cient call handling procedures in cellular mobile networks

نویسندگان

  • Michel Mandjes
  • Kurt Tutschku
چکیده

The performance of nowadays cellular mobile networks can be enhanced considerably by using more e cient call handling mechanisms. This paper discusses two advanced schemes, namely guard channels and the retry of blocked handovers. Furthermore, a more detailed customer model is presented in this study in order to obtain a more acccurate cell con guration: instead of the usual Poisson input, we allow the blocked fresh calls to be repeated. We show how this model can mathematically be analyzed and evaluate the e ciency of the call handling mechanisms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Eecient Call Handling Procedures in Cellular Mobile Networks

The performance of nowadays cellular mobile networks can be enhanced considerably by using more eecient call handling mechanisms. This paper discusses two advanced schemes, namely guard channels and the retry of blocked handovers. Furthermore, a more detailed customer model is presented in this study in order to obtain a more acccurate cell connguration: instead of the usual Poisson input, we a...

متن کامل

Scalable Schemes for Mobile Networks with Multiple Services

The introduction of new service categories with di erent bandwidth requirements, e.g., data and multimedia, to cellular mobile radio networks makes many of the traditional mechanisms unusable or less e cient. The call admission and the handover handling are of the most sensitive issues to this extension. The performance of all services including the traditional voice and the new services can be...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Analysis of Handoff Schemes in Wireless Mobile Network

[email protected] Abstract. This paper analyses the different traffic schemes for handoff handling and call blocking attempts. As traffic in mobile cellular networks increases, Handoffs will become an increasingly important issue and as cell sizes shrink to accommodate an increasingly large demand of services, newer more efficient handoff schemes need to be used. In this paper the author anal...

متن کامل

A Two-Threshold Guard Channel Scheme for Minimizing Blocking Probability in Communication Networks

In this paper, we consider the call admission problem in cellular network with two classes of voice users. In the first part of paper, we introduce a two-threshold guard channel policy and study its limiting behavior under the stationary traffic. Then we give an algorithm for finding the optimal number of guard channels. In the second part of this paper, we give an algorithm, which minimizes th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996