A mobile service covers a large field of technologies ranging from the mobile device such as a PDA or a phone to the enterprise content server through all the wired and wireless networks between them. In this paper, the focus is given to the client side application, the associated technologies and chosen frameworks to built these kind of contents. Some samples of technologies will be presented ranging from the Wireless Web with WML and xHTML contents to fat client based technology mainly the J2ME platform. APIs and protocols for messaging and synchronization are also part of mobile applications. A brief overview of security features is presented at the last section of this paper.
{"title":"An Overview of Mobile Applications Architecture and the Associated Technologies","authors":"Sofien Beji, N. E. Kadhi","doi":"10.1109/ICWMC.2008.55","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.55","url":null,"abstract":"A mobile service covers a large field of technologies ranging from the mobile device such as a PDA or a phone to the enterprise content server through all the wired and wireless networks between them. In this paper, the focus is given to the client side application, the associated technologies and chosen frameworks to built these kind of contents. Some samples of technologies will be presented ranging from the Wireless Web with WML and xHTML contents to fat client based technology mainly the J2ME platform. APIs and protocols for messaging and synchronization are also part of mobile applications. A brief overview of security features is presented at the last section of this paper.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134481739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kyongkuk Cho, Kyungmin Lee, D. Yoon, Wooju Lee, S. K. Park
In this paper, we implement the UDCM (up down conversion module) for the WiBro base station equipment RAS (radio access station). It performs the digital IF (intermediate frequency) signal processing between a channel card and the radio equipments (REs). The UDCM embed on digital optic interface unit of RAS. Converting the frequency into 10 MHz or baseband is the main function. It filters the spurious within channel bandwidth for downlink (DL) /uplink (UL). Also to support the communication with the other chips or peripherals, we design the interface modules and controller. As the UDCM is optimized on the Virtex5 families, it can save the dedicated FPGA resources and lowers the development costs. Its functionality is verified using simulation tools on the RTL (register transfer level) for the predefined test vector. After setting the timing constraints for the interface signals and timing verification, the UDCM downloaded into main unit. Finally, this digital unit is connected to a channel card and REs to ensure the expected performance for its reference simulation results by capturing I/Q, synchronization signals.
{"title":"FPGA Design and Implementation of UDCM for the WiBro System","authors":"Kyongkuk Cho, Kyungmin Lee, D. Yoon, Wooju Lee, S. K. Park","doi":"10.1109/ICWMC.2008.34","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.34","url":null,"abstract":"In this paper, we implement the UDCM (up down conversion module) for the WiBro base station equipment RAS (radio access station). It performs the digital IF (intermediate frequency) signal processing between a channel card and the radio equipments (REs). The UDCM embed on digital optic interface unit of RAS. Converting the frequency into 10 MHz or baseband is the main function. It filters the spurious within channel bandwidth for downlink (DL) /uplink (UL). Also to support the communication with the other chips or peripherals, we design the interface modules and controller. As the UDCM is optimized on the Virtex5 families, it can save the dedicated FPGA resources and lowers the development costs. Its functionality is verified using simulation tools on the RTL (register transfer level) for the predefined test vector. After setting the timing constraints for the interface signals and timing verification, the UDCM downloaded into main unit. Finally, this digital unit is connected to a channel card and REs to ensure the expected performance for its reference simulation results by capturing I/Q, synchronization signals.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133406434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A Personal Network (PN) is a network of distributed personal devices that communicate with each other independently from their geographical location. By adding extra functionality to PNs it is possible to enable cooperation between PNs forming a group-oriented network called Fednet. A Fednet is a secure, opportunity or purpose driven ad-hoc sharing of personal resources. In this paper, we provide a description of a Fednet and its lifecycle. We introduce a proxy-based functional architecture of a Fednet and the basic processes of the access control in Fednets. Finally, we compare Fednets with related paradigms, such as grids, Virtual Organizations, Secure Virtual Enclaves and P2P networks.
