This document summarizes a journal article that proposes a new home agent architecture and algorithms for mobility management in mobile IP networks. The key points are:
1) The proposed architecture introduces real-time algorithms, models different arrival rates of mobile nodes and correspondent nodes, treats procedures like registration as priority tasks, and uses a multi-processor home agent for improved performance.
2) The proposed algorithms are derived from Mobile IPv4 and introduce priority management. They require less time for location update and tunneling compared to the standard Mobile IP model.
3) The algorithms address tasks scheduling and assignment based on priority and processor utilization, as well as registration, discovery, and routing/tunneling with consideration for preempting lower
Performance Analysis of Data Traffic Offload Scheme on Long Term Evolution (L...TELKOMNIKA JOURNAL
One of new mobile technology is being developed by 3GPP is Long Term Evolution (LTE). LTE
usually used by user because provide high data rate. Many traffic sending over LTE, makes several users
didn’t get good Quality of Service (QoS). Traffic diversion is needed to increasing QoS value. It can be
done with offloading data method from LTE to Wi-Fi network. This paper using 802.11ah standard to
evaluate Wi-Fi network. IEEE 802.11ah have 1000 meters coverage area and efficiency energy
mechanism, which is proposed for M2M in 5G techonology. Some research has proven that traffic
diversion with offloading can increasing network performance. The contribution of this paper is to evaluate
the impact of traffic offload between LTE and IEEE 802.11ah standard. This paper propose two scenarios
using increment number of user and increment mobility speed of user to evaluate throughput and delay
value before and after the offload process. The simulation will simulate using Network Simulator-3. We can
conclude that network performance after offloading is better for every scenario. For increment number of
user scenario, throughput value increasing 29.08%, and delay decreasing 8.12%. Scenario with increment
mobility speed of user obtain throughput value increasing 37,57%, and delay value decreasing 27.228%.
Performance Analysis of Data Traffic Offload Scheme on Long Term Evolution (L...TELKOMNIKA JOURNAL
One of new mobile technology is being developed by 3GPP is Long Term Evolution (LTE). LTE
usually used by user because provide high data rate. Many traffic sending over LTE, makes several users
didn’t get good Quality of Service (QoS). Traffic diversion is needed to increasing QoS value. It can be
done with offloading data method from LTE to Wi-Fi network. This paper using 802.11ah standard to
evaluate Wi-Fi network. IEEE 802.11ah have 1000 meters coverage area and efficiency energy
mechanism, which is proposed for M2M in 5G techonology. Some research has proven that traffic
diversion with offloading can increasing network performance. The contribution of this paper is to evaluate
the impact of traffic offload between LTE and IEEE 802.11ah standard. This paper propose two scenarios
using increment number of user and increment mobility speed of user to evaluate throughput and delay
value before and after the offload process. The simulation will simulate using Network Simulator-3. We can
conclude that network performance after offloading is better for every scenario. For increment number of
user scenario, throughput value increasing 29.08%, and delay decreasing 8.12%. Scenario with increment
mobility speed of user obtain throughput value increasing 37,57%, and delay value decreasing 27.228%.
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2cscpconf
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET)
when two or more of these devices find themselves within transmission range. MANETs are
stand-alone (no existing infrastructure needed), autonomous networks that utilise multi-hop
communication to reach nodes out of transmitter range. Unlike infrastructure networks e.g. the
Internet with fixed topology, MANETs are dynamic. Despite the heterogeneous nature of these
two networks, integrating MANETs with the Internet extends the network coverage and adds to
the application domain of MANETs. One of the many ways of combining MANETs with the
Internet involves using Mobile Internet Protocol (Mobile IP) and a MANET protocol to route
packets between the Internet and the MANET via Gateway agents. In this paper, we evaluate the
performance of Mobile IP on MANET in Network Simulator 2 (NS2). We have implemented
Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand Multiple
Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols and compared performances based on Throughput, End-to-End Delay (E2ED),
Packet Delivery Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results
suggest that on-demand routing within the MANET better serves Mobile IP on MANETs.
