Research, Practice, and Educational Advancements in Telecommunications and Networking
Latest Publications


TOTAL DOCUMENTS

17
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781466600508, 9781466600515

Author(s):  
Ye Ouyang ◽  
Hosein Fallah

The past few years have seen mobile operators transition to next-generation mobile networks, specifically from third-generation networks (3G) to long term evolution (LTE). This paper describes the basic architecture and topology of UMTS R4 core network and introduces two options in network planning, i.e., flat structure or layered structure. This paper introduces the re-homing of radio network controller (RNC) and base station controller (BSC) and studies the impact on the performance of voice core of UMTS networks. The proposed RNC re-homing models are created and analyzed for voice core of UMTS networks. The paper concludes that the appropriate RNC re-homing optimizes the traffic of voice core in UMTS network.


Author(s):  
Emin Koksal

This paper investigates how incentives of network operators to deviate from neutrality may create social costs or benefits in different market structures. The deviation from network neutrality is a general form of discrimination based on charging different prices for non-affiliated content and application providers. In this paper, deviation from network neutrality is formulated as a form of vertical foreclosure. While constructing the model two-sided nature of the internet service, the providing market is considered. The author found that, although monopoly network operators have no incentive to deviate from neutrality, the duopoly network operators have this incentive. Welfare analysis suggests destructive results for almost all participants, hence the total surplus in both market structures. In addition, the analysis for the degree of integration between the network operators and their affiliated content and application providers, suggest some policy proposals to discourage their degree of integration.


Author(s):  
Galen Grimes ◽  
Michael Bartolacci

Virtual worlds have become increasingly popular with the growth of high speed Internet access worldwide and online gaming. The popularity of massively multiplayer online role playing games (MMORPG), such as World of Warcraft, and virtual worlds, such as Second Life, has created an opportunity for educators to build a learning platform that students can readily relate to. This paper explores some of the possibilities of utilizing one particular virtual world (Second Life) as a platform for network and information security training with a focus on the profiling of online behavior. In particular it describes the initial attempts of its use at one of the Pennsylvania State University’s campuses.


Author(s):  
Steven R. Powell

In response to slowing growth, intensifying competition in their traditional wireless voice, text markets with an eye toward increasing revenues from offering a bundle of mobile and fixed-line voice, data, text, and video services to subscribers, management at Telefonica and America Movil have restructured their companies and reconsidered their internationalization strategies. This paper focuses on the two companies’ Latin American wireless market portfolios, providing background on why these reorganizational and strategic actions were taken. In particular, the paper compares the portfolios with respect to their market attractiveness and competitive positions in 2008 relative to 2002 on both an overall average and degree of variance basis across the markets in the portfolios. The portfolio analysis technique employed in the paper may have wider applicability for formulating corporate strategy.


Author(s):  
Rui Peng ◽  
Alex J. Aved ◽  
Kien A. Hua

With the proliferation of inexpensive cameras and the availability of high-speed wired and wireless networks, systems of distributed cameras are becoming an enabling technology for a broad range of interdisciplinary applications in domains such as public safety and security, manufacturing, transportation, and healthcare. Today’s live video processing systems on networks of distributed cameras, however, are designed for specific classes of applications. To provide a generic query processing platform for applications of distributed camera networks, the authors designed and implemented a new class of general purpose database management systems, the live video database management system (LVDBMS). The authors view networked video cameras as a special class of interconnected storage devices, and allow the user to formulate ad hoc queries expressed over real-time live video feeds. This paper introduces their system and presents the live video data model, the query language, and the query processing and optimization technique.


Author(s):  
Chirag K. Gohel ◽  
Kamaljit I. Lakhtaria

Asterisk is a leading open source telephony software/system, easily implemented over intranet and internet. Asterisk empowers developers and integrators to create advanced communication solutions. An Asterisk system is a low cost type of a traditional PBX system. Any phone controlled by an Asterisk system can call a VoIP or analog phone controlled or managed by a traditional telephone system or by Asterisk telephone system. In this paper, the authors focus on the deployment and testing of various Open Source Asterisk Services in an enterprise level communication system. Selected services are listed in this paper that can be used to implement a telephone system with good Quality of Services (QoS) and good Quality of Experience (QoE) from the personal user to enterprise level users.


Author(s):  
Hazar Cenk Aki ◽  
M. Erturk ◽  
Huseyin Arslan

In this paper, the authors propose three partitioning schemes for adaptive clustering with fractional frequency reuse namely maximal fractional frequency reuse partitioning (MFRP), optimal fractional reuse partitioning (OFRP), and GoS-oriented frequency reuse partitioning. The authors propose that an overlaid cellular clustering scheme, which uses adaptive fractional frequency reuse factors, would provide a better capacity by exploiting the high level of signal to interference ratio (SIR). The proposed methods are studied via simulations and the results show that the adaptive clustering with different partitioning methods provide better capacity and grade of service (GoS) comparing to the conventional cellular architectures.


Author(s):  
M. Shukla ◽  
Ruchir Gupta

In recently proposed multiple access techniques like IDMA and OFDM-IDMA, the user separation is done by user specific interleavers in contrast to the conventional CDMA scheme, where user separation is assured with user-specific signature sequences. The user specific interleavers must demonstrate minimum probability of collision amongst each other in addition to other merits, including minimal consumption of bandwidth, least hardware for their generation, and least memory requirement. In this paper, the authors propose an interleaver based on prime numbers for the generation of user specific interleavers to remove the problem of high consumption of bandwidth. The simulation results demonstrate the optimal performance of prime interleaver (PI), which is based on prime numbers, apart from other merits in comparison to random and other interleavers.


Author(s):  
Natarajan Meghanathan

This paper develops an energy-aware connected dominating set based data gathering (ECDS-DG) algorithm for wireless sensor networks. The algorithm includes only nodes that have a relatively higher energy level in ECDS. For every round, a data gathering tree (ECDS-DG tree) rooted at the ECDS Leader, that is, the node with the largest available energy, which transmits the data packet to the sink, is formed by considering only the nodes in the ECDS as the intermediate nodes of the tree. The non-ECDS nodes are leaf nodes of the tree, and the upstream node of an intermediate ECDS node in the ECDS-DG tree is the closest ECDS node that is also relatively closer to the ECDS Leader. Performance comparison studies involving well-known LEACH and PEGASIS algorithms indicate that ECDS-DG incurs the lowest energy consumption per round and sustains the largest number of rounds before first node failure.


Author(s):  
Mohd Nazri Ismail ◽  
Abdullah Mohd Zin

This paper presents complete network analyzer development for heterogeneous services in a campus environment. The purpose of this study is to define the accuracy of network analyzer development with independent data, real networks and OPNET simulation tools. The tests for network analyzer software are based on traffic and utilization performance. The reliability of this network analyzer will test with web service. The results show that this software is accurate with independent data, real networks and OPNET simulation tools. Finally, this software measures network resources during the preparation, proposal and planning phases.


Sign in / Sign up

Export Citation Format

Share Document