The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] MOBILE(969hit)

641-660hit(969hit)

  • An Efficient Uplink and Downlink Resource Sharing Scheme for Wireless Multimedia Systems

    Alessandro ANDREADIS  Romano FANTACCI  Giovanni GIAMBENE  Francesco PETITI  

     
    PAPER-Wireless Communication Technology

      Vol:
    E85-B No:8
      Page(s):
    1512-1524

    Future wireless communication systems will provide mobile terminals with high bit-rate transmissions for accessing broadband wired networks. In this paper, we envisage a Time Division Multiple Access - Time Division Duplexing (TDMA-TDD) air interface and we propose a Medium Access Control (MAC) protocol, named Dynamic Scheduling - TDD (DS-TDD), that allows guaranteeing the QoS of different traffic classes and efficiently supports uplink/downlink traffic asymmetries. The DS-TDD performance is theoretically analyzed. Moreover, the DS-TDD protocol is compared with another scheme proposed in the literature. Finally, the impact of packet errors on the DS-TDD performance is evaluated.

  • Caching and Concurrency Control in a Wireless Mobile Computing Environment

    SangKeun LEE  

     
    PAPER-Databases

      Vol:
    E85-D No:8
      Page(s):
    1284-1296

    Caching of frequently accessed data has been shown to be a useful technique for reducing congestion on the narrow bandwidth of wireless channels. However, traditional client/server strategies for supporting transactional cache consistency, which require extensive communications between a client and a server, are not appropriate in a wireless mobile database. This paper proposes two, simple but effective, transactional cache consistency protocols for mobile read-only transactions by utilizing the broadcast-based solutions for the problem of invalidating caches. The novelty of our approach is that the consistency check on accessed data and the commitment protocol are implemented in a truly distributed fashion as an integral part of cache invalidation process. The applicability of proposed techniques is also examined by an analytical study.

  • Limiting the Holding Time in Mobile Cellular Systems during Heavy Call Demand Periods in the Aftermath of Disasters

    Kazunori OKADA  

     
    PAPER

      Vol:
    E85-A No:7
      Page(s):
    1454-1462

    Call demand suddenly and greatly increases in the aftermath of a major disaster, because people want to check on their families and friends in the stricken area. Many call attempts in mobile cellular systems are blocked due to the limited radio frequency resources. In this paper, as a solution to this problem, limiting the holding time of calls is investigated and a dynamic holding time limit (DHTL) method, which varies the holding time limit dynamically based on the number of call attempts, is proposed. The effect of limiting the holding time is investigated first using a computer simulation with a constant and heavy traffic load model. This simulation shows that the average holding time of calls is decreased as the holding time limit is reduced. But it also shows limiting the holding time decreases the number of calls blocked and forced call terminations at handover considerably. Next, a simple estimation method for the holding time limit, which reduces the blocking rate to the normal rate for increasing call demand, is described. Finally, results are given of a simulation, which show that the DHTL method keeps good performance for a sudden and great traffic load fluctuation condition.

  • Multiple-Reference Compression of RTP/UDP/IP Headers for Mobile Multimedia Communications

    Takeshi YOSHIMURA  Toshiro KAWAHARA  Tomoyuki OHYA  Minoru ETOH  

     
    PAPER

      Vol:
    E85-A No:7
      Page(s):
    1491-1500

    In this paper, we propose an RTP/UDP/IP header compression method, Multiple-Reference Compression (MRC), which is designed for mobile multimedia communications. MRC is a compression method that calculates differences from the multiple reference headers that have already been sent and inserts them into a compressed header. The receiver can decompress the compressed header as long as at least one of the reference headers is correctly received and decompressed. MRC improves robustness against packet losses compared with CRTP defined in IETF RFC2508, and imposes less overheads and computational burden than robust header compression (ROHC) defined in RFC3095. We also implemented MRC and other header compression algorithms into our mobile testbed, and conducted multimedia streaming experiments over the testbed. The results of the experiments show that MRC offers the same level of packet loss rate as Legacy RTP for both audio and video streams, and provides better media quality than Legacy RTP and CRTP on error-prone radio links. Header compression robust against packet losses is expected as a key technology for VoIP and multimedia streaming services over 3G and future mobile networks.

