By Topic

IEEE Wireless Communications

Issue 1 • Date Feb. 2005

Filter Results

Displaying Results 1 - 12 of 12
  • Wireless LAN security and IEEE 802.11i

    Publication Year: 2005, Page(s):27 - 36
    Cited by:  Papers (35)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (535 KB) | HTML iconHTML

    This article reviews wireless LAN security with a focus on the evolving new IEEE 802.11i standard. The major security enhancements in encryption and authentication defined by 802.11i are illustrated. In addition, the newly introduced key management in 802.11i is discussed. Because 802.11i incorporates IEEE 802.1X as its authentication enhancement, 802.1X with consideration of roaming users is depi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bluetooth and Wi-Fi wireless protocols: a survey and a comparison

    Publication Year: 2005, Page(s):12 - 26
    Cited by:  Papers (84)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    Bluetooth and IEEE 802.11 (Wi-Fi) are two communication protocol standards that define a physical layer and a MAC layer for wireless communications within a short range (from a few meters up to 100 m) with low power consumption (from less than 1 mW up to 100 mW). Bluetooth is oriented to connecting close devices, serving as a substitute for cables, while Wi-Fi is oriented toward computer-to-comput... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring emerging IPv6 wireless access networks

    Publication Year: 2005, Page(s):47 - 53
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (734 KB) | HTML iconHTML

    Foreseeing a future where IPv6 and mobile terminals play an important role in public access communication networks, this article introduces a monitoring system capable of identifying relevant traffic flows and tracking them while terminal equipment moves between network attachment points. The mobile flows are characterized and represented so that individual users and flows can perceive the quality... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cautionary perspective on cross-layer design

    Publication Year: 2005, Page(s):3 - 11
    Cited by:  Papers (324)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    Recently, in an effort to improve the performance of wireless networks, there has been increased interest in protocols that rely on interactions between different layers. However, such cross-layer design can run at cross purposes with sound and longer-term architectural principles, and lead to various negative consequences. This motivates us to step back and reexamine holistically the issue of cro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Wireless Communications 2004 Index

    Publication Year: 2005, Page(s):75 - 80
    Request permission for commercial reuse | PDF file iconPDF (780 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IP connectivity for gateway GPRS support node

    Publication Year: 2005, Page(s):37 - 46
    Cited by:  Papers (9)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (539 KB) | HTML iconHTML

    In the Universal Mobile Telecommunications System, the gateway GPRS support node (GGSN) provides IP connection between the mobile telecommunications network and external packet data networks (e.g., the Internet). Specifically, the GGSN exercises session management to transfer user packets between mobile stations and external data networks. In this article we focus on the GGSN functions for IP conn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving seamless mobility in IP-based radio access networks

    Publication Year: 2005, Page(s):54 - 59
    Cited by:  Papers (9)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (505 KB) | HTML iconHTML

    A handover in any IP-based mobile network is a complex procedure. Typically, it takes quite a long time before the new access router gets the parameters describing the flow states associated with an incoming mobile node. It may even be that the new access router does not have enough resources to support the rerouted flows. Thus, it is crucial to select from several candidate access routers the one... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Voice quality evaluation in wireless packet communication systems: a tutorial and performance results for RHC

    Publication Year: 2005, Page(s):60 - 67
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (575 KB) | HTML iconHTML

    As wireless systems evolve toward supporting a wide array of services, including traditional voice service, using packet-switched transport, it becomes increasingly important to assess the impact of packet-switched transport protocols on voice quality, in this article we present a tutorial on voice quality evaluation for wireless packet-switched systems. We introduce an evaluation methodology that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open call

    Publication Year: 2005, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (484 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of header compression schemes for IP-based wireless access systems

    Publication Year: 2005, Page(s):68 - 74
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    For mobile IP-based telephony (voice over IP) and IP-based real-time multimedia over cellular radio systems, an economically viable solution is needed. It is an absolute requirement that, for example, the 60-octet IPv6/UPD/RTP headers on IP telephony packets be reduced in size to conserve bandwidth in the radio spectrum. We evaluate the performance of two header compression schemes, based on RFCs ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Wireless Communications

    Publication Year: 2005, Page(s): 0_1
    Request permission for commercial reuse | PDF file iconPDF (1612 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (446 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Wireless Communications is designed for individuals working in the communications and networking communities.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Hamid Gharavi
National Institute of Standards and Technology (NIST)