Academic literature on the topic 'Packet switching (Data transmission) Telecommunication Algorithms'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Packet switching (Data transmission) Telecommunication Algorithms.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Packet switching (Data transmission) Telecommunication Algorithms"

1

Shijer, Sameera Sadey, and Ahmad H. Sabry. "Analysis of performance parameters for wireless network using switching multiple access control method." Eastern-European Journal of Enterprise Technologies 4, no. 9(112) (August 31, 2021): 6–14. http://dx.doi.org/10.15587/1729-4061.2021.238457.

Full text
Abstract:
The developments of wireless networks have directed to search for opportunities of a broad diversity of improved and new networking contributions. Wireless Asynchronous Transfer Mode (ATM) is a non-synchronous or random mode of transferring information. The advantages of circuit switching include dedicated connections and guaranteed traffic parameters and the benefits of packet switching are the efficiency at the physical layer and a more cost-effective design. ATM is the only protocol that offers the best of both communication methods. Although the Variable Bit-Rate (VBR) transmission presents a promising prospective of stable data quality, it is usually accompanied by network traffic overload and cell packet loss, which extensively weakens that potential. This work overcomes these concerns by developing a switching-based multiple access control model to improve the data transmission performance of wireless ATM. Therefore, this work discusses the effectiveness of the developed approach to minimize the cell packet losses and network traffic overload in wireless ATM. Three control access is processed; polling, token passing, and reservation algorithms for collision avoidance. The reservation stage reserves the data before sending, which includes two timeline intervals; a fixed-time reservation period, and variable data transmission interval. Using OPNET 10.5, the results show that the presented switching-based multiple access control model can achieve a throughput value of 98.3 %, data transmission delay of about 40.2 ms, and 0.024 % of packet losses during data transmission between the source and destination. It is demonstrated that the introduced method effectively transmits information without creating any network complexity and delay
APA, Harvard, Vancouver, ISO, and other styles
2

Sun, Yu, Xing, and Qin. "Parallel Transmission of Distributed Sensor Based on SCTP and TCP for Heterogeneous Wireless Networks in IoT." Sensors 19, no. 9 (April 29, 2019): 2005. http://dx.doi.org/10.3390/s19092005.

Full text
Abstract:
Sensors in the Internet of Things (IoT) generate large amounts of data, which requires high-speed data transmission. In order to achieve the parallel transmissions of the wireless sensor network on the transmission layer, the performance of stream control transmission protocol (SCTP) and transmission control protocol (TCP) in the wireless sensor network under different packet error rates was simulated and compared. A dynamic multipath handover method for SCTP (MS-SCTP) was proposed to improve the transmission performance, which selects the transmission path according to the packet error rate and the retransmission ratio in the sender’s buffer. The TCP and SCTP protocol switching method (TCP-SCTP) was proposed to detect the current network traffic and adjust the MS-SCTP or TCP method. Analysis and simulation results show that MS-SCTP and TCP-SCTP could improve network throughput and reduce packet loss rate. MS-SCTP and TCP-SCTP can be combined with other technologies and channel allocation algorithms to improve network traffic.
APA, Harvard, Vancouver, ISO, and other styles
3

Obamila, E. J. "Impact of scheduling algorithms on the performance of telemedicine traffic in cellular networks." African Journal of Engineering Research 9, no. 2 (July 14, 2021): 13–27. http://dx.doi.org/10.30918/ajer.92.21.001.

