MOBILITY SUPPORT USING INTELLIGENT USER SHADOWS FOR NEXT-GENERATION WIRELESS NETWORKS
|
|
|
- Theresa Parsons
- 10 years ago
- Views:
Transcription
1 MOBILITY SUPPORT USING INTELLIGENT USER SADOWS FOR NEXT-GENERATION WIRELESS NETWORKS Gergely V. Záruba, Wei Wu, Mohan J. Kumar, Sajal K. Das enter for Research in Wireless Mobility and Networking Department of omputer Science and Engineering The University of Texas at Arlington Arlington, Texas, USA {zaruba, wuwei, kumar, Abstract This paper proposes a mobility management scheme for seamless roaming in fourth generation (4G) wireless overlay networks. A new mobile software entity called user shadow is introduced to the wired network, addressing the roaming needs of the mobile user. With the help of these user shadows, most signaling interaction between mobile devices and wired networks is constrained to the wired links, reducing the dependence on the limited wireless bandwidth. Additionally, the novel concept of software IP mobility is introduced, enabling the mobile software entities (i.e., user shadows) to communicate using their own IP stack. Software IP mobility enhances the current IP mobility approaches while helping in providing with seamless mobility. A signaling cost analysis is performed to compare signaling overhead of the user shadow approach to that of Mobile IP. 1. Introduction One of the major enablers towards next generation (NG or 4G) wireless networks is system integration [1,2] where a unique perception general wireless access system is to be established through the integration of the services offered by current (such as UMTS, GPRS, Wireless LAN, etc.) and future wireless access technologies. The trend towards packet switched technologies and increasingly general use/acceptance of the Internet Protocol (IP) indicate that all these wireless access networks are to be connected to an IP-based core network (i.e., the Internet). In other words, NG wireless networks can be seen as many overlapping wireless Internet access domains. In this heterogeneous environment, a mobile host (M 1 ) is equipped with multiple wireless interfaces or a multimode wireless interface to connect to any or all wireless access networks anytime anywhere. The seamless roaming of a M in NG wireless networks involves various tasks such as wireless interface management, handoff decision, service admission request and quality of service (QoS) negotiation while considering limited processing power and battery life of the Ms. In this paper, we describe a mobility management scheme relaying on our 4G system integration framework called NGIneUS (Intelligent User Shadows for Next Generation Wireless Services pronounced: ingenious) [3]. The motivation behind our work is given by the fact that the processing power and bandwidth of wired networks are relatively easily expandable and thus their extensive use can be justified to most efficiently control the scarcest resource: the wireless bandwidth. One of the novel ideas of our scheme is the deployment of mobile software entities, namely user shadows into the wired networks, controlling and negotiating with the network on behalf of the users. User shadows can help to limit the signaling overhead to the wired networks as much as possible. Another new concept in NGIneUS is the assignment of IP addresses to the user shadows, i.e., to mobile software entities. Therefore, user shadows can receive and terminate data streams of services to and from corresponding nodes, while individual users need to communicate only with their respective shadows. As users roam, the associated user shadows migrate inside the wired networks, much like shadows, hence the name. Since shadows are assigned their own IP addresses, their 1 We will use mobile host and mobile user interchangeably in this paper.
