Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Advanced Wireless Networks - 4G Technologies

.pdf
Скачиваний:
47
Добавлен:
17.08.2013
Размер:
21.94 Mб
Скачать

848 QUALITY-OF-SERVICE MANAGEMENT

[12]L. Hanzo, P.J. Cherriman and J. Streit, Wireless Video Mommunication. Second to Third Generation Systems and Beyond, IEEE Series on Digital and Mobile Communication. IEEE: New York, 2001.

[13]Hanjalic, G.C. Langelaar, P.M.B. van Roosmalen, J. Biemond and R.L. Lagendijk,

Image and Video Databases. Restoration, Watermarking and Retrieval. Elsevier: New York, 2000.

[14]I.J. Cox, M.L. Miller and J.A. Bloom, Digital Watermarking. Morgan Kaufmann: San Francisco, CA, 2002.

[15]N. Nikolaidis and I. Pitas, Robust image watermarking in the spatial domain, Signal Process., vol. 66, no. 3, 1998, pp. 385–403.

[16]M. Bami, F. Bartolini, V. Cappellini and A. Piva, A DCT-domain system for robust image watermarking, Signal Process., vol. 66, no. 3, 1998, pp. 357–372.

[17]I. Cox, J. Kilian, F. Leighton and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. Image Processing, vol. 6, 1997, pp. 1673– 1687.

[18]H. Hartung and B. Girod, Watermarking of uncompressed and compressed video, Signal Process., vol. 66, 1998, pp. 283–301.

[19]M.D. Swanson, B. Zhu and A.H. Tewfik, Transparent robust image watermarking transform, in Proc. IEEE Int. Conf. Image Processing, Lausanne, 16–19, September 1996, pp. 211–214.

[20]R.M. Wolfgang and E.J. Delp, A watermark for digital images, in Proc. IEEE Int. Conf. Image Processing, Lausanne, 16–19, September 1996, pp. 219–222.

[21]T. Ebrahimi, MPEG-4 video verification model: A video encoding/de coding algorithm based on content representation, perceived quality: Toward comprehensive metrics, Proc. SPIE, vol. 4299, 2001.

[22]R. Gold, Optimal binary sequences for spread spectrum multiplexing, IEEE Trans. Inform. Theory, vol. IT-13, 1967, pp. 619–621.

[23]K.T. Tan, M. Ghanbari and D.E. Pearson, An objective measurement tool for MPEG video quality, Signal Process., vol. 70, no. 3, 1998, pp. 279–294.

[24]S. Winkler, Visual fidelity and perceived quality: toward comprehensive metrics, Proc. SPIE, vol. 4299, 2001.

[25]P. Campisi, M. Carli, G. Giunta and A. Neri, Tracing watermarking for multimedia communication quality assessment, in Proc. IEEE Int. Conf. Communications, New York, 28 April to 2 May 2002.

[26]P. Campisi, G. Giunta and A. Neri, Object based quality of service assessment for MPEG-4 videos using tracing watermarking, in Proc. IEEE Int. Conf. Image Processing, Rochester, NY, 22–25 September, 2002.

[27]H. Liu, Signal Processing Applications in CDMA Communications. Artech House: Norwell, MA, 2000.

[28]P. Campisi, M. Carli, G. Giunta and A. Neri, Blind quality assessment system for multimedia communications using tracing watermarking, IEEE Trans. Signal Processing, vol. 51, no. 4, April 2003, pp. 996–1002.

[29]G. Anastasi and L. Lenzini, QoS provided by the IEEE 802.11 wireless LAN to advanced data applications: a simulation analysis, Wireless networks, vol. 6, no. 2, 2000, pp. 99–108.

[30]G. Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function, IEEE J. Select. Areas Commun, vol. 18, no. 3, 2000, pp. 535–587.

REFERENCES 849

[31]F. Cali, M. Conti and E. Gregori, Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit, IEEE/ACM Trans. Networking, vol. 8, no. 6, 2000, pp. 785–799.

[32]C. Coutras, S. Gupta and N.B. Shroff, Scheduling of real-time traffic in IEEE 802.11 wireless lAN, Wireless Networks, vol. 6, no. 6, 2000, pp. 457–466.

[33]S. Choi and K.G. Shin, A cellular wireless local area network with QoS guarantee for heterogeneous traffic, ACM Mobile Networks Applic., vol. 3, no. 1, 1998, pp. 89–100.

[34]S. Choi and K.G. Shin, A unified wireless LAN architecture for real-time and non-real-time communication services, IEEE/ACM Trans. Networking, vol. 8, no. 1, 2000, pp. 44–59.

[35]B.P. Crow, I. Widjaja, J.G. Kim and P.T. Sakai, IEEE 802.11 wireless local area networks, IEEE Commun. Mag., vol. 35, no. 9, 1997, pp. 116–126.

[36]A. Ganz and A. Phonphoem, Robust superpoll with chaining protocol for IEEE 802.11 wireless LANs in support of multimedia applications, Wireless Networks, vol. 7, no. 1, 2001, pp. 65–73.

[37]IEEE 802.11 Task Group, http://grouper.ieee.org/groups/802/11/, 2000.

[38]R.C. Meier, An integrated 802.11 QoS model with point-controlled contention arbitration, IEEE Document 802.11-00/448, November 2000.

[39]O. Sharon and E. Altman, An efficient polling MAC for wireless LANs, IEEE/ACM Trans. Networking, vol. 9, no. 4, 2001, pp. 439–451.

[40]S.T. Sheu and T.F. Sheu, A bandwidth allocation/sharing/extension protocol for multimedia over IEEE 802.11 ad hoc wireless LANs, IEEE J. Select. Areas Commun., vol. 19, no. 10, 2001, pp. 2065–2080.

[41]M. Fischer, QoS baseline proposal for the IEEE 802.11E, IEEE Document 802.1100/360, November 2000.

[42]M. Fischer, EHCF normative text, IEEE Document 802.11-01/110, March 2001.

[43]S.-C. Lo, G. Lee and W. –T. Chen, An efficient multipolling mechanism for IEEE 802.11 wireless LANs, IEEE Trans. Comput., vol. 52, no. 6, 2003, pp. 764–778.

[44]T.S.E. Ng, I. Stoica and H. Zhang, Packet fair queueing algorithms for wireless networks with location-dependent errors, in Proc. INFOCOM’ 98, vol. 3, 1998, pp. 1103– 1111.

[45]J. -S. Yang, C. -C. Tseng and R. -G. Cheng, Dynamic scheduling framework on an RLC/MAC layer for general packet radio service, IEEE Trans. Wireless Commun., vol. 2, no. 5, 2003, pp. 1008–1016.

[46]S.J. Golestani, A self-clocked fair queuing scheme for broadband applications, in Proc. IEEE INFOCOM’94, April 1994, pp. 636–646.

[47]GSM 03.60 General Packet Radio Service (GPRS); Service Description;Stage 2, ETSI Standard v. 7.0.0, 1999.

[48]W. Stallings, High-Speed Networks: TCP/IP and ATM Design Principles. PrenticeHall: Englewood Cliffs, NJ, 1998, pp. 325–330.

[49]A. Demers, S.Keshav and S. Shenkar, Analysis and simulation of a fair queuing algorithm, in Proc. SIGCOMM’89, Austin, TX, September 1989, pp. 1–12.

[50]R.L. Cruz, A calculus for network delay–Part I: Network elements in isolation, IEEE Trans. Inform. Theory, vol. 37, 1991, pp. 114–131.

[51]S.J. Golestani, Network delay analysis of a class of fair queuing algorithms, IEEE J. Select. Areas Commun., vol. 13, 1995, pp. 1057–1070.

[52]S. Ross, Stochastic Processes, 2nd edn. Wiley: New York, 1980, pp. 114–115.

850 QUALITY-OF-SERVICE MANAGEMENT

[53]M.Ergen, S.Coleri and P.Varaiya , QoS aware adaptive resource allocation techniques for fair scheduling in OFDMA based broadband wireless access systems, IEEE Trans. Broadcasting, vol. 49, no. 4, 2003, pp. 362–370.

[54]I. Koffman and V. Roman, Broadband wireless access solutions based on OFDM access in IEEE 802.16, IEEE Commun. Mag., April 2002.

[55]I. Koutsopoulos and L. Tassiulas, Channel state-adaptive techniques for throughput enhancement in wireless broadband networks, in INFOCOM 2001, vol. 2, 2001,

pp.757–766.

[56]IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface, IEEE Std 802.16-2001.

[57]C.Y. Wong, R.S. Cheng, K.B. Letaief and R.D. Murch, Multiuser OFDM with adaptive subcarrier, bit, and power allocation, IEEE J. Select. Areas Commun., vol. 17, no. 10, 1999, pp. 1747–1758.

[58]S.G. Glisic, Adaptive WCDMA, Theory and Practice. Wiley: Chichester, 2003.

[59]S.G. Glisic, Advanced Wireless Communications, 4G Technology., Wiley: Chichester, 2004.

[60]P. Viswanath, D.N.C. Tse and R. Laroia, Opportunistic beamforming using dumb antennas, IEEE Trans. Inform. Theory, vol. 48, no. 6, 2002, pp. 1277–1294.

[61]J. Bolot and A. Shankar, Dynamic behavior of rate-based flow control mechanisms, ACM Comput. Commun. Rev., vol. 20, no. 2, 1992, pp. 35–49.

[62]M. Hluchyj and N. Yin, On closed-loop rate control for ATM networks, in Proc. IEEE INFOCOM, 1994, pp. 99–108.

[63]E. Altman, T. Basar and R. Srikant, Congestion control as a stochastic control problem with action delays, Automatica, vol. 35, no. 12, 1999, pp. 1937–1950.

[64]L. Benmohamed and S. Meerkov, Feedback control of congestion in store-and-forward networks: the case of single congestion node, IEEE/ACM Trans. Networking, vol. 1, 1993, pp. 693–798.

[65]S.Q. Li, S. Chong and C.Hwang, Link capacity allocation and network control by filtered input rate in high speed networks, IEEE/ACM Trans. Networking, vol. 3, 1995,

pp.10–15.

[66]D. Bertsekas and R. Gallager, Data Networks. Prentice-Hall: Englewood Cliffs, NJ, 1992.

[67]S.H. Low and D.E. Lapsley, Optimization flow control, I: basic algorithm and convergence, IEEE/ACM Trans. Networking, vol. 7, 1999, pp. 861–874.

[68]F.P. Kelly, A. Maulloo and D. Tan, Rate control for communication networks: Shadow prices, proportional fairness and stability, J. Opns. Res. Soc., 1998, pp. 237–252.

[69]H. Yaiche, R. R. Mazumdar and C. Rosenberg, A game theoretic framework for bandwidth allocation and pricing in broadband networks, IEEE/ACM Trans. Networking, vol. 8, 2000, pp. 667–678.

[70]O. Ait-Hellal, E. Altman and T. Basar, Rate based flow control with bandwidth information, Eur. Trans. Telecommun., vol. 8, no. 1, 1997, pp. 55–65.

[71]H.S. Kim and N.B. Shroff, Loss probability calculations at a finite buffer multiplexer,

IEEE/ACM Trans. Networking, vol. 9, 2001, pp. 765–768.

[72]H.S. Kim and N.B. Shroff, On the asymptotic relationship between the overflow probability and the loss ratio, Adv. Appl. Prob., vol. 33, no. 4, 2001, pp. 810–835.

[73]A.P. Zwart, A fluid queue with a finite buffer and subexponential input, Adv. Appl. Probabil., vol. 32, 2000, pp. 221–243.

REFERENCES 851

[74]A.V. Oppenheim, A.S. Willsky and S.H. Nawab, Signals and Systems. Prentice-Hall: Englewood Cliffs, NJ, 1997.

[75]P.W. Glynn and W. Whitt, Logarithmic asymptotics for steady-state tail probabilities in a single-server queue, J. Appl. Prob., 1994, pp. 131–155.

[76]R.M. Loynes, The stability of a queue with nonindependent inter-arrival and service times, in Proc. Cambridge Phil. Soc., vol. 58, pp. 497–520, 1962.

[77]J. Choe and N.B. Shroff, Use of the supremum distribution of Gaussian processes in queueing analysis with long-range dependence and selfsimilarity, Stochast. Models, vol. 16, no. 2, 2000.

[78]N.B. Likhanov and R. Mazumdar, Cell loss asymptotics in buffers fed by heterogeneous longtailed sources, in Proc. IEEE INFOCOM, 2000, pp. 173–180.

[79]D. Qiu and N.B. Shroff, Study of predictive flow control, Purdue University, Technical Report Available at: http://min.ecn.purdue.edu/ dongyu/paper/techrep.ps, May 2001.

[80]J. Choe and N.B. Shroff, A central limit theorem based approach for analyzing queue behavior in high-speed networks, IEEE/ACM Trans. Networking, vol. 6, 1998, pp. 659– 671.

[81]D. Qiu and N.B. Shroff, A predictive flow control scheme for efficient network utilization and QoS, IEEE/ACM Trans. Networking, vol. 12, no. 1, 2004, pp. 161–172.

Index

3GPP, 22, 23, 415, 418, 613, 614, 615, 616, 626

AA, 633

AAA, 42, 614, 615, 616 ABR, 400, 403, 468, 479, 520 Absolute guarantee, 296

Access point, 20, 235, 236, 238, 306, 307, 320, 323, 344, 640, 700, 821

ACK, 9, 12, 14, 129, 130, 131, 132, 133, 136, 137, 138, 150, 153, 156, 157, 162, 166, 167, 259, 260, 261, 262, 264, 265, 266, 267, 268, 269, 270, 273, 275, 276, 277, 281, 285, 287, 288, 472, 811

Acknowledgement spoofing, 622, 624 Active applications, 6, 633

Active networking, 629, 635, 639, 661 Active packets, 635, 636

Active router controller, 630

Ad hoc, 2, 176, 507, 508, 531, 532, 715, 716 Ad hoc networks, 465

Adaptation threshold, 120, 124

Adaptive, 44, 45, 101, 106, 126, 136, 146, 147, 149, 164, 191, 259, 303, 362, 367, 384, 385, 460, 463, 531, 533, 580, 581, 586, 587, 644, 665, 690, 694, 696, 725, 796, 814, 859

Adaptive reuse partitioning, 384 Advanced resource management system,

392

Advertisement lifetime, 320 AGENT message, 19 Agent(s) transport, 391 AKA, 613, 614, 615, 616, 627

All channel con-centric allocation ACCA, 384

Aloha, 153, 156, 663 Aternate path routing, 499 AMC, 103, 105

AN, 2, 355, 357, 359, 610, 629, 634, 635, 636, 660

Anchoring, 312, 313, 314

ANMP, 715, 717, 718, 725

ANTS, 635, 636, 659, 660

AODV, 468, 477, 478, 499, 531, 533, 617, 804, 805, 806

AP, 615, 635, 636, 637, 640, 821 APR, 499, 500

ARC, 631

Architecture reconfigurability, 465 ARP, 384, 386, 388, 534

ASFSM, 644 A-TCP, 283, 285 ATDMA, 25

ATM, 22, 23, 147, 213, 232, 233, 235, 237, 242, 244, 245, 255, 256, 257, 323, 324, 325, 326, 327, 361, 362, 363, 364, 365, 403, 461, 632, 659, 726, 849, 859

ATM Forum, 235, 255, 323 Attribute-based multicasting, 545 Attribute-based naming, 545, 550 AuC, 608, 609, 612, 613, 614

Authentication, 42, 323, 325, 364, 550, 589, 590, 591, 592, 594, 595, 597, 598, 599, 601, 603, 604, 605, 606, 607, 608, 609, 610, 612, 613, 614, 615, 621, 622, 624, 625, 626, 628, 715

Advanced Wireless Networks: 4G Technologies. Savo G. Glisic

C 2006 John Wiley & Sons, Ltd.

854 INDEX

Authentication and key agreement, 613 Authentication vector, 613

Autonomous reuse partitioning, 384, 385, 458 AV, 518, 519, 613

BA, 371, 372, 373, 706, 713 Backoff scheme, 543 Bandwidth reconfiguration, 388

Bandwidth-delay product, 259, 260 BAR, 371, 372

Base building block, 630 Basic algorithm, 372

Basic algorithm with reassignment, 372

BB, 170, 172, 173, 174, 175 BBN, 630

BCH, 128, 129, 130 BCLC, 520

BCO, 371, 373, 374, 375 BDCL, 371, 373, 374 BDP, 259, 260, 261, 262

Beamforming, 67, 96, 153, 156, 176, 369, 729, 789, 797, 798, 799, 859

Beamwidth, 51, 58, 66, 158, 687 Berlekamp and Welch decoder, 619 BFA, 371, 373

Bilateral symmetric interaction (BSI) game, 650

Bio-analogies, 654 BIONET, 323 Bionet platform, 657 BLA, 838, 839 Black-burst, 170

Blanket coverage, 551, 687 Borrow first available, 373 from the richest, 372

with channel ordering, 373

with directional channel locking, 373 Boundary estimation, 561, 562, 565, 567 BQ-REPLY, 479, 480

BRA, 390 Breakpoint model, 84 BRM, 390

Broadband Wireless Internet Forum, 834 Browser agent, 706, 714

BSI, 650, 652

BSS, 608, 610, 821, 823, 825, 828 BTS, 609, 610

Bunching of base stations, 692 BWIF, 834

CA, 177, 189, 228, 229, 231, 232, 256, 260, 261, 262, 263, 264, 291, 324, 355, 390, 414, 419, 420, 421, 423, 532, 580, 581, 584, 586, 587, 588, 617, 625, 627, 628, 799, 804, 847, 848

CA (certification authority), 617 CABR, 371

CAC, 240, 345, 346, 353, 354, 355, 390, 394, 395, 397, 398, 399, 400, 403, 404, 405, 407, 409, 410, 411, 412, 420, 422, 426, 828

CACA, 390

Call blocking probabilities, 394, 396, 397 Call blocking probability, 179, 184, 370, 372,

375, 383, 407, 408, 411, 422 Call-admission control, 345

Care of address, 318

Carrier sense multiple access, 160, 821 CBDRA, 221, 222

CBR, 223, 224, 225, 241, 399, 404, 419, 807 CCU, 828

CDMA, 1, 25, 30, 32, 33, 34, 35, 36, 42, 44, 45, 93, 96, 99, 302, 367, 395, 397, 398, 399, 400, 401, 403, 405, 407, 409, 411, 413, 415, 417, 418, 419, 423, 425, 426, 427, 430, 433, 444, 456, 459, 460, 461, 463, 493, 662, 665, 671, 673, 675, 677, 695, 697, 727, 728, 732, 733, 737, 741, 796, 797, 848

Cdma2000, 1, 2

CE, 139, 632, 633, 656, 657, 658

Cell residence time, 179, 180, 181, 183, 185, 186, 187, 188, 350

Cell site switch, 307

Centralized bandwidth-delay routing algorithm, 221

Centralized DCA, 376

Certificates, 604, 626 CFB, 822

CFP, 821, 822, 826 CGSR, 468, 469, 470

Channel allocation, 364, 369, 370, 375, 378, 380, 382, 385, 386, 410, 458, 692, 793

assignment with borrowing and reassignment, 375

class, 121, 123, 124, 125, 126 codec unit, 828

holding time, 181, 182, 183, 184, 185, 186, 187, 188, 330, 333, 336, 343, 344

modeling, 47

segregation, 376, 381, 458 Ciphertext, 592, 593, 605

CIR, 90, 368, 369, 370, 376, 380, 381, 384, 385, 386, 387, 429, 431, 432, 433, 434, 435, 436, 437

CIR measurement DCA, 376 Cleartext, 590, 591, 592, 597, 605 Clear-to-send, 119, 169

Clustering, 52, 87, 502, 503, 505, 718 CM, 349, 350, 641, 642, 643

CMIP, 701, 723

CMMBCR, 806

CMRPC, 806, 807, 808, 809 CMTTP, 427

CN, 22, 287, 318, 320, 321, 322 CoA, 318, 319, 320, 321, 322, 323 Co-channel reuse distance, 367 Coding gain, 108, 109, 113, 118, 500 Coexistence, 439, 442, 463

Cognitive radio networks as a game, 650 Coherence bandwidth, 70

Coherent relaying with interference subtraction, 761

Collective identification, 576 Compact pattern allocation, 370, 457

Complete graph, 171, 194, 214, 216, 219 Composite radio environment, 1, 3 Conditional MRPC, 806

Confidentiality, 599, 601, 603, 604, 605, 606, 607, 613, 615, 618

Congestion avoidance, 260, 279, 280, 284, 291, 292

Connection generation, 306 Connectivity ratio, 769 Convolutional coding, 120 Coordination-dummy game, 649 Correspondent node, 318, 321, 322

Coverage, 11, 17, 70, 211, 307, 308, 313, 314, 317, 329, 369, 370, 378, 486, 489, 551, 552, 567, 570, 585, 640, 667, 668, 669, 670, 671, 672, 673, 679, 680, 685, 691, 692, 693, 694, 695, 728, 796

Coverage radius, 668, 669, 670, 685

CPN, 640, 641, 642, 643, 645, 646, 647, 648 CPs, 641, 643, 644, 646, 708

CR, 2, 3, 6, 7, 128, 332, 333, 334, 339, 625, 769

Crankback, 222, 223, 224, 225, 227 Crankback ratio, 222, 223, 224, 225, 227 CRC, 127, 128, 129, 130, 132, 141, 143, 158,

661

CRE, 1, 2, 3, 6, 7

CRIS, 761, 762

Crosslayer, 293 Cross-layer interaction, 299 Cross-over distance, 768

Cryptographic authentication, 590 Cryptography, 589, 596, 599, 618, 619, 625 CS, 94, 141, 164, 236, 238, 241, 242, 354, 355,

390, 391, 423, 704

CSI (channel state information), 124

CSMA, 160, 169, 170, 171, 173, 301, 418, 493, 543, 567, 568, 571, 821

CSMA/CA, 171, 173, 567, 568, 571, 821 CSS, 307

CTMC, 104, 107, 109, 114, 115, 117

CTS, 162, 164, 165, 166, 167, 168, 169, 170, 822, 824

INDEX 855

CWND, 284, 286, 288

Cyber-entities, 656

Daemon agent, 707, 714 DAG, 477

Data aggregation, 545, 546, 662, 664, 791 centric routing, 544

collection, 715 prediction, 810

Datagrams, 210, 318, 322, 323

DCA, 369, 370, 375, 376, 378, 379, 380, 381, 382, 383, 386

DCF, 149, 160, 176, 821, 822 DCLC, 520

DCS, 376, 381

DD, 223, 224 DEA, 597

Decay constant, 82, 86, 87, 764

Delay constrained least cost routing, 520 constraint curve, 239

deviation, 223, 226

spread, 47, 48, 61, 62, 70, 72, 73, 78, 79, 92, 93, 730, 764, 765, 767

Delivery ratio, 770

Deployment, 3, 293, 538, 539, 551, 552, 553, 583, 585, 639, 680, 685, 686, 687, 688, 696, 705

DES, 595, 597

DFIMA, 399, 400, 415, 417, 418, 424, 425, 426 Diffraction, 52, 70, 86, 687, 696

Directed diffusion, 548, 581, 583, 585 Directed graph, 228

Direction of arrival, 67, 729 Directional probability, 347, 348, 349 Directory register, 311

Discovery, 318, 658 Distance-based location, 317 Distributed DCA, 376, 378 Diversity coding, 532, 617, 627

gain, 105, 295, 841 reception, 440

DOA, 51, 67, 153

Doppler, 59, 66, 99, 113, 114, 133, 250, 252, 255, 737

DPSK modulation, 738

DR, 94, 311, 312, 379, 380, 769, 770 DRP, 482, 484

DSA, 4, 5, 6

DS-CDMA, 32, 34, 35, 36, 44, 300, 427, 459, 462

DSR, 283, 285, 468, 472, 473, 475, 476, 499, 514, 515, 520, 617, 637, 804, 805, 806, 814

DSSS system, 447 Dual slope model, 84

Duty cycle, 161, 543, 580, 808, 810, 811

856 INDEX

DVB, 2, 22

Dynamic cell sizing, 694

channel allocation, 188, 369, 386 channel selection, 376, 381 charging, 690, 692

hierarchical database architecture, 311 LA management, 315

source routing, 283, 285, 499, 530, 813 spectrum allocation, 5

time-based location, 316 update schemes, 315

EAP, 614, 615, 627 EAR, 542, 543

Early termination, 488, 516 Eavesdropping, 715

ECN, 265, 266, 285, 286, 287, 288, 289, 293, 294

EDGE, 1, 2, 25, 28 EE, 633, 634

Effective bandwidths, 237, 256 capacity, 235

traffic source, 235

EGC, 147, 735, 741, 742, 743 Eigenvalue decomposition, 57 ELFN, 285

Elliot, 102, 136 ELN, 265 Encipherment, 605

End-to-end reliability, 549

Energy efficiency, 147, 542, 543, 581, 801, 808, 810

EPG, 649, 650, 652, 653 Equal gain combiner, 735 Equalization, 79, 369 Equivocation, 112

Erlang, 27, 180, 181, 186, 239, 383, 398, 408, 412, 414, 422, 457, 459, 672, 673, 682, 796

ESPRIT, 51, 52, 66, 67, 95, 96 ESRT, 549, 576, 578, 579, 584, 587 ET, 488, 516

ETCP, 575

Exact potential game, 649

Explicit link failure notification, 285 Extensible authentication protocol, 627

FA, 318, 319, 320, 321, 322, 323, 376, 377, 383

FAIN (future active IP network), 634 Fair scheduling algorithm, 839, 841 Fast retransmit, 260, 268, 269, 270, 273 FBS, 392

FCA, 369, 370, 372, 374, 375, 377, 378, 380, 381, 382, 383, 385, 386, 667, 668, 672, 673, 679

FCC mask, 41 FCFS, 406 FCS, 141, 158 FDD, 28, 686

FEC, 10, 126, 129, 147, 158, 265, 272 Fetch quickly, 549

FFT, 32, 33, 834, 836 FIFO, 236, 264

First available, 376 First-in first-out, 245, 264 Fisheye routing, 496 Fitness, 654

Fixed channel assignment, 400, 667, 668, 695

Fixed reuse partitioning, 384 FlCA, 383

Flexible channel allocation, 383 Flexible reuse FRU, 384

Folk theorem, 649

Forced termination, 305, 332, 338, 339, 388 ForCES, 630, 632, 633, 659

Foreign agent, 321, 323, 363, 637 Forward error correction, 10, 22, 126, 272

Forwarding and control element separation, 630, 632

FPF, 447, 448, 449

Fractional guaranteed service, 347 FRCV, 260, 261

Frechet variable, 75

Frequency assignment, 369, 458 Frequency reuse factor, 368 Fritchman, 102, 145

FRXT, 260

FSA, 839

FSR, 496

Full connection rerouting, 328

GA, 188, 389, 390, 579, 583, 584, 587, 708, 709, 710, 711, 712, 713, 714

GAMA, 170

Game theory, 646, 662

Gao, 60, 61, 62, 176, 582, 587, 724 Gaussian noise, 39, 113, 447, 731, 734, 785 GBN, 129

Genes, 654, 655, 656, 712 Genetic algorithm, 708, 709 GEO, 263, 328

GH, 788, 838

Gilbert, 102, 136, 145, 460 Global state routing, 496 GM, 32, 33, 34, 35, 390 Go-back-N, 10, 129 Goodput, 105, 146

GOP, 297, 298

GoS, 395, 396, 398, 399, 408, 409, 411, 412, 414, 422

GPRS, 1, 2, 22, 827, 828, 849

GPS, 40, 47, 388, 442, 463, 551, 554 GRA, 839

Grade of service, 383, 395 Graphs, 227, 228, 231, 695 Gratuitous reply, 514

Greedy release algorithm, 839 GreedyHungarian, 838, 842

Group allocation multiple access, 170 Group-of-picture, 297

GSM, 1, 22, 23, 25, 26, 27, 28, 29, 93, 96, 311, 324, 410, 439, 456, 589, 607, 608, 609, 610, 611, 613, 614, 626, 729, 797, 849

GSR, 496

HA, 159, 318, 319, 320, 321, 322, 323, 636 Hadamard, 109

HAN, 1

Handoff, 15, 18, 27, 306, 307, 321, 327, 329, 660, 695

Handoff call, 179, 181, 182, 183, 184, 185, 186, 187, 305, 329, 332, 333, 334, 337, 339, 342, 394, 395, 399, 404, 405, 406, 411, 412, 423, 670

Handover, 188, 259, 265, 306, 362, 363, 459, 691, 692, 694

Hard handoff, 29, 307 HCA, 369, 382, 383 HCF, 149, 822, 824 HDLC, 139, 140, 148 HE, 613, 614

Header, 8, 9, 108, 126, 127, 128, 129, 130, 132, 150, 158, 167, 266, 273, 293, 472, 485, 506, 572, 573, 632, 633, 822, 826

HID, 494 Hierarchical ID, 494

location prediction, 345 static, 704

High-level data link control, 139 HIPERLAN, 11, 22, 34, 42, 66, 104, 627,

815 HLP, 345, 845

HLR, 307, 308, 309, 310, 311, 312, 313, 324, 325, 326, 608, 609, 611, 613

Home agent, 318, 320, 321, 322, 636, 637 environment, 613

location register, 307, 613 HS, 704, 833, 840

HSA, 840 HSDPA, 104

HSR, 491, 494, 495

Hybrid channel allocation, 369 Hyper-Erlang, 179, 180, 185, 187 Hysteresis, 103, 104, 105, 107, 114, 115,

116

INDEX 857

I frames, 141, 142, 143, 145 IARP, 486, 489, 490, 491, 517, 519 IEEE802, 11, 22, 146, 834

IERP, 486, 487, 489, 490

IETF, 5, 23, 530, 531, 534, 630, 632, 659, 723

IH, 694

Imperfections, 106, 110 IMSI, 608

INAB, 707, 708

Incremental deployment, 552

Indoor, 43, 44, 94, 95, 97, 145, 146, 301, 459, 661, 662, 663, 664, 697

Infrared Link, 148

Integral guaranteed service, 347 Intelligent handover, 690, 694

relaying, 690, 693, 696 Interarrival time, 89 Intercell handoff, 306 Intercluster routing, 501

Interference cancellation, 369, 737, 738, 742

Interleaving attacks, 595, 596, 597 Internetwork access broker, 707 Intersatellite handoff, 329

links, 364

Intertechnology roaming, 311, 323 Interzone routing protocol, 486 Intracell handoff, 306, 386 Intracluster routing, 501, 502, 507 Intradomain routing, 221, 224 Intrazone routing protocol, 486 Intrusion detection system, 630 IPv6, 3, 44, 320, 322, 323

IrLAP, 139, 140, 141, 142, 148 IS-41, 311, 324, 364

ISL, 328

ISM, 2, 539, 540, 580

ISO, 101, 175, 593, 606, 607, 624, 625, 626, 847

ISO SC27 protocol, 593 Isolation coefficients, 369 Iterative distance-based location,

316

Jakes, 113

KASUMI, 612, 626 KDC, 589, 603 Key archival, 607 Key deletion, 607

key distribution center, 589 Key generation, 598, 604 Key maintenance, 607 Key recovery, 607

Key replacement, 607