23,993 research outputs found
Mobility management in IP-Based Networks
Mobile communication networks experience a tremendous development clearly
evident from the wide variety of new applications way beyond classical
phone services. The tremendous success of the Internet along with the
demand for always-on connectivity has triggered the development of All-IP
mobile communication networks. Deploying these networks requires, however,
overcoming many challenges. One of the main challenges is how to manage the
mobility between cells connecting through an IP core in a way that
satisfies real-time requirements. This challenge is the focus of this
dissertation. This dissertation delivers an in-depth analysis of the
mobility management issue in IP-based mobile communication networks. The
advantages and disadvantages of various concepts for mobility management in
different layers of the TCP/IP protocol stack are investigated. In
addition, a classification and brief description of well-known mobility
approaches for each layer are provided. The analysis concludes that network
layer mobility management solutions seem to be best suited to satisfy the
requirements of future All-IP networks. The dissertation, therefore,
provides a comprehensive review of network layer mobility management
protocols along with a discussion of their pros and cons. Analyses of
previous work in this area show that the proposed techniques attempt to
improve the performance by making constraints either on access networks
(e.g. requiring a hierarchical topology, introducing of intermediate nodes,
etc.) or mobile terminals (e.g. undertaking many measurements, location
tracking, etc.). Therefore, a new technique is required that completes
handoffs quickly without affecting the end-to-end performance of ongoing
applications. In addition, it should place restrictions neither on access
networks nor on mobiles. To meet these requirements, a new solution named
Mobile IP Fast Authentication protocol (MIFA) is proposed. MIFA provides
seamless mobility and advances the state of the art. It utilizes the fact
that mobiles movements are limited to a small set of neighboring subnets.
Thus, contacting these neighbors and providing them in advance with
sufficient data related to the mobiles enable them to fast re-authenticate
the mobiles after the handoff. The dissertation specifies the proposal for
both IPv4 and IPv6. The specification of MIFA considers including many
error recovery mechanisms to cover the most likely failures. Security
considerations are studied carefully as well. MIFA does not make any
restrictions on the network topology. It makes use of layer 2 information
to optimize the performance and works well even if such information is not
available.In order to analyze our new proposal in comparison to a wide
range of well-known mobility management protocols, this dissertation
proposes a generic mathematical model that supports the evaluation of
figures such as average handoff latency, average number of dropped packets,
location update cost and packet delivery cost. The generic model considers
dropped control messages and takes different network topologies and
mobility scenarios into account. This dissertation also validates the
generic mathematical model by comparing its results to simulation results
as well as results of real testbeds under the same assumptions. The
validation proves that the generic model delivers an accurate evaluation of
the performance in low-loaded networks. The accuracy of the model remains
acceptable even under high loads. The validation also shows that simulation
results lie in a range of 23 %, while results of real testbeds lie in a
range of 30 % of the generic model?s results. To simplify the analysis
using the generic mathematical model, 4 new tools are developed in the
scope of this work. They automate the parameterization of mobility
protocols, network topologies and mobility scenarios. This dissertation
also evaluates the new proposal in comparison to well-known approaches
(e.g. Mobile IP, Handoff-Aware Wireless Access Internet Infrastructure
(HAWAII), etc.) by means of the generic mathematical model as well as
simulation studies modeled in the Network Simulator 2. The evaluation shows
that MIFA is a very fast protocol. It outperforms all studied protocols
with respect to the handoff latency and number of dropped packets per
handoff. MIFA is suitable for low as well as high speeds. Moreover, there
is no significant impact of the network topology on its performance. A main
advantage of MIFA is its robustness against the dropping of control
messages. It remains able to achieve seamless handoffs even if a dropping
occurs. The performance improvement is achieved, however, at the cost of
introducing new control messages mainly to distribute data concerning
mobile terminals to neighbor subnets. This results in more location update
cost than that resulting from the other mobility management protocols
studied. Due to excluding any constraints on the network topology, MIFA
generates the same packet delivery cost as Mobile IP and less than other
protocols.An additional focus of this dissertation is the development of an
adaptive eLearning environment that personalizes eLearning contents
conveying the topics of this dissertation depending on users?
characteristics. The goal is to allow researchers to quickly become
involved in research on mobility management, while learners such as
students are able to gain information on the topics without excess detail.
