The 1st IEEE Workshop on VoIP Management and Security : VoIP MaSe 2006 : securing and managing VoIP communications |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2006 |
Disciplina | 004.695 |
Soggetto topico |
Internet telephony - Management
Internet telephony - Security measures Telecommunications Electrical & Computer Engineering Engineering & Applied Sciences |
ISBN | 1-5090-9403-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996207695303316 |
[Place of publication not identified], : IEEE, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
The 1st IEEE Workshop on VoIP Management and Security : VoIP MaSe 2006 : securing and managing VoIP communications |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2006 |
Disciplina | 004.695 |
Soggetto topico |
Internet telephony - Management
Internet telephony - Security measures Telecommunications Electrical & Computer Engineering Engineering & Applied Sciences |
ISBN | 1-5090-9403-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145626503321 |
[Place of publication not identified], : IEEE, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Internet protocol-based emergency services / / Henning Schulzrinne |
Autore | Schulzrinne Henning |
Pubbl/distr/stampa | Chichester, West Sussex : , : John Wiley & Sons Inc., , 2013 |
Descrizione fisica | 1 online resource (797 p.) |
Disciplina | 004.67/8 |
Altri autori (Persone) |
TschofenigHannes
SchulzrinneHenning |
Soggetto topico |
Computer network protocols
Emergency communication systems Internet Public safety radio service |
ISBN |
1-119-99385-7
1-119-99384-9 1-118-65247-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
-- List of Figures xiii -- List of Tables xvii -- List of Contributors xix -- Preface xxi -- Acknowledgments xxv -- Acronyms xxvii -- 1 Introduction 1 -- 1.1 History 1 -- 1.2 Overview 5 -- 1.3 Building Blocks 8 -- 1.3.1 Recognizing Emergency Calls 8 -- 1.3.2 Obtaining and Conveying Location Information 9 -- 1.3.3 Routing Emergency Calls 9 -- 2 Location: Formats, Encoding and Protocols 11 -- 2.1 Applying the PIDF-LO civicAddress Type to US Addresses 14 -- 2.1.1 Introduction: The Context and Purpose of PIDF-LO and CLDXF 15 -- 2.1.2 CLDXF Elements 17 -- 2.1.3 Conclusion 30 -- 2.2 DHCP as a Location Configuration Protocol (LCP) 31 -- 2.2.1 What's New in RFC 6225? 32 -- 2.2.2 DHCPv4 and DHCPv6 Option Formats 32 -- 2.2.3 Option Support 35 -- 2.2.4 Latitude and Longitude Fields 36 -- 2.2.5 Altitude 36 -- 2.2.6 Datum 37 -- 2.3 Geography Markup Language (GML) 37 -- 2.3.1 Introduction 37 -- 2.3.2 Overview of the OGC 38 -- 2.3.3 The OGC Geography Markup Language (GML) 38 -- 2.3.4 Conclusion 47 -- 2.4 A Taxonomy of the IETF HELD Protocol 47 -- 2.4.1 The LIS and HELD 48 -- 2.4.2 LIS Discovery 48 -- 2.4.3 Basic HELD 53 -- 2.4.4 HELD Target Identities and Third-Party Requests 59 -- 2.4.5 HELD Measurements 62 -- 2.4.6 HELD as a Dereference Protocol 64 -- 2.4.7 HELD Policy URIs 66 -- 2.4.8 HELD Device Capabilities 69 -- 2.5 OMA Enablers and Emergency Services 72 -- 2.5.1 SUPL 73 -- 2.5.2 MLS 84 -- 2.5.3 MLP 85 -- 2.5.4 LOCSIP 89 -- 2.6 3GPP Location Protocols 92 -- 2.6.1 Introduction 92 -- 2.6.2 Location Technology in 3GPP Networks 93 -- 2.6.3 Emergency Location Information in 3GPP CS Domain, Control Plane 100 -- 2.6.4 Emergency Location Information in the IMS 100 -- 3 Architectures 103 -- 3.1 NENA i2 104 -- 3.1.1 Background 104 -- 3.1.2 The i2 Architecture 105 -- 3.1.3 Regulatory Situation and Deployment Status 117 -- 3.2 NENA i3 119 -- 3.2.1 History 119 -- 3.2.2 Emergency Services IP Networks 120 -- 3.2.3 Signaling and Routing IP-Originated Calls 121 -- 3.2.4 Legacy Wireline and Wireless Origination 122.
3.2.5 Emergency Events 123 -- 3.2.6 Routing Calls Within the ESInet 123 -- 3.2.7 Provisioning the ECRF 124 -- 3.2.8 PSAPs 125 -- 3.2.9 Other i3 Features 126 -- 3.3 IETF Emergency Services for Internet Multimedia 126 -- 3.3.1 Introduction 126 -- 3.3.2 Recognizing Emergency Calls 128 -- 3.3.3 Obtaining and Conveying Location Information 128 -- 3.3.4 Routing Emergency Calls 129 -- 3.3.5 Obligations 130 -- 3.3.6 LoST Mapping Architecture 132 -- 3.3.7 Steps Toward an IETF Emergency Services Architecture 135 -- 3.3.8 Summary 138 -- 3.4 Emergency Services Support in WiFi Networks 139 -- 3.4.1 Introduction 139 -- 3.4.2 Location Configuration 140 -- 3.4.3 Support for Emergency Services 141 -- 3.4.4 Support for Emergency Alert Systems 142 -- 3.5 WiMAX 142 -- 3.5.1 The WiMAX Network Architecture 143 -- 3.5.2 Network Architecture for Emergency Services Support 148 -- 3.5.3 The Fundamental Building Blocks 150 -- 3.5.4 Roaming Considerations and Network Entry 152 -- 3.5.5 Limited Access 154 -- 3.5.6 Location Support in WiMAX 157 -- 3.5.7 Conclusion 163 -- 3.6 3GPP 163 -- 3.6.1 Introduction 163 -- 3.6.2 Requirements 164 -- 3.6.3 Emergency Calls in the CS Domain 169 -- 3.6.4 Emergency Calls in PS Domain 176 -- 3.6.5 Identified Overload Problems 189 -- 4 Deployment Examples 193 -- 4.1 Emergency Calling in Sweden 195 -- 4.1.1 Introduction 195 -- 4.1.2 Overview 196 -- 4.1.3 Protocols for PSAP Interconnection 198 -- 4.1.4 Protocol Standards 200 -- 4.1.5 Media 201 -- 4.1.6 Emergency Call Routing 201 -- 4.1.7 Testing 201 -- 4.1.8 Examples 201 -- 4.2 UK Specification for Locating VoIP Callers 209 -- 4.2.1 Introduction 209 -- 4.2.2 The Regulatory Environment 209 -- 4.2.3 Standards Development 210 -- 4.2.4 The Current UK Emergency Services Structure 210 -- 4.2.5 Principles Driving the Specification 211 -- 4.2.6 Putting It All Together 213 -- 4.2.7 Implications for Access Network Providers 215 -- 4.3 Implementation of VoIP 9-1-1 Services in Canada 216 -- 4.3.1 Regulatory Framework (About the CRTC) 217. 4.3.2 Canada's Telecom Profile 217 -- 4.3.3 Interim Solution for Nomadic and Fixed/Non-Native VoIP 220 -- 4.3.4 The (Defunct) Canadian i2 Proposal 222 -- 4.3.5 VoIP Regulatory Processes, Decisions and Milestones 227 -- 4.3.6 Lessons Learned 229 -- 4.3.7 Conclusion 230 -- 4.4 US/Indiana Wireless Direct Network Project 230 -- 4.4.1 Background and History of the IWDN 231 -- 4.4.2 The IWDN Crossroads Project 231 -- 4.4.3 The IN911 IP Network 232 -- 4.4.4 Conclusion 235 -- 5 Security for IP-Based Emergency Services 237 -- 5.1 Introduction 237 -- 5.2 Communication Model 238 -- 5.3 Adversary Models and Security Threats 240 -- 5.4 Security Threats 241 -- 5.4.1 Denial-of-Service Attacks 242 -- 5.4.2 Attacks Involving the Emergency Identifier 242 -- 5.4.3 Attacks Against the Mapping System 243 -- 5.4.4 Attacks Against the Location Information Server 244 -- 5.4.5 Swatting 245 -- 5.4.6 Attacks to Prevent a Specific Individual From Receiving Aid 246 -- 5.4.7 Attacks to Gain Information About an Emergency 246 -- 5.4.8 Interfering With the LIS and LoST Server Discovery Procedure 246 -- 5.4.9 Call Identity Spoofing 247 -- 5.5 Countermeasures 248 -- 5.5.1 Discovery 248 -- 5.5.2 Secure Session Setup and Caller Identity 250 -- 5.5.3 Media Exchange 251 -- 5.5.4 Mapping Database Security 251 -- 6 Emergency Services for Persons With Disabilities 253 -- 6.1 What Is Specific with Communication for People with Disabilities? 