Optimizing SIP Application Layer Mobility over IPv6 Using Layer 2 Triggers
|
|
|
- Benjamin Townsend
- 10 years ago
- Views:
Transcription
1 Optimizing SIP Application Layer Mobility over IPv6 Using Layer 2 Triggers Emil Ivov Network Research Team Louis Pasteur University / LSIIT Illkirch, Strasbourg [email protected] Thomas Noël Network Research Team Louis Pasteur University / LSIIT Illkirch, Strasbourg [email protected] Abstract This paper describes a solution for the optimization of Session Initiation Protocol (SIP) based mobility over IPv6 in an b network as well as its theoretical evaluation and actual performance. Time necessary for a complete handoff depends on multiple factors. In this paper we focus on the delay accumulated during movement detection and try to bring it to a minimum using upward propagation of events generated by a Layer 2 entity. This allows us to speed up handoffs and get closer to a mobility solution applicable in real-world communications. We are using SIP both as a communications signalling protocol and as a means of handling application layer terminal mobility. Keywords-component; mobility; SIP; IPv6; WLAN; b; handover; triggers I. INTRODUCTION The proliferation of wireless devices along with the rapid growth of the Internet is demanding the Internet community to move from Internet Protocol version 4 (IPv4) [1] to Internet Protocol version 6 (IPv6) [2]. The major motivation behind this is the limitation of the IPv4 address space. Although Network Address Translation (NAT) is widely used to circumvent the address space problem, it fails to provide the global routability. IPv6, on the other hand, is designed to solve such problems. The expanded address space offered by IPv6 will enable assignment of globally routable IP addresses to every possible device connected to the Internet. Wireless network access is increasingly popular. Wireless communications offer numerous advantages such as movement during a session, and network access at a fair rate among nodes. Mobility between access points that are part of the same subnet is managed by layer 2 mechanisms. When a Mobile Node () connects to an Access Point (AP) in another subnet, however, the IPv6 address of the becomes topologically invalid. This kind of movement has to be managed by upper layer protocols. Mobile IPv6 [3] is one such protocol. It is designed to maintain network connectivity for hosts roaming across the Internet. It allows mobile nodes to manage global communication through a home address and yet maintain packet flow while away from home using a Care-of-Address for each different point of network access. Another way to provide terminal mobility is using an application layer protocol such as SIP for example. This is achieved by re-initializing all sessions, active at the time an moves between subnets. The correspondent application gets notified for a mobility event and received an s new IP address through a session reinitialization request. Many recent studies such as [13], [14], and [15] describe different handover optimizations when using a layer 3 protocol such as Mobile IPv6. A commonly employed technique is using information (messages) available in lower layers. The method is often referred to as Layer 2 or Cross Layer Trigger usage [10]. In this paper we propose and evaluate a way to use these triggers in an application layer mobility solution based on SIP. The rest of the paper is organized as follows: Sections II.A and II.B describe SIP and SIP based terminal mobility. Section II.C presents Wireless LAN [6] and general mobility. Section III.A gives an overview of the optimization described in the document and section III.B contains its analytical evaluation. Test results and graphics could be found in Section IV. The paper is terminated by a concluding Section V. II. THE STATE OF THE ART A. Session Initiation Protocol Basics The Session Initiation Protocol (SIP)[4] is a protocol for establishing and tearing down multimedia sessions. SIP can also support various types of mobility such as terminal mobility, session mobility, personal mobility, and service mobility [5]. Since our focus in this paper is on terminal mobility we describe the SIP terminal mobility after briefly mentioning the SIP basics in the following subsection. Fig. 1, shows a typical example of a SIP message exchange between two users, Alice and Bob. (Each message is labelled with the letter "M" and a number for reference by the text.) In this example, Alice uses a SIP application on her PC (referred to as a softphone) to call Bob on his SIP phone over the Internet. Also shown are two SIP proxy servers that act on behalf of Alice and Bob to facilitate the session establishment. This typical arrangement is often referred to as the "SIP trapezoid" as shown by the geometric shape of the dotted lines in the figure.
2 Alice s phone INVITE M1 100 Trying M3 180 Ringing M8 200 OK M11 atlanta.com proxy INVITE M2 100 Trying M5 180 Ringing M7 200 OK M10 ACK M12 Media Session BYE M OK M14 biloxi.com proxy Figure 1. A basic SIP scenario. INVITE M4 180 Ringing M6 Bob s phone Alice "calls" Bob using his SIP identity, a type of Uniform Resource Identifier (URI) called a SIP URI. It has a similar form to an address, typically containing a username and a host name. In this case, it is sip:[email protected], where biloxi.com is the domain of Bob's SIP service provider. Since Alice s softphone does not know the location of Bob or the SIP server in the biloxi.com domain, the softphone sends the INVITE request to the SIP server that serves Alice's domain, atlanta.com. The proxy server receives the INVITE request and sends a 100 (Trying) response back to Alice's softphone. The 100 (Trying) response indicates that the INVITE has been received and that the proxy is working on her behalf to route the INVITE to the destination. The atlanta.com proxy server locates the proxy server at biloxi.com and forwards, or proxies, the INVITE request there. The biloxi.com proxy server receives the INVITE and responds with a 100 (Trying) response back to the atlanta.com proxy server to indicate that it has received the INVITE and is processing the request. It then consults a database, generically called a location service that contains the current IP address of Bob and proxies the INVITE to Bob's SIP phone. Bob's SIP phone receives the INVITE and alerts Bob for the incoming call from Alice so that Bob can decide whether to answer the call, that is, Bob's phone rings. Bob's SIP phone indicates this in a 180 (Ringing) response, which is routed back through the two proxies in the reverse direction. When Alice's softphone receives the 180 (Ringing) response, it passes this information to Alice, perhaps using an audio ring back tone or by displaying a message on Alice's screen. In this example, Bob decides to answer the call. When he picks up the handset, his SIP phone sends a 200 (OK) response to indicate that the call has been answered. Finally, Alice's softphone sends an acknowledgement message, ACK, to Bob's SIP phone to confirm the reception of the final response (200 (OK)). The ACK is sent directly from Alice's softphone to Bob's SIP phone, bypassing the two proxies. This occurs because the endpoints have learned each other's address from the Contact header fields through the INVITE/200 (OK) exchange, which was not known when the initial INVITE was sent. Alice and Bob's media session has now begun. During the session, either Alice or Bob may change the characteristics of the media session (e.g. media formats or endpoint location). This is accomplished by sending a re-invite containing a new media description. A re-invite scenario is discussed a bit later. At the end of the call, Bob disconnects (hangs up) first and generates a BYE message. This BYE is routed directly to Alice's softphone, again bypassing the proxies. Alice confirms receipt of the BYE with a 200 (OK) response, which terminates the session. B. Session Iinitiation Protocol Mobility Reference [5] discussed how SIP can be used to support terminal mobility and its advantages over other mobility protocols. It is important to note that SIP-based terminal mobility does not add extra bytes to base SIP in order to support mobility. For the completeness of the paper, we briefly illustrate mid-call [5] mobility with Fig. 2a and Fig. 2b. Midcall mobility allows a node to continue an ongoing session with a peer after changing networks. CN CN Home Network Home Network 2 1 Foreign Network Figure 2a SIP Mobility before handover Fig. 2, shows an example of how mid-call mobility is supported by SIP. In this example, an sends a re-invite request with its new IP address to the CN (1), and the CN directly sends packets to the at the new point of 3 Foreign Network Figure 2b SIP Mobility after handover 1 reinvite 2 OK 3 - DATA
3 attachment to the network (2, 3). In this paper, we measure the handoff delay during mid-call mobility only. C. Mobility with Wireless LAN and IPv6 IEEE b (WLAN) [6] enables two operational modes ad hoc and infrastructure. When in ad hoc mode all nodes participate in the routing process. There are no key (central) nodes. An infrastructure mode is where nodes are in direct communication with a single key node called Access Point (AP). APs are dedicated equipment with at least one wireless and one wired interface. They serve as a bridge between wired and wireless networks. One or more nodes connected to an access point are called a Basic Service Set (BSS). When an moves into a new BSS, it needs to synchronize with the corresponding AP. The synchronization procedure is initiated by the with the emission of a Probe Request frame to which an AP responds with a Probe Response. Once the synchronization completed, the starts an authentication procedure, and upon its successful completion, it moves to an association process where it receives BSS transmission parameters from the AP (e.g., the data rate and the transmission power). Once the association completes, the node can communicate via the new access point. This process, also known as L2 handover, is illustrated in Fig. 3. When cover areas of different access points share a common cover zone, a node can roam between the access points. A node associates itself with the access point which offers the best signal or which has the minimum load among the access points. On the network layer (L3) a Mobile Node () detects movement between subnets by analyzing Router Advertisements sent by an Access Router (AR) [7]. An AR sends multicast Router Advertisement beacons at a random interval of between 0.03 to 0.07 seconds [8] for mobility aware networks and between 200 and 600 seconds [7] for standard network configurations. To determine whether network has changed the then compares router prefix information contained in these messages. If a Router Advertisement is not received within a specified interval, an may request one by sending a Router Solicitation. After Receiving the RA the creates its new network address. This is most often done using Stateless Address Autoconfiguration [9]. Once the address created, a host performs Duplicate Address Detection (DAD) [9] to make sure no other host on the local link is using the same address. DAD, however, is relatively expensive in terms of time. It consists in sending one or more Neighbour Solicitations using its new address and waiting for a response for at least a second. This considerably prolongs the handover stage. Therefore an should perform DAD in parallel with its communication (or not at all). Once all this is completed an is ready to re-establish network activities interrupted during handover New Router III. Router Solicitation Router Advertisement New Access Point Figure 3 the handover process INTRODUCING L2 TRIGGERS IN SESSION INITIATION PROTOCOL MOBILITY A. Analytical Evaluation Тhe handover process over WLAN, when controlled by an application layer entity, consists of 3 major phases Layer 2 handover, Layer 3 address creation and Application Layer Handover which gives us a total handover time of : T = T ( L2) + T ( L3) + T ( APP) Probe Request Probe Response Probe Request Authentication Authentication Association Request Association Response Mobile Node 1) T(L2) - Layer 2 handover - synchronization, authentication, and association. We will be calling the time necessary for a Layer 2 handover - T(L2) 160ms [10]. 2) T(L3) - Layer 3 address construction Router Solicitation, and Router Advertisement. The time needed by Layer 3 to construct a new network address is referred to as T(L3). T(L3)= T(movement detection) + T(DAD). Assuming that the movement detection process is terminated by the reception of an RA we have T(movement detection) 750ms [7], and T(DAD) 1500s [9],[7] 3) T(APP) - Application Layer handover Session reinitialization, referred to as T(APP) consists in the time that it takes the application layer to detect the address change, send the SIP re-invite request, and re-establish the media flow towards the new location of the. In our testbed this comes down to the following T(APP) T(app layer movement detection) + 50 ms In this paper we focus on handover optimization by bringing T(L3) and T(APP) to a minimum. T(L3) depends mainly on the delay accumulated before receiving an RA. To bring that to a minimum an may send a Router Solicitation (RS) or a router may send RAs at a small interval. Both have their inconveniences: [7] specifies that responses to RSs must be randomly delayed by ms and having dense RAs