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IPIJNSA Journal
Mobile ip (mip) is an internet protocol that allows mobile nodes to have continuous network connectivity to the internet without changing their ip addresses while moving to other networks. The packets sent from correspondent node (cn) to a mobile node (mn) go first through the mobile node’s home agent (ha), then the ha tunnels them to the mn’s foreign network. One of the main problems in the original mip is the triangle routing problem. Triangle routing problem appears when the indirect path between cn and mn through the ha is longer than the direct path. This paper proposes a new technique to improve the performance of the original mip during the handoff. The proposed technique reduces the delay, the packet loss and the registration time for all the packets transferred between the cn and the mn. In this technique, tunneling occurs at two levels above the ha in a hierarchical network. To show the effectiveness of the proposed technique, it is compared with the original mip and another technique for solving the same problem in which tunneling occurs at one level above the ha. Simulation results presented in this paper are based on the ns2 mobility software on linux platform. The simulations results show that our proposed technique achieves better performance than the others, considering the packet delay, the packet losses during handoffs and the registration time, in different scenarios for the location of the mn with respect to the ha and fas
Enabling active flow manipulation in silicon-based network forwarding enginesTal Lavian Ph.D.
A significant challenge arising from today’s increasing Internet traffic is the ability to flexibly incorporate intelligent control in high performance commercial network devices. This paper tackles this challenge by introducing the Active Flow Manipulation (AFM) mechanism to enhance traffic control intelligence of network devices through programmability. With AFM, customer network services can exercise active network
control by identifying distinctive flows and applying specified actions to alter network behavior in real-time. These services are dynamically loaded through Openet by the CPU-based control unit of a network node and are closely coupled with its silicon-based forwarding engines, without negatively impacting forwarding performance. AFM is exposed as a key enabling technology of the programmable networking platform Openet. The effectiveness of our approach is demonstrated by four active network services on commercial network nodes.
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
The important goal of this thesis is represented as demonstrating a self-organising based process for current versions of heterogeneous LTE-Advanced networks to simultaneously improve both quality of service and ability. The main index terms of this research could be exhibited as: SON; LTE-A, HetNets; Femtocell; Interference, Multi-Layer; Handover, Access Control; Power Control, eICIC. The self-organizing method of this research is described as the primary goal, to be got through the following targets: ThesisScientist.com
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
Non-intrusive remote monitoring of data centre services should be such that it does not require
(or minimal) modification of legacy code and standard practices. Also, allowing third party
agent to sit on every server in a data centre is a risk from security perspective. Hence, use of
standard such as SNMPv3 is advocated in this kind of environment. There are many tools (open
source or commercial) available which uses SNMP; but we observe that most of the tools do not
have an essential feature for auto-discovery of network. In this paper we present an algorithm
for remote monitoring of services in a data centre. The algorithm has two stages: 1) auto
discovery of network topology and 2) data collection from remote machine. Further, we
compare SNMP with WBEM and identify some other options for remote monitoring of services
and their advantages and disadvantages.
A Network and Position Proposal Scheme using a Link-16 based C3I SystemUniversity of Piraeus
The smart usage of hi-end military technological solutions in daily activities makes people life better. This paper describes a network and position proposal scheme in respect of technical networking and positioning information. A Link-16 based Command, Control, Communication and Intelligence (C3I) system is established among the mobile devices. Each device knows its geographical position using its GPS. A network along with a possible good position for user’s service is proposed, fulfilling his/her requirements for comfortable work.
In this paper we discuss NEMO-BSP protocol and TOR architecture. NEMO protocol was initially not designed to handle anonymity of TOR architecture. Due to some of the unique feature of TOR architecture, the use of TOR architecture has been rapidly increased these days. TOR architecture provides anonymity which other network architectures failed to provides. When using a TOR a user feels safe and has no issue of tracking and packet tracing. Therefore whenever a NEMO user uses TOR architecture there are much vulnerability in network. In this paper we outline those security issues in details which arise when a NEMO user uses TOR architecture. We hope in future those issues will be solved and implemented in future so that a user not only remains anonymous while using TOR but also remains secure from various types of vulnerabilities.
Mohd. Altamash Sheikh. “Security Issues of Network Mobility (NEMO) with Tor Architecture” United International Journal for Research & Technology (UIJRT) 1.4 (2019): 25-29.
Marvell Network Telemetry Solutions for Data Center and Enterprise NetworksMarvell
Marvell network telemetry - which enables accurate measurement of the network’s performance in real-time. In this white paper we will discuss how network telemetry is evolving in modern data center networks. Details will then be given of how the generic approach to network telemetry that has been taken by Marvell is providing greater visibility into network performance, plus flexible support of existing telemetry protocols, as well as the future ones emerging.
To know more visit @ https://www.marvell.com/switching/
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2cscpconf
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET)
when two or more of these devices find themselves within transmission range. MANETs are
stand-alone (no existing infrastructure needed), autonomous networks that utilise multi-hop
communication to reach nodes out of transmitter range. Unlike infrastructure networks e.g. the
Internet with fixed topology, MANETs are dynamic. Despite the heterogeneous nature of these
two networks, integrating MANETs with the Internet extends the network coverage and adds to
the application domain of MANETs. One of the many ways of combining MANETs with the
Internet involves using Mobile Internet Protocol (Mobile IP) and a MANET protocol to route
packets between the Internet and the MANET via Gateway agents. In this paper, we evaluate the
performance of Mobile IP on MANET in Network Simulator 2 (NS2). We have implemented
Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand Multiple
Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols and compared performances based on Throughput, End-to-End Delay (E2ED),
Packet Delivery Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results
suggest that on-demand routing within the MANET better serves Mobile IP on MANETs.
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IPIJNSA Journal
Mobile ip (mip) is an internet protocol that allows mobile nodes to have continuous network connectivity to the internet without changing their ip addresses while moving to other networks. The packets sent from correspondent node (cn) to a mobile node (mn) go first through the mobile node’s home agent (ha), then the ha tunnels them to the mn’s foreign network. One of the main problems in the original mip is the triangle routing problem. Triangle routing problem appears when the indirect path between cn and mn through the ha is longer than the direct path. This paper proposes a new technique to improve the performance of the original mip during the handoff. The proposed technique reduces the delay, the packet loss and the registration time for all the packets transferred between the cn and the mn. In this technique, tunneling occurs at two levels above the ha in a hierarchical network. To show the effectiveness of the proposed technique, it is compared with the original mip and another technique for solving the same problem in which tunneling occurs at one level above the ha. Simulation results presented in this paper are based on the ns2 mobility software on linux platform. The simulations results show that our proposed technique achieves better performance than the others, considering the packet delay, the packet losses during handoffs and the registration time, in different scenarios for the location of the mn with respect to the ha and fas
Enabling active flow manipulation in silicon-based network forwarding enginesTal Lavian Ph.D.
A significant challenge arising from today’s increasing Internet traffic is the ability to flexibly incorporate intelligent control in high performance commercial network devices. This paper tackles this challenge by introducing the Active Flow Manipulation (AFM) mechanism to enhance traffic control intelligence of network devices through programmability. With AFM, customer network services can exercise active network
control by identifying distinctive flows and applying specified actions to alter network behavior in real-time. These services are dynamically loaded through Openet by the CPU-based control unit of a network node and are closely coupled with its silicon-based forwarding engines, without negatively impacting forwarding performance. AFM is exposed as a key enabling technology of the programmable networking platform Openet. The effectiveness of our approach is demonstrated by four active network services on commercial network nodes.
