SlideShare a Scribd company logo
1 of 6
Download to read offline
Journal of Computer Sciences 2 (1): 01-06, 2006
ISSN 1549-3636
© 2006 Science Publications
Corresponding Author: Samuel Pierre, Department of Computer Engineering, Ecole Polytechnique of Montreal
P.O. Box 6079, Station Centre-ville, Montréal, Que., H3C 3A7, Canada
Tel.: (514) 340-4711 ext. 4685, Fax: (514) 340-5159
1
Home Agent Architecture and Algorithms for Mobility Management
in Mobile IP Networks
Marcellin Diha and Samuel Pierre
Mobile Computing and Networking Research Laboratory (LARIM)
Department of Computer Engineering, Ecole Polytechnique of Montreal, P.O. Box 6079
Station Centre-ville, Montréal, Que., H3C 3A7, Canada
Abstract: This study proposes new Home Agent architecture and algorithms for real-time mobility
management in mobile IP networks. The proposed architecture and algorithms offer a better perform-
ance based on the call-to-mobility ratio (CMR) and require less time for the location update and the
tunneling compared with the Mobile IP model. These results are very useful and interesting for a real-
time context where the factor time is very important.
Key words: Home agent architecture, call-to-mobility ratio, proposed algorithms, time factor
INTRODUCTION
The development of cellular networks brought
many changes in the telephony area. Voice and mainly
data transmission have increased a lot. The traditional
telephony made place to new types of services that
integrate both voice and data. It leads to the design and
implementation of new hybrid networks able to fulfill
this need. The mean-term goal is to have cellular net-
works entirely based on the IP protocol. But several
problems must be solved before achieving this goal.
Among these problems is the mobility management in
IP networks because originally these networks were
designed fix. In addition, the real-time aspect that is not
supported in the actual IP protocol must also be ad-
dressed.
The IETF developed a mobile version of IP proto-
col able to manage users’ mobility in IP networks[1-3]
.
Three main algorithms are proposed for mobility man-
agement: users’ registration to a local router, foreign
routers’ discovery and location update when users are
away from their home network and finally tunneling and
data routing to mobile users. The Mobile IP protocol is
implemented in several local area networks and works
well. But real-time features are not supported in the
protocol. There are two major components in mobility
management: handover management and location man-
agement[4-9]
.
Handover management is the way a network uses to
maintain connection to a mobile user as it moves and
changes its access point to the network. In general, there
are two types of handover: intra-cell handover and inter-
cell handover[4]
. The first type occurs when within a cell
a user experiences degradation of signal strength. This
leads to a choice of new channels having better signal
strength at the same Base Transceiver Station (BTS).
The second type occurs when a user moves from one
cell to another cell. In this case, the user’s connection
information is transferred from the old BTS to the new
one. In both intra-cell and inter-cell handover, the fol-
lowing procedure is performed. First, the user initiates a
handover procedure. Then the network or the mobile
(depending on the unit that controls the handover opera-
tion) provides necessary information and performs
routing operations for the handover. Finally, all subse-
quent calls to the user are transferred from the old con-
nection to the new one.
Location management is the process a net-
work uses to find t he current attachment point
of a mobile user for call delivery. The first step
of the procedure is the location registration. In this
phase, the mobile user periodically notifies the network
of its new access point. The notifications allow
the network to authenticate the user and update
its location profile. The second step is the call delivery.
When a call belonging to a user reached the network, a
search for the user’s profile is made usually in a local
database. Then the call is forwarded to the user based
on the information contained in its profile.
Mobility support in the IP protocol has been devel-
oped by the IETF leading to the Mobile IP protocol[3,10]
.
Currently two versions of Mobile IP are available,
versions 4 (IPv4) and 6 (IPv6). In this study we focus
on IPv4 since it is actually the most implemented one.
A Mobile Node (MN) is a node able to move from
one subnet to another without any need of changing its
IP address. The MN accesses the Internet via a Home
J. Computer Sci., 2 (1): 01-06, 2006
2
Agent (HA) or a Foreign Agent (FA). The Correspon-
dent Node (CN) is a node establishing a connection
with the MN. The HA is a local router on the MN’s
home network and the FA is a router on the visited
network. The following operations are introduced by
the Mobile IP protocol[2,3]
.
Discovery: How an MN finds an agent (HA or FA).
Registration: How an MN registers with its HA.
Routing and Tunneling: How an MN receives data-
grams when visiting a foreign network[11]
.
Location management operations include agent
discovery, movement detection, forming care-of-
address and location update. Handover operations in-
clude routing and tunneling. Figure 1 illustrates Mobile
IP network architecture.
Fig. 1: Mobile IP network architecture
Fig. 2: Proposed architecture of Mobile IP network
Proposed architecture: Figure 2 shows the proposed
Mobile IP network architecture. The architecture intro-
duces the following main features:
* Real-time algorithms support.
* Connection of MNs and CNs to an FA or HA with
different arrival rates in the network.
* All procedures associated with an MN (registration,
discovery, tunneling and routing) represent differ-
ent tasks with a specific priority.
* Multiprocessor agent (HA or FA). In this study the
emphasis is put on the HA. Also the Home Agent is
redundant to allow failure recovery.
* A main processor dispatching the different tasks
arriving on an agent.
* A set of faster processors is defined to process
high-priority tasks.
* Architecture allowing different speeds for the proc-
essors.
Proposed algorithms: Based on the architecture de-
scribed above, a set of new algorithms has been defined
for mobility management. These algorithms are derived
from Mobile IPv4 algorithms[3]
. They introduce the
notion of priority management in a real-time context.
The new discovery algorithm adds the ranging concept
in addition to the lifetime used in Mobile IPv4. Also it
allows the MN to initiate Foreign Agents search at
startup in stead of waiting advertisements. In addition,
this algorithm allows the MN to keep a list of the most
recent Foreign Agents that it tries to contact first before
initiating any broadcast search.
Tasks scheduling and assignment algorithm: The
task scheduling and assignment algorithm is described
in Fig. 3. The scheduling part of this algorithm is based
on the EDF algorithm[12]
while the assignment part is a
