Fast Handoff Mobile IP Protocol Using A Novel Route Optimization Technique

Similar documents
Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

Tomás P. de Miguel DIT-UPM. dit UPM

Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents

Performance Evaluation of a QoS-Aware Handover Mechanism

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5),

School of Computer Science

Network Mobility Support Scheme on PMIPv6 Networks

REDUCING PACKET OVERHEAD IN MOBILE IPV6

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

Cost Analysis of NEMO Protocol Entities

Mobile IP Part I: IPv4

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

6 Mobility Management

Analysis of Mobile IP in Wireless LANs

On the Design of Mobility Management Scheme for based Network Environment

IPv6 Networks: Protocol Selection for Mobile Node

OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6

Introduction to Mobile IPv6

SURVEY ON MOBILITY MANAGEMENT PROTOCOLS FOR IPv6

ABSTRACT. Introduction. Table of Contents. By Yi-an Chen

Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents

Abstract. 2 Overview of mobility in WLAN. 1 Introduction

Boosting mobility performance with Multi-Path TCP

Permanent Link:

Transport Layer Protocols

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

RARP: Reverse Address Resolution Protocol

Secure Networking Using Mobile IP

Mobility on IPv6 Networks

Dynamic Home Agent Reassignment in Mobile IP

A Proxy Mobile IP based Layer-3 Handover Scheme for Mobile WiMAX based Wireless Mesh Networks

Securing Internet Gateway Discovery Protocol in Ubiquitous Wireless Internet Access Networks

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

INTERNET SERVICE PROVIDER-MOBILE BORDER GATEWAY ROUTE OPTIMIZATION TECHNIQUE IN MOBILE IP BASED ON DIFFERENT ISPS STRUCTURES (ISP-MBG)

Introducing Reliability and Load Balancing in Mobile IPv6 based Networks

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Handover Management based on the Number of Retries for VoIP on WLANs

IPv6 associated protocols. Piers O Hanlon

Mobile Internet Protocol v6 MIPv6

Reliable Multicast Protocol with Packet Forwarding in Wireless Internet

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Internet Connectivity for Ad hoc Mobile Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

CS268 Exam Solutions. 1) End-to-End (20 pts)

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

MOBILITY SUPPORT USING INTELLIGENT USER SHADOWS FOR NEXT-GENERATION WIRELESS NETWORKS

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Mobility (and philosophical questions about names and identity) David Andersen CMU CS The problem

TCP for Wireless Networks

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Wireless Networks: Network Protocols/Mobile IP

IP - The Internet Protocol

/98/$10.00 (c) 1998 IEEE

Networking Test 4 Study Guide

Outline. Wireless System Integration WLAN. WAN Technologies ดร. อน นต ผลเพ ม LAN. WAN Server LAN. Wireless System Architecture Protocols

Guaranteed QoS Routing Scheme in MPLS -Wireless Access Networks

Mobile IP and Cellular IP Integration for Inter Access Networks Handoff

Mobility Management Advanced

Static and Dynamic Network Configuration

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

SHISA: The IPv6 Mobility Framework for BSD Operating Systems

A Seamless Handover Mechanism for IEEE e Broadband Wireless Access

Network Layer: Network Layer and IP Protocol

Integrated DNS and IPv6 mobility for next generation Internet

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Analysis and Comparison of Different Host Mobility Approaches

IEEE P802 Handoff ECSG Handoff for Multi-interfaced 802 Mobile Devices. Abstract

Home Agent placement and assignment in WLAN with Cellular Networks

Final for ECE374 05/06/13 Solution!!

A Study on Mobile IPv6 Based Mobility Management Architecture

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Mobile Computing/ Mobile Networks

EE6390. Fall Research Report. Mobile IP in General Packet Radio System

Proxy Mobile IPv6-Based Handovers for VoIP Services in Wireless Heterogeneous Networks

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

A Novel Pathway for Portability of Networks and Handing-on between Networks

(Refer Slide Time: 01:38 01:37)

QoS Provisioning in Mobile Internet Environment

SOFTWARE-DEFINED NETWORKING IN HETEROGENEOUS RADIO ACCESS NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

SBSCET, Firozpur (Punjab), India

Adaptive DCF of MAC for VoIP services using IEEE networks

How To Understand The Theory Of Network Mobility

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Internet Control Protocols Reading: Chapter 3

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Figure 1. The Example of ZigBee AODV Algorithm

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

SEcure Neighbour Discovery: A Report

IMHP: A Mobile Host Protocol for the Internet. Abstract

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Mobility Support in IPv6

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Transcription:

