SlideShare a Scribd company logo
1 of 6
Download to read offline
K Al-Adhal et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1048-1053

www.ijera.com

RESEARCH ARTICLE

OPEN ACCESS

Performance of Handover in Mobile IP Networks
Khaled Mahmood Al-Adhal,

Dr. S. S. Tyagi

Department of CSE, Faculty of Engineering & Technology
Professor, CSE, FET
MANAV RACHNA INTERNATIONAL UNNIVERSITY

Abstract
Mobile IP Protocol (MIP) is an old protocol and it is a Standard Protocol that allows users to maintain non-stop
connectivity with their home address regardless of physical movement. In this paper we study handoff in mobile
IP networks and Mobile IP Protocol Extensions for Handoff Latency Minimization [9].
Keywords: Mobile IP, Fast Handoff, Roaming, Eager cell switching, Lazy cell switching.

I.

Introduction

The IP is expected to become the main
carrier of traffic to mobile and wireless nodes. This
includes ordinary data traffic like HTTP, FTP, and email, as well as voice, video, and other time-sensitive
data. To support mobile users, the basic Internet
protocols have been extended with protocols for
intercepting and forwarding packets to a mobile and
possibly roaming node. Seamless roaming requires
that users and applications do not experience loss of
connectivity or any noticeable hiccups in traffic. This
is not only important for time-sensitive traffic, but
also for TCP based traffic, as TCP performance is
highly sensitive to packet loss and reordering.
It is therefore imperative that a handoff is
initiated in such a way that network connectivity is
maintained for the longest possible period of time,
and that the handoff latency and packet loss is
minimized [3].
However, little is known about the performance of the
Mobile IP in an actual network. In particular, it is not
understood how different handoff initiation

algorithms influence essential performance metrics
like the packet loss and the duration of a handoff.

II.

Hand off Initiation

The Mobile IPv6 specification [6] contains only a
weak specification of handoff initiation algorithms.
Two conceptually simple handoff initiation
algorithms that have gained considerable interest are
ECS1 andLCS2 [3]. Both operate at the network layer
without requiring information from the lower (link)
layers.
A handoff algorithm has three major responsibilities:
1. Detecting and quality assessing available
networks
2. Deciding whether to perform a handoff, and
3. Executing the handoff.
Handoff initiation consists of the first two activities.
A seamless handoff requires that no packets are lost
as a consequence of the handoff. In general, it is also
desirable that packets are not reordered, duplicated, or
extraordinarily delayed.
First consider the scenarios depicted in Figure 1.
A

A

B

B

(a)

(b)

Figure1 A node moves from point A to B:
(a) Seamless hand off technologically possible,
(b) Seamless hand off possible, but not performed.
Here the ranges of two wireless networks (1
and 2) are depicted as circles. A mobile user moves
from point A to point B. In the situation shown in
Figure 1(a), where the networks do not overlap, no
Mobile IP handoff initiation algorithm could avoid
www.ijera.com

losing packets (one might imagine a very elaborate
infrastructure where packets were multicast to all
possible handoff targets and that packets could be
stored there until the mobile node arrives, but even
then a long period without network access would
1048 | P a g e
K Al-Adhal et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1048-1053
most likely be noted by the user). In the situation
shown in Figure 1(a), where the networks overlap
sufficiently), seamless handoff is possible.
Figure 1(b) shows that there are situations where a
handoff is possible, but not desirable. ECS
proactively initiates a handoff every time a new
network prefix is learned in a router advertisement.
Conversely, LCS acts reactively by not initiating a
handoff before the primary network is confirmed to
be unreachable. When the lifetime of the primary
network expires, LCS probes the current default
router to see if it is still reachable. If not, a handoff to

www.ijera.com

another network is initiated. Consider what happens
when ECS and LCS are subjected to the movement in
Figure 1(a).
Figure2 illustrates a timeline for LCS where
significant events have been pointed out. The first
event is that network 2 gets within range. However,
the mobile node cannot, in general, observe this
before it receives a router advertisement from
network 2. This results in a network discovery delay.
LCS does not yet per form a handoff. Next, network
1 gets out of range [6].

Handoff latency
Network
discovery time

Network2
Within
range

Network loss
discovery time

Network2
discovered

Network1
out of range

Perform
Handoff

Handoff
initiate

Newpoint of
attachment
established

TIime

Figure2 LCS
This cannot, in general, be detected
immediately, as this requires active communication
with the base station, and it gives rise to a network
loss discovery delay. LCS declares the network
unreachable when the lifetime of the last received
router advertisement has expired and the following

probing is unsuccessful. LCS then hands off to one of
the alternative networks known to it through router
advertisements—in this case network 2—and thus
establish a new point of attachment. Thus, LCS will
lose packets in the handoff latency interval.
The behavior of ECS is illustrated in Figure3).
Handoff latency

