Search results for "mobile network"

showing 10 items of 21 documents

UMTS radio networks

2006

Publisher Summary This chapter reviews the contributions to the UMTS radio network planning, with the optimization being provided from COST 273 and the real-time tuning, which is related to RRM. The results on UTRAN performance evaluation by the means of simulation tools are also discussed. The UMTS planning includes processes like: the propagation and traffic models, the aspects of parameter planning, and the automatic planning algorithms. An accurate ray-tracing model integrated in a UMTS-capable planning tool allows the radio network planner to reach optimal numbers for the BS deployment and configuration while meeting the service level requirements. Ray tracing can identify the problem …

EngineeringCustomised Applications for Mobile networks Enhanced Logicbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSService level requirementPlannerSoftware deploymentUMTS Terrestrial Radio Access NetworkRay tracing (graphics)businesscomputerDimensioningUMTS frequency bandsComputer networkcomputer.programming_language
researchProduct

A “Best Current Practice” for 3GPP-based cellular system security

2014

This paper is an attempt at formulating a Best Current Practice (BCP) for access security and a baseline for core network security in the 3GPP-based systems. This encompasses the 2G circuit-switched GSM system, the 2.5G packet-switched GPRS system, the 3G UMTS system and the 4G LTE/LTE-A system. The 3GPP have defined several security standards, but many measures are optional and there are several areas deliberately not covered by the 3GPP standards. The present document is therefore an attempt at pointing out the best available options and providing advice on how to achieve an overall system hardening, which is badly needed as the cellular systems have undoubtedly become one of the most cri…

GPRS core networkCustomised Applications for Mobile networks Enhanced LogicSecurity serviceComputer scienceGSMNetwork Access ControlGeneral Packet Radio ServiceComputer securitycomputer.software_genreBest current practicecomputerUMTS frequency bands2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)
researchProduct

GPRS Security for Smart Meters

2013

Part 1: Cross-Domain Conference and Workshop on Multidisciplinary Research and Practice for Information Systems (CD-ARES 2013); International audience; Many Smart Grid installations rely on General Packet Radio Service (GPRS) for wireless communication in Advanced Metering Infrastructures (AMI). In this paper we describe security functions available in GPRS, explaining authentication and encryption options, and evaluate how suitable it is for use in a Smart Grid environment. We conclude that suitability of GPRS depends on the chosen authentication and encryption functions, and on selecting a reliable and trustworthy mobile network operator.

GPRSComputer science[SHS.INFO]Humanities and Social Sciences/Library and information sciences02 engineering and technology[INFO] Computer Science [cs]Encryption[SHS.INFO] Humanities and Social Sciences/Library and information sciencesGPRS core networkAMI0202 electrical engineering electronic engineering information engineeringWirelessMetering mode[INFO]Computer Science [cs]General Packet Radio ServiceSmartgridMobile network operatorAuthenticationbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineering020206 networking & telecommunicationsSmart gridSecuritybusinessSmart MeteringComputer network
researchProduct

Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study

2016

In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…

General Computer Scienceinformation securityComputer scienceMobile computingresource allocationMobile Web02 engineering and technologyComputer securitycomputer.software_genreSecurity information and event managementPublic land mobile network0203 mechanical engineeringSecurity association0202 electrical engineering electronic engineering information engineeringMobile paymentGeneral Materials ScienceResource managementCloud computing securityIMT AdvancedGeneral EngineeringPhysical layer020302 automobile design & engineering020206 networking & telecommunicationsInformation securityComputer security modelultra-dense networksSecurity serviceNetwork Access ControlNetwork security policyResource allocationlcsh:Electrical engineering. Electronics. Nuclear engineeringlcsh:TK1-9971computer5GEfficient energy useIEEE Access
researchProduct

Handover management in heterogenous mobile and wireless networks

2015

Since 1990, networking and mobile technologies have made a phenomenal unprecedented progress. This progress has been experienced on multiple fronts in parallel; especially on the application level and the user's needs one. This rapid evolution of the technology imposed a need for the existence of heterogeneous environments where the coverage is ensured throughout the different available networks. The challenge with such architecture would be to provide the user with the ability to navigate through the different available networks in a transparent and seamless fashion. However, the navigation among different types of networks is commonly referred to as vertical Handover. The IEEE 802.21 stan…

HandoverMedia Independent Handover (MIH)Logique floue[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Wireless communicationEnvironnement hétérogèneFuzzy logicMobile networksHeterogeneous environmentsMobile protocolsRéseau mobileLinear regressionRéseau sans filRégression linéaireProtocoles mobiles
researchProduct

