A Comparative Analysis of Centralized and Distributed Mobility Management in IP-Based Mobile Networks

Size: px
Start display at page:

Download "A Comparative Analysis of Centralized and Distributed Mobility Management in IP-Based Mobile Networks"

Transcription

1 A Comparative Analysis of Centralized and Distributed Mobility Management in IP-Based Mobile Networks The Mobility Management (MM) is one of the crucial requirements for future mobile networks. The current MM schemes, such as Mobile IP and Proxy Mobile IP, are based on a centralized mobility anchor for mobility control and data delivery. However, it is reported that such a Centralized MM (CMM) approach tends to give a couple of drawbacks, which include non-optimal data route, injection of unwanted data traffics into core networks, and increased cost of network engineering. Recently, some proposals on Distributed MM (DMM) architectures have been discussed so as to overcome limitations of the centralized MM approach, which can be divided into Partially Distributed MM (P- DMM) and Fully Distributed MM (F-DMM). In this paper, we conduct a comparative study on the three MM approaches in terms of total delay and traffic overhead. From numerical results, we see that F-DMM and P-DMM can give better performance than CMM in terms of control/data traffic overhead. However, in terms of total delay, it seems that CMM is preferred to P-DMM and F-DMM in the mesh-like networks, whereas P-DMM and F-DMM is preferred to CMM in the tree-like networks. Keywords: Mobility management, Centralized, Distributed, Numerical analysis, Comparison I. INTRODUCTION As the Internet services become popular, the number of mobile Internet users has been rapidly increasing with wide popularity of smart phones. It is reported that the number of mobile Internet users will exceed the number of desktop users in near future [1]. The current Internet does not support the IP mobility because an IP address has overloaded semantics as both Identifier (ID) and Locator (LOC). In the network layer, an IP address is used as a LOC to find a destination host and to forward the data packets to the host. This IP address is also used as a host ID to identify host in the transport layer. When a mobile host moves from one subnet to another, it acquires a new IP address. In mobile networks, however, the location of mobile host may continue to change by movement. This means that the static allocation of LOC (i.e., an IP address) to a host may become problematic in mobile environments. In the meantime, the host ID needs to be kept persistently without change to maintain on-going sessions against movement of a host. Accordingly, ID and LOC need to be separated to support IP mobility [2]. To deal with this problem, the Internet Engineering Task Force (IETF) and the other segments of Internet community have recently been discussing the ID-LOC split concept using the separate namespaces for host ID and locator, which could be helpful for IP mobility support, multi-homing support, routing scalability, and security enhancement. Recently, Mobile IP (MIP) [3, 4] and Proxy Mobile IPv6 (PMIP) [5] have been developed for IP mobility support. These protocols also use the ID-LOC separation

2 concept for mobility support. That is, Home Address (HoA) is used as ID, whereas Care-of Address (CoA) is employed as LOC to represent the current location of mobile node. However, these protocols are based on a centralized Mobility Management (MM) approach, in which Home Agent (HA) or Local Mobility Anchor (LMA) is used as a centralized mobility anchor by which all control and data packets are processed. Such a centralized anchor allows a mobile host to be reachable, when it is away from its home domain, by ensuring the forwarding of data packets destined to or sent from the mobile host. However, the centralized MM scheme tends to be vulnerable to several problems. First, the centralized mobility anchor tends to induce unwanted control/data traffics into core networks, which may give a big burden to network operators due to large operational costs. In addition, a single point of failure of central node may induce severe degradation of overall system performance and also the increased cost of network engineering. The IETF has recently discussed the distributed mobility management to overcome limitations of this Centralized MM (CMM) approach [6], [7], which can be divided into the Partially Distributed MM (P-DMM) and the Fully Distributed MM (F-DMM). In P-DMM, only data plane is distributed, as shown in Host Identity protocol (HIP) [8], Locator Identifier Separation Protocol - Alternative Topology (LISP-ALT) [9-11], and Identifier Locator Network Protocol (ILNP) [12]. In F-DMM, both data plane and control plane are distributed, as shown in the examples of LISP-DMC [13], DMM-LIS [14], and LISP- DHT [15]. The CMM schemes may incur non-optimal data routes and performance degradations, whereas the DMM schemes can provide optimal data routes and high performance, since the route optimization will be intrinsically supported, and unnecessary traffics can be reduced when the two hosts communicate directly with each other, not relying on a centralized anchor. This will also be helpful to reduce the handover delay. In this paper, we will conduct a comparative study of the centralized and distributed MM architectures for IP mobility support. The rest of this paper is organized as follows. In Section II, we review the candidate schemes for centralized and distributed MM architectures. Section III analyzes the performance of the candidate schemes in terms of the total delay and the data/control traffic overhead. Section IV discusses the numerical results and qualitative comparisons for those candidate architectures. Section V concludes this paper. II. CANDIDATE ARCHITECTURES FOR MOBILITY MANAGEMENT The candidate mobility schemes, considered in this paper, are all based on the ID-LOC separation concept, and thus they need an ID-LOC mapping agent. However, in the viewpoint of how to provide mobility support, those schemes can be classified into CMM and DMM, and DMM is further divided into Partial DMM (P-DMM) and Full DMM (F-DMM). Before going into the detailed description, let us compare the candidate MM schemes in the architectural perspective, as described in Table 1. In the mobility perspective, MIP [3], [4] and PMIP [5] can be viewed as a centralized MM architecture, in which all control and data traffics are processed by a centralized agent, such as HA and LMA. Data packets are first delivered to the centralized node, and then the centralized node will forward the data packets to the corresponding host. In the ID-LOC mapping control, the centralized mapping agents, HA and LMA, are used for ID-LOC

3 mapping management. HIP [8], LISP-ALT [9]~[11] and ILNP [12] can be regarded as a partially distributed MM approach, in which the data plane is separated from the control plane. For distributed ID-LOC mapping management, some dedicated mapping agents are used: Rendezvous Server (RVS) in HIP, Map Server (MS) in LISP, and Dynamic Domain Name System (D-DNS) in ILNP. All mobility control traffics are processed by these mapping control entities. The mapping query operations will be performed with the mapping agents to find the location of mobile hosts, before transmission of data packets. It is noted that LISP will be MM protocol. In the meantime, LISP-DMC [13], DMM-LIS [14], and LISP-DHT [15] can be classified as the fully distributed MM approach, in which both control plane and data plane are separated. That is, a centralized mapping agent is not used. Instead, the mapping query operations will be performed to obtain the location of mobile hosts by applying a hash function or by multicasting of a map query message. Each of the candidate MM schemes for F-DMM has its distinctive features, but the overall MM mechanisms are based on the fully distributed approach for all of the associated schemes. The details of each candidate scheme will be discussed in the subsequent sections. In CMM, both data delivery and control function are performed based on a central server. Figure 1 depicts the basic operations for map update (or registration) and data delivery in CMM, in which it is assumed that the control operations for map update is performed by a network router, rather than by a host. In the figure there are the three hosts, denoted by two Mobile Nodes (MNs) and a Correspondent Node (CN). When each host is attached to its nearest Access Router (AR) in Step 1, its ID and LOC will be registered or updated to the central server by using a Map Update message (Step 2). Now, we assume that CN wants to send a data packet to MN1. The data packet of CN will first be delivered to AR3 (Step 3). AR3 forwards the data packet to the central server, since it has no information of LOC of MN1 (Step 4). On reception of this data packet, the central server will look up its ID-LOC mapping table which has been updated in the map update operation, so as to find the LOC of MN1. Now, the data packet is delivered to AR1 of MN1, further to MN1 (Step 5). Typical examples of CMM include the currently wellknown mobility protocols, such as MIP and PMIP. In MIP and PMIP, the central server of CMM corresponds to the Home Agent (HA) of MIP or the Local Mobility Anchor (LMA) of PMIP. In MIP, the Binding Update message corresponds to Map Update message. In PMIP, LMA is used as the control server (or mapping system), and Mobile Access Gateway (MAG) corresponds to an AR in CMM. In terms of control messages, the PBU message of PMIP can be regarded as Map Update message

4 of CMM. Based on Figure 1, we are going to describe the operations of MIP and PMIP. In MIP, when MN1 is attached to AR1, it performs the map update operation with HA. Then, CN tries to communicate with MN1. Now, CN transmits a data packet to MN1 via HA. In PMIP, when MN1 is attached to AR1 (MAG), AR1 will perform the map update operation with LMA. Now, CN can send data packets to MN1 via LMA. In P-DMM, both data delivery and control function are separated, and an optimal data path is obtained from the control server by using the 'map query' function, before data transmission. That is, the data delivery function is distributed by using an optimal route, whereas the control function can still be regarded as a centralized scheme. The name of P-DMM comes from this observation. Figure 2 illustrates the basic operations for map update, map query, and data delivery in P-DMM. In the figure, when each host is attached to its nearest AR (Step 1), its ID and LOC are registered with the control server by using a Map Update message (Step 2). When CN sends a data packet to MN1 (Step 3), AR3 of CN sends a Map Query message to the control server (step 4). On reception of this message, the central server will look up its ID-LOC mapping table so as to find the LOC of MN1. Finally, the server responds with a Map Query ACK message (containing the LOC of MN1) to AR3 of CN (Step 5). Now, the data packet can be delivered from CN to MN1 (Step 6). The recently proposed protocols for ID-LOC separation, such as HIP [8], LISP-ALT [9-11], and ILNP [12], can be classified as P-DMM. In HIP, the Rendezvous Server (RVS) is used as the control server, and HIP I1 and R1 messages correspond to the Map Query and Map Query ACK messages, respectively. In LISP-ALT, the Map Server (MS) is used as the control server, and LISP Tunnel Router corresponds to AR of P-DMM. The Map Register, Map Request, and Map Reply messages of LISP can be regarded as the Map Update, Map Query, and Map Query ACK messages of P-DMM. On the other hand, in case of ILNP, the Dynamic Domain Name System (D- DNS) is used as the control server which requires an extension of the legacy DNS. Now, we describe the HIP, LISP-ALT and ILNP schemes on the basis of Figure 2. In HIP, a locator and a host identifier are separated, in which a 128-bit Host Identity Tag (HIT) is used as a host ID, and an IP address of the host is used as a LOC. That is, HIT is the node identifier, and IP address is used for packet routing in the network. It is noted that HIP depends on a centralized RVS for LOC binding update in the global scale, which may create a lot of unnecessary signaling and control messages in mobile networks. This makes the HIP approach very inconvenient. To deal with this problem, the work in [16] proposed an enhanced scheme for HIP. The main idea is similar to HIP. However, it deploys a

5 Local RVS (LRVS) at the gateway of mobile network to provide a localized mobility control. In Figure2, when MN1 is connected to an access router 1 (AR1), it configures its LOC. Then, MN1 performs the map update operation with a Localized RVS (LRVS).The LRVS also performs the binding update operation with the global RVS. In data delivery, as indicated in Figure 2, CN sends a data packet to MN1. To do this, CN will initiate the HIP 4-way handshaking operations with MN1 for connection setup. The first I1 packet is sent to LRVS, and LRVS will forward the I1 packet to MN1. After receiving the I1 packet, MN1 responds with a R1 message to CN. The other two messages, I2 and R2, are exchanged between CN and MN for completion of security association. Now, CN can send the data packets directly to MN1. On the other hand, LISP has recently been made in the IETF, which splits the current IP address space into Endpoint IDentifier (EID) and Routing LOCator (RLOC). To support the LISP mobility, the LISP is extended to the LISP-MN architecture in [17], in which it is assumed that each mobile node implements the light-weight tunnel router functionality in mobile networks. In this architecture, a Map Server (MS) is used as an anchor point for MNs. That is, a MN will maintain the map cache and directly communicate with MS. It is noted that LISP-MN depends on a central MS for mapping control operations, which may incur significant overhead of control messages at MS. To deal with this problem, the work in [18] proposed an enhanced scheme of LISP-MN. The main idea is the same with LISP-MN, but it deploys a Local Map Server (LMS) at the gateway of mobile network so as to provide a localized mobility control. In Figure 2, when MN1 is attached to AR1, then it will perform the map update operation with LMS (control server). LMS will also perform the map update operation with the global MS. For data delivery, CN will first send a Map Query message to LMS. The LMS will respond with Map Query ACK message to CN. Now, CN can send the data packet to MN1. ILNP [12] is another scheme for ID-LOC separation, which is based on the address re-writing, in which a 128- bit IPv6 address will be divided into the upper 64 bits for LOC and the lower 64 bits for ID. For mobility support, a Dynamic DNS (D-DNS) server is used for mapping between ID and LOC of hosts. In Figure 2, when MN1 is connected to AR1, then it will perform the map update operation with D-DNS (control server). In the data delivery operation, CN will first send a Map Query message to D-DNS. D-DNS then responds with a Map Query ACK message to CN. Now, CN can send data packets to MN1 through an optimized route.

6 In F-DMM, the control server is not used, differently from P-DMM. Instead, both data delivery and control function are performed by ARs in the distributed way. Figure 3 illustrates the operations for map update, map query, and data delivery in F-DMM. As shown in the figure, each AR performs the mapping control function, instead of the control server. The ID-LOC mapping management is performed based on a Distributed Hash Table (DHT) or hash function. That is, the AR that is responsible for ID-LOC mapping management for a certain host will be determined by applying a DHT or hash function to the ID of the concerned host. In this way, the overhead of mapping management will be distributed onto a lot of ARs in the network, not relying on a single control server. From the example of Figure 3, we can see that the ID-LOC mapping information of MN1 is managed by AR4, MN2 is allocated to AR1, and CN is assigned to AR2. When a host is attached to AR (Step 1), the attached AR will determine which AR in the network shall be responsible for ID-LOC mapping management for the concerned host. Then, the attached AR sends a Map Update message to the determined AR (Step 2). When CN sends a data packet to MN1 (Step 3), AR3 of CN will look up its DHT table or perform its hash function so as to find which AR in the network has the ID-LOC mapping information of MN1. After that, AR3 of CN sends a Map Query message to AR4 that has the associated mapping information (Step 4). In turn, AR4 will respond with a Map Query ACK message to AR3 (Step 5). Now, the data packet can be delivered from CN to MN1 over an optimized path (Step 6). Several works on distributed ID-LOC management have so far been made. Most of them are based on the DHT, and each scheme uses a distinctive DHT or hash function. Typical examples of the F-DMM architecture include LISP- DMC [13], DMM-LIS [14], and LISP-DHT [15]. In LISP-DMC, AR/TR performs the processing of both data and control messages, but the binding update operation is not performed. That is, the central server, such as MS, is not used. Instead, the binding query operations are performed to get the LOC of the concerned host by multicast. The Map Request message of LISP-DMC corresponds to the Map Query message of F-DMM. In DMM-LIS, a network is divided into a lot of domains. Each domain contains a Mapping Server (MS) and several TRs. The MS will maintain the mapping information between global EID and Autonomous System Number (ASN) of each domain. Each MS also maintains the mapping between ASN and TR. Each TR constitutes onehop DHT ring. The Map Register and Map Request messages of DMM-LIS correspond to the Map Update and

7 Parameter S c S d B w L w β σ T q N Host N AR Description Size of control packets (bytes) Size of data packets (bytes) Wired link bandwidth (Mbps) Wired link delay (ms) Hop count between node AR and MA in the tree topology Hop count between node AR and AR in the tree topology Average queuing delay at each node (ms) Number of host per AR Number of ARs per domain Map Query messages of F-DMM. On the other hand, LISP-DHT is a mapping distribution system based on DHT, which is designed to take full advantage of the DHT architecture so as to build an efficient and secure ID-LOC mapping system. Based on Figure 3, we describe the operations of LISP-DMC schemes. In LISP-DMC, when MN1 is attached to AR1, then AR1 will store its ID-LOC in its binding cache. AR1 will not perform the map update operation. Now, CN sends a data packet to AR3. Then, AR3 will send a Map Query message to all ARs by multicast. Only the corresponding AR, where MN is staying, will respond with a Map Query ACK message to AR3. Now, AR3 will forward the data packets to MN1 through an optimized route. III. PERFORMANCE ANALYSIS In this section, we analyze the traffic overhead at the central node and the total delay for binding update, binding query and data delivery. For analysis, we consider the two network topologies: mesh and tree, as illustrated in Figure 4. In the mesh topology, all Access Routers (ARs) are directly connected to each other. Only a single AR will perform the functionality of Mobility Agent (MA) for CMM and P- DMM. In F-DMM, each AR will perform the functionality of MA. For CMM and P-DMM, the centralized MA is located at the root node in the tree topology. On the other hand, in F-DMM, MAs are located at leaf nodes in a balanced binary tree. We assume that the leaf nodes in the tree are connected each other. We also define the parameters used for analysis in Table 2. In the table, we denote T x y (S) by the transmission delay of a message with size S sent from x to y via 'wired ' link. Then, T x y (S) is expressed as T x y (S) [(S/B w ) L w T q ]. The transmission delay over the wireless link is neglected, since it is a common for all of the candidate schemes. In the analysis, the Total Delay (TD) consists of the Binding Update Delay (BUD), the Binding Query Delay (BQD) and Data Delivery Delay (DDD). That is, TD BUD BQD DDD. In CMM, when MN is attached to a new AR, the AR will perform the binding update operation with the control server (MA). The MA updates its database. If all ARs are inter-connected in the mesh topology, the distance between two ARs or the distance between AR and MA is only one-hop link. In the tree topology, the distance between AR and MA is more than one-hop link. Accordingly, the Binding Update Delay (BUD) of CMM for each topology can be represented as follows. CMM_BUD Mesh 2 T AR MA (S c ) CMM_BUD Tree 2 β T AR MA (S c ) The binding query delay of CMM is 0, because the binding query operation is not performed. Thus, the Binding Query Delay (BQD) of CMM can be represented

8 as follows. PDMM_BQD Mesh 2 T AR-MA (S c ) CMM BQDMesh CMM BQDTree 0 PDMM_BQD Tree 2 β T AR-MA (S c ) In data delivery, a data packet is first delivered to MA, and MA will forward the data packet to the concerned host. So, the data delivery delay of CMM is as follows. In data delivery, the data traffic will be delivered through an optimized route. So, the data delivery delay of P-DMM can be represented as follows. CMM_DDD Mesh 2 T AR-MA (S d ) CMM_DDD Tree 2 β T AR-MA (S d ) PDMM_DDD Mesh 2 T AR-AR (S d ) PDMM_DDD Tree 2 σ T AR-AR (S d ) So, we get the total delay of CMM as follows: So, we obtain the total delay of P-DMM as follows: PDMM_TD Mesh PDMM_BUD Mesh PDMM_BQD Mesh CMM_TD Mesh CMM_BUD Mesh CMM_BQD Mesh PDMM_DDD Mesh CMM_DDD Mesh PDMM_TD Tree PDMM_BUD Tree PDMM_BQD Tree CMM_TD Tree CMM_BUD Tree CMM_BQD Tree PDMM_DDD Tree CMM_DDD Tree In P-DMM, when MN is attached to a new AR, the AR will perform the binding update operation with MA. The MA updates its database. Accordingly, the Binding Update Delay (BUD) of P-DMM is represented as follows. PDMM_BUD Mesh 2 T AR-MA (S c ) In F-DMM, when MN is attached to a new AR, the AR will perform the binding update operation with the distributed MA. Each MA has a rich finger table on all MAs. The Map Update and Map Query messages are transmitted through an optimal path. The probability for F-DMM is ((N AR 2) N AR ). Accordingly, the Binding Update Delay (BUD) of F-DMM can be represented as follows. PDMM_BUD Tree 2 β T AR-MA (S c ) FDMM_BUD Mesh ((N AR 2)/N AR ) (2 T AR AR (S c )) The binding query delay of P-DMM from CN to MN can be calculated as follows. First, AR performs the map query operation with MA to find the LOC of MN. Then, MA will look for the LOC of MN in its database. After lookup, the MA responds to AR with a Map Query ACK message. Thus, the binding query delay of P-DMM can be represented as follows. FDMM_BUD Tree ((N AR 2)/N AR ) (2 σ T AR AR (S c )) In F-DMM, the binding query delay from CN to MN can be calculated as follows. First, AR performs the map query operation with a distributed AR/MA so as to find the LOC of MN. Then, MA will look up for the LOC of

9 MN in its database. After lookup, the designated AR/MA responds to AR/MA with a Map Query ACK message. We assume that mobile hosts are equally distributed in the network with the probability of (N AR 2)/N AR. Thus, the binding query delay of F-DMM can be represented as follows. CMM_TO Mesh CMM_TO Tree S c N Host N AR S d N Host N AR FDMM_BQD Mesh ((N AR 2)/N AR ) (2 T AR AR (S c )) FDMM_BQD Tree ((N AR -2)/N AR ) (2 σ T AR AR (S c )) In data delivery, the data traffic will be through an optimized route. So, the data delivery delay of F-DMM can be represented as follows. In P-DMM, we calculate the traffic overhead by the number of mapping control to be processed by MA. For mapping update, all hosts in the network will send the Map Update messages to MA. Thus, the Map Update message of S c N Host N AR shall be processed by MA. For data transmission, each host sends Map Query messages to MA. Thus, the Map Query messages of S c N Host N AR shall be processed by MA. Accordingly, we get the traffic overhead of P-DMM for each topology is as follows. FDMM_DDD Mesh 2 T AR AR (S d ) FDMM_DDD Tree 2 σ T AR AR (S d ) So, we obtain the total delay of F-DMM as follows: FDMM_TD Mesh FDMM_BUD Mesh FDMM_BQD Mesh FDMM_DDD Mesh FDMM_TD Tree FDMM_BUD Tree FDMM_BQD Tree FDMM_DDD Tree In CMM, we calculate the traffic overhead by the number of mapping control and data traffic to be processed at MA. It is assumed that mobile hosts are equally distributed in the network. For mapping update, all hosts in the network will send the Map Update messages to MA. Thus, the Map Update message of S c N Host N AR shall be processed by MA. For data transmission, the data packets S d N Host N AR shall also be processed at MA. Accordingly, we get the traffic overhead of CMM for each topology is as follows. PDMM_TO Mesh PDMM_TO Tree 2 (S c N Host N AR ) In F-DMM, we calculate the traffic overhead by the number of mapping control to be processed by AR/MA. It is assumed that mobile hosts are equally distributed in the network. For mapping update, all hosts in the network will send the Map Update messages to its own AR. Each AR/MA will process the binding update messages of S c (N Host /N AR ). After that, the AR/MA will perform a hash function to determine the designated AR/MA for the concerned host. If the hashed value of the host is the other AR/MA, then the AR will forward a Map Update message to the designated AR/MA of host. Thus, the Map Update message of S c (N Host N Host /N AR ) shall be processed. For data delivery, each host sends a Map Query messages to AR/MA. Each AR/MA will process the map query messages of S c (N Host /N AR ). After that, AR/MA will perform the hash function to determine the designated AR/MA of host. Then, AR will forward the Map Query message to the designated AR/MA of host. Thus, the Map Query messages of S c (N Host N Host /N AR ) shall be processed by MA/AR. The data packets of S d (N Host /N AR ) shall also be processed by AR/MA. Let us assume that the probability for F-DMM is (N AR 2)/N AR. Accordingly, we get the traffic overhead of F-DMM for each topology is as follows.

10 Parameters β L w Default 15 2 ms Minimum 1 1 Maximum T q 5 ms 1 28 N AR N Host σ N AR 1000 S d 1024 bytes S c 200 bytes B wl 11 Mbps B w 100 Mbps FDMM_TO Mesh FDMM_TO Tree =((N AR 2)/N AR ) {2 (S c (N Host N Host N AR )) 2 S c (N Host /N AR ) S d (N Host /N AR )} IV. RESULTS AND DISCUSSION Based on the analysis given so far, we now compare the performances of the proposed schemes. For numerical analysis, the default values of parameters are configured as given in Table 3 by referring to [18], [19]. Among these parameters, we note that β, T q, L w, N Host, and N AR may depend on the network conditions of mobile networks. Thus, we will compare the performance of candidate schemes by varying those parameter values. Figure 5 and Figure 6 compare the total delays for different average queuing delay at each node (T q ) and wired link delay (L w ). It is shown in the figures that the total delay linearly increases, as T q and L w get larger, for the three candidate schemes. We can see that P-DMM and F-DMM give slightly worse performance than CMM. This is because P-DMM and F-DMM perform the binding update and query operations. In the meantime, it is shown that CMM gives the best performance among the candidate schemes, since the binding query operation is not performed in CMM. Figure 7 compares the total delay for different hop count between AR and MA (β). In the figure, we can see

11 β that P-DMM and CMM give better performance than F- DMM, until the hop count reaches 5. However, if the hop count is greater than 5, the proposed F-DMM scheme provides smaller delays than CMM and P-DMM, and the performance gaps between the candidate schemes get larger, as β increases. This is because the F-DMM does not use the centralized MA for binding update and query operation, and the data delivery and query operations are performed in the distributed way. In the figure it is shown that P-DMM gives better performance than CMM. This is because P-DMM uses an optimal path for data delivery. Figure 8 and Figure 9 illustrate the impact of average queuing delay at each node (T q ) and wired link delay (L w ) on total delays. We can see that the total delay linearly increases, as T q and L w get larger, for the three candidate schemes. We can see that CMM gives worse performance than P-DMM and F-DMM. This is because CMM performs the binding update operations with a centralized MA, while there is no query operation, and the data packets are directly delivered to the centralized MA. On the other hand, it is shown in the figure that F-DMM gives the best performance among the candidate schemes. This is because the F-DMM does not use the centralized MA, and the data delivery and query operations are performed in the distributed way. Figure 10 shows the impact of the number of ARs in the domain on total delay. From the figure, the total delay slightly increases, as N AR gets larger for the P-DMM and F-DMM schemes. This implies that the distributed schemes are much preferred in mobile network with a maximum number of ARs in the domain. Overall, F- DMM and P-DMM provide much smaller total delays than CMM. This is because the data delivery operation is performed through an optimal path. On the other hand, F-

12 DMM gives the best performance among the candidate schemes. Figure 11 and Figure 12 compare the number of control/data messages to be processed by MA or AR/MA for different N Host and N AR. In Figure 11, we can see that the F-DMM and P-DMM schemes provide smaller traffic overhead than CMM. This is because all of the mapping control and data messages shall be processed by MA in CMM. On the other hand P-DMM gives worse performance than F-DMM. This is because that all of the mapping control messages are processed by MA. It is shown in the figure that F-DMM gives the best performance among the candidate schemes. This is because all the control traffics are distributed onto the AR/MAs in the network. The gaps of performance between centralized and distributed schemes get larger, as the number of hosts in the network increases. In Figure 12, we can see that the traffic overhead of F-DMM is not affected by the number of ARs in the domain. This is because all of the mapping control traffics are processed by the AR/MAs in the network. In addition to the numerical analysis and results until

13 now, we discuss the qualitative comparison of CMM and DMM. Table 4 summarizes the pros and cons of CMM and DMM by functionality. CMM schemes maintain the data path between a central network entity and the host. A single data path is maintained per host. The tunnel management is easy to deploy and broadly used. However, those tunnels tend to induce data overhead due to encapsulations and data processing. Tunnels header compression may also add further processing. This induced overhead may impact on core network links as well as access networks. In the centralized schemes, the central entities need to maintain per-user tunneling contexts, which may cause scalability issues. The aggregated traffic is huge, and the mobile data traffic explosion may occur. The data path centralization tends to induce the single point of failure and bottleneck issues. On the other hand, in DMM schemes, only the necessary and temporary tunnels are used between access nodes. If a mobile node does not move, its data traffic can be simply routed without additional overhead. The tunnel endpoints are located at the access level, thus the rest of the network is not affected. This can reduce the processing overhead for encapsulation and de-capsulation. However, each access node may need to be maintained in per-user context. An active host may have parallel data flows that are anchored at different access nodes. The user contexts and tunnel maintenance are distributed

14 Functionality CMM DMM Pros Single path per host No tunnel is required when the active is motionless Encapsulation Avoid unnecessary overhead Cons Permanent tunnel per active host Overhead in processing Tunnel management Pros Cons Easy to deploy Huge aggregated traffic in network Bottlenecks/single point of failure Temporary tunnel endpoints distributed at access node level Avoid single point of failures Multiple inter-access node tunnels per host situation Pros Easy to administrate Avoid scalability issues User context Cons Dimensioning of central mobility agents, scalability Contexts replication (e.g. for a host with flows on different anchors) among access nodes, which is helpful to avoid the single point of failure and bottleneck issues. When the flows of a moving host are anchored on different access nodes, they require several parallel updates. Delays and packet loss may be affected by the distance between access nodes. V. CONCLUSIONS In this paper, we have conducted a comparative study for the candidate MM architectures: Centralized MM (CMM), Partially Distributed MM (P-DMM), and Fully Distributed MM (F-DMM) for IP mobility support in future mobile networks. By performance analysis, the three candidate schemes are compared in terms of total delay and traffic overhead. From numerical results, we see that F-DMM and P-DMM can gives better performance than CMM in the mesh-like and tree-like networks in terms of traffic overhead. However, from the perspective of total delay, CMM may be preferred to P-DMM and F-DMM in the mesh topology, whereas P-DMM and F-DMM are preferred to CMM in the tree topology.

15 This research was partly supported by the Basic Science Research Program of NRF( ). [1] Morgan Stanley Report, Internet trends, [2] J. Saltzer, On the naming and binding of network destinations, IETF RFC 1498, Aug [3] C. Perkins, et al., IP Mobility Support for IPv4, IETF RFC 3344, Aug [4] D. Johnson, et al., Mobility Support in IPv6, IETF RFC 3775, Jun [5] S. Gundavelli, et al., Proxy Mobile IPv6, IETF RFC 5213, Aug [6] H. Chan, et al., Requirements for Distributed Mobility Management, IETF RFC 7333, Aug [7] D. Liu, et al., Distributed Mobility Management: Current Practices and Gap Analysis, IETF RFC 7429, Jan [8] P. Jokela, et al., Host Identity Protocol, IETF RFC 5201, Apr [9] D. Farinacci, et al., Locator/ID Separation Protocol, IETF RFC 6830, Jan [10] V. Fuller, et al., Locator/ID Separation Protocol - Alternative Topology (LISP+ALT), IETF RFC 6836, Jan [11] V. Fuller, et al., LISP Map Server Interface, IETF RFC 6833, Jan [12] RJ Atkinson, et al., Identifier-Locator Network Protocol (ILNP) Architecture Description, IETF RFC 6740, Nov [13] M. Gohar, et al., ''Network-based Distributed Mobility Control in Localized Mobile LISP Networks,'' IEEE Communications Letters, Vol. 16, Jan. 2012, pp [14] F. Qiu, et al., ''A Distributed Mobility Management Scheme in Networks with the Locator/Identifier Separation,'' International Journal of Communications Systems,'' Vol. 27, Oct. 2014, pp [15] L. Mathy, et al., ''LISP-DHT: Towards a DHT to Map Identiers onto Locators,'' Conference of ReArch' 08, Dec [16] S. Nova czki, et al., ''Micromobility Support in HIP,'' Conference of IEEE MELECON, May [17] D. Farinacci, et al., LISP Mobile Node, IETF Internet Draft, draft-meyer-lisp-mn-12, Jan [18] M. Gohar, et al., ''Distributed Mapping Management of Identifiers and Locators in LISP-based Mobile Networks,'' Wireless Personal Communications, Vol. 72. No. 1, Sep. 2013, pp [19] D. Xie, et al., "URCP: Universal Rate Control Protocol for Real-Time Communication Applications," Microsoft Research Technical Report, MSR-TR , Jun He received B.S. degree in Computer Science from University of Peshawar, Pakistan, and M.S. degree in Technology Management from Institute of Management Sciences, Pakistan, in 2006 and 2009, respectively. He also received Ph. D degree from the School of Computer Science and Engineering in the Kyungpook National University, Korea, in From September 2012 to September 2014, he worked as a Post-Doctoral researcher for Software Technology Research Center (STRC) in Kyungpook National University, Korea. He has been as an International Research Professor with the Department of Information and Communication Engineering in the Yeungnam University since September His current research interests include Network Layer Protocols, Wireless Communication, Mobile Multicasting, Wireless Sensors Networks, TRILL, and Internet Mobility. moneebgohar@yu.ac.kr

