Optimal Service Delivery in Mobile Networks
|
|
- Charla Hall
- 5 years ago
- Views:
Transcription
1 Optimal Service Delivery in Mobile Networks Ashutosh Dutta, Ph.D. Senior Scientist NIKSUN Princeton, NJ, USA WWSMC 11, NJ USA, July
2 A name identifies what you want, An address identifies where it is, and An route identifies a way to get there John Shoch, 1978
3 Talk Outline Evolution of Mobile Networks Service Delivery in Mobile Networks A taxonomy of IP mobility Handoff optimization Use case scenarios Measurement-based mobility model Conclusions. 3
4 Evolution of mobility protocols 1 G 2 G 2.5 G 3 G 4 G IEEE TACS 80 Mb/s (UL), 360 Mb/s GSM GPRS EDGE NMT 9.6 kb/s 54 kb/s 236 kb/s JTACS NTT PDC 42 kb/s WCDMA 144 kb/s, 384 kb/s, 2 Mb/s 80 Mb/s EHSPA IS Mb/s (DL), 22 Mb/s (UL) AMPS SMR 48.6 kb/s IS-95 (A) 9.6 kb/s iden 24 kb/s IS-95 (B) 115 kb/s CDMA2000 1X 144 kb/s CDMA2000 NX 144 kb/s, 384 kb/s, 2 Mb/s UMB 280 Mb/s LTE 50 UL, 100 DL
5 Mobile Wireless Internet: A Scenario Domain1 WAN Internet Domain2 PSTN gateway UMTS/ CDMA Bluetooth a/b/g WAN a/b/g IPv6 Network PAN LAN LAN Hotspot PSTN Roaming User CH UMTS/CDMA Network Ad Hoc Network
6 Service Delivery Metrics QoE => Perceived Quality of Service Network Metrics Bit rate, delay, jitter, packet loss rate Power consumption Application Metrics Call setup delay Failed calls, dropped calls, retransmission MOS (Mean Opinion Score) for media Several standards groups ITU-T SG12 ITU X.902 (IP Telephony) IETF IPPM, DIFFSERV 3GPP 3GPP TS (IMS performance) Slide 6
7 Mobility Taxonomy IP Mobility Personal Terminal Service Session Issues Mobility pattern NetworkTransport Layer Layer MIPv4 Cellular IP HAWAII IDMP MIP-LR MIPV6 ProxyMIPv6 MSOCKS, Migrate msctp Shim Layer HIP Application Layer SIPMM MIP-LR(M) Proxy Systems Optimization Host controlled vs. Network Controlled
8 Use Case: Cross layer and multiple interfaces Zone 1 Zone 2 Zone 3 Ne tw or k Ty pe GS M d S SI D/ C ell ID Connect to WLAN N A B S SI D N/ A N A Op er at or AT &T T- Mo bile Se cu rit y N W C ha nn el NA NA 1 9 PK M EAP- PEA P Q o S N / A Y e s Ph ysi cal La yer Dat a Rat e N/A 9.6 kbps OF DM 40 Mbp s Wakeup WLAN Download over WLAN Shutdown GPS Wi-Fi Wi-Fi Zone 4 Zone 5 Zone 6 Airport WLAN Link Going Down. Radio State Café GSM Shutdown GPS Start Download over WLAN Switch to WiMAX Download over WiMAX Shutdown WLAN Wakeup GPS Wakeup WLAN Battery level low Shutdown WiMAX Download over GSM/GPRS Zone 7 Wi-MAX Zone 8 Wi-MAX Zone 9 Network Type SSID/ Cell ID BSSID Operator Security NW EAP Channel QoS Physical Type Layer Data Rate GSM N/A AT&T NA NA 1900 N/A N/A 9.6 Kbps kbps b Airport Café 00:00: Airport Café.11i EAP- PEAP Courtesy: IEEE WLAN WiMAX GPS 6.11e OFDM 11 Mbps
9 Mobility Illustration in a sample IP-based network Administrative Domain B Registration Agent Authorization Agent Authorization Agent Administrative Domain A Registration Agent Signaling Proxy L2 PoA L2 PoA Authentication Agent Configuration Agent L3 PoA D L3 PoA N1 N2 Backbone Configuration Agent N1- Network 1 (802.11) N2- Network 2 ( CDMA/GPRS) Authentication Agent Layer 3 PoA N2 N1 C Signaling Proxy L3 PoA B A Layer 2 PoA IP ch Corresponding Host Layer 2 PoA Mobile Host Handoff Delay CDMA ~ 18 s ms media interruption h/o delay 900 ms h/o delay 18 s 18 Seconds media interruption 4 Seconds media interruption h/o delay 4 s 9
10 System decomposition of handover process Handover Event P1 P2 P3 P4 P5 P6 Network discovery & selection Network attachment Configuration Security association Binding update Media reroute P11 Channel discovery P13 Server discovery P12 Subnet discovery P21 L2 associatio n Domain Advertisement P22 P23 Router solicitation P31 Identifier acquisition P32 P33 Duplicate Address Detection Address Resolution P41 Authentication (L2 and L3) P42 Key derivation P51 P52 Identifier update Identifier Verification P53 Identifier mapping Binding cache Tunneling P54 P61 P63 Buffering P62 Forwarding P64 Bi-casting/ Multicasting 10
11 How security affect handoff performance Security protocols have an impact on the performances of the network End-to-end latency Throughput Handoff delay Packet loss Main components that affect the performance Authentication/authorization, Key Derivation Encryption Security related delays may affect all the layers Layer 2 (e.g., i, WEP) Layer 3 (IPSEC/IKE) Upper Layers (e.g., TLS, SRTP) Server Layer 4 Layer 3 Security Association Layer 2 Key Distribution Authentication Encryption Mobile MN Server MN Network L3 POA
12 Key principles for security optimization Number of round trip signaling for key derivation process need to be minimized Avoid the key exchange by maintaining the end-point address identifier (e.g., IP address) Avoid tear down and re-establishment of Security Association (e.g., IPSec Tunnel) Proactive authentication Fast re-authentication Security context transfer between the base stations Cross layer assisted authentication Layer 3 authentication bootstraps layer 2 authentication process Anchor-based security association Clients behind Mobile IP Home Agent are shielded from IP address change
13 Media Independent Pre-authentication - a deployment scenario AR Network 4 Information Server INTERNET CN Network 3 Current Network 1 AR AP1 TN AA Network 2 MN-CA key CA AP2 AR AR CTN MN-CA key AA CA AP3 AP1 Coverage Area Mobile AP 2 & 3 Coverage Area CTN Candidate Target Networks TN Target Network
14 Network-Layer Assisted Pre-Authentication Supports handover across intertechnology, inter-subnet and inter-domain Radius/Diameter Home AAA Domain AAAh Independent of link-layer technology (e.g., , CDMA) No context transfer security problems (e.g. no domino effect) Roaming AAA Domain* nar/paa PSK Network A PSK Association & 4-way handshake AP2 AAAv PANA pre-auth AP /24 par / /24 AP0 Network B MN IEEE i Pre-authentication PANA Pre-authentication
