Academic literature on the topic 'Diameter and Mobile IP integration'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Diameter and Mobile IP integration.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Diameter and Mobile IP integration"

1

Sharma, Priyanka. "Integration of Mobile IP with MANET." International Journal of Computer Trends and Technology 39, no. 1 (2016): 28–31. http://dx.doi.org/10.14445/22312803/ijctt-v39p106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Benzaid, Mounir, Pascale Minet, Khaldoun Al Agha, Cedric Adjih, and Geraud Allard. "Integration of Mobile-IP and OLSR for a Universal Mobility." Wireless Networks 10, no. 4 (2004): 377–88. http://dx.doi.org/10.1023/b:wine.0000028542.48770.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Munira, Sirajum, Humaira Sadia, Samara Fahin, Ashraf Siddik, and A. K. M. Fazlul Haque. "DSR and OLSR routing protocol based performance evaluation and integration on MIP with MANET." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (2020): 1306. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1306-1312.

Full text
Abstract:
This paper describes the integration of mobile IP in mobile ad hoc network (MIPMANET) in large area network (LAN) between 8 nodes, where latency, delay, throughput is considered for the quality of service (QoS) consideration. For the best result of MIPMANET, the Dynamic Source Routing Protocol (DSR) and Optimized Link State Routing Protocol (OLSR) are considered. Although MANET has other routing protocols, the DSR performs better in MIPMANET integration in NS2. Mobile IP is applied for doing the dynamic topology to static topology as the nodes are flexible in an ad-hoc network. Simulation result suggests that the MANET performs better in DSR with MIP as the amount of packet drop is low and throughput is high
APA, Harvard, Vancouver, ISO, and other styles
4

Choi, Minkyu, and Ronnie Caytiles. "A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems." International Journal of Smart Home 7, no. 5 (2013): 49–56. http://dx.doi.org/10.14257/ijsh.2013.7.5.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Huo, Long She, and Long Zhang. "The Integration of Mobile Internet and Broadband Network Based on ID/Locator Separation." Advanced Materials Research 765-767 (September 2013): 898–902. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.898.

Full text
Abstract:
New broadband mobile IP bearing network technologies based on ID/Locator separation solve the four questions security, mobility, routing scalability and network integration. As the main direction of mobile Internet and telecom broadband network integration, the research of the overall architecture and key evaluation methods of the mobile Internet and broadband network integration is used to guide other research directions. This article reviews the related studies of the integration and evolution, as well as the related key technologies and new equipment/system, to development the application platform and construction to complete scientific research achievements of the ground and presentation.
APA, Harvard, Vancouver, ISO, and other styles
6

Al mojamed, Mohammad. "Integrating IP Mobility Management Protocols and MANET: A Survey." Future Internet 12, no. 9 (2020): 150. http://dx.doi.org/10.3390/fi12090150.

Full text
Abstract:
The Mobile ad hoc Network (MANET) is a collection of mobile devices that forms a self-created, self-administered, and self-organized network. It is an infrastructureless network that does not require an existing infrastructure to operate. MANET suits scenarios where a temporary network is needed, such as emergency rescue, the military field, and disaster areas. MANET is an isolated network, and communication is restricted to the participating nodes’ transmission coverage. In order to increase its connectivity and its application scope, however, MANET requires integration with other networks, forming a hybrid MANET. The integration of MANET and IP networks raises many challenges and issues. Mobility management is one of the main challenges. Traditional mobility management protocols provide seamless mobility in a single hop infrastructure network. Consequently, mobile nodes can maintain their global connectivity without interrupting the ongoing sessions. Mobility management becomes more challenging in a network that relies on multi-hop communication, such as MANET. This paper presents a survey of the use of mobility management systems when integrating MANET with the internet, with the objective of serving as a handy reference in this field of research. It presents, analyzes, and discusses existing mobility management solutions for integrated MANET networks. It also investigates their shortcomings and provides a comparative study of the surveyed proposals.
APA, Harvard, Vancouver, ISO, and other styles
7

Y., Smolianik, and Puzyrov S. "INTEGRATION OF ESP32-CAM OV2604 CAMERA WITH MOBILE MESSENGERS." Computer systems and network 2, no. 1 (2017): 88–93. http://dx.doi.org/10.23939/csn2020.01.088.

