SlideShare a Scribd company logo
1 of 47
Download to read offline
http://siti.ulusofona.pt
Andréa Nascimento, Rute C. Sofia
andrea.nascimento@ulusofona.pt
SITI/ULHT
19th
Oct 2011
MEISI Seminary
New approaches to mobility management in multi-
access networks
http://siti.ulusofona.pt 2
Agenda
What is global mobility?
Mobility management notions
Mobility management approaches of today
User-centric mobility management
Decentralizing mobility management
Conclusions
Name, e-mail
http://siti.ulusofona.pt 3
What is global mobility?
http://siti.ulusofona.pt 4
What is global mobility?
Today...
• we have widespread wireless networks, with different access
technologies
–heterogeneous networks, different network architectures
and protocols
• end users have highly nomadic lifestyle
• end users usually hold a cellular and a fixed access
subscription
• increasing demand for different services (from low-data-rate
non-real time to high-speed real-time applications)
• increasing variety of user-friendly and multimedia-enabled
terminals
http://siti.ulusofona.pt 5
Global perspective today
Session breaks;
re-registration required;
nomadism but NO session continuity
http://siti.ulusofona.pt 6
Global perspective tomorrow
No visible interruption;
no re-registration required;
nomadism and session continuity provided
http://siti.ulusofona.pt 7
Use-case 1: Hotspots/3G
A user may prefer to use a Wi-Fi connection when available
The system could choose which network is better when more
than one is available, based on user's preferences
The change of point of attachment should not require a re-
registration
Name, e-mail
http://siti.ulusofona.pt 8
Mobility management notions
http://siti.ulusofona.pt 9
Nomadism
• The same service look & feel delivered independently of user
location or terminal
• Change of attachment point requires service re-activation
• Sessions (e.g., TCP) have to be re-initiated
• Requires global form of addressing (identification)
and global AAA
• Example: 3G global roaming
Session continuity
• Sessions are seamessly diverted (handed over) from an old
identifier to a new
• Change of attachment point does not disrupt active sessions
• Examples: L2 mobility support (micro-mobility); Mobile IP
Main concepts
http://siti.ulusofona.pt 10
Location management:
• Locate a mobile user’s point of attachment for delivering
data packets
Handover management:
• Maintain a mobile user’s connection as it continues to
change its point of attachment
Main elements involved: Mobile Node (MN), Correspondent
Node (CN), Mobility Anchor Point (MAP)
Binding: notion of known-address and real address, and the
association between them
Main tasks
http://siti.ulusofona.pt 11
Fast handover
Seamless handover
Low signaling traffic overhead
Routing efficiency
Quality of service
Fast security
Minimal special support required
Main requirements
Name, e-mail
http://siti.ulusofona.pt 12
Mobility management approaches of today
http://siti.ulusofona.pt 13
MM approaches of today
http://siti.ulusofona.pt 14
Network layer – Mobile IP
Home Agent (HA):
• Mobile IP aware router in the home network
• Mobility anchor point
• Control plane: signalling, registration, data redirection
• Data plane: routing
Mobile node (MN):
• MIPv6/v4 client
• If MIPv6, integrated in the IPv6 stack – not an additional
package!
Correspondent node (CN):
• Third-party with whom MN communicates
http://siti.ulusofona.pt 15
Mobile IPv4 (RFC 3344)
Agent discovery process: the MN determines if it is in the
home network.
Registration process: the MN tells its Home Agent it is away
and its current IP address (Care-of address) via Foreign
Agent.
Forwarding process:
the Home Agent
encapsulates all the
incoming packets
and sends them to
the MN's Foreign
Agent.
http://siti.ulusofona.pt 16
Mobile IPv6 (RFC 3775)
Binding Update (BU): association HoA - CoA
HA Registration: MN sends a BU to its HA
CN Registration: MN sends a BU to its CNs
Communication between MN and CN:
• Bidirectional tunneling
(through the HA): it uses
IP encapsulation
• Route optimization
(direct communication):
it uses Routing Header
type 2 extension.
http://siti.ulusofona.pt 17
MIPv6 – Advantages/Disadvantages
Advantages:
• Address auto-configuration: no need for a Foreign Agent
• Route optimization: binding updates (BUs) to CNs; avoid
triangle routing
• Routing header extension: less overhead than IP
encapsulation
• Ingress filter bypass: Home Address option
Disadvantages:
• Handoff latency: HA Registration and CN Registration
• Service disruption during handover
• Correspondent node Mobile IP aware
http://siti.ulusofona.pt 18
FMIPv6 (RFC5568):
It creates a tunnel between the old
