Markovian Models in GSM900 Mobile Cellular Communication Systems

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hypergraph Models for Cellular Mobile Communication Systems

Cellular systems have hitherto been modeled mostly by graphs for the purpose of channel assignment. However, hypergraph modeling of cellular systems offers a significant advantage over graph modeling in terms of the total traffic carried by the system. For example, we show that a 37-cell system when modeled by a hypergraph carries around 30% more traffic than when modeled by a graph. We study t...

متن کامل

Secure Communication in Shotgun Cellular Systems

In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...

متن کامل

Demand-based Radio Network Planning of Cellular Mobile Communication Systems

This paper presents a demand-based engineering method for designing radio networks of cellular mobile communication systems. The proposed procedure is based on a forward-engineering method, the Integrated Approach to cellular network planning and is facilitated by the application of a new discrete population model for the traac description, the Demand Node Concept. The use of the concept enable...

متن کامل

Two-dimensional traffic models for cellular mobile systems

Abstracg Two-dimensional traffic models for cellular mobile systems are formulated and the main performance measures are evaluated. System analysis in its general f m is rather complex but a solution is always attained in closed form or by numerical techniques.

متن کامل

Security in Mobile Communication Systems

Mobile computing has become very important and popular in networking. And it will certainly become even more popular because of the beneets it can ooer. But mobility also raises some important security issues and even vulnerabilities. This paper lists the most signiicant security constraints and threats that the mobile communication systems have.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sistemas y Telemática

سال: 2006

ISSN: 1692-5238

DOI: 10.18046/syt.v1i2.927