Full text
Abstract:
The issue of creating an IP camera based on the ESP-32 CAM module, and integration and transfer of images to the messenger is considered. Provision is made to ensure and increase security during data transmission and interaction with the bot. It is also proposed to create a special telegram bot, using the telegram API, to obtain images from the camera, at any time, when connected to the Internet. The efficiency of the microcontroller at a given task is analyzed. The use of MQTT transmission protocol is proposed, and its advantages for this system are considered. Examples of improvement of this project, layout of this module are given. Discussion of the place and scope of work for the use of this module. The advantages of the ESP-32 CAM module for this task are considered, and why it is the best in its segment for beginners and improvement of knowledge in this work. Examples of using the module with other mobile applications are given. Keywords: - ESP-32 CAM module, messenger, MQTT, advantages, microcontroller, telegram.
APA, Harvard, Vancouver, ISO, and other styles
8

Chung, Chiu Chiao, and Wei Shiang Weng. "Remote Access the ZigBee Sensor Network through the IP Network." Advanced Materials Research 684 (April 2013): 539–42. http://dx.doi.org/10.4028/www.scientific.net/amr.684.539.

Full text
Abstract:
With the wireless communication technology and world-wide Internet, living styles have become more and more convenient and smart, especially, for the application of context-aware systems based in wireless sensor networks. Furthermore, mobile devices provide users timely information browsing and mobile data access. In this study, the ZigBee wireless sensor network combined with sensor data observed Services (Sensor data Observation Service), and PostgreSQL database systems is developed to implement a remote access ZigBee wireless sensor network through an IP Internet browser. This system includes: (a) the integration of ZigBee CC2430 sensor sensing light, humidity and temperature; (b) PostgreSQL database tools accessing data; (c) via the sensor data Observation Service (SOS ) technologies; (d) through mobile devices to master the relevant environmental information.
APA, Harvard, Vancouver, ISO, and other styles
9

Cortés-Polo, David, Jesús Calle-Cancho, Javier Carmona-Murillo, and José-Luis González-Sánchez. "Future Trends in Mobile-Fixed Integration for Next Generation Networks." International Journal of Vehicular Telematics and Infotainment Systems 1, no. 1 (2017): 33–53. http://dx.doi.org/10.4018/ijvtis.2017010103.

Full text
Abstract:
In recent years, the growth the in the number of heterogeneous interconnected systems, as well as the emergence of new requirements in applications and services are progressively changing the original simplicity and transparency of the Internet architecture. When this architecture was designed, the main goal was to interconnect stationary host. Therefore, the appearance of mobile communications has made necessary to adapt traditional protocols in order to accommodate mobile users. This implies a new interaction between the mobile network and the fixed access network. This paper describes the main IP mobility protocols both centralized and distributed paradigms, and emergent approaches based on software defined networking. Moreover, a novel classification is presented, which relates the integration of the mobility protocol with the access network. Analytical models evaluate the registration updates cost and the packet loss rate of the classified protocols.
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Ji-In, Nak-Jung Choi, Tae-Wan You, Heeyoung Jung, Young-Woo Kwon, and Seok-Joo Koh. "Mobile-Oriented Future Internet: Implementation and Experimentations over EU–Korea Testbed." Electronics 8, no. 3 (2019): 338. http://dx.doi.org/10.3390/electronics8030338.

Full text
Abstract:
Today’s mobility management (MM) architectures, such as Mobile Internet Protocol (IP) and Proxy Mobile IP, feature integration of data and control planes, as well as centralized mobility control. In the existing architecture, however, the tight integration of the data and control planes can induce a non-optimal routing path, because data packets are delivered via a central mobility agent, such as Home Agent and Local Mobility Anchor. Furthermore, the centralized mobility control mechanism tends to increase traffic overhead due to the processing of both data and control packets at a central agent. To address these problems, a new Internet architecture for the future mobile network was proposed, named Mobile-Oriented Future Internet (MOFI). The MOFI architecture was mainly designed as follows: (1) separation of data and control planes for getting an optimal data path; (2) distributed identifier–locator mapping control for alleviating traffic overhead at a central agent. In this article, we investigate the validity of the MOFI architecture through implementation and experimentations over the European Union (EU)–Korea testbed network. For this purpose, the MOFI architecture is implemented using OpenFlow and Click Modular Router over a Linux platform, and then it is evaluated over the locally and internationally configured EU–Korea testbed network. In particular, we operate two realistic communication scenarios over the EU–Korea testbed network. From the experimentation results, we can see that the proposed MOFI architecture can not only provide the mobility management efficiently, but also support the backward compatibility for the current IP version 6 (IPv6) applications and an Internet Protocol network.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Diameter and Mobile IP integration"

1

Ventura, Håkan. "Diameter : Next generations AAA protocol." Thesis, Linköping University, Department of Electrical Engineering, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1195.

