Pub Date : 1997-12-17DOI: 10.1109/ICPWC.1997.655467
H. Huomo
This paper presents an overview of how current cellular systems are evolving towards the third-generation of wireless personal communication systems dubbed Universal Mobile Telecommunication Systems (UMTS) in Europe. It pays attention to the standardization process globally in general with the focus on Europe.
{"title":"Evolution towards 3rd generation wireless access","authors":"H. Huomo","doi":"10.1109/ICPWC.1997.655467","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655467","url":null,"abstract":"This paper presents an overview of how current cellular systems are evolving towards the third-generation of wireless personal communication systems dubbed Universal Mobile Telecommunication Systems (UMTS) in Europe. It pays attention to the standardization process globally in general with the focus on Europe.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121948300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1997-12-17DOI: 10.1109/ICPWC.1997.655517
The characteristics of an optically-fed phased array antenna are affected by the amplitude and phase noise introduced by optical amplifiers (EDFA) used in the system. A theoretical derivation and a numerical computation of the effect of phase noise on antenna performance are given. The phase fluctuations make the main beam jitter around a mean value directly related to the mean and the variance of the amplified spontaneous emission induced random phase change.
{"title":"Effect of noise in optically-fed phased array antennas for CDMA wireless networks","authors":"","doi":"10.1109/ICPWC.1997.655517","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655517","url":null,"abstract":"The characteristics of an optically-fed phased array antenna are affected by the amplitude and phase noise introduced by optical amplifiers (EDFA) used in the system. A theoretical derivation and a numerical computation of the effect of phase noise on antenna performance are given. The phase fluctuations make the main beam jitter around a mean value directly related to the mean and the variance of the amplified spontaneous emission induced random phase change.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116195753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1997-12-17DOI: 10.1109/ICPWC.1997.655576
V. Varadharajan, Y. Mu
We propose three security protocols for mobile communications, which enable mutual authentication and establish a shared secret key between mobile users. They also provide a certain degree of anonymity of the communicating users to other system users. Our protocols are based on a hybrid scheme involving a combination of public key and symmetric key based systems.
{"title":"Preserving privacy in mobile communications: a hybrid method","authors":"V. Varadharajan, Y. Mu","doi":"10.1109/ICPWC.1997.655576","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655576","url":null,"abstract":"We propose three security protocols for mobile communications, which enable mutual authentication and establish a shared secret key between mobile users. They also provide a certain degree of anonymity of the communicating users to other system users. Our protocols are based on a hybrid scheme involving a combination of public key and symmetric key based systems.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128393358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1997-12-17DOI: 10.1109/ICPWC.1997.655510
S. Gupta, R. Yates, C. Rose
For wireless communications systems, this work considers a power control algorithm in which a user's link quality objective, as measured by the signal to interference ratio (SIR), varies with its transmitter power. In particular, as increased interference or reduced uplink gain leads a mobile to raise its transmitter power, that mobile lowers its SIR target. In this way, the likelihood of an infeasible power control problem in which the users' transmitter powers rise to a maximum, is reduced. This graceful degradation of the SIR is termed soft dropping. Convergence proofs for a soft dropping power control algorithm are presented. Simulation results for a generic CDMA system demonstrate performance improvements over fixed target SIR algorithms.
{"title":"Soft dropping power control-a power control backoff strategy","authors":"S. Gupta, R. Yates, C. Rose","doi":"10.1109/ICPWC.1997.655510","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655510","url":null,"abstract":"For wireless communications systems, this work considers a power control algorithm in which a user's link quality objective, as measured by the signal to interference ratio (SIR), varies with its transmitter power. In particular, as increased interference or reduced uplink gain leads a mobile to raise its transmitter power, that mobile lowers its SIR target. In this way, the likelihood of an infeasible power control problem in which the users' transmitter powers rise to a maximum, is reduced. This graceful degradation of the SIR is termed soft dropping. Convergence proofs for a soft dropping power control algorithm are presented. Simulation results for a generic CDMA system demonstrate performance improvements over fixed target SIR algorithms.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128206567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1997-12-17DOI: 10.1109/ICPWC.1997.655513
S. Won, Whan-woo Kim, Y. Oh, I. Jeong
This paper presents the effects of an algorithm for controlling the base station's received target signal-to-interference ratio (SIR) according to the quality of the received frames on the capacity enhancement. It is proved that the algorithm presented has a smaller mean of the actual SIR received at the antenna than the existing method which applies the fixed target SIR needed for the worst case to all the users at every time instant. It is also shown that the capacity of the system can be further increased by optimizing the system parameters in the algorithm.
