Connection-information-based connection rerouting for connection-oriented mobile communication networks

Similar documents
A Binarization Algorithm specialized on Document Images and Photos

Load-Balanced Anycast Routing

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Cluster Analysis of Electrical Behavior

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

Simulation Based Analysis of FAST TCP using OMNET++

User Authentication Based On Behavioral Mouse Dynamics Biometrics

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

3D vector computer graphics

Analysis of Continuous Beams in General

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

IP mobility support is becoming very important as the

An Optimal Algorithm for Prufer Codes *

Efficient Distributed File System (EDFS)

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

S1 Note. Basis functions.

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

On Some Entertaining Applications of the Concept of Set in Computer Science Course

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

Constructing Minimum Connected Dominating Set: Algorithmic approach

CMPS 10 Introduction to Computer Science Lecture Notes

Mathematics 256 a course in differential equations for engineering students

A New Transaction Processing Model Based on Optimistic Concurrency Control

Related-Mode Attacks on CTR Encryption Mode

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

THE MAP MATCHING ALGORITHM OF GPS DATA WITH RELATIVELY LONG POLLING TIME INTERVALS

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution

Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast

Load Balancing for Hex-Cell Interconnection Network

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

Assembler. Building a Modern Computer From First Principles.

Analysis of Collaborative Distributed Admission Control in x Networks

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Performance Evaluation of Information Retrieval Systems

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Advanced Computer Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Module Management Tool in Software Development Organizations

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

Report on On-line Graph Coloring

kccvoip.com basic voip training NAT/PAT extract 2008

Edge Detection in Noisy Images Using the Support Vector Machines

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network

Virtual Machine Migration based on Trust Measurement of Computer Node

High-Boost Mesh Filtering for 3-D Shape Enhancement

Brave New World Pseudocode Reference

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

Wishing you all a Total Quality New Year!

AADL : about scheduling analysis

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

IP Camera Configuration Software Instruction Manual

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Classifier Selection Based on Data Complexity Measures *

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

X- Chart Using ANOM Approach

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

Cell Count Method on a Network with SANET

Wireless Sensor Network Localization Research

Deadlock-Free Path-Based Fault-Tolerant Multicast Communications on 2-D Mesh Networks-on-Chip

A fair buffer allocation scheme

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

S.P.H. : A SOLUTION TO AVOID USING EROSION CRITERION?

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

Solving two-person zero-sum game by Matlab

Parallel matrix-vector multiplication

Notes on Organizing Java Code: Packages, Visibility, and Scope

MODELING THE RELIABILITY OF INFORMATION MANAGEMENT SYSTEMS BASED ON MISSION SPECIFIC TOOLS SET SOFTWARE

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

News. Recap: While Loop Example. Reading. Recap: Do Loop Example. Recap: For Loop Example

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation

Fault Detection in Rule-Based Software Systems

MODULE DESIGN BASED ON INTERFACE INTEGRATION TO MAXIMIZE PRODUCT VARIETY AND MINIMIZE FAMILY COST

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

Support Vector Machines

TN348: Openlab Module - Colocalization

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Conditional Speculative Decimal Addition*

USING GRAPHING SKILLS

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method

Transcription:

Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang Km Research Insttute of Advanced Computer Technology, Seoul Natonal Unversty, Kwanak-ku, Seoul, 151-742, Korea Department of Computer Engneerng, Seoul Natonal Unversty, Kwanak-ku, Seoul, 151-742, Korea Receved 9 August 1996 Abstract. To date, varous connecton reroutng methods for connecton-orented moble networks have been proposed. The prevous methods, however, are lmted to specfc topologes or envronments. In ths paper, we propose the connecton-nformaton-based reroutng wdely applcable to varous connecton-orented moble networks. Ths method requres nether a specfc topology nor a complex connecton, enables fast reroutng, provdes approprate route optmalty, and can be extended easly. 1. Introducton In moble computer communcaton, how to provde transparent network servces to moble users has been regarded as a dffcult problem. Much research has been carred out concernng the problem. Ths research has targeted varous envronments such as the Internet [1 6], MAN-based PCN [7 10], ATM-based PCN [11], and tradtonal or real-tme packet swtchng networks [12]. These networks are classfed nto two types, that s, the connecton-less network and the connectonorented network. The Internet belongs to the connectonless network, and the others belong to the connectonorented network. Research shows that one of the key ssues concernng the connecton-less network and that of the connecton-orented network are the data redrecton problem [1 5] and the connecton reroutng problem [9 12] respectvely. The handlng of the data redrecton problem and that of the connecton reroutng problem are smlar to some extent, but ther detals are very dfferent. There exsts a connecton between two communcatng users n the connecton-orented network whle there s no connecton for the communcatng users n the connectonless network. Therefore, when a user changes ts locaton to a new area, n the connecton-orented network ts connecton has to be rerouted to the new locaton at an approprate pont and all data addressed to the user Author to whom correspondence should be addressed. E-mal address: mhsong@twns.snu.ac.kr E-mal address: yhcho@smart.snu.ac.kr E-mal address: cskm@twns.snu.ac.kr are transmtted to hm through the rerouted connecton, whle n the connecton-less network an acton such as the connecton reroutng s not needed and each pece of data addressed to the user s redrected ndependently at an approprate pont towards the new locaton. Our nterest s n the connecton reroutng, and the motvaton of our work s the fact that exstng connecton reroutng methods are based to ther specfc envronments and so are not approprate for general connecton-orented moble network envronments. The am of ths paper s to propose a new connecton reroutng method, called the connecton-nformaton (CI)-based reroutng, whch s good for applcaton to varous connecton-orented moble networks. The connecton-orented moble network can be modelled to consst of three modules; the moble host (MH), the moble host agent (MHA), and the mobltyhandlng router (MR). The MHA medates between MHs and the fxed part of the network, and the MR handles connecton reroutng as well as tradtonal routng. Fgure 1 shows a stuaton of connecton reroutng n whch, durng a conversaton, a destnaton MH (MH d ) changes ts locaton whle ts source MH (MH s ) stays n ts area. In the example, the source MHA (MHA s ) s the agent for the source MH (MH s ), and the old MHA (MHA old ) and the new MHA (MHA new ) are the agents for the destnaton MH (MH d ) before and after the locaton change respectvely. The MR r s the reroutng pont. The MR s s the source endpont of the old connecton and the new connecton, and the MR old and the MR new are the destnaton-endpont MR of the old connecton and that of the new connecton 0967-1846/98/020047+19$19.50 c 1998 The Brtsh Computer Socety, The Insttuton of Electrcal Engneers and IOP Publshng Ltd 47