totally new concept since it based on a multiprocessor
architecture. The tasks are sorted based on the deadline
and assigned to the processors. If a task is critical (short
deadline), it is assigned to a faster processor. If not it is
assigned to a normal processor. A task is assigned to a
processor only if its current utilization rate is less
than 1. This ensures that a processor is not used at its
full capacity while others are unused.
Fig. 2: Task scheduling and assignment algorithm
Registration algorithm: The registration procedure is
a task running on the HA with the highest priority. It
can preempt any other mobility management task for a
IP Network
HA
MNn
CN1
CNn
MN
MN
FA
1
FA2
FA
n
-Given i counter of tasks and j counter of processors.
-Given n tasks TSK1, 
,TSKi, 
, TSKn with the priorities
p1, 
 pi, 
 pn.
-Given S a set of faster processors and ps threshold of a criti-
cal task.
-Given u(i) the utilization rate of the task TSKi and U(j) a
vector of u(i) on Pj.
BEGIN
-i= 1, U(j)= 0, S =1.
-Sort the n tasks based on u(i) on P0.
WHILE i ≀ n DO
j = min{k|U(k) + u(i) 1}
IF ( (pi > ps ) && ( ∃PR ∈S | U(PR) < 1)) )
THEN TSKi →PR
ELSE TSKi → Pj
i ←i + 1
END WHILE
END BEGIN
IP Network
HA
CN
MN
MN
FA
J. Computer Sci., 2 (1): 01-06, 2006
3
given user. For example, during a tunneling procedure,
if a registration request is received for the same user,
the tunneling process will be delayed until the registra-
tion is done. The different stages of the algorithm are
described as follow:
* MN sends a registration request to the HA.
* HA verifies IF a task other than the registration is
in process for the same user.
IF yes THEN the task is preempted by the registra-
tion task.
* HA sends a response to the MN.
* IF request accepted THEN registration procedure
done ELSE MN retries UNTIL request accepted.
Discovery algorithm: The discovery algorithm intro-
duces also the notion of priority in a real-time environ-
ment and it is based on the lifetime expiration and the
ranging. The discovery procedure has the second high-
est priority. The different steps are described as follow.
* IF first time startup THEN MN sends a broadcast
advertisement.
* FAs verify if no higher priority task is being exe-
cuted for the same MN.
IF yes THEN delay discovery process UNTIL
high-priority task execution is done.
* FAs send responses back to MN.
* MN chooses FA with most strong signal strength
and records the lifetime, the care-of-address and the
FA’s IP address.
* IF lifetime expires or the MN starts going out of
range (wick signal strength) THEN send registra-
tion request to Foreign Agents in the MN’s local
database.
IF no FA responds back THEN broadcast a discov-
ery advertisement message.
* REPEAT steps 2 through 4 UNTIL registration
succeed.
* IF registration succeeds THEN MN sends new
location information to HA for location update.
Routing and tunneling algorithm: The new routing
and tunneling algorithm also introduces the notion of
priority in a real-time environment. This procedure has
the lowest priority. Thus, during a tunneling procedure,
if a registration procedure is received for the same user,
the location procedure will be suspended until the regis-
tration is done. The steps of the algorithm are the fol-
lowing:
* HA receives data for an MN.
* HA verifies if a registration request is made for the
same user.
IF yes THEN HA suspends tunneling process until
registration is done.
* IF MN in local network THEN delivered packets
using normal IP packets delivery procedure ELSE
forward packets to MN via its current FA.
Performance analysis: The performance analysis is
based on the CMR (Call-to-Mobility Ratio). The CMR
is the average number of messages send to a user di-
vided by the average number of networks or subnets
visited by the user in a given time stamp. The goal of
the CMR analysis is to determine the ratio by which the
proposed model reduces the location update and the
tunneling times.
”
λ
=
CMR (1)
Where, λ is the average number of messages send
to a user and ” the average number of subnets or net-
works visited by the user between two consecutives
messages.
We define the following parameters to compare the
CMR in the Mobile IP and the proposed models:
U cost for location update procedure execution in
the Mobile IP model;
L cost for tunneling procedure execution in Mobile
IP model;
u cost for location update procedure execution in
the proposed model;
l cost for tunneling procedure execution in the
proposed model;
T cost to cross a boundary between two subnets;
UMIP total cost for the location update procedure in
Mobile IP model;
LMIP total cost for tunneling procedure execution in
Mobile IP model;
CMIP total cost for location update and tunneling pro-
cedures execution in Mobile IP model;
UPROP total cost for location update procedure in the
proposed model;
LPROP total cost for tunneling procedure execution in
the proposed model;
CPROP total cost for location update and tunneling pro-
cedures execution in the proposed model.
The total costs are obtained as follows:
CMR
U
UMIP = (2)
T
L
CMR
U
T
L
U
C MIP
MIP
MIP +
+
=
+
+
= (3)
CMR
u
UPROP = (4)
J. Computer Sci., 2 (1): 01-06, 2006
4
T
L
U
C PROP
PROP
PROP +
+
= T
l
CMR
u
+
+
= (5)
Our goal is to reduce the location update and the
tunneling times by respectively at least 50% and 25%.
Then u = U/2 and l = L/4. We make the following as-
sumptions to simplify the analysis L = U, T = U/4 = u/2
and U = 1, that leads to:
u
u
U
U
U
PROP
MIP 1
=
= (6)
u
l
L
L
L
PROP
MIP 2
=
= (7)
CMR
u
CMR
CMR
u
CMR
U
C
C
PROP
MIP
2
4
5
4
2
4
)
5
4
(
+
+
=
+
+
= (8)
Figure 4 shows the location update cost for different
values of the CMR and u = 0.2.
0
5
10
15
20
25
0 1 2
CMR
Location
update
total
cost
Proposed
MIP
Fig. 3:Comparison of location update total cost (u=0.2)
Figure 5 illustrates the location update cost for
different values of the CMR and u = 0.5.
0
5
10
15
20
25
0 1 2
CMR
Location
update
total
cost
Proposed
MIP
Fig. 5:Comparison of location update total cost (u=0.5)
Figure 6 shows the location update cost and the
ratio CMIP/CPROP for different values of the CMR for u =
0.2 and 0.5.
In Fig. 4 and 5 we noticed that the proposed model
reduces by 80% the location update time for u = 0.2 and
by 50% for u = 0.5 for small values of the CMR. The
reason is that in this case the mobile users make an
important number of location update requests and the
processing on the multiprocessor HA in the proposed
0.5
0.6
0.7
0.8
0.9
0.5 1 1.5 2
CMR
Cmip/Cprop
u = 0.5
u = 0.2
Fig. 4: Comparison of ratio CMIP/CPROP
architecture is faster compared with the mobile IP
model. When the CMR increases, the mobile users stay
longer in the same network and in this case, the location
update time decreases and is near 0 for the two models.
For the total costs (location update plus tunneling)
shown in Fig. 6, the reduction is between 67% and 80%
for u = 0.2 and between 50% and 60% for u = 0.5.
We can conclude that the proposed model offers a
better performance based on the CMR. Indeed, it takes
less time for the location update and the tunneling in the
