52 research outputs found

    Efficient Handoff for QoS Enhancement in Heterogeneous Wireless Networks (UMTS/WLAN Interworking)

    Get PDF
    Today’s Wireless Communications technologies prove us that wireless communications will in the long run be composed of different communication networks as a way to benefit from each other. This can however be achieved from cellular networks and wireless local area networks that show some compatible characteristics that enable them be integrated. Scenarios typically behind these integrations is the UMTS and WLAN interworking where UMTS network is known for its wide area of coverage and nearly roaming however, known for lack of enough data rate. This is contrary with WLAN which is known for high data rate and cheaper compared to UMTS. WLAN however has a small area of coverage and lacks roaming. This in regard brings the idea that the two different networks being integrated could provide the means for mobile users to be gratified with a supported coverage and quality at anywhere and anytime with seamless access to internet

    Mobile Business as Strategic Tools in the US Airline Industry

    Get PDF
    This thesis analyzes opportunities and threats of mobile business in the context of the US airline industry as s strategic tool to create a sustainable competitive advantage through the implementation of an effective mobile business model. The analysis is based on the assumption that mobile airline strategies have to create a strategic fit with the business environment seen from an airline perspective. Forces inherent in the global environment as well as in the micro-environment are analyzed using environmental scanning as systematic technique. Exploratory data obtained from a focus group interview is added to the analysis in order to assess opportunities and threats and to extract the key success factors for airline m-business, which is found to have tremendous impact on the way an airline creates value to its customers. Key success factors discussed in this thesis are user experience, the value contribution of mobile technology, and customer requirements. Crucial elements found for matching these factors are to expedite and facilitate processes, the ability to integrate systems into a mobile infrastructure, and using devices that yield quick and inexpensive results

    Bluetooth Wireless Technology: A milestone in ICT

    Get PDF
    This article summarizes the Bluetooth technology – a type of Wireless Personal Area Network (WPAN) with emphasis on the pivotal role of Bluetooth enabled devices in ICT. The areas of application of Bluetooth technology, itssecurity, basic design and architecture, and likely future trends in its applications are also discussed with a view to highlighting its major significance. Bluetooth was compared with other wireless communications technologies specifically Infrared Data Association (IrDA) and Wireless Fidelity (Wi-Fi®) showing their dissimilarities and, above all, the advantages of Bluetooth wireless protocol over the other wireless technologies which have made it a topic of discourse in ICT are discussed

    Arbeitsbericht Nr. 2006-03, Juni 2006

    Get PDF
    Die Studie beschreibt Durchführung und Ergebnisse einer empirischen Untersuchung zur Verbreitung und Sicherheit von Wireless LAN-Infrastrukturen (WLAN) in deutschen Unternehmen und Behörden. Es werden Erkenntnisse über die Verbreitung der WLAN-Technologie, den Einsatz von WLAN-Sicherheitsmaßnahmen, die Gründe des Nichteinsatzes von Sicherheitsmaßnahmen sowie Zusammenhänge zwischen unternehmensspezifischen Merkmalen und dem Einsatz von Sicherheitsmaßnahmen ermittelt. Ausgangspunkt der Untersuchung ist ein von uns entwickelter Katalog WLAN-spezifischer Sicherheitsmaßnahmen, der in einen Fragebogen für eine Internet-Befragung überführt wird. Die Befragung wurde von November 2005 bis Januar 2006 in Kooperation mit der NetSys.IT Information & Communication, dem Wirtschaftsnetz Thüringen, dem Wirtschafts- und Innovationsportal Thüringen, dem TeleTrusT Deutschland e.V. durchgeführt. Von 1.164 eingeladenen Unternehmen und Behörden nahmen 290 an der Untersuchung teil. Das entspricht einer Rücklaufquote von 24,9%. 75 der Befragungsteilnehmer nutzen WLAN-Infrastrukturen. Dies ergibt eine WLAN-Verbreitung von 25,9%. Von der Gruppe der WLAN-nutzenden Befragungsteilnehmer beantworteten 36 den Fragebogenteil zum Einsatz von WLAN-Sicherheitsmaßnahmen vollständig

    Mobile commerce (mCommerce) security. An appraisal of current issues and trends

    Full text link
    Millions of data capable mobile devices are currently in use around the world enabled by the growing acceptance of Internet over wireless networks. However, security mechanisms still remain nascent. Security plays a crucial role in facilitating the level of trust users place on mobile devices and applications. To effectively diffuse the mobile devices in the marketplace, sufficient levels of trust has to be established in the underlying security of mobile devices and applications. This paper is an appraisal of recent issues and emerging trends regarding mobile security, within the context of conducting mobile commerce via mobile networks by individual consumers and businesses.<br /

    Mcommerce - a vision in time

    Full text link
    Global mCommerce revenues are expected to grow from $400 million in 2000, to 22.2 billion by 2005 (Raczkowski, 2002) mCommerce is a key driver in developing the global information society, with applications emerging in numerous areas including banking, financial services, security services and shopping (Khalifa and Cheng, 2002). With optimistic projections regarding its growth, many researchers are actively determining the future of mCommerce. In this paper, we have tried to synthesise some predictions and evolving definitions, explored security as a critical impediment and developing solutions; investigated the mPayment scenario; and derived a futuristic research framework. Specifically, we have attempted to capture the moving mCommerce scenario in present time, with a special focus into mPayments.<br /