Full text
Abstract:
<p>The need for AAA protocols in the world are increasing and todays most common protocols RADIUS and TACACS+, cannot cope with the fast advances in fields benefiting from the use of AAA protocols. This is why IETF has developed the protocol Diameter as a next generations AAA protocol. The objective of this thesis is to account for the work conducted with Diameter as well as to determine if it is going to become the major AAA protocol of the next generation. In this thesis, I describe what Diameter is, its close integration with the Mobile IP protocol and its other uses. As Diameter is based on RADIUS an introduction to AAA and RADIUS is given in order to comprehend where we are today and where we are going as well as to why. I also compare today’s protocols (RADIUS, TACACS+, Kerberos and COPS) against the next generations AAA protocol Diameter. From this comparison, the Mobile IP integration capabilities and an analysis of the support of the Diameter protocol I have come to the conclusion that Diameter is going to become the major AAA protocol of the next generation.</p>
APA, Harvard, Vancouver, ISO, and other styles
2

Rácz, Péter. "A generic accounting configuration architecture for multi-service mobile networks." Aachen Shaker, 2008. http://d-nb.info/989384519/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chalamalasetty, Kalyani. "Architecture for IMS Security to Mobile:Focusing on Artificial Immune System and Mobile Agents Integration." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5795.

Full text
Abstract:
The IP Multimedia Subsystem (IMS) is an open IP based service infrastructure that enables an easy deployment of new rich multimedia services mixing voice and data. The IMS is an overlay network on top of IP that uses SIP as the primary signaling mechanism. As an emerging technology, the SIP standard will certainly be the target of Denial of Service (DoS) attacks and consequently IMS will also inherit this problem. The objective of proposed architecture for IMS is to cram the potential attacks and security threats to IP Multimedia Subsystem (IMS) and explore the security solutions developed by 3GPP. This research work incorporates the ideas of immune system and multiagent architecture that is capable of detecting, identifying and recovering from an attack. The proposed architecture protects IMS core components i.e. P-CSCF (Proxy- Call Session Control Function), I-CSCF (Interrogating-Call Session Control Function), S-CSCF (Serving Call Session Control Function) and HSS (Home Subscriber Server) from external and internal threats like eavesdropping, SQL injection and denial-ofservice (DoS) attacks. In the first level i.e. CPU under normal load all incoming and out going messages were investigated to detect and prevent SQL injection. Second level considers Denial of Service (DOS) attacks when CPU load exceeds threshold limit. Proposed architecture is designed and evaluated by using an approach called Architecture Tradeoff Analysis Method (ATAM). The results obtained confirm consistency of the architecture.<br>kalyani-0046737527800
APA, Harvard, Vancouver, ISO, and other styles
4

Švec, Michal. "Dohledový systém pro Internet Protocol Multimedia Subsystem." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220193.

Full text
Abstract:
The master’s thesis describes IMS (IP Multimedia Subsystem) in terms of IMS core ele- ments (functional description, different implementation, signaling etc.) Communication protocols SIP and DIAMETER, together with SNMP protocol, which is used for collecting data are briefly described in this thesis.Thesis is also describing various IMS projects to- gether with Open IMS project, for whom was this surveillance system designed. Next part deals with architecture design of surveillance system along with management options implemented in surveillance system for users and administrators. The main part of master’s thesis deals with the description of the surveillance system for the experimental school Open IMS network and describes the remote configuration of core elements and monitoring of network traffic, together with the monitoring servers performance. The most of the data in the designed surveillance system are processed into graphs, which are regularly updated. The final part of master’s thesis describes the configuration and implementation of monitoring tools MRTG and NfSen that were used in created web based surveillance system.
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Ren-Shiou, and 劉任修. "Integration of Mobile IP and RSVP." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/36734359707821326109.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊工程系<br>88<br>This thesis proposes a simple but effective method to incorporate RSVP (Resource ReSerVation Protocol) in the mobile computing environment without squandering too much network resources. Along with the booming telecommunication market, the PCS system is migrating from the 2.5 generation to the 3rd generation. Under the 3rd generation architecture, the traditional circuit switching backbone networks will be replaced with gigabits or terabits per second packet switching networks. As a consequence, both voice and data will be carried by packets transmitted in such a high speed network. However, packets may lose or delay because of traffic jams. In order to transport multimedia traffic of wireless mobile phones, QoS (quality of service) becomes an important issue. RSVP is a receiver oriented resource reservation protocol designed for an integrated services Internet. However, RSVP has being facing two great challenges owing to the operational characteristics of Mobile IP. First, due to IP-in-IP encapsulation, RSVP messages are invisible to the intermediate routers that comprise the tunnel. Second, after a mobile host moves to another location, the resources previously allocated to it can no longer be used. To overcome the impact of host mobility on service guarantees, we integrate mobile ip regional registration protocol and RSVP to form a hierarchical resource reservation architecture for mobile hosts. Simulation results show that our approach is promising.
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Ching-Yang, and 黃景洋. "Integration of NAT and Mobile IP." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/24223737921335037597.