proposed model compared with the Mobile IP model.
These results are very useful and interesting for a real-
time context where the factor time is very important. To
validate the analysis, we had conducted different simu-
lations.
COMPUTATIONAL RESULTS
Figure 7 shows the setup for the different simula-
tions. The network used is an Ethernet based LAN
10/100 Mbps with an 8-Port Ethernet Hub.
We simulated the implementation of the current
mobile IP algorithms as well as the proposed architec-
ture and algorithms in a real-time environment using
VxWorks as real-time Operating System running on a
MPPC (MotorolaTM Power PC). Our simulations focus
on the location update average time, the tunneling aver-
age time, the number of tasks missing their deadline
depending on the number and the speed of the proces-
sors on the HA.
Fig. 5: Simulation setup
J. Computer Sci., 2 (1): 01-06, 2006
5
Location update average time: In the Mobile IP
model, the location update time is constant and does not
depend on the user’s arrival rate in the network. The
location update average rate value is around 1 sec. In
the proposed model, the location update time increase
with the user’s arrival rate. The maximum value is
around 0.8 s. For small value of the arrival rate, few
users arrived in the network and are dispatched on the
processors, which in this case have a low utilization
rate. The processing is then faster per user leading to a
low location update time. But when the arrival rate
increase, many users arrived in the network and the
processing takes longer but the average time is still
lower compared with the Mobile IP model. Overall the
location update time is reduces by 20 % to 80% in the
proposed model, which is above the targeted objective
of 50%.
Figure 8 shows the location update average time for
different arrival time in the networks.
0
200
400
600
800
1000
1200
1
0
0
5
0
0
0
6
0
0
0
0
Arrival rate
Location
update
time
(ms)
MIP
Proposed
Fig. 6: Location update average time
Tunneling average time: Figure 9 illustrates the tun-
neling average time for different data sizes.
0
500
1000
1500
2000
1
0
0
0
5
0
0
0
0
2
0
0
0
0
0
4
0
0
0
0
0
6
0
0
0
0
0
8
0
0
0
0
0
1
0
0
0
0
0
0
Data size (bytes)
Tunneling
average
time
(ms)
MIP
Proposed
Fig. 7: Tunneling average time
The tunneling time is smaller in the proposed
model compare to the Mobile IP model. The data proc-
essing is faster because of the multiprocessor architec-
ture. The messages sent to the mobile users spend less
time in the message queue on the HA. In the mobile IP
model the message i + 1 will wait longer than the mes-
sage i on the message queue, increasing the processing
time. But in the proposed model the message i + 1 can
be process in parallel on a different processor while
processing the message i on an other one. As a result the
total time spent in the system is reduced. Overall the
tunneling time is reduces by 10 to 30% in the proposed
model, which is above the targeted objective of 25%.
Task scheduling and assignment: Figure 10 shows the
number of tasks missing their deadline for different
number of processors with different speeds following
Gaussian and exponential distributions.
0
10
20
30
0 2000 4000
Numebr of tasks
Missed
deadlines
Rate= mean
Rate = expo.
V = gaussian
Fig. 10: Processors with different speeds distribution
The number of tasks missing their deadline in the
Gaussian distribution is lower compare to the exponen-
tial distribution. The reason is that in the first case the
speeds of the processors are close to the mean speed. It
is the contrary in the exponential case where the distri-
bution is larger with more low speeds. This leads to a
higher ratio Execution Time/Processor Speed and num-
ber of missed deadlines. So, for configurations with
different speeds, the speeds of the processors must
follow a Gaussian distribution in order to have an opti-
mal scheduling and assignment for the tasks.
CONCLUSION
In this study we presented a Mobile IP architecture
and mobility management algorithms in a real-time
context. The implementation of the proposed architec-
ture and algorithms gave better results for the location
update and tunneling average times as well as the CMR
compare to the existing architecture and algorithms[13-
14]
. The location update time is reduced by 20 to 80%
while the tunneling time is reduced by 10 to 30%. These
results meet time constraint in real-time systems. The
multiprocessor architecture is the core of the proposed
model. It gives a faster parallel processing for the mo-
bile users.
The scheduling and assignment algorithm is opti-
mal for different number of processors with different
speeds. This achievement is something new compare to
actual real-time multiprocessor scheduling and assign-
ment algorithms. In the current algorithms, the proces-
sors must have the same speed to guarantee an optimal
scheduling and assignment.
Many investigations are on going in real-time mo-
bility management for Mobile IP networks. The areas
J. Computer Sci., 2 (1): 01-06, 2006
6
cover the implementation of real-time algorithms in real
networks as well as proposition of new algorithms and
architectures. Also, since the current protocols are de-
signed for micro-mobility, the WAN and global roam-
ing areas are some new domains of interest.
REFERENCES
1. 3GPP, 2000. Combined GSM and Mobile IP Mo-
bility Handling in UMTS IP CN. 3GPP Technical
Specification.
2. James, D.S, 1998. Mobile IP, The Internet Un-
plugged. Prentice Hall, PTR.
3. Perkins, C., 2002. IP Mobility Support for IPv4.
Internet Engineering Task Force, RFC 3220.
4. Akyildiz, I.F., J. McNair, J.S.M. Ho, H.
Uzunalioglu and W. Wang, 1999. Mobility Man-
agement in Next-Generation Wireless Systems.
Proc. IEEE., 87: 1347-1384.
5. Stallings, W., 2001. Wireless Communications and
Networks. Prentice Hall, Upper Saddle River, New
Jersey.
6. Caceres, R. and V. Padmanabhan, 1996. Fast and
scalable handoffs for wireless networks. In Proc.
ACM/IEEE MOBICOM’96, pp: 56-66.
7. Wong, V.W.S. and V.C.M. et Leung, 2000. Loca-
tion Management for Next Generation Personal
Communication Networks”, Department of Electri-
cal and Computer Engineering. The University of
British Columbia, Vancouver, Canada, Tech. Rep.
8. Stallings, W., 2001. Wireless Communications and
Networks. Prentice Hall, Upper Saddle River, New
Jersey.
9. Ho, J. and I.F. et Akyildiz, 1995. Mobile user Lo-
cation Update and Paging under Delay Constraints.
ACM/Baltzer. J. Wireless Networks, 1: 413-425.
10. Perkins, C., 1996. Minimal Encapsulation within
IP. Internet Engineering Task Force, RFC 2004.
11. Calhoun, P. and C. Perkins, 1996. IP Encapsulation
within IP. Internet Engineering Task Force, RFC
2003.
12. Chrishna, C.M. and G.S. Kang, 1997. Real-Time
Systems. McGraw Hill.
13. Schneider, J. and R. et Comroe, 2001. Motorola
Canopy TM
Access Point User’s Guide.
14. Schneider, J. and R. et Comroe, 2001. Motorola
CanopyTM
Subscriber Modem User’s Guide.
15. Gupta, V., 1998. Solaris Mobile IP: Design and
Implementation. SUN Microsystems Inc.