    Access control and availability aspects using wireless solutions based on IEEE 802.11 technologies, providing access to classified networks

    Get PDF
    Wireless networking is among the fastest growing trends in technology. For military objectives wireless networks are effective and flexible ways of communicating, and important elements in operating quick, accurate and independent. Over the last year’s commercial technology, based on the wireless IEEE 802.11 standard has grown to be low-cost products offering cheap and easy ways to establish rapid communication services. For all that, lacking elements of security, increased availability, weak mechanisms and capabilities in order to protect and safeguard private wireless networking, concerns costumers which require high assurance communication facilities. To comply with physical security, high-end wireless security requirements and protection mechanisms are required to fully ensure the wireless environment and control the enterprise. Wireless networks has not been considered secure enough to be implemented as part of high assurance communication systems which have access to classified information networks. This thesis considers security aspects of wireless networking related to access control and availability, which means that a wide range of security issues will be discussed. Based on availability, the thesis will focus on requirements and mechanisms related to authentication, confidentiality, integrity and authenticity. The thesis has indicated through two problem scenarios that high-end requirements signifies complexity and that security mechanisms must be implemented through adoption and adjustment of the available security protocols IEEE 802.1X and IEEE 802.11i. Still, the thesis has shown that security protocols such as IEEE 802.1X and 802.11i does not solve all security problems. Additional wireless protection systems are required to supervise and control state security in order to protect the wireless network environment. In addition, network-layer security is required to oblige end-to-end security control. The conclusion brings security in wireless network into comprehensive challenges that require fully control to analyze data and operations to consolidate the wireless environment. Considering wireless protection systems which operate as integrated parts of high assurance wireless system, the thesis has investigated mechanisms and ways to actively protect the wireless network environment. The thesis has shown that wireless monitor and honeypot networks introduce potential solutions to meet availability aspects in turns of automatic detection, protection and preventio

    A Framework for the Self-Configuration of Wireless Mesh Networks

    Get PDF
    The use of wireless radio technology is well established for narrowband access systems, but its use for broadband access is relatively new. Wireless mesh architecture is a first step towards providing high-bandwidth wireless network coverage, spectral efficiency, and economic advantage. However, the widespread adoption and use of Wireless Mesh Networks (WMN) as a backbone for large wireless access networks and for last-mile subscriber access is heavily dependent on the technology’s ease of deployment. In order for WMNs to be regarded as mainstream technology, it needs to gain a competitive edge compared to wireline technologies such as DSL and cable. To achieve this, a broadband wireless network must be self-configuring, self-healing and self-organizing. In this thesis, we address these challenges. First, we propose a four-stage scheme (power-up, bootstrapping, network registration, and network optimization). We develop algorithms for each of these stages, taking advantage of the inherent properties of WMNs to determine the network’s topology. The novel part of our scheme is in the de-coupling of the subscriber’s credentials from the network hardware. This is a key part of our architecture as it helps ensure quick network enrolment, management and portability. It also helps, in our opinion, make the concept of widespread deployment using commodity hardware feasible

    Next generation mobile wireless hybrid network interworking architecture

    Get PDF
    It is a universally stated design requirement that next generation mobile systems will be compatible and interoperable with IPv6 and with various access technologies such as IEEE 802.11x. Discussion in the literature is currently as to whether the recently developed High Speed Packet Access (HSPA) or the developing Long Term Evaluation (LTE) technology is appropriate for the next generation mobile wireless system. However, the HSPA and the LTE technologies are not sufficient in their current form to provide ubiquitous data services. The third–generation mobile wireless network (3G) provides a highly developed global service to customers through either circuit switched or packet switched networks; new mobile multimedia services (e.g. streaming/mobile TV, location base services, downloads, multiuser games and other applications) that provide greater flexibility for the operator to introduce new services to its portfolio and from the user point of view, more services to select and a variety of higher, on-demand data rates compared with 2.5-2.75G mobile wireless system. However cellular networks suffer from a limited data rate and expensive deployment. In contrast, wireless local area networks (WLAN) are deployed widely in small areas or hotspots, because of their cost-effectiveness, ease of deployment and high data rates in an unlicensed frequency band. On the other hand, WLAN (IEEE 802.11x) cannot provide wide coverage cost-efficiently and is therefore at a disadvantage to 3G in the provision of wide coverage. In order to provide more services at high data rates in the hotspots and campus-wide areas, 3G service providers regard WLAN as a technology that compliments the 3G mobile wireless system. The recent evolution and successful deployment of WLANs worldwide has yielded demand to integrate WLANs with 3G mobile wireless technologies seamlessly. The key goal of this integration is to develop heterogeneous mobile data networks, capable of supporting ubiquitous data services with high data rates in hotspots. The effort to develop heterogeneous networks – also referred to fourth-generation (4G) mobile wireless data networks – is linked with many technical challenges including seamless vertical handovers across WLAN and 3G radio technologies, security, common authentication, unified accounting &amp;amp; billing, WLAN sharing (by several mobile wireless networks – different operators), consistent QoS and service provisioning, etc. This research included modelling a hybrid UMTS/WLAN network with two competent couplings: Tight Coupling and Loose Coupling. The coupling techniques were used in conjunction with EAP-AKA for authentication and Mobile IP for mobility management. The research provides an analysis of the coupling techniques and highlights the advantages and disadvantages of the coupling techniques. A large matrix of performance figures were generated for each of the coupling techniques using Opnet Modeller, a network simulation tool
    corecore