{"title":"Proxy-Based Fednets for Sharing Personal Services in Distributed Environments","authors":"Malohat Ibrohimovna, Sonia Heemstra de Groot","doi":"10.1109/ICWMC.2008.25","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.25","url":null,"abstract":"A Personal Network (PN) is a network of distributed personal devices that communicate with each other independently from their geographical location. By adding extra functionality to PNs it is possible to enable cooperation between PNs forming a group-oriented network called Fednet. A Fednet is a secure, opportunity or purpose driven ad-hoc sharing of personal resources. In this paper, we provide a description of a Fednet and its lifecycle. We introduce a proxy-based functional architecture of a Fednet and the basic processes of the access control in Fednets. Finally, we compare Fednets with related paradigms, such as grids, Virtual Organizations, Secure Virtual Enclaves and P2P networks.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133856072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The maximum size of the single frequency network (SFN) of DVB-H depends on the guard interval (GI) and FFT mode. The distance limitation between the extreme transmitter sites is thus straightforward to calculate. Nevertheless, there might be need to extend the theoretical SFN areas e.g. due to the lack of frequencies. This paper describes a simulation method for obtaining information about the effect of parameter settings on the error levels caused by the over-sized DVB-H SFN area. The functionality of the method was tested by programming a simulator and analysing the variations of carrier per interference distribution. The results show that the limits can be exceeded e.g. by selecting the antenna height in optimal way and accepting certain increase of the error level that is called SFN error rate (SER) in this analysis.
{"title":"The Simulation of the Interference Levels in Extended DVB-H SFN Areas","authors":"J. Penttinen","doi":"10.1109/ICWMC.2008.51","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.51","url":null,"abstract":"The maximum size of the single frequency network (SFN) of DVB-H depends on the guard interval (GI) and FFT mode. The distance limitation between the extreme transmitter sites is thus straightforward to calculate. Nevertheless, there might be need to extend the theoretical SFN areas e.g. due to the lack of frequencies. This paper describes a simulation method for obtaining information about the effect of parameter settings on the error levels caused by the over-sized DVB-H SFN area. The functionality of the method was tested by programming a simulator and analysing the variations of carrier per interference distribution. The results show that the limits can be exceeded e.g. by selecting the antenna height in optimal way and accepting certain increase of the error level that is called SFN error rate (SER) in this analysis.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121223182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The emerging technologies have brought a revolution in wireless communication. After three successful generations of wireless standards, now fourth generation is under consideration. Along with progress toward new technologies, interoperability of different technologies is also getting attention. User session handover is main concern to provide connectivity between different networks. This paper has mentioned some handover solutions based on prior networks. The main objective is to present the idea about session handover of user between GSM and WiMAX. GSM is circuit switched based network where as WiMAX is packet switched network. Both technologies use different infrastructure but both support Mobile IP. So in this paper the issue of interoperability between heterogeneous networks has been dealt with using Mobile IP.
{"title":"Mobile IP Based Interoperability between GSM and WiMAX","authors":"R. Shaukat, A. R. Cheema","doi":"10.1109/ICWMC.2008.50","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.50","url":null,"abstract":"The emerging technologies have brought a revolution in wireless communication. After three successful generations of wireless standards, now fourth generation is under consideration. Along with progress toward new technologies, interoperability of different technologies is also getting attention. User session handover is main concern to provide connectivity between different networks. This paper has mentioned some handover solutions based on prior networks. The main objective is to present the idea about session handover of user between GSM and WiMAX. GSM is circuit switched based network where as WiMAX is packet switched network. Both technologies use different infrastructure but both support Mobile IP. So in this paper the issue of interoperability between heterogeneous networks has been dealt with using Mobile IP.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130805666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper evaluates the impact of the newest micro & nanotechnologies on smart antenna systems. After analyzing the key features of the main mobile wireless systems of the present - UMTS, CDMA2000, WiMax 802.16e, and MBWA 802.20, we have identified some common issues, requirements and limitations. Dwelling on the SDC -Software-Defined Component perspectives we have analyzed the impact of novel RF MEMS on reconfigurable circuits, namely on smart antenna systems. This lead us to imagine a software-defined autonomous antenna - SDAA, which includes the RF module. This in turn, integrated on a SDR platform, will prototype the idea of extending the SDR concept over the RF module. This paper introduces our proposed SDR & SDAA architecture and its benefits.