Network
discovery time

Network2
Within
range

Network2
discovered
Handoff initiated

Perform Handoff

Network1
out of range

New point of
attachment
established

TIime

Figure3 ECS
ECS handoff immediately when a new
network is discovered. If the mobile node has an
interface that is capable of receiving from the old
network while attaching to the new, a seamless
handoff can be performed provided a sufficient
network overlap.
The performance of ECS thus depends on
the frequency with which access routers are
broadcasting router advertisements. Similarly, LCS
also depends on the frequency of broadcasted router
advertisements, but additionally depends on the
lifetime of network prefixes and probing time. The
theory and data needed to decide what handoff
initiation algorithms to use in what circumstances,
how to tune protocol parameters, and where to put
optimization efforts, are missing.

www.ijera.com

Both ECS and LCS are very simple-minded
approaches. PCS is our proposal for a more
intelligent handoff initiation algorithm that also
considers measured signal-to-noise ratio and roundtrip time to access routers [8].
Periodically (currently every 0.5 second) the
algorithm sends an echo request to the default router
a tall available networks. The default routers are
expected to reply to the echo. These echo requests are
sent for three reasons:
1. It is only possible to measure the SNR of a link to
a network if there is traffic at the network.
2. It can be determined faster that a network has
become unreachable than by monitoring the lifetime
of network prefixes.
3. The round-trip time is an indication of the capacity
of a network.
1049 | P a g e
K Al-Adhal et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1048-1053

(Home Agent) from which the HA would “guess” the
real IP address of the MN. Further, the MN would
use a dedicated destination port to tell the HA that it
is communicating from behind a NAT.
Handoffs between subnets served by
different FAs1 (L3 handoffs) require a change of the
CoA (Care of address) and a succeeding registration
of the new CoA with the HA [6]. This process takes
some nonzero time to complete as the Registration
Request propagates through the network. During this
period of time the MN is not able to send or receive
IP packets. The latency involved in Layer 3 handoffs
can be above the threshold required for the support of
delay-sensitive or real-time services. IETF is working
on several drafts, which propose methods to achieve
low-latency Mobile IP handoffs. The methods are
explained in the following.

Parametric cell switching only performs
handoff when a significantly better network is
available .The cost of using the PCS algorithm is a
slightly increased network load.

III.

Mobile IP Protocol Extensions for
Handoff Latency Minimization

When using Mobile IP, the movement of a
MN away from its home link is transparent to
transport and higher-layer protocols and applications,
since the IP address of the communicating nodes
remains the same at all times. Therefore, the MN
(Mobile Node) may easily continue communication
with other nodes after moving to a new link. At least
in theory. There are cases in which it is not possible
for the MN to keep its IP address after a handoff [11].
For example when the MN operates in private
address networks which are separated from the public
Internet by Network Address Translation (NAT)
devices, which is not an uncommon case.
The basic idea is that the MN would use a
specific source port for the communication with HA
Mobile node

L2-Link
Down
Trigger

Old Foreign Agent

L2Source
Trigger

New Foreign Agent

Home Agent

Hardware Request

Hardware Reply
L2-Link
Down
Trigger

L2-Link
Up
Trigger

www.ijera.com

Forward
Packet

L2-Link
Up
Trigger
Registration Reply
Registration Request
Developer Packet

Registration Reply

Registration Reply

Figure4 Pre-Registration Handoff

IV.

Low Latency Handoffs in Mobile IPv4

In described two techniques, which allow
greater support for real-time services on a Mobile
IPv4network by minimizing the period of time when
a MN is unable to send or receive IPv4 packets due to
the delay in the Mobile IPv4 registration process.
The L3 handoff can be either networkinitiated or mobile-initiated. Accordingly, L2 triggers
can be used both in the MN and in the FAs to trigger
particular L3handoff events.

www.ijera.com

V.

Pre-Registration handoff method

This handoff method allows the MN to
communicate with the New Foreign Agent (nFA)
while still connected to the Old Foreign Agent (oFA)
[2].
This way, the MN is able to “pre-build” its
registration state on the nFA prior to an underlying
L2 handoff.
• Network-Initiated Handoff
A network initiated handoff can be source
triggered (Figure3) or target triggered (Figure5),
1050 | P a g e
K Al-Adhal et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1048-1053
depending on whether oFA (source trigger case) or
nFA (target trigger case) receives an L2 trigger
informing it about a certain MN's upcoming
movement from oFA to nFA. In both cases the
mobile node receives a Proxy Router Advertisement
message (PrRtAdv), which contains information
about the nFA. Upon reception of an PrRtAdv
message the MN starts registration with nFA by

Mobile Node

Old Foreign Agent

sending it a Registration Request message. This
message has to be routed through oFA since the MN
is not directly connected to nFA prior to the L2
handoff [1].
The nFA performs the registration of the MN with
the HA and buffers the Registration Reply until the
MN completes the L2 handoff and connects to nFA.

New Foreign Agent

PrRlAdv
Agent Advertisement Tunneled Via oFA

Registration Request

www.ijera.com

Routed Via oFA

Home Agent

L2-Link Target Trigger

Registration Request

Buffered
Registration Reply
L2-Link
UP
Trigger

Agent Solicitation

Registration Reply

Figure5 Pre-Registration Handoff - Network Initiated, Target Trigger

Mobile Node

Old Foreign Agent

New Foreign Agent

Home Agent

PrRlSo
PrRlAdv
Routed Via oFA

Registration Request

Registration Request
Buffered
Registration Reply

L2-Link
UP
Trigger

Agent Solicitation

Registration Reply

Figure6 Pre-Registration Handoff -Mobile Initiated
Router Solicitation "(PrRtSol) message to oFA. The
solicitation message must contain an Id entire of nFA
VI.
Mobile-Initiated handover
(i.e. nFA's IPv4 address). oFA replies to the MN with
A mobile-initiated handoff (Figure6) occurs
aPrRtAdv
message
containing
the
agent
when a trigger is received at the MN to inform that it
advertisement for the requested nFA. In order to
will shortly move to nFA. The L2 trigger contains
expedite the handoff, the actual nFA advertisement
information such as the nFA's identifier (i.e. it's
IPv4address).
As a consequence of the L2 trigger, the MN
begins registration with nFA by sending the Proxy
www.ijera.com

1051 | P a g e
K Al-Adhal et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1048-1053
can be cached by oFA, following a previous
communication between the two [5].
Such caching can be done in a pre-soliciting
process of known FAs to avoid performing the
solicitation during an actual handoff procedure. In
case that oFA does not have cached information
about nFA it has to make an PrRtSol-PrRtAdv
exchange with nFA in order to obtain the
information. The rest of the registration process is
similar to the network-initiated cases [10].

VII.

contains the MN's L2 address and an identifier for the
other FA (i.e., the other FA's IPv4address). The two
FAs make a Handoff Request (HRqst) - Handoff
Reply (HRply) exchange. The exchange triggers the
initialization of a bi-directional tunnel between the
two [4].
The point during the L2 handoff in which
the MN is no longer connected on a given link is
signaled by an Layer 2 Link Down Trigger (L2-LD)
trigger at oFA and MN. The completion of the L2
handoff is signaled by an Layer 2 Link Up Trigger
(L2-LU) trigger at nFA and MN. The trigger is
handled as follows:
a.) When oFA receives the L2LD trigger, it begins
forwarding packets to MN through the forward tunnel
to nFA.
b.) When the nFA receives the L2LU trigger,
delivering packets tunneled from oFA to MN and
forwards outstanding packets from MN using normal
routing mechanisms or through a reverse tunnel to
oFA or the HA.
c.) When the MN receives the L2LU, it initiates the
registration process with nFA by soliciting an agent
advertisement. After registration, the nFA takes over
the role of default foreign agent for the MN.

Post-Registration handoff method

This extension proposes the setup of a
tunnel between nFA and oFA, thus it allows the MN
to continue using its oFA while on nFA's subnet. This
enables a rapid establishment of service at the new
point of attachment which minimizes the impact on
real-time applications. The MN must eventually
perform a registration, but it can do this after
communication with the nFA is established.
The handoff process starts with either oFA
or nFA receiving an L2 trigger informing it that a
certain MN is about to move from oFA to nFA. In the
former case the trigger is called Layer 2 Source
Trigger (L2ST) and in the latter case Layer 2 Target
Trigger (L2TT) to indicate whether the trigger is
made in the previous network (source) or the
destination network (target) of the MN. The trigger
Mobile node

L2-Link
Down
Trigger

Old Foreign Agent

L2Source
Trigger

New Foreign Agent

Home Agent

Hardware Request

Hardware Reply
L2-Link
Down
Trigger

L2-Link
Up
Trigger

www.ijera.com

Forward
Packet

L2-Link
Up
Trigger
Registration Reply
Registration Request
Developer Packet

Registration Reply

Registration Reply

Figure7 Post-Registration Handoff -Source Trigger
Figure7 shows the Post-Registration
process after a source trigger. The only difference
in the target trigger case is that nFA initializes the
handoff [3].

www.ijera.com

VIII.

Conclusions

There are a number of important metrics
that should be considered when evaluating the
performance of a handoff initiation strategy as
experienced by a mobile node:

1052 | P a g e
K Al-Adhal et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1048-1053






Handoff latency: The handoff latency is the
time where the mobile node is potentially
unreachable. In general, it is caused by the
time used to discover a new network, obtain
and validate a new COA(identifies the current
location of the mobile node), obtain
authorization to access the new network, make
the decision that a handoff should be initiated,
and ,finally, execute the handoff, which
involves notifying the home agent of the new
COA and awaiting the acknowledgment from
the HA.
Number of performed handoffs: The more
handoffs a given strategy will perform in a
given scenario, the more likely it is that the
user will observe them, and the more the
network is loaded by signaling messages.
User value: When several networks are
candidates as target for a handoff, the one most
optimal from the user's perspective should be
chosen. This may be the network that offers
the most bandwidth, cheapest price, the most
stable connection, and so on.

[9]

[10]

[11]

www.ijera.com

Robert Elz "The Role of Mobile IP in a
Mobile
World"
ITS
Telecommunications, 2008. ITST 2008.
8th International Conference on Centre for
Network Research (CNR), Department of
Computer Engineering, E-ISBN: 978-14244-2858-8 Page(s): 209 Date: 2008
Koodli, Ed.
"Mobile IPv6 Fast
Handovers" Network Working Group Rfc:
5268 June 2008 IEEE
Stefan Raab, Madhavi W. Chandra "
Design How-To Understand Mobile IP-Part III" 3/16/2009

Reference
[1]

[2]

[3]

[4]

[5]

[6]
[7]

[8]

Jiang
Xie,
Ivan
Howitt,
and
IzzeldinShibeika "IEEE 802.11-based
Mobile IP Fast Handoff Latency Analysis
"This full text paper was peer reviewed at
the direction of IEEE Communications
Society subject matter experts for
publication in the ICC 2007 proceedings.
Khalid EltaybAldalaty
"Mobile IP
Handover Delay Reduction Using
Seamless
Handover
Architecture
"August 2009.
K. El Malki, Ed. "The Study of Handover
in Mobile IP Networks" Rfc: 4881 June
2007
Mohamed AlnasIrfanAwan D.R Holton
"Handoff mechanism in Mobile IP" 9781-4244-5219-4 2009 IEEE 176 Page(s):
176 – 179 E-ISBN Date: 10-11 Oct. 2009
Mohamed AlnasIrfanAwan R Holton "A
Survey of Handoff Performance in Mobile
IP"2009
Third
UKSim
European
Symposium on Computer Modeling and
Simulation 2009- IEEE
Perkins, C. E.,
"Mobile IP Design
Principles and Practices"
R. Malekian, and R. Berangi, “The Study
of Handoff in Mobile IPv6”, In
Proceedings of WORLD COMP’08 ,
Nevada, USA, 2008
Reza
MalekianThird
International
Conference
on
Broadband
Communications, Information Technology
& Biomedical Applications 978-0-76953453-4/08 $25.00 © 2008 IEEE

www.ijera.com

1053 | P a g e

More Related Content

What's hot

Networking questions
Networking questionsNetworking questions
Networking questionsrajujast
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attackRaj Sikarwar
 
High Speed data transmission in medical body sensor network by reducing the d...
High Speed data transmission in medical body sensor network by reducing the d...High Speed data transmission in medical body sensor network by reducing the d...
High Speed data transmission in medical body sensor network by reducing the d...ijsrd.com
 
Study and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolStudy and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolMehedi
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusIJMER
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...ijeei-iaes
 
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETsIJMER
 
Final year project list for the year 2012
Final year project list for the year 2012Final year project list for the year 2012
Final year project list for the year 2012Muhammad Farhan
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5friv4schoolgames
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
internetworking operation
internetworking operationinternetworking operation
internetworking operationSrinivasa Rao
 
A DYNAMIC ADDRESSING PROTOCOL ON CODE MESSAGES FOR AN UNDERWATER WIRELESS HAL...
A DYNAMIC ADDRESSING PROTOCOL ON CODE MESSAGES FOR AN UNDERWATER WIRELESS HAL...A DYNAMIC ADDRESSING PROTOCOL ON CODE MESSAGES FOR AN UNDERWATER WIRELESS HAL...
A DYNAMIC ADDRESSING PROTOCOL ON CODE MESSAGES FOR AN UNDERWATER WIRELESS HAL...ijwmn
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
 

What's hot (20)

Networking questions
Networking questionsNetworking questions
Networking questions
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 
High Speed data transmission in medical body sensor network by reducing the d...
High Speed data transmission in medical body sensor network by reducing the d...High Speed data transmission in medical body sensor network by reducing the d...
High Speed data transmission in medical body sensor network by reducing the d...
 
Study and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolStudy and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocol
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart Campus
 
Networks faq
Networks faqNetworks faq
Networks faq
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
 
109 113
109 113109 113
109 113
 
A Novel Acknowledgement based Intrusion Detection System for MANETs
A Novel Acknowledgement based Intrusion Detection System for  MANETsA Novel Acknowledgement based Intrusion Detection System for  MANETs
A Novel Acknowledgement based Intrusion Detection System for MANETs
 
Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)Mobile network layer (mobile comm.)
Mobile network layer (mobile comm.)
 
