Service Discovery in Wireless and Mobile Networks

2011 ◽  
pp. 251-272
Author(s):  
Hitha Alex ◽  
Mohan Kumar ◽  
Behrooz A. Shirazi

Service discovery is an important component of wireless and mobile network systems. An efficient service discovery mechanism would ensure high availability of services to users and applications, and high utilization of services. In this chapter, we discuss various issues and challenges facing the design and selection of a proper service discovery mechanism. This chapter also investigates service discovery mechanisms such as SLP, Jini, Salutation, and others, and assesses their suitability for applications in wireless and mobile environments.

Author(s):  
G. Manohar ◽  
D. Kavitha ◽  
S. Sreedhar

Intermittently connected mobile Network systems represent a challenging environment for networking research, due to the problems of ensuring messages delivery in spite of frequent disconnections and random meeting patterns. These networks fall into general category of Delay Tolerant Networks. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this context, traditional routing schemes fail, because they try to establish complete end-to-end paths, before any packet is sent. To deal with such networks, researches introduced flooding based routing schemes which leads to high probability of delivery. But the flooding based routing schemes suffered with contention and large delays. Here the proposed protocol “Spraying with performed by a node upon reception of an Acknowledgment message”, sprays a few message copies into the network, neighbors receives a copy and by that relay nodes we are choosing the shortest route and then route that copy towards the destination, if packets reach its destination which that node diffuse Acknowledment with Autonomic behaviour and discard messages. Previous works assumption is that there is no contention and unreachable nodes. But we argue that contention and unreachable nodes must be considered for finding efficiency in routing. So we are including a network which has contention and unreachable nodes and we applied the proposed protocol. So, we introduce new routing mechanism for Diffusion Based Efficient Spray Routing in Intemittently Connected Mobile Networks with Multiple Copies.


Mobile communication systems were initially designed to carry voice traffic with limited support for packet and messaging services. The constant increase in demand for packet traffic evolved the mobile networks to ultimately become data pipes with support for mobility. While the mobile applications changed dramatically over time, the fundamental principles for mobile service delivery remain the same to a large extend in every network generation. These principles are important to form the investigative context and identify the sources of network evidence with the highest probative value. This chapter details the mobile service delivery fundamentals together with the key features implemented in each mobile network generation. In practice, the sources of mobile network evidence belong to network segments from different generations; therefore, the fundamentals are necessary to establish an effective forensics plan and maximize the investigative outcome.


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


Author(s):  
Elarbi Abderraouf ◽  
Abdesselam Bassou ◽  
Mohamed Rida Lahcene Rida Lahcene

<p>Thanks to the success of smart phones and mobile-ready laptops, data traffic has recently grown exponentially, and the demand for mobile data has risen very dramatically. These requests in large capacity can only be satisfied by a high efficiency and a very good optimization of the infrastructures of the mobile networks, while taking into account the constraints which are the power, bandwidth and a limited complexity. The task of developing mobile technologies has also evolved from a national or regional focus to a complex and growing mission, supported by global standards development organizations such as 3GPP (3rd Group Partnership Project). Through this research, we present everything related to the simulation of the 4G mobile network system (LTE), which can provide high data flow with good quality, through three model channels known as (EPA, EVA, ETU). In this work we focus on the block ‘iterative decoding channel encoder’ in the LTE system, where the iterative channel coding called ‘Turbo-code’ (TC) is substituted by the iterative coding channel called ‘Unpunctured Turbo Trellis-coded Modulation’ (UTTCM). The simulation results showed that with less decoding complexities, UTTCM's LTE system gives good performance (in terms of BER).</p>


Author(s):  
Marzook Khatri

Abstract: The deployment of 5G mobile communication networks is just getting started right now. There are numerous technologies available today, each capable of fulfilling activities such as enabling voice traffic via voice over IP (VoIP), providing broadband data access in mobile environments, and so on. However, there is a pressing need to implement technology that can bring all of these systems together into a single unified system. Because it is all about smoothly integrating terminals, networks, and applications, 8G presents a solution to this dilemma. In this work, an attempt is made to provide a study of various cellular technologies, such as 4G, 5G, 6G, 7G, and FG, as well as a detailed comparison between them. With the introduction of network virtualization and the implementation of 5G/IoT, mobile networks will become more complicated and offer more diverse services. This raises concerns about a considerable increase in the workload of network operations. Meanwhile, artificial intelligence (AI) is advancing rapidly and is projected to alleviate human resource shortages in a variety of industries. Similarly, the mobile industry is gaining traction in the application of artificial intelligence (AI) to network operations in order to improve the efficiency of mobile network operations. This paper will address the idea of using AI technology to network operations and will give various use examples to demonstrate that AI-driven network operations have a bright future. Keywords: 5G & 6G networks, Artificial Intelligence, Next generation network, Future Advancement.


2020 ◽  
Vol 8 (5) ◽  
pp. 2040-2044

The cloud technologies are gaining boom in the field of information technology. But on the same side cloud computing sometimes results in failures. These failures demand more reliable frameworks with high availability of computers acting as nodes. The request made by the user is replicated and sent to various VMs. If one of the VMs fail, the other can respond to increase the reliability. A lot of research has been done and being carried out to suggest various schemes for fault tolerance thus increasing the reliability. Earlier schemes focus on only one way of dealing with faults but the scheme proposed by the the author in this paper presents an adaptive scheme that deals with the issues related to fault tolerance in various cloud infrastructure. The projected scheme uses adaptive behavior during the selection of replication and fine-grained checkpointing methods for attaining a reliable cloud infrastructure that can handle different client requirements. In addition to it the algorithm also determines the best suited fault tolerance method for every designated virtual node. Zheng, Zhou,. Lyu and I. King (2012).


2020 ◽  
Vol 17 (1) ◽  
pp. 51-70
Author(s):  
Jesús Calle-Cancho ◽  
José-Manuel Mendoza-Rubio ◽  
José-Luis González-Sánchez ◽  
David Cortés-Polo ◽  
Javier Carmona-Murillo

The number of mobile subscribers, as well as the data traffic generated by them, is increasing exponentially with the growth of wireless smart devices and the number of network services that they can support. This significant growth is pushing mobile network operators towards new solutions to improve their network performance and efficiency. Thus, the appearance of Software Defined Networking (SDN) can overcome the limitations of current deployments through decoupling the network control plane from the data plane, allowing higher flexibility and programmability to the network. In this context, the process of handling user mobility becomes an essential part of future mobile networks. Taking advantage of the benefits that SDN brings, in this article we present a novel mobility management solution. This proposal avoids the use of IP-IP tunnels and it adds the dynamic flow management capability provided by SDN. In order to analyse performance, an analytical model is developed to compare it with NB-DMM (Network-based DMM), one of the main DMM (Distributed Mobility Management) solutions. Additionally, performance is also evaluated with an experimental testbed. The results allow handover latency in real scenarios and numerical investigations to be measured, and also show that SR-DMM achieves better efficiency in terms of signaling and routing cost than NB-DMM solution.


Sign in / Sign up

Export Citation Format

Share Document