329 research outputs found
Mobile IP: state of the art report
Due to roaming, a mobile device may change its network attachment each time it moves to a new link. This might cause a disruption for the Internet data packets that have to reach the mobile node. Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working group, that is able to inform the network about this change in network attachment such that the Internet data packets will be delivered in a seamless way to the new point of attachment. This document presents current developments and research activities in the Mobile IP area
Mobility management across converged IP-based heterogeneous access networks
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 8/2/2010.In order to satisfy customer demand for a high performance âglobalâ mobility service, network operators (ISPs, carriers, mobile operators, etc.) are facing the need to evolve to a converged âall-IPâ centric heterogeneous access infrastructure. However, the integration of such heterogeneous access networks (e.g. 802.11, 802.16e, UMTS etc) brings major mobility issues. This thesis tackles issues plaguing existing mobility management solutions in converged IP-based heterogeneous networks. In order to do so, the thesis firstly proposes a cross-layer mechanism using the upcoming IEEE802.21 MIH services to make intelligent and optimized handovers. In this respect, FMIPv6 is integrated with the IEEE802.21 mechanism to provide seamless mobility during the overall handover process. The proposed solution is then applied in a simulated vehicular environment to optimize the NEMO handover process. It is shown through analysis and simulations of the signalling process that the overall expected handover (both L2 and L3) latency in FMIPv6 can be reduced by the proposed mechanism by 69%. Secondly, it is expected that the operator of a Next Generation Network will provide mobility as a service that will generate significant revenues. As a result, dynamic service bootstrapping and authorization mechanisms must be in place to efficiently deploy a mobility service (without static provisioning), which will allow only legitimate users to access the service. A GNU Linux based test-bed has been implemented to demonstrate this. The experiments presented show the handover performance of the secured FMIPv6 over the implemented test-bed compared to plain FMIPv6 and MIPv6 by providing quantitative measurements and results on the quality of experience perceived by the users of IPv6 multimedia applications. The results show the inclusion of the additional signalling of the proposed architecture for the purpose of authorization and bootstrapping (i.e. key distribution using HOKEY) has no adverse effect on the overall handover process. Also, using a formal security analysis tool, it is shown that the proposed mechanism is safe/secure from the induced security threats. Lastly, a novel IEEE802.21 assisted EAP based re-authentication scheme over a service authorization and bootstrapping framework is presented. AAA based authentication mechanisms like EAP incur signalling overheads due to large RTTs. As a result, overall handover latency also increases. Therefore, a fast re-authentication scheme is presented which utilizes IEEE802.21 MIH services to minimize the EAP authentication process delays and as a result reduce the overall handover latency. Analysis of the signalling process based on analytical results shows that the overall handover latency for mobility protocols will be approximately reduced by 70% by the proposed scheme
A network-based coordination design for seamless handover between heterogeneous wireless networks
Includes bibliographical references (leaves 136-144).The rapid growth of mobile and wireless communication over the last few years has spawned many different wireless networks. These heterogeneous wireless networks are envisioned to interwork over an IP-based infrastructure to realize ubiquitous network service provisioning for mobile users. Moreover, the availability of multiple-interface mobile nodes (MNs) will make it possible to communicate through any of these wireless access networks. This wireless network heterogeneity combined with the availability of multiple-interface MNs creates an environment where handovers between the different wireless access technologies become topical during mobility events. Therefore, operators with multiple interworking heterogeneous wireless networks will need to facilitate seamless vertical handovers among their multiple systems. Seamless vertical handovers ensure ubiquitous continuity to active connections hence satisfy the quality of experience of the mobile users
Recommended from our members
Controlling the handover mechanism in wireless mobile nodes using game theory
This paper proposes a novel network selection mechanism as an extension
to the FMIPv6 [2] protocol, which improves handover latency in the MIPv6 [1] in
the case where the Mobile Nodes (MN) have a single wireless interface with multiple
Care-of-Addresses (CoAâs). Moreover, this paper proposes a novel interface/network
selection mechanism, which is an extension to the MFMIPv6 [5], which work when
the mobile node has more than one wireless interface. Generally, the previous access
router (PAR) in the FMIPv6 protocol forwards all the arrived packets to the new
access router (NAR) by setting up a tunnel to it in order to prevent packet losses
incurred by latency during handover procedure. However, there is no protocol which
offers the user and/or the application to dynamically choose the right NAR (i.e. the
one offers a better service). Whatâs more, one of the main objectives of the next
generation networks will be heterogeneity in the wireless access environment in
which a mobile terminal will be able to connect to multiple radio networks
simultaneously. For these reasons, network selection and efficient load balancing
mechanisms among different networks will be required to achieve high-speed
connectivity with seamless mobility. To this end; Game Theory [3], naturally
becomes a useful and powerful tool to research this kind of problems. Game theory
is a mathematical tool developed to understand competitive situations in which
rational decision makers interact to achieve their objectives. The mechanism
improves the handover latency, the user ability to choose the right interface/network
and controls when to force the MN to make the handover
A survey on subjecting electronic product code and non-ID objects to IP identification
Over the last decade, both research on the Internet of Things (IoT) and
real-world IoT applications have grown exponentially. The IoT provides us with
smarter cities, intelligent homes, and generally more comfortable lives.
However, the introduction of these devices has led to several new challenges
that must be addressed. One of the critical challenges facing interacting with
IoT devices is to address billions of devices (things) around the world,
including computers, tablets, smartphones, wearable devices, sensors, and
embedded computers, and so on. This article provides a survey on subjecting
Electronic Product Code and non-ID objects to IP identification for IoT
devices, including their advantages and disadvantages thereof. Different
metrics are here proposed and used for evaluating these methods. In particular,
the main methods are evaluated in terms of their: (i) computational overhead,
(ii) scalability, (iii) adaptability, (iv) implementation cost, and (v) whether
applicable to already ID-based objects and presented in tabular format.
Finally, the article proves that this field of research will still be ongoing,
but any new technique must favorably offer the mentioned five evaluative
parameters.Comment: 112 references, 8 figures, 6 tables, Journal of Engineering Reports,
Wiley, 2020 (Open Access
The MobyDick Project: A Mobile Heterogeneous All-IP Architecture
Proceedings of Advanced Technologies, Applications and Market Strategies for 3G (ATAMS 2001). Cracow, Poland: 17-20 June, 2001.This paper presents the current stage of an IP-based architecture for heterogeneous environments, covering UMTS-like W-CDMA wireless access technology, wireless and wired LANs, that is being developed under the aegis of the IST Moby Dick project. This architecture treats all transmission capabilities as basic physical and data-link layers, and attempts to replace all higher-level tasks by IP-based strategies.
The proposed architecture incorporates aspects of mobile-IPv6, fast handover, AAA-control, and Quality of Service. The architecture allows for an optimised control on the radio link layer resources. The Moby dick architecture is currently under refinement for implementation on field trials. The services planned for trials are data transfer and voice-over-IP.Publicad
A Survey on Proxy Mobile IPv6 Handover
[EN] As wireless technologies have been improving in recent years, a mobility management mechanism is required to provide seamless and ubiquitous mobility for end users who are roaming among points of attachment in wireless networks. Thus, Mobile IPv6 was developed by the Internet Engineering Task Force (IETF) to support the mobility service. However, Mobile IPv6 is unable to fulfill the requirements of real-time applications, such as video streaming service and voice over IP service, due to its high handover (HO) latency. To address this problem, Proxy Mobile IPv6 (PMIPv6) has been introduced by the IETF. In PMIPv6, which is a network-based approach, the serving network controls mobility management on behalf of the mobile node (MN). Thus, the MN is not required to participate in any mobility-related signaling. However, the PMIPv6 still suffers from lengthy HO latency and packet loss during a HO. This paper explores an elaborated survey on the HO procedure of PMIPv6 protocols and proposed approaches accompanied by a discussion about their points of weakness.This work was supported in part by the University of Malaya under UMRG Grant (RG080/11ICT).Modares, H.; Moravejosharieh, A.; Lloret, J.; Salleh, R. (2016). A Survey on Proxy Mobile IPv6 Handover. IEEE Systems Journal. 10(1):208-217. https://doi.org/10.1109/JSYST.2013.2297705S20821710
- âŚ