Fast Handoff Mobile IP Protocol Using A Novel Route Optimization Technique
|
|
- Jewel Harrington
- 7 years ago
- Views:
Transcription
1 Fast Handoff Mobile IP Protocol Using A Novel Route Optimization Technique Sajal Saha 1, Asish K Mukhopadhayay 2, and Surajjan Ghose 3 1 Narula Institute of Technology/Dept. of Computer Application, Kolkata, India sajalkrsaha@rediffmail.com 2 Dr.B.C.Roy Engg. College / Dept. of ECE, Durgapur, India akm55@gmail.com 3 Jadavpur University / Dept. of CSE, Kolkata, India sghose@cse.jdvu.ac.in Abstract Route optimization is a common technique to solve the triangular routing problem in Mobile IP. This paper evaluates various route optimization schemes available in the literature and prepares a comparative analysis of those schemes. It proposes a novel pilot agent based route optimization technique that reduces the handoff delay efficiently. The scheme has been simulated using OPNET and the results show that the proposed scheme ensures packet transfer through correspondent node in a secure manner with smooth handoff even during frequent movement of mobile node without call dropping. Index Terms Route optimization, Mobile IP, Triangular routing. I. INTRODUCTION Mobile IP protocol allows a Mobile node (MN) to move from one place to another in the Internet and still maintains communication with other nodes known as correspondent nodes (CNs). In Mobile IP packets coming from CN is received by the HA which redirects it to the MN through the FA. However, the MN can send the packets directly to the CN. Thus, overall routing path becomes triangular as shown in Fig. 1. This extended routing path is known as triangular routing problem. IETF defined route optimization (RO) [2][9][10] technique in 1996 to resolve triangular routing problem. In this technique, the CN can send the packets directly to the MN. Whenever MN is away and attached to a Foreign Agent (FA) with its care-of-address (CoA), it updates the binding cache by sending binding update request to the CN. In case of further change of FA while roaming, the old FA maintains a binding cache entry for the MN, and delivers the packets to the MN s new CoA so that packet drop can not occur. The rest of the paper is organized as follows. We compare different existing RO schemes in Section 2. We present our proposed scheme in Section 3. The simulation results are presented in Section 4. Finally we present our conclusion in Section 5. Figure 1. Triangular routing in Mobile IP. II. COMPARISON OF EXISTING RO SCHEMES Pekka Nikander et el. [1] analyzed the security issues with RO in MIPv6 using Return Routability technique. Perkins [2] introduced RO extension in MIPv6 that enables reliable handoff between FA and MN. MOTOROLA introduced route optimization for iden (Integrated Dispatch Enhanced Network) system [3] where FA keeps all the binding updates for a MN and transmit those directly through tunneling to the destination node. When a new MN comes into the foreign network, the binding update is forwarded to all the FAs so that no binding warning (BW) message is introduced to HA. Quang Gao et el [5] proposed virtual HA based route optimization scheme. The basic idea presented in this paper is based on two major assumptions, a) there is actually no need of a permanent HA throughout and b) MN tends to be highly localized during session period (The period in which all active connections starts and terminates). Thus, if the temporary address is not changed during this session period, there will be no connection disruption. Actually one of the hosts within the MN's footprint is set as its virtual HA (VHA). It retains its Virtual Home Address (VHoA) during a particular session period. According to the 2nd assumption a MH is closer to its VHA (abiding to locality concepts during session period). Thus tunneling packets by VHA to MH will lower or almost eliminate the triangle routing problem. The Basic idea of [6] is to set up a correspondent agent (CA) similar to HA & FA. The proposed solution gives the task of maintaining and updating binding caches & encapsulating messages to a single CA instead of a number of correspondent hosts in a network. Chun-Hsin Wu et el. [7] proposed bi-directional route optimization technique. This technique enables a CN and a MN to communicate with each other directly without the intervention of the HA and solves the triangular routing problem using a bi-directional tunnel. Here, a correspondent agent (CA) is also introduced to keep the transparency to the CN s and also to serve multiple CN s of its subnet. The CA maintains a Binding cache and intercepts all the packets which are sent to and from the CN s. Similarly, a FA maintains a tunneling cache to implement a bi-directional technique. In [8], a new entity called Mobile Router (MR) has been proposed. These MRs are places all the way around the network so that in between every path there is at least one MR. These MRs are also designed to have wireless links. There will be high probability that there exists one or more MR in the path between HA to CN or CN to HA. Also there is high probability that the MR in the path from HA to CN will be 207
2 same as in the path from CN to HA. Instead of the CN, these MRs will keep their binding caches updated on the basis of the messages that they catch in its transition from HA to CN or vice versa. Now every time CN sends a message to HA, if it gets encountered by any of the MR in its path that has the relevant information then it intercepts the packet and tunnels it to the MN bypassing the HA. But if in any case there is no MR encountered, then the HA receives the message and tunnels it to MN as in MIP. The binding entries in MR will have a specific life time after which it will be discarded. We have considered these salient optimization schemes and prepared a comparative analysis as summarized in Table 1. TABLE I. A COMPARISON OF EXISTING PROTOCOLS Protocol/Methodology IP version Advantage / Contribution Drawback/shortcomings Hand off Latency Return Routibility 2003[1] 6 Provide Security Against active attacks through return rout ability. RO extension 1998 [2] 6 Decrease in Handoff Latency through modified registration request message and agent advertisement message. MIP RO in iden System 1997 [3] NS2 Simulation of RO in MIP 2003 [4] Virtual HA based scheme 2000 [5] 6 MN sends the packet directly to FA bypassing the HA and reduce handoff latency. The lifetime of the state created at CN is deliberately restricted to a few minutes, this leads to worthless exchange HoT message through HA every few minutes. Security Required larger memory for FA to maintain the binding cache. 4 Enables IPv4 to support RO. Only two RO messages have been used (Binding Update & Binding Warning). 4 No need of secure distribution of mobile binding, transparency, runs on basic MIP. Agent Based RO 2001[6] 6 Mobility is completely transparent to the MN, scalable, simple, performance is better than [2]. Bidirectional RO in Mobile 4 CN and MN directly IP over wireless LAN 2002 communicate with each [7] without the intervention of the HA. Mainly client application is considered, Assuming that MNs are highly localized during session period. Single Point of Failure(CA s binding cache),accessing & updating of binding cache will be time taking. Agents need to be upgraded to support some extra functionalities like binding and tunneling cache. High RO using mobile router(mr) 2003[8] 4 Scalable, Transparent, Problem of one point failure is reduced as there is a number of copies kept in all the intermediate MR. Not cost effective as a number of MNs have to be installed, More memory is needed as two MRs may keep same informations, that will be redundant. III. PROPOSED ARCHITECTURE We propose one of the Home or Foreign agents in the network to be assigned as the Pilot Agent (PA). It will act on behalf of each individual CN to maintain binding caches, and tunneling the datagram to the MNs. In this way, the route optimization function becomes transparent to the end nodes, without requiring any modification in the CNs. In addition, a PA can manage binding caches for a number of end nodes in the same subnet. When multiple CNs in the same subnet communicates with a particular MN, a single Binding Update message is required to be sent to the PA, thereby reducing signaling traffic. The binding table consists of three fields, namely home address (HoA), care-of-address (CoA) and Time to Leave (TTL). We keep the binding table as binary search tree format to reduce the mapping time in the binding table. It will speed up the searching of CoA and reduce 208
3 the handoff latency. As a binding warning message comes from an external network, security needs to be imposed. Each MN has a unique id in the binding message which can be encoded using Huffman encoding technique to obtain a compressed data. It can then be used as a checksum and appended with the binding warning message which contains the CoA of MN. On the other hand, the HA keeps record of all its MN s id and the corresponding hash function. After receiving the binding warning message, the HA itself works out the hash function with MN s unique id and its HoA and produce the checksum. If it matches the one that is received, then the HA accepts the message otherwise rejects it. After the successful authentication of binding warning message, HA sends MN s CoA to PA. In this way we achieve highly secured RO with lower handoff latency. TABLE II. SOME IMPORTANT PARAMETERS TAKEN IN SIMULATION TTL threshold 7 Sec Binding cache lifetime 100 Sec Input buffer size 8mb Maximum buffer size 50 bytes Binding update lifetime 1800sec MN registration retry maximum 4 Registration request interval 4 Minimum retransmission timeout 10 Sec Minimum retransmission timeout 120 Sec CN data rate 1 Mbps MN,CN transmitter power Watt MN,CN packet reception power threshold 0.95 dbm Figure 2. Proposed architecture. IV. RESULTS AND DISCUSSIONS We have used OPNET modeler simulator to evaluate the performance of the proposed RO scheme with the assumption that the CN s are also within the mobile IP domain. Some important parameters considered in simulation are shown in Table 2. The basic functional modules included in simulation are MN, HA, PA and two foreign agents FR0 and FR1 as shown in Fig. 2. Initially, the MN resides at the home network and receives packets from CN through the PA. When the MN starts moving towards FR0 in the foreign network, handoff occurs at 1.16 min. MN starts receiving packets at FR0 directly from PA through tunneling and bypassing HA. At 4min, the MN moves from FR0 towards FR1 via home network and handoff occurs at 5.34 and 7.96 min respectively. At FR1, the MN starts receiving packets from PA. Finally, the MN returns to its home network. During the entire movement, the MN always receives packets through the PA. Fig. 3 shows the scenario of packet sending and receiving by the CN and MN respectively. Packet receiving at the MN is more because of excess control messages. Fig. 4 shows the load analysis of different agents. There are Figure 3. Packet transfer between Corresponding node (sender) & Mobile node (receiver). Figure 4. Load analysis of different agents. 209
4 Average delay FR0 2 Average delay FR1 1 4 Average delay Home agent 3 5 Average delay Pilot agent Figure 7. Average delay of different agents. Figure 5. Average throughput analysis of different agents. sudden dips at about 1 min, 5 min and 8 min in MN and CN lines in the graph showing packet drops during handoff. It increases after handoff points 4 and 5 simultaneously as MN reaches to FR1 as shown in Fig.5. So, throughput of the agents increases depending on the presence of MN in the corresponding network as shown in Fig.6. Fig. 7 shows the propagation delay of different agents. Fig. 8 shows the average load analysis of CN and MN. Fig. 9 and Fig. 10 show the frame transmission delay of different agent and CN, MN respectively in MAC layer. Fig. 10 shows that MN changes its point of attachment from home network and enters FR0, that s why signal strength changes abruptly. It is to be noted that signal strength is always almost above the signal strength of CN. Fig. 11 shows the average propagation delay of CN and MN. Fig. 12 shows the average load of CN and MN. Fig. 14 shows the average throughput of CN and MN. Fig. 13 and 15 shows the traffic analysis of different agents. There is traffic burst for foreign routers and HA. This burst also absorbed by the PA. This proves the stabilization and optimization of the traffic in the PA. Figure 8. Average load analysis of CN and MN. Figure 9. Media access delay of different agents. Figure 6. Throughput analysis of CN and MN. Figure 10. Media access delay of CN and MN. 210
5 Figure 11. Average delay of CN and MN. V. CONCLUSION Our analysis of different existing solutions for route optimization and their comparative study reveals that none of the solutions can provide all the potential benefits of route optimization. Some of the solutions propose secure and safe packet transfer but can not overcome high handoff latency. Some of the solutions propose low handoff latency and low signaling overhead but without enough security. On the other hand, our novel scheme effectively solves the triangular routing problem without sacrificing performance, transparency and simplicity by unifying the flow of binding updates through the pilot agent. From the simulation and analysis, it is seen that our proposed PA based scheme stabilizes and optimizes mobile IP protocol with improved handoff latency. REFERENCES Figure 12. Average load of CN and MN. Figure 13. Traffic analysis of different agents. Figure 14. Average throughput of CN and MN. [1] Nikander, P.; Arkko, J.; Aura, T.; Montenegro, G., Mobile IP version 6 (MIPv6) route optimization security design Vehicular Technology Conference, VTC 2003-Fall IEEE 58th Volume 3, Issue, 6-9 Oct Page(s): Vol.3. [2] Charles E. Perkins and David B. Johnson, Route Optimization for Mobile IP, Springer journal cluster computing, (print) (online), Issue Volume 1,Number 2, June, [3] Rajesh Pal and Piy P. Peng, Mobile IP Route Optimization in an iden System, MOTOROLA Technical Developments, March [4] Hao Chen, Ljiljana Trajković, simulation of route optimization in MobileIP, [5] Qiang Gao; Acampora, A., A virtual HA based route optimization for mobile IP, Wireless Communications and Networking Conference, WCNC IEEE Volume 2, Issue, 2000 Page(s): vol. 2 [6] Vadali, R. Jianhui Li Yiqiong Wu Guohong Cao, Agentbased route optimization for mobile IP, Vehicular Technology Conference, VTC 2001 IEEE 54th Volume: 4, page(s): vol.4 [7] Chun-hsin Wu, Ann-tzung Cheng, Shao-ting Lee, Jan-ming Ho, D. T. Lee, Bi-directional Route Optimization in Mobile IP over WirelessLAN, [8] Amit Mahajan, Ben Wild, Route Optimizations In Mobile IP, f [9] Sajal Saha et al. A comparative Study of Route Optimization Protocols in Mobile IP, p , National Conference on Computing and Communication System (CoCoSys-2009), 2 nd - 4 th January [10] Abhishek Thakur et al. A Novel Route Optimization scheme in Mobile IP, BTech final dissertation, Narula Institute of Technology, West Bengal University of Technology, June 2009 Figure 15. Average traffic analysis of different agents. 211
Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.
Mobile Routing Basic Notions of Mobility When a host moves, its point of attachment in the changes. This is called a handoff. The point of attachment is a base station (BS) for cellular, or an access point
More informationAn Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
More informationTomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
More informationLoad Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents
1 Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents Albert Cabellos-Aparicio, Jordi Domingo-Pascual Abstract A foreseeable scenario is where on the Internet Mobile IPv6 is deployed
More informationPerformance Evaluation of a QoS-Aware Handover Mechanism
Performance Evaluation of a QoS-Aware Handover Mechanism 1.Introduction Background Requirements in mobile communication Seamless mobility support Guarantee certain levels of QoS Mobile communications over
More informationG.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com
More informationSchool of Computer Science
Cost and Scalability Analysis of Mobility Management Entities of NEMO Md. Shohrab Hossain and Mohammed Atiquzzaman TR-OU-TNRL-11-102 February 2011 Telecommunication & Network Research Lab School of Computer
More informationNetwork Mobility Support Scheme on PMIPv6 Networks
Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr
More informationREDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile
More informationMPLS VPN in Cellular Mobile IPv6 Architectures(04##017)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic
More informationCost Analysis of NEMO Protocol Entities
Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science, University of Oklahoma, Norman, OK 73019. Email: {shohrab, atiq}@ou.edu William Ivancic NASA
More informationMobile IP Part I: IPv4
Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile
More informationMobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP
Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses
More information6 Mobility Management
Politecnico di Milano Facoltà di Ingegneria dell Informazione 6 Mobility Management Reti Mobili Distribuite Prof. Antonio Capone Introduction Mobility management allows a terminal to change its point of
More informationAnalysis of Mobile IP in Wireless LANs
ENSC 835: COMMUNICATION NETWORKS FINAL PROJECT PRESENTATIONS Spring 2011 Analysis of Mobile IP in Wireless LANs www.sfu.ca/~bshahabi Babak Shahabi (bshahabi@sfu.ca( bshahabi@sfu.ca) 301102998 Shaoyun Yang
More informationOn the Design of Mobility Management Scheme for 802.16-based Network Environment
On the Design of obility anagement Scheme for 802.16-based Network Environment Junn-Yen Hu and Chun-Chuan Yang ultimedia and Communications Laboratory Department of Computer Science and Information Engineering
More informationIPv6 Networks: Protocol Selection for Mobile Node
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 16-24 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) IPv6 Networks: Protocol Selection for Mobile
More informationOPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 Virender Kumar Department of Electronics & Communication Engineering, HCTM Technical Campus, Kaithal, India gangotrahctm@gmail.com ABSTRACT Mobile
More informationIntroduction to Mobile IPv6
1 Introduction to Mobile IPv6 III IPv6 Global Summit Moscow Dr. Dimitrios Kalogeras dkalo@grnet.gr GRNET Outline Introduction Relevant Features of IPv6 Major Differences between MIPv4 and MIPv6 Mobile
More informationSURVEY ON MOBILITY MANAGEMENT PROTOCOLS FOR IPv6
SURVEY ON MOBILITY MANAGEMENT PROTOCOLS FOR IPv6 BASED NETWORK 1 Nitul Dutta, 2 Iti Saha Misra, 3 Kushal Pokhrel and 4 Md. Abu Safi 1 Department of Computer Science & Engineering, Sikkim Manipal Institute
More informationABSTRACT. Introduction. Table of Contents. By Yi-an Chen
A Survey Paper on Mobile IP By Yi-an Chen ABSTRACT Mobile Internet Protocol (IP) is a new recommended Internet protocol designed to support the mobility of a user (host). Host mobility is becoming important
More informationLoad Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents
Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents Albert Cabellos-Aparicio, Jordi Domingo Pascual Departament d Arquitectura de Computadors Universitat Politècnica de Catalunya
More informationAbstract. 2 Overview of mobility in WLAN. 1 Introduction
A study of mobility in WLAN Fengping Li Helsinki University of Technology Telecommunication Software and Multimedia Laboratory fli@cc.hut.fi Abstract This paper studies mobility in wireless LAN (WLAN,
More informationBoosting mobility performance with Multi-Path TCP
Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,
More informationPermanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=134801
Citation: Parvin, Sazia and Ali, Shohrab and Han, Song and Dillon, Tharam. 2009. Security against DoS attack in mobile IP communication, in Atilla Elci, Mehmet A. Orgun and Alexander Chefranov (ed), 2nd
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationIP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationSecure Networking Using Mobile IP
Secure Networking Using Mobile IP Alexandros Karakos and Konstantinos Siozios Democritus University of Thrace eepartment of Electrical and Computer Engineering GR-671 00 Xanthi, GREECE Abstract. The increasing
More informationMobility on IPv6 Networks
Mobility on IPv6 Networks Pedro M. Ruiz Project Manager Agora Systems S.A. Global IPv6 Summit Madrid 13-15 March 2002 Pedro M. Ruiz (c) Agora Systems S.A, 2002 1 Outline Motivation MIPv6 architecture MIPv6
More informationDynamic Home Agent Reassignment in Mobile IP
Dynamic Home Agent Reassignment in Mobile IP Yu Chen Terrance Boult yrchen@agere.com tboult@eecs.lehigh.edu Agere Systems Lehigh University 1247 South Cedar Crest Blvd. 19 Memorial Drive West Allentown,
More informationA Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks
A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks Min-Kim, Jong-min Kim, Hwa-sung Kim Dept. of Electronics and Communications Engineering Kwangwoon University
More informationSecuring Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks
Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks Bok-Nyong Park 1, Wonjun Lee 1 and Christian Shin 2 1 Dept. of Computer Science and Engineering, Korea University,
More informationAN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
More informationINTERNET SERVICE PROVIDER-MOBILE BORDER GATEWAY ROUTE OPTIMIZATION TECHNIQUE IN MOBILE IP BASED ON DIFFERENT ISPS STRUCTURES (ISP-MBG)
INTERNET SERVICE PROVIDER-MOBILE BORDER GATEWAY ROUTE OPTIMIZATION TECHNIQUE IN MOBILE IP BASED ON DIFFERENT ISPS STRUCTURES (ISP-MBG) ABSTRACT Sherif Kamel Hussein Department of Communications and Electronics
More informationIntroducing Reliability and Load Balancing in Mobile IPv6 based Networks
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA jfaizan@engr.smu.edu Hesham El-Rewini Southern Methodist University
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationMobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
More informationHandover Management based on the Number of Retries for VoIP on WLANs
Handover Management based on the Number of Retries for VoIP on WLANs Shigeru Kashihara Yuji Oie Department of Computer Science and Electronics, Kyushu Institute of Technology Kawazu 68-4, Iizuka, 82-852
More informationIPv6 associated protocols. Piers O Hanlon
IPv6 associated protocols Piers O Hanlon Contributions Main authors Jean-Marc Barozet, Cisco, France Faycal Hadj, Cisco, France Patrick Grossetete, Cisco, France Gunter Van de Velde, Cisco, Belgium Bernard
More informationMobile Internet Protocol v6 MIPv6
Mobile Internet Protocol v6 MIPv6 A brief introduction Holger.Zuleger@hznet.de 13-dec-2005 Holger Zuleger 1/15 > c Defined by MIPv6 RFC3775: Mobility Support in IPv6 (June 2004) RFC3776: Using IPsec to
More informationReliable Multicast Protocol with Packet Forwarding in Wireless Internet
Reliable Multicast Protocol with Packet Forwarding in Wireless Internet Taku NOGUCHI, Toru YOSHIKAWA and Miki YAMAMOTO College of Information Science and Engineering, Ritsumeikan University 1-1-1, Nojihigashi,
More informationTelecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
More informationInternet Connectivity for Ad hoc Mobile Networks
Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationCS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
More informationMobility Management 嚴 力 行 高 雄 大 學 資 工 系
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)
More informationMOBILITY SUPPORT USING INTELLIGENT USER SHADOWS FOR NEXT-GENERATION WIRELESS NETWORKS
MOBILITY SUPPORT USING INTELLIGENT USER SADOWS FOR NEXT-GENERATION WIRELESS NETWORKS Gergely V. Záruba, Wei Wu, Mohan J. Kumar, Sajal K. Das enter for Research in Wireless Mobility and Networking Department
