Filters








1,007 Hits in 6.3 sec

An ICMP-Based Mobility Management Approach Suitable for Protocol Deployment Limitation

Jeng-Yueng Chen, Chun-Chuan Yang, Wen-Shiung Chen, Yi-Hung Huang, Heng-Te Chu
2009 EURASIP Journal on Wireless Communications and Networking  
To address this problem and to offset the limitation of the original MRT approach, we propose two different schemes, an ICMP echo scheme and an ICMP destination-unreachable scheme.  ...  However, this approach demands that all the edge routers on the Internet support MRT, resulting in protocol deployment difficulties.  ...  The best way to achieve this objective is to use an existing protocol for mobility management. In other words, we propose that existing protocols run in conventional nodes for mobility management.  ... 
doi:10.1155/2009/983594 fatcat:a2p4htfjjjcafdipfbyxquzpyu

An enhanced mobility management approach for wireless IP networks

Jeng-Yueng Chen, Wen-Shiung Chen, Chun-Chuan Yang, Yi-Hung Huang, Heng-Te Chu
2006 IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006.  
Mobile IP (MIP) and Mobile IP Route Optimization (MIP-RO) have been proposed to provide mobility management in the Internet. However, the MIP protocol suffers from triangular routing problem.  ...  Therefore, this paper introduces five different schemes which relieve the limitation of the original MRT approach and cut down the triangular routing problem as much as possible.  ...  This paper illustrates an enhanced MRT approach suitable for mobile wireless environment.  ... 
doi:10.1109/wcnc.2006.1683522 dblp:conf/wcnc/ChenCYHC06 fatcat:umdqwmkmtnfo5etjwqledfuigm

Survey on signaling techniques for cognitive networks

Dzmitry Kliazovich, Fabrizio Granelli, Nelson L.S. da Fonseca
2011 2011 IEEE 16th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)  
Following an overview of existing methods for crosslayer signaling, the paper identifies the most appropriate approaches to be used for cognitive network implementation outlining advantages, drawbacks,  ...  and provides guidance for usage of each signaling method.  ...  Finland in the framework of the Intelligent Telecommunication Systems with Enhanced Cognitive Processing (ITSE) project as well as the research fellowship provided by the European Research Consortium for  ... 
doi:10.1109/camad.2011.5941118 dblp:conf/camad/KliazovichGF11 fatcat:pmv5g6apz5aihdijy5uyybcvjm

Literature Survey on Cross-Layer Design Architecture for Bandwidth Management in Mobile Ad-hoc Networks

Jhunu Debbarma, Mrinal Kanti Debbarma, Sudipta Roy, Rajat K. Pal
2012 International Journal of Computer Applications  
There is high mobility and rapid deployment of the mobile nodes. Hence, there is need for multi-hop transmission where nodes can forward other nodes information.  ...  In dynamic network, there is a need for different layers to cooperate closely to meet QoS requirements of the mobile application.  ...  Mobile Host Air Network Limitations of ICMP message passing based cross-layer Architecture  The message passing is only in the upward direction.  ... 
doi:10.5120/9701-3739 fatcat:6ixx4v5fzjdlpf3xn2eoyhjztq

Engineering Considerations [chapter]

2004 Real-Time Systems Design and Analysis  
-64 bits of the application-layer key management protocol.  ...  For ILNPv4 implementations, enhancements to the key management protocol likely will be needed, because existing key management protocols rely on 32-bit IPv4 addresses, while ILNP Node Identifiers are 64  ... 
doi:10.1002/0471648299.ch8 fatcat:ff2dd7ygj5fjvnetmf3doqis3i

2. Engineering Considerations [chapter]

1970 Permafrost in Canada  
-64 bits of the application-layer key management protocol.  ...  For ILNPv4 implementations, enhancements to the key management protocol likely will be needed, because existing key management protocols rely on 32-bit IPv4 addresses, while ILNP Node Identifiers are 64  ... 
doi:10.3138/9781442632615-004 fatcat:crsyreibzfbgzgknao5fam7frm

Limitations of IPsec Policy Mechanisms [chapter]

Jari Arkko, Pekka Nikander
2005 Lecture Notes in Computer Science  
We describe our experiences in using IPsec in a number of situations, including IPv6 control protocols, mobility protocols, network management, and multimedia protocols.  ...  IPsec, while widely implemented, is rarely used for end-toend protection of application protocols. Instead, it is mainly used today as an "all or nothing" protection for VPNs.  ...  Acknowledgments The authors would like to thank Bernard Aboba, James Kempf, Steven Bellovin, and Stephen Kent for interesting discussions in this problem space.  ... 
doi:10.1007/11542322_29 fatcat:wpk23oizubba7edxjy3cykmyhi

Limitations of IPsec Policy Mechanisms [chapter]

Jari Arkko
2005 Lecture Notes in Computer Science  
We describe our experiences in using IPsec in a number of situations, including IPv6 control protocols, mobility protocols, network management, and multimedia protocols.  ...  IPsec, while widely implemented, is rarely used for end-toend protection of application protocols. Instead, it is mainly used today as an "all or nothing" protection for VPNs.  ...  Acknowledgments The authors would like to thank Bernard Aboba, James Kempf, Steven Bellovin, and Stephen Kent for interesting discussions in this problem space.  ... 
doi:10.1007/11542322_30 fatcat:nnrg4c6qzbd5djskysmu4a27ty

