Academia.eduAcademia.edu

wireless ATM links

description2,985 papers
group12 followers
lightbulbAbout this topic
Wireless ATM links refer to the use of wireless communication technologies to facilitate Asynchronous Transfer Mode (ATM) networking, enabling the transmission of data packets over wireless channels. This approach aims to provide high-speed, low-latency connectivity for multimedia and real-time applications, leveraging the benefits of ATM's fixed-size cell structure in a wireless environment.
lightbulbAbout this topic
Wireless ATM links refer to the use of wireless communication technologies to facilitate Asynchronous Transfer Mode (ATM) networking, enabling the transmission of data packets over wireless channels. This approach aims to provide high-speed, low-latency connectivity for multimedia and real-time applications, leveraging the benefits of ATM's fixed-size cell structure in a wireless environment.

Key research themes

1. How can security in ATM transactions be enhanced through cardless and multi-factor authentication methods?

This research theme investigates the development and implementation of improved security mechanisms in ATM systems by minimizing reliance on physical cards and introducing multi-factor authentication that combines biometrics, OTPs, and mobile technologies. Such approaches aim to mitigate risks stemming from card-related frauds like cloning and skimming, as well as attacks exploiting weak PINs or compromised credentials.

Key finding: Proposes a cardless ATM transaction system that replaces physical cards with facial recognition combined with OTP-based authentication, introducing a model where a User-Generated One Time Password (OTP) and BPIN (bank... Read more
Key finding: Develops a hybrid, cost-effective authentication framework integrating three main authentication factors: knowledge-based (PIN), token-based (card), and biometrics-based (keystroke dynamics). It demonstrates improved ATM... Read more
Key finding: Introduces a two-tier security authentication mechanism combining One Time Password (OTP) with UID-based verification and a security question-based secondary verification to address network issues in OTP delivery. This... Read more

2. How can mobile technologies, such as QR codes and mobile banking, improve efficiency and security in ATM cash withdrawal?

This theme explores the integration of mobile banking features with ATM systems to streamline cash withdrawal processes by allowing pre-authorization on mobile apps and simplifying ATM interactions. The incorporation of QR-code scanning and mobile transaction generation reduces ATM queue times and enhances security by pairing mobile credentials with physical card hardware, thus improving user experience without overhauling existing ATM infrastructures.

Key finding: Proposes a system where customers initiate cash withdrawal transactions through their mobile banking app, generating a QR code that facilitates rapid cash dispensing at ATM machines. This approach minimizes ATM interaction... Read more
Key finding: Describes a cardless ATM access system that leverages mobile phone connectivity combined with biometric (facial recognition) and OTP verification, enabling users to perform transactions securely without physical cards. This... Read more

3. What architectural and protocol design considerations are essential for integrating wireless access with ATM networks to support quality of service and network mobility?

This research area focuses on the challenges and solutions in designing wireless ATM links and access networks that ensure QoS, mobility support, and seamless integration with core ATM infrastructures. It addresses protocol stacks accommodating IPv6 and RSVP over ATM, traffic modeling for optimized resource allocation, and mechanisms for managing variable wireless link quality, mobility, and multicast in heterogeneous network environments.

Key finding: Demonstrates an architecture integrating IPv6 and RSVP protocols over an ATM-based Passive Optical Network (PON) access network. It validates the mapping of IP-level QoS guarantees via RSVP onto ATM QoS parameters and... Read more
Key finding: Analyzes wireless access requirements in mobility-intensive environments, emphasizing architectural elements like name-to-locator separation, dynamic global name resolution, and spectrum coordination protocols. Proposes... Read more
Key finding: Develops optimization models based on fractional Brownian motion traffic characterization to guide ATM network design and capacity planning. The approach supports guaranteeing QoS levels under variable and bursty traffic... Read more

