Figure 3 - uploaded by Karl Andersson
Content may be subject to copyright.
The structure of a UMTS network 

The structure of a UMTS network 

Source publication
Article
Full-text available
Fourth generation (4G) wireless systems targeting 100 Mb/s for highly mobile scenarios and 1 Gb/s for low mobility communication are soon to be deployed on a broad basis with LTE-Advanced and IEEE 802.16m as the two candidate systems. Traditional applications spanning everything from voice, video, and data to new machine-to-machine (M2M) applicatio...

Contexts in source publication

Context 1
... structure of UMTS networks is slightly changed from the GSM network structure (Figure 3). Later as HSDPA/HSUPA (High-speed Downlink Packet Access/High-speed Uplink Packet Access) was added data rates could reach as high as 14.4 Mbps in the downlink direction and 5.76 Mbps in the uplink direction and end-to-end delays around 25 ms. ...
Context 2
... initiative supporting heterogeneous wireless networking is Unlicensed Mobile Access (UMA) [3] providing roaming and hand-over services for users between GSM/UMTS, WLAN, and Bluetooth networks. By the introduction of a UMA Network Controller (UNC) users can connect to and be reach- able via a GSM/UMTS network through e.g. a residential WLAN access point and a broadband IP network connection ( Figure 13). The UNC appears to the core network as a base station subsystem (BSS). ...

Similar publications

Chapter
Full-text available
The increasing demand in mobile data traffic, data hungry services and high Quality of Service prerequisites have led to the design of advanced architectures including multi-tier heterogeneous cellular networks. In this chapter, a multi-tier heterogeneous wireless network is examined consisting of the macrocell, multiple femtocells and multiple Vis...
Preprint
Full-text available
Rate control at the MAC-layer is one of the fundamental building blocks in many wireless networks. Over the past two decades around thirty mechanisms have been proposed in the literature. Among them, there are mechanisms that make rate selection decisions based on sophisticated measurements of wireless link quality, and others that are based on str...
Conference Paper
Full-text available
Smart Cities rely on smart devices connected to the Internet of Things (IoT). The wireless multi-hop networks are a key building block to enable the IoT. We focus on a mutualized deployment, where a network operator offers IoT connectivity to multiple urban clients, with their specific Quality of Service (QoS) requirements. Hence, such a network mu...

