4G WIRELESS NETWORKS: BENEFITS AND CHALLENGES.
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 6
Abstract
The era of new wireless communications is upon us. Eventually it will penetrate into our daily life and change the way we live just like many technological innovations whose original research came from the military needs. In this paper, we investigate future wireless network especially in the hostile military environment. By combining two hottest wireless network topics, 4G (the fourth generation of cellular communication systems) and MANET (the Mobile Ad-hoc Network), we explore potentials as well as foreseeable challenges to the wireless communications in the future battlefield. Mobility is one of the most invigorating features, having an enormous impact on how communication is evolving into the future. Mobility in 4G networks requires new level of mobility support as compared to traditional mobility. There is plenty of related research on mobility in next generation networks, which promises support for emerging ambient and ubiquitous communications. This paper aims to identify and explore the different issues and challenges related to mobility management in 4G heterogeneous networks. A review of the existing solutions and ongoing projects related to these mobility management issues is presented; which can help in discovering a unified approach to seamless mobility in future generation networks.
Authors and Affiliations
Pushpendra Kr. Verma and Dr. Jayant Shekhar
Processing of TiO2/ TiCxO1 −x Nano-ceramic Composite semiconductor: Novel Results
In this work, we present experimental studies for the processing of TiO2/ TiCxO1−x Nanoceramic Composite. This paper reports the synthesis of TiO2/ TiCxO1−x composite with Ti/C ratio 50:30 via spark plasma sintering ro...
INFLUENCE OF EMOTIONAL INTELLIGENCE ON ACADEMIC SELF-EFFICACY AND ACHIEVEMENT
The study examined the influence of emotional intelligence on academic self-efficacy and achievement. The participant in the study were 150 undergraduate students at Shiraz in the Shiraz City(Iran). Their age ranged be...
Kerberos Authentication Protocol Modeling Using NUSMV Model
Authentication is one of the biggest problem related to computer information security in the area of distributed environments. Various protocols are used for the authentication purpose such as Needham-Schroeder protoco...
Android Basic Architecture including Operating System using their Application
This paper discusses about Android which is software developed for the AndroidTM mobile devices. Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Androi...
Privacy and Trust Management in Cloud Computing
Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access t...