Search results for "mobile networks"

showing 10 items of 10 documents

A “Best Current Practice” for 3GPP-based cellular system security

2014

This paper is an attempt at formulating a Best Current Practice (BCP) for access security and a baseline for core network security in the 3GPP-based systems. This encompasses the 2G circuit-switched GSM system, the 2.5G packet-switched GPRS system, the 3G UMTS system and the 4G LTE/LTE-A system. The 3GPP have defined several security standards, but many measures are optional and there are several areas deliberately not covered by the 3GPP standards. The present document is therefore an attempt at pointing out the best available options and providing advice on how to achieve an overall system hardening, which is badly needed as the cellular systems have undoubtedly become one of the most cri…

GPRS core networkCustomised Applications for Mobile networks Enhanced LogicSecurity serviceComputer scienceGSMNetwork Access ControlGeneral Packet Radio ServiceComputer securitycomputer.software_genreBest current practicecomputerUMTS frequency bands2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)
researchProduct

UAV Communication Strategies in the Next Generation of Mobile Networks

2020

| openaire: EC/H2020/857031/EU//5G!Drones The Next Generation of Mobile Networks (NGMN) alliance advocates the use of different means to support vehicular communications. This aims to cope with the massive data generated by these devices which could affect the Quality of Service (QoS) of the associated applications, but also the overall operation carried out by the vehicles. However, efficient communication strategies must be considered in order to select, for each vehicle, the communication mean ensuring the best QoS. In this paper, we tackle this issue and we propose efficient communication strategies for Unmanned Aerial Vehicles (UAVs). In addition to direct UAV-to-Infrastructure communi…

Scheme (programming language)Computer sciencebusiness.industryQuality of serviceNode (networking)05 social sciencesComputerApplications_COMPUTERSINOTHERSYSTEMS050801 communication & media studies020206 networking & telecommunications02 engineering and technologySpectral efficiencylaw.inventionUAV-to-Infrastructure (U2I)0508 media and communicationsRelaylawUAV-to-UAV (U2U)0202 electrical engineering electronic engineering information engineeringbusinessMobile NetworksUnmanned Aerial Vehicles (UAVs)computerComputer networkcomputer.programming_language
researchProduct

UWSIO: Towards automatic orchestration for the deployment of 5G monitoring services from bare metal

2018

The next generation mobile networks 5G are currently being intensively developed and standardized globally, with commercial prototyping 5G connections already emerging. At the 5G system level, one of the Key Performance Indicators (KPIs) defining 5G is substantially reduced service creation time for 5G network operators and/or service providers to increase the system efficiency and thus reduce operational costs. In this work, we focus on realize this challenging KPI in terms of speedy creation of monitoring services for 5G operators from scratch (no operating system pre-installed). A new 5G infrastructure orchestrator UWSIO is proposed to achieve fully automated deployment of 5G monitoring …

Service (systems architecture)Computer sciencebusiness.industryTestbed020206 networking & telecommunications020207 software engineeringCloud computing02 engineering and technologyService providerSoftware deployment0202 electrical engineering electronic engineering information engineeringOrchestrationPerformance indicatorOrchestration (computing)businessSoftware engineeringNext Generation Mobile Networks2018 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Design and evaluation of self-healing solutions for future wireless networks

2016

This doctoral dissertation is aimed at the creation of comprehensive and innovative Self-Organizing Networks (SON) solutions for the Network Management of future wireless networks. More specifically, the thesis focuses on the Self-Healing (SH) part of SON. Faults can appear at several functional areas of a complex cellular network. However, the most critical domain from a fault management viewpoint is the Radio Access Network (RAN). The fault management of network elements is not only difficult but also imposes high costs both in capital investment (CAPEX) and operational expenditures (OPEX). The SON concept has emerged with the goal to foster automation and to reduce human involvement in man…

cell outgate managementmobile networksitseorganisoituvat verkotviatcell degradation detection5G-tekniikkamatkaviestinverkottukiasematverkonhallintaself-organizing networksautomaatioradioverkotitsekorjautuvuusself-healingfaults managementennakointilangattomat verkot
researchProduct

Handover management in heterogenous mobile and wireless networks

2015

Since 1990, networking and mobile technologies have made a phenomenal unprecedented progress. This progress has been experienced on multiple fronts in parallel; especially on the application level and the user's needs one. This rapid evolution of the technology imposed a need for the existence of heterogeneous environments where the coverage is ensured throughout the different available networks. The challenge with such architecture would be to provide the user with the ability to navigate through the different available networks in a transparent and seamless fashion. However, the navigation among different types of networks is commonly referred to as vertical Handover. The IEEE 802.21 stan…

HandoverMedia Independent Handover (MIH)Logique floue[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Wireless communicationEnvironnement hétérogèneFuzzy logicMobile networksHeterogeneous environmentsMobile protocolsRéseau mobileLinear regressionRéseau sans filRégression linéaireProtocoles mobiles
researchProduct

UMTS radio networks

2006

Publisher Summary This chapter reviews the contributions to the UMTS radio network planning, with the optimization being provided from COST 273 and the real-time tuning, which is related to RRM. The results on UTRAN performance evaluation by the means of simulation tools are also discussed. The UMTS planning includes processes like: the propagation and traffic models, the aspects of parameter planning, and the automatic planning algorithms. An accurate ray-tracing model integrated in a UMTS-capable planning tool allows the radio network planner to reach optimal numbers for the BS deployment and configuration while meeting the service level requirements. Ray tracing can identify the problem …

EngineeringCustomised Applications for Mobile networks Enhanced Logicbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSService level requirementPlannerSoftware deploymentUMTS Terrestrial Radio Access NetworkRay tracing (graphics)businesscomputerDimensioningUMTS frequency bandsComputer networkcomputer.programming_language
researchProduct

Efficient Steering Mechanism for Mobile Network-Enabled UAVs

2022

HTTP Adaptive Streaming (HAS) is becoming the de-facto video delivery technology over best-effort networks nowadays, thanks to the myriad advantages it brings. However, many studies have shown that HAS suffers from many Quality of Experience (QoE)-related issues in the presence of competing players. This is mainly caused by the selfishness of the players resulting from the decentralized intelligence given to the player. Another limitation is the bottleneck link that could happen at any time during the streaming session and anywhere in the network. These issues may result in wobbling bandwidth perception by the players and could lead to missing the deadline for chunk downloads, which result …

Networking and Internet Architecture (cs.NI)FOS: Computer and information sciencesOptimization problembusiness.industryComputer scienceDistributed computingComputerApplications_COMPUTERSINOTHERSYSTEMS020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyComputer Science - Networking and Internet ArchitectureMechanism (engineering)0203 mechanical engineeringModels of communication0202 electrical engineering electronic engineering information engineeringCellular networkWirelessConnection steeringQuality of experienceUnmanned Aerial Vehicles (UAVs)Mobile NetworksbusinessGame theory2019 IEEE Global Communications Conference (GLOBECOM)
researchProduct

Customers' perceived risk and trust in using mobile money services-an empirical study of Ghana

2019

Copyright © 2019, IGI Global. Although mobile money (MM) has been explored in the existing literature, the roles of trust and risk in MM use have received little attention from researchers. Furthermore, many of the existing studies have treated these constructs as unidimensional. The extant literature also shows that perceived risk has received little attention from researchers who have conducted studies on MM. Thus, the objective of this study is to examine the roles of trust and perceived risk in customers' intent to adopt MM services in Ghana. Both trust and perceived risk were broken down into various dimensions. The study involved 671 respondents who were selected via an intercept appr…

asiakkaatmobile networksmobiilipalvelutluottamusverkkopankitmobile moneymobile paymentsGhanaperceived riskriskitpankkipalvelut
researchProduct

Advanced performance monitoring for self-healing cellular mobile networks

2015

This dissertation is devoted to development and validation of advanced per- formance monitoring system for existing and future cellular mobile networks. Knowledge mining techniques are employed for analysis of user specific logs, collected with Minimization of Drive Tests (MDT) functionality. Ever increas- ing quality requirements, expansion of the mobile networks and their extend- ing heterogeneity, call for effective automatic means of performance monitoring. Nowadays, network operation is mostly controlled manually through aggregated key performance indicators and statistical profiles. These methods are are not able to fully address the dynamism and complexity of modern mobile networks. Se…

sleeping cellsekvensointitoimintahäiriötsequence-based analysisrakenteettomat verkotmonitorointidata miningtietoliikenneverkotmatkaviestinverkotanomaly detectionself-organizing networkshäiriötperformance monitoringtiedonlouhintacellular mobile networksquality and performance managementknowledge mining
researchProduct

Customers' Perceived Risk and Trust in Using Mobile Money Services—an Empirical Study of Ghana

2019

Although mobile money (MM) has been explored in the existing literature, the roles of trust and risk in MM use have received little attention from researchers. Furthermore, many of the existing studies have treated these constructs as unidimensional. The extant literature also shows that perceived risk has received little attention from researchers who have conducted studies on MM. Thus, the objective of this study is to examine the roles of trust and perceived risk in customers' intent to adopt MM services in Ghana. Both trust and perceived risk were broken down into various dimensions. The study involved 671 respondents who were selected via an intercept approach and an online survey. Str…

mobile networkstrustGhanaperceived riskComputer Science ApplicationsManagement Information SystemsRisk perceptionasiakkaatEmpirical researchmobiilipalvelutluottamusverkkopankitMobile paymentmobile moneyBusinessmobile paymentsMarketingta512riskitpankkipalvelutInternational Journal of E-Business Research
researchProduct