253 -- 6.1.1 Important Characteristics of Regular Voice Telephony 253 -- 6.1.2 Important Characteristics of Accessible Conversational Services Suitable for People with Disabilities 254 -- 6.2 Reality Today 255 -- 6.3 Interpretation of the Term “Equivalent Service” 255 -- 6.4 Sad History 256 -- 6.5 Policy and Regulation Support 256 -- 6.5.1 UN Convention on the Rights of Persons with Disabilities 256 -- 6.5.2 The European Union Universal Service Directive 257 -- 6.5.3 The Telecom Act and Public Procurement Act in the United States 257 -- 6.5.4 Americans With Disability Act 257. 6.5.5 Relay Service Regulation in the United States 258 -- 6.6 Good Opportunities in IP-Based Services 258 -- 6.7 Implementation Experience 260 -- 7 Regulatory Situation 261 -- 7.1 Regulatory Aspects of Emergency Services in the United States 262 -- 7.1.1 Introduction 262 -- 7.1.2 Background 262 -- 7.1.3 E9-1-1 Requirements 263 -- 7.2 Regulatory Aspects of Emergency Services in the European Union 266 -- 7.2.1 Introduction 266 -- 7.2.2 Regulatory Development of Emergency Services Under EU Law 267 -- 7.2.3 Current Legal Framework 267 -- 7.2.4 New Legal Framework 274 -- 7.2.5 Emergency Regulation Outside of the EU Telecom Regulatory Framework 276 -- 7.2.6 Conclusion 276 -- 8 Research Projects and Pilots 279 -- 8.1 REACH112: Responding to All Citizens Needing Help 280 -- 8.1.1 Outline 280 -- 8.1.2 Emergency Service Access 282 -- 8.1.3 The Obstacles 284 -- 8.1.4 Conclusion 288 -- 8.2 PEACE: IP-Based Emergency Applications and Services for Next-Generation Networks 288 -- 8.2.1 Introduction 288 -- 8.2.2 Project Scope 289 -- 8.2.3 Development Status 291 -- 8.3 US Department of Transportation's NG 9-1-1 Pilot Project 298 -- 8.3.1 Overview 298 -- 8.3.2 Proof-of-Concept Description 300 -- 8.3.3 Testing 313 -- 8.3.4 Conclusion 317 -- 9 Organizations 321 -- 9.1 ETSI EMTEL 322 -- 9.1.1 Purpose of ETSI Special Committee EMTEL (Emergency Communications) 322 -- 9.1.2 Main Features of EMTEL 322 -- 9.1.3 Scope of ETSI SC EMTEL Work 323 -- 9.1.4 Operation and Activities of SC EMTEL 324 -- 9.1.5 EMTEL Evolution and Strategy 324 -- 9.1.6 Vision for Future Emergency Services 325 -- 9.2 NENA 326 -- 9.3 EENA 327 -- 9.3.1 What Is EENA? 327 -- 9.3.2 What EENA Does? 327 -- 9.3.3 What Are the EENA Memberships? 328 -- 9.4 Ecma International 330 -- 9.4.1 Ecma International 330 -- 9.4.2 Ecma Technical Committee TC32 331 -- 9.4.3 ECMA TR/101, Next Generation Corporate Networks (NGCN) / Emergency Calls 331 -- 9.5 ATIS 332 -- 9.5.1 Emergency Services Interconnection Forum (ESIF) 332 -- 9.5.2 Next-Generation Emergency Services (NGES) Subcommittee 333. 9.5.3 Example ESIF Issues 334 -- 9.5.4 Summary 336 -- 9.6 The NG9-1-1 Caucus and the NG9-1-1 Institute 336 -- 9.7 COCOM EGEA 338 -- 10 Conclusion and Outlook 341 -- 10.1 Location 341 -- 10.2 Architectures 342 -- 10.3 Deployments 343 -- 10.4 Security and Privacy 344 -- 10.5 Emergency Services for Persons with Disabilities 344 -- 10.6 Regulation 345 -- 10.7 Research Projects and Pilots 345 -- 10.8 Funding 346 -- References 349 -- Index 363. |
Record Nr. | UNINA-9910139054803321 |
Schulzrinne Henning | ||
Chichester, West Sussex : , : John Wiley & Sons Inc., , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Internet protocol-based emergency services / / Henning Schulzrinne |
Autore | Schulzrinne Henning |
Pubbl/distr/stampa | Chichester, West Sussex : , : John Wiley & Sons Inc., , 2013 |
Descrizione fisica | 1 online resource (797 p.) |
Disciplina | 004.67/8 |
Altri autori (Persone) |
TschofenigHannes
SchulzrinneHenning |
Soggetto topico |
Computer network protocols
Emergency communication systems Internet Public safety radio service |
ISBN |
1-119-99385-7
1-119-99384-9 1-118-65247-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
-- List of Figures xiii -- List of Tables xvii -- List of Contributors xix -- Preface xxi -- Acknowledgments xxv -- Acronyms xxvii -- 1 Introduction 1 -- 1.1 History 1 -- 1.2 Overview 5 -- 1.3 Building Blocks 8 -- 1.3.1 Recognizing Emergency Calls 8 -- 1.3.2 Obtaining and Conveying Location Information 9 -- 1.3.3 Routing Emergency Calls 9 -- 2 Location: Formats, Encoding and Protocols 11 -- 2.1 Applying the PIDF-LO civicAddress Type to US Addresses 14 -- 2.1.1 Introduction: The Context and Purpose of PIDF-LO and CLDXF 15 -- 2.1.2 CLDXF Elements 17 -- 2.1.3 Conclusion 30 -- 2.2 DHCP as a Location Configuration Protocol (LCP) 31 -- 2.2.1 What's New in RFC 6225? 32 -- 2.2.2 DHCPv4 and DHCPv6 Option Formats 32 -- 2.2.3 Option Support 35 -- 2.2.4 Latitude and Longitude Fields 36 -- 2.2.5 Altitude 36 -- 2.2.6 Datum 37 -- 2.3 Geography Markup Language (GML) 37 -- 2.3.1 Introduction 37 -- 2.3.2 Overview of the OGC 38 -- 2.3.3 The OGC Geography Markup Language (GML) 38 -- 2.3.4 Conclusion 47 -- 2.4 A Taxonomy of the IETF HELD Protocol 47 -- 2.4.1 The LIS and HELD 48 -- 2.4.2 LIS Discovery 48 -- 2.4.3 Basic HELD 53 -- 2.4.4 HELD Target Identities and Third-Party Requests 59 -- 2.4.5 HELD Measurements 62 -- 2.4.6 HELD as a Dereference Protocol 64 -- 2.4.7 HELD Policy URIs 66 -- 2.4.8 HELD Device Capabilities 69 -- 2.5 OMA Enablers and Emergency Services 72 -- 2.5.1 SUPL 73 -- 2.5.2 MLS 84 -- 2.5.3 MLP 85 -- 2.5.4 LOCSIP 89 -- 2.6 3GPP Location Protocols 92 -- 2.6.1 Introduction 92 -- 2.6.2 Location Technology in 3GPP Networks 93 -- 2.6.3 Emergency Location Information in 3GPP CS Domain, Control Plane 100 -- 2.6.4 Emergency Location Information in the IMS 100 -- 3 Architectures 103 -- 3.1 NENA i2 104 -- 3.1.1 Background 104 -- 3.1.2 The i2 Architecture 105 -- 3.1.3 Regulatory Situation and Deployment Status 117 -- 3.2 NENA i3 119 -- 3.2.1 History 119 -- 3.2.2 Emergency Services IP Networks 120 -- 3.2.3 Signaling and Routing IP-Originated Calls 121 -- 3.2.4 Legacy Wireline and Wireless Origination 122.
3.2.5 Emergency Events 123 -- 3.2.6 Routing Calls Within the ESInet 123 -- 3.2.7 Provisioning the ECRF 124 -- 3.2.8 PSAPs 125 -- 3.2.9 Other i3 Features 126 -- 3.3 IETF Emergency Services for Internet Multimedia 126 -- 3.3.1 Introduction 126 -- 3.3.2 Recognizing Emergency Calls 128 -- 3.3.3 Obtaining and Conveying Location Information 128 -- 3.3.4 Routing Emergency Calls 129 -- 3.3.5 Obligations 130 -- 3.3.6 LoST Mapping Architecture 132 -- 3.3.7 Steps Toward an IETF Emergency Services Architecture 135 -- 3.3.8 Summary 138 -- 3.4 Emergency Services Support in WiFi Networks 139 -- 3.4.1 Introduction 139 -- 3.4.2 Location Configuration 140 -- 3.4.3 Support for Emergency Services 141 -- 3.4.4 Support for Emergency Alert Systems 142 -- 3.5 WiMAX 142 -- 3.5.1 The WiMAX Network Architecture 143 -- 3.5.2 Network Architecture for Emergency Services Support 148 -- 3.5.3 The Fundamental Building Blocks 150 -- 3.5.4 Roaming Considerations and Network Entry 152 -- 3.5.5 Limited Access 154 -- 3.5.6 Location Support in WiMAX 157 -- 3.5.7 Conclusion 163 -- 3.6 3GPP 163 -- 3.6.1 Introduction 163 -- 3.6.2 Requirements 164 -- 3.6.3 Emergency Calls in the CS Domain 169 -- 3.6.4 Emergency Calls in PS Domain 176 -- 3.6.5 Identified Overload Problems 189 -- 4 Deployment Examples 193 -- 4.1 Emergency Calling in Sweden 195 -- 4.1.1 Introduction 195 -- 4.1.2 Overview 196 -- 4.1.3 Protocols for PSAP Interconnection 198 -- 4.1.4 Protocol Standards 200 -- 4.1.5 Media 201 -- 4.1.6 Emergency Call Routing 201 -- 4.1.7 Testing 201 -- 4.1.8 Examples 201 -- 4.2 UK Specification for Locating VoIP Callers 209 -- 4.2.1 Introduction 209 -- 4.2.2 The Regulatory Environment 209 -- 4.2.3 Standards Development 210 -- 4.2.4 The Current UK Emergency Services Structure 210 -- 4.2.5 Principles Driving the Specification 211 -- 4.2.6 Putting It All Together 213 -- 4.2.7 Implications for Access Network Providers 215 -- 4.3 Implementation of VoIP 9-1-1 Services in Canada 216 -- 4.3.1 Regulatory Framework (About the CRTC) 217. 4.3.2 Canada's Telecom Profile 217 -- 4.3.3 Interim Solution for Nomadic and Fixed/Non-Native VoIP 220 -- 4.3.4 The (Defunct) Canadian i2 Proposal 222 -- 4.3.5 VoIP Regulatory Processes, Decisions and Milestones 227 -- 4.3.6 Lessons Learned 229 -- 4.3.7 Conclusion 230 -- 4.4 US/Indiana Wireless Direct Network Project 230 -- 4.4.1 Background and History of the IWDN 231 -- 4.4.2 The IWDN Crossroads Project 231 -- 4.4.3 The IN911 IP Network 232 -- 4.4.4 Conclusion 235 -- 5 Security for IP-Based Emergency Services 237 -- 5.1 Introduction 237 -- 5.2 Communication Model 238 -- 5.3 Adversary Models and Security Threats 240 -- 5.4 Security Threats 241 -- 5.4.1 Denial-of-Service Attacks 242 -- 5.4.2 Attacks Involving the Emergency Identifier 242 -- 5.4.3 Attacks Against the Mapping System 243 -- 5.4.4 Attacks Against the Location Information Server 244 -- 5.4.5 Swatting 245 -- 5.4.6 Attacks to Prevent a Specific Individual From Receiving Aid 246 -- 5.4.7 Attacks to Gain Information About an Emergency 246 -- 5.4.8 Interfering With the LIS and LoST Server Discovery Procedure 246 -- 5.4.9 Call Identity Spoofing 247 -- 5.5 Countermeasures 248 -- 5.5.1 Discovery 248 -- 5.5.2 Secure Session Setup and Caller Identity 250 -- 5.5.3 Media Exchange 251 -- 5.5.4 Mapping Database Security 251 -- 6 Emergency Services for Persons With Disabilities 253 -- 6.1 What Is Specific with Communication for People with Disabilities? 253 -- 6.1.1 Important Characteristics of Regular Voice Telephony 253 -- 6.1.2 Important Characteristics of Accessible Conversational Services Suitable for People with Disabilities 254 -- 6.2 Reality Today 255 -- 6.3 Interpretation of the Term “Equivalent Service” 255 -- 6.4 Sad History 256 -- 6.5 Policy and Regulation Support 256 -- 6.5.1 UN Convention on the Rights of Persons with Disabilities 256 -- 6.5.2 The European Union Universal Service Directive 257 -- 6.5.3 The Telecom Act and Public Procurement Act in the United States 257 -- 6.5.4 Americans With Disability Act 257. 6.5.5 Relay Service Regulation in the United States 258 -- 6.6 Good Opportunities in IP-Based Services 258 -- 6.7 Implementation Experience 260 -- 7 Regulatory Situation 261 -- 7.1 Regulatory Aspects of Emergency Services in the United States 262 -- 7.1.1 Introduction 262 -- 7.1.2 Background 262 -- 7.1.3 E9-1-1 Requirements 263 -- 7.2 Regulatory Aspects of Emergency Services in the European Union 266 -- 7.2.1 Introduction 266 -- 7.2.2 Regulatory Development of Emergency Services Under EU Law 267 -- 7.2.3 Current Legal Framework 267 -- 7.2.4 New Legal Framework 274 -- 7.2.5 Emergency Regulation Outside of the EU Telecom Regulatory Framework 276 -- 7.2.6 Conclusion 276 -- 8 Research Projects and Pilots 279 -- 8.1 REACH112: Responding to All Citizens Needing Help 280 -- 8.1.1 Outline 280 -- 8.1.2 Emergency Service Access 282 -- 8.1.3 The Obstacles 284 -- 8.1.4 Conclusion 288 -- 8.2 PEACE: IP-Based Emergency Applications and Services for Next-Generation Networks 288 -- 8.2.1 Introduction 288 -- 8.2.2 Project Scope 289 -- 8.2.3 Development Status 291 -- 8.3 US Department of Transportation's NG 9-1-1 Pilot Project 298 -- 8.3.1 Overview 298 -- 8.3.2 Proof-of-Concept Description 300 -- 8.3.3 Testing 313 -- 8.3.4 Conclusion 317 -- 9 Organizations 321 -- 9.1 ETSI EMTEL 322 -- 9.1.1 Purpose of ETSI Special Committee EMTEL (Emergency Communications) 322 -- 9.1.2 Main Features of EMTEL 322 -- 9.1.3 Scope of ETSI SC EMTEL Work 323 -- 9.1.4 Operation and Activities of SC EMTEL 324 -- 9.1.5 EMTEL Evolution and Strategy 324 -- 9.1.6 Vision for Future Emergency Services 325 -- 9.2 NENA 326 -- 9.3 EENA 327 -- 9.3.1 What Is EENA? 327 -- 9.3.2 What EENA Does? 327 -- 9.3.3 What Are the EENA Memberships? 328 -- 9.4 Ecma International 330 -- 9.4.1 Ecma International 330 -- 9.4.2 Ecma Technical Committee TC32 331 -- 9.4.3 ECMA TR/101, Next Generation Corporate Networks (NGCN) / Emergency Calls 331 -- 9.5 ATIS 332 -- 9.5.1 Emergency Services Interconnection Forum (ESIF) 332 -- 9.5.2 Next-Generation Emergency Services (NGES) Subcommittee 333. 9.5.3 Example ESIF Issues 334 -- 9.5.4 Summary 336 -- 9.6 The NG9-1-1 Caucus and the NG9-1-1 Institute 336 -- 9.7 COCOM EGEA 338 -- 10 Conclusion and Outlook 341 -- 10.1 Location 341 -- 10.2 Architectures 342 -- 10.3 Deployments 343 -- 10.4 Security and Privacy 344 -- 10.5 Emergency Services for Persons with Disabilities 344 -- 10.6 Regulation 345 -- 10.7 Research Projects and Pilots 345 -- 10.8 Funding 346 -- References 349 -- Index 363. |
Record Nr. | UNINA-9910821320603321 |
Schulzrinne Henning | ||
Chichester, West Sussex : , : John Wiley & Sons Inc., , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mobility protocols and handover optimization : design, evaluation and application / / Ashutosh Dutta, Henning Schulzrinne |
Autore | Dutta Ashutosh |
Edizione | [First edition.] |
Pubbl/distr/stampa | Chichester, West Sussex : , : IEEE Press : , : Wiley, , [2014] |
Descrizione fisica | 1 online resource (478 p.) |
Disciplina | 621.3845/6 |
Collana | Wiley - IEEE |
Soggetto topico |
Mobile communication systems
Computer network protocols |
ISBN | 1-119-94551-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
About the Authors xv -- Foreword xvii -- Preface xix -- Acknowledgements xxiii -- List of Abbreviations xxv -- 1 Introduction 1 -- 1.1 Types of Mobility 2 -- 1.1.1 Terminal Mobility 2 -- 1.1.2 Personal Mobility 5 -- 1.1.3 Session Mobility 6 -- 1.1.4 Service Mobility 7 -- 1.2 Performance Requirements 7 -- 1.3 Motivation 8 -- 1.4 Summary of Key Contributions 9 -- 2 Analysis of Mobility Protocols for Multimedia 13 -- 2.1 Summary of Key Contributions and Indicative Results 13 -- 2.2 Introduction 14 -- 2.3 Cellular 1G 15 -- 2.3.1 System Architecture 15 -- 2.3.2 Handoff Procedure 17 -- 2.4 Cellular 2G Mobility 17 -- 2.4.1 GSM 17 -- 2.4.2 IS-95 19 -- 2.5 Cellular 3G Mobility 23 -- 2.5.1 WCDMA 24 -- 2.5.2 CDMA2000 26 -- 2.6 4G Networks 27 -- 2.6.1 Evolved Packet System 28 -- 2.6.2 WiMAX Mobility 31 -- 2.7 IP-Based Mobility 34 -- 2.7.1 Network Layer Macromobility 34 -- 2.7.2 Network Layer Micromobility 40 -- 2.7.3 NETMOB: Network Mobility 46 -- 2.7.4 Transport Layer Mobility 49 -- 2.7.5 Application Layer Mobility 49 -- 2.7.6 Host Identity Protocol 50 -- 2.7.7 MOBIKE 52 -- 2.7.8 IAPP 53 -- 2.8 Heterogeneous Handover 55 -- 2.8.1 UMTS-WLAN Handover 55 -- 2.8.2 LTE-WLAN Handover 58 -- 2.9 Multicast Mobility 61 -- 2.10 Concluding Remarks 71 -- 3 Systems Analysis of Mobility Events 73 -- 3.1 Summary of Key Contributions and Indicative Results 75 -- 3.2 Introduction 75 -- 3.2.1 Comparative Analysis of Mobility Protocols 77 -- 3.3 Analysis of Handoff Components 78 -- 3.3.1 Network Discovery and Selection 80 -- 3.3.2 Network Attachment 80 -- 3.3.3 Configuration 81 -- 3.3.4 Security Association 81 -- 3.3.5 Binding Update 82 -- 3.3.6 Media Rerouting 83 -- 3.4 Effect of Handoff across Layers 83 -- 3.4.1 Layer 2 Delay 84 -- 3.4.2 Layer 3 Delay 84 -- 3.4.3 Application Layer Delay 85 -- 3.4.4 Handoff Operations across Layers 85 -- 3.5 Concluding Remarks 90 -- 4 Modeling Mobility 91 -- 4.1 Summary of Key Contributions and Indicative Results 91 -- 4.2 Introduction 92 -- 4.3 Related Work 92.
4.4 Modeling Mobility as a Discrete-Event Dynamic System 93 -- 4.5 Petri Net Primitives 94 -- 4.6 Petri-Net-Based Modeling Methodologies 96 -- 4.7 Resource Utilization during Handoff 97 -- 4.8 Data Dependency Analysis of the Handoff Process 99 -- 4.8.1 Petri-Net-Based Data Dependency 99 -- 4.8.2 Analysis of Data Dependency during Handoff Process 100 -- 4.9 Petri Net Model for Handoff 105 -- 4.10 Petri-Net-Based Analysis of Handoff Event 113 -- 4.10.1 Analysis of Deadlocks in Handoff 114 -- 4.10.2 Reachability Analysis 120 -- 4.10.3 Matrix Equations 122 -- 4.11 Evaluation of Systems Performance Using Petri Nets 123 -- 4.11.1 Cycle-Time-Based Approach 123 -- 4.11.2 Floyd-Algorithm-Based Approach 124 -- 4.11.3 Resource-Time Product Approach 125 -- 4.12 Opportunities for Optimization 128 -- 4.12.1 Analysis of Parallelism in Handoff Operations 129 -- 4.12.2 Opportunities for Proactive Operation 129 -- 4.13 Concluding Remarks 130 -- 5 Layer 2 Optimization 131 -- 5.1 Introduction 131 -- 5.2 Related Work 131 -- 5.3 IEEE 802.11 Standards 132 -- 5.3.1 The IEEE 802.11 Wireless LAN Architecture 133 -- 5.3.2 IEEE 802.11 Management Frames 134 -- 5.4 Handoff Procedure with Active Scanning 135 -- 5.4.1 Steps during Handoff 135 -- 5.5 Fast-Handoff Algorithm 137 -- 5.5.1 Selective Scanning 137 -- 5.5.2 Caching 138 -- 5.6 Implementation 142 -- 5.6.1 The HostAP Driver 142 -- 5.7 Measurements 142 -- 5.7.1 Experimental Setup 142 -- 5.7.2 The Environment 142 -- 5.7.3 Experiments 143 -- 5.8 Measurement Results 143 -- 5.8.1 Handoff Time 143 -- 5.8.2 Packet Loss 143 -- 5.9 Conclusions and Future Work 146 -- 6 Mobility Optimization Techniques 149 -- 6.1 Summary of Key Contributions and Indicative Results 149 -- 6.1.1 Discovery 149 -- 6.1.2 Authentication 150 -- 6.1.3 Layer 3 Configuration 151 -- 6.1.4 Layer 3 Security Association 152 -- 6.1.5 Binding Update 152 -- 6.1.6 Media Rerouting 153 -- 6.1.7 Route Optimization 154 -- 6.1.8 Media-Independent Cross-Layer Triggers 155 -- 6.2 Introduction 156. 6.3 Discovery 156 -- 6.3.1 Key Principles 156 -- 6.3.2 Related Work 157 -- 6.3.3 Application Layer Discovery 158 -- 6.3.4 Experimental Results and Analysis 161 -- 6.4 Authentication 164 -- 6.4.1 Key Principles 166 -- 6.4.2 Related Work 166 -- 6.4.3 Network-Layer-Assisted Preauthentication 169 -- 6.4.4 Experimental Results and Analysis 173 -- 6.5 Layer 3 Configuration 177 -- 6.5.1 Key Principles 179 -- 6.5.2 Related Work 180 -- 6.5.3 Router-Assisted Duplicate Address Detection 180 -- 6.5.4 Proactive IP Address Configuration 180 -- 6.5.5 Experimental Results and Analysis 183 -- 6.6 Layer 3 Security Association 183 -- 6.6.1 Key Principles 184 -- 6.6.2 Related Work 184 -- 6.6.3 Anchor-Assisted Security Association 184 -- 6.6.4 Experimental Results and Analysis 187 -- 6.7 Binding Update 190 -- 6.7.1 Key Principles 191 -- 6.7.2 Related Work 191 -- 6.7.3 Hierarchical Binding Update 192 -- 6.7.4 Experimental Results and Analysis 195 -- 6.7.5 Proactive Binding Update 199 -- 6.8 Media Rerouting 199 -- 6.8.1 Key Principles 200 -- 6.8.2 Related Work 200 -- 6.8.3 Data Redirection Using Forwarding Agent 201 -- 6.8.4 Mobility-Proxy-Assisted Time-Bound Data Redirection 202 -- 6.8.5 Time-Bound Localized Multicasting 205 -- 6.9 Media Buffering 210 -- 6.9.1 Key Principles 211 -- 6.9.2 Related Work 211 -- 6.9.3 Protocol for Edge Buffering 212 -- 6.9.4 Experimental Results and Analysis 215 -- 6.9.5 Analysis of the Trade-off between Buffering Delay and Packet Loss 219 -- 6.10 Route Optimization 220 -- 6.10.1 Key Principles 221 -- 6.10.2 Related Work 221 -- 6.10.3 Maintaining a Direct Path by Application Layer Mobility 221 -- 6.10.4 Interceptor-Assisted Packet Modifier at the End Point 222 -- 6.10.5 Intercepting Proxy-Assisted Route Optimization 224 -- 6.10.6 Cost Analysis and Experimental Analysis 226 -- 6.10.7 Binding-Cache-Based Route Optimization 229 -- 6.11 Media-Independent Cross-Layer Triggers 232 -- 6.11.1 Key Principles 232 -- 6.11.2 Related Work 232 -- 6.11.3 Media Independent Handover Function 233. 6.11.4 Faster Link-Down Detection Scheme 238 -- 6.12 Concluding Remarks 241 -- 7 Optimization with Multilayer Mobility Protocols 243 -- 7.1 Summary of Key Contributions and Indicative Results 243 -- 7.2 Introduction 244 -- 7.3 Key Principles 245 -- 7.4 Related Work 245 -- 7.5 Multilayer Mobility Approach 246 -- 7.5.1 Policy-Based Mobility Protocols: SIP and MIP-LR 247 -- 7.5.2 Integration of SIP and MIP-LR with MMP 248 -- 7.5.3 Integration of Global Mobility Protocol with Micromobility Protocol 250 -- 7.5.4 Implementation of Multilayer Mobility Protocols 250 -- 7.5.5 Implementation and Performance Issues 252 -- 7.6 Concluding Remarks 255 -- 8 Optimizations for Simultaneous Mobility 257 -- 8.1 Summary of Key Contributions and Indicative Results 257 -- 8.2 Introduction 258 -- 8.2.1 Analysis of Simultaneous Mobility 258 -- 8.3 Illustration of the Simultaneous Mobility Problem 260 -- 8.4 Related Work 262 -- 8.5 Key Optimization Techniques 262 -- 8.6 Analytical Framework 262 -- 8.6.1 Fundamental Concepts 262 -- 8.6.2 Handoff Sequences 263 -- 8.6.3 Binding Updates 264 -- 8.6.4 Location Proxies and Binding Update Proxies 265 -- 8.7 Analyzing the Simultaneous Mobility Problem 267 -- 8.8 Probability of Simultaneous Mobility 270 -- 8.9 Solutions 272 -- 8.9.1 Soft Handoff 273 -- 8.9.2 Receiver-Side Mechanisms 273 -- 8.9.3 Sender-Side Mechanisms 275 -- 8.10 Application of Solution Mechanisms 276 -- 8.10.1 Mobile IPv6 277 -- 8.10.2 MIP-LR 279 -- 8.10.3 SIP-Based Mobility 280 -- 8.11 Concluding Remarks 282 -- 9 Handoff Optimization for Multicast Streaming 285 -- 9.1 Summary of Key Contributions and Indicative Results 285 -- 9.2 Introduction 286 -- 9.3 Key Principles 289 -- 9.4 Related Work 290 -- 9.5 Mobility in a Hierarchical Multicast Architecture 291 -- 9.5.1 Channel Announcement 293 -- 9.5.2 Channel Management 293 -- 9.5.3 Channel Tuning 293 -- 9.5.4 Local Advertisement Insertion 294 -- 9.5.5 Channel Monitor 294 -- 9.5.6 Security 295 -- 9.6 Optimization Techniques for Multicast Media Delivery 296. 9.6.1 Reactive Triggering 296 -- 9.6.2 Proactive Triggering 297 -- 9.6.3 Triggering during Configuration of a Mobile 298 -- 9.7 Experimental Results and Performance Analysis 299 -- 9.7.1 Experimental Results 299 -- 9.7.2 Performance Analysis 302 -- 9.8 Concluding Remarks 305 -- 10 Cooperative Roaming 307 -- 10.1 Introduction 307 -- 10.2 Related Work 309 -- 10.3 IP Multicast Addressing 310 -- 10.4 Cooperative Roaming 311 -- 10.4.1 Overview 311 -- 10.4.2 L2 Cooperation Protocol 312 -- 10.4.3 L3 Cooperation Protocol 313 -- 10.5 Cooperative Authentication 314 -- 10.5.1 Overview of IEEE 802.1x 314 -- 10.5.2 Cooperation in the Authentication Process 315 -- 10.5.3 Relay Process 316 -- 10.6 Security 318 -- 10.6.1 Security Issues in Roaming 318 -- 10.6.2 Cooperative Authentication and Security 319 -- 10.7 Streaming Media Support 320 -- 10.8 Bandwidth and Energy Usage 320 -- 10.9 Experiments 321 -- 10.9.1 Environment 321 -- 10.9.2 Implementation Details 322 -- 10.9.3 Experimental Setup 322 -- 10.9.4 Results 323 -- 10.10 Application Layer Mobility 328 -- 10.11 Load Balancing 329 -- 10.12 Multicast and Scalability 330 -- 10.13 An Alternative to Multicast 330 -- 10.14 Conclusions and Future Work 331 -- 11 System Evaluation 333 -- 11.1 Summary of Key Contributions and Indicative Results 333 -- 11.2 Introduction 334 -- 11.3 Experimental Validation 334 -- 11.3.1 The Media Independent Preauthentication Framework 334 -- 11.3.2 Intratechnology Handoff 338 -- 11.3.3 Intertechnology Handoff 340 -- 11.3.4 Cross-Layer-Trigger-Assisted Preauthentication 342 -- 11.3.5 Mobile-Initiated Handover with 802.21 Triggers 344 -- 11.3.6 Network-Initiated Handover with 802.21 Triggers 345 -- 11.3.7 Handover Preparation Time 346 -- 11.4 Handoff Optimization in IP Multimedia Subsystem 350 -- 11.4.1 Nonoptimized Handoff Mode 350 -- 11.4.2 Optimization with Reactive Context Transfer 351 -- 11.4.3 Optimization with Proactive Security Context Transfer 352 -- 11.4.4 Performance Results 353 -- 11.5 Systems Validation Using Petri-Net-Based Models 355. 11.5.1 MATLABª-Based Modeling of Handoff Functions 356 -- 11.5.2 Petri-Net-Based Model for Optimized Security Association 360 -- 11.5.3 Petri-Net-Based Model for Hierarchical Binding Update 361 -- 11.5.4 Petri-Net-Based Model for Media Redirection of In-Flight Data 362 -- 11.5.5 Petri-Net-Based Model of Optimized Configuration 364 -- 11.5.6 Petri-Net-Based Model for Multicast Mobility 364 -- 11.6 Scheduling Handoff Operations 365 -- 11.6.1 Sequential Scheduling 366 -- 11.6.2 Concurrent Scheduling 368 -- 11.6.3 Proactive Scheduling 368 -- 11.7 Verification of Systems Performance 369 -- 11.7.1 Cycle-Time-Based Approach 369 -- 11.7.2 Using the Floyd Algorithm 370 -- 11.8 Petri-Net-Based Modeling for Multi-Interface Mobility 371 -- 11.8.1 Multihoming Scenario 371 -- 11.8.2 Break-Before-Make Scenario 372 -- 11.8.3 Make-Before-Break Scenario 372 -- 11.8.4 MATLABª-Based Petri Net Modeling for Multi-Interface Mobility 372 -- 11.9 Deadlocks in Handoff Scheduling 374 -- 11.9.1 Handoff Schedules with Deadlocks 375 -- 11.9.2 Deadlock Prevention and Avoidance in Handoff Schedules 377 -- 11.10 Analysis of Level of Concurrency and Resources 380 -- 11.11 Trade-off Analysis for Proactive Handoff 385 -- 11.12 Concluding Remarks 389 -- 12 Conclusions 391 -- 12.1 General Principles of Mobility Optimization 391 -- 12.2 Summary of Contributions 393 -- 12.3 Future Work 394 -- A RDF Schema for Application Layer Discovery 395 -- A.1 Schema Primitives 395 -- B Definitions of Mobility-Related Terms 399 -- References 409 -- Index 425. |
Record Nr. | UNINA-9910140411803321 |
Dutta Ashutosh | ||
Chichester, West Sussex : , : IEEE Press : , : Wiley, , [2014] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mobility protocols and handover optimization : design, evaluation and application / / Ashutosh Dutta, Henning Schulzrinne |
Autore | Dutta Ashutosh |
Edizione | [First edition.] |
Pubbl/distr/stampa | Chichester, West Sussex : , : IEEE Press : , : Wiley, , [2014] |
Descrizione fisica | 1 online resource (478 p.) |
Disciplina | 621.3845/6 |
Collana | Wiley - IEEE |
Soggetto topico |
Mobile communication systems
Computer network protocols |
ISBN | 1-119-94551-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
About the Authors xv -- Foreword xvii -- Preface xix -- Acknowledgements xxiii -- List of Abbreviations xxv -- 1 Introduction 1 -- 1.1 Types of Mobility 2 -- 1.1.1 Terminal Mobility 2 -- 1.1.2 Personal Mobility 5 -- 1.1.3 Session Mobility 6 -- 1.1.4 Service Mobility 7 -- 1.2 Performance Requirements 7 -- 1.3 Motivation 8 -- 1.4 Summary of Key Contributions 9 -- 2 Analysis of Mobility Protocols for Multimedia 13 -- 2.1 Summary of Key Contributions and Indicative Results 13 -- 2.2 Introduction 14 -- 2.3 Cellular 1G 15 -- 2.3.1 System Architecture 15 -- 2.3.2 Handoff Procedure 17 -- 2.4 Cellular 2G Mobility 17 -- 2.4.1 GSM 17 -- 2.4.2 IS-95 19 -- 2.5 Cellular 3G Mobility 23 -- 2.5.1 WCDMA 24 -- 2.5.2 CDMA2000 26 -- 2.6 4G Networks 27 -- 2.6.1 Evolved Packet System 28 -- 2.6.2 WiMAX Mobility 31 -- 2.7 IP-Based Mobility 34 -- 2.7.1 Network Layer Macromobility 34 -- 2.7.2 Network Layer Micromobility 40 -- 2.7.3 NETMOB: Network Mobility 46 -- 2.7.4 Transport Layer Mobility 49 -- 2.7.5 Application Layer Mobility 49 -- 2.7.6 Host Identity Protocol 50 -- 2.7.7 MOBIKE 52 -- 2.7.8 IAPP 53 -- 2.8 Heterogeneous Handover 55 -- 2.8.1 UMTS-WLAN Handover 55 -- 2.8.2 LTE-WLAN Handover 58 -- 2.9 Multicast Mobility 61 -- 2.10 Concluding Remarks 71 -- 3 Systems Analysis of Mobility Events 73 -- 3.1 Summary of Key Contributions and Indicative Results 75 -- 3.2 Introduction 75 -- 3.2.1 Comparative Analysis of Mobility Protocols 77 -- 3.3 Analysis of Handoff Components 78 -- 3.3.1 Network Discovery and Selection 80 -- 3.3.2 Network Attachment 80 -- 3.3.3 Configuration 81 -- 3.3.4 Security Association 81 -- 3.3.5 Binding Update 82 -- 3.3.6 Media Rerouting 83 -- 3.4 Effect of Handoff across Layers 83 -- 3.4.1 Layer 2 Delay 84 -- 3.4.2 Layer 3 Delay 84 -- 3.4.3 Application Layer Delay 85 -- 3.4.4 Handoff Operations across Layers 85 -- 3.5 Concluding Remarks 90 -- 4 Modeling Mobility 91 -- 4.1 Summary of Key Contributions and Indicative Results 91 -- 4.2 Introduction 92 -- 4.3 Related Work 92.
4.4 Modeling Mobility as a Discrete-Event Dynamic System 93 -- 4.5 Petri Net Primitives 94 -- 4.6 Petri-Net-Based Modeling Methodologies 96 -- 4.7 Resource Utilization during Handoff 97 -- 4.8 Data Dependency Analysis of the Handoff Process 99 -- 4.8.1 Petri-Net-Based Data Dependency 99 -- 4.8.2 Analysis of Data Dependency during Handoff Process 100 -- 4.9 Petri Net Model for Handoff 105 -- 4.10 Petri-Net-Based Analysis of Handoff Event 113 -- 4.10.1 Analysis of Deadlocks in Handoff 114 -- 4.10.2 Reachability Analysis 120 -- 4.10.3 Matrix Equations 122 -- 4.11 Evaluation of Systems Performance Using Petri Nets 123 -- 4.11.1 Cycle-Time-Based Approach 123 -- 4.11.2 Floyd-Algorithm-Based Approach 124 -- 4.11.3 Resource-Time Product Approach 125 -- 4.12 Opportunities for Optimization 128 -- 4.12.1 Analysis of Parallelism in Handoff Operations 129 -- 4.12.2 Opportunities for Proactive Operation 129 -- 4.13 Concluding Remarks 130 -- 5 Layer 2 Optimization 131 -- 5.1 Introduction 131 -- 5.2 Related Work 131 -- 5.3 IEEE 802.11 Standards 132 -- 5.3.1 The IEEE 802.11 Wireless LAN Architecture 133 -- 5.3.2 IEEE 802.11 Management Frames 134 -- 5.4 Handoff Procedure with Active Scanning 135 -- 5.4.1 Steps during Handoff 135 -- 5.5 Fast-Handoff Algorithm 137 -- 5.5.1 Selective Scanning 137 -- 5.5.2 Caching 138 -- 5.6 Implementation 142 -- 5.6.1 The HostAP Driver 142 -- 5.7 Measurements 142 -- 5.7.1 Experimental Setup 142 -- 5.7.2 The Environment 142 -- 5.7.3 Experiments 143 -- 5.8 Measurement Results 143 -- 5.8.1 Handoff Time 143 -- 5.8.2 Packet Loss 143 -- 5.9 Conclusions and Future Work 146 -- 6 Mobility Optimization Techniques 149 -- 6.1 Summary of Key Contributions and Indicative Results 149 -- 6.1.1 Discovery 149 -- 6.1.2 Authentication 150 -- 6.1.3 Layer 3 Configuration 151 -- 6.1.4 Layer 3 Security Association 152 -- 6.1.5 Binding Update 152 -- 6.1.6 Media Rerouting 153 -- 6.1.7 Route Optimization 154 -- 6.1.8 Media-Independent Cross-Layer Triggers 155 -- 6.2 Introduction 156. 6.3 Discovery 156 -- 6.3.1 Key Principles 156 -- 6.3.2 Related Work 157 -- 6.3.3 Application Layer Discovery 158 -- 6.3.4 Experimental Results and Analysis 161 -- 6.4 Authentication 164 -- 6.4.1 Key Principles 166 -- 6.4.2 Related Work 166 -- 6.4.3 Network-Layer-Assisted Preauthentication 169 -- 6.4.4 Experimental Results and Analysis 173 -- 6.5 Layer 3 Configuration 177 -- 6.5.1 Key Principles 179 -- 6.5.2 Related Work 180 -- 6.5.3 Router-Assisted Duplicate Address Detection 180 -- 6.5.4 Proactive IP Address Configuration 180 -- 6.5.5 Experimental Results and Analysis 183 -- 6.6 Layer 3 Security Association 183 -- 6.6.1 Key Principles 184 -- 6.6.2 Related Work 184 -- 6.6.3 Anchor-Assisted Security Association 184 -- 6.6.4 Experimental Results and Analysis 187 -- 6.7 Binding Update 190 -- 6.7.1 Key Principles 191 -- 6.7.2 Related Work 191 -- 6.7.3 Hierarchical Binding Update 192 -- 6.7.4 Experimental Results and Analysis 195 -- 6.7.5 Proactive Binding Update 199 -- 6.8 Media Rerouting 199 -- 6.8.1 Key Principles 200 -- 6.8.2 Related Work 200 -- 6.8.3 Data Redirection Using Forwarding Agent 201 -- 6.8.4 Mobility-Proxy-Assisted Time-Bound Data Redirection 202 -- 6.8.5 Time-Bound Localized Multicasting 205 -- 6.9 Media Buffering 210 -- 6.9.1 Key Principles 211 -- 6.9.2 Related Work 211 -- 6.9.3 Protocol for Edge Buffering 212 -- 6.9.4 Experimental Results and Analysis 215 -- 6.9.5 Analysis of the Trade-off between Buffering Delay and Packet Loss 219 -- 6.10 Route Optimization 220 -- 6.10.1 Key Principles 221 -- 6.10.2 Related Work 221 -- 6.10.3 Maintaining a Direct Path by Application Layer Mobility 221 -- 6.10.4 Interceptor-Assisted Packet Modifier at the End Point 222 -- 6.10.5 Intercepting Proxy-Assisted Route Optimization 224 -- 6.10.6 Cost Analysis and Experimental Analysis 226 -- 6.10.7 Binding-Cache-Based Route Optimization 229 -- 6.11 Media-Independent Cross-Layer Triggers 232 -- 6.11.1 Key Principles 232 -- 6.11.2 Related Work 232 -- 6.11.3 Media Independent Handover Function 233. 6.11.4 Faster Link-Down Detection Scheme 238 -- 6.12 Concluding Remarks 241 -- 7 Optimization with Multilayer Mobility Protocols 243 -- 7.1 Summary of Key Contributions and Indicative Results 243 -- 7.2 Introduction 244 -- 7.3 Key Principles 245 -- 7.4 Related Work 245 -- 7.5 Multilayer Mobility Approach 246 -- 7.5.1 Policy-Based Mobility Protocols: SIP and MIP-LR 247 -- 7.5.2 Integration of SIP and MIP-LR with MMP 248 -- 7.5.3 Integration of Global Mobility Protocol with Micromobility Protocol 250 -- 7.5.4 Implementation of Multilayer Mobility Protocols 250 -- 7.5.5 Implementation and Performance Issues 252 -- 7.6 Concluding Remarks 255 -- 8 Optimizations for Simultaneous Mobility 257 -- 8.1 Summary of Key Contributions and Indicative Results 257 -- 8.2 Introduction 258 -- 8.2.1 Analysis of Simultaneous Mobility 258 -- 8.3 Illustration of the Simultaneous Mobility Problem 260 -- 8.4 Related Work 262 -- 8.5 Key Optimization Techniques 262 -- 8.6 Analytical Framework 262 -- 8.6.1 Fundamental Concepts 262 -- 8.6.2 Handoff Sequences 263 -- 8.6.3 Binding Updates 264 -- 8.6.4 Location Proxies and Binding Update Proxies 265 -- 8.7 Analyzing the Simultaneous Mobility Problem 267 -- 8.8 Probability of Simultaneous Mobility 270 -- 8.9 Solutions 272 -- 8.9.1 Soft Handoff 273 -- 8.9.2 Receiver-Side Mechanisms 273 -- 8.9.3 Sender-Side Mechanisms 275 -- 8.10 Application of Solution Mechanisms 276 -- 8.10.1 Mobile IPv6 277 -- 8.10.2 MIP-LR 279 -- 8.10.3 SIP-Based Mobility 280 -- 8.11 Concluding Remarks 282 -- 9 Handoff Optimization for Multicast Streaming 285 -- 9.1 Summary of Key Contributions and Indicative Results 285 -- 9.2 Introduction 286 -- 9.3 Key Principles 289 -- 9.4 Related Work 290 -- 9.5 Mobility in a Hierarchical Multicast Architecture 291 -- 9.5.1 Channel Announcement 293 -- 9.5.2 Channel Management 293 -- 9.5.3 Channel Tuning 293 -- 9.5.4 Local Advertisement Insertion 294 -- 9.5.5 Channel Monitor 294 -- 9.5.6 Security 295 -- 9.6 Optimization Techniques for Multicast Media Delivery 296. 9.6.1 Reactive Triggering 296 -- 9.6.2 Proactive Triggering 297 -- 9.6.3 Triggering during Configuration of a Mobile 298 -- 9.7 Experimental Results and Performance Analysis 299 -- 9.7.1 Experimental Results 299 -- 9.7.2 Performance Analysis 302 -- 9.8 Concluding Remarks 305 -- 10 Cooperative Roaming 307 -- 10.1 Introduction 307 -- 10.2 Related Work 309 -- 10.3 IP Multicast Addressing 310 -- 10.4 Cooperative Roaming 311 -- 10.4.1 Overview 311 -- 10.4.2 L2 Cooperation Protocol 312 -- 10.4.3 L3 Cooperation Protocol 313 -- 10.5 Cooperative Authentication 314 -- 10.5.1 Overview of IEEE 802.1x 314 -- 10.5.2 Cooperation in the Authentication Process 315 -- 10.5.3 Relay Process 316 -- 10.6 Security 318 -- 10.6.1 Security Issues in Roaming 318 -- 10.6.2 Cooperative Authentication and Security 319 -- 10.7 Streaming Media Support 320 -- 10.8 Bandwidth and Energy Usage 320 -- 10.9 Experiments 321 -- 10.9.1 Environment 321 -- 10.9.2 Implementation Details 322 -- 10.9.3 Experimental Setup 322 -- 10.9.4 Results 323 -- 10.10 Application Layer Mobility 328 -- 10.11 Load Balancing 329 -- 10.12 Multicast and Scalability 330 -- 10.13 An Alternative to Multicast 330 -- 10.14 Conclusions and Future Work 331 -- 11 System Evaluation 333 -- 11.1 Summary of Key Contributions and Indicative Results 333 -- 11.2 Introduction 334 -- 11.3 Experimental Validation 334 -- 11.3.1 The Media Independent Preauthentication Framework 334 -- 11.3.2 Intratechnology Handoff 338 -- 11.3.3 Intertechnology Handoff 340 -- 11.3.4 Cross-Layer-Trigger-Assisted Preauthentication 342 -- 11.3.5 Mobile-Initiated Handover with 802.21 Triggers 344 -- 11.3.6 Network-Initiated Handover with 802.21 Triggers 345 -- 11.3.7 Handover Preparation Time 346 -- 11.4 Handoff Optimization in IP Multimedia Subsystem 350 -- 11.4.1 Nonoptimized Handoff Mode 350 -- 11.4.2 Optimization with Reactive Context Transfer 351 -- 11.4.3 Optimization with Proactive Security Context Transfer 352 -- 11.4.4 Performance Results 353 -- 11.5 Systems Validation Using Petri-Net-Based Models 355. 11.5.1 MATLABª-Based Modeling of Handoff Functions 356 -- 11.5.2 Petri-Net-Based Model for Optimized Security Association 360 -- 11.5.3 Petri-Net-Based Model for Hierarchical Binding Update 361 -- 11.5.4 Petri-Net-Based Model for Media Redirection of In-Flight Data 362 -- 11.5.5 Petri-Net-Based Model of Optimized Configuration 364 -- 11.5.6 Petri-Net-Based Model for Multicast Mobility 364 -- 11.6 Scheduling Handoff Operations 365 -- 11.6.1 Sequential Scheduling 366 -- 11.6.2 Concurrent Scheduling 368 -- 11.6.3 Proactive Scheduling 368 -- 11.7 Verification of Systems Performance 369 -- 11.7.1 Cycle-Time-Based Approach 369 -- 11.7.2 Using the Floyd Algorithm 370 -- 11.8 Petri-Net-Based Modeling for Multi-Interface Mobility 371 -- 11.8.1 Multihoming Scenario 371 -- 11.8.2 Break-Before-Make Scenario 372 -- 11.8.3 Make-Before-Break Scenario 372 -- 11.8.4 MATLABª-Based Petri Net Modeling for Multi-Interface Mobility 372 -- 11.9 Deadlocks in Handoff Scheduling 374 -- 11.9.1 Handoff Schedules with Deadlocks 375 -- 11.9.2 Deadlock Prevention and Avoidance in Handoff Schedules 377 -- 11.10 Analysis of Level of Concurrency and Resources 380 -- 11.11 Trade-off Analysis for Proactive Handoff 385 -- 11.12 Concluding Remarks 389 -- 12 Conclusions 391 -- 12.1 General Principles of Mobility Optimization 391 -- 12.2 Summary of Contributions 393 -- 12.3 Future Work 394 -- A RDF Schema for Application Layer Discovery 395 -- A.1 Schema Primitives 395 -- B Definitions of Mobility-Related Terms 399 -- References 409 -- Index 425. |
Record Nr. | UNINA-9910824829603321 |
Dutta Ashutosh | ||
Chichester, West Sussex : , : IEEE Press : , : Wiley, , [2014] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
NETWORKING 2009 [[electronic resource] ] : 8th International IFIP-TC 6 Networking Conference, Aachen, Germany, May 11-15, 2009, Proceedings / / edited by Luigi Fratta, Henning Schulzrinne, Yutaka Takahashi, Otto Spaniol |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XX, 969 p.) |
Disciplina | 004.6 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Electrical engineering Computer system failures Application software Software engineering Computer organization Computer Communication Networks Communications Engineering, Networks System Performance and Evaluation Information Systems Applications (incl. Internet) Software Engineering Computer Systems Organization and Communication Networks |
Soggetto genere / forma |
Aachen (2009)
Kongress. |
ISBN | 3-642-01399-6 |
Classificazione |
DAT 250f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Ad-Hoc Networks: Sensor Networks -- Modelling: Routing and Queuing -- Peer to Peer: Analysis -- Quality of Service: New Protocols -- Wireless Networks: Planning and Performance -- Applications and Services: System Evaluation -- Peer to Peer: Topology -- Next Generation Internet: Transport Protocols -- Wireless Networks: Protocols -- Next Generation Internet: Network and Transport -- Modelling and Performance Analysis: Infrastructure -- Applications and Services: Streaming and Multimedia -- Wireless Networks: Availability -- Modelling and Performance Evaluation: Network Architectures -- Peer to Peer: Frameworks and Architectures -- All-IP Networking: Frameworks -- Next Generation Internet -- Performance and Wireless. |
Record Nr. | UNISA-996466260803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
NETWORKING 2009 : 8th International IFIP-TC 6 Networking Conference, Aachen, Germany, May 11-15, 2009. Proceedings / / Luigi Fratta, Henning Schulzrinne, Yutaka Takahashi, Otto Spaniol (Eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg, : Springer Berlin Heidelberg, 2009 |
Descrizione fisica | 1 online resource (XX, 969 p.) |
Disciplina | 004.6 |
Altri autori (Persone) |
FrattaLuigi
SchulzrinneHenning SpaniolOtto <1945-> TakahashiYutaka |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer network architectures
Computer science Information storage and retrieval systems Computer system performance Computer networks Telecommunication Software engineering |
ISBN | 3-642-01399-6 |
Classificazione |
DAT 250f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Ad-Hoc Networks: Sensor Networks -- Modelling: Routing and Queuing -- Peer to Peer: Analysis -- Quality of Service: New Protocols -- Wireless Networks: Planning and Performance -- Applications and Services: System Evaluation -- Peer to Peer: Topology -- Next Generation Internet: Transport Protocols -- Wireless Networks: Protocols -- Next Generation Internet: Network and Transport -- Modelling and Performance Analysis: Infrastructure -- Applications and Services: Streaming and Multimedia -- Wireless Networks: Availability -- Modelling and Performance Evaluation: Network Architectures -- Peer to Peer: Frameworks and Architectures -- All-IP Networking: Frameworks -- Next Generation Internet -- Performance and Wireless. |
Record Nr. | UNINA-9910484067503321 |
Berlin, Heidelberg, : Springer Berlin Heidelberg, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Principles, systems and applications of IP telecommunications : services and security for next generation networks : second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008, revised selected papers / / Henning Schulzrinne, Radu State, Saverio Niccolini (editors) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2008] |
Descrizione fisica | 1 online resource (VIII, 343 p.) |
Disciplina | 004.6 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Internetworking (Telecommunication)
Computer networks |
ISBN | 3-540-89054-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A SIP-Based Programming Framework for Advanced Telephony Applications -- An IMS Based Mobile Podcasting Architecture Supporting Multicast/Broadcast Delivery -- Generalized Third-Party Call Control in SIP Networks -- Automatic Adaptation and Analysis of SIP Headers Using Decision Trees -- A Self-learning System for Detection of Anomalous SIP Messages -- Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems -- One Server Per City: Using TCP for Very Large SIP Servers -- Session Initiation Protocol (SIP) Server Overload Control: Design and Evaluation -- Improving the Scalability of an IMS-Compliant Conferencing Framework Part II: Involving Mixing and Floor Control -- On Mechanisms for Deadlock Avoidance in SIP Servlet Containers -- Lawful Interception in P2P-Based VoIP Systems -- Security Analysis of an IP Phone: Cisco 7960G -- Understanding SIP through Model-Checking -- Detecting VoIP Traffic Based on Human Conversation Patterns -- Template-Based Signaling Compression for Push-To-Talk over Cellular (PoC) -- Providing Content Aware Enterprise Communication Services. |
Record Nr. | UNINA-9910484045803321 |
Berlin, Heidelberg : , : Springer-Verlag, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Principles, systems and applications of IP telecommunications : services and security for next generation networks : second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008, revised selected papers / / Henning Schulzrinne, Radu State, Saverio Niccolini (editors) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2008] |
Descrizione fisica | 1 online resource (VIII, 343 p.) |
Disciplina | 004.6 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Internetworking (Telecommunication)
Computer networks |
ISBN | 3-540-89054-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A SIP-Based Programming Framework for Advanced Telephony Applications -- An IMS Based Mobile Podcasting Architecture Supporting Multicast/Broadcast Delivery -- Generalized Third-Party Call Control in SIP Networks -- Automatic Adaptation and Analysis of SIP Headers Using Decision Trees -- A Self-learning System for Detection of Anomalous SIP Messages -- Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems -- One Server Per City: Using TCP for Very Large SIP Servers -- Session Initiation Protocol (SIP) Server Overload Control: Design and Evaluation -- Improving the Scalability of an IMS-Compliant Conferencing Framework Part II: Involving Mixing and Floor Control -- On Mechanisms for Deadlock Avoidance in SIP Servlet Containers -- Lawful Interception in P2P-Based VoIP Systems -- Security Analysis of an IP Phone: Cisco 7960G -- Understanding SIP through Model-Checking -- Detecting VoIP Traffic Based on Human Conversation Patterns -- Template-Based Signaling Compression for Push-To-Talk over Cellular (PoC) -- Providing Content Aware Enterprise Communication Services. |
Record Nr. | UNISA-996465741503316 |
Berlin, Heidelberg : , : Springer-Verlag, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|