Modelling Mobile Encounter Networks

2006

This article presents mobile encounter networks, which emerge when mobile devices come across each other and form a temporary connection between them using a common short-range radio technology. Local information exchanges between mobile devices results in a broadcast diffusion of information to other users of the network with a delay. In addition to presenting the concept of mobile encounter networks, we also provide an abstract method for describing the information diffusion process inside them. peerReviewed

Mobile identification numberComputer scienceMobile computingMobile WebmatkaviestinverkotPublic land mobile networkMobile stationMobile phone signalMobile searchMobile technologyGSM servicesRadio access networkbusiness.industryIMT AdvancedMobile broadbandmobile communicationmobile p2p networkvertaisverkotMobile telephonySmall cellbusinessMobile devicelangattomat verkotComputer networkMobile collaborationmobiilit vertaisverkot
researchProduct

Mobile Search - Social Network Search Using Mobile Devices Demonstration

2008

Mobile search prototype demonstrates the possibilities of social network search in N800 mobile devices. Search is initiated from a N800 mobile device to search the contacts in mobile device's addressbook. The contacts can be other N800 mobile devices running mobile Web server or normal Web servers in the Internet with Drupal content management system. Mobile device users can select which of their personal information such as phone numbers, calendar data etc. to share via a mobile Web server. The proposed search mechanism has many benefits compared to centralized Web search engines like Google. The search can locate information which is not referenced anywhere and thus allows hidden or rare …

Mobile processorWeb serverMobile identification numberComputer scienceMobile computingMobile WebMobile communications over IPcomputer.software_genreWorld Wide WebPublic land mobile networkServerMobile stationMobile databaseMobile paymentMobile searchMobile technologyGSM servicesRadio access networkSocial networkbusiness.industrySearch analyticsThe InternetbusinesscomputerPersonally identifiable informationMobile deviceComputer network2008 5th IEEE Consumer Communications and Networking Conference
researchProduct

Mobile Encounter Networks and Their Applications

2008

This article presents mobile encounter networks (MENs), which emerge when mobile devices come across each other and form a temporary connection between them using a common short-range radio technology. Local information exchanges between mobile devices results in a broadcast diffusion of information to other users of the network with a delay. Gasoline price comparison system (GPCS), which delivers newest gasoline prices to mobile users using mobile encounter information diffusion, is described as well as other application areas where MENs could be used. The feasibility of building MENs using bluetooth is tested with the BlueCheese mobile encounter network middleware and it is found that the…

Mobile radioMobile processorMobile identification numberComputer scienceMobile computingMobile Weblaw.inventionPublic land mobile networkBluetoothlawMobile stationMobile phone signalMobile databaseMobile paymentMobile searchMobile technologyGSM servicesRadio access networkbusiness.industryIMT AdvancedMobile broadbandMiddlewareSmall cellTelecommunicationsbusinessMobile deviceComputer network2008 5th IEEE Consumer Communications and Networking Conference
researchProduct

Efficient Steering Mechanism for Mobile Network-Enabled UAVs

2022

HTTP Adaptive Streaming (HAS) is becoming the de-facto video delivery technology over best-effort networks nowadays, thanks to the myriad advantages it brings. However, many studies have shown that HAS suffers from many Quality of Experience (QoE)-related issues in the presence of competing players. This is mainly caused by the selfishness of the players resulting from the decentralized intelligence given to the player. Another limitation is the bottleneck link that could happen at any time during the streaming session and anywhere in the network. These issues may result in wobbling bandwidth perception by the players and could lead to missing the deadline for chunk downloads, which result …

Networking and Internet Architecture (cs.NI)FOS: Computer and information sciencesOptimization problembusiness.industryComputer scienceDistributed computingComputerApplications_COMPUTERSINOTHERSYSTEMS020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyComputer Science - Networking and Internet ArchitectureMechanism (engineering)0203 mechanical engineeringModels of communication0202 electrical engineering electronic engineering information engineeringCellular networkWirelessConnection steeringQuality of experienceUnmanned Aerial Vehicles (UAVs)Mobile NetworksbusinessGame theory2019 IEEE Global Communications Conference (GLOBECOM)
researchProduct

Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 …

2002

The recent NSF Workshop on Infrastructure for Mobile and Wireless Systems, held on Oct. 15, 2001 in Phoenix had a goal of defining and establishing a common infrastructure for the discipline of mobile wireless networking. This consensus-based paper is the outcome of that workshop. The paper provides a foundation for implementation, standardization, and further research and discussion on the issues of what should constitute such an infrastructure. Workshop participants came from many different wireless communities, including those of communications, operating systems, core networking, mobility, databases, and middleware. The workshop presented various research directions in the field and inc…

Public land mobile networkWireless site surveyWi-Fi arrayComputer sciencebusiness.industryMobile broadbandMobile computingMobile technologyMobile WebTelecommunicationsbusinessMunicipal wireless networkComputer network
researchProduct