Loading...
Search for: mobility-management
0.008 seconds

    User Privacy in Enterprise Mobile Management

    , M.Sc. Thesis Sharif University of Technology Parsafar, Hoda (Author) ; Amini, Morteza (Supervisor)
    Abstract
    The expansion of technology and the increasing use of mobile devices and smartphones have aected various aspects of personal and social life. These include the use of personal mobile devices in enterprise environments called BYODs have a number of positive and negative eects. On the one hand, it would be more cost-eective for an organization or business environment for users to use their own devices, but on the other hand, it poses numerous security and information challenges that are important to manage. These include disrupting the user’s privacy or disseminating organization information to personal devices and thus violating the organization’s security policies. In this study, a model is... 

    Joint Optimization of Computation Offloading and Resource Allocation in Mobile Edge Computing Networks

    , M.Sc. Thesis Sharif University of Technology Shokouhi, Mohammad Hossein (Author) ; Pakravan, Mohammad Reza (Supervisor) ; Hadi, Mohammad (Co-Supervisor)
    Abstract
    Mobile edge computing (MEC) is a promising technology that aims to resolve cloud computing’s issues by deploying computation resources at the edge of mobile network and in the proximity of users. The advantages of MEC include reduced latency, energy consumption, and load on access and mobile core networks, to name but a few. Despite all the aforementioned advantages, the mobility of mobile network users causes the traditional MEC architecture to suffer from several issues, such as decreased efficiency and frequent service interruption. One of the methods to manage users’ mobility is virtual machine (VM) migration, where the VM containing the user’s task is migrated to somewhere closer to... 

    QoS-based multi-criteria handoff algorithm for femto-macro cellular networks

    , Article Wireless Personal Communications ; Volume 98, Issue 1 , 2018 , Pages 1435-1460 ; 09296212 (ISSN) Kalbkhani, H ; Jafarpour Alamdari, S ; Shayesteh, M. G ; Solouk, V ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    The hierarchical coexistence of femtocells and macrocells is a promising approach for heterogeneous networks (HetNets), dealing mainly with indoor coverage issues and providing high data rates in cellular networks. As for any HetNet, mobility management with handoff issues on top, should be studied prior to hindering the successful deployment of these networks. The current study introduces a new handoff algorithm in hierarchical macro/femtocell HetNets based on the combination of quality of service metrics for efficient network selection including: received signal strength, co-channel interference level, and outage probability of each of femtocell and macrocell networks. The proposed... 

    Anticipatory approaches for resource allocation in LiFi networks

    , Article 2nd West Asian Colloquium on Optical Wireless Communications, WACOWC 2019, 27 April 2019 through 28 April 2019 ; 2019 , Pages 157-161 ; 9781728137674 (ISBN) Dastgheib, M. A ; Beyranvand, H ; Salehi, J. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    As a promising solution for future indoor access networks, resource allocation in Visible light communication or LiFi networks is subject to lots of researches. An interesting approach for network algorithm design is to use some knowledge about the future of the network. With this regards, the anticipatory design may improve the performance of the system in terms of delay and throughput. This paper reviews the state-of-the-art anticipatory algorithms proposed in the literature, given different prediction capabilities. The key element that all of these algorithms share is to find an event that correlates the current actions to the performance of the network in the future. Apart from the... 

    3MOKAN: A novel mobility management mechanism based on keeping alternative nodes

    , Article 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, Gino-wan, Okinawa, 25 March 2008 through 28 March 2008 ; 2008 , Pages 756-761 ; 1550445X (ISSN) ; 0769530966 (ISBN); 9780769530963 (ISBN) Hasanlou, M ; Fazli, E ; Movaghar, A ; Mohammadi, H ; Sharif University of Technology
    2008
    Abstract
    A mobile ad hoc network (MANET) is a network without any predefined infrastructure in which every node not only enjoys the services from the network, but serves the network as a relaying router. Because of nodes mobility, these kinds of networks are highly dynamic. Therefore, link failure is so frequent. In this paper we propose a novel mobility management method which is independent of underlying routing protocol. Based on this mechanism, a node tries to keep an alternate node for its next hop and when a link breakage occurs, simply node uses its alternate node as next hop. Simulation results show that this mechanism can reduce average number of hop counts, number of selected routes and... 

    Joint mode selection and resource allocation in D2D communication based underlaying cellular networks

    , Article Telecommunication Systems ; Volume 67, Issue 1 , 2018 , Pages 47-62 ; 10184864 (ISSN) Sobhi Givi, S ; Khazali, A ; Kalbkhani, H ; Shayesteh, M. G ; Solouk, V ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    Device-to-Device (D2D) communication technology, under the standardization of third generation partnership project and a component of the evolving fifth generation architecture, is mainly aimed to increase system capacity and data rate via providing direct communications between end devices without the use of routing data through the network. Apart from the attracting features, due to the resource sharing between cellular user equipment (CUE) and D2D user equipment (DUE) in such communications, an efficient algorithm for resource and power allocation to DUE, especially for mobile users is necessary to maintain the performance. The current paper introduces a joint mode algorithm for mobile... 

    A secure architecture for mobility management in heterogeneous networks in IMS

    , Article 2009 1st International Conference on Networked Digital Technologies, NDT 2009, Ostrava, 28 July 2009 through 31 July 2009 ; 2009 , Pages 496-499 ; 9781424446155 (ISBN) Hoseini, F. S ; Aghaie Khouzani, H ; Mozayani, N ; Sharif University of Technology
    2009
    Abstract
    The IP Multimedia Subsystem is a basis for a significant new architecture which offers network operators the opportunity to expand their services, integrating voice and multimedia communications and delivering them into new environments with new purposes. The IMS is an overlay network on top of IP that uses SIP as the primary signaling mechanism. Using IMS bears several new security challenges. In this paper we provide an overview of IMS and its architecture. Then we represent a secure model to overcome some of IMS security challenges. ©2009 IEEE  

    A hierarchical routing protocol for energy load balancing in wireless sensor networks

    , Article 2007 Canadian Conference on Electrical and Computer Engineering, CCECD, Vancouver, BC, 22 April 2007 through 26 April 2007 ; 2007 , Pages 1086-1089 ; 08407789 (ISSN) ; 1424410215 (ISBN); 9781424410217 (ISBN) Amini, N ; Miremadi, S. G ; Fazeli, M ; Sharif University of Technology
    2007
    Abstract
    In this paper, a hierarchical routing protocol for wireless sensor networks is introduced that aims at reducing the energy imbalance among sensor nodes by integrating the distance of the nodes from the base station into clustering policies. Moreover, the proposed routing protocol does not need any centralized support from a certain node which is at odds with aiming to establish a scalable routing protocol. Mobility management is a salient feature of this protocol that guarantees reliable communications between mobile and static nodes. A simulator was developed in the MATLAB environment to evaluate the performance of this protocol. Simulations on two different network configurations are used...