منابع مشابه
Reducing Packet Overhead in Mobile IPv6
Common Mobile IPv6 mechanisms, Bidirectional tunneling and Route optimization, show inefficient packet overhead when both nodes are mobile. Researchers have proposed methods to reduce packet overhead regarding to maintain compatible with standard mechanisms. In this paper, three mechanisms in Mobile IPv6 are discussed to show their efficiency and performance. Following discussion, a new mechani...
متن کاملReducing Real-Time Traffic Packet loss in Mobile IPv6 using Two-Tier Buffer
Packet loss in mobile IPv6 is a huge problem during mobile node handover, especially for real-time packets. When the mobile node moves from one subnet to another, it cannot receive packets that the correspondent node sent to it. This unreachable problem remains until the mobile node gets new address and sends its binding updates to inform the correspondent node about its new address. In real-ti...
متن کاملA Probabilistic Scheme for Reducing the Packet Loss in Mobile IPv6
Mobile IPv6 allows a Mobile Node to remain reachable by a Correspondent Node while roaming from one network to another network. In Mobile IPv6, a Mobile Node directly updates its current location information to a Correspondent Node using a route optimization method. Route optimization helps to culminate the packet delay incurred due to suboptimal route traversed by the packets from a Correspond...
متن کاملREDUCING HANDOFF LATENCY IN MOBILE IPv6 BASED WLAN
Internet technology has widespread throughout the world over the past few years; this technology has offered variety of services and resources to the users. In contrast to traditional fixed networks the world has become mobile. Mobile computing offers users access to resource anytime anywhere. People have started communicating over wireless area networks (WLAN) using laptops and handheld device...
متن کاملHybrid Packet Marking IP Traceback Technique over IPv4, IPv6 and Mobile IPv6
-Cyber-attacks are increasing day by day. Each time attackers or malicious users come up with new techniques or methods in order to harm the network system of particular organization. While attacking on any organization, the main focus of the attacker is to successfully launch attack against organization’s network system by hiding its own identity under the identity of other legitimate user in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Distributed and Parallel systems
سال: 2012
ISSN: 2229-3957
DOI: 10.5121/ijdps.2012.3301