Solved

Mobile Application Security

Posted on 2012-03-26
3
420 Views
Last Modified: 2012-03-28
We are reviewing a document on mobile application security and one of the topics is: Implement Controls to Prevent Unauthorized Access to Paid-For Resources.  Under this topic is the following comment which I need help on:

"Minimize data transfers using techniques such as fast dormancy (3GPP), caching, and others to minimize signaling load on base stations."  ...what does this mean?

I will appreciate any help understanding this comment.
0
Comment
Question by:kooolsam
  • 2
3 Comments
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 37772006
Over is to minimise mobile congestion with connection and persistent connection to base station unnecessarily. At the same time to stay efficient by maximizing every connection established. This some sort alluding to content delivery network where cache is done at local some instead of always making longer trip to base station. Likewise for father normalcy the idea is not to tear down and build connection to many or unnecessarily. Sort of reducing the chance for new connection instead and optimized already established or going to established connection call...hope those make senses...one example below http://m.computerworld.com/s/article/9191759/Fast_dormancy_to_improve_smartphone_networking_and_battery_performance_?mm_ref=http%3A%2F%2Fwww.google.com%2Fsearch%3Fhl%3Den%26gl%3DGB%26ie%3DUTF-8%26source%3Dandroid-browser%26q%3Dfaster%2Bdormancy%2Bmobile%2Bbase%2Bstation
0
 

Author Closing Comment

by:kooolsam
ID: 37777279
The comments was very poor and hard to understand.  But the link provided was very, very helpful
0
 
LVL 62

Expert Comment

by:btan
ID: 37780015
Sorry as using the mobile phone as input keyboard.
0

Featured Post

Network it in WD Red

There's an industry-leading WD Red drive for every compatible NAS system to help fulfill your data storage needs. With drives up to 8TB, WD Red offers a wide array of solutions for customers looking to build the biggest, best-performing NAS storage solution.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.
An analysis of the phishing scam that has been affecting Google users, along with steps to take for protection, as well as what to do if you receive one of the emails.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now