Handling Mobility in a Wireless ATM Network. Stanford University. Stanford, CA user movement.

Size: px
Start display at page:

Download "Handling Mobility in a Wireless ATM Network. Stanford University. Stanford, CA user movement."

Transcription

1 Handling Mobility in a Wireless ATM Network Bora A. Akyol Donald C. Cox Department of Electrical Engineering Stanford University Stanford, CA akyol@wireless.stanford.edu Abstract The world of wireless telecommunications is rapidly changing. The capabilities of wireless networks are improving at a steady pace. This paper presents a protocol implementation for implementing mobility in an Asynchronous Transfer Mode (ATM) network. The vision of the authors is of one \ATM-based wireless telecommunications network" that is capable of supporting a variety of today's applications with room to grow for advanced applications of the future. 1 Introduction Wireless communication networks, e.g cellular telephony, have rapidly grown to be a sizable part of the world telecommunications market over the past two decades[2]. One reason for the rapid growth of wireless communication networks (WCN) is the mobility of a tetherless terminal. Next generation wireless networks are called Personal Communication Services (PCS) Networks and will provide for global user mobility, a life-long user identication numbering system and ability to accommodate varying data rates. The next generation xed network technology is Asynchronous Transfer Mode and we envision the communication needs of the next generation wireless networks to be accommodated by a xed Asynchronous Transfer Mode (ATM) network. An ATM network is designed to handle integrated voice, video, and data in a single protocol. Future wireless communicators may also handle voice, data, and perhaps images and video[4, 7]. It is then logical to consider an ATM network as the xed supporting network since ATM can carry wireless trac of varying data rates across long distances[5, 9, 10, 11]. We will refer to this combined network as the \ATM-based wireless PCS network." We should also note here that the dierentiating factor between wireless and xed network users is mobility and this paper concentrates on implementing mobility Research supported by Motorola Inc., Schaumburg, IL. and Pacic Bell, San Ramon, CA. within the xed ATM network (The authors are aware of the xed network user mobility schemes such as callforwarding; however, mobility of the wireless users and the ability to place a call anywhere provides sucient reason to consider only the wireless network users.). We propose a possible implementation of mobility in a wireless network supported by an ATM network using the ATM Network Interface (UNI) signaling and a two-tier database architecture to keep track of user movement. 2 Database Architectures to Support Mobility in an ATM Network Mobility is a key advantage of a wireless network. In order to provide mobility, the wireless network must keep track of the location of its users. In a network where users are globally mobile, the tracking of users becomes one of the major functions of the wireless network. A database system is used in order to support the tracking process. The two-tier database architecture used in this research is advantageous in a geographically partitioned network such as a PCS network. We assume that the wireless network service area is partitioned into \zones". Each zone consists of a set of radio ports, the radio port controllers, and the xed network infrastructure that interconnects these radio ports and provides xed network access (See Figure 1). Two types of xed network connections exist in a zone. The rst is the ATM network that interconnects the zones in the wireless network. The second type of connection is the connection between the radio ports and the radio port controllers. This second type of connection is not considered in this paper, but will be addressed in our future research. Hence, in this paper, we assume that the ports and the port controllers are interconnected by an optimized communications link. There is also a database associated with every zone. This database is partitioned into two segments. One segment is reserved for the users that are permanently

2 Controller Database Controller To the ATM Network Wireless-to-ATM Network Interface Figure 1: A Zone in the PCS Network registered in that zone, i.e. the \home" segment. The second segment is for the users that are visiting the zone. The network databases do not keep track of the radio ports that connect the users to the network. The port controller keeps track of radio port and active user information. The user identication numbers determine the location of user's permanent registry and are used in tracking the users. The nearest database is the rst place to be searched in order to locate user information. If the desired information is not found at the nearest database then the permanent registry for that user is queried. We will refer to this architecture as the \twotier database architecture." The European GSM and U.S. IS-41 digital cellular standard of \Home Location Register/Visiting Location Register" is one example of a two-tier database architecture. One important advantage of a two-tier architecture as described above is the two-step deterministic search where a user's prole is retrieved in at most two database look-ups.. An alternative to a two-tier database architecture is a hierarchical structure which takes advantage of the locality and motion patterns of users and organizes the distribution of data accordingly. The main dierence in terms of user identication numbers between a hierarchical scheme and a two-tier scheme is location dependence. In a hierarchical scheme, the user identication numbers do not carry any location information; therefore, the hierarchical scheme will also be referred to as a \Location Independent" scheme. The two-tier architecture is characterized as a \Location Dependent" database architecture. The location independence provides for exibility in choosing service providers and changing home locations at the cost of increased complexity. We are not including the hierarchical structure in this research. 3 Support of Mobility in an ATM Network In this section we discuss the network transactions that are related to user mobility and suggest how they can be implemented using the ATM Network Interface 1 (UNI) signaling protocol [1]. The network transactions related to user mobility are: Registration, Call Setup, Hand-o. We refer to the operational software that manages a zone and the signaling systems in that zone as the \Zone Manager." The zone manager is responsible for database and connection management functions in the zone. There are two networks and two kinds of signaling in the ATM-based wireless PCS network architecture. The zones are interconnected by an ATM network. The zone managers must use the ATM signaling in order to establish connections through the ATM network. The radio ports and portables belong to the wireless network, and the zone managers exchange wireless network signaling messages in order to support the needs of the users and the network itself. The wireless network signaling messages are encapsulated into ATM cells and transmitted through the ATM network to their destinations. See gure 2 for a depiction of connection types and protocols between the layers in the wireless and ATM networks. 3.1 ATM Connection Setup Procedure A procedure that is common to all of the wireless network transactions is establishing a connection through the xed ATM network. We will digress here and describe how an ATM connection is established in a xed network context[1], using current ATM protocols between two ATM network entities and then describe how registration, call setup and hand-o are implemented using this procedure. 1 ATM UNI (version 3.1) is an implementation agreement proposed by the ATM Forum and coincides with the ITU- Q.2931 signaling protocol implementation. In this text the UNI signaling messages are typeset in BOLDFACE characters. Note also that the zones of the wireless network will appear as \users" to the xed ATM network hence use of ATM UNI signaling is justied.