Fast Handoff Mobile IP Protocol Using A Novel Route Optimization Technique Sajal Saha 1, Asish K Mukhopadhayay 2, and Surajjan Ghose 3 1 Narula Institute of Technology/Dept. of Computer Application, Kolkata, India Email: sajalkrsaha@rediffmail.com 2 Dr.B.C.Roy Engg. College / Dept. of ECE, Durgapur, India Email: akm55@gmail.com 3 Jadavpur University / Dept. of CSE, Kolkata, India Email: sghose@cse.jdvu.ac.in Abstract Route optimization is a common technique to solve the triangular routing problem in Mobile IP. This paper evaluates various route optimization schemes available in the literature and prepares a comparative analysis of those schemes. It proposes a novel pilot agent based route optimization technique that reduces the handoff delay efficiently. The scheme has been simulated using OPNET and the results show that the proposed scheme ensures packet transfer through correspondent node in a secure manner with smooth handoff even during frequent movement of mobile node without call dropping. Index Terms Route optimization, Mobile IP, Triangular routing. I. INTRODUCTION Mobile IP protocol allows a Mobile node (MN) to move from one place to another in the Internet and still maintains communication with other nodes known as correspondent nodes (CNs). In Mobile IP packets coming from CN is received by the HA which redirects it to the MN through the FA. However, the MN can send the packets directly to the CN. Thus, overall routing path becomes triangular as shown in Fig. 1. This extended routing path is known as triangular routing problem. IETF defined route optimization (RO) [2][9][10] technique in 1996 to resolve triangular routing problem. In this technique, the CN can send the packets directly to the MN. Whenever MN is away and attached to a Foreign Agent (FA) with its care-of-address (CoA), it updates the binding cache by sending binding update request to the CN. In case of further change of FA while roaming, the old FA maintains a binding cache entry for the MN, and delivers the packets to the MN s new CoA so that packet drop can not occur. The rest of the paper is organized as follows. We compare different existing RO schemes in Section 2. We present our proposed scheme in Section 3. The simulation results are presented in Section 4. Finally we present our conclusion in Section 5. Figure 1. Triangular routing in Mobile IP. II. COMPARISON OF EXISTING RO SCHEMES Pekka Nikander et el. [1] analyzed the security issues with RO in MIPv6 using Return Routability technique. Perkins [2] introduced RO extension in MIPv6 that enables reliable handoff between FA and MN. MOTOROLA introduced route optimization for iden (Integrated Dispatch Enhanced Network) system [3] where FA keeps all the binding updates for a MN and transmit those directly through tunneling to the destination node. When a new MN comes into the foreign network, the binding update is forwarded to all the FAs so that no binding warning (BW) message is introduced to HA. Quang Gao et el [5] proposed virtual HA based route optimization scheme. The basic idea presented in this paper is based on two major assumptions, a) there is actually no need of a permanent HA throughout and b) MN tends to be highly localized during session period (The period in which all active connections starts and terminates). Thus, if the temporary address is not changed during this session period, there will be no connection disruption. Actually one of the hosts within the MN's footprint is set as its virtual HA (VHA). It retains its Virtual Home Address (VHoA) during a particular session period. According to the 2nd assumption a MH is closer to its VHA (abiding to locality concepts during session period). Thus tunneling packets by VHA to MH will lower or almost eliminate the triangle routing problem. The Basic idea of [6] is to set up a correspondent agent (CA) similar to HA & FA. The proposed solution gives the task of maintaining and updating binding caches & encapsulating messages to a single CA instead of a number of correspondent hosts in a network. Chun-Hsin Wu et el. [7] proposed bi-directional route optimization technique. This technique enables a CN and a MN to communicate with each other directly without the intervention of the HA and solves the triangular routing problem using a bi-directional tunnel. Here, a correspondent agent (CA) is also introduced to keep the transparency to the CN s and also to serve multiple CN s of its subnet. The CA maintains a Binding cache and intercepts all the packets which are sent to and from the CN s. Similarly, a FA maintains a tunneling cache to implement a bi-directional technique. In [8], a new entity called Mobile Router (MR) has been proposed. These MRs are places all the way around the network so that in between every path there is at least one MR. These MRs are also designed to have wireless links. There will be high probability that there exists one or more MR in the path between HA to CN or CN to HA. Also there is high probability that the MR in the path from HA to CN will be 207

