In recent years, internet protocol mobility management has become one of the most popular research areas in networking. Mobility management protocols are in charge of preserving continuing communications as a user roam between different networks. All existing internet protocols (IP), like MIPv6, and PMIPv6, rely on a centralized mobility anchor to control mobile node traffic and signaling. The disadvantages of centralized mobility management (CMM) include ineffectiveness in handling massive volumes of traffic, poor scalability, wasteful use of network resources, and packet delay. When CMM is required to handle mobile media, which demands a huge amount of information and frequently needs quality of services (QoS) such as session continuance and reduced latency, these difficulties become apparent. It drives the need for distributed mobility management protocol (DMM) systems to manage the growing amount of mobile data, the overwhelming of this is video communication. DMM approaches could be regarded as an innovative and effective method to deal with mobility. An overview of the CMM protocol and its drawbacks are analyzed. This study examines the various DMM protocol techniques and their performance metrics are compared to highlight similarities and differences. The study reveals the network-based DMM protocol improves overall handoff time and packet loss.In recent years, internet protocol mobility management has become one of the most popular research areas in networking. Mobility management protocols are in charge of preserving continuing communications as a user roam between different networks. All existing internet protocols (IP), like MIPv6, and PMIPv6, rely on a centralized mobility anchor to control mobile node traffic and signaling. The disadvantages of centralized mobility management (CMM) include ineffectiveness in handling massive volumes of traffic, poor scalability, wasteful use of network resources, and packet delay. When CMM is required to handle mobile media, which demands a huge amount of information and frequently needs quality of services (QoS) such as session continuance and reduced latency, these difficulties become apparent. It drives the need for distributed mobility management protocol (DMM) systems to manage the growing amount of mobile data, the overwhelming of this is video communication. DMM approaches could be regarded as an innovative and effective method to deal with mobility. An overview of the CMM protocol and its drawbacks are analyzed. This study examines the various DMM protocol techniques and their performance metrics are compared to highlight similarities and differences. The study reveals the network-based DMM protocol improves overall handoff time and packet loss.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
Improvement in the mobility of mobile ipv6 based mobile networks using revers...ijmnct
Mobile IPv6 based Mobile Networks are becoming increasingly important with the widespread
popularity of wireless internet connectivity. For large networks, an extension, namely, the Hierarchical
Mobile IPv6 is used, which suffers from overloading of the Home Agent as every packet sent has to pass
through it and this produces a significant loss in performance. In this paper, a method to improve the
mobility using the fast handover of Mobile IPv6 (FMIPv6) and the Reverse Routing Header Protocol is
proposed. Simulation results at different packet intervals show that, the proposed scheme is able to
reduce the average delay and achieve an optimum level of throughput.
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
Currently cellular networks are overloaded, due to rapid growth of various smartphone applications. With
the arrival of 3G and 4G network technologies mobile data traffic has been growing at an unprecedented
pace and increasingly surpassing the network capacity. Mobile data offloading is an effective network
congestion demotion approach to solve the overload issue through opportunistic communication. It is a
beneficiary approach, because there is no monetary cost for it. Subscribe Send Architecture and
Opportunistic forwarding protocol plays a vital role during offloading by allowing users to subscribe the
contents but does not download the subscribed content on the Content Service Provider thereby network
traffic reduces up to a greater extent. A quantitative study on performance evaluation of opportunistic
routing protocols like Epidemic, Spray and Wait, ProPhet and MaxProp are discussed in this paper. We
have compared these protocols based on few performance metrics like overhead ratio, delivery probability
and average latency. Our simulation results verify that MaxProp performs well and can offload cellular
traffic effectively.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
Improvement in the mobility of mobile ipv6 based mobile networks using revers...ijmnct
Mobile IPv6 based Mobile Networks are becoming increasingly important with the widespread
popularity of wireless internet connectivity. For large networks, an extension, namely, the Hierarchical
Mobile IPv6 is used, which suffers from overloading of the Home Agent as every packet sent has to pass
through it and this produces a significant loss in performance. In this paper, a method to improve the
mobility using the fast handover of Mobile IPv6 (FMIPv6) and the Reverse Routing Header Protocol is
proposed. Simulation results at different packet intervals show that, the proposed scheme is able to
reduce the average delay and achieve an optimum level of throughput.
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
Currently cellular networks are overloaded, due to rapid growth of various smartphone applications. With
the arrival of 3G and 4G network technologies mobile data traffic has been growing at an unprecedented
pace and increasingly surpassing the network capacity. Mobile data offloading is an effective network
congestion demotion approach to solve the overload issue through opportunistic communication. It is a
beneficiary approach, because there is no monetary cost for it. Subscribe Send Architecture and
Opportunistic forwarding protocol plays a vital role during offloading by allowing users to subscribe the
contents but does not download the subscribed content on the Content Service Provider thereby network
traffic reduces up to a greater extent. A quantitative study on performance evaluation of opportunistic
routing protocols like Epidemic, Spray and Wait, ProPhet and MaxProp are discussed in this paper. We
have compared these protocols based on few performance metrics like overhead ratio, delivery probability
and average latency. Our simulation results verify that MaxProp performs well and can offload cellular
traffic effectively.
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...cscpconf
Intelligent transportation system (ITS) consists of moving networks, where the network mobility
(NEMO) basic support is adopted as a mobility management protocol for moving networks.
Even though NEMO basic support (NBS) provides a basic mobility support for ITS systems, the
mobile routers (MR) need to participate in the mobility signaling. In the literature, network
based mobility management such as Proxy Mobile IPv6 (PMIPv6) based solutions are explored
for mobility management. However, the signaling overhead incurred due to this approach is still
need to be optimized. In this paper, we introduce a bulk binding update solution for the
registration of MR with local mobility anchor (LMA) in moving networks. The bulk binding
update procedure uses a group identifier for group of MRs during the periodic binding update
process which reduces the signaling overhead compared with the basic PMIPv6 based
approach. The numerical results demonstrate that the proposed approach gives a better
performance in terms of signaling overhead and handover latency than NBS, and simplePIMPv6 based solutions.
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2cscpconf
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET)
when two or more of these devices find themselves within transmission range. MANETs are
stand-alone (no existing infrastructure needed), autonomous networks that utilise multi-hop
communication to reach nodes out of transmitter range. Unlike infrastructure networks e.g. the
Internet with fixed topology, MANETs are dynamic. Despite the heterogeneous nature of these
two networks, integrating MANETs with the Internet extends the network coverage and adds to
the application domain of MANETs. One of the many ways of combining MANETs with the
Internet involves using Mobile Internet Protocol (Mobile IP) and a MANET protocol to route
packets between the Internet and the MANET via Gateway agents. In this paper, we evaluate the
performance of Mobile IP on MANET in Network Simulator 2 (NS2). We have implemented
Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand Multiple
Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols and compared performances based on Throughput, End-to-End Delay (E2ED),
Packet Delivery Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results
suggest that on-demand routing within the MANET better serves Mobile IP on MANETs.
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
The fast growing mobile data traffic causes the deficiency of cellular network capacity. To mitigate this problem, Wi-Fi offloading techniques where the mobile data traffic is offloaded through sparsely deployed Wi-Fi networks have been extensively investigated. Wi-Fi offloading techniques can be classified into: 1) auction game-based offloading and 2) congestion game-based offloading. To proposed system inventing a Finite Horizon Markov Decision Process (FHMDP) to make offloading decisions efficiently. The existing approach use two algorithms such as; 1) Hybrid offloading algorithm and 2) Monotone offloading algorithm. But the previous work of hybrid offloading algorithm and monotone offloading algorithm was not efficient. Based on the Finite Horizon Markov Decision Process (FHMDP) mechanism. The proposed mechanism of offload cellular network traffic of vehicular users through carrier Wi-Fi networks based on the game theory approach. It computes the mobile network offloading performance. In this design of offloading mechanism in order to improve the overall offloading performance. By reducing the number of vehicular users contending for the channel and prioritizing high WIFI data rates and thus the offloading performance can be improved. In the proposed approach is reducing the accessing cost, time and improve the Wi-Fi offloading performance.
Route Optimization (RO) in Mobile Internet Protocol
Version Six (MIPv6) is a technique that enables a
Mobile Node (MN) and a Corresponding Node (CN)
to communicate directly by bypassing the Home Agent
(HA). RO is usually faced with the problem of Internet
Protocol (IP) multilayer tunnels due to pinball or suboptimal
routing. The generic consideration in
designing route optimization scheme is to use
minimum signaling information in the IPv6 packet
header. In order for optimization to take place in
MIPv6, a protocol called route optimization protocol
must be introduced. Route optimization protocol is
used basically to improve performance. Also RO can
also be described as a mechanism that eliminates the
inefficiency in tunneling of packets from MRs to their
HA before being sent to CNs over the Internet.
However, Network Mobility (NEMO) can be described
as a network whose point of attachment to the Internet
varies with time.
The tradeoff between the two protocols can provide a
significant impact on the networks. Furthermore, one
potential choice of selecting any of the protocols can
increase or decrease the degree of application in used.
The tradeoff in offloading solution can vary from
mobile access network and core mobile network.
Optimizing traffic breakout and support for mobility
are paramount to service operators. The study focused
on the development and evaluation of an experimental
test bed of route optimization in MIPv6 and
NEMO.The tradeoff between the two protocols was
examined. The results of the experimental test bed
shows the benefit of next generation of Internet
system, especially for real-time applications that
need to provide seamless connection with low handoff
latency.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
Mobility Management For Next Generation NetworksGreen Packet
Increasingly, operators worldwide will be faced with a similar challenge of managing data congestion over multiple access networks. With networks evolving into LTE, operators would need to carefully assess the technology fit into integrating complementary nature of multiple access networks into an all-IP flat architecture. An all IP flat architecture helps to tie heterogeneous access networks that devices can attach to access end-user services. Communication devices today are able to connect with more than one type of wireless technologies to the “web of things”. An end-user will connect to a Wi-Fi hotspot, if within range. When moving away from range, the communication link is handover to for example, UMTS. The motivation of inter-working lies in marrying the diverse strengths of each communication technology. High-bandwidth data communication inherent in WLAN lacks mobility. Conversely, cellular technologies such as UMTS succeed in highly mobile environments, but limited in bandwidth. Although cellular networks are evolving from today’s 3G to LTE that brings promise of capacity leaps (by nearly 4 times), the overall data growth projection will outpace LTE deployments and fill up very quickly.
The immediate need to curtail congested network and effectively manage mobility is imminent to accommodate the data traffic on their networks. The impact of inter-mobility between inter access technology together with various types of mobility support including 3GPP legacy network and non 3GPP is necessary to provide a target low-latency, higher data-rate, all-IP core network capable of supporting real-time packet services. Some of the available IP mobility protocols lack sufficient control to the network to optimize the handover process and do not handle well with slow connection setups of some wireless technologies. This paper highlights the potential approaches of bringing together mobility technologies that are available and how these approaches contribute to resolve operator concerns in deployment of services and combating congestion, access technology integration and evolution to LTE from legacy 3GPP networks.
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIScscpconf
As the future generation networks are envisioned to be heterogeneous in nature, seamless
mobility in such networks is an important issue. While IETF work groups have standardized
various mobility management protocols, such as Mobile IPv6 (MIPv6), Fast Handovers for
Mobile IPv6 (Predictive FMIPv6, and Reactive FMIPv6), Hierarchical Mobile IPv6 (HMIPv6),
Proxy Mobile IPv6 (PMIPv6) and Fast Handovers for PMIPv6 (Predictive FPMIPv6, and
Reactive FPMIPv6), out of which some are host based and some are network based, the
decision regarding which protocol suits the future networks is still a research issue. The study
of various mobility management protocols in terms handover latency and the number of hops is
needed to evaluate these protocols. Even though much study has been done in literature in terms
of handover latency, study still needs performance evaluation in terms of average hop delay. In
this paper we study various mobility management protocols by applying simple numerical
analysis. The study is carried out for performance evaluation of various mobility management
protocols in terms of average hop delay, wireless link delay, wired part delay, and binding
update and registration delay. In this work, the average hop delay is estimated in terms of total
handover latency and total number of hops contributing to each protocol. The study enables us
to make a few important observations regarding the performance of these mobility management
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
A review study of handover performance in mobile ipIJCNCJournal
The Mobile Internet Protocol (Mobile IP) is an extension to the Internet Protocol proposed by the Internet
Engineering Task Force (IETF) that addresses the mobility issues. In order to support un-interrupted
services and seamless mobility of nodes across the networks (and/or sub-networks) with permanent IP
addresses, handover is performed in mobile IP enabled networks. Handover in mobile IP is source cause of
performance degradation as it results in increased latency and packet loss during handover. Other issues
like scalability issues, ordered packet delivery issues, control plane management issues etc are also
adversely affected by it. The paper provides a constructive survey by classifying, discussing and comparing
different handover techniques that have been proposed so far, for enhancing the performance during
handovers. Finally some general solutions that have been used to solve handover related problems are
briefly discussed.
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATIONijujournal
Emerging sensor-embedded smartphones motivated the mobile Internet of Things research. With the integrated embedded hardware and software sensor components, and mobile network technologies, smartphones are capable of providing various environmental context information via embedded mobile device-hosted Web services (MWS). MWS enhances the capability of various mobile sensing applications such as mobile crowd sensing, real time mobile health monitoring, mobile social network in proximity and so on. Although recent smartphones are quite capable in terms of mobile data transmission speed and computation power, the frequent usage of high
performance multi-core mobile CPU and the high speed 3G/4G mobile Internet data transmission will quickly drain the battery power of the mobile device. Although numerous previous researchers have tried to overcome the resource intensive issues in mobile embedded service provisioning domain, most of the efforts were constrained because of the underlying resource intensive technologies. This paper presents a lightweight mobile Web service provisioning framework for mobile sensing which utilises the protocols that were designed for constrained Internet of Things environment. The prototype experimental results show that the proposed framework can provide higher throughput and less resource consumption than the traditional mobile Web service frameworks.
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATIONijujournal
Emerging sensor-embedded smartphones motivated the mobile Internet of Things research. With the
integrated embedded hardware and software sensor components, and mobile network technologies,
smartphones are capable of providing various environmental context information via embedded mobile
device-hosted Web services (MWS). MWS enhances the capability of various mobile sensing applications
such as mobile crowdsensing, real time mobile health monitoring, mobile social network in proximity and
so on. Although recent smartphones are quite capable in terms of mobile data transmission speed and
computation power, the frequent usage of high performance multi-core mobile CPU and the high speed
3G/4G mobile Internet data transmission will quickly drain the battery power of the mobile device.
Although numerous previous researchers have tried to overcome the resource intensive issues in mobile
embedded service provisioning domain, most of the efforts were constrained because of the underlying
resource intensive technologies. This paper presents a lightweight mobile Web service provisioning
framework for mobile sensing which utilises the protocols that were designed for constrained Internet of
Things environment. The prototype experimental results show that the proposed framework can provide
higher throughput and less resource consumption than the traditional mobile Web service frameworks.
Lightweight Mobile Web Service Provisioning for the Internet of Things Mediat...ijujournal
Emerging sensor-embedded smartphones motivated the mobile Internet of Things research. With the
integrated embedded hardware and software sensor components, and mobile network technologies,
smartphones are capable of providing various environmental context information via embedded mobile
device-hosted Web services (MWS). MWS enhances the capability of various mobile sensing applications
such as mobile crowdsensing, real time mobile health monitoring, mobile social network in proximity and
so on. Although recent smartphones are quite capable in terms of mobile data transmission speed and
computation power, the frequent usage of high performance multi-core mobile CPU and the high speed
3G/4G mobile Internet data transmission will quickly drain the battery power of the mobile device.
Although numerous previous researchers have tried to overcome the resource intensive issues in mobile
embedded service provisioning domain, most of the efforts were constrained because of the underlying
resource intensive technologies. This paper presents a lightweight mobile Web service provisioning
framework for mobile sensing which utilises the protocols that were designed for constrained Internet of
Things environment. The prototype experimental results show that the proposed framework can provide
higher throughput and less resource consumption than the traditional mobile Web service frameworks.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
More Related Content
Similar to An overview of internet engineering task force mobility management protocols: approaches and its challenges
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...cscpconf
Intelligent transportation system (ITS) consists of moving networks, where the network mobility
(NEMO) basic support is adopted as a mobility management protocol for moving networks.
Even though NEMO basic support (NBS) provides a basic mobility support for ITS systems, the
mobile routers (MR) need to participate in the mobility signaling. In the literature, network
based mobility management such as Proxy Mobile IPv6 (PMIPv6) based solutions are explored
for mobility management. However, the signaling overhead incurred due to this approach is still
need to be optimized. In this paper, we introduce a bulk binding update solution for the
registration of MR with local mobility anchor (LMA) in moving networks. The bulk binding
update procedure uses a group identifier for group of MRs during the periodic binding update
process which reduces the signaling overhead compared with the basic PMIPv6 based
approach. The numerical results demonstrate that the proposed approach gives a better
performance in terms of signaling overhead and handover latency than NBS, and simplePIMPv6 based solutions.
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2cscpconf
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET)
when two or more of these devices find themselves within transmission range. MANETs are
stand-alone (no existing infrastructure needed), autonomous networks that utilise multi-hop
communication to reach nodes out of transmitter range. Unlike infrastructure networks e.g. the
Internet with fixed topology, MANETs are dynamic. Despite the heterogeneous nature of these
two networks, integrating MANETs with the Internet extends the network coverage and adds to
the application domain of MANETs. One of the many ways of combining MANETs with the
Internet involves using Mobile Internet Protocol (Mobile IP) and a MANET protocol to route
packets between the Internet and the MANET via Gateway agents. In this paper, we evaluate the
performance of Mobile IP on MANET in Network Simulator 2 (NS2). We have implemented
Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand Multiple
Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols and compared performances based on Throughput, End-to-End Delay (E2ED),
Packet Delivery Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results
suggest that on-demand routing within the MANET better serves Mobile IP on MANETs.
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
The fast growing mobile data traffic causes the deficiency of cellular network capacity. To mitigate this problem, Wi-Fi offloading techniques where the mobile data traffic is offloaded through sparsely deployed Wi-Fi networks have been extensively investigated. Wi-Fi offloading techniques can be classified into: 1) auction game-based offloading and 2) congestion game-based offloading. To proposed system inventing a Finite Horizon Markov Decision Process (FHMDP) to make offloading decisions efficiently. The existing approach use two algorithms such as; 1) Hybrid offloading algorithm and 2) Monotone offloading algorithm. But the previous work of hybrid offloading algorithm and monotone offloading algorithm was not efficient. Based on the Finite Horizon Markov Decision Process (FHMDP) mechanism. The proposed mechanism of offload cellular network traffic of vehicular users through carrier Wi-Fi networks based on the game theory approach. It computes the mobile network offloading performance. In this design of offloading mechanism in order to improve the overall offloading performance. By reducing the number of vehicular users contending for the channel and prioritizing high WIFI data rates and thus the offloading performance can be improved. In the proposed approach is reducing the accessing cost, time and improve the Wi-Fi offloading performance.
