scispace - formally typeset
Search or ask a question

Showing papers on "Mobile telephony published in 2009"


Patent
12 Jun 2009
TL;DR: In this article, improved capabilities are described for displaying mobile content in association with a website on a mobile communication facility based at least in part on receiving a website request from a mobile carrier gateway, receiving contextual information relating to the requested website, associating the received contextual information with a mobile content, and finally displaying the mobile content with the website on mobile communication facilities.
Abstract: In embodiments of the present invention improved capabilities are described for displaying mobile content in association with a website on a mobile communication facility based at least in part on receiving a website request from a mobile carrier gateway, receiving contextual information relating to the requested website, associating the received contextual information with a mobile content, and, finally, displaying the mobile content with the website on a mobile communication facility.

675 citations


Journal ArticleDOI
TL;DR: This theoretically hybrid, statistically significant, and culturally sensitive book achieves a sustained sociological understanding of the cell phone in a global context through an important study spanning three continents, and asking fundamental questions about the social effects of wireless communication.
Abstract: Castells, M., Fernandez-Ardevol, M., Qiu, J. L., & Sey, A. (2007). Mobile communication and society: A global perspective. Cambridge, MA: The MIT Press. This theoretically hybrid, statistically sig...

535 citations


Journal ArticleDOI
22 May 2009-Science
TL;DR: The mobility of mobile phone users is modeled in order to study the fundamental spreading patterns that characterize a mobile virus outbreak and it is found that although Bluetooth viruses can reach all susceptible handsets with time, they spread slowly because of human mobility, offering ample opportunities to deploy antiviral software.
Abstract: We modeled the mobility of mobile phone users in order to study the fundamental spreading patterns that characterize a mobile virus outbreak. We find that although Bluetooth viruses can reach all susceptible handsets with time, they spread slowly because of human mobility, offering ample opportunities to deploy antiviral software. In contrast, viruses using multimedia messaging services could infect all users in hours, but currently a phase transition on the underlying call graph limits them to only a small fraction of the susceptible users. These results explain the lack of a major mobile virus breakout so far and predict that once a mobile operating system's market share reaches the phase transition point, viruses will pose a serious threat to mobile communications.

516 citations


Patent
Federico Fraccaroli1
03 Sep 2009
TL;DR: In this article, the matching profiles for each user are stored in the server through the user's mobile unit or a secure page on the Internet, and each matching profile is corresponded with a respective mobile unit using the same identification information (ID) of the respective mobile units utilized for carrying out phone calls.
Abstract: A wireless communications network comprises a server in a central location storing matching profiles for a plurality of users of the network. The matching profile for each user is stored in the server through the user's mobile unit or a secure page on the Internet. Each matching profile is corresponded with a respective mobile unit using the same identification information (ID) of the respective mobile unit utilized for carrying out phone calls. The server has a customizable variable matching algorithm and probes the matching profiles corresponding to the respective mobile units in a cell or group of cells for a match every time a new mobile unit subscribes into the cell or group of cells. When there is a match of matching profiles, the two persons are put in contact or advised of each other through a phone call or other communications method.

467 citations


Proceedings ArticleDOI
14 Jun 2009
TL;DR: The results show that cellular service can be effectively guaranteed while having a comparable sum rate with a none power control case in most of the cell area.
Abstract: We address resource sharing of the cellular network and a device-to-device (D2D) underlay communication assuming that the cellular network has control over the transmit power and the radio resources of D2D links. We show that by proper power control, the interference between two services can be coordinated to benefit the overall performance. In addition, we consider a scenario with prioritized cellular communication and an upper limit on the maximum transmission rate of all links. We derive the optimum power allocation for the considered resource sharing modes. The results show that cellular service can be effectively guaranteed while having a comparable sum rate with a none power control case in most of the cell area.

400 citations


Patent
31 Jul 2009
TL;DR: In this article, improved mobile content presentation capabilities are disclosed for mobile communications facilities, such as cell phones, and information relating to the user characteristics associated with a mobile communication facility and other capabilities are employed to improve the presentation and relevance of mobile content.
Abstract: Improved mobile content presentation capabilities are disclosed for mobile communications facilities, such as cell phones. Information relating to the user characteristics associated with a mobile communication facility and other capabilities are employed to improve the presentation and relevance of mobile content to appropriate or desirable mobile communication facilities.

382 citations


Journal ArticleDOI
TL;DR: An introduction to the upcoming IEEE 802.16j amendment is presented and insight is provided about the obstacles that practical system designers face when incorporating relaying into a wireless broadband network.
Abstract: Relaying and cooperation have re-emerged as important research topics in wireless communication over the past half-decade. Although multihop relaying for coverage extension in wireless networks is an old concept, it became practical only recently. Nowhere is this better illustrated than in the IEEE 802.16 working group, which has devoted a task group to incorporating relay capabilities in the foundation of mobile WiMAX-IEEE 802.16e-2005. Currently, this task group is in the process of finishing IEEE 802.16j, the multihop relay specification for 802.16. This amendment will be fully compatible with 802.16e-2005 mobile and subscriber stations, but a BS specific to 802.16j will be required for relays to operate. This article presents an introduction to the upcoming IEEE 802.16j amendment and provides insight about the obstacles that practical system designers face when incorporating relaying into a wireless broadband network.

361 citations


Proceedings ArticleDOI
19 Apr 2009
TL;DR: This work defines a global fairness objective and proves that the corresponding optimization problem can be solved by gradient descent and is the first to address these two aspects of the distribution of dynamic content over a mobile social network.
Abstract: We study the dissemination of dynamic content, such as news or traffic information, over a mobile social network. In this application, mobile users subscribe to a dynamic-content distribution service, offered by their service provider. To improve coverage and increase capacity, we assume that users share any content updates they receive with other users they meet. We make two contributions. First, we determine how the service provider can allocate its bandwidth optimally to make the content at users as "fresh" as possible. More precisely, we define a global fairness objective (namely, maximizing the aggregate utility over all users) and prove that the corresponding optimization problem can be solved by gradient descent. Second, we specify a condition under which the system is highly scalable: even if the total bandwidth dedicated by the service provider remains fixed, the expected content age at each user grows slowly (as log(n)) with the number of users n. To the best of our knowledge, our work is the first to address these two aspects (optimality and scalability) of the distribution of dynamic content over a mobile social network.

330 citations


Journal ArticleDOI
TL;DR: A VHO decision algorithm is developed that enables a wireless access network to not only balance the overall load among all attachment points but also maximize the collective battery lifetime of mobile nodes (MNs) and maintain load balancing.
Abstract: There are currently a large variety of wireless access networks, including the emerging vehicular ad hoc networks (VANETs). A large variety of applications utilizing these networks will demand features such as real-time, high-availability, and even instantaneous high-bandwidth in some cases. Therefore, it is imperative for network service providers to make the best possible use of the combined resources of available heterogeneous networks (wireless area networks (WLANs), Universal Mobile Telecommunications Systems, VANETs, Worldwide Interoperability for Microwave Access (WiMAX), etc.) for connection support. When connections need to migrate between heterogeneous networks for performance and high-availability reasons, seamless vertical handoff (VHO) is a necessary first step. In the near future, vehicular and other mobile applications will be expected to have seamless VHO between heterogeneous access networks. With regard to VHO performance, there is a critical need to develop algorithms for connection management and optimal resource allocation for seamless mobility. In this paper, we develop a VHO decision algorithm that enables a wireless access network to not only balance the overall load among all attachment points (e.g., base stations and access points) but also maximize the collective battery lifetime of mobile nodes (MNs). In addition, when ad hoc mode is applied to 3/4G wireless data networks, VANETs, and IEEE 802.11 WLANs for a more seamless integration of heterogeneous wireless networks, we devise a route-selection algorithm for forwarding data packets to the most appropriate attachment point to maximize collective battery lifetime and maintain load balancing. Results based on a detailed performance evaluation study are also presented here to demonstrate the efficacy of the proposed algorithms.

311 citations


Book
Xinheng Wang1
02 Mar 2009
TL;DR: In this article, the authors proposed a wireless mesh network (WMN) which combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network.
Abstract: Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.

308 citations


Journal ArticleDOI
TL;DR: This low-cost indoor navigation system runs on off-the-shelf camera phones and uses built-in cameras to determine user location in real time by detecting unobtrusive fiduciary markers, enabling quick deployment in new environments.
Abstract: This low-cost indoor navigation system runs on off-the-shelf camera phones. More than 2,000 users at four different large-scale events have already used it. The system uses built-in cameras to determine user location in real time by detecting unobtrusive fiduciary markers. The required infrastructure is limited to paper markers and static digital maps, and common devices are used, facilitating quick deployment in new environments. The authors have studied the application quantitatively in a controlled environment and qualitatively during deployment at four large international events. According to test users, marker-based navigation is easier to use than conventional mobile digital maps. Moreover, the users' location awareness in navigation tasks improved. Experiences drawn from questionnaires, usage log data, and user interviews further highlight the benefits of this approach.

Journal ArticleDOI
TL;DR: The case of mobile phones as a tool in solving development problems drawing from the evidence of ICT4D supported projects was evaluated in this article, where 20 projects were analyzed by theme in order to provide a thematic overview as well as a comparative analysis of the development role of mobile phone.
Abstract: In the context of the rapid growth of mobile phone penetration in developing countries, mobile telephony is currently considered to be particularly important for development. Yet, until recently, very little systematic evidence was available that shed light on the developmental impacts of mobile telecommunication. The Information and Communication Technology for Development (ICT4D) program of the International Development Research Centre (IDRC), Canada, has played a critical role in filling some of the research gaps through its partnerships with several key actors in this area. The objective of this paper is to evaluate the case of mobile phones as a tool in solving development problems drawing from the evidence of IDRC supported projects. IDRC has supported around 20 projects that cut across several themes such as livelihoods, poverty reduction, health, education, the environment and disasters. The projects will be analyzed by theme in order to provide a thematic overview as well as a comparative analysis of the development role of mobile phones. In exploring the evidence from completed projects as well as the foci of new projects, the paper summarizes and critically assesses the key findings and suggests possible avenues for future research.

Patent
23 Jun 2009
TL;DR: In this article, the authors proposed a mobile communication method in which a mobile station performs a handover from a handoff source radio base station to a hand over target radio BS, which includes the steps of acquiring, at the handover target radio base stations, from a switching center, a key for calculating a first key for generating a certain key used in a communication between the target radio station and the mobile station.
Abstract: The present invention relates to a mobile communication method in which a mobile station performs a handover from a handover source radio base station to a handover target radio base station. The mobile communication method includes the steps of: (A) acquiring, at the handover target radio base station, from the handover source radio base station or a switching center, a key for calculating a first key for generating a certain key used in a communication between the handover target radio base station and the mobile station; and (B) acquiring, at the handover target radio base station, from the switching center, a second key for calculating a first key for generating a certain key used in a communication between a next handover target radio base station and the mobile station.

Patent
09 Mar 2009
TL;DR: In this article, the authors present improved capabilities for aggregating user behavioral data across multiple wireless operators and delivering content to a mobile communication facility based on that aggregation, among other factors.
Abstract: The present application discloses improved capabilities for aggregating user behavioral data across multiple wireless operators and delivering content to a mobile communication facility based on that aggregation, among other factors.

Journal ArticleDOI
TL;DR: Two types of traffic status-estimation algorithms, i.e., the link-based and the vehicle-based, are introduced and analyzed and the results show that estimations of the traffic status based on imperfect data are reasonably accurate.
Abstract: Vehicle-based sensors can be used for traffic monitoring. These sensors are usually set with long sampling intervals to save communication costs and to avoid network congestion. In this paper, we are interested in understanding the traffic-monitoring performance that we can expect from such vehicle-based mobile sensor networks, despite the incomplete information provided. This is a fundamental problem to be addressed. A performance evaluation has been carried out in Shanghai, China, by utilizing the vehicle-based sensors installed in about 4000 taxies. Two types of traffic status-estimation algorithms, i.e., the link-based and the vehicle-based, are introduced and analyzed. The results show that estimations of the traffic status based on these imperfect data are reasonably accurate. Therefore, the feasibility of such an application is demonstrated.

Proceedings ArticleDOI
13 Sep 2009
TL;DR: A power efficient transceiver will be developed that adapts to changing traffic load for an energy efficient operation in mobile radio systems and will enable a sustainable increase of mobile data rates.
Abstract: EARTH is a major new European research project starting in 2010 with 15 partners from 10 countries. Its main technical objective is to achieve a reduction of the overall energy consumption of mobile broadband networks by 50%. In contrast to previous efforts, EARTH regards both network aspects and individual radio components from a holistic point of view. Considering that the signal strength strongly decreases with the distance to the base station, small cells are more energy efficient than large cells. EARTH will develop corresponding deployment strategies as well as management algorithms and protocols on the network level. On the component level, the project focuses on base station optimizations as power amplifiers consume the most energy in the system. A power efficient transceiver will be developed that adapts to changing traffic load for an energy efficient operation in mobile radio systems. With these results EARTH will reduce energy costs and carbon dioxide emissions and will thus enable a sustainable increase of mobile data rates.

Patent
11 Mar 2009
TL;DR: In this article, a system for providing a mobile application includes a Mobile Subscriber Detection Authorization and Verification System (MSDAVS), to request and receive confidential information from a confidential information owner relating to a user who opted-in to a mobile service application, and to communicate the received confidential information to the mobile application service provider.
Abstract: A system for providing a mobile application includes a Mobile Subscriber Detection Authorization and Verification System (MSDAVS), to request and receive confidential information from a confidential information owner relating to a user who opted-in to a mobile service application, and to communicate the received confidential information to a mobile application service provider. The MSDAVS can include an opt-in database, to store opt-in or registration data of the opted-in users of the mobile service application and a service policy database. The mobile application service can be a mobile traffic alerting service, the confidential information owner a telephone number database of one of a wireless carrier or a telephone number database operator, and the requested confidential information a list telephone numbers of opted-in users in an alert area, defined by the mobile traffic alerting service.

Patent
28 Aug 2009
TL;DR: In this paper, a system, method, and computer program product of automatically connecting a mobile communication device to a communication network using a network resource classification database includes detecting a communication access point using the mobile communication devices and reporting network attributes associated with the access point to a resource classification server.
Abstract: A system, method, and computer program product of automatically connecting a mobile communication device to a communication network using a network resource classification database includes detecting a communication network access point using the mobile communication device and reporting network attributes associated with the access point to a resource classification server. The server analyzes and stores the network attributes, determines auxiliary data related to the access point, and uses a rules database to determine a category identifier associated with the access point. The server creates a resource classification characterizing the access point based upon the network attributes, auxiliary data, and category identifier. The mobile communication device queries the server, receives a resource classification, and connects to an access point based upon the received resource classification.

Patent
19 Jun 2009
TL;DR: In this article, a method of presenting voicemail to a user establishes communication with a mobile communication device, which includes receiving a plurality of spoken letters corresponding to a spelling of at least a portion of a contact name and identifying a contact and associated contact information.
Abstract: A method of initiating a communication from a mobile communication device includes receiving a plurality of spoken letters corresponding to a spelling of at least a portion of a contact name and identifying a contact and associated contact information from a database associated with a mobile communication device in response to the spoken letters. A communication to the contact is initiated from the mobile communication device using the associated contact information. A method of presenting voicemail to a user establishes communication with a mobile communication device. A first voicemail box is checked for messages, the first voicemail box being associated with the mobile communication device. A second voicemail box is checked for messages, the second voicemail box being associated with a second communication device. At least one voicemail message received from at least one of the first and second voicemail boxes is presented to a user via a single interface.

Journal ArticleDOI
TL;DR: Growth in the number of mobile users, coupled with the strong uptake of wireless broadband services, is driving high transport capacity requirements among cellular networks, however, revenues are not scaling linearly with increases in traffic.
Abstract: Growth in the number of mobile users, coupled with the strong uptake of wireless broadband services, is driving high transport capacity requirements among cellular networks. However, revenues are not scaling linearly with increases in traffic. Demand for optimizing the cost efficiency of backhaul is becoming as critical as investment in the radio infrastructure. As a result, new transmission technologies, topologies, and network architectures are emerging in an attempt to ease the backhaul cost and capacity crunch.

Journal ArticleDOI
Sassan Ahmadi1
TL;DR: This tutorial describes the prominent technical features of IEEE 802.16m and the potential for successful deployment of the next generation of mobile WiMAX in 2011+.
Abstract: The growing demand for mobile Internet and wireless multimedia applications has motivated the development of broadband wireless access technologies in recent years. Mobile WiMAX has enabled convergence of mobile and fixed broadband networks through a common wide-area radio-access technology and flexible network architecture. Since January 2007, the IEEE 802.16 working group has been developing a new amendment of the IEEE 802.16 standard (i.e., IEEE 802.16m) as an advanced air interface to meet the requirements of ITU-R/IMT-advanced for 4G systems, as well as for the next-generation mobile network operators. Depending on the available bandwidth and multi-antenna mode, the next-generation mobile WiMAX will be capable of over-the-air data-transfer rates in excess of 1 Gb/s and of supporting a wide range of high-quality and high-capacity IP-based services and applications while maintaining full backward compatibility with the existing mobile WiMAX systems to preserve investments and continuing to support first-generation products. This tutorial describes the prominent technical features of IEEE 802.16m and the potential for successful deployment of the next generation of mobile WiMAX in 2011+.

Proceedings ArticleDOI
29 Aug 2009
TL;DR: This study is the first large-scale quantitative analysis of a real-world commercial LSN service and presents results of data analysis over user profiles, update activities, mobility characteristics, social graphs, and attribute correlations.
Abstract: Location-based Social Networks (LSNs) allow users to see where their friends are, to search location-tagged contentwithin their social graph, and to meet others nearby. The recent availability of open mobile platforms, such as Apple iPhones and Google Android phones, makes LSNs much more accessible to mobile users.To study how users share their location in real world, wecollected traces from a commercial LSN service operated by astartup company. In this paper, we present results of data analysis over user profiles, update activities, mobility characteristics, social graphs, and attribute correlations. To the best of our knowledge, this study is the first large-scale quantitative analysis of a real-world commercial LSN service.

Proceedings ArticleDOI
16 Mar 2009
TL;DR: Through the testing approach, this paper was able to identify a number of previously unknown vulnerabilities, some of which can be exploited for spoofing of tag content, an NFC-based worm, and for Denial-of-Service attacks.
Abstract: Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phones. The situation is critical because NFC is mostly used in the area of payment and ticketing. This paper presents our approach to security testing of NFC-enabled mobile phones. Our approach takes into account not only the NFC-subsystem but also software components that can be controlled through the NFC-interface. Through our testing approach, we were able to identify a number of previously unknown vulnerabilities, some of which can be exploited for spoofing of tag content, an NFC-based worm, and for Denial-of-Service attacks. We further show that our findings can be applied to real world NFC-services.

