515 research outputs found

    GSM mobility management using an intelligent network platform

    Get PDF
    PhDAbstract not availabl

    Media independent handovers : network selection for mobile IP nodes in heterogeneous wireless networks

    Get PDF
    Includes abstract.Includes bibliographical references (p. 79-82).In Next Generation Networks (NGN), also known as 4G, Beyond 3G, Converged, Integrated and Interworked Network, user node mobility in wireless and wired environments will seamlessly cross disparate network boundaries. The effort to offer ubiquitous computing, providing access to services anywhere and anytime, strongly encourages the ability to roam across the different existing and future networks. Literature shows investigation of concepts such as Always Best Connected (ABC) when heterogeneous networks co-exist , which will work or compete with other schemes like Home Network Default (HND), Compatibility and Network Operator Agreements (CNOA) to guide network selection or access . With the variety of available networks, the mobile node may be faced with having to decide which network to connect to. We concentrate on the network selection aspects of these envisaged mobile, overlay and integrated environment in heterogeneous networks. The standard developments by the IEEE802.21 Working group and the IETF Networking group form the base of our approach that seeks to see mobility across heterogeneous networks a reality. We propose an IEEE802.21 Media Independent Handover Function (MIHF) based network discovery and network selection, leading to a handover. The selection may be further assisted by an MIHF capable Broker Node that is Third party to the Network Providers to provide a central yet distributed database of the available networks as encountered by the Mobile Node, to cater for Nodes with no prior knowledge of networks and software repository. A Mobile Node (MN) in our solution uses 802.21 communication messages to obtain information about foreign networks encountered before selecting the networks to connect to. Our evaluation through simulations, shows that network selection in heterogeneous wireless networks environment for the appropriately equipped devices is greatly enhanced by the use of the Media Independent Handover Protocol. In scenarios where the mobile node has no prior knowledge of the encountered different network architectures, the use of a Broker node can, for an optimal number of available networks also greatly enhance the mobile node’s network selection by reducing the delay associated and the packet losses incurred

    Inter-Domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks

    Get PDF
    The convergence of diverse but complementary wireless access technologies and inter-operation among administrative domains have been envisioned as crucial for the next generation wireless networks that will provide support for end-user devices to seamlessly roam across domain boundaries. The integration of existing and emerging heterogeneous wireless networks to provide such seamless roaming requires the design of a handover scheme that provides uninterrupted service continuity while facilitating the establishment of authenticity of the entities involved. The existing protocols for supporting re-authentication of a mobile node during a handover across administrative domains typically involve several round trips to the home domain, and hence introduce long latencies. Furthermore, the existing methods for negotiating roaming agreements to establish inter-domain trust rely on a lengthy manual process, thus, impeding seamless roaming across multiple domains in a truly heterogeneous wireless network. In this thesis, we present a new proof-token based authentication protocol that supports quick re-authentication of a mobile node as it moves to a new foreign domain without involving communication with the home domain. The proposed proof-token based protocol can also support establishment of spontaneous roaming agreements between a pair of domains that do not already have a direct roaming agreement, thus allowing flexible business models to be supported. We describe details of the new authentication architecture, the proposed protocol, which is based on EAP-TLS and compare the proposed protocol with existing protocols

    3G migration in Pakistan

    Get PDF
    The telecommunication industry in Pakistan has come a long way since the country\u27s independence in 1947. The initial era could be fairly termed as the PTCL (Pakistan Telecommunication Company Limited) monopoly, for it was the sole provider of all telecommunication services across the country. It was not until four decades later that the region embarked into the new world of wireless communication, hence ending the decades old PTCL monopoly. By the end of the late 1990\u27s, government support and international investment in the region opened new doors to innovation and better quality, low cost, healthy competition. Wireless licenses for the private sector in the telecommunication industry triggered a promising chain of events that resulted in a drastic change in the telecommunication infrastructure and service profile. The newly introduced wireless (GSM) technology received enormous support from all stakeholders (consumers, regulatory body, and market) and caused a vital boost in Pakistan\u27s economy. Numerous tangential elements had triggered this vital move in the history of telecommunications in Pakistan. Entrepreneurs intended to test the idea of global joint ventures in the East and hence the idea of international business became a reality. The technology had proven to be a great success in the West, while Pakistan\u27s telecom consumer had lived under the shadow of PTCL dominance for decades and needed more flexibility. At last the world was moving from wired to wireless! Analysts termed this move as the beginning of a new era. The investors, telecommunication businesses, and Pakistani treasury prospered. It was a win-win situation for all involved. The learning curve was steep for both operators and consumers but certainly improved over time. In essence, the principle of deploying the right technology in the right market at the right time led to this remarkable success. The industry today stands on the brink of a similar crossroads via transition from second generation to something beyond. With the partial success of 3G in Europe and the USA, the government has announced the release of three 3G licenses by mid 2009. This decision is not yet fully supported by all but still initiated parallel efforts by the operators and the vendors to integrate this next move into their existing infrastructure

    SECURITY MEASUREMENT FOR LTE/SAE NETWORK DURING SINGLE RADIO VOICE CALL CONTINUITY (SRVCC).

    Get PDF
    Voice has significant place in mobile communication networks. Though data applications have extensively gained in importance over the years but voice is still a major source of revenue for mobile operators. It is obvious that voice will remain an important application even in the era of Long Term Evolution (LTE). Basically LTE is an all-IP data-only transport technology using packet switching. Therefore, it introduces challenges to satisfy quality of service expectations for circuit-switched mobile telephony and SMS for LTE capable smartphones, while being served on the LTE network. Since 2013, mobile operators have been busy deploying Voice Over LTE (VoLTE). They are relying on a VoLTE technology called Single Radio Voice Call Continuity (SRVCC) for seamless handover between packet-switch domain to circuit-switch domain or vice versa. The aim of thesis is to review and identify the security measurement during SRVCC and verify test data for ciphering and integrity algorithm.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Mobility and Handoff Management in Wireless Networks

    Get PDF
    With the increasing demands for new data and real-time services, wireless networks should support calls with different traffic characteristics and different Quality of Service (QoS)guarantees. In addition, various wireless technologies and networks exist currently that can satisfy different needs and requirements of mobile users. Since these different wireless networks act as complementary to each other in terms of their capabilities and suitability for different applications, integration of these networks will enable the mobile users to be always connected to the best available access network depending on their requirements. This integration of heterogeneous networks will, however, lead to heterogeneities in access technologies and network protocols. To meet the requirements of mobile users under this heterogeneous environment, a common infrastructure to interconnect multiple access networks will be needed. In this chapter, the design issues of a number of mobility management schemes have been presented. Each of these schemes utilizes IP-based technologies to enable efficient roaming in heterogeneous network. Efficient handoff mechanisms are essential for ensuring seamless connectivity and uninterrupted service delivery. A number of handoff schemes in a heterogeneous networking environment are also presented in this chapter.Comment: 28 pages, 11 figure

    The new enhancement of UMTS: HSDPA and HSUPA

    Get PDF
    During the last two decades, the world of the mobile communications grew a lot, as a consequence of the increasing necessity of people to communicate. Now, the mobile communications still need to improve for satisfies the user demands. The new enhancement of UMTS in concrete HSDPA and HSUPA is one of these improvements that the society needs. HSDPA and HSUPA which together are called HSPA, give to the users higher data rates in downlink and uplink. The higher data rates permit to the operators give more different types of services and at the same time with better quality. As a result, people can do several new applications with their mobile terminals like applications that before a computer and internet connection were required, now it is possible to do directly with the mobile terminal. This thesis consists in study these new technologies denominated HSDPA and HSUPA and thus know better the last tendencies in the mobile communications. Also it has a roughly idea about the future tendencies

    Performance evaluation of user mobility on QoS classes in a 3G network

    Get PDF
    The popularity of IP services is increasing and the demand for managing traffic with different QoS classes has become more challenging. The stability of the system is affected by the rate of voice traffic. Mobility allows users to be connected at all time where handover may occur as it is not always possible to be connected to the same base station. Mobility and handover cause severe interference, which affects overall throughput and capacity of the system. The system requires greater capacity with more coverage area. This study deals with the impact of user mobility on voice quality in IP based application in a 3G Network. The aim is to improve the system performance in mixed traffic environment. A mathematical model is used to analyse the impact of using different type of coder on packet end-to-end delay and packet loss. The simulation results indicate that types of coder affect the system performance. Application of scheduling based on weight and load balancing technique can improve the system performance. The deployment of scheduling based on weight and a load balancing technique have been investigated to reduce the end-to-end delay and to improve overall performance in mixed traffic environment. The results under different conditions are analysed and it is found that by applying scheduling scheme, the quality of voice communication can be improved. In addition, load balancing technique can be used to improve the performance of the system. Apart from the decrease in delay, the technique can increase the capacity of the system and the overall stability of the system can be further improved. Finally, network security is another important aspect of network administration. Security policies have to be defined and implemented so that critical sections of the network are protected against unwarranted traffic or unauthorized personnel. The impact of implementing IPSec has been tested for voice communication over IP in a 3G network. Implementing the security protocol does not significantly degrade the performance of the system.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Mobility management across converged IP-based heterogeneous access networks

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 8/2/2010.In order to satisfy customer demand for a high performance “global” mobility service, network operators (ISPs, carriers, mobile operators, etc.) are facing the need to evolve to a converged “all-IP” centric heterogeneous access infrastructure. However, the integration of such heterogeneous access networks (e.g. 802.11, 802.16e, UMTS etc) brings major mobility issues. This thesis tackles issues plaguing existing mobility management solutions in converged IP-based heterogeneous networks. In order to do so, the thesis firstly proposes a cross-layer mechanism using the upcoming IEEE802.21 MIH services to make intelligent and optimized handovers. In this respect, FMIPv6 is integrated with the IEEE802.21 mechanism to provide seamless mobility during the overall handover process. The proposed solution is then applied in a simulated vehicular environment to optimize the NEMO handover process. It is shown through analysis and simulations of the signalling process that the overall expected handover (both L2 and L3) latency in FMIPv6 can be reduced by the proposed mechanism by 69%. Secondly, it is expected that the operator of a Next Generation Network will provide mobility as a service that will generate significant revenues. As a result, dynamic service bootstrapping and authorization mechanisms must be in place to efficiently deploy a mobility service (without static provisioning), which will allow only legitimate users to access the service. A GNU Linux based test-bed has been implemented to demonstrate this. The experiments presented show the handover performance of the secured FMIPv6 over the implemented test-bed compared to plain FMIPv6 and MIPv6 by providing quantitative measurements and results on the quality of experience perceived by the users of IPv6 multimedia applications. The results show the inclusion of the additional signalling of the proposed architecture for the purpose of authorization and bootstrapping (i.e. key distribution using HOKEY) has no adverse effect on the overall handover process. Also, using a formal security analysis tool, it is shown that the proposed mechanism is safe/secure from the induced security threats. Lastly, a novel IEEE802.21 assisted EAP based re-authentication scheme over a service authorization and bootstrapping framework is presented. AAA based authentication mechanisms like EAP incur signalling overheads due to large RTTs. As a result, overall handover latency also increases. Therefore, a fast re-authentication scheme is presented which utilizes IEEE802.21 MIH services to minimize the EAP authentication process delays and as a result reduce the overall handover latency. Analysis of the signalling process based on analytical results shows that the overall handover latency for mobility protocols will be approximately reduced by 70% by the proposed scheme

    SECURITY MEASUREMENT FOR LTE/SAE NETWORK DURING SINGLE RADIO VOICE CALL CONTINUITY (SRVCC).

    Get PDF
    Voice has significant place in mobile communication networks. Though data applications have extensively gained in importance over the years but voice is still a major source of revenue for mobile operators. It is obvious that voice will remain an important application even in the era of Long Term Evolution (LTE). Basically LTE is an all-IP data-only transport technology using packet switching. Therefore, it introduces challenges to satisfy quality of service expectations for circuit-switched mobile telephony and SMS for LTE capable smartphones, while being served on the LTE network. Since 2013, mobile operators have been busy deploying Voice Over LTE (VoLTE). They are relying on a VoLTE technology called Single Radio Voice Call Continuity (SRVCC) for seamless handover between packet-switch domain to circuit-switch domain or vice versa. The aim of thesis is to review and identify the security measurement during SRVCC and verify test data for ciphering and integrity algorithm.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format
    • …
    corecore