Full text
Abstract:
碩士<br>國立清華大學<br>通訊工程研究所<br>91<br>As the number of mobile terminals increases, Mobile IP, the protocol defined by the IETF to enable mobility in IP layer, potentially could make users roam around the world while also keeps their connection to the Internet uninterruptedly. In the mean time, many organizations are using NAT (Network Address Translator) to isolate private network from public realms. The integration of NAT with Mobile IP, however, introduces technical issues that must be resolved before these two protocols can function together. This thesis points out the conflicts when Mobile IP and NAT are integrated and proposes effective techniques to harmonize these two critical protocols. Message flows are presented to detail our solution as well. A testbed is constructed in which our design is implemented. Experiments are conducted to verify our design and demonstrate the performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Ze-Home, and 李澤泓. "The Integration of Mobile-IP and Multicasting in IPv6 Environment." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/32115726031227228016.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學系<br>87<br>With the popularization of the Internet and multimedia applications, the multicast services are needed more and more. On the other hand, people desire their computer with high mobility. It is an important course to integrate multicasting and mobile system. But it has some problems to integrate these two systems in IPv4 environment. Some solutions have been proposed, but there still have some problems with these solutions. In IPv6 environment, with more elaborate design, it is easier to integrate multicasting and mobile systems. In this paper, we focus on the implementation of integrating these two systems in IPv6 environment.
APA, Harvard, Vancouver, ISO, and other styles
8

Chia-Ching, Shen, and 沈家慶. "Mobile IP and Ad Hoc Networks: An Integration and Implementation Experience." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/32844927192938180819.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊工程系<br>90<br>Mobile IP has been widely accepted as a standard to support IP mobility in a wireless Internet environment to keep a session connected when a mobile host roams from subnet to subnet. Another emerging wireless network architecture that is gaining more and more popularity is the {\it mobile ad hoc network (MANET)}, which can be flexibly deployed in almost any environment without the need of infrastructure base stations. In order to move to an all-IP environment, there seems to be growing demand to integrate these two architectures together. In this paper, we propose to extend the typical {\it wireless access points} to multiple clusters of MANETs, each as a subnet of the Internet, and discuss how to support Mobile IP in such environment. Such integration is beneficial to both societies. From Mobile IP's prospective, Foreign Agents' service areas are not limited to hosts within a single (wireless) hop any more. From MANET's prospective, mobile hosts can immediately enjoy tremendous services already existing on the Internet. This article reports our integration and implementation experience based on IEEE 802.11b wireless LANs. Issues such as overlapping of MANETs, dynamic adjustment of mobile agents' service coverages, support of local broadcast and various communication scenarios are addressed. Discussion also covers required adjustments of Mobile IP and pros and cons of layer-2 and layer-3 implementation of MANETs. Performance results are also reported.
APA, Harvard, Vancouver, ISO, and other styles
9

Yeh, Chun-Tsui, and 葉純翠. "The Case Study of the Introduction of Mobile Technologies and Integration of IP." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/33014893897802194396.

Full text
Abstract:
碩士<br>逢甲大學<br>經營管理碩士在職專班<br>99<br>Mobile Technologies and Integration of IP in recent years are a hot topic for enterprise, personal and the family. Enterprise imports the integration program to save communications costs, to solve the company internal problem, and to upgrade efficiency. Telecommunication Company, equipment suppliers, IT industry adapt to the demands and trends of development, and are vigorously promoting Mobile Technologies and Integration of IP. Enterprise through consolidation, communication, network, company internal process integration on the same platform, and can deliver real-time information at any time to device, Changed the way traditional management, and also improve the quality of service to users. Take this research review of information networking, communication, co- evolution of the digital convergence, to explore its benefits and future trends, to facilitate the subsequent development of the industry, find the appropriate strategies that to have the better competitive advantages!
APA, Harvard, Vancouver, ISO, and other styles
10

賴思耀. "Integration of 802.11 and Mobile IP in Authentication, Authorization, and Accounting (AAA) Architecture." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/17712014052206879456.

Full text
Abstract:
碩士<br>國立中興大學<br>電機工程學系<br>92<br>IEEE 802.11 Wireless LAN standard was ratified a few years ago and lots of vendors have engaged in the manufacture of Wireless LAN products compliant with 802.11. However, 802.11 did not specify how to implement Distribution System (DS).When mobile nodes roam among access points (AP) of different vendors, the context transfer used to keep connection uninterrupted may be failed. This will become a hurdle to widely deploy 802.11 Wireless LAN. In order to overcome this problem, 802.11f was proposed and specified a set of services that will enable multi-vendor access points to interoperate with each other. However, 802.11f only works when a mobile node roams in the same subnet. Once the mobile node moves across different subnets, data connection between terminals will break down. Originally engineered as a solution for Wireless LAN, Mobile IP enables a mobile node to move freely from one subnet to another without disrupting end-to-end connectivity. Besides, the AAA (Authentication, Authorization, and Accounting) architecture is essential for Internet Service Provider (ISP) to handle security and accounting considerations, especially when users roam among different administrative domains. For some big network domains, the mobile node’s current network attach point could be far away from its static home agent and would cause a long delay when registration request is processed. In this thesis, we first give an introduction to 802.11f and analyze the situation as 802.11f cooperates with Mobile IP. In order to improve both intra and inter domain roaming efficiency, we propose a theoretical model which integrates 802.11 and Mobile IP in AAA environment. We analyze the operation of the model and discuss what kinds of problem this model faces. In intra domain roaming, we make use of the “context pre-transfer model” to pre-establish 802.11 services for the user. In inter domain roaming, we also utilize “Simultaneous Handoff of Mobile IPv4 and 802.11” (SIMIP) to process 802.11 reassociation and Mobile IP registration at the same time. Furthermore, we use a new function of next generation AAA protocol, Diameter, to allocate a new home agent for the user to process subsequent Mobile IP registration locally.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Diameter and Mobile IP integration"

1

Nakhjiri, Mahsa, and Madjid Nakhjiri. AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility. Wiley & Sons, Incorporated, John, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility. Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Diameter and Mobile IP integration"

1

Chaphekar, Devendra, Bhisham Sonkar, and Gupteshwar Gupta. "Study of Framework of Mobile IP and MANET Integration." In Intelligent Computing, Networking, and Informatics. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1665-0_100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Byun, Tae-Young, and Moo-Ho Cho. "Integration of Mobile IP and NHRP over ATM Networks." In Web Technologies and Applications. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36901-5_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cabrera, A. Triviño. "Integration of Mobile Ad Hoc Networks into IP-Based Access Networks." In Computer Communications and Networks. Springer London, 2009. http://dx.doi.org/10.1007/978-1-84800-328-6_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Monedero, J. Hamilton Ortiz, and L. Javier García Villalba. "Integration of Protocols in Order to Provide Quality of Service in IP Mobile Networks." In Embedded and Ubiquitous Computing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30121-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Al-Doski, Lava N., Rabindra Ghimire, and Seshadri Mohan. "IP Multimedia Subsystem: Analysis of Scalability and Integration *." In Mobile Communications Handbook. CRC Press, 2017. http://dx.doi.org/10.1201/b12494-36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cortés-Polo, David, Jose-Luis González-Sánchez, Francisco J. Rodríguez-Pérez, and Javier Carmona-Murillo. "Mobile-Fixed Integration for Next-Generation Mobile Network." In Advances in Wireless Technologies and Telecommunication. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8732-5.ch018.

Full text
Abstract:
In recent years, the growth the in number of heterogeneous interconnected systems, as well as the emergence of new requirements in applications and services are progressively changing the original simplicity and transparency of the Internet architecture. When this architecture was designed, the main goal was to interconnect stationary host. Therefore, the appearance of mobile communications has made necessary to adapt traditional protocols in order to accommodate mobile users. This implies a new interaction between the mobile network and the fixed access network. This chapter describes the main IP mobility protocols and presents a novel classification, which relates the integration of the mobility protocol with the access network. The chapter also presents analytical models to evaluate the registration updates cost and the packet loss rate of the classified protocols.
APA, Harvard, Vancouver, ISO, and other styles
7

Hassan, Mahbub, and Sanjay Jha. "Voiceover IP." In Enterprise Networking. IGI Global, 2002. http://dx.doi.org/10.4018/978-1-930708-17-4.ch008.

