dc.contributor.author |
El-Hajj W. |
dc.contributor.author |
Hajj H.M. |
dc.contributor.author |
Barka E. |
dc.contributor.author |
Dawy Z. |
dc.contributor.author |
Hmaissy O.E. |
dc.contributor.author |
Ghaddar D. |
dc.contributor.author |
Aitour Y. |
dc.contributor.editor |
|
dc.date |
2009 |
dc.date.accessioned |
2017-09-07T07:07:30Z |
dc.date.available |
2017-09-07T07:07:30Z |
dc.date.issued |
2009 |
dc.identifier |
10.1002/sec.128 |
dc.identifier.isbn |
|
dc.identifier.issn |
19390122 |
dc.identifier.uri |
http://hdl.handle.net/10938/11418 |
dc.description.abstract |
In the communication sector, the optimal objective is to equate quality and cost. The technologies that best serve these objectives are Wireless Access Technologies since they are easily deployed and capable of reaching and serving customers everywhere in a cost effective way. In this paper, we examine the communication options, and account for a country's geography to propose optimal WiMax planning keeping in mind the security concerns that are inherent in wireless communication. To perform WiMax radio network planning, we use a network simulation tool from ATDI called ICS Telecom. Our approach offers all users a minimum bandwidth of 1.4Mbps as well as a coverage that exceeds 90percent for all indoor users in the area under study. We optimize the network by iteratively minimizing the number of base stations required, and equivalently minimizing the cost, while maximizing the coverage for the subscribers. We also analyze the impact of security on the performance of WiMax. More specifically, we use well-known simulation software called Qualnet to simulate a WiMax environment under different security protocols and encryption scenarios. We then analyze the results to determine the impact of the added security features on the data rates between the base station(s) subscribers. The results of our proposed WiMax planning approach and the conducted security experiments showed that efficient deployment and coverage plans could be achieved for big cities as well as for rural areas. © 2009 John Wiley and Sons, Ltd. |
dc.format.extent |
|
dc.format.extent |
Pages: (401-412) |
dc.language |
English |
dc.publisher |
CHICHESTER |
dc.relation.ispartof |
Publication Name: Security and Communication Networks; Publication Year: 2009; Volume: 2; no. 5; special issue SI; Pages: (401-412); |
dc.relation.ispartofseries |
|
dc.relation.uri |
|
dc.source |
Scopus |
dc.subject.other |
|
dc.title |
Optimal WiMax planning with security considerations |
dc.type |
Article |
dc.contributor.affiliation |
El-Hajj, W., College of Information Technology, UAE University, 17551 Al Ain, United Arab Emirates |
dc.contributor.affiliation |
Hajj, H.M., Department Electrical and Computer Engineering, American University of Beirut, Beirut, 1107-2020, Lebanon |
dc.contributor.affiliation |
Barka, E., College of Information Technology, UAE University, 17551 Al Ain, United Arab Emirates |
dc.contributor.affiliation |
Dawy, Z., Department Electrical and Computer Engineering, American University of Beirut, Beirut, 1107-2020, Lebanon |
dc.contributor.affiliation |
Hmaissy, O.E., Department Electrical and Computer Engineering, American University of Beirut, Beirut, 1107-2020, Lebanon |
dc.contributor.affiliation |
Ghaddar, D., Department Electrical and Computer Engineering, American University of Beirut, Beirut, 1107-2020, Lebanon |
dc.contributor.affiliation |
Aitour, Y., Department Electrical and Computer Engineering, American University of Beirut, Beirut, 1107-2020, Lebanon |
dc.contributor.authorAddress |
El-Hajj, W.; College of Information Technology, UAE University, 17551 Al Ain, United Arab Emirates; email: welhajj@uaeu.ac.ae |
dc.contributor.authorCorporate |
University: American University of Beirut; Faculty: Faculty of Engineering and Architecture; Department: Electrical and Computer Engineering; |
dc.contributor.authorDepartment |
Electrical and Computer Engineering |