4 incurs extra traffic of approximately 14 kbps when sending RA frames at their minimum size of 88 bytes. On some networks, consumption of such bandwidth may be undesirable. T(APP) may vary according to implementations. The only way for an application entity to get notified for a mobility event is to cache a node s network address and perform periodic verifications for a change. The exact interval at which these verifications would occur is quite delicate to determine since big values bring to a delay in detecting node movement and short intervals may take significant resources on the host machine. In our solution a mobile node would send an RS right after moving to a new subnet. This would cause a nearby router to respond with an RA (after introducing an average delay of 250 ms) and speed up address construction by Layer 3. Once the receives the RA, it does not perform DAD in order to avoid the significant delay it implies, as explained in section 1.2. Right after that the application entity, controlling handover and mobility, would send its session re-initialization message to a CN. Table I shows analytical time values needed by each layer to complete the handover process. TABLE I. HANDOVER DURATION BY LAYERS SIP SIP + DENSE RAs SIP+CLT L2 Handover T(L2) 160 ms 160 ms 160 ms L3 Addr Construction T(L3) 1900 ms 50 ms 260 ms SIP Handover 50 ms + detection 50 ms + detection 50 ms B. Optimization Description SIP is an application layer protocol and as such standard SIP entities could only rely on indirect mobility notification such as constantly scanning local addresses for a change. A mobility event would reach a SIP application only after all procedures described in section 1 have completed and, assuming that there are no lower layer mobility handlers (such as MIPv6 [8]), it is obliged to acquiesce to delays imposed by lower layers (e.g. waiting for an RA). On the link layer level, though, there is an underlying awareness of connection events, which one might convey to a SIP application. If this information is available, it is always available faster than multicast-ed RAs and hence address changes. Link-Layer movement, however doesn t necessarily mean that subnet and network address have changed so an RA must be solicited to confirm movement. In our solution we introduce a Cross Layer Module (CLM), Fig. 4, that interacts with link, network, and application layer entities. Many network cards support notification model that enables communication with user-space processes. The CLM listens for event notifications and would send an RS every time an AP change is reported (i.e. right after the reception of an Association Response). The corresponding RA response is received and processed by the Network Layer. The network address is thus updated. The CLM on its turn uses the RA as a trigger to send a notification to a pre-registered application layer SIP entity and it is able to send its session re-initialization message (re-invite). SIP 6 reinvite IPv6 Stack Figure 4 - Cross Layer Module Architecture The implementation of CLM does not require any changes in the network configuration and will behave the same way over networks with dense RAs and standard RFC2461 [7] compliant networks (i.e. with density of RA emissions). IV. IMPLEMENTATION AND TESTING A. Testbed The testbed used for testing the proposed optimization consists of three IPv6 access networks. Two of these are equipped with an b Wireless LAN access point. All APs are Cisco Aironet 350 series. Handovers occur back and forth the two IPv6 networks equipped with an AP. Network topology is shown on Fig. 5. s are Linux equipped terminals with modified IPv6 stacks so that no DAD is performed, as proposed by [7] and [11]. We implemented the CLM as described in the previous section. We also modified a SIP client called the SIP- Communicator [12] so that it would handle incoming re- INVITEs and interact with the CLM (i.e. send a re-invite upon CLM mobility notification). Router 1 JNI 5 Mobility Event 4 RА Cross Layer Module NETWORK Router b AP b AP 2 Mobility Event RTNETLINK 3 RS Figure 5 Test bed network topology 1 Association Response Network Card Driver B. Test Results We have measured the handoff delay with SIP terminal mobility in our IPv6 testbed. Three different scenarios have been considered: (a) SIP mobility over a network with standard RA density (400 s) and with DAD; (b) SIP mobility over a network with dense RAs (750 ms) and with DAD; (c) Standard Router 3
