The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Understanding the propagation dynamics of information/an epidemic on complex networks is very important for discovering and controlling a terrorist attack, and even for predicting a disease outbreak. As an effective method, with analyzing the structure of a propagation network, a large number of previous studies have analyzed the propagation dynamics. Most of these studies are based on a special network...
This paper presents the discovery architecture to look for available computing/intelligence resources on Internet of Things. Although mobile users roam around heterogeneous IoT fields, the architecture supports seamless service provisioning of ubiquitous resources from deployed smart devices' federations in different ownership, policy, communication technologies.
Mobile Money is growing in the developed world while cars are becoming much smarter. Combine the two — and you get cars that ‘own’ a wallet. We propose not a user-centric, but a car-centric service that enables cars to have Pre-Pay subscription accounts for car-related purchases and for linking to financial services. The solution uses advanced car communications capability and securely stored car...
This paper analyzes the impact of the fast-growing BYOD (Bring Your Own Device) trend in the corporate mobile market, which blurs lines between business and personal usage. To enable selective funding and resource optimization for BYOD, we propose that the enterprise determines its own service delivery policy, using an enterprise Business Context (eBC) Policy tool. The enterprise is best placed to...
In this paper we propose a method of translating enterprise business objectives into service delivery policy rules in Mobile Broadband networks. This enables enterprises to control their own session policies for BYOD (Bring Your Own Device) users and apply selective funding with prioritized service delivery. The proposed eBC (enterprise Business Context) Policy process uses internal corporate data...
Empowering the enterprise to control their own session policy for mobile broadband is not only necessary for consumerization, but is beneficial in controlling budgets and protecting corporate network resources. We propose a practical method of establishing dynamically enterprise-Business-Context (eBC) status to determine whether or not the enterprise should fund employees'' service requests and what...
This research proposes a new architecture for the inter-connectivity between UEs running on the LTE infrastructure participating in an Application Layer Multicast-based distributed conference. The main contribution is that the proposal replaces the standard centralized architecture of the IMS-based conference with a more robust solution utilizing intelligence and computational capacity of LTE's eNodeBs...
This paper proposes a practical model for non-Telecom staff to determine enterprise-Business-Context (eBC) status for employees' service requests. This is used to grant selective funding for business usage, which is distinguished from unfunded personal usage. The eBC Model interprets enterprise objectives via layered prioritization. It computes the eBC status from dynamic Attributes, grouped into...
The numbers of MVNOs (Mobile Virtual Network Operator) are growing globally, but so do their operational and business issues. This paper identifies these issues and looks for remedies via the new 4G architecture and interfaces. The paper examines the ‘Full’ MVNO model as a ‘Home’ network in a pseudo roaming scenario (National Roaming), allowing MVNO to connect to multiple MNOs through the discovery...
The MVNO (Mobile Virtual Network Operator) business in Europe is maturing, with growing pressure on margins. To cope, MVNOs seek independence and flexibility which they can gain by advanced 4G access agnostic technology. This evolution is supported by three overlapping MVNO models: 4G “Full MVNO”, Multi-MNO and “Always Best Connected”, which are all enhanced by advanced Policy functions. The paper...
The popularity of mobile Internet is driving the Mobile world towards untrusted services while increasing Mobile Data volumes encourage adoption of untrusted access network for delivery of MNO services. This paper examines the emerging methods of utilizing untrusted access and facilitating untrusted third party services on either trusted or non-trusted access networks via existing and extended EPS...
Ubiquitous digital devices with rich media processing and networking capabilities open an avenue for enriching user experiences, especially in video voice over IP communication sessions because a communication session can be transferred partially to multiple devices that are in the vicinity of caller and (or) callee. Then, the transferred partial session can be retrieved back to the original place...
SCTP faces three performance problems in hard handover scenarios: high network handover delay, high transport handover delay and throughput under-utilization. Existing solutions assume the mobile extension of SCTP (m-SCTP) as a unique way to handle handovers and rely on terminal mechanisms. Nevertheless, they are not efficient as they lack the necessary information to perform on-time and fine SCTP...
Mobile ad hoc network (MANET) can be the best option in developing seamless communication environment in various application scenarios where there is no any pre-defined infrastructure. A mobility model which represents movement behavior of considered application scenarios should incorporate important features that may change characteristics of mobile nodes. In most of the cases, mobile nodes used...
Due to their centralised design, current mobile network architectures as well as IMS layer will not be able to handle the increasing number of mobile users consuming high bitrate services. An Ultra Flat Architecture (UFA), based on SIP and designed with the primary goal of being scalable, has been introduced in a previous paper. In this paper, the limitations of current 3GPP architectures are discussed...
Session mobility is an advanced feature that provides new capabilities for the clients as well as more benefits for the service operators. In this paper we propose the deployment of a mobility server in IMS-IP multimedia subsystem to provide session mobility between the devices connected to different access technologies. We have modified SIP based session mobility approaches and we have adopted them...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.