and the new points of
attachment.
MIPv6 – Extensions
HMIPv6 (RFC5380):
It creates a hierarchy of home
agents.
http://siti.ulusofona.pt 19
MIPv6 – Extensions
PMIPv6 (RFC5213):
It performs mobility management for IPv6 nodes not aware of MIPv6.
http://siti.ulusofona.pt 20
Issues in Mobility Management
Handover latency does not provide QoS required for real-time
applications
Host-based methods require protocol stack modification in
the mobile node (it increases the complexity, waste of
resources)
Network-based protocol needs more study and
standardization
A novel approach is needed to be integrated into both L2 and
L3 handover procedure
Name, e-mail
http://siti.ulusofona.pt 21
User-centric Mobility Management
http://siti.ulusofona.pt 22
SITI Project
Partners: SITI (ULHT) and IT (University of Aveiro)
Sponsored by FCT
Duration of the project: May 2010 to April 2013
http://siti.ulusofona.pt/~umm
http://siti.ulusofona.pt 23
Last-hop towards the end user
Dynamic and spontaneous wireless environments
User owns and often carries devices that can be part of the
network
No clear splitting between network elements and end-devices
Human movement patterns are based on individual users
routines and movement target-interests.
Human behaviour may exhibit high variability (impacts the
network)
User-centric environments
http://siti.ulusofona.pt 24
User-centric environments
http://siti.ulusofona.pt 25
Provide a new mobility management architecture more
suitable for user-centric environments
De-construct current mobility management based on
centralized and static mobility anchoring
Provide nomadic end-user experience
Provide session continuity
Main aspects:
• Handover optimization
• User-centric approach
Main aspects
http://siti.ulusofona.pt 26
Analyze and validate adequate cost functions and metrics to
estimate QoE levels on-the-fly
Intelligent selection of mobility anchor points:
•The best connection
•Users expectations
•Seamlessly, anytime, anywhere
•Characteristics (technology, interfaces, services)
•Environment (mobility behavior, social patterns, resources)
Handover optimization
http://siti.ulusofona.pt 27
Identify basic mobility functionalities on current standards
Decoupling of functionalities in different management
elements (mobility anchor points)
Evaluate the better location to place mobility management
elements (server, router, end device)
Management functionalities placed closer to the end-user
Optimize the distribution of mobility anchor points
Specify the mobility control mechanism required for
communication between the different entities
User-centric approach
http://siti.ulusofona.pt 28
Study of main standardized mobility management schemes
Study of user's behaviour in main user-centric scenarios:
Hotspot, MANETs, WMNs, UPNs, DTNs.
Identification of functional blocks
Categorization of functional blocks
Output: Deliverable 1 – UMM Use-cases
• Available on the website: http://siti.ulusofona.pt/~umm
• Section “Documents”
MM Characterization
http://siti.ulusofona.pt 29
Device Identification:
• MN's identification in the network
Identification database control:
• mechanism related to the recording of association between
known-address and real-address
Binding mechanism (registration/update):
• signaling to create/update a record (binding) in the
identification control
Routing/forwarding:
• process of intercepting packets destined to a known-
address, encapsulating and forwarding to real-address
Functional blocks
http://siti.ulusofona.pt 30
Handover negotiation
• process taken when the device has its real-address changed, in order
to guarantee that the user will keep active all its sessions during the
handoff process
Resource management:
• procedures to guarantee the quality of the connection when the MN
changes its point of attachment to the network
Mobility estimation:
• prediction of MN's movement, in order to prevent connection breaks
Security/privacy:
• security mechanisms to assure the integrity of the elements and
signaling of the mobility management system
Functional blocks
http://siti.ulusofona.pt 31
Functional blocks - Scheme
Name, e-mail
http://siti.ulusofona.pt 32
Decentralizing mobility management
http://siti.ulusofona.pt 33
Approach 1: Control and data plane
• Control - signaling
• Data - data traffic, routing, forwarding and address
translation
Approach 2: Location and Handover management
• Location - locate devices, call delivery
• Handover - maintaining active sessions while MN is roaming
Decoupling functionalities
http://siti.ulusofona.pt 34
Decoupling functionalities
http://siti.ulusofona.pt 35
Data
Control
Located in the Home Agent
Functionalities:

Binding mechanism (registration and update)

ID database control

Handover negotiation

Security

Device identification

Routing/forwarding
Approach 1: Control and data planes - MIPv6
http://siti.ulusofona.pt 36
One approach: Siemens patent
Siemens – 2008
Idea: take the control functions off the home network and put
them into the premisses of a MSP (Mobility Service Provider)
Compatible with MIPv6 and MIPv4
Home Agent splitted into two elements:
• HA-Control plane (HA-C)
• HA-Data plane (HA-D)
Describes the communication between HA-C and HA-D
Approach 1: Patent Siemens
http://siti.ulusofona.pt 37
One approach: Siemens patent
Approach 1: Patent Siemens
HA-C: placed into the MSP premisses
Functionalities:
• MN registration
• Secure communication to MN
• Secure communication to HA-D
• Keep the mapping between HoAs and CoAs
• Decide which HA-D the MN should use
http://siti.ulusofona.pt 38
One approach: Siemens patent
Approach 1: Patent Siemens
HA-D: placed into the access router in the home network
Functionalities:
• Secure communication to HA-C
• Establishing a IP-in-IP tunnelling to the MN CoA
• Forwarding the packets to the MN CoA
http://siti.ulusofona.pt 39
One approach: Siemens patent
Approach 1: Patent Siemens
http://siti.ulusofona.pt 40
One approach: Siemens patent
Approach 1: Patent Siemens
Advantages:
• There is no restriction into where to place the HA control
plane functionality
• Increased scalability
• Simpler processing on MIP-enable routers
Disadvantages:
• MN depends on the service provider (MSP) to offer the
mobility management service
• The overhead on the network for the signaling between
HA-C and HA-D is unknown
• The overhead on the time spent for the communication
between HA-C and HA-D is unknown
http://siti.ulusofona.pt 41
Why is this interesting?
Approach 1: Why splitting?
Splitting functionalities gives us the flexibility to choose
where to place each block of functionality
Splitting functionalities may divide the charge of work of the
involved elements
It is interesting to think about a decentralized approach
If it is possible to separate the mobility management into
control and data planes functionality blocks, maybe it is
possible to separate into other functionality blocks (for
instance, location and handover management)
http://siti.ulusofona.pt 42
Status of the project
Implementation of control/data splitting on NS-2
Definition of scenarios
1 poster published on international event
2 scientific papers published on international events
Next steps:
• Location/Handover management splitting
• Other functionality splitting approach, based on simulation
results
• Define positioning of splitted elements
Name, e-mail
http://siti.ulusofona.pt 43
Summary and conclusions
http://siti.ulusofona.pt 44
Next generation wireless networks are focus of intense
research
User-centric environments are the part of the network where
the end user is located and deserve more attention
User-centric MM approach can make the system less
dependent on the access/service provider networks
Identified blocks represent basic functionalities to offer all the
specified requirements
There is no one approach that implements all functional
blocks
Conclusions
http://siti.ulusofona.pt 45
Handover optimization
• Influencing handover decision
• New metrics
• Consider user policies
Mobility patterns & models
• Mobility patterns influence architecture requirements
• Adequate support for de-centralized control requires a
better analysis of potential mobility patterns
Future research topics
http://siti.ulusofona.pt 46
Which OSI Layer(s) are best suited to support mobility
convergence?
Multi-access handover issues
• Resource management
• Dealing with simultaneous movement
• AAA, single sign-on
Future research topics
http://siti.ulusofona.pt 47
Thanks!
andrea.nascimento@ulusofona.pt

More Related Content

Similar to New approaches to mobility management in multi-access networks

Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6Governments ENabled with IPv6
 
Mobile Networks as Secure and Reliable Communication Platform for Smart Home
Mobile Networks as Secure and Reliable Communication Platform for Smart HomeMobile Networks as Secure and Reliable Communication Platform for Smart Home
Mobile Networks as Secure and Reliable Communication Platform for Smart HomeAllSeen Alliance
 
Onubha brochure
Onubha brochureOnubha brochure
Onubha brochureOlsen Song
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...Rick G. Garibay
 
Smart Work Zones – New ways of communicating with road users and managing wor...
Smart Work Zones – New ways of communicating with road users and managing wor...Smart Work Zones – New ways of communicating with road users and managing wor...
Smart Work Zones – New ways of communicating with road users and managing wor...JumpingJaq
 
Extending WebDriver: A cloud approach
Extending WebDriver: A cloud approachExtending WebDriver: A cloud approach
Extending WebDriver: A cloud approachBoni García
 
Introducing the Open Edge Module
Introducing the Open Edge ModuleIntroducing the Open Edge Module
Introducing the Open Edge ModuleIvan Zoratti
 
Advancing the JISC Access & Identity Management Programme
Advancing the JISC Access & Identity Management ProgrammeAdvancing the JISC Access & Identity Management Programme
Advancing the JISC Access & Identity Management ProgrammeJISC Netskills
 
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOTConnectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOTSolace
 
Next Generation Networks for Contactless and Mobile Ticketing
Next Generation Networks for Contactless and Mobile TicketingNext Generation Networks for Contactless and Mobile Ticketing
Next Generation Networks for Contactless and Mobile TicketingFujitsu Network Communications
 
