Implementation and Analysis of a Testbed for IP-Based Heterogeneous Wireless Networks
|
|
- Ann Justina Turner
- 6 years ago
- Views:
Transcription
1 Implementation and Analysis of a Testbed for IP-Based Heterogeneous Wireless Networks JYH-CHENG CHEN, CHING-YANG HUANG, SHUN-CHAO HUANG, MING-CHIA JIANG, CHIA-FENG KANG, HONG-WEI LIN, LIAN-DONG LIU,YI-WEN LIU, JUI-HUNG YEH National Tsing Hua University Hsinchu, Taiwan Abstract: - This paper presents a generic testbed for IP-based heterogeneous wireless networks. The testbed comprises GPRS, wireless LANs, VoIP system, and PSTN. The interworking between GPRS and WLAN is achieved by a GPRS-WLAN Mobility Gateway (GWMG) that resides on the border of GPRS system. A WLAN-centric authentication is proposed and implemented to authenticate users in the testbed. The Mobile IP messages are capable of traversing NAT. A simplified SIP user agent is implemented to execute IP signaling for real-time sessions. The testbed also incorporates a traffic conditioner such that QoS control mechanism can be enforced. Furthermore, by connecting to the public Internet and PSTN, any user in the world can make a real circuit-switched or packet-switched phone call to any user in our testbed. In addition, a privacy network architecture is proposed to protect the location privacy of Internet users. Performance analysis in terms of handoff latency, packet delay, and packet loss is achieved by empirical experiments. Key-Words: All-IP wireless networks, mobility management, authentication, NAT, VoIP, privacy network, QoS, and signaling. 1 Introduction Today, many different wireless systems exist, ranging from wireless PANs (Personal Area Networks), wireless LANs (Local Area Networks) to outdoors cellular systems. They are typically not compatible with each other, making it difficult to roam from one system to another. Wireless PANs, LANs, and cellular systems are also being developed and are evolving independently. Although ITU IMT-2000 has been trying to unify third-generation (3G) wireless systems, incompatible systems are expected to co-exist in the future. No wireless technology has emerged as a common and long-term universal solution. IP (Internet Protocol), which is already a universal network-layer protocol for wireline packet networks, is becoming a promising universal network-layer protocol over all wireless systems. An IP device, with multiple radio interfaces or software-defined radio, could roam between heterogeneous wireless systems if they all support IP as a common network layer. Unlike today's radio systems that depend heavily on proprietary technologies, IP provides a globally successful open infrastructure for services and applications. Such an all-ip wireless and wireline network could also make wireless networks more scalable and cost effective. Although IP is a promising technology for future generation wireless networks, there are still many challenges for realizing IP-based heterogeneous wireless networks. Constructing a testbed is one of the effective ways to inspect and experiment various design alternatives. This paper illustrates a testbed being building at the WIRE Lab (Wireless Internet Research & Engineering Laboratory) for future generation wireless networks. The testbed, which comprises numerous IP-based protocols and applications, is capable of demonstrating wireless multimedia communications in heterogeneous networks. Major technologies of a completed system, including mobility management, security, NAT (Network Address Translation, IETF RFC 2663), VoIP (Voice over IP), signaling, QoS (quality-of-service), and location privacy are implemented. Empirical experiments are conducted to analyze the testbed performance. Section 2 defines the testbed architecture. It also describes the realization of network components and protocols. Section 3 depicts the testbed implementation. Section 4 illustrates the experimental results. Section 5 concludes the paper. 2 Architecture and Protocols With a view to realizing different network components, protocols, and applications in future IP-based heterogeneous networks, a testbed has been implemented to examine design alternatives and to perform various experiments.
2 Fig. 1. Testbed architecture Fig. 1 presents the testbed architecture. There are four major components in the testbed including GPRS, public WLAN, private WLAN, and VoIP networks. The testbed is connected to the public Internet by a router. In addition, it connects to the Public Switched Telephone Network (PSTN) by a PSTN gateway. The critical integration issues and solutions implemented in the testbed are discussed in next sessions. 2.1 GPRS-WLAN Mobility Gateway (GWMG) General Packet Radio Service (GPRS), a wireless packet system based on the GSM architecture, is designed to serve highly mobile subscribers with sophisticated high-power radio. Cell diameters generally can exceed 10 Km. Current available data rate is limited on the range of Kbps. On the other hand, by utilizing short range and low power radio, wireless LANs (WLANs) are mainly deployed in indoor environment for low mobility and high speed applications. The bit rates of WLANs range from 11 Mbps (e.g. IEEE b) to 54 Mbps (e.g. IEEE a). Therefore, users might want to use GPRS virtually anywhere to access to the Internet. They nevertheless would like to leverage the high-speed access of WLANs whenever it is possible. However GPRS and WLANs are based on different networking technologies. The integration of them, especially seamless roaming, thus becomes a critical issue. Mobile IP (IETF RFC 3220) is the mobility management protocol developed by the Internet Engineering Task Force (IETF). It is a natural choice that the testbed employs Mobile IP as the mobility management protocol in WLANs. To integrate Mobile IP with the mobility management defined in GPRS, we design a GPRS-WLAN Mobility Gateway (GWMG) [1]. By simply deploying the GWMG on the border of GPRS and WLANs, users could seamlessly roam among these two systems without changing the existing infrastructure. The GWMG is a logical entity that could be implemented stand-alone or as an addition to the gateway GGSN which connects GPRS to external IP networks. Because a user might have his/her home network in either GPRS or WLAN networks, the gateway should be able to function like a Home Agent (HA) and Foreign Agent (FA). The two cases when a user has home network in WLANs and GPRS, respectively, are described as follows: Home in WLANs - When the home network of a user is in WLANs, the correspondent node 2
