By Topic

Wireless Telecommunications Symposium, 2005

Date April 28-30, 2005

Filter Results

Displaying Results 1 - 25 of 53
  • Mobile network voice transmission quality estimation based on radio path parameters

    Publication Year: 2005 , Page(s): 95 - 99
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (246 KB) |  | HTML iconHTML  

    The article describes design, development and test results of a voice transmission quality estimating algorithm that offers results (MOS estimates) comparable to intrusive speech quality measurements but which employs different techniques-analyzing radio path parameters only. The goal of this approach is to achieve relevant results faster, easier and with a lower computational power. However, the obvious-disadvantage of an approach based on analysis of radio path features is the dependency on the transmission technology used and consequent need for retraining when the transmission mechanism changes. The parameter-based transmission quality estimations that are presented are based on a large database of transmission parameters from a mobile telecommunication network. The output speech samples were evaluated with the ITU-T P.862 (PESQ) algorithm. The correlation between single GSM parameters and the objective speech quality are analyzed. The measured results and the final estimating algorithm description are given. It is worth noting that the reliability of the final algorithm is fully comparable to PESQ itself. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient adaptive modulation and power allocation algorithm for OFDMA cellular systems

    Publication Year: 2005 , Page(s): 169 - 173
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (209 KB) |  | HTML iconHTML  

    An adaptive transmission scheme using QAM and LDPC code is proposed for an OFDMA cellular system employing FDD. Also, adaptive algorithms for active user selection, subchannel transmission power allocation, and modulation and coding set selection are proposed. The performance of the proposed scheme is obtained from computer simulation and is compared with that of the conventional scheme using mean SNR only. It is shown that the proposed scheme can provide up to 5.1 dB gain over the conventional scheme at the expense of only 3 more bits in feedback information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Economic model for 2-hop relaying cellular networks

    Publication Year: 2005 , Page(s): 184 - 189
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (202 KB) |  | HTML iconHTML  

    This paper discusses the economic model for two hop relaying cellular networks. The benefit and cost of relaying is modeled in term of a utility function, which is based on error free data transmission. The benefit takes into account the power spent while the relay is carrying. Use of relays lowers the power in the cellular system, thereby lowering the signal to interference ratio. The benefit also involves overcoming dead spots due to relays. Finally for mobile and relay, choice of model parameters formulates a non-collaborative game to maximize their utility and their strategy gives Nash equilibrium. The utility function can also be used as a criterion to choose relays. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A sensitivity analysis approach to the optimal policy range of the resource access control in wireless systems

    Publication Year: 2005 , Page(s): 100 - 105
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (255 KB) |  | HTML iconHTML  

    In this paper, the resource access control process is modelled as a Markov decision process. The stationary optimal resource access control policy is determined by solving the associated linear programming problem. Proposed resource access control policy allows employed system to make admission decisions to maximize system rewards according to current traffic condition and QoS metrics. The salient contribution of this research is to find the range for each optimal resource access control policy under specific traffic conditions. Sensitivity analysis technique is used to make it possible to find the range for each optimal policy under specific traffic parameters. Proposed model and sensitivity analysis techniques can be easily extended to a rich service model with multiple traffic types. The performance in terms of the weighted system utilization is analyzed via simulation and the results are compared with those of the complete sharing scheme. The ranges for the optimal policy are illustrated to show that a table-lookup scheme is a prominent application for the real-time resource access control. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of asynchronous carrier interferometry/MC-CDMA uplink with interference cancellation techniques

    Publication Year: 2005 , Page(s): 131 - 135
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (274 KB) |  | HTML iconHTML  

    In this paper, we analyze the uplink performance of an asynchronous carrier interferometry/MC-CDMA, with nonlinear parallel and serial interference cancellation techniques. Specifically, we employ the new variant of parallel interference cancellation known as block-PIC and demonstrate significant performance (10 dB) improvement relative to conventional PIC. We also study the effect of order of cancelling in serial interference cancellation by comparing the performance of the conventional fixed ordering scheme with dynamic ordering. We show that dynamic ordering provides a gain of 8 dB relative to fixed ordering. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framework architecture for Internet content adaptation system and vertical handover management on 4G networks

    Publication Year: 2005 , Page(s): 34 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (589 KB) |  | HTML iconHTML  

