Search results

Filters

  • Journals

Search results

Number of results: 2
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

The growing number of mobile devices and the increasing popularity of multimedia services result in a new challenge of providing mobility in access networks. The paper describes experimental research on media (audio and video) streaming in a mobile IEEE 802.11 b/g/n environment realizing network-based mobility. It is an approach to mobility that requires little or no modification of the mobile terminal. Assessment of relevant parameters has been conducted in an IPv6 testbed. During the tests, both Quality of Service (QoS) and Quality of Experience (QoE) parameters have been considered. Against the background of standard L3 and L2 handovers, an emerging mobility solution named Proxy Mobile IPv6 (PMIPv6) has been examined. Its advantages (L3 connectivity maintenance) and disadvantages (packet loss during handover) are emphasized based on the obtained results. Moreover, a new solution for handover optimization has been proposed. A handoff influence upon audio/video generation and transfer imperfections has been studied and found to be an interesting direction of future work.

Go to article

Authors and Affiliations

M. Hoeft
K. Gierlowski
T. Gierszewski
J. Konorski
K. Nowicki
J. Wozniak
Download PDF Download RIS Download Bibtex

Abstract

This article describes security mechanisms used by 3rd-7th layers in OSI/ISO network model. Many of commonly used protocols by these layers were designed with assumption that there are nointruders. Such assumption was true many years ago. The network situation has been changed for last few years and we should realize that some properties of existing protocols may be abused. Moreover, we should exchange some of them or create new versions. There are some methods and guidelines concerning secure programming, but there is also lack of guidelines about creating secure protocols. Authors see the necessity of such guideline and this article is an attempt at analysing existing solutions and selecting some universal and important patterns.

Go to article

Authors and Affiliations

Marek Kołodziejczyk
Marek R. Ogiela

This page uses 'cookies'. Learn more