. The political economy of mobile telecommunications liberalization: Evidence from the OECD countries

    NARCIS (Netherlands)

    Duso, T.; Seldeslachts, J.

    2010-01-01

    The change from analogue to digital technologies in the mobile telecom industries at the beginning of the 1990s increased the economic rationale for rendering these markets more competitive. Yet, the speed of reforms have been remarkably different across countries. We empirically investigate this

  10. Wireless network topology for monitoring mobile agents

    Science.gov (United States)

    Fraser, Matthew J.; James, Daniel A.; Thiel, David V.

    2005-02-01

    A wireless network of multiple sensor nodes for monitoring large numbers of mobile agents is described and investigated. Wireless monitoring provides time critical information from a number of data sources allowing near real-time analysis of the collected data. The developed wireless network provides a moderate data rate, is able to support many wireless nodes and is a low power solution. Novel network structures have been developed to satisfy all of these requirements. This paper evaluates a number of currently available wireless communication protocols, concluding that a Bluetooth wireless network satisfies the above criteria. To support a large number of devices, topologies using inter-piconet and piconet sharing methods have been developed. These network structures are outlined in detail and have been developed with the current Bluetooth hardware limitations in mind. The proposed wireless networks have been developed to be implemented with current Bluetooth hardware. A summary of network performance is included for each developed network structure, and from these figures an appropriate network structure has been chosen that satisfies the requirements of a wireless sensor network for monitoring mobile agents.

  11. Environmental Discourses in Organizations: the Case of a Brazilian Mobile Telecommunications Company

    Directory of Open Access Journals (Sweden)

    Alexandre de Pádua Carrieri

    2007-09-01

    Full Text Available This paper examines the discourse configurations on the environmental theme in business organizations and its relevance to the understanding of the inclusion of ecological discourses in the discourses of organizational members. A case study into a Brazilian telecommunications company offers empirical evidence. It begins with the understanding that organizations adopt several strategies in an attempt to disseminate a certain environmental discourse. As these efforts share space with other pressures, a fragmented discourse emerges. In this paper, the pressures of the environmental theme on organizations are discussed in order to understand this process. The second part of the argument focuses on the context of the case study – Brazilian organizations – and, afterwards, the third part deals with ecological discourses in their insertions in organizational interests. The data of the case study were collected through documental research and 40 semi-structured interviews. The analysis was applied based on Discourse Analysis. In conclusion, an ambiguous discourse configuration was shown that offer elements for the understanding that philanthropy, legal obligation and organizational competitiveness need to be used together to offer legitimacy to the theme of environmental responsibility in business organizations.

  12. Overlaid Cellular and Mobile Ad Hoc Networks

    CERN Document Server

    Huang, Kaibin; Chen, Bin; Yang, Xia; Lau, Vincent K N

    2008-01-01

    In cellular systems using frequency division duplex, growing Internet services cause unbalance of uplink and downlink traffic, resulting in poor uplink spectrum utilization. Addressing this issue, this paper considers overlaying an ad hoc network onto a cellular uplink network for improving spectrum utilization and spatial reuse efficiency. Transmission capacities of the overlaid networks are analyzed, which are defined as the maximum densities of the ad hoc nodes and mobile users under an outage constraint. Using tools from stochastic geometry, the capacity tradeoff curves for the overlaid networks are shown to be linear. Deploying overlaid networks based on frequency separation is proved to achieve higher network capacities than that based on spatial separation. Furthermore, spatial diversity is shown to enhance network capacities.

  13. An access alternative for mobile satellite networks

    Science.gov (United States)

    Wu, W. W.

    1988-05-01

    Conceptually, this paper discusses strategies of digital satellite communication networks for a very large number of low density traffic stations. These stations can be either aeronautical, land mobile, or maritime. The techniques can be applied to international, domestic, regional, and special purpose satellite networks. The applications can be commercial, scientific, military, emergency, navigational or educational. The key strategy is the use of a non-orthogonal access method, which tolerates overlapping signals. With n being either time or frequency partitions, and with a single overlapping signal allowed, a low cost mobile satellite system can be designed with n squared (n squared + n + 1) number of terminals.

  14. Fundamentals of 5G mobile networks

    CERN Document Server

    Rodriguez, Jonathan

    2015-01-01

    Fundamentals of 5G Mobile Networks provides an overview of the key features of the 5th Generation (5G) mobile networks,  discussing the motivation for 5G and the main challenges in developing this new technology. This book provides an insight into the key areas of research that will define this new system technology paving the path towards future research and development.  The book is multi-disciplinary in nature, and aims to cover a whole host of intertwined subjects that will predominantly influence the 5G landscape, including the future Internet, cloud computing, small cells and self-organ

  15. Earth-Mars Telecommunications and Information Management System (TIMS): Antenna Visibility Determination, Network Simulation, and Management Models

    Science.gov (United States)

    Odubiyi, Jide; Kocur, David; Pino, Nino; Chu, Don

    1996-01-01

    This report presents the results of our research on Earth-Mars Telecommunications and Information Management System (TIMS) network modeling and unattended network operations. The primary focus of our research is to investigate the feasibility of the TIMS architecture, which links the Earth-based Mars Operations Control Center, Science Data Processing Facility, Mars Network Management Center, and the Deep Space Network of antennae to the relay satellites and other communication network elements based in the Mars region. The investigation was enhanced by developing Build 3 of the TIMS network modeling and simulation model. The results of several 'what-if' scenarios are reported along with reports on upgraded antenna visibility determination software and unattended network management prototype.

  16. Data Confidentiality in Mobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    Hamza Aldabbas

    2012-03-01

    Full Text Available Mobile ad hoc networks (MANETs are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.These individual nodes act as routers to forward both their own data and also their neighbours’ data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2 to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs, as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.

  17. Broadcast Abstraction in a Stochastic Calculus for Mobile Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2012-01-01

    We introduce a continuous time stochastic broadcast calculus for mobile and wireless networks. The mobility between nodes in a network is modeled by a stochastic mobility function which allows to change part of a network topology depending on an exponentially distributed delay and a network...

  18. Cooperative Localization for Mobile Networks

    DEFF Research Database (Denmark)

    Cakmak, Burak; Urup, Daniel Nygaard; Meyer, Florian;

    2016-01-01

    We propose a hybrid message passing method for distributed cooperative localization and tracking of mobile agents. Belief propagation and mean field message passing are employed for, respectively, the motion-related and measurementrelated part of the factor graph. Using a Gaussian belief approxim...... approximation, only three real values per message passing iteration have to be broadcast to neighboring agents. Despite these very low communication requirements, the estimation accuracy can be comparable to that of particle-based belief propagation....

  19. 76 FR 28443 - President's National Security Telecommunications Advisory Committee

    Science.gov (United States)

    2011-05-17

    ... users from legacy Land Mobile Radio to 4G technologies for their mobile telecommunications needs. The... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Advisory Committee Meeting. SUMMARY: The President's National Security Telecommunications...

  20. Transportation dynamics on networks of mobile agents

    CERN Document Server

    Yang, Han-Xin; Xie, Yan-Bo; Lai, Ying-Cheng; Wang, Bing-Hong

    2011-01-01

    Most existing works on transportation dynamics focus on networks of a fixed structure, but networks whose nodes are mobile have become widespread, such as cell-phone networks. We introduce a model to explore the basic physics of transportation on mobile networks. Of particular interest are the dependence of the throughput on the speed of agent movement and communication range. Our computations reveal a hierarchical dependence for the former while, for the latter, we find an algebraic power law between the throughput and the communication range with an exponent determined by the speed. We develop a physical theory based on the Fokker-Planck equation to explain these phenomena. Our findings provide insights into complex transportation dynamics arising commonly in natural and engineering systems.

  1. Privacy Analysis in Mobile Social Networks

    DEFF Research Database (Denmark)

    Sapuppo, Antonio

    2012-01-01

    Nowadays, mobile social networks are capable of promoting social networking benefits during physical meetings, in order to leverage interpersonal affinities not only among acquaintances, but also between strangers. Due to their foundation on automated sharing of personal data in the physical...... factors: inquirer, purpose of disclosure, access & control of the disclosed information, location familiarity and current activity of the user. This research can serve as relevant input for the design of privacy management models in mobile social networks....... surroundings of the user, these networks are subject to crucial privacy threats. Privacy management systems must be capable of accurate selection of data disclosure according to human data sensitivity evaluation. Therefore, it is crucial to research and comprehend an individual's personal information...

  2. Multicast Routing Protocols in Adhoc Mobile networks

    Directory of Open Access Journals (Sweden)

    S.Nagaprasad,

    2010-11-01

    Full Text Available The majority of applications are in areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions where participants share information dynamically using their mobile devices. Well established routing protocols do exist to offer efficient multicasting service in conventional wired networks. These protocols, having been designed for fixed networks, may fails to keep up with node movements and frequent topology changes in a MANET. Therefore, adapting existing wired multicast protocols as such to a MANET, which completely lacks infrastructure, appear less promising. Providing efficient multicasting over MANET faces many challenges, includes scalability,quality of service, reliable service, security, Address configuration, Applications for multicast over MANET. The existing multicast routing protocol do not addresses these issues effectively over Mobile Adhoc Networks (MANET.

  3. Key Success Factors of 3rd Generation Mobile Network Services for M-Commerce in Malaysia

    Directory of Open Access Journals (Sweden)

    Saravanan Muthaiyah

    2004-01-01

    Full Text Available While there has been a great deal of excitement in view of M-commerce, very little is actually known about conditions and critical success factors for successful introduction of the 3rd generation mobile network services here in Malaysia. This study investigates the factors for successful diffusion of 3G network services and their role in advancing an interactive marketplace. 3G which simply means 3rd generation mobile communications technology has been widely discussed by many telecommunications service providers. It was launched by the International Telecommunication Union (ITU some 13 years ago. 3G is viewed as an enabler of M-Commerce here in Malaysia. However, true success of this technology depends on various factors. The objective of this study is to investigate significant key enablers of 3G deployment and adoption in Malaysia. An insight into the critical factors to be considered for the deployment of 3G technology in Malaysia and experiences of other countries will be used as a benchmark to understand the mitigating factors of 3G deployment. Critical factors such as cost to of service, interoperability of standards, insufficiency of mobile services or content and deficiency of the laws will be discussed in this study. The study also discusses diffusion barriers and drivers for the rapid service diffusion of 3G mobile networks.

  4. Performance of BGP Among Mobile Military Networks

    Science.gov (United States)

    2011-04-08

    widely used policy-based routing protocol to date. Explicit MANET routing protocols (e.g., AODV , DSR, LAR [3]) are not con- sidered policy-based... routes to destinations (e.g., reachability), and its influence on network’s outage events. Furthermore, our modified BGP protocol is compared to the OSPF...and OSPF-MDR routing protocols for mobile networks with increasing number of nodes. Our results show that modified BGP’s overhead growth is

  5. Communication cliques in mobile phone calling networks

    Science.gov (United States)

    Li, Ming-Xia; Xie, Wen-Jie; Jiang, Zhi-Qiang; Zhou, Wei-Xing

    2015-11-01

    People in modern societies form different social networks through numerous means of communication. These communication networks reflect different aspects of human's societal structure. The billing records of calls among mobile phone users enable us to construct a directed calling network (DCN) and its Bonferroni network (SVDCN) in which the preferential communications are statistically validated. Here we perform a comparative investigation of the cliques of the original DCN and its SVDCN constructed from the calling records of more than nine million individuals in Shanghai over a period of 110 days. We find that the statistical properties of the cliques of the two calling networks are qualitatively similar and the clique members in the DCN and the SVDCN exhibit idiosyncratic behaviors quantitatively. Members in large cliques are found to be spatially close to each other. Based on the clique degree profile of each mobile phone user, the most active users in the two calling networks can be classified in to several groups. The users in different groups are found to have different calling behaviors. Our study unveils interesting communication behaviors among mobile phone users that are densely connected to each other.

  6. Seamless Mobility in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Faouzi Zarai

    2010-12-01

    Full Text Available In next generation of wireless networks, different technologies belonging to one or more operators should be integrated to form a heterogeneous environment based on an IP core network infrastructure. This ensures user mobility and service continuity by maintaining connections when switching between varioustechnologies and it introduces new resources and possibilities for applications. In this context, an automatic interface selection based on instantaneous and practical constraints and user preferences (Quality of Service (QoS parameters, available resources, security, power consumption, etc is therefore required. The different network selection and handover schemes proposed in the literature can be classified into three approaches according to who is responsible for making the handover decision: the terminal, the network or thanks to a cooperation between both of them. However, these approaches keep presenting some drawbacks; namely the problem of resources management and network load balancing whenever the selection is controlled by the mobile terminal (MT and the problem of scalability and unknown operator’s management policy whenever the selection is rather controlled by the network. In this article, first we propose a new architecture and new network selection scheme that explicitly take into account the current resource usage and the user preferences. Furthermore, our solution ensures the selection of the most suitable network for each flow while taking into consideration its expectations in terms of QoS. A feasibility study of our architecture is then triggered on a single MT by using typical scenarios and using various algorithms to evaluate their performances.

  7. Impact of the Mobile Telecommunication Network’s Milk Flow Project on the Livelihoods of Pastoralists in Ladugga Grazing Reserve, Kaduna State, Nigeria

    Directory of Open Access Journals (Sweden)

    John Gambo Laah

    2013-12-01

    Full Text Available The paper aims at assessing the impact of Mobile Telecommunication Network (MTN Milk-Flow Project on the livelihoods of pastoralists in Ladugga Grazing Reserve in Kaduna State, Nigeria. A structured questionnaire was administered to 242 pastoralists in Ladugga. To complement the quantitative source of data, Focus Group Discussions (FGDs and in-depth interviews (IDIs were conducted to assess the benefits and impact of the Milk Flow Project. A total of four (4 FGD sand four (4 IDIs were held with Fulani pastoralists and stakeholders in Ladugga Grazing Reserve. The mean age for male respondents was 55 years while that of the females was 42 years. The result reveals that the milk-flow project has led to: formation and membership of cooperative societies; significant increase in milk production and consequently income; a reduction in morbidity and mortality rates of cows due to better health seeking behaviours; the development of pasture farms and an increase in school enrolment. The paper suggested the need to encourage more private sector participation in supporting pastoralists’ livelihoods within the grazing reserve systems.

  8. Portable control device for networked mobile robots

    Energy Technology Data Exchange (ETDEWEB)

    Feddema, John T. (Albuquerque, NM); Byrne, Raymond H. (Albuquerque, NM); Bryan, Jon R. (Edgewood, NM); Harrington, John J. (Albuquerque, NM); Gladwell, T. Scott (Albuquerque, NM)

    2002-01-01

    A handheld control device provides a way for controlling one or multiple mobile robotic vehicles by incorporating a handheld computer with a radio board. The device and software use a personal data organizer as the handheld computer with an additional microprocessor and communication device on a radio board for use in controlling one robot or multiple networked robots.

  9. CDMA coverage under mobile heterogeneous network load

    NARCIS (Netherlands)

    Saban, D.; van den Berg, Hans Leo; Boucherie, Richardus J.; Endrayanto, A.I.

    2002-01-01

    We analytically investigate coverage (determined by the uplink) under non-homogeneous and moving traffic load of third generation UMTS mobile networks. In particular, for different call assignment policies, we investigate cell breathing and the movement of the coverage gap occurring between cells

  10. CDMA coverage under mobile heterogeneous network load

    NARCIS (Netherlands)

    Saban, Dorin; Berg, van den Hans; Boucherie, Richard J.; Endrayanto, Irwan

    2002-01-01

    We analytically investigate coverage (determined by the uplink) under non-homogeneous and moving traffic load of third generation UMTS mobile networks. In particular, for different call assignment policies, we investigate cell breathing and the movement of the coverage gap occurring between cells wh

  11. Call Admission Control in Mobile Cellular Networks

    CERN Document Server

    Ghosh, Sanchita

    2013-01-01

    Call Admission Control (CAC) and Dynamic Channel Assignments (DCA) are important decision-making problems in mobile cellular communication systems. Current research in mobile communication considers them as two independent problems, although the former greatly depends on the resulting free channels obtained as the outcome of the latter. This book provides a solution to the CAC problem, considering DCA as an integral part of decision-making for call admission. Further, current technical resources ignore movement issues of mobile stations and fluctuation in network load (incoming calls) in the control strategy used for call admission. In addition, the present techniques on call admission offers solution globally for the entire network, instead of considering the cells independently.      CAC here has been formulated by two alternative approaches. The first approach aimed at handling the uncertainty in the CAC problem by employing fuzzy comparators.  The second approach is concerned with formulation of CAC ...

  12. Transmission qualities of natural lines of mine telecommunication network in the aspect of multiplexing

    Energy Technology Data Exchange (ETDEWEB)

    Penkala, E.

    1982-10-01

    The parameters of natural lines of mine telecommunication cables which are essential for multiplexing are discussed. It is shown that a method of time multiplexing permits better use to be made of line capacity than does frequency multiplexing.

  13. Ubiquitous Mobile Awareness from Sensor Networks

    Science.gov (United States)

    Kanter, Theo; Pettersson, Stefan; Forsström, Stefan; Kardeby, Victor; Österberg, Patrik

    Users require applications and services to be available everywhere, enabling them to focus on what is important to them. Therefore, context information (e.g., spatial data, user preferences, available connectivity and devices, etc.) has to be accessible to applications that run in end systems close to users. In response to this, we present a novel architecture for ubiquitous sensing and sharing of context in mobile services and applications. The architecture offers distributed storage of context derived from sensor networks wirelessly attached to mobile phones and other devices. The architecture also handles frequent updates of sensor information and is interoperable with presence in 3G mobile systems, thus enabling ubiquitous sensing applications. We demonstrate these concepts and the principle operation in a sample ubiquitous Mobile Awareness service.

  14. An Application of Mobile Agent System in Network Management

    Institute of Scientific and Technical Information of China (English)

    YANGChen-xiang; DUJun-ping; YINYi-xin

    2004-01-01

    This paper describes an application of a reusable mobile agent system in network management. A mobile agent reusable system is constructed to realize a new method in forming mobile agent systems. By using this method, an agent can change its route dynamically without making any change to its specific behavior. By classifying mobile agents into two categories, the task agent can be reusable in different networks. In this way, a mobile agent system can easily carry out network management tasks.

  15. Supersampling and Network Reconstruction of Urban Mobility

    Science.gov (United States)

    Sagarra, Oleguer; Szell, Michael; Santi, Paolo; Díaz-Guilera, Albert; Ratti, Carlo

    2015-01-01

    Understanding human mobility is of vital importance for urban planning, epidemiology, and many other fields that draw policies from the activities of humans in space. Despite the recent availability of large-scale data sets of GPS traces or mobile phone records capturing human mobility, typically only a subsample of the population of interest is represented, giving a possibly incomplete picture of the entire system under study. Methods to reliably extract mobility information from such reduced data and to assess their sampling biases are lacking. To that end, we analyzed a data set of millions of taxi movements in New York City. We first show that, once they are appropriately transformed, mobility patterns are highly stable over long time scales. Based on this observation, we develop a supersampling methodology to reliably extrapolate mobility records from a reduced sample based on an entropy maximization procedure, and we propose a number of network-based metrics to assess the accuracy of the predicted vehicle flows. Our approach provides a well founded way to exploit temporal patterns to save effort in recording mobility data, and opens the possibility to scale up data from limited records when information on the full system is required. PMID:26275237

  16. Supersampling and Network Reconstruction of Urban Mobility.

    Directory of Open Access Journals (Sweden)

    Oleguer Sagarra

    Full Text Available Understanding human mobility is of vital importance for urban planning, epidemiology, and many other fields that draw policies from the activities of humans in space. Despite the recent availability of large-scale data sets of GPS traces or mobile phone records capturing human mobility, typically only a subsample of the population of interest is represented, giving a possibly incomplete picture of the entire system under study. Methods to reliably extract mobility information from such reduced data and to assess their sampling biases are lacking. To that end, we analyzed a data set of millions of taxi movements in New York City. We first show that, once they are appropriately transformed, mobility patterns are highly stable over long time scales. Based on this observation, we develop a supersampling methodology to reliably extrapolate mobility records from a reduced sample based on an entropy maximization procedure, and we propose a number of network-based metrics to assess the accuracy of the predicted vehicle flows. Our approach provides a well founded way to exploit temporal patterns to save effort in recording mobility data, and opens the possibility to scale up data from limited records when information on the full system is required.

  17. Supersampling and Network Reconstruction of Urban Mobility.

    Science.gov (United States)

    Sagarra, Oleguer; Szell, Michael; Santi, Paolo; Díaz-Guilera, Albert; Ratti, Carlo

    2015-01-01

    Understanding human mobility is of vital importance for urban planning, epidemiology, and many other fields that draw policies from the activities of humans in space. Despite the recent availability of large-scale data sets of GPS traces or mobile phone records capturing human mobility, typically only a subsample of the population of interest is represented, giving a possibly incomplete picture of the entire system under study. Methods to reliably extract mobility information from such reduced data and to assess their sampling biases are lacking. To that end, we analyzed a data set of millions of taxi movements in New York City. We first show that, once they are appropriately transformed, mobility patterns are highly stable over long time scales. Based on this observation, we develop a supersampling methodology to reliably extrapolate mobility records from a reduced sample based on an entropy maximization procedure, and we propose a number of network-based metrics to assess the accuracy of the predicted vehicle flows. Our approach provides a well founded way to exploit temporal patterns to save effort in recording mobility data, and opens the possibility to scale up data from limited records when information on the full system is required.

  18. Community core evolution in mobile social networks.

    Science.gov (United States)

    Xu, Hao; Xiao, Weidong; Tang, Daquan; Tang, Jiuyang; Wang, Zhenwen

    2013-01-01

    Community detection in social networks attracts a lot of attention in the recent years. Existing methods always depict the relationship of two nodes using the temporary connection. However, these temporary connections cannot be fully recognized as the real relationships when the history connections among nodes are considered. For example, a casual visit in Facebook cannot be seen as an establishment of friendship. Hence, our question is the following: how to cluster the real friends in mobile social networks? In this paper, we study the problem of detecting the stable community core in mobile social networks. The cumulative stable contact is proposed to depict the relationship among nodes. The whole process is divided into timestamps. Nodes and their connections can be added or removed at each timestamp, and historical contacts are considered when detecting the community core. Also, community cores can be tracked through the incremental computing, which can help to recognize the evolving of community structure. Empirical studies on real-world social networks demonstrate that our proposed method can effectively detect stable community cores in mobile social networks.

  19. Community Core Evolution in Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Hao Xu

    2013-01-01

    Full Text Available Community detection in social networks attracts a lot of attention in the recent years. Existing methods always depict the relationship of two nodes using the temporary connection. However, these temporary connections cannot be fully recognized as the real relationships when the history connections among nodes are considered. For example, a casual visit in Facebook cannot be seen as an establishment of friendship. Hence, our question is the following: how to cluster the real friends in mobile social networks? In this paper, we study the problem of detecting the stable community core in mobile social networks. The cumulative stable contact is proposed to depict the relationship among nodes. The whole process is divided into timestamps. Nodes and their connections can be added or removed at each timestamp, and historical contacts are considered when detecting the community core. Also, community cores can be tracked through the incremental computing, which can help to recognize the evolving of community structure. Empirical studies on real-world social networks demonstrate that our proposed method can effectively detect stable community cores in mobile social networks.