same as in the path from CN to HA. Instead of the CN, these MRs will keep their binding caches updated on the basis of the messages that they catch in its transition from HA to CN or vice versa. Now every time CN sends a message to HA, if it gets encountered by any of the MR in its path that has the relevant information then it intercepts the packet and tunnels it to the MN bypassing the HA. But if in any case there is no MR encountered, then the HA receives the message and tunnels it to MN as in MIP. The binding entries in MR will have a specific life time after which it will be discarded. We have considered these salient optimization schemes and prepared a comparative analysis as summarized in Table 1. TABLE I. A COMPARISON OF EXISTING PROTOCOLS Protocol/Methodology IP version Advantage / Contribution Drawback/shortcomings Hand off Latency Return Routibility 2003[1] 6 Provide Security Against active attacks through return rout ability. RO extension 1998 [2] 6 Decrease in Handoff Latency through modified registration request message and agent advertisement message. MIP RO in iden System 1997 [3] NS2 Simulation of RO in MIP 2003 [4] Virtual HA based scheme 2000 [5] 6 MN sends the packet directly to FA bypassing the HA and reduce handoff latency. The lifetime of the state created at CN is deliberately restricted to a few minutes, this leads to worthless exchange HoT message through HA every few minutes. Security Required larger memory for FA to maintain the binding cache. 4 Enables IPv4 to support RO. Only two RO messages have been used (Binding Update & Binding Warning). 4 No need of secure distribution of mobile binding, transparency, runs on basic MIP. Agent Based RO 2001[6] 6 Mobility is completely transparent to the MN, scalable, simple, performance is better than [2]. Bidirectional RO in Mobile 4 CN and MN directly IP over wireless LAN 2002 communicate with each [7] without the intervention of the HA. Mainly client application is considered, Assuming that MNs are highly localized during session period. Single Point of Failure(CA s binding cache),accessing & updating of binding cache will be time taking. Agents need to be upgraded to support some extra functionalities like binding and tunneling cache. High RO using mobile router(mr) 2003[8] 4 Scalable, Transparent, Problem of one point failure is reduced as there is a number of copies kept in all the intermediate MR. Not cost effective as a number of MNs have to be installed, More memory is needed as two MRs may keep same informations, that will be redundant. III. PROPOSED ARCHITECTURE We propose one of the Home or Foreign agents in the network to be assigned as the Pilot Agent (PA). It will act on behalf of each individual CN to maintain binding caches, and tunneling the datagram to the MNs. In this way, the route optimization function becomes transparent to the end nodes, without requiring any modification in the CNs. In addition, a PA can manage binding caches for a number of end nodes in the same subnet. When multiple CNs in the same subnet communicates with a particular MN, a single Binding Update message is required to be sent to the PA, thereby reducing signaling traffic. The binding table consists of three fields, namely home address (HoA), care-of-address (CoA) and Time to Leave (TTL). We keep the binding table as binary search tree format to reduce the mapping time in the binding table. It will speed up the searching of CoA and reduce 208

the handoff latency. As a binding warning message comes from an external network, security needs to be imposed. Each MN has a unique id in the binding message which can be encoded using Huffman encoding technique to obtain a compressed data. It can then be used as a checksum and appended with the binding warning message which contains the CoA of MN. On the other hand, the HA keeps record of all its MN s id and the corresponding hash function. After receiving the binding warning message, the HA itself works out the hash function with MN s unique id and its HoA and produce the checksum. If it matches the one that is received, then the HA accepts the message otherwise rejects it. After the successful authentication of binding warning message, HA sends MN s CoA to PA. In this way we achieve highly secured RO with lower handoff latency. TABLE II. SOME IMPORTANT PARAMETERS TAKEN IN SIMULATION TTL threshold 7 Sec Binding cache lifetime 100 Sec Input buffer size 8mb Maximum buffer size 50 bytes Binding update lifetime 1800sec MN registration retry maximum 4 Registration request interval 4 Minimum retransmission timeout 10 Sec Minimum retransmission timeout 120 Sec CN data rate 1 Mbps MN,CN transmitter power 0.005 Watt MN,CN packet reception power threshold 0.95 dbm Figure 2. Proposed architecture. IV. RESULTS AND DISCUSSIONS We have used OPNET modeler simulator to evaluate the performance of the proposed RO scheme with the assumption that the CN s are also within the mobile IP domain. Some important parameters considered in simulation are shown in Table 2. The basic functional modules included in simulation are MN, HA, PA and two foreign agents FR0 and FR1 as shown in Fig. 2. Initially, the MN resides at the home network and receives packets from CN through the PA. When the MN starts moving towards FR0 in the foreign network, handoff occurs at 1.16 min. MN starts receiving packets at FR0 directly from PA through tunneling and bypassing HA. At 4min, the MN moves from FR0 towards FR1 via home network and handoff occurs at 5.34 and 7.96 min respectively. At FR1, the MN starts receiving packets from PA. Finally, the MN returns to its home network. During the entire movement, the MN always receives packets through the PA. Fig. 3 shows the scenario of packet sending and receiving by the CN and MN respectively. Packet receiving at the MN is more because of excess control messages. Fig. 4 shows the load analysis of different agents. There are Figure 3. Packet transfer between Corresponding node (sender) & Mobile node (receiver). Figure 4. Load analysis of different agents. 209