M Song et al Fgure 1. Moble network model. respectvely. We use ths model as a bass for the followng dscussons. Wthout loss of generalty, we assume that the MH s s fxed whle the MH d s movng. In ths model, one locaton area corresponds to one subnet n an nternetwork or to one router coverage area n a subnet. Ths paper s organzed as follows. Secton 2 provdes a summary of exstng works. In secton 3, we descrbe the dea and concept of the CI-based reroutng n detal. In secton 4, we compare t wth prevous methods. In secton 5, we dscuss ts problems and solutons. In secton 6, we dscuss ts applcaton feasblty and extenson. In secton 7, we dscuss the data redrecton problem n relaton to the connecton reroutng. In secton 8, we conclude the paper. 2. Prevous works 2.1. Major reroutng methods Most connecton reroutng methods suggested for moble networks make reuse of the connecton to be rerouted for ts new one. Ths strategy s good for fast reroutng and low network processng overhead. Fve mportant such reroutng methods are as follows: (1) the connecton extenson reroutng [10], (2) the destnatonbased reroutng [9], (3) the branch-pont-traversal-based reroutng [12], (4) the multcast-jon-based reroutng [12], and (5) the vrtual-tree-based reroutng [11]. Ther reroutng procedures are shown n fgure 2, n whch the p-req (path-request), p-rsp (path-response), rr- REQ (reroutng-request), rr-rsp (reroutng-response), rr-cnfm (reroutng-confrmaton), rel-req (release- ReQuest) and rel-rsp (release-response) are the messages for the path request, the path response, the reroutng request, the reroutng response, the reroutng confrmaton, the release request and the release response respectvely. The number n and n(rel), the respectve heads of the reroutng and release messages, are the message flow sequence numbers of the reroutng and release respectvely. The rr-req s followed by the rr-rsp, and the rr-rsp s followed by the rr-cnfm, f needed. The rel-req message s sent by the reroutng MR towards the old destnaton MHA at the same tme that the rr-rsp s sent to the new destnaton MHA, so that the MRs and MHA on the old connecton branch release the resources for the branch. The rel-rsp message s sent to the MR by the old destnaton MHA as the response to the rel-req message. In the fgure, the bold arrows ndcate the flows of the rr-req, rr-rsp, and rr-cnfm messages, the thn arrows ndcate the flows of the rel-req and rel-rsp messages, and the dotted arrows ndcate the flows of the p-req and p-rsp messages. In the connecton extenson reroutng, when a communcatng destnaton MH has moved nto a new area, ts new MHA fnds the locaton of the MH s old destnatonendpont MR (MR old ) and sends the reroutng request message (rr-req) to the MR. The MR extends the MH s connecton to the new MHA, and then the extended connecton becomes the MH s new connecton. Ths method has the mert of smplcty. However, the MH s several locaton changes durng a conversaton may make the connecton largely devated from ts optmal route. In the destnaton-based reroutng, the reroutng pont s predetermned at the connecton set-up tme, and when a destnaton MH has entered a new area durng ts communcaton, ts new MHA sends the reroutng request message (rr-req) to the pre-determned pont. Ths method prevents the rerouted connecton from begn largely devated from ts optmal route to a certan extent, but t does not resolve the problem completely. In the branch-pont-traversal-based reroutng, when a destnaton MH has entered a new area durng ts communcaton, ts new MHA sends the rr-req message to the old agent of the MH (MHA old ) to request the old MHA to fnd the pont at whch the MH s connecton can branch to the new MHA, and then the old MHA ntalzes the fndng by forwardng the rr-req message over the connecton to be rerouted. The message meets a pont branchng to the new MHA at last and the pont becomes the reroutng pont. Ths method s approprate for networks whch have tree-lke topologes, but has dffcultes n beng 48

Connecton reroutng based on connecton nformaton Fgure 2. Reroutng procedures of prevous connecton reroutng methods. appled to the networks wth other topologes. Moreover, the traversal for fndng the reroutng pont may take a long tme. In the multcast-jon-based reroutng, the connecton s bult and managed by a multcast protocol, and the jon operaton of the protocol s used for the connecton reroutng. In the method, when a destnaton MH has entered a new area durng ts communcaton, ts new MHA ssues a jon request message towards the source MH (MH s ) or a specfc MR. The message meets the connecton at a pont at last, and the pont becomes the reroutng pont. In fact, there are three types for the jon operaton. In the frst [13] or the second type [14], the jon request message s sent towards the source MH or a specfc MR respectvely untl t meets wth an MR on the connecton to be rerouted. In the thrd type [15], a path request message (p-req) s sent towards the source MH and s captured by the agent of the source MH (MHA s ) at last, and then a path message (p-rsp) s sent to the new destnaton MHA by the source MHA, so that the new destnaton MHA can send the jon message (rr-req) along the path known by the path message to a pont whch wll be the reroutng pont. As known n the above, n the multcast-jon-based reroutng the reroutng pont s determned dynamcally rght at the reroutng tme, but the adopton of the multcast protocol for moblty handlng lmts the method only to the networks wth the capablty of multcastng. In the vrtual-tree-based reroutng, when a connecton s establshed, a tree of expected connecton branches s constructed as the destnaton end-part of the connecton. Therefore, when a destnaton MH has entered a new area durng ts communcaton, ts new MHA does not need to establsh a new connecton branch. Ths method s sutable for a specal case where the destnaton MH changes ts locaton frequently, but t may not be acceptable n most other cases because of the overhead cost of the connecton branches tree. The structures of the p-req, p-rsp, rr-req, rr- RSP, and rr-cnfm messages for the reroutng methods mentoned above can be thought to be lke those shown n fgure 3. Each of the messages conssts of the operaton feld, the destnaton address feld, the source address feld, and the CID (connecton dentfer) feld. Note that the CIDs of the messages have dfferent meanngs: the connecton to be rerouted n the p-req, p-rsp, and rr- REQ messages, the connecton rerouted n the rr-rsp and rr-cnfm messages, the connecton whch should be released n the rel-req message, and the connecton released n the rel-rsp message. 2.2. Problems of exstng methods and our ams When the above-mentoned exstng methods are examned n respect of general applcablty, they are found to have the followng problems. The rerouted connecton may be largely devated from ts expected optmal route (n the connecton extenson and destnaton-based reroutngs). The dstance between the reroutng pont and the new MHA may be very long, and so the reroutng may take a long tme (n the connecton extenson, destnatonbased, branch-pont-traversal-based, and multcast-jonbased reroutngs). The network s requred to have a specfc topology (n the branch-pont-traversal-based reroutng). The reroutng depends on a specfc protocol (n the multcast-jon-based reroutng). The connecton structure s complex (n the vrtualtree-based reroutng). Our proposal solves these problems, that s, t prevents the rerouted connecton from becomng abnormally long, t takes a short tme n reroutng, t does not depend on a specfc network topology or protocol, and t does not requre a complex connecton structure, so that t s sutable for general applcaton. 49

M Song et al Fgure 3. Reroutng message structures of prevous connecton reroutng methods. Fgure 4. Procedure of CI-based reroutng. 3. CI-based reroutng 3.1. Connecton reroutng based on CI A connecton can be represented by the combnaton of ts global connecton dentfer (GCID) and the addresses of the MRs on the connecton. We call the content the CI (connecton nformaton). The CI whch conssts of a connecton dentfer and router addresses can be consdered to be a connecton-orented verson of the route record whch s the nformaton for the datagram path n the connecton-less network and conssts of only router addresses [16]. Our reroutng method, called the CI-based reroutng, s based on the connecton nformaton. The procedure of the CI-based reroutng s as follows. (1) When a connecton s establshed, ts destnaton MH s provded wth the connecton nformaton. The source MHA, ntermedate MRs, and destnaton MHA on the connecton capture the GCID of the connecton and store t as an dentfer of the connecton durng the establshment. (2) When the MH has changed ts locaton durng a communcaton, the MH provdes ts connecton nformaton to ts new MHA. (3) The new MHA selects one MR beng closest to t for the reroutng pont of the move-n MH s connecton out of the MRs ncluded n the connecton nformaton, as shown n fgure 5. (We call the MR the closest MR.) The new MHA should be able to calculate cost dstances from t to the MRs. (4, 5) The new MHA requests the selected MR to reroute the connecton of the move-n MH. (6, 7) (6(rel), 7(rel)). The MR reroutes the connecton to the new MHA. That s, the MR requests the MRs and MHA on the old branch of the connecton to release the GCID and other resources for the connecton by sendng a release request message towards the old MHA (6(rel), 50

Connecton reroutng based on connecton nformaton Fgure 5. Selecton of the reroutng pont. Fgure 6. The format of CI feld. 7(rel)) and bulds the new branch of the connecton to the new MHA (6, 7), n parallel. When the constructon of the new branch s completed, the connecton nformaton about the new branch s provded to the MH. (8) The MH updates the correspondng part of ts old connecton nformaton wth the connecton nformaton about the new branch. (8(rel), 9(rel)). The old MHA sends a release response message to the reroutng MR. Ths method fulfls the goals presented at the end of secton 2.2 as follows. The rerouted connecton s not largely devated from ts possble optmal route because the connecton of the move-n MH s rerouted at the MR beng closest to the MH s new MHA. (Ths s dscussed n detal n secton 4.) The reroutng takes a very short tme because the dstance between the reroutng pont and the new MHA s very short. (Ths s also dscussed n detal n secton 4.) It does not depend on a specfc network topology n selectng the reroutng pont because the connecton nformaton s enough to select the reroutng pont. It does not depend on a specfc protocol because the proposed method uses only ts own protocol. The connecton structure s smple because the proposed method s based on the pont-to-pont uncast connecton and needs no addtonal connecton branches. 3.2. Acquston and update of connecton nformaton In our reroutng method, when a connecton s establshed, ts connecton nformaton s recorded n ts connecton setup request packet. We call ths technque the connecton recordng. The connecton recordng s dvded nto two parts, that s, the GCID recordng whch records the GCID n the connecton set-up request packet and the route recordng whch records the route record n the packet. The connecton set-up request packet must nclude a specal feld for the connecton nformaton. We call the specal feld the CI feld and defne the feld to be composed of the followng fve subfelds as shown n fgure 6. Operaton code the code of connecton recordng. GCID the unque dentfer for a connecton. Record length the maxmum number of the MR addresses to be ncluded n the CI feld. Record ponter the ponter ndcatng the next recordng poston of the route record subfeld. Route record the addresses of the preset number of MRs on a connecton. The GCID s recorded n the GCID subfeld by the source MHA and the MR addresses are recorded n the route record subfeld by the MRs. The record length s preset by the source MHA, and, n the case that all the space of the route record subfeld s used up before the connecton setup request packet reaches the destnaton MHA, the oldest MR address n the route record subfeld s overwrtten by a new one. Fnally, only the addresses of the preset number of MRs closest to the destnaton MH are provded to the MH. Ths strategy s based on the movng localty of MH. We call ths route-recordng technque the crcular route recordng. Ths route-recordng technque s very dfferent from that used n Internet [16], where n the case that all the route record space of a datagram s used up before the datagram reaches ts destnaton the route recordng s no longer performed at ongong routers and so the addresses of the foremost possble number of routers are eventually provded to the destnaton. One example of connecton recordng s shown n fgure 7. In the example, seven MRs are ncluded n a connecton, but the record length s only 5. Therefore, although all the seven MRs partcpate n connecton 51

M Song et al Fgure 7. Example of connecton recordng. Fgure 8. Structures of reroutng request and response messages. recordng, only the addresses of fve MRs can be ncluded n the CI feld. The crcular route recordng makes the addresses of the last fve MRs be ncluded n the CI feld. The frst overwrtng occurs at the MR 6. That s, the content of the address feld 1 n the CI feld s overwrtten wth the MR 6 address. When the connecton recordng s complete, the address feld 3, whch s the next recordng poston, ncludes the address of the MR farthest from the destnaton MHA, and the address feld 2 ncludes the address of the MR closest to the destnaton MHA. Consequently, the destnaton MH s provded wth the connecton nformaton ncludng one GCID and the addresses of the fve MRs closest to the destnaton MHA, that s, GCID, A3, A4, A5, A6, A7. Fgure 8 shows the structures of reroutng messages, that s, of the reroutng request message and of the reroutng response message. Some felds of the messages, that s, the record length feld of the rr-req message, and the record length, record ponter, and route record felds of the rr-rsp message are ncluded so that the connecton recordng can be performed at the reroutng tme. One example of the connecton recordng at the reroutng tme s shown n fgure 9. The record length of the rr-req message s ntalzed to 0, but, whle the message s beng forwarded to the reroutng MR, ts record length s ncremented by one per each ntermedate MR whch the message meets. When the rr-req message has reached the reroutng MR, the MR copes the record length of the rr-req message for that of the rr-rsp message. Whle reroutng s beng performed, the addresses of the MRs beng ncluded n the new connecton branch are recorded n the route record feld of the rr-rsp message and the nformaton about the new branch s provded to the destnaton MH at last. When the reroutng s completed, the MH updates the correspondng part of ts old connecton nformaton wth the connecton nformaton about the new branch. 52

Connecton reroutng based on connecton nformaton Fgure 9. Connecton recordng at connecton reroutng. Fgure 10. Comparson of reroutng procedures. 3.3. Release of old connecton branch The structures of the release request and response messages are the same as those shown n fgure 3, except the CID feld s renamed as the GCID feld. The release of the old connecton branch needs much care because the outstandng data to the source and destnaton MHs should be processed properly before the release [17]. We wll handle ths problem n another paper. 4. Quanttatve comparsons 4.1. Defnton of evaluaton factors We defne the followng performance evaluaton factors, so that we may compare our proposed method wth prevous ones quanttatvely. Connecton dstance number of lnks on a connecton. Movng dstance number of lnks to whch extent an MH moved. Reroute dstance ( reroute-dstance ) number of lnks on a new connecton branch. Route optmalty ( route-optmalty ) the extent to whch the real route of a rerouted connecton s close to ts optmal route, that s, the dstance of the optmal route over that of the real route. Degree of reroutng procedure ( deg-of-reroutngprocedure ) number of all the sequences of operatons for reroutng (refer to fgure 10). Sze of connecton nformaton ( sze-of-ci ) number of MR addresses ncluded n a connecton nformaton. Recordng length ( recordng-length ) number of the MRs of a connecton whch were nvolved n connecton recordng. Reroutng tme ( reroutng-tme ) the tme needed for performng all the sequences of operatons for reroutng. Sze of reroutng messages ( sze-of-reroutngmessages ) sum of the szes of the messages for reroutng. For convenence, we constran the messages to the reroutng request, response, and confrmaton messages only, and count the number of address felds for the sze of each message (refer to fgures 3 and 8). 4.2. Comparson results The reroutng procedures of the prevous methods dscussed n sectons 2 and our CI-based method are compared wth each other over a connecton n fgure 10. In the fgure, the c-e, d, b-p-t, m-j, v-t, and CI are the abbrevatons of the connecton extenson reroutng, destnaton-based reroutng, branch-pont-traversal-based reroutng, multcast-jon-based reroutng, vrtual-tree-based 53

M Song et al reroutng, and CI-based reroutng respectvely, and the MR c-e, MR b-p-t/m-j (whch s the abbrevaton of the MR b-p-t /MR m-j ), and MR CI represent the reroutng ponts of the connecton extenson reroutng, branch-pont-traversalbased reroutng and multcast-jon-based reroutng, and CIbased reroutng respectvely. Our comparson results are as follows. Below, the reroutng methods are ndvdually dstngushed by subscrpts for each evaluaton factor, and an (evaluaton factor) /j/k/.../z s the abbrevaton of the (evaluaton factor) /(evaluaton factor) j /(evaluaton factor) k /.../(evaluaton factor) z, whch means the evaluaton factor of the reroutng method, that of the method j, that of the method k,..., and that of the method z. reroute-dstance v-t = 0, reroute-dstance CI <= reroute-dstance c-e/d/b-p-t/m-j. The dstance of the new connecton branch of the CIbased reroutng s shortest n comparson wth the other methods except the vrtual-tree-based reroutng, n whch the dstance s zero. So, we obtan the above results. route-optmalty c-e <= route-optmalty CI <= route-optmalty b-p-t/m-j. The dstance between the source MHA and the reroutng pont plus the dstance between the reroutng pont and the new MHA of the CI-based reroutng s no smaller than those of the branch-pont-traversal-based reroutng and multcast-jon-based reroutng, whch provde optmal routes, and s no larger than that of the connecton extenson reroutng. So, we obtan the above results. The route optmaltes of the destnaton-based reroutng and vrtual-tree-based reroutng cannot be compared wth those of others because the reroutng ponts of the two methods are dependent on mplementatons. deg-of-reroutng-procedure v-t = 0, deg-of-reroutng-procedure c-e/d/ci = 2, deg-of-reroutng-procedure m-j = 2or5, deg-of-reroutng-procedure b-p-t = 4. All the sequences of reroutng operatons are 1(rr- REQ) and 2(rr-RSP) n the connecton extenson reroutng, destnaton-based reroutng, and CI-based reroutng, 1(p-REQ), 2(p-RSP), 3(p-RSP), 4(rr-REQ), and 5(rr-RSP) or 4(rr-REQ) and 5(rr-RSP) n the multcast-jon-based reroutng, and 1(rr-REQ), 2(rr-REQ), 3(rr-RSP), and 4(rr- CNFM) n the branch-pont-traversal-based reroutng. The vrtual-tree-based reroutng does not have those reroutng operatons. So, we obtan the above results. sze-of-ci b-p-t/m-j/v-t = 0, sze-of-ci c-e/d = 1, 0 <= sze-of-ci CI <= k (k: record length). In the branch-pont-traversal-based reroutng, multcastjon-based reroutng, and vrtual-tree-based reroutng, no MR address s known to the destnaton MH. In the connecton extenson reroutng or destnaton-based reroutng, the destnaton endpont MR or a prefxed pont MR s known to the destnaton MH, and so the connecton nformaton szes of the two methods can be sad to be 1. In the CI-based reroutng, the record length number of MR addresses n maxmum are known to the destnaton MH. So, we obtan the above results. recordng-length b-p-t/m-j/v-t = 0, recordng-length c-e/d = 1 recordng-length CI = n (n: number of MRs on connecton). In the branch-pont-traversal-based reroutng, multcastjon-based reroutng, and vrtual-tree-based reroutng, no MR s nvolved n the connecton recordng. In the connecton extenson reroutng or destnaton-based reroutng, t can be sad that one MR s nvolved n the connecton recordng. In the CI-based reroutng, all MRs beng ncluded n a connecton are nvolved n the connecton recordng. So, we obtan the above results. reroutng-tme v-t = 0, reroutng-tme CI <= reroutng-tme c-e/d/b-p-t/m-j. The CI-based reroutng has no larger total sum of the dstances of connecton segments correspondng to the sequences of reroutng operatons than the connectonextenson reroutng, destnaton-based reroutng, branchpont-traversal-based reroutng, and multcast-jon-based reroutng. So, f we assume that the reroutng tme s manly dependent on the total sum of the dstances of the connecton segments correspondng to the sequences of reroutng operatons, we obtan the above results. sze-of-reroutng-messages v-t = 0, sze-of-reroutng-messages c-e/d/m-j = 4, sze-of-reroutng-messages b-p-t = 6, sze-of-reroutng-messages CI = 4 + reroute-dstance CI. (Referrng to fgures 3 and 8.) As shown n fgures 3 and 8, the total numbers of address felds n the reroutng (request, response, and confrmaton) messages of the connecton extenson reroutng, destnaton-based reroutng, branch-pont-traversalbased reroutng, and multcast-jon-based reroutng are 4, 4, 6, and 4 respectvely, and that of the CI-based reroutng s 4 plus the reroute dstance. The vrtual-tree-based reroutng has no reroutng messages, and so ts sze of reroutng messages s zero. So, we obtan the above results. 4.3. Detaled comparsons The prevous secton showed that the proposed method, keepng ts route optmalty moderate, has no longer a 54

Connecton reroutng based on connecton nformaton Fgure 11. Network envronment for comparson (the extended crossbar network). reroute dstance and reroutng tme than any other one whose connecton structure s the pont-to-pont. We show ths pont more clearly now. The extended crossbar network shown n fgure 11 s ntroduced for ths purpose and on the network the CI-based reroutng s compared n respect of the reroute dstance and route optmalty wth the connecton extenson reroutng and the multcast-jonbased reroutng whch have the same degree of reroutng procedure as the CI-based reroutng. The extended crossbar network provdes an envronment for smple calculaton and far comparson of reroute dstances and route optmaltes. In the network, each node except boundary nodes has eght lnks. The horzontal or vertcal lnk has the length of 1, and the slope lnk has the length of 2. Each of the eght lnks corresponds to one movng drecton of MH, and so an MH has eght movng drectons at a node. The eght movng drectons can be grouped nto fve cases for the calculaton of reroute dstances and route optmaltes. Our comparson results are as follows. Below, the connecton dstance and movng dstance are represented wth l and m respectvely. (1) Case 1: reroute-dstance c-e/ci/m-j = m. route-optmalty c-e/ci/m-j = 1. (2) Case 2: reroute-dstance c-e/ci = m. route-dstance m-j = 2 m. route-optmalty c-e/ci ={l+( 2 1)m}/(l + m). route-optmalty m-j = 1. (3) Case 3: reroute-dstance c-e/ci/m-j = m. route-optmalty c-e/ci/m-j = 1. 55

M Song et al (4) Case 4: reroute-dstance c-e/m-j = m. reroute-dstance CI = m/ 2. route-optmalty c-e ={l+(1 2)m}/(l + m). route-optmalty CI ={l+(1 2)m}/l. route-optmalty m-j = 1. (5) Case 5: reroute-dstance c-e = m. reroute-dstance CI/m-j = 0. route-optmalty c-e = (1 m)/(l + m). route-optmalty CI/m-j = l. When we assume that the probablty wth whch an MH moves n each drecton at a node s 1, we can calculate 8 the average reroute dstance and route optmalty for each reroutng method as follows. Below, the fve cases are dstngushed by superscrpts for each of the reroute dstances and route optmaltes reroute-dstance average ={1 reroute-dstance case1 +2 reroute-dstance case2 +2 reroute-dstance case3 +2 reroute-dstance case4 +1 reroute-dstance case5 }/8. route-optmalty average ={1 route-optmalty case1 +2 route-optmalty case2 +2 route-optmalty case3 +2 route-optmalty case4 +1 route-optmalty case5 }/8. The above results wth the connecton dstance (l) beng from 10 to 12 are depcted n fgure 12. The movng dstance (m) ranges from 0 to 10, excludng the 11 and 12 for convenence. We can see the followng facts from the fgure. On average, the reroute dstance of the CI-based reroutng s shorter than those of the connecton extenson reroutng and multcast-jon-based reroutng, and the route optmalty of the CI-based reroutng s between that of the connecton extenson reroutng and that of the multcastjon-based reroutng, for the movng dstances above 0, as the average case shows. Case (4) shows ths fact best. Some nterestng facts can be seen from cases (1) (3) and (5). That s, n each of the four cases, two or all three reroutng methods have the same reroute dstance and route optmalty as follows. In cases (1) and (3), all the three reroutng methods have the same reroute dstance and route optmalty. In case (2), the CI-based reroutng and the connecton extenson reroutng have the same reroute dstance and route optmalty. In case (5), the CI-based reroutng and the multcast-jon-based reroutng have the same reroute dstance and route optmalty. These nterestng facts mean that the three reroutng methods make lttle dfference n some cases. 4.4. Normalzed comparson One specal pont whch we can see from fgure 12 s that the route optmaltes of the connecton extenson reroutng and CI-based reroutng are dependent on the connecton dstance l as well as on the movng dstance m n cases (2), (4), and (5). That s, the route optmalty ncreases as l ncreases for the same m n the two reroutng methods of the three cases. Ths s because the movng dstance relatve to the connecton dstance, that s, m to l rato (m/l) decreases as l ncreases for the same m. Consderng now general envronments where l and m can have any values, ncludng 10 12, we normalze m nto m/l. When we represent the m/l wth r and assume that the r ranges from 0 to 1, we can rewrte the prevous equatons as follows. (1) Case 1: reroute-d c-e/ci/m-j = r. route-optmalty c-e/ci/m-j = 1. (2) Case 2: reroute-d c-e/ci = r. reroute-d m-j = 2r. route-optmalty c-e/ci ={l+( 2 1)m}/(l + m) ={(l + m) + ( 2 2)m}/(l + m) = 1 (2 2)m/(l + m) = 1 (2 2)r/(1 + r) route-optmalty m-j = 1. (3) Case 3: reroute-d c-e/ci/m-j = r. route-optmalty c-e/ci/m-j = 1. (4) Case 4: reroute-d c-e/m-j = r. reroute-d CI = r/ 2. route-optmalty c e ={l+(1 2)m}/(l + m) = 1 2m/(l + m) = 1 2r/(1 + r) route-optmalty CI ={l+(1 2)m}/l = 1+(1 2)r. (5) Case 5: reroute-d c-e = m. reroute-dstance CI/m-j = 0. route-optmalty c-e = (l m)/(l + m) ={(l + m) 2m}/(l + m) = 1 2r/(1 + r). route-optmalty CI/m-j = 1. The new reroute dstances and route optmaltes accordng to the normalzed movng dstance (r) are depcted n fgure 13. The graphs of the fgure can show now the reroute dstances and route optmaltes for the m over any values of l, ncludng 10 12. 56

Connecton reroutng based on connecton nformaton Fgure 12. Comparson of reroute dstances and route optmaltes wth l = 10,11, and 12. 57

M Song et al Fgure 12. (Contnued) 5. Problems and solutons The proposed method s based on the connecton nformaton. The connecton nformaton gves the generalty of applcaton to the proposed method. However, some problems are generated from the connecton nformaton and connecton recordng. In fact, the comparson results shown n the prevous secton stated that the proposed method s worst n respect to the sze of connecton nformaton and the dstance of connecton recordng among the compared ones. We now dscuss the problems due to the connecton nformaton and connecton recordng. The connecton nformaton ncreases the sze of the connecton set-up request message and of the reroutng response message, and so ncreases the network traffc. However, ths s not a serous problem when the maxmum sze of the connecton nformaton, that s, the record length, s adjusted approprately small at the connecton set-up tme, or when the connecton has a long sesson and the MH does not move so frequently, n whch case the overhead of the connecton nformaton s not of so large a rato to the total traffc of the sesson. However, the connecton nformaton may be a heavy overhead to the network when the sesson s short or the MH moves very frequently. One soluton to ths problem s to dfferentate the maxmum connecton nformaton sze accordng to the types of connecton sesson and the movng frequency of MH. One example s that the maxmum connecton nformaton sze s forced to be small when the connecton sesson s short or the movng frequency s very hgh, whle the maxmum connecton nformaton sze s allowed to be large when the connecton sesson s long and the movng frequency s not so hgh. The connecton recordng may make the connecton set-up be delayed at each of the MRs beng ncluded n the connecton. Ths problem, however, s smply resolved when the operaton of connecton set-up and that of the connecton recordng are performed n parallel n the MRs. Another soluton s that the source MHA gets all the addresses of the MRs to be ncluded n the connecton through a fast source routng technque [18] so that the source MHA can record the connecton nformaton n a connecton set-up request packet at one tme and establshng the connecton can be accelerated. 6. Consderatons for applcatons 6.1. CI acquston The ntroducton of connecton nformaton nto the connecton reroutng s a unque strategy of the CIbased reroutng. Therefore, we need to examne whether or not the connecton nformaton can be provded to the destnaton MH through a connecton set-up request message n real networks. We examne t n the mportant emergng connecton-orented moble networks based on the X.25 [19], ST2 [13], ATM [11, 20, 21], and DQDB [7, 22] network. 58

Connecton reroutng based on connecton nformaton Fgure 13. Comparson of reroute dstances and route optmaltes wth normalzed movng dstances. The X.25 connecton set-up request packet has the user data area, and the area can be used for other purposes. When we assume that the operaton code, record length, and record ponter of a CI feld requre one octet respectvely, and that the GCID s composed of the address and local connecton dentfer (LCI) of the source MH, the user data area (whch s assumed to be 128 octets) can nclude one GCID and fve MR addresses because the maxmum length of the X.25 network address NSAP (network servce access pont) s 20 octets [23], and the LCI, called VCI (vrtual crcut dentfer), requres 1.5 octet [19]. The ST2 connecton set-up packet ncludes the feld for a global connecton dentfer, called the stream dentfer (SID) feld, and the optonal route record feld. The couple of a SID and a route record corresponds to our connecton nformaton exactly, and therefore the proposed CI-based reroutng can be easly realzed n the ST2 network. In the sgnallng protocol of the ATM network, that s, n Q.2931 [24], varable length nformaton elements can be defned for specal purposes, and the connecton (call) setup request packet of the Q.2931 can nclude some varable nformaton elements. The GCID (global call ID) and TL (transt lst) nformaton elements have been proposed for the leave-ntated jon n the communcaton on the multpont-to-multpont connecton and for the source routng n P-NNI (prvate-network-to-network nterface) respectvely [25, 26]. Referrng to the two nformaton elements, we can defne the CI nformaton element for the ATM-based moble network. The CI nformaton element of the DQDB-based moble network, whose sgnallng protocol s Q.931, can be defned smlarly. 6.2. Connecton fluctuaton When a node or lnk fals n a network, the connectons traversng the lnk or the node have to be rerouted. Ths nternal connecton reroutng nvaldates the connecton nformaton about the connectons whch s mantaned n the related MHs, and so the CI-based reroutng cannot be appled to these connectons. The soluton to ths problem s as follows. Frst, we extend the CI feld so that t ncludes two addtonal subfelds, that s, the CHANGED subfeld and the address of MHA s(d) subfeld as shown n fgure 14. The CHANGED flag s for the status of a connecton, that s, t ndcates whether or not the connecton s fluctuated due to the node or lnk falure. The flag s ntalzed to 0, but s changed to 1 when the connecton s fluctuated. The subfeld of the address of MHA s(d) s for the address of a source or destnaton MHA. The address of a source or destnaton MHA s a new addton to the connecton nformaton and s used when the connecton fluctuaton occurs. Second, the rr-req message s extended and modfed somewhat. That s, the CHANGED subfeld s nserted nto the second subfeld of the rr-req message, and the address of selected MR subfeld of the message s renamed 59

