A Network-based Seamless Handover Scheme for Multi-homed Devices

Size: px
Start display at page:

Download "A Network-based Seamless Handover Scheme for Multi-homed Devices"

Transcription

1 A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, Abstract Terinal-based obility protocols require obile devices to participate in obility signaling that consues lots of processing power and eory. Network-based obility protocol solves this proble by excluding low-end obile devices fro signaling requireent. We earlier proposed SEMO6, a terinal-based obility protocol which exploits ultiple network interfaces to achieve sealess handover. In this paper, we have proposed a network-based obility solution for SEMO6. We have perfored a thorough cost analysis of its ajor obility entities that participate in obility anageent and also obtained their efficiency based on signaling overhead. Results show interesting relationships aong various network paraeters. Our signaling analysis can be used by network engineers to estiate the resource requireents of its entities in actual deployent. Index Ters Mobility anageent, Proxy Mobile IPv6, ultihoing, sealess handover. I. INTRODUCTION Proliferation in obile coputing has drawn significant attention of the research counity and Mobile IPv6 MIPv6) [1] was standardized to facilitate Internet connectivity to obile devices. However, as a host-based obility solution, Mobile IPv6 requires low-end obile devices to perfor all obility related signaling to aintain connectivity. Therefore, Internet Engineering Task Force IETF) proposed Proxy Mobile IPv6 PMIPv6) [2], a Network-based Localized Mobility Manageent NetLMM) solution which provides Internet connectivity to low power obile devices without requiring the to get involved in obility signaling. With the convergence of next generation wireless access technologies, such as 82.11, WiMAX, GPRS, 3G, etc, obile devices are now getting equipped with ultiple network interfaces that can facilitate increased availability, fault tolerance. This capability of counicating through ultiple network interfaces is soeties tered as ultihoing. Though PMIPv6 supports ultihoing, it has not been specified clearly how to achieve sealess handover in ultihoing scenario. Multi-hoed obile devices can aintain sealess connectivity with ultiple wireless access networks, thereby benefitting the ongoing sessions with its peers. We, therefore, proposed SEaless MObility using Shi6 SEMO6) [3], [4], a network-layer based solution that provides sealess connectivity to ulti-hoed obile devices. However, SEMO6 is a terinal-based protocol and it requires involveent of the low-power obile devices for obility anageent. A few works on PMIPv6 and related protocols have been reported in the literature. Iapichino et al. [5] propose a ulti-hoing solution cobining Host Identity Protocol with PMIPv6. Lee et al. [6] copares HMIPv6 and PMIPv6. Ki et al. [7] perfored handover analysis of PMIPv6. Iapichino et al. [8] perfored experiental evaluation of PMIPv6. However, none of the exiting works [6] [8] exploited the ultihoing feature of obile devices to iprove the perforance of PMIPv6. Although there exists a few entity-wise cost evaluation of obility protocols [9], [1] in the literature, no such evaluation for PMIPv6 has been attepted. Such an entity-wise evaluation is very crucial as obility anageent entities are very resource restricted and overloading of these entities ay result in coplete outage for the whole syste. Our objective of this work is to propose a network-based obility architecture that ensures sealess handover of obile devices through its ultihoing feature. We have proposed a novel obility architecture cobining the idea of PMIPv6 and SEMO6 [4] and naed it Proxy-SEMO6 that exploits ake-before-break strategy to achieve sealess handover in localized obility doain. In addition, we have perfored entity-wise cost evaluation of the proposed schee. The contributions of this work are: i) proposing a networkbased sealess obility solution for SEMO6, ii) developing an analytical odel to perfor signaling analysis of its key entities, and presenting nuerical results. Our results show the ipact of various network paraeters on the total overhead and perforance of the obility anageent entities of Proxy-SEMO6. Our proposed schee can guide design engineers to iprove the handoff perforance of network-based obility protocols that have received significant attention with the convergence of next generation all-ip networks. The rest of the paper is organized as follows. Section II explains basic SEMO6 [3] architecture in brief. In Section III, the proposed Proxy-SEMO6 architecture is explained along with its protocol operation and tiing diagra. Section IV presents a cost analysis of all the entities of Proxy-SEMO6, followed by the nuerical results in Section V. Finally, we conclude the paper in Section VI. II. SEMO6 ARCHITECTURE To achieve sealess handover of ultihoed obile devices, we earlier proposed SEMO6 [3], a terinal-based

