Charles Edward Perkins

Charles Edward Perkins
Institute of Electrical and Electronics Engineers | IEEE · IEEE Computer Society

Master of Arts, Master of EE

About

220
Publications
49,193
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
63,202
Citations

Publications

Publications (220)
Technical Report
Full-text available
This document discusses the problem statement and use cases of IP based vehicular networking for Intelligent Transportation Systems (ITS). The main scenarios of vehicular communications are vehicle-to- vehicle (V2V), vehicle-to-infrastructure (V2I), and vehicle-to-everything (V2X) communications. First, this document explains use cases using V2V, V...
Technical Report
Full-text available
Wireless Body Area Networks (WBANs) intend to facilitate use cases related to medical field. IEEE 802.15.6 defines PHY and MAC layer and is designed to deal with better penetration through the human tissue without creating any damage to human tissues with the approved MICS (Medical Implant Communication Service) band by USA Federal Communications C...
Patent
Full-text available
A method and system for improved NAT operation enable efficient translation for packets destined for communication systems within a domain utilizing network addresses that are incompatible with source and destination addresses indicated in packets delivered from the global Internet. Since the addresses are not compatible with global Internet addres...
Chapter
The Internet is growing ever more mobile - meaning, that an ever greater proportion of Internet devices are mobile devices. This trend necessitates new designs and will produce new and even unpredictable conceptions about the very nature of the Internet and, more fundamentally, the nature of social interaction. The engineering response to growing m...
Conference Paper
A multi-radio device may perform dual-radio handovers in a make-before-break manner, at the price of higher peak-power and more sophisticated isolation of receiver signal from radio frequency (RF) interference. The IEEE 802.21c Task Group has developed a media-independent single radio handover specification to avoid these requirements resulting in...
Article
Full-text available
As most terminals sold today offer wireless Internet as primary feature for personal communication requirements. the “Mobile Internet” is rapidly flourishing in the information society. And, yet, the mobile Internet is still young and growing at a rapid pace. More than ever, engineers and theoreticians are challenged to enable the continued safe gr...
Conference Paper
Full-text available
The number of devices connected to the Internet has outstripped the number of effectively assignable IPv4 addresses. In order to be globally reachable, many devices must share the same IPv4 address; current mechanisms only provide reachability when the device sharing the IPv4 address itself initiates communication. We describe a mechanism to make n...
Conference Paper
Full-text available
A number of efforts currently aim at scalable and efficient mobile ad hoc routing, an essential piece concerning the integration of such networks in the Internet. However, there is another independent and important issue, namely, how can existing Internet networks and ad hoc networks coexist coherently within the same protocol architecture. A funda...
Conference Paper
Full-text available
The Internet has revolutionized communication, education, commerce and information access for its users worldwide. Unfortunately, the lack of copper/fiber infrastructure in the rural areas of the developing world has prevented a large majority of the human population from reaping the benefits of the Internet. While the number of mobile subscribers...
Conference Paper
Full-text available
We present an analytical, epidemiological, model for the overhead of information dissemination in mobile networks, which finds application in a range of settings, including resource discovery, information dissemination in sensor networks, location services and ad hoc network routing. We consider two principal information dissemination mechanisms, o...
Conference Paper
Full-text available
We study the overhead of some mechanisms for information dissemination. We use reactive routing protocols in mobile ad hoc networks as our illustrative example. However, while reactive routing protocols are the main application for our results, they apply to different settings as well, which include publish/subscribe information dissemination mecha...
Conference Paper
Full-text available
We compute the probability that a path is discovered by a class of reactive routing protocols which we denote as random reactive protocols. These reactive protocols do not flood the network, but attempt to find a path from the source to the destination by sending a packet to a destination chosen randomly. Several protocols, including VRR or AODV-NF...
Article
This is the first in a new series of reports on selected activities from the Internet Engineering and Research Task Forces, IETF and IRTF. This issue focuses on IP mobility, routing in mobile ad-hoc networks, routing scalability, and transition from IP version 4 to version 6. Principal in IP mobility is the impending publication of the NETLMM worki...
Article
This is the first in a new series of reports on selected activities from the Internet Engineering and Research Task Forces, IETF and IRTF. This issue focuses on IP mobility, routing in mobile ad-hoc networks, routing scalability, and transition from IP version 4 to version 6. Principal in IP mobility is the impending publication of the NETLMM worki...
