scispace - formally typeset
Search or ask a question

Context Transfer Protocol (CXTP)

TL;DR: This document presents the Context Transfer Protocol (CXTP) that enables authorized context transfers that reduces latency and packet losses, and to avoid the re-initiation of signaling to and from the mobile node.
Abstract: This document presents the Context Transfer Protocol (CXTP) that enables authorized context transfers. Context transfers allow better support for node based mobility so that the applications running on mobile nodes can operate with minimal disruption. Key objectives are to reduce latency and packet losses, and to avoid the re-initiation of signaling to and from the mobile node. This memo defines an Experimental Protocol for the Internet community.
Citations
More filters
Proceedings ArticleDOI
07 Mar 2004
TL;DR: A novel and efficient data structure, neighbor graphs, is described, which dynamically captures the mobility topology of a wireless network as a means for prepositioning the station's context ensuring that the station’s context always remains one hop ahead.
Abstract: User mobility in wireless data networks is increasing because of technological advances, and the desire for voice and multimedia applications. These applications, however, require fast handoffs between base stations to maintain the quality of the connections. Previous work on context transfer for fast handoffs has focused on reactive methods, i.e. the context transfer occurs after the mobile station has associated with the next base station or access router. In this paper, we describe the use of a novel and efficient data structure, neighbor graphs, which dynamically captures the mobility topology of a wireless network as a means for prepositioning the station's context ensuring that the station's context always remains one hop ahead. From experimental and simulation results, we find that the use of neighbor graphs reduces the layer 2 handoff latency due to reassociation by an order of magnitude from 15.37ms to 1.69ms, and that the effectiveness of the approach improves dramatically as user mobility increases.

322 citations


Cites background or methods from "Context Transfer Protocol (CXTP)"

  • ...The previous work on context transfers has mostly focused on the IP layer using reactive transfer mechanisms [7], and general purpose transfer mechanisms without detailing transfer triggers [11]....

    [...]

  • ...In the case of the SEAMOBY context transfer protocol, the protocol provides a generic framework for either reactive or pro-active context transfers [11]....

    [...]

01 Aug 2008
TL;DR: This document specifies the EAP key hierarchy and provides a framework for the transport and usage of keying material generated by EAP authentication algorithms, known as "methods", and also provides a system-level security analysis.
Abstract: The Extensible Authentication Protocol (EAP), defined in [RFC3748], enables extensible network access authentication. This document specifies the EAP key hierarchy and provides a framework for the transport and usage of keying material generated by EAP authentication algorithms, known as "methods". It also provides a system-level security analysis.

182 citations

Journal ArticleDOI
TL;DR: A comprehensive survey of authentication and privacy-preserving schemes for 4G and 5G cellular networks can be found in this paper, where the authors provide a taxonomy and comparison of authentication schemes in terms of tables.

163 citations

Journal ArticleDOI
TL;DR: A fast-handoff framework is introduced which adaptively meets different application requirements via a cross-layer approach and important design considerations for mobility support in future IEEE 802.11 networks are suggested.
Abstract: With the advance of wireless local area network (WLAN) technology, handoff support has become one of the most important issues in IEEE 802.11 WLANs. However, the current IEEE 802.11 specification does not provide the fast handoff required for real-time multimedia applications. To support fast handoff in IEEE 802.11 networks, a number of fast-handoff schemes have been proposed in the literature. In this article we review these fast-handoff schemes and analyze their advantages and disadvantages qualitatively. After that, important design considerations for mobility support in future IEEE 802.11 networks are suggested. Also, we introduce a fast-handoff framework which adaptively meets different application requirements via a cross-layer approach.

149 citations


Cites background from "Context Transfer Protocol (CXTP)"

  • ...Here, the context includes information regarding the MH’s session, quality of service (QoS), and security [26]....

    [...]

Patent
25 Mar 2010
TL;DR: In this article, a method for optimising the distribution of data objects between caches in a cache domain of a resource limited network is described, where object information including the request frequency of each requested data object and the locations of the caches at which the requests were received is collated and stored.
Abstract: There is described a method for optimising the distribution of data objects between caches in a cache domain of a resource limited network. User requests for data objects are received at caches in the cache domain. A notification is sent from each cache at which a request is received to a cache manager. The notification reports the user request and identifies the requested data object. At the cache manager, object information including the request frequency of each requested data object and the locations of the caches at which the requests were received is collated and stored. At the cache manager, objects for distribution within the cache domain are identified on the basis of the object information. Instructions are sent from the cache manager to the caches to distribute data objects stored in those caches between themselves. The objects are classified into classes according to popularity, the classes including a high popularity class comprising objects which should be distributed to all caches in the cache domain, a medium popularity class comprising objects which should be distributed to a subset of the caches in the cache domain, and a low popularity class comprising objects which should not be distributed.

137 citations