15 Network Pre-authentication Flows PaC Network-Layer Pre-authentication PaC s Movement Pre-configuration PSKx 4-way hanshake current APx target APx target PAA AAAv AAAH Associated PANA-Client-Initiation(PCI) PANA-Start-Request (PSR) [EAP Req/Ident] PANA-Start-Answer(PSA) [EAP Resp/Ident] PANA-Auth-Request (PAR) [EAP-TLS/Start] PANA-Auth-Answer (PAN) [EAP-TLS/Client-Hello] PANA-Auth-Request (PAR) [EAP-TLS/ServCert] PANA-Auth-Answer (PAN) [EAP-TLS/ClientCert] PANA-Auth-Request (PAR) [EAP-TLS/ChangeSpec] PANA-Auth-Answer (PAN) [EAP-TLS/Ack] PANA-Binding-Request[AUTH] (PBR) (EAP-Success) PANA-Binding-Answer (PBA) Non-roaming Roaming AAA prot-req (EAP-Resp/Ident) AAA prot-ans (EAP-TLS/Start) AAA prot-req (EAP-TLS/Client-Hello) AAA prot-ans (EAP-TLS/ServCert) AAA prot-req (EAP-TLS/ClientCert) AAA prot-ans (EAP-TLS/ChangeSpec) AAA prot-req (EAP-TLS/Ack) AAA prot-ans (EAP-Success) SNMPv3-Set(PSK, PaC s MAC address) SNMPv3-Ack PSK (Re)Association PSKx installation EAP skipped EAPOL Key: Message 1 EAPOL Key: Message 2 EAPOL Key: Message 3 EAPOL Key: Message 4 1x controlled port enabled & IP traffic
16 Performance (MPA-Non-MPA) Single I/F MPA No packet loss during pre-authentication, pre-configuration and pro-active handoff before L2 handoff Only 0 packet loss, 4 ms delay during handoff mostly transient data Includes delay due to layer 2, update to delete the tunnel on the router We also reduced the layer 2 delay in hostap Driver L2 delay depends upon driver and chipset MPA Approach handoff 4 s non-mpa About 200 packets loss, ~ 4 s during handover Includes standard delay due to layer 2, IP address acquisition, Re-Invite, Authentication/Authorization Could be more if we have firewalls also set up Non-MPA Approach
17 Optimized handoff delay with MPA (Multiple I/F) Handoff Delay CDMA ~ 18 s a. MIP-based Non-optimized handoff CDMA Handoff Delay CDMA 16 s c. MPA and assisted optimized handoff b. SIP-based Non-optimized handoff
18 Triple Encapsulation for Mobile VPN Internal (protected) External (unprotected) CN i-ha i-mip tunnel VPN GW VPN tunnel x-ha x-mip tunnel External Network 1 External Network N Internal Home Network Internal Visited Network DMZ MN MN MN MN Based on its current location, MN dynamically establishes/changes/terminates tunnels without changing current standards of IPsec VPN or Mobile IP. Triple encapsulation tunnel is constructed by: i-ha (Internal Home Agent): Forwards IP packets to MN s current internal location VPN GW: Protects (encrypts and authenticates) IP packets transmitted in external networks x-ha (External Home Agent): Forwards IP packets to MN s current external location
19 RTP S equence RTP S equence RTP Packet Sequence Results: Mobile IP-VPN Non-M a ke -be fore -bre a k RTP S equenc e Cellular Secured Handoff RTP sequence during handoff Non -m ake -b efore -break (e nterpris e) Cellular Packet Loss Due to Non -make-before -break (en te rprise ) Tim e in S e conds Cellular (enterprise) (enterprise) Out-of-order-packet Time in Seconds Hand-off with no-make-before break (internal-external-internal) with make-before-break CN VPN GW MN VPN traffic in VPN traffic in cellular Hom e-cellular-hots pot handoff RTP S equenc e Cellular External Hotspot Home T im e in S e co n d s RTP Tunnel (RTP) MOBIKE MOBIKE MOBIKE MOBIKE Visited Network 1 (Cellular) Mobike in cellular Mobike in IP0 address of interface IP1 address of cellular interface IP0 is primary address Visited Network ( is up) (802.11) (First packet on ) IP1 is primary address (Last packet on cellular) (Last packet on ) IP0 is primary address Packet Visited Network Loss (Cellular) (No-Break-before-make) Home-external-external handoff Mobike-based handoff (cellular-hotspot-cellular)
20 Handoff Optimization in IMS/MMD Network AAA/HSS Optimization HSS non-sip AS AAA HA S-CSCF SIP AS Non-SIP support non SIP IMS/ MMD I-CSCF E-CSCF Different Domain cdma2000 PCRF DHCP PDSN RAN P-CSCF IPSec Tunnel cdma200 0 PCRF DHCP PDSN RAN P-CSCF IPSec Tunnel FTTH /ADSL AP PCRF DHCP P-CSCF Optimized roaming architecture MN MN P-CSCF Fast handoff 20
21 Types of Handoff P-CSCF Fast-handoff Experimental Results Components Optimized PPP Termination Non-Optimized Layer 2 Delay Reactive Proactive PPP Activation MIP-Solicitation MIP-Binding Update DHCP Trigger DHCP Inform SIP Trigger SIP+Security Media Redirection Time in ms Components Optimized Figure 1: Levels of MMD Optimization 21
22 Optimal mobility system design Scheduling of handover operations Relevant optimization principles SIP-based Fast handoff Mobile VPN Example experimental mobility optimization Media Independent Pre-authentication Simultaneous Mobility Optimized handoff In IMS Muti-layer Mobility Multicast fast handoff Potential Target Mobility System Sequential Direct path between CH and MH Limit binding update between CH and MH X X X Maintain Security association between end-points X Anchor-based Forwarding X X Post-handoff triggers X Proactive Pre-handoff triggers X X Proactive network discovery X Proactive authentication X Proactive identifier configuration X Proactive binding update X X Dynamic Buffering X Proactive context transfer X Parallel Discovery of Layer 2 and Layer 3 PoA X 22
23 Measurement assisted mobility model DNS/E NUM P-CSCF S-CSCF HSS S-CSCF Invite OK ACK RTP diameter GETS- Application Server I-CSCF P-CSCF SIP DNS Monitoring Agent PCRF IMS PCRF Layer 3 control Network/ Application Feedback IMS-layer control Layer 2 control Controller Managed IP (Multi-Provider Network) (EPC) GW GETS Call Wireline Access Cable DSL Fiber Ethernet Caller (UE1) GW RAN IP CAN Wireless Access UMTS EvDO WiMAX LTE Satellite 23 RAN Wireless Access UMTS EvDO WiMAX LTE Satellite RAN RAN IP CAN Called (UE2) Wireline Access Cable DSL Fiber Ethernet 23