3 s Controllers Zone Manager (ZONES) ATM Network Backbone Physical Link * Wireless Network Signaling Messages Using ATM ITU Q.2931B Signaling Messages Using ATM Physical Link Layer Protocol s Controllers Zone Manager (ZONES) ATM Network Backbone Physical Link Wireless Network Layers (*) The radio ports and port controllers can only communicate with the corresponding zone managers. The comm. between radio ports and port controllers is unspecified. Figure 2: Protocol Layers in the Wireless and ATM Networks. The radio ports and the port controllers may only communicate with the zone managers. An ATM connection in a xed network context is established between two parties directly connected to the ATM network, the calling party that initiates the connection and the called party that is the destination. This process is discussed in the following paragraphs 2 : 1. SETUP: The setup message is sent from the calling party 3 to the ATM network and from the ATM network to the called party. This message includes the called party address information, ATM user cell rate (ATM trac descriptor), broadband bearer capability and quality of service (QoS) parameters. The ATM network is responsible for selecting a connection identier and sending a setup message to the called party. For network management purposes the connection is also assigned a call reference by the ATM network. This call reference is used in all of the following messages to refer to the ongoing connection setup. 2 We will refer to this procedure as the ATM connection setup procedure throughout the text. Note that this procedure is in a xed network context and is used by all ATM network users. The zone managers will also use this procedure to establish ATM connections. 3 The calling/called parties will be zone managers in the wireless access ATM network context. If the radio ports, and the port controllers are also interconnected by the ATM network, then the same procedure will be used by the ports and controllers as well. 2. CALL PROCEEDING: The ATM network upon receiving the SETUP message will determine whether the access to the requested service is authorized. If the access is authorized then the network sends a CALL PROCEEDING message to the calling user. The calling user then waits for the connection. 3. CONNECT: The connect message is sent by the called party to the ATM network to indicate call acceptance. The ATM network then sends a similar message to the calling party to indicate that a connection is established. If the called party is not able to send a CONNECT message in the allocated time, it sends a CALL PROCEED- ING message to the ATM network while processing the connection request. If a CALL PRO- CEEDING message is sent by the called user to the ATM network, the ATM network waits for a CONNECT message until the connection setup timer expires. 4. CONNECT ACKNOWLEDGE: The calling user sends this message to the ATM network to acknowledge the successful connection, and goes into active state. The ATM network sends this message to the called party to acknowledge the successful connection setup. The state diagram for ATM connection setup is given in Figure 3. The ow of ATM signaling messages for a successful ATM connection setup is given in Figure 4. In a network where multiple hops are needed to establish a connection, this procedure is repeated at every hop. If an intermediate node does not have the resources to establish the connection, a RELEASE COMPLETE message will be sent to the initiating party to clear the call. If the called user is busy or if the incoming request is rejected the called user will send a RELEASE COMPLETE message which will include the reason for refusal. An active connection is terminated by the user by sending a RELEASE message to the network and the network will respond with a RELEASE COM- PLETE message and both parties will enter the idle state. 3.2 Registration In Section 3.1 we discussed how an ATM connection in the xed ATM network is established. In the following sections we show how the ATM Connection Setup procedure may be used to implement Registration, Call Setup, and Hand-o transactions of the wireless network.

4 IDLE Send SETUP to Network Time Expired CALL INIT Call Rejected Call completed Receive (Rcv) Call Proc. from Network CALL PROC. Rcv. CONNECT from Network Send CONNECT ACK. ACTIVE Figure 3: ATM Connection SETUP state diagram Calling Party SETUP CALL PROC. CONNECT CONNECT ACK. ATM Network SETUP CONNECT CONNECT ACK. Called Party Figure 4: Signaling Message Flow for ATM connection setup. Registration is performed to maintain information about the mobile user locations. It is also used to ensure the validity of user location information. The registration is performed as follows: 1. The registration process starts with the transmission of the user identication number (UID) and user's previous zone identication from the portable that enters a new zone. The portable recognizes the zone change by comparing the current zone identication with the stored last zone identication. The radio ports are assumed to transmit zone identication beacon signals periodically to assist the registration process [3]. After exchange of authentication keys, user's password is also transmitted over the radio interface in an encrypted message. 2. Upon receiving the UID and the authentication information, the zone manager (ZM) of the new zone establishes an ATM connection to the zone that contains the user prole (\home" zone) 4. The location of the user prole may be obtained by querying the user's previous known zone. The zone managers communicate by using the wireless network signaling protocol messages that are encapsulated into ATM cells. 3. After the ATM connection between the new and home zone managers is established, the zone manager of the user's current zone requests user's authentication record and upon receipt of this record, the user is authenticated. 4. If authentication is successful, the user's prole is updated with the new location information and the updated prole is transferred to the current zone. 5. The user's prole in the previous zone is deleted by establishing an ATM connection to the previous zone manager. 6. If the authentication is unsuccessful then the user access is denied. 7. After the registration transaction is complete, the connection is released using RELEASE and RE- LEASE COMPLETE messages. Please see Figure 5 for message ows for a successful registration. 3.3 Call Setup The call setup procedure is used to establish a connection between two wireless network users. In this section, the originating zone refers to the calling user's zone and the destination zone refers to the called user's zone. The call setup proceeds as follows: 1. Called user identication number (CUID) is transmitted from the portable to the originating zone manager together with call setup parameters such as required bandwidth, trac type, etc. 2. The originating zone manager (OZM) forms an ATM UNI protocol SETUP message using the incoming call parameters and proceeds as follows: (a) OZM requests the called user's location information from the wireless network. The procedure for this process is similar to what is described in sections 2, 3.2 and gure 5. 4 Note that if the user prole is stored in a hierarchical database structure then a search has to be performed in order to locate the record; however, the steps involved in each step of the search will the same as what will be described in the following paragraphs.

5 Portable New Zone Home Zone Previous Zone Registration Request Establish ATM connection and obtain Profile from Home Database Call blocking may be checked at the same time as the user's prole is obtained. The connection setup for the user connection may be initiated by the OZM. Profile Calling Call Setup Request Zone Manager ATM Network ATM Conn. Setup to called user DB. Database Zone Manager Called Notify user Loc. Data If user is authenticated delete profile from previous zone. ATM Conn. Setup to called user zone. Accept Conn. Page Respond Figure 5: Signaling Message Flow for Registration Alert Calling Setup Conn. (b) When the called user's location information is retrieved from the network, an ATM connection is established to the called user's current zone manager using the ATM connection setup procedure. (c) After the connection is established, the originating zone manager (OZM) passes the calling user's identication number to the destination zone manager (DZM) and requests a connection setup. If the calling user's identication number is not in the call blocking list of the called user then the called user is paged, if the page is successful, the DZM requests an ATM connection between the two users. If the page is not successful then the called user is pronounced inactive and the proper record is updated. If the calling user is in the call blocking list of the called user, the connection is rejected. (d) Pending ATM user connection establishment, the calling user and the called user are notied and the connection is established. (e) If the called user is busy, the DZM noti- es the OZM of the \busy" state and call attempt is terminated. The connection between the two zone managers is cleared. 3. After the call is complete, the ATM connection is released using RELEASE and RELEASE COMPLETE ATM signaling messages. See Figure 6 for the call setup transaction ow for a successful call. Remarks: Respond Conn. Established Conn. Established TWO WAY USER CONNECTION ESTABLISHED Figure 6: Signaling Message Flow for Call Setup 3.4 Inter-zone Hand-o The inter-zone hand-o process depends on its implementation in the wireless network. We will assume the following: Hand-o is portable initiated. The portables monitor the link quality in terms of received signal power to candidate radio ports and when the link to another port becomes stronger that port is selected and hand-o is executed[3]. The hand-o process may be initiated in two ways: The portable may tune into the control channel of the candidate radio port and initiate a hand-o through the candidate port or the portable may use the existing link with the previous port to initiate the hand-o. The latter method is used more frequently in present systems[3]; however, both methods have merit and will be discussed. The only kind of hand-o that generates network trac is an inter-zone hand-o. Therefore we will limit the discussion to inter-zone hand-os. The intra-zone hand-o is performed in a similar manner by the radio port controller without generating network signaling trac.

6 Since we limit our discussion to the inter-zone handos, the candidate radio port and the previous radio port are in dierent zones. The candidate radio port is controlled by the \candidate zone manager." The previous radio port is controlled by the \previous zone manager." Please refer to gures 7, 8 and 9 for details. The hand-o will proceed as described below: Hand-o through the Previous Port 1. In this case, the portable realizes that a link of better quality exists to a candidate radio port. The portable records the identity of the candidate port. 2. The portable sends a message to the previous zone manager (PZM) desiring a hand-o to the candidate radio port. 3. The PZM establishes an ATM connection to the candidate zone manager (CZM) using the ATM connection setup procedure. 4. The PZM transfers a copy of the user prole to the CZM, CZM assigns a channel to the user, relays the channel assignment information to the PZM. 5. The PZM contacts the end point for the user connection and requests re-routing to the candidate zone. 6. Once the re-routing is complete, the PZM contacts the portable and relays the channel assignment information. 7. The portable tunes to the new channel and contacts the CZM. 8. The CZM and the portable verify the connection. After verication the CZM noties the PZM of the successful hand-o. If the connection is not veried, the portable tunes to the previous channel and starts scanning for candidate ports. The CZM deallocates the assigned channel. 9. If the hand-o is successful, the PZM deletes user prole Hand-o through the Candidate Port 1. The portable initiates a hand-o by establishing a link with the candidate radio port in the candidate zone and requesting a hand-o from the candidate zone manager. This message includes the user's identication number and previous zone identication. 2. The candidate zone manager acknowledges this message. The candidate zone manager (CZM) establishes an ATM connection to the previous zone manager (PZM) using the ATM connection setup procedure. The portable tunes back to its previous channel after the acknowledgment is received. 3. Following the connection establishment, the CZM requests a hand-o. The PZM transfers the user prole to the CZM using the ATM connection. The PZM shall also send a re-routing message to the ATM network so that the route to the candidate zone can be setup The CZM provides the PZM with the channel assignment information for the portable. Pending re-routing success, the CZM starts to buer the information for the portable. If the re-routing is not successful the hand-o attempt is dropped, the PZM is notied. The PZM in turn noties the portable. 5. If the re-routing is accomplished, the PZM sends the proceed with hand-o message to the portable that is still tuned to the channel in the previous zone. The proceed with hand-o message includes the channel assignment information for the candidate zone. If the portable cannot be raised at the previous zone, the CZM will be notied and the CZM will page the portable to establish a link. This page includes the candidate channel assignment. 6. The portable, after receiving either the channel assignment information or the page from the CZM, tunes to the assigned channel and transmission is initiated. In either case the buered information is passed on to the portable in the order received. If the accepted time limits for the connection are exceeded then some information such as expired voice packets may be dropped, 7. When the stability of the new link is proven, and thus the hand-o is completed, the ATM connection between the zone managers is released. Upon release of this connection the PZM updates the user's prole using a procedure similar to registration (authentication is not needed in this case) 5 Currently this can only be achieved using a SETUP message to establish the new connection. However, we can use the fact that the hand-o is most likely to occur between neighboring zones and perform the re-routing at the nearest common network point, this capability will need to be added into the ATM network signaling protocol.

7 and erase the information that is buered for the portable at the previous zone. Portable Previous Zone Mgr. Candidate Zone Mgr. End point for user connection Hand-off Request Establish ATM Conn. Request Hand-off Previous Link Candidate Link Channel Assignment Radio Port Controller Previous Radio Port Portable Candidate Radio Port Channel Assignment Data Establish ATM Conn. Request Re-routing Verify Radio Connection Connection Verified Re-route complete Notify end point PREVIOUS ZONE Radio Port Controller CANDIDATE ZONE Re-routed data Figure 8: Signaling Message Flow for Successful Hando, Case 1, Using Previous Port Figure 7: The Hand-o: Basic Picture. Here the candidate zone is designated as a candidate for hand-o. The previous zone is the zone the portable is communicating with before the hand-o. The dierences between these two alternative methods are subtle; however, the former method (hand-o through the previous port) does not need synchronization to the control channel of the candidate port and uses the existing radio link to the previous port for hand-o related signaling. Note that if hand-o is being performed because the existing link is deteriorating, then the success of the former method is not assured; nevertheless, if the portables monitor the link quality frequently then this will be a minor problem. The latter method suers from diculty of carrying on two connections at once but does not suer from the failing link problem of the latter. We have now outlined the proposed implementation of mobility within the xed ATM network. The next topic will the investigation of the impact of mobility on the xed ATM networks. 4 Impact of Mobility on the ATM Network In this section we discuss the impact of mobility on the current ATM network technology. The current ATM networks are being designed to handle xed users. The user's identication number is used to determine where the user is and how to route a call to the user. However, in a mobile user environment the user numbers do not yield any information about the user's location. In such an environment the user's number must be used as a means to retrieve the location information. Note that if the wireless and ATM networks were separate entities in which no cross-interaction between users occurred, then the discussions in the previous sections would provide a way of implementing a self-contained wireless network supported by an ATM network. However, the users in the respective networks need to interact with each other, so the ATM signaling protocols need to be modied to understand the existence of mobile users. In the following sections we will discuss methods which may be used to make ATM understand the existence of mobile users. 4.1 Making ATM Work with Mobile s The Interim Solution The ATM signaling protocol currently understands only xed user numbers. These numbers are treated very much like a phone number to establish where to route a call to any given user. When xed ATM users are allowed to interact with mobile users we will face the following numbering system problem. When an ATM user desires to connect to a user that is a wireless network subscriber, the called user's number is useless for an ordinary ATM host. This implies that we need to have a numbering scheme that accommodates the mobile users. An interim solution is to to dene PCS subscriber numbers as specially marked ATM numbers, e.g. special area codes, and have ATM to wireless user calls routed to designated wireless user switches that re-route the calls to their nal destinations. The calls from wireless network subscribers to xed ATM

