scispace - formally typeset
Search or ask a question

Showing papers on "UMTS frequency bands published in 2004"


Journal ArticleDOI
TL;DR: The proposed SCTP-based vertical handover scheme does not require the addition of components such as home/foreign agents or a SIP server to existing networks and provides a network-independent solution preferred by service providers.
Abstract: This article proposes a new method to facilitate seamless vertical handover between wide area cellular data networks such as UMTS and WLANs using the stream control transmission protocol (SCTP). The multihoming capability and dynamic address configuration extension of SCTP are applied in UMTS/WLAN overlay architecture to decrease handover delay and improve throughput performance. Unlike techniques based on mobile IP or session initiation protocol, the SCTP-based vertical handover scheme does not require the addition of components such as home/foreign agents or a SIP server to existing networks. Therefore, the proposed scheme provides a network-independent solution preferred by service providers. Performance evaluations are presented to demonstrate the effectiveness of the proposed scheme.

262 citations


Proceedings ArticleDOI
06 Jun 2004
TL;DR: A commuter mobile access router infrastructure that exploits wireless diversity (e.g. channel diversity, network diversity, and technology diversity) to provide improved data performance for wireless data users and improves the end-user experience of web-browsing and streaming applications by a factor of 2.8 and 4.4 respectively.
Abstract: We introduce MAR, a commuter mobile access router infrastructure that exploits wireless diversity (e.g. channel diversity, network diversity, and technology diversity) to provide improved data performance for wireless data users. Our system design stems from the observation that rather than choosing a single wireless service provider (e.g. Sprint, AT&T, BT, Vodafone), a single technology (e.g. GPRS, UMTS, CDMA, 802.11), or a single wireless channel, users can obtain significant benefits by using the multiplicity of choices available. MAR is a wireless multi-homed device that can be placed in moving vehicles (e.g. car, bus, train) to enable high-speed data access. MAR dynamically instantiates new channels based on traffic demand, aggregates the bandwidth and dynamically shifts load from poor quality to better quality channels. MAR, thus, provides a faster, more stable, and reliable communication channel to mobile users.We have implemented and tested the MAR system in our testbed which spans the networks of three different cellular providers. Through our experiments we have performed a detailed evaluation to quantify the benefits of MAR for different protocols and applications. For example, even in highly mobile environments, MAR, on average, improves the end-user experience of web-browsing and streaming applications by a factor of 2.8 and 4.4 respectively. Our results show that significant benefits can be obtained by exploiting the diversity in coverage offered by many cellular operators, different technology networks (e.g. GPRS, CDMA), and diverse wireless channels.

243 citations


Proceedings ArticleDOI
01 Oct 2004
TL;DR: A man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies, is presented, showing that an attacker can mount an impersonation attack since GSM base stations do not support integrity protection.
Abstract: In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows an intruder to impersonate a valid GSM base station to a UMTS subscriber regardless of the fact that UMTS authentication and key agreement are used. As a result, an intruder can eavesdrop on all mobile-station-initiated traffic.Since the UMTS standard requires mutual authentication between the mobile station and the network, so far UMTS networks were considered to be secure against man-in-the-middle attacks. The network authentication defined in the UMTS standard depends on both the validity of the authentication token and the integrity protection of the subsequent security mode command.We show that both of these mechanisms are necessary in order to prevent a man-in-the middle attack. As a consequence we show that an attacker can mount an impersonation attack since GSM base stations do not support integrity protection. Possible victims to our attack are all mobile stations that support the UTRAN and the GSM air interface simultaneously. In particular, this is the case for most of the equipment used during the transition phase from 2G (GSM) to 3G (UMTS) technology.

240 citations


Journal ArticleDOI
TL;DR: In this paper, an internal planar inverted-F antenna (PIFA) is presented for the GSM, DCS, PCS, UMTS, HIPERLAN/2 and IEEE 802.11a bands within 2.5:1 voltage standing wave ratio.
Abstract: A novel internal planar inverted-F antenna (PIFA) suitable for handset terminals is presented. The structure combines shorted parasitic patches, capacitive loads and slots to achieve multiband operation. This compact antenna operates in the GSM, DCS, PCS, UMTS, HIPERLAN/2 and IEEE 802.11a bands within 2.5:1 voltage standing wave ratio (VSWR) and with good efficiency.

136 citations


Journal ArticleDOI
TL;DR: This paper analyzes the handoff performance of SIP in a IP-based 4G network with Universal Mobile Telecommunication System (UMTS) and Wireless LAN (WLAN) access networks and shows that the minimum delay is unacceptable for streaming multimedia traffic and requires the deployment of soft-handoff techniques.

113 citations


Proceedings ArticleDOI
05 Sep 2004
TL;DR: To protect UMTS connections from GSM attacks by integrating an additional authentication and key agreement on intersystem handovers between GSM and UMTS.
Abstract: GSM suffers from various security weaknesses: Just recently, Barkan, Biham and Keller presented a ciphertext-only attack on the GSM encryption algorithm A5/2 which recovers the encryption key from a few dozen milliseconds of encrypted traffic within less than a second Furthermore, it is well-known that it is possible to mount a man-in-the-middle attack in GSM during authentication which allows an attacker to make a victim mobile station authenticate itself to a fake base station which in turn forwards the authentication traffic to the real network, thus impersonating the victim mobile station to a real network and vice versa We discuss the impact of GSM encryption attacks, that recover the encryption key, and the man-in-the-middle attack on the security of networks, which employ UMTS and GSM base stations simultaneously We suggest to protect UMTS connections from GSM attacks by integrating an additional authentication and key agreement on intersystem handovers between GSM and UMTS

112 citations


Patent
Peter Randall1, Amardiya Sesmun1
27 Feb 2004
TL;DR: In this article, the authors propose an infrastructure element that allocates wireless resources to one of a plurality of wireless communication units (112-116) dependent upon an operational state of the wireless communication unit.
Abstract: A Wireless communication s stem (100, 200) Comprises an infrastructure element that allocates wireless resources to one of a plurality of wireless communication units (112-116) dependent upon an operational state of the wireless communication unit. The infrastructure element transitions the wireless communication unit between a plurality of operational states based on a variable, service or quality of service accessed by the wireless communication unit. The transitional, preferably, used in a Radio Resource Controller (RRC) state model, are based on the QoS class of the service that, the communication unit is using. An improvement in signalling load results from reduced signalling procedures required for mobility management, session management and RRC connection management.

104 citations


Patent
14 Oct 2004
TL;DR: In this article, the authors present a method and apparatus for enabling a wireless terminal to communicate the dual-mode capabilities and reporting the interworking capabilities of the two networks with which the wireless terminal has the added capability of obtaining services from either one of the inter working networks.
Abstract: Method and apparatus for enabling a wireless terminal to communicate the dual-mode capabilities and reporting the interworking capabilities of the two networks with which the wireless terminal have the added capability of obtaining services from either one of the interworking networks.

84 citations


Journal ArticleDOI
TL;DR: In this article, an efficient integration of global positioning system (GPS) and universal mobile telecommunication system (UMTS) radio front-end units is presented, which includes the transmitter and receiver filters, duplex filter, power amplifier, buck regulator, and power detector.
Abstract: An efficient integration of global positioning system (GPS) and universal mobile telecommunication system (UMTS) radio front-end units is presented. The combined front-end unit includes the transmitter and receiver filters, duplex filter, power amplifier, buck regulator, and power detector for the UMTS wireless code-division multiple-access system. The GPS building blocks of the radio front-end unit consist of the low-noise amplifier and RF filter. The inter-system isolation was experimentally quantified and the compared against the minimum inter-system isolation requirements, defined according to desensitization and intermodulation tests in the GPS receiver. The characterized isolation of the antenna array provided 6 dB of margin over the minimum inter-system isolation requirements for 3-dB degradation of the carrier-to-noise ratio in GPS receivers. The UMTS portion of the radio front-end unit was verified against the Third-Generation Partnership Project standard.

76 citations


Patent
18 Aug 2004
TL;DR: In this paper, the authors propose a method and apparatus for selecting cells in a mobile telecommunications system, the system comprising a network of a plurality of cells of a Universal Mobile Telecommunications Systems (UMTS) and an RAT, the method comprising, at a user equipment device: when in UMTS mode, flagging in a neighbouring cell list stored on the UEs information for a cell of a second RAT which is known to be unsuitable for selection.
Abstract: A method and apparatus for selecting cells in a mobile telecommunications system, the system comprising a network of a plurality of cells of a Universal Mobile Telecommunications Systems (UMTS) and a network of a plurality of cells of a second Radio Access Technology (RAT), the method comprising, at a user equipment device: when in UMTS mode, flagging in a neighbouring cell list stored on the user equipment device information for a cell of a second RAT which is known to be unsuitable for selection. Information from the neighbouring cell list information for the flagged cell may be removed, in particular for a limited period of time.

75 citations


Patent
27 Sep 2004
TL;DR: In this article, the quality of service of received multimedia broadcast multicast service data is controlled by determining the error rate or error ratio of the received service data units in the radio link layer.
Abstract: In a mobile terminal of a wireless communication system, such as UMTS or any future communication system, the quality of service of received multimedia broadcast multicast service data is controlled by determining the error rate or error ratio of the received service data units in the radio link layer. This allows quality of service control for MBMS services received over a PTM transmission.

Book
13 Feb 2004
TL;DR: This book explains the GSM Fundamentals and IP Telephony for UMTS Release 4.9 and Beyond (All-IP) and some of the applications for GPRS/UMTS and discusses the role of net neutrality in this system.
Abstract: About the Authors.1. Introduction.2. Principles of Communications .3. GSM Fundamentals.4. General Packet Radio System.5. IP Applications for GPRS/UMTS.6. Universal Mobile Telecommunications System.7. UMTS Transmission Networks.8. IP Telephony for UMTS Release 4.9. Release 5 and Beyond (All-IP).Glossary of Terms.Index.

BookDOI
01 Jan 2004
TL;DR: In this paper, the authors present a collection of radio network planning tools for wideband code-division multiple access (WCDMA)-based UMTS networks, covering radio configuration, arrangement, and network functionality.
Abstract: This is the second book put together by these editors. The first was Radio Interface System Planning for GSM/ GPRS/UMTS (Springer, 2001), which introduced GSM/GPRS and UMTS mobile networks radio system planning. Jukka Lempiainen of Tampere University of Technology and Matti Manninen of European Communications Engineering, Ltd., describe a practical planning process for wideband code-division multiple access (WCDMA)-based UMTS networks, covering UMTS configuration, arrangement, and network functionality. The book presents many aspects of UMTS radio network planning. It is a collection of work by various authors. The book is divided into eight chapters grouped into three parts which present different aspects. The first part concentrates on UMTS planning configuration and the issue of the UMTS concept. In this part readers are introduced to the world of UMTS and its radio network, radio interface as well as radio and wired part of the system evolution. The configuration planning described by Jarkko Itkonen and Risto Jurva in Chapter 2 deals with configuration of base and mobile stations (including those indoors). Furthermore, it presents power budget calculations for uplink and downlink transmissions in many service configurations. In Chapter 3 Kimmo Kanto describes digital map production and their use in the network planning process (the use of source materials, useful layers, quality of data). The author describes mapping methods, coordinate systems, digital map layers, and quality requirements. In Chapter 4 Hans Ahnlund writes of radio network planning software. He describes the radio network planning tool environment, and design, measurement, and analysis tools. The author finishes this chapter by characterizing management and information tools. The second part of the book focuses on topology planning. In Chapter 5 Jarno Niemelä introduces the principles of the UMTS topology planning (i.e., combined coverage and capacity planning). The topology planning phase includes UMTS site and base station configuration. Finally, radio system simulations of topology planning are discussed. Part 3 of the book describes the UMTS network functionality. In Chapter 6 Matti Manninen thoroughly characterizes the WCDMA radio interface: physical layer, spreading and modulation, radio management, and other parameters for WCDMA radio access. Chapter 7, written by Kai Ojala and Pasi Niemi, describes WCDMA field measurements, which are divided into three categories: measurements in idle mode, in connection establishment, and in connected mode. The last chapter describes different aspects of quality of service measurements for end-to-end testing. The chapter was written by M. Ahokangas, T. Heikkilä, T. Niranen, T. Taipale, and J. Uimonen. The reader will find out about UMTS QoS architecture, measurements, protocol decoding, signaling procedure analysis, and traffic and capacity measurements. Sophisticated protocol analyzers that are basic tools for decoding and analyzing the protocol layers are considered. The book gives practical information on and guidelines for radio planning, optimization, and other useful subjects. The advantage of the book is its detailed description of the actions taken during the planning process. Because the authors work for Nokia, the book gives a lot of practical information. Additionally, it describes NetAct Planner, the Nokia design field measurement and QoS measurement tool. I can recommend UMTS Radio Network Planning, Optimization and QOS Management: For Practical Engineering Tasks to every engineer and researcher interested in this subject. This is a highly informative and valuable book for readers interested in UMTS, especially in radio network planning and optimization.

Proceedings ArticleDOI
26 Sep 2004
TL;DR: Algorithm for optimum assignment of mobiles to a radio technology during call setup as well as during the call is studied based on an approach previously employed to balance the load of distributed computing systems.
Abstract: Currently UMTS networks are rolled out to compliment existing GSM networks. As most UMTS mobiles will also support GSM, the question of which system to select for a given service emerges. In order to exploit the differences between radio access technologies, common radio resource management (CRRM) is employed, i.e. common management of the whole radio resources such that the assignment of mobiles to different radio technologies is flexible and considers the specific advantages of each system. The focus of the paper is on intelligent algorithms to decide the balancing of the load between the different radio technologies. We study algorithms for optimum assignment of mobiles to a radio technology during call setup as well as during the call. The decision is based on an intelligent evaluation of various aspects of the radio link. Our algorithm is based on an approach previously employed to balance the load of distributed computing systems.

Proceedings ArticleDOI
26 Sep 2004
TL;DR: A new statistical propagation model is provided that addresses a number of gaps in the area of peer-to-peer radio channel modelling in an urban microcellular environment and reveals that the standard deviation of shadowing is actually a function of the separation distance between the transmitter and receiver.
Abstract: The paper provides a new statistical propagation model that addresses a number of gaps in the area of peer-to-peer radio channel modelling in an urban microcellular environment. The paper focuses on the 2.1 GHz (UMTS) and 5.2 GHz (HIPERLAN/2 and 802.11a/e/h) bands and makes use of a detailed three-dimensional ray-tracing tool. Propagation analysis reveals that the standard deviation of shadowing is actually a function of the separation distance between the transmitter and receiver. Path loss increases with lower terminal heights, as does the probability of a line-of-sight. Statistical channel models are derived that combine standard parameters, such as separation distance, operating frequency and terminal height, with more advanced and innovative parameters, such as distance dependent shadowing and LOS probability.

Proceedings ArticleDOI
26 Sep 2004
TL;DR: An overview of the physical layer aspects of HSDPA is provided and the improvements in sector and user throughput (with respect to release-99 UMTS) resulting from H SDPA with joint scheduling and resource allocation are discussed.
Abstract: High speed downlink packet access (HSDPA) technology was standardized for 3GPP W-CDMA release-5. HSDPA includes advanced techniques such as adaptive modulation and coding (AMC), hybrid ARQ (HARQ), and fast scheduling. HSDPA can deliver a 3/spl times/ increase in sector and a 6/spl times/ increase in user throughput for some traffic models. Additionally HSDPA can support almost a 4/spl times/ increase in the number of users compared to UMTS release-99 for the same service. With advanced receivers, HSDPA can support broadband quality service with 60 users per site. This paper provides an overview of the physical layer aspects of HSDPA and discusses the improvements in sector and user throughput (with respect to release-99 UMTS) resulting from HSDPA with joint scheduling and resource allocation.

Proceedings ArticleDOI
20 Jun 2004
TL;DR: A new modelling approach is proposed that directly accounts system capacity and it is shown that the resulting optimization problems of WLAN coverage planning can be seen as extensions of the classical set covering or maximum coverage problems.
Abstract: Wireless local area networks (WLANs) are spreading all over the planet with impressive speed and market penetration. They will replace traditional indoor wired local networks and allow flexible access outdoor, eventually competing with classical cellular systems (GSM, GPRS, UMTS, etc.) in the provision of wireless services. Although the small systems currently installed are planned using rules of thumb, their rapid spread and size increase requires quantitative methods to determine proper access points (AP) positioning. Previously proposed approaches to the coverage planning neglect the effect of the IEEE802.11 access mechanism, which limits system capacity when access points coverage areas overlap. Here we propose a new modelling approach that directly accounts system capacity and show that the resulting optimization problems of WLAN coverage planning can be seen as extensions of the classical set covering or maximum coverage problems. We present and discuss different formulations based on quadratic and hyperbolic objective functions and report some preliminary results on synthetic instances we generated.

Patent
Francesco Meago1
23 Mar 2004
TL;DR: In this article, the authors proposed a method for multicast service delivering through the UMTS and GSM networks, in which a certain amount of physical resources are reserved in all the system for the IS-MBMS services; not real-time services can be transmitted on the reserved resources when not used by the ISMBMS ones.
Abstract: The method concerns multicast service delivering through the UMTS and GSM networks. For this aim is given higher priority to an opportune subset of all the real-time services with guaranteed bandwidth transmissible by the network. This subset is named IS-MBMS (Immediate Streaming-Multimedia Broadcast Multicast Service). A certain amount of physical resources is reserved in all the system for the IS-MBMS services; not real-time services can be transmitted on the reserved resources when not used by the IS-MBMS ones. The reserved resources allow for transmitting the IS-MBMS services with minimum bit-rate, at least. The network announces in the service area that an IS-MBMS content becomes available; in reply one or more subscribed users transmit a request for joining a multicast group for that service. The network transmits a notification message on a multicast channel to give to the joined users useful information of how get the announced service, i.e.: Service-Id, RB parameters, etc. The IS-MBMS content is transmitted immediately on a point-to-multipoint channel set-up in each involved cells, even if there are zero recipients in the cell. Content is transmitted in parallel in different cells, leading to service continuity, and the mobile station can perform soft combining. During the IS-MBMS content delivery the network can count in each involved cell the number of subscribed users joined to the transmitted IS-MBMS service. The network switches from point-to-multipoint to point-to-point or to no transmission depending on the result of counting and on a fixed threshold. Alternatively the network, parallel to the content delivery, can execute a checking procedure to see if there are joined users in a cell: in this case the point-to-multipoint channel is switched to no transmission (fig. 3 ).

Journal ArticleDOI
TL;DR: The characteristics of universal mobile telecommunications system (UMTS) signals are outlined and the signal parameters with respect to their possible biological relevance are discussed in order to define a generic UMTS test signal (GUS) for experiments aiming at the investigation of biological effects of weak electromagnetic fields.
Abstract: This report outlines the characteristics of universal mobile telecommunications system (UMTS) signals and discusses the signal parameters with respect to their possible biological relevance in order to define a generic UMTS test signal (GUS) for experiments aiming at the investigation of biological effects of weak electromagnetic fields. The GUS includes features of a real UMTS signal and especially the characteristics of UMTS, which differ from those of already applied second generation mobile communication systems (GSM 900, DCS1800, PCS1900, IS-95). It has been specified on the basis of the recommendations of a working group of the German Forschungsgemeinschaft Funk (FGF) with a focus on the mechanisms of UMTS which are responsible for slow term signal contributions, i.e., low frequency variations of the radio frequency (RF) envelope, since the hypothetical possibility of biological relevance of weak electromagnetic fields is often attributed to time variations of the RF envelope with frequencies close to those of natural processes. In this respect, it is also shown that the mandatory power control loop in UMTS gives rise to very strong 1.5 kHz variations on the air interface. Based upon the concept of the GUS, a UMTS test signal generator (GUS6960S) is described.

Journal ArticleDOI
TL;DR: New space-time block coding schemes for multiple transmit and receive antennas, motivated by utilization in UMTS, are proposed, offering a continuous trade-off between quality of service (QoS) and data rate.
Abstract: New space-time block coding schemes for multiple transmit and receive antennas are proposed. First, the well-known Alamouti scheme is extended to NT = 2m transmit antennas achieving high transmit diversity. Many receiver details are worked out for four and eight transmit antennas. Further, solutions for arbitrary, even numbers (NT = 2k) of transmit antennas are presented achieving decoding advantages due to orthogonalization properties while preserving high diversity. In a final step, such extended Alamouti and BLAST schemes are combined, offering a continuous trade-off between quality of service (QoS) and data rate. Due to the simplicity of the coding schemes, they are very well suited to operate under UMTS with only very moderate modifications in the existing standard. The number of supported antennas at transmitter alone is a sufficient knowledge to select the most appropriate scheme. While the proposed schemes are motivated by utilization in UMTS, they are not restricted to this standard.

Journal ArticleDOI
TL;DR: An auction-based mechanism for nearly consistent reservation of the resources of a UMTS (or GPRS) network by the users that value them the most, in order to satisfy the longer time scale requirements of their service sessions, is defined.
Abstract: We consider UMTS networks in which users request services other than telephony that last for long time intervals: e.g., video clips that last for several minutes. The duration of network time-slots over which resource units are allocated is much shorter. This complicates consistent reservation of resources over longer time scales, where consistent reservation is required to ensure that service quality is constant throughout the entire service session. In this paper, we define an auction-based mechanism for nearly consistent reservation of the resources of a UMTS (or GPRS) network by the users that value them the most, in order to satisfy the longer time scale requirements of their service sessions. Each of these sessions has a fixed target bit-rate. The mechanism is based on a series of Generalized Vickrey Auctions and a set of predefined user utility functions that we propose. Bidding is performed automatically on behalf of the users on the basis of each user's selection of one of these utility functions and his declaration of a total willingness to pay. We argue that under our mechanism the user does not have a clear incentive of not performing a truthful selection of a bidding function according to his own utility. The utility functions we define express appropriately the preferences of the users with respect to the resource allocation pattern in the cases where perfectly consistent allocation cannot be attained. We also provide a mapping of these functions to the UMTS service classes. The effectiveness of our resource reservation mechanism is demonstrated by means of experiments. It appears that most of the users either are served very satisfactorily or essentially are not served at all. The mechanism is implemented at the network base station, and is applicable in practical cases of networks with large numbers of users whose sessions last for many slots.

Patent
10 Sep 2004
TL;DR: In this article, a method for managing radio resources in a mobile communications network having a plurality of cells, wherein the radio resources are managed by plurality of radio resources management procedures arranged for having available at least one maximum downlink total load value representative of the maximum total load level of each cell of the network; and for measuring at least 1 uplink load value and at least current downlink overall load value of each node in each cell.
Abstract: A method for managing radio resources in a mobile communications network having a plurality of cells, wherein the radio resources are managed by a plurality of radio resources management procedures arranged for having available at least one maximum downlink total load value representative of the maximum total load level of each cell of the network; and for measuring at least one uplink load value and at least one current downlink total load value of each cell of the network. The method includes the steps of defining at least two status parameters including a first status parameter or load status parameter adapted to reach a first set of status ranges, depending on the measured uplink load value and the current downlink total load value; a second status parameter or packet congestion flag adapted to reach a second set of status ranges, depending upon reaching of a congestion status in a packet management procedure; and adopting different sets of managing strategies associated with the radio resources management procedures of the network as a function of the at least two status parameters being in the respective sets of status ranges. Preferred application is in UMTS mobile networks.

Journal Article
TL;DR: A detailed scenario of how mobile ad-hoc networking can be used in the AEC industry is provided, giving an overview of the existing mobile ad -hoc networks and addressing some issues of implementation and deployment of the networking protocol called Ad- hoc On-demand Distance Vector routing (AODV).
Abstract: Wearable computing along with advanced mobile communication has the potential to revolutionise the working environment and working processes of the mobile worker of the AEC industry. While wearable computing allows the mobile worker to execute his/her work and tasks more efficiently and safer with the support of information provided by novel user interfaces, like augmented reality glasses and voice recognition, advanced mobile communication can transfer the information required in a certain context (location, time, task etc.) to and from the mobile worker. Wearable computing allows the mobile worker e.g. to access data bases like material lists and CAD drawings, to hold video conferences with remote or on-site experts without being distracted by additional hardware he has to handle, i.e. his hands and arms are free to concentrate completely on his work. For transferring data and voice calls numerous different networking technology and communication networks are available, like GPRS, UMTS and WLAN. However, communication costs, bandwidth and coverage limitations might prohibit its use on construction environments. Ad-hoc networking offers means of spontaneous communications between different devices without using an infrastructure and provides a promising communication solution for the AEC industry. This article focuses on the applicability of mobile ad-hoc networking in the AEC industry by providing a detailed scenario of how mobile ad-hoc networking can be used in the AEC industry, giving an overview of the existing mobile ad-hoc networks and addressing some issues of implementation and deployment of the networking protocol called Ad-hoc On-demand Distance Vector routing (AODV).

Proceedings ArticleDOI
02 May 2004
TL;DR: An extended overview on the orthogonal frequency division multiple access (OFDMA) technique and its applications in 4/sup th/ generation cellular mobile networks is presented and a comparison between the performance of OFDMA and other multiple access systems is carried out.
Abstract: An extended overview on the orthogonal frequency division multiple access (OFDMA) technique and its applications in 4/sup th/ generation cellular mobile networks is presented. After introducing the main idea, a comparison between the performance of OFDMA and other multiple access systems is carried out. Moreover, some practical notes for system deployment are discussed. Finally, two standardized telecommunication systems that use OFDMA as air interface are introduced and their basic parameters are compared.

Book ChapterDOI
07 Jun 2004
TL;DR: A novel CAC algorithm that takes into account the mobility of users inside the cell with a focus on the downlink of third generation mobile systems is developed and extended to extend the Erlang capacity bounds.
Abstract: In this paper, we develop a novel CAC algorithm that takes into account the mobility of users inside the cell with a focus on the downlink of third generation mobile systems We first study the system capacity in a multiple cell setting and obtain effective bandwidth expressions for different calls as a function of both their positions in the cell as well as their classes of traffic (voice versus data) We then use this formulation to derive a mobility-based admission control algorithm which we analyze by Markov chains We hence obtain several performance measures, namely the blocking probability, the dropping probability, both intra and inter-cell, as well as the overall cell throughput We eventually investigate the performance of our CAC and show how to extend the Erlang capacity bounds, ie, the set of arrival rates such that the corresponding blocking/dropping probabilities are kept below predetermined thresholds

Proceedings ArticleDOI
01 Jan 2004
TL;DR: An overview of potential services over MBMS, the broadcast /multicast service of the universal mobile telecommunication system (UMTS), and related business models and service requirements are presented.
Abstract: This paper provides an overview of potential services over MBMS, the broadcast /multicast service of the universal mobile telecommunication system (UMTS), and discusses related business models and service requirements. While MBMS is a suitable data service for some applications already envisaged for the introduction of UMTS (e.g. multimedia message service (MMS) push), MBMS can be an enabler for services that are not feasible over UMTS without major enhanced downlink capacity or broadcast/multicast capabilities. For both of these categories, potential services, their constraints and adequate business models are presented. The paper also analyses the main functional requirements that need to be taken into consideration when defining or dimensioning an MBMS service. Most of these requirements fall into the scope of standardisation. As a consequence, these requirements will have to be considered by relevant standardisation bodies (3GPP, OMA - open mobile alliance) as a way to guarantee that MBMS will meet these service requirements.

Patent
Stefan Parkvall1, Erik Dahlman1
17 Feb 2004
TL;DR: In this paper, a method and system for backward compatible detection of an introduced channel sub-frame structure particularly well suited for data transmissions is presented. But this method is not suitable for a cellular mobile radio communications system, particularly a Universal Mobile Telecommunications System, UMTS.
Abstract: The present invention relates to transmissions and retransmissions in a communications system. It reveals a method and system for backward compatible detection of an introduced channel sub-frame structure particularly well suited for data transmissions. The invention is well suited for a cellular mobile radio communications system, particularly a Universal Mobile Telecommunications System, UMTS.

Patent
24 Nov 2004
TL;DR: In this article, an apparatus and method of controlling unsolicited traffic are disclosed, which can be applied to wireless communication networks such as CDMA2000, UMTS, GPRS and the like so that traffic which is not solicited by wireless communication devices operating on those networks is not sent over the air needlessly.
Abstract: An apparatus and method of controlling unsolicited traffic are disclosed herein. The apparatus and method can be applied to wireless communication networks such as CDMA2000, UMTS, GPRS and the like so that traffic which is not solicited by wireless communication devices operating on those networks is not sent over the air needlessly. The present application provides techniques to block unsolicited traffic based on the identity of a user (for example based on International Mobile Station Identity (IMSI), Network Access Identifier (NAI), Mobile Station Internet Services Digital Network Number (MSISDN), Session Initiation Protocol (SIP) Universal Resource Locator (url)) as opposed to techniques that are based on a session or IP address, such as a traditional firewall. In accordance to this application, user identity based techniques are applied to block unsolicited traffic whenever a user has established a data session. Further in accordance with this application, user identity based techniques are persisted across changes in IP address and/or session.

Journal ArticleDOI
M. Rahman1, P. Ernstrom1
TL;DR: The results indicate that repeaters are well suited to increase capacity of a WCDMA /UMTS system in hotspot areas.
Abstract: Currently, wireless operators around the world are building code-division multiple-access (CDMA) based radio access networks and big efforts are made to find the most cost effective way to do so. In this paper, the novel use of repeaters in a direct-sequence CDMA (DS-CDMA) system such as UMTS to improve capacity in areas with hotspots (small areas with increased traffic volume) is studied through static Monte Carlo simulations. The performance of the repeaters is shown to be sensitive to tuning of the repeater gain. With correct tuning, the simulations show that the repeaters are very beneficial for the downlink, which is the capacity-limiting link. When repeaters covering the hotspots are introduced, the system is thus seen to tolerate more hotspot traffic. For a scenario in which the hotspots are located close to the cell border, the system tolerates approximately twice as high hotspot traffic load. For hotspots located halfway between the base station and the cell border, the system tolerates approximately 80% more hotspot traffic load. Also in the uplink, more hotspot traffic is tolerated when repeaters are introduced. The effect is smaller than for the downlink, however. The results indicate that repeaters are well suited to increase capacity of a WCDMA /UMTS system in hotspot areas.

Journal ArticleDOI
TL;DR: An integrated architecture and intersystem roaming procedures are proposed to show the implementation feasibility of UMTS-cdma2000 IP-level interworking.
Abstract: This article describes the mobility and session management mechanisms for UMTS and cdma2000 packet-switched (PS) service domains, and compares the design guidelines for these two third-generation technologies. We first introduce the network architectures and protocols for UMTS and cdma2000, and then elaborate on the PS service domain's mobility management, session management, and IP-level mobility mechanisms. Based on the mobility and session management mechanisms of the UMTS and cdma2000 PS service domains, an integrated architecture and intersystem roaming procedures are proposed to show the implementation feasibility of UMTS-cdma2000 IP-level interworking.