The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The IEEE 802.11ai is an upcoming fast initial link setup (FILS) amendment that could enable a STA to achieve secure link setup in less than 100 ms. A successful link setup process will then allow the STA to send IP traffic with a valid IP address through the AP. In this paper, we first present a performance analysis on how well the legacy 802.11 can support FILS. We then demonstrate that the rate...
The growing complexity of customizable embedded multi-processor architectures for digital media processing will soon require highly scalable network-on-chip based communication infrastructures. In this paper, we propose xpipes, a scalable and high-performance NoC architecture for multi-processor SoCs, consisting of soft macros that can be turned into instance-specific network components at instantiation...
3GPP defines the Policy and Charging Control (PCC) architecture to enforce network resources dynamically and to manage charging functions. In this paper, we present the design and implementation of Group Accounting System (GAS). GAS is based on the PCC architecture and is integrated with the IP Multimedia Subsystem (IMS) of Chunghwa Telecom. GAS allows a group of people to share one or more accounts...
The notion of a decentralized lookup service is very useful for many distributed applications. Information lookup systems using Distributed Hash Table (DHT) have been actively studied. In the Chord DHT, nodes are configured as a ring structure and lookup requests are for-warded along with the ring. In order to get information efficiently, response time should be short. However, since Chord overlay...
This paper proposes a new solution approach for the simultaneous mobility issues in seamless handover. An alternative scheme is designed to minimize handover latency between two different networks with location management support while simultaneous handover occurs. One of the most emerging techniques in recent research projects for mobility management is mobile Stream Transmission Control Protocol...
Increasing demand for ubiquitous high speed data access has resulted in widespread deployment of heterogeneous wireless networking domains. Integration of heterogeneous networks presents some considerable challenges which include the demand for seamless handoff, continuity of data traffic & multimedia sessions and central authentication system, billing & security. In this paper the...
In this paper we discuss the architecture of MStack, a data-centric communications stack specifically designed for mobile intermittent networking environments. MStack contains native support for delay tolerant connections, it is resilient to disconnections, and solves other problems associated with mobile devices. The architecture and its main protocols are discussed, together with some examples of...
Based on the analysis of 802.11 link-layer handoff and representative cross-layer mechanisms supporting mobility, this paper proposes a Locator/Identifier Split Network Based Cross-Layer Roaming Mechanism (LISN-CLRM) with the Layer 2 and Layer 3 handoff coupling organically. Theoretical analysis shows that the total delay of this mechanism is much smaller than MIPv6, and is 77.5 ms smaller than SMOS[1]...
There have been a number of network monitoring projects launched to cope with cyber threats in the Internet. In those projects, several types of sensors such as black hole sensor, low and high interaction honey pot, and web crawlers are deployed to analyze characteristics of attackers from various perspectives. However, there are some problems of deployment and operation of network monitoring systems,...
Traffic generation represents one of the main challenge in modeling and simulating the application and network load. In this work, we present a tool, called OpenAirInterface Traffic Generator (OTG), for the generation of realistic application traffic that can be used for testing and evaluating the performance of emerging networking architectures. In addition to the traffic of conventional applications,...
Contemporary mobile devices such as smartphones and tablets are increasingly equipped with multiple network interfaces that enable automatic vertical handover between heterogeneous wireless networks including WiFi and cellular 3G and 4G networks. However, the employed vertical handover schemes are mostly quite simple, and incur non-negligible service disruptions to ongoing sessions, e.g., video streaming...
Path delays in IP networks are important metrics, required by network operators for assessment, planning, and fault diagnosis. Monitoring delays of all source-destination pairs in a large network is however challenging and wasteful of resources. The present paper develops a spatio-temporal prediction approach to track and predict network-wide path delays using measurements on only a few paths. The...
The internet IP multicast technology has been extended to the field of wireless mobile. High performance routing algorithm is important for multimedia multicast in mobile wireless internet environment. This paper proposes a high performance multicast routing algorithm in mobile IP environment based on the super node set, which can reduce the cost of multicast generation tree, and greatly reduce the...
Processor design is a widely studied topic in computer system architecture design. How to improve computer performance is an important part of the computer overall design. In general processors, multiplication components play a decisive role in processor's performance. An important and frequent operation in decimal computations is multiplication. However, due to the inherent inefficiency of decimal...
In this paper, we propose a vertical handover decision system for IP mobility communication and describe its implementation with existing IP mobility architecture. Our proposed handover decision tries to reflect that a specified communication quality such as VoIP takes a priority. In other words, the purpose of our proposal is to prefer the specified communication quality in handover across heterogeneous...
Now-a-days with the increasing number of mesh clients it has become a challenging task to provide uninterrupted internet connectivity for the clients. To solve this problem several mobility management schemes such as iMesh and MEMO, have been proposed. The major drawbacks of these schemes are: larger handoff delay and higher signaling overhead. A new mobility management scheme named Forward Pointer...
The Next Generation Mobile Network (NGMN) is expected to include integration of wireless technologies. In NGMN multimedia services are provided through the IP Multimedia Subsystem (IMS). Recently IMS has been enhanced to ensure session continuity when roaming among different wireless technologies. However achieving seamless mobility which is one of the goals of NGMN is still a challenge. In this paper...
A new quality of service (QoS) enhancement scheme for IEEE 802.11e Enhanced Distributed Channel Access (EDCA) protocol is developed. It uses a combination of an adaptive access category (AC) traffic allocation, incorporated into the network's wireless side, and weighted round robin (WRR) queuing scheduling mechanism, incorporated into the wired side of the network. The adaptive traffic allocation...
On real-time video streaming, the distribution with multi-tree Application Level Multicast (ALM) is effective in terms of delay and jitter. In constructing multi-tree networks, a joining node selects counterpart nodes based on their performance or bandwidth capacity and they are connected each other. However, tree-based ALM has the overhead of reconstructing the tree topology when any node leaves...
The paper proposes an FPGA-like approach to on-chip communication and comes up with a design methodology where switches are avoided and where two any IPs are connected if and only if they are communicating. It avoids the problem of costly (time, area, energy) intermediate hop counts of on-chip networks (NOCs) between any two source-destination pairs. The second novelty is that without knowing the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.