Lessons Learned on the Operation of the LoST Protocol for Mobile IP-Based Emergency Calls

Author(s):  
Ana Goulart ◽  
Anna Zacchi ◽  
Bharath Chintapatla ◽  
Walt Magnussen

The technology used in citizen-to-authority emergency calls is based on traditional telephony, that is, circuit-switched systems. However, new standards and protocols are being developed by the Internet Engineering Task Force (IETF) to allow emergency communications over packet switched networks, such as the Internet. This architecture is known as Next Generation-9-1-1 (NG-911). In this paper, the authors present lessons learned from experiments on the IETF standard called Location to Service Translation protocol (LoST). LoST maps the user’s location to the address of the emergency call center that serves that location. After implementing the standards in a test-bed with real-world systems, spatial databases, and communication networks, the authors observed performance issues that users may experience. Based on their observations, the authors propose practical ideas to improve the performance of the NG-911 system and LoST protocol operation for mobile users.

Author(s):  
Ana Goulart ◽  
Anna Zacchi ◽  
Bharath Chintapatla ◽  
Walt Magnussen

The technology used in citizen-to-authority emergency calls is based on traditional telephony, that is, circuit-switched systems. However, new standards and protocols are being developed by the Internet Engineering Task Force (IETF) to allow emergency communications over packet switched networks, such as the Internet. This architecture is known as Next Generation-9-1-1 (NG-911). In this paper, the authors present lessons learned from experiments on the IETF standard called Location to Service Translation protocol (LoST). LoST maps the user’s location to the address of the emergency call center that serves that location. After implementing the standards in a test-bed with real-world systems, spatial databases, and communication networks, the authors observed performance issues that users may experience. Based on their observations, the authors propose practical ideas to improve the performance of the NG-911 system and LoST protocol operation for mobile users.


Author(s):  
Ling Lin ◽  
Antonio Liotta

The growth of the Internet and its popular services are forcing telecom operators to provide advanced services to their subscribers, as traditional voice services are no longer enough to attract more customers. To enable more innovative and value-added IP services and take advantage of the services that the Internet provides, the IP Multimedia Subsystem (IMS) is introduced. The IMS provides a complete access-agnostic architecture and framework that facilitates the convergence of the mobile network, removing the gap between the two most successful communication networks: cellular and Internet network. The harmonized All-IP platform has the potential to provide all Internet services with a more cost-effective and more efficient architecture than the circuit-switched networks do. However, by merging two of the most successful networks, the integration of two network models with different concerns and motivations is not without its problems, among which, the scalability issue is the most essential when supporting content delivery services. The purpose of this chapter is to study and design a new content delivery network infrastructure, PeerMob, merging the Peer-to-Peer technology with the IMS framework, which benefits IMS with scalability, reliability, and efficiency features coming with decentralized P2P architecture. The chapter also puts this P2P IMS paradigm under realistic network conditions and strenuous simulation to evaluate the performance of the P2P IMS system.


Author(s):  
GEETHANJALI. N ◽  
BRINDHA. G ◽  
DEENU MOL.A ◽  
SINDHU. M

Mobile Internet Protocol has been proposed by Internet Engineering Task Force (IETF) to support portable IP addresses for mobile devices that often change their network access points to the Internet. In the basic mobile IP protocol, datagrams sent from wired or wireless hosts and destined for the mobile host that is away from home, have to be routed through the home agent. Nevertheless, datagrams sent from mobile hosts to wired hosts can be routed directly. This asymmetric routing, called “triangle routing,” is often far from optimal and “route optimization” has been proposed to address this problem. In this paper, we present the deep description and implementation of “route optimization”, Authentication extension to mobile IP in the ns-2 simulator. We illustrate simulations of the mobile IP with route optimization with simulation scenarios, parameters, and simulations results.


2019 ◽  
Vol 20 (8) ◽  
pp. 800-807 ◽  
Author(s):  
Jose Luis Marzo ◽  
Josep Miquel Jornet ◽  
Massimiliano Pierobon

By interconnecting nanomachines and forming nanonetworks, the capacities of single nanomachines are expected to be enhanced, as the ensuing information exchange will allow them to cooperate towards a common goal. Nowadays, systems normally use electromagnetic signals to encode, send and receive information, however, in a novel communication paradigm, molecular transceivers, channel models or protocols use molecules. This article presents the current developments in nanomachines along with their future architecture to better understand nanonetwork scenarios in biomedical applications. Furthermore, to highlight the communication needs between nanomachines, two applications for nanonetworks are also presented: i) a new networking paradigm, called the Internet of NanoThings, that allows nanoscale devices to interconnect with existing communication networks, and ii) Molecular Communication, where the propagation of chemical compounds like drug particles, carry out the information exchange.


2021 ◽  
Vol 51 (3) ◽  
pp. 29-32
Author(s):  
Michael Welzl ◽  
Stephan Oepen ◽  
Cezary Jaskula ◽  
Carsten Griwodz ◽  
Safiqul Islam

RFC 9000, published in May 2021, marks an important milestone for the Internet's standardization body, the Internet Engineering Task Force (IETF): finally, the specification of the QUIC protocol is available. QUIC is the result of a five-year effort - and it is also the second of two major protocols (the first being SPDY, which later became HTTP/2) that Google LLC first deployed, and then brought to the IETF for standardization. This begs the question: when big players follow such a "shoot first, discuss later" approach, is IETF collaboration still "real", or is the IETF now being (mis-)used to approve protocols for standardization when they are already practically established, without really actively involving anyone but the main proponents?


Sign in / Sign up

Export Citation Format

Share Document