Loading...
Search for: mobile-networks
0.008 seconds
Total 42 records

    An adaptive fuzzy logic based handoff algorithm for interworking between WLANs and mobile networks

    , Article 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2002, Lisboa, 15 September 2002 through 18 September 2002 ; Volume 5 , 2002 , Pages 2446-2451 ; 0780375890 (ISBN); 9780780375895 (ISBN) Majlesi, A ; Khalaj, B. H ; Sharif University of Technology
    2002
    Abstract
    In this paper, the goal is to propose an optimal handoff algorithm for hybrid networks (HNs), which are constructed by interworking between wireless LANs (WLANs) and mobile networks. The proposed algorithm is an adaptive fuzzy logic based algorithm that can adapt itself with the dynamic conditions in HNs. It uses mobile terminal speed estimation and traffic in the WLAN as additional input parameters. This algorithm is designed to meet special requirements of HNs. The simulation results show that it has much better performance than conventional algorithms. ©2002 IEEE  

    Mobility in file sharing

    , Article 11th International Conference on Distributed Multimedia Systems, DMS 2005, 5 September 2005 through 7 September 2005 ; 2005 , Pages 155-160 ; 1891706179 (ISBN) Sheikhattar, H ; Haghighat, A ; Noroozi, N ; Sharif University of Technology
    Knowledge Systems Institute Graduate School  2005
    Abstract
    New advances in technology of mobile computers along with advent of wireless and mobile networking bring new capabilities, applications and concerns to the computer world. In this paper, we discussed on file sharing requirements in a mobile environment. Then, we proposed an architecture that supports mobility of hardware, data and software over the environment. Finally a sample implementation of the suggested architecture is presented. © 2005 by Knowledge Systems Institute Graduate School  

    Implementation and Development of a New Framework for Flexible Inter-PHY Functional Splitting in Cloud RAN Networks

    , M.Sc. Thesis Sharif University of Technology Basiri-Moghadam, Shahriar (Author) ; Hossein Khalaj, Babak (Supervisor)
    Abstract
    Thorough investigation of the Cloud-RAN (C-RAN) architecture has recently shown that CRAN can bring advanced cooperated and coordinated processing capabilities as well as the multiplexing gains toward future radio access networks. The baseband processing of each base station instance can now be flexibly split into smaller functional components, that can be placed either at remote radio units (RRUs) or baseband units (BBUs), depending on the available resources. In this project, we investigate recent implemented methods in C-RAN. also, we propose, develop and implement new architectural frameworks for C-RAN that can support both a flexible functional split and a new functional splitting known... 

    Design and Implementation of a Software Defined Mobile Network with End-to-End Multi-Domain Orchestration

    , M.Sc. Thesis Sharif University of Technology Hemmati, Ali Akbar (Author) ; Hossein Khalaj, Babak (Supervisor) ; Ravanshid, Azad (Co-Supervisor)
    Abstract
    In the fifth generation of mobile networks there is a move to replace hardware with software. Meaning that instead of buying dedicated hardware for mobile networks, we only need some general-purpose hardware and will run virtualized network functions on top of that using software. Besides, in the past few years there has been a handful of great opensource cloud management tools that facilitates management of infrastructure and has accelerated this move towards softwarization. Some of these include ONAP, Openstack and Kubernetes. These tools help network engineers to sofwarize functionalities that where previously run on dedicated hardware and manage them automatically. In this project we... 

    Optimum hello interval for a connected homogeneous topology in mobile wireless sensor networks

    , Article Telecommunication Systems ; Volume 52, Issue 4 , 2013 , Pages 2475-2488 ; 10184864 (ISSN) Nayebi, A ; Sarbazi Azad, H ; Sharif University of Technology
    2013
    Abstract
    Topology of a mobile wireless sensor/ad hoc network is prone to link breakages due to node mobility which compels the periodic re-construction of the topology in so called "hello" intervals. The problem addressed in this paper is determining the maximum "hello" interval preserving the connectivity of a homogeneous topology with high probability. In order to study the optimum "hello" interval, statistical topology lifetime (STL) is formally defined as a value of "hello" interval that ensures statistical connectivity with a given threshold. Temporal properties of the topology are studied based on two phenomena; one concerning a connectivity phase transition with time and the other one... 

