iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1002/SEC.128
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T04:53:40Z","timestamp":1694753620268},"reference-count":14,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2009,7,15]],"date-time":"2009-07-15T00:00:00Z","timestamp":1247616000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2009,9]]},"abstract":"Abstract<\/jats:title>In the communication sector, the optimal objective is to equate quality and cost. The technologies that best serve these objectives are Wireless Access Technologies since they are easily deployed and capable of reaching and serving customers everywhere in a cost effective way. In this paper, we examine the communication options, and account for a country's geography to propose optimal WiMax planning keeping in mind the security concerns that are inherent in wireless communication. To perform WiMax radio network planning, we use a network simulation tool from ATDI called ICS Telecom. Our approach offers all users a minimum bandwidth of 1.4\u2009Mbps as well as a coverage that exceeds 90% for all indoor users in the area under study. We optimize the network by iteratively minimizing the number of base stations required, and equivalently minimizing the cost, while maximizing the coverage for the subscribers. We also analyze the impact of security on the performance of WiMax. More specifically, we use well\u2010known simulation software called Qualnet to simulate a WiMax environment under different security protocols and encryption scenarios. We then analyze the results to determine the impact of the added security features on the data rates between the base station(s) subscribers. The results of our proposed WiMax planning approach and the conducted security experiments showed that efficient deployment and coverage plans could be achieved for big cities as well as for rural areas. Copyright \u00a9 2009 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.128","type":"journal-article","created":{"date-parts":[[2009,7,15]],"date-time":"2009-07-15T09:12:02Z","timestamp":1247649122000},"page":"401-412","source":"Crossref","is-referenced-by-count":0,"title":["Optimal WiMax planning with security considerations"],"prefix":"10.1002","volume":"2","author":[{"given":"Wassim","family":"El\u2010Hajj","sequence":"first","affiliation":[]},{"given":"Hazem M.","family":"Hajj","sequence":"additional","affiliation":[]},{"given":"Ezedin","family":"Barka","sequence":"additional","affiliation":[]},{"given":"Zaher","family":"Dawy","sequence":"additional","affiliation":[]},{"given":"Omar","family":"El Hmaissy","sequence":"additional","affiliation":[]},{"given":"Dima","family":"Ghaddar","sequence":"additional","affiliation":[]},{"given":"Youssef","family":"Aitour","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2009,7,15]]},"reference":[{"key":"e_1_2_1_2_2","unstructured":"Jos\u00e9Luiz FrauendorfN MehtaT.Key Factors for IEEE 802.16e 2.5\u2009GHz WiMax Deployments for Fixed Access Service Applications WCA's Global Development Committee (GDC) S\u00e3o Paulo \u2010 Brazil & Reston \u2013 USA Jan2008."},{"key":"e_1_2_1_3_2","unstructured":"TheodorosT KostantinosV.WiMax Network Planning and Systems Performance Evaluation Wireless Communications and Networking Conference (WCNC) pp.1948\u20131953 Hong Kong 11\u201315 March2007."},{"key":"e_1_2_1_4_2","unstructured":"VelezFJ CarvalhoV SantosD et al.Aspects of cellular planning for emergency and safety services in mobile WiMax networks Wireless Pervasive Computing 2006 Thailand 16\u201318 Jan.2006."},{"key":"e_1_2_1_5_2","unstructured":"HoymannC DittrichM G\u00f6bbelsS.Dimensioning Cellular WiMax Part II: Multihop Networks 13th European Wireless Conference: Enabling Technologies for Wireless Multimedia Communications Paris France April2007."},{"key":"e_1_2_1_6_2","doi-asserted-by":"crossref","unstructured":"HoymannC DittrichM G\u00f6bbelsS.Dimensioning cellular multihop WiMax networks IEEE Mobile WiMax Symposium Orlando Florida 25\u201329 March2007.","DOI":"10.1109\/WIMAX.2007.348692"},{"key":"e_1_2_1_7_2","unstructured":"AhmedY.WiMax \u2010 Broadband Wireless Access Technical University of Munich Germany 16 April2006."},{"key":"e_1_2_1_8_2","unstructured":"CrozierE KleinA.WiMax's Technology for LOS and NLOS Environments WiMax Forum White Paper August2004."},{"key":"e_1_2_1_9_2","unstructured":"GrenierE.Signal Propagation Modeling in Urban Environment ATDI White Paper June2005."},{"key":"e_1_2_1_10_2","unstructured":"A Practical Guide to WiMax Antennas: MIMO and Beam forming Technical Overview Motorola White Paper 2007."},{"key":"e_1_2_1_11_2","doi-asserted-by":"crossref","unstructured":"ImperatoreP SalvadoriE ChlamtacI.Path Loss Measurements at 3.5\u2009GHz: A Trial Test WiMax Based in Rural Environment 2006\u20102007.","DOI":"10.1109\/TRIDENTCOM.2007.4444709"},{"key":"e_1_2_1_12_2","unstructured":"Base Station Optimizer Set To Generate Substantial Savings For Wireless Network Operators 1 September2006. [Online]. Available:www.WiMax\u2010industry.com\/ar\/8u.htm. [Accessed: 5 June 2009]."},{"key":"e_1_2_1_13_2","unstructured":"Planning Tool Improves Accuracy of WiMax Network Proposals 5 May2007. [Online]. Available:www.provision\u2010comm.com\/news\/archive\/ImprovedWiMax. [Accessed: 5 June 2009]."},{"key":"e_1_2_1_14_2","unstructured":"IEEE802.16e IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems 2005."},{"key":"e_1_2_1_15_2","unstructured":"IEEE802.16 IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems 2004."}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.128","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.128","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T05:00:59Z","timestamp":1694667659000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,15]]},"references-count":14,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2009,9]]}},"alternative-id":["10.1002\/sec.128"],"URL":"http:\/\/dx.doi.org\/10.1002\/sec.128","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,15]]}}}