Exploiting Opportunistic Scheduling in Cellular Data Networks
|
|
|
- Lee Elliott
- 10 years ago
- Views:
Transcription
1 Exploiting Opportunistic Scheduling in Cellular Data Networks Radmilo Racic, Denys Ma Hao Chen, Xin Liu University of California, Davis 1
2 3G Cellular Networks Provide high speed downlink data access Examples HSDPA (High Speed Downlink Packet Access) EVDO (Evolution-Data Optimized) Approach: exploring multi-user diversity Time-varying channel condition Location-dependent channel condition Opportunistic scheduling Embracing multi-user diversity 2
3 TDM (Time Division Multiplexing) Base station use TDM to divide channels into time slots TTI (Transmission Time Interval) HSDPA: 2 ms EVDO: 1.67 ms 3
4 Opportunistic Scheduling Assumptions Phones channel conditions fluctuate independently But some varying set of phones may have strong channel conditions at any moment Opportunistic scheduling Phones measure and report their CQIs (Channel Quality Indicators) to base station periodically Base station schedules a phone with good channel condition 4
5 Proportional Fair (PF) Scheduler Motivation: strike a balance between throughput and fairness in a single cell Goal: maximize the product of the throughput of all users 5
6 PF Algorithm Base station schedules argmax i CQI i (t ) R i (t ) CQI i ( t) : Instantaneous channel condition of user i R i ( t) : Average throughput of user i, often calculated using a sliding window R i (t) = αcqi (t) + (1 α)r i i (t 1) if i is scheduled (1 α)r i (t 1) otherwise 6
7 PF Vulnerabilities Base station does not verify phone s CQI reports Attack: malicious phones may fabricate CQI PF guarantees fairness only within a cell Attack: malicious phones may exploit hand offs Design flaw: cellular networks trust cell phones for network management 7
8 Attacks Goal: malicious phones hoard time slots Two-tier attacks Intra-cell attack: exploit unverified CQI reports Inter-cell attack: exploit hand off procedure We studied attack impact via simulation 8
9 Threat Model Assumptions Attackers control a few phones admitted into the network, e.g.: Via malware on cell phones Via pre-paid cellular data cards Attackers have modified phones to report arbitrary CQI and to initiate hand off We do not assume that attacker hacks into the network 9
10 Intra cell Attack Assumption: attacker knows CQI of every phone (we will relax this assumption later) Approach: at each time slot, attackers Calculate CQI i (t) required to obtain max Report CQI i (t) to base station CQIi ( t) R ( t) i 10
11 Results from Intra cell Attack 11
12 Inter cell Attack 12
13 Results from Inter cell Attack 13 Timeslots Occupied
14 Attack without Knowing CQIs Problem Attack needs to calculate max CQIi ( t) R ( t) But attacker may not know the every phone s i i CQIi ( t) R ( t) i Solution: estimate c(t +1) = c(t)/(1 ε) c(t)/(1+ σ(c(t) 1)) CQI c(t) = max i (t ) i R i (t ) if attacker is scheduled otherwise 14
15 Results from Unknown CQI Attack 15 Timeslots Occupied
16 CQI Prediction Accuracy 16
17 Attack Impact on Throughput Before attack kbps After attack (1 attacker, 49 victim users) Attacker: 1.5M bps Each victim user: kbps 17
18 Attack Impact on Average Delay Before attack 0.01s between two consecutive transmissions After attack (in a cell of 50 users) One attacker causes 0.81s delay Five attackers cause 1.80s delay Impact: disrupt delay-sensitive data traffic E.g.: VoIP useless if delay > 0.4s 18
19 Attack Detection Detect anomalies in Average throughput Frequency of handoffs Limitations Difficult to determine appropriate parameters False positives 19
20 Attack Prevetion Goal: extend PF to enforce global fairness during hand-off Approach: estimate the initial average throughput in the new cell Estimate average throughput as: R = E(CQI) G(N) E(CQI) : G(N) : N : N expection of CQI opportunistic scheduling gain number of users 20
21 Attack Prevention (cont.) E(CQI B ) G(N B ) G(N B ) R B R A = N B E(CQI A ) G(N A ) N B G(N A ) N A N A 21
22 Related Work Attacks on scheduling in cellular networks Using bursty traffic [Bali 07] Other attacks on cellular networks Using SMS [Enck 05] [Traynor 06] Attacking connection establishment [Traynor 07] Attacking battery power [Racic 06] 22
23 Conclusion Cellular networks grant unwarranted trust in mobile phones We discovered vulnerabilities in PF scheduler Malicious phone may fabricate CQI reports Malicious phone may request arbitrary hand offs Attack can severely reduce bandwidth and disrupt delay-sensitive applications Propose to enforce global fairness in PF to prevent attack 23
Cellular Network Planning and Optimization Part XI: HSDPA. Jyri Hämäläinen, Communications and Networking Department, TKK, 25.1.
