首页 > 最新文献

Wireless Mobile Applications and Services on WLAN Hotspots最新文献

英文 中文
A novel idle mode operation in IEEE 802.11 WLANs: prototype implementation and empirical evaluation IEEE 802.11无线局域网中一种新的空闲模式操作:原型实现和经验评估
Pub Date : 2006-12-11 DOI: 10.1109/ICC.2006.255403
Sunggeun Jin, Kwanghun Han, Sunghyun Choi
While the IEEE 802.11 Wireless Local Area Network (WLAN) became a prevailing technology for the broadband wireless Internet access, new applications such as Internet Protocol (IP) telephony are fast emerging today. For the battery-powered IP phone devices, the standby time extension is a key concern for the market acceptance while today's 802.11 is not optimized for such an operation. In this paper, we propose a novel Idle Mode operation, which comprises paging, idle handoff, and delayed handoff. Under the idle mode operation, a Mobile Host (MH) does not need to perform a handoff within a predefined Paging Area (PA). Only when the MH enters a new PA, an idle handoff is performed with a minimum level of signaling. Due to the absence of such idle mode operation, both IP paging and Power Saving Mode (PSM) have been considered the alternatives so far even though they are not efficient. We develop a new analytical model to comparatively evaluate our proposed scheme. Our numerical results demonstrate that the proposed scheme outperforms the legacy alternatives with respect to power consumption, thus extending the standby time dramatically.
当IEEE 802.11无线局域网(WLAN)成为宽带无线互联网接入的主流技术时,互联网协议(IP)电话等新应用正在迅速涌现。对于电池供电的IP电话设备,待机时间的延长是市场接受度的关键问题,而今天的802.11并没有针对这种操作进行优化。在本文中,我们提出了一种新的空闲模式操作,它包括分页、空闲切换和延迟切换。在空闲模式操作下,移动主机(MH)不需要在预定义的Paging Area (PA)内执行切换。只有当MH进入新的PA时,才会以最小的信令级别执行空闲切换。由于没有这样的空闲模式操作,IP分页和省电模式(Power Saving mode, PSM)都被认为是迄今为止的备选方案,尽管它们效率不高。我们建立了一个新的分析模型来比较评价我们提出的方案。我们的数值结果表明,该方案在功耗方面优于传统方案,从而显着延长待机时间。
{"title":"A novel idle mode operation in IEEE 802.11 WLANs: prototype implementation and empirical evaluation","authors":"Sunggeun Jin, Kwanghun Han, Sunghyun Choi","doi":"10.1109/ICC.2006.255403","DOIUrl":"https://doi.org/10.1109/ICC.2006.255403","url":null,"abstract":"While the IEEE 802.11 Wireless Local Area Network (WLAN) became a prevailing technology for the broadband wireless Internet access, new applications such as Internet Protocol (IP) telephony are fast emerging today. For the battery-powered IP phone devices, the standby time extension is a key concern for the market acceptance while today's 802.11 is not optimized for such an operation. In this paper, we propose a novel Idle Mode operation, which comprises paging, idle handoff, and delayed handoff. Under the idle mode operation, a Mobile Host (MH) does not need to perform a handoff within a predefined Paging Area (PA). Only when the MH enters a new PA, an idle handoff is performed with a minimum level of signaling. Due to the absence of such idle mode operation, both IP paging and Power Saving Mode (PSM) have been considered the alternatives so far even though they are not efficient. We develop a new analytical model to comparatively evaluate our proposed scheme. Our numerical results demonstrate that the proposed scheme outperforms the legacy alternatives with respect to power consumption, thus extending the standby time dramatically.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123346883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A distributed approach for assistive service provision in pervasive environment 普及环境中辅助服务提供的分布式方法
Pub Date : 2006-09-29 DOI: 10.1145/1161023.1161037
M. Ghorbel, M. Mokhtari, Stéphane Renouard
In this paper, we propose assistive service provision architecture in pervasive environments. This architecture is based on a distributed approach and ensures service design, deployment and discovery aspects. In order to perform those aspects, several constraints are supported by this architecture such as the context of the pervasive environment, the user profile and the terminal profile. Delivered services are dedicated to dependent people (elderly and people with disabilities). Our strategy is based on our previous work on smart home for people with disabilities. We also present the OSGi-based implementation of our architecture. This implementation is a first step to experiment and validate our approach. We are aiming at having evaluations in real conditions The rapid development of information and communication technologies is opening a large variety of new services and aids not only for valid people, but also for dependent people due to physical/cognitive restriction or the elderly. Combining technical aids and mobile technology allows those people to benefit from an independent living in both usual and temporary living environments.