More Related Content

Similar to An Architecture For Mobility Management In Mobile Computing Networks

E032028030
E032028030E032028030
E032028030
inventy
 
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IPPERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
IJNSA Journal
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
IJARIIT
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
IAEME Publication
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
IAEME Publication
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
IAEME Publication
 

Similar to An Architecture For Mobility Management In Mobile Computing Networks (20)

Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
 
mipshop-5.ppt
mipshop-5.pptmipshop-5.ppt
mipshop-5.ppt
 
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
 
E032028030
E032028030E032028030
E032028030
 
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IPPERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
 
Enabling active flow manipulation in silicon-based network forwarding engines
Enabling active flow manipulation in silicon-based network forwarding enginesEnabling active flow manipulation in silicon-based network forwarding engines
Enabling active flow manipulation in silicon-based network forwarding engines
 
2004 qof is_mpls_ospf
2004 qof is_mpls_ospf2004 qof is_mpls_ospf
2004 qof is_mpls_ospf
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
LTE handover
LTE handoverLTE handover
LTE handover
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
I010525057
I010525057I010525057
I010525057
 
Nirmala
NirmalaNirmala
Nirmala
 
A Network and Position Proposal Scheme using a Link-16 based C3I System
A Network and Position Proposal Scheme using a Link-16 based C3I SystemA Network and Position Proposal Scheme using a Link-16 based C3I System
A Network and Position Proposal Scheme using a Link-16 based C3I System
 
Security Issues of Network Mobility (NEMO) with Tor Architecture
Security Issues of Network Mobility (NEMO) with Tor ArchitectureSecurity Issues of Network Mobility (NEMO) with Tor Architecture
Security Issues of Network Mobility (NEMO) with Tor Architecture
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
Marvell Network Telemetry Solutions for Data Center and Enterprise Networks
Marvell Network Telemetry Solutions for Data Center and Enterprise NetworksMarvell Network Telemetry Solutions for Data Center and Enterprise Networks
Marvell Network Telemetry Solutions for Data Center and Enterprise Networks
 
Fs3610481053
Fs3610481053Fs3610481053
Fs3610481053
 

More from Jim Jimenez

More from Jim Jimenez (20)

My School Essay Writing - College Homework Help A
My School Essay Writing - College Homework Help AMy School Essay Writing - College Homework Help A
My School Essay Writing - College Homework Help A
 
017 Difference Between Paragraph And Essay Ppt
017 Difference Between Paragraph And Essay Ppt017 Difference Between Paragraph And Essay Ppt
017 Difference Between Paragraph And Essay Ppt
 