2 migration can be handled by any of the existing IP mobility management protocols (with slight extensions). Mobile IP [4] is one of the premier IP mobility management protocols standardized by the IETF (Internet Engineering Task Force). Mobile IP relies on the association of a unique IP address with the M s wireless interface. Mobile IP enables correspondent hosts () to reach the M through its unique IP address even if the M resides in a foreign network. A home agent (A), foreign agents (FA), and temporary IP addresses (care-of addresses) are used to aid packet forwarding. If a M changes its wireless point of attachment (by roaming between networks), it has to update its location with its A. The more frequent the handoff requests are the more wireless bandwidth is used for signaling. To reduce the signaling cost for Ms moving within the local domain, intra-domain or micro-mobility management protocols have been proposed, such as ellular IP [5], AWAII [6] and IDMP [7]. With such hierarchical schemes, M mobility generates location update signaling up-to the gateway node only, thus shielding the A from mobility effects. owever, even with these schemes, roaming Ms will still need to transmit location update messages via the wireless links. In contrast, our scheme requires the user shadows within the wired infrastructure to send location updates on behalf of Ms. Moreover, none of the existing mobility schemes provide any support to the Ms for dealing with mobility-related tasks, whereas user shadows communicate with the network on behalf of the Ms, enhancing network proactivity and user transparency. The rest of the paper is organized as follows: Section 2 presents the proposed mobility management scheme, reviewing the concepts of user shadows and software IP mobility. Section 3 outlines the comparative signaling cost analysis on our mobility management scheme and Mobile IP. Section 4 concludes the paper. 2. Mobility Support Using User Shadows NGIneUS considers NG wireless systems to be heterogeneous networks consisting of several overlaying wireless access networks, while Ms are equipped with multiple wireless interfaces. User shadows are running and migrating between dedicated environments, namely NG servers (NGS). NGSs are deployed in each wireless access domain, co-located with network controllers or routers. For example, in a GSM cellular network, an NGS could be mapped to each mobile service switching center (MS) controlling several base station controllers (BS), while in a corporate wireless LAN environment, the NGS could be the gateway router connecting the access points to the rest of the network. An architectural view of NG wireless system is provided in Figure 1. Figure 1. Architecture of NGIneUS using user shadows 2.1. User Shadows In the proposed mobility management scheme, each mobile user is associated with a user shadow, following the user s path in the wired infrastructure and controlling network access parameters on behalf of the user. As the user moves, the associated shadow will also migrate from one NGS to another in the wired network, optimizing the distance between itself and its owner. It is the task of the user shadows to determine whether to migrate to another NGS based on the current location of users as well as on user profiles, such as mobility patterns, QoS requirements of applications, user subscription plans and capability of the mobile device [3]. The location change of Ms can be detected by intercepting messages of the new IP address assignment to the M since NGSs are normally co-located with the edge router or gateway,
3 where IP address assignment functions such as DP (Dynamic ost onfiguration Protocol) server are configured. The NGS at the access domain to which the M enters will send a migration notice message to the NGS at the previous access domain of the M. If multiple wireless air interfaces are available to the M, the shadow will instruct the M to use the appropriate wireless interface for communication. In this case, the user shadow (or a copy of the shadow) can migrate in advance to the corresponding NGS. Figure 2 shows the message flow of migration procedure of a user shadow, where the DP server in charge of providing with care-of addresses is assumed to be co-located with the NGS in each subnet. Mobile ost DP Discovery DP Request Base Station DP Offer DP AK NGS / DP Server Migration Notice Shadow Migration Registration Request NGS / User Shadow Registration Reply Figure 2. Message flow of shadow migration ome Agent Migration is not the only way for user shadows to move closer to the users. The fact, that there is a one-to-one mapping between users and shadows implies that a shadow can only be present at the NGS of one of the wireless interfaces. Yet, the user has to be enabled to use the other available access networks as well. Thus, user shadows can instruct the NGSs of those access networks to spawn a process, which we refer to as the slave user shadow. The slave user shadow s task is to receive/transmit packets to/from the user through the wireless interface relaying those packets to the shadow. Another task of the slave is to negotiate access parameters with the access network controller on behalf of the user (and the shadow). Since slave shadows are access network specific, no data or code migration is initiated by the user shadow; it simply instructs the NGS to create a new process. User shadows and their slaves communicate through a common protocol, called inter-shadow messaging protocol (ISMP). Another major difference between user shadows and their slaves is that the former have their own IP address while the slaves use the IP address of the corresponding NGS and a port number. While user shadows never cease to exist though they migrate from one NGS to another, slave shadows can as easily be terminated by their masters as they were created; slave user shadows do not carry any important information about the user, her behavior or the properties of her connections. Using this approach one software entity, i.e., the master user shadow can control the information flow arriving and departing simultaneously through various wireless interfaces. Although the message exchange between shadow master and slaves introduces signaling overhead, such messages are within the wired networks, thereby not affecting the bandwidth constrained wireless links. The information collected from the slave shadow plays an important role in the mobility management, stream admission control, scheduling, and profile management. Figure 3 depicts the slave user shadow spawning procedure where the user is originally connected to only a macro-cell provider thus 100% of her traffic is routed on the only available interface. When the user moves into a hot-spot area, a slave shadow is spawn in the NGS of the hot-spot; 40% of her traffic in the example is routed over the hot-spot s interface Software IP Mobility urrent IP mobility management proposals deal only with mobility of hardware devices. IP addresses are associated to the wireless interfaces of mobile devices. In NGIneUS, mobile software entities, i.e., user shadows are allowed to be associated with IP addresses, such that applications can address and communicate with mobile software code using a simple IP address. In our proposed scheme, user shadows function as terminating points for IP packets and overlying transport layer (i.e., TP, UDP) data streams, i.e., it is the user shadows that carry the user specific IP address and terminate all network and transport layer streams. Since user
4 shadows reside inside NGSs, routing functions have to be included in all NGSs. Routing is to be performed between the IP layer associated with the physical interface of the NGS and the IP stacks of each of the software (virtual) interfaces created by individual user shadows. Figure 4 outlines the protocol stack in NGS. binding mechanism is needed between the user and her shadow. To update the binding with the shadow, the mobile user sends refreshing messages to the NGS in the same domain periodically or on-demand. In turn, the NGS relays the message to the corresponding user shadow by checking the MA address of the mobile device. ontent Provider 40% igher Layers - NGS igher Layers - NGS igher Layers Shadow 1 igher igher igher 100% 60% Internet 4 Transport Layer - NGS IP Layer - NGS Transport Layer - NGS IP Layer - NGS Tport Layer Shadow 1 IP Layer Shadow 1 Tport IP Tport IP Tport IP User moves Link Laye r Physical Interface Link Laye r Physical Iface Virtual Iface Shadow-1 Virt. Iface Virt. Iface Virt. Iface Left Side View Front View Right Side View Stream flow before spawning Stream flow after spawning Master Shadow Slave Shadow Figure 3. Master vs. slave user shadows User shadows create their own virtual (software) interface; thus each user shadow has its own TP/IP protocol stack and routes all the packets to the default IP of the NGS IP layer. Similar to the IP address assignment to a physical mobile device using Mobile IP, a user shadow can also have its home IP address and care-of-address in the foreign networks. Alternatively, the shadow IP address can be acquired from any DP server with dynamic update to the DNS server. In other words, user shadows can be treated just like mobile devices and as such devices, they need IP mobility handling; since user shadows are software agents, we refer to their mobility as software IP mobility. With the unique IP address associated to shadows, they can always be reached even after migrating to a new NGSs. Since a mobile user is represented by its shadow to the outside world, a Figure 4. NGS protocol stack 3. Signaling ost Analysis In this section, we perform a simple signaling cost analysis in terms of location update cost on NGIneUS, while comparing the results to the signaling cost of Mobile IP. We select Mobile IP as the manager to handle the mobility of user shadows, and assume that M care-of addresses are assigned by a DP server. For simplicity, user shadow spawning is not considered. To create a simple, comparable situation with Mobile IP, a M is assumed to use co-located care-of-address in the foreign network (configured using the DP server). The DP server is assumed to be co-located with the NGS in each subnet. The mobility pattern of users is modeled by the fluid flow model [8], where Ms are uniformly distributed with a density ρ and move at an average velocity of v in uniformly distributed directions (between [0,2π)). If the subnet areas are square-shaped with the perimeter l, the subnetcrossing or handoff rate of a M is r c =p*v*l/π. We define the following parameters for the signaling cost analysis: mh-bs is the transmission cost between Ms and base stations. is the transmission cost between the base station and the
