7 research outputs found

    Autoconfiguration, Registration and Mobility Management for Pervasive Computing

    Get PDF
    Special Issue of Pervasive Computing</p

    Media independent handovers : network selection for mobile IP nodes in heterogeneous wireless networks

    Get PDF
    Includes abstract.Includes bibliographical references (p. 79-82).In Next Generation Networks (NGN), also known as 4G, Beyond 3G, Converged, Integrated and Interworked Network, user node mobility in wireless and wired environments will seamlessly cross disparate network boundaries. The effort to offer ubiquitous computing, providing access to services anywhere and anytime, strongly encourages the ability to roam across the different existing and future networks. Literature shows investigation of concepts such as Always Best Connected (ABC) when heterogeneous networks co-exist , which will work or compete with other schemes like Home Network Default (HND), Compatibility and Network Operator Agreements (CNOA) to guide network selection or access . With the variety of available networks, the mobile node may be faced with having to decide which network to connect to. We concentrate on the network selection aspects of these envisaged mobile, overlay and integrated environment in heterogeneous networks. The standard developments by the IEEE802.21 Working group and the IETF Networking group form the base of our approach that seeks to see mobility across heterogeneous networks a reality. We propose an IEEE802.21 Media Independent Handover Function (MIHF) based network discovery and network selection, leading to a handover. The selection may be further assisted by an MIHF capable Broker Node that is Third party to the Network Providers to provide a central yet distributed database of the available networks as encountered by the Mobile Node, to cater for Nodes with no prior knowledge of networks and software repository. A Mobile Node (MN) in our solution uses 802.21 communication messages to obtain information about foreign networks encountered before selecting the networks to connect to. Our evaluation through simulations, shows that network selection in heterogeneous wireless networks environment for the appropriately equipped devices is greatly enhanced by the use of the Media Independent Handover Protocol. In scenarios where the mobile node has no prior knowledge of the encountered different network architectures, the use of a Broker node can, for an optimal number of available networks also greatly enhance the mobile node’s network selection by reducing the delay associated and the packet losses incurred

    Securing Handover in Wireless IP Networks

    Get PDF
    In wireless and mobile networks, handover is a complex process that involves multiple layers of protocol and security executions. With the growing popularity of real time communication services such as Voice of IP, a great challenge faced by handover nowadays comes from the impact of security implementations that can cause performance degradation especially for mobile devices with limited resources. Given the existing networks with heterogeneous wireless access technologies, one essential research question that needs be addressed is how to achieve a balance between security and performance during the handover. The variations of security policy and agreement among different services and network vendors make the topic challenging even more, due to the involvement of commercial and social factors. In order to understand the problems and challenges in this field, we study the properties of handover as well as state of the art security schemes to assist handover in wireless IP networks. Based on our analysis, we define a two-phase model to identify the key procedures of handover security in wireless and mobile networks. Through the model we analyze the performance impact from existing security schemes in terms of handover completion time, throughput, and Quality of Services (QoS). As our endeavor of seeking a balance between handover security and performance, we propose the local administrative domain as a security enhanced localized domain to promote the handover performance. To evaluate the performance improvement in local administrative domain, we implement the security protocols adopted by our proposal in the ns-2 simulation environment and analyze the measurement results based on our simulation test

    Seminar Mobilkommunikation SS 2001

    Get PDF
    Der vorliegende Interne Bericht enthält die Beiträge des Seminars Mobilkommunikation vom Sommersemester 2001. Die Themenauswahl kann grob in folgende vier Blöcke gegliedert werden: 1. Protokolle und Konzepte zur Mikromobilitätsunterstützung, die als Erweiterung des Makromobilitätsprotokolls Mobile IP schnelle Handover innerhalb einer Domäne als Ziel haben und den Skalierbarkeitsaspekt von Mobile IP ansprechen. Insbesondere werden die Protokolle Hierarchical Mobile IPv6 und Cellular IP behandelt. 2. IP Routingalgorithmen in mobilen ad-hoc Netzen. In einer Doppelarbeit werden diverse Unicast- und Multicast Routingalgorithmen, in einer weiteren Arbeit diverse Clusteringalgorithmen behandelt. 3. Sicherheits- und Privacy Konzepte. Eine Arbeit widmet sich der Location Privacy in der Mobilkommunikation, während sich eine weitere mit dem Aufbau einer AAA-Infrastruktur in Mobile IP-Netzen befasst. 4. IP in Mobilfunknetzen. In dieser Arbeit geht es um eine IP-basierte UMTS Systemarchitektur

