List of Journals    /    Call For Papers    /    Subscriptions    /    Login
 
 
 
 
 SEARCH
By Author By Title
 
 
ABOUT CSC
 About CSC Journals
 CSC Journals Objectives
 List of Journals
 CALL FOR PAPERS
 Call For Papers CFP
 Special Issue CFP
AUTHOR GUIDELINES
 Submission Guidelines
 Peer Review Process
 Helpful Hints For Getting Published
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 FOR REVIEWERS
 Reviewer Guidelines
 FOR EDITORIAL
 Editor Guidelines
 Join Us As Editor
 Launch Special Issue
 Suggest New Journal
 CSC LIBRARY
 Browse CSC Library
 Open Access Policy
  SERVICES
 Conference Partnership Program (CPP)
 Abstracting & Indexing
 SUBSCRIPTIONS
 Subscriptions
 Discounted Packages
 Archival Subscriptions
 How to Subscribe
 Librarians
 Subscriptions Agents
 Order Form
 DOWNLOADS
 
 
 
 
A Context Transfer Approach to Enhance Mobile Multicast
Full text
 PDF(179.4KB)
Source 
International Journal of Computer Science and Security (IJCSS)
Table of Contents
Download Complete Issue    PDF(1016.41KB)
Volume:  2    Issue:  4
Pages:  1-42
Publication Date:   August 2008
ISSN (Online): 1985-1553
Pages 
9 - 17
Author(s)  
Aisha-Hassan A. Hashim - Malaysia
Abdi Nasir Ahmed - Malaysia
Abdulrehman Bin Mahfouz - Malaysia
Sheroz Khan - Malaysia
 
Published Date   
15-11-2008 
Publisher 
CSC Journals, Kuala Lumpur, Malaysia
ADDITIONAL INFORMATION
Keywords   Abstract   References   Cited by   Related Articles   Collaborative Colleague
 
KEYWORDS:   context transfer, Hierarchical Mobile IPv6, multicast, signaling cost 
 
 
This Manuscript is indexed in the following databases/websites:-
1. Directory of Open Access Journals (DOAJ)
2. Free-Books-Online
3. Docstoc
4. Scribd
5. PDFCAST
6. CiteSeerX
7. WorldCat
8. Google Scholar
9. ScientificCommons
10. Academic Index
11. refSeek
12. ResearchGATE
13. Bielefeld Academic Search Engine (BASE)
14. Socol@r
15. iSEEK
16. Academic Journals Database
17. Libsearch
18. slideshare
 
 
With the advent of the handheld devices and multimedia applications, there has been an increasing interest for mobile multicast. IETF proposes two approaches. The first approach is Bi-directional Tunneling (BT), where the mobile node subscribes to a multicast group through its home network. The second approach is Remote Subscription (RS), where the mobile node joins the multicast group via a local multicast router on the foreign link being visited. However, in BT approach the home agent is typical far and this will lead to high signaling cost at the same time the home agent represents a single point of failure and introduces scalability issues. RS approach suffers mainly from frequent tree reconstruction. The main aim for this paper is to propose a new mobile multicast approach to reduce the signaling cost and reduce the packet loss especially in case of macromibiliy. The proposed solution integrates Hierarchical Mobile IPv6 with Mobile context transfer. This paper presents and evaluates the proposed solution. Our results shows that compared to BT approach, the proposed solution gives lower signaling cost. 
 
 
 
1 R. Berezdivin, R. Breining, and R. Topp. “Next-Generation Wireless Communications Concepts and Technologies”. IEEE Commun. Mag., vol. 40, Mar. 2002, pp. 108–16.
2 Karan Singh, R. S. Yadav, Ranvijay. “A Review Paper on AD HOC Network Security”. International Journal of Computer Science and Security, Vol.1, Issue 1, 2007.
3 R.Asokan, A.M.Natarajan, C.Venkatesh. “Ant Based Dynamic Source Routing Protocol to Support Multiple Quality of Service (QoS) Metrics in Mobile Ad Hoc Networks”. International Journal of Computer Science and Security, vol. 2, issue 3, 2008.
4 A.K. Othman. “GPS-less Localization Protocol for Underwater Acoustic Networks”. International Journal of Computer Science and Security, Vol. 1, Issue 1, 2007.
5 R. Koodli, E. Perkins, “Fast Handovers and Context Transfer in Mobile Networks”, Nokia Research Center, 2004.
6 Xia, F. and Sarikaya, B. "FMIPv6 extensions for Multicast Handover", draft-xia-mipshopfmip- multicast-00.txt, (work in progress), September 2006.
7 X. P. Costa, R. Schmitz, H. Hartenstein, M. Liebsch, “A MIPV6, FMIPV6 and HMIPV6 Handover Latency Study: Analytical Approach”, NEC EUROPE Ltd, Heidelberg, 2005.
8 T. C. Schmidt, M. Waehlisch. “Seamless Multicast Handover in a Hierarchical Mobile IPv6 Environment”. IETF, December 2005.
9 J. Loughney, M. Nakhjiri, C. Perkins, R. Koodli. “Context Transfer Protocol”. RFC4067, 2005.
10 Soliman, H., Castelluccia, C., El-Malki, K., Bellier, L. "Hierarchical Mobile IPv6 mobility management". RFC 4140, August 2005.
11 I. Miloucheva. “Context Management for Efficient Mobile Multicast Service”. FOCUS, 2004.
12 H. Santos, A. Mantos. “Context Transfer of Mobile IPv6 Multicast Listeners”. Internet Draft (work in progress expired), February 2006.
13 Schmidt, T. "Multicast Mobility in MIPv6: Problem Statement and Brief Survey". Draft irtfmobopts- mmcastv6-ps-01.txt (work in progress), July 2007.
14 J. Kempf. "Problem Description: Reasons For Performing Context Transfers Between Nodes in an IP Access Network". IETF, September 2002.
15 J. Xie and I. F. Akyildiz. “An optimal location management scheme for minimizing signaling cost in Mobile IP”. IEEE International Conference on Communications (ICC), New York, pp. 3313–3317, April 2002.
16 S. Fu, M. Atiquzzaman, L. Ma, and Y. Lee. “Signaling cost and performance of SIGMA, A seamless handover scheme for data networks”. Accepted by Journal of Wireless Communication Mobile Computing, 2005.
 
 
 
 
 
 
1 PeekYou
 
2 yasni
 
3 Waatp
 
 
 
Aisha-Hassan A. Hashim : Colleagues
Abdi Nasir Ahmed : Colleagues
Abdulrehman Bin Mahfouz : Colleagues
Sheroz Khan : Colleagues  
 
 
 
  Untitled Document
 
Copyrights (c) 2012 Computer Science Journals. All rights reserved.
Best viewed at 1152 x 864 resolution. Microsoft Internet Explorer.
 
  
 
Copyrights & Usage: Articles published by CSC Journals are Open Access. Permission to copy and distribute any other content, images, animation and other parts of this website is prohibited. CSC Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.