منابع مشابه
Supporting Groupware in Mobile Networks
We present MaGMA (Mobility and Group Management Architecture), an architecture for groupware support in mobile networks. MaGMA’s main objective is enabling mobile users to use real-time group applications over the IP infrastructure. Our solutions address group management as well as support for QoS and seamless handoff. We illustrate the advantages of MaGMA using mathematical analysis and simula...
متن کاملLTE Adaptation for Mobile Broadband Satellite Networks
One of the key factors for the successful deployment of mobile satellite systems in 4G networks is the maximization of the technology commonalities with the terrestrial systems. An effective way of achieving this objective consists in considering the terrestrial radio interface as the baseline for the satellite radio interface. Since the 3GPP Long Term Evolution (LTE) standard will be one of th...
متن کاملSupporting Programmable Handoff in Mobile Networks
In this paper we describe the design, implementation and evaluation of a programmable architecture for profiling, composing and deploying handoff services. We argue that future wireless access networks should be built on a foundation of open programmable networking allowing for the dynamic deployment and management of new mobile and wireless services. Customizing handoff control and mobility ma...
متن کاملSecurity Issues in Next Generation Mobile Networks: LTE and Femtocells
Cellular mobile networks are used by more than 4 billion users worldwide. One effective way to meet the increasing demand for data rates is to deploy femtocells, which are lowpower base stations that connect to the mobile operator through the subscriber’s residential Internet access. Yet, security and privacy issues in femtocell-enabled cellular networks, such as UMTS and LTE, still need to be ...
متن کاملImpact Study of a Mobile Botnet over LTE Networks
This paper studies the impact of a mobile botnet on a Long Term Evolution (LTE) network by implementing a mobile botnet architecture that initiates a Distributed Denial of Service (DDoS) attack. To understand the behavior of the mobile botnet, a correlation between the mobile devices’ mobility and the DDoS attack is established. Real traces of taxi cabs are used to simulate the mobile devices’ ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGMETRICS Performance Evaluation Review
سال: 2019
ISSN: 0163-5999
DOI: 10.1145/3292040.3219647