本文提出了普适环境下的辅助服务提供体系结构。该体系结构基于分布式方法,并确保服务设计、部署和发现方面。为了执行这些方面,该体系结构支持几个约束,例如普及环境的上下文、用户配置文件和终端配置文件。所提供的服务专门针对受抚养的人(老年人和残疾人)。我们的策略是基于我们之前在残疾人智能家居方面的工作。我们还介绍了基于osgi的体系结构实现。这个实现是实验和验证我们的方法的第一步。我们的目标是在真实条件下进行评估。信息和通信技术的快速发展不仅为有效的人提供了各种各样的新服务和辅助工具,也为由于身体/认知限制或老年人而依赖的人提供了服务和辅助工具。将技术辅助和移动技术相结合,使这些人能够在常规和临时生活环境中独立生活。
{"title":"A distributed approach for assistive service provision in pervasive environment","authors":"M. Ghorbel, M. Mokhtari, Stéphane Renouard","doi":"10.1145/1161023.1161037","DOIUrl":"https://doi.org/10.1145/1161023.1161037","url":null,"abstract":"In this paper, we propose assistive service provision architecture in pervasive environments. This architecture is based on a distributed approach and ensures service design, deployment and discovery aspects. In order to perform those aspects, several constraints are supported by this architecture such as the context of the pervasive environment, the user profile and the terminal profile. Delivered services are dedicated to dependent people (elderly and people with disabilities). Our strategy is based on our previous work on smart home for people with disabilities. We also present the OSGi-based implementation of our architecture. This implementation is a first step to experiment and validate our approach. We are aiming at having evaluations in real conditions The rapid development of information and communication technologies is opening a large variety of new services and aids not only for valid people, but also for dependent people due to physical/cognitive restriction or the elderly. Combining technical aids and mobile technology allows those people to benefit from an independent living in both usual and temporary living environments.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115332800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Human-centric network security management: a comprehensive helper 以人为本的网络安全管理:全面助手
Pub Date : 2006-09-29 DOI: 10.1145/1161023.1161031
G. K. Mostéfaoui, P. Brézillon
In most current systems, managing access to networks rely on static rules implemented on firewalls and IDS (Intrusion Detection Systems). These measures lack a systematic consideration of the context within which an attack occurs. Indeed, we argue that network access management must be enforced by identifying the sensible contexts in which the hacker tries to drive the system to, before performing the potential dangerous action. Thus, our claim concerns a human-centered management of security as opposed to computing-centered security. In this direction, we propose a visual model that allows expressing sensible contexts for blocking hackers when they enter such sensible contexts. This surveillance operation could be lead by a human or a system. Additionally, our solution allows interlocked processes of incremental acquisition of knowledge and learning of new practices that enriches the initial security policy with new security contexts.