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
The cell migrations take place between the different network operators, and require the significant information exchange between the operators to handle the migratory users. The new user registration requires the pre-shared information from the user’s equipment, which signifies the user recognition before registering the new user over the network. In this thesis, the proposed model has been aimed at the development of the new call admission control mechanism with the sub-channel assignment. The very basic utilization of the proposed model is to increase the number of the users over the given cell units, which is realized by using the sub-channel assignment to the users of the network. The proposed model is aimed at solving the issue by assigning the dual sub channels over the single communication channel. Also the proposed model is aimed at handling the minimum resource users by incorporating the load balancing approach over the given network segment. The load balancing approach shares the load of the overloaded cell with the cell with lowest resource utilization. The proposed model performance has been evaluated in the various scenarios and over all of the BTS nodes. The proposed model results have been obtained in the form of the resource utilization, network load, transmission delay, consumed bandwidth and data loss. The proposed model has shown the efficiency obtained by using the proposed call admission control (CAC) along with the new load balancing mechanism. The proposed model has shown the robustness of the proposed model in handling the cell overloading factors.
The important goal of this thesis is represented as demonstrating a self-organising based process for current versions of heterogeneous LTE-Advanced networks to simultaneously improve both quality of service and ability. The main index terms of this research could be exhibited as: SON; LTE-A, HetNets; Femtocell; Interference, Multi-Layer; Handover, Access Control; Power Control, eICIC. The self-organizing method of this research is described as the primary goal, to be got through the following targets: ThesisScientist.com
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
Non-intrusive remote monitoring of data centre services should be such that it does not require
(or minimal) modification of legacy code and standard practices. Also, allowing third party
agent to sit on every server in a data centre is a risk from security perspective. Hence, use of
standard such as SNMPv3 is advocated in this kind of environment. There are many tools (open
source or commercial) available which uses SNMP; but we observe that most of the tools do not
have an essential feature for auto-discovery of network. In this paper we present an algorithm
for remote monitoring of services in a data centre. The algorithm has two stages: 1) auto
discovery of network topology and 2) data collection from remote machine. Further, we
compare SNMP with WBEM and identify some other options for remote monitoring of services
and their advantages and disadvantages.
A Network and Position Proposal Scheme using a Link-16 based C3I SystemUniversity of Piraeus
The smart usage of hi-end military technological solutions in daily activities makes people life better. This paper describes a network and position proposal scheme in respect of technical networking and positioning information. A Link-16 based Command, Control, Communication and Intelligence (C3I) system is established among the mobile devices. Each device knows its geographical position using its GPS. A network along with a possible good position for user’s service is proposed, fulfilling his/her requirements for comfortable work.
In this paper we discuss NEMO-BSP protocol and TOR architecture. NEMO protocol was initially not designed to handle anonymity of TOR architecture. Due to some of the unique feature of TOR architecture, the use of TOR architecture has been rapidly increased these days. TOR architecture provides anonymity which other network architectures failed to provides. When using a TOR a user feels safe and has no issue of tracking and packet tracing. Therefore whenever a NEMO user uses TOR architecture there are much vulnerability in network. In this paper we outline those security issues in details which arise when a NEMO user uses TOR architecture. We hope in future those issues will be solved and implemented in future so that a user not only remains anonymous while using TOR but also remains secure from various types of vulnerabilities.
Mohd. Altamash Sheikh. “Security Issues of Network Mobility (NEMO) with Tor Architecture” United International Journal for Research & Technology (UIJRT) 1.4 (2019): 25-29.
Marvell Network Telemetry Solutions for Data Center and Enterprise NetworksMarvell
Marvell network telemetry - which enables accurate measurement of the network’s performance in real-time. In this white paper we will discuss how network telemetry is evolving in modern data center networks. Details will then be given of how the generic approach to network telemetry that has been taken by Marvell is providing greater visibility into network performance, plus flexible support of existing telemetry protocols, as well as the future ones emerging.
To know more visit @ https://www.marvell.com/switching/
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to An Architecture For Mobility Management In Mobile Computing Networks (20)
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
2. J. Computer Sci., 2 (1): 01-06, 2006
2
Agent (HA) or a Foreign Agent (FA). The Correspon-
dent Node (CN) is a node establishing a connection
with the MN. The HA is a local router on the MN’s
home network and the FA is a router on the visited
network. The following operations are introduced by
the Mobile IP protocol[2,3]
.
Discovery: How an MN finds an agent (HA or FA).
Registration: How an MN registers with its HA.
Routing and Tunneling: How an MN receives data-
grams when visiting a foreign network[11]
.
Location management operations include agent
discovery, movement detection, forming care-of-
address and location update. Handover operations in-
clude routing and tunneling. Figure 1 illustrates Mobile
IP network architecture.
Fig. 1: Mobile IP network architecture
Fig. 2: Proposed architecture of Mobile IP network
Proposed architecture: Figure 2 shows the proposed
Mobile IP network architecture. The architecture intro-
duces the following main features:
* Real-time algorithms support.
* Connection of MNs and CNs to an FA or HA with
different arrival rates in the network.
* All procedures associated with an MN (registration,
discovery, tunneling and routing) represent differ-
ent tasks with a specific priority.
* Multiprocessor agent (HA or FA). In this study the
emphasis is put on the HA. Also the Home Agent is
redundant to allow failure recovery.
* A main processor dispatching the different tasks
arriving on an agent.
* A set of faster processors is defined to process
high-priority tasks.
* Architecture allowing different speeds for the proc-
essors.
Proposed algorithms: Based on the architecture de-
scribed above, a set of new algorithms has been defined
for mobility management. These algorithms are derived
from Mobile IPv4 algorithms[3]
. They introduce the
notion of priority management in a real-time context.
The new discovery algorithm adds the ranging concept
in addition to the lifetime used in Mobile IPv4. Also it
allows the MN to initiate Foreign Agents search at
startup in stead of waiting advertisements. In addition,
this algorithm allows the MN to keep a list of the most
recent Foreign Agents that it tries to contact first before
initiating any broadcast search.
Tasks scheduling and assignment algorithm: The
task scheduling and assignment algorithm is described
in Fig. 3. The scheduling part of this algorithm is based
on the EDF algorithm[12]
while the assignment part is a
totally new concept since it based on a multiprocessor
architecture. The tasks are sorted based on the deadline
and assigned to the processors. If a task is critical (short
deadline), it is assigned to a faster processor. If not it is
assigned to a normal processor. A task is assigned to a
processor only if its current utilization rate is less
than 1. This ensures that a processor is not used at its
full capacity while others are unused.
Fig. 2: Task scheduling and assignment algorithm
Registration algorithm: The registration procedure is
a task running on the HA with the highest priority. It
can preempt any other mobility management task for a
IP Network
HA
MNn
CN1
CNn
MN
MN
FA
1
FA2
FA
n
-Given i counter of tasks and j counter of processors.
-Given n tasks TSK1, …,TSKi, …, TSKn with the priorities
p1, … pi, … pn.
-Given S a set of faster processors and ps threshold of a criti-
cal task.
-Given u(i) the utilization rate of the task TSKi and U(j) a
vector of u(i) on Pj.
BEGIN
-i= 1, U(j)= 0, S =1.
-Sort the n tasks based on u(i) on P0.
WHILE i ≤ n DO
j = min{k|U(k) + u(i) 1}
IF ( (pi > ps ) && ( ∃PR ∈S | U(PR) < 1)) )
THEN TSKi →PR
ELSE TSKi → Pj
i ←i + 1
END WHILE
END BEGIN
IP Network
HA
CN
MN
MN
FA
3. J. Computer Sci., 2 (1): 01-06, 2006
3
given user. For example, during a tunneling procedure,
if a registration request is received for the same user,
the tunneling process will be delayed until the registra-
tion is done. The different stages of the algorithm are
described as follow:
* MN sends a registration request to the HA.
* HA verifies IF a task other than the registration is
in process for the same user.
IF yes THEN the task is preempted by the registra-
tion task.
* HA sends a response to the MN.
* IF request accepted THEN registration procedure
done ELSE MN retries UNTIL request accepted.
Discovery algorithm: The discovery algorithm intro-
duces also the notion of priority in a real-time environ-
ment and it is based on the lifetime expiration and the
ranging. The discovery procedure has the second high-
est priority. The different steps are described as follow.
* IF first time startup THEN MN sends a broadcast
advertisement.
* FAs verify if no higher priority task is being exe-
cuted for the same MN.
IF yes THEN delay discovery process UNTIL
high-priority task execution is done.
* FAs send responses back to MN.
* MN chooses FA with most strong signal strength
and records the lifetime, the care-of-address and the
FA’s IP address.
* IF lifetime expires or the MN starts going out of
range (wick signal strength) THEN send registra-
tion request to Foreign Agents in the MN’s local
database.
IF no FA responds back THEN broadcast a discov-
ery advertisement message.
* REPEAT steps 2 through 4 UNTIL registration
succeed.
* IF registration succeeds THEN MN sends new
location information to HA for location update.
Routing and tunneling algorithm: The new routing
and tunneling algorithm also introduces the notion of
priority in a real-time environment. This procedure has
the lowest priority. Thus, during a tunneling procedure,
if a registration procedure is received for the same user,
the location procedure will be suspended until the regis-
tration is done. The steps of the algorithm are the fol-
lowing:
* HA receives data for an MN.
* HA verifies if a registration request is made for the
same user.
IF yes THEN HA suspends tunneling process until
registration is done.
* IF MN in local network THEN delivered packets
using normal IP packets delivery procedure ELSE
forward packets to MN via its current FA.
Performance analysis: The performance analysis is
based on the CMR (Call-to-Mobility Ratio). The CMR
is the average number of messages send to a user di-
vided by the average number of networks or subnets
visited by the user in a given time stamp. The goal of
the CMR analysis is to determine the ratio by which the
proposed model reduces the location update and the
tunneling times.
µ
λ
=
CMR (1)
Where, λ is the average number of messages send
to a user and µ the average number of subnets or net-
works visited by the user between two consecutives
messages.
We define the following parameters to compare the
CMR in the Mobile IP and the proposed models:
U cost for location update procedure execution in
the Mobile IP model;
L cost for tunneling procedure execution in Mobile
IP model;
u cost for location update procedure execution in
the proposed model;
l cost for tunneling procedure execution in the
proposed model;
T cost to cross a boundary between two subnets;
UMIP total cost for the location update procedure in
Mobile IP model;
LMIP total cost for tunneling procedure execution in
Mobile IP model;
CMIP total cost for location update and tunneling pro-
cedures execution in Mobile IP model;
UPROP total cost for location update procedure in the
proposed model;
LPROP total cost for tunneling procedure execution in
the proposed model;
CPROP total cost for location update and tunneling pro-
cedures execution in the proposed model.
The total costs are obtained as follows:
CMR
U
UMIP = (2)
T
L
CMR
U
T
L
U
C MIP
MIP
MIP +
+
=
+
+
= (3)
CMR
u
UPROP = (4)
4. J. Computer Sci., 2 (1): 01-06, 2006
4
T
L
U
C PROP
PROP
PROP +
+
= T
l
CMR
u
+
+
= (5)
Our goal is to reduce the location update and the
tunneling times by respectively at least 50% and 25%.
Then u = U/2 and l = L/4. We make the following as-
sumptions to simplify the analysis L = U, T = U/4 = u/2
and U = 1, that leads to:
u
u
U
U
U
PROP
MIP 1
=
= (6)
u
l
L
L
L
PROP
MIP 2
=
= (7)
CMR
u
CMR
CMR
u
CMR
U
C
C
PROP
MIP
2
4
5
4
2
4
)
5
4
(
+
+
=
+
+
= (8)
Figure 4 shows the location update cost for different
values of the CMR and u = 0.2.
0
5
10
15
20
25
0 1 2
CMR
Location
update
total
cost
Proposed
MIP
Fig. 3:Comparison of location update total cost (u=0.2)
Figure 5 illustrates the location update cost for
different values of the CMR and u = 0.5.
0
5
10
15
20
25
0 1 2
CMR
Location
update
total
cost
Proposed
MIP
Fig. 5:Comparison of location update total cost (u=0.5)
Figure 6 shows the location update cost and the
ratio CMIP/CPROP for different values of the CMR for u =
0.2 and 0.5.