Full text
Abstract:
Efficient transmission of medical information is an emerging area of telecommunication engineering because it conveys critical data about a patient’s state and vital measurements. Consequently, it is required that such transmissions be accelerated and errorless. This requirement is beyond the norm of only scheduling users at a Base Station but calls for the provisioning of guaranteed bandwidth for transmission of these critical medical data. To achieve this, there is a need to develop a scheduling scheme that will prioritize all forms of Telemedicine traffic over regular traffic at the Base Station. But there is also the need to measure, evaluate and quantify the impact of the developed scheduling scheme on telemedicine traffic transmission in cellular networks in terms of the throughputs attained. To address these problems, priority and non-priority based scheduling algorithms for telemedicine traffic transmission were developed and simulated using MATLAB 8.1.0 software and the impact of the developed algorithm on telemedicine traffic transmission was evaluated. The result represents a significant increase in telemedicine user’s throughputs with a priority scheduling scheme. Over 20 rounds, the impact of packet sizes, traffic load conditions and codec rates on the average throughputs of telemedicine traffics were studied and discussed.
APA, Harvard, Vancouver, ISO, and other styles
4

Hamrouni, Chafaa, Bilel Neji, and Adel M. Alimi. "Both Side Linked Fuzzy Controlled Antennas Array Systemdevelopment for Small Satellite Application: ERP Sat_1." Advanced Materials Research 875-877 (February 2014): 2092–96. http://dx.doi.org/10.4028/www.scientific.net/amr.875-877.2092.

Full text
Abstract:
Pico Satellite Telecommunication with Ground Station (GS) is Characterized by a Limitedline of Sight that Affects Transmission Delay and Data. in this Paper, a New Fuzzy Logic Control Systemmodel is Proposed to Ensure a Long Lasting Ground Station (G.S) Visibility to Pico Satellite Duringorbiting in Leo. Developed System is Helpful to Control Wave Propagation for Transmission. Presentedmethod Describes a Fuzzy Switching Control System for both Side Microstrip Antennas Array Systemmodel that Guarantee a Maximum Transmission Time and Achieves Small Satellite Communicationcontrol Performance with Simplified Control Scheme. the Method Includes Switched Systemmodeling, Fuzzy Control System Design, and Optimized Fuzzy Modeling Algorithm; in Addition Petri Netmodeling is Developed to Predict System Behavior. Added Algorithms were Simulated and Tested.Proposed System and Integrated Algorithms Performance were Demonstrated in the Reportedsimulations and Tests Results.
APA, Harvard, Vancouver, ISO, and other styles
5

Safdar Malik, Tauqeer, and Mohd Hilmi Hasan. "Reinforcement Learning-Based Routing Protocol to Minimize Channel Switching and Interference for Cognitive Radio Networks." Complexity 2020 (August 13, 2020): 1–24. http://dx.doi.org/10.1155/2020/8257168.

Full text
Abstract:
In the existing network-layered architectural stack of Cognitive Radio Ad Hoc Network (CRAHN), channel selection is performed at the Medium Access Control (MAC) layer. However, routing is done on the network layer. Due to this limitation, the Secondary/Unlicensed Users (SUs) need to access the channel information from the MAC layer whenever the channel switching event occurred during the data transmission. This issue delayed the channel selection process during the immediate routing decision for the channel switching event to continue the transmission. In this paper, a protocol is proposed to implement the channel selection decisions at the network layer during the routing process. The decision is based on past and expected future routing decisions of Primary Users (PUs). A learning agent operating in the cross-layer mode of the network-layered architectural stack is implemented in the spectrum mobility manager to pass the channel information to the network layer. This information is originated at the MAC layer. The channel selection is performed on the basis of reinforcement learning algorithms such as No-External Regret Learning, Q-Learning, and Learning Automata. This leads to minimizing the channel switching events and user interferences in the Reinforcement Learning- (RL-) based routing protocol. Simulations are conducted using Cognitive Radio Cognitive Network simulator based on Network Simulator (NS-2). The simulation results showed that the proposed routing protocol performed better than all the other comparative routing protocols in terms of number of channel switching events, average data rate, packet collision, packet loss, and end-to-end delay. The proposed routing protocol implies the improved Quality of Service (QoS) of the delay sensitive and real-time networks such as Cellular and Tele Vision (TV) networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Havrylova, Alla, Olha Korol, and Stanyslav Milevskyi. "MATHEMATICAL MODEL OF AUTHENTICATION OF A TRANSMITTED MESSAGE BASED ON A MCELIECE SCHEME ON SHORTED AND EXTENDED MODIFIED ELLIPTIC CODES USING UMAC MODIFIED ALGORITHM." Cybersecurity: Education, Science, Technique, no. 5 (2019): 40–51. http://dx.doi.org/10.28925/2663-4023.2019.5.4051.

