Learn More
This paper introduces a mobility tracking mechanism that combines a movement-based location update policy with a selective paging scheme. Movement-based location update is selected for its simplicity. It does not require each mobile terminal to store information about the arrangement and the distance relationship of all cells. In fact, each mobile terminal(More)
—This paper proposes a new approach to simplify the two-dimensional random walk models capturing the movement of mobile users in Personal Communications Services (PCS) networks. Analytical models are proposed for the new random walks. For a PCS network with hexagonal configuration, our approach reduces the states of the two-dimensional random walk from (3 2(More)
In wireless data transmission, the capacity of wireless link is typically limited. Since many applications exhibit temporal locality for data access, the cache mechanism can be built in a wireless terminal to effectively reduce the data access time. This paper studies the cache performance of the wireless terminal by considering a business card application.(More)
— It is well known that, due to the mobility of a portable and limited channel availability, calls of portables may not be completed due to being blocked or terminated during the call initiation or the handover process. The characteristics of the call-completion and call-holding times for both a complete call and an incomplete call are of critical(More)
This paper describes mobility management for the third-generation mobile networks. We focus on the evolution from General Packet Radio Service (GPRS) to Universal Mobile Telecommunication System (UMTS). In this evolution, the radio access network UTRAN has been introduced, and radio-related management is moved from the core network to UTRAN. We elaborate on(More)
This paper describes the NCTUns simulation tool that facilitates the WiMAX studies of network behaviors and performance analysis. We compare NCTUns with ns-2, QualNet, and OPNET Modeler. The design paradigms of these tools are elaborated. Then we enumerate the WiMAX-related functions that can be simulated by these tools. The performance of NCTUns is studied(More)
—In universal mobile telecommunication system (UMTS), authentication functions are utilized to identify and authenticate a mobile station (MS) and validate the service request type to ensure that the user is authorized to use the particular network services. The authenticating parties are the authentica-tion center (AuC) in the home network and the MS. In(More)