16 He received the B.S. and M.S. degrees in Management Science from KAIST in 1992 and 1994, respectively. He also received Ph.D. degree in Industrial Engineering from KAIST in From August 1998 to February 2004, he worked for Protocol Engineering Center in ETRI. He has been as a professor with the school of Computer Science and Engineering in the Kyungpook National University since March His current research interests include mobility management in the future Internet, IP mobility, multicasting, LED-based visible lights communication, IoT and SCTP. He has so far participated in the international standardization as an editor in ITU-T SG13 and ISO/IEC JTC1/SC6. sjkoh@knu.ac.kr

Enhanced Mobility Control in Mobile LISP Networks

Enhanced Mobility Control in Mobile LISP Networks Enhanced Mobility Control in Mobile LISP Networks Moneeb Gohar School of Computer Science and Engineering Kyungpook National University Daegu, South Korea moneebgohar@gmail.com Ji In Kim School of Computer

More information

Distributed Mobility Control for Mobile-Oriented Future Internet Environments

Distributed Mobility Control for Mobile-Oriented Future Internet Environments Distributed Mobility Control for Mobile-Oriented Future Internet Environments Ji-In Kim Kyungpook National University Daegu, KOREA jiin16@gmail.com Heeyoung JUNG ETRI Daejon, KOREA hyjung@etri.re.kr Seok

More information

Distributed Mobility Management in Proxy Mobile IPv6 using Hash Function

Distributed Mobility Management in Proxy Mobile IPv6 using Hash Function Distributed Mobility Management in Proxy Mobile IPv6 using Hash Function Ji In Kim School of Computer Science and Engineering Kyungpook National University Daegu, Korea jiin16@gmail.com Seok Joo Koh School

More information

A Network-Based Handover Scheme in HIP-Based Mobile Networks

A Network-Based Handover Scheme in HIP-Based Mobile Networks J Inf Process Syst, Vol.9, No.4, pp.651~659, December 2013 http://dx.doi.org/10.3745/jips.2013.9.4.651 pissn 1976-913X eissn 2092-805X A Network-Based Handover Scheme in HIP-Based Mobile Networks Moneeb

More information

Distributed Mobility Control Schemes in the HIP-based Mobile Networks

Distributed Mobility Control Schemes in the HIP-based Mobile Networks ICACT Transactions on Advanced Communications Technology (TACT) Vol. 2, Issue 4, July 2013 269 Distributed Mobility Control Schemes in the HIP-based Mobile Networks Sang-Il Choi, Seok-Joo Koh School of

More information

Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks

Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks Journal of Information Processing Systems, Vol.7, No.4, December 2011 http://dx.doi.org/10.3745/jips.2011.7.4.627 Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks Ji-In

More information

Q-PMIP: Query-based Proxy Mobile IPv6

Q-PMIP: Query-based Proxy Mobile IPv6 Q-PMIP: Query-based Proxy Mobile IPv6 Jae Wan Park*, Ji In Kim*, Seok Joo Koh* *School of Computer Science and Engineering, Kyungpook National University, Korea jwparkinf8@gmail.com, jiin16@gmail.com,

More information

Inter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks

Inter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks J Inf Process Syst, Vol.12, No.2, pp.196~213, June 2016 http://dx.doi.org/10.3745/jips.03.0037 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Inter-Domain Mobility Management Based on the Proxy Mobile

More information

DHT-based Identifier-Locator Mapping Management for Mobile Oriented Future Internet

DHT-based Identifier-Locator Mapping Management for Mobile Oriented Future Internet DHT-based Identifier-Locator Mapping Management for Mobile Oriented Future Internet Hyung-Woo Kang Kyungpook National University Daegu, Korea hwkang0621@gmail.com Ji-In Kim Kyungpook National University

More information

Distributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks

Distributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks J. lnf. Commun. Converg. Eng. 15(1): 37-42, Mar. 2017 Regular paper Distributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks Sang-Il Choi 1 and Seok-Joo Koh 2*, Member,

More information

Mobile Oriented Future Internet (MOFI): Architectural Design and Implementations

Mobile Oriented Future Internet (MOFI): Architectural Design and Implementations Mobile Oriented Future Internet (): Architectural Design and Implementations Ji-In Kim, Heeyoung Jung, and Seok-Joo Koh With the recent growth in smartphone services, the mobile environment has become

More information

Host Identifier and Local Locator for Mobile Oriented Future Internet: Implementation Perspective

Host Identifier and Local Locator for Mobile Oriented Future Internet: Implementation Perspective Host Identifier and Local Locator for Mobile Oriented Future Internet: Implementation Perspective Nak Jung Choi*, Ji In Kim**, Seok Joo Koh* * School of Computer Science and Engineering, Kyungpook National

More information

A New Inter-networking Architecture for Mobile Oriented Internet Environment

A New Inter-networking Architecture for Mobile Oriented Internet Environment Future Network & MobileSummit 2012 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2012 ISBN: 978-1-905824-29-8 A New Inter-networking

More information

ICTC 2013 http://ictc2013.org/main/ 1 / 1 2013-10-17 International Advisory Committee Steering Committee Organizing Committee Technical Program Committee Program at a Glance Industrial Session Special

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Mobile QoS provisioning by Flow Control Management in Proxy Mobile IPv6

Mobile QoS provisioning by Flow Control Management in Proxy Mobile IPv6 Mobile QoS provisioning by Flow Control Management in Proxy Mobile IPv6 Taihyong Yim, Tri M. Nguyen, Youngjun Kim and Jinwoo Park School of Electrical Engineering Korea University Seoul, Rep. of Korea

More information

ID/LOC Separation Network Architecture for Mobility Support in Future Internet

ID/LOC Separation Network Architecture for Mobility Support in Future Internet ID/LOC Separation Network Architecture for Mobility Support in Future Internet Nakjung Choi, Taewan You, Jungsoo Park, Taekyoung Kwon and Yanghee Choi School of Computer Science and Engineering, Seoul

More information

A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks

A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks ICACT Transactions on on the Advanced Communications Technology (TACT) Vol. Vol. 2, 2, Issue Issue 3, 3, May May 2013 2013 233 A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks

More information

Seamless Multicast Handover in PMIPv6-based Wireless Networks

Seamless Multicast Handover in PMIPv6-based Wireless Networks Seamless Multicast Handover in PMIPv6-based Wireless Networks Moneeb Gohar*, Seok Joo Koh*, Tae-Won Um**, Hyun-Woo Lee** *School of Computer Science and Engineering, Kyungpook National University **Electronic

More information

Analysis of Proxy Mobile IPv6: A Network-based Mobility Solution

Analysis of Proxy Mobile IPv6: A Network-based Mobility Solution Analysis of Proxy Mobile IPv6: A Network-based Mobility Solution Md. Shohrab Hossain and Mohammed Atiquzzaman School of Computer Science, University of Oklahoma, Norman, OK 7319 Email: {shohrab, atiq}@ou.edu

More information

Network Management. International Journal of

Network Management. International Journal of Volume 27 Number 2 March April 2017 ISSN 1055 7148 International Journal of Network Management Editor-in-Chief: James Won-Ki Hong SPECIAL ISSUE: Softwarization of networks, clouds, and internet of things

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation

More information

An Identifier / Locator Split Architecture for Multi-homing and Mobility Support

An Identifier / Locator Split Architecture for Multi-homing and Mobility Support IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 13 An Identifier / Locator Split Architecture for Multi-homing and Mobility Support Joonsuk KANG and Koji OKAMURA,

More information

Subnet Multicast for Delivery of One-to-Many Multicast Applications

Subnet Multicast for Delivery of One-to-Many Multicast Applications Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting

More information

Research Article An ID/Locator Separation Based Group Mobility Management in Wireless Body Area Network

Research Article An ID/Locator Separation Based Group Mobility Management in Wireless Body Area Network Journal of Sensors Volume 215, Article ID 53725, 12 pages http://dx.doi.org/1.1155/215/53725 Research Article An ID/Locator Separation Based Group Mobility Management in Wireless Body Area Network Moneeb

More information

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson HIP Host Identity Protocol October 2007 Patrik Salmela Ericsson Agenda What is the Host Identity Protocol (HIP) What does HIP try to solve HIP basics Architecture The HIP base exchange HIP basic features

More information

Seamless Multicast Handover in Fmipv6-Based Networks

Seamless Multicast Handover in Fmipv6-Based Networks Seamless Multicast Handover in Fmipv6-Based Networks Moneeb Gohar, Seok Joo Koh, Tae-Won Um, and Hyun-Woo Lee Abstract This paper proposes a fast tree join scheme to provide seamless multicast handover

More information

A Location Management-aware Mapping System for ID/Locator Separation to Support Mobility

A Location Management-aware Mapping System for ID/Locator Separation to Support Mobility A Location Management-aware Mapping System for ID/Locator Separation to Support Mobility Mukankunga Bisamaza Angel and Choong Seon Hong Departement of Computer Engineering Kyung Hee University 1 Seocheon,

More information

Flow Mobility Management in PMIPv6-based DMM (Distributed Mobility Management) Networks

Flow Mobility Management in PMIPv6-based DMM (Distributed Mobility Management) Networks Flow Mobility Management in PMIPv6-based DMM (Distributed Mobility Management) Networks Kyoungjae Sun and Younghan Kim Soongsil University, Seoul, Republic of Korea {gomjae, younghak@ssu.ac.kr} Abstract

More information

Seamless Handover Scheme for Proxy Mobile IPv6

Seamless Handover Scheme for Proxy Mobile IPv6 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication Seamless Handover Scheme for Proxy Mobile IPv6 Ju-Eun Kang 1, Dong-Won Kum 2, Yang Li 2, and You-Ze Cho 2 1 LGDACOM

More information

An Enhancement of Mobile IP by Home Agent Handover

An Enhancement of Mobile IP by Home Agent Handover An Enhancement of Mobile IP by Home Agent Handover Li-Sheng Yu and Chun-Chuan Yang Multimedia and Communications Laboratory Department of Computer Science and Information Engineering National Chi Nan University,

More information

An Efficient Correspondent Registration to Reduce Signaling Overheads for Proxy Mobile IPv6

An Efficient Correspondent Registration to Reduce Signaling Overheads for Proxy Mobile IPv6 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 187 An Efficient Correspondent Registration to Reduce Signaling Overheads for Proxy Mobile IPv6 Pyung-Soo

More information

Proxy Mobile IPv6 (PMIPv6)

Proxy Mobile IPv6 (PMIPv6) Sungkyunkwan University Proxy Mobile IPv6 (PMIPv6) - Grand ICT 연구센터지원사업라이프컴패니온쉽경험을위한지능형인터랙션융합연구 - 무선포함접속방식에독립적인차세대네트워킹기술개발 SDN/NFV 기반의기업유무선통합네트워크를위한액세스기술독립적오픈소스컨트롤러개발 - 자율제어네트워킹및자율관리핵심기술개발생체모방자율제어시스템및자율관리

More information

NEMO-based Mobility Management in LISP Network

NEMO-based Mobility Management in LISP Network 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP) NEMO-based Mobility Management in LISP Network Yizhen Wu, Ke Chen, Kaiping Xue, Dan Ni The Department of EEIS,

More information

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs. T-0.50 Computer Networks II Mobility Issues 6.0.008 Overview Mobile IP NEMO Transport layer solutions i SIP mobility Contents Prof. Sasu Tarkoma Mobility What happens when network endpoints start to move?

More information

Location Management Agent for SCTP Handover in Mobile Network

Location Management Agent for SCTP Handover in Mobile Network Location Management Agent for SCTP Handover in Mobile Network Yong-Jin Lee Department of Technology Education, Korea National University of Education 250 Taesungtapyon-ro, Heungduk-ku, Cheongju, South

More information

Distributed mobility management

Distributed mobility management Distributed mobility management for Future Internet H. Anthony Chan Huawei Technologies h.a.chan@ieee.org Internet Core network: converge (cellular and Internet no more IPv4 blocks available) Access networks:

More information

Locator ID Separation Protocol (LISP) Overview

Locator ID Separation Protocol (LISP) Overview Locator ID Separation Protocol (LISP) is a network architecture and protocol that implements the use of two namespaces instead of a single IP address: Endpoint identifiers (EIDs) assigned to end hosts.

More information

PMIPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS. Proxy Mobile IPv6. Peter R. Egli INDIGOO.COM. indigoo.

PMIPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS. Proxy Mobile IPv6. Peter R. Egli INDIGOO.COM. indigoo. PMIPv6 PMIPv6 Proxy Mobile IPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS Peter R. Egli INDIGOO.COM 1/25 Contents 1. Why PMIPv6 when we have MIP? 2. PMIPv6 terminology

More information

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol

IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol Ryuji Wakikawa Carl Williams Keisuke Uehara Jun Murai Keio University. Graduate School of Media and Governance KDDI

More information

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Sangheon Pack, Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul, Korea

More information

School of Computer Science

School of Computer Science Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman TR-OU-TNRL-10-105 September 2010 Telecommunication & Network Research Lab School of Computer Science THE UNIVERSITY OF

More information

Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track ISSN: 2070-1721 F. Xia B. Sarikaya Huawei USA J. Korhonen, Ed. Nokia Siemens Networks S. Gundavelli Cisco D.

More information

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS Sandro Grech Nokia Networks (Networks Systems Research) Supervisor: Prof. Raimo Kantola 1 SANDRO GRECH - OPTIMIZING MOBILITY MANAGEMENT IN

More information

IP Mobility Support for QoS over Heterogeneous Networks

IP Mobility Support for QoS over Heterogeneous Networks IP Mobility Support for QoS over Heterogeneous Networks Eun Kyoung PAIK Feb. 7-9, 2007 Future Technology Lab. KT Contents Introduction Network Topology Perspective Multihoming Network Layer Perspective

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical

More information

LISP Locator/ID Separation Protocol

LISP Locator/ID Separation Protocol LISP Locator/ID Separation Protocol Hernán Contreras G. Consulting Systems Engineer hcontrer@cisco.com LISP Next Gen Routing Architecture Locator-ID Separation Protocol (LISP) Elevator Pitch LISP is a

More information

ILNP: a whirlwind tour

ILNP: a whirlwind tour ILNP: a whirlwind tour Saleem Bhatti, University of St Andrews, UK 2010-10-03 NANOG50. Copyright 2010 Saleem Bhatti. 1 Outline 1. What? Basic information about ILNP. 2. Why? The rationale for ILNP. 3.

More information

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology 2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6

More information

Evaluating Secure Identification in the Mobile Oriented Future Internet (MOFI) Architecture

Evaluating Secure Identification in the Mobile Oriented Future Internet (MOFI) Architecture Future Network and MobileSummit 2012 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2012 ISBN: 978-1-905824-29-8 Poster Paper

More information

Proxy Mobile IPv6 (PMIPv6)

Proxy Mobile IPv6 (PMIPv6) Proxy Mobile IPv6 (PMIPv6) Youn-Hee Han yhhan@kut.ac.kr Korea University of Technology and Education Internet Computing Laboratory http://icl.kut.ac.kr Outline Background PMIPv6 (Proxy Mobile IPv6) Overview

More information

Cost and Efficiency Analysis of Hierarchical SIGMA

Cost and Efficiency Analysis of Hierarchical SIGMA Cost and Efficiency Analysis of Hierarchical SIGMA Md. Shohrab Hossain, Mohammed Atiquzzaman School of Computer Science, The University of Oklahoma Norman, OK 7319 Email: {shohrab, atiq}@ou.edu William

More information

Distributed or Centralized Mobility?

Distributed or Centralized Mobility? Distributed or Centralized Mobility? Philippe Bertin, Servane Bonjour Orange Labs Cesson-Sévigné, France {firstname.name}@orange-ftgroup.com Jean-Marie Bonnin TELECOM Bretagne Cesson-Sévigné, France jm.bonnin@telecom-bretagne.eu

More information

New Mobility Management Mechanism for Delivering Packets with Non-Encapsulation

New Mobility Management Mechanism for Delivering Packets with Non-Encapsulation New Mobility Management Mechanism for Delivering Packets with Non-Encapsulation Myoung Ju Yu * and Seong Gon Choi * *College of Electrical & Computer Engineering, Chungbuk National University, 410 Seongbong-ro,

More information

Chapter 7 Mobility Management at Transport Layer

Chapter 7 Mobility Management at Transport Layer Chapter 7 Mobility Management at Transport Layer This chapter is dedicated to transport-layer mobility support schemes, which follow an end-to-end philosophy, putting the notion of mobility at the end

More information

A Scheme of Primary Path Switching for Mobile Terminals using SCTP Handover

A Scheme of Primary Path Switching for Mobile Terminals using SCTP Handover Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, 2007 218 A Scheme of Primary Path Switching for Mobile Terminals using

More information

Dynamic Traffic Load Balancing Mechanism for SHAKE Architecture

Dynamic Traffic Load Balancing Mechanism for SHAKE Architecture Dynamic Traffic Load Balancing Mechanism for SHAKE Architecture Hiroshi Esaki, Hiroki Kan Graduate School of Information Science and Technology, The University of Tokyo, Japan hiroshi@wide.ad.jp kohki@hongo.wide.ad.jp

More information

Internet Engineering Task Force (IETF) Request for Comments: 6612 Category: Informational May 2012 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6612 Category: Informational May 2012 ISSN: Internet Engineering Task Force (IETF) G. Giaretta, Ed. Request for Comments: 6612 Qualcomm Category: Informational May 2012 ISSN: 2070-1721 Interactions between Proxy Mobile IPv6 (PMIPv6) and Mobile IPv6

More information

msctp for Vertical Handover Between Heterogeneous Networks

msctp for Vertical Handover Between Heterogeneous Networks msctp for Vertical Handover Between Heterogeneous Networks Seok Joo Koh and Sang Wook Kim Department of Computer Science, Kyungpook National University, Daegoo, Korea {sjkoh, swkim}@cs.knu.ac.kr Abstract.

More information

Network Working Group. Intended status: Informational. H. Deng. China Mobile. July 4, 2014

Network Working Group. Intended status: Informational. H. Deng. China Mobile. July 4, 2014 Network Working Group Internet-Draft Intended status: Informational Expires: January 5, 2015 D. Liu China Mobile H. Chan Huawei Technologies H. Deng China Mobile July 4, 2014 Distributed mobility management

More information

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6

A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 1 Hui Deng 2Xiaolong Huang 3Kai Zhang 3 Zhisheng Niu 1Masahiro Ojima 1R&D Center Hitachi (China) Ltd. Beijing 100004, China 2Dept.

More information

A Survey on Signaling Load in Mobility Management

A Survey on Signaling Load in Mobility Management ISSN: 2231-4946 Volume IV, Special Issue, December 2014 International Journal of Computer Applications in Engineering Sciences Special Issue on Advances in Computer and Communications www.caesjournals.org

More information

Internet Engineering Task Force (IETF) Request for Comments: 6279 Category: Informational ISSN: Q. Wu Huawei June 2011

Internet Engineering Task Force (IETF) Request for Comments: 6279 Category: Informational ISSN: Q. Wu Huawei June 2011 Internet Engineering Task Force (IETF) Request for Comments: 6279 Category: Informational ISSN: 2070-1721 M. Liebsch, Ed. NEC S. Jeong ETRI Q. Wu Huawei June 2011 Abstract Proxy Mobile IPv6 (PMIPv6) Localized

More information

A Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks

A Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks , pp.147-151 http://dx.doi.org/10.14257/astl.2015.117.35 A Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks Ronnie Caytiles, Seungyong Shin, Minji Yang and Byungjoo

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

IP without IP addresses

IP without IP addresses IP without IP addresses h"p://ilnp.cs.st-andrews.ac.uk/ Saleem Bha) School of Computer Science University of St Andrews Copyright, Saleem N. Bha?, 19 Nov 2013 1 Thanks Dr Ran Atkinson PhD students at St

More information

LISP Router IPv6 Configuration Commands

LISP Router IPv6 Configuration Commands ipv6 alt-vrf, page 2 ipv6 etr, page 4 ipv6 etr accept-map-request-mapping, page 6 ipv6 etr map-cache-ttl, page 8 ipv6 etr map-server, page 10 ipv6 itr, page 13 ipv6 itr map-resolver, page 15 ipv6 map-cache-limit,

More information

Improvements to LISP Mobile Node

Improvements to LISP Mobile Node Improvements to LISP Mobile Node Michael Menth, Dominik Klein, and Matthias Hartmann University of Würzburg, Institute of Computer Science, Germany Abstract The Locator/Identifier Separation Protocol (LISP)

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

Cost Analysis of Mobility Management Entities for SIGMA

Cost Analysis of Mobility Management Entities for SIGMA 010 International Conference on High Performance Switching and Routing Cost Analysis of Mobility Management Entities for SIGMA Md. Shohrab Hossain Mohammed Atiquzzaman University of Oklahoma, Norman, OK

More information

New Mobility Management Mechanism for Delivering Packets with Non-Encapsulation

New Mobility Management Mechanism for Delivering Packets with Non-Encapsulation New Mobility Management Mechanism for Delivering Packets with Non-Encapsulation Myoung Ju Yu * and Seong Gon Choi * *College of Electrical & Computer Engineering, Chungbuk National University, 410 Seongbong-ro,

More information

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Hyemee Park, Tae-Jin Lee, and Hyunseung Choo School of Information and Communication Engineering Sungkyunkwan

More information

nsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network

nsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network nsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network Peyman Behbahani City University, London, UK p.behbahani@city.ac.uk Veselin Rakocevic City University, London,

More information

Intended status: Informational. Intel Corporation P. Seite. France Telecom - Orange. February 14, 2013

Intended status: Informational. Intel Corporation P. Seite. France Telecom - Orange. February 14, 2013 DMM Working Group Internet-Draft Intended status: Informational Expires: August 18, 2013 H. Ali-Ahmad (Ed.) France Telecom - Orange D. Moses H. Moustafa Intel Corporation P. Seite France Telecom - Orange

More information

Handover Management for Mobile Nodes in IPv6 Networks

Handover Management for Mobile Nodes in IPv6 Networks TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer Diwakar Yagyasen.1 Effect of Mobility on Protocol Stack Application: new applications and adaptations Transport:

More information

LISP: What and Why. RIPE Berlin May, Vince Fuller (for Dino, Dave, Darrel, et al)

LISP: What and Why. RIPE Berlin May, Vince Fuller (for Dino, Dave, Darrel, et al) LISP: What and Why RIPE Berlin May, 2008 Vince Fuller (for Dino, Dave, Darrel, et al) http://www.vaf.net/prezos/lisp-ripe-long.pdf Agenda What is the problem? What is LISP? Why Locator/ID Separation? Data

More information

ICN IDENTIFIER / LOCATOR. Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016)

ICN IDENTIFIER / LOCATOR. Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016) ICN IDENTIFIER / LOCATOR Marc Mosko Palo Alto Research Center ICNRG Interim Meeting (Berlin, 2016) 1 A brief review of ID/Locators in IETF It s long, and we ll skim over it Then we discuss the CCNx & NDN

More information

Route Optimization for Proxy Mobile IPv6 in IMS Network

Route Optimization for Proxy Mobile IPv6 in IMS Network Route Optimization for Proxy Mobile IPv6 in IMS Network Tsunehiko Chiba, Hidetoshi Yokota KDDI R&D Laboratories, Inc. Saitama, Japan Ashutosh Dutta, Dana Chee Telcordia Technologies, Inc. New Jersey, USA

More information

Optimal method to Reducing Link and Signaling Costs in Mobile IP

Optimal method to Reducing Link and Signaling Costs in Mobile IP Optimal method to Reducing Link and Signaling Costs in Mobile IP Sridevi Assistant Professor, Department of Computer Science,Karnatak University,Dharwad Abstract The objective of this research paper is

More information

LISP CHARTER SAM HARTMAN PAINLESS SECURITY, LLC IETF 74 MARCH 25, 2008

LISP CHARTER SAM HARTMAN PAINLESS SECURITY, LLC IETF 74 MARCH 25, 2008 LISP CHARTER SAM HARTMAN PAINLESS SECURITY, LLC IETF 74 MARCH 25, 2008 1 CONCERNS TO ADDRESS Accurately describe what LISP separates Describe properties of EIDs Discuss overlapping EIDs and RLOCs CHARTER

More information

O-PMIPv6: Optimized Proxy Mobile IPv6. Ahmad Rasem, Bachelor of Communications Engineering

O-PMIPv6: Optimized Proxy Mobile IPv6. Ahmad Rasem, Bachelor of Communications Engineering O-PMIPv6: Optimized Proxy Mobile IPv6 by Ahmad Rasem, Bachelor of Communications Engineering A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements

More information

A Survey of IP micro-mobility protocols

A Survey of IP micro-mobility protocols A Survey of IP micro-mobility protocols Pierre Reinbold Olivier Bonaventure Infonet group, University of Namur, Belgium. http://www.infonet.fundp.ac.be. E-mail: preinbold,obonaventure@info.fundp.ac.be

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

Mobile IPv6 Overview

Mobile IPv6 Overview Sungkyunkwan University Prepared by H. Choo Copyright 2000-2018 Networking Laboratory Lecture Outline Network Layer Mobile IPv6 Proxy Mobile IPv6 Networking Laboratory 2/87 Sungkyunkwan University Network

More information

fp2p-hn: A P2P-based Route Optimization Solution for Mobile IP and NEMO clients.

fp2p-hn: A P2P-based Route Optimization Solution for Mobile IP and NEMO clients. 1 fp2p-hn: A P2P-based Route Optimization Solution for Mobile IP and NEMO clients. Albert Cabellos-Aparicio 1, Rubén Cuevas 2, Jordi Domingo-Pascual 1, Ángel Cuevas 2, Carmen Guerrero 2 Abstract Wireless

More information

Keywords PMIPv6, Local Mobility Anchor, Mobile Access Gateway, AAA.

Keywords PMIPv6, Local Mobility Anchor, Mobile Access Gateway, AAA. Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Optimized Handover

More information

Integration of LISP and LISP-MN in INET

Integration of LISP and LISP-MN in INET Institute of Computer Science Chair of Communication Networks Prof. Dr.-Ing. P. Tran-Gia, Matthias Hartmann (University of Wuerzburg, Germany) Michael Höfling, Michael Menth (University of Tuebingen, Germany)

More information

MOBILITY AGENTS: AVOIDING THE SIGNALING OF ROUTE OPTIMIZATION ON LARGE SERVERS

MOBILITY AGENTS: AVOIDING THE SIGNALING OF ROUTE OPTIMIZATION ON LARGE SERVERS MOBILITY AGENTS: AVOIDING THE SIGNALING OF ROUTE OPTIMIZATION ON LARGE SERVERS Albert Cabellos-Aparicio and Jordi Domingo-Pascual * Technical University of Catalonia, Department of Computer Architecture

More information

Intended status: Informational. C. White Logical Elegance, LLC. October 24, 2011

Intended status: Informational. C. White Logical Elegance, LLC. October 24, 2011 Network Working Group Internet-Draft Intended status: Informational Expires: April 26, 2012 D. Farinacci D. Lewis D. Meyer cisco Systems C. White Logical Elegance, LLC. October 24, 2011 LISP Mobile Node

More information

Mobile Communications Chapter 8: Network Protocols/Mobile IP

Mobile Communications Chapter 8: Network Protocols/Mobile IP Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama

More information

Contact: Contact: Seok J. Koh. Tel: KNU. Fax: KOREA.

Contact: Contact: Seok J. Koh. Tel: KNU. Fax: KOREA. Question(s): 1 Meeting, date: Geneva, April 2008 Study Group: 17 Working Party: 1 Intended type of document (R-C-TD-LS): C Source: ETRI Title: Revised Text of X.mmc-2 ISO/IEC WD 24793-2 (MMC-2) Contact:

More information

Context Reflector for Proxy Mobile IPv6

Context Reflector for Proxy Mobile IPv6 Context Reflector for Proxy Mobile IPv6 Sawako Kiriyama 1, Ryuji Wakikawa 2, Jinwei Xia 3 and Fumio Teraoka 1 1 Keio University Yokohama, Kanagawa, Japan {kiri@tera.ics.keio.ac.jp and tera@ics.keio.ac.jp}

More information

Vers un renforcement de l architecture Internet : le protocole LISP ( Locator/ID Separation Protocol )

Vers un renforcement de l architecture Internet : le protocole LISP ( Locator/ID Separation Protocol ) Vers un renforcement de l architecture Internet : le protocole LISP ( Locator/ID Separation Protocol ) JCSA 2013" " " Luigi Iannone! 1 Institut Mines-Télécom Road Map" - Why LISP???! - LISP Data Plane!

More information

Technischer Bericht. Evaluating the Benefits of Introducing PMIPv6 for Localized Mobility Management

Technischer Bericht. Evaluating the Benefits of Introducing PMIPv6 for Localized Mobility Management Georg-August-Universität Göttingen Institut für Informatik ISSN Nummer 1611-1044 IFI-TB-2007-02 Technischer Bericht Evaluating the Benefits of Introducing PMIPv6 for Localized Mobility Management Jun Lei

More information

Internet Engineering Task Force (IETF) Request for Comments: L. Zhang UCLA. July 2011

Internet Engineering Task Force (IETF) Request for Comments: L. Zhang UCLA. July 2011 Internet Engineering Task Force (IETF) Request for Comments: 6301 Category: Informational ISSN: 2070-1721 Z. Zhu UCLA R. Wakikawa Toyota ITC L. Zhang UCLA July 2011 A Survey of Mobility Support in the

More information

Proxy Mobile IPv6 extensions for Distributed Mobility Management

Proxy Mobile IPv6 extensions for Distributed Mobility Management Proxy Mobile IPv6 extensions for Distributed Mobility Management draft-bernardos-dmm-pmipv6-dlif-00 Carlos J. Bernardos Universidad Carlos III de Madrid Antonio de la Oliva Universidad Carlos III de Madrid

More information

Proposed Node and Network Models for M2M Internet

Proposed Node and Network Models for M2M Internet 2009-2012 NTT CORPORATION. All Rights Reserved. Proposed Node and Network Models for M2M Internet Yuminobu Igarashi NTT Information Sharing Platform Laboratories 2012 NTT Information Sharing Platform Laboratories

More information

Fast Device Discovery for Remote Device Management in Lighting Control Networks

Fast Device Discovery for Remote Device Management in Lighting Control Networks J Inf Process Syst, Vol.10, No.4, pp.00~00, December 2014 http://dx.doi.org/10.3745/jips.03.0011 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Fast Device Discovery for Remote Device Management in

More information