  20. Dynamic Pathloss Model for Future Mobile Communication Networks

    DEFF Research Database (Denmark)

    Kumar, Ambuj; Mihovska, Albena Dimitrova; Prasad, Ramjee

    2016-01-01

    — Future mobile communication networks (MCNs) are expected to be more intelligent and proactive based on new capabilities that increase agility and performance. However, for any successful mobile network service, the dexterity in network deployment is a key factor. The efficiency of the network...... that incorporates the environmental dynamics factor in the propagation model for intelligent and proactively iterative networks...

  1. Fundamental Properties of Wireless Mobile Ad-hoc Networks

    NARCIS (Netherlands)

    Hekmat, R.

    2005-01-01

    Wireless mobile ad-hoc networks are formed by mobile devices that set up a possibly short-lived network for communication needs of the moment. Ad-hoc networks are decentralized, self-organizing networks capable of forming a communication network without relying on any fixed infrastructure. Each nod

  2. Mobile cloud networking: mobile network, compute, and storage as one service on-demand

    NARCIS (Netherlands)

    Jamakovic, Almerima; Bohnert, Thomas Michael; Karagiannis, Georgios; Galis, A.; Gavras, A.

    2013-01-01

    The Future Communication Architecture for Mobile Cloud Services: Mobile Cloud Networking (MCN)1 is a EU FP7 Large scale Integrating Project (IP) funded by the European Commission. MCN project was launched in November 2012 for the period of 36 month. In total top-tier 19 partners from industry and ac

  3. Energy efficient evolution of mobile broadband networks

    Energy Technology Data Exchange (ETDEWEB)

    Micallef, G.

    2013-04-15

    Over the last decade, the mobile communications industry has broken through some remarkable barriers, pushing further and transforming the way people communicate and access information. As the volume of traffic carried by mobile networks maintains an insatiable growth, mobile network operators are required to ensure that networks can scale accordingly. In addition to upgrading existing networks, a number of operators have already started to rollout a further radio access technology layer, Long Term Evolution, or LTE. In addition to enhancing network capacity, operators are also required to adhere to public commitments for reducing their energy and carbon footprint. In 2008 Vodafone stated that by the year 2020, efforts for reducing emissions are expected to halve emissions registered in the year 2006/7. In addition to presenting a more environmentally conscious brand, this is also hoped to reduce costs, which, based on increasing energy prices and necessary network upgrades are likely to increase. Since base station sites make up for about 75% of the power consumption in mobile networks, studies are focused on this specific network element. A number of factors believed to play a role in the power consumption of mobile networks are separately investigated and later combined, providing a realistic indication of how the consumption is expected to evolve. This is also used as an indication to determine how likely it is for operators to achieve power consumption and emission targets. In order for mobile network operators to upgrade existing infrastructure different options are available. Irrespective of the selected option, capacity upgrades are bound to increase the power consumption of the network. Carried through case studies, a first analysis compares a number of network evolution strategies, determining which provides the necessary performance while limiting the increase in power consumption. Overall, it is noted that a hybrid solution involving the upgrade of

  4. Antecedents of Behavioral Intention to Use Mobile Telecommunication Services: Effects of Corporate Social Responsibility and Technology Acceptance

    Directory of Open Access Journals (Sweden)

    Sanghoon Lee

    2015-08-01

    Full Text Available The concepts of corporate social responsibility (CSR and user experience have been identified as core determinants of the success of service providers. Accordingly, practitioners and researchers have investigated the effects of service providers’ CSR and user experience on behavioral intention to use a particular service. Based on the importance of these concepts, the current study integrates subjective dimensions of CSR with the technology acceptance model (TAM to explore whether the CSR efforts of mobile telecommunication services providers and the service acceptance of their customers have significant effects on behavioral intention to use a service. We apply structural equation modeling and find that two factors from the TAM (i.e., usefulness and ease of use as well as economic, social, and environmental responsibility are significantly related to customer attitude and satisfaction. Moreover, our results show that there are significantly positive relationships between customer attitude and behavioral intention to use a service, as well as between customer satisfaction and intention. Practical and theoretical implications along with notable limitations of the current study are presented.

  5. Energy Efficient Evolution of Mobile Networks

    DEFF Research Database (Denmark)

    Micallef, Gilbert; Mogensen, Preben

    2011-01-01

    in understanding the impact that different options can have on the energy consumption of their networks. This paper investigates the possible energy gains of evolving a mobile network through a joint pico deployment and macro upgrade solution over a period of 8 years. Besides the network energy consumption, energy...... efficiency in Mbps/kWh is also analyzed. Furthermore, a cost analysis is carried out, to give a more complete picture of the different options being considered. Focusing on the last year of the evolution analysis, results show that deploying more pico sites reduces the energy consumption of the network......, by a maximum of 30%. With regards to the energy efficiency, high deployment of pico sites allowed the network to carry 16% more traffic for the same amount of energy. This, however, results in an increase in cost, specifically operational costs....

  6. Spectral Control of Mobile Robot Networks

    CERN Document Server

    Zavlanos, Michael M; Jadbabaie, Ali

    2010-01-01

    The eigenvalue spectrum of the adjacency matrix of a network is closely related to the behavior of many dynamical processes run over the network. In the field of robotics, this spectrum has important implications in many problems that require some form of distributed coordination within a team of robots. In this paper, we propose a continuous-time control scheme that modifies the structure of a position-dependent network of mobile robots so that it achieves a desired set of adjacency eigenvalues. For this, we employ a novel abstraction of the eigenvalue spectrum by means of the adjacency matrix spectral moments. Since the eigenvalue spectrum is uniquely determined by its spectral moments, this abstraction provides a way to indirectly control the eigenvalues of the network. Our construction is based on artificial potentials that capture the distance of the network's spectral moments to their desired values. Minimization of these potentials is via a gradient descent closed-loop system that, under certain convex...

  7. Hybrid Mobile Communication Networks for Planetary Exploration

    Science.gov (United States)

    Alena, Richard; Lee, Charles; Walker, Edward; Osenfort, John; Stone, Thom

    2007-01-01

    A paper discusses the continuing work of the Mobile Exploration System Project, which has been performing studies toward the design of hybrid communication networks for future exploratory missions to remote planets. A typical network could include stationary radio transceivers on a remote planet, mobile radio transceivers carried by humans and robots on the planet, terrestrial units connected via the Internet to an interplanetary communication system, and radio relay transceivers aboard spacecraft in orbit about the planet. Prior studies have included tests on prototypes of these networks deployed in Arctic and desert regions chosen to approximate environmental conditions on Mars. Starting from the findings of the prior studies, the paper discusses methods of analysis, design, and testing of the hybrid communication networks. It identifies key radio-frequency (RF) and network engineering issues. Notable among these issues is the study of wireless LAN throughput loss due to repeater use, RF signal strength, and network latency variations. Another major issue is that of using RF-link analysis to ensure adequate link margin in the face of statistical variations in signal strengths.

  8. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  9. Using heuristic algorithms for capacity leasing and task allocation issues in telecommunication networks under fuzzy quality of service constraints

    Science.gov (United States)

    Huseyin Turan, Hasan; Kasap, Nihat; Savran, Huseyin

    2014-03-01

    Nowadays, every firm uses telecommunication networks in different amounts and ways in order to complete their daily operations. In this article, we investigate an optimisation problem that a firm faces when acquiring network capacity from a market in which there exist several network providers offering different pricing and quality of service (QoS) schemes. The QoS level guaranteed by network providers and the minimum quality level of service, which is needed for accomplishing the operations are denoted as fuzzy numbers in order to handle the non-deterministic nature of the telecommunication network environment. Interestingly, the mathematical formulation of the aforementioned problem leads to the special case of a well-known two-dimensional bin packing problem, which is famous for its computational complexity. We propose two different heuristic solution procedures that have the capability of solving the resulting nonlinear mixed integer programming model with fuzzy constraints. In conclusion, the efficiency of each algorithm is tested in several test instances to demonstrate the applicability of the methodology.

  10. Future mobile communications LTE optimization and mobile network virtualization

    CERN Document Server

    Zaki, Yasir

    2012-01-01

    The key to a successful future mobile communication system lies in the design of its radio scheduler. One of the key challenges of the radio scheduler is how to provide the right balance between Quality of Service (QoS) guarantees and the overall system performance. Yasir Zaki proposes innovative solutions for the design of the Long Term Evolution (LTE) radio scheduler and presents several LTE radio scheduler analytical models that can be used as efficient tools for radio dimensioning. The author also introduces a novel wireless network virtualization framework and highlights the potential gai

  11. Mobile location services over the next generation IP core network

    DEFF Research Database (Denmark)

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    network is changing from circuit-switched to packet-switched technology and evolving to an IP core network based on IPv6. The IP core network will allow all IP devices to be connected seamlessly. Due to the movement detection mechanism of Mobile IPv6, mobile terminals will periodically update......Mobile communication networks are evolving towards smaller cells, higher throughput, better security and provision of better services. Wireless short-range technologies, such as the WLAN 802.11 standards family and Bluetooth, are expected to play a major role in future networks. The mobile core...... their current point of attachment to the network and hence provide the current location of the mobile user automatically. The convergence of wireless short-range networks, mobile networks and Internet technology will provide the mobile user's location without any add-in equipment for location measurement...

  12. Low Computational Complexity Network Coding For Mobile Networks

    DEFF Research Database (Denmark)

    Heide, Janus

    2012-01-01

    Network Coding (NC) is a technique that can provide benefits in many types of networks, some examples from wireless networks are: In relay networks, either the physical or the data link layer, to reduce the number of transmissions. In reliable multicast, to reduce the amount of signaling and enable...... cooperation among receivers. In meshed networks, to simplify routing schemes and to increase robustness toward node failures. This thesis deals with implementation issues of one NC technique namely Random Linear Network Coding (RLNC) which can be described as a highly decentralized non-deterministic intra......-flow coding technique. One of the key challenges of this technique is its inherent computational complexity which can lead to high computational load and energy consumption in particular on the mobile platforms that are the target platform in this work. To increase the coding throughput several...

  13. 高龄人群移动信息终端产品设计研究%Research on Design of Mobile Telecommunication Product for Old People

    Institute of Scientific and Technical Information of China (English)

    黄婷; 吴勘

    2012-01-01

    目前我国的消费市场上针对高龄人群所设计开发的移动信息终端产品非常少,这方面研究也极其有限.通过资料分析以及市场调查等手段对高龄人群的生理和心理两大方面进行研究,其中生理方面包括听力、视力、触觉和肌力,心理方面包括消费心理和认知心理.根据研究结果,分析归纳得出高龄人群移动信息终端产品设计的指导性设计原则.最后,以面向高龄人群的移动信息终端产品设计为实例,验证上述设计原则.%The market of mobile telecommunication product for old people will develop very well in China in the future. But nowadays the research on design of mobile telecommunication product for them is very limited. Based on lots of information researches and experimentations, the physiology and psychology of old people are researched in this paper, including audition, vision, feeling, consumer psychology and cognitive psychology. Based on the research results, the design methods and principles of mobile telecommunication product for the old are analyzed. In the end, a mobile telecommunication product for old pepole is designed as an example to validate the design principles.

  14. Advanced mobile networking, sensing, and controls.

    Energy Technology Data Exchange (ETDEWEB)

    Feddema, John Todd; Kilman, Dominique Marie; Byrne, Raymond Harry; Young, Joseph G.; Lewis, Christopher L.; Van Leeuwen, Brian P.; Robinett, Rush D. III; Harrington, John J.

    2005-03-01

    This report describes an integrated approach for designing communication, sensing, and control systems for mobile distributed systems. Graph theoretic methods are used to analyze the input/output reachability and structural controllability and observability of a decentralized system. Embedded in each network node, this analysis will automatically reconfigure an ad hoc communication network for the sensing and control task at hand. The graph analysis can also be used to create the optimal communication flow control based upon the spatial distribution of the network nodes. Edge coloring algorithms tell us that the minimum number of time slots in a planar network is equal to either the maximum number of adjacent nodes (or degree) of the undirected graph plus some small number. Therefore, the more spread out that the nodes are, the fewer number of time slots are needed for communication, and the smaller the latency between nodes. In a coupled system, this results in a more responsive sensor network and control system. Network protocols are developed to propagate this information, and distributed algorithms are developed to automatically adjust the number of time slots available for communication. These protocols and algorithms must be extremely efficient and only updated as network nodes move. In addition, queuing theory is used to analyze the delay characteristics of Carrier Sense Multiple Access (CSMA) networks. This report documents the analysis, simulation, and implementation of these algorithms performed under this Laboratory Directed Research and Development (LDRD) effort.

  15. Methodologies for assessing the use-phase power consumption and greenhouse gas emissions of telecommunications network services.

    Science.gov (United States)

    Chan, Chien A; Gygax, André F; Wong, Elaine; Leckie, Christopher A; Nirmalathas, Ampalavanapillai; Kilper, Daniel C

    2013-01-02

    Internet traffic has grown rapidly in recent years and is expected to continue to expand significantly over the next decade. Consequently, the resulting greenhouse gas (GHG) emissions of telecommunications service-supporting infrastructures have become an important issue. In this study, we develop a set of models for assessing the use-phase power consumption and carbon dioxide emissions of telecom network services to help telecom providers gain a better understanding of the GHG emissions associated with the energy required for their networks and services. Due to the fact that measuring the power consumption and traffic in a telecom network is a challenging task, these models utilize different granularities of available network information. As the granularity of the network measurement information decreases, the corresponding models have the potential to produce larger estimation errors. Therefore, we examine the accuracy of these models under various network scenarios using two approaches: (i) a sensitivity analysis through simulations and (ii) a case study of a deployed network. Both approaches show that the accuracy of the models depends on the network size, the total amount of network service traffic (i.e., for the service under assessment), and the number of network nodes used to process the service.

  16. Dynamic Coverage of Mobile Sensor Networks

    CERN Document Server

    Liu, Benyuan; Nain, Philippe; Towsley, Don

    2011-01-01

    In this paper we study the dynamic aspects of the coverage of a mobile sensor network resulting from continuous movement of sensors. As sensors move around, initially uncovered locations are likely to be covered at a later time. A larger area is covered as time continues, and intruders that might never be detected in a stationary sensor network can now be detected by moving sensors. However, this improvement in coverage is achieved at the cost that a location is covered only part of the time, alternating between covered and not covered. We characterize area coverage at specific time instants and during time intervals, as well as the time durations that a location is covered and uncovered. We further characterize the time it takes to detect a randomly located intruder. For mobile intruders, we take a game theoretic approach and derive optimal mobility strategies for both sensors and intruders. Our results show that sensor mobility brings about unique dynamic coverage properties not present in a stationary sens...

  17. Virtual Stationary Automata for Mobile Networks

    Science.gov (United States)

    2005-01-21

    frequencies at neighboring regions. Leader election alternatives. The bulk of the imple- mentation presented in this paper consists of performing a...simple leader election . We are separating the leader election portion of the algorithm from the the rest of the implementation in order to more easily take...advantage of superior region-based leader election algorithms for mobile networks. These leader election algorithms could be designed to produce

  18. On the Need of Network coding for Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Heide, Janus; Pedersen, Morten Videbæk

    This paper advocates the need of network coding for mobile clouds. Mobile clouds as well as network coding are describing two novel concepts. The concept of mobile clouds describes the potential of mobile devices to communicate with each other and form a cooperative cluster in which new services...... and potentials are created. Network coding on the other side enables the mobile cloud to communicate in a very efficient and secure way in terms of energy and bandwidth usage. Even though network coding can be applied in a variety of communication networks, it has some inherent features that makes it suitable...... for mobile clouds. The paper will list the benefits of network coding for mobile clouds as well as introduce both concepts in a tutorial way. The results used throughout this paper are collaborative work of different research institutes, but mainly taken from the mobile device group at Aalborg University....

  19. Network Coding Applications and Implementations on Mobile Devices

    DEFF Research Database (Denmark)

    Fitzek, Frank; Pedersen, Morten Videbæk; Heide, Janus

    2010-01-01

    Network coding has attracted a lot of attention lately. The goal of this paper is to demonstrate that the implementation of network coding is feasible on mobile platforms. The paper will guide the reader through some examples and demonstrate uses for network coding. Furthermore the paper will als...... show that the implementation of network coding is feasible today on commercial mobile platforms....

  20. Multidimensional views on mobile call network

    Institute of Scientific and Technical Information of China (English)

    Shengqi YANG; Bin WU; Bai WANG

    2009-01-01

    Recent studies on social network have spurred significant interests in human behaviors. Nowadays, various kinds of interpersonal human interactions, from mobile calls to emalls, provide particular avenues to explore the inher-ent properties of communication patterns. In this article, we present a comprehensive study on a massive anonymous call records obtained from a major mobile service operator. The important difference laid in our work and previous mainly topological analyses is that we report on multiple aspects of the dataset. By investigating the calls of the users, we find out that most calls tend to last within one minute. Call du-ration between two females is much longer than that of two males. But calls of males generally involve more stations than that of female, indicating a larger mobile range of the males. We also observed that people tend to communicate more with each other when they share similar characters. Besides, the network is well-connected and robust to random attack. We also demonstrate that the close-knit sub-groups with little discrepancy in the characteristics of its involved users usually evoke more calls. Another interesting discov-ery is that call behaviors among people between workdays and weekends is obviously distinct. Generally speaking, the goal that we research on call network through multidimen-sional analyses is to uncover the intricate patterns of human communications and put up reasonable insights into future service intelligence.

  1. Performance Evaluation Of Macro amp Micro Mobility In HMIP Networks

    Directory of Open Access Journals (Sweden)

    Osama Ali Abdelgadir

    2015-08-01

    Full Text Available Abstract Changing the location of mobile node during transmission or receiving of data always caused changing of the address of the mobile node which results in packet loss as well as delay in time taken to locate the new address of the Mobile Node therefore delay of data receiving is caused this problem was known as micro-mobility issue. To resolve this problem and ascurrently mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of mobile IP which supports quality of service minimum packet loss limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of mobile IP and micro mobility protocols where mobile IP handles macro mobility and HMIP cellular IP HAWAII handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed.HIERARCHICAL MICRO MOBILITY PROTOCOL is used. To identify the impact of micro-mobility in IP based Wireless Network to implement selected micro-mobility model of Hierarchal Micro Mobility Protocol in network simulator and for more analysis and measurements results and for the purpose of performance comparison between both Macro and Micro mobility Protocol Management.. Simulation results presented in this paper are based on ns 2

  2. CUSTOMER CARE AS AN ESSENTIAL ELEMENT IN THE TELECOMMUNICATION INDUSTRY : Case Airtel Ghana.

    OpenAIRE

    Gambo, Ramatu Bashiru

    2016-01-01

    Today, an evolution of mobile internet has led to a dramatic demand of mobile network services within the telecommunication industry. This has compelled telecommunication companies not to only consider price as a major competing tool in intense competing markets but also, focus on customer care as a means of excelling in those markets. The purpose of this study is to investigate customer care activities practiced by Airtel Ghana, the case company and their impact on the company’s service deli...

  3. Navigation Architecture for a Space Mobile Network

    Science.gov (United States)

    Valdez, Jennifer E.; Ashman, Benjamin; Gramling, Cheryl; Heckler, Gregory W.; Carpenter, Russell

    2016-01-01

    The Tracking and Data Relay Satellite System (TDRSS) Augmentation Service for Satellites (TASS) is a proposed beacon service to provide a global, space based GPS augmentation service based on the NASA Global Differential GPS (GDGPS) System. The TASS signal will be tied to the GPS time system and usable as an additional ranging and Doppler radiometric source. Additionally, it will provide data vital to autonomous navigation in the near Earth regime, including space weather information, TDRS ephemerides, Earth Orientation Parameters (EOP), and forward commanding capability. TASS benefits include enhancing situational awareness, enabling increased autonomy, and providing near real-time command access for user platforms. As NASA Headquarters' Space Communication and Navigation Office (SCaN) begins to move away from a centralized network architecture and towards a Space Mobile Network (SMN) that allows for user initiated services, autonomous navigation will be a key part of such a system. This paper explores how a TASS beacon service enables the Space Mobile Networking paradigm, what a typical user platform would require, and provides an in-depth analysis of several navigation scenarios and operations concepts. This paper provides an overview of the TASS beacon and its role within the SMN and user community. Supporting navigation analysis is presented for two user mission scenarios: an Earth observing spacecraft in low earth orbit (LEO), and a highly elliptical spacecraft in a lunar resonance orbit. These diverse flight scenarios indicate the breadth of applicability of the TASS beacon for upcoming users within the current network architecture and in the SMN.

  4. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  5. Consensus in networks of mobile communicating agents

    Science.gov (United States)

    Baronchelli, Andrea; Díaz-Guilera, Albert

    2012-01-01

    Populations of mobile and communicating agents describe a vast array of technological and natural systems, ranging from sensor networks to animal groups. Here, we investigate how a group-level agreement may emerge in the continuously evolving network defined by the local interactions of the moving individuals. We adopt a general scheme of motion in two dimensions and we let the individuals interact through the minimal naming game, a prototypical scheme to investigate social consensus. We distinguish different regimes of convergence determined by the emission range of the agents and by their mobility, and we identify the corresponding scaling behaviors of the consensus time. In the same way, we rationalize also the behavior of the maximum memory used during the convergence process, which determines the minimum cognitive/storage capacity needed by the individuals. Overall, we believe that the simple and general model presented in this paper can represent a helpful reference for a better understanding of the behavior of populations of mobile agents.

  6. Consensus in evolving networks of mobile agents

    Science.gov (United States)

    Baronchelli, Andrea; Díaz-Guilera, Albert

    2012-02-01

    Populations of mobile and communicating agents describe a vast array of technological and natural systems, ranging from sensor networks to animal groups. Here, we investigate how a group-level agreement may emerge in the continuously evolving networks defined by the local interactions of the moving individuals. We adopt a general scheme of motion in two dimensions and we let the individuals interact through the minimal naming game, a prototypical scheme to investigate social consensus. We distinguish different regimes of convergence determined by the emission range of the agents and by their mobility, and we identify the corresponding scaling behaviors of the consensus time. In the same way, we rationalize also the behavior of the maximum memory used during the convergence process, which determines the minimum cognitive/storage capacity needed by the individuals. Overall, we believe that the simple and general model presented in this talk can represent a helpful reference for a better understanding of the behavior of populations of mobile agents.

  7. A Comparative Study of WiMAX and LTE as the Mobile Enterprise Network

    Directory of Open Access Journals (Sweden)

    Harshitha.K.Raj

    2014-03-01

    Full Text Available In recent years, the demand for mobile Internet access has grown significantly. The 3G technology that promised mobile broadband hasn’t been widely successful because of its low transmission rate and high service costs. The number of 3G subscribers was only around 11 percent of the number of 2G subscribers. To enable the mobile Internet, the International Telecommunication Union’s (ITU Working Party 5D launched the International Mobile Telecommunications (IMT-Advanced initiative, seeking proposals from communication standards organizations regarding 4G technologies. Mainly based on two technologies: WiMAX refers to the IEEE 802.16 families of standards, and Long-Term Evolution (LTE, developed by the 3rd Generation Partnership Project. In comparison WiMAX and LTE are much more capable, thus presenting themselves as strong candidates of the mobile technologies for the enterprise known as 4G wireless technologies. WiMAX and LTE resemble each other in some key aspects. These include operating in licensed spectrum bands, high capacity, and strong QoS mechanisms. In this paper we first present the concept of WiMAX and LTE issues that could affect their deployment and adoption as 4G technologies. Secondly we propose an analysis of the differences between WiMAX and LTE from the perspective of enterprise network requirements. And then we focus on performance metrics derived from OPNET modeler release 16 system level simulator. To perform the comparison 4 scenarios were developed the first two are for 7 cell LTE and 7cell W iMAX networks while the second two are for 19 cell LTE and 19cell WiMAX networks.

