The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a secure scheme, named the Digital-Signature-based Authentication Method (DiSAM for short), in which two authentication methods, called Homogeneous Network Authentication (HoNA for short) and Untrusted Network Authentication (UNA for short), are proposed to enhance the security of the LTE-A on F-PMIPv6 handover. In the HoNA, when UE enters a network, it obtains its representative...
Network layers such as IP/MPLS and OTN/ASON each has its own failure protection scheme. We propose a coordinated protection plan, so called protection synergy, to protect all possible dual failures by utilizing existing single failure protection schemes. There are two aspects essential for effective dual failure protection: One is to guarantee the connectivity under any dual fiber failures, the other...
Proxy Mobile IPv6 (PMIPv6), as a network-based mobility management protocol, was released in 2008 by the IETF in RFC 5213 to support IP mobility. But in its handover procedure, network-link disconnection cannot absolutely be avoided. The IETF later proposed Fast Proxy Mobile IPv6 (FPMIPv6 for short) protocol, which was designed primarily to improve the switching process, particularly for reducing...
Flash memory storage device has received tremendous attention due to its superior performances. The command scheduling algorithm between Flash Translation Layer (FTL) and Flash Controller (FC) is a critical part for the system performance. However, conventional first-in-first-out command scheduling scheme may not fully utilize the full bandwidth due to the different timing budgets for NAND flash operations...
This paper proposes the mobile resource discovery algorithm called MRDA, by which mobile phone can communicate based on MANET(Mobile Ad-hoc Network). MRDA is the peer-to-peer structure. It utilizes distributed hash tables (DHTs) to efficiently cache the resource information. Meanwhile, we design the simple datagram structure which can effectively reduce the mobile phone's memory occupancy and decrease...
This paper proposes the mobile resource discovery algorithm called MRDA, which focus on the communication of Mobile Ad-hoc Network (MANET) nodes in a peer-to-peer manner. It utilizes distributed hash tables (DHTs) to efficiently cache the resource information. Meanwhile, we design the simple datagram structure and use dynamic transmission interval of advertising datagram, which can effectively reduce...
This paper presents the results of an investigation into spatial distribution of hyperlinks to the Beijing tourist attractions' official Websites. The purpose of this study is to assess whether the hyperlink in the Web could be used to do tourism research. Through this study, the simple inlink count to a tourist attraction's official Website was found to highly correlate with the number of the tourist...
The 3rd generation network rely on a key protocol-the GPRS tunneling protocol (GTP). However, GTP itself is not designed to be secure. So it is necessary to inspect the legal GTP channels and protect the backbone. Because a great deal of GTP-U packets transferring in the channels and the 3G firewall is required to check ten thousand GTP channels which needs mass bytes, so a fast and saving space algorithm...
RFID is an enabling technology which brings visibility, traceability and performance efficiency to supply chains. To apply RFID technology in a public domain, information sharing infrastructure is needed to support public services as code resolution, information query, tracing & tracking, and security authentication. A common data model is the basis for information sharing, with which the shared...
Peer discovery is a basic service of P2P applications. It enables peers in a P2P application to locate one another so they can interact. The connectivity of a P2P system depends on the efficiency of the peer discovery mechanism adopted. There are three categories of peer discovery mechanisms. Most P2P applications implement one of them. They will work perfectly in a transparent net work, where peers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.