    Alert Correlation in Cellular Mobile Nework

    , M.Sc. Thesis Sharif University of Technology Amini, Hossein (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    As mobile networks have been expanded, the importance of subscribers' information security has become more and more evident. Despite mitigating known vulnerabilities of older mobile networks in newer generations, there are still some security flaws that can be exploited. In particular, as a common scenario, attackers can exploit "Use 2G mobile network if 3G/4G is unavailable" setting in order to force a subscriber to downgrade his/her mobile network to 2G; hence becoming vulnerable to known 2G attacks. Mobile networks have a heterogeneous and distributed architecture which make intrusion detection systems incapable of covering the entire network. In this dissertation, alongside with the... 

    Minimizing the error of time difference of arrival method in mobile networks

    , Article 2005 International Conference on Wirelessand Optical Communications Networks, Dubai, 6 March 2005 through 8 March 2005 ; 2005 , Pages 328-332 ; 0780390199 (ISBN); 9780780390195 (ISBN) Malekitabar, A ; Aghababa, H ; Radfar, M. H ; Khalaj, B. H ; Sharif University of Technology
    2005
    Abstract
    Estimating the position of a mobile set is of great importance in new mobile services. However, in most cases, the accuracy should be less than 100 meters. This accuracy is hard to reach especially in urban areas. The main problem is that there are a lot of obstacles like buildings between the BTS and the mobile set. Thus the time measured between BTS and the mobile set is somehow greater than the time it takes the wave to travel directly between two points. This paper introduces an optimized solution for TDOA as one of the most efficient ways for finding the location of a mobile phone. Considering the standards and limitations of both GSM and UMTS, the Authors present a solution for... 

    A methodology for mobile network security risk management

    , Article ITNG 2009 - 6th International Conference on Information Technology: New Generations, 27 April 2009 through 29 April 2009, Las Vegas, NV ; 2009 , Pages 1572-1573 Seify, M ; Bijani, S ; Sharif University of Technology
    Abstract
    Based on the risk analysis done in the GSM network of Iran a methodology for cellular mobile network risk management is established. Primarily we focus on the importance of risk management in the GSM Network and then introduce very briefly the suggested method for managing risk in Iranian GSM security. GSM Security risk evaluation is a method for increasing the efficiency of security policy in the manner that security threats and vulnerabilities against the mobile network is identified and prioritized. © 2009 IEEE  

    Improvement of Resource Allocation Methods in Device to Device Communication Systems

    , M.Sc. Thesis Sharif University of Technology Khalvandi, Reza (Author) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    There is an increasing demand from mobile users for higher bandwidth, lower latency, longer battery life and better quality of service. It is expected that the next generation of mobile networks standards which is called 5G meets most of these demands. It is expected that the enhanced features of the mobile networks can be achieved within the limited bandwidth which is offered by the regulators and therefore, one of the key challenges in the development of these new technologies would be the issue of resource allocation. Efficient allocation of frequency, time and power to different users is an important issue and therefore, one of the important areas of development in these standards has... 

    Unsupervised Anomaly Detection in Mobile Networks

    , M.Sc. Thesis Sharif University of Technology Ranjkeshzadeh, Sina (Author) ; Amini, Arash (Supervisor) ; Kazemi, Reza (Supervisor)
    Abstract
    With the fast-growing mobile networks, the need for network reliability increases. Various events like antenna failures, attacks on mobile networks, floods, sporting events cause abnormal behavior in mobile networks. Some events like antenna failures and attacks need consideration. But some of them like sporting events can be ignored. Right now, most mobile operators, detect these events manually which is a very time-consuming and costly task for them. To overcome this problem one idea is to predict future data by prediction algorithms. Then compare new data with the predicted one. If there exists significant deviation, there is an anomaly. But most of the failures and anomalies in mobile... 

