Notification:
We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

Personal Communications, IEEE

Issue 5 • Date Oct. 1996

Filter Results

Displaying Results 1 - 6 of 6
  • Mobile Telecommunications: emerging European Markets

    Publication Year: 1996
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (147 KB)  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM wireless access for mobile multimedia: concept and architecture

    Publication Year: 1996 , Page(s): 39 - 48
    Cited by:  Papers (33)  |  Patents (7)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5020 KB)  

    This article discusses the concept and architecture of ATM wireless access for mobile multimedia. Following an overview of wireless ATM, the authors present the concept of ATM wireless access (AWA). This concept is characterized by the following: (1) an ATM transport capability for supporting multimedia services; (2) utilization of the high frequency band for a high-speed transmission capability; (3) limited mobility during communications; and (4) a dual-mode access capability to private as well as public networks. In addition, architectural issues are discussed, including protocol architectures on the control/user (C/U) plane and mobile station architecture. Moreover, the ATM transport architecture is discussed in detail, including the topics of wireless ATM cell configuration, QoS issues, ATM/TDMA conversion over wireless, a timestamp scheme, and QoS-oriented buffer control. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart antenna arrays for CDMA systems

    Publication Year: 1996 , Page(s): 16 - 25
    Cited by:  Papers (70)  |  Patents (14)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2660 KB)  

    There are a diverse range of products and services currently on the market, but cellular or personal communications services (PCS) radio networks probably have the highest public profile. These services provide highly mobile, widely accessible two-way voice and data communications links. In general, the most complex and expensive part of the radio path for these systems is the base station. As a result, manufacturers have been designing networks that have high efficiency in terms of the bandwidth occupied and the number of users per base station. Base station antenna arrays are a promising method for providing large capacity increases in cellular mobile radio systems. This article considers channel-modeling issues, receiver structures, and algorithms, and looks at the potential capacity gains that can be achieved. It considers antenna arrays for the mobile-to-base-station or reverse link of a CDMA cellular system. It begins with an introduction to CDMA communications systems and also addresses the general topic of antenna array receivers View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rerouting for handoff in a wireless ATM network

    Publication Year: 1996 , Page(s): 26 - 33
    Cited by:  Papers (46)  |  Patents (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2060 KB)  

    Handoff is the procedure by which a user's radio link is transferred between radio ports in the network without an interruption of the user connection. We discuss how a wireless asynchronous transfer mode (ATM) network may reroute a user connection during a handoff. The authors propose a novel procedure called “nearest common node rerouting (NCNR)”. NCNR is designed to perform the rerouting of user connections due to a handoff event in a fast and efficient manner. The authors conclude by comparing NCNR to other rerouting schemes discussed in the literature View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy and authentication protocols for PCS

    Publication Year: 1996 , Page(s): 34 - 38
    Cited by:  Papers (10)  |  Patents (6)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1652 KB)  

    This article describes the message flow due to authentication, voice privacy, and signaling message encryption expected to be incorporated in the EIA/TIA's cellular industry Interim Standard IS 41 Revision C. The algorithm for authentication and generation of voice privacy mask and signalling message encryption keys employed by the standard is based on private key cryptographic techniques that use a secret key (also known as shared secret data, or SSD) for authentication. Two schemes have been proposed in the standard. In the first one, the SSD is shared only between the handset and the authentication center. In the second, the SSD is also shared with the visited system. Compared to the first scheme, the second scheme requires a considerably reduced rate of accesses to network databases for authentication during call origination determination, thereby reducing call setup time. However, during registration, the second scheme requires additional database accesses compared to the first due to the need to get an up-to-date call history count from the previous visited system. We compare the two schemes with the use of a simple mobility model for users and study their impact on the traffic to network databases. Defining the user mobility rule as the number of registrations per hour per user, we show that as the user mobility rate increases from roughly 0.5 to 15, the effectiveness of the second scheme compared to the first varies from about a 66 percent improvement to about a 30 percent degradation, clearly implying that the mobility characteristics of the user population dictate the choice of the authentication scheme View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of asynchronous data transfer methods of IEEE 802.11 MAC protocol

    Publication Year: 1996 , Page(s): 8 - 15
    Cited by:  Papers (23)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2312 KB)  

    The desire to provide universal connectivity for mobile computers and communication devices is fueling a growing interest in wireless packet networks. To satisfy the needs of wireless data networking, Study Group 802.11 was formed under IEEE project 802 to recommend an international standard for WLANs. A key part of the standard is the MAC protocol needed to support asynchronous and time-bounded delivery of data frames. It has been proposed that unslotted CSMA/CA be the basis for the IEEE 802.11 WLAN MAC protocols. We conduct a performance evaluation of the asynchronous data transfer protocols that are a part of the proposed IEEE 802.11 standard, taking into account the decentralized nature of communication between stations, the possibility of “capture”, and presence of “hidden” stations. We compute the system throughput and evaluate fairness properties of the proposed MAC protocols. Further, the impact of spatial characteristics on the performance of the system and that observed by individual stations is determined. A comprehensive comparison of the access methods provided by the 802.11 MAC protocol is done and observations are made as to when each should be employed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

This Magazine ceased publication in 2001. The current retitled publication is IEEE Wireless Communications.

Full Aims & Scope