Full text
Abstract:
As the name suggests, voice over Internet Protocol (VoIP) refers to the technology that allows transmission of voice over IP networks. Using VoIP, we can make telephone calls over the Internet or any IP-based corporate networks. With VoIP in place, the Internet does not remain a data-only network; it becomes a telephone network as well. So, what is the motivation for VoIP? There are several appealing reasons why we want this technology. The most compelling reason behind the emergence of this technology is the enormous cost savings through integration of both voice and data, two large revenue-making media for telecommunication companies, over the same communication infrastructure. The other major motivation for VoIP is the widespread adoption of IP platform. Today IP is a well-entrenched technology which is deployed in servers, routers, desktop PCs, laptops, and in many hand-held mobile devices, such as palmtops and PDAs. If voice signals could be transported over IP, then voice could be delivered to all these devices, making these devices much more useful than they already are. This chapter discusses several aspects of VoIP: (1) Advanced applications powered by VoIP, (2) the technical challenges and solutions for making VoIP a reality, (3) various VoIP configurations, and (4) the protocols and standards for VoIP. We conclude the chapter by discussing the future of VoIP.
APA, Harvard, Vancouver, ISO, and other styles
8

Ntantogian, Christoforos, and Christos Xenakis. "Security Architectures for B3G Mobile Networks." In Mobile Computing. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch203.

Full text
Abstract:
The integration of heterogeneous mobile/wireless networks using an IP-based core network materializes the beyond third generation (B3G) mobile networks. Along with a variety of new perspectives, the new network model raises new security concerns, mainly, because of the complexity of the deployed architecture and the heterogeneity of the employed technologies. In this chapter, we examine and analyze the security architectures and the related security protocols, which are employed in B3G networks focusing on their functionality and the supported security services. The objectives of these protocols are to protect the involved parties and the data exchanged among them. To achieve these, they employ mechanisms that provide mutual authentication as well as ensure the confidentiality and integrity of the data transferred over the wireless interface and specific parts of the core network. Finally, based on the analysis of the security mechanisms, we present a comparison of them that aims at highlighting the deployment advantages of each one and classifies the latter in terms of: (1) security, (2) mobility, and (3) reliability.
APA, Harvard, Vancouver, ISO, and other styles
9

Kasimatis, Panagiotis, and Dimitra Varla. "Mobile Telecom System Architectures—IMS an Evolution Path Towards IP Convergence." In Handbook of Research on Heterogeneous Next Generation Networking. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-108-7.ch010.

Full text
Abstract:
This chapter deals with the description of the various applied Mobile System Architectures, showing the evolution path towards the IP Convergence issue, with the introduction of the IP Multimedia Subsystem. It contains the most important networks entities of the different Mobile Networks Systems and their integration to the IMS. Being the core of the Fixed-Mobile Converge, IMS’ operation, functionality and interoperability with the other Telecom platforms are analyzed. Furthermore, aiming in a cost effective high QoS solution, typical performance evaluation strategies of the network manufacturers are described. Its scope is to give an overview of the existing architectures, their network components, their characteristics and their differences, while also show how nearly all traditional Telecom networks can be converged, with the use of the IMS, to an all-IP network, where various applications can be accessed by heterogeneous network platforms.
APA, Harvard, Vancouver, ISO, and other styles
10

Ntantogian, Christoforos, and Christos Xenakis. "Security Architectures for B3G Mobile Networks." In Handbook of Research on Wireless Security. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch019.

Full text
Abstract:
The integration of heterogeneous mobile/wireless networks using an IP-based core network materializes the beyond third generation (B3G) mobile networks. Along with a variety of new perspectives, the new network model raises new security concerns, mainly, because of the complexity of the deployed architecture and the heterogeneity of the employed technologies. In this chapter, we examine and analyze the security architectures and the related security protocols, which are employed in B3G networks focusing on their functionality and the supported security services. The objectives of these protocols are to protect the involved parties and the data exchanged among them. To achieve these, they employ mechanisms that provide mutual authentication as well as ensure the confidentiality and integrity of the data transferred over the wireless interface and specific parts of the core network. Finally, based on the analysis of the security mechanisms, we present a comparison of them that aims at highlighting the deployment advantages of each one and classifies the latter in terms of: (1) security, (2) mobility, and (3) reliability.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Diameter and Mobile IP integration"

1

Costa, I. "Network architecture for IP/PSTN/3G integration: the WINE GLASS proposal." In Second International Conference on 3G Mobile Communication Technologies (3G 2001). IEE, 2001. http://dx.doi.org/10.1049/cp:20010066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saha, Sumanta. "Deploying OMA Converged IP Messaging over IMS: Integration Plan and Architecture." In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.1264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gomez, Miguel, Emilio J. Torres, Javier Chamorro, Tomas Hernandez, and Eduardo Mendez. "On the integration and convergence of IN and IP mobile service infrastructures." In 2009 International Conference on Telecommunications. IEEE, 2009. http://dx.doi.org/10.1109/ictel.2009.5158634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hyejeong Lee, Sung Won Lee, and Dong-Ho Cho. "Mobility management based on the integration of mobile IP and session initiation protocol in next generation mobile data networks." In 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484). IEEE, 2003. http://dx.doi.org/10.1109/vetecf.2003.1285387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

