The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the design, construction, and testing of a fully-functional virtualised mobile core network is outlined. Lessons learned and recommendations for future improvements are provided. The presented work uses open-source software for virtual network function infrastructure control (OpenStack), network flow programming (OpenDaylight), and network orchestration (OpenBaton) to virtualise a commercial...
Pervasive computing is one of the increasing researches nowadays. The main problem to be solved in pervasive computing is service discovery and service providing accurately within a stipulated time interval. This paper proposes a REQ-RES Matching based service discovery method for improve the efficiency of service discovery and service provision. Present and permanent information of services is stored...
Virtualization of network functions and centralized management are anticipated to provide 5G mobile networks with flexibility, lower end-to-end latency and reduced cost. Based on the concept of emerging Software Defined Network (SDN) and Network Function Virtualization (NFV) techniques, we propose Software Defined Protocol (SDP) technique to facilitate a flexible service-oriented protocol stack deployment...
As mobile devices and mobile Internet cover large area, the development of mobile learning also got bigger. This article mainly expounds the JAVA mobile learning system under the environment of development and implementation, combined with domestic and international theory research results, elaborated the development trend of mobile learning and mobile learning system design principle, the image and...
The paper presents a detailed techno-economic model for LTE networks with inherent coupling of CAPEX and OPEX cost for each real or virtualized network element. The life-cycle phases of a network from the idea to set up a certain product or service, followed by the installation and operation of the network up to the decommissioning of the equipment are taken into account. The work was performed within...
This demonstration presents a new and innovative open platform whose goal is to enable secure mobile applications. Secure Elements (SE) are hosted in dedicated servers, whose protocol (RACS) is detailed by an IETF draft. They are remotely used from mobiles via secure TLS channels. These channels are booted from TLS NFC (Near Field Communication) smartcards that are tapped against tablets equipped...
Network Function Virtualization (NFV) promises to transform the way telecom providers design and operate networks and network services. Virtualized Evolved Packet Core (vEPC) is one of the NFV use cases that has got most attention, where dependability is a major concern. In the traditional EPC, functions are deployed in proprietary network elements with proven characteristics, e.g., a defined availability,...
In the latest years, we have seen a fast evolution of Internet systems and a remarkable increase of the number and variety of services required. The need of new architectural solutions has led to the creation of new tools that allow to develop more flexible and dynamic networks. Software Defined Networking (SDN) goes in this direction, offering a new way to manage networks, based on programmability,...
In this work, we demonstrate the design and implementation of a novel system called Async, which enables a mobile network operator (MNO) to efficiently manage the growth of mobile data. For this, we enable an opportunistic delivery model for the MNOs by leveraging the delay-elastic nature of certain applications such as video downloads, and the price-sensitive nature of certain users. Specifically,...
Remote Laboratories constitute a first order didactic resource in engineering faculties. Their use from mobile devices to increase the availability of the experiments at the laboratory is a challenge highly coupled to the requirements established by each experiment. This paper will present and compare the main strategies for adapting a Remote Laboratory to mobile devices, as well as the experience...
The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront. Compare with traditional operating system, personal cloud shifts individual computing "from being device-centric to information-centric", which create a bridge between operating system-based computing and the more service-oriented approach...
Advanced mobile networking technology applicable to mobile sensor platforms was developed, deployed and demonstrated. A two-tier sensorweb design was developed. The first tier utilized mobile network technology to provide mobility. The second tier, which sits above the first tier, utilizes 6LowPAN (Internet Protocol version 6 Low Power Wireless Personal Area Networks) sensors. The entire network was...
The emerging of cloud computing has brought about new hope for efficient adoption and use of computer-based information system. Software as a Service (SaaS) allows online customers to use applications on the Internet on a payas-you-go basis without investing in new infrastructure or software license. However, current SaaS delivery model bring challenge to online customers in community with poor financial...
The proliferation of heterogeneous mobile applications has overridden privacy and security issues. Since privacy threat in Location Based Services (LBS) is very hard to define, new approach of addressing the anonymity issues in Privacy Enhancing Technologies (PETs) using Trusted Computing technologies will result the privacy enhancement of user personal data and location information in mobile network...
Smart phones of today have increasingly sophisticated software. As the feature set grows further, the probability of system security related defects is likely to increase as well. Today, the security of mobile platforms and applications comes under great scrutiny as they are getting widely adopted. It is therefore crucial that code for mobile devices gets well tested and security bugs eliminated where...
With Java runtime-based application has been widely used in our enterprise application and mobile computing.We must maintain many machines in different types, like web server cluster,distributed database,virtual machines,hosting machines and so on.Cloud computing technology has been designed to manage those resources in efficiently way. Client agent can be installed in those host machines or virtual...
Fourth Generation (4G) is the evolving mobile technology, supporting up to 1 Gbit/s bandwidth for fixed gadgets and 100 Mbit/s for mobiles, and is reported to be more secure than 3G and 4G. Also supports IPv6 in addition to many added features. Content Delivery Networks (CDN) is the technology deployed for good quality as well as speedy access to the content as it overcomes flash crowd, denial of...
With the present technology and environment, we are able to interact with other people using online communities, while sometimes missing the opportunity to meet people in the real world. Location-based services have a strong correlation with the real world, and have the potential to develop online connections into off-line connections. However, most of these location-based services observe only users'...
Smartphone is the fastest growing in handheld device market. Due to this factor, the importance of mobile web and applications are growing. We introduce an alternative enhanced hybrid application scheme to reduce a number of applications. The enhanced hybrid application can provide various services based on Wi-Fi zone. This application can reduce a number of applications and complexity in mobile home...
Mobile device has become an important tool and component in many businesses and used widely as a successful platform to invent and develop new applications to increase efficiency and reduce cost. Maintaining a fleet of devices for the mobile task force in a secure and scalable fashion is critical to ensure the long-term success of enterprise mobility platforms. Many mobile device management suites...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.