Two-dwell code acquisition techniques by advanced spatio-temporal antennas for the radio access of 3G mobile communications

Author(s):  
G. Giunta
2017 ◽  
Vol E100.B (9) ◽  
pp. 1674-1687
Author(s):  
Mamoru SAWAHASHI ◽  
Kenichi HIGUCHI

2006 ◽  
Vol E89-B (10) ◽  
pp. 2678-2686 ◽  
Author(s):  
J.-W. KIM ◽  
G.-R. KWON ◽  
J.-S. LEE ◽  
N.-H. KIM ◽  
S.-J. KO

2018 ◽  
Vol 7 (4.6) ◽  
pp. 350
Author(s):  
Karthikala. P ◽  
Dr. C.Arunachala Perumal ◽  
Ms. M.Ramya

Mobile data traffic is finding exponential growth currently in telecommunications industry. It has become important to concentrate on both spectral and energy efficiencies in utilizing cellular networks under green communication standpoint. Thus, for 5G the utmost priority is that to increase data traffic and reduce the total network energy ingesting by half. The proposed work is to design the Cloud Radio Access Network (C-RAN) with energy efficient, flexible and capacity-enhanced features by effectively bundling and establishing relation between BBU and RRU utilizing Catechistic technique. Mathematical results with realistic parameters prove that the projected optimization design clearly improve the energy efficiency of C-RAN’s compared to standard schemes. 


2019 ◽  
Vol 2019 (2) ◽  
pp. 24-30
Author(s):  
Василий Типаков ◽  
Vasily Sergeevich Tipakov ◽  
Тимур Яковлев ◽  
Timur Aleksandrovich Yakovlev

The article is focused on the problem of degrading the signals of broadband 3G / 4G mobile radio access systems in places of subscribers clustering and in so-called “dead zones”. The analysis of the actual principles of building mobile networks has been carried out, the main disadvantages of the approaches to the development of cellular networks have been identified. The current trend of building macro cells in the urban environment has lost its effectiveness due to the increasing frequencies used; it has to be replaced by a fundamentally new way of planning mobile networks. A new principle of providing access to mobile communications “from inside to outside” is proposed, which takes into account the needs of a large number of subscribers in the premises. It is based on setting the maximum number of internal base stations fully meeting the needs of internal network users. Such a distinction will positively affect all subscribers and improve the experience from using the high-quality services of the mobile operators, which will result in increasing the economic performance


2009 ◽  
pp. 2752-2765
Author(s):  
Christos Xenakis

The global system for mobile communications (GSM) is the most popular standard that implements second generation (2G) cellular systems. 2G systems combined with general packet radio services (GPRS) are often described as 2.5G, that is, a technology between the 2G and third generation (3G) of mobile systems. GPRS is a service that provides packet radio access for GSM users. This chapter presents the security architecture employed in 2.5G mobile systems focusing on GPRS. More specifically, the security measures applied to protect the mobile users, the radio access network, the fixed part of the network, and the related data of GPRS are presented and analyzed in detail. This analysis reveals the security weaknesses of the applied measures that may lead to the realization of security attacks by adversaries. These attacks threaten network operation and data transfer through it, compromising end users and network security. To defeat the identified risks, current research activities on the GPRS security propose a set of security improvements to the existing GPRS security architecture.


Author(s):  
Christos Xenakis

The global system for mobile communications (GSM) is the most popular standard that implements second generation (2G) cellular systems. 2G systems combined with general packet radio services (GPRS) are often described as 2.5G, that is, a technology between the 2G and third generation (3G) of mobile systems. GPRS is a service that provides packet radio access for GSM users. This chapter presents the security architecture employed in 2.5G mobile systems focusing on GPRS. More specifically, the security measures applied to protect the mobile users, the radio access network, the fixed part of the network, and the related data of GPRS are presented and analyzed in detail. This analysis reveals the security weaknesses of the applied measures that may lead to the realization of security attacks by adversaries. These attacks threaten network operation and data transfer through it, compromising end users and network security. To defeat the identified risks, current research activities on the GPRS security propose a set of security improvements to the existing GPRS security architecture.


Sign in / Sign up

Export Citation Format

Share Document