{"title":"The Impact of Novel RF MEMS and SDCs on Smart Antenna Technologies","authors":"N. Crisan, L. Cremene","doi":"10.1109/ICWMC.2008.76","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.76","url":null,"abstract":"This paper evaluates the impact of the newest micro & nanotechnologies on smart antenna systems. After analyzing the key features of the main mobile wireless systems of the present - UMTS, CDMA2000, WiMax 802.16e, and MBWA 802.20, we have identified some common issues, requirements and limitations. Dwelling on the SDC -Software-Defined Component perspectives we have analyzed the impact of novel RF MEMS on reconfigurable circuits, namely on smart antenna systems. This lead us to imagine a software-defined autonomous antenna - SDAA, which includes the RF module. This in turn, integrated on a SDR platform, will prototype the idea of extending the SDR concept over the RF module. This paper introduces our proposed SDR & SDAA architecture and its benefits.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133475073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper considers two nodes (base station (BS), access gateway (AG)) mobile network architecture based on a all IP infrastructure. We propose to use a multicast tree from an AG to some BS on which mobility could be predicted. The problem is well defined and the complexity proof and reduction are well discussed. We focus on a distributed process to control multicast functionalities in each IP router to obtain a constraint delay multicast tree compatible with the embedded IP routing that minimises the number of used links. After defining the related problem from a graph theory point of view, we show that it is NP-complete and not approximable. Then, we describe a distributed algorithm and we compare its performance to the ones of a proposed centralised algorithm.
{"title":"Optimized Multicast Tree for Handover in a Two-Nodes Mobile Network Architecture Based on a All-IP Infrastructure","authors":"Y. Benallouche, D. Barth","doi":"10.1109/ICWMC.2008.18","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.18","url":null,"abstract":"This paper considers two nodes (base station (BS), access gateway (AG)) mobile network architecture based on a all IP infrastructure. We propose to use a multicast tree from an AG to some BS on which mobility could be predicted. The problem is well defined and the complexity proof and reduction are well discussed. We focus on a distributed process to control multicast functionalities in each IP router to obtain a constraint delay multicast tree compatible with the embedded IP routing that minimises the number of used links. After defining the related problem from a graph theory point of view, we show that it is NP-complete and not approximable. Then, we describe a distributed algorithm and we compare its performance to the ones of a proposed centralised algorithm.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124509927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The scalable extension of H.264/AVC, called H.264/SVC, is a current standardization project of Joint Video Team (JVT). An encoded SVC bitstream consists of an H.264/AVC-compatible base layer and one or more scalable enhance layers. In order to meet requirements of various clients, some scalable enhance layers can be truncated. This paper focuses on the investigation of H.264/SVC transmission over IEEE 802.11e through a cross-layer architecture. The cross-layer architecture, enabling interaction between Network Abstraction Layer (NAL) and IEEE 802.11e MAC layer, provides differentiated services according to the importance of scalable video packets. The simulations are conducted with Qualnet 4.0. The simulation results show that our approach provides better video quality.
