2018
DOI: 10.1007/s11276-018-1837-6
|View full text |Cite
|
Sign up to set email alerts
|

A statistical comparative performance analysis of mobile network operators

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Although there have been many works on ensuring reliability aspects for MNOs, no experimental evaluations have been devised for comparisons of different MNOs in terms of their composite metrics such as reliability using a crowdsourced dataset. In our previous related work, we investigated the performance of three MNOs in terms of latency, DL/Upload (UL) speed, jitter, and PL [26]. Different from our previous analysis, in the present paper we extend these comparison ideas into combining different metrics to evaluate the performance of MNOs in terms of their reliability.…”
Section: Reliabilitymentioning
confidence: 99%
“…Although there have been many works on ensuring reliability aspects for MNOs, no experimental evaluations have been devised for comparisons of different MNOs in terms of their composite metrics such as reliability using a crowdsourced dataset. In our previous related work, we investigated the performance of three MNOs in terms of latency, DL/Upload (UL) speed, jitter, and PL [26]. Different from our previous analysis, in the present paper we extend these comparison ideas into combining different metrics to evaluate the performance of MNOs in terms of their reliability.…”
Section: Reliabilitymentioning
confidence: 99%
“…Assuming that the security model is as follows: the web server and the mobile terminal are exposed in the open wireless mobile network environment, and the two must ensure the interaction security and achieve the purpose of authentication when communicating. The authentication server and the web server are deployed in the private cloud environment, and it is considered that the web server and the authentication server have been authenticated [24][25][26]. This solution only needs to focus on ensuring the security of data transmission between the web server and the authentication server.…”
Section: Dual-server Authentication Scheme For Mobile Cloudmentioning
confidence: 99%
“…where B is the available spectrum, D is the average cell density, and SE is the per-cell SE which represents the amount of information transferred per second over a unit bandwidth [34]. [37]).…”
Section: Utilized Metricsmentioning
confidence: 99%