{"title":"Effects of controlling target SIR on capacity enhancement in a CDMA system","authors":"S. Won, Whan-woo Kim, Y. Oh, I. Jeong","doi":"10.1109/ICPWC.1997.655513","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655513","url":null,"abstract":"This paper presents the effects of an algorithm for controlling the base station's received target signal-to-interference ratio (SIR) according to the quality of the received frames on the capacity enhancement. It is proved that the algorithm presented has a smaller mean of the actual SIR received at the antenna than the existing method which applies the fixed target SIR needed for the worst case to all the users at every time instant. It is also shown that the capacity of the system can be further increased by optimizing the system parameters in the algorithm.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121896179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1997-12-17DOI: 10.1109/ICPWC.1997.655540
Ming-Yi Lee, Jiann-Liang Chen, Shinfeng D. Lin
To support the high quality services with wireless networks, the wireless network management module is indispensable. Based on the Java facility, CORBA engine, and SNMP management protocol, a universal browser-based wireless network management system (WNMS) is designed and reported. We use the CORBA engine for communication between the manager and agent (managed system). The SNMP protocol and Java facility are utilized for the design of the management applications to take the advantage of the platform independence. In the WNMS, two new features, agent discovery and binding operation, are also implemented. From the prototype system, it is observed that with the new features and traditional management functions the WNMS can achieve a high quality in wireless-wireline network management.
{"title":"A Java-based wireless network management system","authors":"Ming-Yi Lee, Jiann-Liang Chen, Shinfeng D. Lin","doi":"10.1109/ICPWC.1997.655540","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655540","url":null,"abstract":"To support the high quality services with wireless networks, the wireless network management module is indispensable. Based on the Java facility, CORBA engine, and SNMP management protocol, a universal browser-based wireless network management system (WNMS) is designed and reported. We use the CORBA engine for communication between the manager and agent (managed system). The SNMP protocol and Java facility are utilized for the design of the management applications to take the advantage of the platform independence. In the WNMS, two new features, agent discovery and binding operation, are also implemented. From the prototype system, it is observed that with the new features and traditional management functions the WNMS can achieve a high quality in wireless-wireline network management.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131473781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1997-12-17DOI: 10.1109/ICPWC.1997.655529
Hyung-Deug Bae
This paper presents a management model for handling performance degradation of cellular mobile network due to service failure of an entire or partial cell. It provides a simple and practical method for deployment of performance management control functions. The model consists of monitoring, analysing, controlling and tracing phases. The criteria and activities in each phase are discussed. The management model described is useful for predictable long-term traffic jamming of a single cell or cluster of cells.
{"title":"Managing mobile communication network for performance","authors":"Hyung-Deug Bae","doi":"10.1109/ICPWC.1997.655529","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655529","url":null,"abstract":"This paper presents a management model for handling performance degradation of cellular mobile network due to service failure of an entire or partial cell. It provides a simple and practical method for deployment of performance management control functions. The model consists of monitoring, analysing, controlling and tracing phases. The criteria and activities in each phase are discussed. The management model described is useful for predictable long-term traffic jamming of a single cell or cluster of cells.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116599070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1997-12-17DOI: 10.1109/ICPWC.1997.655573
S. Patel
The detection of fraud in wireless systems is made easier when the network is continuously aware of the location of mobile handsets. For existing cellular systems, location awareness requires handsets to be powered on. We explore ways to exploit the autonomous registration capabilities of handsets in order to detect the presence of illegitimate clones. Throughout the paper, location awareness is used as a new paradigm for organizing new and existing fraud detection techniques.
