Learn More
The impacts of moving directions and speed of the nodes in mobile ad hoc networks leads link failure very often. This route failures causes resource cost due to route rediscovery and multiple transmissions. Often the protocol used in mobile ad hoc routing mislead by assuming link failure as congestion state and then continues retransmissions of the dropped(More)
In the recent times many accessible congestion control procedures have no capability to differentiate involving two major problems like packet loss by link crash and packet loss by congestion due to buffer overflow. Consequently these resolutions effect in form of wastage of possessions because they target only on the packet drop by link crash that has the(More)
E-tickets issued online can be used by different vendors to provide services such as discount coupons for E-shopping, or an entrance for a football game. One major issue associated with E-tickets is the problem of validation, which becomes more severe in a mobile environment due to mobility of a mobile host (MH) and frequent failure/disconnection of(More)
This document discusses some of the security problems and practical problems with the current Session Traversal Utilities for NAT (STUN) authentication for Traversal Using Relays around NAT (TURN) messages. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This document is a(More)
This document specifies the behavior to be followed by a Port Control Protocol (PCP) client to contact its PCP server(s) when one or several PCP server IP addresses are configured. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document.(More)
Application-Layer Protocol Negotiation (ALPN) labels for Session Traversal Utilities for NAT (STUN) usages, such as Traversal Using Relays around NAT (TURN) and NAT discovery, are defined in this document to allow an application layer to negotiate STUN usages within the Transport Layer Security (TLS) connection. ALPN protocol identifiers defined in this(More)
  • 1