在大多数当前系统中,管理对网络的访问依赖于在防火墙和入侵检测系统(IDS)上实现的静态规则。这些措施缺乏对攻击发生的背景的系统考虑。实际上,我们认为,在执行潜在的危险操作之前,必须通过识别黑客试图将系统驱动到的合理上下文来实施网络访问管理。因此,我们的主张涉及以人为中心的安全管理,而不是以计算为中心的安全管理。在这个方向上,我们提出了一个可视化模型,该模型允许在黑客进入这种感知环境时表达明智的上下文来阻止黑客。这种监视行动可能是由人或系统领导的。此外,我们的解决方案支持知识增量获取和新实践学习的联锁过程,这些新实践可以用新的安全上下文丰富初始安全策略。
{"title":"Human-centric network security management: a comprehensive helper","authors":"G. K. Mostéfaoui, P. Brézillon","doi":"10.1145/1161023.1161031","DOIUrl":"https://doi.org/10.1145/1161023.1161031","url":null,"abstract":"In most current systems, managing access to networks rely on static rules implemented on firewalls and IDS (Intrusion Detection Systems). These measures lack a systematic consideration of the context within which an attack occurs. Indeed, we argue that network access management must be enforced by identifying the sensible contexts in which the hacker tries to drive the system to, before performing the potential dangerous action. Thus, our claim concerns a human-centered management of security as opposed to computing-centered security. In this direction, we propose a visual model that allows expressing sensible contexts for blocking hackers when they enter such sensible contexts. This surveillance operation could be lead by a human or a system. Additionally, our solution allows interlocked processes of incremental acquisition of knowledge and learning of new practices that enriches the initial security policy with new security contexts.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SymPhone: design and implementation of a VoIP peer for Symbian mobile phones using Bluetooth and SIP SymPhone:基于蓝牙和SIP的Symbian手机VoIP对等体的设计和实现
Pub Date : 2006-09-29 DOI: 10.1145/1161023.1161034
Patrick Stuedi, A. Frei, LucAndré Burdet, G. Alonso
VoIP is born from the growing Internet infrastructure, which has over the years seen significant improvements in both bandwidth and end-to-end latency. In this paper, we explore making VoIP available on a mobile phone. For that purpose, we propose an architecture and describe the various components involved. Data entering and leaving the mobile phone is encapsulated in a wireless Bluetooth connection. The bridge to the Internet is provided by a linux Bluetooth access point. The system is compatible with current VoIP standards using RTP and SIP for data and signaling transmission, respectively. It has been tested to work in combination with several known softphones. Both RTP and SIP stack are built on top of a special IP emulation layer on the mobile phone, which has been developed to facilitate the migration of the application onto devices having a direct IP binding available for Bluetooth such as BNEP (Bluetooth Network Encapsulation Protocol). Apart from presenting design and implementation details, the paper also provides measurement results with regard to delay and session setup time and discusses certain limitations of the application evolving from restrictions imposed by the mobile phone's programming platform.
VoIP是从不断增长的互联网基础设施中诞生的,多年来,互联网基础设施在带宽和端到端延迟方面都有了显著的改进。在本文中,我们探索使VoIP在移动电话上可用。为此,我们提出了一个体系结构,并描述了所涉及的各种组件。进出手机的数据被封装在无线蓝牙连接中。到Internet的桥接是由linux蓝牙接入点提供的。系统兼容当前的VoIP标准,采用RTP协议传输数据,采用SIP协议传输信令。它已经过测试,可以与几种已知的软电话结合使用。RTP和SIP堆栈都建立在移动电话上的特殊IP模拟层之上,该层的开发是为了方便将应用程序迁移到具有可用于蓝牙的直接IP绑定的设备上,例如BNEP(蓝牙网络封装协议)。除了介绍设计和实现细节外,本文还提供了关于延迟和会话建立时间的测量结果,并讨论了从手机编程平台施加的限制演变的应用程序的某些限制。
{"title":"SymPhone: design and implementation of a VoIP peer for Symbian mobile phones using Bluetooth and SIP","authors":"Patrick Stuedi, A. Frei, LucAndré Burdet, G. Alonso","doi":"10.1145/1161023.1161034","DOIUrl":"https://doi.org/10.1145/1161023.1161034","url":null,"abstract":"VoIP is born from the growing Internet infrastructure, which has over the years seen significant improvements in both bandwidth and end-to-end latency. In this paper, we explore making VoIP available on a mobile phone. For that purpose, we propose an architecture and describe the various components involved. Data entering and leaving the mobile phone is encapsulated in a wireless Bluetooth connection. The bridge to the Internet is provided by a linux Bluetooth access point. The system is compatible with current VoIP standards using RTP and SIP for data and signaling transmission, respectively. It has been tested to work in combination with several known softphones. Both RTP and SIP stack are built on top of a special IP emulation layer on the mobile phone, which has been developed to facilitate the migration of the application onto devices having a direct IP binding available for Bluetooth such as BNEP (Bluetooth Network Encapsulation Protocol). Apart from presenting design and implementation details, the paper also provides measurement results with regard to delay and session setup time and discusses certain limitations of the application evolving from restrictions imposed by the mobile phone's programming platform.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115284522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Authentication, authorization and accounting (AAA) in hybrid ad hoc hotspot's environments 混合自组织热点环境中的身份验证、授权和计费(AAA)