Cellular Network Planning and Optimization Part XI: HSDPA Jyri Hämäläinen, Communications and Networking Department, TKK, 25.1.2008 HSDPA HSDPA = High Speed Downlink Packet Access. Release 5 was the first
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
3GPP Wireless Standard
3GPP Wireless Standard Shishir Pandey School of Technology and Computer Science TIFR, Mumbai April 10, 2009 Shishir Pandey (TIFR) 3GPP Wireless Standard April 10, 2009 1 / 23 3GPP Overview 3GPP : 3rd Generation
GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving
GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving 1 Space Division Multiple Access of the signals from the MSs A BTS with n directed antennae covers mobile stations
A Framework for supporting VoIP Services over the Downlink of an OFDMA Network
A Framework for supporting VoIP Services over the Downlink of an OFDMA Network Patrick Hosein Huawei Technologies Co., Ltd. 10180 Telesis Court, Suite 365, San Diego, CA 92121, US Tel: 858.882.0332, Fax:
Downlink resource allocation algorithm: Quality of Service
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Deployment Aspects for VoIP Services over HSPA Networks
Nash Technologies Your partner for world-class custom software solutions & consulting Deployment Aspects for VoIP Services over HSPA Networks Jens Mueckenheim, Enrico Jugl, Thomas Wagner, Michael Link,
ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE
ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE Hung-yu Wei, Samrat Ganguly, Rauf Izmailov NEC Labs America, Princeton, USA 08852, {hungyu,samrat,rauf}@nec-labs.com Abstract Non-uniform
Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1
Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note Bandwidth utilization is the wise use of
Figure 1: cellular system architecture
Question 1: (30 marks) Consider a FDM cellular system with 120 cites, a frequency reuse factor of N=12, and 900 overall two-way channels. Omni-directional antennas are used: Figure 1 shows some of the
VoIP over Wireless Opportunities and Challenges
Prof. Dr. P. Tran-Gia VoIP over Wireless Opportunities and Challenges Universität Würzburg Lehrstuhl für verteilte Systeme H.323 RTP Codec Voice-over-IP over Wireless (VoIPoW) UDP IMS G723.1 SIP G729 HSDPA
Predictive Scheduling in Multi-Carrier Wireless Networks with Link Adaptation
Predictive Scheduling in Multi-Carrier Wireless Networks with Link Adaptation Gokhan Sahin Department of Computer Science and Engineering University of Nebraska-Lincoln, Lincoln, Nebraska Email: [email protected]
Circuit-Switched Voice Services over HSPA
Circuit-Switched Voice Services over HSPA 1 Qualcomm Incorporated, Corporate R&D San Diego, USA Abstract Circuit-Switched (CS) Voice Services over HSPA (CSoHS) was recently introduced for 3GPP WCDMA Release
The Evolution of 3G CDMA Wireless Networks. David W. Paranchych IEEE CVT Luncheon January 21, 2003
The Evolution of 3G CDMA Wireless Networks David W. Paranchych IEEE CVT Luncheon January 21, 2003 Outline Past: cdma2000 1xRTT Present: 1xEV-DO What is it? How does it work? How well does it work? What
Wireless Technologies for the 450 MHz band
Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed
An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems
ICWMC 211 : The Seventh International Conference on Wireless and Mobile Communications An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2 1x EVDO and LTE Systems Xinsheng
Joint Radio Resource Management and QoS Implications of Software Downloading for SDR Terminals
Joint Radio Resource Management and QoS Implications of Software Downloading for SDR Terminals Nicolas Motte, Robert Rümmler 2, David Grandblaise, Lucas Elicegui, Didier Bourse, Eiko Seidel 3 - Motorola
Wireless Cellular Networks: 3G
Wireless Cellular Networks: 3G Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 7-1 Overview Wireless
Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering
Handoff in GSM/GPRS Cellular Systems Avi Freedman Hexagon System Engineering Outline GSM and GSM referemce model GPRS basics Handoffs GSM GPRS Location and Mobility Management Re-selection and routing
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii
TABLE OF CONTENTS Dedication Table of Contents Preface v vii xvii Chapter 1 Overview of Wireless Networks 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Signal Coverage Propagation Mechanisms 1.2.1 Multipath 1.2.2 Delay
NeoConnect Home Suite
NeoConnect Home Suite SERVICES AND SERVICE LEVELS V2.0 1 1. DEFINITIONS 1.1. Except where the context requires otherwise, words, terms and definitions shall have the meaning given to them by the Master
Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse
Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of
White paper. Mobile broadband with HSPA and LTE capacity and cost aspects
White paper Mobile broadband with HSPA and LTE capacity and cost aspects Contents 3 Radio capacity of mobile broadband 7 The cost of mobile broadband capacity 10 Summary 11 Abbreviations The latest generation
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
Nokia Networks. Voice over LTE (VoLTE) Optimization
Nokia Networks Voice over LTE (VoLTE) Optimization Contents 1. Introduction 3 2. VoIP Client Options 5 3. Radio Network Optimization 6 4. Voice Quality Optimization 11 5. Handset Power Consumption Optimization
Scheduling for VoIP Service in cdma2000 1x EV-DO
Scheduling for VoIP Service in cdma2000 1x EV-DO Young-June Choi and Saewoong Bahk School of Electrical Engineering & Computer Science Seoul National University, Seoul, Korea E-mail: {yjchoi, sbahk}@netlab.snu.ac.kr
LTE OPTIMIZATION AND MOBILE NETWORK
FUTUREMOBILE COMMUNICATION: LTE OPTIMIZATION AND MOBILE NETWORK VIRTUALIZATION Yasir Zaki, Andreas Timm Giel,, Carmelita Görg University of Bremen, Technical University of Hamburg Euroview July 23 rd 2012
HSDPA Throughput Performances Using an Experimental HSDPA Transmission System
NTT DoCoMo Technical Journal Vol. 6 No.4 HSDPA Throughput Performances Using an Experimental HSDPA Transmission System Shinya Tanaka, Hiroyuki Ishii, Tomoki Sao, Yousuke Iizuka and Takeshi Nakamori The
Radio Resource Allocation in GSM/GPRS Networks
Radio Resource Allocation in GSM/GPRS Networks Jean-Lien C. Wu 1, Wei-Yeh Chen 2, and Hung-Huan Liu 1 1 Department of Electronic Engineering, National Taiwan University of Science and Technology, 43, Keelung
LTE Evolution for Cellular IoT Ericsson & NSN
LTE Evolution for Cellular IoT Ericsson & NSN LTE Evolution for Cellular IoT Overview and introduction White Paper on M2M is geared towards low cost M2M applications Utility (electricity/gas/water) metering
VoIP-Kapazität im Relay erweiterten IEEE 802.16 System
VoIP-Kapazität im Relay erweiterten IEEE 802.16 System 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Karsten Klagges ComNets Research Group RWTH Aachen University 16. März 2012 Karsten Klagges
NSN White paper February 2014. Nokia Solutions and Networks Smart Scheduler
NSN White paper February 2014 Nokia Solutions and Networks Smart Scheduler CONTENTS 1. Introduction 3 2. Smart Scheduler Features and Benefits 4 3. Smart Scheduler wit Explicit Multi-Cell Coordination
Channel assignment for GSM half-rate and full-rate traffic
Computer Communications 23 (2000) 476 482 www.elsevier.com/locate/comcom Channel assignment for GSM half-rate and full-rate traffic P. Lin, Y.-B. Lin* Department of Computer Science and Information Engineering,
PERFORMANCE AND EFFICIENCY EVALUATION OF CHANNEL ALLOCATION SCHEMES FOR HSCSD IN GSM
Generol Conference (Port B) PERFORMANCE AND EFFICIENCY EVALUATION OF CHANNEL ALLOCATION SCHEMES FOR HSCSD IN GSM Dayong Zhou and Moshe Zukerman Department of Electrical and Electronic Engineering The University
CS 8803 - Cellular and Mobile Network Security: GSM - In Detail
CS 8803 - Cellular and Mobile Network Security: GSM - In Detail Professor Patrick Traynor 9/27/12 Cellular Telecommunications Architecture Background Air Interfaces Network Protocols Application: Messaging
Technical and economical assessment of selected LTE-A schemes.
