In nested NEMO, a multi-tunneling causes a pinball routing problem. Several solutions proposed to solve the pinball routing problem in NEMO BSP cannot be used at PMIPv6-based NEMO due to different environment such as no route optimization with CN. We propose a tunnel compress scheme for multi-tunneling in PMIPv6-based NEMO. The scheme consists of two parts: the first part is an inter domain or wired Internet part. The other is an intra part of nested mobile networks. In the inter-domain part, single IP-in-IP tunnel is created by connecting an innermost entry point with an outermost exit point in original multi-tunnels. As the same way used in the inter-domain part, single IP-in-IP tunnel is created from the outermost exit point and an innermost exit point in original multi-tunnels. In the proposed scheme, IP-in-IP encapsulated packets are forwarded using host-based routing without modifying the outer header. The information to compress multi-tunnels is piggybacked at the PMIPv6 signaling.
Developing route optimization based pmi pv6 testbed for reliable packet trans...redpel dot com
This document proposes a scheme to solve the out-of-sequence problem that can occur when route optimization is supported in Proxy Mobile IPv6 (PMIPv6). The scheme uses additional packet sequence numbers and time information when the out-of-sequence problem occurs. The performance of the proposed scheme is evaluated using a reliable packet transmission testbed and is compared to existing RO-supported PMIPv6 and an out-of-sequence time period scheme. Experimental results show that the proposed scheme prevents most out-of-sequence problems by using sequence numbers, while also reducing buffering costs compared to other schemes.
Optimization of IP Networks in Various Hybrid IGP/MPLS Routing SchemesEM Legacy
This document discusses optimization of IP networks using hybrid IGP/MPLS routing schemes. It proposes a heuristic approach using genetic algorithms to optimize network performance metrics like utilization and hop count while minimizing the number of label switched paths (LSPs). The document presents models for different hybrid routing approaches, a problem formulation, and results from applying the genetic algorithm approach to a case study network.
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMijcsit
In this paper, we propose a new traffic flow model of the Long Term Evaluation (LTE) network for the Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Here only one Evolve Node B (eNB) nearest to the Mobility Management Entity (MME) and Serving Gateway (S-GW) will use the S1 link to
bridge the E-UTRAN and Evolved Packet Core (EPC). All the eNBs of a tracking area will be connected to each other by the X2 link. Determination of capacity of a links of such a network is a challenging job since each node offers its own traffic and at the same time conveys traffic of other nodes. In this paper, we apply maximum flow algorithm including superposition theorem to solve the traffic flow of radio network. Using the total flow per subcarrier, a new traffic model is also developed in the paper. The relation among the traffic parameters: ‘blocking probability’, ‘offered traffic’, ‘instantaneous capacity’, ‘average holding
time’, and ‘number of users’ are shown graphically under both QPSK and 16-QAM. The concept of the network will be helpful to improve the SINR of the received signal ofeNBslocated long distance relative to MME/S-GW.
Performance Analysis of Mesh-based NoC’s on Routing Algorithms IJECEIAES
The advent of System-on-Chip (SoCs), has brought about a need to increase the scale of multi-core chip networks. Bus Based communications have proved to be limited in terms of performance and ease of scalability, the solution to both bus – based and Point-to-Point (P2P) communication systems is to use a communication infrastructure called Network-on-Chip (NoC). Performance of NoC depends on various factors such as network topology, routing strategy and switching technique and traffic patterns. In this paper, we have taken the initiative to compile together a comparative analysis of different Network on Chip infrastructures based on the classification of routing algorithm, switching technique, and traffic patterns. The goal is to show how varied combinations of the three factors perform differently based on the size of the mesh network, using NOXIM, an open source SystemC Simulator of mesh-based NoC. The analysis has shown tenable evidence highlighting the novelty of XY routing algorithm.
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
This document proposes a new channel assignment method called ODCAM that aims to increase throughput and minimize delay in multi-channel multi-radio wireless mesh networks. ODCAM uses a channel diversity mechanism to select new channels along the path from source to destination. It stores channel information in a Channel Diversity Table. Simulation results show that ODCAM combined with the HWMP routing protocol increases average throughput by 12.78% and decreases average end-to-end delay compared to a hybrid channel assignment approach.
Some of the key driving forces behind the transition from the UMTS based cellular system to the Long Term Evolution Advanced (LTE-A) are to improve the mean and the cell-edge throughput, improve the user fairness, and improve the quality of service (QoS) satisfaction for all users. In the latter system, relays appear as one of the most prominent enabler for improving the cell-edge user experience while increasing the system’s fairness.
In this white paper, we present the basics of relay deployments in LTE-A networks. Moreover, we analyze resource allocation problem for Relay Nodes (RN) deployments and present some of the solutions for improvement in system resource usage and QoS satisfaction. Afterwards, we introduce the capabilities of NOMOR’s LTE-A system level simulator and evaluate the performance of LTE-A relay systems under the described solutions.
This document proposes an improved position-based power aware routing algorithm for mobile ad-hoc networks. It introduces using a weighted metric of remaining battery power, speed, and distance of nodes to determine routes. The existing MFR (Most Forward within Radius) algorithm does not consider factors like battery power and speed differences, which can lead to unreliable communication or packet loss. The proposed algorithm uses a weighted combination of distance, velocity, and battery power metrics to select routes, aiming to balance load, increase network lifetime, and improve network performance compared to MFR. Simulation results showed the proposed algorithm reduces packet loss and increases throughput compared to MFR.
This document summarizes a research paper that proposes a new Position Based Opportunistic Routing Protocol (POR) to improve reliable data delivery in mobile ad hoc networks. Existing geographic routing protocols have issues with route failures and delays in discovering new routes when nodes move. The proposed POR protocol selects multiple forwarding candidate nodes to opportunistically forward packets. If the primary forwarder fails, backup candidates can forward packets to avoid transmission interruptions. Simulation results show the POR protocol has lower delay and higher packet delivery ratio compared to existing protocols.
Developing route optimization based pmi pv6 testbed for reliable packet trans...redpel dot com
This document proposes a scheme to solve the out-of-sequence problem that can occur when route optimization is supported in Proxy Mobile IPv6 (PMIPv6). The scheme uses additional packet sequence numbers and time information when the out-of-sequence problem occurs. The performance of the proposed scheme is evaluated using a reliable packet transmission testbed and is compared to existing RO-supported PMIPv6 and an out-of-sequence time period scheme. Experimental results show that the proposed scheme prevents most out-of-sequence problems by using sequence numbers, while also reducing buffering costs compared to other schemes.
Optimization of IP Networks in Various Hybrid IGP/MPLS Routing SchemesEM Legacy
This document discusses optimization of IP networks using hybrid IGP/MPLS routing schemes. It proposes a heuristic approach using genetic algorithms to optimize network performance metrics like utilization and hop count while minimizing the number of label switched paths (LSPs). The document presents models for different hybrid routing approaches, a problem formulation, and results from applying the genetic algorithm approach to a case study network.
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMijcsit
In this paper, we propose a new traffic flow model of the Long Term Evaluation (LTE) network for the Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Here only one Evolve Node B (eNB) nearest to the Mobility Management Entity (MME) and Serving Gateway (S-GW) will use the S1 link to
bridge the E-UTRAN and Evolved Packet Core (EPC). All the eNBs of a tracking area will be connected to each other by the X2 link. Determination of capacity of a links of such a network is a challenging job since each node offers its own traffic and at the same time conveys traffic of other nodes. In this paper, we apply maximum flow algorithm including superposition theorem to solve the traffic flow of radio network. Using the total flow per subcarrier, a new traffic model is also developed in the paper. The relation among the traffic parameters: ‘blocking probability’, ‘offered traffic’, ‘instantaneous capacity’, ‘average holding
time’, and ‘number of users’ are shown graphically under both QPSK and 16-QAM. The concept of the network will be helpful to improve the SINR of the received signal ofeNBslocated long distance relative to MME/S-GW.
Performance Analysis of Mesh-based NoC’s on Routing Algorithms IJECEIAES
The advent of System-on-Chip (SoCs), has brought about a need to increase the scale of multi-core chip networks. Bus Based communications have proved to be limited in terms of performance and ease of scalability, the solution to both bus – based and Point-to-Point (P2P) communication systems is to use a communication infrastructure called Network-on-Chip (NoC). Performance of NoC depends on various factors such as network topology, routing strategy and switching technique and traffic patterns. In this paper, we have taken the initiative to compile together a comparative analysis of different Network on Chip infrastructures based on the classification of routing algorithm, switching technique, and traffic patterns. The goal is to show how varied combinations of the three factors perform differently based on the size of the mesh network, using NOXIM, an open source SystemC Simulator of mesh-based NoC. The analysis has shown tenable evidence highlighting the novelty of XY routing algorithm.
