The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Handoff management is a key element in mobile networks to sustain an ongoing session of a user. In this paper, we propose a handoff management technique to reduce handoff delay and call dropping. This handoff management technique incorporates a prediction component which will predict a UE's next cell and best handoff time. The prediction component is realized using a predictive model which uses earlier...
Data captured from a live cellular network with the real users during their common daily routine help to understand how the users move within the network. Unlike the simulations with limited potential or expensive experimental studies, the research in user-mobility or spatio-temporal user behavior can be conducted on publicly available datasets such as the Reality Mining Dataset. These data have been...
Understanding the dynamics of the individuals' daily mobility patterns is very important in a wide range of fields. However, lacking of tools to monitor the time-resolved location of individuals makes this research consume both tremendous time and money in the past. Nowadays, the rapidly developing ability to collect space-time activity (STA) data through new information technologies such as cellular...
In the idea to create a realistic model of mobility and traffic for the networks of 3rd and 4th generation, we have studied many techniques of modeling and planning. Our choice was for the real network traces exploitation techniques, mainly because compared to other techniques this technique is very adapted to the real modeling. Although this technique is most convenient, it has many disadvantages...
In the idea to create a realistic model of mobility and traffic for the networks of 3rd and 4th generation, we have studied many techniques of modeling and planning. Our choice was for the real network traces exploitation techniques, mainly because compared to other techniques this technique is very adapted to the real modeling. Although this technique is most convenient, it has many disadvantages...
In this approach we trace the number of subscribers of an individual mobile center in a month to retrieve the social behavior in a province. It can be useful to show the relation between population behavior and mobile subscribers' activity. It is focused on a province's mobile station information in official working days, weekends and holidays.
Next generation heterogeneous networks require an effective handover scheme, optimized specially to support network mobility. The paper proposes an architecture to support seamless mobility of mobile networks across heterogeneous networks. We consider the vehicular scenario where a vehicle is provided with mobility through different Internet service providers (ISPs) and propose to use multiple mobile...
Data dissemination and discovery is critical for ad-hoc wireless sensor networks. Most existing research depends on location information that is not always obtained easily, efficiently and accurately. We propose the concept of Contour-cast, a location-free data dissemination and discovery approach for large-scale wireless sensor networks. One important property of Contour-cast is that it does not...
The article designs location tracking system used in underground mine based on WiFi (Wireless Fidelity) technology. The WiFi wireless network communication technology can solve problems of difficult communication between miners and mine managers, accurately location of mining personnel, complex terrain, too much monitoring points and requiring larger network coverage; in particular, the place which...
To support network mobility in wireless network, NEMO BSP is proposed by IETF. Mobility support paradigm is going to move from the MN to Network. PMIPv6 is the latest protocol based on local mobility management and network-based mobility. The mobile node can freely move between PMIPv6 network and mobile network. The previous NEMO protocols based on PMIPv6 cannot support this kind of mobility due to...
Wireless sensor networks experience a number of problems not found in wired networks, such as limited power resources, location identification and message routing in a wireless medium. Analysis of small world networks have shown that it is possible to transmit information from one node to another node some random distance away within a small number of hops (i.e. small world networks have a small diameter)...
Recent advances in ultra lightweight communications and sensor devices have ushered in a new range of applications to incorporate location awareness into mission critical situations such as remote health monitoring of chronically ill patients or emergency response personnel. However, in an open environment where these devices could potentially operate in the future, reliable and accurate positioning...
One of the ad-hoc networks challenges is the connectivity problem coming from changeable and dynamic topology of networks nodes. According to most of researches done on this problem, one of the solutions is adding static nodes in some points in network environment; and many attempts have been made to find these points by using different ways. However, in most of these studies no attention has been...
This paper presents a new approach based on the scatter search (SS) algorithm applied to the location management problem using the location area (LA) scheme. The LA scheme is used to achieve the best configuration of the network partitioning, into groups of cells (location areas), that minimizes the costs involved. In this work we execute five distinct experiments with the aim of setting the best...
Proxy mobile IPV6 protocol is a network-based mobility management protocol. Mobile node does not need to participate in any PMIPv6 messages. A certificated-based authentication mechanism based on the public key infrastructure is proposed in this article. It can be used to protect and authenticate two proxy binding messages of PMIPv6. In addition, we use SVO formal logic to analysis the security of...
Mobile users are often involved in team activities and exhibit collaborative mobility in realistic ad hoc network application scenarios. Due to diverse group mobility patterns, the network may remain partitioned for extended durations. This paper describes an approach to reduce the communication disruptions by deploying forwarding nodes. The forwarding nodes explore the field periodically in orderto...
Few works are concerned with PPStream (PPS) application system, though it is so popularly used like PPLive (PPL) and it does have very different buffer structure which has been discussed in our previous work. Since the mobile related devices develop quickly, more and more applications are required to keep good quality in mobile environment. In this paper, we simulate a mobile peer in PPS system in...
In this paper, we propose a scheme for improved performance of resource reservation and call admission control for cellular networks called Predictive User Mobility Behavior (PUMB) scheme. This algorithm is proposed in which bandwidth is allocated more efficiently to neighboring cells by key mobility parameters in order to provide Quality of Service (QoS) guarantees for transferring traffic. The cell...
One of the main challenges in all-IP networks is the development of suitable mobility solution. Mobile IP (MIP) presents the standard protocol used to support IP mobility. However, MIP is inadequate for real-time applications and inter-domain mobility (when a mobile node performs handover between two autonomous systems (AS)). In this paper, we propose an efficient approach to manage inter-domain handover...
With the rapid development of wireless technologies and increasing communication need of people in ubiquitous environment, some handoff schemes and improvements were proposed by IETF in order to support mobility effectively. In addition, mobile Stream Control Transmission Protocol (mSCTP) proposed by IETF is a new transport protocol supporting mobility and with a built-in feature called Multi-homing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.