  • Self-Similarity in Cell Dwell Time Caused by Terminal Motion and Its Effects on Teletraffic of Cellular Communication Networks

    Hirotoshi HIDAKA  Kazuyoshi SAITOH  Noriteru SHINAGAWA  Takehiko KOBAYASHI  

     
    PAPER

      Vol:
    E85-A No:7
      Page(s):
    1445-1453

    This paper discusses self-similarity in cell dwell time of a mobile terminal, the discovery of which was described in our previous paper, and its effects on teletraffic of mobile communication networks. We have evaluated various teletraffic statistics, such as cell dwell time and channel occupancy time, of a mobile terminal based on measurements of motion for various types of vehicles. Those results show that cell dwell time follows a long-tailed log-normal distribution rather than the exponential distribution that has been used for modeling. Here, we first elaborate on self-similarity in cell dwell time of various vehicles. We then evaluate self-similarity in channel occupancy time. For future mobile multimedia communication systems employing a micro-cell configuration, it is anticipated that data communication will be the main form of communication and that call holding time will be long. For such cases, we have shown that channel occupancy time will be greatly affected by the cell dwell time of the mobile terminal, and that self-similarity, a characteristic that is not seen in conventional systems, will consequently appear. We have also found that hand-off frequently fails as self-similarity in cell dwell time of a mobile terminal becomes stronger.

  • Terminal Migration Model in which Cell Dwell Time is Defined by Different Probability Distributions in Different Cells

    Hirotoshi HIDAKA  Kazuyoshi SAITOH  Noriteru SHINAGAWA  Takehiko KOBAYASHI  

     
    LETTER

      Vol:
    E85-A No:7
      Page(s):
    1693-1695

    In evaluating the teletraffic of mobile communication networks, it is important to model the motion of terminals. In the previous migration model, mobility characteristics of terminals, such as cell dwell time, have been expressed by a single probability distribution. In this paper, we discuss the modeling of the cell dwell time of terminals in each cell. Using measured data we show that cell dwell time differs from cell to cell and follows log-normal distributions rather than conventional exponential distributions.

  • Experiments on Adaptive Antenna Array Transmit Diversity in W-CDMA Forward Link

    Atsushi HARADA  Shinya TANAKA  Mamoru SAWAHASHI  Fumiyuki ADACHI  

     
    PAPER

      Vol:
    E85-A No:7
      Page(s):
    1612-1623

    This paper proposes adaptive antenna array transmit diversity (AAA-TD) in the W-CDMA forward link with frequency division duplexing (FDD), based on adaptively-generated receiver antenna weights in the reverse link, which only track the changes in the average signal-to-interference power ratio (SIR) and direction of arrival (DOA) but with the calibration of the phase/amplitude variations of the parallel RF receiver/transmitter circuits corresponding to the number of array antennas. The laboratory and field experimental results exploiting AAA-TD are presented to show the strong multipath interference (MPI) suppression effect especially from high-rate users with large transmission power. Laboratory experiments elucidate that by using AAA-TD with four antennas, the required transmitted SIR before multiplying the transmitter antenna weights at the average BER of 10-3 is decreased by approximately 13 dB compared to that with one omni-directional antenna transmitter. Field experiments also show that although an error floor above 10-2 is observed with one omni-directional antenna transmitter when the transmitted SIR is -12 dB due to severe MPI, no error floor is observed when employing 4-antenna AAA-TD and the loss of the required received signal power at the average BER of 10-3 from the single-user case is suppressed to below approximately 5 dB. Therefore, we show that AAA-TD is very effective in suppressing severe MPI especially from high rate users with large transmission power due to its adaptive main lobe and null steering.