Full text
Abstract:
The subject of the research is a mathematical model of authentication of the transmitted message based on the McEliese scheme on shortened and elongated modified elliptic codes using the modified UMAC algorithm. The aim of this work is to develop such a scheme for the information exchange over Internet commverification and integrity of the transmitted information, taking into account the prevention of an increase in the costs of the actions taken. Tasks: analysis of existing ways to increase the resistance to hacking of transmitted messages over telecommunication networks; analysis of a message transfer scheme using blockchain technology; formalized description of a mathematical model for providing clear text authentication using a modified UMAC algorithm, as the formation of key data, a crypto-code construction (CCC) is used on the McEliese scheme on modified elliptic codes (MEС); development of data encryption and decryption algorithms using CCC based on McEliese on the MEC and UMAC algorithm. Аn approach was proposed to verify the authentication and verification of the information packet during transmission and reception via telecommunication channels, which allows using already known hashing methods to compare generated codegrams and transmitted messages for their correspondence, which increases the level of cryptographic stability of the transmitted data and the reliability of the received data. The developed schemes of algorithms for generating codеgrams and their decryption using the proposed approach make it possible to gradually demonstrate the implementation of procedures for generating codegrams and their hash codes using both shortening and lengthening the code. Further research should prove from a practical point of view the effectiveness of using this approach when transmitting a message regarding the preservation of its integrity and authenticity. Therefore, it is necessary to develop a test system that should implement the proposed approach, as well as evaluate the results obtained.unication channels, which would ensure the proper level of
APA, Harvard, Vancouver, ISO, and other styles
7

Kruglikov, S. V., and A. Yu Zalizka. "Synthesis of wireless telecommunication network with adaptation to refusals of central elements of average and high intensity." Proceedings of the National Academy of Sciences of Belarus, Physical-Technical Series 65, no. 1 (April 6, 2020): 117–28. http://dx.doi.org/10.29235/1561-8358-2020-65-1-117-128.

Full text
Abstract:
A technique of synthesis of a wireless digital communication network with package switching, providing transfer of video messages of real time scale between elements of multipurpose information-operating system in conditions of high failure rate of central elements, is considered. As conceptual model of a telecommunication network – the network of the mixed structure, including multipurpose devices, constructed on the basis of standards of a broadband radio access with switching of packages and two interconnected levels of network interaction of elements (local and main) is accepted. The technique of synthesis of a wireless network is based on the multilevel, combined adaptation of a telecommunication network in the conditions of refusals of central elements, which primary goal is rational change of parameters, functions of network elements in close interrelation with purposeful transformation of structure of telecommunication system subnetworks. The main objective of carrying out the combined adaptation of the network consists in achievement of necessary throughput of communication system depending on degree of failure rate of central elements. Properties of multilevel adaptation were investigated in the course of realization of the combined (structurally-parametrical) synthesis with use of the aggregate approach of modelling of difficult technical systems. Efficiency of the specified technique is proven by the results of the imitating experiment with use of the aggregate model of a wireless network of data transmission with switching of packages, obtained previously. The experimental data, received at natural research of networks of a broadband radio communication on the basis of standards 802.11 b/g/n, have shown, that time of processing of packages of a message essentially depends on use of existing ways of adaptation. In particular, application of effective algorithms of adaptation (both parametrical and structural) will allow to reduce the time of finding of details (packages) in broadband communication devices by several times and, thereby, to provide demanded throughput of the network functioning in the conditions of refusals of central elements.
APA, Harvard, Vancouver, ISO, and other styles
8

Polshchykov, K. A., S. A. Lazarev, and E. D. Kiseleva. "ALGORITHM FOR CALCULATING THE RECOMMENDED AUDIO COMMUNICATION SESSION DURATION IN A MOBILE AD HOC NETWORK." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 191 (May 2020): 43–48. http://dx.doi.org/10.14489/vkit.2020.05.pp.043-048.

Full text
Abstract:
In the process of carrying out search and rescue operations and emergency response measures, organization of manpower and equipment management based on ensuring effective information exchange is of great importance. Moreover, tasks are often carried out in conditions of inoperative or absent telecommunication infrastructure and possible destructive external influences. In such situations, for the transfer of information, it is preferable to deploy a mobile ad hoc network, which has an arbitrary decentralized topology and is able to operate without base stations. In order to ensure the transmission of streaming data with the required quality in wireless packet-switched networks, various algorithms for the dynamic distribution and reservation of channel resources have been developed. However, insufficient attention has been paid to substantiating the duration of the transmission of streams of audio information in a mobile ad hoc network. The article presents the results of the development and research of an algorithm for obtaining the recommended duration of sessions for transmitting voice information streams to support decision-making to ensure the effectiveness of audio communications in a mobile ad hoc network. The recommended duration of the communication session depends on the limit number of packets in the audio stream, the calculation of which is based on the use of mathematical models to estimate the average volume of a multimedia message, the transmission of which can be carried out with the required quality for the given characteristics of the network. Implementation of the proposed algorithm will allow users of a mobile ad hoc network to receive messages about the recommended duration of audio communication sessions.
APA, Harvard, Vancouver, ISO, and other styles
9

Polshchykov, K. A., S. A. Lazarev, and E. D. Kiseleva. "ALGORITHM FOR CALCULATING THE RECOMMENDED AUDIO COMMUNICATION SESSION DURATION IN A MOBILE AD HOC NETWORK." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 191 (May 2020): 43–48. http://dx.doi.org/10.14489/vkit.2020.05.pp.043-048.

Full text
Abstract:
In the process of carrying out search and rescue operations and emergency response measures, organization of manpower and equipment management based on ensuring effective information exchange is of great importance. Moreover, tasks are often carried out in conditions of inoperative or absent telecommunication infrastructure and possible destructive external influences. In such situations, for the transfer of information, it is preferable to deploy a mobile ad hoc network, which has an arbitrary decentralized topology and is able to operate without base stations. In order to ensure the transmission of streaming data with the required quality in wireless packet-switched networks, various algorithms for the dynamic distribution and reservation of channel resources have been developed. However, insufficient attention has been paid to substantiating the duration of the transmission of streams of audio information in a mobile ad hoc network. The article presents the results of the development and research of an algorithm for obtaining the recommended duration of sessions for transmitting voice information streams to support decision-making to ensure the effectiveness of audio communications in a mobile ad hoc network. The recommended duration of the communication session depends on the limit number of packets in the audio stream, the calculation of which is based on the use of mathematical models to estimate the average volume of a multimedia message, the transmission of which can be carried out with the required quality for the given characteristics of the network. Implementation of the proposed algorithm will allow users of a mobile ad hoc network to receive messages about the recommended duration of audio communication sessions.
APA, Harvard, Vancouver, ISO, and other styles
10

Yakymchuk, N. M. "Statistical models of network traffic." Connectivity 149, no. 1 (2021). http://dx.doi.org/10.31673/2412-9070.2021.012734.