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationMobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744. The problem
Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744 The problem How to support mobile users What do we mean by support? Make it easy and convenient to effectively
More informationTCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationWireless Networks: Network Protocols/Mobile IP
Wireless Networks: Network Protocols/Mobile IP Mo$va$on Data transfer Encapsula$on Security IPv6 Problems DHCP Adapted from J. Schiller, Mobile Communications 1 Mo$va$on for Mobile IP Rou$ng based on IP
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More information0-7803-4902-4/98/$10.00 (c) 1998 IEEE
Application of Mobile 1P to Tactical Mobile Internetworking Charles Graff Michael Bereschinsky Mitesh Patel US Army CECOM, Fort Monmouth, NJ Li Fung Chang BeHcore331 Newman Springs Rd. Red Bank, NJ 07701
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationOutline. Wireless System Integration WLAN. WAN Technologies ดร. อน นต ผลเพ ม LAN. WAN Server LAN. Wireless System Architecture Protocols
204526 Wireless LANs 1 st semester 2002 (June September) Wireless System Integration ดร. อน นต ผลเพ ม Anan Phonphoem, Ph.D. anan@cpe.ku.ac.th Intelligent Wireless Network Group (IWING Lab) http://iwing.cpe.ku.ac.th
More informationGuaranteed QoS Routing Scheme in MPLS -Wireless Access Networks
JKAU: Comp. IT, Vol. 2, pp: 45-56 (2013 A.D./ 1435 A.H.) DOI: 10.4197 / Comp. 2-3 Guaranteed QoS Routing Scheme in MPLS -Wireless Access Networks Jeddah University, Alkamil Branch, Alkamil, Saudi Arabia
More informationMobile IP and Cellular IP Integration for Inter Access Networks Handoff
Mobile and Cellular Integration for Inter Access Networks Handoff Marco Carli*, Alessandro Neri*, Andrea Rem Picci** *University of Roma Tre, Via della vasca navale, 84, 00146 Rome, Italy **Lucent Technologies
More informationMobility Management Advanced
Mobility Management Advanced Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Mobility Management Approaches in the TCP/IP Reference Model
More informationStatic and Dynamic Network Configuration
CHAPTER 6 This chapter describes: Static Networks Dynamic Networks Static Networks The mobile access router can be part of a static network or a dynamic network. A static network supports stub routers
More informationSERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
More informationSHISA: The IPv6 Mobility Framework for BSD Operating Systems
SHISA: The IPv6 Mobility Framework for BSD Operating Systems Keiichi Shima Internet Initiative Japan Inc. Ryuji Wakikawa, Koshiro Mitsuya, Keisuke Uehara Keio University Tsuyoshi Momose NEC Corporation
More informationA Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationIntegrated DNS and IPv6 mobility for next generation Internet
Integrated DNS and IPv6 mobility for next generation Internet Winston K G SEAH Seng Kee TAN Institute for Infocomm Research 21, Heng Mui Keng Terrace, Singapore 119613 Tel: +65 68742012 Email: winston@i2r.a-star.edu.sg
More informationAdministrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling
Administrivia No lecture on Thurs. Last work will be out this week (not due, covers wireless) Extra office hours for next week and the week after. Channel Partitioning, Random Access and Scheduling Channel
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationAnalysis and Comparison of Different Host Mobility Approaches
Analysis and Comparison of Different Host Mobility Approaches Mevlut Erdem Kurul, Rommel Pesigan and Brad Weekes Department of Computer Science University of California, San Diego La Jolla, CA 92193-0114
More informationIEEE P802 Handoff ECSG Handoff for Multi-interfaced 802 Mobile Devices. Abstract
IEEE P802 Handoff ECSG Handoff for Multi-interfaced 802 Mobile Devices Date: May 12, 2003 Authors: Huai-An (Paul) Lin Intel Corp. 2111 NE 25 th Avenue, OR 97124 Phone: +1 503-264-6726 E-mail: huai-an.lin@intel.com
More informationHome Agent placement and assignment in WLAN with Cellular Networks
Home Agent placement and assignment in WLAN with Cellular Networks Selvakumar.R, Senior Lecturer, Department of Computer Science and Engineering V.M.K.V.Engineering College, Salem-636 308 Tamilnadu, India.
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationA Study on Mobile IPv6 Based Mobility Management Architecture
UDC 621.396.69:681.32 A Study on Mobile IPv6 Based Mobility Management Architecture VTsuguo Kato VRyuichi Takechi VHideaki Ono (Manuscript received January 19, 2001) Mobile IPv6 is considered to be one
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationEINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
More informationPerformance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationMobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
More informationEE6390. Fall 1999. Research Report. Mobile IP in General Packet Radio System
EE6390 Introduction to Wireless Communications Systems Fall 1999 Research Report Mobile IP in General Packet Radio System Kelvin K. W. Wong Ramzi Hamati Date: Dec. 6, 1999 1.0 Abstract Tunneling is one
More informationProxy Mobile IPv6-Based Handovers for VoIP Services in Wireless Heterogeneous Networks
IACSIT International Journal of Engineering and Technology, Vol. 4, No. 5, October 12 Proxy Mobile IPv6-Based Handovers for VoIP Services in Wireless Heterogeneous Networks N. P. Singh and Brahmjit Singh
More informationAn enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
More informationA Novel Pathway for Portability of Networks and Handing-on between Networks
A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com
More information(Refer Slide Time: 01:38 01:37)
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No: 29 IP Version 6 & Mobile IP Good day, in the last lecture we discussed
More informationQoS Provisioning in Mobile Internet Environment
QoS Provisioning in Moile Internet Environment Salem Lepaja (salem.lepaja@tuwien.ac.at), Reinhard Fleck, Nguyen Nam Hoang Vienna University of Technology, Institute of Communication Networks, Favoritenstrasse
More informationSOFTWARE-DEFINED NETWORKING IN HETEROGENEOUS RADIO ACCESS NETWORKS
SOFTWARE-DEFINED NETWORKING IN HETEROGENEOUS RADIO ACCESS NETWORKS Hao Yu Technical University of Denmark (DTU), Oersteds Plads 343, Kgs. Lyngby, 2800, Denmark e-mail: haoyu@fotonik.dtu.dk Paper type Research
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationAdaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
More informationHow To Understand The Theory Of Network Mobility
Mathematical Modeling and Simulation Study of Delay-Sensitive Algorithm to Enhance Quality of Service in Mobile Networks L. Arockiam 1 and P. Calduwel Newton 2 1 Associate Professor, St. Joseph s College
More informationBCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationCS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More information2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
More informationSEcure Neighbour Discovery: A Report
SEcure Neighbour Discovery: A Report Arun Raghavan (Y6111006) CS625: Advanced Computer Networks Abstract The IPv6 [5] Neighbour Discovery [12] protocol is used by nodes in IPv6 for such purposes as discover
More informationIMHP: A Mobile Host Protocol for the Internet. Abstract
IMHP: A Mobile Host Protocol for the Internet Charles Perkins T. J. Watson Research Center IBM Corporation P. O. Box 218 Yorktown Heights, NY 10598 Andrew Myles Department of Electronics
More information5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationMobility Support in IPv6
Second Annual International Conference Mobile Computing and Networking (MobiCom'96), ye, New York, USA, November 1996. Mobility Support in IPv6 Charles E. Perkins & David B. Johnson 1 Presented By: Ajay
More informationLecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
More information