The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The goal of federated authentication is to identify a user or entity in different security domains without the need for redundant user management and a multitude of credentials. Federated authentication is becoming more important with the increasing popularity of service-oriented architectures, since interacting systems are generally not located within a single security domain. For this reason, companies...
As the Internet continues to shape and reshape our lives, there is a parallel phenomenon taking place in wireless communication which is equally influential. Mobile communication has proved to be a major paradigm in the history of human communication. As both the Internet and mobile telephony continue their dramatic advances, there is a lot of requirement that should be available such as valid IP...
Recently, small base stations such as femtocell and picocell are drawing attention as new components of wireless access networks. These small base stations are used not only to expand the wireless area within a large building, but also to increase bandwidth capacity and reduce the load on the core network. If multiple femtocells are deployed in an office building to expand the communication area,...
Wireless networks will certainly run applications with strict QoS requirements and so, micro-mobility protocols such as fast hierarchical mobile IPv6 (FHMIP) are useful tools to accomplish this new feature. The FHMIP is an effective scheme to reduce Mobile IPv6 handover disruption, however it does not support application's QoS requirements. Therefore, in order to provide QoS guarantees for real-time...
Open, decentralized networks such as Internet are increasingly heterogeneous and dynamic. Applications running over such networks must be able to cope with resource restrictions and operate under the most diverse conditions. Providing multiple services over the same network has enormous effect on scalability, performances and cost of this network. Selecting a proper concept of network for mass market...
Recent efforts are made to construct a globally accessible group communication service by a simultaneous use of network and application layer multicast. Such hybrid approaches provide native multicast to group members wherever available, but relocate data distribution and duplication from the network to applications or gateways if needed. Such services require an abstract programming interface to...
Starting with an efficient mobility management scheme for heterogeneous wireless networks, this paper proposes a solution for AAA handling using a common database for storing user information. Regardless of the access technology selected, user@realm identities are used for authentication, authorization, and accounting. In particular, a new function is introduced in which port-based network access...
The pervasive computing field is almost always addressed from application, middleware, sensing or human computer interaction perspective. Thus, solutions are usually designed at application level or involve developing new hardware. Although current layered network architectures (mainly TCP/IP stack) have enabled internetworking of lots of different devices and services, they are neither well-suited...
Together with the IMO's future navigation system implementation strategy, the e-navigation, wireless access technologies are proliferating on the maritime scenario, covering last mile communications. In the near future, we foresee that communication technologies will coexist and will be available in overlapping areas through the maritime last mile. Therefore, in order to enhace ship-shore communications,...
A common technique for improving throughput in low bandwidth networks is the use of header compression. While removing static protocol entries and synchronizing state information between a sender and receiver can reduce per-packet overhead, this is defeated by fixed sized TDMA MAC frames. Another optimisation technique is the use of packet aggregation, where multiple data packets are concatenated...
Efficiency and fairness are main objectives in any system design and many choices in life are made based on their tradeoffs. In this paper we introduce a framework for the evaluation of efficiency-fairness tradeoffs that would provide a sound basis for network providers and social planners to provide or plan for an equitable access to the Internet to a diversity of users with different needs and financial...
Today users are getting used to have many heterogeneous devices available in their surroundings. This opens great opportunities to build pervasive communication environments. Pervasive communications are usually user-centric in nature, as they should target sessions to users rather than their specific devices. Mobility is a key issue in such context: users often move and that implies different devices...
Next generation mobile radio networks of IMT Advanced systems family will offer ubiquitous broadband high area coverage, at up to 1 GBit/s in cities and 100 MBit/s in rural areas and QoS support in terms of throughput and low delay. Candidate technologies like 3GPP-LTE, WiMAX, as well as the WINNER system design are based on OFDMA transmission for flexible radio resource allocation, scalable and adaptable...
Multihoming protocols, such as SCTP, HIP or SHIM6 provide a framework for multiple addresses management.In wireless environments, the set of the available address of multihomed nodes frequently changes due to handovers. Asa consequence, multihoming protocols are supposed to detect such changes and if necessary rehome their ongoing sessions.Nonetheless, current multihoming protocols do not provide...
The paper concerns problems for service orchestration in IP-based multimedia telecommunications. For operators that want to leverage the value of legacy systems and services, Service Capability Interaction Manager (SCIM) provides means of wrapping those systems and services so that they can be orchestrated alongside new services. SCIM functionality is not specified in details and dasialivepsila SCIM...
Obtaining VoIP security through the IPsec protocol increases packet size, thus substantially increasing the network overhead. One way of mitigating such a problem consists of multiplexing calls so that the transmission of redundant data is reduced. The performance of such technique is directly linked to the number of concurrent calls; however, in more constrained scenarios, the existence of several...
Accounting is a key task in commercial networks. With the increasing number of IP-based services and mobility support, accounting needs to evolve towards an integrated, service-oriented accounting approach in a mobile environment. Therefore, this dissertation digest paper presents the Service-oriented Tailored Accounting Configuration (STACO) architecture that enables a service-oriented accounting...
This paper proposes an enhanced multihoming support scheme based on combining ideas from both the Shim and Proxy Mobile IPv6 (PMIPv6) protocols. The proposed scheme not only resolves the multihoming support problems with the current PMIPv6, but also provides mobility support to the Shim protocol. In the proposed scheme, the Shim protocol is locally used between a multihomed Mobile Node (MN) and the...
The paper is focused on developing a client-server application that can be used in the secure communication of video information over the IP. The main interest in developing the application is as a multidisciplinary project that can help students to develop their practical skills. The interest for such an approach in learning appears in the context of the Bologna process where multidisciplinarity...
Testing network-based security tools such as intrusion detection and prevention systems (IDS/IPS) differs from testing ordinary network tools (e.g., routers and switches). Basically, in addition to the parameters (such as bandwidth utilization, routing information and packets timing) that are important for network tools, security tools are more sensitive to issues like traffic composition, contents,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.