Learn More
This paper introduces a mobility tracking mechanism that combines a movement-based location update policy with a selective paging scheme. Movement-based location update is selected for its simplicity. It does not require each mobile terminal to store information about the arrangement and the distance relationship of all cells. In fact, each mobile terminal(More)
In wireless data transmission, the capacity of wireless link is typically limited. Since many applications exhibit temporal locality for data access, the cache mechanism can be built in a wireless terminal to effectively reduce the data access time. This paper studies the cache performance of the wireless terminal by considering a business card application.(More)
—This paper proposes a new approach to simplify the two-dimensional random walk models capturing the movement of mobile users in Personal Communications Services (PCS) networks. Analytical models are proposed for the new random walks. For a PCS network with hexagonal configuration, our approach reduces the states of the two-dimensional random walk from (3 2(More)
Wireless Personal Communications Abstract| Cellular Digital Packet Data (CDPD) utilizes sleep mode mechanism to conserve the power of mobile end systems (MESs). A timer called T203 determines how quick an M-ES enters the sleep mode, and another timer called T204 determines how often the M-ES wakes up. A large T204 value and a small T203 value can eeectively(More)
This paper describes the NCTUns simulation tool that facilitates the WiMAX studies of network behaviors and performance analysis. We compare NCTUns with ns-2, QualNet, and OPNET Modeler. The design paradigms of these tools are elaborated. Then we enumerate the WiMAX-related functions that can be simulated by these tools. The performance of NCTUns is studied(More)
In Universal Mobile Telecommunication System (UMTS), authentication functions are utilized to identify and authenticate a mobile station (MS), and validate the service request type to ensure that the user is authorized to use the particular network services. The authenticating parties are the Authentication Center (AuC) in the home network and the MS. In(More)
We propose an auxiliary strategy, called per-user forwarding, for locating users who move from place to place while using Personal Communications Services (PCS). The forwarding strategy augments the basic location strategy proposed in existing standards such as GSM and IS-41, with the objective of reducing network signalling and database loads in exchange(More)
— It is well known that, due to the mobility of a portable and limited channel availability, calls of portables may not be completed due to being blocked or terminated during the call initiation or the handover process. The characteristics of the call-completion and call-holding times for both a complete call and an incomplete call are of critical(More)