    Optimum hello interval for a connected homogeneous topology in mobile wireless sensor networks

    , Article Telecommunication Systems ; Vol. 52, issue. 4 , April , 2013 , pp. 2475-2488 ; Online ISSN: 1572-9451 Nayebi, A ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    Topology of a mobile wireless sensor/ad hoc network is prone to link breakages due to node mobility which compels the periodic re-construction of the topology in so called ""hello"" intervals. The problem addressed in this paper is determining the maximum ""hello"" interval preserving the connectivity of a homogeneous topology with high probability. In order to study the optimum ""hello"" interval, statistical topology lifetime (STL) is formally defined as a value of ""hello"" interval that ensures statistical connectivity with a given threshold. Temporal properties of the topology are studied based on two phenomena; one concerning a connectivity phase transition with time and the other one... 

    Learning automata based dynamic guard channel algorithms

    , Article Computers and Electrical Engineering ; Volume 37, Issue 4 , 2011 , Pages 601-613 ; 00457906 (ISSN) Beigy, H ; Meybodi, M. R ; Sharif University of Technology
    2011
    Abstract
    In this paper, we first propose two learning automata based decentralized dynamic guard channel algorithms for cellular mobile networks. These algorithms use learning automata to adjust the number of guard channels to be assigned to cells of network. Then, we introduce a new model for nonstationary environments under which the proposed algorithms work and study their steady state behavior when they use LR-I learning algorithm. It is also shown that a learning automaton operating under the proposed nonstationary environment equalizes its penalty strengths. Computer simulations have been conducted to show the effectiveness of the proposed algorithms. The simulation results show that the... 

    Defining interval for threshold in new thinning scheme

    , Article Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, 9 July 2010 through 11 July 2010 ; Volume 6 , July , 2010 , Pages 108-112 ; 9781424455386 (ISBN) Firouzi, Z ; Mortazavi Far, L ; Sharif University of Technology
    2010
    Abstract
    Call admission control schemes are crucially Important concepts ID researches on cellular mobile networks. One of them is the new thinning scheme. In this study we define a confidence interval for threshold and the numerical results show the performance of the scheme in defined interval. Also we discuss the sensitivity of the scheme (in sample-based sensitivity method) at different thresholds. The results show the better performance in confidence thresholds and sensitivity of scheme into variations of thresholds  

    Covert communications through mobile voice channels

    , Article IET Information Security ; Volume 10, Issue 3 , 2016 , Pages 156-164 ; 17518709 (ISSN) Kazemi, R ; Rezaei, R ; Akhaee, M. A ; Behnia, F ; Sharif University of Technology
    Institution of Engineering and Technology  2016
    Abstract
    The rapid development and growth of cellular mobile networks in recent years has made voice channels widely available almost everywhere. On the other hand, voice dedicated channels possess properties that make them ideal options for high priority real-time secure communications. Beside these realities, information embedding has gained remarkable attention in recent years due to its potential application in multimedia security. In this regard, this study aims to propose an efficient scheme for data hiding to show the feasibility of exploiting these channels for covert communications. To this end, the authors propose new suboptimal but practical schemes based on additive and multiplicative... 

    Compensating for the latency of data acquisition for localization in mobile wireless sensor networks

    , Article ISSNIP 2009 - Proceedings of 2009 5th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 7 December 2009 through 10 December 2009 ; 2009 , Pages 7-12 ; 9781424435180 (ISBN) Rahimian, M. A ; Ohyama, S ; Sharif University of Technology
    Abstract
    The problem of latency in data acquisition, which is specific to the case of mobile wireless sensor networks, has been introduced and investigated. In this regard, the properties of the so-called Data Acquisition Latency Error, and the way it affects the performance of the respective localization schemes in a mobile network were discussed through both theoretical analysis and simulations. Moreover, a weighted version of lateration scheme was introduced and shown to outperform the traditional one, while tracking a mobile node. This work is to the best of our knowledge the first to have addressed the aforementioned problem in mobile wireless sensor networks, and to have offered a solution for... 

    An area-scalable human-based mobility model

    , Article Computer Networks ; Volume 177 , 2020 Gharib, M ; Foroozani, A ; Rezaei, S ; Hemmatyar, A. M. A ; Movaghar, A ; Sharif University of Technology
    Elsevier B.V  2020
    Abstract
    Mobile networks have been growing rapidly, where it is of paramount importance to evaluate the performance of any protocol designed for such networks before deployment. Mobility is one of the main mobile network issues that directly affects performance metrics. Since mobile nodes are often carried by their owners, nodes movement should be modeled according to humans movement. In this paper, we extend our previously published human mobility model based on real collected data. The real human movement is traced, cleaned up and analyzed. To the best of our knowledge, our collected data set is the only one that contains the detail of both walking and driving nodes. The analysis shows several... 

    Designing and Implementing Service Based Mobile Network Framework

    , M.Sc. Thesis Sharif University of Technology Pashaei Darian, Amir Salar (Author) ; Hossein Khalaj, Babak (Supervisor)
    Abstract
    The growth of user traffic and appearance of new services, has changed architecture of mobile networks. Data flows have different requirments based on their services. Mobile platform should be able to recognize services and slice network resources based on them. Different approaches have been investigated using relevant standards and numerous articles. The focus of this thesis is on implement a platform based on fourth generation mobile networks that can differentiate between data flows according to their respective required QoS.We have implemented an IMS network and connected it to a mobile core network But IMS network just supports session-based services. We introduced a solution for non... 

    Analysis of link lifetime in wireless mobile networks

    , Article Ad Hoc Networks ; Volume 10, Issue 7 , September , 2012 , Pages 1221-1237 ; 15708705 (ISSN) Nayebi, A ; Sarbazi Azad, H ; Sharif University of Technology
    Abstract
    Link lifetime (LL) analysis is crucially important in designing and evaluating wireless mobile network protocols. Although a considerable amount of research has been conducted on this issue, the current paper studies several aspects of link lifetime for the first time, e.g. a closed form expression for the probability distribution of the residual link lifetime (RLL) for the constant velocity mobility model is obtained, which facilitates marginal studies on the behavior of link lifetime. As a case, using a tail analysis of LL and RLL distributions, we analytically prove that they are heavy-tailed. Using this outcome, a self-similar behavior in the traffic pattern of a sample delay tolerant... 

    Response Time Improvement Using Service Migration in Mobile Edge Computing Considering User Mobility

    , M.Sc. Thesis Sharif University of Technology Nejati, Amir Reza (Author) ; Goudarzi, Maziar (Supervisor)
    Abstract
    With the emergence of the 5th generation cellular networks, response time is becoming increasingly more important. One of the solutions to satisfy this requirement is using mobile edge computing. MEC is bringing the cloud computing features to the edge of the network and reduces services response time by reducing the user distance to her services. But for this solution to be effective, we need to migrate user services based on their movements. The main problem in migrating services is predicting user route and do the migration based on these predictions. We must do this procedure in a way that minimizes the service outage. In this research, we predict the user route with the historical... 

    Opportunistic RF Energy Harvesting in Cognitive Radio Networks

    , M.Sc. Thesis Sharif University of Technology Miri, Zoheir (Author) ; Nasiri-kenari, Masoumeh (Supervisor) ; Ashtiani, Farid (Supervisor)
    Abstract
    Considering energy efficiency ways a key role in designing future wireless networks( 5G mobile networks). Moreover Spectrum efficiency is another critical issues in designing wireless networks. Cognitive radios can improve the spectrum efficiency. On the other hand, radio frequency (RF) energy harvesting has emerged as a promising technique to supply energy for wireless networks and thereby increase their energy efficiency. In this thesis, we propose a new technique for the RF-powered CRNs.To this end,We consider a cognitive radio network comprised of a primary user and a secondary user. The primary user, uses a typical frequency band for transmit data in a time slot basis and both the...