TAKEOVER: A New Vertical Handover Concept for Next-Generation Heterogeneous Networks
|
|
- Eileen Russell
- 5 years ago
- Views:
Transcription
1 TAKEOVER: A New Vertical Handover Concept for Next-Generation Heterogeneous Networks Hyun-Ho Choi and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology (KAIST) TEL: , FAX: hopper@comis.kaist.ac.kr, dhcho@ee.kaist.ac.kr Abstract One of the major challenges for seamless mobility in next-generation heterogeneous networks is vertical handover, which is the process of maintaining a mobile user s active connections as it changes its point of attachment. For seamless vertical handover, we introduce a new concept,, which enables a neighbor node to process requests of a mobile node. We develop protocol and operation for the takeover and apply it to vertical handover for next-generation heterogeneous networks. The proposed handover scheme using the takeover protocol reduces average handover latency and so enables a fast and seamless handover between two different access technologies. The simulation results show that the takeover-based vertical handover scheme achieves better performances compared with conventional handover schemes, with respect to handover delay, packet loss, and power consumption. I. INTRODUCTION Next-generation communication requires universal wireless access and ubiquitous computing through seamless personal and terminal mobility. One of the major challenges for seamless mobility is vertical handover, which is the process of maintaining a mobile user s active connections as it moves between different types of network. In order to achieve seamless vertical handover in heterogeneous network environments, it is necessary to guarantee service continuity and quality-ofservice (QoS), which means low latency and low packet loss during handover [1]. Generally, conventional handover schemes have been proposed by using pre-registration or post-registration method, which can reduce the handover delay because they separate layer 2 (L2) and L3 handovers and perform the L3 handover earlier or later than the L2 handover [2]. However, these scheme can not be applied in heterogeneous network environments without modification, because they need pre-defined signaling between two access nodes involved in handover. Moreover, current pre-registration or post-registration schemes consider only registration process during handover, and so it is difficult to apply conventional schemes to the handover between heterogeneous networks. For vertical handover, not only the registration procedure but also the of authentication and connection setup with a new network are required, and these should be performed seamlessly to maintain the service continuity during handover [3]. However, it is difficult to satisfy these requirements in the case of vertical handover because a mobile node () suffers from communicating with two different access networks (ANs) concurrently, and cannot receive enough signal strength from a new AN in order to complete all handover before attachment with the new network [4]. Therefore, in this paper, we propose a new vertical handover concept for next-generation heterogeneous networks. In this concept, we use a neighbor node () to solve the problems of vertical handover. Since an is able to communicate with any node, anywhere and any time in the next-generation communication environments, an can search an and can communicate directly with it [5]. Thus, if an s neighbor node is connecting with the AN where the will move, it is possible to let the perform operations needed for vertical handover instead of the. Namely, the takes over the vertical handover from the and carries out handover requiring large latency such as registration and authentication before handover completion. By using this operation, fast and seamless handover can be achieved. In this paper, this concept is named because the takes over s handover operations. We define signaling messages and protocol for takeover operations and apply it to proposed vertical handover scheme. This paper is organized as follows. In Section II, we describe the proposed takeover protocol and operation. In Section III, we provide details of the proposed vertical handover scheme using takeover concept. In Section IV, we show simulation environments and discuss simulation results. We present concluding remarks in Section V. II. TAKEOVER PROTOCOL happens between two s that can communicate each other. Fig. 1 shows the basic operation of takeover protocol in which tries to request a takeover to. operation consists of four phases: neighbor node discovery, takeover initiation, takeover process, and takeover completion phases. First, the broadcasts Ready-to- message to discover an that can take over requests of the. This /05/$20.00 (c)2005 IEEE
2 Neighbor node Discovery fromto 1. Ready to 2. Clear to process (pre-authentication, pre-registration) Initiation Process Completion 3. Request 4. Reply 5. Stop 6. Completion 7. Thank takes over and processes the request of oan Request Handover Completion nan Fig. 1. Basic operations of takeover protocol. Fig. 2. Operation of proposed vertical handover based on takeover protocol. message contains the address of the and the purpose of takeover. As a response of the Ready-to- message, the sends Clear-to- message with its address. If the confirms its by this message, it starts takeover initiation procedure with the through exchange of Request and Reply messages. The Request message includes specific contents of the request and information needed according to a kind of request (e.g., s identity number, authentication method, security key, and user profile). At this time, the can process the takeover request instead of the. If the wants to interrupt the takeover operation, it can send Stop message to the. When the finishes the takeover operation, it delivers to the Completion message together with the final information created as a result of successful takeover execution. Finally, the transmits Thank message to the. III. PROPOSED VERTICAL HANDOVER