TAKEOVER: A New Vertical Handover Concept for Next-Generation Heterogeneous Networks

Size: px
Start display at page:

Download "TAKEOVER: A New Vertical Handover Concept for Next-Generation Heterogeneous Networks"

Transcription

1 TAKEOVER: A New Vertical Handover Concept for Next-Generation Heterogeneous Networks Hyun-Ho Choi and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology (KAIST) TEL: , FAX: hopper@comis.kaist.ac.kr, dhcho@ee.kaist.ac.kr Abstract One of the major challenges for seamless mobility in next-generation heterogeneous networks is vertical handover, which is the process of maintaining a mobile user s active connections as it changes its point of attachment. For seamless vertical handover, we introduce a new concept,, which enables a neighbor node to process requests of a mobile node. We develop protocol and operation for the takeover and apply it to vertical handover for next-generation heterogeneous networks. The proposed handover scheme using the takeover protocol reduces average handover latency and so enables a fast and seamless handover between two different access technologies. The simulation results show that the takeover-based vertical handover scheme achieves better performances compared with conventional handover schemes, with respect to handover delay, packet loss, and power consumption. I. INTRODUCTION Next-generation communication requires universal wireless access and ubiquitous computing through seamless personal and terminal mobility. One of the major challenges for seamless mobility is vertical handover, which is the process of maintaining a mobile user s active connections as it moves between different types of network. In order to achieve seamless vertical handover in heterogeneous network environments, it is necessary to guarantee service continuity and quality-ofservice (QoS), which means low latency and low packet loss during handover [1]. Generally, conventional handover schemes have been proposed by using pre-registration or post-registration method, which can reduce the handover delay because they separate layer 2 (L2) and L3 handovers and perform the L3 handover earlier or later than the L2 handover [2]. However, these scheme can not be applied in heterogeneous network environments without modification, because they need pre-defined signaling between two access nodes involved in handover. Moreover, current pre-registration or post-registration schemes consider only registration process during handover, and so it is difficult to apply conventional schemes to the handover between heterogeneous networks. For vertical handover, not only the registration procedure but also the of authentication and connection setup with a new network are required, and these should be performed seamlessly to maintain the service continuity during handover [3]. However, it is difficult to satisfy these requirements in the case of vertical handover because a mobile node () suffers from communicating with two different access networks (ANs) concurrently, and cannot receive enough signal strength from a new AN in order to complete all handover before attachment with the new network [4]. Therefore, in this paper, we propose a new vertical handover concept for next-generation heterogeneous networks. In this concept, we use a neighbor node () to solve the problems of vertical handover. Since an is able to communicate with any node, anywhere and any time in the next-generation communication environments, an can search an and can communicate directly with it [5]. Thus, if an s neighbor node is connecting with the AN where the will move, it is possible to let the perform operations needed for vertical handover instead of the. Namely, the takes over the vertical handover from the and carries out handover requiring large latency such as registration and authentication before handover completion. By using this operation, fast and seamless handover can be achieved. In this paper, this concept is named because the takes over s handover operations. We define signaling messages and protocol for takeover operations and apply it to proposed vertical handover scheme. This paper is organized as follows. In Section II, we describe the proposed takeover protocol and operation. In Section III, we provide details of the proposed vertical handover scheme using takeover concept. In Section IV, we show simulation environments and discuss simulation results. We present concluding remarks in Section V. II. TAKEOVER PROTOCOL happens between two s that can communicate each other. Fig. 1 shows the basic operation of takeover protocol in which tries to request a takeover to. operation consists of four phases: neighbor node discovery, takeover initiation, takeover process, and takeover completion phases. First, the broadcasts Ready-to- message to discover an that can take over requests of the. This /05/$20.00 (c)2005 IEEE

