Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 5:00 PM ET (12:00 - 21:00 UTC). We apologize for the inconvenience.
By Topic

Wireless Communications, IEEE

Issue 1 • Date Feb. 2005

Filter Results

Displaying Results 1 - 12 of 12
  • Bluetooth and Wi-Fi wireless protocols: a survey and a comparison

    Publication Year: 2005 , Page(s): 12 - 26
    Cited by:  Papers (54)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (610 KB) |  | HTML iconHTML  

    Bluetooth and IEEE 802.11 (Wi-Fi) are two communication protocol standards that define a physical layer and a MAC layer for wireless communications within a short range (from a few meters up to 100 m) with low power consumption (from less than 1 mW up to 100 mW). Bluetooth is oriented to connecting close devices, serving as a substitute for cables, while Wi-Fi is oriented toward computer-to-computer connections, as an extension of or substitution for cabled LANs. In this article we offer an overview of these popular wireless communication standards, comparing their main features and behaviors in terms of various metrics, including capacity, network topology, security, quality of service support, and power consumption. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Wireless Communications 2004 Index

    Publication Year: 2005 , Page(s): 75 - 80
    Save to Project icon | Request Permissions | PDF file iconPDF (780 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IP connectivity for gateway GPRS support node

    Publication Year: 2005 , Page(s): 37 - 46
    Cited by:  Papers (9)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (539 KB) |  | HTML iconHTML  

    In the Universal Mobile Telecommunications System, the gateway GPRS support node (GGSN) provides IP connection between the mobile telecommunications network and external packet data networks (e.g., the Internet). Specifically, the GGSN exercises session management to transfer user packets between mobile stations and external data networks. In this article we focus on the GGSN functions for IP connection including access point name processing, IP address allocation, tunneling technologies, and QoS management. Based on our experience as a mobile operator, we give several examples to show how these functions can actually be implemented in a commercial mobile network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cautionary perspective on cross-layer design

    Publication Year: 2005 , Page(s): 3 - 11
    Cited by:  Papers (247)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (551 KB) |  | HTML iconHTML  

    Recently, in an effort to improve the performance of wireless networks, there has been increased interest in protocols that rely on interactions between different layers. However, such cross-layer design can run at cross purposes with sound and longer-term architectural principles, and lead to various negative consequences. This motivates us to step back and reexamine holistically the issue of cross-layer design and its architectural ramifications. We contend that a good architectural design leads to proliferation and longevity, and illustrate this with some historical examples. Even though the wireless medium is fundamentally different from the wired one, and can offer undreamt of modalities of cooperation, we show that the conventional layered architecture is a reasonable way to operate wireless networks, and is in fact optimal up to an order. However the temptation and perhaps even the need to optimize by incorporating cross-layer adaptation cannot be ignored, so we examine the issues involved. We show that unintended cross-layer interactions can have undesirable consequences on overall system performance. We illustrate them by certain cross-layer schemes loosely based on recent proposals. We attempt to distill a few general principles for cross-layer design. Moreover, unbridled cross-layer design can lead to spaghetti design, which can stifle further innovation and be difficult to upkeep. At a critical time when wireless networks may be on the cusp of massive proliferation, the architectural considerations may be paramount. We argue that it behooves us to exercise caution while engaging in cross-layer design. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring emerging IPv6 wireless access networks

    Publication Year: 2005 , Page(s): 47 - 53
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (734 KB) |  | HTML iconHTML  

    Foreseeing a future where IPv6 and mobile terminals play an important role in public access communication networks, this article introduces a monitoring system capable of identifying relevant traffic flows and tracking them while terminal equipment moves between network attachment points. The mobile flows are characterized and represented so that individual users and flows can perceive the quality of service they receive, and operators can have global traffic views of their heterogeneous access networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless LAN security and IEEE 802.11i

    Publication Year: 2005 , Page(s): 27 - 36
    Cited by:  Papers (25)  |  Patents (6)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (535 KB) |  | HTML iconHTML  

    This article reviews wireless LAN security with a focus on the evolving new IEEE 802.11i standard. The major security enhancements in encryption and authentication defined by 802.11i are illustrated. In addition, the newly introduced key management in 802.11i is discussed. Because 802.11i incorporates IEEE 802.1X as its authentication enhancement, 802.1X with consideration of roaming users is depicted. Both intrasubnet and intersubnet roaming are illustrated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of header compression schemes for IP-based wireless access systems

    Publication Year: 2005 , Page(s): 68 - 74
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (544 KB) |  | HTML iconHTML  

    For mobile IP-based telephony (voice over IP) and IP-based real-time multimedia over cellular radio systems, an economically viable solution is needed. It is an absolute requirement that, for example, the 60-octet IPv6/UPD/RTP headers on IP telephony packets be reduced in size to conserve bandwidth in the radio spectrum. We evaluate the performance of two header compression schemes, based on RFCs 2508 and 3095, under the conditions of cellular radio access technology. The results presented in this article refer to voice and Web browsing traffic and are based on the implementation of compression/decompression algorithms for the aforementioned standards. We find that RFC 3095 performs significantly better if used for mobile communications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open call

    Publication Year: 2005 , Page(s): 2
    Save to Project icon | Request Permissions | PDF file iconPDF (484 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Voice quality evaluation in wireless packet communication systems: a tutorial and performance results for RHC

    Publication Year: 2005 , Page(s): 60 - 67
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (575 KB) |  | HTML iconHTML  

    As wireless systems evolve toward supporting a wide array of services, including traditional voice service, using packet-switched transport, it becomes increasingly important to assess the impact of packet-switched transport protocols on voice quality, in this article we present a tutorial on voice quality evaluation for wireless packet-switched systems. We introduce an evaluation methodology that combines elementary objective voice quality metrics with a frame synchronization mechanism. The methodology allows networking researchers to conduct effective and accurate quality evaluation of packet voice. To illustrate the use of the described evaluation methodology and interpretation of the results, we conduct a case study of the impact of robust header compression (ROHC) on the voice quality achieved with real-time transmission of GSM encoded voice over a wireless link. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving seamless mobility in IP-based radio access networks

    Publication Year: 2005 , Page(s): 54 - 59
    Cited by:  Papers (6)  |  Patents (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (505 KB) |  | HTML iconHTML  

    A handover in any IP-based mobile network is a complex procedure. Typically, it takes quite a long time before the new access router gets the parameters describing the flow states associated with an incoming mobile node. It may even be that the new access router does not have enough resources to support the rerouted flows. Thus, it is crucial to select from several candidate access routers the one that best fits the mobile node's requirements. This article describes the candidate access router discovery protocol, which can be used to select a suitable new access router. We also address the context transfer architecture that makes use of the candidate access router discovery protocol and aims to reduce the time required to recover flow descriptor parameters. Finally, we discuss how the two protocols can intemperate to achieve seamless handovers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Wireless Communications

    Publication Year: 2005 , Page(s): 0_1
    Save to Project icon | Request Permissions | PDF file iconPDF (1612 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (446 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Wireless Communications Magazine deals with all technical and policy issues related to personalization, location-independent communications in all media.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Hsiao-Hwa Chen
Cheng Kung University, Taiwan