Technical and economical assessment of selected LTE-A schemes. Heinz Droste,, Darmstadt Project Field Intelligent Wireless Technologies & Networks 1 Mobile Networks enabler for connected life & work. Textbox
Smart Grid Security: A Look to the Future
Smart Grid Security: A Look to the Future SESSION ID: TECH-W03A Gib Sorebo Chief Cybersecurity Technologist Leidos @gibsorebo Overview Distributed Energy Plug-in Vehicles Evolving Threats: Market Manipulation,
CDMA Network Planning
CDMA Network Planning by AWE Communications GmbH www.awe-com.com Contents Motivation Overview Network Planning Module Air Interface Cell Load Interference Network Simulation Simulation Results by AWE Communications
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
Capacity of VoIP over HSDPA with Frame Bundling
Capacity of VoIP over HSDPA with Frame Bundling Yong-Seok Kim Telecommunication Network Business Samsung Electronics Email: [email protected] Youngheon Kim Telecommunication Network Business Samsung
A Systemfor Scanning Traffic Detection in 3G WCDMA Network
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology
Exercise 2 Common Fundamentals: Multiple Access
Exercise 2 Common Fundamentals: Multiple Access Problem 1: TDMA, guard time. To set up a GSM-connection, the base station (BTS) and the mobile station (MS) use the following short access burst in a TDMA-slot
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
How To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
Low-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks
Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks Karamitsos Ioannis Telecom Lab,On Telecoms Athens, Attica 16342, Greece Al-Arfaj Khalid Rayadah Investment Co Riyadh, KSA Kingdom of Saudi
About Me" List of Lectures" In This Course" Mobile and Sensor Systems. Lecture 1: Introduction to Wireless Systems" " Dr. Cecilia Mascolo" "
About Me Reader in Mobile Systems NetOS Research Group Research on Mobile, Social and Sensor Systems More specifically, Human Mobility and Social Network modelling Opportunistic Mobile Networks Mobile
Improved Channel Allocation and RLC block scheduling for Downlink traffic in GPRS
Improved Channel Allocation and RLC block scheduling for Downlink traffic in GPRS Haibo Wang, Devendra Prasad, Xin Zhou Jimena Martinez Llorente, François Delawarde, Gwénaël Coget, Patrick Eggers, Hans
DYNAMIC RADIO RESOURCE MANAGEMENT IN GSM/GPRS USING SCALABLE RESOURCE ALLOCATION TECHNIQUE
DYNAMIC RADIO RESOURCE MANAGEMENT IN GSM/GPRS USING SCALABLE RESOURCE ALLOCATION TECHNIQUE Seok Y Tang, Shyamalie Thilakawardana and Rahim Tafazolli Mobile Communications Research Group Centre for Communications
Priority-Coupling A Semi-Persistent MAC Scheduling Scheme for VoIP Traffic on 3G LTE
Priority-Coupling A Semi-Persistent MAC Scheduling Scheme for VoIP Traffic on 3G LTE S. Saha * and R. Quazi ** * Helsinki University of Technology, Helsinki, Finland ** University of Dhaka, Dhaka, Bangladesh
On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2
On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
Monitoring for Handover from TDD to GSM
Agenda Item: Source: Title: Document for: Siemens Monitoring for Handover from TDD to GSM Handover Preparation Monitoring for Handover from TDD to GSM The intention of this document is an explanation of
Solution for cell edge performance improvement and dynamic load balancing. Qualcomm Technologies, Inc.
HSPA+ Multiflow Solution for cell edge performance improvement and dynamic load balancing Feburary 1, 2014 Qualcomm Technologies, Inc. Not to be used, copied, reproduced, or modified in whole or in part,
LTE VoIP Capacity with Soft Frequency Reuse. Dipl.-Ing. Maciej Mühleisen ComNets TUHH FFV Workshop 15.3.2013
LTE VoIP Capacity with Soft Frequency Reuse Dipl.-Ing. Maciej Mühleisen ComNets TUHH FFV Workshop 15.3.2013 1 Outline Motivation VoIP Scheduling Soft Frequency Reuse Scheduler Concept Scenario & Results
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Abstract - Cellular frequency reuse is known to be an efficient method to allow many wireless telephone
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,
Chapter 15. Cognitive Radio Network Security
Chapter 15 Cognitive Radio Network Security 1 Outline A taxonomy of CR security threats Primary user emulation attacks Byzantine failures in distributed spectrum sensing Security vulnerabilities in IEEE
Cellular Networks: Background and Classical Vulnerabilities
Cellular Networks: Background and Classical Vulnerabilities Patrick Traynor CSE 545 1 Cellular Networks Provide communications infrastructure for an estimated 2.6 billion users daily. The Internet connects
Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA
Emerging Network Security Threats and what they mean for internal auditors December 11, 2013 John Gagne, CISSP, CISA 0 Objectives Emerging Risks Distributed Denial of Service (DDoS) Attacks Social Engineering
Fachgebiet für Kommunikationstechnik. Prof. Dr.-Ing. Klaus David. HSDPA for UMTS. Stephan Sigg 18.04.2005
Fachgebiet für Kommunikationstechnik Prof. Dr.-Ing. Klaus David HSDPA for UMTS Stephan Sigg 18.04.2005 Gliederung HSDPA Concepts HSDPA Control Channels HSUPA Fast Scheduling in HSDPA Fachgebiet für Kommunikationstechnik
Chapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
Mobile VoIP over 1xEV-DO A Technical Whitepaper
Mobile VoIP over 1xEV-DO A Technical Whitepaper Paul Callahan VP, Business Development Airvana, Inc. [email protected] +1 978 244 1877 The Business Case for Mobile VoIP The combination of high performance
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM
Lecture overview History of cellular systems (1G) GSM introduction Basic architecture of GSM system Basic radio transmission parameters of GSM Analogue cellular systems 70 s In the early 70 s radio frequencies
UTRA-UTRAN Long Term Evolution (LTE) and 3GPP System Architecture Evolution (SAE)
UTRA-UTRAN Long Term Evolution (LTE) and 3GPP System Architecture Evolution (SAE) Long Term Evolution of the 3GPP radio technology 3GPP work on the Evolution of the 3G Mobile System started with the RAN
Implementation of Mobile Measurement-based Frequency Planning in GSM
Implementation of Mobile Measurement-based Frequency Planning in GSM Comp.Eng. Serkan Kayacan (*), Prof. Levent Toker (**) (*): Ege University, The Institute of Science, Computer Engineering, M.S. Student
2G/3G Mobile Communication Systems
2G/3G Mobile Communication Systems Winter 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline 2G Review: GSM Services Architecture Protocols Call setup Mobility management
Admission Control for VoIP Traffic in IEEE 802.11 Networks
Admission Control for VoIP Traffic in IEEE 802.11 Networks Sachin Garg Avaya Labs Basking Ridge, NJ 07920 Email: [email protected] Martin Kappes Avaya Labs Basking Ridge, NJ 07920 Email: [email protected]
IAB CONCERNS ABOUT CONGESTION CONTROL. Iffat Hasnian 1832659
IAB CONCERNS ABOUT CONGESTION CONTROL Iffat Hasnian 1832659 IAB CONCERNS Outline 1- Introduction 2- Persistent High Drop rate Problem 3- Current Efforts in the IETF 3.1 RTP 3.2 TFRC 3.3 DCCP 3.4 Audio
EECC694 - Shaaban. Transmission Channel
The Physical Layer: Data Transmission Basics Encode data as energy at the data (information) source and transmit the encoded energy using transmitter hardware: Possible Energy Forms: Electrical, light,
Efficient resource utilization improves the customer experience
White paper Efficient resource utilization improves the customer experience Multiflow, aggregation and multi band load balancing for Long Term HSPA Evolution Executive summary Contents 2. Executive summary
ALL-IP CELLULAR NETWORK ARCHITECTURE FOR EFFICIENT RESOURCE MANAGEMENT
ALL-IP CELLULAR NETWORK ARCHITECTURE FOR EFFICIENT RESOURCE MANAGEMENT Young-June Choi, Kwang Bok Lee and Saewoong Bahk School of Electrical Engineering and Computer Science, INMC Seoul National University
PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE 802.11 WIRELESS LANS
V OICE OVER WIRELESS LOCAL AREA N ETWORK PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE 82.11 WIRELESS LANS HONGQIANG ZHAI, JIANFENG WANG, AND YUGUANG FANG, UNIVERSITY OF FLORIDA The
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Packet Synchronization in Cellular Backhaul Networks By Patrick Diamond, PhD, Semtech Corporation
Packet Synchronization in Cellular Backhaul Networks By Patrick Diamond, PhD, Semtech Corporation (Semtech White Paper October 2008) INTRODUCTION For carriers to leverage cost-effective IP networks to
Introduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Introduction to Clean-Slate Cellular IoT radio access solution. Robert Young (Neul) David Zhang (Huawei)
Introduction to Clean-Slate Cellular IoT radio access solution Robert Young (Neul) David Zhang (Huawei) Page 11 Introduction and motivation There is a huge opportunity for Mobile Network Operators to exploit
Packetized Telephony Networks
Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.
Planning of UMTS Cellular Networks for Data Services Based on HSDPA
Planning of UMTS Cellular Networks for Data Services Based on HSDPA Diana Ladeira, Pedro Costa, Luís M. Correia 1, Luís Santo 2 1 IST/IT Technical University of Lisbon, Lisbon, Portugal 2 Optimus, Lisbon,
Choosing the Right Audio Codecs for VoIP over cdma2000 Networks:
Choosing the Right Audio Codecs for VoIP over cdma2000 Networks: System capacity, Voice quality, Delay, and Transcoding issues Dr. Sassan Ahmadi NOKIA Inc. [email protected] February 8, 2005 1 2005
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