All papers in wireless ATM links

TCP is the most popular and widely used network transmission protocol. All most 90% of the Internet connections make use of TCP for communication. TCP is reliable for wired networks and it considers all packet timeouts in wired networks... more
Internet is expanding rapidly over the entire globe, TCP/IP is inseparable part of Internet. The increased use of wireless links for providing connectivity in remote areas and facilitating mobility in Internet brought out some serious... more
Web is extending quickly over the whole globe, TCP/IP is as one piece of Internet. The expanded utilization of remote connections for giving availability in remote territories and encouraging portability in Internet drew out a few genuine... more
Web is extending quickly over the whole globe, TCP/IP is as one piece of Internet. The expanded utilization of remote connections for giving availability in remote territories and encouraging portability in Internet drew out a few genuine... more
Transmission Control Protocol (TCP) is known to suffer from performance degradation in mobile wireless environments, as such environments are prone to packet losses due to high bit error rates and mobility induced disconnections, because... more
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and... more
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and... more
The MAC protocol, known as MASCARA (Mobile Access Scheme based on Contention And Reservation for ATM), is an infrastructure-based. adaptive TDMA scheme, which combines reservation-and contention-based access methods to provide multiple... more
Now g(t) = log det(X + Z + tN) 0 log det(Z + tN) = n i=1 log(1 + t i (N Y 01 )) 0 log(1 + t i (N Z 01 )) + log det(ZY 01
DVB-SH is a new broadcasting standard offering a mobile TV service for handheld devices using hybrid satellite/terrestrial-repeaters solution. A new link layer protection algorithm called Multi-Burst Sliding Encoding (MBSE) has been... more
This paper presents a hardware/software co-design approach where different specification languages can be used in parallel, allowing effective system co-modeling. The proposed methodology introduces a process model that extends the... more
Multipath routing protocols are distinguished from single-path routing by the fact that they look for and use several routes from a source to destination. Several routing schemes have been proposed in the context of mobile ad hoc networks... more
We present a transaction commit protocol "Transaction Commit On Timeout (TCOT)" based on a "timeout" approach for Mobile Database Systems (MDS), which can be universally used to reach a final transaction termination decision (e.g.,... more
Rapid advances in Wireless Sensor Networks (WSNs) indicate that they are becoming increasingly complex. Consequently users and applications are becoming more demanding. Due to unique characteristics of WSNs, like small dimensions and... more
The idea of using multiple access links (so called multihoming) is commonly used to improve the aggregate bandwidth and the overall service availability, which has been employed by large enterprises and data centers as a mechanism to... more
0002 This invention relates generally to wireless access to information Systems and the internet, and more specifi cally relates to a method for improving the Transmission Control Protocol (TCP) for wireless media.
Nodes, using CSMA/CA type medium access control (MAC) protocols (e.g. IEEE 802.11e) and omnidirectional antennas, in an ad-hoc network may not be able to transmit packets to each other concurrently due to spatial contention for the shared... more
A suburban ad-hoc network (SAHN) interconnects a cooperative group at broadband speed using wireless links. The nodes are stationary. A SAHN involves low installation and service costs for SAHN specific traffic. Some current routing... more
Provision for quality of service (QoS) for real-time traffic in multi-hop ad-hoc wireless networks with shared medium and a contention based media access control (MAC) pro-tocol is very challenging. In our previous work we have explained... more
In the past decades Wireless Fidelity, wireless internet(Wi-Fi) networks have enhanced its features and got closer to the home users. Back in the day home users used wired internet connections in their homes. Due to the technical... more
ShoeSoleSense is a proof of concept, novel body worn interfacean insole that enables location independent hands-free interaction through the feet. Forgoing hand or finger interaction is especially beneficial when the user is engaged in... more
This paper presents a systematic methodology for the optimal design of wireless power transfer (WPT) systems. To design a WPT for a specific application, the values of coil geometric parameters and the number of resonators should be... more
Rapidly deployable wireless networks consist of mobile base stations and less powerful mobile hosts. The mobile base stations have t o maintain wireless connectivity while on the move along pre-de ned paths. Physical obstructions and... more
This paper presents a hardware/software co-design approach where different specification languages can be used in parallel, allowing effective system co-modeling. The proposed methodology introduces a process model that extends the... more
This paper describes the design and initial results from implementation work carried out in the European GOLLUM project developing an open, extensible, and unified Application Programming Interface (API) for accessing, querying and... more
IEEE 802.11 is being currently considered to develop telecommunications infrastructures in industrial environments. However, in such environments there may exist a high level of Electromagnetic Fields (EMF) contamination, due to the... more
TCP Westwood (TCPW) is a sender-side modification of the TCP congestion window algorithm that improves upon the performance of TCP Reno in wired as well as wireless networks. The improvement is most significant in wireless networks with... more
We use a stochastic model to study the throughput performance of various versions of transport control protocol (TCP) (Tahoe (including its older version that we call OldTahoe), Reno, and NewReno) in the presence of random losses on a... more
The growing demand of usage of wireless sensors applications in different aspects makes the quality-of-service (QoS) to be one of paramount issues in wireless sensors applications. Quality of service guarantee in wireless sensor networks... more
Distributed classification fusion using error-correcting codes (DCFECC) has recently been proposed for wireless sensor networks operating in a harsh environment. It has been shown to have a considerably better capability against... more
Wireless ad hoc networks will be an important component in future communication systems. The performance of wireless ad hoc networks can be improved by link quality-aware applications. Wireless link quality is dynamic in nature,... more
Radio frequency (RF) tags have been widely used in inventory tracking, environmental monitoring, battlefield situational awareness, and combat identification due to their low cost, small size, and wireless functionality. This paper... more
Binaural noise reduction, with applications for instance in hearing aids, has been a very significant challenge. This task relates to the optimal utilization of the available microphone signals for the estimation of the ambient noise... more
Transmission Control Protocol (TCP) is the vastly researched, used and implemented transport protocol from the bouquet of standardized protocols we have. Since its first introduction, TCP has experienced tremendous revolutions... more
We use a new method based on discrete fuzzy transforms for coding/decoding frames of color videos in which we determine dynamically the GOP sequences. Frames can be differentiated into intraframes, predictive frames, and bidirectional... more
RAPIDware is a collection of software design techniques for constructing adaptive middleware to support collaborative computing. This paper describes an experimental study in the design of adaptive proxy services for resource-limited... more
This paper describes an experimental study in the use of a composable proxy framework to improve the quality of interactive audio streams delivered to mobile hosts. Two forward error correction (FEC) proxylets are developed, one using... more
With data throughput for mobile devices constantly increasing, services such as video broadcast and multicast are becoming feasible. The 3GPP (3rd Generation Partnership Project) committee is currently working on a standard for Mobile... more
TCP performance over wireless networks is critical as the Internet gradually expands to the wireless territory. Traditional TCP schemes have been proven to be inefficient for the wireless network, as they are designed and optimized for... more
This paper presents the measurement and statistical analysis of the temporal variations of the radio channel defined by a fixed link at 3.5 GHz in suburban areas. The analysis provides the required information about the temporal stability... more
Unmanned aerial vehicle (UAV) has been used recently a lot in military applications as well as in civilian. It shows great advantages and importance in the search and rescue, real-time surveillance, reconnaissance operations, traffic... more
Since TCP cannot distinguish between packet losses due to transmission errors from those due to congestion, TCP tends to perform poorly on wireless links that are prone to transmission errors. Several techniques have previously been... more
Ad hoc networks are the solution to the demands of spontaneous network setup. They are characterized by the use of wireless links, dynamically changing topology, multi-hop connectivity and decentralized routing mechanisms and... more
Mobile Ad Hoc Network (MANET) consists of dynamic topology as nodes in the network are mobile, and connected via wireless links. The nodes are grouped in clusters for the purpose of routing. Nodes within the cluster communicate directly.... more
Smart antenna is recognized as promising technologies for higher user capacity in 3G wireless networks by effectively reducing multipath and co-channel interference. Advent of powerful, low-cost, digital processing components and the... more
The accurate determination of the link quality is critical for ensuring that functionalities such as intelligent routing, load-balancing, power control and frequency selection operate efficiently. There are 4 primary metrics for capturing... more
In wireless sensor networks (WSNs), a significant amount of packets are lost when transmitted over wireless links, leading to unnecessary energy expenditure. This lossy property of a link can be described by the packet reception ratio... more
We demonstrate that, by jointly optimizing video coding and radio-over-fibre transmission, we extend the reach of 60-GHz wireless distribution of high-quality high-definition video satisfying low complexity and low delay constraints,... more
Download research papers for free!