    Fourth generation (4G) mobile devices and services will transform wireless communications into a realtime connectivity. Our paper aims to present twofold solutions, a proposal architecture for the Internet content adaptation for the mobile and heterogeneous environments. We aim to provide adapted Internet contents to the users of various devices by considering the whole of the context constraints and the limitations of the heterogeneous environments. The second solution is to build an architecture for heterogeneous networks that relies on mobile stream control transmission protocol to reach mobility value added services in combination with simple object access protocol. To let users keep their session open white moving through various networks, the proposed network oriented architecture based on resource server will handle vertical handover and reduce latency and data loss. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of frequency interference and indoor location sensing with 802.11b and Bluetooth technologies

    Publication Year: 2005 , Page(s): 174 - 183
    Cited by:  Papers (3)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (511 KB) |  | HTML iconHTML  

    Location-aware computing is regarded as a key feature of many future mobile applications. GPS serves well for most outdoor applications; however, its dependence on satellites makes it ineffective in indoor environments. Several technologies such as infrared sensing, radio frequency, ultrasonic and RFIDs have been proposed for indoor location sensing. Each of these methods has its own merits and shortcomings. Recently there has been an increase in the use of commodity wireless technologies like 802.11 or Bluetooth for indoor location positioning. Since BT and WLAN don't get along very well, the paper presents experimental results of interference effect of one technology on the other. These results help in determining which of these two technologies is more suitable for location sensing applications. The paper also presents two techniques of how Bluetooth technology can be used (with and without the use of signal strength information) for location sensing. The paper concludes by suggesting some changes to the Bluetooth architecture to improve its capabilities for location positioning. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulations of site diversity based outage improvements for point-to-multipoint systems in millimeter-wave band

    Publication Year: 2005 , Page(s): 91 - 94
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (214 KB) |  | HTML iconHTML  

    Rain attenuation is one of the main factors limiting performance of point-to-multipoint systems operating in millimeter-wave bands. Site diversity can be used as one of the propagation impairment mitigation techniques thanks to the non-uniform spatial distribution of the rain rate. A diversity gain concept is usually used for diversity evaluations. The motivation to this work is to offer to service providers a simpler way to evaluate possibilities of the site diversity employment for specific scenarios instead of power balance calculations of every potential diversity connection. Outage improvement was studied using space-time simulations of a point-to-multipoint system in a specific area under a specific rain conditions. Large rain event database for Czech Republic was build for the simulations utilizing time sequences of rainfall radar images for 50×50 km area. System outage improvement probability was derived as a straightforward function of the rain fade margin, angle separation and distances of main and diversity hubs. Some of the simulation results at 42 GHz and corresponding outage improvement probability using the site diversity are presented as well. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data link control for multiple input multiple output wireless systems

    Publication Year: 2005 , Page(s): 112 - 119
    Cited by:  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (361 KB) |  | HTML iconHTML  

    This paper investigates the adaptation of data link error control protocols to be more efficient over MIMO wireless links. Data link mechanisms control, among other things, the transmission errors at the link layer, whereas MIMO is a physical layer technology that handles the wireless link with a notably high efficiency and flexibility. A new cross layer protocol is proposed in this paper in order to improve the performance of error control mechanism by making use of the multi-channel transmission characteristics. The main idea is to divide each link layer data unit (block) into sub-blocks and transmit the sub-blocks from different transmit antennas and therefore take advantage of the spatial "diversity". Besides, the division helps the receiver to recognize some error-free parts of a block; consequently new algorithms that exploit this feature are proposed and analyzed. In addition, different methods for providing higher link reliability to retransmitted data are explored. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Instant messaging usage policies enable ubiquitous communication

    Publication Year: 2005 , Page(s): 45 - 48
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (227 KB) |  | HTML iconHTML  

    Instant messaging (IM) systems are popular among users. Inside corporate environments, the real-time nature of IM communication has resulted in increased productivity. However, network administrators are concerned about the lack of security in ubiquitous IM systems and their potential to leak sensitive data to outsiders. In response, some corporate managers have banned the use of IM inside the organization. We advocate the adoption of IM usage policy that clarifies how security can be strengthened while maintaining realtime communication. It is hoped that the usage guidelines outlined in this paper will enable ubiquitous communication while maintaining security in IM environments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new service discovery architecture for sensor networks