Pub Date : 2006-09-29 DOI: 10.1145/1161023.1161030
H. Moustafa, Gilles Bourdon, Y. Gourhant
Wireless LAN (WLAN) is rapidly growing as a popular technology for ubiquitous communication, where Internet access is being a standard commodity. The growing demand in WLAN technological development is to provide high quality and secure Internet access to mobile users using their portable devices. Nevertheless, WLAN is still restrictive, as it requires the presence of mobile users in the communication range of access points. Moreover, the security of this network is posing a major challenge for its usage. Hybrid ad hoc networks appear as an attractive solution in public hotspots applications, allowing mobile users to achieve WLAN access independent of their existence in access points communication ranges. Since effective Authentication, Authorization and Accounting (AAA) are of great importance for secure mobile wireless access, in this paper we propose a novel architecture that provides efficient AAA and secure communication among mobile clients in WLAN hotspots applications. Our solution uses the hybrid ad hoc network concept and considers the service provider as the single point of contact for all AAA transactions. We adapt the IEEE 802.11i standard to the hybrid ad hoc network environment in order to set up authenticated links on layer 2, achieving secure wireless access as well as confidential data transfer. Since IEEE 802.11i necessitates the existence of a fixed infrastructure between the WLAN and the authentication server, we introduce a cross-layer interaction with the ad hoc routing layer in order to provide a virtual infrastructure among the mobile clients through employing a clustering mechanism. We validate our proposed solution through simulation. Through analyzing the obtained results, we give some performance estimates and we show the advantages of using the hybrid ad hoc networks approach.
无线局域网(WLAN)作为一种流行的无处不在的通信技术正在迅速发展,其中互联网接入正在成为一种标准商品。无线局域网技术发展的日益增长的需求是为使用便携式设备的移动用户提供高质量和安全的互联网接入。然而,WLAN仍然是限制性的,因为它要求在接入点的通信范围内存在移动用户。此外,该网络的安全性对其使用提出了重大挑战。混合自组织网络作为一种有吸引力的解决方案出现在公共热点应用中,它允许移动用户独立于接入点通信范围内实现WLAN访问。由于有效的认证、授权和计费(AAA)对于安全的移动无线接入非常重要,本文提出了一种新的体系结构,在WLAN热点应用中提供高效的AAA和安全的移动客户端通信。我们的解决方案使用混合自组织网络概念,并将服务提供者视为所有AAA事务的单一接触点。我们将IEEE 802.11i标准应用于混合自组织网络环境,在第二层建立认证链路,实现安全的无线接入和机密数据传输。由于IEEE 802.11i要求在WLAN和身份验证服务器之间存在固定的基础设施,因此我们引入了与自组织路由层的跨层交互,以便通过采用集群机制在移动客户端之间提供虚拟基础设施。我们通过仿真验证了我们提出的解决方案。通过分析得到的结果,给出了一些性能估计,并展示了使用混合自组织网络方法的优点。
{"title":"Authentication, authorization and accounting (AAA) in hybrid ad hoc hotspot's environments","authors":"H. Moustafa, Gilles Bourdon, Y. Gourhant","doi":"10.1145/1161023.1161030","DOIUrl":"https://doi.org/10.1145/1161023.1161030","url":null,"abstract":"Wireless LAN (WLAN) is rapidly growing as a popular technology for ubiquitous communication, where Internet access is being a standard commodity. The growing demand in WLAN technological development is to provide high quality and secure Internet access to mobile users using their portable devices. Nevertheless, WLAN is still restrictive, as it requires the presence of mobile users in the communication range of access points. Moreover, the security of this network is posing a major challenge for its usage. Hybrid ad hoc networks appear as an attractive solution in public hotspots applications, allowing mobile users to achieve WLAN access independent of their existence in access points communication ranges. Since effective Authentication, Authorization and Accounting (AAA) are of great importance for secure mobile wireless access, in this paper we propose a novel architecture that provides efficient AAA and secure communication among mobile clients in WLAN hotspots applications. Our solution uses the hybrid ad hoc network concept and considers the service provider as the single point of contact for all AAA transactions. We adapt the IEEE 802.11i standard to the hybrid ad hoc network environment in order to set up authenticated links on layer 2, achieving secure wireless access as well as confidential data transfer. Since IEEE 802.11i necessitates the existence of a fixed infrastructure between the WLAN and the authentication server, we introduce a cross-layer interaction with the ad hoc routing layer in order to provide a virtual infrastructure among the mobile clients through employing a clustering mechanism. We validate our proposed solution through simulation. Through analyzing the obtained results, we give some performance estimates and we show the advantages of using the hybrid ad hoc networks approach.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133196950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Friend relay: a resource sharing framework for mobile wireless devices 朋友中继:一个用于移动无线设备的资源共享框架
Pub Date : 2006-09-29 DOI: 10.1145/1161023.1161027
H. Caituiro-Monge, K. Almeroth, Mariali Alvarez-Rohena
The rising popularity of wireless devices opens exciting possibilities for users to share their resources. However, there exists no end-to-end, general-purpose, resource sharing framework for such devices. Existing resource sharing solutions address only part of the overall challenge and barely consider mobile wireless devices' critical characteristics, such as mobility, CPU capability, and power limitations. Furthermore, they do not have mechanisms to control the degree to which resources are shared. This lack of control likely leads to over-usage of shared resources, therefore, reducing computing capacity and draining the batteries of devices that are sharing resources. In this paper, we present Friend Relay, a resource-sharing framework for mobile wireless devices that offers automatic publishing, discovery and configuration, as well as monitoring and control. Our contribution is to add monitoring and control as mechanisms to manage the utilization of shared resources. To evaluate Friend Relay, we quantify the benefits of monitoring and controlling resource usage for Internet access sharing. For our evaluation, we developed a prototype of Friend Relay. In addition, we prototyped "Internet Sharing", a service to allow users to share the ISP subscription of another user. Our evaluation focuses on the performance of this service with and without the Friend Relay monitoring and control mechanisms. Our results show that mobile devices that either share or use resources can benefit significantly from using our Friend Relay architecture.
无线设备的日益普及为用户共享资源提供了令人兴奋的可能性。然而,目前还没有针对此类设备的端到端、通用的资源共享框架。现有的资源共享解决方案只解决了整体挑战的一部分,几乎没有考虑移动无线设备的关键特性,例如移动性、CPU能力和功率限制。此外,它们没有机制来控制资源共享的程度。这种控制的缺乏可能导致共享资源的过度使用,从而降低计算能力并耗尽共享资源的设备的电池。在本文中,我们提出了朋友中继,一个移动无线设备的资源共享框架,提供自动发布,发现和配置,以及监测和控制。我们的贡献是增加监视和控制机制来管理共享资源的利用。为了评估朋友中继,我们量化了监控和控制互联网访问共享的资源使用的好处。为了进行评估,我们开发了一个Friend Relay的原型。此外,我们还原型化了“互联网共享”,一种允许用户共享另一个用户的ISP订阅的服务。我们的评估侧重于该服务在有无朋友中继监视和控制机制的情况下的性能。我们的结果表明,共享或使用资源的移动设备可以从使用我们的朋友中继体系结构中获益良多。
{"title":"Friend relay: a resource sharing framework for mobile wireless devices","authors":"H. Caituiro-Monge, K. Almeroth, Mariali Alvarez-Rohena","doi":"10.1145/1161023.1161027","DOIUrl":"https://doi.org/10.1145/1161023.1161027","url":null,"abstract":"The rising popularity of wireless devices opens exciting possibilities for users to share their resources. However, there exists no end-to-end, general-purpose, resource sharing framework for such devices. Existing resource sharing solutions address only part of the overall challenge and barely consider mobile wireless devices' critical characteristics, such as mobility, CPU capability, and power limitations. Furthermore, they do not have mechanisms to control the degree to which resources are shared. This lack of control likely leads to over-usage of shared resources, therefore, reducing computing capacity and draining the batteries of devices that are sharing resources. In this paper, we present Friend Relay, a resource-sharing framework for mobile wireless devices that offers automatic publishing, discovery and configuration, as well as monitoring and control. Our contribution is to add monitoring and control as mechanisms to manage the utilization of shared resources. To evaluate Friend Relay, we quantify the benefits of monitoring and controlling resource usage for Internet access sharing. For our evaluation, we developed a prototype of Friend Relay. In addition, we prototyped \"Internet Sharing\", a service to allow users to share the ISP subscription of another user. Our evaluation focuses on the performance of this service with and without the Friend Relay monitoring and control mechanisms. Our results show that mobile devices that either share or use resources can benefit significantly from using our Friend Relay architecture.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Managing mobility and adaptation in upcoming 802.21 enabled devices 管理即将推出的支持802.21的设备的移动性和适应性