Towards Cognitive Internet: An Evolutionary Vision [chapter]

Fabrizio Granelli, Dzmitry Kliazovich, Neumar Malheiros
2014 Signals and Communication Technology  
Autonomous communication protocol tuning is then crucial in defining and managing the performance of the Internet.  ...  In this survey, we overview and compare existing adaptive protocol stack solutions, review the principles of cross-layer design as well as the agent-based and AI based self-configuration solutions.  ...  However, despite the advantages of direct communication between protocol layers and standardized way of signaling, ICMP-based approach is mostly limited by request-response action -while more complicated  ... 
doi:10.1007/978-3-319-01718-1_6 fatcat:dlzrtlvbejfkdbhqmutuex4nhu

TCP in a wireless world

G. Huston
2001 IEEE Internet Computing  
Acknowledgments This column is based on part of a longer article  ...  Managing Bit-Level Corruption TCP was designed for wire-based carriage and the protocol design makes numerous assumptions that are typical of such an environment. 1, 2 For example, it assumes that packet  ...  Conclusion Is TCP suitable for the mobile wireless environment?  ... 
doi:10.1109/4236.914651 fatcat:ya5ugc62zrd23brwkpm24b75sa

State-of-the-art multihoming solutions for Android: A quantitative evaluation and experience report

Luca Stornaiuolo, Paolo Bellavista
2015 2015 11th International Conference on Network and Service Management (CNSM)  
The technical challenges associated with multihoming management in mobile systems and applications have attracted relevant research activities, as demonstrated by the wide related literature of the recent  ...  However, only very recently some multihoming solutions and techniques have started to be applied in industrially-relevant platforms and cases, often in a limited and very controlled way.  ...  behind the protocol itself, calling for significant re-deployment and nonback-compatible evolution of the existing installation base.  ... 
doi:10.1109/cnsm.2015.7367352 dblp:conf/cnsm/StornaiuoloB15 fatcat:gkcrekvv2ncflj7vym7fnz4x6y

Architectures and Cross-Layer Design for Cognitive Networks [chapter]

Dzmitry Kliazovich, Fabrizio Granelli, Nelson L. S. da Fonseca
2010 Handbook on Sensor Networks  
Finally, a discussion on the required properties of the cross-layer design for cognitive networks and deployment issues are specified.  ...  In order to optimize network operations, the introduction of self-awareness, self-management, and self-healing into the network was proposed.  ...  approach involves operation with heavy protocol headers (IP and ICMP), as well as significant protocol processing overhead.  ... 
doi:10.1142/9789812837318_0001 fatcat:fycoylnjirb3fjthcdcyxdikly

A proposal for unifying mobility with multi-homing, NAT, & security

Ran Atkinson, Saleem Bhatti, Stephen Hailes
2007 Proceedings of the 5th ACM international workshop on Mobility management and wireless access - MobiWac '07  
Internet users seek solutions for mobility, multi-homing, support for localised address management (i.e. via NATs), and end-to-end security.  ...  In recent years, some have postulated that the Internet's namespaces are not sufficiently rich and that the current concept of an address is too limiting.  ...  The lack of a location-independent identifier makes key management for Mobile IP difficult. This in turn is a deployment impediment for Mobile IP.  ... 
doi:10.1145/1298091.1298105 dblp:conf/mobiwac/AtkinsonBH07 fatcat:dyx2rjuxjrh45digjqbzvcutcu

ILNP: mobility, multi-homing, localised addressing and security through naming

Randall Atkinson, Saleem Bhatti, Stephen Hailes
2009 Telecommunications Systems  
Internet users seek solutions for mobility, multihoming, support for localised address management (i.e. via NATs), and end-to-end security.  ...  In recent years, some have postulated that the Internet's namespaces are not sufficiently rich and that the current concept of an address is too limiting.  ...  The lack of a location-independent identifier makes key management for Mobile IP difficult. This in turn is a deployment impediment for Mobile IP.  ... 
doi:10.1007/s11235-009-9186-5 fatcat:cdznpu3lejaxfp3he4cbwjabeq

IPv6 lightweight stateless address autoconfiguration for 6LoWPAN using color coordinators

Hyojeong Shin, Elmurod Talipov, Hojung Cha
2009 2009 IEEE International Conference on Pervasive Computing and Communications  
Since conventional address autoconfiguration protocols require high network bandwidth and management cost, they are not suitable for wireless sensor networks.  ...  As resource-constrained network technology develops, such as wireless sensor networks, connectivity to an IP-based network has become an important requirement.  ...  ACKNOWLEDGMENT We would like to thank our shepherd, David Yates, and the reviewers for their useful feedback on the paper.  ... 
doi:10.1109/percom.2009.4912770 dblp:conf/percom/ShinTC09 fatcat:qxv3wyyg4vfpdocrps7rblds6i
« Previous Showing results 1 — 15 out of 1,007 results