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
This document proposes a new channel assignment method called ODCAM that aims to increase throughput and minimize delay in multi-channel multi-radio wireless mesh networks. ODCAM uses a channel diversity mechanism to select new channels along the path from source to destination. It stores channel information in a Channel Diversity Table. Simulation results show that ODCAM combined with the HWMP routing protocol increases average throughput by 12.78% and decreases average end-to-end delay compared to a hybrid channel assignment approach.
Some of the key driving forces behind the transition from the UMTS based cellular system to the Long Term Evolution Advanced (LTE-A) are to improve the mean and the cell-edge throughput, improve the user fairness, and improve the quality of service (QoS) satisfaction for all users. In the latter system, relays appear as one of the most prominent enabler for improving the cell-edge user experience while increasing the system’s fairness.
In this white paper, we present the basics of relay deployments in LTE-A networks. Moreover, we analyze resource allocation problem for Relay Nodes (RN) deployments and present some of the solutions for improvement in system resource usage and QoS satisfaction. Afterwards, we introduce the capabilities of NOMOR’s LTE-A system level simulator and evaluate the performance of LTE-A relay systems under the described solutions.
This document proposes an improved position-based power aware routing algorithm for mobile ad-hoc networks. It introduces using a weighted metric of remaining battery power, speed, and distance of nodes to determine routes. The existing MFR (Most Forward within Radius) algorithm does not consider factors like battery power and speed differences, which can lead to unreliable communication or packet loss. The proposed algorithm uses a weighted combination of distance, velocity, and battery power metrics to select routes, aiming to balance load, increase network lifetime, and improve network performance compared to MFR. Simulation results showed the proposed algorithm reduces packet loss and increases throughput compared to MFR.
This document summarizes a research paper that proposes a new Position Based Opportunistic Routing Protocol (POR) to improve reliable data delivery in mobile ad hoc networks. Existing geographic routing protocols have issues with route failures and delays in discovering new routes when nodes move. The proposed POR protocol selects multiple forwarding candidate nodes to opportunistically forward packets. If the primary forwarder fails, backup candidates can forward packets to avoid transmission interruptions. Simulation results show the POR protocol has lower delay and higher packet delivery ratio compared to existing protocols.
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...ijwmn
This article investigates mobility load balancing (MLB) algorithm implementation through network
simulator (ns-3) in long term evolution (LTE) systems employing orthogonal frequency division multiple
access (OFDMA) for downlink (DL) data transmission. MLB is introduced by the third generation
partnership project (3GPP) as a key target of LTE self-organizing networks (SONs) [1]. Our contribution
is twofold. First, we implemented elementary procedures (EPs) related to load management (LM) function
of the X2-application protocol (X2AP) as specified in TS 136.423 [2]. We particularly focused on EPs
’Resource Status Reporting Initiation Procedure’ and 'Resource Status Reporting Procedure’. Second, we
implemented a MLB based adaptive handover (HO) algorithm enabling to configure adaptively HO
hysteresis threshold for each neighbouring cell, of an overloaded cell, according to its current load
information. Numerical results show how, through suitable simulation scenarios, MLB enables enhancing
network performance in terms of overall throughput, packet loss ratio (PLR) and fairness without incurring
HO overhead.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improved data efficiency of programmable arbiter based on chip permutation ne...EditorIJAERD
The document describes a proposed improved on-chip permutation network (OCP network) for multiprocessor system-on-chips (MPSoCs) that supports guaranteed traffic permutation. The network employs a pipelined circuit-switching approach combined with a dynamic path-setup scheme under a three-stage Clos network topology. A programmable arbiter priority logic is used to improve data transfer efficiency by providing three priority logics - fixed, round robin, and dynamic - that can be selected according to priority requirements. The design is implemented on an FPGA and simulation results and synthesis reports indicate the proposed OCP network improves power, delay, and data efficiency compared to existing systems.
This document summarizes a research paper that proposes improvements to the Temporally Ordered Routing Algorithm (TORA) routing protocol for mobile ad hoc networks (MANETs). The paper discusses challenges with TORA related to routing overhead and accuracy in large MANETs. It proposes combining TORA with a clustering technique to select certain nodes as cluster heads to reduce routing information maintenance and optimize routing in large networks. The clustering aims to create a backbone of routes between cluster heads and gateways to improve efficiency. The paper evaluates TORA and the modified TORA with clustering through network simulations to analyze performance metrics like packet delivery ratio and overhead.
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSIJCNCJournal
This document analyzes the bit error rate (BER) of two-user power-domain non-orthogonal multiple access (NOMA) systems using successive interference cancellation receivers over Rayleigh fading channels. It derives closed-form expressions for the BER in single-input single-output and multiple-input multiple-output NOMA systems. The analysis considers two categories of multiuser superposition transmission and verifies the analytical results through Monte Carlo simulation.
Haqr the hierarchical ant based qos aware on demand routing for manetscsandit
A Mobile Ad Hoc Network (MANET) is a collection of wireless mobile devices with no pre
existing infrastructure or centralized control. Supporting QoS during routing is a very
challenging task. Clustering is an effective method for resource management regarding network
performance, routing protocol design, QoS etc. In real time various types of nodes with different
computing and transmission power, different rolls and different mobility pattern may exist.
Hierarchical routing provides routing through this kind of heterogeneous nodes. In this paper,
HAQR, a novel ant based QoS aware routing is proposed on a three level hierarchical cluster
based topology in MANET which will be more scalable and efficient compared to flat
architecture and will give better throughput.
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
A new clustering technique based on replication for MANET routing protocolsTELKOMNIKA JOURNAL
The cluster head nodes in most mobile ad hoc networks (MANET) clustering protocols take on an extraordinary role in managing routing information. The reliability, efficiency and scalability of the clustering in MANET will ultimately be dramatically impacted. In this work we establish a new approach to form the clusters in MANET called the square cluster-based routing protocol (SCBRP). That protocol is based on the theory of replication. The goal of the protocol is to achieve reliability, availability and scalability with in the MANET. The proposed protocol is evaluated by caring the performance analysis using the NS-3 simulator. The performance shows 50% improvementin data delivering ratio in large network size, also shows an improvement in network stability and availability which is reflected in energy consumption measurements and increase in the system lifetime to 20%.
This document summarizes a research paper that proposes a distributed polar transmission system for frequency selective fading channels in a MIMO-OFDM relay communication system. The system uses polar coding at the source and relay nodes to provide higher reliability than conventional decode-and-forward or amplify-and-forward relay schemes. The system divides the polarizing relay channels into a down-polarizing system and an up-polarizing system. Analysis of the bit error rate performance indicates that the polar system can increase symmetric capacity under low-complexity successive interference cancellation decoding by exploiting channel polarization with OFDM symbol combining and splitting over frequency selective fading channels.
This document summarizes research on multi-numerology 5G new radio (NR) systems. It begins with an introduction comparing the flexibility of NR and LTE, noting that NR allows simultaneous use of multiple numerologies. Section II further describes differences in flexibility between NR and LTE regarding 3GPP standards. Section III then outlines potential research opportunities for improving multi-numerology systems, such as addressing interference between non-orthogonal numerologies. Finally, Section IV indicates that simulation results on inter-numerology interference will be presented as a function of guard allocation and parameters.
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Eiko Seidel
This document discusses heterogeneous LTE networks and inter-cell interference coordination (ICIC). It begins by explaining that initial LTE networks consisted of homogeneous macro cell deployments but that heterogeneous networks using smaller pico and femto cells are now being implemented to improve capacity and coverage. This introduces new interference challenges. The document then outlines various ICIC methods like frequency reuse and power control techniques that can help mitigate interference. It provides simulation results showing the benefits of heterogeneous networks and techniques like range expansion.
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
This document proposes an improved AODV routing protocol for mobile ad hoc networks (MANETs) that considers both node load and routing delay when selecting routes. It calculates a "route weight" based on the average load and delay of the nodes along each potential path from source to destination. The path with the lowest route weight is then selected for routing to help balance traffic loads across the network and minimize delays. Simulation results showed this approach can dynamically balance traffic allocation between paths and optimize resource utilization in the MANET.
Performance Analysis of MIMO-LTE for MQAM over Fading ChannelsIOSRJECE
LTE (Long Term Evolution) is a 3GPP (Third Generation Partnership Project) wireless standards which uses the standard OFDMA (Orthogonal Frequency Division Multiple Access) modulation, MU-MIMO (Multiuser Multiple Input Multiple Output) technology and different multipath fading models. LTE uses the spectrum more efficiently to deliver high speed data. This paper characterizes the downlink performance of LTE. The MIMO technology which provides high data rate applications to the users made a breakthrough in wireless communication and is defined in the LTE standard. The performance is characterized in terms of BER (Bit Error Rate). In this paper the LTE system is modelled and simulated using MATLAB and the BER for 2×2 and 4×4 MIMO-LTE using 16QAM and 64QAM modulation schemes for Rayleigh fading environment are obtained against different SNR values.
Multi-layer heterogeneous network layout including small cell base stations are considered to be the key to further enhancements of the spectral efficiency achieved in mobile communication networks. It has been recognized that inter-cell interference has become the limiting factor when trying to achieve not only high average user satisfaction, but a high degree of satisfaction for as many users as possible. Therefore, inter-cell interference coordination (ICIC) lies in the focus of researchers defining next generation mobile communication standards, such as LTE-A.
Building upon [1], this paper provides an overview over the background calling for ICIC in heterogeneous LTE-A networks. It outlines techniques standardized in Rel. 10 of LTE-A, discusses them showing their benefits and limitations by means of system-level simulations and motivates the importance of self optimizing network (SON) procedures for ICIC in LTE-A.
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...IJCNCJournal
Mobile Ad hoc Network (MANET) is a distributed, infrastructure-less and decentralized network. A routing
protocol in MANET is used to find routes between mobile nodes to facilitate communication within the
network. Numerous routing protocols have been proposed for MANET. Those routing protocols are
designed to adaptively accommodate for dynamic unpredictable changes in network's topology. The mobile
nodes in MANET are often powered by limited batteries and network lifetime relies heavily on the energy
consumption of nodes. In consequence, the lack of a mobile node can lead to network partitioning. In this
paper we analyse, evaluate and measure the energy efficiency of three prominent MANET routing protocols
namely DSR, AODV and OLSR in addition to modified protocols. These routing protocols follow the
reactive and the proactive routing schemes. A discussion and comparison highlighting their particular
merits and drawbacks are also presented. Evaluation study and simulations are performed using NS-2 and
its accompanying tools for analysis and investigation of results.
Route Optimization (RO) in Mobile Internet Protocol
Version Six (MIPv6) is a technique that enables a
Mobile Node (MN) and a Corresponding Node (CN)
to communicate directly by bypassing the Home Agent
(HA). RO is usually faced with the problem of Internet
Protocol (IP) multilayer tunnels due to pinball or suboptimal
routing. The generic consideration in
designing route optimization scheme is to use
minimum signaling information in the IPv6 packet
header. In order for optimization to take place in
MIPv6, a protocol called route optimization protocol
must be introduced. Route optimization protocol is
used basically to improve performance. Also RO can
also be described as a mechanism that eliminates the
inefficiency in tunneling of packets from MRs to their
HA before being sent to CNs over the Internet.
However, Network Mobility (NEMO) can be described
as a network whose point of attachment to the Internet
varies with time.
The tradeoff between the two protocols can provide a
significant impact on the networks. Furthermore, one
potential choice of selecting any of the protocols can
increase or decrease the degree of application in used.
The tradeoff in offloading solution can vary from
mobile access network and core mobile network.
Optimizing traffic breakout and support for mobility
are paramount to service operators. The study focused
on the development and evaluation of an experimental
test bed of route optimization in MIPv6 and
NEMO.The tradeoff between the two protocols was
examined. The results of the experimental test bed
shows the benefit of next generation of Internet
system, especially for real-time applications that
need to provide seamless connection with low handoff
latency.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
Here is a synthesis essay on key aspects of IEEE 802.11n:
IEEE 802.11n made significant improvements to wireless networking standards that dramatically increased throughput. One of the most impactful changes was the introduction of MIMO (Multiple Input Multiple Output) technology, which utilizes multiple antennas to enhance signal quality and throughput. By transmitting multiple data streams simultaneously through spatially separated antennas, MIMO allows devices to take advantage of multipath propagation to receive more data per transmission.
Another major enhancement in 802.11n was the use of frame aggregation. Earlier 802.11 standards treated each packet individually, requiring overhead for each transmission. Frame aggregation allows multiple packets to be bundled into a single transmission, reducing overhead. This
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document compares the performance of HS-TCP and TCP in a hierarchical mobile IPv6 (HMIPv6) network. It summarizes a simulation conducted using the Network Simulator 2 (NS-2) to model an HMIPv6 topology with one home agent, two foreign agents, one mobile node, and one correspondent node. The simulation measured throughput as the mobile node moved between the foreign agents while communicating with the correspondent node. The results showed that HS-TCP had better throughput than TCP, with HS-TCP performing 32-96% better depending on the bandwidth level.
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of
mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host
node and a router so that all nodes can be source plus forwarders of traffic. The task of finding routes
in Mobile Ad-hoc Network (MANET) is an important factor in determining the efficiency of any
MANET routing protocols. This paper describes about the basic idea of different routing protocols
and its efficient use in MANET. There are several routing protocols based on UNICAST and
MULTICAST. This paper will conclude the main characteristics of these protocols with comparison
and suggest the best suited protocol for particular topology or network.
Analysis of Multicast Routing Protocols: Puma and OdmrpIJMER
This document summarizes and compares two multicast routing protocols for mobile ad hoc networks: PUMA and ODMRP. It begins with an introduction to ad hoc networks and multicast routing. It then provides details on PUMA, a receiver-initiated protocol where receivers elect a core node to reduce flooding. PUMA establishes a mesh structure along shortest paths from the core to group members. ODMRP is a mesh-based protocol that maintains multiple paths between sources and receivers through periodic control messages. It is more resilient to failures but has higher overhead than PUMA. The document analyzes the algorithms, advantages, and disadvantages of each protocol.
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...cscpconf
Intelligent transportation system (ITS) consists of moving networks, where the network mobility
(NEMO) basic support is adopted as a mobility management protocol for moving networks.
Even though NEMO basic support (NBS) provides a basic mobility support for ITS systems, the
mobile routers (MR) need to participate in the mobility signaling. In the literature, network
based mobility management such as Proxy Mobile IPv6 (PMIPv6) based solutions are explored
for mobility management. However, the signaling overhead incurred due to this approach is still
need to be optimized. In this paper, we introduce a bulk binding update solution for the
registration of MR with local mobility anchor (LMA) in moving networks. The bulk binding
update procedure uses a group identifier for group of MRs during the periodic binding update
process which reduces the signaling overhead compared with the basic PMIPv6 based
approach. The numerical results demonstrate that the proposed approach gives a better
performance in terms of signaling overhead and handover latency than NBS, and simplePIMPv6 based solutions.
MOBILITY LOAD BALANCING BASED ADAPTIVE HANDOVER IN DOWNLINK LTE SELF-ORGANIZI...ijwmn
This article investigates mobility load balancing (MLB) algorithm implementation through network
simulator (ns-3) in long term evolution (LTE) systems employing orthogonal frequency division multiple
access (OFDMA) for downlink (DL) data transmission. MLB is introduced by the third generation
partnership project (3GPP) as a key target of LTE self-organizing networks (SONs) [1]. Our contribution
is twofold. First, we implemented elementary procedures (EPs) related to load management (LM) function
of the X2-application protocol (X2AP) as specified in TS 136.423 [2]. We particularly focused on EPs
’Resource Status Reporting Initiation Procedure’ and 'Resource Status Reporting Procedure’. Second, we
implemented a MLB based adaptive handover (HO) algorithm enabling to configure adaptively HO
hysteresis threshold for each neighbouring cell, of an overloaded cell, according to its current load
information. Numerical results show how, through suitable simulation scenarios, MLB enables enhancing
network performance in terms of overall throughput, packet loss ratio (PLR) and fairness without incurring
HO overhead.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improved data efficiency of programmable arbiter based on chip permutation ne...EditorIJAERD
The document describes a proposed improved on-chip permutation network (OCP network) for multiprocessor system-on-chips (MPSoCs) that supports guaranteed traffic permutation. The network employs a pipelined circuit-switching approach combined with a dynamic path-setup scheme under a three-stage Clos network topology. A programmable arbiter priority logic is used to improve data transfer efficiency by providing three priority logics - fixed, round robin, and dynamic - that can be selected according to priority requirements. The design is implemented on an FPGA and simulation results and synthesis reports indicate the proposed OCP network improves power, delay, and data efficiency compared to existing systems.
This document summarizes a research paper that proposes improvements to the Temporally Ordered Routing Algorithm (TORA) routing protocol for mobile ad hoc networks (MANETs). The paper discusses challenges with TORA related to routing overhead and accuracy in large MANETs. It proposes combining TORA with a clustering technique to select certain nodes as cluster heads to reduce routing information maintenance and optimize routing in large networks. The clustering aims to create a backbone of routes between cluster heads and gateways to improve efficiency. The paper evaluates TORA and the modified TORA with clustering through network simulations to analyze performance metrics like packet delivery ratio and overhead.
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSIJCNCJournal
This document analyzes the bit error rate (BER) of two-user power-domain non-orthogonal multiple access (NOMA) systems using successive interference cancellation receivers over Rayleigh fading channels. It derives closed-form expressions for the BER in single-input single-output and multiple-input multiple-output NOMA systems. The analysis considers two categories of multiuser superposition transmission and verifies the analytical results through Monte Carlo simulation.
Haqr the hierarchical ant based qos aware on demand routing for manetscsandit
A Mobile Ad Hoc Network (MANET) is a collection of wireless mobile devices with no pre
existing infrastructure or centralized control. Supporting QoS during routing is a very
challenging task. Clustering is an effective method for resource management regarding network
performance, routing protocol design, QoS etc. In real time various types of nodes with different
computing and transmission power, different rolls and different mobility pattern may exist.
Hierarchical routing provides routing through this kind of heterogeneous nodes. In this paper,
HAQR, a novel ant based QoS aware routing is proposed on a three level hierarchical cluster
based topology in MANET which will be more scalable and efficient compared to flat
architecture and will give better throughput.
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
A new clustering technique based on replication for MANET routing protocolsTELKOMNIKA JOURNAL
The cluster head nodes in most mobile ad hoc networks (MANET) clustering protocols take on an extraordinary role in managing routing information. The reliability, efficiency and scalability of the clustering in MANET will ultimately be dramatically impacted. In this work we establish a new approach to form the clusters in MANET called the square cluster-based routing protocol (SCBRP). That protocol is based on the theory of replication. The goal of the protocol is to achieve reliability, availability and scalability with in the MANET. The proposed protocol is evaluated by caring the performance analysis using the NS-3 simulator. The performance shows 50% improvementin data delivering ratio in large network size, also shows an improvement in network stability and availability which is reflected in energy consumption measurements and increase in the system lifetime to 20%.
This document summarizes a research paper that proposes a distributed polar transmission system for frequency selective fading channels in a MIMO-OFDM relay communication system. The system uses polar coding at the source and relay nodes to provide higher reliability than conventional decode-and-forward or amplify-and-forward relay schemes. The system divides the polarizing relay channels into a down-polarizing system and an up-polarizing system. Analysis of the bit error rate performance indicates that the polar system can increase symmetric capacity under low-complexity successive interference cancellation decoding by exploiting channel polarization with OFDM symbol combining and splitting over frequency selective fading channels.
This document summarizes research on multi-numerology 5G new radio (NR) systems. It begins with an introduction comparing the flexibility of NR and LTE, noting that NR allows simultaneous use of multiple numerologies. Section II further describes differences in flexibility between NR and LTE regarding 3GPP standards. Section III then outlines potential research opportunities for improving multi-numerology systems, such as addressing interference between non-orthogonal numerologies. Finally, Section IV indicates that simulation results on inter-numerology interference will be presented as a function of guard allocation and parameters.
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Eiko Seidel
This document discusses heterogeneous LTE networks and inter-cell interference coordination (ICIC). It begins by explaining that initial LTE networks consisted of homogeneous macro cell deployments but that heterogeneous networks using smaller pico and femto cells are now being implemented to improve capacity and coverage. This introduces new interference challenges. The document then outlines various ICIC methods like frequency reuse and power control techniques that can help mitigate interference. It provides simulation results showing the benefits of heterogeneous networks and techniques like range expansion.
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
This document proposes an improved AODV routing protocol for mobile ad hoc networks (MANETs) that considers both node load and routing delay when selecting routes. It calculates a "route weight" based on the average load and delay of the nodes along each potential path from source to destination. The path with the lowest route weight is then selected for routing to help balance traffic loads across the network and minimize delays. Simulation results showed this approach can dynamically balance traffic allocation between paths and optimize resource utilization in the MANET.
Performance Analysis of MIMO-LTE for MQAM over Fading ChannelsIOSRJECE
LTE (Long Term Evolution) is a 3GPP (Third Generation Partnership Project) wireless standards which uses the standard OFDMA (Orthogonal Frequency Division Multiple Access) modulation, MU-MIMO (Multiuser Multiple Input Multiple Output) technology and different multipath fading models. LTE uses the spectrum more efficiently to deliver high speed data. This paper characterizes the downlink performance of LTE. The MIMO technology which provides high data rate applications to the users made a breakthrough in wireless communication and is defined in the LTE standard. The performance is characterized in terms of BER (Bit Error Rate). In this paper the LTE system is modelled and simulated using MATLAB and the BER for 2×2 and 4×4 MIMO-LTE using 16QAM and 64QAM modulation schemes for Rayleigh fading environment are obtained against different SNR values.
Multi-layer heterogeneous network layout including small cell base stations are considered to be the key to further enhancements of the spectral efficiency achieved in mobile communication networks. It has been recognized that inter-cell interference has become the limiting factor when trying to achieve not only high average user satisfaction, but a high degree of satisfaction for as many users as possible. Therefore, inter-cell interference coordination (ICIC) lies in the focus of researchers defining next generation mobile communication standards, such as LTE-A.
Building upon [1], this paper provides an overview over the background calling for ICIC in heterogeneous LTE-A networks. It outlines techniques standardized in Rel. 10 of LTE-A, discusses them showing their benefits and limitations by means of system-level simulations and motivates the importance of self optimizing network (SON) procedures for ICIC in LTE-A.
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...IJCNCJournal
Mobile Ad hoc Network (MANET) is a distributed, infrastructure-less and decentralized network. A routing
protocol in MANET is used to find routes between mobile nodes to facilitate communication within the
network. Numerous routing protocols have been proposed for MANET. Those routing protocols are
designed to adaptively accommodate for dynamic unpredictable changes in network's topology. The mobile
nodes in MANET are often powered by limited batteries and network lifetime relies heavily on the energy
consumption of nodes. In consequence, the lack of a mobile node can lead to network partitioning. In this
paper we analyse, evaluate and measure the energy efficiency of three prominent MANET routing protocols
namely DSR, AODV and OLSR in addition to modified protocols. These routing protocols follow the
reactive and the proactive routing schemes. A discussion and comparison highlighting their particular
merits and drawbacks are also presented. Evaluation study and simulations are performed using NS-2 and
its accompanying tools for analysis and investigation of results.
Route Optimization (RO) in Mobile Internet Protocol
Version Six (MIPv6) is a technique that enables a
Mobile Node (MN) and a Corresponding Node (CN)
to communicate directly by bypassing the Home Agent
(HA). RO is usually faced with the problem of Internet
Protocol (IP) multilayer tunnels due to pinball or suboptimal
routing. The generic consideration in
designing route optimization scheme is to use
minimum signaling information in the IPv6 packet
header. In order for optimization to take place in
MIPv6, a protocol called route optimization protocol
must be introduced. Route optimization protocol is
used basically to improve performance. Also RO can
also be described as a mechanism that eliminates the
inefficiency in tunneling of packets from MRs to their
HA before being sent to CNs over the Internet.
However, Network Mobility (NEMO) can be described
as a network whose point of attachment to the Internet
varies with time.
The tradeoff between the two protocols can provide a
significant impact on the networks. Furthermore, one
potential choice of selecting any of the protocols can
increase or decrease the degree of application in used.
The tradeoff in offloading solution can vary from
mobile access network and core mobile network.
Optimizing traffic breakout and support for mobility
are paramount to service operators. The study focused
on the development and evaluation of an experimental
test bed of route optimization in MIPv6 and
NEMO.The tradeoff between the two protocols was
examined. The results of the experimental test bed
shows the benefit of next generation of Internet
system, especially for real-time applications that
need to provide seamless connection with low handoff
latency.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
Here is a synthesis essay on key aspects of IEEE 802.11n:
IEEE 802.11n made significant improvements to wireless networking standards that dramatically increased throughput. One of the most impactful changes was the introduction of MIMO (Multiple Input Multiple Output) technology, which utilizes multiple antennas to enhance signal quality and throughput. By transmitting multiple data streams simultaneously through spatially separated antennas, MIMO allows devices to take advantage of multipath propagation to receive more data per transmission.