Pub Date : 2006-09-29 DOI: 10.1145/1161023.1161025
F. Cacace, L. Vollero
One emerging characteristic of electronic devices is the increasing number of connectivity interfaces (aka NICs1) towards the outside world. That obviously translates in a set of technical issues related to their management in order to provide seamless connectivity when the connections move from one interface to another. The IEEE 802.21 is a recent effort of IEEE that aims at providing a general interface for the management of NICs. In this paper we discuss how the upcoming standard may be effectively exploited in a mobile context in order to hide network heterogeneity to end users. To accomplish this task, we propose a centralized element called Mobility Manager interfacing with the 802.21 sublayer and responsible for the application of connectivity policies. Based on a real testbed, we showed that the new standard and the MM can be used to improve network performance experienced by the end user. Moreover we showed how the MM can interact with adaptive applications in order to improve further the range of usability of real-time applications.
电子设备的一个新特征是与外部世界的连接接口(即nic1)数量的增加。这显然转化为一系列与管理相关的技术问题,以便在连接从一个接口移动到另一个接口时提供无缝连接。IEEE 802.21是IEEE最近的一项努力,旨在为网卡管理提供通用接口。在本文中,我们讨论了如何在移动环境中有效地利用即将到来的标准,以便向最终用户隐藏网络异质性。为了完成这项任务,我们提出了一个称为移动管理器的集中元素,它与802.21子层接口,并负责连接策略的应用。在一个实际的测试平台上,我们证明了新标准和MM可以用来改善最终用户体验的网络性能。此外,我们还展示了MM如何与自适应应用程序交互,以进一步提高实时应用程序的可用性。
{"title":"Managing mobility and adaptation in upcoming 802.21 enabled devices","authors":"F. Cacace, L. Vollero","doi":"10.1145/1161023.1161025","DOIUrl":"https://doi.org/10.1145/1161023.1161025","url":null,"abstract":"One emerging characteristic of electronic devices is the increasing number of connectivity interfaces (aka NICs1) towards the outside world. That obviously translates in a set of technical issues related to their management in order to provide seamless connectivity when the connections move from one interface to another. The IEEE 802.21 is a recent effort of IEEE that aims at providing a general interface for the management of NICs. In this paper we discuss how the upcoming standard may be effectively exploited in a mobile context in order to hide network heterogeneity to end users. To accomplish this task, we propose a centralized element called Mobility Manager interfacing with the 802.21 sublayer and responsible for the application of connectivity policies. Based on a real testbed, we showed that the new standard and the MM can be used to improve network performance experienced by the end user. Moreover we showed how the MM can interact with adaptive applications in order to improve further the range of usability of real-time applications.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115749997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
UniWireless: a distributed open access network UniWireless:分布式开放接入网络
Pub Date : 2006-09-29 DOI: 10.1145/1161023.1161029
D. Severina, M. Brunato, A. Ordine, L. Veltri
In this paper we describe the UniWireless framework, a nationwide distributed Open Access testbed that involves different research units collaborating in the TWELVE national project. The Uni-Fy AAA system, used to manage the collection of involved hotspots, is also discussed.The most important aspect of the UniWireless framework is its compatibility with different authentication mechanisms; while most access networks enforce a particular authentication protocol upon their users, in the UniWireless system different mechanisms coexist, and each client can in principle use the one that it considers most suitable. Two different, independent and coexisting authentication protocols (capive portal and a SIP-based technique) have been implemented and are described in this paper.Besides its academic and scientific value for demonstrating results and supporting research activities, the UniWireless framework is actually used to grant access to nomadic users that belong to different research units in all the hotspots related to the project. Every nomadic user can access network resources from every hotspot in the testbed by his usual authentication credentials. Experience gathered from more than one year of continuative use of the system is also discussed.
