Connection failure detection mechanism of UMTS charging protocol
نویسندگان
چکیده
منابع مشابه
Real-time Charging in UMTS Environment
The forthcoming UMTS system and the subscriber’s new requirements will bring powerful changes in mobile telecommunication. With the available functions and possibilities the role of the infrastructure provider and content / application provider should diverge. In our study, we will show these new functions and possibilities, we summarize the legal and technical difficulties of the advents of 3 ...
متن کاملAn Adaptive Failure Detection Protocol
The detection of process failures is a crucial problem system designers have to cope with in order to build faulttolerant distributed platforms. Unfortunately, it is impossible to distinguish with certainty a crashed process from a very slow process in a purely asynchronous distributed system. This prevents some problems to be solved in such systems. That is why failure detector oracles have be...
متن کاملRLC buffer occupancy when using a TCP connection over UMTS
This paper analyzes a TCP connection over UMTS radio access bearer in RLC acknowledged mode. The stacking of RLC and TCP protocols is highly beneficial for the global system behavior. Protocol mechanisms used by RLC are well adapted to wireless constraints and the ARQ function implemented by RLC hides the wireless channel unreliability to TCP. However, RLC protocol parameters have to be careful...
متن کاملAn effective AKA protocol for UMTS
UMTS is the most popular third-generation mobile phone system at present, and the UMTS AKA is his authentication and key agreement protocol. There are some weaknesses in the existed UMTS AKA protocol, such as synchronization question, storage overhead, insecurity with leakiness authentication vector, and weakness in mutual authentications. In this paper, we use the concept of proxy key to desig...
متن کاملSPUR: A Secured Protocol for UMTS Registration
This paper presents a new scheme for mobile identification and registration in UMTS networks. Our approach attempts to alleviate different limitations observed with the current solutions (such as the 3GPP). It guarantees the protection of the data transmitted on the SIP messages during the registration procedure. Our method provides the authentication of the main entities involved in the regist...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Wireless Communications
سال: 2006
ISSN: 1536-1276
DOI: 10.1109/twc.2006.1633371