scholarly journals Tuning the Behavior of the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) for Routers in Mobile and Wireless Networks

Author(s):  
H. Asaeda ◽  
H. Liu ◽  
Q. Wu

Current innovation in the field of Mobile and Wireless network will increase the use of mobile devices which procreated in an outburst of traffic passing through the internet. Due to the explosion of traffic mobility management has become a challenge in future mobile and wireless networks. To deal with such an explosion, mobile networks are becoming flatter as compared to previous hierarchical mobile networks. This paper presents a detailed survey of solutions for currently mobility management such as Centralized mobility management techniques for mobile and wireless networks, described the limitation of Centralized Mobility Management which is hierarchical and centralized in nature and discussed an approach which removes the limitation of Centralized mobility management called as Distributed mobility management. This paper also discussed two different approaches of Distributed mobility management such as Client based Distributed mobility management and Network based Distributed mobility management.


2021 ◽  
Vol 25 (1) ◽  
pp. 34-38
Author(s):  
Jonathan Oostvogels ◽  
Fan Yang ◽  
Sam Michiels ◽  
Wouter Joosen ◽  
Danny Hughes

Latency-sensitive applications for the Internet of Things (IoT) often require performance guarantees that contemporary wireless networks fail to offer. Application scenarios involving real-time control of industrial machinery, robotics, or delay-sensitive actuation therefore typically still rely on cables: today's wireless networks cannot deliver messages in a sufficiently small and predictable amount of time. Drop-in wireless replacements for these cabled systems would nevertheless provide great benefit by eliminating the high cost and complexity associated with running cables in harsh industrial environments [1]. The symbolsynchronous bus, introduced in this article and embodied in a platform called Zero-Wire, is a novel wireless networking paradigm that addresses this gap. Using concurrent optical transmissions, it strives to bring low-latency deterministic networking to the wireless IoT.


2015 ◽  
Vol 7 (3) ◽  
pp. 1 ◽  
Author(s):  
Haider Noori AL-Hashimi ◽  
Waleed Noori Hussein

VANET Networks are one of the main next generation wireless networks which are envisaged to be an integration of homogeneous and heterogeneous wireless networks. The inter-networking of these wireless networks with the Internet will provide ubiquitous access to roaming network users. However, a seamless handover mechanism with negligible handover delay is required to maintain active connections during roaming across these networks. Several solutions, mainly involving host-based localized mobility management schemes, have been widely proposed to reduce handover delay among homogeneous and heterogeneous wireless networks. However, the handover delay remains high and unacceptable for delay-sensitive services such as real-time and multimedia services. Moreover, these services will be very common in next generation wireless networks. Unfortunately, these widely proposed host-based localized mobility management schemes involve the vehicle in mobility-related signalling hence effectively increasing the handover delay. Furthermore, these schemes do not properly address the advanced handover scenarios envisaged in future wireless networks. This paper, therefore, proposes a VANET mobility management framework utilizing cross-layer design, the IEEE 802.21 future standard, and the recently emerged network-based localized mobility management protocol, Proxy Mobile IPv6, to further reduce handover delay.


Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


2016 ◽  
pp. 749-777
Author(s):  
Sulata Mitra

The next generation wireless networks will be heterogeneous wireless environments because of the coexistence of a large variety of wireless access technologies. The different networks have different architectures and protocols. So it is difficult for a user to roam from one radio system to another which can be solved by using the Internet protocol as a common interconnection protocol as it needs no assumptions about the characteristics of the underlying technologies. An all-IP wireless network is an IP-based wireless access system that makes wireless networks more robust, scalable, and cost effective. The nodes in such a network are mobile nodes as they change their location and point of attachment to the Internet frequently. The mobility management is an important research issue in an all-IP wireless network for providing seamless roaming facility to mobile nodes from one wireless system to another. The dynamic resource management is also required in this environment to ensure sufficient resource in the selected route for transmission or reception of the data packets during seamless roaming of the mobile nodes. This chapter is aimed at the researchers and the policy makers making them aware of the different means of mobility management and resource management for mobile nodes in all-IP wireless networks.


Sign in / Sign up

Export Citation Format

Share Document