8 Portable 1 Initiate Hand-off Alternate Zone Manager Acknowledge Hand-off Proceed Verify Radio Connection Initiate Data Transfer Hand-off Request Information Acknowledge Previous Zone Manager Acknowledge Release Connection Re-routing Request ATM Connection Setup Data Data Sent to New Zone Release Hand-off Complete End Point for the Connection Figure 9: Signaling Message Flow for Successful Hando, Case 2, Using Candidate Port hosts do not constitute a problem as the burden of establishing the connection lies with the wireless network which is aware of both kinds of numbering plans and users. This alternative is easy to implement and does not require any major modication to the ATM protocols. Because of ease of implementation this approach could provide a good interim solution. Unfortunately, this interim method may not scale well as the number of wireless network users grow and the wireless switching centers get congested. We might also face having to re-route calls across hundreds of miles to establish a connection to a user that is only 5 miles away. This leads the way to our next topic which relieve the problems discussed so far Wireless-aware ATM Interface Approach A wireless-aware ATM interface approach will distribute the wireless switching center functionality to all xed ATM end-points including ATM switches and ATM interface equipment at user terminals. This is accomplished by designating a special numbering scheme which identies the wireless users as \mobile" and cause a dierent signaling mechanism to be employed for voice and data calls that are to or from wireless users. These mechanisms are similar to the wireless network messages discussed in section 3. For example, if an ATM user needs to establish a data connection to a wireless network user, the protocol recognizes that the user is mobile and try to obtain the location information for that user using wireless network signaling procedures. Once the location information is obtained, a connection is setup and the users start exchanging information. This distributes the intelligence to the xed network user interfaces and will result in more eective use of network resources. The following are a few additional issues that need to be addressed for implementation of ATM-based wireless PCS networks. 4.2 Wireless users in a Multi-tier Environment A multi-tier network environment is dened as one that will provide dierent bandwidth capacities to users depending on their locality. An example of a multi-tier architecture is given in [8]. In a campuswide setting the users may be able to attain a few megabits per second data rates. As they leave the campus and go into a wider area, the wireless network may change the available data rate to a lower value but still will allow the connection to continue in a seamless manner. Accommodating changing data rates on a pre-established connection may cause a problem to the supporting xed ATM network. In some environments a tier change could cause the available channel bandwidth to decrease or to increase by an order of magnitude or more. Currently, using ATM UNI signaling, once an ATM connection is established the only way to change the allocated bandwidth is to reestablish the connection. Clearly, we need to dene a procedure by which the bandwidth allocated for an established connection may be changed. One approach to solving this problem can be classied as an extension of ATM ow control algorithms. When the user changes a tier in the multi-tier network, the ATM ow control mechanisms will either detect an extreme congestion in the case of a bandwidth decrease or they may be programmed to detect a completely empty packet queue in case of a bandwidth increase. This in turn could trigger the network to send a message to either party asking for renegotiation of ATM trac descriptors. We shall call this method the Autonomous Bandwidth Negotiation Algorithm. Alternatively, the wireless access network could notify the ATM network of the tier change. Upon notication the ATM network may change the parameters for the established connection. 4.3 Handling Bursts of Errors in the Wireless Network The wireless environment suers from stochastic channel degradation; therefore, occasional bursts of errors may occur for data that is transmitted over a

9 radio interface. In the current ATM adaptation layer implementations, the only recovery from such an error burst is re-transmitting the complete information packet through the network. In order to prevent the excessive use of network resources the wireless network zone managers may need to be able to buer large amounts of data so that such errors only result in a re-transmit over the radio interface. 4.4 Re-routing Strategy for Hand-o A hand-o is performed when a portable unit determines that a better quality radio link is available. Typically hand-o results in switching to a neighboring zone. When the hand-o process is handled by the network, we may make use of the locality of hand-o and choose to re-route at the nearest common network node between the two zones. However, the current ATM signaling does not permit a re-routing at an intermediary point of an ATM connection[1]. In order to handle hand-o in an ecient manner we need to dene the protocol that needs to be added to the existing ATM protocol set so that the concept of nearest common node is dened. Once the nearest common node is dened then what needs to be done for hando is to adjust the routing and translation tables at the nearest common node and the nodes between the nearest common node and the zone where the hand-o is performed. This strategy is Nearest Common Node Re-routing. Some alternative hando approaches are discussed in [10, 11]. 5 Conclusion The integration of the xed Asynchronous Transfer Mode and the next generation wireless personal communications networks is a challenging problem. The current ATM networks do not have the means to understand or to support mobile users. On the other hand, the specications for current wireless networks are still being designed to interface with the plain old telephone networks. In this paper we proposed a protocol implementation to integrate mobility into the ATM protocol stack. Our vision is of one network that is an integration of today's xed and mobile networking technologies; namely, an ATM-based wireless PCS network. Also in this paper, we have established a database architecture to support mobility in the ATM network, we have dened the signaling structure needed to support the mobility and we have given counterparts for these signaling messages in terms of ITU-Q.2931 signaling messages. We also identied the issues involved in the interactions between wireless and xed ATM users, and wireless users in multi-tier environments. Other remaining issues are: An alternative wireless network architecture which will use the ATM protocol not only in the backbone but also on links between the radio port controllers and the ATM network and perhaps also from radio ports to port controllers. A radio-access structure that is able to accommodate varying data rates in a multi-tier environment. An addendum proposal to current ATM UNI specications to incorporate the solutions for the issues raised in Section 4. A complete wireless network signaling specication which solidies the procedures described in this paper. References [1] ATM Forum Network Interface specication version 3.1, ATM Forum, May [2] D. C. Cox, \Wireless Network Access for Personal Communications," IEEE Comm. Mag., Vol. 30, No. 12, pp , Dec [3] D. C. Cox, \A Radio System Proposal for Widespread Low-Power Tetherless Communications," IEEE Trans. on Comm., Vol. 39, No. 2, pp , Feb [4] R. R. Gejji, \Mobile Multimedia Scenario Using ATM and Microcellular Technologies," IEEE Trans. on Veh. Tech., Vol. 43, No. 3, pp , Aug [5] I. M. Leslie, et al., \ATM Everywhere," IEEE Network, pp , March [6] C. N. Lo et al., \An Estimate of Network Database Transaction Volume to Support Universal PCS," ICUPC '92, Dallas, TX., 29 Sept.-1 Oct [7] Arthur Miller, \From here to ATM," IEEE Spectrum, pp , June [8] J. F. Rizzo and N. R. Sollenberger, \Multitier Wireless Access," IEEE Personal Comm. Mag., June [9] D. Raychaudhuri et al., \ATM Based Transport Architecture for Multiservices Wireless Personal Communication Networks," IEEE J. on Selected Areas in Comm., October 1994, pp [10] A. S. Acampora et al., \An architecture and methodology for mobile-executed cell hand-o in wireless ATM networks," Proceedings of International Zurich Seminar on Digital Comm., Zurich, Switzerland, 8-11 March [11] R. Yuan et al., \Mobility Support in a Wireless ATM Network," 5th Workshop on 3rd Generation Wireless Information Networks, 1995, Kluwer Publishers, pp

An AAL3/4-based Architecture for Interconnection between ATM and Cellular. Networks. S.M. Jiang, Danny H.K. Tsang, Samuel T.