{"title":"Improving Scalable Video Transmission over IEEE 802.11e through a Cross-Layer Architecture","authors":"Hsing-Lung Chen, Po-Ching Lee, Shu-Hua Hu","doi":"10.1109/ICWMC.2008.35","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.35","url":null,"abstract":"The scalable extension of H.264/AVC, called H.264/SVC, is a current standardization project of Joint Video Team (JVT). An encoded SVC bitstream consists of an H.264/AVC-compatible base layer and one or more scalable enhance layers. In order to meet requirements of various clients, some scalable enhance layers can be truncated. This paper focuses on the investigation of H.264/SVC transmission over IEEE 802.11e through a cross-layer architecture. The cross-layer architecture, enabling interaction between Network Abstraction Layer (NAL) and IEEE 802.11e MAC layer, provides differentiated services according to the importance of scalable video packets. The simulations are conducted with Qualnet 4.0. The simulation results show that our approach provides better video quality.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129490278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless mesh networks have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. Special routing protocols are employed, which facilitate routing between the Mesh Routers as well as between the Mesh Routers and the Mobile Nodes. This work addresses a framework of packet routing in the wireless mesh network. We investigate a cross-layer solution to enable a good application delivery. In addition, we present an IPv6 addressing scheme and new procedures to handle mobility. Another feature of our work, is that we use a modified Multi Protocol Label Switching (MPLS) scheme to introduce a new hierarchical QoS routing.
{"title":"Cross-Layer QoS Routing Framework for Wireless Mesh Networks","authors":"L. Romdhani, C. Bonnet","doi":"10.1109/ICWMC.2008.70","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.70","url":null,"abstract":"Wireless mesh networks have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. Special routing protocols are employed, which facilitate routing between the Mesh Routers as well as between the Mesh Routers and the Mobile Nodes. This work addresses a framework of packet routing in the wireless mesh network. We investigate a cross-layer solution to enable a good application delivery. In addition, we present an IPv6 addressing scheme and new procedures to handle mobility. Another feature of our work, is that we use a modified Multi Protocol Label Switching (MPLS) scheme to introduce a new hierarchical QoS routing.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130675106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Several solutions have been proposed to couple QoS with mobility management in a way that can satisfy the real-time requirements. The most of these solutions depend on RSVP which suffers from many drawbacks. "Next Step In Signaling" protocol suite (NSIS) presents a new promised framework that can be used to signal for different QoS models and cover the drawbacks of RSVP. This paper proposes a new solution named MalSAM (Mobility management aware Next Step In Signaling for "All-IP" Mobile communication networks). MalSAM supports a fast and a smooth handoff simultaneously with a fast reservation of resources during and after the handover. It integrates the Mobile IP Fast Authentication protocol (MIFA) with QoS-NSIS Signaling Layer Protocol (QoS-NSLP). This is achieved by adding a new object to accommodate MIFA messages. The main advantages of MalSAM are its simple network architecture without introducing new entities and its fast handover and fast resources reservation.
{"title":"MaISAM: A New Fast QoS Aware Mobility Management Protocol for “ALLIP” Networks","authors":"Esam Alnasouri, A. Mitschele-Thiel, Ali Diab","doi":"10.1109/ICWMC.2008.62","DOIUrl":"https://doi.org/10.1109/ICWMC.2008.62","url":null,"abstract":"Several solutions have been proposed to couple QoS with mobility management in a way that can satisfy the real-time requirements. The most of these solutions depend on RSVP which suffers from many drawbacks. \"Next Step In Signaling\" protocol suite (NSIS) presents a new promised framework that can be used to signal for different QoS models and cover the drawbacks of RSVP. This paper proposes a new solution named MalSAM (Mobility management aware Next Step In Signaling for \"All-IP\" Mobile communication networks). MalSAM supports a fast and a smooth handoff simultaneously with a fast reservation of resources during and after the handover. It integrates the Mobile IP Fast Authentication protocol (MIFA) with QoS-NSIS Signaling Layer Protocol (QoS-NSLP). This is achieved by adding a new object to accommodate MIFA messages. The main advantages of MalSAM are its simple network architecture without introducing new entities and its fast handover and fast resources reservation.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133896523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}