dc.contributor.authorDivision |
|
dc.contributor.authorEmail |
welhajj@uaeu.ac.ae |
dc.contributor.faculty |
Faculty of Engineering and Architecture |
dc.contributor.authorInitials |
El-Hajj, W |
dc.contributor.authorInitials |
Hajj, HM |
dc.contributor.authorInitials |
Barka, E |
dc.contributor.authorInitials |
Dawy, Z |
dc.contributor.authorInitials |
El Hmaissy, O |
dc.contributor.authorInitials |
Ghaddar, D |
dc.contributor.authorInitials |
Aitour, Y |
dc.contributor.authorOrcidID |
|
dc.contributor.authorReprintAddress |
El-Hajj, W (reprint author), UAE Univ, Coll Informat Technol, Al Ain 17551, U Arab Emirates. |
dc.contributor.authorResearcherID |
|
dc.contributor.authorUniversity |
American University of Beirut |
dc.description.cited |
AHMED Y, 2006, WIMAX BROADBAND WIRE; CROZIER E, 2004, WIMAXS TECHNOLOGY LO; Grenier E., 2005, SIGNAL PROPAGATION M; HOYMANN C, 2007, IEEE MOB WIMAX S ORL; HOYMANN C, 2007, 13 EUR WIR C EN TECH; IMPERATORE P, 2006, PATH LOSS MEASUREMEN; LUIZ J, 2008, KEY FACTORS IEEE 802; Theodoros T., 2007, WIR COMM NETW C 2007, P1948; VELEZ FJ, 2006, WIRELESS PERVASIVE C; 2007, PRACTICAL GUIDE WIMA; 2005, IEEE80216E 16; 2004, IEEE80216 16; 2007, PLANNING TOOL IMPROV; 2006, BASE STATION OPTIMIZ |
dc.description.citedCount |
|
dc.description.citedTotWOSCount |
0 |
dc.description.citedWOSCount |
0 |
dc.format.extentCount |
12 |
dc.identifier.articleNo |
|
dc.identifier.coden |
|
dc.identifier.pubmedID |
|
dc.identifier.scopusID |
70350218645 |
dc.identifier.url |
|
dc.publisher.address |
THE ATRIUM, SOUTHERN GATE, CHICHESTER PO19 8SQ, W SUSSEX, ENGLAND |
dc.relation.ispartofConference |
|
dc.relation.ispartofConferenceCode |
|
dc.relation.ispartofConferenceDate |
|
dc.relation.ispartofConferenceHosting |
|
dc.relation.ispartofConferenceLoc |
|
dc.relation.ispartofConferenceSponsor |
|
dc.relation.ispartofConferenceTitle |
|
dc.relation.ispartofFundingAgency |
|
dc.relation.ispartOfISOAbbr |
Secur. Commun. Netw. |
dc.relation.ispartOfIssue |
5 |
dc.relation.ispartOfPart |
|
dc.relation.ispartofPubTitle |
Security and Communication Networks |
dc.relation.ispartofPubTitleAbbr |
Secur. Commun. Networks |
dc.relation.ispartOfSpecialIssue |
SI |
dc.relation.ispartOfSuppl |
|
dc.relation.ispartOfVolume |
2 |
dc.source.ID |
WOS:000274441800004 |
dc.type.publication |
Journal |
dc.subject.otherAuthKeyword |
ICS telecom |
dc.subject.otherAuthKeyword |
IPSec |
dc.subject.otherAuthKeyword |
Qualnet |
dc.subject.otherAuthKeyword |
WiMax planning |
dc.subject.otherAuthKeyword |
WiMax security |
dc.subject.otherChemCAS |
|
dc.subject.otherIndex |
Cost effective |
dc.subject.otherIndex |
Coverage plan |
dc.subject.otherIndex |
Data rates |
dc.subject.otherIndex |
ICS telecom |
dc.subject.otherIndex |
IPSec |
dc.subject.otherIndex |
Network simulation tools |
dc.subject.otherIndex |
Qualnet |
dc.subject.otherIndex |
Radio network planning |
dc.subject.otherIndex |
Security considerations |
dc.subject.otherIndex |
Security features |
dc.subject.otherIndex |
Security protocols |
dc.subject.otherIndex |
Simulation software |
dc.subject.otherIndex |
TeleCOM |
dc.subject.otherIndex |
Wireless access technology |
dc.subject.otherIndex |
Wireless communications |
dc.subject.otherIndex |
Base stations |
dc.subject.otherIndex |
Computer simulation |
dc.subject.otherIndex |
Computer software |
dc.subject.otherIndex |
Cryptography |
dc.subject.otherIndex |
Intelligent control |
dc.subject.otherIndex |
Interoperability |
dc.subject.otherIndex |
Network security |
dc.subject.otherIndex |
Optimization |
dc.subject.otherIndex |
Rural areas |
dc.subject.otherIndex |
Telecommunication |
dc.subject.otherIndex |
Telecommunication systems |
dc.subject.otherIndex |
Wimax |
dc.subject.otherIndex |
Wireless networks |
dc.subject.otherIndex |
Network protocols |
dc.subject.otherKeywordPlus |
|
dc.subject.otherWOS |
Computer Science, Information Systems |
dc.subject.otherWOS |
Telecommunications |