An AAL3/4-based Architecture for Interconnection between ATM and Cellular. Networks. S.M. Jiang, Danny H.K. Tsang, Samuel T. An AA3/4-based Architecture for Interconnection between and Cellular Networks S.M. Jiang, Danny H.K. Tsang, Samuel T. Chanson Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong

More information

An Efficient DECT-Mobile IP Interworking for Mobile Computing

An Efficient DECT-Mobile IP Interworking for Mobile Computing An Efficient DECT-Mobile IP Interworking for Mobile Computing Anthony Lo *, Winston Seah * and Edwin Schreuder + * Centre for Wireless Communications 1, National University of Singapore, 20 Science Park

More information

Next, we compare procedures for certain feature scenarios. In the IS-41 approach, features are handled in three ways: by the HLR upon receiving a

Next, we compare procedures for certain feature scenarios. In the IS-41 approach, features are handled in three ways: by the HLR upon receiving a Next, we compare procedures for certain feature scenarios In the IS-41 approach, features are handled in three ways: by the HLR upon receiving a LOCREQ, a serving upon receiving a ROUTEREQ, or by the serving

More information

Andrew T. Campbell, Javier Gomez. Center for Telecommunications Research, Columbia University, New York. [campbell,

Andrew T. Campbell, Javier Gomez. Center for Telecommunications Research, Columbia University, New York. [campbell, An Overview of Cellular IP Andrew T. Campbell, Javier Gomez Center for Telecommunications Research, Columbia University, New York [campbell, javierg]@comet.columbia.edu Andras G. Valko Ericsson Research

More information

PSTN MSC. ATM Backbone ISDN. Frame. Channels Synch. Downlink Unicast/Multicast. Request/Update. Downlink Broadcast. New User. Uplink Data.

PSTN MSC. ATM Backbone ISDN. Frame. Channels Synch. Downlink Unicast/Multicast. Request/Update. Downlink Broadcast. New User. Uplink Data. MAC Layer Scheduling Strategies during Hando for Wireless Mobile Multimedia Networks Shalinee Kishore 1, Prathima Agrawal 2, Krishna M. Sivalingam ;3 and Jyh-Cheng Chen 4 1 WINLAB, Rutgers University,

More information

Wireless ATM - An Overview

Wireless ATM - An Overview Wireless ATM - An Overview Xinri Cong, cong@cis.ohio-state.edu Abstract This paper studies the concepts and architecture of Wireless ATM (WATM). Several key design issues are addressed. Other Reports on

More information

TELEPHONY CONTROL PROTOCOL SPECIFICATION

TELEPHONY CONTROL PROTOCOL SPECIFICATION Part F:3 TELEPHONY CONTROL PROTOCOL SPECIFICATION TCS Binary This document describes the Bluetooth Telephony Control protocol Specification Binary (TCS Binary), using a bit-oriented protocol. This protocol

More information

Satellite. Call Processor. ATM Switch

Satellite. Call Processor. ATM Switch 9th yrrhenian Workshop on Digital Communications, Lerici (Italy), Sep. 1997 Media Access Protocols for use with Smart Array Antennas to Enable Wireless Multimedia Applications Anthony S. Acampora, Srikanth

More information

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc Extensions to RTP to support Mobile Networking Kevin Brown Suresh Singh Department of Computer Science Department of Computer Science University of South Carolina Department of South Carolina Columbia,

More information

Dheeraj Sanghi. Abstract. In the last few years, there have been a revolution in the telecommunication scenario of

Dheeraj Sanghi. Abstract. In the last few years, there have been a revolution in the telecommunication scenario of NUMBERING PLAN FOR INTERNET TELEPHONY Dheeraj Sanghi Abstract In the last few years, there have been a revolution in the telecommunication scenario of the country. There are new services like paging, cellular,

More information

Scalability Enhancements for. Connection-Oriented Networks. E. Gauthier J.-Y. Le Boudec. Laboratoire de Reseaux de Communication (LRC),

Scalability Enhancements for. Connection-Oriented Networks. E. Gauthier J.-Y. Le Boudec. Laboratoire de Reseaux de Communication (LRC), Scalability nhancements for Connection-Oriented Networks. Gauthier J.-Y. Le Boudec Laboratoire de Reseaux de Communication (LRC), PFL CH-05 Lausanne June 4, 995 Abstract We consider the issue of increasing

More information

A Signaling and Control Architecture for. Mobility Support in Wireless ATM Networks. R. Yuan, S. K. Biswas, L. J. French, J. Li and D.

A Signaling and Control Architecture for. Mobility Support in Wireless ATM Networks. R. Yuan, S. K. Biswas, L. J. French, J. Li and D. A Signaling and Control Architecture for Mobility Support in Wireless ATM Networks R. Yuan, S. K. Biswas, L. J. French, J. Li and D. Raychaudhuri NEC USA, C&C Research Laboratories 4 Independence Way Princeton,

More information

Lecture 1 Overview - Data Communications, Data Networks, and the Internet

Lecture 1 Overview - Data Communications, Data Networks, and the Internet DATA AND COMPUTER COMMUNICATIONS Lecture 1 Overview - Data Communications, Data Networks, and the Internet Mei Yang Based on Lecture slides by William Stallings 1 OUTLINE Data Communications and Networking

More information

A Handover Optimisation Scheme in Cellular Networks

A Handover Optimisation Scheme in Cellular Networks A Handover Optimisation Scheme in Cellular Networks A.Gueroui and S.Boumerdassi Laboratoire PRiSM, Université de Versailles 45, Avenue des Etats-Unis 78035 Versailles France Laboratoire CEDRIC, CNAM 292,

More information

Global IP Network System Large-Scale, Guaranteed, Carrier-Grade

Global IP Network System Large-Scale, Guaranteed, Carrier-Grade Global Network System Large-Scale, Guaranteed, Carrier-Grade 192 Global Network System Large-Scale, Guaranteed, Carrier-Grade Takanori Miyamoto Shiro Tanabe Osamu Takada Shinobu Gohara OVERVIEW: traffic

More information

Design and Analysis of QoS Supported Frequent Handover Schemes in Microcellular ATM Networks

Design and Analysis of QoS Supported Frequent Handover Schemes in Microcellular ATM Networks 942 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 50, NO. 4, JULY 2001 Design and Analysis of QoS Supported Frequent Handover Schemes in Microcellular ATM Networks Kuochen Wang and Lon-Sheng Lee Abstract

More information

A Centralized Approaches for Location Management in Personal Communication Services Networks

A Centralized Approaches for Location Management in Personal Communication Services Networks A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,

More information

E. ZERVAS. Dept. of Electronics, TEI-Athens, Egaleo - Greece. A. KALOXYLOS, L. MERAKOS

E. ZERVAS. Dept. of Electronics, TEI-Athens, Egaleo - Greece.   A. KALOXYLOS, L. MERAKOS LAMPS: LOCATION AGENTS AND MOBILE-PNNI SCHEME E. ZERVAS Dept. of Electronics, TEI-Athens, 12444 Egaleo - Greece E-mail: zervas@ee.teiath.gr A. KALOXYLOS, L. MERAKOS Communication Networks Laboratory, Dept.