Article
Full-text available
The eight articles in this special section are devoted to wireless mesh networks.
Chapter
An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. In this paper we present an innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host as a specialized router, which periodically advertises...
Conference Paper
Despite the large amount of research in ad hoc networks, there are still several limitations on the scalability and performance of routing protocols, which require a more fundamental understanding of some of the basic mechanisms. In this paper, we focus on one of these mechanisms, which is route discovery, and analyze its extent and overhead in dis...
Article
Ad hoc networks are autonomous collections of devices that establish connectivity without the need for infrastructure devices. Typically, the network links are modeled as wireless links and the network nodes are considered able to move freely, so that wireless links frequently fail as neighbors move away from each other, and new links form when two...
Chapter
Snapshot of a Mobile Node's Actions Enabling Fast Handovers Understanding the Implications of Packet Rerouting Summary References
Chapter
Introduction Context Creation on an Access Router Context Transfer Design Summary References
Chapter
Introduction What is IPsec? Security Associations Traffic Processing Internet Key Exchange (IKE) Protocol Summary References
Chapter
Movement Detection Algorithm IP Address Configuration Returning Home Changes to Neighbor Discovery References
Chapter
Motivation Home Agent and Prefix Discovery Discovery of other Home Agents References
Chapter
Half Title Title Copyright Dedication Contents List of Figures List of Tables Preface Acknowledgments Acronyms
Chapter
Home Address Destination Option Mobility Header Binding Update Binding Acknowledgment (BACK) Binding Referesh Request (BRR) Binding Error (BERR) Mobility Message Options Summary References
Chapter
Introduction Background and Problem Description Design of Header Compression Context Transfer Performance Study Chapter Notes References
Chapter
Introduction Establishing Connectivity in WLAN Handover Bottlenecks Improving Handover Support Related Work Summary References
Chapter
Introduction Roaming and Handover Together Constitute the Mobility Problem Internet Principle: Core Network Transparency Network-controlled Mobility Application Layer and Session Layer Mobility Supporting Mobility Using IP Summary References
Chapter
Introduction Establishing a Security Association Between a Mobile Node and its Home Agent Binding Update and IPsec Processing at a Mobile Node Binding Update and IPsec Processing at a Home Agent IKE, IPsec and Mobile IPv6 Summary References
Chapter
Introduction VPN Mobility Middlebox Management Adapting IPv6 Fast Handovers for IPV4 Networks Summary References
Chapter
Overview IPv6-in-IPv6 Encapsulation Routing Header Type 2 Encapsulating Packets to the Mobile Node Reverse Tunneling Direct Delivery to a Correspondent Node Delivering Packets to a Mobile Node Directly Sending Binding Updates Inline Signaling or Piggybacking Summary References
Chapter
Introduction Mobility Between Networks Case Study: VoIP Handovers Taxonomy of Research Problems Chapter Notes References
Chapter
Introduction Hierarchical Mobility Model Protocol Operation Summary References
Chapter
Neighborhood Prefix Discovery Forwarding SetUp Interaccess Router Communication Announcing Attachment Summary Chapter Notes References
Chapter
Introduction Mobility Events and Actions How Mobile IP Supports IP Mobility Limitations of the Base Mobile IP Protocol Summary References
Chapter
Motivation Definitions IPv6 Format IPv6 Addresses Neighbor Discovery Protocol Stateless Address Autoconfiguration Summary References
Chapter
Introduction Location Privacy Problem with Mobile IPv6 Hiding the Home Address from Onlookers Disclosing the Care-of Address Conclusion References
Chapter
Introduction Mobile IPv6 Operation IP Reachability Service Mobile IPv6 and IP Multimedia Subsystem (IMS) Summary References
Chapter
Introduction NEMO Model and Terminology NEMO Basic Protocol NEMO Route Optimization Prefix Delegation and Management Summary References
Chapter
Binding Cache Management Return Routability Development Security Management Delivering Packets to the Care-of Address Home Agent Discovery Movement Detection and Link Establishment Summary References
Chapter
Introduction Reference Model and Assumptions Protocol Operation Message Formats Security Implications References
Chapter
Return Routability – Theory of Operation Home Test INIT (HOTI) Message Care-of Test INIT (COTI) Message Home Test (HOT) Message Care-of Test (COT) Message Using the Binding Management Key Threat Models to Worry About Securing Route Optimization Using a Static Shared Key Summary References
Article
A new protocol is presented for on-demand, loop-free routing in ad hoc networks. The new protocol, called the labeled distance routing (LDR) protocol, uses a distance invariant to establish an ordering criterion and per-destination sequence numbers to reset the invariant resulting in loop-freedom at every instant. The distance invariant allows node...
Article
Full-text available
Discovery of services and other named resources is expected to be a crucial feature for the usability of mobile ad-hoc networks (MANETs). Different types of service discovery architectures are distinguished by the extent to which Service Coordinators (SCs) are implemented in the network. SCs are nodes that hold a central repository for the caching...
Article
Full-text available
This document specifies a new extension for use by Foreign Agents operating Mobile IP for IPv4. Currently, a foreign agent cannot supply status information without destroying the ability for a mobile node to verify authentication data supplied by the home agent. The new extension solves this problem by making a better place for the foreign agent to...
Article
A mobile node and a correspondent node may preconfigure data useful for precomputing a Binding Management Key that can subsequently be used for authorizing Binding Updates.
Article
Within the IETF, the working group for Mobile Ad Hoc Networking (MANET) has recently made new steps towards standardizing new routing protocols. In particular, there is now a document specifying a new protocol called DYMO (for Dynamic Mobile Networks).I will discuss these recent steps forward, and to give concrete examples I will describe more spec...
Article
Many wireless access systems have been developed recently to support users mobility and ubiquitous communication. Nevertheless, these systems always work independently and cannot simultaneously serve users properly. In this paper, we aim to integrate ...
Conference Paper
Privacy when using IP communication has become an important problem. It is a challenging problem that spans multiple layers in the OSI reference model with various constant identifiers that can be profiled. This leads to user privacy concerns. Location Privacy, on the other hand, is primarily concerned with revealing a user’s identity as a function...
Conference Paper
Full-text available
Current mobile ad hoc network (MANET) routing protocols operate with networks as flat address spaces, treating all nodes in the network as independent peers. However, these nodes are not always independent; they can form groups due to physical or environmental restraints. By taking advantage of these natural groupings, there is an opportunity to op...
Conference Paper
Full-text available
The use of dominating-set neighbor elimination as an integral part of the distribution of route requests using the ad hoc on-demand distance vector (AODV) protocol as an example of on-demand routing protocols is investigated. We use detailed simulations to show that simply applying dominant pruning (DP) to the distribution of route requests in AODV...
Article
Full-text available
We investigate the use of dominating-set neighbor elimination as an integral part of the distribution of route requests using the Ad hoc On-demand Distance Vector (AODV) protocol as an example of on-demand routing protocols. We use detailed simulations to show that simply applying dominant pruning (DP) to the distribution of route requests in AODV...
Article
Full-text available
Mobile IP, the current IETF proposal for IP mobility support, represents a key element for future All-IP wireless networks to provide service continuity while on the move within a multi-access environment. We conducted a performance evaluation ...
Article
The Dynamic Host Configuration Protocol for IPv6 (DHCP) enables DHCP servers to pass configuration parameters such as IPv6 network addresses to IPv6 nodes. It offers the capability of automatic allocation of reusable network addresses and additional configuration flexibility. This protocol is a stateful counterpart to "IPv6 Stateless Address Autoco...
Article
The ad hoc on-demand distance-vector (AODV) routing protocol has been designed for use in ad hoc networks, which are presently receiving wide interest within many diverse research communities. These networks represent a significant departure from traditional wired networks due to the distinguishing characteristics of both the wireless channel and m...
Article
Full-text available
A new protocol is presented for on-demand loop-free routing in ad hoc networks. The new protocol, called labeled distance routing (LDR) protocol, uses a distance invariant to establish an ordering criterion and per-destination sequence numbers to reset the invariant resulting in loop-freedom at every instant. The distance invariant allows nodes to...
Conference Paper
Full-text available
Ad hoc networks meet the demands of spontaneous network set-up. They are characterized by the use of wireless links, dynamically changing topology, multi-hop connectivity and decentralized routing mechanisms and decision-making. AODV and DSR are the two most widely studied on-demand ad hoc routing protocols. Previous studies have shown limitations...
Conference Paper
Full-text available
Standard IP mobility management (IP-MM) commonly known as Mobile IP, presents a set of technical challenges in performance and scalability, as the mobile host (MN) varies the handoff rate, due to its mobility pattern, between successive wireless points of attachment; these manifest themselves primarily as increased signaling between the MN and its...
Article
As mobile networking continues to experience increasing popularity, the need to connect large numbers of wireless devices will become more prevalent. Many re- cent proposals for ad hoc routing have certain characteris- tics which may limit their scalability to large networks. This paper examines five different combinations of modifications which ma...
Article