Evolving Architectures for Small Cells in the Enterprise
Evolving Architectures for Small Cells in the EnterpriseEvolving Architectures for Small Cells in the Enterprise
Evolving Architectures for Small Cells in the EnterpriseAndy Odgers
 
Seminario IoT - Internet of Things
Seminario IoT - Internet of ThingsSeminario IoT - Internet of Things
Seminario IoT - Internet of ThingsLuiz Oliveira
 
WINS: Peering and IXPs
WINS: Peering and IXPsWINS: Peering and IXPs
WINS: Peering and IXPsAPNIC
 
Location based information sharing system for mobile devices
Location based information sharing system for mobile devicesLocation based information sharing system for mobile devices
Location based information sharing system for mobile deviceseSAT Journals
 

Similar to New approaches to mobility management in multi-access networks (20)

Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
 
4 w mobility-wpmc2008-final
4 w mobility-wpmc2008-final4 w mobility-wpmc2008-final
4 w mobility-wpmc2008-final
 
Mobile Networks as Secure and Reliable Communication Platform for Smart Home
Mobile Networks as Secure and Reliable Communication Platform for Smart HomeMobile Networks as Secure and Reliable Communication Platform for Smart Home
Mobile Networks as Secure and Reliable Communication Platform for Smart Home
 
Onubha brochure
Onubha brochureOnubha brochure
Onubha brochure
 
V2X, V2I, and the Cellular Infrastructure
V2X, V2I, and the Cellular InfrastructureV2X, V2I, and the Cellular Infrastructure
V2X, V2I, and the Cellular Infrastructure
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 
Smart Work Zones – New ways of communicating with road users and managing wor...
Smart Work Zones – New ways of communicating with road users and managing wor...Smart Work Zones – New ways of communicating with road users and managing wor...
Smart Work Zones – New ways of communicating with road users and managing wor...
 
Extending WebDriver: A cloud approach
Extending WebDriver: A cloud approachExtending WebDriver: A cloud approach
Extending WebDriver: A cloud approach
 
Introducing the Open Edge Module
Introducing the Open Edge ModuleIntroducing the Open Edge Module
Introducing the Open Edge Module
 
Advancing the JISC Access & Identity Management Programme
Advancing the JISC Access & Identity Management ProgrammeAdvancing the JISC Access & Identity Management Programme
Advancing the JISC Access & Identity Management Programme
 
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOTConnectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
 
Next Generation Networks for Contactless and Mobile Ticketing
Next Generation Networks for Contactless and Mobile TicketingNext Generation Networks for Contactless and Mobile Ticketing
Next Generation Networks for Contactless and Mobile Ticketing
 
Evolving Architectures for Small Cells in the Enterprise
Evolving Architectures for Small Cells in the EnterpriseEvolving Architectures for Small Cells in the Enterprise
Evolving Architectures for Small Cells in the Enterprise
 
JISC's AIM programme
JISC's AIM programmeJISC's AIM programme
JISC's AIM programme
 
Mobile computing
Mobile computing Mobile computing
Mobile computing
 
Seminario IoT - Internet of Things
Seminario IoT - Internet of ThingsSeminario IoT - Internet of Things
Seminario IoT - Internet of Things
 
WINS: Peering and IXPs
WINS: Peering and IXPsWINS: Peering and IXPs
WINS: Peering and IXPs
 
LTE Architecture.pdf
LTE  Architecture.pdfLTE  Architecture.pdf
LTE Architecture.pdf
 
Location based information sharing system for mobile devices
Location based information sharing system for mobile devicesLocation based information sharing system for mobile devices
Location based information sharing system for mobile devices
 

More from Rute C. Sofia

Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...Rute C. Sofia
 
Piloto IPv6 - FCCN (1999)
Piloto IPv6 - FCCN (1999)Piloto IPv6 - FCCN (1999)
Piloto IPv6 - FCCN (1999)Rute C. Sofia
 
Estudo do Protocolo ISAKMP/OAkley como Norma de Gestão de Chaves da Arquitect...
Estudo do Protocolo ISAKMP/OAkley como Norma de Gestão de Chaves da Arquitect...Estudo do Protocolo ISAKMP/OAkley como Norma de Gestão de Chaves da Arquitect...
Estudo do Protocolo ISAKMP/OAkley como Norma de Gestão de Chaves da Arquitect...Rute C. Sofia
 
SICAP, a Shared-segment Inter-domain Control Aggregation Protocol (portuguese)
SICAP, a Shared-segment Inter-domain Control Aggregation Protocol (portuguese)SICAP, a Shared-segment Inter-domain Control Aggregation Protocol (portuguese)
SICAP, a Shared-segment Inter-domain Control Aggregation Protocol (portuguese)Rute C. Sofia
 
Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)Rute C. Sofia
 
a SICAP: Shared-Segment based Inter-domain Control Aggregation Protocol.
a SICAP: Shared-Segment based Inter-domain Control Aggregation Protocol.a SICAP: Shared-Segment based Inter-domain Control Aggregation Protocol.
a SICAP: Shared-Segment based Inter-domain Control Aggregation Protocol.Rute C. Sofia
 
ReCoop: Cooperative Wireless Networks, CeBIT 2010
ReCoop: Cooperative Wireless Networks, CeBIT 2010ReCoop: Cooperative Wireless Networks, CeBIT 2010
ReCoop: Cooperative Wireless Networks, CeBIT 2010Rute C. Sofia
 
A Primer on Advanced Ethernet Forwarding
A Primer on Advanced Ethernet ForwardingA Primer on Advanced Ethernet Forwarding
A Primer on Advanced Ethernet ForwardingRute C. Sofia
 
Advanced in Forwarding and Routing
Advanced in Forwarding and RoutingAdvanced in Forwarding and Routing
Advanced in Forwarding and RoutingRute C. Sofia
 
Future Internet Networking Architectures, New Paradigms
Future Internet Networking Architectures, New ParadigmsFuture Internet Networking Architectures, New Paradigms
Future Internet Networking Architectures, New ParadigmsRute C. Sofia
 
COPELABS, an overview to ULHT Students
COPELABS, an overview to ULHT StudentsCOPELABS, an overview to ULHT Students
COPELABS, an overview to ULHT StudentsRute C. Sofia
 
Trust Management: Requirement in user-centric networking?
Trust Management: Requirement in user-centric networking?Trust Management: Requirement in user-centric networking?
Trust Management: Requirement in user-centric networking?Rute C. Sofia
 
Social Sustainability Enabler: a Usage Scenario for E-inclusion
Social Sustainability Enabler: a Usage Scenario for E-inclusionSocial Sustainability Enabler: a Usage Scenario for E-inclusion
Social Sustainability Enabler: a Usage Scenario for E-inclusionRute C. Sofia
 
ULOOP project overview - the second generation of user-centric networking
ULOOP project overview - the second generation of user-centric networkingULOOP project overview - the second generation of user-centric networking
ULOOP project overview - the second generation of user-centric networkingRute C. Sofia
 
ULOOP Second industrial workshop overview
ULOOP Second industrial workshop overviewULOOP Second industrial workshop overview
ULOOP Second industrial workshop overviewRute C. Sofia
 
ULOOP standardization
ULOOP standardizationULOOP standardization
ULOOP standardizationRute C. Sofia
 
User in control: the ULOOP approach
User in control: the ULOOP approachUser in control: the ULOOP approach
User in control: the ULOOP approachRute C. Sofia
 
Named Data Networking Operational Aspects - IoT as a Use-case
Named Data Networking Operational Aspects - IoT as a Use-caseNamed Data Networking Operational Aspects - IoT as a Use-case
Named Data Networking Operational Aspects - IoT as a Use-caseRute C. Sofia
 
Contextual Inference and Characterization Derived from Wireless Network Mining
Contextual Inference and Characterization Derived from Wireless Network MiningContextual Inference and Characterization Derived from Wireless Network Mining
Contextual Inference and Characterization Derived from Wireless Network MiningRute C. Sofia
 

More from Rute C. Sofia (20)

IoT Lab @COPELABS
IoT Lab @COPELABSIoT Lab @COPELABS
IoT Lab @COPELABS
 
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
 
Piloto IPv6 - FCCN (1999)
Piloto IPv6 - FCCN (1999)Piloto IPv6 - FCCN (1999)
Piloto IPv6 - FCCN (1999)
 
Estudo do Protocolo ISAKMP/OAkley como Norma de Gestão de Chaves da Arquitect...
Estudo do Protocolo ISAKMP/OAkley como Norma de Gestão de Chaves da Arquitect...Estudo do Protocolo ISAKMP/OAkley como Norma de Gestão de Chaves da Arquitect...
Estudo do Protocolo ISAKMP/OAkley como Norma de Gestão de Chaves da Arquitect...
 
SICAP, a Shared-segment Inter-domain Control Aggregation Protocol (portuguese)
SICAP, a Shared-segment Inter-domain Control Aggregation Protocol (portuguese)SICAP, a Shared-segment Inter-domain Control Aggregation Protocol (portuguese)
SICAP, a Shared-segment Inter-domain Control Aggregation Protocol (portuguese)
 
Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)
 
a SICAP: Shared-Segment based Inter-domain Control Aggregation Protocol.
a SICAP: Shared-Segment based Inter-domain Control Aggregation Protocol.a SICAP: Shared-Segment based Inter-domain Control Aggregation Protocol.
a SICAP: Shared-Segment based Inter-domain Control Aggregation Protocol.
 
