Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
4 pages
1 file
Currently, the technology trend indicates that billions of handheld gadgets as well as other types of mobile devices will be coming online in the next few years. Mobility is important in mobile communication. While the existing Internet mobility standards, namely Mobile IP, is waiting for a wide adoption, cell phone networks are providing the ubiquitous mobility services on a global scale as of today. This paper will explain how to implementing IP Mobile in wireless access point. It can be done by two methods that are Distributed DHCP (MAC reserved) and Centralized DHCP (Bypassed DHCP) with maintaining IP. However, in the movement of IP mobile from one access point to another access point there is delay time that we called delay IP and delay activity
Fifth IEE International Conference on 3G Mobile Communication Technologies (3G 2004) The Premier Technical Conference for 3G and Beyond, 2004
ABSTRACT The following paper describes the challenges of providing consistent authentication procedures across WLAN hotspots owned by different operators, where the set of credentials that the user should present to the network can be quite large depending on user subscription and inter-operator roaming agreements. This paper provides a description of the set of features that are needed to support secure, authenticated access to the network, and highlights how current authentication solutions provide at least some of these features. Finally the paper introduces two new techniques for enhancing the operation of these authentication solutions to provide a consistent "look and feel" and level of security across different hotspots.
Computer Networks, 2009
The Control And Provisioning of Wireless Access Points (CAPWAP) protocol is under definition within the IETF to enable an Access Controller (AC) to manage a collection of Wireless Termination Points (WTPs). CAPWAP aims at simplifying the deployment and control of large scale, possibly heterogeneous, wireless networks. We present the first open source implementation of the CAPWAP protocol along with early experimental results aiming at the assessment of its reliability and performances. The paper ends describing applications of the CAPWAP protocol to management and QoS scenarios and discussing benefits and technical issues concerning its use.
In this paper we propose and describe a unified solution for interoperability between mobile cellular network and WLAN. The integration between two networks, cellular and WLAN, is performed on the Authentication, Authorization and Accounting i.e. AAA side. For that purpose we developed WLAN Access Controller and WLAN AAA Gateway, which provide gateway-type access control as well as charging and billing functionalities for the WLAN service, respectively. In the development process of these elements we have considered current development stadium of all needed network entities and protocols. The developed solution provides costeffective and easy-to-deploy PLMN-WLAN internetworking scenario.
Int'l J. of Communications, Network and System Sciences, 2014
The growing ubiquity of Wi-Fi networks combined with the integration of low-cost Wi-Fi chipsets in all devices makes Wi-Fi as the wireless technology the most used for accessing to internet [1]. This means that the development of a Wi-Fi strategy has become an imperative for almost all operators worldwide. In this context, APs (Access Points) have to become as secure as cellular networks. Furthermore, authentication process between a mobile device and an access point has to be automated, without user constraining configuration. For reaching this purpose, client must have different credentials depending on authentication method. Our goal is to create an architecture that is both ergonomic and flexible in order to meet the need for connection and client mobility. We use NFC technology as a radio channel for starting communication with the network. The communication initiation will instantiate a virtual Wi-Fi AP and distribute all policies and access certificates for an authentication based on EAP-TLS (it could be extended to any EAP method for 802.1X standard). The end result of our new topology is to allow access to services through a virtual Wi-Fi AP with an enterprise-grade in a public hotspot.
2018
THOMPSON, Edward Palmer. <strong>Costumes Em Comum</strong>: Estudo Sobre Cultura Popular Tradicional. São Paulo: Companhia Das Letras, 1988. 528 pág.
La prueba t-Student se utiliza para contrastar hipótesis sobre medias en poblaciones con distribución normal. También proporciona resultados aproximados para los contrastes de medias en muestras suficientemente grandes cuando estas poblaciones no se distribuyen normalmente (aunque en este último caso es preferible realizar una prueba no paramétrica). Para conocer si se puede suponer que los datos siguen una distribución normal, se pueden realizar diversos contrastes llamados de bondad de ajuste, de los cuales el más usado es la prueba de Kolmogorov. A menudo, la prueba de Kolmogorov es referida erróneamente como prueba de Kolmogorov-Smirnov, ya que en realidad esta última, sirve para contrastar si dos poblaciones tienen la misma distribución. Otros tests empleados para la prueba de normalidad son debidos a Saphiro y Wilks.
Journal of Business on Hospitality and Tourism
Journal of British Studies, 2009
Annals of the Alexandru Ioan Cuza University - Economics
Українсько-єврейське співжиття в Галичині й конструювання національного , 2011
Schizophrenia Bulletin, 2004
Journal of Applied Geophysics, 2018
JACC: Cardiovascular Interventions, 2014
Computers & Education, 2010
International journal of sport and exercise psychology, 2016
Australian Journal of Teacher Education, 2014
Journal of Computer Science and Cybernetics
Journal of Managerial Psychology, 2011
Journal of Web Engineering, 2021
Levéltári Szemle, 2024
Revista De Educacion, 1989
Third International …, 1996