2 Fig. 1. Proxy-SEMO6 architecture. obility solution in network layer. SEMO6 is based on Shi6 [11] and it decouples upper layer session identifier fro locator, thereby tries to reduce the ipact of obility on upper layer protocols, e.g., transport and application layers. SEMO6 focuses on providing a single platfor for obility and ultihoing. Moreover, it exploits ulti-hoing feature of Mobile Host MH) to iniize handover latency which is a very crucial factor for any handover protocol. However, as a terinal-based obility solution, the MH is responsible for all the obility-related signaling in SEMO6; thus, it consues significant aount of power a ajor concern for any obile device. Therefore, it is essential to design a network-based obility solution that relieves MH fro obility related signaling in addition to achieving sealess handover for ultihoed obile devices. III. PROXY-SEMO6 ARCHITECTURE Fig. 1 shows the Proxy-SEMO6 architecture which is siilar to Proxy MIPv6. The ain difference is the support of sealess obility for the ulti-hoed MH. Location Mobility Anchor LMA) keeps track of the MH in the localized obility doain and all traffic destined to the MH fro any Correspondent Node CN) are routed through the LMA. The Mobility Anchor Gateway MAG), usually the access router of the MH, perfors all obility related signaling on behalf of the MH, thereby saving MH s resources. In our proposed schee, we assued that LMA will allocate separate binding cache entry per interface of the MH. A. Tiing diagra The tiing diagra for the proposed Proxy-SEMO signaling is shown in Fig. 2. When any ultihoed MH enters the Proxy-SEMO6 doain, it attepts to attach to the access network L2 attachent) through one of its interfaces e.g., IF 1 ) and sends router solicitation to the access router e.g., MAG 1 ). Upon receiving the solicitation, the MAG uses MH s identification e.g., MAC address) to deterine whether the MH is authorized to use the localized obility support. The MAG then registers the MH s one interface IF 1 ) with the Fig. 2. Tiing diagra of Proxy-SEMO6 signaling. LMA through Proxy Binding Update PBU) which associates MAG 1 s address with MH s IF 1. The LMA adds a Binding Cache Entry BCE) into its table and establishes a bidirectional tunnel with the MAG 1 if one does not already exist. The LMA also sends Proxy Binding Acknowledgeent PBA) to the MAG 1 along with the assigned prefix. Upon receiving the PBA, the MAG 1 sends the MH Router Advertiseent that includes the allocated prefix), allowing MH to configure its IF 1 address through stateless auto-configuration. When the MH oves in a region that is covered by two access networks, it attepts to acquire another IP address fro the MAG 2 for its second interface IF 2 ) in a siilar way entioned above see Fig. 2). Thus, when the LMA receives the PBU fro the MAG 2, the LMA inserts another BCE into its table corresponding to the MH s IF 2 and establishes siilar bi-directional tunnel with the MAG 2. In addition, the LMA sends MH s CN a SEMO6 Update Request UR) essage to add this new IP address into CN s peer locator list. Thus, during the handoff, when the MH oves away fro the MAG 1 link, the L2 detachent) event is detected by the MAG 1 for exaple, through IPv6 neighbor unreachability detection event). The MAG 1 then infors the LMA about this event through the deregistration PBU which results in possible tunnel deletion if not needed for any other MH). At this point, the LMA sends CN UR essage so that CN can odify its peer locator list by reoving the MH s unreachable IP address. The CN can still continue the session using the unique ULID through the other locator corresponding to IF 2 ), thereby reducing handoff latency and packet loss.

3 B. Proxy-SEMO6 vs. PMIPv6 Proxy-SEMO6 attepts to reduce handover latency of PMIPv6 by exploiting the following strategies: Proxy-SEMO6 exploits the ake-before-break strategy, that is, attepts to connect through new MAG before disconnecting with the old MAG. It decouples the upper layer session identifier fro the location-based IP address, thereby ensuring session continuity, even though the MH s IP address varies due to the change of attachent point. However, Proxy-SEMO6 reduces handover latency of PMIPv6 at the cost of soe additional signaling e.g., sending UR essage to CN by the LMA). IV. SIGNALING COST ANALYSIS In this section, we perfor entity-wise cost analysis of Proxy-SEMO6. A. Assuptions and Notations To ake the odel analytically tractable, the following assuptions have been ade: Session arrival at each MH is equal. All session lengths are of equal size. Searching an entry in binding cache is assued to use binary search. Our cost analysis ignores standard IP switching costs. The notations used in the analysis are listed below. Nuber of MHs in the LMA-doain, N c Average nuber of CNs per MH, Nuber of MAGs in the LMA-doain, β M Unit transission cost for essage type M = {PBU, PBA, UR, UA,... } σ Proportionality constant of wireless link over wired link, ω Linear coefficient for lookup cost, T r Subnet residence tie, λ s Average session arrival rate, κ Maxiu transission unit, α Average session size, δ X Processing cost at entity X. B. Local Mobility Anchor In Proxy-SEMO6, the ajor costs for LMA are 1) initial registration cost, 2) binding update cost, 3) context establishent cost, 4) CN update cost, and 5) data delivery cost. 1) Initial registration cost: We assue that ɛ fraction of MHs enters into the LMA-doain fro outside at a rate of θ d. Thus, a total of ɛ θ d MHs enters into the LMA-doain per second. When a MH enters the LMA-doain, the MAG tracks it and sends PBU to the LMA. The LMA processes the PBU, allocates prefix for the MH, updates the binding cache and sends back PBA to the MAG. This incurs transission costs β PBU and β PBA ) and processing cost δ LMA ) on the LMA. Thus, the cost incurred at the LMA is, Λ Reg LMA = ɛnθ ) d βpbu +β PBA +δ LMA 1) 2) Binding update cost: When the MH oves within the LMA-doain and crosses subnets in every T r seconds), the concerned new) MAG detects it and sends the PBU to the LMA. In addition, MAGs send periodic refreshing updates to the LMA for extending the binding lifetie so that the entries are not reoved fro the cache. Let the binding lifetie bet l. Hence, frequency of sending periodic refreshing updates are η r = T r T /Tr l, and total frequency of sending LU and refreshing PBU is η t = 1 + T r ) T l /T r, This incurs transission cost β PBU and β PBA ) and lookup cost ωlog 2 ) at the LMA. Hence, ) Λ PBU LMA = η t βpbu +β PBA +ωlog 2 2) 3) Context establishent cost: The LMA establishes Shi6 context with the MH so that LMA can subsequently send update to CN about the locator change when MH oves to a new MAG-region). During the context establishent phase, the LMA is infored about the ULID, locator list and current locator used by the MH. Thus, it incurs transission cost for Shi6 Context β SC ) and processing by the LMA. Hence, Λ SC ) LMA = λ s 2βSC +δ LMA 3) 4) CN update cost: In order to odify the CN s peer locator list, LMA sends UR essage to CN whenever any new binding entry is inserted corresponding to MH s second interface. Furtherore, when MAG sends deregistration essage to the LMA, the LMA deletes corresponding binding entry and infors CN through UR essage. Thus, the cost on LMA regarding UR essage is as follows: Λ UR LMA = NNc ) βur +β UA 4) T r 5) Data delivery cost: In a session between the CN and MH, an average of α κ data packets and corresponding ACK) are transitted. The total data packet arrival rate to the LMA is λ p = N c λ s α κ. Data packets received by the LMA are tunneled through the respective MAG to the destination MH. This incurs transission cost for data and Ack packet β DP and β DA ) including extra IP-header β IP ), and lookup cost. Therefore, data delivery cost for the LMA is given ) by, Λ DD LMA = λ p βdp +β DA +β IP +ωlog 2 5) 6) Total Cost on LMA: Thus, the total cost on the LMA can be obtained by adding Eqns. 1), 2), 3), 4) and 5): Λ LMA = Λ Reg LMA +ΛPBU LMA +Λ UR LMA +Λ SC LMA +Λ DD LMA 6) C. Mobility Anchor Gateway The ajor costs for each MAG are 1) MH authentication cost, 2) binding update cost, and 3) data delivery cost. 1) MH authentication cost: For every registration request fro an incoing MH, the MAG is responsible for authentication. Based on the credentials AAA inforation) of the MH, the MAG either accepts or rejects the registration request. As a total of ɛ θ d MHs enters into the LMA-doain per second and if there are MAGs in the LMA-doain, therefore each MAG processes ɛ θ d / authentication requests. Hence, Λ AAA MAG = ɛnθ d δmag 7)

4 2) Binding update cost: Assuing MHs are uniforly distributed in the LMA-doain, each MAG sends PBU and refreshing PBU essages receives corresponding PBA) on behalf of / MHs. Moreover, the MAG has to detect the oveent of the MH inside its doain in to sense its arrival or departure, thereby requiring processing cost at MAG δ MAG ). Hence, cost incurred at each MAG for binding updates can be obtained as follows: Λ PBU MAG = ηtn ) βpbu +β PBA +δ MAG 8) 3) Data delivery cost: Each MAG receives data packets tunneled fro the LMA and decapsulate the and sends the to the corresponding MH. So the data delivery cost at each MAG is given by, α κ λ s βdp +β DA +β IP ) Λ DD MAG = NNc 9) 4) Total Cost on MAG: Thus, the total cost on each MAG can be obtained by adding Eqns. 7), 8) and 9): D. Mobile Host Λ MAG = Λ AAA MAG +Λ PBU MAG +Λ DD MAG 1) As a network-based obility solution, Proxy-SEMO6 incurs least cost at the MH. As all the encapsulation and decapsulation are perfored by the MAG for the packets to and fro the MH), the wireless access network is not affected by the extra IP headers. Other than packet delivery, the only task a MH is required to do is to establish Shi6 context with the LMA after registers with the LMA-doain. Thus, the total cost for each MH is as follows: α ) Λ MH = σn c λ s βdp +β DA +2λsβ SC 11) κ E. Efficiency We define a new etric called efficiency to easure the perforance of Proxy-SEMO6. It is defined as the ratio of net data delivery cost excluding all overheads) to the total cost that includes signaling and data delivery costs). The net data delivery cost of LMA can be expressed as follows: Λ Net DD ) LMA = λ p βdp +β DA 12) Hence, the efficiency of LMA is given by, ξ LMA = ΛNet DD LMA 13) Λ LMA The net data delivery cost of MAG can be expressed as follows: Λ Net DD MAG = NNc α ) s βdp +β DA 14) κ λ Hence, the efficiency of MAG is given by, ξ MAG = ΛNet DD MAG 15) Λ MAG The net data delivery cost of the MH can be expressed as follows: Λ Net DD α ) MH = σn c λ s βdp +β DA 16) κ Hence, the efficiency of MH is given by, ξ MH = ΛNet DD MH 17) Λ MH V. NUMERICAL RESULTS In this section, we present nuerical results showing ipact of various syste paraeters on Proxy-SEMO6 entities. The paraeter values used in nuerical analysis are derived using siilar approaches used in [9], [1]; each cost etric is a relative quantity and is based on the specific packet size unit cost for 1 bytes [9]). For exaple, β PBU =.76, since the size of PBU packet is 76. Therefore, we have set the paraeters as follows: β PBA =.76, β IP =.4, β DP = 5.72, β DA =.6, ɛ = 2%,θ d =.1, σ = 1, η =.3, η =.3, λ s =.1, δ LMA =.3, δ MAG =.3, κ = 512 bit/sec, α = 124 bits. The default values of other paraeters are = 1, T r = 7 sec, = 4, N c = 1. It can be noted that while coputing the total overhead of the LMA and MAG, we have considered all the factors considered including tunneling overhead, except payload delivery cost. A. LMA Fig. 3 shows the ipact of Session to Mobility Ratio SMR) on the total overhead of LMA for different nuber of MHs in the LMA-doain. SMR is the product of subnet residence tie T r ) and session arrival rate λ s ). We kept λ s =.1 fixed) while varying T r value. Again higher nuber of MHs under the LMA-doain increases the data delivery overhead on the LMA, resulting in higher overhead on the LMA. However, with respect to SMR, the total overhead on LMA decreases very slowly. This is due to the fact that higher SMR less obility rate) causes reduction in PBU cost, which is very sall copared to the data tunneling overhead. Hence the graphs are alost flat in nature. This is an interesting finding phenoena obtained fro our analysis. Fig. 4 shows the ipact of nuber of CNs per MH) on the total overhead of LMA. Total overhead increases for both increased nuber of CNs and higher session arrival rates. Higher session arrival affects data tunneling overhead since ore data packets are required to be tunneled through LMA. Fig. 5 shows the ipact of SMR on the efficiency of LMA. We find that efficiency increases for higher session lengths, having ore payload traffic copared to obility signaling traffic. In addition, the efficiency of LMA increases slowly with the increase of SMR since higher SMR less obility) causes reduced signaling traffic for the LMA. However, efficiency falls a little bit when the value of T r is 12 sec SMR = 1.2) and again in SMR = 2.4 due to rise in signaling traffic caused by refreshing updates. B. MAG Fig. 6 shows the ipact of subnet residence ties on the total overhead of each MAG, for different nuber of MHs in the PMIPv6-doain. The total overhead on each MAG decreases for higher values of T r, producing less PBUs. However, there are soe additional refreshing PBU sent to the LMA by the MAG, to keep the binding entry valid and those refreshing PBUs causes the overhead on MAG to rise in 12 sec and then 24 sec, which are ultiple of binding entry lifetie.

5 Total overhead on LMA N = 1 = 3 = Session to Mobility Ratio Total overhead on LMA 5 4 x 1 5 λ s =.1 λ =.4 s λ =.16 s Nuber of CNs 8 1 Efficiency of LMA %) α = 5k 52 α = 1k α = 2k Session to Mobility Ratio Fig. 3. Ipact of SMR on the total overhead of LMA for different nuber of MHs. Fig. 4. Ipact of nuber of CNs on total cost of LMA for different session arrival rates. Fig. 5. Ipact of SMR on the efficiency of LMA for different session lengths. Total Overhead on MAG = 1 = 3 = Subnet Residence Tie sec) Efficiency of MAG %) Nc = 1 Nc = 5 Nc = Session length bits) x 1 4 Signaling Overhed on MH %) α = 5kb α = 1kb α = 2kb Nuber of Correspondent Nodes Fig. 6. Ipact of subnet residence ties on total overhead of each MAG for different nuber of MHs in the PMIPv6-doain. Fig. 7. Ipact of session lengths on the efficiency of each MAG for different nuber of CNs. Fig. 8. Signaling overhead on the MH vs. nuber of CNs. Fig. 7 shows the ipact of session lengths on the efficiency of each MAG. Efficiency increases for larger sessions as net data delivery through the MAG increases. In addition, higher nuber of CNs also results in ore data traffic to the CNs, resulting in iproved efficiency. C. MH The percentage of signaling overhead on each MH is shown in Fig. 8. The only signaling responsibility of MH other than data transission cost) is to establish Shi6 context with the LMA after its registration with it. Results show that the overhead is very sall <.25%) for the MH; the higher the session length is, the lower the percentage overhead is, having ore payload traffic copared to signaling traffic. VI. CONCLUSION In this paper, we have proposed a novel sealess obility solution for network-based obility anageent that requires least involveent of the low-power obile devices. We have developed analytical odel to derive the total overhead on the obility anageent entities of the proposed schee. Results show interesting relationships aong various network paraeters, such as, network size, obility rate, traffic rate. Our proposed schee can guide design engineers to iprove the handoff perforance of network-based obility protocols that have received significant attention with the convergence of next generation all-ip networks. REFERENCES [1] C. Perkins, D. Johnson, and J. Arkko, Mobility support in IPv6, IETF RFC 6275, Jul 211. [2] S. Gundavelli and K. L. et al., Proxy Mobile IPv6, IETF RFC 5213, August 28. [3] M. S. Rahan and M. Atiquzzaan, SEMO6 - A ultihoing-based sealess obility anageent fraework, in IEEE MILCOM, San Diego, CA, Nov 17-19, 28. [4] M. S. Rahan, M. Atiquzzaan, W. Ivancic, and W. Eddy, Perforance Coparison between MIPv6 and SEMO6, in IEEE GLOBE- COM, Miai, FL, Dec 6-1, 21. [5] G. Iapichino and C. Bonnet, Host identity protocol and proxy obile IPv6: A secure global and localized obility anageent schee for ultihoed obile nodes, in IEEE GLOBECOM, Honolulu, HI, Nov 3- Dec 4, 29. [6] J.-H. Lee, Y.-H. Han, S. Gundavelli, and T.-M. Chung, A coparative perforance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6, Journal of Telecounication Systes, vol. 41, no. 4, pp , Aug. 29. [7] M. S. Ki, S. K. Lee, D. Cypher, and N. Golie, Fast handover latency analysis in Proxy Mobile IPv6, in IEEE Global Telecounications Conference, Miai, FL, Dec [8] G. Iapichino and C. Bonnet, Experiental evaluation of Proxy Mobile IPv6: An ipleentation perspective, in IEEE WCNC, Sydney, Australia, April [9] A. Shahriar, M. S. Hossain, and M. Atiquzzaan, A cost analysis fraework for NEMO prefix delegation-based schees, IEEE Transactions on Mobile Coputing, vol. 11, no. 2, pp , Jul 212. [1] M. S. Hossain, M. Atiquzzaan, and W. Ivancic, Cost analysis of obility anageent entities of SINEMO, in IEEE ICC, Kyoto, Japan, Jun 5-9, 211. [11] E. Nordark and M. Bagnulo, Shi6: Level 3 ultihoing shi protocol for IPv6, IETF RFC 5533, Jun 29.

Analysis of Proxy Mobile IPv6: A Network-based Mobility Solution

Analysis of Proxy Mobile IPv6: A Network-based Mobility Solution Analysis of Proxy Mobile IPv6: A Network-based Mobility Solution Md. Shohrab Hossain and Mohammed Atiquzzaman School of Computer Science, University of Oklahoma, Norman, OK 7319 Email: {shohrab, atiq}@ou.edu

More information

School of Computer Science

School of Computer Science Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain, Mohammed Atiquzzaman TR-OU-TNRL-10-105 September 2010 Telecommunication & Network Research Lab School of Computer Science THE UNIVERSITY OF

More information

Cost and Efficiency Analysis of Hierarchical SIGMA

Cost and Efficiency Analysis of Hierarchical SIGMA Cost and Efficiency Analysis of Hierarchical SIGMA Md. Shohrab Hossain, Mohammed Atiquzzaman School of Computer Science, The University of Oklahoma Norman, OK 7319 Email: {shohrab, atiq}@ou.edu William

More information

Cost Analysis of Mobility Management Entities for SIGMA

Cost Analysis of Mobility Management Entities for SIGMA 010 International Conference on High Performance Switching and Routing Cost Analysis of Mobility Management Entities for SIGMA Md. Shohrab Hossain Mohammed Atiquzzaman University of Oklahoma, Norman, OK

More information

Cost Analysis of Mobility Management Entities of SINEMO

Cost Analysis of Mobility Management Entities of SINEMO Cost Analysis of Mobility Management Entities of SINEMO Md. Shohrab Hossain, Mohammed Atiquzzaman School of Computer Science, University of Oklahoma, Norman, OK 7319. Email: {shohrab, atiq}@ou.edu William

More information

Proxy Mobile IPv6 (PMIPv6)

Proxy Mobile IPv6 (PMIPv6) Sungkyunkwan University Proxy Mobile IPv6 (PMIPv6) - Grand ICT 연구센터지원사업라이프컴패니온쉽경험을위한지능형인터랙션융합연구 - 무선포함접속방식에독립적인차세대네트워킹기술개발 SDN/NFV 기반의기업유무선통합네트워크를위한액세스기술독립적오픈소스컨트롤러개발 - 자율제어네트워킹및자율관리핵심기술개발생체모방자율제어시스템및자율관리

More information

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation

More information

PMIPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS. Proxy Mobile IPv6. Peter R. Egli INDIGOO.COM. indigoo.

PMIPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS. Proxy Mobile IPv6. Peter R. Egli INDIGOO.COM. indigoo. PMIPv6 PMIPv6 Proxy Mobile IPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS Peter R. Egli INDIGOO.COM 1/25 Contents 1. Why PMIPv6 when we have MIP? 2. PMIPv6 terminology

More information

Keywords PMIPv6, Local Mobility Anchor, Mobile Access Gateway, AAA.

Keywords PMIPv6, Local Mobility Anchor, Mobile Access Gateway, AAA. Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Optimized Handover

More information

Experimental Evaluation of Proxy Mobile IPv6: an Implementation Perspective

Experimental Evaluation of Proxy Mobile IPv6: an Implementation Perspective Experimental Evaluation of Proxy Mobile IPv6: an Implementation Perspective Giuliana Iapichino and Christian Bonnet Mobile Communications Department Eurecom Sophia Antipolis, France {Giuliana.Iapichino,

More information

Seamless Handover Scheme for Proxy Mobile IPv6

Seamless Handover Scheme for Proxy Mobile IPv6 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication Seamless Handover Scheme for Proxy Mobile IPv6 Ju-Eun Kang 1, Dong-Won Kum 2, Yang Li 2, and You-Ze Cho 2 1 LGDACOM

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks

A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks ICACT Transactions on on the Advanced Communications Technology (TACT) Vol. Vol. 2, 2, Issue Issue 3, 3, May May 2013 2013 233 A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks

More information

O-PMIPv6: Optimized Proxy Mobile IPv6. Ahmad Rasem, Bachelor of Communications Engineering

O-PMIPv6: Optimized Proxy Mobile IPv6. Ahmad Rasem, Bachelor of Communications Engineering O-PMIPv6: Optimized Proxy Mobile IPv6 by Ahmad Rasem, Bachelor of Communications Engineering A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements

More information

AUTHENTICATION MECHANISM FOR FAST HANDOVER PMIPv6 NETWORKS

AUTHENTICATION MECHANISM FOR FAST HANDOVER PMIPv6 NETWORKS INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 AUTHENTICATION MECHANISM FOR FAST HANDOVER PMIPv6 NETWORKS N.S.Nandhinee PG Student Department of Computer Science

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Mobile IPv6 Overview

Mobile IPv6 Overview Sungkyunkwan University Prepared by H. Choo Copyright 2000-2018 Networking Laboratory Lecture Outline Network Layer Mobile IPv6 Proxy Mobile IPv6 Networking Laboratory 2/87 Sungkyunkwan University Network

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology

Introduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology 2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6

More information

Q-PMIP: Query-based Proxy Mobile IPv6

Q-PMIP: Query-based Proxy Mobile IPv6 Q-PMIP: Query-based Proxy Mobile IPv6 Jae Wan Park*, Ji In Kim*, Seok Joo Koh* *School of Computer Science and Engineering, Kyungpook National University, Korea jwparkinf8@gmail.com, jiin16@gmail.com,

More information

P-SIGMA: Paging in End to End Mobility Management

P-SIGMA: Paging in End to End Mobility Management P-SIGMA: Paging in End to End Mobility Management Abu S. Reaz, Mohammed Atiquzzaman Telecommunications and Networks Research Lab School of Computer Science, University of Oklahoma, Norman, OK 73019-6151,

More information

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Sangheon Pack, Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul, Korea

More information

Scalability Analysis of a Multihomed Network Mobility Protocol

Scalability Analysis of a Multihomed Network Mobility Protocol Scalability Analysis of a Multihomed Network Mobility Protocol Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science, University of Oklahoma Norman, OK 7319. Email: {shohrab, atiq}@ou.edu

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

PMIPv6: A Network-Based Localized Mobility Management Solution

PMIPv6: A Network-Based Localized Mobility Management Solution PMIPv6: A Network-Based Localized Mobility Management Solution by Ignacio Soto, Universidad Politécnica de Madrid; Carlos J. Bernardos, and María Calderón, Universidad Carlos III de Madrid; and Telemaco

More information

Signalling Cost Analysis of SINEMO: Seamless End-to-End Network Mobility

Signalling Cost Analysis of SINEMO: Seamless End-to-End Network Mobility Signalling Cost Analysis of SINEMO: Seamless End-to-End Network Mobility ABSTRACT Abu S Reaz, Pulak K Chowdhury, Mohammed Atiquzzaman School of Computer Science University of Oklahoma Norman, OK 73019-6151

More information

Context Reflector for Proxy Mobile IPv6

Context Reflector for Proxy Mobile IPv6 Context Reflector for Proxy Mobile IPv6 Sawako Kiriyama 1, Ryuji Wakikawa 2, Jinwei Xia 3 and Fumio Teraoka 1 1 Keio University Yokohama, Kanagawa, Japan {kiri@tera.ics.keio.ac.jp and tera@ics.keio.ac.jp}

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

A Scheme Improving Fast PMIPv6-based Network Mobility by Eliminating Tunneling Overload for ITS

A Scheme Improving Fast PMIPv6-based Network Mobility by Eliminating Tunneling Overload for ITS A Scheme Improving Fast PMIPv-based Network Mobility by Eliminating Tunneling Overload for ITS Seonggeun Ryu 1, Ji-Woong Choi 1, and Kyung-Joon Park 1 Abstract NEtwork MObility Basic Support (NEMO BS)

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks

Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks Journal of Information Processing Systems, Vol.7, No.4, December 2011 http://dx.doi.org/10.3745/jips.2011.7.4.627 Partial Bicasting with Buffering for Proxy Mobile IPv6 Handover in Wireless Networks Ji-In

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Performance Comparison between MIPv6 and SEMO6

Performance Comparison between MIPv6 and SEMO6 This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom proceedings. Performance Comparison between MIPv6 and

More information

Seamless Multicast Handover in PMIPv6-based Wireless Networks

Seamless Multicast Handover in PMIPv6-based Wireless Networks Seamless Multicast Handover in PMIPv6-based Wireless Networks Moneeb Gohar*, Seok Joo Koh*, Tae-Won Um**, Hyun-Woo Lee** *School of Computer Science and Engineering, Kyungpook National University **Electronic

More information

Improving LTE/EPC signalling for sporadic data with a control-plane based transmission procedure

Improving LTE/EPC signalling for sporadic data with a control-plane based transmission procedure Iproving LTE/EPC signalling for sporadic data with a control-plane based transission procedure Izuru Sato Network Syste Laboratories Fujitsu Laboratories Liited Kawasaki, Japan sato.izuru@jp.fujitsu.co

More information

A Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks

A Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks , pp.147-151 http://dx.doi.org/10.14257/astl.2015.117.35 A Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks Ronnie Caytiles, Seungyong Shin, Minji Yang and Byungjoo

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

Mobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1]

Mobile & Wireless Networking. Lecture 9: Mobile IP. [Schiller, Section 8.1] 192620010 Mobile & Wireless Networking Lecture 9: Mobile IP [Schiller, Section 8.1] Geert Heijenk Outline of Lecture 11 q Mobile IP Basics q 3 parts of Mobile IP: q Advertising Care-of Addresses q Registration

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Micro mobility improvement in proxy mobile IPv6 domain

Micro mobility improvement in proxy mobile IPv6 domain Micro mobility improvement in proxy mobile IPv6 domain Ahmed Baioumy Instituto Superior Técnico, Lisbon, Portugal November 2014 ahmed.baioumy@tecnico.ulisboa.pt Abstract Micro mobility is one of the most

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

Mobile QoS provisioning by Flow Control Management in Proxy Mobile IPv6

Mobile QoS provisioning by Flow Control Management in Proxy Mobile IPv6 Mobile QoS provisioning by Flow Control Management in Proxy Mobile IPv6 Taihyong Yim, Tri M. Nguyen, Youngjun Kim and Jinwoo Park School of Electrical Engineering Korea University Seoul, Rep. of Korea

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Technischer Bericht. Evaluating the Benefits of Introducing PMIPv6 for Localized Mobility Management

Technischer Bericht. Evaluating the Benefits of Introducing PMIPv6 for Localized Mobility Management Georg-August-Universität Göttingen Institut für Informatik ISSN Nummer 1611-1044 IFI-TB-2007-02 Technischer Bericht Evaluating the Benefits of Introducing PMIPv6 for Localized Mobility Management Jun Lei

More information

Performance Analysis of NEMO using City Section Mobility Model

Performance Analysis of NEMO using City Section Mobility Model Proceedings of 13th International Conference on Computer and Information Technology (ICCIT 2010) 23-25 December, 2010, Dhaka, Bangladesh Performance Analysis of NEMO using City Section Mobility Model Md.

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track Internet Engineering Task Force (IETF) Request for Comments: 6572 Category: Standards Track ISSN: 2070-1721 F. Xia B. Sarikaya Huawei USA J. Korhonen, Ed. Nokia Siemens Networks S. Gundavelli Cisco D.

More information

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6

Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Extended Correspondent Registration Scheme for Reducing Handover Delay in Mobile IPv6 Ved P. Kafle Department of Informatics The Graduate University for Advanced Studies Tokyo, Japan Eiji Kamioka and Shigeki

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

An Efficient Correspondent Registration to Reduce Signaling Overheads for Proxy Mobile IPv6

An Efficient Correspondent Registration to Reduce Signaling Overheads for Proxy Mobile IPv6 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 187 An Efficient Correspondent Registration to Reduce Signaling Overheads for Proxy Mobile IPv6 Pyung-Soo

More information

Handover Management for Mobile Nodes in IPv6 Networks

Handover Management for Mobile Nodes in IPv6 Networks TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we

More information

Route Optimization for Proxy Mobile IPv6 in IMS Network

Route Optimization for Proxy Mobile IPv6 in IMS Network Route Optimization for Proxy Mobile IPv6 in IMS Network Tsunehiko Chiba, Hidetoshi Yokota KDDI R&D Laboratories, Inc. Saitama, Japan Ashutosh Dutta, Dana Chee Telcordia Technologies, Inc. New Jersey, USA

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Proxy Mobile IPv6 (PMIPv6)

Proxy Mobile IPv6 (PMIPv6) Proxy Mobile IPv6 (PMIPv6) Youn-Hee Han yhhan@kut.ac.kr Korea University of Technology and Education Internet Computing Laboratory http://icl.kut.ac.kr Outline Background PMIPv6 (Proxy Mobile IPv6) Overview

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Internet Engineering Task Force (IETF) Request for Comments: 6612 Category: Informational May 2012 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6612 Category: Informational May 2012 ISSN: Internet Engineering Task Force (IETF) G. Giaretta, Ed. Request for Comments: 6612 Qualcomm Category: Informational May 2012 ISSN: 2070-1721 Interactions between Proxy Mobile IPv6 (PMIPv6) and Mobile IPv6

More information

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions Perforance Analysis of Exposed Terinal Effect in IEEE 80.11 Ad Hoc Networks in Finite Load Conditions Diitris Vassis 1, Georgios Korentzas 1 1 Dept. of Inforation and Counication Systes Engineering University

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

NEMO-based Mobility Management in LISP Network

NEMO-based Mobility Management in LISP Network 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP) NEMO-based Mobility Management in LISP Network Yizhen Wu, Ke Chen, Kaiping Xue, Dan Ni The Department of EEIS,

More information

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network (IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of

More information

Enhanced Mobility Control in Mobile LISP Networks

Enhanced Mobility Control in Mobile LISP Networks Enhanced Mobility Control in Mobile LISP Networks Moneeb Gohar School of Computer Science and Engineering Kyungpook National University Daegu, South Korea moneebgohar@gmail.com Ji In Kim School of Computer

More information

Configuring Proxy Mobile IPv6

Configuring Proxy Mobile IPv6 Information About Proxy Mobile IPv6, page 1 Restrictions on Proxy Mobile IPv6, page 3 (GUI), page 4 (CLI), page 6 Information About Proxy Mobile IPv6 Proxy Mobile IPv6 (PMIPv6) is a network-based mobility

More information

A Survey on Signaling Load in Mobility Management

A Survey on Signaling Load in Mobility Management ISSN: 2231-4946 Volume IV, Special Issue, December 2014 International Journal of Computer Applications in Engineering Sciences Special Issue on Advances in Computer and Communications www.caesjournals.org

More information

MAG Service Configuration Mode Commands

MAG Service Configuration Mode Commands MAG Service Configuration Mode Commands The MAG Service Configuration Mode is used to create and manage a Mobility Access Gateway service in an (ehrpd network) or a P-MIP S-GW (LTE-SAE network). The MAG

More information

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Mobile IPv6. Washington University in St. Louis

Mobile IPv6. Washington University in St. Louis Mobile IPv6 Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

On Secure-Smart Mobility Scheme in Proxy Mobile IPv6 Networks

On Secure-Smart Mobility Scheme in Proxy Mobile IPv6 Networks UBICOMM 014 : The Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies On Secure-Smart Mobility Scheme in Proxy Mobile IPv6 Networks Jae-Young Choi College

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

Analysis of the Application current X2 Interface Handover Process in LTE Technology

Analysis of the Application current X2 Interface Handover Process in LTE Technology CITACEE 213 ISSN: 2338-5154 Analysis of the Application current X2 Interface Handover Process in LTE Technology Uke Kurniawan Usan Departent of Electrical and Telecounication Engineering Telko University

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

EUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD

EUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD EUROPEAN ETS 300 428 TELECOMMUNICATION August 1995 STANDARD Source: ETSI TC-NA Reference: DE/NA-052619 ICS: 33.040 Key words: B-ISDN, ATM Broadband Integrated Services Digital Network (B-ISDN); Asynchronous

More information

Impact of SDN on Mobility Management

Impact of SDN on Mobility Management 2016 IEEE 30th International Conference on Advanced Information Networking and Applications Impact of SDN on Mobility Management Kuljaree Tantayakul IRIT-ENSEEIHT University of Toulouse, France Email:

More information

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Distributed Mobility Management in Proxy Mobile IPv6 using Hash Function

Distributed Mobility Management in Proxy Mobile IPv6 using Hash Function Distributed Mobility Management in Proxy Mobile IPv6 using Hash Function Ji In Kim School of Computer Science and Engineering Kyungpook National University Daegu, Korea jiin16@gmail.com Seok Joo Koh School

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

Network PMIP Support COPYRIGHT. 3GPP2 X.S Version 1.0 Date: December 5, 2008

Network PMIP Support COPYRIGHT. 3GPP2 X.S Version 1.0 Date: December 5, 2008 GPP X.S00-0 Version.0 Date: December, 00 COPYRIGHT GPP and its Organizational Partners claim copyright in this document and individual Organizational Partners may copyright and issue documents or standards

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

PERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS

PERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS PERFORMACE AALSIS OF THE MTS SSTEM FOR PACKET DATA TRASFER OVER DEDICATED CHAELS Manju Sarvagya, Ratna V. Raja Kuar Departent of Electronics and Electrical Counication Engineering Indian Institute of Technology,

More information

Fast-Handover Mechanism between WLAN and WiMax with MIH in PMIPv6

Fast-Handover Mechanism between WLAN and WiMax with MIH in PMIPv6 Telecommun Syst (2014) 55:47 54 DOI 10.1007/s11235-013-9750-x Fast-Handover Mechanism between 802.11 WLAN and 802.16 WiMax with MIH in PMIPv6 Cheol-Joong Kim Seok-Cheon Park Myung-Kyu Yi Published online:

More information

A wireless sensor network for visual detection and classification of intrusions

A wireless sensor network for visual detection and classification of intrusions A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang

More information

Mobile IPv6. Raj Jain. Washington University in St. Louis

Mobile IPv6. Raj Jain. Washington University in St. Louis Mobile IPv6 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 13-1 Overview! IPv6:

More information

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National

More information