Access network technologies: deployments in Sweden

Author(s):  
C.P. Larsen
2021 ◽  
Vol 13 (6) ◽  
pp. 144
Author(s):  
Ghadah Aldabbagh ◽  
Nikos Dimitriou ◽  
Samar Alkhuraiji ◽  
Omaimah Bamasag

This paper focuses on the study of IoT network deployments, in both unlicensed and licensed bands, considering LoRaWAN and NB-IoT standards, respectively. The objective is to develop a comprehensive and detailed network planning and coverage dimensioning methodology for assessing key metrics related to the achieved throughput and capacity for specific requirements in order to identify tradeoffs and key issues that are related to the applicability of IoT access technologies for representative use case types. This paper will provide a concise overview of key characteristics of IoT representative IoT access network standards that are considered for being deployed in unlicensed and licensed bands and will present a methodology for modeling the characteristics of both access network technologies in order to assess their coverage and capacity considering different parameters.


Author(s):  
Adnan Mahmood ◽  
Shadi M. S. Hilles ◽  
Hushairi Zen

Vertical Handover Decision (VHD) algorithms are indispensable components of forthcoming 4G heterogeneous wireless networks architecture – so as to provide requisite Quality of Service to an assortment of applications anywhere at any time, while allowing seamless roaming in highly dynamic scenarios (i.e. multitude of access network technologies that vary in bandwidth, latency, monetary cost, etc.) using Mobile Terminals (MTs) enabled with multiple access interfaces. In this article, a critical review of the existing VHD algorithms has been carried out as an effort to update the previous studies. To offer a methodical contrast, recently published VHD algorithms have been classified into four major classes depending on the key handover decision criterion used, i.e. RSS based algorithms, bandwidth based algorithms, cost function based algorithms, and the combination algorithms. Moreover, operational fundamentals, advantages, and disadvantages of exemplary VHD algorithms for each class have been presented to assess the tradeoffs between their intricacy of implementation and the efficacy.


2014 ◽  
Vol 1008-1009 ◽  
pp. 684-689
Author(s):  
De Long Yang ◽  
Jie Tong ◽  
Gang Xu ◽  
Jin Long Liu ◽  
Lin Yang

Power transmission line monitoring is a general appellation of automated monitoring and scientific management for power transmission line by advanced techniques, and it’s an important basis for achieving smart grid. Its data transmission system is divided into access network and data network, the access network consists of a variety of terminals, tower nodes and aggregation nodes, which includes on-site and remote networks. The application of flexible and reliable network would guarantee to achieve a high-speed, reliable and transparent data transfer between master station and terminals in the system. According to the data transmission requirements of transmission line condition monitoring system, this paper studies the communication network technologies for access network in the perspective of private and public networks, and after a comparative analysis of these technologies, it proposes a principle of how to select reasonable communication network technologies for different application scenarios.


Author(s):  
Christos Vassilopoulos

This chapter offers a qualitative approach towards the development of the new generation access network, based on FTTx implementations. After a brief description of the current state of traditional access networks and an estimation of the expected data rate per household in terms of services, the chapter examines all the available Network Technologies (FTTx), Access Technologies (xDSL, Ethernet and PON) for both P2P and P2MP development schemes and their relevant implementations. The prospects of NGA are also strategically examined in view of the complicated multi-player environment, involving Telco (ILEC and CLEC), regulators and pressure interest groups, all striving to serve their individual, often conflicting interests. The chapter concludes with an outline of the different deployment strategies for both ILEC and CLEC Telco.


2007 ◽  
Vol 25 (3-4) ◽  
pp. 121-131
Author(s):  
A. F. Cameron ◽  
D. J. Thorne ◽  
K. T. Foster ◽  
S. I. Fisher

1998 ◽  
pp. 39-50
Author(s):  
Leif Aarthun Ims ◽  
Mauro Ravera ◽  
Stefano Balzaretti ◽  
Umberto Ferrero ◽  
Marco De Bortoli ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document