24 Resource usage per mobility events Sub transitions Sub-operations Resource Consumption Bytes exchanged CPU samples Power due to transmission (nano joules) t00 Layer 2 un-reachability test t01 Layer 3 unreachability t11 Discover layer 2 channel t12 Discover layer 3 subnet t13 Discover server t21 Layer 2 association t22 Router solicitation t23 Domain advertisement t31 Identifier acquisition t32 Duplicate address detection t33 Address resolution t41 Layer 2 open authentication t42 Layer 2 EAP t43 Four-way handshake t51 Master key derivation (PMK) t52 Session key derivation (PTK) t61 Identifier update t62 Identifier verification t63 Identifier mapping t64 Binding cache t71 Fast binding update t72 Local caching t81 Tunneling t82 Forwarding t83 Buffering t91 Local id mapping t92 Multicasting/bicasting
25 Modeling of handoff processes An example p31 p32 p33 Resource network capacity Potential Parallel Operation t31 t32 t33 t64 p64 t70 p11 p21 p22 p12 p23 P52 t53 p53 p61 Connected t11 t21 t22 t12 t23 t52 t51 P51 t54 p54 P00 t01 p41 p42 p62 p63 t13 Resource Battery t41 t42 p13 t62 t63 Resource CPU
26 Scheduling of handoff operations P A Network capacity Resources Network capacity P A 1 token 2 2 Mobile Disconnected Connected Network Discovered Mobile authenticated P1 P2 P3 P4 t2 t3 t4 t5 P 0 t1 scanning Authentication 4-way Handshake Association Disconnection Connected P0 t1 P01 Scanning P02 t2 t3 P1 Network Discovered Mobile Authenticated P2 t4 Association P3 4-way handshake complete t5 CPU cycles P C P B Battery power Authentication Resources CPU P C 4-way Handshake Operation Resource s Battery P B Current Network A. Sequential operations Target Network B. Parallel operations Level of concurrency =2 Resources P A Network Capacity P A 1 P11 PB1 Network discovery t11 t13 P12 t12 Preauthentication AP Key installation P1 Connected t1 P D Dis connected P2 4-way Handshake (SA) C. Proactive operations t4 P A 2 P3 P C Association t5 Connected P0 t1 P03 P01 Authentication P02 4-way Handshake Scanning t2 t3 t4 2 P1 P2 P3 Network Discovered P C CPU Mobile Authenticated D. Parallel operations Level of concurrency = 3 Battery PB t5 4 Association 26
27 Conclusions IP-based mobility in 4G networks involves movement across access technologies, movement across administrative domains, at multiple layers and involve interaction among multiple protocols Measurement-based Mobility model Allows to predict the handoff performance Provides trade-off performance (e.g., Resources vs. QoS) Allows to study behavioral characteristics deadlock based on mobility patterns Best current practices to provide optimal service delivery under different mobility pattern under different resource environment For different applications Mobile Cloud Computing, Real-time, Non-real-time 27
28 Burlingame, CA USA June
29 Cellular mobility GSM AUC HLR VLR EIR BSS MSC BSC 1 BSC 2 BTS A opoa BTS B npoa npoa BTS C npoa BTS D Serving Cell MH Move Target Cell
30 SAE/LTE (4G) S10 Enhanced Packet Core (EPC) SGSN Source enb S4 S1-MME X2 S3 Target enb X2 MME Serving Gateway (S-GW) S1-U E-UTRAN Candidate enb UE UE UE X2 S11 S5 S8 S6a PDN-GW Trusted Non-3GPP (WiFI, WiMAX) UTRAN IP-based IMS network Slide 30 NIKSUN Confidential Restricted Access See Title Page for Restrictions S2a HSS S7 SGi UE PCRF S2b epdg S6c Wn Wm Untrusted Non-3GPP Rx+ Wx AAA UE
31 QoE metrics Driven by measurements Slide 31
32 Optimizing authentication Related Work IEEE Standards IEEE i provides pre-authentication at link-layer in the distribution system (DS) IEEE r improves 11i by introducing a new key hierarchy but it does not work between DSs either. Context transfer solutions (Bargh et al, Georgiades et al, Duong et al) Security problems such as domino effect Assume certain trust relationships which might not be possible in certain scenarios. Oriented towards the same technology Re-authentication Pre-installation based on movement pattern (Mishra et al, Pack et al ) AAA assisted key installation Works within the same administrative domain MIPv6 and AAA assisted (Ruckforth et al) Limited to MIPv6 and within the same domain Cooperative Roaming (Forte et al) Works within a domain
33 Key principles for SA optimization Avoid the key exchange by maintaining the endpoint address identifier Avoid tear down and re-establishment of Security Association Reduce the number of signaling messages that help rekeying Anchor-based security association Clients behind NAT are shielded from IP address change
34 802.11i Pre-authentication Flow STA Current AP Target AP AAAv AAAH IEEE 11i Pre-Authentication PMKsta-targetAP Associated EAPOL Start EAPOL-Request(EAP-Req/ident) EAPOL-Response(EAP-Resp/ident) EAPOL-Request(EAP-TLS/Start) EAPOL-Response(EAP-TLS/Client-Hello) EAPOL-Request(EAP-TLS/ServCert) EAPOL-Response(EAP-TLS/ClientCert) EAPOL-Request(EAP-TLS/ChangeSpec) EAPOL-Response(EAP-TLS/Ack) EAPOL-Request(EAP-TLS/Sucess) Non-roaming Roaming AAA prot-req (EAP-Resp/Ident) AAA prot-ans (EAP-TLS/Start) AAA prot-req (EAP-TLS/Client-Hello) AAA prot-ans (EAP-TLS/ServCert) AAA prot-req (EAP-TLS/ClientCert) AAA prot-ans (EAP-TLS/ChangeSpec) AAA prot-req (EAP-TLS/Ack) AAA prot-ans (EAP-Success) PMKsta-targetAP 4-way hanshake (Re)Association EAPOL Key: Message 1 EAPOL Key: Message 2 EAPOL Key: Message 3 EAPOL Key: Message 4 1x controlled port enabled & IP traffic
35 Key Derivation Process Post-auth AAA Authentication Server i Pre-auth AAA Network-Layer Preauth AAA Authentication Server MSK Authenticator AP MSK PMK 4-way handshake (PTKs) AP MSK Authenticator AP MSK PMK AP MSK PAA AP PSKap MSK PaC-EP-Master-Key PSK PSKap PMK 4-way handshake (PTKs) MN MSK PMK WPA Supplicant MN 4-way handshake (PTKs) MN MSK MSK PMK PaC-EP-Master-Key PSK PMK WPA Supplicant
36 Technical issues for mobility management Key Functions Handoff Characteristics May take place between cell, subnet or domain Need to optimize the handoff delay and transient data loss ( e.g., end-todelay up to 200 ms, 3%-5% packet loss, jitter, for real-time VoIP traffic) May use soft-handoff feature of CDMA, but need fast-handoff mechanisms for other technologies (e.g., ) Need to support session based applications for TCP and RTP traffic Configuration Registration Should be configured within few milliseconds Configures IP address and other server parameters (e.g, DNS, SIP server, Gateway) Assist pre-session mobility Hierarchical nature will make the registration faster Helps location management functionality Quality of Service Location Management Need to maintain same QoS during its subnet/domain movement Allow user to maintain same URI irrespective of point of attachment