SCHEME We apply the takeover protocol to vertical handover scheme in heterogeneous network environments. Fig. 2 and 3 illustrate operation and signaling procedure for the proposed vertical handover based on takeover protocol, respectively. First, an that hands over from old AN (oan) to new AN (nan) decides to start handover or takeover based on signal strength from two ANs. If the wants to initiate the takeover process, it broadcasts Ready-to- message to search a suitable which can help the during vertical handover period. The Ready-to- message contains s address, aim of the takeover, and identity of the nan where the wants to move. If an is able to take over the s request, it replies Clear-to- message with its address. If the discovers the, which is currently connected with the nan, it initiates the takeover. Through Request message, the demands the to perform preauthentication and pre-registration, except L2 attachment, among all needed for vertical handover. Since these authentication and registration take long time compared with total handover latency, if these are executed previously by the takeover process, faster vertical handover is possible. Here, the pre-authentication procedure observes authentication method specified according to the nan, and the preregistration uses the mobile IP (L3) registration procedure. In order to make the process these pre-operations, the Request message should deliver the s identity number and IP address, information for authentication, and security key to the. If the receives the Request message, it sends Reply and performs the pre-authentication and pre-registration in regular sequence. Here, if the pre-registration is executed not by normal process but by the takeover process, the network router can know this takeover context and can bi-cast data traffic into two ANs, in order to reduce the packet loss during the vertical handover. If the receives the Reply message from the, it sets a timer T 1. This timer T 1 means a maximum time that the can wait until takeover process is finished, and so it should be set to larger value than time required for takeover process. Possibly, if the timer T 1 is expired before the takeover is not completed, the interrupts current takeover process by sending Stop message to the. In this
3 oan HO & TO decision fromto Ready to ['s address, aim of TO, nan's ID] Clear to ['s address] Request ['s ID & IP, Auth. info. & key] Reply Set timer T1 Process Pre-authentication nan TABLE I SIMULATION PARAMETERS Name Value radius of AN 1000 m radius of 100 m number of per AN 100 distance power gradient (γ) 2(ad hoc) or 4(cellular) noise power -130 db target SNR 0dB transmission rate of 1 Mbps speed of (km/h) s position update duration 0.2 sec s direction update duration 10 sec time needed for authentication 1sec time needed for L3 registration 1sec time needed for L2 attachment 0.2 sec time needed for L2 detachment 0.2 sec T1 timer 2.5 sec No oan detachment T1 expire? Yes Stop Completion ['s new IP & auth. key] Thank nan attachment Pre-registration Release pre-processing Fig. 3. Signaling procedure of proposed vertical handover based on takeover protocol. case, the can retry the takeover to another or attempt the handover directly to the nan. This decision is based on current location of the and signal strength from the oan and nan. If the accomplishes the takeover mission, it sends Completion message to the to report takeover results and related information such as the s new IP address and authentication key, which will be used after the attaches to the nan. If the receives the Completion message, it replies Thank message. Then, the performs L2 detachment procedure with the oan and L2 attachment procedure with the nan. Accordingly, the can connect with the nan through only L2 attachment procedure without new authentication and registration procedure and thus fast vertical handover can be achieved by this takeover process. By simple analysis [6], we can obtain handover delay when the takeover is not used (D wot O ) and handover delay when the takeover is used (D wt O )asfollows. D wot O = T detach + T auth + T reg + T attach (1) D wt O = T detach + T attach (2) Assuming that the takeover operation is successful, the han- dover scheme with takeover can save authentication delay (T auth ) and registration delay (T reg ). When the takeover is successful with probability p and the handover succeeds at all times, average delay of takeover-based vertical handover scheme becomes D wt O p + D wot O (1 p). IV. SIMULATION RESULTS A. Simulation Environments To evaluate the performances of proposed vertical handover scheme, we carry out computer simulation [3]. Table I shows parameters used for simulation. The radius of an AN is 1km and the radius of is 100m, which means maximum distance that two s can communicate each other. The number of AN is unlimited and all ANs are placed to satisfy that distance between adjacent two ANs is 3 km. The number of per an AN is 100. The path loss is simply modelled as A d γ, where A is constant set to 1, d is a distance between two nodes, and γ is distance power gradient, which is set to 2 in the communication between two s or 4 in the communication between the and AN [7]. We assume that both the and AN consume transmission power to satisfy target SNR of 0 db for demodulation when noise power is -130 db in the whole frequency bandwidth [8]. To give mobility into s, we change the speed of the from 3 to 100 km/h. We assume that the s position is updated every 0.2 sec and the s direction is changed every 10 sec. Considering actual latency required for authentication and mobile IP registration used in UMTS or WLAN system, the times needed to perfrom pre-authentication and pre-registration are assumed to be 1 sec, respectively. Hence, the value of T 1 timer is set to 2.5 sec because it should be larger than the sum of times for two pre-. In addition, L2 attachment and detachment are assumed to require 0.2 sec, respectively. Moreover, to achieve simulation results, we use some following assumptions.
4 Fig. 4. Successful probability of takeover vs. speed of. Fig. 5. Average handover delay vs. successful probability of handover. Every is located randomly with uniform distribution in whole AN coverage. Every can give and take takeover request. All handovers are vertical handover generated between two different ANs. If enters into handover area, every prefers to perform takeover process rather than direct handover process. Every is active node which is receiving downlink packets during vertical handover. When T 1 timer is expired, the carries out handover process directly only if signal strength of nan is greater than that of oan. Otherwise, the retries the takeover process. B. Results and Discussions We investigate probability of successful takeover execution, average handover delay, packet loss rate, and power consumption as performance measures in two cases that the takeover operation is applied or not. Fig. 4 shows successful probability of takeover versus speed of according to time consumed takeover execution. failure occurs when the connection between the and is broken or the timer T 1 is expired before the receives the Completion message. Here, we define takeover execution time (T takeover )asaduration from the Ready-to- message to the Thank message transmission. We assume that it takes from 2 to 4 sec for takeover execution, taking account of an searching, transmissions of signaling messages, takeover process (i.e, preauthentication and pre-registration), and processing delays at each node. As the speed of increases, the successful probability of takeover decreases. If the s speed is larger, i.e., the mobility is increased, it is difficult to maintain the connection Fig. 6. Expected number of dropped packets vs. playout time. between the and during the takeover process, and so the successful probability of takeover is decreased. Moreover, successful probability of takeover is reduced by the same reason as the takeover execution time is increased. Fig. 5 exhibits average handover delay versus successful probability of handover. When the takeover protocol is not used, the average handover delay is worst. If the takeover is applied, the handover delay is decreased because delay by both authentication and registration is removed by the takeover operation. In addition, the handover delay becomes better as the speed of is slower. This is because the successful probability of takeover is larger as the s speed is slower. Finally, the total vertical handover delay is reduced by using the proposed takeover operation. Fig. 6 shows expected number of dropped packets versus playout time. For the packet loss performance during handover, all ANs are modeled as simple M/M/1 queues [9]. The service
5 consider s energy consumption, the proposed takeover process induces more energy consumption as the s speed increases and the successful probability of takeover decreases. However, if we assume that the is a plugged terminal existed in handover region as a special case, we can ignore the s energy consumed by takeover process. Although the proposed vertical handover scheme requires more signaling cost and processing overhead of s, it can achieve better performances than conventional handover schemes that do not use the takeover protocol, with respect to handover delay, packet loss rate, and power consumption. Especially, the proposed handover scheme shows better performances as the takeover execution time is smaller and the velocity of s is slower, because these factors increase the successful probability of takeover operation. Fig. 7. Average energy consumed for handover per a node vs. speed of. time of a packet is assumed to be exponentially distributed, including the processing time and the transmission time. We assume that the AN transmits 100 byte packets every 100 ms to the, and the service rate is 1 Mbps in all ANs. In addition, all link delays between two nodes and processing delays are assumed to be 10 ms [10]. The playout time is the maximum allowed end-to-end delay between the AN and. Hence, the number of dropped packets falls as the playout time is increased. If the takeover is not used, more packet loss occurs compared with scheme using takeover method because packet loss duration out of overall vertical handover delay is increased. As the speed of is slower, the number of dropped packet shows better performance since the successful probability of the takeover increases and so the average packet loss duration is reduced. Therefore, the proposed vertical handover scheme using takeover can guarantee a low packet loss rate because fast handover is achieved by the takeover process. Fig. 7 displays average energy consumed for handover per a node versus speed of. We measure the energy consumption when the takeover process is used or not, according to speed of. When the takeover process is applied, the energy consumed in the or is measured. An s energy required for handover without the takeover and an s energy required for takeover process have almost constant though the speed of is varied, because these values are not affected generally by s mobility. However, in the case of handover scheme with takeover, energy consumption per an is increased if the speed of is larger. That is, s energy consumption is increased by more takeover failure as the speed of is greater. Considering only s energy consumption, the scheme with takeover shows better performance than the scheme without takeover in every speed of. However, the sum of energy consumption of both and is not better when the speed of is more than about 25 km/h. If we V. CONCLUSIONS For seamless vertical handover, we introduce a new concept, takeover, which enables an to process requests of an. We develop protocol and operation for the takeover and apply it to vertical handover for next-generation heterogeneous networks. The simulation results show that the takeoverbased vertical handover scheme achieves faster and seamless handover compared with conventional handover schemes without the takeover. Therefore, our proposed vertical handover scheme guarantees seamless mobility and service continuity by using a novel concept of takeover in heterogeneous networks. This takeover concept is also applicable to various situations in which an is restricted by its coverage, battery power, resource, and so on. REFERENCES [1] J. McNair and Fang Zhu, Vertical handoffs in fourth-generation multinetwork environments,, IEEE Wireless Commun., vol. 11, no. 3, pp. 8-15, June [2] K. El Malki, et al., IETF draft, Low latency Handoff in Mobile IPv4, May [3] H. H. Choi, O. Song, and D. H. Cho, A Seamless Handoff Scheme for UMTS-WLAN Interworking, IEEE Globecom, vol. 3, pp , Dec [4] C. Guo, et al., A Seamless and Proactive End-to-End Mobility Solution for Roaming Across Heterogeneous Wireless Networks, IEEE J. Select. Areas Commun., vol. 22, pp , June [5] S. Balasubramaniam and J. Indulska, Handovers between heterogeneous networks in pervasive systems, Proceedings, ICCT 2003, vol. 2, pp , Apr [6] F. Urasawa, et al., Analysis and simulation results of multihop handoff scheme in an ad hoc wireless network, Wireless Personal Multimedia Communications, vol. 3, pp , Oct [7] Jaeweon Cho, Z.J. Haas, On the throughput enhancement of the downstream channel in cellular radio networks through multihop relaying, IEEE J. Select. Areas Commun., vol 22, pp , Sep [8] T. Adachi, M. Nakagawa, Battery consumption and handoff examination of a cellular ad-hoc united communication system for operational mobile robots, IEEE Personal Indoor and Mobile Radio Communications, vol. 3, pp , Sep [9] C. Blondia, et al., Low Latency Handoff Mechanisms and Their Implementation in an IEEE Network, Proceedings of ITC18, Teletraffic and Engineering Vol. 5b, pp , Berlin, Germany, Sep [10] O. Casals, et al., Performance evaluation of the post-registration method, a low latency handoff in MIPv4, IEEE ICC 2003, vol.1, pp , May 2003.
A Seamless Handoff Scheme for UMTS-WLAN Interworking
A Seamless Handoff Scheme for UMTS-WLAN Interworking Hyun-Ho Choi, Osok Song and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology
More informationQoS based vertical handoff method between UMTS systems and wireless LAN networks
QoS based vertical handoff method between UMTS systems and wireless LAN networks Sungkwan Jung and Dong-ho Cho Div. of EE, Dept. of EECS Korea Advanced Institute of Science and Technology Daejeon, Rep.
More informationReducing Inter-Cell Handover Events based on Cell ID Information in Multi-hop Relay Systems
Reducing Inter-Cell Handover Events based on Cell ID Information in Multi-hop Relay Systems Ji Hyun Park Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and
More informationDue to the many benefits provided by both the third-generation (3G) mobile networks and the IEEE wireless local area networks (WLANs), it is
Performance of UMTS/WLAN Integration at Hot-Spot Locations Using OPNET Marwan Abu-Amara, Ashraf Mahmoud, Tarek Sheltami, Adel Al-Shahrani, Khalid Al-Otaibi, S.M.Rehman, and Taha Anwar {marwan, ashraf,
More informationAn Approach to Efficient and Reliable design in Hierarchical Mobile IPv6
An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 Taewan You 1, Seungyun Lee 1, Sangheon Pack 2, and Yanghee Choi 2 1 Protocol Engineering Center, ETRI, 161 Gajoung-dong, Yusong-gu,
More informationUniversity of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks
University of Würzburg Institute of Computer Science Research Report Series Performance Comparison of Handover Mechanisms in Wireless LAN Networks Rastin Pries and Klaus Heck Report No. 339 September 2004
More informationMODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS
MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS 1 V.VINOTH, 2 M.LAKSHMI 1 Research Scholar, Faculty of Computing, Department of IT, Sathyabama University,
More informationWiMax-based Handovers in Next Generation Networks
WiMax-based Handovers in Next Generation Networks Nadine Akkari Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University, Saudi Arabia nakkari@kau.edu.sa
More informationAn Enhancement of Mobile IP by Home Agent Handover
An Enhancement of Mobile IP by Home Agent Handover Li-Sheng Yu and Chun-Chuan Yang Multimedia and Communications Laboratory Department of Computer Science and Information Engineering National Chi Nan University,
More informationCC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments
CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted
More informationSpeed Effect on the Performance of Vertical Handover in Wifi-3G Network
Speed Effect on the Performance of Vertical Handover in Wifi-3G Network Hassan Khalil Arab American University of Jenin Ramallah, Palestine Emails: Hassan.khalil22@gmail.com Mohammad Hamarsheh Arab American
More informationMobility Management usually includes two parts: location management and handoff management.
Mobile Data / Mobility Management I. Mobile Data Services/ Management This broad area involves a lot of industrial applications. Mobile data services/ management is becoming another profitable market for
More informationOptimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee
Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.
More informationVertical Handover in Vehicular Ad-hoc Networks A Survey
Vertical Handover in Vehicular Ad-hoc Networks A Survey U. Kumaran Department of computer Applications Noorul Islam Center for Higher Education, Kumaracoil,Tamilnadu, India. Abstract- Vehicular Ad-hoc
More informationPerformance Evaluation of Wireless n Using Level 2 and Level 3 Mobility
Indian Journal of Science and Technology, Vol 11(14), DOI: 10.17485/ijst/2018/v11i14/120616, April 2018 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Performance Evaluation of Wireless 802.11n Using
More informationAn Efficient Proactive Routing Method for Mobile Ad Hoc Networks using Peer-to-Peer and Cellular Communication System
An Efficient Proactive Routing Method for Mobile Ad Hoc Networks using Peer-to-Peer and Cellular Communication System Hiroaki Morinot, Tadao 8aitot:j: and Mitsuo Nohara:j: t Research and Development Initiative
More informationAn efficient trigger to improve intra-wifi handover performance
An efficient trigger to improve intra-wifi handover performance Roberta Fracchia, Guillaume Vivier Motorola Labs, Parc les Algorithmes, Saint-Aubin, 91193 Gif-sur-Yvette, France Abstract Seamless mobility
More informationPerformance Analysis of Cell Switching Management Scheme in Wireless Packet Communications
Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical
More informationPerformance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks
Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation
More informationPerformance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)
Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University
More informationAn Improved Inter-Domain Handover Scheme Based on a Bidirectional Cooperative Relay
BULGARIAN ACADEMY OF CIENCE CYBERNETIC AND INFORMATION TECHNOLOGIE Volume 13, No 4 ofia 2013 Print IN: 1311-9702; Online IN: 1314-4081 DOI: 10.2478/cait-2013-0059 An Improved Inter-Domain Handover cheme
More informationVirtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity
Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Hyemee Park, Tae-Jin Lee, and Hyunseung Choo School of Information and Communication Engineering Sungkyunkwan
More informationExperiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol
Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121
More informationVertical and Horizontal Handover in Heterogeneous Wireless Networks using OPNET
Vertical and Horizontal Handover in Heterogeneous Wireless Networks using OPNET Abhishek Dhiman M.E, E.C.E Department, Thapar University, Patiala Karamjit Singh Sandha Asst. Professor, E.C.E Department
More informationPerformance Evaluation of the Post-Registration Method, a Low Latency Handoff in MIPv4
Performance Evaluation of the Post-Registration Method, a Low Latency Handoff in MIPv O. Casals, Ll. Cerdà Dept. Computer Architecture, Technical University of Catalonia (UPC), Barcelona Spain {olga, llorenc}@ac.upc.es
More informationPerformance Analysis Of Wi-Fi And Wi-Max Networks During Vertical Handover
Performance Analysis Of Wi-Fi And Wi-Max Networks During Vertical Handover Ashish Mishra Dept. of Computer Science,Pondicherry University Pondicherry Mrs. R.Sunitha Assistant Professor Dept. of Computer
More informationInvestigation on OLSR Routing Protocol Efficiency
Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova
More informationHandover Management for Mobile Nodes in IPv6 Networks
TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we
More informationLink Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017 265 Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method Mohammad Pashaei, Hossein Ghiasy
More informationA Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks
ICACT Transactions on on the Advanced Communications Technology (TACT) Vol. Vol. 2, 2, Issue Issue 3, 3, May May 2013 2013 233 A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks
More informationRECENTLY, the information exchange using wired and
Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology
More informationSeamless Handover Scheme for Proxy Mobile IPv6
IEEE International Conference on Wireless & Mobile Computing, Networking & Communication Seamless Handover Scheme for Proxy Mobile IPv6 Ju-Eun Kang 1, Dong-Won Kum 2, Yang Li 2, and You-Ze Cho 2 1 LGDACOM
More informationRequirements for the Operations & Management of 4G Networks
Requirements for the Operations & Management of 4G Networks Prof. James Won-Ki Hong Dept. of Computer Science and Engineering, Korea & Prof. Alberto Leon-Garcia Dept. of Electrical and Computer Engineering
More informationA Seamless Handover Mechanism for IEEE e Broadband Wireless Access
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea {kka1, tongsok}@kt.co.kr
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationIP Mobility Support with a Multihomed Mobile Router
IP Mobility Support with a Multihomed Mobile Router Hee-Dong Park 1, Dong-Won Kum 2, Yong-Ha Kwon 2, Kang-Won Lee 2, and You-Ze Cho 2 1 Department of Computer Engineering, Pohang College, Pohang, 791-711,
More informationFAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN
FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN SANGHEON PACK AND YANGHEE CHOI School of Computer Science and Engineering, Seoul National University, Seoul, Korea
More informationA COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationCost Analysis of Mobility Management Entities for SIGMA
010 International Conference on High Performance Switching and Routing Cost Analysis of Mobility Management Entities for SIGMA Md. Shohrab Hossain Mohammed Atiquzzaman University of Oklahoma, Norman, OK
More informationA Simulative Study on the Performance Evaluation for Simultaneous and Successive Mobility for Mobile IPv6
Journal of Computer Science 6 (12): 1511-1517, 2010 ISSN 1549-3636 2010 Science Publications A Simulative Study on the Performance Evaluation for Simultaneous and Successive Mobility for Mobile IPv6 Ibrahim
More informationDirectional Antenna based Time Division Scheduling in Wireless Ad hoc Networks
Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology
More informationPerformance Analysis of Fast Handover in Mobile IPv6 Networks
Performance Analysis of Fast Handover in Mobile IPv6 Networks Sangheon Pack and Yanghee Choi School of Computer Science&Engineering Seoul National University, Seoul, Korea Tel: +82-2-880-1832, Fax: +82-2-872-2045
More informationA Fast Handoff Scheme Between PDSNs in 3G Network
A Fast Handoff Scheme Between PDSNs in 3G Network Jae-hong Ryu 1 and Dong-Won Kim 2, 1 Electronics and Telecommunications Research Institute (ETRI) 161 Gajeong-dong, Yuseong-gu, Daejeon, 305-350, Korea
More informationEnd-User Controlled Vertical Handover Procedure for 4G Wireless Access Networks
End-User Controlled Vertical Handover Procedure for 4G Wireless Access Networks M. Gopu, Dr. Ritesh Khanna Abstract This paper proposes a user terminal-controlled mobility management across heterogeneous
More informationImpact of Hello Interval on Performance of AODV Protocol
Impact of Hello Interval on Performance of AODV Nisha Bhanushali Priyanka Thakkar Prasanna Shete ABSTRACT The multi-hop ad hoc networks are self organizing networks with dynamic topology. The reactive
More informationFigure 1: Ad-Hoc routing protocols.
Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationPerformance Comparison and Analysis on MIPv6, Fast MIPv6 Bi-casting and Eurecom IPv6 Soft Handover over IEEE802.11b WLANs
Performance Comparison and Analysis on MIPv6, Fast MIPv6 Bi-casting and Eurecom IPv6 Soft Handover over IEEE802.11b WLANs Farouk Belghoul, Yan Moret, Christian Bonnet Department of Mobile Communications,
More informationA Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks
, pp.147-151 http://dx.doi.org/10.14257/astl.2015.117.35 A Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks Ronnie Caytiles, Seungyong Shin, Minji Yang and Byungjoo
More informationModulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1
Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Maryam Soltan, Inkwon Hwang, Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles, CA
More informationA Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks
A Simple Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks Chun-Su Park, You-Sun Kim, Kwang-Wook Lee, Seung-Kyun Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea
More informationAn Efficient DECT-Mobile IP Interworking for Mobile Computing
An Efficient DECT-Mobile IP Interworking for Mobile Computing Anthony Lo *, Winston Seah * and Edwin Schreuder + * Centre for Wireless Communications 1, National University of Singapore, 20 Science Park
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationUAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks
UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,
More informationAnalyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. IV (May - Jun. 2014), PP 49-53 Analyzing the performance of WiMAX zone
More informationSeamless Network Mobility Management for Realtime Service
Seamless Network Mobility Management for Realtime Service Hee-Dong Park, Yong-Ha Kwon, Kang-Won Lee, Sung-Hyup Lee, Young-Soo Choi, Yang Li, and You-Ze Cho School of Electrical Engineering & Computer Science,
More informationCross-layer Optimized Vertical Handover Schemes between Mobile WiMAX and 3G Networks
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 2, NO. 4, AUGUST 2008 171 Copyright c 2008 KSII Cross-layer Optimized Vertical Handover Schemes between Mobile WiMAX and 3G Networks Jaeho Jo
More informationVirtual Price Based Policy Enforcement for Access Selection and Vertical Handover in Multi-Access Networks
Virtual Price Based Policy Enforcement for Access Selection and Vertical Handover in Multi-Access Networks Fanchun Jin 1, Joseph S. Gomes 1, Yu Zhou 1, Hyeong-Ah Choi 1, Jae-Hoon Kim 2, JungKyo Sohn 3,
More informationPerformance Analysis of Three Routing Protocols for Varying MANET Size
Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,
More informationA Study on Mobile IPv6 Based Mobility Management Architecture
UDC 621.396.69:681.32 A Study on Mobile IPv6 Based Mobility Management Architecture VTsuguo Kato VRyuichi Takechi VHideaki Ono (Manuscript received January 19, 2001) Mobile IPv6 is considered to be one
More informationEnergy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR
Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on Mr. Nirav Bhatt, Dr. Dhaval Kathiriya Reaserch Scholar, School of Computer Science, RK University, Rajkot Director IT,
More informationThroughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network
Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India
More informationA Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism
A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism Dae Sun Kim 1 and Choong Seon Hong 2 1 School of Electronics and Information, Kyung Hee Univerity 1 Seocheon, Giheung, Yongin,
More informationFast Handover for Multiple-interface Mobile Devices Connecting to a Single Foreign Agent in MIPv4 with MIH Support
Fast Handover for Multiple-interface Mobile Devices Connecting to a Single Foreign Agent in MIPv4 with MIH Support Beizhong Chen Ivan Marsic David Faucher Cezar Purzynski Ray Miller Sharma Sameer Rutgers
More information4G Wireless Systems. Outlines. Data Rates of Wireless Networks. Wireless Networks. Wireless Networks Throughput versus Range
Outlines 4G Wireless Systems Vijay K. Garg, Ph.D., P.E. Department of Electrical & Computer Engineering, College of Engineering, University of Illinois at Chicago e-mail: garg.v@comcast.net Types of wireless
More informationSeamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism
Seamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism Bharatesh Chakravarthi S. B M.Tech. Dept of ISE The Oxford College of Engineering Bangalore, India Prof. D. Jayaramaiah
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationPerformance of Soft Handover FBSS Compared to Hard Handover in case of High Speed in IEEE e for Multimedia Traffic
SETIT 2009 5 th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 22-26, 2009 TUNISIA Performance of Soft Handover FBSS Compared to Hard Handover
More informationProactive Context Transfer in WLAN-based Access Networks
Proactive Context Transfer in WLAN-based Access Networks Ha Duong, Arek Dadej and Steven Gordon Institute for Telecommunications Research, University of South Australia Mawson Lakes, SA 5095, Australia.
More informationAvailable online at ScienceDirect. Procedia Computer Science 57 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient
More informationRESOURCE MANAGEMENT STRATEGY TO SUPPORT REAL TIME VIDEO ACROSS UMTS AND WLAN NETWORKS
RESOURCE MANAGEMENT STRATEGY TO SUPPORT REAL TIME VIDEO ACROSS UMTS AND WLAN NETWORKS K.Ayyappan, I.Saravanan, G.Sivaradje and P.Dananjayan Department of Electronics and Communication Engineering Pondicherry
More informationIJCSMS International Journal of Computer Science & Management Studies, Vol. 12, Issue 03, September 2012 ISSN (Online):
Various handover processes in Wi-Max Deepak Nandal 1, Vikas Nandal 2 1 Asst Prof (CSE), PDM, Bahadurgarh dpk.nandal@yahoo.com 2 Asst. Prof (ECE) UIET, MDU, Rohtak, India nandalvikas@gmail.com Abstract
More informationEvaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network
Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector
More informationPerformance Comparison of UMTS/WLAN Integrated Architectures with Dynamic Home Agent Assignments
Performance Comparison of UMTS/WLAN Integrated Architectures with Dynamic Home Agent Assignments R. Surender, G. Sivaradje and P. Dananjayan Department of Electronics and Communication Engineering, Pondicherry
More informationDynamic Two-Threshold Flow Control Scheme for 3GPP LTE-A Relay Networks
Dynamic Two-Threshold Flow Control Scheme for 3GPP LTE-A Relay Networks Ping-Chen Lin and Ray-Guang Cheng Department of Electronic and Computer Engineering, National Taiwan University of Science and Technology,
More informationFast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE
Fast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE 802.11 Chien-Chao Tseng *, Chia-Liang Lin *, Yu-Jen Chang * and Li-Hsing Yen * Department of Computer Science, National Chiao Tung University,
More informationP-SIGMA: Paging in End to End Mobility Management
P-SIGMA: Paging in End to End Mobility Management Abu S. Reaz, Mohammed Atiquzzaman Telecommunications and Networks Research Lab School of Computer Science, University of Oklahoma, Norman, OK 73019-6151,
More informationMobile Communications. Ad-hoc and Mesh Networks
Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between
More informationA FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS
A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationGATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani
GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,
More informationQuality of Service and Security as Frameworks toward Next-Generation Wireless Networks
Quality of Service and Security as Frameworks toward Next-Generation Wireless Networks ZORAN BOJKOVIĆ, BOJAN BAKMAZ Faculty of transport and traffic engineering University of Belgrade Vojvode Stepe 305,
More informationPERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES
PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES Karann Chew, Rahim Tafazolli University of Surrey, United Kingdom Abstract - GPRS is part of the evolution
More informationLocation Management Agent for SCTP Handover in Mobile Network
Location Management Agent for SCTP Handover in Mobile Network Yong-Jin Lee Department of Technology Education, Korea National University of Education 250 Taesungtapyon-ro, Heungduk-ku, Cheongju, South
More informationPerformance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV
MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through
More informationAdaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks
Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Sangheon Pack, Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul, Korea
More informationMobility Management Protocols for Wireless Networks. By Sanaa Taha
Mobility Management Protocols for Wireless Networks By outline Mobility Management Mobility Management Models Host-based Mobility Management Protocols Network- based Mobility Management Protocols Which
More informationFast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks
Fast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks Sunguk Lee Research Institute of Industrial Science and Technology Pohang, Gyeongbuk, 790-330, S.KOREA
More informationDesign and Implementation of a Simulator for Ad Hoc Network Routing Protocols
Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,
More informationDistributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks
J. lnf. Commun. Converg. Eng. 15(1): 37-42, Mar. 2017 Regular paper Distributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks Sang-Il Choi 1 and Seok-Joo Koh 2*, Member,
More informationmsctp for Vertical Handover Between Heterogeneous Networks
msctp for Vertical Handover Between Heterogeneous Networks Seok Joo Koh and Sang Wook Kim Department of Computer Science, Kyungpook National University, Daegoo, Korea {sjkoh, swkim}@cs.knu.ac.kr Abstract.
More informationEfficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks
Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56
More informationFuzzy Logic based Intelligent Vertical Handoff Algorithm
Fuzzy Logic based Intelligent Vertical Handoff Algorithm Renuka Dogra 1, Kiran Ahuja 2 Department of Electronics & Communication Engineering 1, 2, D.A.V Institute of Engineering & Technology, Jalandhar,Punjab,
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationEnergy Efficient Utilization of IEEE Hot Spots in 3G Wireless Packet Data Networks
Energy Efficient Utilization of IEEE 802.11 Hot Spots in 3G Wireless Packet Data Networks F. Ozan Akgül and M. Oğuz Sunay Koç University, Department of Electrical & Electronics Engineering, Rumeli Feneri
More informationA NEW ROUTING MECHANISM FOR INTEGRATING CELLULAR NETWORKS, WLAN HOT SPOTS AND MANETS
A NEW ROUTING MECHANISM FOR INTEGRATING CELLULAR NETWORKS, WLAN HOT SPOTS AND MANETS Dave Cavalcanti 1, Carlos Cordeiro 2, Anup Kumar 3, Dharma Agrawal 1 OBR Center for Distributed and Mobile Computing
More informationNetwork Selection Decision Based on Handover History in Heterogeneous Wireless Networks
International Journal of Computer Science and Telecommunications [Volume 3, Issue 2, February 2012] 21 ISSN 2047-3338 Network Selection Decision Based on Handover History in Heterogeneous Wireless Networks
More informationSimulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
More information