5 SIP mobility over a network with dense RAs (750 ms) and without DAD; (d) SIP mobility of a node using Cross Layer triggers. The table shows the handoff delay for each of these configurations. Values shown in the table are the average result of ten successive handovers for each configuration. TABLE II. Case L2 start L2 end Address Config HANDOVER LATENCY IN DIFFERENT SCENARIOS reinvite OK Data (a) 0 0, ,54 409, , ,2 (b) 0 0,165 0,755 2,149 2,199 2,247 (b) 0 0,168 0,666 0,699 0,756 0,797 (d) 0 0,167 0,313 0,346 0,395 0,454 Table II shows the signalling delay measured from the first Probe Request sent by the Mobile Node after entering the new BSS until the first UDP data packet received by the on its new location. As we can see, Layer 2 trigger usage combined with kernel modifications (removed DAD) have reduced handoff delay by 1500 ms to over 400 s for some cases. The same tests are illustrated on Fig. 6. OK received re-invite sent RA Received RS Sent L2 Handover End L2 Handover Start Data Flow Handover time with L2 triggers use Handover without L2 triggers use Handover time without L2 triggers and with DAD -0,1 0,1 0,3 0,5 0,7 0,9 1,1 1,3 1,5 1,7 1,9 2,1 2,3 Time (seconds) Figure 6 Test bed network topology SIP - L2 triggers - DAD SIP - L2 triggers + DAD SIP + L2 triggers - DAD SIP - L2 triggers + DAD + Slow RAs V. CONCLUSION In this paper, we have described an optimization of the handover process, its analytical evaluation, and sample results for SIP mobility in an IPv6 laboratory testbed. In our performance study we concentrate on optimizing the movement detection part of the handover process. We observe that using Cross Layer Triggers and removing DAD greatly improve SIP mobility. Results shown in the article reflect handoff delays for standard network configurations, networks with dense RA emissions, and s with and without kernel modifications and CLT usage. REFERENCES [1] Postel, J., "Internet Protocol", STD 5, RFC 791, September [2] S. Deering, R. Hinden. Internet Protocol, Version 6 (IPv6). RFC2460 December 1998 [3] D. Johnson, C. Perkins, J. Arkko, Mobility Support in IPv6, RFC June 2004 [4] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M. and E. Schooler, "SIP: Session Initiation Protocol", RFC 3261, June [5] H. Schulzrinne and E. Wedland, ACM SIGMOBILE Mobile Computing and Communications Review. Application-layer mobility using SIP - Mobile Computing and Communications Review, Volume 1, Number 2. February [6] "Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications", ANSI/IEEE Std , 1999 Edition. [7] Narten, T., Nordmark, E. and W. Simpson, "Neighbor Discovery for IP Version 6 (IPv6)", RFC 2461, December [8] D. Johnson, C. Perkins, J. Arkko, Mobility Support in IPv6, RFC June 2004 [9] S. Thomson, T. Narten, IPv6 Stateless Address Autoconfiguration. RFC2462. December 1998 [10] Nicolas Montavont, Thomas Noel. Analysis and Evaluation of Mobile IPv6 Handovers over Wireless LAN 2001 [11] Nobuyasu Nakajima, Ashutosh Dutta, Subir Das, Henning Schulzrinne Handoff Delay Analysis and Measurement for SIP based mobility in IPv6. November 2002 [12] The SIP Communicator Project, url ref: [13] Rajeev Koodli. Fast Handovers for Mobile IPv6 - Internet Draft - work in progress. draft-ietf-mipshop-fast mipv6-01.txt. 10 October [14] G. Daley and JinHyeock Choi. Movement Detection Optimization in Mobile IPv6, Internet Draft - Work In Progress, draft-daley-mobileipmovedetect-01.txt. February 2003 [15] JinHyeock Choi, DongYun Shin. Fast Router Discovery with RA Caching in AP - Internet Draft work in progress. draft-jinchoimobileip-frd-00.txt February 2003
Mobility on IPv6 Networks
Mobility on IPv6 Networks Pedro M. Ruiz Project Manager Agora Systems S.A. Global IPv6 Summit Madrid 13-15 March 2002 Pedro M. Ruiz (c) Agora Systems S.A, 2002 1 Outline Motivation MIPv6 architecture MIPv6
REDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran [email protected] [email protected] Common Mobile
Introduction to Mobile IPv6
1 Introduction to Mobile IPv6 III IPv6 Global Summit Moscow Dr. Dimitrios Kalogeras [email protected] GRNET Outline Introduction Relevant Features of IPv6 Major Differences between MIPv4 and MIPv6 Mobile
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
Network Mobility Support Scheme on PMIPv6 Networks
Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. [email protected]
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University
Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push
SIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna ([email protected]) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Changyong Lee, Hwankuk-Kim, Hyuncheol Jeong, Yoojae Won Korea Information Security Agency, IT Infrastructure Protection Division
hgs/sip2001 Mobility 1 SIP for Mobility
hgs/sip2001 Mobility 1 SIP for Mobility Henning Schulzrinne Dept. of Computer Science Columbia University New York, New York (sip:)[email protected] Conference International SIP Paris, France
Mobility Management in DECT/IPv6 Networks
Mobility Management in DECT/IPv6 Networks Sarantis Paskalis 1, Georgios Lampropoulos 1, and Georgios Stefanou 1 Department of Informatics and Telecommunications University of Athens, Greece Abstract. The
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr
IPv6 mobility and ad hoc network mobility overview report
Institut Eurecom 1 Department of Mobile Communications 2229, route des Crêtes B.P. 193 06904 Sophia Antipolis FRANCE Research Report RR-08-217 IPv6 mobility and ad hoc network mobility overview report
SURVEY ON MOBILITY MANAGEMENT PROTOCOLS FOR IPv6
SURVEY ON MOBILITY MANAGEMENT PROTOCOLS FOR IPv6 BASED NETWORK 1 Nitul Dutta, 2 Iti Saha Misra, 3 Kushal Pokhrel and 4 Md. Abu Safi 1 Department of Computer Science & Engineering, Sikkim Manipal Institute
Network Friendliness of Mobility Management Protocols
Network Friendliness of Mobility Management Protocols Md Sazzadur Rahman, Mohammed Atiquzzaman Telecommunications and Networks Research Lab School of Computer Science, University of Oklahoma, Norman, OK
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)
Scanning Delays in 802.11 Networks
Scanning Delays in 802.11 Networks David Murray Murdoch University [email protected] Michael Dixon Murdoch University [email protected] Terry Koziniec Murdoch University [email protected]
Neighbour Discovery in IPv6
Neighbour Discovery in IPv6 Andrew Hines Topic No: 17 Email: [email protected] Organiser: Christian Schindelhauer University of Paderborn Immatriculation No: 6225220 August 4, 2004 1 Abstract
Session Initiation Protocol and Services
Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
Mobile IP Part I: IPv4
Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile
Implementing DHCPv6 on an IPv6 network
Implementing DHCPv6 on an IPv6 network Benjamin Long [email protected] 8-11-2009 Implementing DHCPv6 on an IPv6 network 2 Table of Contents DHCPv6 Overview...3 Terms used by DHCPv6...3 DHCPv6 Message
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract
2.2 SIP-based Load Balancing. 3 SIP Load Balancing. 3.1 Proposed Load Balancing Solution. 2 Background Research. 2.1 HTTP-based Load Balancing
SIP TRAFFIC LOAD BALANCING Ramy Farha School of Electrical and Computer Engineering University of Toronto Toronto, Ontario Email: [email protected] ABSTRACT This paper presents a novel solution to
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 8. Wireless Networks Maria Eugenia Berezin, Franck Rousseau, Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory
SERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic
Simulation of SIP-Based VoIP for Mosul University Communication Network
Int. J. Com. Dig. Sys. 2, No. 2, 89-94(2013) 89 International Journal of Computing and Digital Systems http://dx.doi.org/10.12785/ijcds/020205 Simulation of SIP-Based VoIP for Mosul University Communication
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
Proxy Mobile IPv6-Based Handovers for VoIP Services in Wireless Heterogeneous Networks
IACSIT International Journal of Engineering and Technology, Vol. 4, No. 5, October 12 Proxy Mobile IPv6-Based Handovers for VoIP Services in Wireless Heterogeneous Networks N. P. Singh and Brahmjit Singh
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.
Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.2 COMPARISONS OF IP HEADER FORMATS 2.3 EXTENSION HEADERS 2.3.1 Options
A VoIP Traffic Monitoring System based on NetFlow v9
A VoIP Traffic Monitoring System based on NetFlow v9 Chang-Yong Lee *1, Hwan-Kuk Kim, Kyoung-Hee Ko, Jeong-Wook Kim, Hyun- Cheol Jeong Korea Information Security Agency, Seoul, Korea {chylee, rinyfeel,
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. [email protected]
1 IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc. [email protected] Agenda What has not changed between IPv4 and IPv6 traces What has changed between IPv4 and
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network
Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network Shih-yi Chiu Graduate Inst. of Networking and Communication Eng. Chao Yang Univ. of Tech., Taichung, Taiwan [email protected]
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol
Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol Mario Baldi, Fulvio Risso, Livio Torrero Dipartimento di Automatica e Informatica, Politecnico di Torino, Torino, Italy {mario.baldi,
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing
19531 - Telematics 9th Tutorial - IP Model, IPv6, Routing Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 06. January, 2011 Institute of Computer Science Telematics
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA [email protected] Hesham El-Rewini Southern Methodist University
SIP Trunking Quick Reference Document
SIP Trunking Quick Reference Document Publication Information SAMSUNG TELECOMMUNICATIONS AMERICA reserves the right without prior notice to revise information in this publication for any reason. SAMSUNG
Name Service in IPv6 Mobile Ad-hoc Network
Name Service in IPv6 Mobile Ad-hoc Network Jaehoon Jeong, Jungsoo Park, Hyoungjun Kim, and Kishik Park Protocol Engineering Center, ETRI, 161 Gajong-Dong, Yusong-Gu, Daejon 305-350, Korea {paul,pjs,khj,kipark}@etri.re.kr,
Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities
Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland [email protected], [email protected] Abstract This
Bridging the gap between peer-to-peer and conventional SIP networks
1 Bridging the gap between peer-to-peer and conventional SIP networks Mosiuoa Tsietsi, Alfredo Terzoli, George Wells Department of Computer Science Grahamstown, South Africa Tel: +27 46 603 8291 [email protected]
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
Linux Based Implementation and Performance Measurements of Dual Stack Mobile IPv6
Linux Based Implementation and Performance Measurements of Dual Stack Mobile IPv6 CHAMAN SINGH 1 K.L.BANSAL 2 1 Assistant Professor 2 Associate Professor [email protected] [email protected]
4-4 Approach of VoIP/SIP Interoperability Task Force
4-4 Approach of VoIP/SIP Interoperability Task Force In this research, it achieved interoperability of VoIP systems using SIP in both Multi-vendor and Multi-provider environments, and VoIP/SIP interoperability
Multicasting with Mobile IP & The Session Initiation Protocol
Multicasting with Mobile IP & The Session Initiation Protocol Hamad el Allali and Cristian Hesselman Abstract This report discusses how Mobile IP deals with multicast communications and describes a possible
SIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna ([email protected]) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
Abstract. 2 Overview of mobility in WLAN. 1 Introduction
A study of mobility in WLAN Fengping Li Helsinki University of Technology Telecommunication Software and Multimedia Laboratory [email protected] Abstract This paper studies mobility in wireless LAN (WLAN,
6 Mobility Management
Politecnico di Milano Facoltà di Ingegneria dell Informazione 6 Mobility Management Reti Mobili Distribuite Prof. Antonio Capone Introduction Mobility management allows a terminal to change its point of
Firewalls und IPv6 worauf Sie achten müssen!
Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG [email protected] Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)
Design of a SIP Outbound Edge Proxy (EPSIP)
Design of a SIP Outbound Edge Proxy (EPSIP) Sergio Lembo Dept. of Communications and Networking Helsinki University of Technology (TKK) P.O. Box 3000, FI-02015 TKK, Finland Jani Heikkinen, Sasu Tarkoma
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
Special Module on Media Processing and Communication
Special Module on Media Processing and Communication Multimedia Communication Fundamentals Dayalbagh Educational Institute (DEI) Dayalbagh Agra PHM 961 Indian Institute of Technology Delhi (IITD) New Delhi
NTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: [email protected] Date: 2006/05/02 1 Outline Introduction NTP VoIP
IPv6 associated protocols. Piers O Hanlon
IPv6 associated protocols Piers O Hanlon Contributions Main authors Jean-Marc Barozet, Cisco, France Faycal Hadj, Cisco, France Patrick Grossetete, Cisco, France Gunter Van de Velde, Cisco, Belgium Bernard
www.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
Boosting mobility performance with Multi-Path TCP
Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,
Mobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
TRIM: an Architecture for Transparent IMS-based Mobility
TRIM: an Architecture for Transparent IMS-based Mobility Ivan Vidal a,, Antonio de la Oliva a, Jaime Garcia-Reinoso a, Ignacio Soto b a Universidad Carlos III de Madrid. Avda. de la Universidad 30 28911
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
: Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,
Adaptation of TURN protocol to SIP protocol
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 2, January 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 78 Adaptation of TURN protocol to SIP protocol Mustapha GUEZOURI,
Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP
Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses
Introduction to IPv6 and Benefits of IPv6
Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet
Analysis of Mobile IP in Wireless LANs
ENSC 835: COMMUNICATION NETWORKS FINAL PROJECT PRESENTATIONS Spring 2011 Analysis of Mobile IP in Wireless LANs www.sfu.ca/~bshahabi Babak Shahabi ([email protected]( [email protected]) 301102998 Shaoyun Yang