37 Mobility model Problem: In the absence of any formal mechanism it is difficult to predict or verify the systems performance of un-optimized handover or any specific handoff optimization technique Proposal Analyze the basic primitives of a handoff event Model the handoff-related processes as Discrete Event Dynamic Systems (DEDS) Deterministic Timed Transition Petri Net (DTTPN) to build various unoptimized mobility models and their associated optimization techniques Key advantages : This model can predict systems performance for optimized handoff operations This model can design optimal path for sequence of execution of events based on expected performance and resource constraints This model can verify systems behavior (e.g., deadlocks) during handover 37
38 Dependency analysis among handover operations Handoff Process Precedence Data it depends on Relationship P 11 Channel Discovery P 00 Signal-to-Noise Ratio value P 12 Subnet discovery P 21,P 22 Layer 2 beacon ID L3 router advertisement P 13 Server discovery P 12 Subnet address Default router address P 21 - Layer 2 association P 11 Channel number MAC address Authentication key P 22 - Router solicitation P 21, P 12 Layer 2 binding P 23 - Domain advertisement P 13 Server configuration Router advertisement P 31 Identifier acquisition P 23,P 12 Default gateway Subnet address Server address P 32 Duplicate address detection P 31 ARP Router advertisement P 33 Address resolution P 32, P 31 New identifier P 41 Authentication P 13 Address of authenticator P 42 Key Derivation P 41 PMK (Pairwise Master Key) P 51 Identifier update P 31,P 52 L3 Address Uniqueness of L3 address P 52 Identifier verification P 31 Completion of COTI P 53 Identifier mapping P 51 Updated MN address at CN and HA P 54 Binding cache P 53 New Care-of-address mapping P 61 Tunneling P 51 Tunnel end-point address Identifier address P 62 Forwarding P 51, P 53 New address of the mobile P 63 Buffering P 62, P 51 New identifier acquisition P 64 Multicasting/Bicasting P 51 New identifier acquisition 38
39 Backup Slides Burlingame, CA USA June
40 Characteristics of Next Generation Networks? Heterogeneous networks (CDMA, LTE, WiMAX, ) Access-independent converged IP network Order-of-magnitude increases in bandwidth MIMO, smart antennas Increase in video and other high bandwidth traffic New services and service enabling platforms (e.g., Web 2.0, SON) Large range of cell sizes, coverage areas PAN, LAN, WAN Pico-cellular, micro-cellular, cellular Changes in traffic and traffic patterns Rise in video on demand? Requires good high-bandwidth multicast
41 Results (II)
42 Cellular Access Characteristics Generation System Channel spacing Access type Uplink data rate 1G AMPS 30 khz FDMA N/A TACS 25 khz FDMA N/A NMT 25 khz FDMA N/A NTT 25 khz FDMA N/A 2G GSM 200 khz TDMA 9.6 kb/s PDC 30 khz TDMA 42 kb/s IS khz F/TDMA 48 kb/s IS-95 (A) 1.25 MHz F/CDMA 14.4 kb/s iden 25 khz F/TDMA 24 kb/s 2.5G GPRS 200 khz TDMA 45 kb/s EDGE 200 khz TDMA 236 kb/s IS-95 (B) 1.25 MHz F/CDMA 115 kb/s CDMA2000 1X 1.25 MHz CDMA 144 kb/s 3G UMTS/WCDM 5 MHz CDMA/TD 2 Mb/s A MA CDMA MHz CDMA 2 Mb/s 1xEV-DO 4G LTE 20 MHz OFDMA 50 Mb/s WiMAX 2.5 GHz OFDM 40 Mb/s UMB 5 MHz OFDMA 75 Mb/s
43 Handover: Distributed operation across multiple layers CN Discovery Detection Configuration Security Association p42 Binding Update p52 p54 Media Rerouting p61 Server (Proxy, /HA) p13 p23 p31 p32 p41 p42 p52 p51 p53 p54 p61 p63p64 p62 L3 PoA p12 p22 p31 p32 p33 p42 p51 p61 p62 L2 PoA p11 p21 p31 p41 p42 p51 p11 p12 p13 p21 p22 p23 p31 p32 p33 p41 p42 p51 p52 p61 MN Time
44 De-authentication Delay Layer 2 Handoff Delay (802.11) Station performing handoff Probe Delay MN Authentication Delay Re-association Delay (broadcast) Probe Request Probe Response Reassociation Request De-authentication Authentication Request Authentication Response Re-association Request Re-association Request Re-association Response All APs within range on all channels Chan 1 Chan N New AP Discovery Phase Active scanning MN probes AP Passive scanning AP sends beacons periodically Authentication Phase Open authentication Shared authentication i 4 way handshake Association Phase
45 Layer 2 Discovery Optimization General techniques: Reduce the scanning time Caching of ESSID Use of second interface specific discovery Proactive Discovery (no scanning) Proposed Solutions: Shin et al introduces selective scanning and caching strategy Montavont et al propose periodic scanning Velayos et al propose reduction of beacon interval and performs search in parallel with data transmission Brik et al propose to use a second interface to scan while communicating with the first interface u, k Forte and Schulzrinne Application Layer proactive discovery (e.g., Dutta et al)
46 Optimization techniques for layer 3 configuration Layer 3 address acquisition Proactive caching Duplicate Address Detection Optimistic DAD, Proactive DAD, Passive DAD, Router Assisted DAD NUD (Neighbor Unreachability Detection) Aggressive Router Selection Mobile Node Identifier Acquisition L3 PoA Server Layer 3 Configuration Layer 2 Duplicate Identifier Address Mapping Verification Network Server MN Mobile Node L3 POA Network
47 Security Optimization Security protocols have an impact on the performances of the network End-to-end latency Throughput Handoff delay Main components that affect the performance Authentication/authorization, Key Derivation, Encryption Security related delays may affect all the layers Layer 2 (e.g., i, WEP) Layer 3 (IPSEC/IKE) Upper Layers (e.g., TLS, SRTP) Server Layer 4 Layer 3 Security Association Layer 2 Key Distribution Authentication Encryption Mobile MN Server MN Network L3 POA
