146,687 research outputs found

    An Effective Path Selection Method in Multiple Care-of Addresses MIPv6 with Parallel Delay Measurement Technique

    Get PDF
    Abstract. In the Ubiquitous Society, there will be many types of mobile access network surrounding us and we can access the Internet anytime anywhere. At that time, mobile device can select several links from surrounded mobile access networks and access the Internet with multiple interfaces. We have already Mobile IPv6 protocol that supports mobility and try to extend to support multiple Care-of Addresses registration. But, we don't have any solution for selecting effective path. The effective path has many advantages such as reducing communication overhead. In this paper, we propose that effective path selection method in Multiple Care-of Addresses Mobile IPv6 environment with 'Parallel Delay Measurement' technique. With our technique, we can make down average packet delay

    Mapping Sex Offender Addresses: The Utility of the Alaska Sex Offender Registry as a Research Data Base

    Get PDF
    The registration of sex offenders was part of a national effort to enhance public safety by permitting law enforcement officials to track the location of convicted sex offenders after their release. All fifty states have enacted legislation requiring persons convicted of various sex-related offenses to register with law enforcement agencies; many states also grant public access to all or a portion of their registries. This document reports on the Alaska Statistical Analysis Center's efforts to improve data accuracy in the Alaska Sex Offender Registry, maintained by the Alaska State Troopers, and to assess the registry's utility as a research tool.Bureau of Justice Statistics, Grant No. 1999-RU-RX-K006Background of the Project / Research Methodology / Results / Utility: Spatial Justice Research / APPENDICES / A. Alaska’s Sex Offender Registration Law / B. Establishment of a Central Registry of Sex Offenders in Alaska / C. Definitions of Offenses for which Convicted Persons Must Register as Sex Offenders in Alask

    Mobile IP: state of the art report

    Get PDF
    Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node. Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working group, that is able to inform the network about this change in network attachment such that the Internet data packets will be delivered in a seamless way to the new point of attachment. This document presents current developments and research activities in the Mobile IP area

    Mobility Management in beyond 3G-Environments

    Get PDF
    Beyond 3G-environments are typically defined as environments that integrate different wireless and fixed access network technologies. In this paper, we address IP based Mobility Management (MM) in beyond 3G-environments with a focus on wireless access networks, motivated by the current trend of WiFi, GPRS, and UMTS networks. The GPRS and UMTS networks provide countrywide network access, while the WiFi networks provide network access in local areas such as city centres and airports. As a result, mobile end-users can be always on-line and connected to their preferred network(s), these network preferences are typically stored in a user profile. For example, an end-user who wishes to be connected with highest bandwidth could be connected to a WiFi network when available and fall back to GPRS when moving outside the hotspot area.\ud In this paper, we consider a combination of MM for legacy services (like web browsing, telnet, etc.) using Mobile IP and multimedia services using SIP. We assume that the end-user makes use of multi-interface terminals with the capability of selecting one or more types of access networks\ud based on preferences. For multimedia sessions, like VoIP or streaming video, we distinguish between changes in network access when the end-user is in a session or not in a session. If the end-user is not in a session, he or she needs to be able to start new sessions and receive invitations for new sessions. If the end-user is in a session, the session needs to be handed over to the new access network as seamless as possible from the perspective of the end-user. We propose an integrated but flexible solution to these problems that facilitates MM with a customizable transparency to applications and end-users

    Are YOU Registered? An Analysis of Buffalo\u27s Rental Registry Code

    Get PDF
    Buffalo’s Dwelling Unit Registration code was passed in 2004 and became effective in 2005. The City of Buffalo had previously enacted a Multiple Dwelling Unit Registration law, which required owners of multiple dwelling units (three or more units) to register their property and obtain a certificate of occupancy, but the City did not have any required registration for single and double residential dwellings. The purpose of the Rental Registry code is to create a database that lists single and double residential dwelling owners’ contact information for future problems. Owners of single and double residential dwelling units pay annual registration fees. The data is collected through a report in the city’s computer system with the ability to cross-reference properties and owners to see which properties are registered. The Rental Registry code is designed to be a tool for legislators to enforce registration. Like many pieces of legislation it is not always strictly enforced. The courts are permitted to use the Rental Registry code to impose fines, but have not done so consistently

    Multinet : enabler for next generation enterprise wireless services

    Get PDF
    Wireless communications are currently experiencing a fast migration toward the beyond third-generation (B3G)/fourth generation (4G) era. This represents a generational change in wireless systems: new capabilities related to mobility and new services support is required and new concepts as individual-centric, user-centric or ambient-aware communications are included. One of the main restrictions associated to wireless technology is mobility management, this feature was not considered in the design phase; for this reason, a complete solution is not already found, although different solutions are proposed and are being proposed. In MULTINET project, features as mobility and multihoming are applied to wireless network to provide the necessary network and application functionality enhancements for seamless data communication mobility considering end-user scenario and preferences. The aim of this paper is to show the benefits of these functionalities from the Service Providers and final User point of view

    Interworking Architectures in Heterogeneous Wireless Networks: An Algorithmic Overview

    Get PDF
    The scarce availability of spectrum and the proliferation of smartphones, social networking applications, online gaming etc., mobile network operators (MNOs) are faced with an exponential growth in packet switched data requirements on their networks. Haven invested in legacy systems (such as HSPA, WCDMA, WiMAX, Cdma2000, LTE, etc.) that have hitherto withstood the current and imminent data usage demand, future and projected usage surpass the capabilities of the evolution of these individual technologies. Hence, a more critical, cost-effective and flexible approach to provide ubiquitous coverage for the user using available spectrum is of high demand. Heterogeneous Networks make use of these legacy systems by allowing users to connect to the best network available and most importantly seamlessly handover active sessions amidst them. This paper presents a survey of interworking architectures between IMT 2000 candidate networks that employ the use of IEFT protocols such as MIP, mSCTP, HIP, MOBIKE, IKEV2 and SIP etc. to bring about this much needed capacity

    Mobile Networking

    Get PDF
    We point out the different performance problems that need to be addressed when considering mobility in IP networks. We also define the reference architecture and present a framework to classify the different solutions for mobility management in IP networks. The performance of the major candidate micro-mobility solutions is evaluated for both real-time (UDP) and data (TCP) traffic through simulation and by means of an analytical model. Using these models we compare the performance of different mobility management schemes for different data and real-time services and the network resources that are needed for it. We point out the problems of TCP in wireless environments and review some proposed enhancements to TCP that aim at improving TCP performance. We make a detailed study of how some of micro-mobility protocols namely Cellular IP, Hawaii and Hierarchical Mobile IP affect the behavior of TCP and their interaction with the MAC layer. We investigate the impact of handoffs on TCP by means of simulation traces that show the evolution of segments and acknowledgments during handoffs.Publicad

    A Survey on Handover Management in Mobility Architectures

    Full text link
    This work presents a comprehensive and structured taxonomy of available techniques for managing the handover process in mobility architectures. Representative works from the existing literature have been divided into appropriate categories, based on their ability to support horizontal handovers, vertical handovers and multihoming. We describe approaches designed to work on the current Internet (i.e. IPv4-based networks), as well as those that have been devised for the "future" Internet (e.g. IPv6-based networks and extensions). Quantitative measures and qualitative indicators are also presented and used to evaluate and compare the examined approaches. This critical review provides some valuable guidelines and suggestions for designing and developing mobility architectures, including some practical expedients (e.g. those required in the current Internet environment), aimed to cope with the presence of NAT/firewalls and to provide support to legacy systems and several communication protocols working at the application layer
    • …
    corecore