  8. Performance Evaluation Analysis of Group Mobility in Mobile Ad Hoc Networks

    Science.gov (United States)

    Irshad, Ehtsham; Noshairwan, Wajahat; Shafiq, Muhammad; Khurram, Shahzada; Irshad, Azeem; Usman, Muhammad

    Mobility of nodes is an important issue in mobile adhoc networks (MANET). Nodes in MANET move from one network to another individually and in the form of group. In single node mobility scheme every node performs registration individually in new MANET whereas in group mobility scheme only one node in a group i.e group representative (GR) performs registration on behalf of all other nodes in the group and is assigned Care of Address (CoA). Internet protocol (IP) of all other nodes in the group remains same. Our simulated results prove that group mobility scheme reduces number of messages and consumes less time for registration of nodes as compared to single node mobility scheme. Thus network load is reduced in group mobility scheme. This research paper evaluates the performance of group mobility with single node mobility scheme. Test bed for this evaluation is based on Network Simulator 2 (NS-2) environment.

  9. Using Mobile Agents and Overlay Networks to Secure Electrical Networks

    Energy Technology Data Exchange (ETDEWEB)

    Dawes, Neal A.; Prosser, Bryan J.; Fulp, Errin W.; McKinnon, Archibald D.

    2013-02-11

    ABSTRACT The use of wandering, mobile agents can provide a robust approach for managing, monitoring, and securing electrical distribution networks. However, the topological structure of electrical networks can affect system performance. For example, if the multi-agent system relies on a regular inspection rate (on average, points of interest are inspected with equal frequency), then locations that are not well connected will on average be inspected less frequently. This paper discusses creation and use of overlay networks that create a virtual grid graph can provide faster coverage and a more uniform average agent sampling rate. Using overlays agents wander a virtual neighborhood consisting of only points of interest that are interconnected in a regular fashion (each point has the same number of neighbors). Experimental results will show that an overlay can often provide better network coverage and a more uniform inspection rate, which can improve cyber security by providing a faster detection of threats.

  10. Key User Extraction Based on Telecommunication Data (aka. Key Users in Social Network. How to find them?)

    CERN Document Server

    Bródka, Piotr

    2013-01-01

    The number of systems that collect vast amount of data about users rapidly grow during last few years. Many of these systems contain data not only about people characteristics but also about their relationships with other system users. From this kind of data it is possible to extract a social network that reflects the connections between system's users. Moreover, the analysis of such social network enables to investigate different characteristics of its members and their linkages. One of the types of examining such network is key users extraction. Key users are these who have the biggest impact on other network members as well as have big influence on network evolution. The obtained about these users knowledge enables to investigate and predict changes within the network. So this knowledge is very important for the people or companies who make a profit from the network like telecommunication company. The second important thing is the ability to extract these users as quick as possible, i.e. developed the algo...

  11. Clustering in mobile ad hoc network based on neural network

    Institute of Scientific and Technical Information of China (English)

    CHEN Ai-bin; CAI Zi-xing; HU De-wen

    2006-01-01

    An on-demand distributed clustering algorithm based on neural network was proposed. The system parameters and the combined weight for each node were computed, and cluster-heads were chosen using the weighted clustering algorithm, then a training set was created and a neural network was trained. In this algorithm, several system parameters were taken into account, such as the ideal node-degree, the transmission power, the mobility and the battery power of the nodes. The algorithm can be used directly to test whether a node is a cluster-head or not. Moreover, the clusters recreation can be speeded up.

  12. Medicine in long duration space exploration: the role of virtual reality and broad bandwidth telecommunications networks

    Science.gov (United States)

    Ross, M. D.

    2001-01-01

    Safety of astronauts during long-term space exploration is a priority for NASA. This paper describes efforts to produce Earth-based models for providing expert medical advice when unforeseen medical emergencies occur on spacecraft. These models are Virtual Collaborative Clinics that reach into remote sites using telecommunications and emerging stereo-imaging and sensor technologies. c 2001. Elsevier Science Ltd. All rights reserved.

  13. Virtual Social Networks Online and Mobile Systems

    Directory of Open Access Journals (Sweden)

    Maytham Safar

    2009-01-01

    Full Text Available Location-based applications are one of the most anticipated new segments of the mobile industry. These new applications are enabled by GPS-equipped phones (e.g., emergency applications, buddy finders, games, location-based advertising, etc.. These services are designed to give consumers instant access to personalized, local content of their immediate location. Some applications couple LBS with notification services, automatically alerting users when they are close to a pre-selected destination. With the advances in the Internet and communications/mobile technology, it became vital to analyze the effect of such technologies on human communications. This work studies how humans can construct social networks as a method for group communications using the available technologies. We constructed and analyzed a friends network using different parameters. The parameters that were calculated to analyze the network are the distribution sequence, characteristic path length, clustering coefficient and centrality measures. In addition, we built a PDA application that implements the concept of LBS using two system modules. In the first module, we have developed an application for entertainment purpose; an application program which enables end users to send their birth year and get their horoscope in return. The second part of the project was, to build an application, which helps people to stay in touch with their friends and family members (Find Friend. It helps users to find which of their buddies are within the same area they are in.

  14. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  15. Performance Evaluation of TCP over Mobile Ad hoc Networks

    CERN Document Server

    Ahmed, Foez; Islam, Nayeema; Debnath, Sumon Kumar

    2010-01-01

    With the proliferation of mobile computing devices, the demand for continuous network connectivity regardless of physical location has spurred interest in the use of mobile ad hoc networks. Since Transmission Control Protocol (TCP) is the standard network protocol for communication in the internet, any wireless network with Internet service need to be compatible with TCP. TCP is tuned to perform well in traditional wired networks, where packet losses occur mostly because of congestion. However, TCP connections in Ad-hoc mobile networks are plagued by problems such as high bit error rates, frequent route changes, multipath routing and temporary network partitions. The throughput of TCP over such connection is not satisfactory, because TCP misinterprets the packet loss or delay as congestion and invokes congestion control and avoidance algorithm. In this research, the performance of TCP in Adhoc mobile network with high Bit Error rate (BER) and mobility is studied and investigated. Simulation model is implement...

  16. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Santosh Kumar S

    2011-10-01

    Full Text Available A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories- direct mobility metrics and derived mobility metrics. These two mobility metrics has been used to measure different mobility models, this paper considers some of mobility models i.e Random Waypoint Model, Reference Point Group Mobility Model, Random Direction Mobility Model, Random Walk Mobility Model, Probabilistic Random Walk, Gauss Markov, Column Mobility Model, Nomadic Community Mobility Model and Manhattan Grid Model.

  17. Assessment of the energy efficiency enhancement of future mobile networks

    NARCIS (Netherlands)

    Litjens, R.; Toh, Y.; Zhang, H.; Blume, O.

    2014-01-01

    We assess the energy efficiency of mobile networks in 2020, and compare it with a 2010 baseline. A comprehensive assessment approach is taken, considering all relevant scenario aspects such as data traffic growth, hardware evolutions, mobile network deployments and operations including network shari

  18. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  19. Mobile cluster rekeying in tracking sensor network

    Institute of Scientific and Technical Information of China (English)

    WANG Jia-hao; QING Zhi-guang; GENG Ji; LI Zhi-jun

    2006-01-01

    The wireless sensor network has a broad application in target tracking and locating, and is especially fit for military detection or guard. By arranging the sensor nodes around the target, this article establishes a tracking cluster which can follow the target logically, process data on the target and report to the sink node,thus achieving the tracking function. To improve the security, this article proposes a mobile cluster rekeying protocol (MCRP) to manage the tracking cluster's season key. It is based on a random key predistribution algorithm (RKP), which is composed of a multi-path reinforcement scheme, a q-composition scheme and a oneway cryptographic hash function.

  20. Spaceborne Mobile Ad-Hoc Networks

    Science.gov (United States)

    Forcada, Ignasi; Strauss, Adi

    2010-08-01

    Reliable global networking is essential for a rapidly growing mobile and interactive communication. Satellite communication plays already a significant role in this subject. However, the classical space-based data transmission requires an appropriate infrastructure, both on the ground and in orbit. This paper discusses the potential of a self-organising distributed satellite system in Low Earth Orbits (LEO) to achieve a seamless integration in already existing infrastructures. The communication approach is based on dynamic Inter Satellite Links (ISL) not controlled nor coordinated on an individual basis from the ground-based stations.

  1. Towards Self-Organized Location Privacy in Mobile Networks

    OpenAIRE

    Freudiger, Julien; Raya, Maxim; Hubaux, Jean-Pierre

    2008-01-01

    Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus ``sniff on", each other directly. We design a new mechanism to achieve location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this new p...

  2. Application of mobile scanning agent in the network security

    Institute of Scientific and Technical Information of China (English)

    闵君; 冯珊; 唐超; 梅纲

    2004-01-01

    To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to design and realize mobile scanning agent. Besides, it is also explained the programs of mobile scanning agent system. In the end, it expects mobile scanning agent.

  3. Mobile Internet: Politics of Mobile Code and Networks

    NARCIS (Netherlands)

    L. Mosemghvdlishvili (Lela)

    2015-01-01

    markdownabstract__Abstract__ The term mobile internet refers to accessing the internet through (cellular) mobile devices and represents the convergence of mobile telephony, internet services, and personal computing. Whereas iMode (mobile internet and data services) was introduced in Japan as long a

  4. Mobile Internet: Politics of Mobile Code and Networks

    NARCIS (Netherlands)

    L. Mosemghvdlishvili (Lela)

    2015-01-01

    markdownabstract__Abstract__ The term mobile internet refers to accessing the internet through (cellular) mobile devices and represents the convergence of mobile telephony, internet services, and personal computing. Whereas iMode (mobile internet and data services) was introduced in Japan as long a

  5. Mobile Network DoS Attack and Detection Technology

    Directory of Open Access Journals (Sweden)

    K. Krishnamoorthy

    2013-09-01

    Full Text Available Currently, there has been a 3G mobile networks data traffic explosion due to the large increase in the number of smartphone users. Unlike a traditional wired infrastructure, 3G mobile networks have limited wireless resources and signaling procedures for complex wireless resource management and mobile network security for various abnormal and malicious traffic technologies was not ready. So Malicious or potentially malicious traffic originating from mobile malware infected smart devices can cause serious problems to the 3G mobile networks, such as DoS and scanning attack in wired networks. This paper describes the DoS security threat in the 3G mobile network and proposes a detection technology.

  6. Telecommunications demystified

    CERN Document Server

    Nassar, Carl R

    2001-01-01

    Carl R. Nassar, Ph.D., is professor of telecommunications at Colorado State University and director of the Research in Advanced Wireless Communications (RAWCom) laboratory there. He also consults for telecommunications firms and publishes extensively in the wireless literature.Balances a solid theoretical treatment of subjects with practical applications and examples.Covers both digital and analogue telecommunications systems, including digital modulation techniques.The CD accompanying the book includes MATLAB® tutorials that permit readers to model various telecommunications systems and an el

  7. Journey from Mobile Ad Hoc Networks to Wireless Mesh Networks

    Science.gov (United States)

    Wang, Junfang; Xie, Bin; Agrawal, Dharma P.

    A wireless mesh network (WMN) is a particular type of mobile ad hoc network (MANET), which aims to provide ubiquitous high bandwidth access for a large number of users. A pure MANET is dynamically formed by mobile devices without the requirement of any existing infrastructure or prior network configuration. Similar to MANETs, a WMN also has the ability of self-organization, self-discovering, self-healing, and self-configuration. However, a WMN is typically a collection of stationary mesh routers (MRs) with each employing multiple radios. Some MRs have wired connections and act as the Internet gateways (IGWs) to provide Internet connectivity for other MRs. These new features of WMNs over MANETs enable them to be a promising alternative for high broadband Internet access. In this chapter, we elaborate on the evolution from MANETs to WMNs and provide a comprehensive understanding of WMNs from theoretical aspects to practical protocols, while comparing it with MANETs. In particular, we focus on the following critical issues with respect to WMN deployment: Network Capacity, Positioning Technique, Fairness Transmission and Multiradio Routing Protocols. We end this chapter with some open problems and future directions in WMNs.

  8. Virtual Enterprises, Mobile Markets and Volatile Customers

    NARCIS (Netherlands)

    F.P.H. Jaspers (Ferdinand); W. Hulsink (Wim); J.J.M. Theeuwes (Myrte)

    2005-01-01

    textabstractRecently, several new mobile virtual network operators (MVNOs) have entered the European mobile telecommunications markets. These service providers do not own a mobile network, but instead they buy capacity from other companies. Because these virtual operators do not possess an infrastru

  9. Occupational mobility networks of female and male higher education graduates

    Directory of Open Access Journals (Sweden)

    Eliza-Olivia LUNGU

    2013-08-01

    Full Text Available We employ a network based approach to explore occupational mobility of the Romanian university graduates in the first years after graduation. This representation of data permits us to use the novel statistical techniques developed in the framework of weighted directed networks in order to extract a set of stylized facts that highlight patterns of occupational mobility: centrality, degree and network density. We find that the gender plays a significant role in shaping the patterns of occupational mobility.

  10. Synchronization of mobile chaotic oscillator networks

    Energy Technology Data Exchange (ETDEWEB)

    Fujiwara, Naoya, E-mail: fujiwara@csis.u-tokyo.ac.jp [Center for Spatial Information Science, The University of Tokyo, 277-8568 Chiba (Japan); Kurths, Jürgen [Potsdam Institute for Climate Impact Research (PIK), 14473 Potsdam, Germany and Institute for Complex Systems and Mathematical Biology, University of Aberdeen, Aberdeen (United Kingdom); Díaz-Guilera, Albert [Departament de Física de la Matèria Condensada, Universitat de Barcelona, Martí i Franquès 1, 08028 Barcelona, Spain and Universitat de Barcelona Institute of Complex Systems (UBICS), Universitat de Barcelona, Barcelona (Spain)

    2016-09-15

    We study synchronization of systems in which agents holding chaotic oscillators move in a two-dimensional plane and interact with nearby ones forming a time dependent network. Due to the uncertainty in observing other agents' states, we assume that the interaction contains a certain amount of noise that turns out to be relevant for chaotic dynamics. We find that a synchronization transition takes place by changing a control parameter. But this transition depends on the relative dynamic scale of motion and interaction. When the topology change is slow, we observe an intermittent switching between laminar and burst states close to the transition due to small noise. This novel type of synchronization transition and intermittency can happen even when complete synchronization is linearly stable in the absence of noise. We show that the linear stability of the synchronized state is not a sufficient condition for its stability due to strong fluctuations of the transverse Lyapunov exponent associated with a slow network topology change. Since this effect can be observed within the linearized dynamics, we can expect such an effect in the temporal networks with noisy chaotic oscillators, irrespective of the details of the oscillator dynamics. When the topology change is fast, a linearized approximation describes well the dynamics towards synchrony. These results imply that the fluctuations of the finite-time transverse Lyapunov exponent should also be taken into account to estimate synchronization of the mobile contact networks.

  11. Geographical dispersal of mobile communication networks

    Science.gov (United States)

    Lambiotte, Renaud; Blondel, Vincent D.; de Kerchove, Cristobald; Huens, Etienne; Prieur, Christophe; Smoreda, Zbigniew; Van Dooren, Paul

    2008-09-01

    In this paper, we analyze statistical properties of a communication network constructed from the records of a mobile phone company. The network consists of 2.5 million customers that have placed 810 million communications (phone calls and text messages) over a period of 6 months and for whom we have geographical home localization information. It is shown that the degree distribution in this network has a power-law degree distribution k-5 and that the probability that two customers are connected by a link follows a gravity model, i.e. decreases as d-2, where d is the distance between the customers. We also consider the geographical extension of communication triangles and we show that communication triangles are not only composed of geographically adjacent nodes but that they may extend over large distances. This last property is not captured by the existing models of geographical networks and in a last section we propose a new model that reproduces the observed property. Our model, which is based on the migration and on the local adaptation of agents, is then studied analytically and the resulting predictions are confirmed by computer simulations.

  12. On Endogenous Reconfiguration in Mobile Robotic Networks

    CERN Document Server

    Savla, Ketan

    2008-01-01

    In this paper, our focus is on certain applications for mobile robotic networks, where reconfiguration is driven by factors intrinsic to the network rather than changes in the external environment. In particular, we study a version of the coverage problem useful for surveillance applications, where the objective is to position the robots in order to minimize the average distance from a random point in a given environment to the closest robot. This problem has been well-studied for omni-directional robots and it is shown that optimal configuration for the network is a centroidal Voronoi configuration and that the coverage cost belongs to $\\Theta(m^{-1/2})$, where $m$ is the number of robots in the network. In this paper, we study this problem for more realistic models of robots, namely the double integrator (DI) model and the differential drive (DD) model. We observe that the introduction of these motion constraints in the algorithm design problem gives rise to an interesting behavior. For a \\emph{sparser} net...

  13. LinkMind: link optimization in swarming mobile sensor networks.

    Science.gov (United States)

    Ngo, Trung Dung

    2011-01-01

    A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  14. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Trung Dung Ngo

    2011-08-01

    Full Text Available A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  15. Adaptive Mobile Positioning in WCDMA Networks

    Directory of Open Access Journals (Sweden)

    Dong B.

    2005-01-01

    Full Text Available We propose a new technique for mobile tracking in wideband code-division multiple-access (WCDMA systems employing multiple receive antennas. To achieve a high estimation accuracy, the algorithm utilizes the time difference of arrival (TDOA measurements in the forward link pilot channel, the angle of arrival (AOA measurements in the reverse-link pilot channel, as well as the received signal strength. The mobility dynamic is modelled by a first-order autoregressive (AR vector process with an additional discrete state variable as the motion offset, which evolves according to a discrete-time Markov chain. It is assumed that the parameters in this model are unknown and must be jointly estimated by the tracking algorithm. By viewing a nonlinear dynamic system such as a jump-Markov model, we develop an efficient auxiliary particle filtering algorithm to track both the discrete and continuous state variables of this system as well as the associated system parameters. Simulation results are provided to demonstrate the excellent performance of the proposed adaptive mobile positioning algorithm in WCDMA networks.

  16. A Cluster Maintenance Algorithm Based on Relative Mobility for Mobile Ad Hoc Network Management

    Institute of Scientific and Technical Information of China (English)

    SHENZhong; CHANGYilin; ZHANGXin

    2005-01-01

    The dynamic topology of mobile ad hoc networks makes network management significantly more challenging than wireline networks. The traditional Client/Server (Manager/Agent) management paradigm could not work well in such a dynamic environment, while the hierarchical network management architecture based on clustering is more feasible. Although the movement of nodes makes the cluster structure changeable and introduces new challenges for network management, the mobility is a relative concept. A node with high relative mobility is more prone to unstable behavior than a node with less relative mobility, thus the relative mobility of a node can be used to predict future node behavior. This paper presents the cluster availability which provides a quantitative measurement of cluster stability. Furthermore, a cluster maintenance algorithm based on cluster availability is proposed. The simulation results show that, compared to the Minimum ID clustering algorithm, our algorithm successfully alleviates the influence caused by node mobility and make the network management more efficient.

  17. User cooperation, virality and gaming in a social mobile network

    DEFF Research Database (Denmark)

    Varga, C; Blazovics, L; Charaf, H

    2012-01-01

    Social networks and mobile systems are both rapidly developing areas nowadays. In this chapter, we will introduce Gedda-Headz, a novel social mobile gaming concept that brings these two areas together. Gedda-Headz is a social mobile network that mainly focuses on multiplayer mobile gaming. First ......, as virality is very important in social networks, we will describe the viral elements of Gedda-Headz. We will also introduce the Gedda-Headz spreader, a novel method to spread the word about the network, increasing the virality further....

  18. Ultranarrow-band photon-pair source compatible with solid state quantum memories and telecommunication networks.

    Science.gov (United States)

    Fekete, Julia; Rieländer, Daniel; Cristiani, Matteo; de Riedmatten, Hugues

    2013-05-31

    We report on a source of ultranarrow-band photon pairs generated by widely nondegenerate cavity-enhanced spontaneous down-conversion. The source is designed to be compatible with Pr(3+) solid state quantum memories and telecommunication optical fibers, with signal and idler photons close to 606 nm and 1436 nm, respectively. Both photons have a spectral bandwidth around 2 MHz, matching the bandwidth of Pr(3+) doped quantum memories. This source is ideally suited for long distance quantum communication architectures involving solid state quantum memories.

  19. Double pass in acousto-optic tunable filter for telecommunication network

    Science.gov (United States)

    Issa, Hadeel; Quintard, Véronique; Pérennou, André; Sakkour, Afif

    2014-07-01

    We investigate an acousto-optic tunable filter setup for wavelength division multiplexing telecommunication applications in wideband C (100 nm around 1550 nm). Anisotropic Bragg diffraction of light in TeO2 bulk crystal is first investigated experimentally and theoretically in a quasi-collinear interaction configuration. Based on those characterizations, we propose a double-pass optical beam which allows us to improve the filter performances in terms of crosstalk and selectivity: the full width at half maximum and the sidelobe level are reduced.

  20. Integrating mitosis, toxicity, and transgene expression in a telecommunications packet-switched network model of lipoplex-mediated gene delivery.

    Science.gov (United States)

    Martin, Timothy M; Wysocki, Beata J; Beyersdorf, Jared P; Wysocki, Tadeusz A; Pannier, Angela K

    2014-08-01

    Gene delivery systems transport exogenous genetic information to cells or biological systems with the potential to directly alter endogenous gene expression and behavior with applications in functional genomics, tissue engineering, medical devices, and gene therapy. Nonviral systems offer advantages over viral systems because of their low immunogenicity, inexpensive synthesis, and easy modification but suffer from lower transfection levels. The representation of gene transfer using models offers perspective and interpretation of complex cellular mechanisms,including nonviral gene delivery where exact mechanisms are unknown. Here, we introduce a novel telecommunications model of the nonviral gene delivery process in which the delivery of the gene to a cell is synonymous with delivery of a packet of information to a destination computer within a packet-switched computer network. Such a model uses nodes and layers to simplify the complexity of modeling the transfection process and to overcome several challenges of existing models. These challenges include a limited scope and limited time frame, which often does not incorporate biological effects known to affect transfection. The telecommunication model was constructed in MATLAB to model lipoplex delivery of the gene encoding the green fluorescent protein to HeLa cells. Mitosis and toxicity events were included in the model resulting in simulation outputs of nuclear internalization and transfection efficiency that correlated with experimental data. A priori predictions based on model sensitivity analysis suggest that increasing endosomal escape and decreasing lysosomal degradation, protein degradation, and GFP-induced toxicity can improve transfection efficiency by three-fold. Application of the telecommunications model to nonviral gene delivery offers insight into the development of new gene delivery systems with therapeutically relevant transfection levels.