M Song et al Fgure 13. (Contnued) as the address of selected MR/MHA s(d) subfeld, as shown n fgure 15. Thrd, when the connecton s fluctuated, the reroutng pont s selected by another method. In the case that a connecton s fluctuated, each endpont MR on the fluctuated part of the connecton reports the event to the source and destnaton MHs. When each MH receves the report, t changes the CHANGED flag for the connecton to 1. When such an MH has changed ts locaton, ts new MHA ssues the reroutng request message towards ts peer MHA (smlarly as n the frst type of the multcast-jonbased reroutng mentoned n secton 2.1) nstead of sendng the message to the closest MR. Fnally, the message meets one of the MRs over the connecton to be rerouted, and then the MR, whch we call the optmal MR, becomes the reroutng pont of the connecton. Fgure 16 shows a smple example for the reroutng of a fluctuated connecton, where the destnaton MH changes ts locaton and then the new destnaton MHA ssues the reroutng request message towards the source MHA. Note that the operatons for connecton recordng descrbed at the end of secton 3.2 do not need to be performed durng the reroutng request and response for a fluctuated connecton because the connecton nformaton wll no longer be used for the connecton. The second verson of the CI-based reroutng whch consders the connecton fluctuaton s descrbed below. (Handlng of the release request and response s the same as the frst verson, and so s omtted.) 60

Connecton reroutng based on connecton nformaton Fgure 13. (Contnued) Fgure 14. Extended CI feld. Fgure 15. Extended rr-req message. (1) When a connecton s establshed, ts destnaton MH s provded wth the connecton nformaton through connecton recordng. The MH ntalzes the CHANGED flag of ts CI to 0. (If the connecton s fluctuated, the CHANGED flag s changed to 1.) (2) When the destnaton MH has changed ts locaton durng a communcaton, the MH provdes ts CI to ts new MHA. (3, 4, 5) If the CHANGED flag of the CI s 1 (ths means that the connecton of the move-n MH was fluctuated), the MHA ssues the reroutng request message towards ts peer MHA, that s, the source MHA. The message meets one of the MRs on the connecton to be rerouted at last, and the MR becomes the reroutng pont of the connecton. If the CHANGED flag s 0, the new MHA selects one MR beng closest to the MHA out of the MRs ncluded n the CI for the reroutng pont, and then requests the MR to reroute the connecton by sendng the reroutng request message to the MR. (6, 7) The MR whch becomes the reroutng pont reroutes the connecton to the new MHA. If the CHANGED flag of the reroutng request message whch the MR receved s 0, the connecton recordng s performed n parallel to the reroutng so that the connecton nformaton about the new connecton branch s provded to the MH. If the flag s 1, the connecton recordng s not performed. (8) If the CHANGED flag of the CI s 0 n the MH, the MH updates the correspondng part of ts CI wth the connecton nformaton about the new branch. If the flag s 1, the MH does not need such a update acton. 6.3. Support to varous reroutng methods In the second verson of the CI-based reroutng, the closest MR s selected for the reroutng pont by default, but the optmal MR s selected for the reroutng pont when the connecton has experenced the fluctuaton. In ths secton, we call the second verson of the CI-based reroutng the extended closest pont reroutng and extend t fur- 61

M Song et al Fgure 16. Example of connecton reroutng of a fluctuated connecton. Fgure 17. Re-extenson of the CI-feld and the frst extended rr-req and rr-rsp messages. ther so that three mportant exstng reroutng methods can be ncorporated nto t. The three reroutng methods are the connecton extenson reroutng, the destnaton-based reroutng, and the multcast-jon-based reroutng wth some changes. We call them now the endpont reroutng, the prefxed pont reroutng, and the optmal pont reroutng respectvely. The thrd verson of the CI-based reroutng has four reroutng modes, each of whch corresponds to one of the extended closest pont reroutng and the above three reroutng methods beng ncorporated. The four reroutng modes are compared n table 1. The further extended structures of the CI-feld and the frst extended rr-req and rr- RSP messages are also shown n fgure 17. The re-extended structures nclude the felds for the reroutng mode. Some mportant notes to the thrd verson are as follows. Frst, the connecton recordng strateges of the endpont reroutng and the prefxed pont reroutng are left to local technques because the crcular recordng s a waste to them. Second, the address of MHA s/d subfeld s needed only for the extended closest pont reroutng and the optmal pont reroutng. Thrd, the connecton recordng at the tme of reroutng s needed only n the extended closest pont reroutng and the endpont reroutng. The procedure of the thrd verson of the CI-based reroutng s as follows. 62

1. Extended closest pont reroutng Connecton reroutng based on connecton nformaton Table 1. Comparson of reroutng modes. (n.u.: not used; u.: used; addr.(s): address(es).) Contents Intal Connecton connecton CHANGED Address of Record recordng at the Reroutng modes nformaton flag MHA s(d) length tme of reroutng 2. Optmal pont reroutng 3. Endpont reroutng 4. Pre-fxed pont reroutng not fluctuated GCID + addr. of MHA s(d) + addr.s of MRs 0 u. 1 n MRs on new branch fluctuated 1 0 no MR GCID + addr. of MHA s(d) n.u. u. 0 no MR GCID + one addr. of MR n.u. n.u. 1 endpont MR n.u. n.u. 1 no MR Fgure 18. Four approaches of data redrecton. (1) When a connecton s establshed, ts destnaton MH s provded wth the connecton nformaton through connecton recordng. The connecton recordng depends on the reroutng mode set by the source MH. If the reroutng mode s 1, the connecton nformaton s made through the crcular recordng. If the mode s 2, only the address of the source MHA s provded to the destnaton MH as the connecton nformaton. If the mode s 3 or 4, the address of the destnaton endpont MR or a prefxed pont MR s provded to the destnaton MH as the connecton nformaton by a local technque. (If the connecton s fluctuated, the CHANGED flag s changed to 1.) (2) When the destnaton MH has changed ts locaton durng a communcaton, the MH provdes ts CI to ts new MHA. (3, 4, 5) If the reroutng mode and the CHANGED flag of the CI are 1 and 0 respectvely, the new MHA selects one MR beng closest from the MHA out of the MRs ncluded n the CI for the reroutng pont, and then requests the MR to reroute the connecton by sendng the reroutng request message to the MR. If both of the reroutng mode and the CHANGED flag are 1 or f the reroutng mode s 2, the MHA ssues the reroutng request message towards the source MHA (MHA s ) on the connecton to be rerouted. The message meets one of the MRs on the connecton at last, and the MR becomes the reroutng pont. If the reroutng mode s 3 or 4, the MHA sends the reroutng request message to the destnaton endpont MR or a prefxed pont MR, whch address s the unque MR address n the CI. (6, 7) The MR whch becomes the reroutng pont reroutes the connecton to the new MHA. If the reroutng mode and the CHANGED flag of the reroutng request message whch the MR receved are 1 and 0 respectvely, the connecton recordng s performed by the crcular recordng so that the connecton nformaton about the new connecton branch s provded to the destnaton MH. If both the reroutng mode and the CHANGED flag are 1, or f the reroutng mode s 2 or 4, the connecton recordng s not performed. If the reroutng mode s 3, the connecton recordng s performed by a local technque so that the address of the new destnaton endpont MR s provded to the destnaton MH. (8) If the reroutng mode and the CHANGED flag of the CI are 1 and 0 n the MH respectvely, the MH updates the correspondng part of ts CI wth the connecton nformaton about the new branch. If the reroutng mode s 3, the address of the old destnaton endpont MR s replaced wth that of the new one n the CI. In the other cases, the MH does not need such update actons. 63