40 Can You Use The Same Essay For Different
40 Can You Use The Same Essay For Different40 Can You Use The Same Essay For Different
40 Can You Use The Same Essay For Different
 
Printable Frog Writing Paper Curbeu Co Uk
Printable Frog Writing Paper Curbeu Co UkPrintable Frog Writing Paper Curbeu Co Uk
Printable Frog Writing Paper Curbeu Co Uk
 
013 Essay Example Historiographical Glamoro
013 Essay Example Historiographical Glamoro013 Essay Example Historiographical Glamoro
013 Essay Example Historiographical Glamoro
 
Scholarship Essay Sample About Why I Deserve The
Scholarship Essay Sample About Why I Deserve TheScholarship Essay Sample About Why I Deserve The
Scholarship Essay Sample About Why I Deserve The
 
Lined Printable A4 Paper Letter Writing Personal Us
Lined Printable A4 Paper Letter Writing Personal UsLined Printable A4 Paper Letter Writing Personal Us
Lined Printable A4 Paper Letter Writing Personal Us
 
College Pressures Essay 1 VOL.1 .Docx - Economic Se
College Pressures Essay 1 VOL.1 .Docx - Economic SeCollege Pressures Essay 1 VOL.1 .Docx - Economic Se
College Pressures Essay 1 VOL.1 .Docx - Economic Se
 
Mla Format Double Spaced Essay - Term Paper Doubl
Mla Format Double Spaced Essay - Term Paper DoublMla Format Double Spaced Essay - Term Paper Doubl
Mla Format Double Spaced Essay - Term Paper Doubl
 
012 Essay Example College Application Examples Th
012 Essay Example College Application Examples Th012 Essay Example College Application Examples Th
012 Essay Example College Application Examples Th
 
Critical Review Research Papers
Critical Review Research PapersCritical Review Research Papers
Critical Review Research Papers
 
Samples Of Dissertation Proposals. Writing A Disser
Samples Of Dissertation Proposals. Writing A DisserSamples Of Dissertation Proposals. Writing A Disser
Samples Of Dissertation Proposals. Writing A Disser
 
Sample National Junior Honor Society Essay Tel
Sample National Junior Honor Society Essay TelSample National Junior Honor Society Essay Tel
Sample National Junior Honor Society Essay Tel
 
Papers 9 Essays Research Essay Example Apa Template Microsoft Wor
Papers 9 Essays Research Essay Example Apa Template Microsoft WorPapers 9 Essays Research Essay Example Apa Template Microsoft Wor
Papers 9 Essays Research Essay Example Apa Template Microsoft Wor
 
Personalised Luxury Writing Paper By Able Labels Not
Personalised Luxury Writing Paper By Able Labels NotPersonalised Luxury Writing Paper By Able Labels Not
Personalised Luxury Writing Paper By Able Labels Not
 
Homework Help Best Topics For An Argumentative Essa
Homework Help Best Topics For An Argumentative EssaHomework Help Best Topics For An Argumentative Essa
Homework Help Best Topics For An Argumentative Essa
 
🌈 Essay Writing My Teacher. Essay On My
🌈 Essay Writing My Teacher. Essay On My🌈 Essay Writing My Teacher. Essay On My
🌈 Essay Writing My Teacher. Essay On My
 
Guide To The 2019-20 Columbia University Suppl
Guide To The 2019-20 Columbia University SupplGuide To The 2019-20 Columbia University Suppl
Guide To The 2019-20 Columbia University Suppl
 
Help Writing Papers For College - The Best Place T
Help Writing Papers For College - The Best Place THelp Writing Papers For College - The Best Place T
Help Writing Papers For College - The Best Place T
 
Essay Def. What Is An Essay The Definition And Main Features Of
Essay Def. What Is An Essay The Definition And Main Features OfEssay Def. What Is An Essay The Definition And Main Features Of
Essay Def. What Is An Essay The Definition And Main Features Of
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