Another major enhancement in 802.11n was the use of frame aggregation. Earlier 802.11 standards treated each packet individually, requiring overhead for each transmission. Frame aggregation allows multiple packets to be bundled into a single transmission, reducing overhead. This
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document compares the performance of HS-TCP and TCP in a hierarchical mobile IPv6 (HMIPv6) network. It summarizes a simulation conducted using the Network Simulator 2 (NS-2) to model an HMIPv6 topology with one home agent, two foreign agents, one mobile node, and one correspondent node. The simulation measured throughput as the mobile node moved between the foreign agents while communicating with the correspondent node. The results showed that HS-TCP had better throughput than TCP, with HS-TCP performing 32-96% better depending on the bandwidth level.
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of
mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host
node and a router so that all nodes can be source plus forwarders of traffic. The task of finding routes
in Mobile Ad-hoc Network (MANET) is an important factor in determining the efficiency of any
MANET routing protocols. This paper describes about the basic idea of different routing protocols
and its efficient use in MANET. There are several routing protocols based on UNICAST and
MULTICAST. This paper will conclude the main characteristics of these protocols with comparison
and suggest the best suited protocol for particular topology or network.
Analysis of Multicast Routing Protocols: Puma and OdmrpIJMER
This document summarizes and compares two multicast routing protocols for mobile ad hoc networks: PUMA and ODMRP. It begins with an introduction to ad hoc networks and multicast routing. It then provides details on PUMA, a receiver-initiated protocol where receivers elect a core node to reduce flooding. PUMA establishes a mesh structure along shortest paths from the core to group members. ODMRP is a mesh-based protocol that maintains multiple paths between sources and receivers through periodic control messages. It is more resilient to failures but has higher overhead than PUMA. The document analyzes the algorithms, advantages, and disadvantages of each protocol.
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...cscpconf
Intelligent transportation system (ITS) consists of moving networks, where the network mobility
(NEMO) basic support is adopted as a mobility management protocol for moving networks.
Even though NEMO basic support (NBS) provides a basic mobility support for ITS systems, the
mobile routers (MR) need to participate in the mobility signaling. In the literature, network
based mobility management such as Proxy Mobile IPv6 (PMIPv6) based solutions are explored
for mobility management. However, the signaling overhead incurred due to this approach is still
need to be optimized. In this paper, we introduce a bulk binding update solution for the
registration of MR with local mobility anchor (LMA) in moving networks. The bulk binding
update procedure uses a group identifier for group of MRs during the periodic binding update
process which reduces the signaling overhead compared with the basic PMIPv6 based
approach. The numerical results demonstrate that the proposed approach gives a better
performance in terms of signaling overhead and handover latency than NBS, and simplePIMPv6 based solutions.
The document discusses network mobility and the Network Mobility Basic Support Protocol (NEMO BSP). It provides an overview of NEMO BSP, explaining that it enables the movement of an entire network attached to the Internet via a mobile router. It describes how NEMO BSP uses tunneling between the mobile router's care-of address and the home agent to maintain network connectivity as the mobile router changes location. Key aspects of NEMO BSP operation include encapsulation of packets and preservation of ongoing sessions for nodes within the mobile network.
Improvement in the mobility of mobile ipv6 based mobile networks using revers...ijmnct
Mobile IPv6 based Mobile Networks are becoming increasingly important with the widespread
popularity of wireless internet connectivity. For large networks, an extension, namely, the Hierarchical
Mobile IPv6 is used, which suffers from overloading of the Home Agent as every packet sent has to pass
through it and this produces a significant loss in performance. In this paper, a method to improve the
mobility using the fast handover of Mobile IPv6 (FMIPv6) and the Reverse Routing Header Protocol is
proposed. Simulation results at different packet intervals show that, the proposed scheme is able to
reduce the average delay and achieve an optimum level of throughput.
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingCSCJournals
Wireless backhaul has been received much attention as an enabler of future broadband mobile communication systems because it can reduce deployment cost of pico-cells, an essential part of high capacity system. A high performance network, high throughput, low average delay and low packet loss rate, is highly appreciated to sustain the increasing proliferation in multimedia transmissions. The critical issue reducing the performance of wireless backhaul is the interference occurred in the network due to simultaneous nodes transmissions. In this research, we propose a high performance wireless backhaul using the low interference sensitivity MIMO based nodes. MIMO transmission has a better BER performance over SISO one even with the same transmission rate and bandwidth, which means that MIMO can operate at lower SINR values than SISO and give the same performance. This MIMO robust performance against interference gives us a greater benefit when adopted as a wireless interface in wireless backhaul than SISO. These facts motivated us to use the IEEE 802.11n the current MIMO standard to design a MIMO based wireless backhaul. In addition and to justify our assumptions, we investigate the effect of MIMO channels correlation, a major drawback in MIMO transmission, upon the system performance, and prove the robustness of the scheme under different MIMO channels correlation values. After proving the effectiveness of MIMO as a wireless interface for wireless backhaul, we further improve the performance of this MIMO-backhaul using the high efficient Intermittent Periodic Transmit (IPT) forwarding protocol. IPT is a reduced interference packet forwarding protocol with a more efficient relay performance than conventional method in which packets are transmitted continuously form the source nodes. By using these two techniques (IEEE 802.11n (MIMO) + IPT), wireless backhaul nodes can meet more demanding communication requirements such as higher throughput, lower average delay, and lower packet dropping rate than those achieved by simply applying IEEE 802.11n to conventionally relayed backhaul. The proposed wireless backhaul will accelerate introduction of picocell based mobile communication systems.
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
This document discusses dynamic cluster-based adaptive gateway discovery mechanisms for integrating mobile ad hoc networks (MANETs) with the Internet. It begins by introducing the problem and outlines existing solutions. It then proposes a new architecture using dynamic clusters and mobile gateways. Key points of the proposed approach include dynamically adjusting the TTL value and periodicity of gateway advertisements based on network characteristics. The paper evaluates the approach through simulations in NS-2, finding it increases reliability and performance metrics like delivery ratio and delay. In conclusion, dynamic cluster-based gateways help provide reliable Internet access for MANET nodes with varying mobility.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
Investigating Multilayer Omega-Type Networks Operating with the Cut-Through T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
MM-PNEMO: a mathematical model to assess handoff delay and packet lossjournalBEEI
Wireless networks incorporate Mobile Nodes (MNs) that use wireless access networks to communicate. However, the communication among these MNs are not remained stable due to the poor network coverage during inter mobility. Moreover, the wireless nodes are typically small that results in resource-constrained. Thus, it is uphill to use algorithms having giant processing power or memory footprint. Accordingly, it is essential to check schemes consistently to evaluate the performance within the probable application scenario. To do so, numerical analysis could be a notable method to grasp the performance of mobility management schemes as well as the constraint of evolving mobility management solutions specifically for multi-interfaced MR in Proxy NEMO environment. This paper analyzes handoff performance by using a mathematical model of Multihoming-based scheme to support Mobility management in Proxy NEMO (MM-PNEMO) environment. Moreover, a comparative study has been made among the standard Network Mobility Basic Support Protocol (NEMO BSP), Proxy NEMO (PNEMO) and MM-PNEMO scheme respectively. The performance metrics estimated for these schemes are mainly handoff delay and packet loss. This paper also analysed the packet loss ratio and handoff gain as a function of cell radius, number of SMR and velocity respectively. It is apparent that, the MM-PNEMO scheme shows lower packet loss ratio (1%) compared to NEMO-BSP (11%) and P-NEMO (6%).
RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM CONCURRENT TRANSMISSIONSijwmn
The paper presents a Riverbed simulator implementation with both routing and medium access control
(MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs).
As one of the latest promising antenna techniques, MBSAs can achieve concurrent transmissions /
receptions in multiple directions/beams. Thus it can significantly improve the network throughput.
However, so far there is still no accurate network simulator that can measure the MBSA-based
routing/MAC protocol performance. In this paper, we describe the simulation models with the
implementation of MBSA antenna model in physical layer, MAC layer, and routing layer protocols, all in
Riverbed Modeler. We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and
multi-path pipe routing. We will analyze the network performance for those two scenarios and illustrate the
advantages of using MBSAs in wireless networks.
RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM CONCURRENT TRANSMISSIONSijwmn
The paper presents a Riverbed simulator implementation with both routing and medium access control
(MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs).
As one of the latest promising antenna techniques, MBSAs can achieve concurrent transmissions /
receptions in multiple directions/beams. Thus it can significantly improve the network throughput.
However, so far there is still no accurate network simulator that can measure the MBSA-based
routing/MAC protocol performance. In this paper, we describe the simulation models with the
implementation of MBSA antenna model in physical layer, MAC layer, and routing layer protocols, all in
Riverbed Modeler. We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and
multi-path pipe routing. We will analyze the network performance for those two scenarios and illustrate the
advantages of using MBSAs in wireless networks.