Final year project list for the year 2012
Final year project list for the year 2012Final year project list for the year 2012
Final year project list for the year 2012
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
 
Question
QuestionQuestion
Question
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
internetworking operation
internetworking operationinternetworking operation
internetworking operation
 
A DYNAMIC ADDRESSING PROTOCOL ON CODE MESSAGES FOR AN UNDERWATER WIRELESS HAL...
A DYNAMIC ADDRESSING PROTOCOL ON CODE MESSAGES FOR AN UNDERWATER WIRELESS HAL...A DYNAMIC ADDRESSING PROTOCOL ON CODE MESSAGES FOR AN UNDERWATER WIRELESS HAL...
A DYNAMIC ADDRESSING PROTOCOL ON CODE MESSAGES FOR AN UNDERWATER WIRELESS HAL...
 
Ccna interview questions
Ccna interview questionsCcna interview questions
Ccna interview questions
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
Ospf
OspfOspf
Ospf
 

Viewers also liked (20)

Ft3610541057
Ft3610541057Ft3610541057
Ft3610541057
 
Fq3610331039
Fq3610331039Fq3610331039
Fq3610331039
 
Gg3611321138
Gg3611321138Gg3611321138
Gg3611321138
 
Gl3611631165
Gl3611631165Gl3611631165
Gl3611631165
 
Gw3612361241
Gw3612361241Gw3612361241
Gw3612361241
 
Gx3612421246
Gx3612421246Gx3612421246
Gx3612421246
 
Ha3612571261
Ha3612571261Ha3612571261
Ha3612571261
 
Gc3611111116
Gc3611111116Gc3611111116
Gc3611111116
 
Gh3611391145
Gh3611391145Gh3611391145
Gh3611391145
 
Gd3611171122
Gd3611171122Gd3611171122
Gd3611171122
 
Gf3611261131
Gf3611261131Gf3611261131
Gf3611261131
 
Ga3610941103
Ga3610941103Ga3610941103
Ga3610941103
 
Fu3610581067
Fu3610581067Fu3610581067
Fu3610581067
 
Gb3611041110
Gb3611041110Gb3611041110
Gb3611041110
 
Fy3610821086
Fy3610821086Fy3610821086
Fy3610821086
 
Fp3610261032
Fp3610261032Fp3610261032
Fp3610261032
 
Fv3610681072
Fv3610681072Fv3610681072
Fv3610681072
 
Fw3610731076
Fw3610731076Fw3610731076
Fw3610731076
 
Fr3610401047
Fr3610401047Fr3610401047
Fr3610401047
 
Ge3611231125
Ge3611231125Ge3611231125
Ge3611231125
 

Similar to Fs3610481053

Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...IJCNCJournal
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Journals
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Publishing House
 
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...Ranjeet Bidwe
 
Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturingN. A. Sutisna
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
 
Paper id 36201527
Paper id 36201527Paper id 36201527
Paper id 36201527IJRAT
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer ) dimuthu22
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos TechniquesKatie Gulley
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing TechonologiesKathirvel Ayyaswamy
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...Alexander Decker
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...inventionjournals
 

Similar to Fs3610481053 (20)

Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
 
Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
TCP for Wireless Environments
TCP for Wireless EnvironmentsTCP for Wireless Environments
TCP for Wireless Environments
 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturing
 
SmartFlowwhitepaper
SmartFlowwhitepaperSmartFlowwhitepaper
SmartFlowwhitepaper
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
Paper id 36201527
Paper id 36201527Paper id 36201527
Paper id 36201527
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing Techonologies
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Fs3610481053

