345 research outputs found

    Wireless Broadband Access: Policy Implications of Heterogeneous Networks

    Get PDF
    A wireless heterogeneous network can help increase the access transmission speed and contribute thereby to the broadband deployment policies of administrations and telecommunications operators. Given the technical particularities of wireless heterogeneous networks, the deployment of wireless heterogeneous networks raises a number of challenges that need to be addressed by regulatory authorities. This article analyses the following regulatory implications: standardisation and technology neutrality, spectrum management, market analysis, open access and infrastructure sharing, interconnection pricing and charging, broadband deployment policies, and privacy and security issues. --4G,heterogeneous networks,cooperative networks,spectrum management,regulation,wireless networks

    Integration of WiMAX and WiFi Services: Bandwidth Sharing and Channel Collaboration

    Get PDF
    and WiMAX networks; however, most of them either concentrate on the design of collaborated protocols or figure out the issue without the overall consideration of customer preference and contract design. In the present study, we consider a wireless service market in which there are two wireless service providers operating WiFi and WiMAX, respectively. One of the research dimensions given in the study is whether wireless operators implement bandwidth sharing, while the other is whether wireless operators make decisions independently or jointly. By involving customer preference and wholesale price contract in the present model, we find that bandwidth sharing would benefit a WiMAX service provider, yet a WiFi service provider has no significant saving under a wholesale price contract. In addition, the profit of a WiMAX service may increase with WiFi coverage when bandwidth sharing is implemented but decease with WiFi coverage when both wireless services operate without bandwidth sharing. Besides, the WiMAX service provider would allocate more capacity when average usage rate increases, but decrease the amount of capacity when average usage rate is too large

    A Performance Analysis Framework for WiFi/WiMAX Heterogeneous Metropolitan Networks Based on Cross-Layer Design

    Get PDF
    The communication between network nodes within different protocol domains is often regarded simply as a black box with unknown configuration conditions in the path. We address network heterogeneity using a white box approach and focus on its interconnection processes. To achieve this purpose, a Performance Analysis Framework (PAF) is proposed which is composed of the formalization of the latter using process algebra (PA) and the corresponding teletraffic performance models. In this contribution, we target the IEEE 802.16 and IEEE 802.11 protocols. For the teletraffic models, we extend previous models for such scenario with the inclusion of the following protocol operational parameters (metrics): bit error rate (BER), packet error ratio (PER), and packet length (pl). From the framework teletraffic models, the optimal packet length (OPL), end to end throughput, delay, and packet loss are obtained. The PAF outperforms previous modeling solutions in terms of delay and throughput relative to NS3 simulation results. </jats:p

    Media independent handovers : network selection for mobile IP nodes in heterogeneous wireless networks

    Get PDF
    Includes abstract.Includes bibliographical references (p. 79-82).In Next Generation Networks (NGN), also known as 4G, Beyond 3G, Converged, Integrated and Interworked Network, user node mobility in wireless and wired environments will seamlessly cross disparate network boundaries. The effort to offer ubiquitous computing, providing access to services anywhere and anytime, strongly encourages the ability to roam across the different existing and future networks. Literature shows investigation of concepts such as Always Best Connected (ABC) when heterogeneous networks co-exist , which will work or compete with other schemes like Home Network Default (HND), Compatibility and Network Operator Agreements (CNOA) to guide network selection or access . With the variety of available networks, the mobile node may be faced with having to decide which network to connect to. We concentrate on the network selection aspects of these envisaged mobile, overlay and integrated environment in heterogeneous networks. The standard developments by the IEEE802.21 Working group and the IETF Networking group form the base of our approach that seeks to see mobility across heterogeneous networks a reality. We propose an IEEE802.21 Media Independent Handover Function (MIHF) based network discovery and network selection, leading to a handover. The selection may be further assisted by an MIHF capable Broker Node that is Third party to the Network Providers to provide a central yet distributed database of the available networks as encountered by the Mobile Node, to cater for Nodes with no prior knowledge of networks and software repository. A Mobile Node (MN) in our solution uses 802.21 communication messages to obtain information about foreign networks encountered before selecting the networks to connect to. Our evaluation through simulations, shows that network selection in heterogeneous wireless networks environment for the appropriately equipped devices is greatly enhanced by the use of the Media Independent Handover Protocol. In scenarios where the mobile node has no prior knowledge of the encountered different network architectures, the use of a Broker node can, for an optimal number of available networks also greatly enhance the mobile node’s network selection by reducing the delay associated and the packet losses incurred

    Integrated IP communication solutions for public safety services

    Full text link
    In a crisis communication and access to data and information, is critical for public safety services. Several EU projects tackle this topic. In this workshop, results from the u-2010 and HNPS projects will be presented and discussed. The u-2010 project’s objective was to provide the most capable means of communication to everybody required to act in case of accident, catastrophe or crisis, as well as the most The International Emergency Management Society 17 th Annual Conference (TIEMS2010), Beijing (China), June 8-12 2010 effective access to that information,. The project aimed to use any existing or (future) planned communication infrastructure to do this. The HNPS project’s purpose is to design and implement interaction capacities for important public safety applications. These may be at a technical level (interaction between different radio technologies or different video applications) or at a functional level (the collaboration between different agencies)

    WiMAX-WiFi techniques for baseband convergence and routing protocols

    Get PDF
    The focus of this study was to investigate solutions that, when implemented in any heterogeneous wireless network, shall enhance the existing standard and routing protocol connectivity without impacting the standard or changing the wireless transceiver’s functions. Thus achieving efficient interoperability at much reduced overheads. The techniques proposed in this research are centred on the lower layers. This because of the facts that WiMax and WiFi standards have not addressed the backward compatibility of the two technologies at the MAC and PHY layers, for both the baseband functions as well as the routing IP addresses. This thesis describes two innovate techniques submitted for a PhD degree. The first technique is to combine WiMax and WiFi signals so to utilise the same "baseband implementation chain" to handle both of these technologies, thus insuring ubiquitous data communication. WiMax-WiFi Baseband Convergence (W2BC) implementation is proposed to offer an optimum configurable solution targeted at combining the 802.16d WiMax and the 802.11a WiFi technologies. This approach provides a fertile ground for future work into combining more OFDM based wireless technologies. Based on analysis and simulation, the W2BC can achieve saving in device cost, size, power consumption and implementation complexity when compared to current side-by-side implementations for these two technologies. The second technique, called "Prime-IP", can be implemented with, and enhance, any routing protocol. During the route discovery process, Prime-IP enables any node on a wireless mesh network (WMN) to dynamically select the best available route on the network. Prime-IP proposes a novel recursive process, based on prime numbers addressing, to accumulate knowledge for nodes beyond the “neighbouring nodes”, and to determine the sequence of all the “intermediate nodes” used to form the rout

    Pervasive Secure Content Delivery Networks Implementation

    Get PDF
    Over the years, communication networks have been shifting their focus from providing connectivity in a client/server model to providing a service or content. This shift has led to topic areas like Service-Oriented Architecture (SOA), Heterogeneous Wireless Mesh Networks, and Ubiquitous Computing. Furthermore, probably the broadest of these areas which embarks all is the Internet of Things (IoT). The IoT is defined as an Internet where all physical entities (e.g., vehicles, appliances, smart phones, smart homes, computers, etc.), which we interact daily are connected and exchanging data among themselves and users. The IoT has become a global goal for companies, researchers, and users alike due to its different implementation and functional benefits: performance efficiency, coverage, economic and health. Due to the variety of devices which connect to it, it is expected that the IoT is composed of multiple technologies interacting together, to deliver a service. This technologies interactions renders an important challenge that must be overcome: how to communicate these technologies effectively and securely? The answer to this question is vital for a successful deployment of IoT and achievement of all the potential benefits that the IoT promises. This thesis proposes a SOA approach at the Network Layer to be able to integrate all technologies involved, in a transparent manner. The proposed set of solutions is composed of primarily the secure implementation of a unifying routing algorithm and a layered messaging model to standardize communication of all devices. Security is targeted to address the three main security concerns (i.e., confidentiality, integrity, and availability), with pervasive schemes that can be employed for any kind of device on the client, backbone, and server side. The implementation of such schemes is achieved by standard current security mechanisms (e.g., encryption), in combination with novel context and intelligent checks that detect compromised devices. Moreover, a decentralized content processing design is presented. In such design, content processing is handled at the client side, allowing server machines to serve more content, while being more reliable and capable of processing complete security checks on data and client integrity
    • …
    corecore