Real-time service provisioning for mobile and wireless networks

As mobile devices and wireless networks are becoming ubiquitous, the interest of users to deploy real-time applications, e.g. online gaming or Voice-over-IP in such environments is also increasing. Due to the difference between traditional and wireless networks, in particular in terms of available bandwidth and network structure, the concepts used for supporting real-time applications in both networks are different. This paper gives an overview of the key technical challenges that are fundamental and need to be solved in order to easily support real-time applications in wireless and mobile environments. In a first step, issues related to service provisioning in mobile networks are discussed. This is followed by a look at the Quality of Service supported by wireless networks and possible techniques for improving it. Finally, concepts for securing the communication between the users of real-time applications in wireless and mobile networks are presented. For each of these issues, we provide a detailed analysis and an overview of the state-of-the-art. Moreover, we illustrate the main points using distributed online games as an example.

[1]  Robert Cole,et al.  Computer Communications , 1982, Springer New York.

[2]  Lazaros F. Merakos,et al.  Security in third Generation Mobile Networks , 2004, Comput. Commun..

[3]  Gordon S. Blair,et al.  Quality of service management in distributed systems , 1994 .

[4]  R. Braden,et al.  Resource reSer Vation Protocol (RSVP) , 1997 .

[5]  Zheng Wang,et al.  An Architecture for Differentiated Services , 1998, RFC.

[6]  Raj Jain,et al.  Resource Reservation Protocol (RSVP) , 1999 .

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  Gerard Roca Mallofre Resource Reservation Protocol ( RSVP ) , 2022 .

[9]  Wenjing Lou,et al.  Anonymous communications in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[10]  Bernhard Plattner,et al.  A Service Deployment Architecture for Heterogenous Active Networks Nodes , 2002, SMARTNET.

[11]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[12]  Dan Grigoraş Service-oriented Naming Scheme for Wireless Ad Hoc Networks , 2003 .

[13]  Vijay K. Madisetti,et al.  Transport Layer QoS Management for Wireless Multimedia Services , 2002 .

[14]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[15]  Andrew B. Whinston,et al.  Defending Wireless Infrastructure Against the Challenge of DDoS Attacks , 2002, Mob. Networks Appl..

[16]  Martin Mauve,et al.  Lightweight QoS-support for networked mobile gaming , 2004, NetGames '04.

[17]  Leandros Tassiulas,et al.  Network layer support for service discovery in mobile ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[18]  Tristan Henderson,et al.  Networked games: a QoS-sensitive application for QoS-insensitive users? , 2003, RIPQoS '03.

[19]  Ralf Steinmetz,et al.  Human Perception of Jitter and Media Synchronization , 1996, IEEE J. Sel. Areas Commun..

[20]  M. Sloman Network and distributed systems management , 1994 .

[21]  Gustavo Alonso,et al.  Web Services: Concepts, Architectures and Applications , 2009 .

[22]  Abdelsalam Helal,et al.  Konark - a service discovery and delivery protocol for ad-hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[23]  Charles E. Perkins,et al.  Service Location Protocol, Version 2 , 1999, RFC.

[24]  David L. Black,et al.  An Architecture for Differentiated Service , 1998 .

[25]  Marco Conti,et al.  Cross-layering in mobile ad hoc network design , 2004, Computer.

[26]  Charles E. Perkins,et al.  IP Mobility Support , 1996, RFC.

[27]  Panganamala Ramana Kumar,et al.  A cautionary perspective on cross-layer design , 2005, IEEE Wireless Communications.

[28]  Haiyun Luo,et al.  Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .

[29]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[30]  LeeWenke,et al.  Intrusion detection techniques for mobile wireless networks , 2003 .

[31]  Charles E. Perkins,et al.  Service Location Protocol , 1997, RFC.

[32]  David R. Cheriton,et al.  DoS and authentication in wireless public access networks , 2002, WiSE '02.

[33]  Jian Li,et al.  Qos in mobile a hoc networks , 2003, IEEE Wireless Communications.

[34]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[35]  Bernhard Plattner,et al.  Supporting Real-Time Applications in Mobile Mesh Networks , 2005 .

[36]  Hari Balakrishnan,et al.  The design and implementation of an intentional naming system , 1999, SOSP.

[37]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[38]  David Levin,et al.  Survivable mobile wireless networks: issues, challenges, and research directions , 2002, WiSE '02.