M Song et al 7. Data redrecton and connecton reroutng We now turn our dscusson to the data redrecton problem of the connecton-less moble network and relate the data redrecton problem to the connecton reroutng. The mportant dfference of the data redrecton from the connecton reroutng s that the data redrecton can be made at the MHA [1, 3 5] as well as at the MR [2], and all data addressed to a user do not have the same redrecton pont n a communcaton [3, 5]. Consderng the dfference, we classfy exstng data redrecton methods by the followng four approaches as shown n fgure 18. The four approaches can be used ndvdually or n combnaton. (1) Redrecton at MHA old. The data are redrected towards the new destnaton MHA at the old destnaton MHA (MHA old ). In ths case, the new locaton of an MH should always be known to ts MHA old. (2) Redrecton at MHA home. The data are redrected towards the new destnaton MHA at the home MHA (MHA home ). In ths case, the new locaton of an MH should always be known to ts MHA home. (In the connectonless moble network, each MH s related to a home MHA, whch mantans the nformaton about the MH, especally the current locaton of the MH.) (3) Redrecton at MHA s. The data are redrected towards the new destnaton MHA at the source MHA (MHA s ). In ths case, the new locaton of an MH should always be known to ts MHA s. (4) Redrecton at an MR on a path between MHA new and MHA home. The data are redrected towards the new destnaton MHA at an MR on a path between the new destnaton MHA (MHA new ) and the home MHA (MHA home ). In ths case, the new locaton of an MH should always be known to the MRs on a path between ts MHA new and MHA home. Out of the proposals for the connecton-less moble network servces, the Columba proposal [1], the IBM proposal [4], and the Sony proposal [2] use only approaches (1), (2), and (4) respectvely. The Matsushta proposal [3] uses approaches (1) (3) n combnaton. The IETF (Internet Engneerng Task Force) proposal [5] uses approach (2) n basc and approaches (1) and (3) optonally. In the four data redrecton approaches, when we consder the MHA as the MR, we obtan the followng nterestng results. The frst redrecton approach s smlar to the connecton extenson reroutng n that the old destnaton-endpont s the pont at whch the data addressed to the destnaton MH turns to the new locaton of the destnaton MH. The second redrecton approach s smlar to the destnaton-based reroutng n that a prefxed pont s the turnng pont. The thrd approach s smlar to the full-reestablshment reroutng method [12] n that the source-endpont s the turnng pont. The fourth approach s smlar to the second type of the multcastjon-based reroutng n that an MR on a path between the new MHA and a specfc pont (whch s an MR n the multcast-jon-based reroutng and s a home MHA n the fourth data redrecton approach) s the turnng pont. We can see from these facts that the data redrecton problem and the connecton reroutng problem can be handled consstently, although the two problems belong to dfferent types of networks. Moreover, we can extract from the above dscussons that our CI-based reroutng can be appled to the connecton-less moble network so that the closest MR may be the redrecton pont. More detal about ths wll be handled n a separate work. 8. Concluson In ths paper, we proposed a new connecton reroutng method called the CI-based reroutng, compared t wth prevous methods, and dscussed ts problems and solutons, the consderatons for applcatons, ts extensons, and ts applcablty to the connecton-less moble network. Ths method s wdely applcable to varous connecton-orented moble networks because t does not requre a specfc topology or connecton, prevents a rerouted connecton from beng largely devated from ts possble optmal route, enables fast reroutng, and can be extended easly. Our ongong work s to apply the method to the ATM-based moble network n detal, and to extend t further for the moble multcast communcaton. References [1] Ioannds J, Duchamp D and Magure G Q Jr 1991 IP-based-Protocols for Moble Internetworkng (ACM SIGCOMM 91) pp 235 45 [2] Teraoka F, Yokote Y and Tokoro M September 1991 A Network Archtecture Provdng Host Mgraton Transparency (ACM SIGCOMM 91) pp 209 20 [3] Wanda H, Yozawa T, Ohnsh T and Tanaka Y 1993 Moble Computng Envronment based on Internet Packet Forwardng USENIX pp 503 517 [4] Bhagwat P and Perkns C E 1993 A Moble Networkng System based on Internet Protocol (USENIX Assocaton Moble and Locaton-Independent Computng System) pp 69 82 [5] Moble IP Workng Group 1993 Routng Supports for IP Moble Hosts RFC Draft [6] Carlberg K 1992 A routng archtecture that supports moble end systems IEEE MILCOM 92 [7] Huang N and Ko-Shung 1994 A dstrbuted path mgraton scheme for IEEE 802.6 based personal communcaton networks IEEE J. Selected Areas Commun. 12 1415 25 [8] Leung VCM,Qan N, Malyan A D and Donaldson R W 1994 Call control and traffc transport for connecton-orented hgh speed wreless personal communcatons over metropoltan area networks IEEE J. Selected Areas Commun. 12 1376 88 [9] Nanda S, Dravada S and Samad B May 1993 Handoff management and performance for wreless access usng metropoltan area networks IEEE VTC 93 pp 839 45 [10] Polln G P, Meer-Hellstern K S and Goodman D J 1992 Handover protocols between metropoltan area networks IEEE GLOBECOM 92 pp 11 15 [11] Acampora A S and Naghshneh M 1994 An archtecture and methodology for moble-executed handoff n cellular ATM networks IEEE J. Selected Areas Commun. 12 1365 75 [12] Keeton K, Mah B A, Sehan S, Karz R H and Ferrar D 1993 Provdng connecton-orented network servces to moble hosts USENIX Symp. 93 pp 83 102 64