International Workshop on Engineering of Software Services for Pervasive Environments: In Conjunction With the 6th ESEC/FSE Joi 2007
DOI: 10.1145/1294904.1294910
|View full text |Cite
|
Sign up to set email alerts
|

Mobility management in B3G networks

Abstract: The B3G (Beyond 3G) networking will enable mobile users to roam freely through heterogeneous networks on an all-IP platform. However, mobility handling in such an environment poses new challenges. Traditionally, mobility protocols such as Mobile IP, SIP and SCTP are used to manage mobility in B3G, but they require telecommunication companies to either modify existing network infrastructures or deploy central entities in the network core to handle mobility. This is not feasible in a fully distributed computing … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2009
2009
2012
2012

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Mobility management enables users to roam freely. It is classified into two groups: telecom-based and service-oriented [4]. Telecom based mobility management can be performed in three layers: application layer (e.g.…”
Section: Related Work and Solutionmentioning
confidence: 99%
See 1 more Smart Citation
“…Mobility management enables users to roam freely. It is classified into two groups: telecom-based and service-oriented [4]. Telecom based mobility management can be performed in three layers: application layer (e.g.…”
Section: Related Work and Solutionmentioning
confidence: 99%
“…Stream Control Transmission Protocol) and network layer (Mobile IP V4 and V6, eAll-SIP [10]). Consolidating the Telecom-based and service-oriented approaches, [4] presents a middleware-based approach for mobility management. However, our approach is very similar to the application layer approach; it is specific to real-time communication services.…”
Section: Related Work and Solutionmentioning
confidence: 99%
“…The communication between two devices is always secured with SSL. Users can define criteria, such as low-cost or high-speed, to influence the decision of choosing a network interface over another or they can explicitly choose a particular interface [15]. It will not always be possible to have all the network interfaces available for communication, in those case user choices will be limited.…”
Section: A Core Modulesmentioning
confidence: 99%