48 Optimizing Binding Update Techniques Reduce the latency due to longer binding update when the communicating host is far away Limit the binding update within a domain Proposed Solutions IDMP Regional registration-based Mobile IP HMIPv6 Anchor-based Application Layer B2BUA Proactive Binding Update Binding Update Tunneling Mapping Caching Anchor Point CN Mobile Network Anchor Mobile CN
49 PSTN CDMA2000 An example Home Agent FA1 FA2 GMSC PDSN1 L3 PoA PDSN2 L3 PoA AC HLR VLR PCF1 PCF3 PCF4 PCF2 MSC BSC1 BSC2 BSC3 BSC4 BTS1 L2 PoA BTS3 L2 PoA A B C D E F
50 Optimized handoff delay with MPA (Multiple I/F) Handoff Delay CDMA ~ 18 s a. MIP-based Non-optimized handoff CDMA Handoff Delay CDMA 16 s c. MPA and assisted optimized handoff b. SIP-based Non-optimized handoff
51 Several concepts of mobility Terminal mobility, e.g., supported by Mobile IP CH Subnet 1 IP-based Network Subnet 2 MH Typically, you don t just have terminals CH IP-based Network Subnet 2 Users/Persons Subnet 1 Sessions Mobility of users, sessions? MH
52 Personal Mobility: Registration registrar CH IP-based Network Subnet 2 Subnet 1 person@subnet2.org registrar When lady in red moves, she leaves her laptop behind CH IP-based Network Subnet 2 Uses another machine Logs in Subnet 1 User registration performed
53 Personal Mobility: simultaneous registration of multiple bindings CH Subnet 1 Registrar & proxy IP-based Network When lady in red moves, she leaves her laptop behind Uses another machine She can still be located person@subnet1.org person@subnet2.org Subnet 2 CH Subnet 1 person@subnet1.org person@subnet2.org Registrar & proxy IP-based Network Subnet 2
54 Session Mobility INVITE 2 3 CH IP-based Network Subnet 2 1 Subnet 1 MH CH IP-based Network Subnet 2 Subnet 1
55 Mobike-based solution
56 Service Mobility Service Mobility allows a roaming user to get the same view of the network as when he is at home At the time of registration User s service profile is retrieved from the home network The service profile is shared with the responsible entity at home and in the foreign network (wholly or partially) The foreign network provides some of the service required The home network still retains responsibility for other services Examples of entries in the profile of interest may be address book, call handling features, buddy lists, etc.
Mobility Management for Next Generation Wireless Internet
Mobility Management for Next Generation Wireless Internet Ashutosh Dutta, Ph.D. Senior Scientist NIKSUN Innovation Center Princeton New Jersey, 08540 Email: adutta@niksun.com 1 Outline Evolution of mobility
More informationOptimal Service Delivery in Mobile Networks
Optimal Service Delivery in Mobile Networks Ashutosh Dutta, Ph.D. Senior Scientist NIKSUN Princeton, NJ, USA 08540 Email: adutta@niksun.com WWSMC 11, NJ USA, July 2011 1 A name identifies what you want,
More informationQoS SIG Presentation. QoE Measurements In A SeON Framework. Date: December 14, Dr. Parag Pruthi NIKSUN Dr. Ashutosh Dutta NIKSUN
QoS SIG Presentation QoE Measurements In A SeON Framework Dr. Parag Pruthi NIKSUN Dr. Ashutosh Dutta NIKSUN Date: December 14, 2010 Copyright 2010 GISFI. All Rights Reserved. QoE => Perceived Quality of
More informationMobility Protocols and Handover Optimization
Mobility Protocols and Handover Optimization April 16 2018, Denver Section, ComSoc Chapter Speaker: Ashutosh Dutta, Ph.D. Founding Co-Chair IEEE 5G Initiative Director Industry Outreach New Jersey Email:
More informationDimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations. Mobile Telephony Networks
Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations Mobile Telephony Networks 1 The Evolution of Mobile Telephony 1st Generation 2nd 3rd 4th Analogue Voice
More informationDAY 2. HSPA Systems Architecture and Protocols
DAY 2 HSPA Systems Architecture and Protocols 1 LTE Basic Reference Model UE: User Equipment S-GW: Serving Gateway P-GW: PDN Gateway MME : Mobility Management Entity enb: evolved Node B HSS: Home Subscriber
More informationMobile Communications
DSMIPv6, 802.21 1 Mobile Communications IEEE and 3GPP Approaches to Macro-Mobility Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto How does the Dual Stack MIPv6 work? DSMIPv6, 802.21
More informationGPRS and UMTS T
GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,
More informationMobile Network Evolution Part 2
Mobile Network Evolution Part 2 From UMTS to LTE or How to Further Increase Network Capacity and QoS Andreas Mitschele-Thiel Advanced Mobile Communication Networks 1 Outline Evolution from Circuit Switching
More informationKeywords: IEEE , Heterogeneous Handover, Seamless Mobility, Media Independent Pre-authentication
Secured Seamless Convergence across Heterogeneous Access Networks Ashutosh Dutta, Subir Das, David Famolari Telcordia Technologies, NJ Yoshihiro Ohba, Kenichi Taniuchi, Victor Fajardo, Toshikazu Kodama
More informationIntroduction to Wireless Networks. Chapter 7: Introduction to Heterogeneous Networks and
Introduction to Wireless Networks Chapter 7: Introduction to Heterogeneous Networks and ALL-IP Networks Prof. Yuh-Shyan Chen Department t of CSIE National Taipei University Outline Trend on Wireless/Cellular
More informationConvergence WLAN/CDMA Architecture. CDG Technology Forum October 7, 2005
Convergence WLAN/CDMA Architecture CDG Technology Forum October 7, 2005 Outline Introduction and Network Architecture Key elements to enable WLAN/CDMA services Access control Mobility management Summary
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Wireless Networks Cellular & Mobility Sec 7.4 7.8 Lina Battestilli 7.1 Introduction Wireless Chapter 7 Outline Wireless and Mobile Networks 7.2 Wireless
More information2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.
3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to IP Mobility Session 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda IP Mobility Overview Terminology
More informationGTP-based S2b Interface Support on the P-GW and SAEGW
GTP-based S2b Interface Support on the P-GW and SAEGW This chapter describes the GTP-based S2b interface support feature on the standalone P-GW and the SAEGW. Feature, page 1 How the S2b Architecture Works,
More informationMobile IPv6 performance in networks: handover optimizations on the link and network layer
Mobile IPv6 performance in 802.11 networks: handover optimizations on the link and network layer LaTe project, Networking laboratory, TKK Mikko Hautala mhautala@cc.hut.fi 16.03.2006 Supervisor: Instructor:
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Background: # wireless (mobile) phone subscribers
More informationIEEE Assisted Network Layer Mobility Support
IEEE802.21 Assisted Network Layer Mobility Support Qazi Bouland Mussabbir *, Wenbing Yao ** and John Cosmas *** *School Of Engineering and Design, Brunel University Uxbridge, London, UB83PH, UK, qazi.mussabbir@brunel.ac.uk
More informationMulti-RAT Heterogeneous Networks. Presenter: S. Vasudevan, Technical Manager, Advanced Technology Standards
Multi-RAT Heterogeneous Networks Presenter: S. Vasudevan, Technical Manager, Advanced Technology Standards What are Multi-RAT Heterogeneous Networks Integrated Networks supporting a range of cell sizes
More informationEvolution to A Common Core
Evolution to A Common Core Interworking Access Networks Mike Dolan April 2008 Outline Current Situation Multiple Core Networks Commonality at the Application Layer, IMS Converging on a Common Core Network
More information3GPP TS V8.4.0 ( )
TS 23.327 V8.4.0 (2009-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Mobility between -Wireless Local Area Network (WLAN) interworking
More informationOverview of the Cisco Mobile Wireless Home Agent
CHAPTER 1 Overview of the Cisco Mobile Wireless Home Agent This chapter illustrates the functional elements in a typical CDMA2000 packet data system, the Cisco products that are currently available to
More informationINTRODUCTION TO LTE. ECE MOBILE COMMUNICATION Monday, 25 June 2018
INTRODUCTION TO LTE ECE 2526 - MOBILE COMMUNICATION Monday, 25 June 2018 1 WHAT IS LTE? 1. LTE stands for Long Term Evolution and it was started as a project in 2004 by the Third Generation Partnership
More informationWireless Data-Introduction p. 1 Wireless Voice p. 2 Fixed Minimum Bandwidth p. 2 Vague Definition of Service Quality p. 3 Delay Requirements p.
Preface p. xxv Acknowledgments p. xxix Wireless Data-Introduction p. 1 Wireless Voice p. 2 Fixed Minimum Bandwidth p. 2 Vague Definition of Service Quality p. 3 Delay Requirements p. 4 Wireless Local Area
More informationAdvanced Computer Networks. Mobility Support
Advanced Computer Networks 263 3501 00 Mobility Support Patrick Stuedi Spring Semester 2013 Oriana Riva, Department of Computer Science ETH Zürich Last Week WLAN/802.11 Architecture (Infrastructure / Ad
More informationELEC-E7230 Mobile Communication Systems
ELEC-E7230 Mobile Communication Systems Lecture 1 Prof. Tarik Taleb School of Electrical Engineering Aalto University Work Plan Content Mobile Network Architectures Evolution MN Arch. Evolution: 2G to
More informationWireless technologies Testers. WLAN traffic offload bypass for crowded mobile networks
Wireless technologies Testers traffic offload bypass for crowded mobile networks 10 traffic offload the rerouting of mobile data traffic to networks is an interesting alternative for network operators
More informationOverview of the Cisco Mobile Wireless Home Agent
1 CHAPTER Overview of the Cisco Mobile Wireless Home Agent This chapter illustrates the functional elements in a typical Mobile IP packet data system, the Cisco products that are currently available to
More informationNetwork Security: WLAN Mobility. Tuomas Aura CS-E4300 Network security Aalto University, Autumn 2017
Network Security: WLAN Mobility Tuomas Aura CS-E4300 Network security Aalto University, Autumn 2017 Outline Link-layer mobility in WLAN Password-based authentication for WLAN Eduroam case study 2 LINK-LAYER
More informationCellular Networks and Mobility
Cellular Networks and Mobility Daniel Zappala CS 460 Computer Networking Brigham Young University Cellular Networks GSM 2G/3G Architecture 3/20 2G Standard 4/20 GSM: combined FDM/TDM divide into 200 khz
More informationSYSTEM ARCHITECTURE WITH E-UTRAN -- 3GPP ACCESS NETWORKS
SYSTEM ARCHITECTURE WITH E-UTRAN -- 3GPP ACCESS NETWORKS K. Ravi 1, Dr. Mohammed Ali Hussain 2, M. Ramanakar 3 1 Asst.Professor, Dept. of Informatics, Alluri Institute of Management Sciences, Warangal,
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration
More informationIxLoad EPC Wi-Fi Offload Testing
IxLoad EPC Wi-Fi Offload Testing Mobile network traffic is growing exponentially, and service providers must manage their networks efficiently to meet consumer demand. Wi-Fi, one of the small cell technologies,
More informationWiFi Integration in Evolution to 5G networks. Satish Kanugovi WiFi Knowledge Summit, Bangalore March 9, Nokia 2018
WiFi Integration in Evolution to 5G networks Satish Kanugovi (satish.k@nokia.com) WiFi Knowledge Summit, Bangalore March 9, 2018 1 Nokia 2018 Outline Integrating WiFi Access into the 5G Core Multi-Access
More informationNetwork Architectures for Evolving 3G LTE and Mobile WiMAX
Network Architectures for Evolving 3G LTE and Mobile WiMAX All-IP networking is the ultimate goal of 4G mobile networks, but 3G LTE and mobile WiMAX systems have designed semi all-ip network architectures
More informationChapter 17. Wireless Network Security
Chapter 17 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s, to develop a protocol & transmission specifications for wireless LANs (WLANs) Demand
More informationMobile Network Evolution Part 2
Mobile Network Evolution Part 2 From UMTS to LTE or How to Further Increase Network Capacity and QoS Andreas Mitschele-Thiel Advanced Mobile Communication Networks 1 Outline Evolution from Circuit Switching
More informationWireless Network Security
Wireless Network Security Wireless LAN Security Slide from 2 nd book 1 802.11 Wireless LAN Security Stations in LAN are connected physically while in WLAN any station in the radio range is connected, so
More informationDistributed mobility management
Distributed mobility management for Future Internet H. Anthony Chan Huawei Technologies h.a.chan@ieee.org Internet Core network: converge (cellular and Internet no more IPv4 blocks available) Access networks:
More informationMobile IPv6 Operations Explored
Mobile IPv6 Operations Explored U.S. IPv6 Summit 2003 December 8-118 2003 Carl Williams NAv6TF Steering Committee and IPv6 Forum Technical Directorate carlw@mcsr-labs.org labs.org IPv6 Mobility/wireless
More informationTelecom Learning. Technology
Telecom Learning Technology LTE Modules S. No. LTE Module Course Content LTE Overview LTE /EPS Network Architecture 1 LTE Basics LTE/EPS Mobility & Session Mgmt LTE Air Interface LTE Air Interface LTE-RF
More informationETSI TS V ( )
TS 123 327 V12.0.0 (2014-09) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Mobility between 3GPP-Wireless Local
More informationRequirements and best practices for enabling Enhanced PTT over Wi-Fi networks
Requirements and best practices for enabling Enhanced PTT over Wi-Fi networks The following guide is intended for users of Enhanced PTT to ensure that their Wi-Fi networks meet minimum requirements for
More informationOverview of IEEE Networks. Timo Smura
Overview of IEEE 802.11 Networks Timo Smura 24.03.2004 Outline Introduction IEEE 802.11 standards Protocol model Network topologies 802.11 MAC layer 802.11 PHY layers Interoperability: Wi-Fi Alliance 3GPP
More informationTopic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationWireless and Mobile Networks 7-2
Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationConfiguring Hybrid REAP
13 CHAPTER This chapter describes hybrid REAP and explains how to configure this feature on controllers and access points. It contains the following sections: Information About Hybrid REAP, page 13-1,
More informationCSC 4900 Computer Networks: Mobility
CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping
More informationMobile IPv6. Washington University in St. Louis
Mobile IPv6 Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationLast time?! Block 3: Lecture 1! Wireless networks! Ingredients 2: Antennas! Ingredients 1: Mobile Phones, PDAs & Co.! 20/05/14. Part 3: lecture 3!
20/05/14 Last time? WiFi Block 3: Lecture 1 Part 3: lecture 3 Wireless s Speed and ranges and channels Specifications DCF mechanisms WiMax Mobile s Ingredients 1: Mobile Phones, PDAs & Co. Ingredients
More informationT Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.
T-0.50 Computer Networks II Mobility Issues 6.0.008 Overview Mobile IP NEMO Transport layer solutions i SIP mobility Contents Prof. Sasu Tarkoma Mobility What happens when network endpoints start to move?
More informationIntroduction to Mobile Broadband (imb)
Introduction to Mobile Broadband (imb) Teaching By Asst.Prof.Dr. Suwat Pattaramalai suwat.pat@kmutt.ac.th Tel. 02-470-9079 Material: http://webstaff.kmutt.ac.th/~suwat.pat/ 3GPP WiMAX FORUM Introduction
More informationAdvanced Computer Networks. IP Mobility
Advanced Computer Networks 263 3501 00 IP Mobility Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Tuesday 1 April 2014 Outline Last week: Today: Cellular Networks
More informationPMIPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS. Proxy Mobile IPv6. Peter R. Egli INDIGOO.COM. indigoo.
PMIPv6 PMIPv6 Proxy Mobile IPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS Peter R. Egli INDIGOO.COM 1/25 Contents 1. Why PMIPv6 when we have MIP? 2. PMIPv6 terminology
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More informationIPv6 in Mobile Networks and IMS Ericsson NEA Toshikane Oda
IPv6 in Mobile Networks and IMS 2009-02-25 Ericsson NEA Toshikane Oda Outline 1. Growth of Mobile Broadband Markets 2. Evolution of Mobile Packet System 3. IMS for Converged IP Multimedia Services 4. EU
More informationOverview of Mobile Networking Initiatives at WINLAB
Overview of Mobile Networking Initiatives at WINLAB Introduction: The Next Generation MSC Custom Mobile Infrastructure (e.g. GSM, 3G) BTS Public Switched Network (PSTN) BSC GGSN, etc. WLAN Access Point
More informationMobility Testbed for 3GPP2-Based Multimedia Domain Networks
IP MULTIMEDIA SUBSYSTEMS Mobility Testbed for 3GPP2-Based Multimedia Domain Networks Ashutosh Dutta, Kyriakos Manousakis, Subir Das, and Fuchun J. Lin, Telcordia Technologies Tsunehiko Chiba, Hidetoshi
More informationWLAN Roaming and Fast-Secure Roaming on CUWN
802.11 WLAN Roaming and Fast-Secure Roaming on CUWN Contents Introduction Prerequisites Requirements Components Used Background Information Roaming with Higher-Level Security WPA/WPA2-PSK WPA/WPA2-EAP
More informationCDMA Evolution Delivering Real-time & Multimedia Services
CDMA Evolution Delivering Real-time & Multimedia Services May 2006 3G CDMA Latin America Regional Conference, Brazil 2 Nortel Confidential Information Wireless Trends Access & Core Greater Market Penetration
More informationAn Experimental Study of Location Assisted Proactive Handover
An Experimental Study of Location Assisted Proactive Handover A. Dutta, S. Chakravarty c, K. Taniuchi b, V. Fajardo b,y. Ohba b, D. Famolari a, H. Schulzrinne c a Telcordia Technologies b Toshiba America
More informationIP micro-mobility protocols
IP micro-mobility protocols Pierre Reinbold University of Namur Belgium pre@info.fundp.ac.be http://www.infonet.fundp.ac.be Olivier Bonaventure Université Catholique de Louvain (UCL), Belgium Bonaventure@info.ucl.ac.be
More informationWireless systems overview
Wireless systems overview Evolution of systems from 1G to 4G 1G, 4G major features Specifications comparison 5G communication systems Summary Wireless Systems 2016 Evolution of cellular networks WiMAX
More informationWireless Security Background
Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless
More informationChapter 3: Wireless and Mobile Networks
Computer Network Architectures and Multimedia Guy Leduc Chapter 3 Wireless and Mobile Networks Chapter 7 of Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationMobile Broadband Communications
Mobile Broadband Communications (WiMAX & LTE) Teaching By Asst.Prof.Dr. Suwat Pattaramalai suwat.pat@kmutt.ac.th Tel. 02-470-9079 3GPP WiMAX FORUM Mobile Broadband Communications Contents Part I Fundamentals
More informationLatest Mobile Radio Services and Associated R&D Activities
Latest Mobile Radio Services and Associated R&D Activities Hideyuki Shinonaga KDDI R&D Laboratories (shinonaga@kddilabs.jp) Ohara 2-1-15, Kamifukuoka, Saitama, 356-8502, Japan Sep.26, 2002 1 CDMA2000 1x
More informationSeamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism
Seamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism Bharatesh Chakravarthi S. B M.Tech. Dept of ISE The Oxford College of Engineering Bangalore, India Prof. D. Jayaramaiah
More informationStatus of IMS-Based Next Generation Networks for Fixed Mobile Convergence
Status of IMS-Based Next Generation Networks for Fixed Mobile Convergence Prepared for: WOCC 2007 Fuchun Joseph Lin Chief Scientist fjlin@research.telcordia.com Telcordia Technologies, Inc. April 28, 2007
More informationIntegration of and Third-Generation Wireless Data Networks
Integration of 802.11 and Third-Generation Wireless Data Networks Milind M. Buddhikot mbuddhikot@bell-labs.com Center for Networking Research Lucent Bell Labs Research Outline Current Trends and Rationale
More informationWiMAX Overview. Parviz Yegani Cisco Systems IETF-64 Nov. 7-11, 2005 Vancouver, Canada. Session Number Presentation_ID
WiMAX Overview Parviz Yegani Cisco Systems pyegani@cisco.com IETF-64 Nov. 7-11, 2005 Vancouver, Canada Session Number 1 Outline WiMAX NWG Goals Network Reference Model Reference Points and Interfaces NWG
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationCHAPTER 2 THE BASIC TECHNOLOGY OF WIRELESS NETWORKS
11 CHAPTER 2 THE BASIC TECHNOLOGY OF WIRELESS NETWORKS This chapter explains with the evolution of mobile communication systems from the 1G analog communication networks to the 4G broadband converged networks.
More informationCSC 4900 Computer Networks: Wireless Networks
CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission
More informationCS 332 Computer Networks Wireless Networks
CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationMSF Non-3GPP EPS Access Tile. MSF Architecture for Non-3GPP Evolved Packet System (EPS) Access Tile. MSF-LTE-ARCH-non3GPP-EPS-FINAL
MSF Architecture for Non-3GPP Evolved Packet System (EPS) Access Tile MSF-LTE-ARCH-non3GPP-EPS-FINAL MultiService Forum Architectural Framework Contribution Number: File Name: Document Filename: Working
More informationMobility in IPv6 Networks
Mobility in IPv6 Networks o Mobility Paradigm o Mobile IPv4 IPv6 o Basic MIPv6 o Handover, Security o Temporal Optimisation VCoIP in Praxis VCoIP in Praxis VCoIP in Praxis IP Mobility Approaches o Application:
More informationLTE Training LTE (Long Term Evolution) Training Bootcamp, Crash Course
LTE Training LTE (Long Term Evolution) Training Bootcamp, Crash Course Why should you choose LTE Training? LTE Training is an intensive learning experience that cover the essential elements of Long Term
More informationIEEE C /08
2003-01-10 IEEE C802.20-03/08 Project Title IEEE 802.20 Working Group on Mobile Broadband Wireless Access A Vision of an IP-based Cellular Network Date Submitted
More informationWireless and mobile Internet. ToC. Introduction. Institut National des Télécommunications Département LOR
Wireless and mobile Internet hakima.chaouchi@int-evry.fr Institut National des Télécommunications Département LOR Hakima CHAOUCHI Wireless and mobile Internet 1 ToC Introduction Internet and Wireless networks
More informationA+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks
More informationBasic SAE Management Technology for Realizing All-IP Network
LTE SAE EPC Special Articles on SAE Standardization Technology Basic SAE Management Technology for Realizing All-IP Network The standardization of 3GPP Release 8 brings new provisions for All-IP networks
More informationRoute Optimization for Proxy Mobile IPv6 in IMS Network
Route Optimization for Proxy Mobile IPv6 in IMS Network Tsunehiko Chiba, Hidetoshi Yokota KDDI R&D Laboratories, Inc. Saitama, Japan Ashutosh Dutta, Dana Chee Telcordia Technologies, Inc. New Jersey, USA
More informationAddressing Current and Future Wireless Demand
Addressing Current and Future Wireless Demand Dave Wolter Executive Director Radio Technology AT&T Architecture and Planning Rising Demand and The Need to Innovate in the Network 6,732% growth over 13
More informationConfiguring Layer2 Security
Prerequisites for Layer 2 Security, page 1 Configuring Static WEP Keys (CLI), page 2 Configuring Dynamic 802.1X Keys and Authorization (CLI), page 2 Configuring 802.11r BSS Fast Transition, page 3 Configuring
More informationMobile IPv6. Raj Jain. Washington University in St. Louis
Mobile IPv6 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 13-1 Overview! IPv6:
More information3GPP TS V8.9.0 ( )
TS 23.402 V8.9.0 (2010-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Architecture enhancements for non- accesses (Release 8)
More informationOverview of the Cisco Mobile Wireless Home Agent
CHAPTER 1 Overview of the Cisco Mobile Wireless Home Agent This chapter illustrates the functional elements in a typical Mobile IP packet data system, the Cisco products that are currently available to
More informationWISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac
WISNETWORKS User Manual V1.1 2016/3/21 Software version 1.0.0021 Table of contents 1. Setup& WMI... 3 1.1 Hardware Setup... 3 1.2 Web Management Interface... 3 2. Status... 4 2.1 Overview... 4 2.1.1 System...
More informationMobility: vocabulary
What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,
More informationVertical Handoff Characterization for SIP and msctp Based UMTS-WLAN Integration Solutions
Vertical Handoff Characterization for SIP and msctp Based UMTS-WLAN Integration Solutions Syed Asadullah, Ashraf S. Mahmoud, Marwan Abu-Amara, Tarek Sheltami Computer Engineering Department King Fahd University
More information3GPP TS V8.0.0 ( )
TS 23.402 V8.0.0 (2007-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Architecture enhancements for non- accesses (Release 8)
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationRab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology
Cellular Systems - II Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication UMTS Architecture A UMTS network consist
More informationDistributed or Centralized Mobility?
Distributed or Centralized Mobility? Philippe Bertin, Servane Bonjour Orange Labs Cesson-Sévigné, France {firstname.name}@orange-ftgroup.com Jean-Marie Bonnin TELECOM Bretagne Cesson-Sévigné, France jm.bonnin@telecom-bretagne.eu
More informationArchitectures of Next Generation Wireless Networks. Pascal LORENZ.
Architectures of Next Generation Wireless Networks lorenz@ieee.org Internet is increasing exponentially: 2001: 180 million users today: more than 2 billions users Internet traffic and the bandwidth double
More informationMOBILITY AND SERVICE MANAGEMENT FOR FUTURE ALL-IP BASED WIRELESS NETWORKS
MOBILITY AND SERVICE MANAGEMENT FOR FUTURE ALL-IP BASED WIRELESS NETWORKS Weiping He Preliminary Research Document submitted to the Faculty of the Virginia Polytechnic Institute and State University in
More information