{"id":"https://openalex.org/W121724085","doi":"https://doi.org/10.17487/rfc3374","title":"Problem Description: Reasons For Performing Context Transfers Between Nodes in an IP Access Network","display_name":"Problem Description: Reasons For Performing Context Transfers Between Nodes in an IP Access Network","publication_year":2002,"publication_date":"2002-09-01","ids":{"openalex":"https://openalex.org/W121724085","doi":"https://doi.org/10.17487/rfc3374","mag":"121724085"},"language":"en","primary_location":{"id":"doi:10.17487/rfc3374","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc3374","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},"type":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":89,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9714000225067139,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9595999717712402,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.664635956287384},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.621150016784668},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5706708431243896},{"id":"https://openalex.org/keywords/access-network","display_name":"Access network","score":0.4268331825733185},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3291926980018616},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.19176232814788818}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.664635956287384},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.621150016784668},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5706708431243896},{"id":"https://openalex.org/C62793504","wikidata":"https://www.wikidata.org/wiki/Q228327","display_name":"Access network","level":2,"score":0.4268331825733185},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3291926980018616},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.19176232814788818},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.17487/rfc3374","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc3374","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2130966263","https://openalex.org/W2128193806","https://openalex.org/W2004770802","https://openalex.org/W2121317116","https://openalex.org/W2140422316","https://openalex.org/W2165830118","https://openalex.org/W1975116533","https://openalex.org/W2461404866","https://openalex.org/W2365035869","https://openalex.org/W628401212"],"abstract_inverted_index":{"In":[0,22,61,89],"IP":[1,144],"access":[2],"networks":[3],"that":[4,36],"support":[5],"host":[6,13,26,42,65,75,103],"mobility,":[7],"the":[8,12,15,25,41,64,71,74,79,83,97,101,105,115,125,136],"routing":[9],"paths":[10],"between":[11],"and":[14,20,51,56],"network":[16],"may":[17,27],"change":[18],"frequently":[19],"rapidly.":[21],"some":[23,90],"cases,":[24,91],"establish":[28],"certain":[29],"context":[131],"transfer":[31,112,140],"candidate":[32],"services":[33,47,69],"on":[34,70,104,114],"subnets":[35],"are":[37,48],"left":[38],"behind":[39],"when":[40],"moves.":[43],"Examples":[44],"of":[45,58,99,138],"such":[46],"Authentication,":[49],"Authorization,":[50],"Accounting":[52],"(AAA),":[53],"header":[54],"compression,":[55],"Quality":[57],"Service":[59],"(QoS).":[60],"order":[62],"for":[63,141],"to":[66,111,124],"obtain":[67],"those":[68],"new":[72,106,126],"subnet,":[73,127],"must":[76],"explicitly":[77],"re-establish":[78],"service":[80],"by":[81],"performing":[82],"necessary":[84],"signaling":[85],"flows":[86],"from":[87],"scratch.":[88],"this":[92],"process":[93,98,129],"would":[94],"considerably":[95],"slow":[96],"establishing":[100],"mobile":[102],"subnet.":[107],"An":[108],"alternative":[109],"is":[110],"information":[113],"existing":[116],"state":[117],"associated":[118],"with":[119],"these":[120],"services,":[121],"or":[122],"context,":[123],"a":[128],"called":[130],"transfer.":[132],"This":[133],"document":[134],"discusses":[135],"desirability":[137],"facilitating":[142],"seamless":[143],"mobility.":[145]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2016-06-24T00:00:00"}