An Architecture For Mobility Management In Mobile Computing Networks

  • 1. Journal of Computer Sciences 2 (1): 01-06, 2006 ISSN 1549-3636 © 2006 Science Publications Corresponding Author: Samuel Pierre, Department of Computer Engineering, Ecole Polytechnique of Montreal P.O. Box 6079, Station Centre-ville, MontrĂ©al, Que., H3C 3A7, Canada Tel.: (514) 340-4711 ext. 4685, Fax: (514) 340-5159 1 Home Agent Architecture and Algorithms for Mobility Management in Mobile IP Networks Marcellin Diha and Samuel Pierre Mobile Computing and Networking Research Laboratory (LARIM) Department of Computer Engineering, Ecole Polytechnique of Montreal, P.O. Box 6079 Station Centre-ville, MontrĂ©al, Que., H3C 3A7, Canada Abstract: This study proposes new Home Agent architecture and algorithms for real-time mobility management in mobile IP networks. The proposed architecture and algorithms offer a better perform- ance based on the call-to-mobility ratio (CMR) and require less time for the location update and the tunneling compared with the Mobile IP model. These results are very useful and interesting for a real- time context where the factor time is very important. Key words: Home agent architecture, call-to-mobility ratio, proposed algorithms, time factor INTRODUCTION The development of cellular networks brought many changes in the telephony area. Voice and mainly data transmission have increased a lot. The traditional telephony made place to new types of services that integrate both voice and data. It leads to the design and implementation of new hybrid networks able to fulfill this need. The mean-term goal is to have cellular net- works entirely based on the IP protocol. But several problems must be solved before achieving this goal. Among these problems is the mobility management in IP networks because originally these networks were designed fix. In addition, the real-time aspect that is not supported in the actual IP protocol must also be ad- dressed. The IETF developed a mobile version of IP proto- col able to manage users’ mobility in IP networks[1-3] . Three main algorithms are proposed for mobility man- agement: users’ registration to a local router, foreign routers’ discovery and location update when users are away from their home network and finally tunneling and data routing to mobile users. The Mobile IP protocol is implemented in several local area networks and works well. But real-time features are not supported in the protocol. There are two major components in mobility management: handover management and location man- agement[4-9] . Handover management is the way a network uses to maintain connection to a mobile user as it moves and changes its access point to the network. In general, there are two types of handover: intra-cell handover and inter- cell handover[4] . The first type occurs when within a cell a user experiences degradation of signal strength. This leads to a choice of new channels having better signal strength at the same Base Transceiver Station (BTS). The second type occurs when a user moves from one cell to another cell. In this case, the user’s connection information is transferred from the old BTS to the new one. In both intra-cell and inter-cell handover, the fol- lowing procedure is performed. First, the user initiates a handover procedure. Then the network or the mobile (depending on the unit that controls the handover opera- tion) provides necessary information and performs routing operations for the handover. Finally, all subse- quent calls to the user are transferred from the old con- nection to the new one. Location management is the process a net- work uses to find t he current attachment point of a mobile user for call delivery. The first step of the procedure is the location registration. In this phase, the mobile user periodically notifies the network of its new access point. The notifications allow the network to authenticate the user and update its location profile. The second step is the call delivery. When a call belonging to a user reached the network, a search for the user’s profile is made usually in a local database. Then the call is forwarded to the user based on the information contained in its profile. Mobility support in the IP protocol has been devel- oped by the IETF leading to the Mobile IP protocol[3,10] . Currently two versions of Mobile IP are available, versions 4 (IPv4) and 6 (IPv6). In this study we focus on IPv4 since it is actually the most implemented one. A Mobile Node (MN) is a node able to move from one subnet to another without any need of changing its IP address. The MN accesses the Internet via a Home
  • 2. J. Computer Sci., 2 (1): 01-06, 2006 2 Agent (HA) or a Foreign Agent (FA). The Correspon- dent Node (CN) is a node establishing a connection with the MN. The HA is a local router on the MN’s home network and the FA is a router on the visited network. The following operations are introduced by the Mobile IP protocol[2,3] . Discovery: How an MN finds an agent (HA or FA). Registration: How an MN registers with its HA. Routing and Tunneling: How an MN receives data- grams when visiting a foreign network[11] . Location management operations include agent discovery, movement detection, forming care-of- address and location update. Handover operations in- clude routing and tunneling. Figure 1 illustrates Mobile IP network architecture. Fig. 1: Mobile IP network architecture Fig. 2: Proposed architecture of Mobile IP network Proposed architecture: Figure 2 shows the proposed Mobile IP network architecture. The architecture intro- duces the following main features: * Real-time algorithms support. * Connection of MNs and CNs to an FA or HA with different arrival rates in the network. * All procedures associated with an MN (registration, discovery, tunneling and routing) represent differ- ent tasks with a specific priority. * Multiprocessor agent (HA or FA). In this study the emphasis is put on the HA. Also the Home Agent is redundant to allow failure recovery. * A main processor dispatching the different tasks arriving on an agent. * A set of faster processors is defined to process high-priority tasks. * Architecture allowing different speeds for the proc- essors. Proposed algorithms: Based on the architecture de- scribed above, a set of new algorithms has been defined for mobility management. These algorithms are derived from Mobile IPv4 algorithms[3] . They introduce the notion of priority management in a real-time context. The new discovery algorithm adds the ranging concept in addition to the lifetime used in Mobile IPv4. Also it allows the MN to initiate Foreign Agents search at startup in stead of waiting advertisements. In addition, this algorithm allows the MN to keep a list of the most recent Foreign Agents that it tries to contact first before initiating any broadcast search. Tasks scheduling and assignment algorithm: The task scheduling and assignment algorithm is described in Fig. 3. The scheduling part of this algorithm is based on the EDF algorithm[12] while the assignment part is a totally new concept since it based on a multiprocessor architecture. The tasks are sorted based on the deadline and assigned to the processors. If a task is critical (short deadline), it is assigned to a faster processor. If not it is assigned to a normal processor. A task is assigned to a processor only if its current utilization rate is less than 1. This ensures that a processor is not used at its full capacity while others are unused. Fig. 2: Task scheduling and assignment algorithm Registration algorithm: The registration procedure is a task running on the HA with the highest priority. It can preempt any other mobility management task for a IP Network HA MNn CN1 CNn MN MN FA 1 FA2 FA n -Given i counter of tasks and j counter of processors. -Given n tasks TSK1, 