在本文中,我们描述了UniWireless框架,这是一个全国性的分布式开放存取测试平台,涉及在十二个国家项目中合作的不同研究单位。并对Uni-Fy AAA系统进行了讨论,用于对涉及的热点进行采集管理。UniWireless框架最重要的方面是它与不同认证机制的兼容性;虽然大多数接入网络对其用户强制执行特定的身份验证协议,但在UniWireless系统中,不同的机制并存,并且每个客户端原则上可以使用它认为最合适的一个。本文已经实现并描述了两种不同的、独立的和共存的身份验证协议(专用门户和基于sip的技术)。除了在展示成果和支持研究活动方面具有学术和科学价值外,UniWireless框架实际上还用于在与项目相关的所有热点中授予属于不同研究单位的游牧用户访问权限。每个游牧用户都可以通过其常用的身份验证凭证从测试台上的每个热点访问网络资源。还讨论了从一年多的持续使用该系统中收集的经验。
{"title":"UniWireless: a distributed open access network","authors":"D. Severina, M. Brunato, A. Ordine, L. Veltri","doi":"10.1145/1161023.1161029","DOIUrl":"https://doi.org/10.1145/1161023.1161029","url":null,"abstract":"In this paper we describe the UniWireless framework, a nationwide distributed Open Access testbed that involves different research units collaborating in the TWELVE national project. The Uni-Fy AAA system, used to manage the collection of involved hotspots, is also discussed.The most important aspect of the UniWireless framework is its compatibility with different authentication mechanisms; while most access networks enforce a particular authentication protocol upon their users, in the UniWireless system different mechanisms coexist, and each client can in principle use the one that it considers most suitable. Two different, independent and coexisting authentication protocols (capive portal and a SIP-based technique) have been implemented and are described in this paper.Besides its academic and scientific value for demonstrating results and supporting research activities, the UniWireless framework is actually used to grant access to nomadic users that belong to different research units in all the hotspots related to the project. Every nomadic user can access network resources from every hotspot in the testbed by his usual authentication credentials. Experience gathered from more than one year of continuative use of the system is also discussed.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130548694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A localized IP-address auto-configuration protocol for wireless ad-hoc networks 用于无线自组织网络的本地化ip地址自动配置协议
Pub Date : 2006-09-29 DOI: 10.1145/1161023.1161038
V. C. Giruka, M. Singhal
We present a localized IP auto-con.guration protocol for wireless ad-hoc networks, called OASIS. OASIS introduces the idea of position-dependent IP-addresses using a cellular structure of the underlying network. Within a cell, nodes try to obtain a con.ict-free IP-address using a distributed mutual exclusion style algorithm. We show the correctness, and present an asymptotic analysis of the overhead of OASIS. Further, we present extensions to OASIS protocol to cope with message losses and node mobility. OASIS avoids problems due to network partitions and mergers, supports concurrent node joins/leaves, incurs localized control overhead per IP-address acquisition (independent of the number of nodes in the network), and hence it is scalable.
