4,407 research outputs found
Design and Experimental Evaluation of a Route Optimisation Solution for NEMO
An important requirement for Internet protocol (IP)
networks to achieve the aim of ubiquitous connectivity is network
mobility (NEMO). With NEMO support we can provide Internet
access from mobile platforms, such as public transportation vehicles,
to normal nodes that do not need to implement any special
mobility protocol. The NEMO basic support protocol has been
proposed in the IETF as a first solution to this problem, but this
solution has severe performance limitations. This paper presents
MIRON: Mobile IPv6 route optimization for NEMO, an approach
to the problem of NEMO support that overcomes the limitations
of the basic solution by combining two different modes of operation:
a Proxy-MR and an address delegation with built-in routing
mechanisms. This paper describes the design and rationale of the
solution, with an experimental validation and performance evaluation
based on an implementation.Publicad
IPv6 Network Mobility
Network Authentication, Authorization, and Accounting has
been used since before the days of the Internet as we know it
today. Authentication asks the question, “Who or what are
you?” Authorization asks, “What are you allowed to do?” And fi nally,
accounting wants to know, “What did you do?” These fundamental
security building blocks are being used in expanded ways today. The
fi rst part of this two-part series focused on the overall concepts of
AAA, the elements involved in AAA communications, and highlevel
approaches to achieving specifi c AAA goals. It was published in
IPJ Volume 10, No. 1[0]. This second part of the series discusses the
protocols involved, specifi c applications of AAA, and considerations
for the future of AAA
A survey on subjecting electronic product code and non-ID objects to IP identification
Over the last decade, both research on the Internet of Things (IoT) and
real-world IoT applications have grown exponentially. The IoT provides us with
smarter cities, intelligent homes, and generally more comfortable lives.
However, the introduction of these devices has led to several new challenges
that must be addressed. One of the critical challenges facing interacting with
IoT devices is to address billions of devices (things) around the world,
including computers, tablets, smartphones, wearable devices, sensors, and
embedded computers, and so on. This article provides a survey on subjecting
Electronic Product Code and non-ID objects to IP identification for IoT
devices, including their advantages and disadvantages thereof. Different
metrics are here proposed and used for evaluating these methods. In particular,
the main methods are evaluated in terms of their: (i) computational overhead,
(ii) scalability, (iii) adaptability, (iv) implementation cost, and (v) whether
applicable to already ID-based objects and presented in tabular format.
Finally, the article proves that this field of research will still be ongoing,
but any new technique must favorably offer the mentioned five evaluative
parameters.Comment: 112 references, 8 figures, 6 tables, Journal of Engineering Reports,
Wiley, 2020 (Open Access
Mobility and Handoff Management in Wireless Networks
With the increasing demands for new data and real-time services, wireless
networks should support calls with different traffic characteristics and
different Quality of Service (QoS)guarantees. In addition, various wireless
technologies and networks exist currently that can satisfy different needs and
requirements of mobile users. Since these different wireless networks act as
complementary to each other in terms of their capabilities and suitability for
different applications, integration of these networks will enable the mobile
users to be always connected to the best available access network depending on
their requirements. This integration of heterogeneous networks will, however,
lead to heterogeneities in access technologies and network protocols. To meet
the requirements of mobile users under this heterogeneous environment, a common
infrastructure to interconnect multiple access networks will be needed. In this
chapter, the design issues of a number of mobility management schemes have been
presented. Each of these schemes utilizes IP-based technologies to enable
efficient roaming in heterogeneous network. Efficient handoff mechanisms are
essential for ensuring seamless connectivity and uninterrupted service
delivery. A number of handoff schemes in a heterogeneous networking environment
are also presented in this chapter.Comment: 28 pages, 11 figure
Accessing the Internet through Moving Networks
Poster at IST Mobile & Wireless Communications Summit 2007, Budapest, Hungary, 1-5 July 2007.The success of cellular communications networks
shows the interest of users in mobility. Host mobility support in
IP networks is a first step in the adaptation of these networks to
the needs of users in this field. But, there exists also the need of
supporting the movement of a complete network that changes its
point of attachment to the fixed infrastructure. This paper
describes the architecture designed in the EU DAIDALOS II
project to provide Internet access through moving networks. The
designed moving networks architecture support the following
main features: Route Optimisation, Multicast traffic delivery,
security and authentication integration, end-to-end QoS and
interaction with Localised Mobility Management solutions.Publicad
Mobility through Heterogeneous Networks in a 4G Environment
Serving and Managing users in a heterogeneous environment. 17th WWRF Meeting in Heidelberg, Germany, 15 - 17 November 2006. [Proceeding presented at WG3 - Co-operative and Ad-hoc Networks]The increase will of ubiquitous access of the users to the requested services points towards the integration of heterogeneous networks. In this sense, a user shall be able to access its services through different access technologies, such as WLAN, Wimax, UMTS and DVB technologies, from the same or different network operators, and to seamless move between different networks with active communications. In this paper we propose a mobility architecture able to support this users’ ubiquitous access and seamless movement, while simultaneously bringing a large flexibility to access network operators
Enhancing Capacity and Network Performance of Client-Server Architectures Using Mobile IPv6 Host-Based Network Protocol
A huge number of studies have been done supporting seamless mobility networks and mobile technologies over the years The recent innovations in technology have unveiled another revolution from the static architectural approach to more dynamic and even mobile approaches for client-server networks Due to the special equipments and infrastructure needed to support network mobility management it is difficult to deploy such networks beyond the local network coverage without interruption of communications Therefore MIPv6 as developed by the Internet Engineering Task Force IETF and ancillary technologies were reviewed to provide clear insights on implementing MIPv6 in Client-Server architectures However MIPv6 technology presents weaknesses related to its critical handover latency which appears long for real-time applications such as Video Stream with potential loss of data packets during transmissio
- …