    Publication Year: 2005 , Page(s): 190 - 196
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (287 KB) |  | HTML iconHTML  

    Because wireless sensor networks (WSNs) as ad hoc networks allow devices to communicate dynamically without fixed infrastructure and centralized administration, they pose unique challenges on how informations collected by and stored within the network could be queried and accessed while saving devices power consumption. In this paper, we present a new distributed architecture for service location in WSNs that preserves ubiquitous information access. While traditional name and location services provide a direct mapping between services and their locations at predetermined nodes, our architecture relies on dynamically identified locations servers, to adapt to the changing nature of wireless sensor networks. To achieve this goal, our architecture relies on an efficient peer-to-peer algorithm: tapestry. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture of security control in sensor networks

    Publication Year: 2005 , Page(s): 274 - 280
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (362 KB) |  | HTML iconHTML  

    Sensor networking has gained intensive attention recently. It has been a challenge to develop an effective security control strategy for sensor systems. In the present work, we propose an approach to promote security control under a middleware framework. The methodology is based on the third generation (3G) of security control strategies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-delay analysis of wireless networks over Rayleigh fading channel

    Publication Year: 2005 , Page(s): 197 - 201
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    In this work, we propose a state diagram to represent the operation of wireless networks protocol. The analysis on the corresponding state diagram provides the joint distribution of the energy and delay of a successful data packet transmission in a wireless network system. Our analysis takes into account the effect of the channel noise on the transmission of the RTS, CTS, Data, and ACK packets. Furthermore, channel coding is incorporated in the analysis by estimating the packet error probability using error-exponent-based bounds under memoryless fading channel. Using these analysis tools, the code rate and the signal-to-noise ratio per dimension are optimized to achieve the minimum average delay. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Project WISQY: a measurement-based end-to-end application-level performance comparison of 2.5G and 3G networks

    Publication Year: 2005 , Page(s): 9 - 14
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (267 KB) |  | HTML iconHTML  

    The imminent transition from 2.5G to 3G networks is generally considered to be a keystone for the future economic success of mobile telecommunications. This paper presents a practical comparison of GRPS and UMTS network performance, based on measurements in the live network of Mobilkom Austria and comparing the results to dedicated lab trials. Starting from raw TCP/IP download and upload transfer rates and ICMP Ping round-trip-times, we end up with page response times and file transfer rates for simulated HTTP/1.0 scenarios. The presented results are especially interesting for a realistic calibration of forthcoming 3G and beyond simulation tools. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the reliability-aware geographic routing

    Publication Year: 2005 , Page(s): 74 - 78
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (203 KB) |  | HTML iconHTML  

    Reliable communication is achieved when most reliable route is chosen from source to destination in ad hoc networks. The design of efficient routing protocols for dynamically changing network topologies is a crucial part of building power-efficient and scalable ad hoc wireless networks. If position information is available due to GPS or some kind of relative positioning technique, a promising approach is given by geographic routing algorithms, where each forwarding decision is based on the positions of current, destination, and possible candidate nodes in vicinity only. We focus on greedy routing algorithm and introduce a new hybrid metrics for selecting the next hop node in order to find most reliable route to the destination. We develop optimization models and provide simulation results for three new hybrid metrics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ReWINS: a distributed multi-RF sensor control network for industrial automation

    Publication Year: 2005 , Page(s): 24 - 33
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (557 KB) |  | HTML iconHTML  

    Remote "Monitor and Control" systems are being increasingly used in various areas including security, transportation, manufacturing, supply chain, healthcare, biomedical, etc. A unit system with hardware and software components, sans network support, for providing limited monitoring and control for industrial automation was proposed in our earlier work. In this paper, we extend that architecture to address the issues faced by large-scale wireless industrial automation-networking, communication architecture, modularity, extendibility and fault tolerance. The RF link of the wireless interface is reconfigurable to accommodate different RF modules (Bluetooth, 802.11, Zig-bee, RFID) providing over-the-air (OTA) plug-n-play capability. The application integration platform maintains a component level description of the system and is interfaced to a spatio-temporal visualization tool, imparting flexibility for implementing complex systems, where nodes can be addressed individually or on a group/cluster basis. Experimental results of the reconfigurable wireless interface and simulation results of network organization and healing are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peak-to-average power ratio analysis of multi-carrier pulse shape synthesis