    Realizing mobile multimedia systems over emerging fourth-generation wireless technologies

    Get PDF
    Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering, 2001.Includes bibliographical references (p. [161]-167) and index.by Pei-Jeng Kuo.M.Eng

    IP Mobility in Wireless Operator Networks

    Get PDF
    Wireless network access is gaining increased heterogeneity in terms of the types of IP capable access technologies. The access network heterogeneity is an outcome of incremental and evolutionary approach of building new infrastructure. The recent success of multi-radio terminals drives both building a new infrastructure and implicit deployment of heterogeneous access networks. Typically there is no economical reason to replace the existing infrastructure when building a new one. The gradual migration phase usually takes several years. IP-based mobility across different access networks may involve both horizontal and vertical handovers. Depending on the networking environment, the mobile terminal may be attached to the network through multiple access technologies. Consequently, the terminal may send and receive packets through multiple networks simultaneously. This dissertation addresses the introduction of IP Mobility paradigm into the existing mobile operator network infrastructure that have not originally been designed for multi-access and IP Mobility. We propose a model for the future wireless networking and roaming architecture that does not require revolutionary technology changes and can be deployed without unnecessary complexity. The model proposes a clear separation of operator roles: (i) access operator, (ii) service operator, and (iii) inter-connection and roaming provider. The separation allows each type of an operator to have their own development path and business models without artificial bindings with each other. We also propose minimum requirements for the new model. We present the state of the art of IP Mobility. We also present results of standardization efforts in IP-based wireless architectures. Finally, we present experimentation results of IP-level mobility in various wireless operator deployments.Erilaiset langattomat verkkoyhteydet lisääntyvät Internet-kykyisten teknologioiden muodossa. Lukuisten eri teknologioiden päällekkäinen käyttö johtuu vähitellen ja tarpeen mukaan rakennetusta verkkoinfrastruktuurista. Useita radioteknologioita (kuten WLAN, GSM ja UMTS) sisältävien päätelaitteiden (kuten älypuhelimet ja kannettavat tietokoneet) viimeaikainen kaupallinen menestys edesauttaa uuden verkkoinfrastruktuurin rakentamista, sekä mahdollisesti johtaa verkkoteknologioiden kirjon lisääntymiseen. Olemassa olevaa verkkoinfrastruktuuria ei kaupallisista syistä kannata korvata uudella teknologialla yhdellä kertaa, vaan vaiheittainen siirtymävaihe kestää tyypillisesti useita vuosia. Internet-kykyiset päätelaitteet voivat liikkua joko saman verkkoteknologian sisällä tai eri verkkoteknologioiden välillä. Verkkoympäristöstä riippuen liikkuvat päätelaitteet voivat liittyä verkkoon useiden verkkoyhteyksien kautta. Näin ollen päätelaite voi lähettää ja vastaanottaa tietoliikennepaketteja yhtäaikaisesti lukuisia verkkoja pitkin. Tämä väitöskirja käsittelee Internet-teknologioiden liikkuvuutta ja näiden teknologioiden tuomista olemassa oleviin langattomien verkko-operaattorien verkkoinfrastruktuureihin. Käsiteltäviä verkkoinfrastruktuureita ei alun perin ole suunniteltu Internet-teknologian liikkuvuuden ja monien yhtäaikaisten yhteyksien ehdoilla. Tässä työssä ehdotetaan tulevaisuuden langattomien verkkojen arkkitehtuurimallia ja ratkaisuja verkkovierailujen toteuttamiseksi. Ehdotettu arkkitehtuuri voidaan toteuttaa ilman mittavia teknologisia mullistuksia. Mallin mukaisessa ehdotuksessa verkko-operaattorin roolit jaetaan selkeästi (i) verkko-operaattoriin, (ii) palveluoperaattoriin ja (iii) yhteys- sekä verkkovierailuoperaattoriin. Roolijako mahdollistaa sen, että kukin operaattorityyppi voi kehittyä itsenäisesti, ja että teennäiset verkkoteknologiasidonnaisuudet poistuvat palveluiden tuottamisessa. Työssä esitetään myös alustava vaatimuslista ehdotetulle mallille, esimerkiksi yhteysoperaattorien laatuvaatimukset. Väitöskirja esittelee myös liikkuvien Internet-teknologioiden viimeisimmän kehityksen. Työssä näytetään lisäksi standardointituloksia Internet-kykyisissä langattomissa arkkitehtuureissa
    corecore