scispace - formally typeset
Search or ask a question
Author

Madjid F. Nakhjiri

Bio: Madjid F. Nakhjiri is an academic researcher. The author has contributed to research in topics: The Internet & Network packet. The author has an hindex of 1, co-authored 1 publications receiving 166 citations.

Papers
More filters
01 Jul 2005
TL;DR: This document presents the Context Transfer Protocol (CXTP) that enables authorized context transfers that reduces latency and packet losses, and to avoid the re-initiation of signaling to and from the mobile node.
Abstract: This document presents the Context Transfer Protocol (CXTP) that enables authorized context transfers. Context transfers allow better support for node based mobility so that the applications running on mobile nodes can operate with minimal disruption. Key objectives are to reduce latency and packet losses, and to avoid the re-initiation of signaling to and from the mobile node. This memo defines an Experimental Protocol for the Internet community.

166 citations


Cited by
More filters
Proceedings ArticleDOI
07 Mar 2004
TL;DR: A novel and efficient data structure, neighbor graphs, is described, which dynamically captures the mobility topology of a wireless network as a means for prepositioning the station's context ensuring that the station’s context always remains one hop ahead.
Abstract: User mobility in wireless data networks is increasing because of technological advances, and the desire for voice and multimedia applications. These applications, however, require fast handoffs between base stations to maintain the quality of the connections. Previous work on context transfer for fast handoffs has focused on reactive methods, i.e. the context transfer occurs after the mobile station has associated with the next base station or access router. In this paper, we describe the use of a novel and efficient data structure, neighbor graphs, which dynamically captures the mobility topology of a wireless network as a means for prepositioning the station's context ensuring that the station's context always remains one hop ahead. From experimental and simulation results, we find that the use of neighbor graphs reduces the layer 2 handoff latency due to reassociation by an order of magnitude from 15.37ms to 1.69ms, and that the effectiveness of the approach improves dramatically as user mobility increases.

322 citations

01 Aug 2008
TL;DR: This document specifies the EAP key hierarchy and provides a framework for the transport and usage of keying material generated by EAP authentication algorithms, known as "methods", and also provides a system-level security analysis.
Abstract: The Extensible Authentication Protocol (EAP), defined in [RFC3748], enables extensible network access authentication. This document specifies the EAP key hierarchy and provides a framework for the transport and usage of keying material generated by EAP authentication algorithms, known as "methods". It also provides a system-level security analysis.

182 citations

Journal ArticleDOI
TL;DR: A comprehensive survey of authentication and privacy-preserving schemes for 4G and 5G cellular networks can be found in this paper, where the authors provide a taxonomy and comparison of authentication schemes in terms of tables.

163 citations

Journal ArticleDOI
TL;DR: A fast-handoff framework is introduced which adaptively meets different application requirements via a cross-layer approach and important design considerations for mobility support in future IEEE 802.11 networks are suggested.
Abstract: With the advance of wireless local area network (WLAN) technology, handoff support has become one of the most important issues in IEEE 802.11 WLANs. However, the current IEEE 802.11 specification does not provide the fast handoff required for real-time multimedia applications. To support fast handoff in IEEE 802.11 networks, a number of fast-handoff schemes have been proposed in the literature. In this article we review these fast-handoff schemes and analyze their advantages and disadvantages qualitatively. After that, important design considerations for mobility support in future IEEE 802.11 networks are suggested. Also, we introduce a fast-handoff framework which adaptively meets different application requirements via a cross-layer approach.

149 citations

Patent
25 Mar 2010
TL;DR: In this article, a method for optimising the distribution of data objects between caches in a cache domain of a resource limited network is described, where object information including the request frequency of each requested data object and the locations of the caches at which the requests were received is collated and stored.
Abstract: There is described a method for optimising the distribution of data objects between caches in a cache domain of a resource limited network. User requests for data objects are received at caches in the cache domain. A notification is sent from each cache at which a request is received to a cache manager. The notification reports the user request and identifies the requested data object. At the cache manager, object information including the request frequency of each requested data object and the locations of the caches at which the requests were received is collated and stored. At the cache manager, objects for distribution within the cache domain are identified on the basis of the object information. Instructions are sent from the cache manager to the caches to distribute data objects stored in those caches between themselves. The objects are classified into classes according to popularity, the classes including a high popularity class comprising objects which should be distributed to all caches in the cache domain, a medium popularity class comprising objects which should be distributed to a subset of the caches in the cache domain, and a low popularity class comprising objects which should not be distributed.

137 citations