,TSKi, 
, TSKn with the priorities p1, 
 pi, 
 pn. -Given S a set of faster processors and ps threshold of a criti- cal task. -Given u(i) the utilization rate of the task TSKi and U(j) a vector of u(i) on Pj. BEGIN -i= 1, U(j)= 0, S =1. -Sort the n tasks based on u(i) on P0. WHILE i ≀ n DO j = min{k|U(k) + u(i) 1} IF ( (pi > ps ) && ( ∃PR ∈S | U(PR) < 1)) ) THEN TSKi →PR ELSE TSKi → Pj i ←i + 1 END WHILE END BEGIN IP Network HA CN MN MN FA
  • 3. J. Computer Sci., 2 (1): 01-06, 2006 3 given user. For example, during a tunneling procedure, if a registration request is received for the same user, the tunneling process will be delayed until the registra- tion is done. The different stages of the algorithm are described as follow: * MN sends a registration request to the HA. * HA verifies IF a task other than the registration is in process for the same user. IF yes THEN the task is preempted by the registra- tion task. * HA sends a response to the MN. * IF request accepted THEN registration procedure done ELSE MN retries UNTIL request accepted. Discovery algorithm: The discovery algorithm intro- duces also the notion of priority in a real-time environ- ment and it is based on the lifetime expiration and the ranging. The discovery procedure has the second high- est priority. The different steps are described as follow. * IF first time startup THEN MN sends a broadcast advertisement. * FAs verify if no higher priority task is being exe- cuted for the same MN. IF yes THEN delay discovery process UNTIL high-priority task execution is done. * FAs send responses back to MN. * MN chooses FA with most strong signal strength and records the lifetime, the care-of-address and the FA’s IP address. * IF lifetime expires or the MN starts going out of range (wick signal strength) THEN send registra- tion request to Foreign Agents in the MN’s local database. IF no FA responds back THEN broadcast a discov- ery advertisement message. * REPEAT steps 2 through 4 UNTIL registration succeed. * IF registration succeeds THEN MN sends new location information to HA for location update. Routing and tunneling algorithm: The new routing and tunneling algorithm also introduces the notion of priority in a real-time environment. This procedure has the lowest priority. Thus, during a tunneling procedure, if a registration procedure is received for the same user, the location procedure will be suspended until the regis- tration is done. The steps of the algorithm are the fol- lowing: * HA receives data for an MN. * HA verifies if a registration request is made for the same user. IF yes THEN HA suspends tunneling process until registration is done. * IF MN in local network THEN delivered packets using normal IP packets delivery procedure ELSE forward packets to MN via its current FA. Performance analysis: The performance analysis is based on the CMR (Call-to-Mobility Ratio). The CMR is the average number of messages send to a user di- vided by the average number of networks or subnets visited by the user in a given time stamp. The goal of the CMR analysis is to determine the ratio by which the proposed model reduces the location update and the tunneling times. ” λ = CMR (1) Where, λ is the average number of messages send to a user and ” the average number of subnets or net- works visited by the user between two consecutives messages. We define the following parameters to compare the CMR in the Mobile IP and the proposed models: U cost for location update procedure execution in the Mobile IP model; L cost for tunneling procedure execution in Mobile IP model; u cost for location update procedure execution in the proposed model; l cost for tunneling procedure execution in the proposed model; T cost to cross a boundary between two subnets; UMIP total cost for the location update procedure in Mobile IP model; LMIP total cost for tunneling procedure execution in Mobile IP model; CMIP total cost for location update and tunneling pro- cedures execution in Mobile IP model; UPROP total cost for location update procedure in the proposed model; LPROP total cost for tunneling procedure execution in the proposed model; CPROP total cost for location update and tunneling pro- cedures execution in the proposed model. The total costs are obtained as follows: CMR U UMIP = (2) T L CMR U T L U C MIP MIP MIP + + = + + = (3) CMR u UPROP = (4)
  • 4. J. Computer Sci., 2 (1): 01-06, 2006 4 T L U C PROP PROP PROP + + = T l CMR u + + = (5) Our goal is to reduce the location update and the tunneling times by respectively at least 50% and 25%. Then u = U/2 and l = L/4. We make the following as- sumptions to simplify the analysis L = U, T = U/4 = u/2 and U = 1, that leads to: u u U U U PROP MIP 1 = = (6) u l L L L PROP MIP 2 = = (7) CMR u CMR CMR u CMR U C C PROP MIP 2 4 5 4 2 4 ) 5 4 ( + + = + + = (8) Figure 4 shows the location update cost for different values of the CMR and u = 0.2. 0 5 10 15 20 25 0 1 2 CMR Location update total cost Proposed MIP Fig. 3:Comparison of location update total cost (u=0.2) Figure 5 illustrates the location update cost for different values of the CMR and u = 0.5. 0 5 10 15 20 25 0 1 2 CMR Location update total cost Proposed MIP Fig. 5:Comparison of location update total cost (u=0.5) Figure 6 shows the location update cost and the ratio CMIP/CPROP for different values of the CMR for u = 0.2 and 0.5. In Fig. 4 and 5 we noticed that the proposed model reduces by 80% the location update time for u = 0.2 and by 50% for u = 0.5 for small values of the CMR. The reason is that in this case the mobile users make an important number of location update requests and the processing on the multiprocessor HA in the proposed 0.5 0.6 0.7 0.8 0.9 0.5 1 1.5 2 CMR Cmip/Cprop u = 0.5 u = 0.2 Fig. 4: Comparison of ratio CMIP/CPROP architecture is faster compared with the mobile IP model. When the CMR increases, the mobile users stay longer in the same network and in this case, the location update time decreases and is near 0 for the two models. For the total costs (location update plus tunneling) shown in Fig. 6, the reduction is between 67% and 80% for u = 0.2 and between 50% and 60% for u = 0.5. We can conclude that the proposed model offers a better performance based on the CMR. Indeed, it takes less time for the location update and the tunneling in the proposed model compared with the Mobile IP model. These results are very useful and interesting for a real- time context where the factor time is very important. To validate the analysis, we had conducted different simu- lations. COMPUTATIONAL RESULTS Figure 7 shows the setup for the different simula- tions. The network used is an Ethernet based LAN 10/100 Mbps with an 8-Port Ethernet Hub. We simulated the implementation of the current mobile IP algorithms as well as the proposed architec- ture and algorithms in a real-time environment using VxWorks as real-time Operating System running on a MPPC (MotorolaTM Power PC). Our simulations focus on the location update average time, the tunneling aver- age time, the number of tasks missing their deadline depending on the number and the speed of the proces- sors on the HA. Fig. 5: Simulation setup
  • 5. J. Computer Sci., 2 (1): 01-06, 2006 5 Location update average time: In the Mobile IP model, the location update time is constant and does not depend on the user’s arrival rate in the network. The location update average rate value is around 1 sec. In the proposed model, the location update time increase with the user’s arrival rate. The maximum value is around 0.8 s. For small value of the arrival rate, few users arrived in the network and are dispatched on the processors, which in this case have a low utilization rate. The processing is then faster per user leading to a low location update time. But when the arrival rate increase, many users arrived in the network and the processing takes longer but the average time is still lower compared with the Mobile IP model. Overall the location update time is reduces by 20 % to 80% in the proposed model, which is above the targeted objective of 50%. Figure 8 shows the location update average time for different arrival time in the networks. 0 200 400 600 800 1000 1200 1 0 0 5 0 0 0 6 0 0 0 0 Arrival rate Location update time (ms) MIP Proposed Fig. 6: Location update average time Tunneling average time: Figure 9 illustrates the tun- neling average time for different data sizes. 0 500 1000 1500 2000 1 0 0 0 5 0 0 0 0 2 0 0 0 0 0 4 0 0 0 0 0 6 0 0 0 0 0 8 0 0 0 0 0 1 0 0 0 0 0 0 Data size (bytes) Tunneling average time (ms) MIP Proposed Fig. 7: Tunneling average time The tunneling time is smaller in the proposed model compare to the Mobile IP model. The data proc- essing is faster because of the multiprocessor architec- ture. The messages sent to the mobile users spend less time in the message queue on the HA. In the mobile IP model the message i + 1 will wait longer than the mes- sage i on the message queue, increasing the processing time. But in the proposed model the message i + 1 can be process in parallel on a different processor while processing the message i on an other one. As a result the total time spent in the system is reduced. Overall the tunneling time is reduces by 10 to 30% in the proposed model, which is above the targeted objective of 25%. Task scheduling and assignment: Figure 10 shows the number of tasks missing their deadline for different number of processors with different speeds following Gaussian and exponential distributions. 0 10 20 30 0 2000 4000 Numebr of tasks Missed deadlines Rate= mean Rate = expo. V = gaussian Fig. 10: Processors with different speeds distribution The number of tasks missing their deadline in the Gaussian distribution is lower compare to the exponen- tial distribution. The reason is that in the first case the speeds of the processors are close to the mean speed. It is the contrary in the exponential case where the distri- bution is larger with more low speeds. This leads to a higher ratio Execution Time/Processor Speed and num- ber of missed deadlines. So, for configurations with different speeds, the speeds of the processors must follow a Gaussian distribution in order to have an opti- mal scheduling and assignment for the tasks. CONCLUSION In this study we presented a Mobile IP architecture and mobility management algorithms in a real-time context. The implementation of the proposed architec- ture and algorithms gave better results for the location update and tunneling average times as well as the CMR compare to the existing architecture and algorithms[13- 14] . The location update time is reduced by 20 to 80% while the tunneling time is reduced by 10 to 30%. These results meet time constraint in real-time systems. The multiprocessor architecture is the core of the proposed model. It gives a faster parallel processing for the mo- bile users. The scheduling and assignment algorithm is opti- mal for different number of processors with different speeds. This achievement is something new compare to actual real-time multiprocessor scheduling and assign- ment algorithms. In the current algorithms, the proces- sors must have the same speed to guarantee an optimal scheduling and assignment. Many investigations are on going in real-time mo- bility management for Mobile IP networks. The areas
  • 6. J. Computer Sci., 2 (1): 01-06, 2006 6 cover the implementation of real-time algorithms in real networks as well as proposition of new algorithms and architectures. Also, since the current protocols are de- signed for micro-mobility, the WAN and global roam- ing areas are some new domains of interest. REFERENCES 1. 3GPP, 2000. Combined GSM and Mobile IP Mo- bility Handling in UMTS IP CN. 3GPP Technical Specification. 2. James, D.S, 1998. Mobile IP, The Internet Un- plugged. Prentice Hall, PTR. 3. Perkins, C., 2002. IP Mobility Support for IPv4. Internet Engineering Task Force, RFC 3220. 4. Akyildiz, I.F., J. McNair, J.S.M. Ho, H. Uzunalioglu and W. Wang, 1999. Mobility Man- agement in Next-Generation Wireless Systems. Proc. IEEE., 87: 1347-1384. 5. Stallings, W., 2001. Wireless Communications and Networks. Prentice Hall, Upper Saddle River, New Jersey. 6. Caceres, R. and V. Padmanabhan, 1996. Fast and scalable handoffs for wireless networks. In Proc. ACM/IEEE MOBICOM’96, pp: 56-66. 7. Wong, V.W.S. and V.C.M. et Leung, 2000. Loca- tion Management for Next Generation Personal Communication Networks”, Department of Electri- cal and Computer Engineering. The University of British Columbia, Vancouver, Canada, Tech. Rep. 8. Stallings, W., 2001. Wireless Communications and Networks. Prentice Hall, Upper Saddle River, New Jersey. 9. Ho, J. and I.F. et Akyildiz, 1995. Mobile user Lo- cation Update and Paging under Delay Constraints. ACM/Baltzer. J. Wireless Networks, 1: 413-425. 10. Perkins, C., 1996. Minimal Encapsulation within IP. Internet Engineering Task Force, RFC 2004. 11. Calhoun, P. and C. Perkins, 1996. IP Encapsulation within IP. Internet Engineering Task Force, RFC 2003. 12. Chrishna, C.M. and G.S. Kang, 1997. Real-Time Systems. McGraw Hill. 13. Schneider, J. and R. et Comroe, 2001. Motorola Canopy TM Access Point User’s Guide. 14. Schneider, J. and R. et Comroe, 2001. Motorola CanopyTM Subscriber Modem User’s Guide. 15. Gupta, V., 1998. Solaris Mobile IP: Design and Implementation. SUN Microsystems Inc.