Search
Results
-
RSVP support for Mobile IP version 6 in wireless environments
(1998)TIK ReportThis draft describes a specific problem encountered when using RSVP (Resource Reservation Protocol) over optimised routes in MIPv6 (Mobile IP Version 6). The address translation in the MIP’s binding cache creates a mismatch between the flow-id of the packets sent from correspondent node to mobile node and the flow-id signalled by RSVP. We discuss several solutions to this problem: (1) By modifying RSVP at mobile and correspondent nodes ...Report -
-
-
The hp Streamline Diffusion Finite Element Method for Convection Dominated Problems in one Space Dimension
(1998)SAM Research ReportWe analyze the hp Streamline Diffusion Finite Element Method (SDFEM) and the standard Galerkin FEM for one dimensional stationary convection-diffusion problems. Under the assumption of analyticity of the input data, a mesh is exhibited on which approximation with continuous piecewise polynomials of degree p allows for resolution of the boundary layer. On such meshes, both the SDFEM and the Galerkin FEM lead to robust exponential convergence ...Report -
Nonreflecting Boundary Conditions For Electromagnetic Scattering
(1998)SAM Research ReportAn exact nonreflecting boundary condition was derived previously for use with the time dependent Maxwell equations in three space dimensions$^1$. Here it is shown how to combine that boundary condition with the variational formulation for use with the finite element method. The fundamental theory underlying the derivation of the exact boundary condition is reviewed. Numerical examples with the finite-difference time-domain method are ...Report -
The VersaKey Framework: Versatile Group Key Management
(1998)TIK ReportMiddleware supporting secure applications in a distributed environment faces several challenges. Scalable security in the context of multicasting or broadcasting is especially hard when privacy and authenticity is to be assured to highly dynamic groups where the application allows participants to join and leave at any time. Unicast security is well-known and has widely advanced into production state. But proposals for multicast security ...Report -
Exact nonreflecting boundary condition for elastic waves
(1998)SAM Research ReportAn exact nonreflecting boundary condition is derived for the time dependent elastic wave equation in three space dimensions. This condition holds on a spherical surface ${\cal B}$, outside of which the medium is assumed to be linear, homogeneous, isotropic, and source-free. It is local in time, nonlocal on $\cal B$, and involves only first derivatives of the solution. Therefore it can be combined easily with any numerical method in the ...Report -
The impact of active networking technology on service management in a Telecom environment
(1998)TIK ReportActive networking, where network nodes perform customized processing of packets, is a rapidly expanding field of research. This paper is based on the assumption that active networking technology will mature to a point where it can be commercially deployed on a larger scale. We investigate the realization of service provi sioning and service management in a telecom environment that is based on active networking technology, primarily with ...Report -
The Las Cristina Au-Cu deposit in the Venezuelan Guayana Shield: Geological, petrological and geochemical aspects
(1998)This report summarises results of 'Diplom' thesis research projects by R. D. Eichenberger and M. J. Riedi over the period 1996 - 1998 at ETH, Zürich, Switzerland, on the geology of the Las Cristinas deposit in Venezuela. In these projects, core was logged from two sections each through Mesones-Sofia and Conductora-Cuatro Muertos, with emphasis on primary lithology, and the distribution and paragenesis of minerals. Ore and alteration ...Report -