    Publication Year: 2005 , Page(s): 136 - 142
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (342 KB) |  | HTML iconHTML  

    MC (multi-carrier) pulse shape synthesis and decomposition offers significant BER performance gains when compared with traditional OFDM (orthogonal frequency division multiplexing) and SC (single-carrier) systems. How-even there is no prior work that characterizes and quantifies the PAPR performance of MC pulse shape synthesis. This paper addresses that issue. We compare the PAPR of MC pulse shape synthesis with traditional OFDM and SC systems using the raised cosine pulse shape. Our results show that the PAPR of the MC system is lower than the OFDM system (using QPSK and 48 carriers, MC average PAPR is 1.9 dB lower than OFDM). We also show that the PAPR performance of the MC system is roughly equivalent to (for roll-off factors≥0.2 using QPSK and≥0.4 using 64-QAM), if not better than (for roll-off factors≤0.2 using QPSK and≤0.4 using 64-QAM), the SC system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal pricing for broadband wireless Internet access service

    Publication Year: 2005 , Page(s): 240 - 245
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (233 KB) |  | HTML iconHTML  

    This paper analyzes optimal pricing of two different platforms of broadband wireless access to the Internet when one provider uses 3G and the other uses WiFi using game theory. In this model, we assume an imaginary area in which two different providers compete with different service delivery platforms (3G vs. WiFi) and different network deployment strategies. They optimize their profit using different pricing in the same market. Several scenarios are made based on (I) population density (big city and small city), (2) user's preference (bandwidth and coverage), (3) user's willingness-to-pay, (4) the number of hot-spots, (5) cost structure of deployment, and (6) a market penetration rate. Through an equilibrium analysis, we demonstrate which provider has a better market position and what level of pricing is optimal in the future competitive environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless network security - a discussion from a business perspective

    Publication Year: 2005 , Page(s): 261 - 267
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (372 KB) |  | HTML iconHTML  

    Computer networks have come a long way since their inception, and wireless networks are the new trend in the IT market. However, every new technology comes with several advantages and disadvantages. This paper addresses some of the key advances and some of the shortcomings of wireless networks security. It reviews various types of security levels currently offered by standard wireless networks, such as the wired equivalent privacy (WEP); the Wi-Fi protected access (WPA); and 802.11 - the latter defined as the ultimate security available for wireless networks to date. The paper also lists benefits of wireless networks and examples of cost savings. Corporations have been found to consider wireless installations based on the lower total cost of ownership (TCO) and return on investment (ROI) scenarios. In addition to general financial benefits, wireless networks have their own performance benefits such as, for example, increases in data accuracy, and increases in user productivity. There are few industries that have expanded their boundaries in the wireless arena: financial, educational institutions, healthcare facilities and airports (travel). With security being one of the major concerns irrespective of the industry type, the authors highlight factors that senior and mid level IT management should consider when implementing wireless networks. The success story of General Motors investment in wireless LANs factories presents a best practice for WLANs implementations. In the conclusions, questions still open and opportunities for future research are discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the radio link layer QoS performance for Bluetooth real-time video communications

    Publication Year: 2005 , Page(s): 106 - 111
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (285 KB) |  | HTML iconHTML  

    This paper investigates the quality of service (QoS) performance over a Bluetooth radio link for real-time video communications. A bit error control algorithm is proposed for protecting the bit error sensitive data of the latest video codecs as well as the compressed protocol headers. Bit errors and erroneous PDU delivery are analyzed in a Bluetooth link. UDP-Lite and robust protocol header compression (RoHC) are used and integrated into the trial testbed. By sacrificing a small amount of bandwidth in the Bluetooth link, simulations have shown a significant improvement in the video quality in terms of PSNR as demonstrated by some sample video images. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throughput analysis of a novel backoff algorithm for IEEE 802.11 WLANs

    Publication Year: 2005 , Page(s): 85 - 90
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (283 KB) |  | HTML iconHTML  

    The IEEE 802.11 medium access control (MAC) adopts binary exponential backoff (BEB) to provide a contention-based channel access mechanism in the wireless medium. But many researches have shown that BEB may deteriorate the performance when the number of stations increases. In this paper, we propose a new contention window (CW) control algorithm called TB (Tender Backoff) which can tenderly adjust the appropriate CW size. We will analyze the saturated throughput and compare TB with other backoff algorithms. The approach will be examined both by numerical analysis and simulation results. Furthermore, we also do a thorough analysis on the relationship between the CW size and throughput with the incremental amount of stations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • All-IP convergent communications over open service architecture

