2018
DOI: 10.14569/ijacsa.2018.090562
|View full text |Cite
|
Sign up to set email alerts
|

Mobility Management Using the IP Protocol

Abstract: Time critical applications, such as VoIP and video conferencing require Internet connectivity all of the time for better performance. Moreover, in case of vehicular networks, it is very common for mobile devices to move from one network to another. In such scenarios the sudden changes in the network connectivity may cause problems, which affects the data transmission rate. The movement of a mobile node from one network to another is also a challenge for the routers to maintain the routing information as well a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…The identifier allows for geographical mapping of the devices while allowing the transfer and receipt of specific information within a network. It also facilitates search engine optimization for particular devices when using the Internet (Halepoto et al, 2018). IP works over wired communications such as Ethernet and wireless connections, including WIFI, 4G, 3G and LTE.…”
Section: Ip Enabled and Wireless Connectivitymentioning
confidence: 99%
“…The identifier allows for geographical mapping of the devices while allowing the transfer and receipt of specific information within a network. It also facilitates search engine optimization for particular devices when using the Internet (Halepoto et al, 2018). IP works over wired communications such as Ethernet and wireless connections, including WIFI, 4G, 3G and LTE.…”
Section: Ip Enabled and Wireless Connectivitymentioning
confidence: 99%
“…This kind of situation is called the receiver buffer blocking. Many researchers reported the problem of receiver buffer blocking while using TCP [7], [8], [9], [18], [19]. The researchers also suggested the use of retransmission policies for the transmission missing data of one process.…”
Section: Related Workmentioning
confidence: 99%