  1. Mobile location services for the next generation wireless network

    DEFF Research Database (Denmark)

    Schou, Saowanee

    2008-01-01

    in this thesis to resolve the lack of indoor location capability, and a conceptual service architecture for adaptive mobile location services has been developed to facilitate the provision of compelling mobile location services for the future network. The developed service architecture allows the mobile location......Mobile location services exploit mobile location technologies for determining where a mobile user is geographically located. This information can then be used for providing location-specific content to the mobile user. The mobile location services can be used, for example, for finding points...... of interest, getting weather information, and tracking the whereabouts of a child. Mobile location services gained a great deal of interest in 2000, and they were envisioned by the business players in the mobile service market as one of the few service categories where the mobile users would be willing to pay...

  2. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Science.gov (United States)

    2010-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically...

  3. Open Source Telecommunication Companies

    Directory of Open Access Journals (Sweden)

    Peter Liu

    2007-08-01

    Full Text Available Little is known about companies whose core business is selling telecommunications products that lever open source projects. Open source telecommunications (OST companies operate in markets that are very different from typical software product markets. The telecommunications market is regulated, vertically integrated, and proprietary designs and special chips are widely used. For a telecommunications product to be useful, it must interact with both access network products and core network products. Due to specifications in Service Agreements Levels, penalties for failures of telecommunications products are very high. This article shares information that is not widely known, including a list of OST companies and the open source projects on which they depend, the size and diversity of venture capital investment in OST companies, the nature of the commercial product-open source software and company-project relationships, ways in which OST companies make money, benefits and risks of OST companies, and competition between OST companies. Analysis of this information provides insights into the ways in which companies can build business models around open source software. These findings will be of interest to entrepreneurs, top management teams of incumbent companies that sell telecommunications products, and those who care about Ontario's ability to compete globally.

  4. Telecommunications glossary of telecommunications terms

    CERN Document Server

    1997-01-01

    This glossary contains more than 5,000 technical terms and definitions that were standardized by the federal government for use by international and U.S. government telecommunications specialists. It includes international and national terms drawn from the International Telecommunication Union, the International Organization for Standardization, the TIA, ANSI, and others.

  5. FUZZY REQUIREMENT BASED STRATEGY OF QoS SERVICE FOR BROADBAND TELECOMMUNICATION NETWORKS

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A fuzzy requirement based strategy for QoS service in broadband networks was presented. With the analysis of QoS service in ATM networks and broadband IP networks, it gave a requirement-based strategy for QoS service application with Fuzzy language evaluation principles. The requirement parameters are chosen according to the WANT/COST rule, and a fuzzy set is constructed to realize the fuzzy determinant. The simulation results show that it is useful to evaluate the QoS service in broadband networks, and to effectively simplify the access protocols and solve the billing issues in broadband networks.

  6. Distributed Detection of Randomly Located Targets in Mobility-Assisted Sensor Networks with Node Mobility Management

    Directory of Open Access Journals (Sweden)

    Jayaweera SudharmanK

    2010-01-01

    Full Text Available Performance gain achieved by adding mobile nodes to a stationary sensor network for target detection depends on factors such as the number of mobile nodes deployed, mobility patterns, speed and energy constraints of mobile nodes, and the nature of the target locations (deterministic or random. In this paper, we address the problem of distributed detection of a randomly located target by a hybrid sensor network. Specifically, we develop two decision-fusion architectures for detection where in the first one, impact of node mobility is taken into account for decisions updating at the fusion center, while in the second model the impact of node mobility is taken at the node level decision updating. The cost of deploying mobile nodes is analyzed in terms of the minimum fraction of mobile nodes required to achieve the desired performance level within a desired delay constraint. Moreover, we consider managing node mobility under given constraints.

  7. Measures of node centrality in mobile social networks

    Science.gov (United States)

    Gao, Zhenxiang; Shi, Yan; Chen, Shanzhi

    2015-02-01

    Mobile social networks exploit human mobility and consequent device-to-device contact to opportunistically create data paths over time. While links in mobile social networks are time-varied and strongly impacted by human mobility, discovering influential nodes is one of the important issues for efficient information propagation in mobile social networks. Although traditional centrality definitions give metrics to identify the nodes with central positions in static binary networks, they cannot effectively identify the influential nodes for information propagation in mobile social networks. In this paper, we address the problems of discovering the influential nodes in mobile social networks. We first use the temporal evolution graph model which can more accurately capture the topology dynamics of the mobile social network over time. Based on the model, we explore human social relations and mobility patterns to redefine three common centrality metrics: degree centrality, closeness centrality and betweenness centrality. We then employ empirical traces to evaluate the benefits of the proposed centrality metrics, and discuss the predictability of nodes' global centrality ranking by nodes' local centrality ranking. Results demonstrate the efficiency of the proposed centrality metrics.

  8. 云计算环境下基于Mashup的一种电信网络能力服务提供模式%Telecommunications Network Capability Services Model Based on Mashup Technology in Cloud Computing Environment

    Institute of Scientific and Technical Information of China (English)

    刘勇; 乔秀全; 李晓峰

    2012-01-01

    随着高速发展的互联网和移动通信在业务层面的逐渐融合,国内运营商所采用的“封闭花园”模式的业务架构已经面临各种挑战,因此需要更多地考虑如何有效引入互联网业务和服务模式,不断提升用户体验.在电信运营商逐步开放其电信能力API的背景下,基于Mashup的业务构建模式,提出了一种云计算环境下的电信网络能力服务提供模式.该模式将Mashup的理念移植到电信能力上,并将电信能力封装成Web Element的形式呈现给用户,进一步提升了电信网络能力服务的抽象层次.这种电信能力应用模式打破了电信能力拘泥于手持终端的传统形式,提出了一种新的适合于Web2.0环境的电信网络能力服务提供模式.在“OMP(Open Mobile Internet Platform)应用运行和开发引擎算法及功能研发”项目中的试用证明了其可行性.%With the gradual integration of Internet and mobile communications at the service level, the "closed garden" business model used by domestic telecommunications operators has already been facing many challenges. So it's necessary to consider how to enhance the user experience by effectively introducing Internet business and service models. Against the background that operators are gradually opening their telecommunication APIs, based on the Mashup business-constructed models, this paper proposed a telecommunications network capability services model in the cloud computing environment. The model will package telecommunications capabilities in the form of Web element using Mashup technology and provide telecommunications services to users, which can further enhance the abstraction level of telecommunications network capability services. This model breaks the tradition that telecommunications services stick to be set on mobile telephone and it' s a new telecom service model under the background of Web2. 0. The new service model has proved its feasibility in the project of

  9. Voice Service Support in Mobile Ad Hoc Networks

    CERN Document Server

    Jiang, Hai; Poor, H Vincent; Zhuang, Weihua

    2007-01-01

    Mobile ad hoc networks are expected to support voice traffic. The requirement for small delay and jitter of voice traffic poses a significant challenge for medium access control (MAC) in such networks. User mobility makes it more complex due to the associated dynamic path attenuation. In this paper, a MAC scheme for mobile ad hoc networks supporting voice traffic is proposed. With the aid of a low-power probe prior to DATA transmissions, resource reservation is achieved in a distributed manner, thus leading to small delay and jitter. The proposed scheme can automatically adapt to dynamic path attenuation in a mobile environment. Simulation results demonstrate the effectiveness of the proposed scheme.

  10. Security of Mobile Devices and Wi-Fi Networks

    OpenAIRE

    Hong, Zimeng

    2015-01-01

    Along with the progress of times and the development of science and technology, mobile devices have become more and more popular. At the same time, an increasing number of Wi-Fi networks are being built for the demand of mobile devices. Therefore, the security between mobile devices and Wi-Fi networks became a main object in the IT area. The purpose of the thesis is to analyze security threats and give relative advises for all the mobile device and Wi-Fi network users. The thesis mainly ta...

  11. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    DEFF Research Database (Denmark)

    Ngo, Trung Dung

    2012-01-01

    optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm...

  12. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    DEFF Research Database (Denmark)

    Ngo, Trung Dung

    2012-01-01

    A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One...

  13. LTE Adaptation for Mobile Broadband Satellite Networks

    Directory of Open Access Journals (Sweden)

    Bastia Francesco

    2009-01-01

    Full Text Available One of the key factors for the successful deployment of mobile satellite systems in 4G networks is the maximization of the technology commonalities with the terrestrial systems. An effective way of achieving this objective consists in considering the terrestrial radio interface as the baseline for the satellite radio interface. Since the 3GPP Long Term Evolution (LTE standard will be one of the main players in the 4G scenario, along with other emerging technologies, such as mobile WiMAX; this paper analyzes the possible applicability of the 3GPP LTE interface to satellite transmission, presenting several enabling techniques for this adaptation. In particular, we propose the introduction of an inter-TTI interleaving technique that exploits the existing H-ARQ facilities provided by the LTE physical layer, the use of PAPR reduction techniques to increase the resilience of the OFDM waveform to non linear distortion, and the design of the sequences for Random Access, taking into account the requirements deriving from the large round trip times. The outcomes of this analysis show that, with the required proposed enablers, it is possible to reuse the existing terrestrial air interface to transmit over the satellite link.

  14. Detection of mobile user location on next generation wireless networks

    DEFF Research Database (Denmark)

    Schou, Saowanee; Olesen, Henning

    2005-01-01

    of a Mobile IPv6 device can be determined by mapping the geographical location information with the two care-of-addresses and the physical address of the access point where the user is connected. Such a mechanism makes location services for mobile entities available on a global IP network. The end-users can...... look up the current location of other mobile users on a unified IP network by using a ¡§search by identifier¡¨ feature. Furthermore, the entire population of mobile terminals in a specific area is available for search requests.......This paper proposes a novel conceptual mechanism for detecting the location of a mobile user on next generation wireless networks. This mechanism can provide location information of a mobile user at different levels of accuracy, by applying the movement detection mechanism of Mobile IPv6 at both...

  15. Demand Modelling in Telecommunications

    Directory of Open Access Journals (Sweden)

    M. Chvalina

    2009-01-01

    Full Text Available This article analyses the existing possibilities for using Standard Statistical Methods and Artificial Intelligence Methods for a short-term forecast and simulation of demand in the field of telecommunications. The most widespread methods are based on Time Series Analysis. Nowadays, approaches based on Artificial Intelligence Methods, including Neural Networks, are booming. Separate approaches will be used in the study of Demand Modelling in Telecommunications, and the results of these models will be compared with actual guaranteed values. Then we will examine the quality of Neural Network models. 

  16. Telecommunication system engineering

    CERN Document Server

    Freeman, Roger L

    2004-01-01

    From the review of the Third Edition:""A must for anyone in volved in the practical aspects of the telecommunications industry.""-CHOICE* Outlines the expertise essential to the successful operation and design of every type of telecommunications networks in use today* New edition is fully revised and expanded to present authoritative coverage of the important developments that have taken place since the previous edition was published* Includes new chapters on hot topics such as cellular radio, asynchronous transfer mode, broadband technologies, and network management

  17. Modeling Terrain Impact on Mobile Ad Hoc Networks (MANET) Connectivity

    Science.gov (United States)

    2014-05-01

    Modeling Terrain Impact on Mobile Ad Hoc Networks ( MANET ) Connectivity Lance Joneckis Corinne Kramer David Sparrow David Tate I N S T I T U T E F...SUBTITLE Modeling Terrain Impact on Mobile Ad Hoc Networks ( MANET ) Connectivity 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6...1882 ljonecki@ida.org Abstract—Terrain affects connectivity in mobile ad hoc net- works ( MANET ). Both average pairwise link closure and the rate

  18. Avatar Mobility in Networked Virtual Environments: Measurements, Analysis, and Implications

    CERN Document Server

    Liang, Huiguang; Neo, Ming Feng; Ooi, Wei Tsang; Motani, Mehul

    2008-01-01

    We collected mobility traces of 84,208 avatars spanning 22 regions over two months in Second Life, a popular networked virtual environment. We analyzed the traces to characterize the dynamics of the avatars mobility and behavior, both temporally and spatially. We discuss the implications of the our findings to the design of peer-to-peer networked virtual environments, interest management, mobility modeling of avatars, server load balancing and zone partitioning, client-side caching, and prefetching.

  19. Occupational mobility network of the Romanian higher education graduates

    CERN Document Server

    Lungu, Eliza-Olivia; Militaru, Eva; Mocanu, Cristina

    2012-01-01

    Although there is a rich literature on the rate of occupational mobility, there are important gaps in understanding patterns of movement among occupations. We employ a network based approach to explore occupational mobility of the Romanian university graduates in the first years after graduation (2003 - 2008). We use survey data on their career mobility to build an empirical occupational mobility network (OMN) that covers all their job movements in the considered period. We construct the network as directed and weighted. The nodes are represented by the occupations (post coded at 3 digits according to ISCO-88) and the links are weighted with the number of persons switching from one occupation to another. This representation of data permits us to use the novel statistical techniques developed in the framework of weighted directed networks in order to extract a set of stylized facts that highlight patterns of occupational mobility: centrality, network motifs.

  20. Detection of mobile user location on next generation wireless networks

    DEFF Research Database (Denmark)

    Schou, Saowanee; Olesen, Henning

    2005-01-01

    This paper proposes a novel conceptual mechanism for detecting the location of a mobile user on next generation wireless networks. This mechanism can provide location information of a mobile user at different levels of accuracy, by applying the movement detection mechanism of Mobile IPv6 at both...... of a Mobile IPv6 device can be determined by mapping the geographical location information with the two care-of-addresses and the physical address of the access point where the user is connected. Such a mechanism makes location services for mobile entities available on a global IP network. The end-users can...... macro- and micromobility level. In this scheme, an intradomain mobility management protocol (IDMP) is applied to manage the location of the mobile terminal. The mobile terminal needs two care-of addresses, a global care-of address (GCoA) and a local care-of address (LCoA). The current location...

  1. Role of mobile IPv6 for mobile networks and its remaining issues

    Science.gov (United States)

    Ma, Jian; Kan, Zhigang

    2001-10-01

    Mobile IPv6 has received tremendous attention from the cellular telephony industry for use in the next generation networks. This paper starts with recent development of Mobile IPv6 technologies and its standards, and explores remaining issues such as fast handover, smooth handover, mobility managements, AAA, QoS, security and scenarios in its deployment, with particular attention to IPv6.

  2. Anomalous Contagion and Renormalization in Dynamical Networks with Nodal Mobility

    CERN Document Server

    Manrique, Pedro D; Zheng, Minzhang; Xu, Chen; Hui, Pak Ming; Johnson, Neil F

    2015-01-01

    The common real-world feature of individuals migrating through a network -- either in real space or online -- significantly complicates understanding of network processes. Here we show that even though a network may appear static on average, underlying nodal mobility can dramatically distort outbreak profiles. Highly nonlinear dynamical regimes emerge in which increasing mobility either amplifies or suppresses outbreak severity. Predicted profiles mimic recent outbreaks of real-space contagion (social unrest) and online contagion (pro-ISIS support). We show that this nodal mobility can be renormalized in a precise way for a particular class of dynamical networks.

  3. Guest Editorial: Special Issue on Wireless Mobile Computing and Networking

    Institute of Scientific and Technical Information of China (English)

    Yu Wang; Yanwei Wu; Fan Li; Bin Xu; Teresa Dahlberg

    2011-01-01

    Recent convergence of information communications technology and computing is creating new demands and opportunities for ubiquitous computing via wireless and mobile equipments.The demanding networking environment of wireless communications and the fast-growing number of mobile users impose several challenges in terms of channel estimation,network protocol design,resource management,systematic design,application development,and security.The objective of this special issue is to gather recent advances addressing networks,systems,algorithms,and applications that support the symbiosis of mobile computers and wireless networks.

  4. Origin of Mobile Cellular Network Technologies and Markets in Germany and China

    Institute of Scientific and Technical Information of China (English)

    Mingtao Shi

    2009-01-01

    The inventive foundation of mobile cellular technologies was laid about 100 years ago. Wireless voice service was Bundespost in the late 1950s and the first analogue cellular network called C-Netz emerged in the mid-1980s. In China, the first mobile cellular networks called TACS-A and TACS-B were installed by Ministry of Post and Telecommunication in the late 1980s. While describing the events in Germany and China, this paper concentrates on discussing the related technologies and their impacts in the marketplace. A comparison summarises some important findings. Japan and Europe's Nordic countries were the first nations to commercialise the I st generation analogous cellular technologies. There existed A-and B-Network in Germany and China, but the network nature of them is quite different. The market development in Germany and China was similar. The enlarged network capacity accommodated gradually more subscribers and prices related to the cellular services fell continuously. However, China's fee system was more complicated and has adopted the RPP regime, while Germany has been using the CPP billing. The article concludes that implications such as the relationship between science and technology, time lag between scientific discovery and technological applications and technology spillover from military to civilian area are the economic lessons learnt from the story of cellular origin.

  5. Data Transfer Throughput Research Over Mobile Networks

    Directory of Open Access Journals (Sweden)

    Karolis Žvinys

    2013-05-01

    Full Text Available This work analyses communication channel settings of UMTS technology, which are related with a data transfer throughput. The paper describes the measurement equipment that is suitable for measuring parameters of a mobile network channel. Besides, it analyses the suitability of this equipment and issue of parameter values that are associated with data throughput. Further, the study includes the selection of the most specific parameters, which are crucial for data speed. Using these parameters, models were developed for prediction of data transfer throughput. To build the model, the linear and nonlinear forecasting methods were used. The linear prediction was made by using linear regression, nonlinear — neural networks. Using the linear prediction model, 77.83% forecast accuracy was achieved, while the accuracy of forecasted nonlinear transmission rate amounted to 76.19%. The accuracy of prediction models was obtained using eight parameters of the communication channel. Finally, the paper presents the data throughput prediction models that allow predicting data speed with the help of channel parameters presented by a standard terminal. The list of these channel parameters is derived from five UE‘s of different manufacturers. The expected most accurate data transfer rate can be predicted using a set of parameters issued by Nokia device.Article in Lithuanian

  6. Towards More Realistic Mobility Model in Vehicular Ad Hoc Network

    OpenAIRE

    Dhananjay S. Gaikwad; Mahesh Lagad; Prashant Suryawanshi; Vaibhav Maske

    2012-01-01

    Mobility models or the movement patterns of nodes communicating wirelessely, play a vital role in the simulation-based evaluation of vehicular Ad Hoc Networks (VANETs). Even though recent research has developed models that better corresponds to real world mobility, we still have a limited understanding of the level of the required level of mobility details for modeling and simulating VANETs. In this paper, we propose a new mobility model for VANETs that works on the city area and map the topo...

  7. Disruptive Innovations as a Driving Force for the Change of Wireless Telecommunication Infrastructures

    DEFF Research Database (Denmark)

    Kyoseva, Tsvetoslava; Poulkov, Vladimir; Mihaylov, Mihail Rumenov

    2014-01-01

    Innovations are the driving force for fundamental changes and development of future generation telecommunication networks. When considering innovations as drivers for the development of next generation telecommunication networks an important question is whether an innovative emerging technology...... would cause a disruption requiring fundamental change of the infrastructure or will it will only catalyze its evolution. This paper describes the major characteristics of disruptive innovations as a driving force for fundamental changes in existing telecommunications infrastructures. By analyzing...... the current trends in mobile communications, we reason that the emergence of new telecommunication architectures and infrastructures is inevitable. An important consideration in the analysis is the driving role of disruptive technologies for the future of telecommunications. Based on a model for evaluating...

  8. SM-SIP: Seamless Mobility Management for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Khaled Zeraoulia

    2014-08-01

    Full Text Available Next-generation wireless networks (NGN and internet of Thing (IoT become two leaders of designing mobile multimedia services. The deployment of these services using heterogeneous wireless networks will be the important factor that leads to profound change in the way that these services are delivered. Also, how these services will be managed is a real challenge. Consequently, Seamless mobility management should be provided to support various services in heterogeneous networks. A SIP-based network appears as a very attractive alternative to mobile multimedia applications. In this paper, we introduce a novel mobility management strategy for mobile SIP networks, in which we develop a seamless handover used mobile SIP scheme called SM-SIP (Seamless Mobility Management for Heterogeneous Wireless Networks for Mobile SIP environment. SM-SIP can significantly reduce the system signaling cost and handover delay, by proactively processing the address allocation and session updates using link layer information of wireless networks. Also, our performance study shows that SM-SIP reduces efficiently packets loss using an anticipated buffering scheme.

  9. RAC-Multi: Reader Anti-Collision Algorithm for Multichannel Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Kwangcheol Shin

    2009-12-01

    Full Text Available At present, RFID is installed on mobile devices such as mobile phones or PDAs and provides a means to obtain information about objects equipped with an RFID tag over a multi-channeled telecommunication networks. To use mobile RFIDs, reader collision problems should be addressed given that readers are continuously moving. Moreover, in a multichannel environment for mobile RFIDs, interference between adjacent channels should be considered. This work first defines a new concept of a reader collision problem between adjacent channels and then suggests a novel reader anti-collision algorithm for RFID readers that use multiple channels. To avoid interference with adjacent channels, the suggested algorithm separates data channels into odd and even numbered channels and allocates odd-numbered channels first to readers. It also sets an unused channel between the control channel and data channels to ensure that control messages and the signal of the adjacent channel experience no interference. Experimental results show that suggested algorithm shows throughput improvements ranging from 29% to 46% for tag identifications compared to the GENTLE reader anti-collision algorithm for multichannel RFID networks.

  10. Network Size and Connectivity in Mobile and Stationary Ad Hoc Networks

    Science.gov (United States)

    2014-05-01

    mobile ad hoc networks ( MANETs ) is that routes consisting of multiple hops will be available to connect those nodes that lack line-of- sight connectivity...SUPPLEMENTARY NOTES 14. ABSTRACT One of the assumptions behind tactical mobile ad hoc networks ( MANETs ) is that routes consisting of multiple hops will be...Network Size and Connectivity in Mobile and Stationary Ad Hoc Networks Lance Joneckis Corinne Kramer David Sparrow David Tate I N S T I T U T E

  11. Intelligent Middle-Ware Architecture for Mobile Networks

    Science.gov (United States)

    Rayana, Rayene Ben; Bonnin, Jean-Marie

    Recent advances in electronic and automotive industries as well as in wireless telecommunication technologies have drawn a new picture where each vehicle became “fully networked”. Multiple stake-holders (network operators, drivers, car manufacturers, service providers, etc.) will participate in this emerging market, which could grow following various models. To free the market from technical constraints, it is important to return to the basics of the Internet, i.e., providing embarked devices with a fully operational Internet connectivity (IPv6).

  12. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  13. Integrating Mobile Ad Hoc Network to the Internet

    Institute of Scientific and Technical Information of China (English)

    WANG Mao-ning

    2005-01-01

    A novel scheme is presented to integrate mobile ad hoc networks (MANETs) with the Internet and support mobility across wireless local area networks (WLANs) and MANETs. The mobile nodes, connected as a MANET, employ the optimize d link state routing (OLSR) protocol for routing within the MANET. Mobility management across WLANs and MANETs is achieved through the hierarchical mobile IPv6 (HMIPv6) protocol. The performance is evaluated on a HMIPv6 based test-bed composed of WLANs and MANETs. The efficiency gain obtained from using HMIPv6 in such a hybrid network is investigated. The investigation result shows that the use of HMIPv6 can achieve up to 27% gain on reducing the handoff latency when a mobile roams within a domain. Concerning the reduction of the signaling load on the Internet, the use of HMIPv6 can achieve at least a 54% gain and converges to 69%.

  14. Future cooperative communication systems driven by social mobile networks

    DEFF Research Database (Denmark)

    Blázovics, L.; Varga, C.; Bamford, W.

    2011-01-01

    In this work we are underlining the importance of social mobile networks for upcoming cooperative communication systems. The assumption of this work is that future mobile communication systems will incorporate user cooperation, i.e. a combination of cellular access in parallel with ongoing short...... range links to the neighboring devices. It has been shown that user cooperation enables higher data rates, better spectral efficiencies, and reduces the energy consumption of the mobile unit. In this work the social mobile networks are identified to be a fertile ground to facilitate the cooperative use...... cases. By the example of the Gedda-Headz gaming community, possible links between cooperative mobile communication and social mobile networks are shown....

  15. User cooperation, virality and gaming in a social mobile network

    DEFF Research Database (Denmark)

    Varga, C; Blazovics, L; Charaf, H

    2012-01-01

    Social networks and mobile systems are both rapidly developing areas nowadays. In this chapter, we will introduce Gedda-Headz, a novel social mobile gaming concept that brings these two areas together. Gedda-Headz is a social mobile network that mainly focuses on multiplayer mobile gaming. First we......, as virality is very important in social networks, we will describe the viral elements of Gedda-Headz. We will also introduce the Gedda-Headz spreader, a novel method to spread the word about the network, increasing the virality further....... will thoroughly discuss how users may cooperate with each other in Gedda-Headz, as cooperation is very important in a mobile environment. Among other benefits, it may help users to use services that would otherwise be unreachable for them, or greatly decrease the energy cost of certain activities. Finally...

  16. Mobile Carrier Selection In A Post-Conflict Environment – The Primacy Of Ethnicity Over Conventional Network Effects

    Directory of Open Access Journals (Sweden)

    Zaimović Tarik

    2015-12-01

    Full Text Available In this paper we analyze determinants which affect the selection of mobile carriers in a post-conflict environment - Bosnia and Herzegovina. We apply relevant probability modelling to test perceptions of individual respondents on different network effects obtained through a targeted representative survey. Furthermore, we explore whether some non-traditional influences might affect costumers, focusing on the role of demographic characteristics. Our results confirm that conventional network effects have a role in carrier selection, although they are different across carriers. However, we identify that the ethnicity of respondents overwhelms the traditional network effects by having the highest magnitude in the model. Our findings show that the “ethnic affiliation” of mobile carriers, attributed by the users, remains a persistent factor in attracting and keeping telecommunication costumers in Bosnia and Herzegovina.

  17. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  18. The Relationship Between Service Quality and Customer Satisfaction in the Telecommunication Industry: Evidence From Nigeria

    OpenAIRE

    Olu Ojo

    2010-01-01

    This study investigates the relationship between service quality and customer satisfaction in the telecommunication industry with a focus on Mobile Telecommunication Network (MTN) Nigeria. A total of 230 respondents participated in the study. Research questions and objectives were set, alongside the hypotheses that were formulated and tested. Descriptive statistics comprising the simple percentage and tables were used for data presentation and analysis. Regression analysis and Pearson product...

  19. Design of Hybrid Mobile Communication Networks for Planetary Exploration

    Science.gov (United States)

    Alena, Richard L.; Ossenfort, John; Lee, Charles; Walker, Edward; Stone, Thom

    2004-01-01

    The Mobile Exploration System Project (MEX) at NASA Ames Research Center has been conducting studies into hybrid communication networks for future planetary missions. These networks consist of space-based communication assets connected to ground-based Internets and planetary surface-based mobile wireless networks. These hybrid mobile networks have been deployed in rugged field locations in the American desert and the Canadian arctic for support of science and simulation activities on at least six occasions. This work has been conducted over the past five years resulting in evolving architectural complexity, improved component characteristics and better analysis and test methods. A rich set of data and techniques have resulted from the development and field testing of the communication network during field expeditions such as the Haughton Mars Project and NASA Mobile Agents Project.

  20. Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Er. Rakesh Kumar,

    2010-08-01

    Full Text Available hoc networks are self configuring network and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol can accommodate such an environment. Different protocols govern the mobile ad hoc networks and to improve the packet delivery ratio of Destination-Sequenced Distance Vector (DSDV routing protocol in mobile ad hoc networks with high mobility, a message exchange scheme for its invalid route reconstruction is being used. Three protocols AODV, DSDV and I-DSDV were simulated using NS-2 package and were compared in terms of packet delivery ratio, end to end delay routing overhead in different environment; varying number of nodes, speed and pause time. Simulation results show that IDSDVcompared with DSDV, it reduces the number of dropped data packets with little increased overhead at higher rates of node mobility but still compete with AODV in higher node speed and number of node.

  1. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  2. Two-way optical frequency comparisons at 5 ×10-21 relative stability over 100-km telecommunication network fibers

    Science.gov (United States)

    Bercy, Anthony; Stefani, Fabio; Lopez, Olivier; Chardonnet, Christian; Pottie, Paul-Eric; Amy-Klein, Anne

    2014-12-01

    By using two-way frequency transfer, we implement a real-time frequency comparison over a uni-directional telecommunication network of 100 km using a pair of parallel fibers with simultaneous digital data transfer. The relative frequency stability is 10-15 at 1-s integration time and reaches 2 ×10-17 at 40 000 s, three orders of magnitude below the one-way fiber instability. We also demonstrate ultrahigh-resolution comparison of optical frequencies with a bidirectional scheme using a single fiber. We show that the relative stability at 1-s integration time is 7 ×10-18 and scales down to 5 ×10-21 . The same level of performance is reached when an optical link is implemented with an active compensation of the fiber noise. The fractional uncertainty of the frequency comparisons was evaluated for the best case to 2 ×10-20 . These results open the way to accurate and high-resolution frequency comparison of optical clocks over intercontinental fiber networks.

  3. Message Efficient Checkpointing and Rollback Recovery in Heterogeneous Mobile Networks

    Science.gov (United States)

    Jaggi, Parmeet Kaur; Singh, Awadhesh Kumar

    2016-06-01

    Heterogeneous networks provide an appealing way of expanding the computing capability of mobile networks by combining infrastructure-less mobile ad-hoc networks with the infrastructure-based cellular mobile networks. The nodes in such a network range from low-power nodes to macro base stations and thus, vary greatly in their capabilities such as computation power and battery power. The nodes are susceptible to different types of transient and permanent failures and therefore, the algorithms designed for such networks need to be fault-tolerant. The article presents a checkpointing algorithm for the rollback recovery of mobile hosts in a heterogeneous mobile network. Checkpointing is a well established approach to provide fault tolerance in static and cellular mobile distributed systems. However, the use of checkpointing for fault tolerance in a heterogeneous environment remains to be explored. The proposed protocol is based on the results of zigzag paths and zigzag cycles by Netzer-Xu. Considering the heterogeneity prevalent in the network, an uncoordinated checkpointing technique is employed. Yet, useless checkpoints are avoided without causing a high message overhead.

  4. Mobile Ad Hoc Networks Current Status and Future Trends

    CERN Document Server

    Loo, Jonathan

    2011-01-01

    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility o

  5. Subcarrier Wave Quantum Key Distribution in Telecommunication Network with Bitrate 800 kbit/s

    Directory of Open Access Journals (Sweden)

    Gleim A.V.

    2015-01-01

    Full Text Available In the course of work on creating the first quantum communication network in Russia we demonstrated quantum key distribution in metropolitan optical network infrastructure. A single-pass subcarrier wave quantum cryptography scheme was used in the experiments. BB84 protocol with strong reference was chosen for performing key distribution. The registered sifted key rate in an optical cable with 1.5 dB loss was 800 Kbit/s. Signal visibility exceeded 98%, and quantum bit error rate value was 1%. The achieved result is a record for this type of systems.

  6. Subcarrier Wave Quantum Key Distribution in Telecommunication Network with Bitrate 800 kbit/s

    Science.gov (United States)

    Gleim, A. V.; Nazarov, Yu. V.; Egorov, V. I.; Smirnov, S. V.; Bannik, O. I.; Chistyakov, V. V.; Kynev, S. M.; Anisimov, A. A.; Kozlov, S. A.; Vasiliev, V. N.

    2015-09-01

    In the course of work on creating the first quantum communication network in Russia we demonstrated quantum key distribution in metropolitan optical network infrastructure. A single-pass subcarrier wave quantum cryptography scheme was used in the experiments. BB84 protocol with strong reference was chosen for performing key distribution. The registered sifted key rate in an optical cable with 1.5 dB loss was 800 Kbit/s. Signal visibility exceeded 98%, and quantum bit error rate value was 1%. The achieved result is a record for this type of systems.

  7. Flying Ad-Hoc Networks: Routing Protocols, Mobility Models, Issues

    Directory of Open Access Journals (Sweden)

    Muneer Bani Yassein

    2016-06-01

    Full Text Available Flying Ad-Hoc Networks (FANETs is a group of Unmanned Air Vehicles (UAVs which completed their work without human intervention. There are some problems in this kind of networks: the first one is the communication between (UAVs. Various routing protocols introduced classified into three categories, static, proactive, reactive routing protocols in order to solve this problem. The second problem is the network design, which depends on the network mobility, in which is the process of cooperation and collaboration between the UAV. Mobility model of FANET is introduced in order to solve this problem. In Mobility Model, the path and speed variations of the UAV and represents their position are defined. As of today, Random Way Point Model is utilized as manufactured one for Mobility in the greater part of recreation situations. The Arbitrary Way Point model is not relevant for the UAV in light of the fact that UAV do not alter their course and versatility, speed quickly at one time because of this reason, we consider more practical models, called Semi-Random Circular Movement (SRCM Mobility Model. Also, we consider different portability models, Mission Plan-Based (MPB Mobility Model, Pheromone-Based Model. Moreover, Paparazzi Mobility Model (PPRZM. This paper presented and discussed the main routing protocols and main mobility models used to solve the communication, cooperation, and collaboration in FANET networks.

  8. Impact of Mobility On QoS of Mobile WiMax Network With CBR Application

    CERN Document Server

    Bala, Kranti

    2011-01-01

    The issue of mobility is important in wireless network because internet connectivity can only be effective if it's available during the movement of node. To enhance mobility, wireless access systems are designed such as IEEE 802.16e to operate on the move without any disruption of services. In this paper we are analyzing the impact of mobility on the QoS parameters (Throughput, Average Jitter and Average end to end Delay) of a mobile WiMAX network (IEEE 802.16e) with CBR application.

  9. Telecommunication Platforms for Transmitting Sensor Data over Communication Networks-State of the Art and Challenges.

    Science.gov (United States)

    Staniec, Kamil; Habrych, Marcin

    2016-07-19

    The importance of constructing wide-area sensor networks for holistic environmental state evaluation has been demonstrated. A general structure of such a network has been presented with distinction of three segments: local (based on ZigBee, Ethernet and ModBus techniques), core (base on cellular technologies) and the storage/application. The implementation of these techniques requires knowledge of their technical limitations and electromagnetic compatibility issues. The former refer to ZigBee performance degradation in multi-hop transmission, whereas the latter are associated with the common electromagnetic spectrum sharing with other existing technologies or with undesired radiated emissions generated by the radio modules of the sensor network. In many cases, it is also necessary to provide a measurement station with autonomous energy source, such as solar. As stems from measurements of the energetic efficiency of these sources, one should apply them with care and perform detailed power budget since their real performance may turn out to be far from expected. This, in turn, may negatively affect-in particular-the operation of chemical sensors implemented in the network as they often require additional heating.

  10. Virtual Network Connection using Mobile Phones

    Directory of Open Access Journals (Sweden)

    Haripriya. S

    2014-06-01

    Full Text Available Mobile cloud computing provides a solution to meet the increasing functionality demands of end -users, as all application logic is executed on distant servers and only user interface functionalities reside on the mobile device. The mobile device acts as a remote display, capturing user input and rendering the display updates received from the distant server. Varying wireless channel conditions, short battery lifetime and interaction latency introduce major challenges for the remote display of cloud applications on mobile devices. In this paper discussed a number of adequate solutions that have recently been proposed to tackle the main issues associated with the re mote display of cloud services on mobile devices.

  11. Virtual Network Connection using Mobile Phones

    Directory of Open Access Journals (Sweden)

    Haripriya. S

    2015-11-01

    Full Text Available Mobile cloud computing provides a solution to meet the increasing functionality demands of end-users, as all application logic is executed on distant servers and only user interface functionalities reside on the mobile device. The mobile device acts as a remote display, capturing user input and rendering the display updates received from the distant server. Varying wireless channel conditions, short battery lifetime and interaction latency introduce major challenges for the remote display of cloud applications on mobile devices. In this paper discussed a number of adequate solutions that have recently been proposed to tackle the main issues associated with the remote display of cloud services on mobile devices.

  12. BCR Routing for Intermittently Connected Mobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    S. RAMESH

    2014-03-01

    Full Text Available The Wireless and the Mobile Networks appear to provide a wide range of applications. Following these, the Mobile Ad hoc Networks (MANET aid in wide development of many applications. The achievement of the real world applications are attained through effective routing. The Intermittently Connected Mobile Ad hoc Network (ICMANET is a sparse network where a full connectivity is never possible. ICMANET is a disconnected MANET and is also a Delay Tolerant Network (DTN that sustains for higher delays. The routing in a disseminated network is a difficult task. A new routing scheme called Bee Colony Routing (BCR is been proposed with a motto of achieving optimal result in delivering the data packet towards the destined node. BCR is proposed with the basis of Bee Colony Optimization technique (BCO. The routing in ICMNAET is done by means of Bee routing protocol. This paper enchants a novel routing methodology for data transmission in ICMANET.

  13. Analysis towards Mobile IPV4 and Mobile IPV6 in Computer Networks

    Directory of Open Access Journals (Sweden)

    Seyedeh Masoumeh Ahmadi

    2012-04-01

    Full Text Available With the rapid growth in the number of mobile devices like cellular phones, personal digital assistants (PDAs, and laptop computers, the demand for “anywhere, anytime, and any way” high-speed Internet access is becoming a primary concern in our lives. Mobile IP has been designed with the Internet Engineering Task Force (IETF to serve the needs of growing population of mobile computer users who wish to connect to the internet and maintain communication as they move from place to place. Mobile IP enables a wireless network node to move freely from one point of connection to the Internet to another, without disrupting the end-to-end connectivity. The goals of this paper are to define the fundamentals of mobile IPV4, elaborate the problems of mobile IPV4, give a brief overview of some of the literature that deals with the fundamentals of mobile IPV6, explain the problems of mobile IPV6, compare Mobile IPv6 and Mobile IPv4, discuss the advantages of mobile IP, and review the application of mobile IP for vehicular networks.

  14. The incentive regulation in the network management. A cross-sectorial investigation of the network managements energy, telecommunication and railway; Die Anreizregulierung in den Netzwirtschaften. Eine sektoruebergreifende Untersuchung der Netzwirtschaften Energie, Telekommunikation und Eisenbahn

    Energy Technology Data Exchange (ETDEWEB)

    Berndt, Andrea

    2011-07-01

    The author of the book under consideration reports on a cross-sectoral analysis of network management of energy, telecommunications and railways with regard to incentive regulation. The cross-sectoral analysis of incentive regulation requires a systematization of the instrument of payment regulation. Using the example of the incentive regulation, the author provides a rather jurisprudential contribution to a network management dogma.

  15. A Simple Dual Decomposition Method for Resource Allocation in Telecommunication Networks

    Directory of Open Access Journals (Sweden)

    Konnov Igor

    2016-01-01

    Full Text Available We consider a problem of optimal resource allocation in a wireless communication network divided into zones (clusters. The network manager aims to distribute some homogeneous resource (bandwidth among users of several zones in order to maximize the total network profit, which takes into account payments from users and implementation costs. As a result, we obtain a convex optimization problem involving capacity and balance constraints. By using the dual Lagrangian method with respect to the capacity constraint, we reduce the initial problem to a suitable one-dimensional problem, so that calculation of its cost function value leads to independent solution of zonal problems, treated as two-side auction models with one trader. We show that solution of each zonal problem can be found exactly by a simple arrangement type algorithm even in the case where the trader price is not fixed. Besides, we suggest ways to adjust the basic problem to the case of moving nodes. Some results of computational experiments confirm the applicability of the new method.

  16. Looking for Sustainable Urban Mobility through Bayesian Networks

    Directory of Open Access Journals (Sweden)

    Giovanni Fusco

    2004-11-01

    Full Text Available There is no formalised theory of sustainable urban mobility systems. Observed patterns of urban mobility are often considered unsustainable. But we don’t know what a city with sustainable mobility should look like. It is nevertheless increasingly apparent that the urban mobility system plays an important role in the achievement of the city’s wider sustainability objectives.In this paper we explore the characteristics of sustainable urban mobility systems through the technique of Bayesian networks. At the frontier between multivariate statistics and artificial intelligence, Bayesian networks provide powerful models of causal knowledge in an uncertain context. Using data on urban structure, transportation offer, mobility demand, resource consumption and environmental externalities from seventy-five world cities, we developed a systemic model of the city-transportation-environment interaction in the form of a Bayesian network. The network could then be used to infer the features of the city with sustainable mobility.The Bayesian model indicates that the city with sustainable mobility is most probably a dense city with highly efficient transit and multimodal mobility. It produces high levels of accessibility without relying on a fast road network. The achievement of sustainability objectives for urban mobility is probably compatible with all socioeconomic contexts.By measuring the distance of world cities from the inferred sustainability profile, we finally derive a geography of sustainability for mobility systems. The cities closest to the sustainability profile are in Central Europe as well as in affluent countries of the Far East. Car-dependent American cities are the farthest from the desired sustainability profile.

  17. Performance Comparisons of Routing Protocols in Mobile Ad Hoc Networks

    CERN Document Server

    Manickam, P; Girija, M; Manimegalai, Dr D; 10.5121/ijwmn.2011.3109

    2011-01-01

    Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes that dynamically form a network temporarily without any support of central administration. Moreover, Every node in MANET moves arbitrarily making the multi-hop network topology to change randomly at unpredictable times. There are several familiar routing protocols like DSDV, AODV, DSR, etc...which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols DSDV, AODV and DSR based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.

  18. Flying Ad-Hoc Networks: Routing Protocols, Mobility Models, Issues

    OpenAIRE

    Muneer Bani Yassein; “Nour Alhuda” Damer

    2016-01-01

    Flying Ad-Hoc Networks (FANETs) is a group of Unmanned Air Vehicles (UAVs) which completed their work without human intervention. There are some problems in this kind of networks: the first one is the communication between (UAVs). Various routing protocols introduced classified into three categories, static, proactive, reactive routing protocols in order to solve this problem. The second problem is the network design, which depends on the network mobility, in which is the process of cooperati...

  19. Mutual Interference Models for CDMA Mobile Communication Networks

    OpenAIRE

    Hrudkay, K.; Wieser, V.

    2002-01-01

    Nowadays we are witnesses of a huge development one of the most progressive communication technology - mobile networks. The main problem in these networks is an elimination of the mutual interference, which, mainly in non-orthogonal CDMA networks, is the principal obstacle for reaching high transmission rates The aim of this contribution is to give simplified view to mutual interference models for orthogonal and non-orthogonal CDMA networks. The contribution is intended mainly for PhD. studen...

  20. Mobile Robot Navigation using Fuzzy Logic and Wavelet Network

    Directory of Open Access Journals (Sweden)

    Mustafa I. Hamzah

    2014-05-01

    Full Text Available This paper presents the proposed autonomous mobile robot navigation scheme.  The navigation of mobile robot in unknown environment with obstacle avoidance is based on using fuzzy logic and wavelet network. Several cases are designed and modeled in Simulink and MATLAB. Simulation results show good performance for the proposed scheme.

  1. Globalization and International Student Mobility: A Network Analysis

    Science.gov (United States)

    Shields, Robin

    2013-01-01

    This article analyzes changes to the network of international student mobility in higher education over a 10-year period (1999-2008). International student flows have increased rapidly, exceeding 3 million in 2009, and extensive data on mobility provide unique insight into global educational processes. The analysis is informed by three theoretical…

  2. Networked Mobilities and new sites of mediated interaction

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    2008-01-01

    as the relationship to sites and places. Furthermore, an increasing number of such mobile practices are mediated by technologies of tangible and less tangible sorts. The paper concludes with a research agenda for unfolding a ‘politics of visibility', engaging with the ambivalences of networked mobilities and mediated...

  3. Measuring sustainable accessibility potential using the mobility infrastructure's network configuration

    NARCIS (Netherlands)

    Gil, J.; Read, S.

    2012-01-01

    This paper is an exploration into the analysis of public transport networks using space syntax approaches combined with concepts of sustainable accessibility. Present urban development policy aims to achieve sustainable mobility patterns, shifting mobility to soft transportation modes such as walkin

  4. Globalization and International Student Mobility: A Network Analysis

    Science.gov (United States)

    Shields, Robin

    2013-01-01

    This article analyzes changes to the network of international student mobility in higher education over a 10-year period (1999-2008). International student flows have increased rapidly, exceeding 3 million in 2009, and extensive data on mobility provide unique insight into global educational processes. The analysis is informed by three theoretical…

  5. Coordinating face-to-face meetings in mobile network societies

    DEFF Research Database (Denmark)

    Larsen, Jonas; Urry, John; Axhausen, Kay

    2008-01-01

    This exploratory article describes and develops theoretical notions of how coordination takes place within mobile network societies, that is, societies where travel, ties at-a-distance, email and mobile communications are widespread. The article brings together studies of travel, communications...

  6. Real-time medical applications and telecommunications.

    Science.gov (United States)

    Stravs, M

    1999-01-01

    Telecommunications play an important role in telemedicine. Many forms of telecommunication services based on different telecommunication technologies are developed for various needs. The paper deals with complex real-time applications which demand high telecommunication requirements. At the beginning, medical applications are categorised and real-time applications qualified as multimedia applications. Requirements for multimedia elements are listed separately. Later on, short introduction of related telecommunication protocols is given. Real-time medical applications can show their ability in case of guaranteed quality of services delivered by telecommunication network as it is explained in the end.

  7. Network Access Control for Location-Based Mobile Services in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dae-Young Kim

    2017-01-01

    Full Text Available Recent advances in information communication technology and software have enabled mobile terminals to employ various capabilities as a smartphone. They adopt multiple interfaces for wireless communication and run as a portable computer. Mobile services are also transferred from voice to data. Mobile terminals can access Internet for data services anytime anywhere. By using location-based information, improved mobile services are enabled in heterogeneous networks. In the mobile service environment, it is required that mobile terminals should efficiently use wireless network resources. In addition, because video stream becomes a major service among the data services of mobile terminals in heterogeneous networks, the necessity of the efficient network access control for heterogeneous wireless networks is raised as an important topic. That is, quality of services of the location-based video stream is determined by the network access control. Therefore, this paper proposes a novel network access control in the heterogeneous wireless networks. The proposed method estimates the network status with Naïve Bayesian Classifier and performs network access control according to the estimated network status. Thus, it improves data transmission efficiency to satisfy the quality of services. The efficiency of the proposed method is validated through the extensive computer simulation.

  8. Mobility-aware Hybrid Synchronization for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2015-01-01

    Random mobility of node causes the frequent changes in the network dynamics causing the increased cost in terms of energy and bandwidth. It needs the additional efforts to synchronize the activities of nodes during data collection and transmission in Wireless Sensor Networks (WSNs). A key challenge...... in maintaining the effective data collection and transmission is to schedule and synchronize the activities of the nodes with the global clock. This paper proposes the Mobility-aware Hybrid Synchronization Algorithm (MHS) which works on the formation of cluster based on spanning tree mechanism (SPT). Nodes used...... for formation of the network have random mobility and heterogeneous in terms of energy with static sink. The nodes in the cluster and cluster heads in the network are synchronized with the notion of global time scale. In the initial stage, the algorithm establishes the hierarchical structure of the network...

  9. Simulator for Energy Efficient Clustering in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Amit Kumar

    2012-05-01

    Full Text Available The research on various issues in Mobile ad hoc networks is getting popular because of its challenging nature and all time connectivity to communicate. Network simulators provide the platform to analyse and imitate the working of the nodes in the networks along with the traffic and other entities. The current work proposes the design of a simulator for the mobile ad hoc networks that provides a test bed for the energy efficient clustering in the dynamic network. Node parameters like degree of connectivity and average transmission power are considered for calculating the energy consumption of the mobile devices. Nodes that consume minimum energy among their 1-hop neighbours are selected as the cluster heads.

  10. Advances in Mobile Data Communications

    Institute of Scientific and Technical Information of China (English)

    Sean Cai; Li Mo

    2011-01-01

    This special issue of ZTE Communications focuses on recent advances in mobile data communications for the ICT and telecommunications industries. The ever-increasing amount of mobile data traffic has beenthe subject of many studies. This research area is widely applicable to contemporary technology and network optimization techniques.

  11. Energy efficiency in hybrid mobile and wireless networks

    Energy Technology Data Exchange (ETDEWEB)

    Ziaul Haq Abbas

    2012-07-01

    Wireless Internet access is almost pervasive nowadays, and many types of wireless networks can be used to access the Internet. However, along with this growth, there is an even greater concern about the energy consumption and efficiency of mobile devices as well as of the supporting networks, triggering the appearance of the concept of green communication. While some efforts have been made towards this direction, challenges still exist and need to be tackled from diverse perspectives. Cellular networks, WLANs, and ad hoc networks in the form of wireless mesh networks are the most popular technologies for wireless Internet access. The availability of such a variety of access networks has also paved the way to explore synergistic approaches for Internet access, leading to the concept of hybrid networks and relay communications. In addition, many mobile devices are being equipped with multiple interfaces, enabling them to operate in hybrid networks. In contrast, the improvements in the battery technology itself have not matched the pace of the emerging mobile applications. The situation becomes more sophisticated when a mobile device functions also as a relay node to forward other station's data. In the literature, energy efficiency of mobile devices has been addressed from various perspectives such as protocol-level efforts, battery management efforts, etc. However, there is little work on energy efficiency in hybrid mobile and wireless networks and devices with heterogeneous connections. For example, when there are multiple networks available to a mobile device, how to achieve optimum long-term energy consumption of such a device is an open question. Furthermore, in today's cellular networks, micro-, pico-, and femto-cells are the most popular network topologies in order to support high data rate services and high user density. With the growth of such small-cell solutions, the energy consumption of these networks is also becoming an important concern for operators

  12. WISER: realistic and scalable wireless mobile IP network emulator

    Science.gov (United States)

    Kaplan, M. A.; Cichocki, A.; Demers, S.; Fecko, M. A.; Hokelek, I.; Samtani, S.; Unger, J. W.; Uyar, M. U.; Greear, B.

    2009-05-01

    WISER is a scalable network emulation tool for networks with several hundred heterogeneous wireless nodes. It provides high-fidelity network modeling, exchanges packets in real-time, and faithfully captures the complex interactions among network entities. WISER runs on inexpensive COTS platforms and represents multiple full network stacks, one for each individual virtual node. It supports a flexible open source router platform (XORP) to implement routing protocol stacks. WISER offers wireless MAC emulation capabilities for different types of links, waveforms, radio devices, etc. We present experiments to demonstrate WISER's capabilities enabling a new paradigm for performance evaluation of mobile sensor and ad-hoc networks.

  13. Optimization and Performance Analysis of High Speed Mobile Access Networks

    CERN Document Server

    Weerawardane, Thushara

    2012-01-01

    The design and development of cost-effective mobile broadband wireless access networks is a key challenge for many mobile network operators. The over-dimensioning or under-dimensioning of an access network results in both additional costs and customer dissatisfaction.   Thushara Weerawardane introduces new transport technologies and features for High Speed Packet Access (HSPA) and Long-Term Evolution (LTE) networks. Using advanced scientific methods, he proposes new adaptive flow control and enhanced congestion control algorithms, then defends them with highly-developed analytical models derived from Markov chains. For faster analysis, compared to long-lasting detailed simulations, these models provide optimum network performance and ensure reliable quality standards for end users during transport network congestion. Further, the author investigates and analyzes LTE transport network performance by introducing novel traffic differentiation models and buffer management techniques during intra-LTE handovers.

  14. Efficient use of available network in mobile for executing mobile application with real time constraints.

    Directory of Open Access Journals (Sweden)

    A.D.Saraf

    2013-06-01

    Full Text Available In today’s world mobile fulfill most of computational needs of average persons in form of different applications. As smart phones works in multiprocessing mode, no of applications gets executedsimultaneously executed in mobile device. Though mobile configurations are improving in (battery, processing speed it still needs additional computing speed to run apps with real time constraints. Thus to fulfill computational needs of real time mobile applications such as augmented reality , some part of execution can be shared with cloud having no of cloud service provider such as Amazon Cloud, Windows Azure. Mobiles can also use machines and other mobile devices such as laptops, smart phones with higher configurations of ram and processor, tablets etc for transferring execution load of applications running on mobile using different wireless connections such as wifi network or blue tooth network. Mobile must able to utilize all available networks in an efficient way to provide best solution in running augmented reality application. In this paper we are providing modified design of Adhoc networks for providing better computation efficiency as well as terms of services in augmented reality application.

  15. About Network Telecom

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    NETWORK TELECOM magazine is the network & telecommunications industry's leading publication in China, specializing in the field of optic fiber communications, access network, mobile communications, CATV network,cabling system and data communications; and has established its reputation by a combination of authoritative editorial content, targeting a circulation of high quality covering the entire China region.

  16. About Network Telecom

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    NETWORK TELECOM magazine is the network & telecommunications industry's leading publication in China. specializing in the field of optic fiber communications, access network, mobile communications. CATV network,cabling system and data communications;and has established its reputation by a combination of authoritative editorial content, targeting a circulation of high quality covering the entire China region.

  17. TWO-LEVEL HIERARCHICAL COORDINATION QUEUING METHOD FOR TELECOMMUNICATION NETWORK NODES

    Directory of Open Access Journals (Sweden)

    M. V. Semenyaka

    2014-07-01

    Full Text Available The paper presents hierarchical coordination queuing method. Within the proposed method a queuing problem has been reduced to optimization problem solving that was presented as two-level hierarchical structure. The required distribution of flows and bandwidth allocation was calculated at the first level independently for each macro-queue; at the second level solutions obtained on lower level for each queue were coordinated in order to prevent probable network link overload. The method of goal coordination has been determined for multilevel structure managing, which makes it possible to define the order for consideration of queue cooperation restrictions and calculation tasks distribution between levels of hierarchy. Decisions coordination was performed by the method of Lagrange multipliers. The study of method convergence has been carried out by analytical modeling.

  18. The effect of demographic variables on the user’s behavior in the Mobile Telecommunication Market of Albania

    Directory of Open Access Journals (Sweden)

    Nikollaq Terezi

    2016-03-01

    Full Text Available This paper analyzes the mobile operator users living in Tirana, urban area and its outskirts. The level of confidence for sampling is 95%, (p <0.05. The used methodology is implemented through interviews with experts (the employee of mobile operators, as well as, observation of the service process in general and face to face interview according to a properly designed questionnaire. The evaluation methods for approving the hypothesis are based on linear regression and ÷2 tests. This paper aims to find a significant correlation between the duration of contractual agreement and the occupation of the mobile service users. There is significant dependence between groups of age and the variables like Web-page of the operator, signal coverage and the price of 3Gservice

  19. Introspection-based periodicity awareness model for intermittently connected mobile networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Hans; Havinga, Paul

    2013-01-01

    Recently, context awareness in Intermittently Connected Mobile Networks (ICMNs) has gained popularity in order to discover social similarities among mobile entities. Nevertheless, most of the contextual methods depend on network knowledge obtained with unrealistic scenarios. Mobile entities should h

  20. Cloud Computing in Mobile Communication Networks

    Institute of Scientific and Technical Information of China (English)

    Xinzhi Ouyang

    2011-01-01

    Cloud computing makes computing power universally available and provides flexibility in resource acquisition. It allows for scalable provision of services and more reasonable use of resources. This article considers cloud service deployment and virtualization from the perspective of mobile operators. A solution is proposed that allows mobile operators to maximize profits with minimal investment,

  1. A Timed Calculus for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mengying Wang

    2012-12-01

    Full Text Available We develop a timed calculus for Mobile Ad Hoc Networks embodying the peculiarities of local broadcast, node mobility and communication interference. We present a Reduction Semantics and a Labelled Transition Semantics and prove the equivalence between them. We then apply our calculus to model and study some MAC-layer protocols with special emphasis on node mobility and communication interference. A main purpose of the semantics is to describe the various forms of interference while nodes change their locations in the network. Such interference only occurs when a node is simultaneously reached by more than one ongoing transmission over the same channel.

  2. Mobile sensor networks for inspection tasks in harsh industrial environments.

    Science.gov (United States)

    Mulder, Jacob; Wang, Xinyu; Ferwerda, Franke; Cao, Ming

    2010-01-01

    Recent advances in sensor technology have enabled the fast development of mobile sensor networks operating in various unknown and sometimes hazardous environments. In this paper, we introduce one integrative approach to design, analyze and test distributed control algorithms to coordinate a network of autonomous mobile sensors by utilizing both simulation tools and a robotic testbed. The research has been carried out in the context of the mobile sensing project, PicoSmart, in the northern provinces of the Netherlands for the inspection of natural gas pipelines.

  3. A CDMA Spotbeam Architecture for the Next Generation Satellite System (NGSS) for the Aeronautical Telecommunications Network (ATN)

    Science.gov (United States)

    Raghavan, Rajesh S.; Shamma, Mohammed A.

    2003-01-01

    This paper will present work being done to model and simulate a CDMA based Mobile Satellite System architecture for providing all or part of the future Air Traffic Management (ATM) services. Such a system, will help in relieving the dependence on ground based networks, if not eliminate it. Additionally such an architecture can be used in parallel or as a supplementary service along with ground based links to help alleviate any capacity bottlenecks, or in areas where such services are difficult to make available such as in oceanic, remote areas outside the jet highways, or in developing countries where ground services are less available.

  4. A Novel Cache Invalidation Scheme for Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In this paper, we propose a strategy of maintaining cache consistency in wireless mobile environments, which adds a validation server (VS) into the GPRS network, utilizes the location information of mobile terminal in SGSN located at GPRS backbone, just sends invalidation information to mobile terminal which is online in accordance with the cached data, and reduces the information amount in asynchronous transmission. This strategy enables mobile terminal to access cached data with very little computing amount, little delay and arbitrary disconnection intervals, and excels the synchronous IR and asynchronous state (AS) in the total performances.

  5. Verifiable Rational Secret Sharing Scheme in Mobile Networks

    Directory of Open Access Journals (Sweden)

    En Zhang

    2015-01-01

    Full Text Available With the development of mobile network, lots of people now have access to mobile phones and the mobile networks give users ubiquitous connectivity. However, smart phones and tablets are poor in computational resources such as memory size, processor speed, and disk capacity. So far, all existing rational secret sharing schemes cannot be suitable for mobile networks. In this paper, we propose a verifiable rational secret sharing scheme in mobile networks. The scheme provides a noninteractively verifiable proof for the correctness of participants’ share and handshake protocol is not necessary; there is no need for certificate generation, propagation, and storage in the scheme, which is more suitable for devices with limited size and processing power; in the scheme, every participant uses her encryption on number of each round as the secret share and the dealer does not have to distribute any secret share; every participant cannot gain more by deviating the protocol, so rational participant has an incentive to abide by the protocol; finally, every participant can obtain the secret fairly (means that either everyone receives the secret, or else no one does in mobile networks. The scheme is coalition-resilient and the security of our scheme relies on a computational assumption.

  6. Performance Analysis of Solar Photovoltaic Cells for Telecommunication Cellular Network in Remote Areas of Pakistan

    Directory of Open Access Journals (Sweden)

    Abdul Ghayur

    2016-10-01

    Full Text Available In this research design and implementation of solar photo voltaic cell is done for base transceiver system (BTS of telecom cellular networks in remote areas of Pakistan, to accomplish this task investigation is done regarding the present alternate power source of base transceiver system (BTS that is the generator sets used as a stand-by, prime and t-prime source. This research will examine that generator sets fuel consumption and maintenance cost is considerably high and the cellular company has to pay a lot to keep a site on air and to overcome the connectivity issues.To resolve these issues this research is aimed to implement solar technology on BTS, for this purpose exploration is done regarding BTS rectifier system and suggested to use power on distribution systems 16 (PODS 16, latest technology evolution (LTE based instead of the simple BTS rectifier, this new rectifier is intelligent and has redundant ways to overcome power issues as it has the capability to work directly on solar panel equipments and it requires DC supply. Other important factor is that solar panel recharge batteries for power backup and to keep the site on air during night time. Different cost comparison of solar and generator sets have been done by taking real data of different remote areas sites and in the end it is concluded that solar is the alternate costless, environmental friendly source of energy for BTS and can be implemented both for off-grid and on-grid systems.

  7. Optimising TCP for cloud-based mobile networks

    DEFF Research Database (Denmark)

    Artuso, Matteo; Christiansen, Henrik Lehrmann

    2016-01-01

    protocols should therefore be adjusted to cope with the peculiarities of these networks. In this paper, we investigate an optimized design of the Transmission Control Protocol (TCP), as it plays a central role in all-IP mobile networks to ensure optimal performances for application-layer services. TCP...

  8. Lossless Multicast Handovers in Proxy Fast Mobile IPv6 Networks

    NARCIS (Netherlands)

    Meijerink, Bernd; Heijenk, G.J.

    2015-01-01

    There is a demand in the Public Protection and Disaster Relief (PPDR) community for high bandwidth services on mobile devices. Group communication is an important aspect of PPDR networks. In IP based networks multicast is the preferred method to efficiently transmit data to more than one receiver si

  9. Mobile Sensor Networks for Inspection Tasks in Harsh Industrial Environments

    NARCIS (Netherlands)

    Mulder, Jacob; Wang, Xinyu; Ferwerda, Franke; Cao, Ming

    2010-01-01

    Recent advances in sensor technology have enabled the fast development of mobile sensor networks operating in various unknown and sometimes hazardous environments. In this paper, we introduce one integrative approach to design, analyze and test distributed control algorithms to coordinate a network

  10. 4G and Beyond - Exploiting Heterogeneity in Mobile Networks

    DEFF Research Database (Denmark)

    Zakrzewska, Anna

    Current and future mobile networks will constitute of multiple coexisting Radio Access Technologies (RATs), cells of different size (macro-, metro-, pico-, femtocells) forming a Heterogeneous Network (HetNet), and Base Stations (BSs) of various architectures. This thesis addresses different aspec...

  11. The Future of Mobile TV: When Mobile TV Meets the Internet and Social Networking

    Science.gov (United States)

    Montpetit, Marie-José; Klym, Natalie; Blain, Emmanuel

    First-generation mobile TV has involved delivering content to cell phones. But as mobile TV evolves, it will find greater significance as part of a multifaceted video offering that combines multiple screens, devices, networks, and content types. Content, or a particular viewing session, moves with the user, across devices and across networks. Furthermore, in addition to providing an alternate screen, a mobile device may provide complementary functions like programming TiVo remotely, streaming video from the cell phone to the TV set, or creating video content for distribution on the Web and uploading it directly over wireless networks. In the new TV ecosystem, all end-user devices collaborate across the whole video value chain, from content creation to distribution to consumption. Finally, as mobile devices become integral components of the new video ecosystem, their personal nature will drive the development of social TV, defined as a new way of delivering TV based on users sharing all aspects of the experience within the context of social networks. This chapter presents our view of mobile social TV: a shared TV experience that uses the power of the Internet and social networks to "move" from screen to screen and network to network to unite family and friends.

  12. Combining Diffusion Models and Macroeconomic Indicators with a Modified Genetic Programming Method: Implementation in Forecasting the Number of Mobile Telecommunications Subscribers in OECD Countries

    Directory of Open Access Journals (Sweden)

    Konstantinos Salpasaranis

    2014-01-01

    Full Text Available This paper proposes a modified Genetic Programming method for forecasting the mobile telecommunications subscribers’ population. The method constitutes an expansion of the hybrid Genetic Programming (hGP method improved by the introduction of diffusion models for technological forecasting purposes in the initial population, such as the Logistic, Gompertz, and Bass, as well as the Bi-Logistic and LogInLog. In addition, the aforementioned functions and models expand the function set of hGP. The application of the method in combination with macroeconomic indicators such as Gross Domestic Product per Capita (GDPpC and Consumer Prices Index (CPI leads to the creation of forecasting models and scenarios for medium- and long-term level of predictability. The forecasting module of the program has also been improved with the multi-levelled use of the statistical indices as fitness functions and model selection indices. The implementation of the modified-hGP in the datasets of mobile subscribers in the Organisation for Economic Cooperation and Development (OECD countries shows very satisfactory forecasting performance.

  13. ANALYSIS OF ROUTING IN MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Shweta

    2012-09-01

    Full Text Available An ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any standalone infrastructure or centralized administration. Routing in Ad hoc networks is a challenging problem because nodes are mobile and links are continuously being created and broken.In this model we not only improves the reputation of the network but also provide a routing approach for reliable data transmission and also avoid the loop occurs in the communication. The mobile network is the dynamicnetwork that provides the solution for the inclusion and exclusion of dynamic nodes in the network. AODV and DSR are the two most popular routing protocols for ad-hoc network that we discussed here. In this paper we describe the way to find the node having packet loss and to perform the elimination of node from the network withoutperforming the rerouting and provide the reliable data transfer over the network. In this paper, we design and evaluate cooperative caching techniques to efficiently support data access in the ad-hoc network.

  14. Telecommunications Primer

    Directory of Open Access Journals (Sweden)

    Joseph Becker

    2013-05-01

    Full Text Available A description of modern telecommunications devices which can be useful in inter-library communications, including their capacities, types of signals and carriers. Described are telephone lines, radio broadcasting, coaxial cable, microwave and communications satellites. This article, and the one following, were presented as tutorials by the author's to participants at the American Library Association's Atlantic City Convention on June 25, 1969.

  15. A secure network access system for mobile IPv6

    Science.gov (United States)

    Zhang, Hong; Yuan, Man; He, Rui; Jiang, Luliang; Ma, Jian; Qian, Hualin

    2004-03-01

    With the fast development of Internet and wireless and mobile communication technology, the Mobile Internet Age is upcoming. For those providing Mobile Internet services, especially from the view of ISP (Internet Service Provider), current mobile IP protocol is insufficient. Since the Mobile IPv6 protocol will be popular in near future, how to provide a secure mobile IPv6 service is important. A secure mobile IPv6 network access system is highly needed for mobile IPv6 deployment. Current methods and systems are still inadequate, including EAP, PANA, 802.1X, RADIUS, Diameter, etc. In this paper, we describe main security goals for a secure mobile IPv6 access system, and propose a secure network access system to achieve them. This access system consists of access router, attendant and authentication servers. The access procedure is divided into three phases, which are initial phase, authentication and registration phase and termination phase. This system has many advantages, including layer two independent, flexible and extensible, no need to modify current IPv6 address autoconfiguration protocols, binding update optimization, etc. Finally, the security of the protocol in this system is analyzed and proved with Extended BAN logic method, and a brief introduction of system implementation is given.

  16. Space Mobile Network: A Near Earth Communication and Navigation Architecture

    Science.gov (United States)

    Israel, Dave J.; Heckler, Greg; Menrad, Robert J.

    2016-01-01

    This paper describes a Space Mobile Network architecture, the result of a recently completed NASA study exploring architectural concepts to produce a vision for the future Near Earth communications and navigation systems. The Space Mobile Network (SMN) incorporates technologies, such as Disruption Tolerant Networking (DTN) and optical communications, and new operations concepts, such as User Initiated Services, to provide user services analogous to a terrestrial smartphone user. The paper will describe the SMN Architecture, envisioned future operations concepts, opportunities for industry and international collaboration and interoperability, and technology development areas and goals.

  17. A Minimum Cost Handover Algorithm for Mobile Satellite Networks

    Institute of Scientific and Technical Information of China (English)

    Zhang Tao; Zhang Jun

    2008-01-01

    For mobile satellite networks,an appropriate handover scheme should be devised to shorten handover delay with optimized application of network resources.By introducing the handover cost model of service,this article proposes a rerouting triggering scheme for path optimization after handover and a new minimum cost handover algorithm for mobile satellite networks.This algorithm ensures the quality of service (QoS) parameters,such as delay,during the handover and minimizes the handover costs.Simulation indicates that this algorithm is superior to other current algorithms in guaranteeing the QoS and decreasing handover costs.

  18. A Survey of Clustering Approaches for Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Mihir Mehta

    2014-02-01

    Full Text Available In MANET, Clustering is the most significant research area now days. Clustering offers several advantages like it improves stability of network, enhances routing in network, efficient resource allocation among mobile nodes in network and hierarchical routing structure. This survey paper analyzes number of clustering approaches which are widely used for partitioning mobile nodes into different virtual groups. Each clustering algorithm considers different parameters for selection of Cluster Head in Cluster. Cluster Head election is invoked on demand and it is aimed to decrease the computation and communication cost in MANET. Each approach has its own pros and cons.

  19. Telecommunication Services Engineering- Definitions, Architectures and Tools

    OpenAIRE

    Znaty, Simon; Hubaux, Jean-Pierre

    1999-01-01

    This paper introduces telecommunication services engineering through a definition of services, of network architectures that run services, and of methods, techniques and tools used to develop services. We emphasize the Intelligent Network (IN), the Telecommunication Management Network (TMN) and TINA architectures

  20. Perceptions of mobile network operators regarding the cost drivers of the South African mobile phone industry

    Directory of Open Access Journals (Sweden)

    Musenga F. Mpwanya

    2016-03-01

    Full Text Available Purpose: This study seeks to understand the perceptions of mobile network operators (MNOs regarding the cost drivers of the South African mobile phone industry from a supply chain (SC perspective. It also seeks to explore the possible cost interrelationships in the South African mobile phone SC.Research design and methodology: A qualitative case study, involving six willing managers of MNOs, and by using semi-structured interviews, observation and documents, was conducted.Findings: This study suggests that network infrastructure and network maintenance, handsets, logistics, technology, marketing and sales, training and consulting are the cost drivers in the South African mobile phone SC. These cost drivers are interrelated; and they influence one another in the mobile phone SC.Implications: The findings of this study should assist MNOs in their monitoring of cost drivers and in the identification of cost reduction opportunities, in order to remain effective and efficient in the industry. This study’s findings should help regulating authorities (such as the Department of Communications and the Independent Communication Authority of South Africa [ICASA] to gain insights into the cost drivers of the South African mobile phone industry from the perspective of a network operator, and thus to develop appropriate mobile phone policies.