5 NGS/DP server of the subnet, which the M moves to. dhcp-dhcp is the transmission cost between the NGS/DP server in the M s current subnet and the NGS/DP server in the M s previous subnet. dhcp-ha is the transmission cost between the NGS/DP server in the M s current subnet and the home agent. Based on the message flow shown in Figure 2, the signaling cost of the user shadow scheme can be expressed as: dhcp- ha = mh-bs bs- dhcp dhcp- dhcp shadow + The DP address acquiring procedure is same for the M using Mobile IP. The difference is that the M itself has to send the registration request to the A, and A replies directly to the M. So, wireless transmission is required for the location update of the M. Thus, the signaling cost of Mobile IP can be expressed as: dhcp- ha = mh-bs mip + Let be the average number of hops between base station and NGS/DP server, dhcpdhcp be the average number of hops between any two NGSs/DP servers, and dhcp-ha be the average number of hops between NGS/DP server and A. The transmission cost is assumed to be proportional to the distance between the two end-points, the proportionality constant being δ. We assume the transmission cost over wireless links to be α times higher than that over wired links; since the transmission cost over the wireless links is much higher than that over wired links α>>1. Shadow migration requires the transmission of the software code from one NGS to another generating β times higher cost than normal signaling message transmission. Using the above methodology, the signaling cost per time unit with NGIneUS can be expressed as: shadow = (4α = (4α mh-bs mh -bs ( β + 1) + ( β + 1) dhcp-dhcp dhcp-dhcp dhcp-ha dhcp-ha ) δ rc ρvlδ ) π (1) (2) (3) is: The signaling cost per time unit using Mobile IP = (6α mip = (6α + 6 mh-bs + 6 mh-bs ) δ dhcp-ha c r ρvlδ ) dhcp-ha π From Equation (3) and (4), we can observe that NGIneUS has an extra signaling cost due to shadow migration only inside the wired network, while reducing the wireless transmission costs. This is due to the user shadows handling the location update messages inside the wired network. In addition, with the same shadow migration overhead, the proposed scheme has less signaling cost than Mobile IP as α increases. In this condition, faster moving Ms or smaller subnet sizes make the performance of the proposed scheme superior to that of Mobile IP. 4. onclusions In this paper, we outlined the mobility management scheme of NGIneUS, for seamless roaming in 4G wireless overlay networks. A new mobile software entity called user shadow has been introduced to the wired networks, addressing the roaming needs of the mobile user. With the help of user shadows, most signaling interaction between mobile devices and wired networks is constrained to the wired links, reducing the dependence on the limited wireless bandwidth. Additionally, the novel concept of software IP mobility was introduced, enabling the mobile software entities (i.e., user shadows) to communicate using their own IP stack. Software IP mobility enhances the current IP mobility approaches and can help in providing with seamless mobility. The signaling cost analysis has shown that the proposed mobility management scheme consumes less wireless bandwidth than Mobile IP. The signaling cost depends on the migration overhead of the user shadows, requiring these to be as compact as possible. urrently, we are in the process of implementing a software IP mobility testbed, to support IP communication and mobility of software entities as the first step towards our NGIneUS framework. We are in the process of designing and evaluating of protocols and algorithms for handoff management among heterogeneous systems. The (4)
6 handoff decisions, made by user shadows, will be based not only on the technical considerations such as signal to noise ratio (SNR) but also on the information collected on the user s past behavior, i.e., on user profiles. Since user shadows represent the mobile users in the networks, the security problem like the authentication, authorization and accounting (AAA) association between users, user shadows and NGSs is also an important issue under investigation. References [1] Y. Raivio, 4G ype or Reality, Proceedings of the IEEE 3G Mobile ommunication Technologies, March, [2] U. Varshney, and R. Jain, Issues in Emerging 4G Wireless Networks, IEEE omputer Magazine, pp , June, [3] G.V. Záruba, W. Wu, M. J. Kumar, and S. K. Das, NGIneUS: Intelligent User Shadows for Next Generation Wireless Services, Technical Report, The University of Texas at Arlington, [4]. Perkins, Ed., IP Mobility Support for IPv4, IETF RF 3344, Aug [5] A. ampbell, J. Gomez, -Y. Wan, S. Kim, Z. Turányi, and A. Valkó, ellular IP, IETF Draft, draft-ietf-mobileip-cellularip-00.txt, January 2000, Work in Progress. [6] R. Ramjee, T. La Porta, S. Thuel, and K. Varadhan, IP Micro-Mobility Support Using AWAII, IETF Draft, draft-ramjee-micromobility-hawaii-01.txt, July 2000, Work in Progress. [7] A. Misra, S. Das, A. McAuley, A. Dutta, and S.K. Das, IDMP: An Intra-Domain Mobility Management Protocol using Mobility Agents, IETF Draft, draft-mobileip-misra-idmp-00.txt, July 2000, Work in Progress. [8] T. Brown, and S. Mohan, Mobility Management for Personal ommunications Systems, IEEE Transactions on Vehicular Technology, vol. 46, pp , May 1997.
The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction
The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network Girish Patel Wireless Solutions Nortel Networks Richardson, TX [email protected] Steven Dennett Personal Communications Sector Motorola
Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling
Administrivia No lecture on Thurs. Last work will be out this week (not due, covers wireless) Extra office hours for next week and the week after. Channel Partitioning, Random Access and Scheduling Channel
Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP
Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses
Performance Evaluation for Mobility Management Protocols in Cellular IP and Hawaii Mobile Networks
Performance Evaluation for Mobility Management Protocols in Cellular IP and Hawaii Mobile Networks M.Mansour, A.Ghneimat,J. E. Mellor Department of Computing University of Bradford Bradford BD7 1DP, UK.
G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. [email protected]
Offering VoIP in a mobile IP network
Graduate school of computer science and Engineering Monmouth University West Long Branch, NJ, USA Email: {[email protected] [email protected]} Abstract In the recent decade, our understanding
A Novel Pathway for Portability of Networks and Handing-on between Networks
A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 [email protected]
5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
EE6390. Fall 1999. Research Report. Mobile IP in General Packet Radio System
EE6390 Introduction to Wireless Communications Systems Fall 1999 Research Report Mobile IP in General Packet Radio System Kelvin K. W. Wong Ramzi Hamati Date: Dec. 6, 1999 1.0 Abstract Tunneling is one
Mobile IP Part I: IPv4
Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)
Forced Low latency Handoff in Mobile Cellular Data Networks
Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN [email protected]
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
Mobility Management in DECT/IPv6 Networks
Mobility Management in DECT/IPv6 Networks Sarantis Paskalis 1, Georgios Lampropoulos 1, and Georgios Stefanou 1 Department of Informatics and Telecommunications University of Athens, Greece Abstract. The
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
802.11: Mobility Within Same Subnet
What is Mobility? Spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same AP mobile user, (dis) connecting from using DHCP mobile user, passing through multiple
IPv6 Networks: Protocol Selection for Mobile Node
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 16-24 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) IPv6 Networks: Protocol Selection for Mobile
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 Virender Kumar Department of Electronics & Communication Engineering, HCTM Technical Campus, Kaithal, India [email protected] ABSTRACT Mobile
REDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran [email protected] [email protected] Common Mobile
Analysis of Mobile IP in Wireless LANs
ENSC 835: COMMUNICATION NETWORKS FINAL PROJECT PRESENTATIONS Spring 2011 Analysis of Mobile IP in Wireless LANs www.sfu.ca/~bshahabi Babak Shahabi ([email protected]( [email protected]) 301102998 Shaoyun Yang
Internet Connectivity for Ad hoc Mobile Networks
Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins
6 Mobility Management
Politecnico di Milano Facoltà di Ingegneria dell Informazione 6 Mobility Management Reti Mobili Distribuite Prof. Antonio Capone Introduction Mobility management allows a terminal to change its point of
Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks
Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National
Cost Analysis of NEMO Protocol Entities
Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science, University of Oklahoma, Norman, OK 73019. Email: {shohrab, atiq}@ou.edu William Ivancic NASA
Home Agent placement and assignment in WLAN with Cellular Networks
Home Agent placement and assignment in WLAN with Cellular Networks Selvakumar.R, Senior Lecturer, Department of Computer Science and Engineering V.M.K.V.Engineering College, Salem-636 308 Tamilnadu, India.