RIVERBED-BASED NETWORK MODELING FOR MULTI-BEAM CONCURRENT TRANSMISSIONSijwmn
The paper presents a Riverbed simulator implementation with both routing and medium access control (MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs). As one of the latest promising antenna techniques, MBSAs can achieve concurrent transmissions /
receptions in multiple directions/beams. Thus it can significantly improve the network throughput. However, so far there is still no accurate network simulator that can measure the MBSA-based
routing/MAC protocol performance. In this paper, we describe the simulation models with the implementation of MBSA antenna model in physical layer, MAC layer, and routing layer protocols, all in Riverbed Modeler. We will compare two routing scenarios, i.e., multi-hop diamond routing scenario and
multi-path pipe routing. We will analyze the network performance for those two scenarios and illustrate the advantages of using MBSAs in wireless networks.
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics, such as dynamic topology and limited resources. It then classifies routing protocols as either proactive (table-driven) or reactive (on-demand) and describes several examples of each type. Proactive protocols maintain up-to-date routing tables through periodic updates but incur more overhead. Reactive protocols discover routes on demand but add latency. The document provides details on popular protocols like DSDV, AODV, DSR and TORA, explaining their route discovery, maintenance and metrics.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics. It then classifies routing protocols into proactive (table-driven) and reactive (on-demand) categories. For each category, several representative protocols are described in detail, including DSDV, WRP, CGSR, DSR, AODV, ABR, SSA, and TORA. Their routing mechanisms and approaches to route discovery and maintenance are outlined. The document aims to provide an overview of major MANET routing protocols to help determine the most suitable ones for different network conditions.
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoTIJECEIAES
Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency. The bulk binding approaches were used to enhance the mobility signaling for MNs which are moving together from one MAG to another by exchanging a single bulk binding update message. However, in some cases there might be several MNs move at the same time but among different MAGs. In this paper, a bulk registration scheme based on the clustered sensor PMIPv6 architecture is proposed to reduce the mobility signaling cost by creating a single bulk message for all MNs attached to the cluster. Our mathematical results show that the proposed bulk scheme enhances the PMIPv6 performance by reducing the total handoff latency.
Similar to A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO (20)
Levelised Cost of Hydrogen (LCOH) Calculator ManualMassimo Talia
The aim of this manual is to explain the
methodology behind the Levelized Cost of
Hydrogen (LCOH) calculator. Moreover, this
manual also demonstrates how the calculator
can be used for estimating the expenses associated with hydrogen production in Europe
using low-temperature electrolysis considering different sources of electricity
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
Impartiality as per ISO /IEC 17025:2017 StandardMuhammadJazib15
This document provides basic guidelines for imparitallity requirement of ISO 17025. It defines in detial how it is met and wiudhwdih jdhsjdhwudjwkdbjwkdddddddddddkkkkkkkkkkkkkkkkkkkkkkkwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwioiiiiiiiiiiiii uwwwwwwwwwwwwwwwwhe wiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq gbbbbbbbbbbbbb owdjjjjjjjjjjjjjjjjjjjj widhi owqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq uwdhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhwqiiiiiiiiiiiiiiiiiiiiiiiiiiiiw0pooooojjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj whhhhhhhhhhh wheeeeeeee wihieiiiiii wihe
e qqqqqqqqqqeuwiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiqw dddddddddd cccccccccccccccv s w c r
cdf cb bicbsad ishd d qwkbdwiur e wetwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww w
dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffw
uuuuhhhhhhhhhhhhhhhhhhhhhhhhe qiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc ccccccccccccccccccccccccccccccccccc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuum
m
m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm m i
g i dijsd sjdnsjd ndjajsdnnsa adjdnawddddddddddddd uw
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
A Tunnel Compress Scheme for Multi-Tunneling in PMIPv6-based Nested NEMO
1. International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4, November 2010
DOI: 10.5121/ijwmn.2010.2405 60
A Tunnel Compress Scheme for Multi-Tunneling
in PMIPv6-based Nested NEMO
Min-Soo Woo1
, Hyo-Beom Lee2
, Youn-Hee Han3
and Sung-Gi Min4
1
Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea
2
Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea
3
School of Internet-Media, Korea University of Technology and Education, Cheon-An,
South Korea
4
Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea
e-mail: sgmin@korea.ac.kr
Abstract
In nested NEMO, a multi-tunneling causes a pinball routing problem. Several solutions proposed to
solve the pinball routing problem in NEMO BSP cannot be used at PMIPv6-based NEMO due to
different environment such as no route optimization with CN. We propose a tunnel compress scheme for
multi-tunneling in PMIPv6-based NEMO. The scheme consists of two parts: the first part is an inter-
domain or wired Internet part. The other is an intra part of nested mobile networks. In the inter-domain
part, single IP-in-IP tunnel is created by connecting an innermost entry point with an outermost exit
point in original multi-tunnels. As the same way used in the inter-domain part, single IP-in-IP tunnel is
created from the outermost exit point and an innermost exit point in original multi-tunnels. In the
proposed scheme, IP-in-IP encapsulated packets are forwarded using host-based routing without
modifying the outer header. The information to compress multi-tunnels is piggybacked at the PMIPv6
signaling.
Keywords
PMIPv6, NEMO, nested mobile networks, pinball routing problem
I.INTRODUCTION
With rapid adaptation of mobile devices, the need to be connected to Internet during traveling
has become high. Several transportations support the need and mobile networks become a kind
of common network environments. To support Network Mobility (NEMO), NEMO Basic
Support Protocol (NEMO BSP) [1] is proposed by IETF working group. NEMO BSP is based
on Mobile IPv6 (MIPv6) [2]. The access router on a moving vehicle is called a Mobile Router
(MR). The MR aggregates all traffic to MNs connected to the mobile network and it forwards
the aggregated traffic to the MR’s Home Agent (HA). A mobile network can be attached other
mobile network, and as such way multiple mobile networks can be nested. When mobile
networks are nested, NEMO BSP in each mobile network can operate independently. However,
multi-tunnels in nested mobile networks are created between Correspondent Node (CN) and
Mobile Node (MN) because each mobile network creates a tunnel. This multi-tunneling has two
problems. One is an encapsulation overhead. Whenever a tunneling is applied, all packets must
have additional header, which requires data shift in packet buffer and fragmentation of packets if
the size of packets is almost the same as that of Maximum Transfer Unit (MTU). The other is
2. International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4, November 2010
61
multiple packet forwarding, called a pinball routing problem [4], causing additional packet delay
and workload while packets are forwarded between HAs.
Previous schemes such as [5][6] were proposed to solve multi-tunneling problems. However,
these MIPv6-based schemes cannot be used at Proxy Mobile IPv6 (PMIPv6) [3] based on
NEMO. PMIPv6 does not provide Route Optimization (RO) scheme with a CN. A MN in
PMIPv6 does not participate in mobility signaling and does not have Care-of Address (CoA).
In this paper, we propose a Tunnel Compress Scheme (TCS) to solve multi-tunneling
problems at PMIPv6-based NEMO. The TCS reduces multiple tunneling overhead. Multiple
tunnels are partitioned into two parts. The first part is an inter-domain or wired Internet part, and
the second part is a wireless or intra part of nested mobile networks. The partitioning is done at
the outermost exit point of multi-tunnels. Fig. 1 shows two parts of PMIPv6-based NEMO
networks. In wired part, CN, LMAs and MAG4 are connected by wired cables. However, in
wireless part, MAGs and MN are wireless mobile nodes. In nested NEMO, the outermost exit
point acts as the first access gateway to wired Internet. In Fig. 1, the outermost exit point is
MAG4.
The TCS compresses the multi-tunnels between the innermost entry point and the outermost
exit point with the single IP-in-IP tunnel. Then, the packet forwarding from the outermost exit
point to the innermost exit point is done by host-based routing, which can be applicable to Local
Mobility Management (LMM) protocols. As PMIPv6 is one of LMM protocols and Mobile
Access Gateways (MAGs) forwards packets to MNs by host-based concepts, the host-based
routing can be easily integrated into PMIPv6 components.
