112,170 research outputs found
Influence of Intra-cell Traffic on the Output Power of Base Station in GSM
In this paper we analyze the influence of intracell traffic in a GSM cell on the base station output power. It is proved that intracell traffic increases this power. If offered traffic is small, the increase of output power is equal to the part of intracell traffic. When the offered traffic and, as the result, call loss increase, the increase of output power becomes less. The results of calculation are verified by the computer simulation of traffic process in the GSM cell. The calculation and the simulation consider the uniform distribution of mobile users in the cell, but the conclusions are of a general nature
A robust self-organized public key management for mobile ad hoc networks
A mobile ad hoc network (MANET) is a self-organized wireless network where mobile nodes can communicate with each other without the use of any existing network infrastructure or centralized administration. Trust establishment and management are essential for any security framework of MANETs. However, traditional solutions to key management through accessing trusted authorities or centralized servers are infeasible for MANETs due to the absence of infrastructure, frequent mobility, and wireless link instability. In this paper, we propose a robust self-organized, public key management for MANETs. The proposed scheme relies on establishing a small number of trust relations between neighboring nodes during the network initialization phase. Experiences gained as a result of successful communications and node mobility through the network enhance the formation of a web of trust between mobile nodes. The proposed scheme allows each user to create its public key and the corresponding private key, to issue certificates to neighboring nodes, and to perform public key authentication through at least two independent certificate chains without relying on any centralized authority. A measure of the communications cost of the key distribution process has been proposed. Simulation results show that the proposed scheme is robust and efficient in the mobility environment of MANET and against malicious node attacks
Recommended from our members
Telecommunications networks for remote electricity supply metering and load control
The aims and objectives of this thesis are to investigate remote electricity supply metering and load control in terms of the now availble UK Electricity Supply Industry (ESI) private and national telecommunications networks, the intelligent building, the home computer and domestic energy management concepts.
This work commences with an overview of private telecommunications systems utilised within the U.K. electricity supply industry together with those network services provided by Public Telecommunications Service Operators (PTO's) for customer access (Chapters 1 and 2). The thesis continues by describing the meter reading and billing processes (Chapter 3) and introduces the concepts of remote metering, the consumer billing interface (Chapters 4 and 5), load control and spot pricing theory (Chapter 6). A review of recent load control and remote metering field trials, conducted in the UK, including feasibility studies are then detailed (Chapter 7). A mathematical analysis of two basic approaches to the principle of 'idle-line' working is also considered (Chapter 7).
The 'intelligent home' concept and the customer billing interface are then considered in conjunction with the development of a 'home computer' applications strategy (Chapter 8). The development of text, communications and control simulation on the BBC microcomputer, are then detailed by reference to the 'Adaptive Microprocessor based System for Experimentation in the Transmission of Text' (AMTEXT) developed to test the feasibility of the home computer applications strategy developed in Chapter 8 (Chapter 9). The concept of 'idle-time working is then introduced coupled with the concept of 'integration' by way of the national telecommunications network services. Proposals for a Modular Integrated Data Aquisition System (MIDAS) are then considered as a means of illustrating a practical application of both integration and idle-time working (Chapter 10).
The thesis continues by considering network integrity, security and reliability in terms of network architecture and the development of a strategy for quantifying network resilience as a design parameter (Chapter 11).
Finally, the thesis concludes by summarisirig the work undertaken and the results obtained with respect to the initial objectives, and details potential areas for further research
- …