    Publication Year: 2005 , Page(s): 202 - 210
    Cited by:  Patents (14)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (504 KB) |  | HTML iconHTML  

    The application of IP (Internet Protocol) technology in the information and communications industry is a major global trend. A highly efficient service architecture, enabling technologies and advanced applications are critical to rapid multimedia services in an all-IP network environment. In this study, an all-IP service platform based on open service architecture (OSA) was developed to support a set of standard interfaces and applications. The all-IP network environment was integrated using a network-processor-based IPv4/IPv6 translator and a mobile router (MR) supporting IP network mobility. The feasibility of the open service platform for all-IP network environments and of the designed application programming interfaces was investigated using three applications, e-commerce, video-on-demand and on-line gaming. The performance analysis demonstrates that when the number of users was increased from 1 to 80, the system throughput increased from 10.5 Mbps to 60.5 Mbps; the average response time increased from approximately 1 ms to 10.5 ms, and the delay time increased from 0.1 ms to 1 ms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel pilot-free adaptive modulation for wireless OFDM systems

    Publication Year: 2005 , Page(s): 55 - 59
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (249 KB) |  | HTML iconHTML  

    Orthogonal frequency division multiplexing (OFDM) is the contemporary technology adopted for digital audio/video broadcasting as well as wireless local-area and metropolitan-area networks. Since the wireless multimedia services often have different quality-of-service requirements and their performance is sensitive to the channel conditions, the conventional fixed OFDM modulation scheme might not be a satisfactory solution nowadays. In this paper, we introduce a novel pilot-free adaptive modulation scheme, which is bandwidth-efficient and allows variable data rates, for the future robust OFDM systems. We design a number of modulation modes in a combination of different constellation sizes and different polynomial cancellation coding methods (PCC) to combat the crucial intercarrier interference problem. Instead of estimating the channel quality based on the overhead pilot symbols, we propose to directly estimate the signal-to-noise ratio (SNR) without using any pilot. Besides, our scheme offers more modulation modes than some other existing adaptive modulation methods which are simply based on different constellation sizes. According to the Monte Carlo simulations, the empirical results show that our adaptive modulation scheme, in most channel conditions (SNR≥15 dB), not only can satisfy the predetermined bit error rate (BER) requirement (BER≤10-4) but also can dynamically enhance the throughputs in the rather clean environments with high SNR values. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From personal area networks to ubiquitous computing: preparing for a paradigm shift in the workplace

    Publication Year: 2005 , Page(s): 225 - 233
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (489 KB) |  | HTML iconHTML  

    The integration of different mobile communications technologies is providing a new capability, personal area networking (PAN) that considers different needs for time-and space-related information and has the potential to significantly change the way we work. Mobile telephony combining satellite and terrestrial cellular systems has already transformed the way people work by allowing "anytime, anywhere" telephone calling and text messaging. This conceptual paper explores the opportunities and challenges of planning and deploying this emerging technology, PANs, and, eventually, a fully ubiquitous computing network, from two perspectives: the internal management of information technology (IT) within the enterprise and the mobile telecommunications service provider. The early adopter employee demands or "pulls" emerging technology capabilities from the IT organization while the mobile telecommunications service providers markets or "pushes" emerging technology capabilities on the enterprise IT organization. The IT manager must balance these two perspectives. This research is in the early stages of determining how the IT manager should begin the planning and implementation of PANs. After an introduction on the different types of technologies that support the 'anytime-anywhere' paradigm, this paper discusses how mobile telecom service providers identify their customer needs and the products and services they will need to offer to meet those needs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Taxonomy of faults in wireless networks

    Publication Year: 2005 , Page(s): 120 - 125
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (337 KB) |  | HTML iconHTML  

    Two critical issues in wireless networks are fault management and robustness. Addressing these issues makes the network fault tolerant and secure, and also provides better reliability and availability of resources. While researchers have focused on network management, fault detection and recovery, a classification of faults unique to wireless networks is needed. In this paper, we attempt to present a specific taxonomy of faults in wireless networks. Although some faults are similar to those encountered in wired networks, others are characteristic of wireless environments due to the nature of the medium and the mobility of the nodes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.