2 Neighbor node Discovery fromto 1. Ready to 2. Clear to process (pre-authentication, pre-registration) Initiation Process Completion 3. Request 4. Reply 5. Stop 6. Completion 7. Thank takes over and processes the request of oan Request Handover Completion nan Fig. 1. Basic operations of takeover protocol. Fig. 2. Operation of proposed vertical handover based on takeover protocol. message contains the address of the and the purpose of takeover. As a response of the Ready-to- message, the sends Clear-to- message with its address. If the confirms its by this message, it starts takeover initiation procedure with the through exchange of Request and Reply messages. The Request message includes specific contents of the request and information needed according to a kind of request (e.g., s identity number, authentication method, security key, and user profile). At this time, the can process the takeover request instead of the. If the wants to interrupt the takeover operation, it can send Stop message to the. When the finishes the takeover operation, it delivers to the Completion message together with the final information created as a result of successful takeover execution. Finally, the transmits Thank message to the. III. PROPOSED VERTICAL HANDOVER SCHEME We apply the takeover protocol to vertical handover scheme in heterogeneous network environments. Fig. 2 and 3 illustrate operation and signaling procedure for the proposed vertical handover based on takeover protocol, respectively. First, an that hands over from old AN (oan) to new AN (nan) decides to start handover or takeover based on signal strength from two ANs. If the wants to initiate the takeover process, it broadcasts Ready-to- message to search a suitable which can help the during vertical handover period. The Ready-to- message contains s address, aim of the takeover, and identity of the nan where the wants to move. If an is able to take over the s request, it replies Clear-to- message with its address. If the discovers the, which is currently connected with the nan, it initiates the takeover. Through Request message, the demands the to perform preauthentication and pre-registration, except L2 attachment, among all needed for vertical handover. Since these authentication and registration take long time compared with total handover latency, if these are executed previously by the takeover process, faster vertical handover is possible. Here, the pre-authentication procedure observes authentication method specified according to the nan, and the preregistration uses the mobile IP (L3) registration procedure. In order to make the process these pre-operations, the Request message should deliver the s identity number and IP address, information for authentication, and security key to the. If the receives the Request message, it sends Reply and performs the pre-authentication and pre-registration in regular sequence. Here, if the pre-registration is executed not by normal process but by the takeover process, the network router can know this takeover context and can bi-cast data traffic into two ANs, in order to reduce the packet loss during the vertical handover. If the receives the Reply message from the, it sets a timer T 1. This timer T 1 means a maximum time that the can wait until takeover process is finished, and so it should be set to larger value than time required for takeover process. Possibly, if the timer T 1 is expired before the takeover is not completed, the interrupts current takeover process by sending Stop message to the. In this

3 oan HO & TO decision fromto Ready to ['s address, aim of TO, nan's ID] Clear to ['s address] Request ['s ID & IP, Auth. info. & key] Reply Set timer T1 Process Pre-authentication nan TABLE I SIMULATION PARAMETERS Name Value radius of AN 1000 m radius of 100 m number of per AN 100 distance power gradient (γ) 2(ad hoc) or 4(cellular) noise power -130 db target SNR 0dB transmission rate of 1 Mbps speed of (km/h) s position update duration 0.2 sec s direction update duration 10 sec time needed for authentication 1sec time needed for L3 registration 1sec time needed for L2 attachment 0.2 sec time needed for L2 detachment 0.2 sec T1 timer 2.5 sec No oan detachment T1 expire? Yes Stop Completion ['s new IP & auth. key] Thank nan attachment Pre-registration Release pre-processing Fig. 3. Signaling procedure of proposed vertical handover based on takeover protocol. case, the can retry the takeover to another or attempt the handover directly to the nan. This decision is based on current location of the and signal strength from the oan and nan. If the accomplishes the takeover mission, it sends Completion message to the to report takeover results and related information such as the s new IP address and authentication key, which will be used after the attaches to the nan. If the receives the Completion message, it replies Thank message. Then, the performs L2 detachment procedure with the oan and L2 attachment procedure with the nan. Accordingly, the can connect with the nan through only L2 attachment procedure without new authentication and registration procedure and thus fast vertical handover can be achieved by this takeover process. By simple analysis [6], we can obtain handover delay when the takeover is not used (D wot O ) and handover delay when the takeover is used (D wt O )asfollows. D wot O = T detach + T auth + T reg + T attach (1) D wt O = T detach + T attach (2) Assuming that the takeover operation is successful, the han- dover scheme with takeover can save authentication delay (T auth ) and registration delay (T reg ). When the takeover is successful with probability p and the handover succeeds at all times, average delay of takeover-based vertical handover scheme becomes D wt O p + D wot O (1 p). IV. SIMULATION RESULTS A. Simulation Environments To evaluate the performances of proposed vertical handover scheme, we carry out computer simulation [3]. Table I shows parameters used for simulation. The radius of an AN is 1km and the radius of is 100m, which means maximum distance that two s can communicate each other. The number of AN is unlimited and all ANs are placed to satisfy that distance between adjacent two ANs is 3 km. The number of per an AN is 100. The path loss is simply modelled as A d γ, where A is constant set to 1, d is a distance between two nodes, and γ is distance power gradient, which is set to 2 in the communication between two s or 4 in the communication between the and AN [7]. We assume that both the and AN consume transmission power to satisfy target SNR of 0 db for demodulation when noise power is -130 db in the whole frequency bandwidth [8]. To give mobility into s, we change the speed of the from 3 to 100 km/h. We assume that the s position is updated every 0.2 sec and the s direction is changed every 10 sec. Considering actual latency required for authentication and mobile IP registration used in UMTS or WLAN system, the times needed to perfrom pre-authentication and pre-registration are assumed to be 1 sec, respectively. Hence, the value of T 1 timer is set to 2.5 sec because it should be larger than the sum of times for two pre-. In addition, L2 attachment and detachment are assumed to require 0.2 sec, respectively. Moreover, to achieve simulation results, we use some following assumptions.