More information

Data Service Options for Spread Spectrum Systems:

Data Service Options for Spread Spectrum Systems: GPP C.S00-0-A Version.0 May, 00 Data Service Options for Spread Spectrum Systems: Service Options and GPP 00 GPP and its Organizational Partners claim copyright in this document and individual Organizational

More information

A Programmable MAC. of providing minimal perceptual distortion when the desired. extend and complicate, as they need to include the adaptation

A Programmable MAC. of providing minimal perceptual distortion when the desired. extend and complicate, as they need to include the adaptation Abstract Giuseppe Bianchi Politecnico Di Milano Dipartimento di Elettronica e Informazione Piazza L. da Vinci 32, 20133 Milano, Italy bianchi@elet.polimi.it Multimedia service integration over wireless

More information

H.323. Definition. Overview. Topics

H.323. Definition. Overview. Topics H.323 Definition H.323 is a standard that specifies the components, protocols and procedures that provide multimedia communication services real-time audio, video, and data communications over packet networks,

More information

Space Priority Trac. Rajarshi Roy and Shivendra S. Panwar y. for Advanced Technology in Telecommunications, Polytechnic. 6 Metrotech Center

Space Priority Trac. Rajarshi Roy and Shivendra S. Panwar y. for Advanced Technology in Telecommunications, Polytechnic. 6 Metrotech Center Ecient Buer Sharing in Shared Memory ATM Systems With Space Priority Trac Rajarshi Roy and Shivendra S Panwar y Center for Advanced Technology in Telecommunications Polytechnic University 6 Metrotech Center

More information

Transport Performance Evaluation of an ATM-based UMTS Access Network

Transport Performance Evaluation of an ATM-based UMTS Access Network Transport Performance Evaluation of an -based US Access Network Nikos H. Loukas, Christos K. Xenakis, Lazaros Merakos University of Athens, Department of Informatics, Communication Networks Laboratory

More information

SUPPORT OF HANDOVER IN MOBILE ATM NETWORKS

SUPPORT OF HANDOVER IN MOBILE ATM NETWORKS SUPPORT OF HANDOVER IN MOBILE ATM NETWORKS Péter Fazekas fazekasp@hit.hit.bme.hu Tel: (36) 1-463-3256 Fax: (36) 1-463-3263 Department of Telecommunications Pázmány Péter sétany 1/D Polytechnic University

More information

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu

More information

Requirement Plan Plan Name: LTE_Data_Retry Plan Id: LTEDATARETRY Version Number: 31 Release Date: June 2018

Requirement Plan Plan Name: LTE_Data_Retry Plan Id: LTEDATARETRY Version Number: 31 Release Date: June 2018 Requirement Plan Requirement Plan Plan Name: Plan Id: LTEDATARETRY Version Number: 31 Release Date: June 2018 This document provides initial information related to Verizon Wireless Long Term Evolution

More information

What is the role of teletraffic engineering in broadband networks? *

What is the role of teletraffic engineering in broadband networks? * OpenStax-CNX module: m13376 1 What is the role of teletraffic engineering in broadband networks? * Jones Kalunga This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution

More information

Seamless Traffic Migration between the Mobile and Fixed Networks

Seamless Traffic Migration between the Mobile and Fixed Networks Data Traffic Migration Seamless Traffic Migration between the Mobile and Fixed Networks We have developed traffic migration technology for distributing communication traffic from mobile networks to fixed

More information

\Classical" RSVP and IP over ATM. Steven Berson. April 10, Abstract

\Classical RSVP and IP over ATM. Steven Berson. April 10, Abstract \Classical" RSVP and IP over ATM Steven Berson USC Information Sciences Institute April 10, 1996 Abstract Integrated Services in the Internet is rapidly becoming a reality. Meanwhile, ATM technology is

More information

Optical networking technology

Optical networking technology 1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the

More information

EEG453 Multimedia systems Dr. Mohab Mangoud University of Bahrain. Lecture # (3) Communication networks

EEG453 Multimedia systems Dr. Mohab Mangoud University of Bahrain. Lecture # (3) Communication networks EEG453 Multimedia systems Dr. Mohab Mangoud University of Bahrain Lecture # (3) Introduction to Multimedia Communication networks Elements of Multimedia Systems Two key communication modes Person-to-person

More information

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems:

Network management and QoS provisioning - revise. When someone have to share the same resources is possible to consider two particular problems: Revise notes Multiplexing & Multiple Access When someone have to share the same resources is possible to consider two particular problems:. multiplexing;. multiple access. The first one is a centralized

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

The BANDIT can also concentrate and switch multiple sources of Frame Relay traffic simultaneously.

The BANDIT can also concentrate and switch multiple sources of Frame Relay traffic simultaneously. encor! enetworks TM Version A, March 2008 2013 Encore Networks, Inc. All rights reserved. Routing with Frame Relay This chapter discusses Frame Relay routing. 4.1 Frame Relay You can configure use of synchronous

More information

What is the fundamental purpose of a communication system? Discuss the communication model s elements.

What is the fundamental purpose of a communication system? Discuss the communication model s elements. What is the fundamental purpose of a communication system? The fundamental purpose of a communication system is the exchange of data between two parties. Discuss the communication model s elements. The

More information

QoS based vertical handoff method between UMTS systems and wireless LAN networks

QoS based vertical handoff method between UMTS systems and wireless LAN networks QoS based vertical handoff method between UMTS systems and wireless LAN networks Sungkwan Jung and Dong-ho Cho Div. of EE, Dept. of EECS Korea Advanced Institute of Science and Technology Daejeon, Rep.

More information

Seminar report IP Telephony

Seminar report IP Telephony A Seminar report On IP Telephony Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED BY:

More information

An Architecture for Underwater Networks

An Architecture for Underwater Networks An Architecture for Underwater Networks Mandar Chitre Acoustic Research Laboratory, National University of Singapore Lee Freitag Woods Hole Oceanographic Institution Ethem Sozer Massachusetts Institute

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

Information Technology Mobile Computing Module: GSM Handovers

Information Technology Mobile Computing Module: GSM Handovers Information Technology Mobile Computing Module: GSM Handovers Learning Objectives What is handover? Why handover are required? Types of handovers(hard and Soft) Types of Handovers in GSM(Intra cell, Inter

More information

Ch. 4 - WAN, Wide Area Networks

Ch. 4 - WAN, Wide Area Networks 1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate

More information

Supporting IP Multicast for Mobile Hosts. Yu Wang Weidong Chen. Southern Methodist University. May 8, 1998.

Supporting IP Multicast for Mobile Hosts. Yu Wang Weidong Chen. Southern Methodist University. May 8, 1998. Supporting IP Multicast for Mobile Hosts Yu Wang Weidong Chen Southern Methodist University fwy,wcheng@seas.smu.edu May 8, 1998 Abstract IP Multicast is an ecient mechanism of delivering a large amount

More information

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase UNIT-5 GSM System Operations (Traffic Cases) Registration, call setup, and location updating Call setup Interrogation phase For the interrogation phase The initial address message comes outside the GSM

More information

Mobile NFS. Fixed NFS. MFS Proxy. Client. Client. Standard NFS Server. Fixed NFS MFS: Proxy. Mobile. Client NFS. Wired Network.

Mobile NFS. Fixed NFS. MFS Proxy. Client. Client. Standard NFS Server. Fixed NFS MFS: Proxy. Mobile. Client NFS. Wired Network. On Building a File System for Mobile Environments Using Generic Services F. Andre M.T. Segarra IRISA Research Institute IRISA Research Institute Campus de Beaulieu Campus de Beaulieu 35042 Rennes Cedex,

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Quality Control Scheme for ATM Switching Network

Quality Control Scheme for ATM Switching Network UDC 621.395.345: 621.395.74 Quality Control Scheme for ATM Switching Network VMasafumi Katoh VTakeshi Kawasaki VSatoshi Kakuma (Manuscript received June 5,1997) In an ATM network, there are many kinds

More information

Credit-Based Fair Queueing (CBFQ) K. T. Chan, B. Bensaou and D.H.K. Tsang. Department of Electrical & Electronic Engineering

Credit-Based Fair Queueing (CBFQ) K. T. Chan, B. Bensaou and D.H.K. Tsang. Department of Electrical & Electronic Engineering Credit-Based Fair Queueing (CBFQ) K. T. Chan, B. Bensaou and D.H.K. Tsang Department of Electrical & Electronic Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong

More information

Chapter 10: Wireless Networking. School of information science and Engineering, SDU

Chapter 10: Wireless Networking. School of information science and Engineering, SDU Chapter 10: Wireless Networking School of information science and Engineering, SDU 10.1 Introduction to Wireless Networks Requirement to the networks: Provides ubiquitous personal communications; Accommodate

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

Abstract of the Book

Abstract of the Book Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the

More information

Signaling Protocol Structure in GSM

Signaling Protocol Structure in GSM GSM Signaling Protocol Structure in GSM Signaling Protocol Structure in GSM Layer 1 is the physical layer which uses the channel structures over the air interface. Layer 2 is the data link layer and across

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

CHAPTER -1. Introduction to Computer Networks

CHAPTER -1. Introduction to Computer Networks CHAPTER -1 Introduction to Computer Networks PRELIMINARY DEFINITIONS computer network :: [Tanenbaum] a collection of autonomous computers interconnected by a single technology. communications network ::a

More information

ITU-T Y Framework of multi-homing in IPv6-based NGN

ITU-T Y Framework of multi-homing in IPv6-based NGN INTERNATIONAL TELECOMMUNICATION UNION ITU-T Y.2052 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (02/2008) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS

More information

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered

More information

MDP Routing in ATM Networks. Using the Virtual Path Concept 1. Department of Computer Science Department of Computer Science

MDP Routing in ATM Networks. Using the Virtual Path Concept 1. Department of Computer Science Department of Computer Science MDP Routing in ATM Networks Using the Virtual Path Concept 1 Ren-Hung Hwang, James F. Kurose, and Don Towsley Department of Computer Science Department of Computer Science & Information Engineering University

More information

MPLS AToM Overview. Documentation Specifics. Feature Overview

MPLS AToM Overview. Documentation Specifics. Feature Overview MPLS AToM Overview This document provides an introduction to MPLS AToM and includes the following sections: Documentation Specifics, page 14 Feature Overview, page 14 Benefits, page 26 What To Do Next,

More information

Mesh Network. Kiran Mathews Seminar: Verteilte und vernetzte Systeme

Mesh Network. Kiran Mathews Seminar: Verteilte und vernetzte Systeme Mesh Network Kiran Mathews (kmathews@rhrk.uni-kl.de) Seminar: Verteilte und vernetzte Systeme February 8, 2016 Outline 1 Why Mesh Networks? Existing System imesh 2 Architectural Overview Frame Structure

More information

Standardizing Information and Communication Systems

Standardizing Information and Communication Systems Standard ECMA-143 3rd Edition - June 1997 Standardizing Information and Communication Systems Private Integrated Services Network (PISN) - Circuit Mode Bearer Services - Inter-Exchange Signalling Procedures

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

TC32 presentation to ECMA General Assembly, Edinburgh, 22nd June 2000

TC32 presentation to ECMA General Assembly, Edinburgh, 22nd June 2000 TC32 presentation to ECMA General Assembly, Edinburgh, 22nd June 2000 John Elwell, Chairman ECMA TC32 Siemens Communications (International) Limited john.elwell@siemenscomms.co.uk ECMA/TC32/2000/103 ECMA/GA/2000/69

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

Introduction to Networking

Introduction to Networking Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block

More information

Dynamic Multi-Path Communication for Video Trac. Hao-hua Chu, Klara Nahrstedt. Department of Computer Science. University of Illinois

Dynamic Multi-Path Communication for Video Trac. Hao-hua Chu, Klara Nahrstedt. Department of Computer Science. University of Illinois Dynamic Multi-Path Communication for Video Trac Hao-hua Chu, Klara Nahrstedt Department of Computer Science University of Illinois h-chu3@cs.uiuc.edu, klara@cs.uiuc.edu Abstract Video-on-Demand applications

More information

GLOBECOM'94, San Francisco, CA, Nov.-Dic C-PRMA: the Centralized Packet Reservation Multiple Access for

GLOBECOM'94, San Francisco, CA, Nov.-Dic C-PRMA: the Centralized Packet Reservation Multiple Access for GLOBECOM'94, San Francisco, CA, Nov.-Dic. 1994 1 C-PRMA: the Centralized Packet Reservation Multiple Access for Local Wireless Communications? Giuseppe Bianchi, Flaminio Borgonovo, Luigi Fratta, Luigi

More information

ITU-T Y Framework of multi-homing in IPv6-based NGN

ITU-T Y Framework of multi-homing in IPv6-based NGN International Telecommunication Union ITU-T Y.2052 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (02/2008) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS

More information

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA

TCP over Wireless Networks Using Multiple. Saad Biaz Miten Mehta Steve West Nitin H. Vaidya. Texas A&M University. College Station, TX , USA TCP over Wireless Networks Using Multiple Acknowledgements (Preliminary Version) Saad Biaz Miten Mehta Steve West Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX

More information

CDMA450 - a low frequency radio based broadband solution in Värmland

CDMA450 - a low frequency radio based broadband solution in Värmland CDMA450 - a low frequency radio based broadband solution 1. Purpose of this document: The purpose of this document is to describe a best-practice case from all municipalities regarding wireless broadband

More information

WIRELESS INTERNET ACCESS: 3G VS.Wifi?

WIRELESS INTERNET ACCESS: 3G VS.Wifi? WIRELESS INTERNET ACCESS: 3G VS.Wifi? ABSTRACT: This paper compares and contrasts two technologies for delivering broadband wireless Internet access services: 3G VS. WiFi. The former, 3G, refers to the

More information

Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service

Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service PUBLISHED IN: PROCEEDINGS OF THE EUROPEAN WIRELESS 2006 CONFERENCE 1 Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service George Xylomenos, Konstantinos Katsaros

More information

MEGHADOOT: A PACKET RADIO NETWORK ARCHITECTURE FOR RURAL COMMUNITIES

MEGHADOOT: A PACKET RADIO NETWORK ARCHITECTURE FOR RURAL COMMUNITIES MEGHADOOT: A PACKET RADIO NETWORK ARCHITECTURE FOR RURAL COMMUNITIES B. S. Manoj, K. R. Bharath Bhushan, S. S. Doshi, I. Karthigeyan, and C. Siva Ram Murthy High Performance Computing and Networking Laboratory

More information

Mobile Computing over the Internet

Mobile Computing over the Internet Mobile Computing over the Internet Upkar Varshney Computer Information Sciences Washburn University of Topeka Topeka, KS 66621 E-mail: zzvars@acc.wuacc.edu Abstract There has been a trend to support computing

More information

A Methodology in Mobile Networks for Global Roaming

A Methodology in Mobile Networks for Global Roaming ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

Performance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks

Performance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks Performance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks Izhak Rubin and Runhe Zhang Abstract We introduce Unmanned Vehicles (UVs) to aid the operation of the mobile

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Mobile Computing Introduction

Mobile Computing Introduction Mobile Computing Introduction UNIT - 1 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. What is Mobile Computing 2 NTIIN PANDYA 3 NTIIN PANDYA Definitions Mobile Computing What is mobile computing?