Full text
Abstract:
The article considers the issues of statistical modeling of traffic in telecommunication networks with packet switching. The simulation results are used in the development of network technical condition management systems, in particular, diagnostics, troubleshooting and network configuration management. The peculiarities of congestion control of separate network segments are emphasized. With improper analysis the overload condition can be mistaken for equipment failure. Therefore, control and elimination of congestion is a statistical task. The concept of end-to-end network diagnostics is considered. This concept provides for effective assessment of the quality of functioning of all network components taking into account their interrelationships. The main issues are the interaction of equipment, inefficient configuration, improper network organization and user operation. Methods of traffic statistical control characteristics based on perforated and marker bucket algorithms are analyzed. A feature of these algorithms is the formation of a strict output stream at a rate that does not depend on the non-uniformity of the input stream. The possibility of improving the token bucket algorithm by adapting to changes in the statistical characteristics of traffic is shown. To solve this problem, statistical mathematical models of network traffic are built. Data traffic circulating in telecommunication networks by packet switching has self-similar (fractal) properties. The self-similar process retains its properties when considered at different time scales (invariance to scale changes). The degree of statistical stability of the process with multiple scaling is determined by the Hirst parameter (the self-similarity parameter). Graphs of statistical characteristics of low-speed and high-speed data traffic are obtained. Their comparative analysis is carried out.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Packet switching (Data transmission) Telecommunication Algorithms"

1

Pun, Kong Hong. "Static round-robin scheduling algorithms for scalable switches /." View Abstract or Full-Text, 2002. http://library.ust.hk/cgi/db/thesis.pl?COMP%202002%20PUN.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2002.
Includes bibliographical references (leaves 47-48). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Bin. "Algorithm design in optical networking." Click to view the E-thesis via HKUTO, 2007. http://sunzi.lib.hku.hk/hkuto/record/B39329161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Bin, and 吳斌. "Algorithm design in optical networking." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B39329161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Diao, Zhifeng. "Adaptive packet scheduling in OFDM systems." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B32059541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Diao, Zhifeng, and 刁志峰. "Adaptive packet scheduling in OFDM systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B32059541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Yi. "Studies on error control of 3-D zerotree wavelet video streaming." Connect to resource, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1124811298.

Full text
Abstract:
Thesis (Ph. D.)--Ohio State University, 2005.
Title from first page of PDF file. Document formatted into pages; contains xix, 136 p.; also includes graphics (some col.). Includes bibliographical references (p. 129-136). Available online via OhioLINK's ETD Center
APA, Harvard, Vancouver, ISO, and other styles
7

Hu, Bing, and 胡冰. "Feedback-based two stage switch architecture for high speed router design." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B43278693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hu, Bing. "Feedback-based two stage switch architecture for high speed router design." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B43278693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Xin. "Scheduling optical packet switches with reconfiguration delay /." View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?COMP%202005%20LI.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lou, Jianyu Shen Xiaojun. "Frame-based packet scheduling algorithms for input queued switches." Diss., UMK access, 2006.

Find full text
Abstract:
Thesis (Ph. D.)--School of Computing and Engineering. University of Missouri--Kansas City, 2006.
"A dissertation in computer networking and telecommunications networking." Advisor: Xiaojun Shen. Typescript. Vita. Title from "catalog record" of the print edition Description based on contents viewed Nov. 1, 2007. Includes bibliographical references (leaves 121-127). Online version of the print edition.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Packet switching (Data transmission) Telecommunication Algorithms"

1

Lee, Tony T. Principles of broadband switching and networking. Hoboken, N.J: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Tony T. Principles of broadband switching and networking. Hoboken, N.J: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Tony T. Principles of broadband switching and networking. Hoboken, N.J: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Tony T. Principles of broadband switching and networking. Hoboken, N.J: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Metcalfe, Robert M. Packet communication. [San Jose, Calif.]: Peer-to-peer Communications, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Black, Uyless D. MPLS and label switching networks. Upper Saddle River, NJ: Prentice Hall, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Katagata, Zenji. VAN sōran. Tōkyō: Fuji Tekunoshisutemu, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pach, Andrzej Ryszard. Analiza wielodostępowych systemów telekomunikacyjnych z węzłem centralnym i komutacją pakietów. Kraków: Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chiaroni, Dominique. Optical transmission, switching, and subsystems V: 2-5 November 2007, Wuhan, China. Bellingham, Wash: SPIE, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Telecommunication networks: Protocols, modeling, and analysis. Reading, Mass: Addison-Wesley Pub. Co., 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Packet switching (Data transmission) Telecommunication Algorithms"

1

Bleakley, Chris. "The Internet." In Poems That Solve Puzzles, 117–42. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198853732.003.0007.

Full text
Abstract:
Chapter 7 exposes the algorithms that are the foundations of the Internet. The Internet relies on “packet-switching” to transfer data between computers. Messages are broken into ‘‘packets’’ of data and these packets are routed across the network in a series of hops between linked computers. The advantage of packet-switching is that the network is easily extended and is robust to isolated computer failures. Data sent on the Internet is protected from errors by means of an algorithm invented by Richard Hamming. His algorithm adds information to packets, enabling receiving computers to detect and correct transmission errors. Communication on the Internet is secured by means of an algorithm published in 1977. The RSA algorithm relies on the properties of large prime numbers to prevent eavesdroppers from reading encrypted messages.
APA, Harvard, Vancouver, ISO, and other styles
2

Louvros, Spiros. "Towards Unified Services in Heterogeneous Wireless Networks Based on Soft-Switch Platform." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 1416–22. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch191.

Full text
Abstract:
The last two decades, after the telecommunication and computer technology convergence, the world of telecommunication applications has changed dramatically. The traffic needs of the customers have moved from circuit switched applications towards packet switched applications (Cox, 1995). Data traffic, with the characteristics of information transmission in the form of packets and the bursty flow characteristics rather than constant rate, nowadays accounts for slightly more than 60% of the traffic that is transmitted over the backbone telecommunication networks (Esmailzadeh, Nakagawa, & Jones, 2003). In addition to data traffic, multimedia applications like video calls, IP TV, and multimedia messaging traffic (variable rate with real time constraints) was made possible by low cost video digitizing equipment (Houssos, Alonistioti, Merakos, Mohyeldin, Dillinger, Fahrmair, & Schoenmakers, 2003). Different Radio Access Technology (RAT) networks offer different services to their subscribers. This is a big problem for the multimedia industry since it poses certain constraints to the subscribers regarding specific technology handsets. The ideal solution might be a unified handset with a unified service subscriber identity module (SIM) card (Louvros & Iossifides, 2004). This handset should be able to access the service by any radio access network, like Global System Mobile (GSM) (Siegmund, Redl, Weber, & Oliphant, 1995), General Packet Radio System (GPRS), Universal Mobile Telecommunications System (UMTS), and IEEE802.11 standard (WiFi or WLAN) towards a common core platform. In order to achieve such a unification, the service request should be seamless to the radio access technology network and the core platform should support certain protocols to provide again seamless to the user access to the requested service. Such a platform is already designed and is known as the soft-switch solution. The idea behind the soft-switch solution is the layering of the core network management procedures (mobility management, call control, session management, charging) in such a way that the operator can support all requests as a unified routing process. Moreover the operator can deploy its core switch and transmission network based on a common backbone, designed according to the 3GPP standards on IP or ATM infrastructure, and also to be able to accommodate in the future any new radio access technology network simply and without any serious rearrangement of the existing backbone, thus eliminating cost implementation. Asynchronous Transfer Mode (ATM) technology is proposed by the telecommunication industry to accommodate multiple traffic types (packet and voice) in a high speed wire-line backbone network. Briefly, ATM is based on very fast (on the order of 2.5 Gbits/sec or higher (Q.2931 ATM Network Signaling Specification, ITU)) packet switching technology with 53 byte long packets called cells being transmitted through wireline networks running usually on fiber optical equipment (Louvros, Karaboulas, Iossifides, & Kotsopoulos, 2003).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography