About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International ICST Conference on Simulation Tools and Techniques for Communications, Networks and Systems

Research Article

Impact of Traffic Models on Access Management for Heterogeneous Mobile Networks

Download822 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/ICST.SIMUTOOLS2008.3024,
        author={Antoni Barba  Marti and Juan Antonio Guerrero Ib\^{a}\`{o}ez},
        title={Impact of Traffic Models on Access Management for Heterogeneous Mobile Networks},
        proceedings={1st International ICST Conference on Simulation Tools and Techniques for Communications, Networks and Systems},
        publisher={ICST},
        proceedings_a={SIMUTOOLS},
        year={2010},
        month={5},
        keywords={},
        doi={10.4108/ICST.SIMUTOOLS2008.3024}
    }
    
  • Antoni Barba Marti
    Juan Antonio Guerrero Ibáñez
    Year: 2010
    Impact of Traffic Models on Access Management for Heterogeneous Mobile Networks
    SIMUTOOLS
    ICST
    DOI: 10.4108/ICST.SIMUTOOLS2008.3024
Antoni Barba Marti1,*, Juan Antonio Guerrero Ibáñez1,*
  • 1: Telematic Engineering Department/Technical University of Catalonia Jordi Girona 1-3, Edifici C3 08034-Barcelona, Spain
*Contact email: telabm@entel.upc.edu, guerrero@entel.upc.edu

Abstract

The widespread success of wireless and mobile communications has resulted in the creation of a large variety of wireless technologies, including second and third generation (2G and 3G) cellular, satellite, WiFi, and Bluetooth. Future telecommunications systems will allow that different technologies coexist together into a single network and collaborating to offer users the best experience in the telecommunications environment. Access management is used to decide whether or not to accept a new connection or handover request into a communication network without violating the service commitment made to already admit requests. The traditional access control procedure for homogeneous network determines whether a user may be admitted into the system. However, in a heterogeneous environment, the access control is additionally responsible for deciding which radio access network is best suited to accommodate the incoming request.

Published
2010-05-16
Publisher
ICST
Modified
2010-05-16
http://dx.doi.org/10.4108/ICST.SIMUTOOLS2008.3024
Copyright © 2008–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL