An Adaptive Routing Scheme for Wireless Mobile Computing
|
|
- Clare Cox
- 5 years ago
- Views:
Transcription
1 An Adaptive Routing Scheme for Wireless Mobile Computing Ruixi Yuan C&C Software Technology Center, NEC Systems Laboratory, Inc Gateway Drive, Irving, TX Abstract This paper presents a novel routing scheme for wireless mobile networking which is adaptive to the mobile traffic patterns. We propose a concept called friend network to accommodate the need for effective routing information update. Our routing scheme has the advantages of minimizing network bandwidth consumptions, providing optimal routing, and addressing network security concerns at the same time. 1.0 Introduction The advances in computing technology have produced miniaturized computers such as notebook and palmtop computers. Meanwhile, the rapid expansion of wireless communication technologies such as cellular network, wireless LAN are making it possible to support universal network connectivity for mobile computers. Such universal network connectivity offers great promises for general purpose mobile computing. However, network connection between mobile computers presents an entirely different challenge compared to that of the traditional fixed static network. One of the most important problems concerning mobile networking is the addressing and routing scheme that allows mobile hosts to move seamlessly from one location to another. Several proposals have appeared during the past two years [1-5]. For example, the Columbia IPIP protocol [1-2] creates a separate mobile subnet in a campus and uses IP tunnelling for traffic routing. The Sony protocol [3] modifies the TCP/IP stack towards VIP (virtual IP). Recently, Matsushita has proposed using a packet forwarding server (PFS) [6] to handle the mobile traffic. At the same time, location information management has also been an important problem concerning cellular networks and the newly developing PCS systems [7-9]. Another concern caused by the network mobility is security. Due to the constant location change of the mobile station, authentication is needed between the base and mobile stations to prevent unauthorized use of network resources. Furthermore, the continuous location updates of the mobile host also carry significant information of the mobile station, such information can be 1
2 regarded as private and its propagation should be restricted. This problem has been largely ignored in the present mobile IP proposals. In this paper, we propose a novel routing information update and traffic routing scheme based on the analysis of the mobile traffic pattern as well as concern on the network security. We begin in section 2 with the mobile network configuration and design considerations. In section 3, we present a set of functional requirements on the infrastructure that supports mobile networking. In section 4, we introduce the concept of friend network and describe our traffic pattern based adaptive routing scheme. Performance analysis and other related issues are discussed in section 5. Section 6 concludes the paper. 2.0 Network Configuration and Design Considerations Figure 1 depicts a sample configuration of a network that supports mobility. Here mobile hosts mh1, mh2 served by base station BS1 coexist with a static host sh1 and another mobile host mh3 served by base station BS2 on the same subnet. This subnet connects with another subnet via router G where mobile host mh4, served by base station BS3 is located. mh2 sh1 BS1 BS2 mh1 mh3 migration G BS3 mh4 Fig. 1: A sample network configuration. We have deliberately allowed the arbitrary mixing between mobile host and static host in Fig. 1, because such configuration allows more flexibility in a practical network. Some proposals such as the Columbia Mobile IP, allocate an exclusive subnet for mobile hosts. 2
3 In a traditional static network, the host address (e.g. IP address) uniquely defines its identity as well as its location. In a mobile network, however, such possibility no longer holds. Therefore, at least two separate parameters are needed to communicate with a mobile host. One serves as the identity of the mobile host, another conveys its location information. How to distribute the location information, to keep it consistent and up-to-date, and to use the information in delivering packets to the mobile hosts are the focusing points of mobile networking. We maintain that the existing static hosts and regular network routers should be able to communicate with the mobile hosts without any changes. Therefore, the burden to support mobile internetworking should be bore entirely by the mobile hosts (MH), base stations (BS) and the mobility support routers (MSR). We also choose to let the MH use its base stations address to represent the location information, because in a wireless environment, packets destined to the MH always transit its base station. This choice eliminates the need of an extra address assignment mechanism for the MH. 3.0 Functional Requirements on the Infrastructure The static network infrastructure is obviously inadequate to support mobile networking. Thus additional functions need to be added to the MHs, BSs, and MSRs to carry out the task. In this section, we list the functional requirements without giving details on how to implement these functions 1. We shall assume these functions exist when describing our routing scheme for mobile networking. A beaconing protocol enabling the MH to communicate with the BS and obtain network connectivity service. MSR routes the packet on a per host basis instead of the traditional network based routing. An encapsulation protocol is used to tunnels the packet for the MH to its current BS or MSR, the BS or MSR then decapsulates the packet and delivers it to the MH. A routing information update protocol to propagate the location information of the MHs between MSRs. This protocol is also used for the MH to inform its home MSR about its new location. A sender redirect mechanism that allows the MSR to inform the packet sender (or the packet encapsulator) about the new location of the MH where subsequent packets should be directed. These requirements are mostly self explanatory. The applicability of the sender redirect mechanism, however, depends on whether the packet sender can support such redirection [6]. 4.0 Traffic Pattern based Routing Scheme Traffic routing decision is made based on the routing information available. Thus the efficiency of a traffic routing scheme depends critically on the propagation of the routing information. In 1. The implementation issues are been actively pursued in the IETF mobile IP workgroup. 3
4 devising a routing information update protocol, it is necessary to keep in mind that excessive routing information update can be wasteful for network resources, while not enough routing information leads to non-optimal routing. This is especially important in a mobile network, as the host mobility demands frequent routing information updates. The network bandwidth used for the routing information update can be greatly reduced while still achieving optimal traffic routing, if we only propagate the routing information to those routers/hosts that need to communicate with the mobile host. For the routers/hosts without the routing information update, a forwarding and redirecting (if the relevant router/host supports such redirecting) scheme can be adopted if the need to communicate with the mobile host arises. Therefore, traffic pattern analysis plays an important role in designing a mobile network routing scheme. For each traffic pattern, there will be an optimal routing scheme that adapts to the corresponding traffic pattern. In a mobile networking environment, we can assume that the majority traffic for each mobile host is from a finite, limited number of networks/hosts. It is obvious that this assumption is very general and covers most of the mobile traffic scenarios. The networks where the majority traffic for the mobile host originated thus should be conceptually separated from other networks. We can create a special set of networks catering to the mobile traffic. Therefore, we introduce the friend network concept for mobile hosts based upon the above analysis. A network is considered a friend network of a mobile host if the following conditions hold: Substantial network traffic exists between the network and the mobile host. The network is a trusted network of the mobile host and equipped with an MSR. With the creation of the friend networks, the routing information can then be distributed much more efficiently. The network security can also be addressed by prohibiting the routing information propagation into unfriendly networks. In the following subsections, we describe the routing information update procedures and the subsequent packet routing in a mobile network. 4.1 Routing information Update When a mobile host migrates into a new guest network, the beaconing protocol enables the MH to obtain network connectivity service from its current BS or MSR. The routing information update is then propagated as follows: 1. The MH informs its home MSR about its new location The home MSR sends routing update to the friend network MSRs. 3. The home MSR may choose to send a sender redirect message to the hosts 2 currently communicating with the MH. 1. This first location update can also originate from the BS or MSR. 2. Sometimes, this sender redirect message is sent to the MSR forwarding packets using non-optimal route. 4
5 Figure 2 illustrates such routing information propagations. When an MH migrates into friendnet2, the routing information is only distributed among the friend networks, represented by the shaded area. homenet friendnet 2 friendnet 1 migration Fig.2: Routing information propagation in a mobile network. 4.2 Mobile Traffic Routing We adopt a two tier approach for traffic routing in a wireless mobile network. Initially, the packet destined to an MH uses the MH address (which represents its identity) as the destination address. Such packet is routed using normal routing mechanism towards its home network. At some point, the packet reaches a mobility support router (in the worst case scenario, the home MSR), the MSR checks the routing table, if it finds that MH is currently visiting a guest network, the MSR encapsulates the packet and sends it to the BS or MSR currently serving the MH. When receiving the encapsulated packet, the BS or MSR first decapsulates the packet, finds out from its cache if the MH is currently in its service area (cell). If yes, it delivers the packet to the MH via its own mechanism (wireless interface). If the MH has already migrated out of the its cell, the decapsulated packet is routed through normal routing mechanism towards its home network, the packet then repeats the same journey 1. Figure 3 illustrates the packet delivery process. 1. In some mobile routing scheme, a forward pointer is used here to increase efficiency, but in our scheme, such fo ward pointer may not be necessary. Because in most cases, the MSR serving the previous migrated network is a friend network router and shall have the updated location information. 5
6 sender static infrastructure MSR static infrastructure MSR BS MH MH MSR static infrastructure Fig. 3: Deliver a packet to a mobile host. 5.0 Performance Analysis Many factors need to be considered in the design of a network routing and addressing scheme that supports mobility. One main concern is the backward compatibility with the existing network infrastructure. Protocols require changes on the existing network infrastructure are simply too expensive to be implemented. Another major concern is the performance of the routing scheme, how much network resource it consumes in supporting the mobile hosts, and whether it produces optimal routing for the packets. Other related issues include reliability and security. In this section, we focus the discussion on the performance analysis. We analyze the efficiency of network bandwidth utilization of our scheme and compare it with three other existing proposals: Scheme 1: Friend network based routing information update. This scheme assumes that only those networks considered as the friend network get the updated location information of the MH. Thus traffic from the friend networks can achieve optimal routing, while others need to be forwarded to the MH by the home MSR of the mobile host. Scheme 2: Complete update. All network routers are MSRs, and whenever an MH migrates, the routing information is updated to all the routers. This scheme was first proposed in [4]. Scheme 3: Lazy update. The MH only informs its home MSR about its location, and when a packet destined to the MH arrives at an MSR, it queries the home MSR about the location of the MH. This scheme is similar to the Columbia cold search method [2]. However, it queries only the home MSR instead of flooding all the MSRs. Thus it is more efficient. Scheme 4: No update. This scheme assumes that only the home MSR receives location update from the MH and no extra routing update is performed. Thus the traffic needs to be forwarded to the MH at all times. This scheme was first proposed in [6]. 6
7 In order to quantify our analysis, we define several parameters pertinent to the mobile traffic pattern and network configuration: 1. Message/mobility ratio: M r. This parameter is similar to the call/mobility ratio introduced in [7]. It is the average number of messages the MH receives per move. 2. Friend network traffic ratio T f. The amount of traffic from the friend networks. which is also defined as majority traffic. It is usually about 80~90%. 3. Friend network ratio: n f. The number of friend networks divided by the number of networks in the entire corporate network. n f and T f are related with each other. 4. Average message*link cost to update the routing information to an MSR: x. This parameter is dependent on the network topology. 5. Average extra message*link cost to forward a packet to the mobile host instead of using a direct optimal route: y. This parameter is also dependent on the network topology. If we consider that MHs and MSRs distribute randomly within the corporate network, x=y is a good approximation. Furthermore, we assume that a sender redirect mechanism exist. After the first packet forwarded, the subsequent packets are routed through optimal route. This assumption allows us to equate the message lengths of a routing update and a data message, because only the first packet of the data message incurs extra link cost. 1 Taking the total number of networks in the corporate network as N. Simple arithmetics yields the extra message*link cost per mobile host migration as in Table 1: Routing Per move cost Effective region (if x=y) Scheme 1 N*n f *x+(1-t f )*M r *(x+y) Nn f /2T f < M r < N(1-n f )/2(1-T f ) Scheme 2 N*x M r > N(1-n f )/2(1-T f ) Scheme 3 2M r *x 0 < M r < Nn f /2T f Scheme 4 M r *(x+y) 0 < M r < Nn f /2T f Table 1: Comparison of extra message*link cost for different routing schemes A simple criterion is also deduced to determine which scheme is the most efficient with respect to the message/mobility ratio. When we consider some sample parameter numbers: n f =0.2, T f =0.8, and N=20. Traffic pattern based routing scheme would be most efficient when 1. In the event where such redirection is not available, forwarding a data message incurs more link costs then that of the routing update packet. This is equivalent to a bigger M r 7
8 2.5 <M r < 40. This is a rather large range. In addition, by adjusting the friend network ratio n f, our traffic pattern based routing scheme can adapt to the change of message/mobility ratio M r. 6.0 Conclusion In conclusion, we have proposed a novel routing scheme for mobile information network by creating a concept called friend networks. Our routing scheme greatly reduces the network resource consumption by routing information update while providing optimal routing for the mobile traffic. This routing scheme is applicable to a wide range of mobile traffic patterns. In addition, The feature of mobile network security can also be readily incorporated into the scheme by adding policy considerations into the friend network list management. 7.0 Acknowledgments The author is grateful to Dr. Jack Holtzman for bringing Ref. [7] into attention, and would like to thank the anonymous reviewer for valuable comments. 8.0 References [1] J. Ioannidis, Dan Duchamp and G. Q. Maguire Jr., IP based Protocols for Mobile Internetworking, Proceeding of SIGCOMM 91, ACM, September, [2] J. Ioannidis, D. Duchamp, G. Q. Maguire Jr, and Steve Deering, Protocol for Mobile Internetworking, Draft RFC, June, [3] F. Teraoka, VIP: IP Extension for Host Migration Transparency, Draft RFC, November, [4] K. G. Carlberg, A Routing Architecture that SupportMobile End Systems, MILCOM 92, October, [5] Y. Rekhter and C. Perkins, Short-cut Routing for Mobile Hosts, Draft RFC, July, [6] H. Wada, T. Ohnishi, and B. Marsh, Mobile Computing Environment based on Internet Packet Forwarding, 1992 Winter USENIX, January, [7] T. Imielinski and B. R. Badrinath, Mobile Wireless Computing: Solution and Challenges in Data Management, preprint. [8] D. J. Goodman, Trends in Cellular and Cordless Communications, IEEE Communication Magazine, June, [9] L. J. Ng, R. W. Donaldson and A. D. Malyan, Distributed Architectures and Databases for Intelligent Personal Communication Networks, Proceeding of the ICWC, June,
Ubiquitous Mobile Host Internetworking
Ubiquitous Mobile Host Internetworking David B. Johnson School of Computer Science Carnegie Mellon University Pittsburgh, PA 152 13-389 1 dbj Qcs. cmu. edu 1. Introduction With the increasing popularity
More informationMobile host protocols support host
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2000; 10:191 214 Location update and routing scheme for a mobile computing environment By Anna Hać Ł and Yujing Huang We present a new hierarchical
More informationOptimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee
Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.
More informationPerformance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks
Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation
More informationMINT - A Mobile Internet Router
MINT - A Mobile Internet Router Anders Klemets, Gerald Q. Maguire2, Frank Reichert, and Mark T. Smith3 Teleinformatics at Royal Institute of Technology, Stockholm, Sweden komputer Science at Columbia University,
More informationEnhanced Mobile IP Protocol
Enhanced Mobile IP Protocol Baher Esmat, Mikhail N. Mikhail, Amr El Kadi Department of Computer Science, The American University in Cairo, Cairo, Egypt {besmat, mikhail, elkadi}@aucegypt.edu Abstract.
More information2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
More informationMobile IP. Mobile Computing. Mobility versus Portability
Mobile IP Mobile Computing Introduction Amount of mobile/nomadic computing expected to increase dramatically in near future. By looking at the great acceptance of mobile telephony, one can foresee a similar
More informationcell router mobile host
In Mobile Computing, T. Imielinski and H. F. Korth eds., Kluwer Academic Publishers, 1996 22 STRATEGIES FOR QUERY PROCESSING IN MOBILE COMPUTING Masahiko TSUKAMOTO, Rieko KADOBAYASHI* and Shojiro NISHIO
More informationAbstract. I. Introduction. II. Requirements
The Internet Mobile Host Protocol (IMHP) Charles E. Perkins Andrew Myles David B. Johnson Abstract This paper describes the Internet MobileHost
More informationSupporting IP Multicast for Mobile Hosts. Yu Wang Weidong Chen. Southern Methodist University. May 8, 1998.
Supporting IP Multicast for Mobile Hosts Yu Wang Weidong Chen Southern Methodist University fwy,wcheng@seas.smu.edu May 8, 1998 Abstract IP Multicast is an ecient mechanism of delivering a large amount
More informationA FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS
A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,
More informationTR Virtual Cell in Mobile Computer Communications. Kyungshik Lim and Yann-Hang Lee. University of Florida
TR94-020 Virtual Cell in Mobile Computer Communications Kyungshik Lim and Yann-Hang Lee Computer and Information Sciences Department University of Florida Gainesville, FL 32611 Abstract This paper describes
More informationVirtual Private Networks (VPNs)
CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure
More informationIP Paging Considered Unnecessary:
IP Paging Considered Unnecessary: Mobile IPv6 and IP Paging for Dormant Mode Location Update in Macrocellular and Hotspot Networks James Kempf DoCoMo USA Communications Labs 181 Metro Drive, Suite 3 San
More informationA Mobile Networking System based on Internet. Computer Science Department IBM, T.J. Watson Research Center. University of Maryland Hawthorne, NY 10562
A Mobile Networking System based on Internet Protocol(IP) Pravin Bhagwat Charles E. Perkins pravin@cs.umd.edu perk@watson.ibm.com Computer Science Department IBM, T.J. Watson Research Center University
More informationA Framework for Optimizing IP over Ethernet Naming System
www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul
More informationRequest for Comments: 2004 Category: Standards Track October Minimal Encapsulation within IP. Status of This Memo
Network Working Group C. Perkins Request for Comments: 2004 IBM Category: Standards Track October 1996 Status of This Memo Minimal Encapsulation within IP This document specifies an Internet standards
More informationChapter 8 LOCATION SERVICES
Chapter 8 LOCATION SERVICES Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Mobile IP Motivation Data transfer Encapsulation Location Services & Routing Classification of location
More informationA Study on Mobile IPv6 Based Mobility Management Architecture
UDC 621.396.69:681.32 A Study on Mobile IPv6 Based Mobility Management Architecture VTsuguo Kato VRyuichi Takechi VHideaki Ono (Manuscript received January 19, 2001) Mobile IPv6 is considered to be one
More informationA Multihoming based IPv4/IPv6 Transition Approach
A Multihoming based IPv4/IPv6 Transition Approach Lizhong Xie, Jun Bi, and Jianping Wu Network Research Center, Tsinghua University, China Education and Research Network (CERNET) Beijing 100084, China
More informationA Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6
A Hybrid Load Balance Mechanism for Distributed Home Agents in Mobile IPv6 1 Hui Deng 2Xiaolong Huang 3Kai Zhang 3 Zhisheng Niu 1Masahiro Ojima 1R&D Center Hitachi (China) Ltd. Beijing 100004, China 2Dept.
More informationGateway Forwarding Strategies in Ad hoc Networks
Gateway Forwarding Strategies in Ad hoc Networks Erik Nordström Department of Information Technology Uppsala University erikn@it.uu.se Per Gunningberg Department of Information Technology Uppsala University
More informationSCHEDULING AND LOAD SHARING IN MOBILE COMPUTING USING TICKETS
Baskiyar, S. and Meghanathan, N., Scheduling and load balancing in mobile computing using tickets, Proc. 39th SE-ACM Conference, Athens, GA, 2001. SCHEDULING AND LOAD SHARING IN MOBILE COMPUTING USING
More informationAndrew T. Campbell, Javier Gomez. Center for Telecommunications Research, Columbia University, New York. [campbell,
An Overview of Cellular IP Andrew T. Campbell, Javier Gomez Center for Telecommunications Research, Columbia University, New York [campbell, javierg]@comet.columbia.edu Andras G. Valko Ericsson Research
More informationMIPv6: New Capabilities for Seamless Roaming Among Wired, Wireless, and Cellular Networks
Page 1 M: New Capabilities for Seamless Roaming Among Wired, Wireless, and Cellular Networks Paul Schmitz Technical Marketing Engineer Geoff Weaver Business Development Manager Copyright 2002. *Third-party
More informationROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX
ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX ABSTRACT The base Mobile Internet Protocol (Mobile IP) provides a means for portable computers to roam freely, changing its point
More informationEfficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism
Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1345-1353 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49166 Efficient Mobile Content-Centric Networking Using Fast Duplicate
More informationSTUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 155-158 STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS Monika ABSTRACT: In Many wireless
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationGateway Forwarding Strategies for Ad hoc Networks
Gateway Forwarding Strategies for Ad hoc Networks Erik Nordström Per Gunningberg Christian Tschudin Department of Information Technology, Uppsala University {erikn perg}@it.uu.se ABSTRACT This paper studies
More informationFAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN
FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN SANGHEON PACK AND YANGHEE CHOI School of Computer Science and Engineering, Seoul National University, Seoul, Korea
More informationChapter 15 IPv6 Transition Technologies
Chapter 15 IPv6 Transition Technologies Published: April 18, 2006 Updated: November 06, 2006 Writer: Joe Davies 1 Abstract This chapter describes the mechanisms that aid in the transition of Internet Protocol
More informationCSE 123A Computer Netwrking
CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationDistributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast)
137 Distributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast) 1, 2 Jan Fesl, 1 Richard Klee, 1 Marie Dolezalova 1 Institute of Applied Informatics,
More informationChapter 8: Subnetting IP Networks
Chapter 8: Subnetting IP Networks Designing, implementing and managing an effective IP addressing plan ensures that networks can operate effectively and efficiently. This is especially true as the number
More informationFixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering
Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile
More informationAn Efficient Multicast Routing Protocol for Mobile Hosts
An Efficient Multicast Routing Protocol for Mobile Hosts Miae Choi, Byung-Won On, Hyunki Baik and Myong-Soon Park Department of Computer Science & Engineering, Korea University Email: {mine, Dwon, xihson.
More informationROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX
ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX M. L. Jiang and Y. C. Tay ABSTRACT The base Mobile Internet Protocol (Mobile IP)[1] provides a means for portable computers to roam
More informationVirtual private networks
Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible
More informationEnhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1
Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu
More informationEfficient Handoff using Mobile IP and Simplified Cellular IP
Presented at GNSS 2004 The 2004 International Symposium on GNSS/GPS Sydney, Australia 6 8 December 2004 Efficient Handoff using Mobile IP and Simplified Cellular IP S. Omar School of Surveying & Spatial
More informationA Mobile-Floating Agent Scheme for Wireless Distributed Computing
1995 IEEE, to appear in the proceedings of PIMRC 95, Toronto, Cannda. A -Floating Agent Scheme for Wireless Distributed Computing George Y. Liu, A. Danne, A. Marlevi and G. Q. Maguire Jr.* System Research
More informationDomain Based Approach for QoS Provisioning in Mobile IP
Domain Based Approach for QoS Provisioning in Mobile IP Ki-Il Kim and Sang-Ha Kim Department of Computer Science 220 Gung-dong,Yuseong-gu, Chungnam National University, Deajeon 305-764, Korea {kikim, shkim}@cclab.cnu.ac.kr
More informationOptimal method to Reducing Link and Signaling Costs in Mobile IP
Optimal method to Reducing Link and Signaling Costs in Mobile IP Sridevi Assistant Professor, Department of Computer Science,Karnatak University,Dharwad Abstract The objective of this research paper is
More informationAn Enhancement of Mobile IP by Home Agent Handover
An Enhancement of Mobile IP by Home Agent Handover Li-Sheng Yu and Chun-Chuan Yang Multimedia and Communications Laboratory Department of Computer Science and Information Engineering National Chi Nan University,
More informationExtensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc
Extensions to RTP to support Mobile Networking Kevin Brown Suresh Singh Department of Computer Science Department of Computer Science University of South Carolina Department of South Carolina Columbia,
More informationMobile SCTP for IP Mobility Support in All-IP Networks
Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming
More informationIPv6 support. Chris Mitchell. Program Manager Microsoft Corporation Windows Networking & Communications IPv6
IPv6 support Chris Mitchell Program Manager Microsoft Corporation Windows Networking & Communications IPv6 Introduction New scenarios and IPv6 Microsoft s IPv6 support Migration and roadmap 2 New Engaging
More informationNetwork Working Group. Obsoletes: 1388 November 1994 Updates: 1058 Category: Standards Track
Network Working Group G. Malkin Request for Comments: 1723 Xylogics, Inc. Obsoletes: 1388 November 1994 Updates: 1058 Category: Standards Track Status of this Memo RIP Version 2 Carrying Additional Information
More informationA Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols
International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationMIX Network for Location Privacy First Draft
2G1319 Communication Systems Design Department of Microelectronics and Information Technology, KTH csd2002-ipv6privacy@2g1319.ssvl.kth.se MIX Network for Location Privacy First Draft O. Sirovatcenko April
More informationComparison of proposed path selection protocols for IEEE s WLAN mesh networks
Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba
More informationEmpirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks
Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering
More informationA DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET
2008 IEEE Asia-Pacific Services Computing Conference A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET Shubhranshu Singh Advanced Technology Division Samsung India Software Operations
More informationA Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism
A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism Dae Sun Kim 1 and Choong Seon Hong 2 1 School of Electronics and Information, Kyung Hee Univerity 1 Seocheon, Giheung, Yongin,
More informationTCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS
TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia
More informationPERSONAL communications service (PCS) provides
646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,
More informationConfiguring multicast VPN
Contents Configuring multicast VPN 1 Multicast VPN overview 1 Multicast VPN overview 1 MD-VPN overview 3 Protocols and standards 6 How MD-VPN works 6 Share-MDT establishment 6 Share-MDT-based delivery
More informationOptimizing your network for the cloud-first world
Optimizing your network for the cloud-first world Why performing cloud and network modernization together assures seamless, reliable user app delivery. Citrix.com ebook Align Cloud Strategy to Business
More informationP /183. Mobile IP as seen by the Internet Engineering Task Force
N()vember 1993 --~----------------------------------------------------------- P802.11-93/183 Doc: IEEE P862.11-93/183 Mobile IP as seen by the Internet Engineering Task Force Charles E. Perkins perk@watson.ibm.com
More informationAvoiding Redundant Redirect Datagram during
Avoiding Redundant Redirect Datagram during Handoff Completing in a Campus Size Wireless Mobile Network Rahul Kumar 1, Trilok Gabba 2, Gaurav Bhardawaj 3 1 M.Tech C.S.E, BITS Bhiwani, M.D.U Rohtak Haryana-127021,
More informationModule 1. Introduction. Version 2, CSE IIT, Kharagpur
Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical
More informationIndirect RSVP for Virtual Cluster Cellular Mobile IP Networks
Indirect SVP for Virtual Cluster Cellular Mobile IP Networks Yu Zeng, Jon W. Mark, and Xuemin Shen University of Waterloo, Waterloo, Ontario, Canada N2L 3G1 {yzeng, jwmark, xshen}@bbcr.uwaterloo.ca Abstract.
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationSFWR 4C Topic: Migration from IP (Version 4) to IP (Version 6) and Issues Researcher: Mohammad Janjua Date: 05/04/2005
SFWR 4C03 2005 Topic: Migration from IP (Version 4) to IP (Version 6) and Issues Researcher: Mohammad Janjua - 0158591 Date: 05/04/2005 1. Introduction: Currently, the internet protocol in use is IPv4
More informationAgenda. What are we looking at? Introduction. Aim of the project. IP Routing
Agenda Handoffs in Cellular Wireless Networks: The Daedalus Implementation & Experience by Shrinivasan Seshan, Hari Balakrishnan Randy H. Katz A short presentation by Aishvarya Sharma Dept of Computer
More informationA Service Management Architecture for NEMO in IPv4 and IPv6 Networks
A Service Management Architecture for NEMO in IPv4 and IPv6 Networks JinHoKim,ChoongSeonHong, Dae Sun Kim Department of Computer Engineering, Kyung Hee University, Seocheon, Giheung, Yongin, Gyeonggi,
More informationEnd-To-End Signaling and Routing for Optical IP Networks
End-To-End Signaling and Routing for Optical IP Networks Mark Joseph Francisco, Lambros Pezoulas, Changcheng Huang, Ioannis Lambadaris Carleton University Department of Systems and Computer Engineering
More information312 D.B. Johnson /Scalable support for transparent mobile host internetworking work, it is then delivered to the correct individual host on that netwo
Wireless Networks 1 (1995) 311^321 311 Scalable support for transparent mobile host internetworking 3 David B. Johnson Computer Science Department, Carnegie Mellon University, Pittsburgh, PA, USA Abstract.
More informationPerformance Analysis of MANET Routing Protocols OLSR and AODV
VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz
More informationAnalysis and Comparison of Different Host Mobility Approaches
Analysis and Comparison of Different Host Mobility Approaches Mevlut Erdem Kurul, Rommel Pesigan and Brad Weekes Department of Computer Science University of California, San Diego La Jolla, CA 92193-0114
More informationHost Identifier and Local Locator for Mobile Oriented Future Internet: Implementation Perspective
Host Identifier and Local Locator for Mobile Oriented Future Internet: Implementation Perspective Nak Jung Choi*, Ji In Kim**, Seok Joo Koh* * School of Computer Science and Engineering, Kyungpook National
More informationMultilevel Fault-tolerance for Designing Dependable Wireless Networks
Multilevel Fault-tolerance for Designing Dependable Wireless Networks Upkar Varshney Department of Computer Information Systems Georgia State University Atlanta, Georgia 30302-4015 E-mail: uvarshney@gsu.edu
More informationMobile Communications Chapter 8: Network Protocols/Mobile IP
Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama
More informationObsoletes: 2002 January 2002 Category: Standards Track
Network Working Group C. Perkins, Ed. Request for Comments: 3220 Nokia Research Center Obsoletes: 2002 January 2002 Category: Standards Track Status of this Memo IP Mobility Support for IPv4 This document
More informationPERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS
PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS Nutan Bhati, Dr. Ashish Bansal Abstract: Mobile Ad hoc Networks (MANETs) are a collection of mobile nodes forming a dynamic autonomous
More informationMixed-Media Bridging. Chapter Goals. Background. Translation Challenges CHAPTER
24 CHAPTER Chapter Goals Understand bridging in a mixed Ethernet and Token Ring environment. Describe the differences between source-route transparent and translational bridging. List some of the challenges
More informationDelivering Multicast Messages in Networks with Mobile Hosts
Delivering Multicast Messages in Networks with Mobile Hosts Arup Acharya B. R. Badrinath Department of Computer Science Rutgers University {ac harya@riches, badri@cs}.rutgers. edu Abstract There is a strong
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationPART IV. Internetworking Using TCP/IP
PART IV Internetworking Using TCP/IP Internet architecture, addressing, binding, encapsulation, and protocols in the TCP/IP suite Chapters 20 Internetworking: Concepts, Architecture, and Protocols 21 IP:
More informationAppeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan
Appeal Decision Appeal No. 2014-5131 USA Appellant ALCATEL-LUCENT USA LTD. Tokyo, Japan Patent Attorney OKABE, Yuzuru Tokyo, Japan Patent Attorney YOSHIZAWA, Hiroshi The case of appeal against the examiner's
More informationIPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol
IPv4 Care-of Address Registration for IPv4 Support on the NEMO Basic Support Protocol Ryuji Wakikawa Carl Williams Keisuke Uehara Jun Murai Keio University. Graduate School of Media and Governance KDDI
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationMobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP
Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet
More informationDynamic Traffic Load Balancing Mechanism for SHAKE Architecture
Dynamic Traffic Load Balancing Mechanism for SHAKE Architecture Hiroshi Esaki, Hiroki Kan Graduate School of Information Science and Technology, The University of Tokyo, Japan hiroshi@wide.ad.jp kohki@hongo.wide.ad.jp
More informationMobility Support in Internet and Mobile IP. Gianluca Reali
Mobility Support in Internet and Mobile IP Gianluca Reali 1 Problem We have seen that mobile users can change point of attachment In a WLAN, a mobile may change access point. In a cellular network, a mobile
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationQuality of Service Architectures for Wireless Networks: IntServ and DiffServ Models
Quality of Service Architectures for Wireless Networks: IntServ and DiffServ Models Indu Mahadevan y and Krishna M. Sivalingam z; School of Electrical Engineering and Computer Science Washington State
More informationPOLICY ROUTING. Licentiate course seminar paper
HELSINKI UNIVERSITY OF TECHNOLOGY Laboratory of Telecommunications Technology Licentiate course seminar, October 1996 Revised, December 1996 Mauri Pännäri POLICY ROUTING Licentiate course seminar paper
More informationHandover Management for Mobile Nodes in IPv6 Networks
TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we
More informationDHT-based Identifier-Locator Mapping Management for Mobile Oriented Future Internet
DHT-based Identifier-Locator Mapping Management for Mobile Oriented Future Internet Hyung-Woo Kang Kyungpook National University Daegu, Korea hwkang0621@gmail.com Ji-In Kim Kyungpook National University
More informationSchool of Computer Science
Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman TR-OU-TNRL-10-105 September 2010 Telecommunication & Network Research Lab School of Computer Science THE UNIVERSITY OF
More informationMixed-Media Bridging
CHAPTER 31 Mixed-Media Bridging Background Transparent bridges are found predominantly in Ethernet networks, and source-route bridges (SRBs) are found almost exclusively in Ring networks. For more information
More informationRedundancy for Routers using Enhanced VRRP
Redundancy for Routers using Enhanced VRRP 1 G.K.Venkatesh, 2 P.V. Rao 1 Asst. Prof, Electronics Engg, Jain University Banglaore, India 2 Prof., Department of Electronics Engg., Rajarajeshwari College
More informationCharles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo
IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This
More information