In this paper, we propose a new ticket based binding update protocol for Mobile IPv6. This protocol uses CGA (Cryptographically Generated Address) to provide mutual authentication between a mobile node and its corresp...
详细信息
ISBN:
(纸本)9783540683797
In this paper, we propose a new ticket based binding update protocol for Mobile IPv6. This protocol uses CGA (Cryptographically Generated Address) to provide mutual authentication between a mobile node and its corresponding node, but differs from previous protocols in the following way. The protocol does not require a mobile node to generate a signature each time it acquires a new IP address. To minimize computational cost of using CGA, the corresponding node issues a ticket that can be used in later update requests. Our initial protocol requires similar computational cost compared to previous protocols based on CGA, but outperforms others when a mobile node has a valid ticket.
We consider an equilibrium threshold balking strategy in an unobservable GI/M/c queue with customers39; impatience. Upon arriving a customer decides whether to join or balk the queue based on random probability know...
详细信息
ISBN:
(纸本)9783319044835;9783319044828
We consider an equilibrium threshold balking strategy in an unobservable GI/M/c queue with customers' impatience. Upon arriving a customer decides whether to join or balk the queue based on random probability known as joining probability (f). Once a customer decides to join the system it initiates an impatient timer with random duration T, such that, if customers' service is not completed before the timer expires, the customer abandons the system. The waiting time of a customer in system has been associated with a linear cost-reward structure for estimating the net benefit if a customer chooses to participate in the system. The study has been limited to unobservable queue where the information regarding system-length is unknown to the arriving customer. The proposed analysis is based on a root of the characteristic equation formed using the probability generating function of embedded pre-arrival epoch probabilities. Therefore, we obtain the stationary system-length distribution at pre-arrival and arbitrary epochs and thereby we obtain mean system sojourn time. Finally, we present numerical results in the form of graphs for observing net benefit against different model parameters. The proposed model has applications in the modeling of balking and impatient behavior of incoming calls in a call center, multi-core computing, multi-path routing in delay sensitive communications networks.
This work proposes the design and improvement of the wireless cloud system services for controlling water temperature and monitoring the pH-value for the crayfish breeding system. The cooling system employs a set of p...
详细信息
ISBN:
(纸本)9781538666630
This work proposes the design and improvement of the wireless cloud system services for controlling water temperature and monitoring the pH-value for the crayfish breeding system. The cooling system employs a set of peltier, microcontroller board, and temperature and pH sensors. The circulate water system is used in order to maintain well-distributed water temperature in the water tank. The record data is displayed via the cloud computing processing system, which can be access the measured data at any time and everywhere by various PDA devices via internet network.
Implementing se if-management is hard, especially when building large scale distributed systems. Publish/subscribe middlewares, scientific visualization and collaboration tools, and corporate operational information s...
详细信息
Nowadays, distributed information in the form of linguistic resources is accessible throughout the internet. Search engines have become crucial for information retrieval since users need to find and retrieve relevant ...
详细信息
ISBN:
(纸本)9780889866560
Nowadays, distributed information in the form of linguistic resources is accessible throughout the internet. Search engines have become crucial for information retrieval since users need to find and retrieve relevant information in various languages and forms. The objective of this paper is to investigate the application of query expansion technique to improve cross-language information retrieval in English and Thai. As the method of evaluation of query expansion, we investigate whether the expanded terms are useful for the search.
Fog computing is a platform for executing computation intensive tasks by aggregating computational resources of the edge-devices. The challenges of fog computing, includes heterogeneity, scalability, addressing and se...
详细信息
ISBN:
(纸本)9781538642733
Fog computing is a platform for executing computation intensive tasks by aggregating computational resources of the edge-devices. The challenges of fog computing, includes heterogeneity, scalability, addressing and security. In this paper, we address the workload distribution problem in fog network. This is particularly important for reducing the computational latency of an offloading task. An efficient workload distribution is required for effective resource utilization of the fog network. The two extreme approaches for solving the workload distribution problem is by utilizing a centralized or a distributed approach. A distributive framework can be scalable and fault tolerant. However, the communication overhead for maintaining a distributed framework is significantly more compared to a centralized approach. On the other hand, a centralized framework, can be relatively easier for implementing an economic model for multiple services offered by the system. In this paper, we investigate the feasibility of implementing a centralized framework to handle workload distribution in fog network. The two main entities of the framework are: Controller, that collects the available network resources of the participating devices for efficient workload distribution and Clients, providing computational resources for executing task. We evaluate our framework by integrating various heterogeneous nodes like DragonBoard, RaspberryPi and others.
internet flows characteristics are important reference for network behaviors research. However, there are few latest related studies and comparative analysis on different networks is especially rare. Based on traffic ...
详细信息
As a result of the proliferation of internet-connected smart devices brought about by the explosive growth of the internet of Everything (IoE), lower bandwidth load, slower response, bad security, and poor privacy are...
详细信息
In the era of internet, one of the most ultimate goals is that users can seamlessly access to any computing application or service at anywhere anytime. computing infrastructuralization is the path to gradually address...
详细信息
The content technology need to approach new forms and formats with more intelligence and more flexibility to enable a set of new features for the final users with respect those that are present on market standards In ...
详细信息
ISBN:
(纸本)9781424449620
The content technology need to approach new forms and formats with more intelligence and more flexibility to enable a set of new features for the final users with respect those that are present on market standards In this paper, an evolved content model and tools that allow the personal content management on PDA are presented. The proposed solution has been developed by expanding the AXMEDIS MPEG-21 content format with semantic information and processing tools directly hosted on mobile device, PDA and PC.
暂无评论