{"title":"Location, identity and wireless fraud detection","authors":"S. Patel","doi":"10.1109/ICPWC.1997.655573","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655573","url":null,"abstract":"The detection of fraud in wireless systems is made easier when the network is continuously aware of the location of mobile handsets. For existing cellular systems, location awareness requires handsets to be powered on. We explore ways to exploit the autonomous registration capabilities of handsets in order to detect the presence of illegitimate clones. Throughout the paper, location awareness is used as a new paradigm for organizing new and existing fraud detection techniques.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125175249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1997-12-17DOI: 10.1109/ICPWC.1997.655483
M. Kousa, S. Al-Semari
Coding and diversity are two powerful techniques to combat fading effects on communication channels. In this paper the available diversity channels are utilized by forward error correction coding in an adaptive fashion to improve the reliability of the system. Based on the quality of the diversity channels, the code rate over each channel is determined using discrete optimization of the overall error probability, subject to the constraint of fixed overall throughput rate. It is found that the proposed system provides noticeable gain over the classical diversity system when binary BCH codes with hard-decision decoding are used. Moreover, the proposed system offers flexibility in choosing the throughput of the system, which the diversity system lacks. The advantages of the proposed system are obtained at only slight increase in implementation complexity.
{"title":"Adaptive binary coding for diversity communication systems","authors":"M. Kousa, S. Al-Semari","doi":"10.1109/ICPWC.1997.655483","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655483","url":null,"abstract":"Coding and diversity are two powerful techniques to combat fading effects on communication channels. In this paper the available diversity channels are utilized by forward error correction coding in an adaptive fashion to improve the reliability of the system. Based on the quality of the diversity channels, the code rate over each channel is determined using discrete optimization of the overall error probability, subject to the constraint of fixed overall throughput rate. It is found that the proposed system provides noticeable gain over the classical diversity system when binary BCH codes with hard-decision decoding are used. Moreover, the proposed system offers flexibility in choosing the throughput of the system, which the diversity system lacks. The advantages of the proposed system are obtained at only slight increase in implementation complexity.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115600621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1997-12-17DOI: 10.1109/ICPWC.1997.655541
G. Racherla, A. Das, A. Payyoorayil
We present MAdSim-a environment tailored for mobile ad-hoc network simulation. Users and designers can use it for design, analysis and performance evaluation of their mobile ad-hoc network configuration. The input to MAdSim includes the system parameters, the network architecture, communication protocols (standard and user-defined). MAdSim presents, using graphics and text, performance metrics such as total routing and rerouting time, disruption time, buffering requirements, etc. These aid the user in evaluating the system's performance. MAdSim is being developed for PC based systems using MS Visual C++ 5.0 and MFC under Windows 95/NT.
我们提出了madsim -一个为移动自组织网络模拟量身定制的环境。用户和设计人员可以使用它来设计、分析和性能评估他们的移动自组织网络配置。MAdSim的输入包括系统参数、网络架构、通信协议(标准的和用户定义的)。MAdSim使用图形和文本呈现性能指标,如总路由和重路由时间、中断时间、缓冲需求等。这有助于用户评估系统的性能。MAdSim是为基于PC的系统开发的,使用MS Visual c++ 5.0和Windows 95/NT下的MFC。
{"title":"MAdSim-a simulation environment for ad-hoc mobile networks","authors":"G. Racherla, A. Das, A. Payyoorayil","doi":"10.1109/ICPWC.1997.655541","DOIUrl":"https://doi.org/10.1109/ICPWC.1997.655541","url":null,"abstract":"We present MAdSim-a environment tailored for mobile ad-hoc network simulation. Users and designers can use it for design, analysis and performance evaluation of their mobile ad-hoc network configuration. The input to MAdSim includes the system parameters, the network architecture, communication protocols (standard and user-defined). MAdSim presents, using graphics and text, performance metrics such as total routing and rerouting time, disruption time, buffering requirements, etc. These aid the user in evaluating the system's performance. MAdSim is being developed for PC based systems using MS Visual C++ 5.0 and MFC under Windows 95/NT.","PeriodicalId":166667,"journal":{"name":"1997 IEEE International Conference on Personal Wireless Communications (Cat. No.97TH8338)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117144960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}