Book ChapterDOI
01 Oct 2009
TL;DR: VirusMeter is proposed, a novel and general malware detection method, to detect anomalous behaviors on mobile devices and can effectively detect these malware activities with less than 1.5% additional power consumption in real time.
Abstract: Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growing popularity of mobile devices in the last few years, attacks targeting them are also surging. Existing mobile malware detection techniques, which are often borrowed from solutions to Internet malware detection, do not perform as effectively due to the limited computing resources on mobile devices. In this paper, we propose VirusMeter, a novel and general malware detection method, to detect anomalous behaviors on mobile devices. The rationale underlying VirusMeter is the fact that mobile devices are usually battery powered and any malicious activity would inevitably consume some battery power. By monitoring power consumption on a mobile device, VirusMeter catches misbehaviors that lead to abnormal power consumption. For this purpose, VirusMeter relies on a concise user-centric power model that characterizes power consumption of common user behaviors. In a real-time mode, VirusMeter can perform fast malware detection with trivial runtime overhead. When the battery is charging (referred to as a battery-charging mode), VirusMeter applies more sophisticated machine learning techniques to further improve the detection accuracy. To demonstrate its feasibility and effectiveness, we have implemented a VirusMeter prototype on Nokia 5500 Sport and used it to evaluate some real cellphone malware, including FlexiSPY and Cabir. Our experimental results show that VirusMeter can effectively detect these malware activities with less than 1.5% additional power consumption in real time.

Journal ArticleDOI
TL;DR: The results reveal the following order of significance for small variations in hand parameters: position of index finger; distance between phone case and palm; 3) position of the other fingers; 4) size of the hand; 5) dielectric parameters; 6) wrist length and tilt.
Abstract: With the continuous trend to smaller mobile devices with more functionality and more wireless bands, the possible insufficient over-the-air (OTA) becomes a growing concern for service providers. In addition to reduced radiation efficiency by smaller antennas in smaller phones, the head and in particular the hand may further impair radiation performance. The aim of this paper is to investigate the influence of the various parameters of the hand upon the OTA performance criteria to support the standardization process of the hand phantom and to provide the tools for optimization of handheld transmitters. The results reveal the following order of significance for small variations in hand parameters: 1) position of index finger; 2) distance between phone case and palm; 3) position of the other fingers; 4) size of the hand; 5) dielectric parameters; 6) wrist length and tilt. Some configurations may lead to a slight increase of the peak spatial SAR in the head. OTA assessment without the hand does not provide a good measure of phone performance in real life. However, good reproducibility of evaluations requires a precise definition of the hand, in particular its geometry and the phone position within the hand.

Journal ArticleDOI
TL;DR: An in-depth review of service discovery protocols (SDPs) in multihop mobile ad hoc networks analyzes SDP building blocks and determines SDP suitability based on architecture, mobility, and network size.
Abstract: An in-depth review of service discovery protocols (SDPs) in multihop mobile ad hoc networks analyzes SDP building blocks and determines SDP suitability based on architecture, mobility, and network size. Mobile ad hoc networks (manets) include a variety of devices, such as cell phones, PDAs, laptops, and other relatively larger devices. These devices can move at high or low speeds or even remain stationary, entering and leaving the system when switched on or off. Such a variety of devices also offers a variety of services. A service is any tangible or intangible facility a device provides that can be useful for any other device. Services comprise those for software and hardware. A software service, for example, can be a simple file, such as an MP3 file, or a software implementation of an algorithm, such as converting one audio file format to another. A hardware service, for example, can be a printer that a mobile device can use wirelessly. To benefit from these services, a device must be able to both locate them in the network and invoke them. Service discovery protocols (SDPs) enable these capabilities.

