Optimal Service Delivery in Mobile Networks

Size: px
Start display at page:

Download "Optimal Service Delivery in Mobile Networks"

Transcription

1 Optimal Service Delivery in Mobile Networks Ashutosh Dutta, Ph.D. Senior Scientist NIKSUN Princeton, NJ, USA WWSMC 11, NJ USA, July

2 A name identifies what you want, An address identifies where it is, and An route identifies a way to get there John Shoch, 1978

3 Talk Outline Evolution of Mobile Networks Service Delivery in Mobile Networks A taxonomy of IP mobility Handoff optimization Use case scenarios Measurement-based mobility model Conclusions. 3

4 Evolution of mobility protocols 1 G 2 G 2.5 G 3 G 4 G IEEE TACS 80 Mb/s (UL), 360 Mb/s GSM GPRS EDGE NMT 9.6 kb/s 54 kb/s 236 kb/s JTACS NTT PDC 42 kb/s WCDMA 144 kb/s, 384 kb/s, 2 Mb/s 80 Mb/s EHSPA IS Mb/s (DL), 22 Mb/s (UL) AMPS SMR 48.6 kb/s IS-95 (A) 9.6 kb/s iden 24 kb/s IS-95 (B) 115 kb/s CDMA2000 1X 144 kb/s CDMA2000 NX 144 kb/s, 384 kb/s, 2 Mb/s UMB 280 Mb/s LTE 50 UL, 100 DL

5 Mobile Wireless Internet: A Scenario Domain1 WAN Internet Domain2 PSTN gateway UMTS/ CDMA Bluetooth a/b/g WAN a/b/g IPv6 Network PAN LAN LAN Hotspot PSTN Roaming User CH UMTS/CDMA Network Ad Hoc Network

6 Service Delivery Metrics QoE => Perceived Quality of Service Network Metrics Bit rate, delay, jitter, packet loss rate Power consumption Application Metrics Call setup delay Failed calls, dropped calls, retransmission MOS (Mean Opinion Score) for media Several standards groups ITU-T SG12 ITU X.902 (IP Telephony) IETF IPPM, DIFFSERV 3GPP 3GPP TS (IMS performance) Slide 6

7 Mobility Taxonomy IP Mobility Personal Terminal Service Session Issues Mobility pattern NetworkTransport Layer Layer MIPv4 Cellular IP HAWAII IDMP MIP-LR MIPV6 ProxyMIPv6 MSOCKS, Migrate msctp Shim Layer HIP Application Layer SIPMM MIP-LR(M) Proxy Systems Optimization Host controlled vs. Network Controlled

8 Use Case: Cross layer and multiple interfaces Zone 1 Zone 2 Zone 3 Ne tw or k Ty pe GS M d S SI D/ C ell ID Connect to WLAN N A B S SI D N/ A N A Op er at or AT &T T- Mo bile Se cu rit y N W C ha nn el NA NA 1 9 PK M EAP- PEA P Q o S N / A Y e s Ph ysi cal La yer Dat a Rat e N/A 9.6 kbps OF DM 40 Mbp s Wakeup WLAN Download over WLAN Shutdown GPS Wi-Fi Wi-Fi Zone 4 Zone 5 Zone 6 Airport WLAN Link Going Down. Radio State Café GSM Shutdown GPS Start Download over WLAN Switch to WiMAX Download over WiMAX Shutdown WLAN Wakeup GPS Wakeup WLAN Battery level low Shutdown WiMAX Download over GSM/GPRS Zone 7 Wi-MAX Zone 8 Wi-MAX Zone 9 Network Type SSID/ Cell ID BSSID Operator Security NW EAP Channel QoS Physical Type Layer Data Rate GSM N/A AT&T NA NA 1900 N/A N/A 9.6 Kbps kbps b Airport Café 00:00: Airport Café.11i EAP- PEAP Courtesy: IEEE WLAN WiMAX GPS 6.11e OFDM 11 Mbps

9 Mobility Illustration in a sample IP-based network Administrative Domain B Registration Agent Authorization Agent Authorization Agent Administrative Domain A Registration Agent Signaling Proxy L2 PoA L2 PoA Authentication Agent Configuration Agent L3 PoA D L3 PoA N1 N2 Backbone Configuration Agent N1- Network 1 (802.11) N2- Network 2 ( CDMA/GPRS) Authentication Agent Layer 3 PoA N2 N1 C Signaling Proxy L3 PoA B A Layer 2 PoA IP ch Corresponding Host Layer 2 PoA Mobile Host Handoff Delay CDMA ~ 18 s ms media interruption h/o delay 900 ms h/o delay 18 s 18 Seconds media interruption 4 Seconds media interruption h/o delay 4 s 9

10 System decomposition of handover process Handover Event P1 P2 P3 P4 P5 P6 Network discovery & selection Network attachment Configuration Security association Binding update Media reroute P11 Channel discovery P13 Server discovery P12 Subnet discovery P21 L2 associatio n Domain Advertisement P22 P23 Router solicitation P31 Identifier acquisition P32 P33 Duplicate Address Detection Address Resolution P41 Authentication (L2 and L3) P42 Key derivation P51 P52 Identifier update Identifier Verification P53 Identifier mapping Binding cache Tunneling P54 P61 P63 Buffering P62 Forwarding P64 Bi-casting/ Multicasting 10

11 How security affect handoff performance Security protocols have an impact on the performances of the network End-to-end latency Throughput Handoff delay Packet loss Main components that affect the performance Authentication/authorization, Key Derivation Encryption Security related delays may affect all the layers Layer 2 (e.g., i, WEP) Layer 3 (IPSEC/IKE) Upper Layers (e.g., TLS, SRTP) Server Layer 4 Layer 3 Security Association Layer 2 Key Distribution Authentication Encryption Mobile MN Server MN Network L3 POA

12 Key principles for security optimization Number of round trip signaling for key derivation process need to be minimized Avoid the key exchange by maintaining the end-point address identifier (e.g., IP address) Avoid tear down and re-establishment of Security Association (e.g., IPSec Tunnel) Proactive authentication Fast re-authentication Security context transfer between the base stations Cross layer assisted authentication Layer 3 authentication bootstraps layer 2 authentication process Anchor-based security association Clients behind Mobile IP Home Agent are shielded from IP address change

13 Media Independent Pre-authentication - a deployment scenario AR Network 4 Information Server INTERNET CN Network 3 Current Network 1 AR AP1 TN AA Network 2 MN-CA key CA AP2 AR AR CTN MN-CA key AA CA AP3 AP1 Coverage Area Mobile AP 2 & 3 Coverage Area CTN Candidate Target Networks TN Target Network

14 Network-Layer Assisted Pre-Authentication Supports handover across intertechnology, inter-subnet and inter-domain Radius/Diameter Home AAA Domain AAAh Independent of link-layer technology (e.g., , CDMA) No context transfer security problems (e.g. no domino effect) Roaming AAA Domain* nar/paa PSK Network A PSK Association & 4-way handshake AP2 AAAv PANA pre-auth AP /24 par / /24 AP0 Network B MN IEEE i Pre-authentication PANA Pre-authentication

15 Network Pre-authentication Flows PaC Network-Layer Pre-authentication PaC s Movement Pre-configuration PSKx 4-way hanshake current APx target APx target PAA AAAv AAAH Associated PANA-Client-Initiation(PCI) PANA-Start-Request (PSR) [EAP Req/Ident] PANA-Start-Answer(PSA) [EAP Resp/Ident] PANA-Auth-Request (PAR) [EAP-TLS/Start] PANA-Auth-Answer (PAN) [EAP-TLS/Client-Hello] PANA-Auth-Request (PAR) [EAP-TLS/ServCert] PANA-Auth-Answer (PAN) [EAP-TLS/ClientCert] PANA-Auth-Request (PAR) [EAP-TLS/ChangeSpec] PANA-Auth-Answer (PAN) [EAP-TLS/Ack] PANA-Binding-Request[AUTH] (PBR) (EAP-Success) PANA-Binding-Answer (PBA) Non-roaming Roaming AAA prot-req (EAP-Resp/Ident) AAA prot-ans (EAP-TLS/Start) AAA prot-req (EAP-TLS/Client-Hello) AAA prot-ans (EAP-TLS/ServCert) AAA prot-req (EAP-TLS/ClientCert) AAA prot-ans (EAP-TLS/ChangeSpec) AAA prot-req (EAP-TLS/Ack) AAA prot-ans (EAP-Success) SNMPv3-Set(PSK, PaC s MAC address) SNMPv3-Ack PSK (Re)Association PSKx installation EAP skipped EAPOL Key: Message 1 EAPOL Key: Message 2 EAPOL Key: Message 3 EAPOL Key: Message 4 1x controlled port enabled & IP traffic

16 Performance (MPA-Non-MPA) Single I/F MPA No packet loss during pre-authentication, pre-configuration and pro-active handoff before L2 handoff Only 0 packet loss, 4 ms delay during handoff mostly transient data Includes delay due to layer 2, update to delete the tunnel on the router We also reduced the layer 2 delay in hostap Driver L2 delay depends upon driver and chipset MPA Approach handoff 4 s non-mpa About 200 packets loss, ~ 4 s during handover Includes standard delay due to layer 2, IP address acquisition, Re-Invite, Authentication/Authorization Could be more if we have firewalls also set up Non-MPA Approach

17 Optimized handoff delay with MPA (Multiple I/F) Handoff Delay CDMA ~ 18 s a. MIP-based Non-optimized handoff CDMA Handoff Delay CDMA 16 s c. MPA and assisted optimized handoff b. SIP-based Non-optimized handoff

18 Triple Encapsulation for Mobile VPN Internal (protected) External (unprotected) CN i-ha i-mip tunnel VPN GW VPN tunnel x-ha x-mip tunnel External Network 1 External Network N Internal Home Network Internal Visited Network DMZ MN MN MN MN Based on its current location, MN dynamically establishes/changes/terminates tunnels without changing current standards of IPsec VPN or Mobile IP. Triple encapsulation tunnel is constructed by: i-ha (Internal Home Agent): Forwards IP packets to MN s current internal location VPN GW: Protects (encrypts and authenticates) IP packets transmitted in external networks x-ha (External Home Agent): Forwards IP packets to MN s current external location

19 RTP S equence RTP S equence RTP Packet Sequence Results: Mobile IP-VPN Non-M a ke -be fore -bre a k RTP S equenc e Cellular Secured Handoff RTP sequence during handoff Non -m ake -b efore -break (e nterpris e) Cellular Packet Loss Due to Non -make-before -break (en te rprise ) Tim e in S e conds Cellular (enterprise) (enterprise) Out-of-order-packet Time in Seconds Hand-off with no-make-before break (internal-external-internal) with make-before-break CN VPN GW MN VPN traffic in VPN traffic in cellular Hom e-cellular-hots pot handoff RTP S equenc e Cellular External Hotspot Home T im e in S e co n d s RTP Tunnel (RTP) MOBIKE MOBIKE MOBIKE MOBIKE Visited Network 1 (Cellular) Mobike in cellular Mobike in IP0 address of interface IP1 address of cellular interface IP0 is primary address Visited Network ( is up) (802.11) (First packet on ) IP1 is primary address (Last packet on cellular) (Last packet on ) IP0 is primary address Packet Visited Network Loss (Cellular) (No-Break-before-make) Home-external-external handoff Mobike-based handoff (cellular-hotspot-cellular)

20 Handoff Optimization in IMS/MMD Network AAA/HSS Optimization HSS non-sip AS AAA HA S-CSCF SIP AS Non-SIP support non SIP IMS/ MMD I-CSCF E-CSCF Different Domain cdma2000 PCRF DHCP PDSN RAN P-CSCF IPSec Tunnel cdma200 0 PCRF DHCP PDSN RAN P-CSCF IPSec Tunnel FTTH /ADSL AP PCRF DHCP P-CSCF Optimized roaming architecture MN MN P-CSCF Fast handoff 20

21 Types of Handoff P-CSCF Fast-handoff Experimental Results Components Optimized PPP Termination Non-Optimized Layer 2 Delay Reactive Proactive PPP Activation MIP-Solicitation MIP-Binding Update DHCP Trigger DHCP Inform SIP Trigger SIP+Security Media Redirection Time in ms Components Optimized Figure 1: Levels of MMD Optimization 21

22 Optimal mobility system design Scheduling of handover operations Relevant optimization principles SIP-based Fast handoff Mobile VPN Example experimental mobility optimization Media Independent Pre-authentication Simultaneous Mobility Optimized handoff In IMS Muti-layer Mobility Multicast fast handoff Potential Target Mobility System Sequential Direct path between CH and MH Limit binding update between CH and MH X X X Maintain Security association between end-points X Anchor-based Forwarding X X Post-handoff triggers X Proactive Pre-handoff triggers X X Proactive network discovery X Proactive authentication X Proactive identifier configuration X Proactive binding update X X Dynamic Buffering X Proactive context transfer X Parallel Discovery of Layer 2 and Layer 3 PoA X 22

23 Measurement assisted mobility model DNS/E NUM P-CSCF S-CSCF HSS S-CSCF Invite OK ACK RTP diameter GETS- Application Server I-CSCF P-CSCF SIP DNS Monitoring Agent PCRF IMS PCRF Layer 3 control Network/ Application Feedback IMS-layer control Layer 2 control Controller Managed IP (Multi-Provider Network) (EPC) GW GETS Call Wireline Access Cable DSL Fiber Ethernet Caller (UE1) GW RAN IP CAN Wireless Access UMTS EvDO WiMAX LTE Satellite 23 RAN Wireless Access UMTS EvDO WiMAX LTE Satellite RAN RAN IP CAN Called (UE2) Wireline Access Cable DSL Fiber Ethernet 23

24 Resource usage per mobility events Sub transitions Sub-operations Resource Consumption Bytes exchanged CPU samples Power due to transmission (nano joules) t00 Layer 2 un-reachability test t01 Layer 3 unreachability t11 Discover layer 2 channel t12 Discover layer 3 subnet t13 Discover server t21 Layer 2 association t22 Router solicitation t23 Domain advertisement t31 Identifier acquisition t32 Duplicate address detection t33 Address resolution t41 Layer 2 open authentication t42 Layer 2 EAP t43 Four-way handshake t51 Master key derivation (PMK) t52 Session key derivation (PTK) t61 Identifier update t62 Identifier verification t63 Identifier mapping t64 Binding cache t71 Fast binding update t72 Local caching t81 Tunneling t82 Forwarding t83 Buffering t91 Local id mapping t92 Multicasting/bicasting

25 Modeling of handoff processes An example p31 p32 p33 Resource network capacity Potential Parallel Operation t31 t32 t33 t64 p64 t70 p11 p21 p22 p12 p23 P52 t53 p53 p61 Connected t11 t21 t22 t12 t23 t52 t51 P51 t54 p54 P00 t01 p41 p42 p62 p63 t13 Resource Battery t41 t42 p13 t62 t63 Resource CPU

26 Scheduling of handoff operations P A Network capacity Resources Network capacity P A 1 token 2 2 Mobile Disconnected Connected Network Discovered Mobile authenticated P1 P2 P3 P4 t2 t3 t4 t5 P 0 t1 scanning Authentication 4-way Handshake Association Disconnection Connected P0 t1 P01 Scanning P02 t2 t3 P1 Network Discovered Mobile Authenticated P2 t4 Association P3 4-way handshake complete t5 CPU cycles P C P B Battery power Authentication Resources CPU P C 4-way Handshake Operation Resource s Battery P B Current Network A. Sequential operations Target Network B. Parallel operations Level of concurrency =2 Resources P A Network Capacity P A 1 P11 PB1 Network discovery t11 t13 P12 t12 Preauthentication AP Key installation P1 Connected t1 P D Dis connected P2 4-way Handshake (SA) C. Proactive operations t4 P A 2 P3 P C Association t5 Connected P0 t1 P03 P01 Authentication P02 4-way Handshake Scanning t2 t3 t4 2 P1 P2 P3 Network Discovered P C CPU Mobile Authenticated D. Parallel operations Level of concurrency = 3 Battery PB t5 4 Association 26

27 Conclusions IP-based mobility in 4G networks involves movement across access technologies, movement across administrative domains, at multiple layers and involve interaction among multiple protocols Measurement-based Mobility model Allows to predict the handoff performance Provides trade-off performance (e.g., Resources vs. QoS) Allows to study behavioral characteristics deadlock based on mobility patterns Best current practices to provide optimal service delivery under different mobility pattern under different resource environment For different applications Mobile Cloud Computing, Real-time, Non-real-time 27

28 Burlingame, CA USA June

29 Cellular mobility GSM AUC HLR VLR EIR BSS MSC BSC 1 BSC 2 BTS A opoa BTS B npoa npoa BTS C npoa BTS D Serving Cell MH Move Target Cell

30 SAE/LTE (4G) S10 Enhanced Packet Core (EPC) SGSN Source enb S4 S1-MME X2 S3 Target enb X2 MME Serving Gateway (S-GW) S1-U E-UTRAN Candidate enb UE UE UE X2 S11 S5 S8 S6a PDN-GW Trusted Non-3GPP (WiFI, WiMAX) UTRAN IP-based IMS network Slide 30 NIKSUN Confidential Restricted Access See Title Page for Restrictions S2a HSS S7 SGi UE PCRF S2b epdg S6c Wn Wm Untrusted Non-3GPP Rx+ Wx AAA UE

31 QoE metrics Driven by measurements Slide 31

32 Optimizing authentication Related Work IEEE Standards IEEE i provides pre-authentication at link-layer in the distribution system (DS) IEEE r improves 11i by introducing a new key hierarchy but it does not work between DSs either. Context transfer solutions (Bargh et al, Georgiades et al, Duong et al) Security problems such as domino effect Assume certain trust relationships which might not be possible in certain scenarios. Oriented towards the same technology Re-authentication Pre-installation based on movement pattern (Mishra et al, Pack et al ) AAA assisted key installation Works within the same administrative domain MIPv6 and AAA assisted (Ruckforth et al) Limited to MIPv6 and within the same domain Cooperative Roaming (Forte et al) Works within a domain

33 Key principles for SA optimization Avoid the key exchange by maintaining the endpoint address identifier Avoid tear down and re-establishment of Security Association Reduce the number of signaling messages that help rekeying Anchor-based security association Clients behind NAT are shielded from IP address change

34 802.11i Pre-authentication Flow STA Current AP Target AP AAAv AAAH IEEE 11i Pre-Authentication PMKsta-targetAP Associated EAPOL Start EAPOL-Request(EAP-Req/ident) EAPOL-Response(EAP-Resp/ident) EAPOL-Request(EAP-TLS/Start) EAPOL-Response(EAP-TLS/Client-Hello) EAPOL-Request(EAP-TLS/ServCert) EAPOL-Response(EAP-TLS/ClientCert) EAPOL-Request(EAP-TLS/ChangeSpec) EAPOL-Response(EAP-TLS/Ack) EAPOL-Request(EAP-TLS/Sucess) Non-roaming Roaming AAA prot-req (EAP-Resp/Ident) AAA prot-ans (EAP-TLS/Start) AAA prot-req (EAP-TLS/Client-Hello) AAA prot-ans (EAP-TLS/ServCert) AAA prot-req (EAP-TLS/ClientCert) AAA prot-ans (EAP-TLS/ChangeSpec) AAA prot-req (EAP-TLS/Ack) AAA prot-ans (EAP-Success) PMKsta-targetAP 4-way hanshake (Re)Association EAPOL Key: Message 1 EAPOL Key: Message 2 EAPOL Key: Message 3 EAPOL Key: Message 4 1x controlled port enabled & IP traffic

35 Key Derivation Process Post-auth AAA Authentication Server i Pre-auth AAA Network-Layer Preauth AAA Authentication Server MSK Authenticator AP MSK PMK 4-way handshake (PTKs) AP MSK Authenticator AP MSK PMK AP MSK PAA AP PSKap MSK PaC-EP-Master-Key PSK PSKap PMK 4-way handshake (PTKs) MN MSK PMK WPA Supplicant MN 4-way handshake (PTKs) MN MSK MSK PMK PaC-EP-Master-Key PSK PMK WPA Supplicant

36 Technical issues for mobility management Key Functions Handoff Characteristics May take place between cell, subnet or domain Need to optimize the handoff delay and transient data loss ( e.g., end-todelay up to 200 ms, 3%-5% packet loss, jitter, for real-time VoIP traffic) May use soft-handoff feature of CDMA, but need fast-handoff mechanisms for other technologies (e.g., ) Need to support session based applications for TCP and RTP traffic Configuration Registration Should be configured within few milliseconds Configures IP address and other server parameters (e.g, DNS, SIP server, Gateway) Assist pre-session mobility Hierarchical nature will make the registration faster Helps location management functionality Quality of Service Location Management Need to maintain same QoS during its subnet/domain movement Allow user to maintain same URI irrespective of point of attachment

37 Mobility model Problem: In the absence of any formal mechanism it is difficult to predict or verify the systems performance of un-optimized handover or any specific handoff optimization technique Proposal Analyze the basic primitives of a handoff event Model the handoff-related processes as Discrete Event Dynamic Systems (DEDS) Deterministic Timed Transition Petri Net (DTTPN) to build various unoptimized mobility models and their associated optimization techniques Key advantages : This model can predict systems performance for optimized handoff operations This model can design optimal path for sequence of execution of events based on expected performance and resource constraints This model can verify systems behavior (e.g., deadlocks) during handover 37

38 Dependency analysis among handover operations Handoff Process Precedence Data it depends on Relationship P 11 Channel Discovery P 00 Signal-to-Noise Ratio value P 12 Subnet discovery P 21,P 22 Layer 2 beacon ID L3 router advertisement P 13 Server discovery P 12 Subnet address Default router address P 21 - Layer 2 association P 11 Channel number MAC address Authentication key P 22 - Router solicitation P 21, P 12 Layer 2 binding P 23 - Domain advertisement P 13 Server configuration Router advertisement P 31 Identifier acquisition P 23,P 12 Default gateway Subnet address Server address P 32 Duplicate address detection P 31 ARP Router advertisement P 33 Address resolution P 32, P 31 New identifier P 41 Authentication P 13 Address of authenticator P 42 Key Derivation P 41 PMK (Pairwise Master Key) P 51 Identifier update P 31,P 52 L3 Address Uniqueness of L3 address P 52 Identifier verification P 31 Completion of COTI P 53 Identifier mapping P 51 Updated MN address at CN and HA P 54 Binding cache P 53 New Care-of-address mapping P 61 Tunneling P 51 Tunnel end-point address Identifier address P 62 Forwarding P 51, P 53 New address of the mobile P 63 Buffering P 62, P 51 New identifier acquisition P 64 Multicasting/Bicasting P 51 New identifier acquisition 38

39 Backup Slides Burlingame, CA USA June

40 Characteristics of Next Generation Networks? Heterogeneous networks (CDMA, LTE, WiMAX, ) Access-independent converged IP network Order-of-magnitude increases in bandwidth MIMO, smart antennas Increase in video and other high bandwidth traffic New services and service enabling platforms (e.g., Web 2.0, SON) Large range of cell sizes, coverage areas PAN, LAN, WAN Pico-cellular, micro-cellular, cellular Changes in traffic and traffic patterns Rise in video on demand? Requires good high-bandwidth multicast

41 Results (II)

42 Cellular Access Characteristics Generation System Channel spacing Access type Uplink data rate 1G AMPS 30 khz FDMA N/A TACS 25 khz FDMA N/A NMT 25 khz FDMA N/A NTT 25 khz FDMA N/A 2G GSM 200 khz TDMA 9.6 kb/s PDC 30 khz TDMA 42 kb/s IS khz F/TDMA 48 kb/s IS-95 (A) 1.25 MHz F/CDMA 14.4 kb/s iden 25 khz F/TDMA 24 kb/s 2.5G GPRS 200 khz TDMA 45 kb/s EDGE 200 khz TDMA 236 kb/s IS-95 (B) 1.25 MHz F/CDMA 115 kb/s CDMA2000 1X 1.25 MHz CDMA 144 kb/s 3G UMTS/WCDM 5 MHz CDMA/TD 2 Mb/s A MA CDMA MHz CDMA 2 Mb/s 1xEV-DO 4G LTE 20 MHz OFDMA 50 Mb/s WiMAX 2.5 GHz OFDM 40 Mb/s UMB 5 MHz OFDMA 75 Mb/s

43 Handover: Distributed operation across multiple layers CN Discovery Detection Configuration Security Association p42 Binding Update p52 p54 Media Rerouting p61 Server (Proxy, /HA) p13 p23 p31 p32 p41 p42 p52 p51 p53 p54 p61 p63p64 p62 L3 PoA p12 p22 p31 p32 p33 p42 p51 p61 p62 L2 PoA p11 p21 p31 p41 p42 p51 p11 p12 p13 p21 p22 p23 p31 p32 p33 p41 p42 p51 p52 p61 MN Time

44 De-authentication Delay Layer 2 Handoff Delay (802.11) Station performing handoff Probe Delay MN Authentication Delay Re-association Delay (broadcast) Probe Request Probe Response Reassociation Request De-authentication Authentication Request Authentication Response Re-association Request Re-association Request Re-association Response All APs within range on all channels Chan 1 Chan N New AP Discovery Phase Active scanning MN probes AP Passive scanning AP sends beacons periodically Authentication Phase Open authentication Shared authentication i 4 way handshake Association Phase

45 Layer 2 Discovery Optimization General techniques: Reduce the scanning time Caching of ESSID Use of second interface specific discovery Proactive Discovery (no scanning) Proposed Solutions: Shin et al introduces selective scanning and caching strategy Montavont et al propose periodic scanning Velayos et al propose reduction of beacon interval and performs search in parallel with data transmission Brik et al propose to use a second interface to scan while communicating with the first interface u, k Forte and Schulzrinne Application Layer proactive discovery (e.g., Dutta et al)

46 Optimization techniques for layer 3 configuration Layer 3 address acquisition Proactive caching Duplicate Address Detection Optimistic DAD, Proactive DAD, Passive DAD, Router Assisted DAD NUD (Neighbor Unreachability Detection) Aggressive Router Selection Mobile Node Identifier Acquisition L3 PoA Server Layer 3 Configuration Layer 2 Duplicate Identifier Address Mapping Verification Network Server MN Mobile Node L3 POA Network

47 Security Optimization Security protocols have an impact on the performances of the network End-to-end latency Throughput Handoff delay Main components that affect the performance Authentication/authorization, Key Derivation, Encryption Security related delays may affect all the layers Layer 2 (e.g., i, WEP) Layer 3 (IPSEC/IKE) Upper Layers (e.g., TLS, SRTP) Server Layer 4 Layer 3 Security Association Layer 2 Key Distribution Authentication Encryption Mobile MN Server MN Network L3 POA

48 Optimizing Binding Update Techniques Reduce the latency due to longer binding update when the communicating host is far away Limit the binding update within a domain Proposed Solutions IDMP Regional registration-based Mobile IP HMIPv6 Anchor-based Application Layer B2BUA Proactive Binding Update Binding Update Tunneling Mapping Caching Anchor Point CN Mobile Network Anchor Mobile CN

49 PSTN CDMA2000 An example Home Agent FA1 FA2 GMSC PDSN1 L3 PoA PDSN2 L3 PoA AC HLR VLR PCF1 PCF3 PCF4 PCF2 MSC BSC1 BSC2 BSC3 BSC4 BTS1 L2 PoA BTS3 L2 PoA A B C D E F

50 Optimized handoff delay with MPA (Multiple I/F) Handoff Delay CDMA ~ 18 s a. MIP-based Non-optimized handoff CDMA Handoff Delay CDMA 16 s c. MPA and assisted optimized handoff b. SIP-based Non-optimized handoff

51 Several concepts of mobility Terminal mobility, e.g., supported by Mobile IP CH Subnet 1 IP-based Network Subnet 2 MH Typically, you don t just have terminals CH IP-based Network Subnet 2 Users/Persons Subnet 1 Sessions Mobility of users, sessions? MH

52 Personal Mobility: Registration registrar CH IP-based Network Subnet 2 Subnet 1 person@subnet2.org registrar When lady in red moves, she leaves her laptop behind CH IP-based Network Subnet 2 Uses another machine Logs in Subnet 1 User registration performed

53 Personal Mobility: simultaneous registration of multiple bindings CH Subnet 1 Registrar & proxy IP-based Network When lady in red moves, she leaves her laptop behind Uses another machine She can still be located person@subnet1.org person@subnet2.org Subnet 2 CH Subnet 1 person@subnet1.org person@subnet2.org Registrar & proxy IP-based Network Subnet 2

54 Session Mobility INVITE 2 3 CH IP-based Network Subnet 2 1 Subnet 1 MH CH IP-based Network Subnet 2 Subnet 1

55 Mobike-based solution

56 Service Mobility Service Mobility allows a roaming user to get the same view of the network as when he is at home At the time of registration User s service profile is retrieved from the home network The service profile is shared with the responsible entity at home and in the foreign network (wholly or partially) The foreign network provides some of the service required The home network still retains responsibility for other services Examples of entries in the profile of interest may be address book, call handling features, buddy lists, etc.

Mobility Management for Next Generation Wireless Internet

Mobility Management for Next Generation Wireless Internet Mobility Management for Next Generation Wireless Internet Ashutosh Dutta, Ph.D. Senior Scientist NIKSUN Innovation Center Princeton New Jersey, 08540 Email: adutta@niksun.com 1 Outline Evolution of mobility

More information

Optimal Service Delivery in Mobile Networks

Optimal Service Delivery in Mobile Networks Optimal Service Delivery in Mobile Networks Ashutosh Dutta, Ph.D. Senior Scientist NIKSUN Princeton, NJ, USA 08540 Email: adutta@niksun.com WWSMC 11, NJ USA, July 2011 1 A name identifies what you want,

More information

QoS SIG Presentation. QoE Measurements In A SeON Framework. Date: December 14, Dr. Parag Pruthi NIKSUN Dr. Ashutosh Dutta NIKSUN

QoS SIG Presentation. QoE Measurements In A SeON Framework. Date: December 14, Dr. Parag Pruthi NIKSUN Dr. Ashutosh Dutta NIKSUN QoS SIG Presentation QoE Measurements In A SeON Framework Dr. Parag Pruthi NIKSUN Dr. Ashutosh Dutta NIKSUN Date: December 14, 2010 Copyright 2010 GISFI. All Rights Reserved. QoE => Perceived Quality of

More information

Mobility Protocols and Handover Optimization

Mobility Protocols and Handover Optimization Mobility Protocols and Handover Optimization April 16 2018, Denver Section, ComSoc Chapter Speaker: Ashutosh Dutta, Ph.D. Founding Co-Chair IEEE 5G Initiative Director Industry Outreach New Jersey Email:

More information

Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations. Mobile Telephony Networks

Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations. Mobile Telephony Networks Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations Mobile Telephony Networks 1 The Evolution of Mobile Telephony 1st Generation 2nd 3rd 4th Analogue Voice

More information

DAY 2. HSPA Systems Architecture and Protocols

DAY 2. HSPA Systems Architecture and Protocols DAY 2 HSPA Systems Architecture and Protocols 1 LTE Basic Reference Model UE: User Equipment S-GW: Serving Gateway P-GW: PDN Gateway MME : Mobility Management Entity enb: evolved Node B HSS: Home Subscriber

More information

Mobile Communications

Mobile Communications DSMIPv6, 802.21 1 Mobile Communications IEEE and 3GPP Approaches to Macro-Mobility Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto How does the Dual Stack MIPv6 work? DSMIPv6, 802.21

More information

GPRS and UMTS T

GPRS and UMTS T GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,

More information

Mobile Network Evolution Part 2

Mobile Network Evolution Part 2 Mobile Network Evolution Part 2 From UMTS to LTE or How to Further Increase Network Capacity and QoS Andreas Mitschele-Thiel Advanced Mobile Communication Networks 1 Outline Evolution from Circuit Switching

More information

Keywords: IEEE , Heterogeneous Handover, Seamless Mobility, Media Independent Pre-authentication

Keywords: IEEE , Heterogeneous Handover, Seamless Mobility, Media Independent Pre-authentication Secured Seamless Convergence across Heterogeneous Access Networks Ashutosh Dutta, Subir Das, David Famolari Telcordia Technologies, NJ Yoshihiro Ohba, Kenichi Taniuchi, Victor Fajardo, Toshikazu Kodama

More information

Introduction to Wireless Networks. Chapter 7: Introduction to Heterogeneous Networks and

Introduction to Wireless Networks. Chapter 7: Introduction to Heterogeneous Networks and Introduction to Wireless Networks Chapter 7: Introduction to Heterogeneous Networks and ALL-IP Networks Prof. Yuh-Shyan Chen Department t of CSIE National Taipei University Outline Trend on Wireless/Cellular

More information

Convergence WLAN/CDMA Architecture. CDG Technology Forum October 7, 2005

Convergence WLAN/CDMA Architecture. CDG Technology Forum October 7, 2005 Convergence WLAN/CDMA Architecture CDG Technology Forum October 7, 2005 Outline Introduction and Network Architecture Key elements to enable WLAN/CDMA services Access control Mobility management Summary

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Wireless Networks Cellular & Mobility Sec 7.4 7.8 Lina Battestilli 7.1 Introduction Wireless Chapter 7 Outline Wireless and Mobile Networks 7.2 Wireless

More information

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID. 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to IP Mobility Session 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda IP Mobility Overview Terminology

More information

GTP-based S2b Interface Support on the P-GW and SAEGW

GTP-based S2b Interface Support on the P-GW and SAEGW GTP-based S2b Interface Support on the P-GW and SAEGW This chapter describes the GTP-based S2b interface support feature on the standalone P-GW and the SAEGW. Feature, page 1 How the S2b Architecture Works,

More information

Mobile IPv6 performance in networks: handover optimizations on the link and network layer

Mobile IPv6 performance in networks: handover optimizations on the link and network layer Mobile IPv6 performance in 802.11 networks: handover optimizations on the link and network layer LaTe project, Networking laboratory, TKK Mikko Hautala mhautala@cc.hut.fi 16.03.2006 Supervisor: Instructor:

More information

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Background: # wireless (mobile) phone subscribers

More information

IEEE Assisted Network Layer Mobility Support

IEEE Assisted Network Layer Mobility Support IEEE802.21 Assisted Network Layer Mobility Support Qazi Bouland Mussabbir *, Wenbing Yao ** and John Cosmas *** *School Of Engineering and Design, Brunel University Uxbridge, London, UB83PH, UK, qazi.mussabbir@brunel.ac.uk

More information

Multi-RAT Heterogeneous Networks. Presenter: S. Vasudevan, Technical Manager, Advanced Technology Standards

Multi-RAT Heterogeneous Networks. Presenter: S. Vasudevan, Technical Manager, Advanced Technology Standards Multi-RAT Heterogeneous Networks Presenter: S. Vasudevan, Technical Manager, Advanced Technology Standards What are Multi-RAT Heterogeneous Networks Integrated Networks supporting a range of cell sizes

More information

Evolution to A Common Core

Evolution to A Common Core Evolution to A Common Core Interworking Access Networks Mike Dolan April 2008 Outline Current Situation Multiple Core Networks Commonality at the Application Layer, IMS Converging on a Common Core Network

More information

3GPP TS V8.4.0 ( )

3GPP TS V8.4.0 ( ) TS 23.327 V8.4.0 (2009-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Mobility between -Wireless Local Area Network (WLAN) interworking

More information

Overview of the Cisco Mobile Wireless Home Agent

Overview of the Cisco Mobile Wireless Home Agent CHAPTER 1 Overview of the Cisco Mobile Wireless Home Agent This chapter illustrates the functional elements in a typical CDMA2000 packet data system, the Cisco products that are currently available to

More information

INTRODUCTION TO LTE. ECE MOBILE COMMUNICATION Monday, 25 June 2018

INTRODUCTION TO LTE. ECE MOBILE COMMUNICATION Monday, 25 June 2018 INTRODUCTION TO LTE ECE 2526 - MOBILE COMMUNICATION Monday, 25 June 2018 1 WHAT IS LTE? 1. LTE stands for Long Term Evolution and it was started as a project in 2004 by the Third Generation Partnership

More information

Wireless Data-Introduction p. 1 Wireless Voice p. 2 Fixed Minimum Bandwidth p. 2 Vague Definition of Service Quality p. 3 Delay Requirements p.

Wireless Data-Introduction p. 1 Wireless Voice p. 2 Fixed Minimum Bandwidth p. 2 Vague Definition of Service Quality p. 3 Delay Requirements p. Preface p. xxv Acknowledgments p. xxix Wireless Data-Introduction p. 1 Wireless Voice p. 2 Fixed Minimum Bandwidth p. 2 Vague Definition of Service Quality p. 3 Delay Requirements p. 4 Wireless Local Area

More information

Advanced Computer Networks. Mobility Support

Advanced Computer Networks. Mobility Support Advanced Computer Networks 263 3501 00 Mobility Support Patrick Stuedi Spring Semester 2013 Oriana Riva, Department of Computer Science ETH Zürich Last Week WLAN/802.11 Architecture (Infrastructure / Ad

More information

ELEC-E7230 Mobile Communication Systems

ELEC-E7230 Mobile Communication Systems ELEC-E7230 Mobile Communication Systems Lecture 1 Prof. Tarik Taleb School of Electrical Engineering Aalto University Work Plan Content Mobile Network Architectures Evolution MN Arch. Evolution: 2G to

More information

Wireless technologies Testers. WLAN traffic offload bypass for crowded mobile networks

Wireless technologies Testers. WLAN traffic offload bypass for crowded mobile networks Wireless technologies Testers traffic offload bypass for crowded mobile networks 10 traffic offload the rerouting of mobile data traffic to networks is an interesting alternative for network operators

More information

Overview of the Cisco Mobile Wireless Home Agent

Overview of the Cisco Mobile Wireless Home Agent 1 CHAPTER Overview of the Cisco Mobile Wireless Home Agent This chapter illustrates the functional elements in a typical Mobile IP packet data system, the Cisco products that are currently available to

More information

Network Security: WLAN Mobility. Tuomas Aura CS-E4300 Network security Aalto University, Autumn 2017

Network Security: WLAN Mobility. Tuomas Aura CS-E4300 Network security Aalto University, Autumn 2017 Network Security: WLAN Mobility Tuomas Aura CS-E4300 Network security Aalto University, Autumn 2017 Outline Link-layer mobility in WLAN Password-based authentication for WLAN Eduroam case study 2 LINK-LAYER

More information

Cellular Networks and Mobility

Cellular Networks and Mobility Cellular Networks and Mobility Daniel Zappala CS 460 Computer Networking Brigham Young University Cellular Networks GSM 2G/3G Architecture 3/20 2G Standard 4/20 GSM: combined FDM/TDM divide into 200 khz

More information

SYSTEM ARCHITECTURE WITH E-UTRAN -- 3GPP ACCESS NETWORKS

SYSTEM ARCHITECTURE WITH E-UTRAN -- 3GPP ACCESS NETWORKS SYSTEM ARCHITECTURE WITH E-UTRAN -- 3GPP ACCESS NETWORKS K. Ravi 1, Dr. Mohammed Ali Hussain 2, M. Ramanakar 3 1 Asst.Professor, Dept. of Informatics, Alluri Institute of Management Sciences, Warangal,

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration

More information

IxLoad EPC Wi-Fi Offload Testing

IxLoad EPC Wi-Fi Offload Testing IxLoad EPC Wi-Fi Offload Testing Mobile network traffic is growing exponentially, and service providers must manage their networks efficiently to meet consumer demand. Wi-Fi, one of the small cell technologies,

More information

WiFi Integration in Evolution to 5G networks. Satish Kanugovi WiFi Knowledge Summit, Bangalore March 9, Nokia 2018

WiFi Integration in Evolution to 5G networks. Satish Kanugovi WiFi Knowledge Summit, Bangalore March 9, Nokia 2018 WiFi Integration in Evolution to 5G networks Satish Kanugovi (satish.k@nokia.com) WiFi Knowledge Summit, Bangalore March 9, 2018 1 Nokia 2018 Outline Integrating WiFi Access into the 5G Core Multi-Access

More information

Network Architectures for Evolving 3G LTE and Mobile WiMAX

Network Architectures for Evolving 3G LTE and Mobile WiMAX Network Architectures for Evolving 3G LTE and Mobile WiMAX All-IP networking is the ultimate goal of 4G mobile networks, but 3G LTE and mobile WiMAX systems have designed semi all-ip network architectures

More information

Chapter 17. Wireless Network Security

Chapter 17. Wireless Network Security Chapter 17 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s, to develop a protocol & transmission specifications for wireless LANs (WLANs) Demand

More information

Mobile Network Evolution Part 2

Mobile Network Evolution Part 2 Mobile Network Evolution Part 2 From UMTS to LTE or How to Further Increase Network Capacity and QoS Andreas Mitschele-Thiel Advanced Mobile Communication Networks 1 Outline Evolution from Circuit Switching

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Wireless LAN Security Slide from 2 nd book 1 802.11 Wireless LAN Security Stations in LAN are connected physically while in WLAN any station in the radio range is connected, so

More information

Distributed mobility management

Distributed mobility management Distributed mobility management for Future Internet H. Anthony Chan Huawei Technologies h.a.chan@ieee.org Internet Core network: converge (cellular and Internet no more IPv4 blocks available) Access networks:

More information

Mobile IPv6 Operations Explored

Mobile IPv6 Operations Explored Mobile IPv6 Operations Explored U.S. IPv6 Summit 2003 December 8-118 2003 Carl Williams NAv6TF Steering Committee and IPv6 Forum Technical Directorate carlw@mcsr-labs.org labs.org IPv6 Mobility/wireless

More information

Telecom Learning. Technology

Telecom Learning. Technology Telecom Learning Technology LTE Modules S. No. LTE Module Course Content LTE Overview LTE /EPS Network Architecture 1 LTE Basics LTE/EPS Mobility & Session Mgmt LTE Air Interface LTE Air Interface LTE-RF

More information

ETSI TS V ( )

ETSI TS V ( ) TS 123 327 V12.0.0 (2014-09) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Mobility between 3GPP-Wireless Local

More information

Requirements and best practices for enabling Enhanced PTT over Wi-Fi networks

Requirements and best practices for enabling Enhanced PTT over Wi-Fi networks Requirements and best practices for enabling Enhanced PTT over Wi-Fi networks The following guide is intended for users of Enhanced PTT to ensure that their Wi-Fi networks meet minimum requirements for

More information

Overview of IEEE Networks. Timo Smura

Overview of IEEE Networks. Timo Smura Overview of IEEE 802.11 Networks Timo Smura 24.03.2004 Outline Introduction IEEE 802.11 standards Protocol model Network topologies 802.11 MAC layer 802.11 PHY layers Interoperability: Wi-Fi Alliance 3GPP

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Configuring Hybrid REAP

Configuring Hybrid REAP 13 CHAPTER This chapter describes hybrid REAP and explains how to configure this feature on controllers and access points. It contains the following sections: Information About Hybrid REAP, page 13-1,

More information

CSC 4900 Computer Networks: Mobility

CSC 4900 Computer Networks: Mobility CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping

More information

Mobile IPv6. Washington University in St. Louis

Mobile IPv6. Washington University in St. Louis Mobile IPv6 Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Last time?! Block 3: Lecture 1! Wireless networks! Ingredients 2: Antennas! Ingredients 1: Mobile Phones, PDAs & Co.! 20/05/14. Part 3: lecture 3!

Last time?! Block 3: Lecture 1! Wireless networks! Ingredients 2: Antennas! Ingredients 1: Mobile Phones, PDAs & Co.! 20/05/14. Part 3: lecture 3! 20/05/14 Last time? WiFi Block 3: Lecture 1 Part 3: lecture 3 Wireless s Speed and ranges and channels Specifications DCF mechanisms WiMax Mobile s Ingredients 1: Mobile Phones, PDAs & Co. Ingredients

More information

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs.

T Computer Networks II. Mobility Issues Contents. Mobility. Mobility. Classifying Mobility Protocols. Routing vs. T-0.50 Computer Networks II Mobility Issues 6.0.008 Overview Mobile IP NEMO Transport layer solutions i SIP mobility Contents Prof. Sasu Tarkoma Mobility What happens when network endpoints start to move?

More information

Introduction to Mobile Broadband (imb)

Introduction to Mobile Broadband (imb) Introduction to Mobile Broadband (imb) Teaching By Asst.Prof.Dr. Suwat Pattaramalai suwat.pat@kmutt.ac.th Tel. 02-470-9079 Material: http://webstaff.kmutt.ac.th/~suwat.pat/ 3GPP WiMAX FORUM Introduction

More information

Advanced Computer Networks. IP Mobility

Advanced Computer Networks. IP Mobility Advanced Computer Networks 263 3501 00 IP Mobility Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Tuesday 1 April 2014 Outline Last week: Today: Cellular Networks

More information

PMIPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS. Proxy Mobile IPv6. Peter R. Egli INDIGOO.COM. indigoo.

PMIPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS. Proxy Mobile IPv6. Peter R. Egli INDIGOO.COM. indigoo. PMIPv6 PMIPv6 Proxy Mobile IPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS Peter R. Egli INDIGOO.COM 1/25 Contents 1. Why PMIPv6 when we have MIP? 2. PMIPv6 terminology

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

IPv6 in Mobile Networks and IMS Ericsson NEA Toshikane Oda

IPv6 in Mobile Networks and IMS Ericsson NEA Toshikane Oda IPv6 in Mobile Networks and IMS 2009-02-25 Ericsson NEA Toshikane Oda Outline 1. Growth of Mobile Broadband Markets 2. Evolution of Mobile Packet System 3. IMS for Converged IP Multimedia Services 4. EU

More information

Overview of Mobile Networking Initiatives at WINLAB

Overview of Mobile Networking Initiatives at WINLAB Overview of Mobile Networking Initiatives at WINLAB Introduction: The Next Generation MSC Custom Mobile Infrastructure (e.g. GSM, 3G) BTS Public Switched Network (PSTN) BSC GGSN, etc. WLAN Access Point

More information

Mobility Testbed for 3GPP2-Based Multimedia Domain Networks

Mobility Testbed for 3GPP2-Based Multimedia Domain Networks IP MULTIMEDIA SUBSYSTEMS Mobility Testbed for 3GPP2-Based Multimedia Domain Networks Ashutosh Dutta, Kyriakos Manousakis, Subir Das, and Fuchun J. Lin, Telcordia Technologies Tsunehiko Chiba, Hidetoshi

More information

WLAN Roaming and Fast-Secure Roaming on CUWN

WLAN Roaming and Fast-Secure Roaming on CUWN 802.11 WLAN Roaming and Fast-Secure Roaming on CUWN Contents Introduction Prerequisites Requirements Components Used Background Information Roaming with Higher-Level Security WPA/WPA2-PSK WPA/WPA2-EAP

More information

CDMA Evolution Delivering Real-time & Multimedia Services

CDMA Evolution Delivering Real-time & Multimedia Services CDMA Evolution Delivering Real-time & Multimedia Services May 2006 3G CDMA Latin America Regional Conference, Brazil 2 Nortel Confidential Information Wireless Trends Access & Core Greater Market Penetration

More information

An Experimental Study of Location Assisted Proactive Handover

An Experimental Study of Location Assisted Proactive Handover An Experimental Study of Location Assisted Proactive Handover A. Dutta, S. Chakravarty c, K. Taniuchi b, V. Fajardo b,y. Ohba b, D. Famolari a, H. Schulzrinne c a Telcordia Technologies b Toshiba America

More information

IP micro-mobility protocols

IP micro-mobility protocols IP micro-mobility protocols Pierre Reinbold University of Namur Belgium pre@info.fundp.ac.be http://www.infonet.fundp.ac.be Olivier Bonaventure Université Catholique de Louvain (UCL), Belgium Bonaventure@info.ucl.ac.be

More information

Wireless systems overview

Wireless systems overview Wireless systems overview Evolution of systems from 1G to 4G 1G, 4G major features Specifications comparison 5G communication systems Summary Wireless Systems 2016 Evolution of cellular networks WiMAX

More information

Wireless Security Background

Wireless Security Background Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless

More information

Chapter 3: Wireless and Mobile Networks

Chapter 3: Wireless and Mobile Networks Computer Network Architectures and Multimedia Guy Leduc Chapter 3 Wireless and Mobile Networks Chapter 7 of Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Mobile Broadband Communications

Mobile Broadband Communications Mobile Broadband Communications (WiMAX & LTE) Teaching By Asst.Prof.Dr. Suwat Pattaramalai suwat.pat@kmutt.ac.th Tel. 02-470-9079 3GPP WiMAX FORUM Mobile Broadband Communications Contents Part I Fundamentals

More information

Latest Mobile Radio Services and Associated R&D Activities

Latest Mobile Radio Services and Associated R&D Activities Latest Mobile Radio Services and Associated R&D Activities Hideyuki Shinonaga KDDI R&D Laboratories (shinonaga@kddilabs.jp) Ohara 2-1-15, Kamifukuoka, Saitama, 356-8502, Japan Sep.26, 2002 1 CDMA2000 1x

More information

Seamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism

Seamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism Seamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism Bharatesh Chakravarthi S. B M.Tech. Dept of ISE The Oxford College of Engineering Bangalore, India Prof. D. Jayaramaiah

More information

Status of IMS-Based Next Generation Networks for Fixed Mobile Convergence

Status of IMS-Based Next Generation Networks for Fixed Mobile Convergence Status of IMS-Based Next Generation Networks for Fixed Mobile Convergence Prepared for: WOCC 2007 Fuchun Joseph Lin Chief Scientist fjlin@research.telcordia.com Telcordia Technologies, Inc. April 28, 2007

More information

Integration of and Third-Generation Wireless Data Networks

Integration of and Third-Generation Wireless Data Networks Integration of 802.11 and Third-Generation Wireless Data Networks Milind M. Buddhikot mbuddhikot@bell-labs.com Center for Networking Research Lucent Bell Labs Research Outline Current Trends and Rationale

More information

WiMAX Overview. Parviz Yegani Cisco Systems IETF-64 Nov. 7-11, 2005 Vancouver, Canada. Session Number Presentation_ID

WiMAX Overview. Parviz Yegani Cisco Systems IETF-64 Nov. 7-11, 2005 Vancouver, Canada. Session Number Presentation_ID WiMAX Overview Parviz Yegani Cisco Systems pyegani@cisco.com IETF-64 Nov. 7-11, 2005 Vancouver, Canada Session Number 1 Outline WiMAX NWG Goals Network Reference Model Reference Points and Interfaces NWG

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

CHAPTER 2 THE BASIC TECHNOLOGY OF WIRELESS NETWORKS

CHAPTER 2 THE BASIC TECHNOLOGY OF WIRELESS NETWORKS 11 CHAPTER 2 THE BASIC TECHNOLOGY OF WIRELESS NETWORKS This chapter explains with the evolution of mobile communication systems from the 1G analog communication networks to the 4G broadband converged networks.

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

CS 332 Computer Networks Wireless Networks

CS 332 Computer Networks Wireless Networks CS 332 Computer Networks Wireless Networks Professor Szajda Chapter 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets:

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

MSF Non-3GPP EPS Access Tile. MSF Architecture for Non-3GPP Evolved Packet System (EPS) Access Tile. MSF-LTE-ARCH-non3GPP-EPS-FINAL

MSF Non-3GPP EPS Access Tile. MSF Architecture for Non-3GPP Evolved Packet System (EPS) Access Tile. MSF-LTE-ARCH-non3GPP-EPS-FINAL MSF Architecture for Non-3GPP Evolved Packet System (EPS) Access Tile MSF-LTE-ARCH-non3GPP-EPS-FINAL MultiService Forum Architectural Framework Contribution Number: File Name: Document Filename: Working

More information

Mobility in IPv6 Networks

Mobility in IPv6 Networks Mobility in IPv6 Networks o Mobility Paradigm o Mobile IPv4 IPv6 o Basic MIPv6 o Handover, Security o Temporal Optimisation VCoIP in Praxis VCoIP in Praxis VCoIP in Praxis IP Mobility Approaches o Application:

More information

LTE Training LTE (Long Term Evolution) Training Bootcamp, Crash Course

LTE Training LTE (Long Term Evolution) Training Bootcamp, Crash Course LTE Training LTE (Long Term Evolution) Training Bootcamp, Crash Course Why should you choose LTE Training? LTE Training is an intensive learning experience that cover the essential elements of Long Term

More information

IEEE C /08

IEEE C /08 2003-01-10 IEEE C802.20-03/08 Project Title IEEE 802.20 Working Group on Mobile Broadband Wireless Access A Vision of an IP-based Cellular Network Date Submitted

More information

Wireless and mobile Internet. ToC. Introduction. Institut National des Télécommunications Département LOR

Wireless and mobile Internet. ToC. Introduction. Institut National des Télécommunications Département LOR Wireless and mobile Internet hakima.chaouchi@int-evry.fr Institut National des Télécommunications Département LOR Hakima CHAOUCHI Wireless and mobile Internet 1 ToC Introduction Internet and Wireless networks

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Basic SAE Management Technology for Realizing All-IP Network

Basic SAE Management Technology for Realizing All-IP Network LTE SAE EPC Special Articles on SAE Standardization Technology Basic SAE Management Technology for Realizing All-IP Network The standardization of 3GPP Release 8 brings new provisions for All-IP networks

More information

Route Optimization for Proxy Mobile IPv6 in IMS Network

Route Optimization for Proxy Mobile IPv6 in IMS Network Route Optimization for Proxy Mobile IPv6 in IMS Network Tsunehiko Chiba, Hidetoshi Yokota KDDI R&D Laboratories, Inc. Saitama, Japan Ashutosh Dutta, Dana Chee Telcordia Technologies, Inc. New Jersey, USA

More information

Addressing Current and Future Wireless Demand

Addressing Current and Future Wireless Demand Addressing Current and Future Wireless Demand Dave Wolter Executive Director Radio Technology AT&T Architecture and Planning Rising Demand and The Need to Innovate in the Network 6,732% growth over 13

More information

Configuring Layer2 Security

Configuring Layer2 Security Prerequisites for Layer 2 Security, page 1 Configuring Static WEP Keys (CLI), page 2 Configuring Dynamic 802.1X Keys and Authorization (CLI), page 2 Configuring 802.11r BSS Fast Transition, page 3 Configuring

More information

Mobile IPv6. Raj Jain. Washington University in St. Louis

Mobile IPv6. Raj Jain. Washington University in St. Louis Mobile IPv6 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 13-1 Overview! IPv6:

More information

3GPP TS V8.9.0 ( )

3GPP TS V8.9.0 ( ) TS 23.402 V8.9.0 (2010-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Architecture enhancements for non- accesses (Release 8)

More information

Overview of the Cisco Mobile Wireless Home Agent

Overview of the Cisco Mobile Wireless Home Agent CHAPTER 1 Overview of the Cisco Mobile Wireless Home Agent This chapter illustrates the functional elements in a typical Mobile IP packet data system, the Cisco products that are currently available to

More information

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac WISNETWORKS User Manual V1.1 2016/3/21 Software version 1.0.0021 Table of contents 1. Setup& WMI... 3 1.1 Hardware Setup... 3 1.2 Web Management Interface... 3 2. Status... 4 2.1 Overview... 4 2.1.1 System...

More information

Mobility: vocabulary

Mobility: vocabulary What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,

More information

Vertical Handoff Characterization for SIP and msctp Based UMTS-WLAN Integration Solutions

Vertical Handoff Characterization for SIP and msctp Based UMTS-WLAN Integration Solutions Vertical Handoff Characterization for SIP and msctp Based UMTS-WLAN Integration Solutions Syed Asadullah, Ashraf S. Mahmoud, Marwan Abu-Amara, Tarek Sheltami Computer Engineering Department King Fahd University

More information

3GPP TS V8.0.0 ( )

3GPP TS V8.0.0 ( ) TS 23.402 V8.0.0 (2007-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Architecture enhancements for non- accesses (Release 8)

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology Cellular Systems - II Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication UMTS Architecture A UMTS network consist

More information

Distributed or Centralized Mobility?

Distributed or Centralized Mobility? Distributed or Centralized Mobility? Philippe Bertin, Servane Bonjour Orange Labs Cesson-Sévigné, France {firstname.name}@orange-ftgroup.com Jean-Marie Bonnin TELECOM Bretagne Cesson-Sévigné, France jm.bonnin@telecom-bretagne.eu

More information

Architectures of Next Generation Wireless Networks. Pascal LORENZ.

Architectures of Next Generation Wireless Networks. Pascal LORENZ. Architectures of Next Generation Wireless Networks lorenz@ieee.org Internet is increasing exponentially: 2001: 180 million users today: more than 2 billions users Internet traffic and the bandwidth double

More information

MOBILITY AND SERVICE MANAGEMENT FOR FUTURE ALL-IP BASED WIRELESS NETWORKS

MOBILITY AND SERVICE MANAGEMENT FOR FUTURE ALL-IP BASED WIRELESS NETWORKS MOBILITY AND SERVICE MANAGEMENT FOR FUTURE ALL-IP BASED WIRELESS NETWORKS Weiping He Preliminary Research Document submitted to the Faculty of the Virginia Polytechnic Institute and State University in

More information