  • Quick Routing Algorithm on Wireless ATM Network

    Riwu JIN  Shinji SUGAWARA  Tetsuya MIKI  Nobuo NAKAJIMA  

     
    PAPER-Wireless Communication Switching

      Vol:
    E85-B No:7
      Page(s):
    1312-1321

    In this paper, we propose an efficient algorithm of quick routing for private Wireless ATM (Asynchronous Transfer Mode) networks. This algorithm uses hierarchical source routing, which first establishes a connection between the sending node and the home node (which has the terminal location information), and then, partially releases the connection and reroutes it between the sending node and the receiving node. This results in less delay than found in other conventional routing methods, and avoids passing through congested nodes, because this algorithm uses traffic estimation based on queuing theory. We also show the effectiveness of this algorithm with the use of computer simulations.

  • Evaluation of Optimum Adaptive Antenna Array Beam Forming Configuration Considering Diversity Effect in W-CDMA Forward Link

    Satoru FUKUMOTO  Taisuke IHARA  Mamoru SAWAHASHI  Iwao SASASE  

     
    PAPER

      Vol:
    E85-A No:7
      Page(s):
    1594-1603

    This paper investigates the optimum adaptive antenna array beam forming (AAA-BF) configuration considering the diversity effect provided by transmit diversity (TD) in a multipath fading channel in the W-CDMA forward link. Computer simulation results show that the required transmit signal energy per bit-to-background noise power spectrum density ratio (Eb/N0) at the average block error rate (BLER) of 10-2 using AAA-BF coupled with TD is decreased by approximately 1.0 dB compared to that of AAA-BF assuming the identical number of total antennas when the capacity, i.e., the number of simultaneously accommodated users with the transmission power proportional to the symbol rate, normalized by processing gain, Pg, is below approximately 20%. However, we find that in an interference-limited channel, when the capacity normalized by Pg is above approximately 30%, AAA-BF employing all antennas accommodates a larger capacity compared to AAA-BF coupled with TD because of a sufficient interference suppression effect due to a much narrower beam width despite the absence of the antenna diversity effect. This paper also elucidates in a multi-cell model that AAA-BF employing all antennas can accommodate approximately 1.5 times more users with the average BLER of 10-2 and with the outage probability of 5%, compared to the case with AAA-BF coupled with TD, when the total number of antennas is 8.

  • Efficient Multicast Support Exploiting Mobility of Hosts

    Young-yeol CHOO  Yungoo HUH  Cheeha KIM  

     
    LETTER-Terrestrial Radio Communications

      Vol:
    E85-B No:6
      Page(s):
    1213-1217

    The IETF Mobile IP defines two multicast options: remote subscription (RS) and bi-direction tunneling (BT). In order to synthesize the strong points of these two IETF multicast options, we propose a hybrid approach, mMOM, which selectively uses two IETF multicast options based on the mobility of mobile hosts. Whenever a mobile host requests its first registration to a certain foreign agent, the corresponding foreign agent starts the service using the BT option. Afterwards, if it requests re-registration to the same foreign agent, the foreign agent considers it to be relatively immobile and continues services using the RS option. We propose a new metric to compare heterogeneous algorithms. Simulation results show that our approach outperforms all others.

  • Analysis of SIR-Based Downlink Beamforming

    Holger BOCHE  Martin SCHUBERT  

     
    PAPER-Antenna and Propagation

      Vol:
    E85-B No:6
      Page(s):
    1160-1168

    Transmit beamforming is a promising way to increase the downlink capacity of wireless networks. Since all users are coupled via their radiation patterns, the beamforming vectors must be optimized along with power control. It is necessary to balance the signal-to-interference levels according to individual QoS requirements. This problem leads back to the minimization of the infinity-norm of a certain vector and has first been studied by Gerlach and Paulraj in [1]. It has been assumed that the optimum solution can be obtained by minimizing the 1-norm instead, thereby leading to a new problem, which is generally easier to handle. The analytical and numerical results in this paper, however, indicate that this conjecture is generally not valid. We characterize the case where the 1-norm solution also solves the infinity-norm problem. In particular, it is shown that for the special case of a 2-user scenario, both optimization problems are indeed equivalent and a closed-form solution can be given. The analytical results provide new insights into the problem of coupled downlink beamforming and offer a useful approach to the design of efficient and reliable algorithms.

