In this paper, a multiservice, local-area, wireless access ATM system is explored from a signaling protocol viewpoint. The signaling architecture considered here follows the signaling structure of broadband ISDN (B-IS...
详细信息
In this paper, a multiservice, local-area, wireless access ATM system is explored from a signaling protocol viewpoint. The signaling architecture considered here follows the signaling structure of broadband ISDN (B-ISDN) user-network interface (UNI), thus offering the possibility for integration of the wireless ATM access system into fixed B-ISDN. It is shown that the use of the employed signaling structure substantially simplifies the call/bearer and handover control. The evaluation of the signaling protocol architecture yields results, which fall within acceptable ATM signaling performance measures. A comparison with alternate access signaling configurations is also carried out to quantify the relative gains.
In packet-switched networks, queueing of packets at the switches can result when multiple connections share the same physical link. To accommodate a large number of connections, a switch can employ link-scheduling alg...
详细信息
In packet-switched networks, queueing of packets at the switches can result when multiple connections share the same physical link. To accommodate a large number of connections, a switch can employ link-scheduling algorithms to prioritize the transmission of the queued packets. Due to the high-speed links and small packet sizes, a hardware solution is needed for the priority queue in order to make the link schedulers effective. But for good performance, the switch should also support a large number of priority levels (P) and be able to buffer a large number of packets (N). So a hardware priority queue design must be both fast and scalable (with respect to N and P) in order to be implemented effectively. In this paper we first compare four existing hardware priority queue architectures, and identify scalability limitations on implementing these existing architectures for large N and P. Based on our findings, we propose two new priority queue architectures, and evaluate them using simulation results from Verilog HDL and Epoch implementations.
Data communication networks have become an integral part of modern society. The standardization of communication protocols has made the interconnection of heterogeneous systems and networks a reality. This global conn...
详细信息
Data communication networks have become an integral part of modern society. The standardization of communication protocols has made the interconnection of heterogeneous systems and networks a reality. This global connectivity among open systems provides facilities such as remote computing, resource sharing and electronic fund transfer. For all these applications to provide the services that they are designed to provide in a secure manner, it is necessary to evaluate all the possible security violations that may occur. Moreover, the requirements of applications to protect the transfer of information from a range of potential threats should also be assessed. This paper introduces some of the commonly known security threats, together with the security services and state-of-the-art mechanisms that can be used to provide protection against these threats.
The interaction of a soliton of the Nonlinear Schrodinger Equation (NSE) with a weak sinusoidal wave packet is treated analytically, The second-order soliton solution containing the original soliton and a perturbing s...
详细信息
The interaction of a soliton of the Nonlinear Schrodinger Equation (NSE) with a weak sinusoidal wave packet is treated analytically, The second-order soliton solution containing the original soliton and a perturbing soliton is expanded to first order in the amplitude of the perturbating soliton, From this expansion, one obtains the associate function of Gordon [4] and a continuous change of position and phase of the perturbed soliton, One finds that the soliton experiences a second-order change of velocity under the influence of the perturbation. This result is then used to derive the displacement due to a wave packet of general shape, which is also confirmed by computer simulation.
We consider the problem of tracking mobile stations using the ranging measurements from multiple base stations (BSs), without a priori knowledge of which BSs (if any) have a direct line of sight (LOS) range measuremen...
详细信息
We consider the problem of tracking mobile stations using the ranging measurements from multiple base stations (BSs), without a priori knowledge of which BSs (if any) have a direct line of sight (LOS) range measurement. The two key contributions of this paper are to show that (1) it is possible to discriminate between LOS versus non-LOS (NLOS) measurements at each BS by using the time history of its range measurements in a simple hypothesis testing problem and (2) it is possible to correct the NLOS ranging error by exploiting a priori knowledge of the statistical characteristics of the system's standard measurement noise. Simulation examples are presented and the RMS error is compared to the Cramer Rao lower bound on location estimation.
The Tiny Tera is an all-CMOS 320 Gbps, input-queued ATM switch suitable for non-ATM applications such as the core of an Internet router. The tiny tera efficiently supports both unicast and multicast traffic. Instead o...
详细信息
We propose a detailed analysis and estimation of SS7 signaling traffic performance on GSM databases in Taiwan. With the networkengineering and configuration, a fluid flow mobility model is employed to investigate the...
详细信息
ISBN:
(纸本)0780336925
We propose a detailed analysis and estimation of SS7 signaling traffic performance on GSM databases in Taiwan. With the networkengineering and configuration, a fluid flow mobility model is employed to investigate the performance of signaling traffic between databases such as home location registers (HLRs), visitor location registers (VLRs), and equipment identification register (EIR). We also propose the mobility-related signaling traffic on HLRs, VLRs, and EIR to calculate transaction message loads per second on these databases. In addition, the minimum numbers of signaling link required for each VLR, HLR and EIR are estimated with both low and high mobile speeds as well as various average call rates. Furthermore, the estimation and engineering of the processing time capacity of these databases are investigated under various average call rates. Finally, the results in our study are proved to efficiently support the engineered and implementation plan of the existing Taiwan's GSM network.
The purpose of this paper is to show how information in signal strength measurements can be exploited to improve the quality of handoff decisions, for both large and small cells, Averaging of signal strength fluctuati...
详细信息
The purpose of this paper is to show how information in signal strength measurements can be exploited to improve the quality of handoff decisions, for both large and small cells, Averaging of signal strength fluctuations is required, This leads to the following tradeoff problem for the averaging interval for the signal strength measurements. If the interval is too short, the fading fluctuations are not sufficiently smoothed out, If the interval is too long, delay in handoff increases, With this tradeoff in mind, we present a method to adaptively change the averaging interval, The method is based on estimating the maximum Doppler frequency, f(D), as a means to obtain mobile velocity, the hey to the tradeoff. A method used for estimating f(D) from the squared deviations of the signal envelope is outlined, Exact analysis for the f(D) estimate as a function of squared deviations of the logarithmically compressed signal envelope in Rayleigh fading is presented, An extension of the algorithm for robustness in a Rician fading environment is given, Sensitivity issues of the estimates are considered, An adaptive scheme for optimal averaging is outlined.
To fulfil the future demand for and increase the reliability of the mobile cellular service, the authors have explored the use of a call admission policy that constitutes a dynamic channel allocation scheme for a cell...
详细信息
To fulfil the future demand for and increase the reliability of the mobile cellular service, the authors have explored the use of a call admission policy that constitutes a dynamic channel allocation scheme for a cellular system. The call admission policy optimizes a weighted blocking criteria for a queueing network model of a mobile cellular system. In this context, the call admission problem is formulated as a Markov decision process. The value iteration method has been applied to a uniformized chain of a cellular highway system. The effectiveness of a call admission policy for maximizing the call completion rate and for reducing the handoff dropping is studied. Channel reservation policies for handoffs are also examined for different system parameters. In addition, several symmetry properties of the optimal policies which effectively truncate the size of policy space, are mathematically established.
暂无评论