Route Optimization (RO) in Mobile Internet Protocol
Version Six (MIPv6) is a technique that enables a
Mobile Node (MN) and a Corresponding Node (CN)
to communicate directly by bypassing the Home Agent
(HA). RO is usually faced with the problem of Internet
Protocol (IP) multilayer tunnels due to pinball or suboptimal
routing. The generic consideration in
designing route optimization scheme is to use
minimum signaling information in the IPv6 packet
header. In order for optimization to take place in
MIPv6, a protocol called route optimization protocol
must be introduced. Route optimization protocol is
used basically to improve performance. Also RO can
also be described as a mechanism that eliminates the
inefficiency in tunneling of packets from MRs to their
HA before being sent to CNs over the Internet.
However, Network Mobility (NEMO) can be described
as a network whose point of attachment to the Internet
varies with time.
The tradeoff between the two protocols can provide a
significant impact on the networks. Furthermore, one
potential choice of selecting any of the protocols can
increase or decrease the degree of application in used.
The tradeoff in offloading solution can vary from
mobile access network and core mobile network.
Optimizing traffic breakout and support for mobility
are paramount to service operators. The study focused
on the development and evaluation of an experimental
test bed of route optimization in MIPv6 and
NEMO.The tradeoff between the two protocols was
examined. The results of the experimental test bed
shows the benefit of next generation of Internet
system, especially for real-time applications that
need to provide seamless connection with low handoff
latency.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
Mobility Management For Next Generation NetworksGreen Packet
Increasingly, operators worldwide will be faced with a similar challenge of managing data congestion over multiple access networks. With networks evolving into LTE, operators would need to carefully assess the technology fit into integrating complementary nature of multiple access networks into an all-IP flat architecture. An all IP flat architecture helps to tie heterogeneous access networks that devices can attach to access end-user services. Communication devices today are able to connect with more than one type of wireless technologies to the “web of things”. An end-user will connect to a Wi-Fi hotspot, if within range. When moving away from range, the communication link is handover to for example, UMTS. The motivation of inter-working lies in marrying the diverse strengths of each communication technology. High-bandwidth data communication inherent in WLAN lacks mobility. Conversely, cellular technologies such as UMTS succeed in highly mobile environments, but limited in bandwidth. Although cellular networks are evolving from today’s 3G to LTE that brings promise of capacity leaps (by nearly 4 times), the overall data growth projection will outpace LTE deployments and fill up very quickly.
The immediate need to curtail congested network and effectively manage mobility is imminent to accommodate the data traffic on their networks. The impact of inter-mobility between inter access technology together with various types of mobility support including 3GPP legacy network and non 3GPP is necessary to provide a target low-latency, higher data-rate, all-IP core network capable of supporting real-time packet services. Some of the available IP mobility protocols lack sufficient control to the network to optimize the handover process and do not handle well with slow connection setups of some wireless technologies. This paper highlights the potential approaches of bringing together mobility technologies that are available and how these approaches contribute to resolve operator concerns in deployment of services and combating congestion, access technology integration and evolution to LTE from legacy 3GPP networks.
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIScscpconf
As the future generation networks are envisioned to be heterogeneous in nature, seamless
mobility in such networks is an important issue. While IETF work groups have standardized
various mobility management protocols, such as Mobile IPv6 (MIPv6), Fast Handovers for
Mobile IPv6 (Predictive FMIPv6, and Reactive FMIPv6), Hierarchical Mobile IPv6 (HMIPv6),
Proxy Mobile IPv6 (PMIPv6) and Fast Handovers for PMIPv6 (Predictive FPMIPv6, and
Reactive FPMIPv6), out of which some are host based and some are network based, the
decision regarding which protocol suits the future networks is still a research issue. The study
of various mobility management protocols in terms handover latency and the number of hops is
needed to evaluate these protocols. Even though much study has been done in literature in terms
of handover latency, study still needs performance evaluation in terms of average hop delay. In
this paper we study various mobility management protocols by applying simple numerical
analysis. The study is carried out for performance evaluation of various mobility management
protocols in terms of average hop delay, wireless link delay, wired part delay, and binding
update and registration delay. In this work, the average hop delay is estimated in terms of total
handover latency and total number of hops contributing to each protocol. The study enables us
to make a few important observations regarding the performance of these mobility management
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
Ubiquitous technologies based heterogeneous networks has opened a new paradigm of technologies, which are enabled with various different objects called Internet of things (IoT). This field opens new door for innovative and advance patterns with considerable potential advantages in the shape of plethora of monitoring and infotainment applications around us. Data communication is one of the significant area of research in IoT due to its diverse network topologies, where diverse gadgets and devices have integrated and connected with each other. In order to communicate among devices and users, routing should be relible, secure and efficient. Due to diverse and hetrogenous netwok environment, the most of the existing routing solutions do not provide all quality of services requirement in the network. In this paper, we discuss the existing routing trend in IoT, vision and current challenges. This paper also elaborates the technologies and domains to drive this field for future perspectives. The paper concludes with discussion and main points for new researchers in terms of routing to understand about current situation in IoT.
A review study of handover performance in mobile ipIJCNCJournal
The Mobile Internet Protocol (Mobile IP) is an extension to the Internet Protocol proposed by the Internet
Engineering Task Force (IETF) that addresses the mobility issues. In order to support un-interrupted
services and seamless mobility of nodes across the networks (and/or sub-networks) with permanent IP
addresses, handover is performed in mobile IP enabled networks. Handover in mobile IP is source cause of
performance degradation as it results in increased latency and packet loss during handover. Other issues
like scalability issues, ordered packet delivery issues, control plane management issues etc are also
adversely affected by it. The paper provides a constructive survey by classifying, discussing and comparing
different handover techniques that have been proposed so far, for enhancing the performance during
handovers. Finally some general solutions that have been used to solve handover related problems are
briefly discussed.
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATIONijujournal
Emerging sensor-embedded smartphones motivated the mobile Internet of Things research. With the integrated embedded hardware and software sensor components, and mobile network technologies, smartphones are capable of providing various environmental context information via embedded mobile device-hosted Web services (MWS). MWS enhances the capability of various mobile sensing applications such as mobile crowd sensing, real time mobile health monitoring, mobile social network in proximity and so on. Although recent smartphones are quite capable in terms of mobile data transmission speed and computation power, the frequent usage of high
performance multi-core mobile CPU and the high speed 3G/4G mobile Internet data transmission will quickly drain the battery power of the mobile device. Although numerous previous researchers have tried to overcome the resource intensive issues in mobile embedded service provisioning domain, most of the efforts were constrained because of the underlying resource intensive technologies. This paper presents a lightweight mobile Web service provisioning framework for mobile sensing which utilises the protocols that were designed for constrained Internet of Things environment. The prototype experimental results show that the proposed framework can provide higher throughput and less resource consumption than the traditional mobile Web service frameworks.
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATIONijujournal
Emerging sensor-embedded smartphones motivated the mobile Internet of Things research. With the
integrated embedded hardware and software sensor components, and mobile network technologies,
smartphones are capable of providing various environmental context information via embedded mobile
device-hosted Web services (MWS). MWS enhances the capability of various mobile sensing applications
such as mobile crowdsensing, real time mobile health monitoring, mobile social network in proximity and
so on. Although recent smartphones are quite capable in terms of mobile data transmission speed and
computation power, the frequent usage of high performance multi-core mobile CPU and the high speed
3G/4G mobile Internet data transmission will quickly drain the battery power of the mobile device.
Although numerous previous researchers have tried to overcome the resource intensive issues in mobile
embedded service provisioning domain, most of the efforts were constrained because of the underlying
resource intensive technologies. This paper presents a lightweight mobile Web service provisioning
framework for mobile sensing which utilises the protocols that were designed for constrained Internet of
Things environment. The prototype experimental results show that the proposed framework can provide
higher throughput and less resource consumption than the traditional mobile Web service frameworks.
Lightweight Mobile Web Service Provisioning for the Internet of Things Mediat...ijujournal
Emerging sensor-embedded smartphones motivated the mobile Internet of Things research. With the
integrated embedded hardware and software sensor components, and mobile network technologies,
smartphones are capable of providing various environmental context information via embedded mobile
device-hosted Web services (MWS). MWS enhances the capability of various mobile sensing applications
such as mobile crowdsensing, real time mobile health monitoring, mobile social network in proximity and
so on. Although recent smartphones are quite capable in terms of mobile data transmission speed and
computation power, the frequent usage of high performance multi-core mobile CPU and the high speed
3G/4G mobile Internet data transmission will quickly drain the battery power of the mobile device.