119, Munjiro, Yuseong-gu, Daejeon, Korea. {neofaith, mckim, torshong, kangsw}@icu.ac.kr 2 InfraLab, Korea Telecom
A Mobility Management Scheme using - for Realtime Services across Heterogeneous Networks Hyelim Park 1 Myungchul Kim 1 Sooyong Lee 1 Sungwon Kang 1 Yongho Kim 2 1 School of Engineering, Information and
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA [email protected] Hesham El-Rewini Southern Methodist University
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Mobility on IPv6 Networks
Mobility on IPv6 Networks Pedro M. Ruiz Project Manager Agora Systems S.A. Global IPv6 Summit Madrid 13-15 March 2002 Pedro M. Ruiz (c) Agora Systems S.A, 2002 1 Outline Motivation MIPv6 architecture MIPv6
SERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks
Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Anders Nilsson, Ali Hamidian, Ulf Körner Department of Communication Systems Lund University, Sweden Box118,221Lund
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, [email protected]
Mobility Management for IP-based Mobile Networks
Mobility Management for IP-based Mobile Networks H. Becker, N. Gerlich, M. Schopp Siemens Information & Communication Mobile Munich, Germany 1 Overview Introduction to IP-based Radio Access Networks Definition
Mobile SCTP Transport Layer Mobility Management for the Internet
Mobile SCTP Transport Layer Mobility Management for the Maximilian Riegel Siemens AG, Munich, Germany E-mail: [email protected] Dr. Michael Tüxen Siemens AG, Munich, Germany E-mail: [email protected]
Application Layer Mobility Management Scheme for Wireless Internet
Application Layer Mobility Management Scheme for Wireless Internet Ashutosh Dutta, Faramak Vakil, Jyh-Cheng Chen, Miriam Tauil Telcordia Technologies, 445 South Street, Morristown, NJ 07960 Shinichi Baba,
A Study on Mobile IPv6 Based Mobility Management Architecture
UDC 621.396.69:681.32 A Study on Mobile IPv6 Based Mobility Management Architecture VTsuguo Kato VRyuichi Takechi VHideaki Ono (Manuscript received January 19, 2001) Mobile IPv6 is considered to be one
Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.
5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues. 5.1 LEGACY INTEGRATION In most cases, enterprises own legacy PBX systems,
A survey on Spectrum Management in Cognitive Radio Networks
A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,
Voice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
A Mobile Ad-hoc Satellite and Wireless Mesh Networking Approach for Public Safety Communications
A Mobile Ad-hoc Satellite and Wireless Mesh Networking Approach for Public Safety Communications G. Iapichino, C. Bonnet Mobile Communications Department Eurecom Sophia Antipolis, France {Iapichin, Bonnet}@eurecom.fr
ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi ([email protected]) Ehsan Arman ([email protected]) http://www.sfu.ca/~faa6
Mobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; [email protected] +32/3/240.7830; Guy.Reyniers@alcatel.
Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; [email protected] +32/3/240.7830; [email protected] Voice over (Vo) was developed at some universities to diminish
Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA
White Paper Birdstep Intelligent Mobile IP Client v2.0, Universal Edition Seamless secure mobility across all networks Copyright 2002 Birdstep Technology ASA Haakon VII's gate 5B, N-0161 Oslo, Norway Tel:
EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens
Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : [email protected] Tel : (+32)
White Paper ON Dual Mode Phone (GSM & Wi-Fi)
White Paper ON Dual Mode Phone (GSM & Wi-Fi) Author: N Group 1.0 Abstract Dual Mode Handset is in demand for converged Network, Access, Billing, and Operation environment. Dual mode handsets provide cost
Extending Networking to Fit the Cloud
VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks [email protected] Hannu Verkasalo Helsinki University of Technology [email protected]
CS 294-7: Cellular Digital Packet Data (CDPD) Prof. Randy H. Katz CS Division University of California, Berkeley Berkeley, CA 94720-1776 1996
CS 294-7: Cellular Digital Packet Data (CDPD) Prof. Randy H. Katz CS Division University of California, Berkeley Berkeley, CA 94720-1776 1996 1 Cellular Digital Packet Data IBM, McCaw Cellular Data network
Implementing LTE International Data Roaming
Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP
This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP C H A P T E R 5 Mobility This book covers the major components of 802.11
Hand-around on Seamless Services and Mobility in Home Networking
Hand-around on Seamless Services and Mobility in Home Networking Pei-Yuan Qiu 1, Min-Shu Hung 1, Jen-yi Pan 1, Kuo-Pao Fan 2, and Jui-Wen Chen 2 1 Department of Communications Engineering National Chung
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Network Mobility Support Scheme on PMIPv6 Networks
Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. [email protected]
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
IP-based Mobility Management for a Distributed Radio Access Network Architecture. [email protected]
IP-based Mobility Management for a Distributed Radio Access Network Architecture [email protected] Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
Voice over IP (VoIP) Basics for IT Technicians
Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides
of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier
VoLTE 3GPP Roaming Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends VoLTE Roaming and ion Standard Technology In 3GPP Release 11, the VoLTE roaming and interconnection architecture