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

ETSI ETR 123 TECHNICAL February 1994 REPORT

ETSI ETR 123 TECHNICAL February 1994 REPORT ETSI ETR 123 TECHNICAL February 1994 REPORT Source: ETSI TC-NA Reference: DTR/NA-052204 ICS: 33.080 Key words: B-ISDN, charging Broadband Integrated Services Digital Network (B-ISDN); Parameters and mechanisms

More information

Motion Estimation. Original. enhancement layers. Motion Compensation. Baselayer. Scan-Specific Entropy Coding. Prediction Error.

Motion Estimation. Original. enhancement layers. Motion Compensation. Baselayer. Scan-Specific Entropy Coding. Prediction Error. ON VIDEO SNR SCALABILITY Lisimachos P. Kondi, Faisal Ishtiaq and Aggelos K. Katsaggelos Northwestern University Dept. of Electrical and Computer Engineering 2145 Sheridan Road Evanston, IL 60208 E-Mail:

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Signaling System 7 (SS7) By : Ali Mustafa

Signaling System 7 (SS7) By : Ali Mustafa Signaling System 7 (SS7) By : Ali Mustafa Contents Types of Signaling SS7 Signaling SS7 Protocol Architecture SS7 Network Architecture Basic Call Setup SS7 Applications SS7/IP Inter-working VoIP Network

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISOAEC 132 First edition -12-15 Information technology - Telecommunications and information exchange between Systems - Broadband Private Integrated Services Network - Inter-exchange

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION )454 1 TELECOMMUNICATION (02/95) STANDARDIZATION SECTOR OF ITU ")3$.!00,)#!4)/. 02/4/#/,3 &/2!##%33 3)'.!,,).' "2/!$"!.$ ).4%'2!4%$ 3%26)#%3 $)')4!,.%47/2+ ")3$. $)')4!,

More information

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Module 1. Introduction. Version 2, CSE IIT, Kharagpur Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical

More information

INTERNATIONAL TELECOMMUNICATION UNION. SERIES I: INTEGRATED SERVICES DIGITAL NETWORK (ISDN) Overall network aspects and functions, ISDN usernetwork

INTERNATIONAL TELECOMMUNICATION UNION. SERIES I: INTEGRATED SERVICES DIGITAL NETWORK (ISDN) Overall network aspects and functions, ISDN usernetwork INTERNATIONAL TELECOMMUNICATION UNION CCITT I.324 THE INTERNATIONAL TELEGRAPH AND TELEPHONE CONSULTATIVE COMMITTEE (11/1988) SERIES I: INTEGRATED SERVICES DIGITAL NETWORK (ISDN) Overall network aspects

More information

Addressing Unique M2M Challenges with Converged Gateways

Addressing Unique M2M Challenges with Converged Gateways October 19-20, 2010 Addressing Unique M2M Challenges with Converged Gateways Paul L. Russell, Jr. Paul.Russell@InterDigital.com ETSI TC M2M Workshop 19-20 October 2010, Sophia Antipolis, France Where are

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

NG NPTF PT1. Non-Geographic Number Portability Task Force PT1 : Service Description BIPT. Final Version NPNG2v1F 13/04/1999

NG NPTF PT1. Non-Geographic Number Portability Task Force PT1 : Service Description BIPT. Final Version NPNG2v1F 13/04/1999 Final Version NPNG2v1F 13/04/1999 Non-Geographic Number Portability Task Force PT1 : Service Description BIPT Table Of Contents Table Of Contents... 2 1. Scope... 3 2. Regulatory Requirements... 3 3. References...

More information

WAN technology which are to be discussed:

WAN technology which are to be discussed: WAN Technology Operates at 3 layer OSI model as below: 1. PHY 2. Data Link 3. Network Most of WAN technology are packetswitched network categorized as Switched Virtual circuit Network ( 3-phase, connection

More information

ITU-T I.150. B-ISDN asynchronous transfer mode functional characteristics

ITU-T I.150. B-ISDN asynchronous transfer mode functional characteristics INTERNATIONAL TELECOMMUNICATION UNION ITU-T I.150 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (02/99) SERIES I: INTEGRATED SERVICES DIGITAL NETWORK General structure General description of asynchronous

More information

The Open System Interconnect model

The Open System Interconnect model The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually

More information

Network Systems for Emerging WAN Applications

Network Systems for Emerging WAN Applications Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

QoS in a SOHO Virtual Private Network for IP Telephony

QoS in a SOHO Virtual Private Network for IP Telephony CHAPTER 5 QoS in a SOHO Virtual Private Network for Telephony This chapter provides information about implementing QoS in an AVVID-enabled Small Office Home Office (SOHO) Virtual Private Network (VPN)

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

QoS Specification. Adaptation Interaction Layer Flow Mgmt/ Routing Advance Route Prediction Multicasting. HPF Packet Transport

QoS Specification. Adaptation Interaction Layer Flow Mgmt/ Routing Advance Route Prediction Multicasting. HPF Packet Transport The TIMELY Adaptive Resource Management Architecture Vaduvur Bharghavan Kang-Won Lee Songwu Lu Sungwon Ha Jia-Ru Li Dane Dwyer Coordinated Sciences Laboratory University of Illinois at Urbana-Champaign

More information

CHAPTER 6 CONCLUSIONS AND SCOPE FOR FUTURE WORK

CHAPTER 6 CONCLUSIONS AND SCOPE FOR FUTURE WORK CHAPTER 6 CONCLUSIONS AND SCOPE FOR FUTURE WORK 6.1 CONTRIBUTIONS AND CONCLUSIONS The performance analysis of the facsimile transmission is highly essential due to the fact that it used for transmitting

More information

Question 1 In answering the following questions use the following network conguration. Each node in the network represents a router, and the weights o

Question 1 In answering the following questions use the following network conguration. Each node in the network represents a router, and the weights o University of Uppsala Department of Computer Systems (DoCS) Final Examination Datakommunikation (DVP)) Data Communication and Networks INSTRUCTIONS TO CANDIDATES This is a SIX (6) hour examination Answer

More information

ETSI EN V1.4.1 ( )

ETSI EN V1.4.1 ( ) EN 300 359-5 V1.4.1 (2001-06) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Completion of Calls to Busy Subscriber (CCBS) supplementary service; Digital Subscriber

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information