Access Restriction

Author Heilbronner, Stephen
Source CiteSeerX
Content type Text
File Format PDF
Language English
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Recent Progress ♦ Service Location ♦ Implied Architecture ♦ Management Support ♦ Manual Intervention ♦ Security Management ♦ Nomadic System ♦ Visited Domain ♦ Mobile Computing ♦ Full Integration ♦ Powerful Portable System ♦ Ongoing Ietf Standardisation Effort ♦ Accounting Consideration ♦ Necessary Hardware ♦ Relevant Ietf Working Group ♦ Internet Infrastructure ♦ Management Requirement
Description Nomadic computing using powerful portable systems has entered the mainstream of computing due to the recent progress in terms of performance and usability of the necessary hardware. However, most of these systems are still being used stand-alone with almost no provision for management support in the home as well as in the visited domain. This complicates configuration by forcing manual intervention, i.e. for networking and service location, or keeps providers of visited domains from offering their services to nomadic systems due to security and accounting considerations. This paper will first give an overview of the ongoing IETF standardisation efforts supporting nomadic and mobile computing and will present some the protocols and implied architectures of the relevant IETF Working Groups. The selection is based on the requirements of the full integration of nomadic computing systems into the visited domain and especially the tasks of configuration and security management. ...
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study
Learning Resource Type Article
Publisher Date 1997-01-01
Publisher Institution In Proceedings of the 4th Workshop of the OpenView University Association (OVUA '97