ReCoop: Cooperative Wireless Networks, CeBIT 2010
ReCoop: Cooperative Wireless Networks, CeBIT 2010ReCoop: Cooperative Wireless Networks, CeBIT 2010
ReCoop: Cooperative Wireless Networks, CeBIT 2010
 
A Primer on Advanced Ethernet Forwarding
A Primer on Advanced Ethernet ForwardingA Primer on Advanced Ethernet Forwarding
A Primer on Advanced Ethernet Forwarding
 
Advanced in Forwarding and Routing
Advanced in Forwarding and RoutingAdvanced in Forwarding and Routing
Advanced in Forwarding and Routing
 
Future Internet Networking Architectures, New Paradigms
Future Internet Networking Architectures, New ParadigmsFuture Internet Networking Architectures, New Paradigms
Future Internet Networking Architectures, New Paradigms
 
COPELABS, an overview to ULHT Students
COPELABS, an overview to ULHT StudentsCOPELABS, an overview to ULHT Students
COPELABS, an overview to ULHT Students
 
Trust Management: Requirement in user-centric networking?
Trust Management: Requirement in user-centric networking?Trust Management: Requirement in user-centric networking?
Trust Management: Requirement in user-centric networking?
 
Social Sustainability Enabler: a Usage Scenario for E-inclusion
Social Sustainability Enabler: a Usage Scenario for E-inclusionSocial Sustainability Enabler: a Usage Scenario for E-inclusion
Social Sustainability Enabler: a Usage Scenario for E-inclusion
 
ULOOP project overview - the second generation of user-centric networking
ULOOP project overview - the second generation of user-centric networkingULOOP project overview - the second generation of user-centric networking
ULOOP project overview - the second generation of user-centric networking
 
ULOOP Second industrial workshop overview
ULOOP Second industrial workshop overviewULOOP Second industrial workshop overview
ULOOP Second industrial workshop overview
 
ULOOP standardization
ULOOP standardizationULOOP standardization
ULOOP standardization
 
User in control: the ULOOP approach
User in control: the ULOOP approachUser in control: the ULOOP approach
User in control: the ULOOP approach
 
Named Data Networking Operational Aspects - IoT as a Use-case
Named Data Networking Operational Aspects - IoT as a Use-caseNamed Data Networking Operational Aspects - IoT as a Use-case
Named Data Networking Operational Aspects - IoT as a Use-case
 
Contextual Inference and Characterization Derived from Wireless Network Mining
Contextual Inference and Characterization Derived from Wireless Network MiningContextual Inference and Characterization Derived from Wireless Network Mining
Contextual Inference and Characterization Derived from Wireless Network Mining
 

