The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present, many studies focus on the efficiency of handoff among different networks, while research on how to maintain the safety during registration process of handoff is not enough. Unfortunately, mobile node is vulnerable to various security threats and attacks when handover for being lack of protection. A security scheme based on the IPSec protocol which was combined with fast handoff signaling...
In the IPv4 wireless network, the quality of the communications between the wearable computers or the mobile nodes is slow and the wearable computers cannot achieve in the sub-seamless switching between LANs. According to the three function entities of mobile IPv6 the protocol stack software is divided into three major modules, and proposed design program and the division of sub-module based on the...
The signals in the e-health support and curing system should be transferred in high quality, but in the traditional wireless network, the quality and the speed of the communications between the mobile e-health computers is slow. According to the three function entities of mobile IPv6 the protocol stack software is divided into several major modules, and proposed design and the division of sub-module...
In the IPv4 wireless network, the quality of the communications between the wearable computers or the mobile nodes is slow and the wearable computers cannot achieve in the sub-seamless switching between LANs. According to the three function entities of mobile IPv6 the protocol stack software is divided into three major modules, and proposed design program and the division of sub-module based on the...
Traditional wearable systems cannot communicate the location with the condition of people instantly, dynamically and accurately and it is also in low-speed, high-latency and unreliable; the system configuration information with location needs to be changed frequently. By emulating a distributed arithmetic, it analyzes the load of the communication network, the average time that the mobile agent has...
Mobile IP encapsulation mechanism is used for mobile nodes and communication nodes to communicate. Communication of Mobile nodes and communication nodes have two possible ways. The first method is a two-way tunnel mode. Another way is to use route optimization. Two-way tunnel mode is not require the another communication end to support mobile IP. When the mobile node not to register to the other communicate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.