Citations

... Third, we compare our work with the recent articles that focus on the predictive solutions for massive access problem including the ones based on JFS. While the existing reactive network protocols are breaking down most of the time including when a massive number of devices requests wireless access [34,35,36], the recent works [37,38,39,40,41,42,43,44,45,46,47,11,12,13,14,15] aim to develop proactive solutions in which the network traffic is predicted to enable grant free medium access. In Reference [37], a subset of packets is dropped considering the predicted impact of each packet on the latency and the network performance. ...
Article
Full-text available
The Massive Access Problem of the Internet of Things (IoT) occurs at the uplink Medium Access Control (MAC) layer when a massive number of IoT devices seek to transfer their data to an IoT gateway. Although recently proposed predictive access solutions that schedule the uplink traffic based on forecasts of IoT device traffic achieve high network performance, these solutions depend heavily on the performance of forecasters. Hence, the design and selection of forecasting schemes are key to enabling massive access for such predictive access solutions. To this end, in this paper, first, we develop a framework that emulates the relationship between the IoT device class composition in the coverage area of an IoT gateway and the resulting network performance by virtue of an Artificial Neural Network (ANN). Second, based on this framework, we develop the Dynamic Automatic Forecaster Selection (DAFS) method, which selects the best-performing forecasting scheme for predictive access, in particular for Joint Forecasting-Scheduling (JFS), in a manner that adapts dynamically to a changing number of IoT devices in each device class in the coverage area. We evaluate the performance of DAFS via simulations and show that our method is able to achieve at least 80% of the best performance that can be attained for both throughput and energy consumption. Furthermore, we demonstrate that DAFS is robust with respect to the selection of architectural parameters and has a reasonable computation time for real-time IoT applications. These results imply that DAFS holds the potential for practical implementation at IoT gateways in order to enable massive access under a dynamically changing composition of IoT devices.
... These solutions showed their usability in various interfaces like WLAN, UMTS, 3G and many more. Besides the mobility management, one of the key issues was raised (Andersson 2012) i.e. power consumption. No application, no interface, no service can run without the battery power of the mobile device. ...
Article
In present days, wireless heterogeneous networks include a variety of interfaces that can be used between users and various base stations. In this multi-interface environment, it is mandatory for a model to interface and synchronize information to lessen the errors, related to continuing communication like latency, erroneous data, disconnecting and many more. Interface management (IM) manages these activities directly to ensure a successful exchange of important information. IM is a set of rules to allot channels for different interfaces in the multichannel/multi-interface atmosphere. Several methods which exposed the distinguishable properties of the interface management have been reveiwed. Moreover, interface management is the leading part of wireless heterogeneous networks as it plays a significant role in effective communication. Therefore, the recent developments in interface management systems are reviewed and the probable challenges of such systems are investigated. Interface Management is a system where a variety of artificial intelligence (AI) techniques can be used to combine functions and information from a variety of interfaces. The main reason of this evaluation is to lighten up all relevant literature related to interfaces, interface selection, interface management, the level of development and possibilities of AI approaches to make best system.
... The SMD's such mobility behaviour is known as macro and micro-mobility, respectively. The VHO and location finding services are part of SMD's mobility management process in heterogeneous wireless networks (Andersson, 2012). We use this process in our proposed model to find SMD's location and achieve its micro and macro mobility. ...
... We use this process in our proposed model to find SMD's location and achieve its micro and macro mobility. SMD's mobility management process is implemented across the protocol stack (Andersson, 2012). The typical VHO's link-layer issues are SMD's leaving from the current APs/eNodeBs/BSs and joining the next APs/eNodeBs/BSs, SMD's authentication at next APs/eNodeBs, and transmission of leftover/lost data-frames to the SMD, post-VHO (T.-s. ...
Article
Full-text available
The bandwidth-intensive applications on Smart-Mobile-Devices (SMDs) are increasing with SMD's colossal growth. The overlapped cellular and non-cellular networks, in hot-spot-places, and SMDs capabilities are significant reasons for this growth. SMD's interfaces-RAT (Radio-Access-Technology) can have complementary link characteristics. The end-users can avail always-best-connectivity (ABC) on their SMDs with complementary RAT characteristics. This paper proposes an Integrated-multi-RAT-utilization (Im-Ru) framework for multipath-computing support to realize ABC for the end-users. The Im-Ru framework has two approaches. The First is a hybrid-RAT-discovery model based on SMD's interfaces, current-location, and identification using ANDSF and MIIS servers. The second is the user's preference-based RAT-selection using weighted-RAT-parameters. We observe that the Im-Ru framework for multipath-computing is useful in future 5G-NR networks. We analyzed the Im-Ru's performance related to average-throughput improvement over the existing approaches for SMD's different speeds and observed a significant improvement. The experimental results show that Im-Ru is more reliable by realizing lower packet-loss and delay than existing work.
... UMA/GAN Architecture[6] ...
Technical Report
Full-text available
The enormous growth of data production by the mobile devices nowadays is forcing the mobile operators to find new alternative ways to handle this traffic. The most realistic solution is represented by offloading. Offload-ing is a technique used to provide the opportunity to the operators to move or the traffic from their network to an alternative network. In this paper we will introduce the existing offloading techniques that are being used in LTE systems. The idea which is the most feasible at the moment for the mobile operator is to move the data traffic generated by the mobile devices out from the cellular network and direct it to a target network which is better represented by the Wi-Fi networks. Through this paper we will have an introduction to the topic. Afterward the existing solution will be explained in details and also we will provide a comparison of all the existing techniques. Finally we will present some conclusions regarding these techniques.
... Several efforts focus to investigate the issues such as handover latency, packet loss, service continuity during handover, vertical handover related to interworking and mobility management. Andersson et al. [38] explore the interworking solutions and mobility solution for interworking architectures. Fernandez et al. [39] perform in-depth analysis of mobility management for heterogeneous wireless network. ...