Analyses of existing eLearning environments show a lack of adaptivity
support. Existing environments focus mainly on adapting either the
navigation or the presentation of contents depending on one or more
selected users? characteristics. There is no environment that supports both
simultaneously. In addition, many user characteristics are disregarded
during the adaptivity process. Thus, there is a need to develop a new
adaptive eLearning environment able to eliminate these drawbacks. This
dissertation, therefore, designs a new Metadata-driven Adaptive eLearning
Environment (MAeLE). MAeLE generates personalized eLearning courses along
with building an adequate navigation at run-time. Adaptivity depends mainly
on providing contents with their describing metadata, which are stored in a
separate database, thus enabling reusing of eLearning contents. The
relation between the metadata that describe contents and those describing
learners are defined accurately, which enables a dynamic building of
personalized courses at run-time. A prototype for MAeLE is provided in this
dissertation as well
Cross-layer design of multi-hop wireless networks
MULTI -hop wireless networks are usually defined as a collection of nodes
equipped with radio transmitters, which not only have the capability to
communicate each other in a multi-hop fashion, but also to route each others’ data
packets. The distributed nature of such networks makes them suitable for a variety of
applications where there are no assumed reliable central entities, or controllers, and
may significantly improve the scalability issues of conventional single-hop wireless
networks.
This Ph.D. dissertation mainly investigates two aspects of the research issues
related to the efficient multi-hop wireless networks design, namely: (a) network
protocols and (b) network management, both in cross-layer design paradigms to
ensure the notion of service quality, such as quality of service (QoS) in wireless mesh
networks (WMNs) for backhaul applications and quality of information (QoI) in
wireless sensor networks (WSNs) for sensing tasks. Throughout the presentation of
this Ph.D. dissertation, different network settings are used as illustrative examples,
however the proposed algorithms, methodologies, protocols, and models are not
restricted in the considered networks, but rather have wide applicability.
First, this dissertation proposes a cross-layer design framework integrating
a distributed proportional-fair scheduler and a QoS routing algorithm, while using
WMNs as an illustrative example. The proposed approach has significant performance
gain compared with other network protocols. Second, this dissertation proposes
a generic admission control methodology for any packet network, wired and
wireless, by modeling the network as a black box, and using a generic mathematical
0. Abstract 3
function and Taylor expansion to capture the admission impact. Third, this dissertation
further enhances the previous designs by proposing a negotiation process,
to bridge the applications’ service quality demands and the resource management,
while using WSNs as an illustrative example. This approach allows the negotiation
among different service classes and WSN resource allocations to reach the optimal
operational status. Finally, the guarantees of the service quality are extended to
the environment of multiple, disconnected, mobile subnetworks, where the question
of how to maintain communications using dynamically controlled, unmanned data
ferries is investigated
A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks
The performance of Mobile Ad hoc networks (MANET) depends on the cooperation
of all active nodes. However, supporting a MANET is a cost-intensive activity
for a mobile node. From a single mobile node perspective, the detection of
routes as well as forwarding packets consume local CPU time, memory,
network-bandwidth, and last but not least energy. We believe that this is one
of the main factors that strongly motivate a mobile node to deny packet
forwarding for others, while at the same time use their services to deliver its
own data. This behavior of an independent mobile node is commonly known as
misbehaving or selfishness. A vast amount of research has already been done for
minimizing malicious behavior of mobile nodes. However, most of them focused on
the methods/techniques/algorithms to remove such nodes from the MANET. We
believe that the frequent elimination of such miss-behaving nodes never allowed
a free and faster growth of MANET. This paper provides a critical analysis of
the recent research wok and its impact on the overall performance of a MANET.
In this paper, we clarify some of the misconceptions in the understating of
selfishness and miss-behavior of nodes. Moreover, we propose a mathematical
model that based on the time division technique to minimize the malicious
behavior of mobile nodes by avoiding unnecessary elimination of bad nodes. Our
proposed approach not only improves the resource sharing but also creates a
consistent trust and cooperation (CTC) environment among the mobile nodes. The
simulation results demonstrate the success of the proposed approach that
significantly minimizes the malicious nodes and consequently maximizes the
overall throughput of MANET than other well known schemes.Comment: 10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.42
Mobile Networking
We point out the different performance problems that need to be addressed when considering mobility in IP networks. We also define the reference architecture and present a framework to classify the different solutions for mobility management in IP networks. The performance of the major candidate micro-mobility solutions is evaluated for both real-time (UDP) and data (TCP) traffic through simulation and by means of an analytical model. Using these models we compare the performance of different mobility management schemes for different data and real-time services and the network resources that are needed for it. We point out the problems of TCP in wireless environments and review some proposed enhancements to TCP that aim at improving TCP performance. We make a detailed study of how some of micro-mobility protocols namely Cellular IP, Hawaii and Hierarchical Mobile IP affect the behavior of TCP and their interaction with the MAC layer. We investigate the impact of handoffs on TCP by means of simulation traces that show the evolution of segments and acknowledgments during handoffs.Publicad
- …