End-to-End QoS Model for Mobile WiMAX Systems

Author(s):  
Sunghyun Cho ◽  
Jae-Hyun Kim ◽  
Jonghyung Kwun
Keyword(s):  
Mobile WiMAX ◽  
2008 ◽  
pp. 235-255 ◽  
Author(s):  
Jenq-Neng Hwang ◽  
Chih-Wei Huang ◽  
Chih-Wei Chang

Author(s):  
Sasan Adibi ◽  
Gordon B. Agnew ◽  
Tom Tofigh

An overview of the technical and business aspects is given for the corporate deployment of services over worldwide interoperability for microwave access (WiMAX). WiMAX is considered to be a strong candidate for the next generation of broadband wireless access; therefore its security is critical. This chapter provides an overview of the inherent and complementary benefits of broadband deployment over a long haul wireless pipe, such as WiMAX. In addition, we explore end-to-end (E2E) security structures necessary to launch secure business and consumer class services. The main focus of this chapter is to look for a best security practice to achieve E2E security in both vertical and horizontal markets. The E2E security practices will ensure complete coverage of the entire link from the client (user) to the server. This is also applicable to wireless virtual private network (VPN) applications where the tunneling mechanism between the client and the server ensures complete privacy and security for all users. The same idea for E2E security is applied to client-server-based multimedia applications, such as in Internet protocol (IP) multimedia subsystem (IMS) and voice over IP (VoIP) where secure client/server communication is required. In general, we believe that WiMAX provides the opportunity for a new class of high data rate symmetric services. Such services will require E2E security schemes to ensure risk-free high data-rate uploads and downloads of multimedia applications. WiMAX provides the capability for embedded security functions through the 802.16 security architecture standards. IEEE 802.16 is further subcategorized as 802.16d (fixed-WiMAX) and 802.16e (mobile-WiMAX). Due to the mobility and roaming capabilities in 802.16e and the fact that the medium of signal transmission is accessible to everyone, there are a few extra security considerations applied to 802.16e. These extra features include: privacy key management version 2 (PKMv2), PKM-extensible authentication protocol (EAP) authentication method, advanced encryption standard (AES) encryption wrapping, and so forth. The common security features of 802.16d and 802.16e are discussed in this chapter, as well as the highlights of the security comparisons between other broadband access, third-generation (3G) technologies, and WiMAX.


2017 ◽  
Vol 3 (10) ◽  
Author(s):  
Mayur Jain ◽  
Aayushi Priya

WIMAX (World Wide Interoperability for Microwave Access) is used to provide a wireless solution in the metropolitan area networks. WIMAX network is capable of wide range coverage, high data rates, secured transmission and mobility supported at vehicular speed. Mobile WIMAX is one of the best concepts for system designed in fixed wireless access to provide good performance and cost effective solution. In this paper, performance of the WIMAX network is analyzed in terms of throughput, end to end delay, and jitter. Simulation is carried out using QUALNET simulator. In this paper AODV, DYMO and ZRP routing protocols are applied to the created mobility scenario with variable transmission range. AODV and DYMO shows low jitter and low end to end delay. It is concluded that AODV and DYMO gives optimized result below 40dbm transmission range with respect to throughput and ZRP shows high throughput above 40dbm transmission range.


Author(s):  
Sasan Adibi ◽  
Gordon B. Agnew

Security measures of mobile infrastructures have always been important from the early days of the creation of cellular networks. Nowadays, however, the traditional security schemes require a more fundamental approach to cover the entire path from the mobile user to the server. This fundamental approach is so-called end-to-end (E2E) security coverage. The main focus of this chapter is to discuss such architectures for IEEE 802.16e (Mobile-WiMAX) and major third generation (3G) cellular networks. The E2E implementations usually contain a complete set of algorithms, protocol enhancements (mutual identification, authentications, and authorization), including the very large-scale integration (VLSI) implementations. This chapter discusses various proposals at the protocol level.


2016 ◽  
Vol 8 (1) ◽  
pp. 47
Author(s):  
Ammatia Risty ◽  
Rendy Munadi ◽  
Ridha Muldina Negara