this paper serves is to guide research in the area of mobile wireless infrastructure, in part to flesh out the infrastructure requirements all participants agreed upon, and also to cast light upon the areas where no agreement was reached. Relevant funding agencies and companies interested in research in this area should consider these unanswered qu...
Article
Full-text available
As laptop computers begin to dominate the marketplace, wireless adapters with varying bandwidth and range capabilities are being developed by hardware vendors. To provide multihop communication between these computers, ad hoc mobile networking is receiving increasing research interest. While increasing a node's transmission range allows fewer hops...
Article
Full-text available
The growing deployment rate of wireless LANs indicates that wireless networking is rapidly becoming a prevalent form of communication. As users become more accustomed to the use of mobile devices, they increasingly want the additional benefit of roaming. The Mobile IP protocol has been developed as a solution for allowing users to roam outside of t...
Article
The need for ad hoc networks arises when a number of mobile nodes gather in one particular location and form autonomous networks. Ad hoc networks can be adjoined to the Internet, introducing routing and addressing issues that require new features from ad hoc networking protocols. The Internet Gateway can offer global addressability and bidirectiona...
Article
Full-text available
As mobile networking continues to experience increasing popularity, the need to connect large num- bers of wireless devices will become more prevalent. Many recent proposals for ad hoc routing have certain characteristics which may limit their scalability to large networks. This paper examines five different combinations of modifications which may...
Article
Sound and effective authentication, authorization and accounting (AAA) schemes for convenient and secure mobile wireless accesses are of great importance given the increased popularity and business opportunities in public wireless LAN hot spots. One ...
Article
Full-text available
A variety of developments combine to highlight the need for respecting order when manipulating relations. For example, new functionality is being added to SQL to support OLAP-style querying in which order is frequently an important aspect. The set- or ...
Article
This paper describe briefly how the Ad hoc On-demand Distance Vector (AODV) routing protocol can be used for internetworking between wireless ad hoc networks and the IPv6 Internet. This solution relies on the signalling of AODV to find an access providing Internet Gateway that is able to distribute a globally routable prefix for the ad hoc network....
Article
Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the performance of two prominent ondemand routing protocols for mobile ad hoc networks --- Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV). A deta...
Article
Full-text available
The Service Location Protocol provides a scalable framework for the discovery and selection of network services. Using this protocol, computers using the Internet no longer need so much static configuration of network services for network based applications. This is especially important as computers become more portable, and users less tolerant or...
Article
Full-text available
The Mobile IP and Authentication, Authorization, Accounting (AAA) working groups are currently looking at defining the requirements for Authentication, Authorization, and Accounting. This document contains the requirements which would have to be supported by a AAA service to aid in providing Mobile IP services.
Article
Full-text available
This article will describe to the reader the Universal Mobile Telecommunications System (UMTS) packet switched architecture and the UMTS release currently under specification --- Release 2000. The article will discuss the relevant features of the Release ...
Article
Since TCP cannot distinguish between packet losses due to transmission errors from those due to congestion, TCP tends to perform poorly on wireless links that are prone to transmission errors. Several techniques have previously been proposed to improve TCP performance over wireless links. Existing schemes typically require an intermediate node (typ...
Conference Paper
Full-text available
Base IP mobility presents performance limitations when a mobile host increases its handoff rate between successive wireless points of attachment as a result of its mobility pattern. These limitations are augmented when latency externalities such as the round trip time between the mobile node and its peers, add to the total of latency and signalling...
Article
This document specifies protocol enhancements that allow transparent routing of IP datagrams to mobile nodes in the Internet. Each mobile node is always identified by its home address, regardless of its current point of attachment to the Internet. While situated away from its home, a mobile node is also associated with a care-of address, which prov...
Article
Full-text available
ecent years have seen an explosive growth both in the number of laptop and notebook computers sold, and in the number of nodes connected to the Internet and the World Wide Web. The notebook computers are themselves ever more powerful, equal in processing capability to many systems sold as desktop workstations. In fact, the future growth of the Inte...

Projects

Project (1)
Archived project