Average delay FR0 2 Average delay FR1 1 4 Average delay Home agent 3 5 Average delay Pilot agent Figure 7. Average delay of different agents. Figure 5. Average throughput analysis of different agents. sudden dips at about 1 min, 5 min and 8 min in MN and CN lines in the graph showing packet drops during handoff. It increases after handoff points 4 and 5 simultaneously as MN reaches to FR1 as shown in Fig.5. So, throughput of the agents increases depending on the presence of MN in the corresponding network as shown in Fig.6. Fig. 7 shows the propagation delay of different agents. Fig. 8 shows the average load analysis of CN and MN. Fig. 9 and Fig. 10 show the frame transmission delay of different agent and CN, MN respectively in MAC layer. Fig. 10 shows that MN changes its point of attachment from home network and enters FR0, that s why signal strength changes abruptly. It is to be noted that signal strength is always almost above the signal strength of CN. Fig. 11 shows the average propagation delay of CN and MN. Fig. 12 shows the average load of CN and MN. Fig. 14 shows the average throughput of CN and MN. Fig. 13 and 15 shows the traffic analysis of different agents. There is traffic burst for foreign routers and HA. This burst also absorbed by the PA. This proves the stabilization and optimization of the traffic in the PA. Figure 8. Average load analysis of CN and MN. Figure 9. Media access delay of different agents. Figure 6. Throughput analysis of CN and MN. Figure 10. Media access delay of CN and MN. 210

Figure 11. Average delay of CN and MN. V. CONCLUSION Our analysis of different existing solutions for route optimization and their comparative study reveals that none of the solutions can provide all the potential benefits of route optimization. Some of the solutions propose secure and safe packet transfer but can not overcome high handoff latency. Some of the solutions propose low handoff latency and low signaling overhead but without enough security. On the other hand, our novel scheme effectively solves the triangular routing problem without sacrificing performance, transparency and simplicity by unifying the flow of binding updates through the pilot agent. From the simulation and analysis, it is seen that our proposed PA based scheme stabilizes and optimizes mobile IP protocol with improved handoff latency. REFERENCES Figure 12. Average load of CN and MN. Figure 13. Traffic analysis of different agents. Figure 14. Average throughput of CN and MN. [1] Nikander, P.; Arkko, J.; Aura, T.; Montenegro, G., Mobile IP version 6 (MIPv6) route optimization security design Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th Volume 3, Issue, 6-9 Oct. 2003 Page(s): 2004-2008 Vol.3. [2] Charles E. Perkins and David B. Johnson, Route Optimization for Mobile IP, Springer journal cluster computing,1386-7857(print) 1573-7543(online), Issue Volume 1,Number 2, June, 1998. [3] Rajesh Pal and Piy P. Peng, Mobile IP Route Optimization in an iden System, MOTOROLA Technical Developments, March 1997. [4] Hao Chen, Ljiljana Trajković, simulation of route optimization in MobileIP, http://www.ensc.sfu.ca/~ljilja/papers/wln02_chen.pdf [5] Qiang Gao; Acampora, A., A virtual HA based route optimization for mobile IP, Wireless Communications and Networking Conference, 2000. WCNC. 2000 IEEE Volume 2, Issue, 2000 Page(s):592-596 vol. 2 [6] Vadali, R. Jianhui Li Yiqiong Wu Guohong Cao, Agentbased route optimization for mobile IP, Vehicular Technology Conference, 2001. VTC 2001 IEEE 54th Volume: 4, page(s): 2731-2735 vol.4 [7] Chun-hsin Wu, Ann-tzung Cheng, Shao-ting Lee, Jan-ming Ho, D. T. Lee, Bi-directional Route Optimization in Mobile IP over WirelessLAN, http://www.iis.sinica.edu.tw/~wuch/publications/2002-vtc-birorevised.pdf [8] Amit Mahajan, Ben Wild, Route Optimizations In Mobile IP, http://robotics.eecs.berkeley.edu/~wlr/228a/projects/mahajan.pd f [9] Sajal Saha et al. A comparative Study of Route Optimization Protocols in Mobile IP, p. 105-109, National Conference on Computing and Communication System (CoCoSys-2009), 2 nd - 4 th January 2009. [10] Abhishek Thakur et al. A Novel Route Optimization scheme in Mobile IP, BTech final dissertation, Narula Institute of Technology, West Bengal University of Technology, June 2009 Figure 15. Average traffic analysis of different agents. 211