Recently uploaded

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

New approaches to mobility management in multi-access networks

  • 1. http://siti.ulusofona.pt Andréa Nascimento, Rute C. Sofia andrea.nascimento@ulusofona.pt SITI/ULHT 19th Oct 2011 MEISI Seminary New approaches to mobility management in multi- access networks
  • 2. http://siti.ulusofona.pt 2 Agenda What is global mobility? Mobility management notions Mobility management approaches of today User-centric mobility management Decentralizing mobility management Conclusions
  • 4. http://siti.ulusofona.pt 4 What is global mobility? Today... • we have widespread wireless networks, with different access technologies –heterogeneous networks, different network architectures and protocols • end users have highly nomadic lifestyle • end users usually hold a cellular and a fixed access subscription • increasing demand for different services (from low-data-rate non-real time to high-speed real-time applications) • increasing variety of user-friendly and multimedia-enabled terminals
  • 5. http://siti.ulusofona.pt 5 Global perspective today Session breaks; re-registration required; nomadism but NO session continuity
  • 6. http://siti.ulusofona.pt 6 Global perspective tomorrow No visible interruption; no re-registration required; nomadism and session continuity provided
  • 7. http://siti.ulusofona.pt 7 Use-case 1: Hotspots/3G A user may prefer to use a Wi-Fi connection when available The system could choose which network is better when more than one is available, based on user's preferences The change of point of attachment should not require a re- registration
  • 9. http://siti.ulusofona.pt 9 Nomadism • The same service look & feel delivered independently of user location or terminal • Change of attachment point requires service re-activation • Sessions (e.g., TCP) have to be re-initiated • Requires global form of addressing (identification) and global AAA • Example: 3G global roaming Session continuity • Sessions are seamessly diverted (handed over) from an old identifier to a new • Change of attachment point does not disrupt active sessions • Examples: L2 mobility support (micro-mobility); Mobile IP Main concepts
  • 10. http://siti.ulusofona.pt 10 Location management: • Locate a mobile user’s point of attachment for delivering data packets Handover management: • Maintain a mobile user’s connection as it continues to change its point of attachment Main elements involved: Mobile Node (MN), Correspondent Node (CN), Mobility Anchor Point (MAP) Binding: notion of known-address and real address, and the association between them Main tasks
  • 11. http://siti.ulusofona.pt 11 Fast handover Seamless handover Low signaling traffic overhead Routing efficiency Quality of service Fast security Minimal special support required Main requirements
  • 12. Name, e-mail http://siti.ulusofona.pt 12 Mobility management approaches of today
  • 14. http://siti.ulusofona.pt 14 Network layer – Mobile IP Home Agent (HA): • Mobile IP aware router in the home network • Mobility anchor point • Control plane: signalling, registration, data redirection • Data plane: routing Mobile node (MN): • MIPv6/v4 client • If MIPv6, integrated in the IPv6 stack – not an additional package! Correspondent node (CN): • Third-party with whom MN communicates
  • 15. http://siti.ulusofona.pt 15 Mobile IPv4 (RFC 3344) Agent discovery process: the MN determines if it is in the home network. Registration process: the MN tells its Home Agent it is away and its current IP address (Care-of address) via Foreign Agent. Forwarding process: the Home Agent encapsulates all the incoming packets and sends them to the MN's Foreign Agent.
  • 16. http://siti.ulusofona.pt 16 Mobile IPv6 (RFC 3775) Binding Update (BU): association HoA - CoA HA Registration: MN sends a BU to its HA CN Registration: MN sends a BU to its CNs Communication between MN and CN: • Bidirectional tunneling (through the HA): it uses IP encapsulation • Route optimization (direct communication): it uses Routing Header type 2 extension.
  • 17. http://siti.ulusofona.pt 17 MIPv6 – Advantages/Disadvantages Advantages: • Address auto-configuration: no need for a Foreign Agent • Route optimization: binding updates (BUs) to CNs; avoid triangle routing • Routing header extension: less overhead than IP encapsulation • Ingress filter bypass: Home Address option Disadvantages: • Handoff latency: HA Registration and CN Registration • Service disruption during handover • Correspondent node Mobile IP aware
  • 18. http://siti.ulusofona.pt 18 FMIPv6 (RFC5568): It creates a tunnel between the old and the new points of attachment. MIPv6 – Extensions HMIPv6 (RFC5380): It creates a hierarchy of home agents.
  • 19. http://siti.ulusofona.pt 19 MIPv6 – Extensions PMIPv6 (RFC5213): It performs mobility management for IPv6 nodes not aware of MIPv6.
  • 20. http://siti.ulusofona.pt 20 Issues in Mobility Management Handover latency does not provide QoS required for real-time applications Host-based methods require protocol stack modification in the mobile node (it increases the complexity, waste of resources) Network-based protocol needs more study and standardization A novel approach is needed to be integrated into both L2 and L3 handover procedure
  • 22. http://siti.ulusofona.pt 22 SITI Project Partners: SITI (ULHT) and IT (University of Aveiro) Sponsored by FCT Duration of the project: May 2010 to April 2013 http://siti.ulusofona.pt/~umm
  • 23. http://siti.ulusofona.pt 23 Last-hop towards the end user Dynamic and spontaneous wireless environments User owns and often carries devices that can be part of the network No clear splitting between network elements and end-devices Human movement patterns are based on individual users routines and movement target-interests. Human behaviour may exhibit high variability (impacts the network) User-centric environments
  • 25. http://siti.ulusofona.pt 25 Provide a new mobility management architecture more suitable for user-centric environments De-construct current mobility management based on centralized and static mobility anchoring Provide nomadic end-user experience Provide session continuity Main aspects: • Handover optimization • User-centric approach Main aspects