3 (CN) sends its traffic to the WLAN system regardless of the mobile station's (MS) anchor point. The home network should be able to tunnel traffic to the MS's current location. In this scenario, the gateway should function like a FA. To identify a MIP (Mobile IP) request, the Access Point Name (APN) in PDP context is utilized to select the specific network service. Home in GPRS In this case, the GWMG plays a role as HA and connects to GGSN through the standard G i interface. When both MS and CN are inside GPRS, packets from CN to MS will pass through BSS, SGSN and finally arrive at GGSN. GGSN will route them to the suitable SGSN by looking at the PDP context of the MS. Once a MS moves to WLANs, the MS will send MIP registration message to its HA (the GWMG). The GWMG then will send a message to inform the GGSN that the MS is out of the GPRS network. GGSN, thus, needs to initiate PDP context deactivation to delete the PDP context in GGSN, SGSN and the MS. If there are packets from GPRS network to the MS, GGSN will forward them to the GWMG rather than SGSN due to lack of PDP context of the MS. When MS is in GPRS network and CN is in WLANs, it works as what defined in the standards. Once a MS roams to WLANs, packets from CN to MS will be intercepted and tunneled by HA (the GWMG) to WLANs once the MIP registration is completed. 2.2 Authentication A SIM-based authentication is preferable for GPRS operators for the integrated GPRS and WLAN networks. It requires WLAN system processes the GPRS-based authentication and transports the GPRS authentication messages back to the GPRS networks. In real world, however, the WLAN users may not be subscribers of the GPRS system. There is no SIM card in WLAN users. In addition, the WLAN operators may not want to reconstruct their WLANs for SIM-based authentication. We propose an alternative WLAN-centric approach based on the perspective of WLAN providers. By deploying WLAN-based Authentication, Authorization, Accounting (AAA) server in both GPRS and WLAN networks as shown in Fig. 2, WLAN users could be authenticated between GPRS and WLAN systems without using a SIM card. Fig. 2. Architecture for WLAN-centric authentication The proposed architecture is based on the loose coupling architecture. In addition, GPRS and WLAN are two parallel systems and work independently. That is, GPRS and WLAN systems could keep existing authentication mechanisms. In GPRS, the authentication process is based on the Authentication and Key Agreement (AKA) developed in GSM. For WLANs, we assume IEEE 802.1X [2], which is now widely deployed in many 802 series standards, is adopted. Because both GPRS and WLANs are widely deployed already, an efficient way to integrate them should reduce the impact on the existing systems as much as possible. The key component in our WLAN-centric architecture is an AAA server, which is installed in both GPRS and WLAN networks. Although RADIUS (Remote Authentication Dial in User Service, IETF RFC 2865) or other servers can serve as the AAA server, in the testbed we use Diameter (IETF RFC 3588) to illustrate our design. In order to filter proper messages to the GPRS AAA server, Fig. 2 shows that an additional Registration Filter (Reg-Filter) is deployed between BSS and SGSN in the GPRS network. Based on the architecture and a two-phase authentication, WLAN users can execute WLAN-based authentication in GPRS networks as they are in WLANs. GPRS subscribers are authenticated by the GPRS authentication mechanism in GPRS networks. All users perform WLAN-based authentication in WLAN systems [3]. 2.3 Network Address Translation Mobile IP assumes every mobile node have a globally unique IP address. However, with the explosive growth of Internet, IPv4 address is 3
4 Fig. 3. UDP tunnelling Fig. 4. Privacy network architecture running out. Network address translator (NAT) that translates between private and public addresses allows several hosts to share one public IP address. However, there are some conflicts between Mobile IP and NAT. The use of tunnel in Mobile IP conceals some information that NAT needs. It is also possible that two mobile stations with identical private IP addresses roam into the same foreign network. We propose the following mechanisms to integrate Mobile IP and NAT: UDP tunneling - UDP tunneling [4] [5] is introduced for encapsulated packet to traverse through NAT. UDP tunneling inserts an additional UDP header into the encapsulated packet as shown in Fig. 3. Thus, NAT could obtain enough information to translate encapsulated packets between private realm and public realm. Static port - Port 434 is the default port number that HA receives registration request message. We bind NAT s port 434 to HA s port 434. When NAT receives any packet from port 434, it will simply redirect the packet to HA s port 434. Therefore, HA can get the registration message. Reverse tunneling Because CN may not reside inside same home network as MS, we mandate the reverse tunneling. With reverse tunneling, all packets from MS will be tunneled to home network first, which then is forwarded to CN by HA. Therefore, packets will traverse through NAT. The CN will get packets with source IP address set to the home NAT s public IP address. Thus, the home NAT would translate the reply packets. In UDP tunneling, data packets will always be encapsulated with UDP destination port 434. With the combination of reverse tunneling and static port, packets could be transferred transparently between CN and MS [6]. 2.4 Signaling The testbed comprises a simplified Session Initiation Protocol (SIP, IETF RFC 3261) User Agent (UA) implemented by the WIRE Lab. The SIP UA executes IP signaling so real-time multimedia sessions can be established between two end points. The WIRE SIP UA includes a Graphic User Interface (GUI) for ease of operation. It mimics a video telephone such that a user can make a multimedia communication through the GUI. After the connection is built, users can not only talk to each other but also see each other in real-time. In addition, a whiteboard is also invoked for information exchange. In the testbed, each laptop is equipped with a PC camera to capture real-time video. Although we develop and implement the WIRE SIP user agent, multimedia applications associated with SIP are vic, rat, and wbd which are available in public domain [7]. 2.5 Voice over IP With Voice over IP (VoIP), voice is sampled and encoded into digital data stream. The digital voice data stream is then segmented and capsulated into IP packets. Voice call is then delivered by IP networks. As shown in Fig. 1, the testbed is connected to the PSTN by a PSTN gateway. The signaling between PSTN and the testbed is controlled by a Media Gateway Controller (MGC), which implements the MEGACO protocol (IETF RFC 3051). PSTN phones (including cellular phones) could initiate a real phone call to the SIP phones 4
5 inside our testbed. The MGC controls the signaling between PSTN and IP networks. Circuit-voice and packet-voice are converted by the PSTN gateway. Users within our testbed could roam between GPRS, public and private WLANs while keeping the session uninterrupted. 2.6 QoS Control In WLANs, we deploy a TC (Traffic Conditioner), which is based on the implementation in Linux kernel, in the testbed to limit the maximum traffic going through a specific IP address and port number. Traffic from each Access Point (AP) into the backbone is controlled by a TC. The TCs are controlled by a TC Controller which instructs each TC how to condition user traffic. The TC Controller and TC essentially function like Policy Decision Point (PDP) and Policy Enforcement Point (PEP), respectively, as that defined in the Policy Framework (IETF RFC 2753) and COPS (Common Open Policy Service, IETF RFC 2748). In addition to the implementation of TC and TC Controller, the testbed also incorporates a GUI center in which one can control the maximum bandwidth from each MS. Once the QoS rule (maximum bandwidth) is enforced, traffic from each MS cannot exceed the defined value unless the operator resets it. To preserve the same QoS level after handoff, the HA issues a Conditioning Request to the TC Controller with the MS's new IP address when receiving a Binding Update from a MS. The TC Controller then sends a request to the associated TC in the new subnet to enforce the same QoS rule. Finally, the QoS rule in the TC in old subnet is revoked as that the MS is no longer within that subnet. 2.7 Location Privacy In Today s Internet, an IP address uniquely identifies a host. For two hosts to communicate with each other, the routing decisions are done based on destination IP address if no advanced routing criteria are defined. Because an IP address represents both identity and location of the host, sending and receiving IP packets usually expose where the user is and possibly also show the identity of the user. We call the issue of exposing IP address information as location privacy problem. To solve the problem, we propose to build a core network through which users can connect each other without knowing where the corresponding user is. An architectural is shown in Fig. 4, in which Host X (X stands for A, B, C and D) are users of the privacy network. Privacy Points are the accessing nodes for users which have subscribed to the privacy service. That is, all privacy service connections will be connected to the privacy points first and routed through the privacy network. Packets then are sent to the corresponding hosts through the nearest privacy point. For example, to build a connection between Host A and Host B, Host A finds out its nearest privacy point and sends out its connection request for Host B through its privacy point. The contacted privacy point determines where packets should be sent to and forwards packets to the determined location. In this scenario, packets are forwarded to another privacy point which is the nearest point to Host B. Packets then will be sent to Host B by this privacy point. The reply packets from Host B are forwarded in reverse direction. Because the testbed is a continuous work, it has not incorporated the privacy service. However an independent testbed has been constructed to demonstrate the feasibility of the proposed idea. 3 Testbed Implementation The testbed architecture is shown in Fig. 1. In the testbed, a GPRS system consisting of HLR, BSS, SGSN and GGSN is purchased from the Industrial Technology Research Institute (ITRI). The MSC is not implemented because the experiments focus on packet-switched network. Due to the regulation of spectrum allocation, instead of GPRS BTS (base transceiver station) an emulator using IEEE b radio is used to emulate the GPRS radio. In GPRS core network, the Reg-Filter function we implement is co-located with SGSN. We also implement the additional AAA server of Diameter and the GPRS-WLAN Mobility Gateway (GWMG) which are shown as gateway in Fig. 1. The gateway connects to GGSN through the G i interface. We have constructed two foreign networks in WLANs. One is a private network with a NAT as the border router. The other one is a public WLAN. The VONTEL VoIP system is also purchased from ITRI. The PSTN Gateway connects our testbed to the PSTN through the PBX (Private Branch exchange) of the university. Any user in public Internet or PSTN including public cellular users can make a real phone call to users in our testbed. Any user in the testbed can also make a phone call to any user in the world, including public Internet, PSTN, and cellular users. As mentioned earlier, currently the privacy network is implemented independent to the testbed. 5
6 Fig. 6. Throughput of video application Fig. 5. Handoff latency between GPRS and WLAN The implementation of SIP servers and privacy points is based on partysip [8]. The SIP user agent is modified from kphone 3.0 [9]. Also, we have implemented a Media Gateway (MG). 4 Experimental Analysis Based on the testbed architecture, various experiments were carried out to analyze the performance. The following sections show the quantified results for mobility management, authentication, NAT, and privacy network. To be more precise for analysis, simplified testbeds were constructed based on the integrated testbed for each specific issue. 4.1 Mobility Management To switch between GPRS and WLAN systems, we implement two policies: WLAN-preferred and usertrigger. In WLAN-preferred mode, the link quality is tracked. It changes to WLAN access if WLAN system is available. The link quality is tracked as well in user-trigger mode. On the other hand, the decision for switching systems is based on user command and the availability of radio interface. The coverage of GPRS and a WLAN is overlapped such that MS could be in the range of both GPRS and WLAN systems. In experiments initially the BTS of GPRS is turned on and the AP of the WLAN is off. MS thus attaches to GPRS and data is received and sent via GPRS radio interface. Once the AP of the WLAN is on, the MS changes to WLAN for high bandwidth service by WLAN-preferred mode Fig. 7. Latency for authenticating GPRS subscriber in WLAN because the WLAN radio is now available. MS then moves to the AP within private network. The MS follows the same path back to GPRS. This time the user-trigger mode is enforced to switch back to the GPRS radio. Fig. 5 indicates the handoff latency between GPRS and WLAN systems. In this experiment, CN continuously sends ping packets to MS with an interval of 1 ms. Fig. 5(a) shows that the average delay to detect FA advertisement is 54.7 ms when the MS moves from GPRS to WLAN. The average time for MS to receive ack from the HA after MS sends MIP registration message is 18.1 ms. Finally, it costs an average of 4.5 ms for MS to receive packets from CN again after the binding update in HA is done. The average handoff latency from GPRS to WLAN totally is 77.3 ms. Relatively, Fig. 5(b) presents the handoff latency from WLAN to GPRS. As mentioned above the handoff is triggered by user, and the average delay is 61.6 ms to send out the registration request. The average delay is ms for the MS to receive ack from the HA. After that, the average latency is 18.7 ms for MS to receive packets from CN again. By comparing them, we notice that the handoff latency from WLAN to GPRS is larger then the latency from GPRS to WLAN. This is because GPRS employs much more complex architecture and protocol stacks. As shown in Fig. 1, in GPRS network packets would need to go through several nodes with more protocol stacks to reach the HA. 6
