Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In order to provide ubiquitous communication, seamless connectivity is now required in all environments including highly mobile networks. By using vertical handover techniques, it is possible to provide uninterrupted communication as connections are dynamically switched between wireless networks as users move around. However, in a highly mobile environment, traditional reactive approaches to handover...
Due to the increased usage of smart phones, mobile users now have access to a diverse set of services. These mobile services have increased the demand for faster wireless networks. In this paper, we examines mobility support functions in soft handoff for IP-based mobile network, and distinguishes the control areas in the cell's range areas for mobile network's efficient session control (SC). Based...
In the next generation mobile network, the concept of virtual network slice (VNS) has been proposed to facilitate the building of a dedicated and customized logical network with isolated resources, which can be defined as a subset of network resources allocated to a virtual operator or service provider. Each VNS is associated with a virtual network function forwarding graph (VNF-FG) to accomplish...
The heterogeneity of the wireless network environment offers the possibility to the mobile user to select between several available radio access network technologies. However, selecting the network that enables the best connectivity is not trivial given that in general the network characteristics vary widely, not only in time, but also depending on the user location within each network. In this context,...
Seamless connectivity plays a key role in realizing QoS-based delivery in mobile networks. However, current handover mechanisms hinder the ability to meet this target, due to the high ratio of handover failures, packet loss and service interruption. These challenges are further magnified in Heterogeneous Cellular Networks (HCN) such as Advanced Long Term Evolution (LTE-Advanced) and LTE in unlicensed...
The existing LTE network architecture dose not scale well to increasing demands due to its highly centralized and hierarchical composition. In this paper we discuss the major modifications required in the current LTE network to realize a decentralized LTE architecture. Next, we develop two IP address mobility support schemes for this architecture. The proposed solutions can handle traffic redirecting...
An Ad hoc network is frequently changing their network structures and no need of any fixed infrastructure based network. Mobility model is one of the important key problems in Mobile Ad hoc Networks (MANETs) due to changing node position frequently in simulation area. In Group mobility models each group has a leader, rest of the group nodes follow the leader node. Angle and Speed are two essential...
Internet of Things is an evolution from computer networks to a network of interconnected objects such as books, cars, sensors, etc… In recent years, interest in the applications of Wireless Body Area Networks (BANs), have grown significantly and this opens up an important number of challenges such as mobility management. Locator/Id Split Protocol (LISP) deals with the traditional IP problems like...
NEtwork MObility (NEMO) is a host-based mobility management protocol, which efficiently manages Internet connectivity of multiple nodes on the move. Proxy Mobile IPv6 (PMIPv6), a network-based mobility management protocol, tries to offload low-power mobile devices though managing mobility signaling by the infrastructure devices. To support network mobility in PMIPv6-domain, several schemes have been...
In this paper, in order for the signaling overhead to be distributed evenly on the boundary of the regional network, each MN's dynamic mobility and traffic load is adjusted according to the PMIPv6 (Proxy Mobile IPv6) networks in the proposed dynamic regional mobility management scheme (dMMS). Each user in a distributed network system, that offers the least amount of signaling traffic, is tailored...
Mobile messaging has become a trend in our daily lives. The current schema for messaging is to route all the messages between mobile users through a centralized server. This scheme, though reliable, creates very heavy load on the server. It is possible for users to communicate through peer-to-peer (P2P) connection, especially over urban networks characterized by heavy user traffic and dense network...
The growth of telecommunication devices has driven the development of technology of Mobile IPv6 (MIPv6), which supports the concept of seamless communication. One of MIPv6 extention is Hierarchical Mobile IPv6 (HMIPv6) were developed to reduce the delay at the time of vertical handover process by utilizing Mobility Anchor Point (MAP) whose enhancement to shorten the process of configuring the IP address...
This paper presents a detailed comparative study of centralized mobility management and distributed mobility management (DMM). This paper proposed a modified mechanism of pmipv6-based partially distributed mobility management operation procedure based on DMM scenario in Internet Engineering Task Force (IETF). Binding update list (BUL) and binding cache entry (BCE) were created by Mobility Anchor and...
Device-to-device (D2D) communication has been regarded as a major technology to improve spectrum utilization and to offload the traffic from cellular base station. D2D peer discovery, as a critical procedure, attracts a lot of attentions. Furthermore, combination with the mobile social network (MSN) is an efficient solution to improve the establishment of D2D pairs. However, limited work has been...
Seamless host mobility is vital to future network mobility, and has been an active research area for a long time. Much research focuses on the performance of the data plane. In this paper, we present comprehensive analyses on the control (signalling) plane in the IETF Mobile IPv6, and compare it with the IRTF Identifier-Locator Network Protocol (ILNP). The control plane behaviour is important in order...
The exponential increase of mobile Internet traffic has been forcing the current mobile network architectures to evolve towards flatten network architectures with IP backhaul support. Hence, current centralized mobility management approaches need to be adapted to cope with flat network architectures. The distributed mobility management is a promising direction to cope with the flatten network architectures...
Due to explosive demands of multimedia services from mobile users, the growing network traffic load becomes a severe challenge for mobile network operators (MNOs). To address this problem, content caching is regarded as an effective emerging technique to reduce the duplicated transmissions of the content downloads demanded by mobile users, while heterogeneous networks (HetNets) are regarded as an...
Mobile Ad hoc Networks (MANETs) represent complex distributed systems that do not rely on any infrastructure or centralized administration. These networks consist of wireless mobile devices which communicate with each other over the wireless channel. Because each mobile node (MN) has a limited transmission range, multi-hop communication is necessary to deliver data across the entire network. Such...
In this paper, we have proposed an efficient cluster based fault detection and recovery in MWSN. If the Cluster head (CH) turns to be a selfish or malicious node, then the system will fail to detect the fault and the subsequent recovery process. Hence identifying selfish or misbehaving CH is essential. At the same time, identifying faulty data from sensors is another important issue in data gathering...
The software integration with new network architectures via SDN (Software Defined Network) axis appears to be a major evolution of networks. While this paradigm was primarily developed for easy network setup, its ability to integrate services has also to be considered. Thus, the mobility service for which solutions have been proposed in conventional architectures by defining standardized protocols...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.