... As discussed above, currently a number of surveys are presented in MCC and seamless connectivity which focuses a single aspect which is either MCC [11,12,15,36,37] or seamless connectivity [38][39][40][41][42][43][44][45][46]. Such studies lack of investigating interworking and mobility aspects for enabling seamless connectivity in MCC. ...
Article
Mobile Cloud Computing (MCC) leverages computational clouds for mitigating resources limitations in mobile devices. However, the mobility attribute of mobile devices and the intrinsic limitations of wireless access medium obstruct to achieve the goal of seamless connectivity for accessing distributed services in MCC. Mobility involves the issues of handover, service quality degradation and disruption, whereas the intrinsic limitations of the wireless access medium includes the issues of connectivity fluctuation and heterogeneity of wireless data networks. Therefore, interworking between heterogeneous wireless data networks and mobility management are employed to achieve consistency and seamless connectivity for accessing distributed services in MCC. However, such techniques lack of managing packet loss, handover latency, signaling overhead, service degradation and disruption, guaranteed QoS, and connectivity failure. Therefore, providing seamless connectivity in the network intensive computing environment of mobile cloud computing is a challenging research perspective. This paper reviews the state-of-the-art for interworking and mobility techniques to highlight issues and challenges in transparently leveraging the services of computational clouds for mobile devices. It proposes thematic taxonomy for the classification of the interworking and mobility techniques and qualitatively analyzes the implications and critical aspects of such techniques. The similarities and differences of interworking and mobility techniques are presented on the basis of latency, packet loss, mobility approach, signaling overhead and architecture. Furthermore, we identify the open issues and challenges in seamless connectivity that remains to be addressed.
... Although the HIMALIS make-before-break handover mechanism looks similar to FMIPv6 [19], the former does not require any pre-established security association among HGWs as the latter does among access routers. Thus, HIMALIS seamless handover is possible even in a heterogeneous wireless networks environment where the neighboring networks are operated by different service providers [21]. ...
Conference Paper
Full-text available
Introduction of ID/locator split into the future Internet architecture can make distributed and dynamic mobility management functions simpler and native. Unlike conventional IP mobility solutions, the new approach can offer smooth mobility across heterogeneous network-layer protocols (e.g. IPv4, IPv6) and other benefits. This paper first gives an overview of new features that ID/locator split-based architecture can bring about besides overcoming the limitations of conventional IP mobility protocols and then discusses the architecture, implementation, and performance of HIMALIS as an example of ID/locator split-based architecture. The performance results validate that HIMALIS has end-to-end throughputs and latencies similar to those of the conventional TCP/IP network. Moreover, the results verify that HIMALIS is capable to provide seamless handover across heterogeneous network-layer protocols.
... Once detecting the new link is connect (e.g. NGIID attaches to the AP in WLAN [11], [12]), NGIID sends another Interest packet (Content Name: /bjtu01/mobilitycontroller, Optional: handover completed, bjtu01, /bjtu01/ngiid/video/to jack.avi/v2, bjtu02) to BJTU01. ...
Conference Paper
Full-text available
To enhance seamless provider mobility support in NDN, we propose a Novel Locator Based mobility support Approach (NLBA). In this approach, we assign an unique locator to each Access Router (AR) in NDN networks, and further modify the outgoing faces field in AR's original Forwarding Information Base (FIB), to record the mobility status and the current locator of the provider. Besides, we append an optional field to the original NDN packet, and further extend the AR with additional functionalities, such as caching or forwarding Interest packets on behalf of the provider. Our analytical investigations indicate that NLBA has lower handover cost and shorter handover latency, compared with other existing rendezvous/indirection point based mobility support approach.
... All the above-mentioned related work deal with different aspects of disaster-resilient network architectures. This paper presents an overall design for such an environment building on our own previous work in related areas such as interworking techniques and architectures for heterogeneous wireless networks [14], a proposal on distributed mobility management [15], and a proposal on locator id separation for mobility management in the new generation network [16]. ...
Conference Paper
Full-text available
Conventional cellular mobile networks are likely to get disturbed easily when a natural disaster (earthquake, tsunami, flooding, etc.) hits an area because of their centralized control and high-power requirements. To address this issue, we propose a new mobile network architecture having distributed controls and ad-hoc configurations. This architecture exploits the locally available resources such as frequency spectrum and lively nodes to reconfigure the network and provide emergency services. We present its design and use cases.
... Moreover, we proposed composite metrics [24], multimedia flow mobility [25], and globally optimized mobility handling schemes [26]. Last, but not least, we have previously proposed cross-layered designed mobility management solutions [27] and described common interworking techniques in heterogeneous wireless networks [28]. The model proposed in this paper is built on these previous results. ...
Article
Full-text available
IP Mobility Management allowing for handover and location management to be handled by the network layer has been around for a couple of 20 years or so now. A number of protocols have been proposed including the GPRS Tunneling Protocol (GTP), Mobile IP, Proxy Mobile IP, and the Locator/Identifier Split Protocol (LISP) being the best known and most discussed in the research literature. This paper overviews existing solutions and suggests a new distributed and dynamic mobility management scheme and evaluates it against existing static approaches.
... If the Nyquist Criterion [25] is used in the feedback control system , the instability of message transfer speed in system is mostly resolved. Moreover, some other issues can be considered, including the localization [26,27], human mobilities [28]. ...
Conference Paper
In Delay-Tolerant Network(DTN), certain malicious node might generate congestion in attack to reduce the overall performance of the whole network, especially the target of message successful delivery ratio. In this paper, a novel Nash equilibrium based congestion control routing algorithm with the function of security defense (NESD) is proposed. In the process of message delivery, node can use Nash equilibrium to compute the largest proportion of transfer messages occupancy to node memory capacity. This mechanism constrains the attack from malicious node and guarantees the message transfer of regular node. This congestion control routing algorithm for security defense is evaluated by experiment. It is important application in the field of homeland defense. The results show that related key parameters are significantly improved in DTN scenario. © 2012 IFIP International Federation for Information Processing.