我们提出了一个本地化的IP自动控制。用于无线自组织网络的生成协议,称为OASIS。OASIS使用底层网络的蜂窝结构引入了位置相关ip地址的思想。在单元内,节点尝试使用分布式互斥样式算法获取无冲突的ip地址。我们证明了其正确性,并给出了OASIS开销的渐近分析。此外,我们还对OASIS协议进行了扩展,以处理消息丢失和节点移动。OASIS避免了由于网络分区和合并而导致的问题,支持并发节点连接/离开,每个ip地址获取(与网络中的节点数量无关)产生本地化控制开销,因此具有可伸缩性。
{"title":"A localized IP-address auto-configuration protocol for wireless ad-hoc networks","authors":"V. C. Giruka, M. Singhal","doi":"10.1145/1161023.1161038","DOIUrl":"https://doi.org/10.1145/1161023.1161038","url":null,"abstract":"We present a localized IP auto-con.guration protocol for wireless ad-hoc networks, called OASIS. OASIS introduces the idea of position-dependent IP-addresses using a cellular structure of the underlying network. Within a cell, nodes try to obtain a con.ict-free IP-address using a distributed mutual exclusion style algorithm. We show the correctness, and present an asymptotic analysis of the overhead of OASIS. Further, we present extensions to OASIS protocol to cope with message losses and node mobility. OASIS avoids problems due to network partitions and mergers, supports concurrent node joins/leaves, incurs localized control overhead per IP-address acquisition (independent of the number of nodes in the network), and hence it is scalable.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132120553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient paging in large-scale urban mesh networks 大规模城市网状网络中的高效寻呼
Pub Date : 2006-09-29 DOI: 10.1145/1161023.1161036
S. Bohacek, V. Sridhara, L. Lou
The task of forming a route can be broken into two parts, finding any route to the desired host and refining that route so it is suitable for the conenction. We refer to this first task as paging and it consists of simply delivering a single packet to the destination. Traditional MANET routing protocols perform this task via flooding. However, when the number of nodes ranges into the thousands, flooding becomes highly inefficient. In the case of cellular networks, paging is performed with one or more base stations broadcasting a page message. However, in large-scale urban networks, nodes are not necessarily in direct contact with the infrastructure, hence such techniques are not applicable. In this paper, the topology and architecture of a large-scale urban mesh network is examined and a scheme is developed for paging. This scheme is designed for and takes advantage of the topology, mobility, and architecture found in urban mesh networks. The resulting scheme is highly efficient in that it generates little overhead and is scalable.
形成一条路由的任务可以分为两部分:找到任何一条到期望主机的路由,并对该路由进行优化,使其适合约定。我们将第一个任务称为分页,它包括简单地将单个数据包发送到目的地。传统的MANET路由协议通过泛洪来完成这项任务。然而,当节点数量达到数千个时,泛洪变得非常低效。在蜂窝网络的情况下,寻呼是由一个或多个广播页消息的基站执行的。然而,在大规模的城市网络中,节点不一定与基础设施直接接触,因此这种技术不适用。本文研究了大规模城市网状网络的拓扑结构,并提出了一种寻呼方案。该方案是为城市网状网络的拓扑结构、移动性和体系结构而设计并利用的。由此产生的方案非常高效,因为它产生的开销很少,并且具有可伸缩性。
{"title":"Efficient paging in large-scale urban mesh networks","authors":"S. Bohacek, V. Sridhara, L. Lou","doi":"10.1145/1161023.1161036","DOIUrl":"https://doi.org/10.1145/1161023.1161036","url":null,"abstract":"The task of forming a route can be broken into two parts, finding any route to the desired host and refining that route so it is suitable for the conenction. We refer to this first task as paging and it consists of simply delivering a single packet to the destination. Traditional MANET routing protocols perform this task via flooding. However, when the number of nodes ranges into the thousands, flooding becomes highly inefficient. In the case of cellular networks, paging is performed with one or more base stations broadcasting a page message. However, in large-scale urban networks, nodes are not necessarily in direct contact with the infrastructure, hence such techniques are not applicable. In this paper, the topology and architecture of a large-scale urban mesh network is examined and a scheme is developed for paging. This scheme is designed for and takes advantage of the topology, mobility, and architecture found in urban mesh networks. The resulting scheme is highly efficient in that it generates little overhead and is scalable.","PeriodicalId":441921,"journal":{"name":"Wireless Mobile Applications and Services on WLAN Hotspots","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134495788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Wireless Mobile Applications and Services on WLAN Hotspots
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1