In Fig. 4 and 5 we noticed that the proposed model
reduces by 80% the location update time for u = 0.2 and
by 50% for u = 0.5 for small values of the CMR. The
reason is that in this case the mobile users make an
important number of location update requests and the
processing on the multiprocessor HA in the proposed
0.5
0.6
0.7
0.8
0.9
0.5 1 1.5 2
CMR
Cmip/Cprop
u = 0.5
u = 0.2
Fig. 4: Comparison of ratio CMIP/CPROP
architecture is faster compared with the mobile IP
model. When the CMR increases, the mobile users stay
longer in the same network and in this case, the location
update time decreases and is near 0 for the two models.
For the total costs (location update plus tunneling)
shown in Fig. 6, the reduction is between 67% and 80%
for u = 0.2 and between 50% and 60% for u = 0.5.
We can conclude that the proposed model offers a
better performance based on the CMR. Indeed, it takes
less time for the location update and the tunneling in the
proposed model compared with the Mobile IP model.
These results are very useful and interesting for a real-
time context where the factor time is very important. To
validate the analysis, we had conducted different simu-
lations.
COMPUTATIONAL RESULTS
Figure 7 shows the setup for the different simula-
tions. The network used is an Ethernet based LAN
10/100 Mbps with an 8-Port Ethernet Hub.
We simulated the implementation of the current
mobile IP algorithms as well as the proposed architec-
ture and algorithms in a real-time environment using
VxWorks as real-time Operating System running on a
MPPC (MotorolaTM Power PC). Our simulations focus
on the location update average time, the tunneling aver-
age time, the number of tasks missing their deadline
depending on the number and the speed of the proces-
sors on the HA.
Fig. 5: Simulation setup
5. J. Computer Sci., 2 (1): 01-06, 2006
5
Location update average time: In the Mobile IP
model, the location update time is constant and does not
depend on the user’s arrival rate in the network. The
location update average rate value is around 1 sec. In
the proposed model, the location update time increase
with the user’s arrival rate. The maximum value is
around 0.8 s. For small value of the arrival rate, few
users arrived in the network and are dispatched on the
processors, which in this case have a low utilization
rate. The processing is then faster per user leading to a
low location update time. But when the arrival rate
increase, many users arrived in the network and the
processing takes longer but the average time is still
lower compared with the Mobile IP model. Overall the
location update time is reduces by 20 % to 80% in the
proposed model, which is above the targeted objective
of 50%.
Figure 8 shows the location update average time for
different arrival time in the networks.
0
200
400
600
800
1000
1200
1
0
0
5
0
0
0
6
0
0
0
0
Arrival rate
Location
update
time
(ms)
MIP
Proposed
Fig. 6: Location update average time
Tunneling average time: Figure 9 illustrates the tun-
neling average time for different data sizes.
0
500
1000
1500
2000
1
0
0
0
5
0
0
0
0
2
0
0
0
0
0
4
0
0
0
0
0
6
0
0
0
0
0
8
0
0
0
0
0
1
0
0
0
0
0
0
Data size (bytes)
Tunneling
average
time
(ms)
MIP
Proposed
Fig. 7: Tunneling average time
The tunneling time is smaller in the proposed
model compare to the Mobile IP model. The data proc-
essing is faster because of the multiprocessor architec-
ture. The messages sent to the mobile users spend less
time in the message queue on the HA. In the mobile IP
model the message i + 1 will wait longer than the mes-
sage i on the message queue, increasing the processing
time. But in the proposed model the message i + 1 can
be process in parallel on a different processor while
processing the message i on an other one. As a result the
total time spent in the system is reduced. Overall the
tunneling time is reduces by 10 to 30% in the proposed
model, which is above the targeted objective of 25%.
Task scheduling and assignment: Figure 10 shows the
number of tasks missing their deadline for different
number of processors with different speeds following
Gaussian and exponential distributions.
0
10
20
30
0 2000 4000
Numebr of tasks
Missed
deadlines
Rate= mean
Rate = expo.
V = gaussian
Fig. 10: Processors with different speeds distribution
The number of tasks missing their deadline in the
Gaussian distribution is lower compare to the exponen-
tial distribution. The reason is that in the first case the
speeds of the processors are close to the mean speed. It
is the contrary in the exponential case where the distri-
bution is larger with more low speeds. This leads to a
higher ratio Execution Time/Processor Speed and num-
ber of missed deadlines. So, for configurations with
different speeds, the speeds of the processors must
follow a Gaussian distribution in order to have an opti-
mal scheduling and assignment for the tasks.
CONCLUSION
In this study we presented a Mobile IP architecture
and mobility management algorithms in a real-time
context. The implementation of the proposed architec-
ture and algorithms gave better results for the location
update and tunneling average times as well as the CMR
compare to the existing architecture and algorithms[13-
14]
. The location update time is reduced by 20 to 80%
while the tunneling time is reduced by 10 to 30%. These
results meet time constraint in real-time systems. The
multiprocessor architecture is the core of the proposed
model. It gives a faster parallel processing for the mo-
bile users.
The scheduling and assignment algorithm is opti-
mal for different number of processors with different
speeds. This achievement is something new compare to
actual real-time multiprocessor scheduling and assign-
ment algorithms. In the current algorithms, the proces-
sors must have the same speed to guarantee an optimal
scheduling and assignment.
Many investigations are on going in real-time mo-
bility management for Mobile IP networks. The areas
6. J. Computer Sci., 2 (1): 01-06, 2006
6
cover the implementation of real-time algorithms in real
networks as well as proposition of new algorithms and
architectures. Also, since the current protocols are de-
signed for micro-mobility, the WAN and global roam-
ing areas are some new domains of interest.
REFERENCES
1. 3GPP, 2000. Combined GSM and Mobile IP Mo-
bility Handling in UMTS IP CN. 3GPP Technical
Specification.
2. James, D.S, 1998. Mobile IP, The Internet Un-
plugged. Prentice Hall, PTR.
3. Perkins, C., 2002. IP Mobility Support for IPv4.
Internet Engineering Task Force, RFC 3220.
4. Akyildiz, I.F., J. McNair, J.S.M. Ho, H.
Uzunalioglu and W. Wang, 1999. Mobility Man-
agement in Next-Generation Wireless Systems.
Proc. IEEE., 87: 1347-1384.
5. Stallings, W., 2001. Wireless Communications and
Networks. Prentice Hall, Upper Saddle River, New
Jersey.
6. Caceres, R. and V. Padmanabhan, 1996. Fast and
scalable handoffs for wireless networks. In Proc.
ACM/IEEE MOBICOM’96, pp: 56-66.
7. Wong, V.W.S. and V.C.M. et Leung, 2000. Loca-
tion Management for Next Generation Personal
Communication Networks”, Department of Electri-
cal and Computer Engineering. The University of
British Columbia, Vancouver, Canada, Tech. Rep.
8. Stallings, W., 2001. Wireless Communications and
Networks. Prentice Hall, Upper Saddle River, New
Jersey.
9. Ho, J. and I.F. et Akyildiz, 1995. Mobile user Lo-
cation Update and Paging under Delay Constraints.
ACM/Baltzer. J. Wireless Networks, 1: 413-425.
10. Perkins, C., 1996. Minimal Encapsulation within
IP. Internet Engineering Task Force, RFC 2004.
11. Calhoun, P. and C. Perkins, 1996. IP Encapsulation
within IP. Internet Engineering Task Force, RFC
2003.
12. Chrishna, C.M. and G.S. Kang, 1997. Real-Time
Systems. McGraw Hill.
13. Schneider, J. and R. et Comroe, 2001. Motorola
Canopy TM
Access Point User’s Guide.
14. Schneider, J. and R. et Comroe, 2001. Motorola
CanopyTM
Subscriber Modem User’s Guide.
15. Gupta, V., 1998. Solaris Mobile IP: Design and
Implementation. SUN Microsystems Inc.