  • 1. K Al-Adhal et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1048-1053 www.ijera.com RESEARCH ARTICLE OPEN ACCESS Performance of Handover in Mobile IP Networks Khaled Mahmood Al-Adhal, Dr. S. S. Tyagi Department of CSE, Faculty of Engineering & Technology Professor, CSE, FET MANAV RACHNA INTERNATIONAL UNNIVERSITY Abstract Mobile IP Protocol (MIP) is an old protocol and it is a Standard Protocol that allows users to maintain non-stop connectivity with their home address regardless of physical movement. In this paper we study handoff in mobile IP networks and Mobile IP Protocol Extensions for Handoff Latency Minimization [9]. Keywords: Mobile IP, Fast Handoff, Roaming, Eager cell switching, Lazy cell switching. I. Introduction The IP is expected to become the main carrier of traffic to mobile and wireless nodes. This includes ordinary data traffic like HTTP, FTP, and email, as well as voice, video, and other time-sensitive data. To support mobile users, the basic Internet protocols have been extended with protocols for intercepting and forwarding packets to a mobile and possibly roaming node. Seamless roaming requires that users and applications do not experience loss of connectivity or any noticeable hiccups in traffic. This is not only important for time-sensitive traffic, but also for TCP based traffic, as TCP performance is highly sensitive to packet loss and reordering. It is therefore imperative that a handoff is initiated in such a way that network connectivity is maintained for the longest possible period of time, and that the handoff latency and packet loss is minimized [3]. However, little is known about the performance of the Mobile IP in an actual network. In particular, it is not understood how different handoff initiation algorithms influence essential performance metrics like the packet loss and the duration of a handoff. II. Hand off Initiation The Mobile IPv6 specification [6] contains only a weak specification of handoff initiation algorithms. Two conceptually simple handoff initiation algorithms that have gained considerable interest are ECS1 andLCS2 [3]. Both operate at the network layer without requiring information from the lower (link) layers. A handoff algorithm has three major responsibilities: 1. Detecting and quality assessing available networks 2. Deciding whether to perform a handoff, and 3. Executing the handoff. Handoff initiation consists of the first two activities. A seamless handoff requires that no packets are lost as a consequence of the handoff. In general, it is also desirable that packets are not reordered, duplicated, or extraordinarily delayed. First consider the scenarios depicted in Figure 1. A A B B (a) (b) Figure1 A node moves from point A to B: (a) Seamless hand off technologically possible, (b) Seamless hand off possible, but not performed. Here the ranges of two wireless networks (1 and 2) are depicted as circles. A mobile user moves from point A to point B. In the situation shown in Figure 1(a), where the networks do not overlap, no Mobile IP handoff initiation algorithm could avoid www.ijera.com losing packets (one might imagine a very elaborate infrastructure where packets were multicast to all possible handoff targets and that packets could be stored there until the mobile node arrives, but even then a long period without network access would 1048 | P a g e
  • 2. K Al-Adhal et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1048-1053 most likely be noted by the user). In the situation shown in Figure 1(a), where the networks overlap sufficiently), seamless handoff is possible. Figure 1(b) shows that there are situations where a handoff is possible, but not desirable. ECS proactively initiates a handoff every time a new network prefix is learned in a router advertisement. Conversely, LCS acts reactively by not initiating a handoff before the primary network is confirmed to be unreachable. When the lifetime of the primary network expires, LCS probes the current default router to see if it is still reachable. If not, a handoff to www.ijera.com another network is initiated. Consider what happens when ECS and LCS are subjected to the movement in Figure 1(a). Figure2 illustrates a timeline for LCS where significant events have been pointed out. The first event is that network 2 gets within range. However, the mobile node cannot, in general, observe this before it receives a router advertisement from network 2. This results in a network discovery delay. LCS does not yet per form a handoff. Next, network 1 gets out of range [6]. Handoff latency Network discovery time Network2 Within range Network loss discovery time Network2 discovered Network1 out of range Perform Handoff Handoff initiate Newpoint of attachment established TIime Figure2 LCS This cannot, in general, be detected immediately, as this requires active communication with the base station, and it gives rise to a network loss discovery delay. LCS declares the network unreachable when the lifetime of the last received router advertisement has expired and the following probing is unsuccessful. LCS then hands off to one of the alternative networks known to it through router advertisements—in this case network 2—and thus establish a new point of attachment. Thus, LCS will lose packets in the handoff latency interval. The behavior of ECS is illustrated in Figure3). Handoff latency Network discovery time Network2 Within range Network2 discovered Handoff initiated Perform Handoff Network1 out of range New point of attachment established TIime Figure3 ECS ECS handoff immediately when a new network is discovered. If the mobile node has an interface that is capable of receiving from the old network while attaching to the new, a seamless handoff can be performed provided a sufficient network overlap. The performance of ECS thus depends on the frequency with which access routers are broadcasting router advertisements. Similarly, LCS also depends on the frequency of broadcasted router advertisements, but additionally depends on the lifetime of network prefixes and probing time. The theory and data needed to decide what handoff initiation algorithms to use in what circumstances, how to tune protocol parameters, and where to put optimization efforts, are missing. www.ijera.com Both ECS and LCS are very simple-minded approaches. PCS is our proposal for a more intelligent handoff initiation algorithm that also considers measured signal-to-noise ratio and roundtrip time to access routers [8]. Periodically (currently every 0.5 second) the algorithm sends an echo request to the default router a tall available networks. The default routers are expected to reply to the echo. These echo requests are sent for three reasons: 1. It is only possible to measure the SNR of a link to a network if there is traffic at the network. 