  1. Improving Network Performance with Affinity based Mobility Model in Opportunistic Network

    CERN Document Server

    Batabyal, Suvadip; 10.5121/ijwmn.2012.4213

    2012-01-01

    Opportunistic network is a type of Delay Tolerant Network which is characterized by intermittent connectivity amongst the nodes and communication largely depends upon the mobility of the participating nodes. The network being highly dynamic, traditional MANET protocols cannot be applied and the nodes must adhere to store-carry-forward mechanism. Nodes do not have the information about the network topology, number of participating nodes and the location of the destination node. Hence, message transfer reliability largely depends upon the mobility pattern of the nodes. In this paper we have tried to find the impact of RWP (Random Waypoint) mobility on packet delivery ratio. We estimate mobility factors like number of node encounters, contact duration(link time) and inter-contact time which in turn depends upon parameters like playfield area (total network area), number of nodes, node velocity, bit-rate and RF range of the nodes. We also propose a restricted form of RWP mobility model, called the affinity based ...

  2. Achieving a Seamless Mobility in the 3G and WLAN Networks Integration when the WLAN AP is Tightly Coupled to the SGSN of the 3G Network

    Directory of Open Access Journals (Sweden)

    George Chukwudi Nganya

    2016-01-01

    Full Text Available The increase in demand for real-time applications such as video and audio streams data transfer has resulted in the need to find a means of managing the increasing numbers of users in the mobile wireless system without affecting the quality of service (QoS requirements. In their work, A. K. Salkintzis, C. Fors, and R. Pazhyannur, stated that one of the approaches to meeting the high user demands is to interwork two different but complementary networks, the Universal Mobile Telecommunication Systems (UMTS which has a high mobility but low-data rate circuit-switched and packet-switched services, and the Wireless Local Area Network (WLAN which has a high-data rate circuit-switched service but limited mobility coverage confined to a smaller area called the hot-spot [1]. The idea is to interwork the two networks such that seamless mobility could be achieved. In this paper, the tight coupling of the WLAN at the SGSN of the UMTS for the possibility of achieving a seamless mobility is examined. The performance of this integration approach is evaluated using this QoS parameters, namely buffer overflow, Ethernet delay, throughput and Ethernet load. A simulation of this integration approach using an OPNET Modeler 14.0 is performed and the simulation results analyzed. We performed a simulation of the WLAN AP tightly coupled to the SGSN node of the UMTS network. Also performed in this research are simulations of different scenarios of the tight coupling approach at the SGSN by varying the number of users in the integrated UMTS and WLAN network to show the effect the number of users connected to both networks has towards achieving seamless mobility in the interworked network. From our study review and the simulation results of this interworking approach, we propose that coupling the WLAN AP and the UMTS network at the SGSN of the UMTS, and using a suitable mobility protocol, has the possibility of providing a seamless mobility between these complementary

  3. Analyzing Reactive Routing Protocols in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dr. Kamaljit I. Lakhtaria

    2012-05-01

    Full Text Available Mobile Ad Hoc Network (MANET is an autonomous mobile nodes forming network in an infrastructure less environment and has dynamic topology. MANET reactive protocols always not have low control overhead. The control overhead for reactive protocols is more sensitive to the traffic load, in terms of the number of traffic rows, and mobility, in terms of link connectivity change rates, than other protocols. Therefore, reactive protocols may only be suitable for MANETs with small number of traffic loads and small link connectivity change rates. It is already proved that, it is more feasible to maintain full network topology in a MANET with low control overhead. In this Research Paper through simulations that were carried out by using Network Simulator-2 (NS-2 we had analyze Reactive/ On-demand protocols such as Ad Hoc On-Demand Distance Vector Routing (AODV, Temporally-Ordered Routing Algorithm (TORA, and Dynamic Source Routing (DSR,

  4. Ad Hoc Mobile Wireless Networks Routing Protocols - A Review

    Directory of Open Access Journals (Sweden)

    Geetha Jayakumar

    2007-01-01

    Full Text Available Mobile ad hoc networks(MANET represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary ad-hoc network topologies, allowing people and devices to seamlessly internet work in areas with no preexisting communication infrastructure e.g., disaster recovery environments. An ad-hoc network is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad-hoc paradigm. Recently the introduction of new technologies such as Bluetooth, IEEE 802.11 and hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent revolutions have been generating a renewed and growing interest in the research and development of MANET. To facilitate communication within the network a routing protocol is used to discover routes between nodes. The goal of the routing protocol is to have an efficient route establishment between a pair of nodes, so that messages can be delivered in a timely manner. Bandwidth and power constraints are the important factors to be considered in current wireless network because multi-hop ad-hoc wireless relies on each node in the network to act as a router and packet forwarder. This dependency places bandwidth, power computation demands on mobile host to be taken into account while choosing the protocol. Routing protocols used in wired network cannot be used for mobile ad-hoc networks because of node mobility. The ad-hoc routing protocols are divided into two classes: table driven and demand based. This paper reviews and discusses routing protocol belonging to each category.

  5. Location based Network Optimizations for Mobile Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen

    selection in Wi-Fi networks and predictive handover optimization in heterogeneous wireless networks. The investigations in this work have indicated that location based network optimizations are beneficial compared to typical link measurement based approaches. Especially the knowledge of geographical...

  6. Supersampling and network reconstruction of urban mobility

    CERN Document Server

    Sagarra, Oleguer; Santi, Paolo; Diaz-Guilera, Albert; Ratti, Carlo

    2015-01-01

    Understanding human mobility is of vital importance for urban planning, epidemiology, and many other fields that aim to draw policies from the activities of humans in space. Despite recent availability of large scale data sets related to human mobility such as GPS traces, mobile phone data, etc., it is still true that such data sets represent a subsample of the population of interest, and then might give an incomplete picture of the entire population in question. Notwithstanding the abundant usage of such inherently limited data sets, the impact of sampling biases on mobility patterns is unclear -- we do not have methods available to reliably infer mobility information from a limited data set. Here, we investigate the effects of sampling using a data set of millions of taxi movements in New York City. On the one hand, we show that mobility patterns are highly stable once an appropriate simple rescaling is applied to the data, implying negligible loss of information due to subsampling over long time scales. On...

  7. Realistic Mobility Modeling for Vehicular Ad Hoc Networks

    Science.gov (United States)

    Akay, Hilal; Tugcu, Tuna

    2009-08-01

    Simulations used for evaluating the performance of routing protocols for Vehicular Ad Hoc Networks (VANET) are mostly based on random mobility and fail to consider individual behaviors of the vehicles. Unrealistic assumptions about mobility produce misleading results about the behavior of routing protocols in real deployments. In this paper, a realistic mobility modeling tool, Mobility for Vehicles (MOVE), which considers the basic mobility behaviors of vehicles, is proposed for a more accurate evaluation. The proposed model is tested against the Random Waypoint (RWP) model using AODV and OLSR protocols. The results show that the mobility model significantly affects the number of nodes within the transmission range of a node, the volume of control traffic, and the number of collisions. It is shown that number of intersections, grid size, and node density are important parameters when dealing with VANET performance.

  8. ITMAN: An Inter Tactical Mobile Ad Hoc Network Routing Protocol

    OpenAIRE

    Grandhomme, Florian; Guette, Gilles; Ksentini, Adlen; Plesse, Thierry

    2016-01-01

    International audience; New generation radio equipment, used by soldiers and vehicles on the battlefield, constitute ad hoc networks and specifically, Mobile Ad hoc NETworks (MANET). The battlefield where these equipment are deployed includes a majority of coalition communication. Each group on the battleground may communicate with other members of the coalition and establish inter-MANETs links. Operational communications tend to provide tactical ad hoc networks some capacities. There is a be...

  9. Nation-Wide Mobile Network Energy Evolution Analysis

    DEFF Research Database (Denmark)

    Perez, Eva; Frank, Philipp; Micallef, Gilbert

    2013-01-01

    Mobile network operators are facing a challenging dilemma. While on the one hand they are committed to reducing their carbon emissions, and energy consumption, they are also required to continuously upgrade existing networks, ensuring that the relentless growth in data traffic can still be suppor...... is expected to evolve from 2012 until 2020. The study also considers an efficient network capacity evolution path, including base station equipment improvement forecasts....

  10. Scalable Overlay Multicasting in Mobile Ad Hoc Networks (SOM

    Directory of Open Access Journals (Sweden)

    Pariza Kamboj

    2010-10-01

    Full Text Available Many crucial applications of MANETs like the battlefield, conference and disaster recovery defines the needs for group communications either one-to-many or many-to-many form. Multicast plays an important role in bandwidth scarce multihop mobile ad hoc networks comprise of limited battery power mobile nodes. Multicast protocols in MANETs generate many controls overhead for maintenance of multicast routingstructures due to frequent changes of network topology. Bigger multicast tables for the maintenance of network structures resultsin inefficient consumption of bandwidth of wireless links andbattery power of anemic mobile nodes, which in turn, pose thescalability problems as the network size is scaled up. However,many MANET applications demands scalability from time to time. Multicasting for MANETs, therefore, needs to reduce the state maintenance. As a remedy to these shortcomings, this paper roposes an overlay multicast protocol on application layer. In the proposed protocol titled “Scalable Overlay Multicasting in Mobile Ad Hoc Networks (SOM” the network nodes construct overlay hierarchical framework to reduce the protocols states and constrain their distribution within limited scope. Based on zone around each node, it constructs a virtual structure at application layer mapped with the physical topology at network layer, thus formed two levels of hierarchy. The concept of two level hierarchies reduces the protocol state maintenance and hence supports the vertical scalability. Protocol depends on the location information obtained using a distributed location service, which effectively reduces the overhead for route searching and updating the source based multicast tree.

  11. A NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    DR. N. SATYANARAYANA

    2010-12-01

    Full Text Available Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad Hoc Flooding Attack (AHFA, can result in denial of service when used against on-demand routing protocols for mobile ad hoc networks, such as AODV, DSR. The intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication cannot be kept. After analyzed Ad Hoc Flooding Attack, we develop Flooding Attack Prevention (FAP, a generic defense against the Ad Hoc Flooding Attack in mobile ad hoc networks. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad Hoc Flooding attack efficiently.

  12. Who's calling? Social networks and mobile phone use among motorcyclists.

    Science.gov (United States)

    De Gruyter, Chris; Truong, Long T; Nguyen, Hang T T

    2017-06-01

    Mobile phone use while riding a motorcycle poses a key safety risk, particularly among younger people who have been found to be more susceptible to distracted driving. While previous research has examined the influence of social networks on mobile phone use while driving a car, no research has explored this association in the context of motorcycle use. Using a survey of university students in Vietnam, this research explores the association between social networks and mobile phone use among motorcyclists and the links this has to reported crashes/falls. Results show that the majority of students are most likely to use a mobile phone to communicate with a friend while riding, either through talking (56.5%) or text messaging (62.0%). However, respondents who frequently talk to a girlfriend/boyfriend or spouse while riding were more likely to experience a crash/fall than those who frequently talk with others while riding (e.g. parent, brother/sister). In addition, those who frequently text message a friend while riding were more likely to experience a crash/fall than those who frequently text message others while riding. The results highlight a clear association between social networks and mobile phone use while riding a motorcycle. Developing a culture of societal norms, where mobile phone use while riding a motorcycle is considered socially unacceptable, will help to reduce the prevalence and ultimate crash risk associated with mobile phone use while riding. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. MOBILE ENTITIES IN WIRELESS SENSOR NETWORKS: THEORY AND PERFORMANCE ANALYSIS

    Directory of Open Access Journals (Sweden)

    Regis W. Anne

    2013-03-01

    Full Text Available Wireless Sensor Network (WSN is a collection of intelligent sensors that can communicate to form a self-organizing network and can function without human intervention for a long amount of time. Traditionally, WSN was static, but due to the necessity of today’s applications, there has been a paradigm shift from a static WSN to dynamic WSN. This dynamism can be realized by adding mobility to static WSN. Mobility can be added by introducing extra elements called Mobile Entities (MEs like Mobile Sinks (MSs, Mobile Cluster Heads (MCHs, Mobile Relays (MRs and Mobile Sensor Nodes (MSNs. Adding MEs to WSN has attracted much research interests because it can significantly improve the capability and functionality of the WSN by making it flexible to failures, ease data collection, increase energy efficiency, enhance connectivity, improve coverage and prolong network lifetime, so the full potential of MEs can be harnessed to yield maximum benefits in static WSN. The goal of this paper is to present a comparative study and performance analysis of few of the possible MEs in literature and based on the results and analysis the best ME can be chosen for the desired application.

  14. Modeling the propagation of mobile phone virus under complex network.

    Science.gov (United States)

    Yang, Wei; Wei, Xi-liang; Guo, Hao; An, Gang; Guo, Lei; Yao, Yu

    2014-01-01

    Mobile phone virus is a rogue program written to propagate from one phone to another, which can take control of a mobile device by exploiting its vulnerabilities. In this paper the propagation model of mobile phone virus is tackled to understand how particular factors can affect its propagation and design effective containment strategies to suppress mobile phone virus. Two different propagation models of mobile phone viruses under the complex network are proposed in this paper. One is intended to describe the propagation of user-tricking virus, and the other is to describe the propagation of the vulnerability-exploiting virus. Based on the traditional epidemic models, the characteristics of mobile phone viruses and the network topology structure are incorporated into our models. A detailed analysis is conducted to analyze the propagation models. Through analysis, the stable infection-free equilibrium point and the stability condition are derived. Finally, considering the network topology, the numerical and simulation experiments are carried out. Results indicate that both models are correct and suitable for describing the spread of two different mobile phone viruses, respectively.

  15. Two and a half years of country-wide rainfall maps using radio links from commercial cellular telecommunication networks

    Science.gov (United States)

    Overeem, A.; Leijnse, H.; Uijlenhoet, R.

    2016-10-01

    Although rainfall estimation employing microwave links from cellular telecommunication networks is recognized as a new promising measurement technique, its potential for long-term large-scale operational rainfall monitoring remains to be demonstrated. This study contributes to this endeavor by deriving a continuous series of rainfall maps from a large 2.5 year microwave link data set of, on average, 3383 links (2044 link paths) covering Netherlands (˜3.5 × 104 km2), a midlatitude country (˜5°E, ˜52°N) with a temperate climate. Maps are extensively verified against an independent gauge-adjusted radar rainfall data set for different temporal (15 min, 1 h, 1 day, 1 month) and spatial (0.9, 74 km2) scales. The usefulness of different steps in the rainfall retrieval algorithm, i.e., a wet-dry classification method and a filter to remove outliers, is systematically assessed. A novel dew filter is developed to correct for dew-induced wet antenna attenuation, which, although a relative underestimation of 6% to 9% is found, generally yields good results. The microwave link rainfall estimation technique performs well for the summer months (June, July, August), even outperforming interpolation of automatic rain gauge data (with a density of ˜1 gauge per 1000 km2), but large deviations are found for the winter months (December, January, February). These deviations are generally expected to be related to frozen or melting precipitation. Hence, our results show the potential of commercial microwave links for long-term large-scale operational rainfall monitoring.

  16. A MOBILE AGENT BASED INTRUSION DETECTION SYSTEM ARCHITECTURE FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Binod Kumar Pattanayak

    2014-01-01

    Full Text Available Applications of Mobile Ad Hoc Networks (MANETs have become extensively popular over the years among the researchers. However, the dynamic nature of MANETs imposes a set of challenges to its efficient implementation in practice. One of such challenges represents intrusion detection and prevention procedures that are intended to provide secured performance of ad hoc applications. In this study, we introduce a mobile agent based intrusion detection and prevention architecture for a clustered MANET. Here, a mobile agent resides in each cluster of the ad hoc network and each cluster runs a specific application at any point of time. This application specific approach makes the network more robust to external intrusions directed at the nodes in an ad hoc network.

  17. Power and Mobility-Aware Adaptive Dynamic Source Routing in Mobile Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XULi; ZHENGBaoyu; YANGZhen

    2005-01-01

    MANET (Mobile ad hoc network) is characterized by a highly dynamic network topology. This makes routing discovery and maintenance challenging for routing protocol design. On the other hand, energy efficient routing may be another important design criterion for MANET since most of nodes are usually powered by battery with limited capacity. With optimization of DSR (Dynamic source routing) protocol, this paper proposes Power and mobility-aware adaptive dynamic source routing (PMADSR). The new routing protocol can be aware of the mobility and remaining battery capacity of nodes. Performance simulation results show that the proposed PMADSR protocol can dynamically balance the traffic load inside the whole network, so as to prolong the network lifetime, as well as achieve higher throughput.

  18. Study on Supporting Technology in Mobile Environment%移动环境下支持技术的研究

    Institute of Scientific and Technical Information of China (English)

    吴婷婷; 周兴铭

    2001-01-01

    With the rapid development of wireless telecommunications network and mobile devices ,mo-bile computing environment becomes more and more mature. Following the trend, mobile supporting technology is also becoming the hot research topic. Mobile supporting technology is the technology thatsupports people access information and do task through the network from any place. Compared with traditional distributed environment, the property of mobile environment--mobile device and resourcepoor,challenges mobile supporting technology.

  19. Future vision of advanced telecommunication networks for electric utilities; Denki jigyo ni okeru joho tsushin network no shorai vision

    Energy Technology Data Exchange (ETDEWEB)

    Tonaru, S.; Ono, K.; Sakai, S.; Kawai, Y.; Tsuboi, A. [Central Research Institute of Electric Power Industry, Tokyo (Japan); Manabe, S. [Shikoku Electric Power Co., Inc., Kagawa (Japan); Miki, Y. [Kansai Electric Power Co. Inc., Osaka (Japan)

    1995-06-01

    The vision of an advanced information system is proposed to cope with the future social demand and business environmental change in electric utilities. At the large turning point such as drastic reconsideration of Electricity Utilities Industry Law, further improvement of efficiency and cost reduction are requested as well as business innovation such as proposal of a new business policy. For that purpose utilization of information and its technology is indispensable, and use of multimedia and common information in organization are the future direction for improving information basis. Consequently, free information networks without any limitation due to person and media are necessary, and the following are important: high-speed, high-frequency band, digital, easily connectable and multimedia transmission lines, and cost reduction and high reliability of networks. Based on innovation of information networks and the clear principle on advanced information system, development of new applications by multimedia technologies, diffusion of communication terminals, and promotion of standardization are essential. 60 refs., 30 figs., 5 tabs.

  20. Intelligent Mobility Management Model for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Sanjeev Prakash

    2015-12-01

    Full Text Available Growing consumer demands for access of communication services in a ubiquitous environment is a driving force behind the development of new technologies. The rapid development in communication technology permits the end users to access heterogeneous wireless networks to utilize the swerve range of data rate service “anywhere any time”. These forces to technology developers to integrate different wireless access technologies which is known as fourth generation (4G. It is become possible to reduce the size of mobile nodes (MNs with manifold network interfaces and development in IP-based applications. 4G mobile/wireless computing and communication heterogeneous environment consist of various access technologies that differ in bandwidth, network conditions, service type, latency and cost. A major challenge of the 4G wireless network is seamless vertical handoff across the heterogeneous wireless access network as the users are roaming in the heterogeneous wireless network environment. Today communication devices are portable and equipped with manifold interfaces and are capable to roam seamlessly among the various access technology networks for maintaining the network connectivity, since no single-interface technology provides ubiquitous coverage and quality-of-service (QoS. This paper reports a mobile agent based heterogeneous wireless network management system. In this system agent’s decision focuses on multi parameter system (MPS. This system works on the parameters- network delay, received signal strength, network latency and study of the collected information about adjoining network cells viz., accessible channel. System is simulated and a comparative study is also made. From results it is observed that system improves the performance of wireless network.

  1. Applying Web Services with Mobile Agents for Computer Network Management

    Directory of Open Access Journals (Sweden)

    Mydhili K.Nair

    2011-03-01

    Full Text Available The exponential rise in complexity of the underlying network elements of a computer network makes itsManagement an intricate, multifaceted and complex problem to solve. With every passing decade, newtechnologies are developed to ease this problem of Network Management. The last decade of the premillenniumera saw the peak of CORBA and Mobile Agent Based implementations, while the first decadeof post millennium saw the emergence of Web Services. All of these technologies evolved as independent,self-contained implementation streams. There is a genuine dearth in finding authentic research outcomeswhere quantifiable, measureable benefits of convergence of these technologies applied to NetworkManagement are put forth. This paper aims to fill this research gap. Here we put forth the experimentalresults obtained of a framework we developed in-house for Network Management that combined twoseemingly divergent distributed computing technologies, namely, Web Services and Mobile Agents.

  2. Exploiting Temporal Complex Network Metrics in Mobile Malware Containment

    CERN Document Server

    Tang, John; Musolesi, Mirco; Latora, Vito

    2010-01-01

    Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed models from epidemiology and complex networks to analyse the spread of malware and the effect of patching specific nodes. These approaches have adopted a static view of the mobile networks, i.e., by aggregating all the edges that appear over time, which leads to an approximate representation of the real interactions: instead, these networks are inherently dynamic and the edge appearance and disappearance is highly influenced by the ordering of the human contacts, something which is not captured at all by existing complex network measures. In this paper we first study how the blocking of malware propagation through immunisation of key nodes (even if carefully chosen through static or temporal betweenness centrality metrics) is ineffective: this is due to the richness of alternative paths in these networks. Then we introduce a time-awa...

  3. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  4. SDN-Based Data Offloading for 5G Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    Mojdeh Amani; Toktam Mahmoodi; Mallikarjun Tatipamula; Hamid Aghvami

    2014-01-01

    The rapid growth of 3G/4G enabled devices such as smartphones and tablets in large numbers has created increased demand for mobile data services. Wi-Fi offloading helps satisfy the requirements of data-rich applications and terminals with improved multi-media. Wi-Fi is an essential approach to alleviating mobile data traffic load on a cellular network because it provides extra capaci-ty and improves overall performance. In this paper, we propose an integrated LTE/Wi-Fi architecture with software-defined net-working (SDN) abstraction in mobile backhaul and enhanced components that facilitate the move towards next-generation 5G mo-bile networks. Our proposed architecture enables programmable offloading policies that take into account real-time network condi-tions as well as the status of devices and applications. This mechanism improves overall network performance by deriving real-time policies and steering traffic between cellular and Wi-Fi networks more efficiently.