  • Enhanced Linear Estimator for Mobile Location Using Range Difference Measurements

    Qun WAN  Ying-Ning PENG  

     
    PAPER

      Vol:
    E85-B No:5
      Page(s):
    946-950

    A closed-form solution of mobile location can be obtained by minimizing the norm of the error vector of a set of linear equations in spherical interpolation (SI) method. However, it assumes that the intermediate variables are independent though they are related by a quadratic equation. To give an improved position estimate, we use this relationship to help SI method and a new location method is proposed based on the approximate linearization of spherical intersecting constraint. Simulation results for line-of-sight and non-line-of-sight situations show that the proposed method performs significantly better than SI and Chan's method, especially for the cases where large bias and large standard deviation exist in range difference measurements.

  • An Approach to Smooth Foreign Agent Handoff

    Chien-Chao TSENG  Kuang-Hwei CHI  Chen-Hung TSAI  

     
    PAPER-Network

      Vol:
    E85-D No:5
      Page(s):
    847-853

    For ubiquitous computing and communication, a mobile node needs to change upon movements its network- and link-layer points of attachment to the Internet. Conventionally, the network-layer protocol is unaware of the link-layer changes, so IP datagrams to and from a moving node could be lost. Considerable system performance degradation might therefore result. This paper presents a scheme to integrate the handoff procedures of the two layers in the context of Mobile IP with route optimization. Experiment results show that our scheme is promising and can reduce packet loss due to host migrations substantially.

  • An Efficient TCP Mechanism for Mobile IP Handoffs

    Jae-Woo KWON  Hee-Dong PARK  You-Ze CHO  

     
    PAPER-Internet

      Vol:
    E85-B No:4
      Page(s):
    796-801

    Mobile IP is a solution to support host mobility in the Internet. But, packets can be lost during the movement detection and registration periods of the Mobile IP. Regular TCP interprets theses packet losses as signs of network congestion, so it reduces its transmission rate by reducing its window size and slow start threshold. Besides, the multiple packet losses occurring during handoffs trigger successive retransmission timeouts at the TCP sender, causing a long communication pause even after handoff is completed. These together lead to significant throughput degradation. In this paper, we propose two new TCP schemes to reduce packet losses and to alleviate the effects of handoffs on TCP performance. TCP-MD (Movement Detection) is proposed to reduce packet losses by detecting a handoff earlier, and TCP-R (Registration) is designed to prevent packet losses by freezing data transmission during registration. The proposed schemes maintain end-to-end TCP semantics, making it possible to fully interoperate with the existing infrastructure. Only a small change is required in the mobile host, plus the implementation is simple because some Mobile IP messages are used to notify the handoff, eliminating the need for any additional messages. Simulations confirmed that the proposed schemes can give an excellent performance in an environment where the mobile host experiences frequent handoffs.

  • Effect of Head Size for Cellular Telephone Exposure on EM Absorption

    Ae-Kyoung LEE  Jeong-Ki PACK  

     
    LETTER-Electromagnetic Compatibility(EMC)

      Vol:
    E85-B No:3
      Page(s):
    698-701

    Scaled models for an anatomical head model and a simple head model are used to investigate the effects of head size on SAR characteristics for a cellular phone exposure at 835 MHz. From the results, we can see that a larger head produces a higher localized SAR and a lower whole-head averaged SAR.

  • Theoretical Derivation Method of Bit Error Rate in TDMA/TDD Transmitter Diversity under Cochannel Interference

    Fumiaki MAEHARA  Fumihito SASAMORI  Fumio TAKAHATA  

     
    LETTER-Wireless Communication Technology

      Vol:
    E85-B No:3
      Page(s):
    663-666

    Transmitter diversity is a powerful technique to improve the transmission quality of downlink in microcellular mobile communications systems. Under cochannel interference (CCI) at the base station (BS), the transmitter diversity is not necessarily effective, because the desired-plus-interference signal power used as a criterion of downlink branch selection is not always relative to the downlink propagation condition. This paper proposes the theoretical derivation of bit error rate (BER) performance in the transmitter diversity under CCI occurring at BS, as parameters of average SIR at BS, normalized Doppler frequency, and so on. It is confirmed from the correspondence of theoretical results with simulation results that the proposed theoretical approach is applicable to the CCI environments at BS.