7 Fig. 8. Latency for authenticating WLAN user in GPRS Due to space limitation, in addition to handoff latency this paper presents only the throughput of video application in Fig. 6. Experimental results discussed here are part of the multimedia conference initiated by SIP signaling. The video codec is based on H.263. Initially, MS obtains an averaged throughput of 56 Kbps in GPRS network. After roaming to WLAN, the traffic is conditioned by a TC with 200 Kbps, 400 Kbps and 600 Kbps, respectively. When MS first moves from GPRS to WLAN, the video quality is drastically improved because of high bandwidth of WLANs. The data rate dramatically drops in handoffs which are marked by vertical dotted-line. Even though there is no retransmission of UDP packets, the video coding techniques help recover loss of small amount of packets by other correctly received packets. 4.2 Authentication Fig. 7 illustrates the latency of a GPRS subscriber authenticated in a visiting WLAN. In the proposed WLAN-centric authentication, GPRS subscribers roaming into WLAN system are requested to perform the WLAN-based authentication, which is Diameter EAP application in our implementation. There are three stages as shown in Fig. 7. The total delay is 118 ms. Although details is not shown in this paper, the total delay for a WLAN user authenticating in WLAN system is 91 ms. Fig. 8 depicts the delay for a WLAN user attaching to GPRS system by the proposed twophase authentication. Because the first phase is WLAN-based, it is similar to Fig. 7 except for the additional K i update procedure. The K i update is measured from the time when GPRS AAA sends out an IMSI Used Notification/Ki Update message to HLR up to the time when the GPRS AAA receives the K i Update Ack message. As shown in Fig. 8, Identity Validation requires 1007 ms. Delays for Authentication, K i Update, and Success are 1012 ms, 605 ms, and 212 ms, respectively. Although the first Fig. 9. Mobile IP with NAT phase is also WLAN-based, it takes more time than that shown in Fig. 7. This is because messages are encapsulated in GPRS Mobility Management (GMM) protocol and are transferred to GPRS core network. First, the protocol stacks in GPRS are more complicated than that in WLAN system. Second, the bandwidth in GPRS is less than that in WLAN. Therefore it takes more time for a WLAN user to execute the first phase authentication. The second phase authentication is a standard GPRS attach. It takes 6172 ms.the total delay is 9008 ms. The delay of a normal GPRS authentication in the same testbed is also around 6172 ms. 4.3 Integration of Mobile IP and NAT Fig. 9 shows the testbed for the integration of Mobile IP and NAT. There are two home networks for two different mobile stations. The mobile stations will move into a same foreign network. Both home network and foreign network are private network with a NAT as the border router. Note that the home agents and foreign agent have the same private IP address and so do the two mobile nodes. This represents an extreme case which is used to show that our solution works even in a exaggerated configuration. Mobile nodes move from their home networks to the foreign network and then move back to their home networks. The experiments are compared with those in a Mobile IP system without NAT. Ping is used continuously when mobiles are moving. The handoff can be split into four stages: Advertisement time: The last ping-reply that MS gets until the MS gets a FA s advertisement. The FA advertisement is sent once per second. 7
8 Mobile IP without NAT Mobile IP with NAT Advertisement time ms ms Mobile node ms 1.594ms processing time Registration 10.58ms 10.75ms time Binding time ms ms Table 1. Handoff latency of Mobile IP with and without NAT Fig. 11. Testbed architecture for privacy network Mobile node processing time: The time between MS gets an advertisement to the time sends a registration request to HA. Registration time: The time between MS sends registration request to the time MS gets a registration reply. Binding time: The time between MS gets registration reply to the time MS get a ping reply. Table 1 summarizes the handoff latency. It indicates that our proposed solution would not incur too much overhead. Fig. 10 shows TCP sequence delay. TCP sequence delay is measured as the time between a TCP sequence is sent to the time an acknowledgment of this sequence is received. Sequence delay is around 20 ms in both scenarios and is increased to around one second for handoff. Due to the processing time of NAT, the sequence delay in Mobile IP with NAT is slightly longer than that Mobile IP system without NAT. However, they are very close. 4.4 Location Privacy Fig. 10. TCP sequence delay The network architecture for the experiments of the privacy network is shown in Fig. 11. Router 1, 2, and 3 assign global IPv6 addresses with router advertisements conforming to [10] using radvd [11]. They handle IPv6 prefixes 4004::/64, 4005::/64 and 4006::/64, respectively. Mobile IPv6 will choose one of these IP addresses to form its care of address (CoA). The privacy network includes one registrar and two privacy points. The privacy points connect to the public network with an identical IP address: 4000::1/16, which is used as an anycast IPv6 address. VoIP is used as the application in experiments. The CN initiates a session by sending out SIP INVITE. After the session is established under router 1 and router 2, the RTP (Real-Time Transport Protocol, IETF RFC 1889) packets are sent between these two nodes through the privacy network. The MS then moves to router 3. Based on the RTP sequence numbers, we collect the RTP packets received in the CN and MS. Results are depicted in Fig. 12 and Fig. 13. The discontinued oblique lines of Fig. 12 and Fig. 13 can be connected with a straight line. The lost packets caused by radio quality and mobile IP binding updates are denoted as vertical lines in these two figures. Although mechanisms are implemented to hide IP address, Fig. 12 and Fig. 13 indicate that the privacy network does not cause too much overhead. 8
9 Acknowledgment This work was sponsored in part by MOE Program for Promoting Academic Excellent of Universities under the grant number 89-E-FA04-1-4, National Science Council under the grant numbers E , E and E , and Industrial Technology Research Institute under the contracts of T , T and 2F Fig. 12. Received and lost RTP packets on CN Fig. 13. Received and lost RTP packets on MS 5 Summary Many radio access techniques and wireless systems exist today. They usually are not compatible with each other which make universal roaming not possible. As driven by mass business and market, there is an immediate need to unify wireless systems so that operators can utilize the network more efficient and mobile users can obtain services easily anytime and anywhere. IP, as it is in today's Internet, is a promising technology for future generation wireless networks. This paper presents a testbed of IP-based heterogeneous wireless network. It demonstrates integration of GPRS and WLAN networks. Mobility management, authentication, NAT, VoIP, QoS, signaling and location privacy are implemented and inspected. Experimental analyses are carried out to examine certain critical performance issues. The testbed is a continuous work. We plan to expand the testbed to a more sophisticated architecture with various crucial protocols and network components so that novel ideas related to IP-based heterogeneous wireless networks can be prototyped and experimented in the testbed. References: [1] H.-W. Lin, J.-C. Chen, M.-C. Jiang, and C.-Y. Huang, Integration of GPRS and wireless LANs with multimedia applications, Lecture Notes in Computer Science: Advances in Multimedia Information Processing - PCM 2002, Springer, pp , Dec [2] IEEE Std X-2001, IEEE Standard for Local and metropolitan area networks- Port- Based Network Access Control, Oct [3] M. C. Jiang, J. C. Chen, and Y. W. Liu, "WLAN-Centric Authentication in Integrated GPRS-WLAN Networks," in Proc. of IEEE Semiannual Vehicular Technology Conference, (VTC '03), Orlando FL, Oct [4] H. Levkowetz, Mobile IP Traversal of Network Address Translation (NAT) Devices. IETF RFC 3519, Apr [5] H. Levkowetz, Mobile IP NAT/NAPT Traversal using UDP Tunnelling. IETF Internet-Draft, Nov [6] C. Y. Huang, J. C. Liu, J. C. Chen, M. C. Jiang, and H. W. Lin, "Integration of NAT with Mobile IP," Proc. of Taiwan Area Network Conference (TANET '02), Hsinchu, Taiwan, pp , October [7] UCL network and multimedia research group. are. [8] A. Moizard, Partysip Mar [9] M. Mustikkamaki, kphone Jan [10] T. Narten, E. Nordmark, W. S. Neighbor Discovery for IP Version 6 (IPv6). IETF RFC 2461, Dec [11] L. Fenneberg, et al., radvd Oct
A GATEWAY APPROACH TO MOBILITY INTEGRATION
ACCEPTED FROM O PEN C ALL A GATEWAY APPROACH TO MOBILITY INTEGRATION OF AND WIRELESS LANS JYH-CHENG CHEN AND HONG-WEI LIN, NATIONAL TSING HUA UNIVERSITY GW HA/FA FA/HA 1 Router AP1 An early version of
More informationChapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach
Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Background: # wireless (mobile) phone subscribers
More informationTalk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks
Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Presented by Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Wireless Networks Cellular & Mobility Sec 7.4 7.8 Lina Battestilli 7.1 Introduction Wireless Chapter 7 Outline Wireless and Mobile Networks 7.2 Wireless
More informationVertical Handoff Characterization for SIP and msctp Based UMTS-WLAN Integration Solutions
Vertical Handoff Characterization for SIP and msctp Based UMTS-WLAN Integration Solutions Syed Asadullah, Ashraf S. Mahmoud, Marwan Abu-Amara, Tarek Sheltami Computer Engineering Department King Fahd University
More informationWireless LAN Based GPRS Support Node
Wireless LAN Based GPRS Support Node Vincent W.-S. Feng, Lin-Yi Wu, Yi-Bing Lin, and Whai-En Chen Department of Computer Science & Information Engineering National Chiao Tung University vincentfeng@itri.org.tw
More informationHandover Management for Mobile Nodes in IPv6 Networks
TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we
More information2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.
3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to IP Mobility Session 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda IP Mobility Overview Terminology
More informationMobility: vocabulary
What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,
More informationMobile IPv6 Operations Explored
Mobile IPv6 Operations Explored U.S. IPv6 Summit 2003 December 8-118 2003 Carl Williams NAv6TF Steering Committee and IPv6 Forum Technical Directorate carlw@mcsr-labs.org labs.org IPv6 Mobility/wireless
More informationIP Mobility vs. Session Mobility
IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when
More informationMobile SCTP for IP Mobility Support in All-IP Networks
Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming
More informationDue to the many benefits provided by both the third-generation (3G) mobile networks and the IEEE wireless local area networks (WLANs), it is
Performance of UMTS/WLAN Integration at Hot-Spot Locations Using OPNET Marwan Abu-Amara, Ashraf Mahmoud, Tarek Sheltami, Adel Al-Shahrani, Khalid Al-Otaibi, S.M.Rehman, and Taha Anwar {marwan, ashraf,
More informationGPRS and UMTS T
GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,
More informationComputer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
More informationAn approach for seamless handoff among mobile WLAN/GPRS integrated networks *
Computer Communications 29 (25) 32 41 www.elsevier.com/locate/comcom An approach for seamless among mobile WLAN/GPRS integrated networks * Rong-Hong Jan*, Wen-Yueh Chiu Department of Computer and Information
More information8.4 IMS Network Architecture A Closer Look
8.4 IMS Network Architecture A Closer Look 243 The anchoring of the media in TrGW also has an implicit topology-hiding effect. Without anchoring, the SDP answer provided to the other network would contain
More informationIPv6-based Beyond-3G Networking
IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless
More informationTODAY AGENDA. VOIP Mobile IP
VOIP & MOBILE IP PREVIOUS LECTURE Why Networks? And types of Networks Network Topologies Protocols, Elements and Applications of Protocols TCP/IP and OSI Model Packet and Circuit Switching 2 TODAY AGENDA
More informationSJTU 2018 Fall Computer Networking. Wireless Communication
SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP
More informationCSC 4900 Computer Networks: Mobility
CSC 4900 Computer Networks: Mobility Professor Henry Carter Fall 2017 Last Time What is the hidden terminal problem? How do CDMA networks use spectrum differently than TDMA systems? What is a chipping
More informationTCP/IP Mobility (Network Mobility)
COMP9336/4336 Mobile Data Networking www.cse.unsw.edu.au/~cs9336 or ~cs4336 TCP/IP Mobility (Network Mobility) 1 Lecture overview This lecture examines protocols and architectures that support mobility
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationA Flow Label Based QoS Scheme for End-to-End Mobile Services
A Flow Label Based QoS Scheme for End-to-End Mobile Services Tao Zheng, Lan Wang, Daqing Gu Orange Labs Beijing France Telecom Group Beijing, China e-mail: {tao.zheng; lan.wang; daqing.gu}@orange.com Abstract
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration
More informationSeamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism
Seamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism Bharatesh Chakravarthi S. B M.Tech. Dept of ISE The Oxford College of Engineering Bangalore, India Prof. D. Jayaramaiah
More informationQoS based vertical handoff method between UMTS systems and wireless LAN networks
QoS based vertical handoff method between UMTS systems and wireless LAN networks Sungkwan Jung and Dong-ho Cho Div. of EE, Dept. of EECS Korea Advanced Institute of Science and Technology Daejeon, Rep.
More informationAn Efficient DECT-Mobile IP Interworking for Mobile Computing
An Efficient DECT-Mobile IP Interworking for Mobile Computing Anthony Lo *, Winston Seah * and Edwin Schreuder + * Centre for Wireless Communications 1, National University of Singapore, 20 Science Park
More informationDesign and Analysis of a Mobility Gateway for GPRS-WLAN Integration
IEEE TRANSATIONS ON VEHIULAR TEHNOLOGY, VOL. X, NO. X, NOVEMBER 2007 1 Design and Analysis of a Mobility Gateway for -WLAN Integration Jyh-heng hen, Senior Member, IEEE, and Wei-Ming hen Abstract This
More informationEnd-User Controlled Vertical Handover Procedure for 4G Wireless Access Networks
End-User Controlled Vertical Handover Procedure for 4G Wireless Access Networks M. Gopu, Dr. Ritesh Khanna Abstract This paper proposes a user terminal-controlled mobility management across heterogeneous
More informationIntroduction to Wireless Networks. Chapter 7: Introduction to Heterogeneous Networks and
Introduction to Wireless Networks Chapter 7: Introduction to Heterogeneous Networks and ALL-IP Networks Prof. Yuh-Shyan Chen Department t of CSIE National Taipei University Outline Trend on Wireless/Cellular
More informationIEEE C /08
2003-01-10 IEEE C802.20-03/08 Project Title IEEE 802.20 Working Group on Mobile Broadband Wireless Access A Vision of an IP-based Cellular Network Date Submitted
More informationPerformance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks
Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation
More informationNo lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after.
Administrivia No lecture on Thurs. Last homework will be out this week (not due, covers wireless) Extra office hours for next week and the week after. 1 CSMA/CA: Recap Sensing in wireless medium is limited
More informationNetwork Architectures for Evolving 3G LTE and Mobile WiMAX
Network Architectures for Evolving 3G LTE and Mobile WiMAX All-IP networking is the ultimate goal of 4G mobile networks, but 3G LTE and mobile WiMAX systems have designed semi all-ip network architectures
More informationBi-directional Route Optimization in Mobile IP Over Wireless LAN
Bi-directional Route Optimization in Mobile IP Over Wireless LAN Chun-Hsin Wu*, Ann-Tzung Cheng, Shao-Ting Lee, Jan-Ming Ho and D.T. Lee Institute of Information Science, Academia Sinica, Taiwan {wuch,
More informationTSIN02 - Internetworking
Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand
More informationWiMAX Overview. Parviz Yegani Cisco Systems IETF-64 Nov. 7-11, 2005 Vancouver, Canada. Session Number Presentation_ID
WiMAX Overview Parviz Yegani Cisco Systems pyegani@cisco.com IETF-64 Nov. 7-11, 2005 Vancouver, Canada Session Number 1 Outline WiMAX NWG Goals Network Reference Model Reference Points and Interfaces NWG
More informationWireless Security Background
Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless
More informationAdvanced Computer Networks. IP Mobility
Advanced Computer Networks 263 3501 00 IP Mobility Patrick Stuedi Spring Semester 2014 1 Oriana Riva, Department of Computer Science ETH Zürich Tuesday 1 April 2014 Outline Last week: Today: Cellular Networks
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationInternet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects
Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP
More informationModule 6: Wireless Mobile Networks
Module 6: Wireless Mobile Networks SMD123 Computer Communications Kaustubh Phanse Department of Computer Science and Electrical Engineering Luleå University of Technology Lecture Objectives Wireless links
More informationIP micro-mobility protocols
IP micro-mobility protocols Pierre Reinbold University of Namur Belgium pre@info.fundp.ac.be http://www.infonet.fundp.ac.be Olivier Bonaventure Université Catholique de Louvain (UCL), Belgium Bonaventure@info.ucl.ac.be
More informationMobile IPv6 performance in networks: handover optimizations on the link and network layer
Mobile IPv6 performance in 802.11 networks: handover optimizations on the link and network layer LaTe project, Networking laboratory, TKK Mikko Hautala mhautala@cc.hut.fi 16.03.2006 Supervisor: Instructor:
More informationSeamless Handover Scheme for Proxy Mobile IPv6
IEEE International Conference on Wireless & Mobile Computing, Networking & Communication Seamless Handover Scheme for Proxy Mobile IPv6 Ju-Eun Kang 1, Dong-Won Kum 2, Yang Li 2, and You-Ze Cho 2 1 LGDACOM
More informationIntroduction. H.323 Basics CHAPTER
CHAPTER 1 Last revised on: October 30, 2009 This chapter provides an overview of the standard and the video infrastructure components used to build an videoconferencing network. It describes the basics
More informationFAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN
FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN SANGHEON PACK AND YANGHEE CHOI School of Computer Science and Engineering, Seoul National University, Seoul, Korea
More informationEfficient Handoff using Mobile IP and Simplified Cellular IP
Presented at GNSS 2004 The 2004 International Symposium on GNSS/GPS Sydney, Australia 6 8 December 2004 Efficient Handoff using Mobile IP and Simplified Cellular IP S. Omar School of Surveying & Spatial
More informationCPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts
1 CPSC 826 Intering Wireless and Mobile Networks Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 29, 200 Wireless and Mobile Networks Background Number
More informationOverview of the Cisco Mobile Wireless Home Agent
1 CHAPTER Overview of the Cisco Mobile Wireless Home Agent This chapter illustrates the functional elements in a typical Mobile IP packet data system, the Cisco products that are currently available to
More informationA Fast Handoff Scheme Between PDSNs in 3G Network
A Fast Handoff Scheme Between PDSNs in 3G Network Jae-hong Ryu 1 and Dong-Won Kim 2, 1 Electronics and Telecommunications Research Institute (ETRI) 161 Gajeong-dong, Yuseong-gu, Daejeon, 305-350, Korea
More informationSIP-based Mobility Architecture for Next Generation Wireless Networks
SIP-based Mobility Architecture for Next Generation Wireless Networks PerCom IEEE 2005 Presented by T.C. Lin 2006/01/25 Outline Introduction Overview of SIP Problem Description Proposed Architecture Performance
More informationElectrical Engineering and Computer Science
Wichita State University Libraries SOAR: Shocker Open Access Repository Ravi Pendse Electrical Engineering and Computer Science Quantitative Analysis of Enhanced Mobile IP Patricia K. Best Ravi Pendse
More informationPMIPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS. Proxy Mobile IPv6. Peter R. Egli INDIGOO.COM. indigoo.
PMIPv6 PMIPv6 Proxy Mobile IPv6 PROXY MOBILE IPV6 OVERVIEW OF PMIPV6, A PROXY-BASED MOBILITY PROTOCOL FOR IPV6 HOSTS Peter R. Egli INDIGOO.COM 1/25 Contents 1. Why PMIPv6 when we have MIP? 2. PMIPv6 terminology
More information4G Wireless Systems. Outlines. Data Rates of Wireless Networks. Wireless Networks. Wireless Networks Throughput versus Range
Outlines 4G Wireless Systems Vijay K. Garg, Ph.D., P.E. Department of Electrical & Computer Engineering, College of Engineering, University of Illinois at Chicago e-mail: garg.v@comcast.net Types of wireless
More informationIntroduction Mobility Support Handover Management Conclutions. Mobility in IPv6. Thomas Liske. Dresden University of Technology
2005 / High Speed Networks II Outline Introduction Mobility Support Overview of IPv6 Mobility Support Handover Management Mobility Support What means Mobility Support? allow transparent routing of IPv6
More informationOver-the-Air Management of Multi-Mode Mobile Hosts using SNMP
Over-the-Air Management of Multi-Mode Mobile Hosts using T. S. Randhawa R.H.S. Hardy (Corresponding Author) NewMIC Scientist Professor SierraWireless Cluster School of Engineering Science New Media Innovation
More informationA Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism
A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism Dae Sun Kim 1 and Choong Seon Hong 2 1 School of Electronics and Information, Kyung Hee Univerity 1 Seocheon, Giheung, Yongin,
More informationAdvanced Computer Networks. Mobility Support
Advanced Computer Networks 263 3501 00 Mobility Support Patrick Stuedi Spring Semester 2013 Oriana Riva, Department of Computer Science ETH Zürich Last Week WLAN/802.11 Architecture (Infrastructure / Ad
More informationCisco ASR 5000 Series Small Cell Gateway
Data Sheet Cisco ASR 5000 Series Small Cell Gateway Mobile subscribers want access to the network at home, work, hotspots, and everywhere in between. This requires mobile operators to expand their service
More informationWide Open Spaces or Mostly Wireless, Most of the Time
Wide Open Spaces or Mostly Wireless, Most of the Time Jerry D. Gibson University of California, Santa Barbara Supported by NSF under Grant Nos. CCF-0429884 and CNS-0435527, the California Micro Program,
More informationAn IP-level Mobility Management Framework Based on Quasi-Registration in Wireless Technologies Convergence
An IP-level Mobility Management Framework Based on Quasi-Registration in Wireless Technologies Convergence Ted Taekyoung Kwon, Mario Gerla UCLA Computer Science Los Angeles, CA 90095 tedkwon,gerla @cs.ucla.edu
More informationService Provider PAT Port Allocation Enhancement for RTP and RTCP
Service Provider PAT Port Allocation Enhancement for RTP and RTCP Problem Overview With the increase in the use of multimedia and real-time traffic over the Internet, private network administrators face
More informationOPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS
OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS Sandro Grech Nokia Networks (Networks Systems Research) Supervisor: Prof. Raimo Kantola 1 SANDRO GRECH - OPTIMIZING MOBILITY MANAGEMENT IN
More informationConvergence WLAN/CDMA Architecture. CDG Technology Forum October 7, 2005
Convergence WLAN/CDMA Architecture CDG Technology Forum October 7, 2005 Outline Introduction and Network Architecture Key elements to enable WLAN/CDMA services Access control Mobility management Summary
More informationOverview of GPRS and UMTS
CHAPTER 1 This chapter briefly introduces the 2.5G General Packet Radio Service (GPRS) and the 3G Universal Mobile Telecommunications System (UMTS) technologies, and their implementation in Cisco Gateway
More informationVertical and Horizontal Handover in Heterogeneous Wireless Networks using OPNET
Vertical and Horizontal Handover in Heterogeneous Wireless Networks using OPNET Abhishek Dhiman M.E, E.C.E Department, Thapar University, Patiala Karamjit Singh Sandha Asst. Professor, E.C.E Department
More informationAn Approach to Efficient and Reliable design in Hierarchical Mobile IPv6
An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 Taewan You 1, Seungyun Lee 1, Sangheon Pack 2, and Yanghee Choi 2 1 Protocol Engineering Center, ETRI, 161 Gajoung-dong, Yusong-gu,
More informationAn Efficient NAT Traversal for SIP and Its Associated Media sessions
An Efficient NAT Traversal for SIP and Its Associated Media sessions Yun-Shuai Yu, Ce-Kuen Shieh, *Wen-Shyang Hwang, **Chien-Chan Hsu, **Che-Shiun Ho, **Ji-Feng Chiu Department of Electrical Engineering,
More information2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
More informationRequest for Comments: 4083 Category: Informational May 2005
Network Working Group M. Garcia-Martin Request for Comments: 4083 Nokia Category: Informational May 2005 Input 3rd-Generation Partnership Project (3GPP) Release 5 Requirements on the Session Initiation
More informationA Policy Controlled IPv4/IPv6 Network Emulation Environment
A Policy Controlled IPv4/IPv6 Network Emulation Environment Tomislav Grgic and Maja Matijasevic University of Zagreb, Faculty of Electrical Engineering and Computing Unska 3, HR-10000 Zagreb, Croatia tomislav.grgic@fer.hr,
More informationLTE : The Future of Mobile Broadband Technology
LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms
More informationSIP as an Enabling Technology
SIP as an Enabling Technology SIP and VoIP Fundamentals Mike Taylor - CTO spscom.com 888.777.7280 Strategic Products and Services / 300 Littleton Road / Parsippany, NJ 07054 Agenda What is SIP? Acceptance
More informationOverview of Mobile Networking Initiatives at WINLAB
Overview of Mobile Networking Initiatives at WINLAB Introduction: The Next Generation MSC Custom Mobile Infrastructure (e.g. GSM, 3G) BTS Public Switched Network (PSTN) BSC GGSN, etc. WLAN Access Point
More informationMIPv6: New Capabilities for Seamless Roaming Among Wired, Wireless, and Cellular Networks
Page 1 M: New Capabilities for Seamless Roaming Among Wired, Wireless, and Cellular Networks Paul Schmitz Technical Marketing Engineer Geoff Weaver Business Development Manager Copyright 2002. *Third-party
More informationFast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE
Fast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE 802.11 Chien-Chao Tseng *, Chia-Liang Lin *, Yu-Jen Chang * and Li-Hsing Yen * Department of Computer Science, National Chiao Tung University,
More informationChapter 7 Mobility Management at Transport Layer
Chapter 7 Mobility Management at Transport Layer This chapter is dedicated to transport-layer mobility support schemes, which follow an end-to-end philosophy, putting the notion of mobility at the end
More informationMobile Communications Chapter 8: Network Protocols/Mobile IP
Mobile Communications Chapter 8: Network Protocols/Mobile IP Motivation Data transfer, Encapsulation Security, IPv6, Problems Micro mobility support DHCP Ad-hoc networks, Routing protocols Prof. Jó Ueyama
More informationFixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering
Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile
More informationSignaling Protocol Structure in GSM
GSM Signaling Protocol Structure in GSM Signaling Protocol Structure in GSM Layer 1 is the physical layer which uses the channel structures over the air interface. Layer 2 is the data link layer and across
More informationNetwork Based Seamless Mobility In Networks Of Future. M.Sc. Ahmet Cihat Toker
Network Based Seamless Mobility In Networks Of Future M.Sc. Ahmet Cihat Toker ahmet-cihat.toker@dai-labor.de Networks Of Today Before we go on with how the networks will look like in the future, let s
More informationGPRS System Architecture
1 LECTURE 6 GPRS What is GPRS? 2 General Packet Radio Service is an overlay on top of GSM physical layer and network entities It extends data capabilities of GSM and provides connection to external packet
More informationUnderstand iwag Solution for 3G Mobile Data
Understand iwag Solution for 3G Mobile Data Contents Introduction Prerequisites Requirements Components Used Background Information Acronyms Explanation of Terminology Used Understand Mobility Services
More informationStatus of IMS-Based Next Generation Networks for Fixed Mobile Convergence
Status of IMS-Based Next Generation Networks for Fixed Mobile Convergence Prepared for: WOCC 2007 Fuchun Joseph Lin Chief Scientist fjlin@research.telcordia.com Telcordia Technologies, Inc. April 28, 2007
More informationWiMax-based Handovers in Next Generation Networks
WiMax-based Handovers in Next Generation Networks Nadine Akkari Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University, Saudi Arabia nakkari@kau.edu.sa
More informationPerformance Measurement of Real-Time Mobile Communication in an IPv6 Testbed
Performance Measurement of Real-Time Mobile Communication in an IPv6 Testbed Nobuyasu Nakajima Toshiba America Research, Inc POBox 136 Convent Station, NJ 07961, USA Abstract This paper presents some experimental
More informationcdma2000 Femtocell Network: Overview
GPP X.S00-000-A Version.0 Date: December cdma00 Femtocell Network: Overview COPYRIGHT GPP and its Organizational Partners claim copyright in this document and individual Organizational Partners may copyright
More informationComputer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the
Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not
More informationConfiguring Security on the GGSN
CHAPTER 12 This chapter describes how to configure security features on the gateway GPRS support node (GGSN), including Authentication, Authorization, and Accounting (AAA), and RADIUS. IPSec on the Cisco
More informationPerformance Evaluation of Wireless n Using Level 2 and Level 3 Mobility
Indian Journal of Science and Technology, Vol 11(14), DOI: 10.17485/ijst/2018/v11i14/120616, April 2018 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Performance Evaluation of Wireless 802.11n Using
More informationMobile IP. Mobile Computing. Mobility versus Portability
Mobile IP Mobile Computing Introduction Amount of mobile/nomadic computing expected to increase dramatically in near future. By looking at the great acceptance of mobile telephony, one can foresee a similar
More informationSeamless Network Mobility Management for Realtime Service
Seamless Network Mobility Management for Realtime Service Hee-Dong Park, Yong-Ha Kwon, Kang-Won Lee, Sung-Hyup Lee, Young-Soo Choi, Yang Li, and You-Ze Cho School of Electrical Engineering & Computer Science,
More informationGSM and Similar Architectures Lesson 13 GPRS
GSM and Similar Architectures Lesson 13 GPRS 1 Two switching modes Circuit Switching Packet switching 2 Circuit switching A connection first sets up Then the entire data transmits through the path that
More informationLECTURE 8. Mobile IP
1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet
More informationAdaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks
Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Sangheon Pack, Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul, Korea
More informationnsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network
nsctp: A New Transport Layer Tunnelling Approach to Provide Seamless Handover for Moving Network Peyman Behbahani City University, London, UK p.behbahani@city.ac.uk Veselin Rakocevic City University, London,
More informationApplication Notes for Configuring SIP Trunking between the Comdasys Mobile Convergence Solution and an Avaya IP Office Telephony Solution Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between the Comdasys Mobile Convergence Solution and an Avaya IP Office Telephony Solution Issue 1.0 Abstract These
More informationROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX
ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX ABSTRACT The base Mobile Internet Protocol (Mobile IP) provides a means for portable computers to roam freely, changing its point
More information