2. It can be determined faster that a network has become unreachable than by monitoring the lifetime of network prefixes. 3. The round-trip time is an indication of the capacity of a network. 1049 | P a g e
  • 3. K Al-Adhal et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1048-1053 (Home Agent) from which the HA would “guess” the real IP address of the MN. Further, the MN would use a dedicated destination port to tell the HA that it is communicating from behind a NAT. Handoffs between subnets served by different FAs1 (L3 handoffs) require a change of the CoA (Care of address) and a succeeding registration of the new CoA with the HA [6]. This process takes some nonzero time to complete as the Registration Request propagates through the network. During this period of time the MN is not able to send or receive IP packets. The latency involved in Layer 3 handoffs can be above the threshold required for the support of delay-sensitive or real-time services. IETF is working on several drafts, which propose methods to achieve low-latency Mobile IP handoffs. The methods are explained in the following. Parametric cell switching only performs handoff when a significantly better network is available .The cost of using the PCS algorithm is a slightly increased network load. III. Mobile IP Protocol Extensions for Handoff Latency Minimization When using Mobile IP, the movement of a MN away from its home link is transparent to transport and higher-layer protocols and applications, since the IP address of the communicating nodes remains the same at all times. Therefore, the MN (Mobile Node) may easily continue communication with other nodes after moving to a new link. At least in theory. There are cases in which it is not possible for the MN to keep its IP address after a handoff [11]. For example when the MN operates in private address networks which are separated from the public Internet by Network Address Translation (NAT) devices, which is not an uncommon case. The basic idea is that the MN would use a specific source port for the communication with HA Mobile node L2-Link Down Trigger Old Foreign Agent L2Source Trigger New Foreign Agent Home Agent Hardware Request Hardware Reply L2-Link Down Trigger L2-Link Up Trigger www.ijera.com Forward Packet L2-Link Up Trigger Registration Reply Registration Request Developer Packet Registration Reply Registration Reply Figure4 Pre-Registration Handoff IV. Low Latency Handoffs in Mobile IPv4 In described two techniques, which allow greater support for real-time services on a Mobile IPv4network by minimizing the period of time when a MN is unable to send or receive IPv4 packets due to the delay in the Mobile IPv4 registration process. The L3 handoff can be either networkinitiated or mobile-initiated. Accordingly, L2 triggers can be used both in the MN and in the FAs to trigger particular L3handoff events. www.ijera.com V. Pre-Registration handoff method This handoff method allows the MN to communicate with the New Foreign Agent (nFA) while still connected to the Old Foreign Agent (oFA) [2]. This way, the MN is able to “pre-build” its registration state on the nFA prior to an underlying L2 handoff. • Network-Initiated Handoff A network initiated handoff can be source triggered (Figure3) or target triggered (Figure5), 1050 | P a g e
  • 4. K Al-Adhal et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1048-1053 depending on whether oFA (source trigger case) or nFA (target trigger case) receives an L2 trigger informing it about a certain MN's upcoming movement from oFA to nFA. In both cases the mobile node receives a Proxy Router Advertisement message (PrRtAdv), which contains information about the nFA. Upon reception of an PrRtAdv message the MN starts registration with nFA by Mobile Node Old Foreign Agent sending it a Registration Request message. This message has to be routed through oFA since the MN is not directly connected to nFA prior to the L2 handoff [1]. The nFA performs the registration of the MN with the HA and buffers the Registration Reply until the MN completes the L2 handoff and connects to nFA. New Foreign Agent PrRlAdv Agent Advertisement Tunneled Via oFA Registration Request www.ijera.com Routed Via oFA Home Agent L2-Link Target Trigger Registration Request Buffered Registration Reply L2-Link UP Trigger Agent Solicitation Registration Reply Figure5 Pre-Registration Handoff - Network Initiated, Target Trigger Mobile Node Old Foreign Agent New Foreign Agent Home Agent PrRlSo PrRlAdv Routed Via oFA Registration Request Registration Request Buffered Registration Reply L2-Link UP Trigger Agent Solicitation Registration Reply Figure6 Pre-Registration Handoff -Mobile Initiated Router Solicitation "(PrRtSol) message to oFA. The solicitation message must contain an Id entire of nFA VI. Mobile-Initiated handover (i.e. nFA's IPv4 address). oFA replies to the MN with A mobile-initiated handoff (Figure6) occurs aPrRtAdv message containing the agent when a trigger is received at the MN to inform that it advertisement for the requested nFA. In order to will shortly move to nFA. The L2 trigger contains expedite the handoff, the actual nFA advertisement information such as the nFA's identifier (i.e. it's IPv4address). As a consequence of the L2 trigger, the MN begins registration with nFA by sending the Proxy www.ijera.com 1051 | P a g e