IEEE 802.16e-2005 teknologi mobile WiMAX merupakan salah satu alternatif yang dapat memberikan datarate 15 Mbps yang lebih baik daripada teknologi 3G, WLAN, dan lain-lain. Mobile WiMAX juga memberikan cakupan area yang luas. Oleh karena itu, WiMAX mampu memberikan layanan berbagai macam aplikasi multimedia seperti VoIP, IPTV, Video conferencing. dan aplikasi real-time lainnya. Selain itu, Mobile WiMAX juga mendukung mobility secara portable, mobile, dan nomadic. Saat ini IPTV muncul pada mobile phone, yang dinamakan mobile TV dimana layanan IPTV akan dapat diakses dalam keadaan bergerak. Hal itu membutuhkan suatu teknologi yang mendukung mobility namun tetap dapat menerima layanan IPTV dengan baik. Teknologi mobile WiMAX adalah teknologi yang cocok untuk mendukung layanan IPTV khususnya untuk user yang sedang bergerak. Akibat dari user yang bergerak maka memungkinkan user tersebut melakukan handover. Penelitian ini menganalisis parameter unjuk kerja yang mempengaruhi pada mobile TV saat user melakukan  handover  pada jaringan mobile WiMAX seperti jitter, end to end delay, throughput, handover delay dengan skenario perbedaan kecepatan dan perubahan jumlah user dalam satu cakupan area. Berdasarkan hasil simulasi untuk skenario perbedaan kecepatan (maksimum 100 km/jam) diperoleh nilai end to end delay sebesar 23.234 ms, jitter sebesar 0.047 ms, throughput sebesar 637.723 Kbps. Sedangkan skenario jumlah user diperoleh nilai end to end delay 27.218 ms, jitter sebesar 0.057 ms, throughput sebesar 558.881 Kbps. Hasil dari kedua skenario menunjukkan bahwa saat kecepatan dan jumlah user naik maka parameter kualitas layanan turun namun masih memenuhi syarat kualitas layanan Mobile TV (IPTV).


VASA ◽  
2016 ◽  
Vol 45 (3) ◽  
pp. 223-228 ◽  
Author(s):  
Jan Paweł Skóra ◽  
Jacek Kurcz ◽  
Krzysztof Korta ◽  
Przemysław Szyber ◽  
Tadeusz Andrzej Dorobisz ◽  
...  

Abstract. Background: We present the methods and results of the surgical management of extracranial carotid artery aneurysms (ECCA). Postoperative complications including early and late neurological events were analysed. Correlation between reconstruction techniques and morphology of ECCA was assessed in this retrospective study. Patients and methods: In total, 32 reconstructions of ECCA were performed in 31 symptomatic patients with a mean age of 59.2 (range 33 - 84) years. The causes of ECCA were divided among atherosclerosis (n = 25; 78.1 %), previous carotid endarterectomy with Dacron patch (n = 4; 12.5 %), iatrogenic injury (n = 2; 6.3 %) and infection (n = 1; 3.1 %). In 23 cases, intervention consisted of carotid bypass. Aneurysmectomy with end-to-end suture was performed in 4 cases. Aneurysmal resection with patching was done in 2 cases and aneurysmorrhaphy without patching in another 2 cases. In 1 case, ligature of the internal carotid artery (ICA) was required. Results: Technical success defined as the preservation of ICA patency was achieved in 31 cases (96.9 %). There was one perioperative death due to major stroke (3.1 %). Two cases of minor stroke occurred in the 30-day observation period (6.3 %). Three patients had a transient hypoglossal nerve palsy that subsided spontaneously (9.4 %). At a mean long-term follow-up of 68 months, there were no major or minor ipsilateral strokes or surgery-related deaths reported. In all 30 surviving patients (96.9 %), long-term clinical outcomes were free from ipsilateral neurological symptoms. Conclusions: Open surgery is a relatively safe method in the therapy of ECCA. Surgical repair of ECCAs can be associated with an acceptable major stroke rate and moderate minor stroke rate. Complication-free long-term outcomes can be achieved in as many as 96.9 % of patients. Aneurysmectomy with end-to-end anastomosis or bypass surgery can be implemented during open repair of ECCA.


Author(s):  
Ahmed Mousa ◽  
Ossama M. Zakaria ◽  
Mai A. Elkalla ◽  
Lotfy A. Abdelsattar ◽  
Hamad Al-Game'a

AbstractThis study was aimed to evaluate different management modalities for peripheral vascular trauma in children, with the aid of the Mangled Extremity Severity Score (MESS). A single-center retrospective analysis took place between 2010 and 2017 at University Hospitals, having emergencies and critical care centers. Different types of vascular repair were adopted by skillful vascular experts and highly trained pediatric surgeons. Patients were divided into three different age groups. Group I included those children between 5 and 10 years; group II involved pediatrics between 11 and 15 years; while children between 16 and 21 years participated in group III. We recruited 183 children with peripheral vascular injuries. They were 87% males and 13% females, with the mean age of 14.72 ± 04. Arteriorrhaphy was performed in 32%; end-to-end anastomosis and natural vein graft were adopted in 40.5 and 49%, respectively. On the other hand, 10.5% underwent bypass surgery. The age groups I and II are highly susceptible to penetrating trauma (p = 0.001), while patients with an extreme age (i.e., group III) are more susceptible to blunt injury (p = 0.001). The MESS has a significant correlation to both age groups I and II (p = 0.001). Vein patch angioplasty and end-to-end primary repair should be adopted as the main treatment options for the repair of extremity vascular injuries in children. Moreover, other treatment modalities, such as repair with autologous vein graft/bypass surgery, may be adopted whenever possible. They are cost-effective, reliable, and simple techniques with fewer postoperative complication, especially in poor/limited resources.


Sign in / Sign up

Export Citation Format

Share Document