4 Fig. 4. Successful probability of takeover vs. speed of. Fig. 5. Average handover delay vs. successful probability of handover. Every is located randomly with uniform distribution in whole AN coverage. Every can give and take takeover request. All handovers are vertical handover generated between two different ANs. If enters into handover area, every prefers to perform takeover process rather than direct handover process. Every is active node which is receiving downlink packets during vertical handover. When T 1 timer is expired, the carries out handover process directly only if signal strength of nan is greater than that of oan. Otherwise, the retries the takeover process. B. Results and Discussions We investigate probability of successful takeover execution, average handover delay, packet loss rate, and power consumption as performance measures in two cases that the takeover operation is applied or not. Fig. 4 shows successful probability of takeover versus speed of according to time consumed takeover execution. failure occurs when the connection between the and is broken or the timer T 1 is expired before the receives the Completion message. Here, we define takeover execution time (T takeover )asaduration from the Ready-to- message to the Thank message transmission. We assume that it takes from 2 to 4 sec for takeover execution, taking account of an searching, transmissions of signaling messages, takeover process (i.e, preauthentication and pre-registration), and processing delays at each node. As the speed of increases, the successful probability of takeover decreases. If the s speed is larger, i.e., the mobility is increased, it is difficult to maintain the connection Fig. 6. Expected number of dropped packets vs. playout time. between the and during the takeover process, and so the successful probability of takeover is decreased. Moreover, successful probability of takeover is reduced by the same reason as the takeover execution time is increased. Fig. 5 exhibits average handover delay versus successful probability of handover. When the takeover protocol is not used, the average handover delay is worst. If the takeover is applied, the handover delay is decreased because delay by both authentication and registration is removed by the takeover operation. In addition, the handover delay becomes better as the speed of is slower. This is because the successful probability of takeover is larger as the s speed is slower. Finally, the total vertical handover delay is reduced by using the proposed takeover operation. Fig. 6 shows expected number of dropped packets versus playout time. For the packet loss performance during handover, all ANs are modeled as simple M/M/1 queues [9]. The service

5 consider s energy consumption, the proposed takeover process induces more energy consumption as the s speed increases and the successful probability of takeover decreases. However, if we assume that the is a plugged terminal existed in handover region as a special case, we can ignore the s energy consumed by takeover process. Although the proposed vertical handover scheme requires more signaling cost and processing overhead of s, it can achieve better performances than conventional handover schemes that do not use the takeover protocol, with respect to handover delay, packet loss rate, and power consumption. Especially, the proposed handover scheme shows better performances as the takeover execution time is smaller and the velocity of s is slower, because these factors increase the successful probability of takeover operation. Fig. 7. Average energy consumed for handover per a node vs. speed of. time of a packet is assumed to be exponentially distributed, including the processing time and the transmission time. We assume that the AN transmits 100 byte packets every 100 ms to the, and the service rate is 1 Mbps in all ANs. In addition, all link delays between two nodes and processing delays are assumed to be 10 ms [10]. The playout time is the maximum allowed end-to-end delay between the AN and. Hence, the number of dropped packets falls as the playout time is increased. If the takeover is not used, more packet loss occurs compared with scheme using takeover method because packet loss duration out of overall vertical handover delay is increased. As the speed of is slower, the number of dropped packet shows better performance since the successful probability of the takeover increases and so the average packet loss duration is reduced. Therefore, the proposed vertical handover scheme using takeover can guarantee a low packet loss rate because fast handover is achieved by the takeover process. Fig. 7 displays average energy consumed for handover per a node versus speed of. We measure the energy consumption when the takeover process is used or not, according to speed of. When the takeover process is applied, the energy consumed in the or is measured. An s energy required for handover without the takeover and an s energy required for takeover process have almost constant though the speed of is varied, because these values are not affected generally by s mobility. However, in the case of handover scheme with takeover, energy consumption per an is increased if the speed of is larger. That is, s energy consumption is increased by more takeover failure as the speed of is greater. Considering only s energy consumption, the scheme with takeover shows better performance than the scheme without takeover in every speed of. However, the sum of energy consumption of both and is not better when the speed of is more than about 25 km/h. If we V. CONCLUSIONS For seamless vertical handover, we introduce a new concept, takeover, which enables an to process requests of an. We develop protocol and operation for the takeover and apply it to vertical handover for next-generation heterogeneous networks. The simulation results show that the takeoverbased vertical handover scheme achieves faster and seamless handover compared with conventional handover schemes without the takeover. Therefore, our proposed vertical handover scheme guarantees seamless mobility and service continuity by using a novel concept of takeover in heterogeneous networks. This takeover concept is also applicable to various situations in which an is restricted by its coverage, battery power, resource, and so on. REFERENCES [1] J. McNair and Fang Zhu, Vertical handoffs in fourth-generation multinetwork environments,, IEEE Wireless Commun., vol. 11, no. 3, pp. 8-15, June [2] K. El Malki, et al., IETF draft, Low latency Handoff in Mobile IPv4, May [3] H. H. Choi, O. Song, and D. H. Cho, A Seamless Handoff Scheme for UMTS-WLAN Interworking, IEEE Globecom, vol. 3, pp , Dec [4] C. Guo, et al., A Seamless and Proactive End-to-End Mobility Solution for Roaming Across Heterogeneous Wireless Networks, IEEE J. Select. Areas Commun., vol. 22, pp , June [5] S. Balasubramaniam and J. Indulska, Handovers between heterogeneous networks in pervasive systems, Proceedings, ICCT 2003, vol. 2, pp , Apr [6] F. Urasawa, et al., Analysis and simulation results of multihop handoff scheme in an ad hoc wireless network, Wireless Personal Multimedia Communications, vol. 3, pp , Oct [7] Jaeweon Cho, Z.J. Haas, On the throughput enhancement of the downstream channel in cellular radio networks through multihop relaying, IEEE J. Select. Areas Commun., vol 22, pp , Sep [8] T. Adachi, M. Nakagawa, Battery consumption and handoff examination of a cellular ad-hoc united communication system for operational mobile robots, IEEE Personal Indoor and Mobile Radio Communications, vol. 3, pp , Sep [9] C. Blondia, et al., Low Latency Handoff Mechanisms and Their Implementation in an IEEE Network, Proceedings of ITC18, Teletraffic and Engineering Vol. 5b, pp , Berlin, Germany, Sep [10] O. Casals, et al., Performance evaluation of the post-registration method, a low latency handoff in MIPv4, IEEE ICC 2003, vol.1, pp , May 2003.

A Seamless Handoff Scheme for UMTS-WLAN Interworking

A Seamless Handoff Scheme for UMTS-WLAN Interworking A Seamless Handoff Scheme for UMTS-WLAN Interworking Hyun-Ho Choi, Osok Song and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

QoS based vertical handoff method between UMTS systems and wireless LAN networks

QoS based vertical handoff method between UMTS systems and wireless LAN networks QoS based vertical handoff method between UMTS systems and wireless LAN networks Sungkwan Jung and Dong-ho Cho Div. of EE, Dept. of EECS Korea Advanced Institute of Science and Technology Daejeon, Rep.

More information

Reducing Inter-Cell Handover Events based on Cell ID Information in Multi-hop Relay Systems

Reducing Inter-Cell Handover Events based on Cell ID Information in Multi-hop Relay Systems Reducing Inter-Cell Handover Events based on Cell ID Information in Multi-hop Relay Systems Ji Hyun Park Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and

More information

Due to the many benefits provided by both the third-generation (3G) mobile networks and the IEEE wireless local area networks (WLANs), it is

Due to the many benefits provided by both the third-generation (3G) mobile networks and the IEEE wireless local area networks (WLANs), it is Performance of UMTS/WLAN Integration at Hot-Spot Locations Using OPNET Marwan Abu-Amara, Ashraf Mahmoud, Tarek Sheltami, Adel Al-Shahrani, Khalid Al-Otaibi, S.M.Rehman, and Taha Anwar {marwan, ashraf,

More information

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 Taewan You 1, Seungyun Lee 1, Sangheon Pack 2, and Yanghee Choi 2 1 Protocol Engineering Center, ETRI, 161 Gajoung-dong, Yusong-gu,

More information

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks

University of Würzburg Institute of Computer Science Research Report Series. Performance Comparison of Handover Mechanisms in Wireless LAN Networks University of Würzburg Institute of Computer Science Research Report Series Performance Comparison of Handover Mechanisms in Wireless LAN Networks Rastin Pries and Klaus Heck Report No. 339 September 2004

More information

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS 1 V.VINOTH, 2 M.LAKSHMI 1 Research Scholar, Faculty of Computing, Department of IT, Sathyabama University,

More information

WiMax-based Handovers in Next Generation Networks

WiMax-based Handovers in Next Generation Networks WiMax-based Handovers in Next Generation Networks Nadine Akkari Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University, Saudi Arabia nakkari@kau.edu.sa

More information

An Enhancement of Mobile IP by Home Agent Handover

An Enhancement of Mobile IP by Home Agent Handover An Enhancement of Mobile IP by Home Agent Handover Li-Sheng Yu and Chun-Chuan Yang Multimedia and Communications Laboratory Department of Computer Science and Information Engineering National Chi Nan University,

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Speed Effect on the Performance of Vertical Handover in Wifi-3G Network

Speed Effect on the Performance of Vertical Handover in Wifi-3G Network Speed Effect on the Performance of Vertical Handover in Wifi-3G Network Hassan Khalil Arab American University of Jenin Ramallah, Palestine Emails: Hassan.khalil22@gmail.com Mohammad Hamarsheh Arab American

More information

Mobility Management usually includes two parts: location management and handoff management.