Although numerous previous researchers have tried to overcome the resource intensive issues in mobile
embedded service provisioning domain, most of the efforts were constrained because of the underlying
resource intensive technologies. This paper presents a lightweight mobile Web service provisioning
framework for mobile sensing which utilises the protocols that were designed for constrained Internet of
Things environment. The prototype experimental results show that the proposed framework can provide
higher throughput and less resource consumption than the traditional mobile Web service frameworks.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Vaccine management system project report documentation..pdf
An overview of internet engineering task force mobility management protocols: approaches and its challenges
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 6, December 2022, pp. 6559~6573
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i6.pp6559-6573 6559
Journal homepage: http://ijece.iaescore.com
An overview of internet engineering task force mobility
management protocols: approaches and its challenges
Prabha Mahenthiran, Dinakaran Muruganadam
School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India
Article Info ABSTRACT
Article history:
Received Oct 18, 2021
Revised Jul 23, 2022
Accepted Aug 18, 2022
In recent years, internet protocol mobility management has become one of
the most popular research areas in networking. Mobility management
protocols are in charge of preserving continuing communications as a user
roam between different networks. All existing internet protocols (IP), like
MIPv6, and PMIPv6, rely on a centralized mobility anchor to control mobile
node traffic and signaling. The disadvantages of centralized mobility
management (CMM) include ineffectiveness in handling massive volumes of
traffic, poor scalability, wasteful use of network resources, and packet delay.
When CMM is required to handle mobile media, which demands a huge
amount of information and frequently needs quality of services (QoS) such
as session continuance and reduced latency, these difficulties become
apparent. It drives the need for distributed mobility management protocol
(DMM) systems to manage the growing amount of mobile data, the
overwhelming of this is video communication. DMM approaches could be
regarded as an innovative and effective method to deal with mobility. An
overview of the CMM protocol and its drawbacks are analyzed. This study
examines the various DMM protocol techniques and their performance
metrics are compared to highlight similarities and differences. The study
reveals the network-based DMM protocol improves overall handoff time and
packet loss.
Keywords:
Centralized mobility
management
Distributed mobility
management
Mobile IPv6
Proxy Mobile IPv6
This is an open access article under the CC BY-SA license.
Corresponding Author:
Dinakaran Muruganadam
School of Information Technology and Engineering, Vellore Institute of Technology
Vellore, Tamil Nadu, India
Email: dinakaran.m@vit.ac.in
1. INTRODUCTION
According to Statista-2020 [1], Figure 1 shows 3.5 billion people own a smartphone around the
world. This means that roughly 73% of them have a smartphone. This ratio is fast rising, as evidence
suggests that there had been 1 billion users worldwide just 4 years ago, in 2016. It is estimated to be a
tremendous growth of 3.8 billion by the year 2021. Customer expectations are evolving as digital information
becomes more widely and freely accessible online. According to the most recent mobile statistics, 51 percent
of individuals use their phones to make online purchases, and nearly two-thirds people (66%) use retail
applications on their phones. Mobile web usage reports for 52.6 percent of all internet traffic. Mobile devices
accounted for 31.16 percent of global online traffic at the start of 2015. This figure has risen to 52.6%. With
the advent of 5G technology, which will deliver substantially better internet speeds and connectivity, we may
anticipate a steady increase in mobile data usage. Different types of new wireless internet services are now
being developed and are built on internet protocols (IP) technology [2]. On the IP, Physical & MAC layers, it
is really important to provide an effective mobility protocol.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6559-6573
6560
Figure 1. Smartphone users worldwide [1]
Mobility management protocols can be broadly classified into host-based and network-based
mobility management protocols. Mobile IPv6 is a host-based mobility management protocol [3]–[6]
suggested by the internet engineering task force (IETF) as the main protocol for mobility management. This
protocol includes hierarchical mobile IPv6 (HMIPv6) [7], [8], fast handover protocol (FMIPv6) [9], [10],
robust hierarchical mobile IPv6 (RH-MIPv6) [11], resource reservation pool [12] generally introduces a
network cost in terms of handoff latency, packet drop and signal overhead when the mobile node moves
frequently. A network-based protocol such as Proxy Mobile IPv6 [13]–[17] has been standardized by IETF.
In the PMIPv6, the proxy mobile agent in the providing network handles mobility on account of the mobile
nodes. Despite the introduction of various quick handover techniques, this protocol still struggles with
handoff latency and loss rate during handover. MIPv6 protocol and PMIPv6 protocol are based on the
centralized mobility management (CMM) approach. MIPv6's home agent (HA) and PMIPv6's local mobility
anchor (LMA) serve as a centralized mobile anchor, processing all control and data packets. This centralized
device makes a mobile node available when it is not at home, and it is also in charge of routing datagrams to
and from the mobile node.
The CMM model is prone to many issues. It also causes a decrease in overall network quality and
raises networking costs. IETF standardized distributed mobility management (DMM) [18], [19] concept to
overcome the limitations of CMM and developed DMM methods based on existing protocols like MIPv6 and
PMIPv6. DMM is generally encouraging the mobility management approach. The main idea behind the
DMM is, that it brings the mobility anchor closer to the mobile node. DMM enables the network to be
configured so that mobile data traffic is distributed appropriately without relying on a centrally installed
anchor. In terms of handoff latency, packet drop, signal cost, and network stress reduction, DMM outperform
existing mobility management protocols such as MIPv6 and PMIPv6.
2. METHOD
2.1. Centralized mobility management protocol
Several IP mobility management protocols have been standardized to ensure that mobile consumers
continue to receive service even if their network connection changes. The IETF developed centralized mobile
support systems for all-IP networks, in which a centralized mobile anchor control mobile node traffic and
signaling. The most common CMM protocols are MIPv6 and PMIPv6. PMIPv6 adds a LMA to the domain
to keep mobility internal, whereas MIPv6 includes a HA. Both mobile signals and user information transfer
are handled by this mobility anchor in CMM.
2.1.1. Mobile IPv6 protocol
The IETF has defined the MIPv6 protocol as host-based. Figure 2(a) shows a working operation of
mobile IPv6 and Figure 2(b) shows MIPv6 with route optimization. While traveling over the internet
topology, mobile IPv6 permits mobile devices to be reached and sustain continuing connections such as file
transfer protocol and streaming. Mobile nodes are given an Internet address called home address (HoA) to
maintain such a connection. This home address is a permanent IP address that serves two functions: one is to
make the mobile node reachable, and the second is to keep the IP layer movement/mobility hidden from
higher layers. A mobile node gets a new IP address called care-of-address (CoA) as it moves from one
location to another. The CoA is formed based on a stateless or stateful mechanism. Every time a mobile node
0
0.5
1
1.5
2
2.5
3
3.5
4
2012 2013 2014 2015 2016 2017 2018 2019 2020 2021
SMART
PHONE
USERS
IN
BILLIONS
YEAR
3. Int J Elec & Comp Eng ISSN: 2088-8708
An overview of internet engineering task force mobility management … (Prabha Mahenthiran)
6561
moves, it informs its HA of its current location. Binding update (BU) refers to the link between HA and its
CoA. This BU message will be stored in the HA's binding cache and used to confirm receipt of the BU as
binding acknowledgement (BA). The packets intended for MN's home address will be redirected by HA and
tunneled to its new CoA position. The HA is the tunnel's point of entry, and the mobile node's care-of address
is the tunnel's departure point. The entry point of the tunnel is the home agent and the exit point is the mobile
node’s care-of address. The tunnel is two-way, which ensures that the services offered by the home agent are
transparent.
(a) (b)
Figure 2. MIPv6 working operation in (a) normal communication and (b) route optimization
An operational overview of Mobile IPv6 is presented in RFC3775. A mobile node (MN) and a
correspondent node (CN) can communicate in one of two ways. Datagrams to the correspondent node were
transmitted from the MN to the HA, which subsequently redirected packets to the CN. The home network
employs neighbor discovery to interrupt traffic in this phase. The delay introduced by routing packets from
the home agent is significant. By forcing traffic via the home agent, the network gains a point of failure.
Route optimization [20], [21] is the second way of communication. A mobile node must establish its present
binding at the correspondent node for traffic from the CN to be routed directly to the mobile node. This mode
of communication allows for the shortest communication path and also eliminates traffic at the home
network. IPv6 also supports multiple home agents. In this situation, the mobile host uses dynamic home
agent discovery mechanisms to automatically discover the IP addresses of home agents. The message flow of
the MIPv6 diagram has been shown in Figure 3.
2.1.2. Drawback of MIPv6
The performance of the network gets degraded if the mobile node moves frequently in a local
domain. In MIPv6, mobile devices are unable to retain their previous upper-layer connections, resulting in a
scaling issue. This protocol faces a few problems to support loss-sensitive and real-time applications due to
high signaling overhead and delay. At the time of registration, the mobile node may lose the connection with
the correspondent node and it leads to packet loss. Mobile IP is not built to handle high-speed transmissions
gracefully. Every handoff has a certain amount of latency, during which the mobile node is unable to receive
messages. As a result, as the handoff rate rises, the rate of packet loss rises with it.
2.1.3. Proxy MIPv6 (PMIPv6) protocol
PMIPv6 is a network protocol. An IP mobility solution was implemented in a network. A mobile
node is not engaged in the IP mobile solution, i.e., MN is not aware of what is going on inside. Then how can
we achieve a network-based mobility management solution? The goal is to employ one of its network's
components as a proxy. It may be an access router. The protocol is known as PMIPv6 since it extends the
capability of MIPV6. The advantage of PMIPv6 is i) HA function and packets used in mobile signaling can
be reused, ii) A common HA would act as a mobile agent for all kinds of IPv6 nodes, and iii) PMIPv6 allows
less signaling compared to MIPv6 in each handoff because there is no duplicate address detection and return
routability. The following entities are used in PMIPv6 and are shown in Figure 4.