  • 26. http://siti.ulusofona.pt 26 Analyze and validate adequate cost functions and metrics to estimate QoE levels on-the-fly Intelligent selection of mobility anchor points: •The best connection •Users expectations •Seamlessly, anytime, anywhere •Characteristics (technology, interfaces, services) •Environment (mobility behavior, social patterns, resources) Handover optimization
  • 27. http://siti.ulusofona.pt 27 Identify basic mobility functionalities on current standards Decoupling of functionalities in different management elements (mobility anchor points) Evaluate the better location to place mobility management elements (server, router, end device) Management functionalities placed closer to the end-user Optimize the distribution of mobility anchor points Specify the mobility control mechanism required for communication between the different entities User-centric approach
  • 28. http://siti.ulusofona.pt 28 Study of main standardized mobility management schemes Study of user's behaviour in main user-centric scenarios: Hotspot, MANETs, WMNs, UPNs, DTNs. Identification of functional blocks Categorization of functional blocks Output: Deliverable 1 – UMM Use-cases • Available on the website: http://siti.ulusofona.pt/~umm • Section “Documents” MM Characterization
  • 29. http://siti.ulusofona.pt 29 Device Identification: • MN's identification in the network Identification database control: • mechanism related to the recording of association between known-address and real-address Binding mechanism (registration/update): • signaling to create/update a record (binding) in the identification control Routing/forwarding: • process of intercepting packets destined to a known- address, encapsulating and forwarding to real-address Functional blocks
  • 30. http://siti.ulusofona.pt 30 Handover negotiation • process taken when the device has its real-address changed, in order to guarantee that the user will keep active all its sessions during the handoff process Resource management: • procedures to guarantee the quality of the connection when the MN changes its point of attachment to the network Mobility estimation: • prediction of MN's movement, in order to prevent connection breaks Security/privacy: • security mechanisms to assure the integrity of the elements and signaling of the mobility management system Functional blocks
  • 33. http://siti.ulusofona.pt 33 Approach 1: Control and data plane • Control - signaling • Data - data traffic, routing, forwarding and address translation Approach 2: Location and Handover management • Location - locate devices, call delivery • Handover - maintaining active sessions while MN is roaming Decoupling functionalities
  • 35. http://siti.ulusofona.pt 35 Data Control Located in the Home Agent Functionalities:  Binding mechanism (registration and update)  ID database control  Handover negotiation  Security  Device identification  Routing/forwarding Approach 1: Control and data planes - MIPv6
  • 36. http://siti.ulusofona.pt 36 One approach: Siemens patent Siemens – 2008 Idea: take the control functions off the home network and put them into the premisses of a MSP (Mobility Service Provider) Compatible with MIPv6 and MIPv4 Home Agent splitted into two elements: • HA-Control plane (HA-C) • HA-Data plane (HA-D) Describes the communication between HA-C and HA-D Approach 1: Patent Siemens
  • 37. http://siti.ulusofona.pt 37 One approach: Siemens patent Approach 1: Patent Siemens HA-C: placed into the MSP premisses Functionalities: • MN registration • Secure communication to MN • Secure communication to HA-D • Keep the mapping between HoAs and CoAs • Decide which HA-D the MN should use
  • 38. http://siti.ulusofona.pt 38 One approach: Siemens patent Approach 1: Patent Siemens HA-D: placed into the access router in the home network Functionalities: • Secure communication to HA-C • Establishing a IP-in-IP tunnelling to the MN CoA • Forwarding the packets to the MN CoA
  • 39. http://siti.ulusofona.pt 39 One approach: Siemens patent Approach 1: Patent Siemens
  • 40. http://siti.ulusofona.pt 40 One approach: Siemens patent Approach 1: Patent Siemens Advantages: • There is no restriction into where to place the HA control plane functionality • Increased scalability • Simpler processing on MIP-enable routers Disadvantages: • MN depends on the service provider (MSP) to offer the mobility management service • The overhead on the network for the signaling between HA-C and HA-D is unknown • The overhead on the time spent for the communication between HA-C and HA-D is unknown
  • 41. http://siti.ulusofona.pt 41 Why is this interesting? Approach 1: Why splitting? Splitting functionalities gives us the flexibility to choose where to place each block of functionality Splitting functionalities may divide the charge of work of the involved elements It is interesting to think about a decentralized approach If it is possible to separate the mobility management into control and data planes functionality blocks, maybe it is possible to separate into other functionality blocks (for instance, location and handover management)
  • 42. http://siti.ulusofona.pt 42 Status of the project Implementation of control/data splitting on NS-2 Definition of scenarios 1 poster published on international event 2 scientific papers published on international events Next steps: • Location/Handover management splitting • Other functionality splitting approach, based on simulation results • Define positioning of splitted elements
  • 44. http://siti.ulusofona.pt 44 Next generation wireless networks are focus of intense research User-centric environments are the part of the network where the end user is located and deserve more attention User-centric MM approach can make the system less dependent on the access/service provider networks Identified blocks represent basic functionalities to offer all the specified requirements There is no one approach that implements all functional blocks Conclusions
  • 45. http://siti.ulusofona.pt 45 Handover optimization • Influencing handover decision • New metrics • Consider user policies Mobility patterns & models • Mobility patterns influence architecture requirements • Adequate support for de-centralized control requires a better analysis of potential mobility patterns Future research topics
  • 46. http://siti.ulusofona.pt 46 Which OSI Layer(s) are best suited to support mobility convergence? Multi-access handover issues • Resource management • Dealing with simultaneous movement • AAA, single sign-on Future research topics