Mobility Management usually includes two parts: location management and handoff management. Mobile Data / Mobility Management I. Mobile Data Services/ Management This broad area involves a lot of industrial applications. Mobile data services/ management is becoming another profitable market for

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

Vertical Handover in Vehicular Ad-hoc Networks A Survey

Vertical Handover in Vehicular Ad-hoc Networks A Survey Vertical Handover in Vehicular Ad-hoc Networks A Survey U. Kumaran Department of computer Applications Noorul Islam Center for Higher Education, Kumaracoil,Tamilnadu, India. Abstract- Vehicular Ad-hoc

More information

Performance Evaluation of Wireless n Using Level 2 and Level 3 Mobility

Performance Evaluation of Wireless n Using Level 2 and Level 3 Mobility Indian Journal of Science and Technology, Vol 11(14), DOI: 10.17485/ijst/2018/v11i14/120616, April 2018 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Performance Evaluation of Wireless 802.11n Using

More information

An Efficient Proactive Routing Method for Mobile Ad Hoc Networks using Peer-to-Peer and Cellular Communication System

An Efficient Proactive Routing Method for Mobile Ad Hoc Networks using Peer-to-Peer and Cellular Communication System An Efficient Proactive Routing Method for Mobile Ad Hoc Networks using Peer-to-Peer and Cellular Communication System Hiroaki Morinot, Tadao 8aitot:j: and Mitsuo Nohara:j: t Research and Development Initiative

More information

An efficient trigger to improve intra-wifi handover performance

An efficient trigger to improve intra-wifi handover performance An efficient trigger to improve intra-wifi handover performance Roberta Fracchia, Guillaume Vivier Motorola Labs, Parc les Algorithmes, Saint-Aubin, 91193 Gif-sur-Yvette, France Abstract Seamless mobility

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation

More information

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University

More information

An Improved Inter-Domain Handover Scheme Based on a Bidirectional Cooperative Relay

An Improved Inter-Domain Handover Scheme Based on a Bidirectional Cooperative Relay BULGARIAN ACADEMY OF CIENCE CYBERNETIC AND INFORMATION TECHNOLOGIE Volume 13, No 4 ofia 2013 Print IN: 1311-9702; Online IN: 1314-4081 DOI: 10.2478/cait-2013-0059 An Improved Inter-Domain Handover cheme

More information

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Hyemee Park, Tae-Jin Lee, and Hyunseung Choo School of Information and Communication Engineering Sungkyunkwan

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

Vertical and Horizontal Handover in Heterogeneous Wireless Networks using OPNET

Vertical and Horizontal Handover in Heterogeneous Wireless Networks using OPNET Vertical and Horizontal Handover in Heterogeneous Wireless Networks using OPNET Abhishek Dhiman M.E, E.C.E Department, Thapar University, Patiala Karamjit Singh Sandha Asst. Professor, E.C.E Department

More information

Performance Evaluation of the Post-Registration Method, a Low Latency Handoff in MIPv4

Performance Evaluation of the Post-Registration Method, a Low Latency Handoff in MIPv4 Performance Evaluation of the Post-Registration Method, a Low Latency Handoff in MIPv O. Casals, Ll. Cerdà Dept. Computer Architecture, Technical University of Catalonia (UPC), Barcelona Spain {olga, llorenc}@ac.upc.es

More information

Performance Analysis Of Wi-Fi And Wi-Max Networks During Vertical Handover

Performance Analysis Of Wi-Fi And Wi-Max Networks During Vertical Handover Performance Analysis Of Wi-Fi And Wi-Max Networks During Vertical Handover Ashish Mishra Dept. of Computer Science,Pondicherry University Pondicherry Mrs. R.Sunitha Assistant Professor Dept. of Computer

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Handover Management for Mobile Nodes in IPv6 Networks

Handover Management for Mobile Nodes in IPv6 Networks TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we

More information

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017 265 Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method Mohammad Pashaei, Hossein Ghiasy

More information

A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks

A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks ICACT Transactions on on the Advanced Communications Technology (TACT) Vol. Vol. 2, 2, Issue Issue 3, 3, May May 2013 2013 233 A Global Mobility Scheme for Seamless Multicasting in Proxy Mobile IPv6 Networks

More information

RECENTLY, the information exchange using wired and

RECENTLY, the information exchange using wired and Fast Dedicated Retransmission Scheme for Reliable Services in OFDMA Systems Howon Lee and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Seamless Handover Scheme for Proxy Mobile IPv6

Seamless Handover Scheme for Proxy Mobile IPv6 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication Seamless Handover Scheme for Proxy Mobile IPv6 Ju-Eun Kang 1, Dong-Won Kum 2, Yang Li 2, and You-Ze Cho 2 1 LGDACOM

More information

Requirements for the Operations & Management of 4G Networks

Requirements for the Operations & Management of 4G Networks Requirements for the Operations & Management of 4G Networks Prof. James Won-Ki Hong Dept. of Computer Science and Engineering, Korea & Prof. Alberto Leon-Garcia Dept. of Electrical and Computer Engineering

More information

A Seamless Handover Mechanism for IEEE e Broadband Wireless Access

A Seamless Handover Mechanism for IEEE e Broadband Wireless Access A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea {kka1, tongsok}@kt.co.kr

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

IP Mobility Support with a Multihomed Mobile Router

IP Mobility Support with a Multihomed Mobile Router IP Mobility Support with a Multihomed Mobile Router Hee-Dong Park 1, Dong-Won Kum 2, Yong-Ha Kwon 2, Kang-Won Lee 2, and You-Ze Cho 2 1 Department of Computer Engineering, Pohang College, Pohang, 791-711,

More information

FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN

FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN FAST INTER-AP HANDOFF USING PREDICTIVE AUTHENTICATION SCHEME IN A PUBLIC WIRELESS LAN SANGHEON PACK AND YANGHEE CHOI School of Computer Science and Engineering, Seoul National University, Seoul, Korea

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Cost Analysis of Mobility Management Entities for SIGMA

Cost Analysis of Mobility Management Entities for SIGMA 010 International Conference on High Performance Switching and Routing Cost Analysis of Mobility Management Entities for SIGMA Md. Shohrab Hossain Mohammed Atiquzzaman University of Oklahoma, Norman, OK

More information

A Simulative Study on the Performance Evaluation for Simultaneous and Successive Mobility for Mobile IPv6

A Simulative Study on the Performance Evaluation for Simultaneous and Successive Mobility for Mobile IPv6 Journal of Computer Science 6 (12): 1511-1517, 2010 ISSN 1549-3636 2010 Science Publications A Simulative Study on the Performance Evaluation for Simultaneous and Successive Mobility for Mobile IPv6 Ibrahim

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Performance Analysis of Fast Handover in Mobile IPv6 Networks

Performance Analysis of Fast Handover in Mobile IPv6 Networks Performance Analysis of Fast Handover in Mobile IPv6 Networks Sangheon Pack and Yanghee Choi School of Computer Science&Engineering Seoul National University, Seoul, Korea Tel: +82-2-880-1832, Fax: +82-2-872-2045

More information

A Fast Handoff Scheme Between PDSNs in 3G Network

A Fast Handoff Scheme Between PDSNs in 3G Network A Fast Handoff Scheme Between PDSNs in 3G Network Jae-hong Ryu 1 and Dong-Won Kim 2, 1 Electronics and Telecommunications Research Institute (ETRI) 161 Gajeong-dong, Yuseong-gu, Daejeon, 305-350, Korea

More information

End-User Controlled Vertical Handover Procedure for 4G Wireless Access Networks

End-User Controlled Vertical Handover Procedure for 4G Wireless Access Networks End-User Controlled Vertical Handover Procedure for 4G Wireless Access Networks M. Gopu, Dr. Ritesh Khanna Abstract This paper proposes a user terminal-controlled mobility management across heterogeneous

More information

Impact of Hello Interval on Performance of AODV Protocol

Impact of Hello Interval on Performance of AODV Protocol Impact of Hello Interval on Performance of AODV Nisha Bhanushali Priyanka Thakkar Prasanna Shete ABSTRACT The multi-hop ad hoc networks are self organizing networks with dynamic topology. The reactive

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Performance Comparison and Analysis on MIPv6, Fast MIPv6 Bi-casting and Eurecom IPv6 Soft Handover over IEEE802.11b WLANs

Performance Comparison and Analysis on MIPv6, Fast MIPv6 Bi-casting and Eurecom IPv6 Soft Handover over IEEE802.11b WLANs Performance Comparison and Analysis on MIPv6, Fast MIPv6 Bi-casting and Eurecom IPv6 Soft Handover over IEEE802.11b WLANs Farouk Belghoul, Yan Moret, Christian Bonnet Department of Mobile Communications,

More information

A Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks

A Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks , pp.147-151 http://dx.doi.org/10.14257/astl.2015.117.35 A Design of Distributed Data Traffic Algorithm based on Hierarchical Wireless/Mobile Networks Ronnie Caytiles, Seungyong Shin, Minji Yang and Byungjoo

More information

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Maryam Soltan, Inkwon Hwang, Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles, CA

More information

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks A Simple Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks Chun-Su Park, You-Sun Kim, Kwang-Wook Lee, Seung-Kyun Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea

More information

An Efficient DECT-Mobile IP Interworking for Mobile Computing

An Efficient DECT-Mobile IP Interworking for Mobile Computing An Efficient DECT-Mobile IP Interworking for Mobile Computing Anthony Lo *, Winston Seah * and Edwin Schreuder + * Centre for Wireless Communications 1, National University of Singapore, 20 Science Park

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1

Analyzing the performance of WiMAX zone handover in the presence of relay node Qualnet6.1 IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. IV (May - Jun. 2014), PP 49-53 Analyzing the performance of WiMAX zone

More information

Seamless Network Mobility Management for Realtime Service

Seamless Network Mobility Management for Realtime Service Seamless Network Mobility Management for Realtime Service Hee-Dong Park, Yong-Ha Kwon, Kang-Won Lee, Sung-Hyup Lee, Young-Soo Choi, Yang Li, and You-Ze Cho School of Electrical Engineering & Computer Science,

More information

Cross-layer Optimized Vertical Handover Schemes between Mobile WiMAX and 3G Networks

Cross-layer Optimized Vertical Handover Schemes between Mobile WiMAX and 3G Networks KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 2, NO. 4, AUGUST 2008 171 Copyright c 2008 KSII Cross-layer Optimized Vertical Handover Schemes between Mobile WiMAX and 3G Networks Jaeho Jo

More information

Virtual Price Based Policy Enforcement for Access Selection and Vertical Handover in Multi-Access Networks

Virtual Price Based Policy Enforcement for Access Selection and Vertical Handover in Multi-Access Networks Virtual Price Based Policy Enforcement for Access Selection and Vertical Handover in Multi-Access Networks Fanchun Jin 1, Joseph S. Gomes 1, Yu Zhou 1, Hyeong-Ah Choi 1, Jae-Hoon Kim 2, JungKyo Sohn 3,

More information

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance Analysis of Three Routing Protocols for Varying MANET Size Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,

More information

A Study on Mobile IPv6 Based Mobility Management Architecture

A Study on Mobile IPv6 Based Mobility Management Architecture UDC 621.396.69:681.32 A Study on Mobile IPv6 Based Mobility Management Architecture VTsuguo Kato VRyuichi Takechi VHideaki Ono (Manuscript received January 19, 2001) Mobile IPv6 is considered to be one

More information

Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR

Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on Mr. Nirav Bhatt, Dr. Dhaval Kathiriya Reaserch Scholar, School of Computer Science, RK University, Rajkot Director IT,

More information

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India

More information

A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism

A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism A Fast Handover Protocol for Mobile IPv6 Using Mobility Prediction Mechanism Dae Sun Kim 1 and Choong Seon Hong 2 1 School of Electronics and Information, Kyung Hee Univerity 1 Seocheon, Giheung, Yongin,

More information

Fast Handover for Multiple-interface Mobile Devices Connecting to a Single Foreign Agent in MIPv4 with MIH Support

Fast Handover for Multiple-interface Mobile Devices Connecting to a Single Foreign Agent in MIPv4 with MIH Support Fast Handover for Multiple-interface Mobile Devices Connecting to a Single Foreign Agent in MIPv4 with MIH Support Beizhong Chen Ivan Marsic David Faucher Cezar Purzynski Ray Miller Sharma Sameer Rutgers

More information

4G Wireless Systems. Outlines. Data Rates of Wireless Networks. Wireless Networks. Wireless Networks Throughput versus Range

4G Wireless Systems. Outlines. Data Rates of Wireless Networks. Wireless Networks. Wireless Networks Throughput versus Range Outlines 4G Wireless Systems Vijay K. Garg, Ph.D., P.E. Department of Electrical & Computer Engineering, College of Engineering, University of Illinois at Chicago e-mail: garg.v@comcast.net Types of wireless

More information

Seamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism

Seamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism Seamless Interoperability Across LTE And WiMAX Using Vertical Handover Mechanism Bharatesh Chakravarthi S. B M.Tech. Dept of ISE The Oxford College of Engineering Bangalore, India Prof. D. Jayaramaiah

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Performance of Soft Handover FBSS Compared to Hard Handover in case of High Speed in IEEE e for Multimedia Traffic

Performance of Soft Handover FBSS Compared to Hard Handover in case of High Speed in IEEE e for Multimedia Traffic SETIT 2009 5 th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 22-26, 2009 TUNISIA Performance of Soft Handover FBSS Compared to Hard Handover

More information

Proactive Context Transfer in WLAN-based Access Networks

Proactive Context Transfer in WLAN-based Access Networks Proactive Context Transfer in WLAN-based Access Networks Ha Duong, Arek Dadej and Steven Gordon Institute for Telecommunications Research, University of South Australia Mawson Lakes, SA 5095, Australia.

More information

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 57 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient

More information

RESOURCE MANAGEMENT STRATEGY TO SUPPORT REAL TIME VIDEO ACROSS UMTS AND WLAN NETWORKS

RESOURCE MANAGEMENT STRATEGY TO SUPPORT REAL TIME VIDEO ACROSS UMTS AND WLAN NETWORKS RESOURCE MANAGEMENT STRATEGY TO SUPPORT REAL TIME VIDEO ACROSS UMTS AND WLAN NETWORKS K.Ayyappan, I.Saravanan, G.Sivaradje and P.Dananjayan Department of Electronics and Communication Engineering Pondicherry

More information

IJCSMS International Journal of Computer Science & Management Studies, Vol. 12, Issue 03, September 2012 ISSN (Online):

IJCSMS International Journal of Computer Science & Management Studies, Vol. 12, Issue 03, September 2012 ISSN (Online): Various handover processes in Wi-Max Deepak Nandal 1, Vikas Nandal 2 1 Asst Prof (CSE), PDM, Bahadurgarh dpk.nandal@yahoo.com 2 Asst. Prof (ECE) UIET, MDU, Rohtak, India nandalvikas@gmail.com Abstract

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

Performance Comparison of UMTS/WLAN Integrated Architectures with Dynamic Home Agent Assignments

Performance Comparison of UMTS/WLAN Integrated Architectures with Dynamic Home Agent Assignments Performance Comparison of UMTS/WLAN Integrated Architectures with Dynamic Home Agent Assignments R. Surender, G. Sivaradje and P. Dananjayan Department of Electronics and Communication Engineering, Pondicherry

More information

Dynamic Two-Threshold Flow Control Scheme for 3GPP LTE-A Relay Networks

Dynamic Two-Threshold Flow Control Scheme for 3GPP LTE-A Relay Networks Dynamic Two-Threshold Flow Control Scheme for 3GPP LTE-A Relay Networks Ping-Chen Lin and Ray-Guang Cheng Department of Electronic and Computer Engineering, National Taiwan University of Science and Technology,

More information

Fast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE

Fast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE Fast Handover Techniques for ESS-Subnet Topology Mismatch in IEEE 802.11 Chien-Chao Tseng *, Chia-Liang Lin *, Yu-Jen Chang * and Li-Hsing Yen * Department of Computer Science, National Chiao Tung University,

More information

P-SIGMA: Paging in End to End Mobility Management

P-SIGMA: Paging in End to End Mobility Management P-SIGMA: Paging in End to End Mobility Management Abu S. Reaz, Mohammed Atiquzzaman Telecommunications and Networks Research Lab School of Computer Science, University of Oklahoma, Norman, OK 73019-6151,

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

Quality of Service and Security as Frameworks toward Next-Generation Wireless Networks

Quality of Service and Security as Frameworks toward Next-Generation Wireless Networks Quality of Service and Security as Frameworks toward Next-Generation Wireless Networks ZORAN BOJKOVIĆ, BOJAN BAKMAZ Faculty of transport and traffic engineering University of Belgrade Vojvode Stepe 305,

More information

PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES

PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES Karann Chew, Rahim Tafazolli University of Surrey, United Kingdom Abstract - GPRS is part of the evolution

More information

Location Management Agent for SCTP Handover in Mobile Network

Location Management Agent for SCTP Handover in Mobile Network Location Management Agent for SCTP Handover in Mobile Network Yong-Jin Lee Department of Technology Education, Korea National University of Education 250 Taesungtapyon-ro, Heungduk-ku, Cheongju, South

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Sangheon Pack, Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul, Korea

More information

Mobility Management Protocols for Wireless Networks. By Sanaa Taha

Mobility Management Protocols for Wireless Networks. By Sanaa Taha Mobility Management Protocols for Wireless Networks By outline Mobility Management Mobility Management Models Host-based Mobility Management Protocols Network- based Mobility Management Protocols Which

More information

Fast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks

Fast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks Fast Location Opposite Update Scheme for Minimizing Handover Latency over Wireless/Mobile Networks Sunguk Lee Research Institute of Industrial Science and Technology Pohang, Gyeongbuk, 790-330, S.KOREA

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,

More information

Distributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks

Distributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks J. lnf. Commun. Converg. Eng. 15(1): 37-42, Mar. 2017 Regular paper Distributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks Sang-Il Choi 1 and Seok-Joo Koh 2*, Member,

More information

msctp for Vertical Handover Between Heterogeneous Networks

msctp for Vertical Handover Between Heterogeneous Networks msctp for Vertical Handover Between Heterogeneous Networks Seok Joo Koh and Sang Wook Kim Department of Computer Science, Kyungpook National University, Daegoo, Korea {sjkoh, swkim}@cs.knu.ac.kr Abstract.

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56

More information

Fuzzy Logic based Intelligent Vertical Handoff Algorithm

Fuzzy Logic based Intelligent Vertical Handoff Algorithm Fuzzy Logic based Intelligent Vertical Handoff Algorithm Renuka Dogra 1, Kiran Ahuja 2 Department of Electronics & Communication Engineering 1, 2, D.A.V Institute of Engineering & Technology, Jalandhar,Punjab,

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Energy Efficient Utilization of IEEE Hot Spots in 3G Wireless Packet Data Networks

Energy Efficient Utilization of IEEE Hot Spots in 3G Wireless Packet Data Networks Energy Efficient Utilization of IEEE 802.11 Hot Spots in 3G Wireless Packet Data Networks F. Ozan Akgül and M. Oğuz Sunay Koç University, Department of Electrical & Electronics Engineering, Rumeli Feneri

More information

A NEW ROUTING MECHANISM FOR INTEGRATING CELLULAR NETWORKS, WLAN HOT SPOTS AND MANETS

A NEW ROUTING MECHANISM FOR INTEGRATING CELLULAR NETWORKS, WLAN HOT SPOTS AND MANETS A NEW ROUTING MECHANISM FOR INTEGRATING CELLULAR NETWORKS, WLAN HOT SPOTS AND MANETS Dave Cavalcanti 1, Carlos Cordeiro 2, Anup Kumar 3, Dharma Agrawal 1 OBR Center for Distributed and Mobile Computing

More information

Network Selection Decision Based on Handover History in Heterogeneous Wireless Networks

Network Selection Decision Based on Handover History in Heterogeneous Wireless Networks International Journal of Computer Science and Telecommunications [Volume 3, Issue 2, February 2012] 21 ISSN 2047-3338 Network Selection Decision Based on Handover History in Heterogeneous Wireless Networks

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information