149,938 research outputs found

    Wireless Heterogeneous Networks and Next Generation Internet

    Get PDF
    The recent advances in wireless access technologies as well as the increasing number of mobile applications have made Wireless Internet a reality. A wide variety of bandwidth demanding services including high speed data delivery and multimedia communication have been materialized through the convergence of the next generation Internet and heterogeneous wireless networks. However, providing even higher bandwidth and richer applications necessitates a fundamental understanding of wireless Internet architecture and the interactions between heterogeneous users. Consequently, fundamental advances in many concepts of the wireless Internet are required for the ultimate goal of communication anytime anywhere. This special issue of the ACM Mobile Networks and Applications Journal is dedicated to the recent advances in the area of Wireless Internet. We accepted 10 papers out of 59 submissions from all over the world with a 17% acceptance rate. Papers describing management schemes, protocols, models, evaluation methods, and experimental studies of Wireless Internet are included in this special issue to provide a broad view of recent advances in this field

    A generic communication architecture for end to end mobility management in the Internet

    Get PDF
    The proliferation of laptops, cellular phones, and other mobile computing platforms connected to the Internet has triggered numerous research works into mobile networking. The increasingly dense set of wireless access networks that can be potentially accessed by mobile users open the door to an era of pervasive computing. However, the puzzle of wireless access networks that tends to become the natural access networks to the Internet pushes legacy“wireoriented” communication architectures to their limit. Indeed, there is a critical gap between the increasingly used stream centric multimedia applications and the incapacity of legacy communication stacks to insure the continuity of these multimedia sessions for mobile users. This paper proposes a generic communication architecture (i.e. not dedicated to a specific protocol or technology) that aims to fill the gap between the application layer continuity needs and the discontinuity of the communication service inherent to the physical layer of wireless mobile networks. This paper introduces an end to end communication architecture that preserves efficiently session continuity in the context of mobile and wireless networks. This architecture is mainly based on end to end mechanisms that could be integrated into a new generation reconfigurable transport protocol. The proposed contribution efficiently satisfies mobility requirements such as efficient location management, fast handover, and continuous connection support

    Network layer access control for context-aware IPv6 applications

    Get PDF
    As part of the Lancaster GUIDE II project, we have developed a novel wireless access point protocol designed to support the development of next generation mobile context-aware applications in our local environs. Once deployed, this architecture will allow ordinary citizens secure, accountable and convenient access to a set of tailored applications including location, multimedia and context based services, and the public Internet. Our architecture utilises packet marking and network level packet filtering techniques within a modified Mobile IPv6 protocol stack to perform access control over a range of wireless network technologies. In this paper, we describe the rationale for, and components of, our architecture and contrast our approach with other state-of-the- art systems. The paper also contains details of our current implementation work, including preliminary performance measurements

    Assessing the benefits of Ajax in mobile learning systems design : a thesis submitted in partial fulfillment of the requirements for a Master of Information Studies at Massey University

    Get PDF
    Today, mobile technology is rapidly changing our life with increasing numbers of services supported by mobile phones, including mobile Internet access and Web-based mobile learning. The growth of the wireless Internet technology opens new path for people to study in anytime and any location. Using Web-based mobile application to present learning resources for mobile learners is a challenge for developers, because the mobile Internet access performance over GPRS networks is often unacceptably slow. A new Web development model, Ajax, may help to address this problem. Ajax (Asynchronous JavaScript and XML), is a new desktop approach to Web application development that uses client-side scripting to provide a seamless user application experience and reduce traffic between client and server. In this paper, we address the question of whether mobile Ajax provides measurable performance advantages over non-Ajax mobile learning applications. A real-life Web-based mobile learning application performance over a GPRS network study was done based on comparing an Ajax application and an Active Server Pages (ASP) application with identical functionality. Our results suggest that mobile Ajax can reduce the bandwidth requirement by 71%, and cut the server's response time in half. In addition, these performance improvements were noticed by users in our small group usability test

    Wireless Multi Hop Access Networks and Protocols

    Get PDF
    As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points to the Internet are available, and the mobile node roams to a new access point, the node has to make a decision when and how to change its point of attachment. The thesis describes how to consider the rapid fluctuations of the wireless medium, how to handle the fact that other nodes on the path to the access point are also mobile which results in frequent link and route breaks, and the impact the change of attachment has on already existing connections. Medium access and routing protocols have been developed that consider both the long term and the short term variations of a mobile wireless network. The long term variations consider the fact that as nodes are mobile, links will frequently break and new links appear and thus the network topology map is constantly redrawn. The short term variations consider the rapid fluctuations of the wireless channel caused by mobility and multi path propagation deviations. In order to achieve diversity forwarding, protocols are presented which consider the network topology and the state of the wireless channel when decisions about forwarding need to be made. The medium access protocols are able to perform multi dimensional fast link adaptation on a per packet level with forwarding considerations. This i ncludes power, rate, code and channel adaptation. This will enable the type of performance improvements that are of significant importance for the success of multi hop wireless networks

    Security Measures in Mobile Commerce: Problems and Solutions

    Get PDF
    Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as well. Today, new technologies that allow mobile (cellular) phones and other handheld devices to access the Internet have made wireless business transactions possible. This phenomenon is known as mobile commerce or M-Commerce. It has been predicted that the number of mobile phones connected to the mobile Internet will exceed the number of Internet-connected PCs before 2007. The mobile phone will therefore become the most prevalent device for accessing the Internet. Several industry analysts predict that Mcommerce will constitute a multibillion dollar business by 2005. However, M-Commerce brings new challenges in providing information security as information travels through multiple networks often across wireless links. What must be done to secure financial transactions via mobile commerce? Generally speaking, M-Commerce creates more security concerns than traditional E-Commerce. In this paper, security measures in M-Commerce, wireless security, and the application of cryptography for key generation, authentication, digital signature and digital certificate are discussed
    • …
    corecore