The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Typical transmission control protocol (TCP) based web agents in mobile wireless environment have several deficiencies, such as performance degradation, head-of-line blocking, and unsupported mobility. The Stream Control Transmission Protocol (SCTP) is a new transport protocol, which provides multi-streaming and multi-homing features. SCTP extensions for dynamic address reconfiguration will support...
Wireless networks such as WiFi (802.11) enable new kinds of applications when users are in a mobility situation, including audio/video streaming. However, the total available bandwidth may vary greatly because of entwork usage and physical interferences in the 2.4GHz band. This may lead to a point where the bandwidth is overused causing a quality of service degradation. Based on the programmable node...
With the rapid growth of the Internet and the ever-increasing security problems associated with its popularity, the need for protection against unwanted intruders has become imperative. Antivirus software, intrusion detection systems, spyware detectors, and mal-ware detectors are some of the protection mechanisms available to users today. The diversity of these manifold systems suggests the need for...
The concept of Ambient Networks (AN) aims at enabling the co-operation between heterogeneous networks on demand, in order to provide ubiquitous connectivity to end-users. This could be achieved by seamlessly incorporating context-awareness which plays a vital role in supporting autonomic decision making in ANs, while giving rise to new types of applications and services. Modeling and disseminating...
Recent advances in materials, sensing, power harvesting, context-awareness and miniaturisation have opened-up the possibility of constructing materials that directly include considerable computing power. We present an architecture for the hardware/software co-design of such “augmented” materials that allows designers to address the links between the physical and informational properties of artefacts...
Next-generation wireless networks will enable the usage of different network technologies fully transparent to the user. Applications will be able to dynamically adapt to the conditions and technical constraints of the network. This vision requires a dynamic allocation of scarce network resources to different users. This paper presents simulation results from a model of admission control and dynamic...
In this paper, we suggest that the next generation wireless network is the integrated cellular and ad hoc network. We propose a call admission control scheme to support burst handoff call using the guard channel and relay function in next generation wireless network. We evaluate our scheme in terms of new call and handoff call blocking probability and channel utilization via simulation study. Simulation...
A mobile agent’s itinerary describes the set of hosts visited during the agent’s travel, and must be protected against malicious entities trying to access and/or modify it for their own benefit. Protection mechanisms must be put in place, but we should avoid imposing unnecessary limitations on the agent’s ability to choose its itinerary in an as flexible as possible way. In this article, we extend...
A crucial prerequisite for building context-aware networks is an integrated infrastructure for sensing, processing, managing and disseminating network context information to network entities and user-facing applications. This requirement is especially important in ambient networks, a class of networks that exploit the inherent heterogeneity seen in today’s wireless networks in order to share diverse...
This article describes the TILAB view about the fixed mobile convergence. Starting from the different perspectives of all the possible actors in the Telecommunication arena, we introduce all the possible level of convergence and present the TILAB experience about the Service Creation Layer. This is considered a key point to optimize the exploitation of all the opportunities coming from the new categories...
IETF Mobile IPv6 allows nodes to perform an IP handover without breaking their active sessions. In Mobile IPv6, after re-associating a new attachment of point, it is generally the responsibility of a mobile node to detect that it has moved to a new IP subnet. Determining whether or not a node has moved to a new IP subnet is not always a simple issue. In this paper, we analyze the movement detection...
In this paper, we present a dynamic bandwidth allocation strategy based on renegotiation. This strategy consists in exploring the unused resources in the network, allocating them to flows whose required bandwidth is greater than the one that was attributed to them at call admission time. These applications, which are non delay sensitive, can be admitted by the CAC (Call Admission Control) with the...
Mobile agent systems provide new perspectives for distributed e-commerce applications. These applications may present specific restrictions, making mobile agent systems a feasible solution. Even so, mobile agents present some security related problems. An important one is resource access control. The ability for mobile agents to provide a simple, scalable, flexible, and secure access control system...
Service adaptation is fundamental to context-aware service provisioning and to the realization of the Virtual Home Environment concept, which is now an integral part of the 3G service framework. Although the technological means for developing advanced, adaptable services are maturing, managing adaptation is still an ambitious task. In this paper, we tackle the issues of automating and managing adaptable...
Making network-centric context information available to ho-sts, network nodes and users allows them to make more meaningful decisions to accomplishing a self-organising behaviour. Instead of implicitly offering services as today we suggest a shift towards explicitly expressing context information that can be used with user context information to allow applications to operate more efficiently . Since...
Widget Integration Framework (WIF) is a framework that covers diverse widgets and their interactions with higher layers above. The framework offers several advantages of supporting a programming abstraction over widgets, supporting high reliability, run-time widget binding to the middleware and augmenting a service discoverer with available widget state information. This paper explains the processes...
Active networks have been a research topic for years and many contributions have helped to refine the active node architecture, the active networks protocols and the needed functionalities. One of them is the service deployment, which is a key functionality for the success of active networks. Many research papers studied this item but how the active node information is known and used for the node...
Web services are emerging as the standard paradigm for program-to-program interactions on Internet. They are gaining more and more momentum and are expected to play a key role in Next Generation Networks. For these reasons, their management is becoming critical. Fault management is one of the most challenging areas of network and service management. It includes fault detection, isolation and repair...
Mobile agent systems present a good solution to implement applications that, for a long time, have used client/server architecture. However, this technology is confronted with security threats from agents and hosts. This paper presents a protocol which protects mobile agents from malicious hosts. This protocol is sufficiently robust so that it is durable and fault tolerant.
In the context of ubiquitous and pervasive computing, publish/subscribe middleware is gaining momentum due to its loosely coupled communication scheme. In this paper we present Q, a publish/subscribe service conceived to operate over mobile ad hoc networks. With Q, the overlay network that routes events from publishers to subscribers dynamically adapts to topology changes by means of cross-layer interaction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.