I1.RELATED WORKS
Several schemes have been proposed to solve pinball routing problem. Reverse Routing
header (RRH) [5] defines a new routing header as extension header of IPv6. The routing header
records optimized path from a MN to a HA. In this approach, packets are forwarded to the MN
using source routing based on path information of the routing header. RRH creates only single
IP-in-IP tunnel, and forwards packets from MN’s HA to access router attached to nested mobile
networks. However, header modifications must be performed in every packet passed through the
tunnel. Furthermore, RRH has a security problem. To solve problems of RRH, Nested Path
Information (NPI) [7] was proposed. In NPI, nested path information is included in a Route
Advertisement (RA) message. If a MN receives this RA message, the MN immediately sends a
Figure 1.Pinball routing problem
3. International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4, November 2010
62
Binding Update (BU) message with nested path information to inform a HA. However, when
nested mobile networks move and are attached to another access router, new nested path
information will be spread to nested mobile networks. Every MR and MN receiving this
information immediately sends a BU message with new information. In this case, binding update
storm can be caused.
Access Router Option (ARO) [6] solves the pinball routing problem using RO scheme of
MIPv6. In nested mobile networks, a HA which a MR is registered is treated as a CN from the
perspective of an upper MR of the MR. The upper MR performs RO procedure with the HA.
After completing RO procedure, packets are forwarded from the HA to the upper MR directly.
ARO is simple and requires minimum changes in existing NEMO BSP. However, a long
convergence time is needed. Also, to find a Top Level of MR (TLMR) of nested mobile
networks, binding caches should be looked up recursively. If degree of nesting is increased,
convergence and search times are getting longer.
To solve the pinball routing problem Hierarchical MIPv6 (HMIPv6) approaches are
proposed. In HMIP based Route Optimization (HMIP-RO) [8] and Hierarchical Route
Optimization (HRO) [9], a TLMR of nested mobile networks acts a role of Mobility Anchor
Point (MAP) of HMIPv6. Every MR in nested mobile networks creates Regional CoA (RCoA)
using Home Address (HoA) prefix of TLMR and informs to HA. After receiving information,
HA forwards packets to the TLMR directly. Through this process, routing optimization is
accomplished. However, in HMIP-RO, multi-tunnels may be caused in intra part of nested
mobile networks. Besides, binding update storm can occur in HMIP-RO as the same as in NPI.
In case of HRO, binding registration time and overhead of MAP are increased because binding
caches are searched recursively.
Route Optimization Using Tree Information Option (ROTIO) [10] is another approach.
Extended TIO (xTIO) which is extension of Tree Information Option (TIO) is used in ROTIO.
ROTIO supports seamless handoff when nested mobile networks are attached another AR.
However, to support seamless handoff, packets are passed through previous point which MR is
attached to. Hence a routing path is getting longer. Moreover, if handover occurs dynamically,
communication may be disrupted.
111. THE TUNNEL COMPRESS SCHEME
A. Nested NEMO in PMIPv6-based network
NEMO can be supported by PMIPv6 [11]. Fig. 2 shows the nested NEMO in PMIPv6-based
network. As in nested NEMO, this orthogonal relationship to support nested node mobility
causes pinball problem. There are four overlaid PMIPv6 networks to support depth 3 nested
mobile networks. The LMA4 and the MAG4 support the mobility of the MR3. The MR3 itself
must be a MAG to support nested nodes mobility. As the MN does not involve in the mobility
management, the MAG1 registers the MN at the LMA1 on behalf of the MN. All traffic bound
to the MN is tunneled to the MAG1 by the LMA1. Same as MAG1, All traffic is tunneled to the
MAG2 and MAG3 using each independent tunnel. Besides, the other tunnel is created between
LMA4 and MAG4 by PMIPv6 specification. Fig. 3 shows the multi-tunnels to forward packets
to the MN for the LMA1.
4. International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4, November 2010
63
The PMIPv6 network consists of wired part and wireless part. All mobile networks belong to
the wireless network part. The forwarding multi-tunnels have the growing phase and the
shrinking phase as well. The growing phase ends at the MAG4, which is the last access gateway
of wired part as
well as the first gateway to the wireless part. The purpose of the growing phase is aggregation
of all traffic bound to the nested mobile network to avoid binding update storm by providing
mobility transparency to MNs under the mobile networks. However, the aggregated traffic must
be forwarded to the right access gateway which forwards the traffic into the mobile networks.
Therefore the growing phase has two purposes: one is the traffic aggregation and the other is
routing the aggregated traffic to the first gateway to the wireless network part. The traffic
aggregation is done by the innermost tunnel of the multi-tunnels and the routing is done by outer
layers of the multi-tunnels.
The shrinking phase starts from MAG4 and it ends at the MAG1. The outermost layer of the
multi-tunnels is eliminated when the outer tunnel reaches its destination MAG. In PMIPv6
MAGs do the host-based mobility handling for MNs. They send specific RA for a MN and
forward packets based on MNs’ home network prefixes; MAGs have the host-based routing
functionality. When the MAG4 terminates the outer most tunnel of the multi-tunnel, it gets the
next layer packet which has the MAG3 as the next destination. As the MAG4 does host-based
routing, it knows how to route the packets having the MAG3 as the next destination. Therefore
the purpose of the next layer tunnel is to route the forwarded packets to MAG3. The shrink
phase of the multi-tunnel acts as routing packets from MAG4 to MAG1.
B. The Tunnel Compress Scheme
The TCS compresses the multi-tunnels between the innermost entry point of the multi-
tunnels and the outermost exit point of the multi-tunnels into single IP-in-IP tunnel. The
innermost entry point of the multi-tunnels encapsulates all packets toward the innermost exit
Figure 2. Pinball routing problem
Figure 3. Multi-tunnels from a CN to a MN
5. International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4, November 2010
64
point of the multi-tunnels with IP-in-IP encapsulation and the encapsulated packets have the
outermost exit point of the multi-tunnels as their destination rather than the innermost exit point
of the multi-tunnels. In our example, all packets bound to the MAG1 are encapsulated with IP-
in-IP encapsulation and their destination becomes the MAG4 instead of the MAG1.
The TCS uses the MAG’s host-based routing functionality from the outermost exit point to
the innermost exit point of the multi-tunnels. Rather than MAGs decapsulate tunneled packets, it
installs the host-based routing entry into their routing entry. Because the tunnel itself carries an
aggregated traffic, installing new routing entries for MAGs coincides with the concept of IP
routing. The intermediate MAGs of the multi-tunnels forward the tunneled packets rather than
decapsulate them.
TCS extends Proxy Binding Update (PBU) message. Fig. 4 shows the extended PBU format.
The PBU message has new “T” flag and TCS option. The “T” flag represents that the initiating
MAG wants to use the TCS. The TCS option records the multi-tunnel information. Each
intermediate MAG adds its LMA information to the TCS option. TCS option has records of
<LMA, MAG> pair.
When a mobile network is attached to other mobile network, the MAG in NEMO network,
which the mobile network will be attached, generates a PBU. The MAG refers
Payload Prot Hdr Len MH Type Reseved
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
0 1 2 3
Checksum Sequence #
Life timeA H L K R M P T Reseved
Mobility Option
(a) Mobility header
LMA Address
Type Length Reserved
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
0 1 2 3
TCS Option
LMA : MAG record n
.
.
.
LMA-MAG
Record 1
MAG Address
(b) TCS option
Figure 4. PBU formats in PMIPv6
6. International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4, November 2010
65
AAA server to get attached node information. The information includes home LMA address
of the attaching node. The MAG creates two LMA_MAG records: one for the attaching node
and the other for itself. The PBU is forwarded to the upper MAG. The upper MAG information
is taken from RA. When the upper MAG receives the PBU with “T” flag set, the MAG appends
its LMA_MAG record to the PBU. If the received MAG is not the mobile router, the MAG
knows that it is the top MAG of the path. The top MAG forwards the LMA of the second record
of TCS option. When the LMA of the second record receives the PBU, it records the first LMA,
which is the inner tunnel LMA, and it forwards the PBU to the first LMA. The recording
procedure is the same as inter-roaming draft [12]. The recording inner tunnel LMA is very
important to repair the multi-tunnels when intermediate MAG (MR) handovers to other PMIPv6.
Fig. 5 shows the PBU flow when the MAG1 is attached to MAG2. When the MAG2 detects
the attachment of the MAG1, it creates a PBU and adds a TCS option. It forwards the PBU to
the MAG3. When the MAG3 receives the PBU, it appends its <LMA3, MAG3> record to the
TCP option and it creates the routing entry for the MAG1. Then it forwards the PBU to the
MAG4. When the MAG4 receives the PBU, it also appends its <LMA4, MAG4> record to the
TCS option and creates routing entry for the MAG1. The MAG4 is not the mobile, so it knows it
is the top MAG of the new path. It must create TCS tunnel entry for the MAG1, and then it
forwards the PBU to the LMA2 directly because the path to the LMA2 was created already
when the MAG2 is registered. When the LMA2 receives the PBU, it records the inner LMA
(LMA1) and forwards the PBU to the LMA1. When the LMA1 receives the PBU, it creates the
TCS tunnel entry. The tunnel entry is composed by the TCS option. The MAG of the last LMA-
MAG record in the TCS option becomes the destination of the TCS tunnel. After creating the
tunnel entry, the LMA1 sends a PBA to the LMA2. The LMA2 forwards MAG4 and the MAG4
forwards the PBA to the MAG2 via the MAG3.