  • 5. K Al-Adhal et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1048-1053 can be cached by oFA, following a previous communication between the two [5]. Such caching can be done in a pre-soliciting process of known FAs to avoid performing the solicitation during an actual handoff procedure. In case that oFA does not have cached information about nFA it has to make an PrRtSol-PrRtAdv exchange with nFA in order to obtain the information. The rest of the registration process is similar to the network-initiated cases [10]. VII. contains the MN's L2 address and an identifier for the other FA (i.e., the other FA's IPv4address). The two FAs make a Handoff Request (HRqst) - Handoff Reply (HRply) exchange. The exchange triggers the initialization of a bi-directional tunnel between the two [4]. The point during the L2 handoff in which the MN is no longer connected on a given link is signaled by an Layer 2 Link Down Trigger (L2-LD) trigger at oFA and MN. The completion of the L2 handoff is signaled by an Layer 2 Link Up Trigger (L2-LU) trigger at nFA and MN. The trigger is handled as follows: a.) When oFA receives the L2LD trigger, it begins forwarding packets to MN through the forward tunnel to nFA. b.) When the nFA receives the L2LU trigger, delivering packets tunneled from oFA to MN and forwards outstanding packets from MN using normal routing mechanisms or through a reverse tunnel to oFA or the HA. c.) When the MN receives the L2LU, it initiates the registration process with nFA by soliciting an agent advertisement. After registration, the nFA takes over the role of default foreign agent for the MN. Post-Registration handoff method This extension proposes the setup of a tunnel between nFA and oFA, thus it allows the MN to continue using its oFA while on nFA's subnet. This enables a rapid establishment of service at the new point of attachment which minimizes the impact on real-time applications. The MN must eventually perform a registration, but it can do this after communication with the nFA is established. The handoff process starts with either oFA or nFA receiving an L2 trigger informing it that a certain MN is about to move from oFA to nFA. In the former case the trigger is called Layer 2 Source Trigger (L2ST) and in the latter case Layer 2 Target Trigger (L2TT) to indicate whether the trigger is made in the previous network (source) or the destination network (target) of the MN. The trigger Mobile node L2-Link Down Trigger Old Foreign Agent L2Source Trigger New Foreign Agent Home Agent Hardware Request Hardware Reply L2-Link Down Trigger L2-Link Up Trigger www.ijera.com Forward Packet L2-Link Up Trigger Registration Reply Registration Request Developer Packet Registration Reply Registration Reply Figure7 Post-Registration Handoff -Source Trigger Figure7 shows the Post-Registration process after a source trigger. The only difference in the target trigger case is that nFA initializes the handoff [3]. www.ijera.com VIII. Conclusions There are a number of important metrics that should be considered when evaluating the performance of a handoff initiation strategy as experienced by a mobile node: 1052 | P a g e
  • 6. K Al-Adhal et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1048-1053    Handoff latency: The handoff latency is the time where the mobile node is potentially unreachable. In general, it is caused by the time used to discover a new network, obtain and validate a new COA(identifies the current location of the mobile node), obtain authorization to access the new network, make the decision that a handoff should be initiated, and ,finally, execute the handoff, which involves notifying the home agent of the new COA and awaiting the acknowledgment from the HA. Number of performed handoffs: The more handoffs a given strategy will perform in a given scenario, the more likely it is that the user will observe them, and the more the network is loaded by signaling messages. User value: When several networks are candidates as target for a handoff, the one most optimal from the user's perspective should be chosen. This may be the network that offers the most bandwidth, cheapest price, the most stable connection, and so on. [9] [10] [11] www.ijera.com Robert Elz "The Role of Mobile IP in a Mobile World" ITS Telecommunications, 2008. ITST 2008. 8th International Conference on Centre for Network Research (CNR), Department of Computer Engineering, E-ISBN: 978-14244-2858-8 Page(s): 209 Date: 2008 Koodli, Ed. "Mobile IPv6 Fast Handovers" Network Working Group Rfc: 5268 June 2008 IEEE Stefan Raab, Madhavi W. Chandra " Design How-To Understand Mobile IP-Part III" 3/16/2009 Reference [1] [2] [3] [4] [5] [6] [7] [8] Jiang Xie, Ivan Howitt, and IzzeldinShibeika "IEEE 802.11-based Mobile IP Fast Handoff Latency Analysis "This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 2007 proceedings. Khalid EltaybAldalaty "Mobile IP Handover Delay Reduction Using Seamless Handover Architecture "August 2009. K. El Malki, Ed. "The Study of Handover in Mobile IP Networks" Rfc: 4881 June 2007 Mohamed AlnasIrfanAwan D.R Holton "Handoff mechanism in Mobile IP" 9781-4244-5219-4 2009 IEEE 176 Page(s): 176 – 179 E-ISBN Date: 10-11 Oct. 2009 Mohamed AlnasIrfanAwan R Holton "A Survey of Handoff Performance in Mobile IP"2009 Third UKSim European Symposium on Computer Modeling and Simulation 2009- IEEE Perkins, C. E., "Mobile IP Design Principles and Practices" R. Malekian, and R. Berangi, “The Study of Handoff in Mobile IPv6”, In Proceedings of WORLD COMP’08 , Nevada, USA, 2008 Reza MalekianThird International Conference on Broadband Communications, Information Technology & Biomedical Applications 978-0-76953453-4/08 $25.00 © 2008 IEEE www.ijera.com 1053 | P a g e