Proceedings ArticleDOI
19 Apr 2009
TL;DR: This chapter proposes a counter-mechanism to contain the propagation of a mobile worm at the earliest stage by patching an optimal set of selected phones by partitioning the social relationship graph via balanced and clustered partitioning.
Abstract: Recently, cellular phone networks have begun allowing third-party applications to run over certain open-API phone operating systems such as Windows Mobile, Iphone and Google’s Android platform. However, with this increased openness, the fear of rogue programs written to propagate from one phone to another becomes ever more real. This chapter proposes a counter-mechanism to contain the propagation of a mobile worm at the earliest stage by patching an optimal set of selected phones. The counter-mechanism continually extracts a social relationship graph between mobile phones via an analysis of the network traffic. As people are more likely to open and download content that they receive from friends, this social relationship graph is representative of the most likely propagation path of a mobile worm. The counter-mechanism partitions the social relationship graph via two different algorithms, balanced and clustered partitioning and selects an optimal set of phones to be patched first as those have the capability to infect the most number of other phones. The performance of these partitioning algorithms is compared against a benchmark random partitioning scheme. Through extensive trace-driven experiments using real IP packet traces from one of the largest cellular networks in the US, we demonstrate the efficacy of our proposed counter-mechanism in containing a mobile worm.

Journal ArticleDOI
J. Sydir1, Rakesh Taori2
TL;DR: The relay station is introduced and the place it is likely to carve out for itself in the traditional cellular architecture and the important economic and performance benefits relay stations could potentially offer, and a few scenarios where relays are likely to be deployed in the beginning are outlined.
Abstract: Shrinking cell sizes, primarily a result of keeping up with the increasing demand for higher data rates, are stretching thin the notion of our traditional cellular system architecture. More and more base stations are serving smaller and smaller areas (cells) which in effect is driving up deployment costs. The option of deploying relay stations is increasingly beginning to look like a solution to the problem of providing a cost-effective way to extend the coverage and capacity in a cellular network. A relay station can be used to extend the point-to-multipoint link between the base station and mobile stations. Relay stations connect to the base stations without wires and are expected to be deployed to cover smaller geographic areas. Primarily the deployment costs but also the equipment costs are expected to be substantially lower than those of base stations. In this article we first introduce the relay station and discuss the place it is likely to carve out for itself in the traditional cellular architecture. We highlight the important economic and performance benefits relay stations could potentially offer, and outline a few scenarios where relays are likely to be deployed in the beginning. The multihop relay standard developed by the IEEE 802.16 working group is then used as a basis to provide an overview of the relay-enhanced cellular architecture and the key choices that can be made in developing relay support within a cellular system - a precursor to what can be expected in later releases of the Mobile WiMAX system. Finally, we discuss some future directions in the development of relay systems.

Patent
23 Dec 2009
TL;DR: In this article, a mobile communication terminal communicates with a central node to provide automatically synchronization of user content stored on a mobile device with content stored at the central node, such as at a synchronization server.
Abstract: A mobile communication terminal communicates with a central node to provide automatically synchronization of user content stored on a mobile device with user content stored at a central node, such as at a synchronization server. In this way, automatic two-way synching may be provided, the user may monitor, view, update, change, add to or delete all or any field of user content using a web interface stored for a mobile device at a central node such as at a synchronization server cloud or data storage cloud, using a remote device, including an off-line device. Current location of the mobile terminal may also be tracked at the central node.

Proceedings ArticleDOI
17 May 2009
TL;DR: Results of power and energy consumption measurements conducted on mobile phones for 2G and 3G networks for text messaging and voice services imply that mobile phones should switch the network in dependency of the service used to save the maximum amount of energy.
Abstract: Over the last years mobile phones had a remarkable evolution. From a simple device for voice communication, it became a full blown multimedia device with multiple features and appealing services. In parallel with the introduction of novel services, mobile devices became more and more energy-hungry reducing the operational time for the user. To extend the battery life of mobile phones is one of the top priorities for mobile phones' manufacturers. This paper presents results of power and energy consumption measurements conducted on mobile phones for 2G and 3G networks. The services under investigation were text messaging, voice and data. The paper reports larger energy consumption in 3G networks for text messaging and voice services than energy consumption in 2G networks. On the other side the 3G networks become more energy friendly when large volumes of data have to be downloaded. The results imply that mobile phones should switch the network in dependency of the service used to save the maximum amount of energy. As this handover consumes energy, we include its analysis in our measurements.