− LMA: the mobile node's binding status is managed by LMA, which functions as its home agent.
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6559-6573
6562
− Mobile access gateway (MAG): a MN is attached to this gateway. This access router manages the
mobility-related signaling for the MN. It also monitors the mobile node's movement to and from the
accessibility connection, as well as signaling to LMA.
− MN: the router or an internet host whose movement is controlled by the network is referred to as MN.
− LMA address: the global IP defined at the LMA is referred to as the LMA address. Between LMA and
MAG, a bidirectional path was built. MAG sends a proxy binding update (PBU) message to this address.
− Proxy care-of address (PCoA): his global address is established on the MAG's interface. This address is
viewed by LMA as the mobile node's CoA, which registers in the MN's binding cache entry (BCE).
− PBU: MAG sent a request to LMA to establish a link between a mobile node's home network prefix
(HNP) and its PCoA.
− Proxy binding acknowledgement (PBA): in reply to PBU, LMA sent a message to MAG.
− MN-HNP: it is a prefix for the connection between MAG and MN.
− MN home address (MN-HoA): this address is utilized as far as MN is connected to the access network.
Figure 3. Signaling flow of MIPv6
The signaling flow of PMIPv6, as shown in Figure 5, is as follows: when a mobile node connects to
MAG for the first time, it sends the router solicitation message to MAG [22]. The MAG sends a PBU
message to LMA for updating. LMA sends a response as a PBA, which includes MN-HNP. The BCE is
subsequently created, and a tunnel to MAG is established. In addition, MAG establishes a bidirectional
tunnel with LMA. MAG now has all of the data for the mobile host. MAG sends router advertisements (RA)
to gain access to the connection advertising the MN's HNP. MN has one or more legitimate addresses after a
successive address configuration. The data transmitted to or from the MN is handled by LMA and MAG
using the network prefix's address.
The MAG will notice the detachment of the mobile host from the connection if it alters its point of
attachment. The MAG then instructs the LMA to delete the MN's binding status. LMA acknowledges the
request and takes a certain amount of time for MAG to update the binding on the new link. If the LMA does
5. Int J Elec & Comp Eng ISSN: 2088-8708
An overview of internet engineering task force mobility management … (Prabha Mahenthiran)
6563
not receive an update within the time limit, it will erase MN's binding cache record. MAG will send a signal
to the LMA to update the binding state when it detects MN's connection to its new access point. The MAG
that is currently serving delivers a RA and MN-HNP, ensuring that the mobile host does not alter its layer 3
interface attachment.
Figure 4. Proxy mobile IPv6
Figure 5. Signal flow of mobile node attachment in PMIPv6
2.1.4. ISSUES ENCOUNTERED IN PMIPv6
PMIPv6 mobility solutions that rely on networks will impose numerous constraints. They are:
− Handoff latency: in PMIPv6, the mobile node experienced a large handoff delay because the handoff
signaling should go through LMA. Moreover, PMIPv6 does not have any buffering mechanism which
leads to the loss of packets during handoff.
− Bottleneck problem: LMA is engaged in the transmission of both control and data packets. LMA must
update the BCE as the mobile node traverses, producing congestion in the system.
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6559-6573
6564
− Route optimization: All incoming data must pass through the tunnel linking LMA and MAG, resulting in
a non-optimal path.
− Network mobility: PMIPv6 is intended to support the mobility of a single MN. It does not encourage
group movement.
− Load balancing: there is an absence of a load balancing mechanism. When the usage of mobile nodes grows,
MAG may become overburdened. As a result, an effective load balancing technique must be proposed.
2.2. Need for DMM protocol
The limits of centralized systems are anticipated to be numerous [23], necessitating expensive
network engineering and specifications. Routing through a central anchor that is not optimal often results in a
lengthier path. The amount of data traffic is rapidly increasing. This would necessitate a significant upgrade
to centralized architecture capabilities. In a centralized design with high growth in mobile nodes, maintaining
the mobility context and setting up special routes for each mobile node is tough. The number of signaling
messages grows, even more, when both endpoints are mobile. The system failure is more susceptible to the
CMM protocol.
With these restrictions in mind, the IETF recently suggested the DMM paradigm, which can be
regarded as an innovative and effective approach to mobile management The primary idea behind DMM is
that mobility anchors being dispersed throughout the system, topographically closer to users, that provides
near-optimal route assistance and effective network resource use, allowing upcoming mobile networks to
scale more easily. Accessibility to the top layer is only granted when it is required in DMM. Prefix
provisioning, signal messages to upgrade the position, and address setting are all reduced to the absolute
minimum. The following entities are used in DMM
− Mobile anchor access router (MAAR): it is the router, to which the node is attached. It performs the
function of LMA and MAG. Also, act as a mobility manager.
− Central mobile database (CMD): the BCE for the mobile node is saved in CMD.
− Previous MAAR (PMAAR): MAAR that served the mobile node before moving to a foreign network, it
is called PMAAR.
− Serving MAAR (SMAAR): it is the MAAR whereby the node is currently connected.
− Anchoring MAAR: an IPv6 address that the mobile node uses.
− Distributed logical interface (DLIF): DLIF is a logic interface at the IP layer of the MAAR.
2.2.1. Advantages of DMM protocol
The following advantages motivate the DMM solutions to handle mobile data traffic in an effective
manner: i) by placing an internet service station nearer to the MN, mobility cost is decreased; ii) latency was
reduced compared to the CMM protocol; iii) the data plane and control plane functions are divided; iv) DMM
provides fast path updates during handover. DMM has an excellent handover performance compared to
centralized mobility protocols; v) to improve packet delivery efficiency, DMM is beneficial. Out of sequence
packet delivery can be avoided by using only one data forwarding per flow; vi) data are distributed among
access nodes; thereby, scalability issues are avoided; vii) temporary tunnels are established between access
nodes only when it is necessary; and viii) as a result of DMM's better traffic distribution among network
entities, congestions and resource wastage can be avoided.
2.3. Approaches in distributed mobility management
According to the IP mobility support protocol, the DMM solution is based on mobility anchors and
dynamic updating of the forwarding devices based on MN's location. Tunneling between the mobile host and
the mobile anchor keeps its forwarding plane intact. Mobile traffic and movement control are also
disseminated and dynamically engaged at the access network, as per MN. DMM can be approached in two
ways. One of them aims at distributing host-based MIPv6 [24]–[26]. A Second approach aimed at making
network-based PMIPv6 [27]–[31] in a scattered way. The following session elaborates host-based DMM and
network-based DMM. In host-based DMM, the present location of MN, its IP sessions, and anchor positions
are provided to the mobility system. In the event of network-based DMM, the DMM entity retrieves the same
information without involving the node.
2.3.1. Host-based DMM protocol
DMM approach extends or reuses the existing MIPv6 protocols. In this method there is no single
anchor but the anchors are distributed at several access router. The following elements are supported by the
DMM method in a distributed way.
7. Int J Elec & Comp Eng ISSN: 2088-8708
An overview of internet engineering task force mobility management … (Prabha Mahenthiran)
6565
− Access mobility anchor (AMA): HA in MIPv6 is extended as AMA in the host-based DMM approach.
The access router is usually where this AMA runs. AMA's features include allocating a network address
to the mobile node and maintaining binding caches. Mobility signaling messages from the mobile node or
its nearby AMA are used to update the binding cache. Serving AMA is the AMA where the mobile node
is currently connected. Serving AMA configures the mobile node's IP address and initiates a message
exchange with that IP address.
− Access binding update (ABU) and access binding acknowledgement (ABA): the mobile node and the
serving AMA exchange BU and BA messages. In addition to this, signaling messages are also mentioned
in DMM. Serving AMA sends ABU messages to originating AMA(s). A tunnel is established between
both AMA’s with the help of ABU messages. In response, an acknowledgement is sent.
Figure 6 illustrates the architecture of the host-based DMM protocol which supports the mobile
node’s handover in a distributed manner. While the mobile node stays at AMA1 it acquires IP Address as
Pref A::MN1 and the status is preferred. When it moves to AMA2, MN acquires a new IP address as Pref
B::MN1. The mobile node registers this information to AMA2 by sending the binding update message.
AMA2 forwards this information to AMA1. AMA1 accepts AMA2's request and responds with an
acknowledgment (ABA) message. As a result, a bidirectional channel connecting AMA1 and AMA2 is
established. MN packets for Pref A::MN1 are sent through a bidirectional channel linked to the AMA1. Due
to the deprecation of Pref A::MN1, AMA2 does not use this IP address for communication with new CNs.
The new IP address, PreB::MN1, is used for new communication sessions with CN2 that do not require
tunneling in the example above.
Figure 6. The structure of host-based DMM protocol
The host-based DMM removes a single mobile anchor i.e., the home agent in MIPv6. In DMM
AMA’s are distributed at the access level. It eliminates the problem of system failure Mobile nodes are
involved in signaling because it is a host-based technique. To continue the mobility session of the mobile
node, tunnels are formed between AMA’s. So, tunneling overhead issues are reduced compared to
MIPv6.The creation of such multiple bi-directional tunnels produces a higher mobility rate and the system
performance requires frequent registration and management of several tunnels.
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6559-6573
6566
2.3.2. Network-based DMM protocol
The mobile node does not send or receive mobility signals. Mobility anchors were distributed and
performed signaling in favor of mobile nodes, similar to PMIPv6. In NB-DMM, the functional elements are:
− Mobility access router (MAR): similar to MAG in PMIPv6. It detects the attachment of the node and
provides HNP to the attached node. MAR maintains a binding cache to store the mobile node’s mobile
context dB for obtaining the information of the mobile node. The MAR where the mobile node is currently
connected is called serving MAR. The source MAR is the anchor point of HNP. The network packets are
sent through a bilateral tunnel formed between the origin MAR and the serving MAR.
− Mobility contextual database (MCDB): it is a repository that keeps track of the HNP's origin MAR. It
gives the Serving MAR mobility information of the mobile node.
− MAR binding update (MBU) and MAR binding acknowledgement (MBA): this signaling message is
exchanged between the MAR’s. For tunnel establishment, Serving MAR sends MAR binding update messages
to the origin MAR. Origin MAR will send the response as the MAR binding acknowledgement to SMAR.
− Mobile contextual request (MCReq) and response (MCres): between the database and the serving MAR,
this message is used. Request is transmitted by SMAR to upgrade or receive the information about the
mobile node in the database. MCDB will send the response message to the serving MAR.
The architecture of the network-based DMM protocol is depicted in Figure 7. In this architecture,
MN moves from the MAR1 access network to MAR2. While MN resides at MAR1 it uses an IP address as
HNP A::MN1. The mobile node then connects to the MAR2 access network. When MAR2 discovers the MN
connection it initially sends and receives the MCReq message & MCRep message to update & recover
mobile context information from DB. MAR2 obtain the previous MN prefix as HNPA::/64 and its relevant
information. MAR2 then sends the Router Advertisement message containing HNPA::/64, “Deprecated” choices
& allocates the latest home network prefix as HNP B::MN1. The mobile node retains the former IP Address and
allocates a current address. This new address is used for new correspondence and the former address is solely for
ongoing correspondence. The ongoing communication to HNPA::MN1 is anchored to MAR1 and then it is
tunneled from MAR1 to MAR2. The new correspondence session is routed without tunneling.
Figure 7. The architecture of the network-based DMM protocol
Network-based DMM is categorized into 1, Partially DMM 2, Fully DMM, and Partially DMM
comprises MAAR and CMD [32], [33]. Mobile node's mobility information is managed by CMD in the
control plane. In the data plane, MAAR is an important component of PMIPv6's LMA and MAG. There is no
CMD in fully distributed mobility management. MAAR, which is positioned at the network's edge, handles
both the planes.
9. Int J Elec & Comp Eng ISSN: 2088-8708
An overview of internet engineering task force mobility management … (Prabha Mahenthiran)
6567
a. Partial network-based DMM protocol
The functions of the information plane and controlling plane are separated. MAAR distributes and
manages its data plane. The central mobility database is used by the control layer. LMA is replaced as CMD
and able to send PBU and PBA messages. MAG is renamed MAAR. It maintains BCE for a mobile node.
This cache stores the PMAAR's information. Each MAAR allocates global Prefixes to its mobile node. The
same Prefix cannot be allocated by some other MAAR. To retrieve the past data of the mobile node, MAAR
needs to contact the CMD.
The communication flow for the initial setup of the mobile host has been depicted in Figure 8. When
a mobile node is attached to MAAR1 for the first time, it assigns an IPv6 prefix to MN and stores this prefix
in BCE. MAAR1 sends PBU along with the mobile node prefix and its ID to CMD. CMD stores a BCE since
it is the first registration. Then CMD sends a proxy binding acknowledgment to MAAR1. MAAR1 stores it
in BCE and unicast a routing advertisement message.
Figure 8. Communication flow for the initial setup of MN
A scenario after handover has been shown in Figure 9. When a mobile node moves to a new
MAAR2, CMD behaves in the following steps. The new MAAR2 assigns Prefix2 to the mobile node and
stores this information in BCE and sends PBU to CMD. CMD retrieves the existing data of the mobile node
and forwards this PBU to PMAAR1. After receiving a PBU, MAAR1 installs a passage towards MAAR2,
then sends PBA to CMD.CMD updates this information in BCE and sends PBA to SMAAR2 containing
previous Proxy CoA and its prefix. Now the bidirectional tunnel is established between PMAAR1 and
SMAAR2. MAAR1 now receives packets addressed to prefix1 and forwards them to MAAR2. Packet flow
after handover is shown in Figure 10.
The scenario after handover where CMD act as a proxy is shown in Figure 11. PBU sent by the
PMAAR, requires a longer time to hit the CMD. SMAAR receives multiple PBA's from the CMD in
response to PBU. Retransmission needs to be taken place by the CMD. It leads to a burst in the packet. To
avoid this burst paging mechanism must be introduced.
− DE-Registration: only serving MAAR is allowed to deregister the whole mobile node session.
− RE-Transmission: to configures the retransmission INITIAL BINDACK-TIMEOUT should be used.
10. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6559-6573
6568
Figure 9. Signaling flow after handover
Figure 10. Packet flow after handover
Figure 11. Handover where CMD acts as a proxy
11. Int J Elec & Comp Eng ISSN: 2088-8708
An overview of internet engineering task force mobility management … (Prabha Mahenthiran)
6569
b. Fully network-based DMM
On the access link, every MAARS does have a collection of IPv6 prefixes that can be given to MN.
Fully proxy based DMM architecture does not have any central control entity [34]–[36]. Each MAAR has its
cache for the mobile node. The MAARs are now in charge of both planes. Packet flow after the handover in
fully Proxy based DMM is shown in Figure 12.
Figure 12. Packet flow after the handover in full proxy-based DMM
In fully DMM, a lack of awareness about other MAARs and their advertising prefixes becomes a
significant bottleneck. When a mobile node attaches, this MAAR has to know two things to effectively
ensure its mobility and the continuity of its data flow: i) whether the node contains any P-MAAR and ii) if it
does, which prefixes were broadcast by which MAAR. Various approaches can be used to accomplish this:
i) make a prior approach that employs layer 2 or layer 3 techniques. Because the present MAAR knows the
target MAAR before handoff, the mobility information can be communicated; ii) schemes for MAAR
identity: they can use a peer-to-peer method or a unicast/multicast/ broadcast query technique; iii) the MN's
explicit confirmation; and iv) additional MN-MAAR connection protocols.
3. RESULTS AND DISCUSSION
3.1. Performance analysis of CMM and DMM protocols
The introduced DMM protocols have the same properties as their corresponding CMM protocols. In
comparison to earlier CMM protocols, Table 1 shows the features of DMM methods. Both CMM and DMM
protocol is described in [3]–[18]. The comparison reveals the DMM protocol outperforms the existing CMM
protocols.
Table 1. Comparison between CMM and DMM protocol
PARAMETER MIPv6 PMIPv6 MIPv6- DMM PMIPv6 -DMM
Type of motility
management
Host protocol Network protocol Host protocol Network protocol
Mobile node address HoA, CoA HoA IP addresses configured at
the access network
IP addresses configured at
the access network
Number of mobile node
addresses associated
Two One N N
Signaling message BU/Back between
MN and HA
PBU/Proxy binding
between MAG and
LMA
BU/BA between serving
AMA and MN, Anchor
BU/Anchor BA.
MBU/MBA and
MCREQUEST/MCRESP
ONSE
Tunneling HA-MN tunnel LMA-MAG tunnel Origin AMA(s)- current
AMA tunnel
Origin MAR(s)- serving
MAR tunnel
Tunneling per MN 1 1 n-1(shared with another
mobile Node)
n-1(shared with another
mobile Node)
Mobility has an impact on both the control plane and the data plane in communication in general.
When a mobile node enters a new position, signaling is introduced, so it is necessary to alter the route to
deliver all packets. To provide seamless mobility to the user, the mobility management protocol introduces
12. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6559-6573
6570
tunneling as an implicit mechanism. The following are the performance metrics used to measure the
efficiency of the protocol.
a. Signaling cost: as mentioned earlier, the fundamental process of IP is to ensure the mobility event of a
node is up-to-date when it hops between subnets. This task necessitates the transmission of control
packets across motility agents. When a mobile node moves, it must send a notification to its mobility
anchor. The location registration is needed even if the mobile node does not communicate with others.
The cost of signaling for location updates will become more critical as the number of MNs grows. Host-
based DMM has lower expenses compared to CMM [37], [38]. Network-based DMM has the highest
signaling burden because it has additional signaling involvement.
b. Cost of data packet delivery: the quantity of incoming packets and the number of hops influences the cost
of delivery of data packet [39], [40]. It rises in a straight manner with the speed of transmission. DMM
performs well compared to CMM since it avoids long routes and forwards traffic in an optimized way.
All messages in CMM are sent through a central entity resulting in a longer path.
c. Tunneling cost: for data packet transmission, all the mobility management protocol uses the tunnel. This
metric is represented by adding the tunneling burden cost to the message distribution cost. The tunnel
expense of DMM [41], [42] is lower compared to the CMM protocol.
d. Processing cost: processing cost is nothing but the number of signaling messages sent by a mobile node
per unit time to a network entity [43]. In specific, count the average number of proxy binding updates
transmitted for each time unit to the local mobile anchor and the average number of proxy binding
updates transmitted to the MAR as in the case of the distributed mobility management protocol. Higher
values of this metric would reflect the possibility of encountering scalability problems.
e. Packet loss and handover latency during a session: the number of packets lost during a session is another
relevant measure [44]. This metric is based on handover latency [45], [46] and is determined as the total
number of packets lost per mobile node throughout handover operations. A mobile node cannot accept
packets until the handover process is completed. Handover latency is the time difference between
transmission and reception of an IP packet. This handover delay is affected by the following parameters:
− Layer 2 handover time: the time required by link layer (L2) to perform handover
− Movement detection time: it is the time required by the device to detect that it has moved to Layer 3.
− IP configuration and duplicate address detection: the time required to verify the uniqueness of an IPv6
address.
f. Handover failure probability: if the mobile node leaves the subnetwork or cell residence before
completing the necessary signaling messages, handover gets fails. As a result, the handover probability of
failure is based on the possibility that the residence time of a subnetwork or cell is much less than handoff
latency (HL). The minimizing of probabilities [47] is critical for mobile management methods since HFP
is deemed to be more important.
g. Security authentication delay: the handoff period is also dependent upon that network's specific
authentication technique [48] that the user terminal acquires.
h. Registration delay: it is defined as the number of hops between the MN and the HA. As the hop count
increases, registration delay increases for all protocols except host-based DMM [49]. There may be a
significant registration problem related to the participation of the mobile context database & mobile
anchor.
i. Mobility anchor load: the proportion of a mobile node's total amount of ongoing sessions to the number
of mobility anchors is known as mobility anchor load [50], [51]. In comparison to the DMM protocol, a
mobility anchor load of said CMM protocol increases
4. CHALLENGES IN THE DEVELOPMENT OF DISTRIBUTED MOBILITY MANAGEMENT
PROTOCOL
Distributed mobility management protocol has several challenges and some of the circumstances are
summarized below.
a. Complex address and tunnel management: as a mobile node may obtain a current address while retaining
its prior addresses, the n volume of addresses, as well as the n-1 volume of tunnels linked with the MN
rises. Therefore, it is essential to design efficient tunneling and address management scheme.
b. Delay for registration and high signal cost: signaling messages to manage bidirectional tunnel from
serving mobile anchor and origin mobile anchor are necessary when the number of tunnels connected
with the mobile node grows. Even when the mobile anchor tries to handle the signal message, it increases
the registration latency and signals overhead.
c. High handover latency: DMM incurs high latency as the mobile nodes move rapidly. For instance,
smartphone consumers in fast-moving vehicles with long-term sessions.
13. Int J Elec & Comp Eng ISSN: 2088-8708
An overview of internet engineering task force mobility management … (Prabha Mahenthiran)
6571
d. Network setup and resource organization: in a distributed environment, resource managerial functions
like self-optimization, QoS provision and network configuration are required.
e. Security consideration: End-to-End security and access network control are essential to secure DMM.
5. CONCLUSION
This article focuses on the detailed study of centralized mobility management protocol, its
limitation, and distributed mobility management protocol with the primary objective of providing flexibility
and scalability for the next-generation mobile networks. The study result shows that the DMM protocol
offers more benefits than the CMM protocol. In addition to this study, we discussed a few challenges that
should be focused on while designing the distributed mobility management protocol. Even though the DMM
protocol helps to save network resources, there are numerous circumstances in which the protocol results in a
decrease in network quality. The future work includes i) the simulation analysis of the network-based DMM
protocol to improve the network performance and ii) to focus on DMM handover issues for the multiple MN
and reducing the packet loss.
REFERENCES
[1] J. Clement, “Global mobile data traffic from 2017 to 2022,” statista.com, 2017. https://www.statista.com/statistics/271405/global-
mobile-data-traffic-forecast/. Accessed: Feb. 28, 2020.
[2] A. B. Abdulkarem and L. Audah, “Design and development of handover simulator model in 5G cellular network,” International
Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 4, pp. 3310–3318, Aug. 2021, doi:
10.11591/ijece.v11i4.pp3310-3318.
[3] D. Johnson, C. Perkins, and J. Arkko, “Mobility support in IPv6,” RFC 3775, 2004.
[4] J.-H. Lee, J.-M. Bonnin, I. You, and Ta.-M. Chung, “Comparative handover performance analysis of IPv6 mobility management
protocols,” IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp. 1077–1088, Mar. 2013, doi:
10.1109/TIE.2012.2198035.
[5] X. Pérez-Costa, M. Torrent-Moreno, and H. Hartenstein, “A performance comparison of Mobile IPv6, Hierarchical Mobile IPv6,
fast handovers for Mobile IPv6 and their combination,” ACM SIGMOBILE Mobile Computing and Communications Review,
vol. 7, no. 4, pp. 5–19, Oct. 2003, doi: 10.1145/965732.965736.
[6] C. Makaya and S. Pierre, “An analytical framework for performance evaluation of IPv6-based mobility management protocols,”
IEEE Transactions on Wireless Communications, vol. 7, no. 3, pp. 972–983, Mar. 2008, doi: 10.1109/TWC.2008.060725.
[7] H. Soliman, C. Castelluccia, K. El Malki, and L. Bellier, “A hierarchical mobile IPv6 proposal,” HMIPv6, 2005.
[8] J.-H. Lee, Y.-H. Han, S. Gundavelli, and T.-M. Chung, “A comparative performance analysis on Hierarchical Mobile IPv6 and
Proxy Mobile IPv6,” Telecommunication Systems, vol. 41, no. 4, pp. 279–292, Aug. 2009, doi: 10.1007/s11235-009-9163-z.
[9] C. Perkins, G. Dommety, K. El-Malki, G. Tsirtsis, and A. Yegin, “Fast Handovers for Mobile Ipv6,” RFC 4068, 2000.
[10] M. M. Sajjad, D. Jayalath, and C. J. Bernardos, “A comprehensive review of enhancements and prospects of fast handovers for
mobile IPv6 protocol,” IEEE Access, vol. 7, pp. 4948–4978, 2019, doi: 10.1109/ACCESS.2018.2887146.
[11] S. Pack, T. You, and Y. Choi, “Performance analysis of robust hierarchical mobile IPv6 for fault tolerant mobile services,” IEICE
Transactions on Communications, vol. E87-B, no. 5, pp. 1158–1165, 2004.
[12] M. Li, X. She, L. Chen, and H. Otsuka, “A novel resource reservation scheme for fast and successful handover,” in 2009 IEEE
20th International Symposium on Personal, Indoor and Mobile Radio Communications, Sep. 2009, pp. 556–560, doi:
10.1109/PIMRC.2009.5450358.
[13] S. Gundavelli, K. Leung, V. Devarapalli, K. Chowdhury, and B. Patil, “Proxy mobile IPv6,” IETF RFC 5213, 2008.
[14] H.-Y. Choi, S.-G. Min, Y.-H. Han, J. Park, and H. Kim, “Implementation and evaluation of proxy mobile IPv6 in NS-3 network
simulator,” in 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications,
Dec. 2010, pp. 1–6, doi: 10.1109/ICUT.2010.5677817.
[15] A. J. Jabir, S. Shamala, Z. Zuriati, and N. Hamid, “A comprehensive survey of the current trends and extensions for the proxy
mobile IPv6 protocol,” IEEE Systems Journal, vol. 12, no. 1, pp. 1065–1081, Mar. 2018, doi: 10.1109/JSYST.2015.2497146.
[16] I. Soto, C. J. Bernardos, M. Calderón, and T. Melia, “PMIPv6: A network-based localized mobility management solution,” The
Internet Protocol Journal, vol. 13, no. 3, pp. 2–15, 2010.
[17] W. Siang Hoh, B.-L. Ong, S.-K. Yoon, and R. B. Ahmad, “A comprehensive performance evaluation of MIPv6 and PMIPv6
mobility management protocols in wireless mesh network,” International journal of electrical and computer engineering systems,
vol. 12, pp. 1–8, Nov. 2021, doi: 10.32985/ijeces.12.si.1.
[18] A. Chan, D. Liu, P. Seite, H. Yokota, and J. Korhonen, “Requirements for distributed mobility management,” RFC 7333, 2014.
[19] S. Jeon, S. Figueiredo, R. L. Aguiar, and H. Choo, “Distributed mobility management for the Future mobile networks: A
comprehensive analysis of Key design options,” IEEE Access, vol. 5, pp. 11423–11436, 2017, doi:
10.1109/ACCESS.2017.2713240.
[20] O. D. Adeniji and A. Osofisan, “Route optimization in MIPv6 experimental test bed for network mobility: Tradeoff analysis and
evaluation,” International Journal of Computer Science and Information Security, vol. 18, no. 5, pp. 19–28, 2020.
[21] A. K. Barbudhe, V. K. Barbudhe, and C. Dhawale, “Comparison of mechanisms for reducing handover latency and packet loss
problems of route optimization in MIPv6,” in 2015 IEEE International Conference on Computational Intelligence &
Communication Technology, Feb. 2015, pp. 323–329, doi: 10.1109/CICT.2015.119.
[22] K. Vasu, S. Mahapatra, and C. S. Kumar, “Block prefix mechanism for flow mobility in PMIPv6 based networks,” arXiv preprint
arXiv:1907.05102, Jul. 2019.
[23] F. Giust, C. J. Bernardos, S. Figueiredo, P. Neves, and T. Melia, “A hybrid MIPv6 and PMIPv6 distributed mobility management:
The MEDIEVAL approach,” in 2011 IEEE Symposium on Computers and Communications (ISCC), Jun. 2011, pp. 25–30, doi:
10.1109/ISCC.2011.5984020.
[24] J.-H. Lee, J.-M. Bonnin, and X. Lagrange, “Host-based distributed mobility management support protocol for IPv6 mobile
networks,” in 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications
14. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6559-6573
6572
(WiMob), Oct. 2012, pp. 61–68, doi: 10.1109/WiMOB.2012.6379140.
[25] T.-T. Nguyen and C. Bonnet, “A hybrid centralized-distributed mobility management for supporting highly mobile users,” in
2015 IEEE International Conference on Communications (ICC), Jun. 2015, pp. 3945–3951, doi: 10.1109/ICC.2015.7248940.
[26] M. Balfaqih, Z. Balfaqih, V. Shepelev, S. A. Alharbi, and W. A. Jabbar, “An analytical framework for distributed and centralized
mobility management protocols,” Journal of Ambient Intelligence and Humanized Computing, vol. 13, no. 7, pp. 3393–3405, Jul.
2022, doi: 10.1007/s12652-020-01749-x.
[27] C. J. Bernardos, A. de la Oliva, A. F. Giust, J. C. Zuniga, and A. Mourad, “Proxy mobile IPv6 extensions for distributed mobility
management,” DMM Working Group, 2020.
[28] M. Balfaqih, M. Ismail, R. Nordin, A. A. Rahem, and Z. Balfaqih, “Fast handover solution for network-based distributed mobility
management in intelligent transportation systems,” Telecommunication Systems, vol. 64, no. 2, pp. 325–346, Feb. 2017, doi:
10.1007/s11235-016-0178-y.
[29] F. Giust, L. Cominardi, and C. Bernardos, “Distributed mobility management for future 5G networks: overview and analysis of
existing approaches,” IEEE Communications Magazine, vol. 53, no. 1, pp. 142–149, Jan. 2015, doi:
10.1109/MCOM.2015.7010527.
[30] F. Giust, C. J. Bernardos, and A. de la Oliva, “Analytic evaluation and experimental validation of a network-based IPv6
distributed mobility management solution,” IEEE Transactions on Mobile Computing, vol. 13, no. 11, pp. 2484–2497, Nov. 2014,
doi: 10.1109/TMC.2014.2307304.
[31] H. Ali-Ahmad, M. Ouzzif, P. Bertin, and X. Lagrange, “Performance analysis on network-based distributed mobility
management,” Wireless Personal Communications, vol. 74, no. 4, pp. 1245–1263, 2014.
[32] Y. Wang, X. Li, and W. Zhang, “A comparative study on PMIPv6 and partially DMM network architecture,” International
Journal of Multimedia and Ubiquitous Engineering, vol. 11, no. 8, pp. 203–212, 2016.
[33] M. K. Murtadha, N. K. Noordin, B. M. Ali, and F. Hashim, “Design and evaluation of distributed and dynamic mobility
management approach based on PMIPv6 and MIH protocols,” Wireless Networks, vol. 21, no. 8, pp. 2747–2763, Nov. 2015, doi:
10.1007/s11276-015-0950-z.
[34] F. Giust, C. J. Bernardos, and A. de la Oliva, “HDMM: deploying client and network-based distributed mobility management,”
Telecommunication Systems, vol. 59, no. 2, pp. 247–270, Jun. 2015, doi: 10.1007/s11235-014-9959-3.
[35] M. K. Murtadha, N. K. Noordin, B. M. Ali, and F. Hashim, “Design and simulation analysis of network-based fully distributed
mobility management in flattened network architecture,” Telecommunication Systems, vol. 65, no. 2, pp. 253–267, Jun. 2017, doi:
10.1007/s11235-016-0226-7.
[36] M. K. Murtadha, N. K. Noordin, B. M. Ali, and F. Hashim, “Fully distributed mobility management scheme for future
heterogeneous wireless networks,” in 2015 IEEE 12th Malaysia International Conference on Communications (MICC), Nov.
2015, pp. 270–275, doi: 10.1109/MICC.2015.7725446.
[37] J. Lee, J. Bonnin, P. Seite, and H. Chan, “Distributed IP mobility management from the perspective of the IETF: motivations,
requirements, approaches, comparison, and challenges,” IEEE Wireless Communications, vol. 20, no. 5, pp. 159–168, Oct. 2013,
doi: 10.1109/MWC.2013.6664487.
[38] S. Figueiredo, S. Jeon, D. Gomes, and R. L. Aguiar, “D3M: Multicast listener mobility support mechanisms over distributed
mobility anchoring architectures,” Journal of Network and Computer Applications, vol. 53, pp. 24–38, Jul. 2015, doi:
10.1016/j.jnca.2015.02.006.
[39] J. Carmona-Murillo, V. Friderikos, and J. L. González-Sánchez, “A hybrid DMM solution and trade-off analysis for future
wireless networks,” Computer Networks, vol. 133, pp. 17–32, Mar. 2018, doi: 10.1016/j.comnet.2018.01.030.
[40] L. T. Jung and A. Ali Wagan, “Distributed network mobility management scheme for network mobility,” in 2018 4th
International Conference on Computer and Information Sciences (ICCOINS), Aug. 2018, pp. 1–6, doi:
10.1109/ICCOINS.2018.8510603.
[41] M. Balfaqih, M. Ismail, R. Nordin, and Z. Balfaqih, “Handover performance evaluation of centralized and distributed network-
based mobility management in vehicular urban environment,” in 2017 9th IEEE-GCC Conference and Exhibition (GCCCE), May
2017, pp. 1–5, doi: 10.1109/IEEEGCC.2017.8447938.
[42] P. P. Ernest, H. A. Chan, O. E. Falowo, and L. A. Magagula, “Distributed mobility management with distributed routing
management at access routers for network-based mobility support,” Wireless Personal Communications, vol. 84, no. 1,
pp. 181–205, Sep. 2015, doi: 10.1007/s11277-015-2602-0.
[43] S. Pack and Y. Choi, “Performance analysis of hierarchical mobile IPv6 in IP-based cellular networks,” in 14th IEEE Proceedings
on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003., pp. 2818–2822, doi:
10.1109/PIMRC.2003.1259259.
[44] M. Balfaqih, M. Ismail, R. Nordin, and Z. Balfaqih, “Handover performance analysis of distributed mobility management in
vehicular networks,” in 2015 IEEE 12th Malaysia International Conference on Communications (MICC), Nov. 2015,
pp. 145–150, doi: 10.1109/MICC.2015.7725424.
[45] J. Wozniak, “Mobility management solutions for current IP and future networks,” Telecommunication Systems, vol. 61, no. 2,
pp. 257–275, Feb. 2016, doi: 10.1007/s11235-015-9999-3.
[46] Z. Balfaqih, “Design and development of network simulator module for distributed mobility management protocol,” Journal of
Ambient Intelligence and Humanized Computing, vol. 13, no. 7, pp. 3407–3421, Jul. 2022, doi: 10.1007/s12652-020-01764-y.
[47] S. Alam, S. Sulistyo, I. W. Mustika, and R. Adrian, “Handover decision for V2V communication in VANET based on moving
average slope of RSS,” Journal of Communications, vol. 16, no. 7, pp. 284–293, 2021, doi: 10.12720/jcm.16.7.284-293.
[48] L. Zhang, M. Ma, and Y. Qiu, “An enhanced handover authentication solution for 6LoWPAN networks,” Computers & Security,
vol. 109, Oct. 2021, doi: 10.1016/j.cose.2021.102373.
[49] M. Aman, S. Mahfooz, M. Zubair, N. Mukhtar, K. Imran, and S. Khusro, “Tunnel-free distributed mobility management (DMM)
support protocol for future mobile networks,” Electronics, vol. 8, no. 12, Dec. 2019, doi: 10.3390/electronics8121519.
[50] J. Carmona-Murillo, I. Soto, F. J. Rodríguez-Pérez, D. Cortés-Polo, and J. L. González-Sánchez, “Performance evaluation of
distributed mobility management protocols: Limitations and solutions for future mobile networks,” Mobile Information Systems,
vol. 2017, pp. 1–15, 2017, doi: 10.1155/2017/2568983.
[51] T.-T. Nguyen and C. Bonnet, “On the efficiency of dynamic multicast mobility anchor selection in DMM: Use cases and
analysis,” in 2014 IEEE International Conference on Communications (ICC), Jun. 2014, pp. 2828–2834, doi:
10.1109/ICC.2014.6883753.
15. Int J Elec & Comp Eng ISSN: 2088-8708
An overview of internet engineering task force mobility management … (Prabha Mahenthiran)
6573
BIOGRAPHIES OF AUTHORS
Prabha Mahenthiran received the B.Tech. and MTech degrees in Computer
Science Engineering from SASTRA University, Thanjavur, India, in 2010 and 2012,
respectively. She is pursuing a Ph.D. degree in the School of Information Technology and
Engineering, Vellore Institute of Technology, Vellore, Tamil Nādu-India. Her research interests
include computer networks, mobile computing, image processing, real-time systems, and
database management systems. She can be contacted at email: prabhamani_88@yahoo.co.in,
prabha.m2019@vitstudent.ac.in.
Dinakaran Muruganadam has completed his B.Tech. (IT), M.Tech (IT-
Networking) in Vellore Institute of Technology and Ph.D in Anna University, Chennai, Tamil
Nadu and India. He worked in TATA Consultancy Services as Assistant System Engineer from
September 2006 to July 2009. Currently he is working as Associate Professor and Head–
Department of IT, School of Information Technology and Engineering, VIT University,
Vellore. He has published around 50+ articles in various International Conferences and
Journals. His research interests are mobile networks and software engineering. He can be
contacted at email: dinakaran.m@vit.ac.in, dinakaran.bpm@gmail.com.