  5. Security Challenges and Attacks in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    CH.V. Raghavendran

    2013-09-01

    Full Text Available Mobile Ad hoc Network (MANET is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are not designed to defense against security challenges. In this paper we discuss about current challenges in an ad hoc environment which includes the different types of potential attacks that are possible in the Mobile Ad hoc Networks that can harm its working and operation. We have done literature study and gathered information relating to various types of attacks. In our study, we have found that there is no general algorithm that suits well against the most commonly known attacks. But the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET. To develop suitable security solutions for such environments, we must first understand how MANETs can be attacked. This paper provides a comprehensive study of attacks against mobile ad hoc networks. We present a detailed classification of the attacks against MANETs.

  6. Radiofrequency Exposure Amongst Employees of Mobile Network Operators and Broadcasters.

    Science.gov (United States)

    Litchfield, Ian; van Tongeren, Martie; Sorahan, Tom

    2016-10-13

    Little is known about personal exposure to radiofrequency (RF) fields amongst employees in the telecommunications industry responsible for installing and maintaining transmitters. IARC classified RF exposure as a possible carcinogen, although evidence from occupational studies was judged to be inadequate. Hence, there is a need for improved evidence of any potentially adverse health effects amongst the workforce occupationally exposed to RF radiation. In this study, results are presented from an exposure survey using data from personal monitors used by employees in the broadcasting and telecommunication industries of the UK. These data were supplemented by spot measurements using broadband survey metres and information on daily work activities provided by employee questionnaires. The sets of real-time personal data were categorised by four types of site determined by the highest powered antenna present (high, medium or low power and ground-level sites). For measurements gathered at each type of site, the root mean square and a series of box plots were produced. Results from the daily activities diaries suggested that riggers working for radio and television broadcasters were exposed to much longer periods as compared to colleagues working for mobile operators. Combining the results from the measurements and daily activity diaries clearly demonstrate that exposures were highest for riggers working for broadcasting sites. This study demonstrates that it is feasible to carry out exposure surveys within these populations that will provide reliable estimates of exposure that can be used for epidemiological studies of occupational groups exposed to RF fields.

  7. Exploiting node mobility for energy optimization in wireless sensor networks

    Science.gov (United States)

    El-Moukaddem, Fatme Mohammad

    Wireless Sensor Networks (WSNs) have become increasingly available for data-intensive applications such as micro-climate monitoring, precision agriculture, and audio/video surveillance. A key challenge faced by data-intensive WSNs is to transmit the sheer amount of data generated within an application's lifetime to the base station despite the fact that sensor nodes have limited power supplies such as batteries or small solar panels. The availability of numerous low-cost robotic units (e.g. Robomote and Khepera) has made it possible to construct sensor networks consisting of mobile sensor nodes. It has been shown that the controlled mobility offered by mobile sensors can be exploited to improve the energy efficiency of a network. In this thesis, we propose schemes that use mobile sensor nodes to reduce the energy consumption of data-intensive WSNs. Our approaches differ from previous work in two main aspects. First, our approaches do not require complex motion planning of mobile nodes, and hence can be implemented on a number of low-cost mobile sensor platforms. Second, we integrate the energy consumption due to both mobility and wireless communications into a holistic optimization framework. We consider three problems arising from the limited energy in the sensor nodes. In the first problem, the network consists of mostly static nodes and contains only a few mobile nodes. In the second and third problems, we assume essentially that all nodes in the WSN are mobile. We first study a new problem called max-data mobile relay configuration (MMRC ) that finds the positions of a set of mobile sensors, referred to as relays, that maximize the total amount of data gathered by the network during its lifetime. We show that the MMRC problem is surprisingly complex even for a trivial network topology due to the joint consideration of the energy consumption of both wireless communication and mechanical locomotion. We present optimal MMRC algorithms and practical distributed

  8. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks

    OpenAIRE

    Liu, Jinshan; Issarny, Valérie

    2004-01-01

    International audience; Interactions between entities unknown to each other are inevitable in the ambient intelligence vision of service access anytime, anywhere. Trust management through a reputation mechanism to facilitate such interactions is recognized as a vital part of mobile ad hoc networks, which features lack of infrastructure, autonomy, mobility and resource scarcity of composing light-weight terminals. However, the design of a reputation mechanism is faced by challenges of how to e...

  9. Mobility-Aware User Association in Uplink Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-07-20

    This letter studies the mobility aware user-to-BS association policies, within a stochastic geometry framework, in two tier uplink cellular networks with fractional channel inversion power control. Particularly, we model the base stations’ locations using the widely accepted poisson point process and obtain the coverage probability and handover cost expressions for the coupled and decoupled uplink and downlink associations. To this end, we compute the average throughput for the mobile users and study the merits and demerits of each association strategy.

  10. EXTENDED MONTE CARLO LOCALIZATION ALGORITHM FOR MOBILE SENSOR NETWORKS

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    A real-world localization system for wireless sensor networks that adapts for mobility and irregular radio propagation model is considered.The traditional range-based techniques and recent range-free localization schemes are not welt competent for localization in mobile sensor networks,while the probabilistic approach of Bayesian filtering with particle-based density representations provides a comprehensive solution to such localization problem.Monte Carlo localization is a Bayesian filtering method that approximates the mobile node’S location by a set of weighted particles.In this paper,an enhanced Monte Carlo localization algorithm-Extended Monte Carlo Localization (Ext-MCL) is suitable for the practical wireless network environment where the radio propagation model is irregular.Simulation results show the proposal gets better localization accuracy and higher localizable node number than previously proposed Monte Carlo localization schemes not only for ideal radio model,but also for irregular one.

  11. Dual adaptive dynamic control of mobile robots using neural networks.

    Science.gov (United States)

    Bugeja, Marvin K; Fabri, Simon G; Camilleri, Liberato

    2009-02-01

    This paper proposes two novel dual adaptive neural control schemes for the dynamic control of nonholonomic mobile robots. The two schemes are developed in discrete time, and the robot's nonlinear dynamic functions are assumed to be unknown. Gaussian radial basis function and sigmoidal multilayer perceptron neural networks are used for function approximation. In each scheme, the unknown network parameters are estimated stochastically in real time, and no preliminary offline neural network training is used. In contrast to other adaptive techniques hitherto proposed in the literature on mobile robots, the dual control laws presented in this paper do not rely on the heuristic certainty equivalence property but account for the uncertainty in the estimates. This results in a major improvement in tracking performance, despite the plant uncertainty and unmodeled dynamics. Monte Carlo simulation and statistical hypothesis testing are used to illustrate the effectiveness of the two proposed stochastic controllers as applied to the trajectory-tracking problem of a differentially driven wheeled mobile robot.

  12. Probabilistic Models and Process Calculi for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Song, Lei

    Due to the wide use of communicating mobile devices, mobile ad hoc networks (MANETs) have gained in popularity in recent years. In order that the devices communicate properly, many protocols have been proposed working at different levels. Devices in an MANET are not stationary but may keep moving......, thus the network topology may undergo constant changes. Moreover the devices in an MANET are loosely connected not depending on pre-installed infrastructure or central control components, they exchange messages via wireless connections which are less reliable compared to wired connections. Therefore...... issues in MANETs e.g. mobility and unreliable connections. Specially speaking, 1. We first propose a discrete probabilistic process calculus with which we can model in an MANET that the wireless connection is not reliable, and the network topology may undergo changes. We equip each wireless connection...

  13. Intelligent Data Rate Control in Cognitive Mobile Heterogeneous Networks

    Science.gov (United States)

    Mar, Jeich; Nien, Hsiao-Chen; Cheng, Jen-Chia

    An adaptive rate controller (ARC) based on an adaptive neural fuzzy inference system (ANFIS) is designed to autonomously adjust the data rate of a mobile heterogeneous network to adapt to the changing traffic load and the user speed for multimedia call services. The effect of user speed on the handoff rate is considered. Through simulations, it has been demonstrated that the ANFIS-ARC is able to maintain new call blocking probability and handoff failure probability of the mobile heterogeneous network below a prescribed low level over different user speeds and new call origination rates while optimizing the average throughput. It has also been shown that the mobile cognitive wireless network with the proposed CS-ANFIS-ARC protocol can support more traffic load than neural fuzzy call-admission and rate controller (NFCRC) protocol.

  14. Data Dissemination in Mobile Phone Sensor Networks

    NARCIS (Netherlands)

    Unknown, [Unknown; Le, Viet Duc; Le Viet Duc, L Duc

    Deploying sensors over large areas is costly in terms of configuration, hardware, and maintenance. Using onboard sensors of today mobile phones can significantly reduce the expenses in monitoring areas and disseminating events or data. Via the available short-range Bluetooth and/or WiFi interfaces,

  15. Data Dissemination in Mobile Phone Sensor Networks

    NARCIS (Netherlands)

    Le, Viet-Duc; Le, Viet-Duc

    2012-01-01

    Deploying sensors over large areas is costly in terms of configuration, hardware, and maintenance. Using onboard sensors of today mobile phones can significantly reduce the expenses in monitoring areas and disseminating events or data. Via the available short-range Bluetooth and/or WiFi interfaces,

  16. Mobile sensor networks for environmental monitoring

    NARCIS (Netherlands)

    Ballari, D.E.

    2012-01-01

    Vulnerability to natural disasters and the human pressure on natural resources have increased the need for environmental monitoring. Proper decisions, based on real-time information gathered from the environment, are critical to protecting human lives and natural resources. To this end, mobile senso

  17. Mobile sensor networks for environmental monitoring

    NARCIS (Netherlands)

    Ballari, D.E.

    2012-01-01

    Vulnerability to natural disasters and the human pressure on natural resources have increased the need for environmental monitoring. Proper decisions, based on real-time information gathered from the environment, are critical to protecting human lives and natural resources. To this end, mobile

  18. Mobility and power in networked European space

    DEFF Research Database (Denmark)

    Richardson, Tim; Jensen, Ole B.

    This paper seeks to contribute to debates about how urban, social and critical theory can conceptualise the socio-technologies of connection, resilience, mobility, and collapse in contemporary urban space. The paper offers a theoretical frame for conceptualising this New Urban Condition, focusing...

  19. Mobility and power in networked European space

    DEFF Research Database (Denmark)

    Richardson, Tim; Jensen, Ole B.

    This paper seeks to contribute to debates about how urban, social and critical theory can conceptualise the socio-technologies of connection, resilience, mobility, and collapse in contemporary urban space. The paper offers a theoretical frame for conceptualising this New Urban Condition, focusing...

  20. Application of neural networks to channel assignment for cellular CDMA networks with multiple services and mobile base stations

    Science.gov (United States)

    Hortos, William S.

    1996-03-01

    The use of artificial neural networks to the channel assignment problem for cellular code- division multiple access (CDMA) telecommunications systems is considered. CDMA takes advantage of voice activity and spatial isolation because its capacity is only interference limited, unlike time-division multiple access (TDMA) and frequency-division multiple access (FDMA) where capacities are bandwidth limited. Any reduction in interference in CDMA translates linearly into increased capacity. FDMA and TDMA use a frequency reuse pattern as a method to increase capacity, while CDMA reuses the same frequency for all cells and gains a reuse efficiency by means of orthogonal codes. The latter method can improve system capacity by factors of four to six over digital TDMA or FDMA. Cellular carriers are planning to provide multiple communication services using CDMA in the next generation cellular system infrastructure. The approach of this study is the use of neural network methods for automatic and local network control, based on traffic behavior in specific cell cites and demand history. The goal is to address certain problems associated with the management of mobile and personal communication services in a cellular radio communications environment. In planning a cellular radio network, the operator assigns channels to the radio cells so that the probability of the processed carrier-to-interference ratio, CII, exceeding a predefined value is sufficiently low. The RF propagation, determined from the topography and infrastructure in the operating area, is used in conjunction with the densities of expected communications traffic to formulate interference constraints. These constraints state which radio cells may use the same code (channel) or adjacent channels at a time. The traffic loading and the number of service grades can also be used to calculate the number of required channels (codes) for each cell. The general assignment problem is the task of assigning the required number

  1. Multimedia Cross–Platform Content Distribution for Mobile Peer–to–Peer Networks using Network Coding

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk; Heide, Janus; Vingelmann, Peter;

    2010-01-01

    This paper is looking into the possibility of multimedia content distribution over multiple mobile platforms forming wireless peer–to–peer networks. State of the art mobile networks are centralized and base station or access point oriented. Current developments break ground for device to device...... communication. In this paper we will introduce a mobile application that runs on Symbian as well as iPhone/iPod de vices and is able to exchange multimedia content in a point to multipoint fashion. The mobile application coined PictureViewer can convey pictures from one source device to many neighboring devices...

  2. Autonomous Deployment and Restoration of Sensor Network using Mobile Robots

    Directory of Open Access Journals (Sweden)

    Tsuyoshi Suzuki

    2010-06-01

    Full Text Available This paper describes an autonomous deployment and restoration of a Wireless Sensor Network (WSN using mobile robots. The authors have been developing an information-gathering system using mobile robots and WSNs in underground spaces in post-disaster environments. In our system, mobile robots carry wireless sensor nodes (SN and deploy them into the environment while measuring Received Signal Strength Indication (RSSI values to ensure communication, thereby enabling the WSN to be deployed and restored autonomously. If the WSN is disrupted, mobile robots restore the communication route by deploying additional or alternate SNs to suitable positions. Utilizing the proposed method, a mobile robot can deploy a WSN and gather environmental information via the WSN. Experimental results using a verification system equipped with a SN deployment and retrieval mechanism are presented.

  3. Autonomous Deployment and Restoration of Sensor Network using Mobile Robots

    Directory of Open Access Journals (Sweden)

    Tsuyoshi Suzuki

    2010-09-01

    Full Text Available This paper describes an autonomous deployment and restoration of a Wireless Sensor Network (WSN using mobile robots. The authors have been developing an information-gathering system using mobile robots and WSNs in underground spaces in post-disaster environments. In our system, mobile robots carry wireless sensor nodes (SN and deploy them into the environment while measuring Received Signal Strength Indication (RSSI values to ensure communication, thereby enabling the WSN to be deployed and restored autonomously. If the WSN is disrupted, mobile robots restore the communication route by deploying additional or alternate SNs to suitable positions. Utilizing the proposed method, a mobile robot can deploy a WSN and gather environmental information via the WSN. Experimental results using a verification system equipped with a SN deployment and retrieval mechanism are presented.

  4. Mutual Interference Models for CDMA Mobile Communication Networks

    Directory of Open Access Journals (Sweden)

    K. Hrudkay

    2002-12-01

    Full Text Available Nowadays we are witnesses of a huge development one of the mostprogressive communication technology - mobile networks. The mainproblem in these networks is an elimination of the mutual interference,which, mainly in non-orthogonal CDMA networks, is the principalobstacle for reaching high transmission rates The aim of thiscontribution is to give simplified view to mutual interference modelsfor orthogonal and non-orthogonal CDMA networks. The contribution isintended mainly for PhD. students to help them to obtain an orientationin such a complicated areas, as the interference models for CDMAnetworks are.

  5. A Study On OFDM In Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Malik Nasereldin Ahmed

    2012-06-01

    Full Text Available Orthogonal Frequency Division Multiplexing (OFDM is the physical layer in emerging wireless local area networks that are also being targeted for ad hoc networking. OFDM can be also exploited in ad hoc networks to improve the energy performance of mobile devices. It is important in wireless networks because it can be used adaptively in a dynamically changing channel. This study gives a detailed view about OFDM and how it is useful to increase the bandwidth. This paper also gives an idea about how OFDM can be a promising technology for high capacity wireless communication.

  6. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  7. Distributed Network Control for Mobile Multi-Modal Wireless Sensor Networks

    Science.gov (United States)

    2010-08-19

    Distributed Network Control for Mobile Multi-Modal Wireless Sensor Networks Doina Bein , Yicheng Wen, Shashi Phoha1, Bharat B. Madan, and Asok Ray The...Journal of High Perfor- mance Computing Applications, Special Issue on Sensor Networks 16 (3) (2002) 235–241. [30] Y. Wen, D. Bein , S. Phoha

  8. An Analysis Framework for Mobility Metrics in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Xu Sanlin

    2007-01-01

    Full Text Available Mobile ad hoc networks (MANETs have inherently dynamic topologies. Under these difficult circumstances, it is essential to have some dependable way of determining the reliability of communication paths. Mobility metrics are well suited to this purpose. Several mobility metrics have been proposed in the literature, including link persistence, link duration, link availability, link residual time, and their path equivalents. However, no method has been provided for their exact calculation. Instead, only statistical approximations have been given. In this paper, exact expressions are derived for each of the aforementioned metrics, applicable to both links and paths. We further show relationships between the different metrics, where they exist. Such exact expressions constitute precise mathematical relationships between network connectivity and node mobility. These expressions can, therefore, be employed in a number of ways to improve performance of MANETs such as in the development of efficient algorithms for routing, in route caching, proactive routing, and clustering schemes.

  9. Discussion on Deployment Mode of Telecommunication Network Deployment after the Establishment of China Tower%铁塔公司成立后电信网络部署模式的探讨研究

    Institute of Scientific and Technical Information of China (English)

    谢创湘; 张凯渠

    2016-01-01

    中国铁塔公司的成立对中国电信行业产生非常大的影响。首先总结了全球电信业网络部署模式的类型,随后分析了中国电信运营商在铁塔公司成立后的网络部署模式变化,最后探讨了中国电信业未来的网络部署模式。%The establishment of China Tower company has a giant impact on China’s telecommunication industry. Firstly, the deployment mode classification of global telecommunication networks was summarized. Then, China’s telecommunication operators’ changes of network deployment modes after the establishment of China Tower Company were analyzed. Finally, the network deployment mode of domestic telecommunication industry in the future was discussed.

  10. On the Feasibility of a Network Coded Mobile Storage Cloud

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Fitzek, Frank; Roetter, Daniel Enrique Lucani

    2015-01-01

    Conventional cloud storage services offer relatively good reliability and performance in a cost-effective manner. However, they are typically structured in a centralized and highly controlled fashion. In more dynamic storage scenarios, these centralized approaches are unfeasible and developing...... decentralized storage approaches becomes critical. The novelty of this paper is the introduction of the highly dynamic distributed mobile cloud, which uses free resources on user devices to move storage to the edges of the network. At the core of our approach, lies the use of random linear network coding...... to simulate the processes governing user behavior to show feasibility of mobile storage clouds in real scenarios....

  11. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    Science.gov (United States)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  12. Green mobile devices and networks energy optimization and scavenging techniques

    CERN Document Server

    Venkataraman, Hrishikesh

    2012-01-01

    While battery capacity fails to keep up with the power-demanding features of the latest mobile devices, powering the functional advancement of wireless devices requires a revolution in the concept of battery life and recharge capability. Future hand-held devices and wireless networks should be able to recharge themselves automatically from the environment and optimize their energy consumption. Green Mobile Devices and Networks: Energy Optimization and Scavenging Techniques provides insights into the principles and technical challenges behind both automatic optimization of energy consumption an

  13. Virtual reality mobility model for wireless ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yu Ziyue; Gong Bo; He Xingui

    2008-01-01

    For wireless ad hoc networks simulation.node's mobility pattern and traffic pattern are two key elements.A new simulation model is presented based on the virtual reality collision detection algorithm in obstacle environment,and the model uses the path planning method to avoid obstacles and to compute the node's moving path.Obstacles also affect node's signal propagation.Considering these factors,this study implements the mobility model for wireless ad hoc networks.Simulation results show that the model has a significant impact on the performance of protocols.

  14. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  15. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  16. Minimization of Power Consumption in Mobile Adhoc Networks

    Directory of Open Access Journals (Sweden)

    B.Ruxanayasmin

    2014-01-01

    Full Text Available An ad hoc network is a mobile wireless network that has no fixed access point or centralized infrastructure. Each node in the network functions as a mobile router of data packets for other nodes and should maintain the network routes for long standing which is not possible due to limited battery source. Also, due to node mobility, link failures in such networks are very frequent and render certain standard protocols inefficient resulting in wastage of power and loss in throughput. The power consumption is an important issue with the goal to maintain the network lives for long by consuming less power. The power consumption can be achieved by modifying algorithms such as cryptographic algorithms,Routing algorithms, Multicast Algorithms, Energy Efficient Algorithms and Power Consumption Techniques in High Performance Computing, Compression and decompression algorithms, minimizing link failure algorithms, and by power control algorithms. In this work, we have proposed a new algorithm for minimization of power consumption in Ad hoc networks. The performance of the proposed model is analyzed and it is observed that, information could be sent with security consuminglesscomputational power, thereby increasing the battery life.

  17. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julián García Matesanz

    2011-03-01

    Full Text Available The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  18. Radio-location of mobile stations in third generation networks

    Directory of Open Access Journals (Sweden)

    Milan Manojle Šunjevarić

    2013-06-01

    Full Text Available Mobile station localization in mobile networks started with simple methods (e.g. Cell-ID method which required only slight modifications of network infrastructures. Principally, it was about network localization by which a localization service became available to all types of mobile phones. Due to low precision, the initiated development of more sophisticated methods has not been finished yet. Among the advanced location-based methods are those based on the measurement of location parameters in the time domain. In this paper the general consideration of radio location methods in 3G (UMTS radio networks is presented. The use of time based measurement methods was analysed in detail. Due to the limited article length, the use of other locating methods in 3G networks (based on power measurements, on radio direction measurement, and on cells identification – Cell ID and global positioning system - GPS are not described. Introduction Mobile station localization within modern cellular networks increases the level of user security and opens wide opportunities for commercial operators who provide this service. The major obstacle for the implementation of this service, which also prevents its practical usage, is the modification of the existing network infrastructure. In general, depending on the infrastructure used, positioning methods can be divided into two groups: integrated and independent. Integrated methods are primarily created for communication networks. A possibility to locate users represents just an additional service within a radio network. Independent methods are totally detached from the communication network in which the user whose location is being determined is. Radio location methods Determining the location of a mobile radio station is performed by determining the intersection of two or more lines of position. These lines represent the position of the set of points at which the mobile station may be located. These lines can be: (a

  19. GEMS: a mobile wireless network for atmospheric sampling

    Science.gov (United States)

    Adams, Mark L.; Manobianco, John; Bickford, James

    2005-06-01

    Large scale, mobile ad-hoc networks (MANET) are of great interest for a number of applications including battlesphere dominance and homeland security. ENSCO, Inc. is designing a system for profiling large regions of the atmosphere. The concept, known as Global Environmental Micro Sensors (GEMS), features an integrated system of airborne probes that will remain suspended in the atmosphere and take measurements of pressure, temperature, humidity, and wind velocity as they are carried by atmospheric currents. In addition to gathering meteorological data, the probes could be used for monitoring and predicting the dispersion of particulate emissions, organic and inorganic pollutants, ozone, carbon dioxide, and chemical, biological, or nuclear contaminants. Several functionality requirements are called into question when investigating a scalable mobile network protocol. For instance, periodic reporting may not always be required and can be abandoned in favor of event-driven reports. Similarly, network connectivity may not be required at all times. Instead of constant global connectivity, paths can be formed only when data packets are ready for transmission. For a successful GEMS system, the most important network function is to relay timely data to one or more receiving stations. We will present both the GEMS system and probe design as well as discuss the trade-offs associated with optimizing a three-dimensional, mobile, airborne network comprised of low-cost, low-power probes. We will also analyze and present measured data to determine the performance of a representative MANET under actual environmental conditions and various aspects of mobility.

  20. Cost management based security framework in mobile ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Security issues are always difficult to deal with in mobile ad hoc networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources.Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks.