8,302 research outputs found

    Adam Smith goes mobile : managing services beyond 3G with the digital marketplace

    Get PDF
    The next generation of mobile communications systems is expected to offer new business opportunities to existing and new market players. A market-based middleware framework has been recently proposed whereby service providers, independent of network operators, are able to tender online service contracts to network operators in a dynamic and competitive manner. This facilitates a seamless service provision over disparate networks in a consumer-centric manner. Service providers select network bearers according to the network operators' ability to meet the QoS target, which in turn is influenced, among other things, by user's price and quality requirements. The benefits of this proposal are the complementarity of numerous network resources, the decoupling of services and networks in a self-organising distributed environment, and increased competition to consumers’ advantag

    Characteristics of WAP traffic

    Get PDF
    This paper considers the characteristics of Wireless Application Protocol (WAP) traffic. We start by constructing a WAP traffic model by analysing the behaviour of users accessing public WAP sites via a monitoring system. A wide range of different traffic scenarios were considered, but most of these scenarios resolve to one of two basic types. The paper then uses this traffic model to consider the effects of large quantities of WAP traffic on the core network. One traffic characteristic which is of particular interest in network dimensioning is the degree of self-similarity, so the paper looks at the characteristics of aggregated traffic with WAP, Web and packet speech components to estimate its self-similarity. The results indicate that, while WAP traffic alone does not exhibit a significant degree of self-similarity, a combined load from various traffic sources retains almost the same degree of self-similarity as the most self-similar individual source

    A resource management architecture for future mobile communications systems

    Get PDF
    This paper presents an overview of a hierarchical Resource Management architecture for future mobile communications systems. The architecture is designed to be generic and can therefore be adopted for a range of Radio Access Methodologies. In particular it provides a mechanism for radio resource management across airinterfaces such as those being defined for use with UMTS. Given the move towards packet-switched technologies both in the Core Network and the Radio Access Network [1], the architecture embraces the concept of statistical QoS applied to individual flows in the form of a commitment level. I

    A personal networking solution

    Get PDF
    This paper presents an overview of research being conducted on Personal Networking Solutions within the Mobile VCE Personal Distributed Environment Work Area. In particular it attempts to highlight areas of commonality with the MAGNET initiative. These areas include trust of foreign devices and service providers, dynamic real-time service negotiation to permit context-aware service delivery, an automated controller algorithm for wireless ad hoc networks, and routing protocols for ad hoc networking environments. Where possible references are provided to Mobile VCE publications to enable further reading

    Mobile distributed authentication protocol

    Get PDF
    Networks access control is a crucial topic and authentication is a pre-requisite of that process. Most existing authentication protocols (for example that used in the GSM mobile network) are centralised. Depending on a single entity is undesirable as it has security, trust and availability issues. This paper proposes a new protocol, GSM-secure network access protocol (G-SNAP). In G-SNAP, the authentication procedure and network access control is handled by a quorum of authentication centres. The advantages of the novel protocol include increased security, availability and distributed trust

    Management system requirements for wireless systems beyond 3G

    Get PDF
    This paper presents a comprehensive description of various management system requirements for systems beyond 3G, which have been identified as a result of the Software Based Systems activities within the Mobile VCE Core 2 program. Specific requirements for systems beyond 3G are discussed and potential technologies to address them proposed. The analysis has been carried out from network, service and security viewpoints

    A personal distributed environment for future mobile systems

    Get PDF
    A Personal Distributed Environment (PDE) embraces a user-centric view of communications that take place against a backdrop of multiple user devices, each with its distinct capabilities, in physically separate locations. This paper provides an overview of a Personal Distributed Environment and some of the research issues related to the implementation of the PDE concept that are being considered in the current Mobile VCE work programme

    Securing personal distributed environments

    Get PDF
    The Personal Distributed Environment (PDE) is a new concept being developed by Mobile VCE allowing future mobile users flexible access to their information and services. Unlike traditional mobile communications, the PDE user no longer needs to establish his or her personal communication link solely through one subscribing network but rather a diversity of disparate devices and access technologies whenever and wherever he or she requires. Depending on the services’ availability and coverage in the location, the PDE communication configuration could be, for instance, via a mobile radio system and a wireless ad hoc network or a digital broadcast system and a fixed telephone network. This new form of communication configuration inherently imposes newer and higher security challenges relating to identity and authorising issues especially when the number of involved entities, accessible network nodes and service providers, builds up. These also include the issue of how the subscribed service and the user’s personal information can be securely and seamlessly handed over via multiple networks, all of which can be changing dynamically. Without such security, users and operators will not be prepared to trust their information to other networks

    The effect of funding changes on public sector non-profit organisations: the case of Bushcare NSW

    Get PDF
    Research into non-profit organisations abounds, but public sector non-profit organisations have been neglected. Recent funding incentives have led to significant changes in the market environment for such organisations. This study describes market changes and explores the reactions of one environmental public sector non-profit organisation, Bushcare NSW, to these changes. This paper contends that, within this institutional environment, non-profit organisations more successful in attracting large amounts of external funding have better administrative structures in place, whereas those less successful find themselves confronted with burdensome administrative duties. Neo-institutional theory provides a theoretical basis for this empirical investigation. Funding changes have had a major impact on Bushcare organisations, those more successful in attracting grants reporting significantly fewer recent administrative changes
    • 

    corecore