Ieee Infocom 2004
DOI: 10.1109/infcom.2004.1354508
|View full text |Cite
|
Sign up to set email alerts
|

Context caching using neighbor graphs for fast handoffs in a wireless network

Abstract: User mobility in wireless data networks is increasing because of technological advances, and the desire for voice and multimedia applications. These applications, however, require handoffs between base stations to be fast to maintain the quality of the connections. Previous work on context transfer for fast handoffs has focused on reactive, i.e. the context transfer occurs after the mobile station has associated with the next base station or access router, methods. In this paper, we describe the use of a novel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
157
0

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 215 publications
(157 citation statements)
references
References 9 publications
0
157
0
Order By: Relevance
“…This way, the protocol can be easily implemented and self-maintained. The method advances a neighbor discovery approach previously proposed by A. Mishra et al [19].…”
Section: Contributionmentioning
confidence: 99%
“…This way, the protocol can be easily implemented and self-maintained. The method advances a neighbor discovery approach previously proposed by A. Mishra et al [19].…”
Section: Contributionmentioning
confidence: 99%
“…They fall into the following main categories: (1) reducing AP scanning (probe) time by using different strategies of channel scanning such as a proactive scan [6], a selective scan [7], eavesdropping [8], [9], and (2) reducing the authentication and reassociation time such as proactive distribution of authentication information [10].…”
Section: B Related Workmentioning
confidence: 99%
“…7 Security context may include the following [65]: 1) authentication state: identifiers of the client and previous authentication result; 2) authorization state: services and functions authorized to the MN; 3) communication security parameters: encryption algorithms, session keys such as encryption and decryption keys, and message authentication keys. Context transfer has been considered as a solution in intranetwork handoffs [60], [66]- [68]. In the remainder of this section, we consider interdomain context transfer to support and facilitate interdomain handoffs.…”
Section: Context Transfermentioning
confidence: 99%
“…For intradomain handoffs, [68] exploits neighbor graphs to directly transfer context from oAP to potential nAPs.…”
Section: Context Transfermentioning
confidence: 99%