  • A Novel Architecture for MIMO Spatio-Temporal Channel Sounder

    Kei SAKAGUCHI  Jun-ichi TAKADA  Kiyomichi ARAKI  

     
    PAPER-Digital Transmission

      Vol:
    E85-C No:3
      Page(s):
    436-441

    Implementation of Multi-Input Multi-Output (MIMO) channel sounder is considered, taking hardware cost and realtime measurement into account. A remarkable difference between MIMO and conventional Single-Input Multi-Output (SIMO) channel sounding is that the MIMO sounder needs some kind of multiplexing to distinguish transmitting antennas. We compared three types of multiplexing TDM, FDM, and CDM for the sounding purpose, then we chose FDM based technique to achieve cost effectiveness and realtime measurement. In the framework of FDM, we have proposed an algorithm to estimate MIMO channel parameters. Furthermore the proposed algorithm was implemented into the hardware, and the validity of the proposed algorithm was evaluated through measurements in an anechoic chamber.

  • One-Time Key Generation System for Agent Data Protection

    Jong-Youl PARK  Dong-Ik LEE  Hyung-Hyo LEE  Joong-Gil PARK  

     
    PAPER-Cooperation in Distributed Systems and Agents

      Vol:
    E85-D No:3
      Page(s):
    535-545

    This paper deals with security issues in a mobile agent system, especially protecting agent data from malicious servers. For this purpose, one-time key generation system, OKGS in short, is proposed. In OKGS, we integrate notions of an one-way hash function and a coupler. A one-way function plays a major role in ensuring confidentiality and integrity of agent data. And the notion of a coupler is used to establish inter-relationship among consecutive encryption keys for agent data, i.e,. all agent keys form a unidirectional chain. With these two features of OKGS, therefore, only the agent owner, who creates the agent bearing data, can decrypt and protect all agent data which are gathered in its itinerary.

  • Wireless Communications R&D in the Science and Technology Policy in Japan

    Takashi IIDA  

     
    INVITED PAPER

      Vol:
    E85-C No:3
      Page(s):
    419-427

    The Fundamental Law of Science and Technology and the Basic Plan of Science and Technology were established in Japan in 1995 and 1996, respectively and the second Basic Plan for Science and Technology R&D was established in April, 2001. In addition, as a part of Japanese government administrative reform, the Council for Science and Technology Policy was organized in the Cabinet Office and the most of the national research laboratories including the Communications Research Laboratory (CRL) have been restructured to the Independent Administrative Institution (IAI). This paper introduces first the relationship between the info-communications R&D and the national science and technology policy in Japan. Second, the R&D of CRL, IAI is introduced. Third, as a typical example of the wireless communications R&D, the research of wireless communication in CRL is shown in more detail in terms of terrestrial wireless/mobile communication system and satellite communication system. Finally the future prospect of such an R&D is shown briefly.

  • Asynchronous Cache Invalidation Strategy to Support Read-Only Transaction in Mobile Environments

    SungHun NAM  IlYoung CHUNG  SungHo CHO  ChongSun HWANG  

     
    PAPER-Databases

      Vol:
    E85-D No:2
      Page(s):
    373-385

    The stateless-based cache invalidation schemes for wireless environments can be categorized into either asynchronous or synchronous cache invalidation according to the broadcasting way of invalidation report. However, if the asynchronous cache invalidation scheme attempts to support local processing of read-only transaction, a critical problem may occur; the asynchronous invalidation reports provide no guarantee of waiting time for mobile transactions requesting commit. To solve this problem, the server in our approaches broadcasts two kind of messages, asynchronous invalidation report to reduce transaction latency and periodic guide message to avoid the uncertainty of waiting time for the next invalidation report. This paper presents a simulation-based analysis on the performance of the suggesting algorithms. The simulation experiments show that the local processing algorithms of read-only transaction based on asynchronous cache invalidation scheme get better response time than the algorithm based on synchronous cache invalidation scheme.

641-660hit(969hit)