Fig. 6 shows the routing tables and the TCS tunnel table. New entries created by the PBU are
highlighted. The MAG4 looks up the tunneling table to find out whether a packet uses the TCS
tunnel or not when the packet arrives at the MAG4. If so, the MAG4 terminates the tunnel and
encapsulates the packet. The encapsulated packet has the final destination of the original multi-
tunnels as the destination of the outer header. Intermediate MAGs, MAG3 and MAG2, just
forwards the encapsulated packet. The forwarding routing entry is created by receiving a PBU
when the MAG1 is attached to the MAG2.
After completing binding registration process with the TCS option, packets are forwarded
along the path as shown in Fig. 7. If the CN sends packets to the MN, the LMA1 intercepts
packets. Then the LMA1 encapsulates packets using TCS tunnel entry. This encapsulated packet
PBU
PBU
Figure 5. PBU flow when MAG1 is attached to MAG2
7. International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4, November 2010
66
is the same as packet format of the LMA1 of Fig. 7. Also the left tunnel of Fig. 8 shows the IP-
in-IP tunnel of outer header when the LMA1 encapsulates packets. Destination of outer
header is the MAG4, so packets are forwarded the MAG4 directly. At this time, optimization
of routing path is performed.
Figure 6. Routing table and TCS tunneling table
Figure 7. A routing path in TCS
Figure 8. Two single IP-in-IP tunnels in TCS
8. International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4, November 2010
67
The MAG4 checks TCS tunneling table whether packets are belonged to TCS tunnel or not.
If so, the MAG4 decapsulates the outer header, and then encapsulates packets once again with
new IP-in-IP tunnel header. This tunnel is the same as shown the right tunnel of Fig. 8. Hence
Packets are forwarded into nested mobile networks. The MAG3 and the MAG2 forward packets
according to routing tables without modification of header. After receiving packets, MAG1
decapsulates outer header and then it sends to the MN. In this process, routing path can be
optimized through the first tunnel, and packet is forwarded in nested mobile networks just using
host-based routing.
C. Movement of Nested mobile networks
When nested mobile networks are moved, several tunnels are affected by the event. All
communication using these tunnels is disrupted because the TCS tunnel consists of two tunnel
segments and each tunnel segment is terminated at the outermost exit point. In this case, the
destination of two tunnel segments and host-routing tables must be updated. The outermost exit
point must send two PBUs simultaneously; one for updating TCS information of LMAs, and the
other for updating MAGs.
Fig. 9 shows the example of two simultaneous PBUs when nested mobile networks move
into MAG3_1.
As the MAG3 returns its home network, the destination of these tunnels must be changed
from the MAG4 to the MAG3_1. When the MAG3_1 detects movement of the MAG3, it creates
the PBU with a TCS option. The PBU is forwarded to the LMA3. As the PBU has the “T” flag,
the LMA3 knows that nested mobile networks have at least one another LMA to be notified. The
information was recorded in the LMA3 when the MAG2 attached to the MAG3. The
LMA3 forwards the PBU to the LMA2. As the same reason, the LMA2 forwards the PBU to
the LMA1. The LMA1 updates its TCP tunnel entry and sends the PBA to the LMA2. This
forwarding continues until the PBA arrives at the MAG3_1.
Figure 9. PBU flow when nested mobile networks move
9. International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4, November 2010
68
The MAG3_1 sends the PBU to the MAG3, and the PBU is forwarded until it arrives at the
MAG1. MAGs receiving the PBU update the reverse tunnel destination from MAG4 to
MAG3_1 as well as routing table entry if necessary.
IV EXPERIMENTS
We perform simulation the proposed TCS using NS-2 network simulator. A simulation
topology and environments are set up the same as Fig. 1. We measure transmission times from a
CN to a MN, and packet sizes when a packet is passed through each network component. We
compare TCS with PMIPv6-based NEMO through measured time and size.
Fig. 10 shows a transmission time in each packet. In TCS, the packet transmission time is
decreased rather than the PMIPv6-based NEMO. This means that packets do not go through
LMAs such as LMA2 and LMA3. Therefore, TCS performs route optimization well.
Fig. 11 shows the size of a packet at each network component to compare the count of
encapsulation between PMIPv6-based NEMO and TCS. We set a data packet size to 1000 bytes.
In PMIPv6-based NEMO, the packet size has gradually increased since the packet is reached to
MAG4, and then has decreased by degrees. It is noticed that a packet is encapsulated in each
LMA and decapsulated in each MAG. We note that the MAG4 has bigger packet size than the
LMA4, because additional information is appended to packets for transmitting in wireless
section. On the other hand, packet size does not increase at all from LMA4 to the MAG2 if we
consider the additional packet overhead in wireless section as the same as in PMIPv6-based
NEMO. We also note that the packet size in LMA2 and LMA3 cannot be drawn because packets
never go through these LMAs. From this result, we know that packets are encapsulated once in
the proposed TCS, and therefore tunneling overhead decreases rather than PMIPv6-based
NEMO.
Figure 10. Transmission time from a CN to a MN in each packet
10. International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4, November 2010
69
Figure 11. Packet size when a packet leaves each network component
V.CONCLUSION
To solve multi-tunneling problems in nested NEMO, several MIPv6-based solutions are
proposed. However, these approaches cannot be used at PMIPv6-based NEMO due to different
environment such as no route optimization with CN.
In this paper, we proposed the TCS to solve multi-tunneling problems at PMIPv6-based
NEMO. The pinball routing problem can be solved by optimizing the routing path in TCS.
Furthermore, when nested mobile networks are attached to another MAG, communication is
continuously kept up. Simulation results show that the routing path can be optimized by skipping
intermediate LMAs in TCS and tunneling overhead also decreases.
References
[1] V. Devarapalli, R. Wakikawa, A. Petrescu, and P. Thubert, "Network Mobility (NEMO) Basic
Support Protocol," RFC 3963, Jan. 2005.
[2] D. Johnson, C. Perkins, and J. Arkko, “Mobility support in IPv6,” RFC 3775, Jun. 2004.
[3] S. Gundavelli, K. Leung, V. Devarapalli, K. Chowdhury and B. Patil, “Proxy Mobile IPv6,” RFC
5213, Aug. 2008.
[4] C. Ng, P. Thubert, H. Ohnishi, and E. Paik, “Taxonomy of Route Optimization models in the NEMO
Context,” Internet Draft, draft-thubert-nemo-ro-taxonomy-04, Feb. 2005.
[5] P. Thubert, and M. Molteni, “IPv6 Reverse Routing Header and its application to Mobile Networks,”
Internet Draft, draft-thubert-nemo-reverse-routing-header-07, Feb. 2007.
[6] C. Ng, and J. Hirano, “Securing Nested Tunnels Optimization with Access Router Option,” Internet
Draft, draft-ng-nemo-access-router-option-01, Jul. 12, 2004.
[7] J. Na, C. Kim, S. Lee, H. Kang, and C. Koo, “Secure Nested Tunnels Optimization using Nested
Path Information,” Internet Draft, draft-na-nemo-nested-path-info-00, Sep. 2003.
[8] H. Ohnishi, K. Sakitani, and Y. Takagi, “HMIP based Route optimization method in a mobile
network,” Internet Draft, draft-ohnishi-nemo-ro-hmip-00.txt, Oct. 2003.
[9] L. Dongkeun, K. Keecheon, and K. Moonhae, “Hierarchical Route Optimization for Nested Mobile
Network,” 18th International Conference on Advanced Information Networking and Application
(AINA’04) pp. 225-229, Mar. 2004.
[10] C. Hosik, K. Taekyoung, and C. Yanghee, “Route Optimization Using Tree Information Option for
Nested Mobile Networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 9, Sep.
2006.
[11] R. Wakikawa, S. Gundavelli, and Y. Zhao, “Network Mobility Support for Proxy Mobile IPv6,”
Internet Draft, draft-wakikawa-netext-pmip6-nemo-support-00.txt, Apr. 2009.
J-H. Na, S. Park, J-M. Moon, S. Lee, E. Lee, and S-H. Kim, “Roaming Mechanism between PMIPv6
Domains,”, Internet Draft, draft-park-netlmm-pmipv6-roaming-01, Jul. 2008.