McNerney, P. J. J., and Ning Zhang. "Towards an Integration of Security and Quality of Service in IP-Based Mobile Ad Hoc Networks." In 2011 IEEE Global Communications Conference (GLOBECOM 2011). IEEE, 2011. http://dx.doi.org/10.1109/glocom.2011.6133684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Velez Pulgarin, Marcela, Roch Glitho, and Alejandro Quintero. "An Overlay Gateway for the Integration of IP Multimedia Subsystem and Mobile Sink Based - Wireless Sensor Networks." In 2010 IEEE Vehicular Technology Conference (VTC 2010-Fall). IEEE, 2010. http://dx.doi.org/10.1109/vetecf.2010.5594531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mecham, Travis, Bruce Wilkerson, and Bryan Templeton. "Full Integration of SCADA, Field Control Systems and High Speed Hydraulic Models: Application Pacific Pipeline System." In 2000 3rd International Pipeline Conference. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/ipc2000-240.

Full text
Abstract:
Recent advances in PLC, SCADA and leak detection system technologies lead to the development of a highly integrated control system. Interconnected with fiber optic communication speeds (OC-1), this level of integration moves away from the historic model of stand-alone field controllers connected over low speed communication links to a centralized control center which, in turn, exchanges data from the host system to stand-alone leak detection processors. A new system design approach utilized familiar pipeline control elements such as PLC controllers and MODBUS communication protocols in combination with elements more typically associated with an office environment such as Windows NT servers, PC compatible computers, and Ethernet TCP/IP communications networks. These open-architecture components were used to fully develop, debug and test the SCADA system prior to system startup. The pipeline simulator is used as the centerpiece for this process to perform thorough operational validation of the system long before initial linefill. Once the various components were fully tested they were exported to the physical system in an operational state. The result is nearly seamless control systems supported by high data rates, high model speeds, common databases, and multi-channel communications. The increased level of integration has had dramatic impacts in leak detection, system safety, engineering development, operator training, and overall reliability of the control systems. The following paper presents a narrative overview of these new developments in the context of an implementation on Pacific Pipeline System (PPS). PPS is a recently constructed and commissioned 209 km (130 mile), 50.8 cm (20″) diameter, hot crude oil pipeline between the southern portion of California’s San Joaquin Valley and refineries in the Los Angeles basin. Following the Interstate 5 corridor over the “Grapevine”, Tejon Pass, Angeles National Forest and through heavily populated areas, this pipeline traverses some of the most environmentally and safety sensitive regions in the United States. The joint federal and state Environmental Impact Report / Environmental Impact Statement (EIR/EIS) set high hurdles for leak detection and control system performance. The historic control architecture and technologies were not adequate. This paper provides an overview of the environmental and physical constraints of the Pacific Pipeline System alignment, hydraulics, pumping and metering equipment, and block valve locations. It also discusses their impact on the design, programming and commissioning of a SCADA system meeting the requirements of the EIR/EIS. The paper then describes in more detail the fiber-optic communication system, control system architecture, SCADA system, leak detection models, simulator models and implementation methods, along with the engineering decisions leading to a comprehensive solution for the SCADA and leak detection requirements.
APA, Harvard, Vancouver, ISO, and other styles
8

Hubbard, Chase, Rob Hovsapian, and Srinivas Kosaraju. "Variable Speed Direct Drive Wind Controller for a Rim Driven Wind Turbine." In ASME 2012 6th International Conference on Energy Sustainability collocated with the ASME 2012 10th International Conference on Fuel Cell Science, Engineering and Technology. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/es2012-91334.

Full text
Abstract:
Multi-blade shaft driven wind turbines depend greatly on the angle of attack as an important factor that the control system monitors such that a maximum amount of aerodynamic force is seen by the rotor blades. This is one significant difference when controlling a Rim Driven Wind Turbine (RDWT). The controller for a RDWT is required to simply point the tower such that it is facing the wind for maximum power generation. This is achieved by incorporating a Variable Speed Direct Drive (VSDD) wind operation control system to control the power production and safe operation of the RDWT. Another consideration for the control system is its integration with the generator. Since the power generation is rim driven, thus operating at a higher variable speed. With information related to the wind turbine’s diameter and the wind speed at any given time it can be calculated how much power can be potentially generated. This can then be in turn relayed to the generator from the wind turbine controller. This information can be relayed using controller-controller communication (such as an analog voltage signal or protocol based communication such as MODBUS RTU or TCP/IP) representing the power coefficient from Betz’ Law. A feasibly controllable system implements a signal from the overall wind turbine controller that in turn supplies the generator with how much power is available in the system to maximize power generation for a broad range of traditionally unrealizable wind conditions (3 m/s to 30 m/s). Rim Driven Wind Turbines represent an evolution in fundamental design of how the wind can be harnessed for power. This paper will discuss the VSDD’s unique design and aspects of maintaining controllability thorough out the overall system operation.
APA, Harvard, Vancouver, ISO, and other styles
9

Ahamed, Mohammad Shahed, Yuji Saito, Masataka Mochizuki, and Koichi Mashiko. "Hot Spot Elimination by Thin and Smart Heat Spreader." In ASME 2015 International Technical Conference and Exhibition on Packaging and Integration of Electronic and Photonic Microsystems collocated with the ASME 2015 13th International Conference on Nanochannels, Microchannels, and Minichannels. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/ipack2015-48019.

Full text
Abstract:
Heat pipes are recognized as an excellent heat transport devices and extensively investigated for applications in electronic cooling. Different types of heat pipes have been developed such as micro/miniature heat pipes, loop heat pipes and so on, and these heat pipes have been widely applied in the field of electronics cooling such as notebook, desktop, data center; as well as aerospace, industrial cooling field. However, in recent years the application of heat pipe is widening to the filed of hand held mobile electronic devices such as smart phone, tablet pc, digital camera etc. With the development in technology these devices have different user friendly functions and capabilities, which requires the highest processor clock speed. In general, high clock speed of processor generates lot of heat which need to be spread or removed to eliminate the hot spot. It becomes a challenging task to cool such electronic devices as mentioned above with a very confined space and concentrated heat sources. Regarding to this challenge, ultra thin flat heat pipe is developed; this newly developed heat pipe consists of a special fiber wick structure which can ensure vapor spaces on the two sides of the wick structure. In this paper a novel thin spreader is proposed to eliminate the hot spot; generally the proposed heat spreader consists of 0.20mm thick metal plate and ultra thin heat pipe of 0.40mm thickness soldered in its body. Maximum thickness of this spreader is 0.63mm. Metal plate is 60mm × 110mm in size; and the ultra thin heat pipe can be fabricated from different original diameter ranges from 2.0mm to 3.0mm Cu tube. Theoretical and experimental analysis have been done to evaluate this thin spreader. In addition, some real application of this spreader will be introduced in this paper.
APA, Harvard, Vancouver, ISO, and other styles
10

Imrie, Andrew, Maciej Kozlowski, Omar Torky, and Aditya Arie Wijaya. "Full Well Corrosion Insight – Case Studies in the Added Value of Electromagnetic Thickness Measurements During Well Interventions." In SPE/ICoTA Well Intervention Conference and Exhibition. SPE, 2021. http://dx.doi.org/10.2118/204431-ms.

Full text
Abstract:
Abstract Monitoring pipe corrosion is one of the critical aspects in the well intervention. Such analysis is used to evaluate and justify any remedial actions, to prolong the longevity of the well. Typical corrosion evaluation methods of tubulars consist of multifinger caliper tools that provide high-resolution measurements of the internal condition of the pipe. Routinely, this data is then analyzed and interpreted with respect to the manufacture's nominal specification for each tubular. However, this requires assumptions on the outer diameter of the tubular may add uncertainty, and incorrectly calculate the true metal thicknesses. This paper will highlight cases where the integration of such tool and electromagnetic (EM) thickness data adds value in discovering the true condition of both the first tubular and outer casings. These case studies demonstrate the use of a multireceiver, multitransmitter electromagnetic (EM) metal thickness tool operating at multiple simultaneous frequencies. It is used to measure the individual wall thickness across multiple strings (up to five) and operates continuously, making measurements in the frequency domain. This tool was combined with a multifinger caliper to provide a complete and efficient single-trip diagnosis of the tubing and casing integrity. The combination of multifinger caliper and EM metal thickness tool results gives both internal and external corrosion as well as metal thickness of first and outer tubular strings. The paper highlights multiple case studies including; i) successfully detecting several areas of metal loss (up to greater than 32%) on the outer string, which correlated to areas of the mobile salt formation, ii) overlapping defects in two tubulars and, iii) cases where a multifinger caliper alone doesn't provide an accurate indication of the true wall thickness. The final case highlights the advantages of integrating multiple tubular integrity tools when determining the condition of the casing wall. Metal thickness tools operating on EM principles benefit from a slim outer diameter design that allows the tools to pass through restrictions which typically would prevent ultrasonic scanning thickness tools. Additionally, EM tools are unaffected by the type of fluid in the wellbore and not affected by any non-ferrous scale buildup that may present in the inside of the tubular wall. Combinability between complementary multifinger caliper technology and EM thickness results in two independent sensors to provide a complete assessment of the well architecture.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography