1) The document discusses route optimization techniques for solving the triangle routing problem in Mobile IPv4, specifically evaluating the performance of the Internet Service Provider Mobile Border Gateway (ISP MBG) scheme.
2) It provides background on Mobile IP, the triangle routing problem, and introduces the ISP MBG technique for optimizing routes.
3) The study evaluates the performance of ISP MBG by varying system parameters like number of nodes and zones, finding it provides shorter transmission times compared to conventional Mobile IP.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
Despite the advances in hardware for hand-held mobile devices, resource-intensive applications (e.g., video and imagestorage and processing or map-reduce type) still remain off bounds since they require large computation and storage capabilities.Recent research has attempted to address these issues by employing remote servers, such as clouds and peer mobile devices.For mobile devices deployed in dynamic networks (i.e., with frequent topology changes because of node failure/unavailability andmobility as in a mobile cloud), however, challenges of reliability and energy efficiency remain largely unaddressed. To the best of ourknowledge, we are the first to address these challenges in an integrated manner for both data storage and processing in mobilecloud, an approach we call k-out-of-n computing. In our solution, mobile devices successfully retrieve or process data, in the mostenergy-efficient way, as long as k out of n remote servers are accessible. Through a real system implementation we prove the feasibilityof our approach. Extensive simulations demonstrate the fault tolerance and energy efficiency performance of our framework in largerscale networks.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
Despite the advances in hardware for hand-held mobile devices, resource-intensive applications (e.g., video and imagestorage and processing or map-reduce type) still remain off bounds since they require large computation and storage capabilities.Recent research has attempted to address these issues by employing remote servers, such as clouds and peer mobile devices.For mobile devices deployed in dynamic networks (i.e., with frequent topology changes because of node failure/unavailability andmobility as in a mobile cloud), however, challenges of reliability and energy efficiency remain largely unaddressed. To the best of ourknowledge, we are the first to address these challenges in an integrated manner for both data storage and processing in mobilecloud, an approach we call k-out-of-n computing. In our solution, mobile devices successfully retrieve or process data, in the mostenergy-efficient way, as long as k out of n remote servers are accessible. Through a real system implementation we prove the feasibilityof our approach. Extensive simulations demonstrate the fault tolerance and energy efficiency performance of our framework in largerscale networks.
An Empirical study on Peer-to-Peer sharing of resources in Mobile Cloud Envi...IJECEIAES
The increase usage of mobile users with internet and interoperability among the cloud services intensifies the role of distributed environemtnt in today’s real world application. Modern technologies are important for building rich, scalable and interoperable applications. To meet the requirements of client,the cloud service provider should offer adequate infrastructure especially under heavy multi-client load.To provide solution for large scale requirements and to statisfy the mobile client from the critical situation like lacking with bandwidth,connectivity issues,service completion ratio, we present adhoc virtual cloud model for different scenarios that include single and multiple client configurations with various file sizes of various file formats for retrieving files in the mobile cloud environement.We evaluate the strategies with the socket and RMI implemented using java and identify the best model for real world applications. Performance evaluation is done with the results obtained and recommends that when sockets and RMI can be appropriately used in peer-to-peer environment when the mobile user cannot connect directly to the cloud services.
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Istabraq M. Al-Joboury
The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improves the qualityoflife in smart cities, but a massive amount of data from different smart devices could slow down or crash database systems. In addition, IoT data transfer to Cloud for monitoring information and generating feedback thus will lead to highdelay in infrastructure level. Fog Computing can help by offering services closer to edge devices. In this paper, we propose an efficient system architecture to mitigate the problem of delay. We provide performance analysis like responsetime, throughput and packet loss for MQTT (Message Queue Telemetry Transport) and HTTP (Hyper Text Transfer Protocol) protocols based on Cloud or Fog serverswith large volume of data form emulated traffic generator working alongsidewith one real sensor. We implement both protocols in the same architecture, with low cost embedded devices to local and Cloud servers with different platforms. The results show that HTTP response time is 12.1 and 4.76 times higher than MQTT Fog and cloud based located in the same geographical area of the sensors respectively. The worst case in performance is observed when the Cloud is public and outside the country region. The results obtained for throughput shows that MQTT has the capability to carry the data with available bandwidth and lowest percentage of packet loss. We also prove that the proposed Fog architecture is an efficient way to reduce latency and enhance performance in Cloud based IoT.
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
Over the past decade cloud computing has interrupted nearly every part of IT. Sales, marketing, finance and support all of these applications are being reengineered to take advantage of cloud's instant access no download and pay as we go attributes. The term cloud computing is sometimes used to refer to a new paradigm some even speak of a new technology.
A New Improved Storage Model of Wireless Devices using the CloudIJCNC
This paper focuses on the development of new storage model by using cloud computing for
mobile devises. The concept of cloud computing has been applied to mobile devices for improving the
existing model (battery time and data saving) of mobile devices. In the recent eras, different types of
cloud computing techniques have been used for improving the efficiency of mobile devices. The paper
has combined the calibration and current launch amount characteristics with the trial results for drop in
battery voltage. A mathematical equation has been derived for mote operation scenario. Through this
equation, the power provide by the power supply as well as the average time of battery can be measured.
The cloud computing is delivery of computing services over Internet. It allows individuals and businesses to use software and hardware that are managed by third parties at remote locations.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
Softwarization has been transforming industries like data center and communications businesses. The established hardware-based architectures are being replaced by fundamentally new approaches - software-based systems which are essentially more flexible, dynamic and powerful. In this paper we analyse the evolution in data centers and communications networks towards virtualized platforms and study how a similar type of evolution could impact and benefit power distribution. Following the softwarization process in other industry sectors, we consider that next a Software Defined Grid (SDG) will emerge.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This paper is an attempt to base on auctions which
presents a frame work for the secure multi-party decision
protocols. In addition to the implementations which are very
light weighted, the main focus is on synchronizing security
features for avoiding agreements manipulations and reducing
the user traffic. Through this paper one can understand that
this different auction protocols on top of the frame work can
be collaborated using mobile devices. This paper present the
negotiation between auctioneer and the proffered and this
negotiation shows that multiparty security is far better than
the existing system.
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESijcsit
Hybrid intra-data centre networks, with optical and electrical capabilities, are attracting research interest
in recent years. This is attributed to the emergence of new bandwidth greedy applications and novel
computing paradigms. A key decision to make in networks of this type is the selection and placement of
suitable flows for switching in circuit network. Here, we propose an efficient strategy for flow selection and
placement suitable for hybrid Intra-cloud data centre networks. We further present techniques for
investigating bottlenecks in a packet networks and for the selection of flows to switch in circuit network.
The bottleneck technique is verified on a Software Defined Network (SDN) testbed. We also implemented
the techniques presented here in a scalable simulation experiment to investigate the impact of flow
selection on network performance. Results obtained from scalable simulation experiment indicate a
considerable improvement on average throughput, lower configuration delay, and stability of offloaded
flows..
Capillary Networks – Bridging the Cellular and IoT WorldsEricsson
The Internet of Things (IoT) represents a new revolutionary era of computing technology that enables a wide variety of devices to interoperate through the existing Internet infrastructure.
An Empirical study on Peer-to-Peer sharing of resources in Mobile Cloud Envi...IJECEIAES
The increase usage of mobile users with internet and interoperability among the cloud services intensifies the role of distributed environemtnt in today’s real world application. Modern technologies are important for building rich, scalable and interoperable applications. To meet the requirements of client,the cloud service provider should offer adequate infrastructure especially under heavy multi-client load.To provide solution for large scale requirements and to statisfy the mobile client from the critical situation like lacking with bandwidth,connectivity issues,service completion ratio, we present adhoc virtual cloud model for different scenarios that include single and multiple client configurations with various file sizes of various file formats for retrieving files in the mobile cloud environement.We evaluate the strategies with the socket and RMI implemented using java and identify the best model for real world applications. Performance evaluation is done with the results obtained and recommends that when sockets and RMI can be appropriately used in peer-to-peer environment when the mobile user cannot connect directly to the cloud services.
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Istabraq M. Al-Joboury
The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improves the qualityoflife in smart cities, but a massive amount of data from different smart devices could slow down or crash database systems. In addition, IoT data transfer to Cloud for monitoring information and generating feedback thus will lead to highdelay in infrastructure level. Fog Computing can help by offering services closer to edge devices. In this paper, we propose an efficient system architecture to mitigate the problem of delay. We provide performance analysis like responsetime, throughput and packet loss for MQTT (Message Queue Telemetry Transport) and HTTP (Hyper Text Transfer Protocol) protocols based on Cloud or Fog serverswith large volume of data form emulated traffic generator working alongsidewith one real sensor. We implement both protocols in the same architecture, with low cost embedded devices to local and Cloud servers with different platforms. The results show that HTTP response time is 12.1 and 4.76 times higher than MQTT Fog and cloud based located in the same geographical area of the sensors respectively. The worst case in performance is observed when the Cloud is public and outside the country region. The results obtained for throughput shows that MQTT has the capability to carry the data with available bandwidth and lowest percentage of packet loss. We also prove that the proposed Fog architecture is an efficient way to reduce latency and enhance performance in Cloud based IoT.
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
Over the past decade cloud computing has interrupted nearly every part of IT. Sales, marketing, finance and support all of these applications are being reengineered to take advantage of cloud's instant access no download and pay as we go attributes. The term cloud computing is sometimes used to refer to a new paradigm some even speak of a new technology.
A New Improved Storage Model of Wireless Devices using the CloudIJCNC
This paper focuses on the development of new storage model by using cloud computing for
mobile devises. The concept of cloud computing has been applied to mobile devices for improving the
existing model (battery time and data saving) of mobile devices. In the recent eras, different types of
cloud computing techniques have been used for improving the efficiency of mobile devices. The paper
has combined the calibration and current launch amount characteristics with the trial results for drop in
battery voltage. A mathematical equation has been derived for mote operation scenario. Through this
equation, the power provide by the power supply as well as the average time of battery can be measured.
The cloud computing is delivery of computing services over Internet. It allows individuals and businesses to use software and hardware that are managed by third parties at remote locations.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
Softwarization has been transforming industries like data center and communications businesses. The established hardware-based architectures are being replaced by fundamentally new approaches - software-based systems which are essentially more flexible, dynamic and powerful. In this paper we analyse the evolution in data centers and communications networks towards virtualized platforms and study how a similar type of evolution could impact and benefit power distribution. Following the softwarization process in other industry sectors, we consider that next a Software Defined Grid (SDG) will emerge.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This paper is an attempt to base on auctions which
presents a frame work for the secure multi-party decision
protocols. In addition to the implementations which are very
light weighted, the main focus is on synchronizing security
features for avoiding agreements manipulations and reducing
the user traffic. Through this paper one can understand that
this different auction protocols on top of the frame work can
be collaborated using mobile devices. This paper present the
negotiation between auctioneer and the proffered and this
negotiation shows that multiparty security is far better than
the existing system.
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESijcsit
Hybrid intra-data centre networks, with optical and electrical capabilities, are attracting research interest
in recent years. This is attributed to the emergence of new bandwidth greedy applications and novel
computing paradigms. A key decision to make in networks of this type is the selection and placement of
suitable flows for switching in circuit network. Here, we propose an efficient strategy for flow selection and
placement suitable for hybrid Intra-cloud data centre networks. We further present techniques for
investigating bottlenecks in a packet networks and for the selection of flows to switch in circuit network.
The bottleneck technique is verified on a Software Defined Network (SDN) testbed. We also implemented
the techniques presented here in a scalable simulation experiment to investigate the impact of flow
selection on network performance. Results obtained from scalable simulation experiment indicate a
considerable improvement on average throughput, lower configuration delay, and stability of offloaded
flows..
Capillary Networks – Bridging the Cellular and IoT WorldsEricsson
The Internet of Things (IoT) represents a new revolutionary era of computing technology that enables a wide variety of devices to interoperate through the existing Internet infrastructure.
A review study of handover performance in mobile ipIJCNCJournal
The Mobile Internet Protocol (Mobile IP) is an extension to the Internet Protocol proposed by the Internet
Engineering Task Force (IETF) that addresses the mobility issues. In order to support un-interrupted
services and seamless mobility of nodes across the networks (and/or sub-networks) with permanent IP
addresses, handover is performed in mobile IP enabled networks. Handover in mobile IP is source cause of
performance degradation as it results in increased latency and packet loss during handover. Other issues
like scalability issues, ordered packet delivery issues, control plane management issues etc are also
adversely affected by it. The paper provides a constructive survey by classifying, discussing and comparing
different handover techniques that have been proposed so far, for enhancing the performance during
handovers. Finally some general solutions that have been used to solve handover related problems are
briefly discussed.
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2cscpconf
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET)
when two or more of these devices find themselves within transmission range. MANETs are
stand-alone (no existing infrastructure needed), autonomous networks that utilise multi-hop
communication to reach nodes out of transmitter range. Unlike infrastructure networks e.g. the
Internet with fixed topology, MANETs are dynamic. Despite the heterogeneous nature of these
two networks, integrating MANETs with the Internet extends the network coverage and adds to
the application domain of MANETs. One of the many ways of combining MANETs with the
Internet involves using Mobile Internet Protocol (Mobile IP) and a MANET protocol to route
packets between the Internet and the MANET via Gateway agents. In this paper, we evaluate the
performance of Mobile IP on MANET in Network Simulator 2 (NS2). We have implemented
Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand Multiple
Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols and compared performances based on Throughput, End-to-End Delay (E2ED),
Packet Delivery Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results
suggest that on-demand routing within the MANET better serves Mobile IP on MANETs.
Fast Mobile IPv6 Handover Using Link and Location InformationCSCJournals
There are two causes of latency in mobile handover: the move detection latency and registration latency. This delay is inherent in the round-trip incurred by Mobile IP as the registration request is sent to the home agent and the response sent back to the foreign agent. Throughout the time between Mobile Node (MN) leaving the old foreign network (oFN) and Home Agent (HA) receiving the MN registration message, HA does not know MN's latest Care of Address (CoA), and therefore it still forwards the packets destined for MN to the old foreign network. These packets will be discarded and lost.
This paper present an improved link layer mechanism with Location information Provider. Global position systems GPS used to assist FMIPv6 for fast handovers and reduced packet loss during handover. We introduce a new link layer combined with Location information Provider signalling in this algorithm accordingly. Further, we report the implementation details performed through simulations.
Therefore, link layer information and Location information Provider allows an MN and FAs to predict the loss of connectivity more quickly than the L3 advertisement based algorithm. The simulations evidence performance improvements in terms of latency and packet loss. It is also shown that by enabling Location information Provider inside the FA discovery method and improving link layer event services, an MN can be well prepared for handover and perform faster movements.
Internet considered as the most important types of wide area networks and the most
important sources for information, that is because its ability to give many electronic services, like
email, communication services, voice over IP, Internet telephony and other services, to get these
services requires accessing to the web server. It is obvious that to make sure the connection oriented
with the Internet service providers, requires remaining and operating the received device within the
arriving zone of Internet signal, and this device will stop to receive this Internet signal, if it moves to
a new position lies outside this area. The researchers presented through their scientific researches
many ideas and ways of ensuring the continued achievement of the Internet access, despite of the
mobility of the recipient device outside the area of the original service provider, the flow of these
ideas led to do a new networking technique known as multi-homing mobility technique, the
researchers are developed several topologies and protocols to suit their operation with this kind of
mobile networks. This paper presents a new approach for developing the multi-homing mobility
network system that increases the performance operation in spite of the far mobility of the recipient
device to new positions. This approach gives also a new way of network topology, new protocols of
programming internetworking devices, as well as applying the mobile IP addressing for sending and
receiving the packets between the Internet service provider and the mobile recipient, and gives a
reliable algorithm for enhancing troubleshooting packet loss. To test and check the ability of this
approach, we design a hypothetical multi-homing mobility network system that operates under these
proposed algorithms, apply packet tracer v.5 simulator for testing the performance of this proposed
approach.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
PHP Frameworks: I want to break free (IPC Berlin 2024)
D0362035
1. IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 3, Issue 6 (Sep-Oct. 2012), PP 20-35
www.iosrjournals.org
Extended Study on the Performance Evaluation of ISP MBG
based Route Optimization Scheme in Mobile IPv4
sherif kamel
Abstract: Mobile IP has seen slow deployment for two major reasons; the need for enhancing edge routers
with Home Agent/Foreign Agent functionality and the fact that triangle routing in such systems is not efficient.
Triangle Routing is defined as the route that must be taken through the Home Agent for any traffic sent by the
Correspondent Node to the Mobile Node. This route is triangle in nature and longer than the normal path
between the Corresponded Node and the Mobile Node. Many protocols and research efforts have been
developed to solve this problem.
Internet service Provider (ISP MBG) is one of the proposed techniques used for solving the triangle
routing problem in conventional Mobile IPv4. This paper will provide a further study on the performance
evaluation of Route Optimization in Mobile IPv4 based on ISP MBG scheme.
The proposed technique has been implemented and tested on the Microsoft.net platform. Simulation
results prove that the new framework has solved the Triangle Routing Problem in Mobile IP by providing a
shorter route with a minimum transmission time for all the datagrams transferred between the Correspondent
Nodes and the Mobile Nodes.
Keywords: Mobile IP, Triangle Routing Problem, Route Optimization, Internet Service Provider, Point of
Presence, Mobile IP Border Gateway, PoPs Virtual Network.
I. Introduction
Today, the number of wireless and mobile devices connected to the Internet is strongly growing.
Wireless links and networks, mobile users and mobility related services form an increasing part of the internet
infrastructure. These wireless and mobile parts are normally connected to larger, wired networks. Mastering the
key concepts in mobile, wireless and wired technology areas are therefore of increasing importance in the
society of today. Mobile IP is an internet protocol, defined by the Internet Engineering Task Force (IETF) that
allows users keep the same IP address, and stay connected to the internet while roaming between networks. The
key feature of Mobile IP design is that all required functionalities for processing and managing mobility
information are embedded in well defined entities, the Home Agent (HA), Foreign Agent (FA), and Mobile
Nodes (MNs) [1, 2]. When a MN moves from its Home Network (HN) to a Foreign Network (FN), the corret
delivery of packets to its current point of attachment depends on the MN's IP address, which changes at every
new point of attachment. Therefore, to ensure packets delivery to the MN, Mobile IP (MIP) allows the MN to
use two IP addresses: The Home address and Care-of-Address (CoA). The home address is static and assigned
to the MN at the HN; CoA on the other hand is dynamic and represents the current location of the MN [2].
Original MIP has many problems such as home agent faults tolerance [3], HA overloading, and triangle
routing problem. Triangle routing problem is considered as one of the main problems facing the implementation
of MIP. When a Corresponding Node (CN) sends traffic to the MN, the traffic gets first to the HA, which
encapsulates this traffic and tunnels it to the FA. The FA de-tunnels the traffic and delivers it to the MN. The
route taken by this traffic is triangular in nature, and the most extreme case of routing can be observed when the
CN and the MN are in the same subnet. Many protocols have been invented to solve the triangle routing
problem, such as forward tunneling and binding cache [], bidirectional route optimization [], the smooth handoff
technique [5], a virtual home agent [6], and a port address translation based route optimization scheme [7]. Also,
Kumar et al. [8] presented a route optimization technique in which the tunneling is done at one level above the
HA in a hierarchical network instead of tunneling at the HA.
This paper provides an extended study on the performance of (ISP MBG) based route optimization in
Mobile IPv4 [9]. This study is based on changing the system parameters including number of nodes, number of
zones and number of pops serving each zone and check the performance of this scheme compared with
conventional Mobile IP scheme. The paper is divided into 6 sections. Section 2 presents some basic concepts
about Mobile IP while Section 3 introduces the concept of the Triangle Routing Problem in Mobile IP. Section 4
presents the ISP MBG technique used to optimize the Triangle Routing Problem in the Conventional Mobile IP
technique. Section 5 introduces the analysis and evaluation of the proposed ISP MBG technique compared with
the conventional Mobile IP technique. Finally section 6 presents the concluding remarks and the future work.
www.iosrjournals.org 20 | Page
2. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
II. Mobile IP
Mobile IP is a modification to IP that allows nodes to continue to receive datagrams no matter where
they happen to be attached to the Internet. It involves some additional control messages that allow the IP nodes
involved to manage their IP routing tables reliably. Scalability has been a dominant design factor during the
development of Mobile IP, because in the future a high percentage of the nodes attached to the Internet will be
capable of
mobility [10, 12].
2. 1 Mobile IP Terminologies
Concerning the Mobile IP a set of terminologies are considered and defined as follows:
Mobile Node (MN) a host or router that changes its point of attachment from one network or
subnetwork to another
Home address (Ha) an IP address that is assigned for an extended period of time to a Mobile
Node in the Home Network.
Home Agent (HA) a router on a Mobile Node’s Home Network which tunnels datagrams
for delivery to the Mobile Node when it is away from home, and
maintains current location information for the Mobile Node.
Home Network (HN) a network, possibly virtual, having a network prefix matching that of a
Mobile Node’s Home Address.
Foreign Agent (FA) a router on a Mobile Node’s Visited Network which provides routing
services to the Mobile Node while registered. The Foreign Agent de-
tunnels and delivers datagrams to the Mobile Node.
Foreign Network any network other than the Mobile Node’s Home Network.
(FN)
Care-of-Address (CoA) the termination point of a tunnel toward a Mobile Node, for datagrams
forwarded to the Mobile Node while it is away from home.
Correspondent a peer with which a Mobile Node is communicating, it may be
Node (CN) either mobile or stationary.
Link a facility or medium over which nodes can communicate at the
link layer. A link underlies the network layer.
Node a host or a router
Tunnel the path followed by a datagram while it is encapsulated
Virtual Network a network with no physical instantiation beyond its router
(with a physical network interface on another network).
Visited Network a network other than a Mobile Node’s Home Network to
which the Mobile Node is currently connected.
Visitor List the list of Mobile Nodes visiting a Foreign Agent.
Mobile Binding the association of Home Network with a Care-of-Address,
along with the remaining lifetime of that association
2. 2 Operation of Mobile IP
Mobile IP is doing the following three relatively separate functions: Agent Discovery, Registration and
Tunneling [10, 11].
2. 2. 1 Agent discovery
The discovery process in Mobile IP is very similar to the router advertisement process defined in Internet
Control Message Protocol (ICMP). For the purpose of discovery, a router or another network node that can act
as an agent periodically issues a router advertisement ICMP message with an advertisement extension [10, 11].
2. 2. 2 Registration
Once a Mobile Node has recognized that it has transferred on a Foreign Network and has acquired a
Care-of-Address, it needs to alert a Home Agent on its Home Network and requests that the Home Agent
forwards its IP traffics. The registration process involves four steps: Registration Request to Foreign Agent,
Foreign Agent Relays the Request to Home Agent, Registration Reply from the Home Agent to the Foreign
Agent and finally the Foreign Agent Relays the Reply to the Mobile Node [10, 11].
2. 2. 3 Tunneling
www.iosrjournals.org 21 | Page
3. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
Once a Mobile Node is registered with a Home Agent, the Home Agent must be able, to intercept IP
datagrams sent to the Mobile Node’s Home Network so that these datagrams can be forwarded via tunneling.
In the most general tunneling case as shown in Figure 1; the source, the encapsulator, the decapsulator
and the destination are separate nodes. The encapsulator node is considered the entry point of the tunnel, while
the decapsulator node is considered the exit point of tunnel. Multiple source-destination pairs can use the same
tunnel between the encapsulator and decapsulator [10, 11].
Tunneling
Encapsulation Decapsulation
Source Destination
Figure 1. General Tunneling
Three options for encapsulation (tunneling) are available for use by the Home Agent on behalf of the
Mobile Node mainly: IP-ln-IP Encapsulation, Minimal Encapsulation, and General Routing Encapsulation
(GRE).
2. 3 Mobile IP Operation Sequence
With the three relatively separated functions; Agent Discovery, Registration and Tunneling; a rough
outlines of the operation of Mobile IP Protocol is described as shown in Figure 2 [12].
Mobile agents (Foreign Agents and Home Agents) advertise their presence via agent-advertisement
messages. A Mobile Node receives an agent advertisement and determines whether it is on its Home Network or
a Foreign Network. When the Mobile Node detects that it is located on its Home Network, it operates without
mobility services. When a Mobile Node detects that it has moved to a Foreign Network, it obtains a CoA on the
Foreign Network. The CoA can be either a Foreign Agent CoA or a Co-located CoA, then the Mobile Node
registers its new CoA with its Home Agent through the exchange of a registration request and registration reply
message, possibly by way of a Foreign Agent. Datagrams sent to the Mobile Node’s Home Network are
intercepted by its Home Agent, tunneled by the Home Agent to the Mobile Node’s CoA, received at the tunnel
endpoint (either at a Foreign Agent or at the Mobile Node itself), and finally delivered to the Mobile Node. In
the reverse direction, datagrams sent by the Mobile Node may be delivered to their destination using standard IP
routing mechanisms, without necessarily passing through the Home Agent.
III. Triangle Routing Problem
One of the basic problems facing the implementation of Mobile IP is the Triangle Routing Problem,
since all the traffics between CN and MN should have to pass through a longer path than the normal one. This
section introduces the definition and the drawbacks of the Triangle Routing Problem as shown in the following
subsections.
3. 1 Triangle Routing Definition
Triangle Routing Problem is considered as one of the problems facing the implementation of Mobile IP.
When a CN sends traffics to a MN, the following sequence must be done:
1. Packets first get the HA.
2. Home Agent encapsulates these packets and tunnels them to the FA.
3. The Foreign Agent de-tunnels the packets and delivers them to the Mobile Node.
www.iosrjournals.org 22 | Page
4. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
As shown in Figure 3, the route taken by these packets is triangle in nature, and the most extreme case
of routing can be observed when the Correspondent Node and Mobile Node are in the same subnet [13].
Datagram MN-CN
CN MN
Datagram CN- MN
3 Detunneld
1 FA
2
HA
Tunneled datagram
Figure 3. Illustration of the Triangle Routing Problem in Mobile IPv4
3. 2 Triangle Routing Drawbacks
Conventional Mobile IP technique allows transparent interoperation between Mobile Nodes and their
Correspondent Nodes, but forces all datagrams for a Mobile Node to be routed through its Home Agent. Thus,
datagrams to the Mobile Node are often routed along paths that are significantly longer than optimal. This
indirect routing can significantly delay the delivery of the datagrams to Mobile Nodes, and it places an
unnecessary burden on the networks and routers along its path through the internet. The Triangle Routing
drawbacks can be mentioned as follows:
1. Increases the delays per packet in datagrams transferred to the Mobile Node.
2. Wastes the network resources.
3. Home Agent bottle neck.
4. Delimits the scalability of Mobile IP protocol.
IV. ISP MBG Route Optimization Technique
Before discussing the ISP MBG scheme it is important to mention the types of communications in
Mobile Networks. In this issue, communication types involve the following [14]:
1. Communication between Mobile Node (MN) and Correspondent Node (CN) within the same Network; in this
case the Home Agent receives a packet destined to the Mobile Node from a Correspondent Node and both
of MN and CN are in the same network as shown in Figure 4.
HA
Mobile IP
Core network
HA : Home Agent
FA FA
FA: Foreign Agent
Mobile Mobile
Terminal Terminal
Figure 4. Connection between Two Mobile Terminals in the Same Network
2. Communication between Mobile Node (MN) and Corresponded Node (CN) in two different Networks; when
both of the Mobile Node and Correspondent Node are located in different networks as shown in Figure 5. It
is supposed for the binding information to be transferred between the two networks and that will lead to a
security related problem. To solve this problem, Mobile IP Border Gateways (MBGs); which are devices
within the mobile networks; will maintain the binding information that must be added to the Correspondent
Node without adding functions to terminals in the external networks [14, 15].
www.iosrjournals.org 23 | Page
5. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
Correspondent Node
HA: Home Agent
Other IP network
FA: Foreign Agent
Gateway
HA
Mobile IP
network
FA FA
Mobile
Terminal
Figure 5. Connection between Mobile Terminal and Correspondent Node in two Different IP Networks
4.1 Objectives of ISP MBG Technique
The main objective of the proposed technique is to solve the Triangle Routing Problem in the
Conventional Mobile IP technique. The proposed technique aims are:
1. Minimizing the average message delay.
2. Maximizing the network throughput (minimize the network blocking rate).
3. Using the network resources efficiently and eliminating the Home Agent (HA) processing bottleneck due to
the fact that all communication from Correspondent Node (CN) to Mobile Node (MN) are necessarily
routed through the Home Agent (HA).
4. Increasing the level of security between different networks by using the Mobile IP Border Gateway (MBG).
This is important for maintaining the information that being used by the Correspondent Node (CN) such as
incoming packets from the external network are tunneled or routed and delivered directly to the Mobile
Node (MN) instead of routing through the Home Agent (HA).
4.1.1 Architectural design of ISP MBG Technique [9]
Figure 6 presents the overall design of the proposed ISP MBG technique for the Route Optimization
Problem.
Figure 6. Global Views for the Proposed ISP MBG Technique with an Example of PVN
The design introduces the following:
1. Having a number of N Internet Service Providers ISP1, ISP2... ISPN each covers a definite and different
geographical place. They are separated by an L Mobile IP Border Gateways (MBGs) [14]. MBGs will
maintain either the binding (Home address, Care-of-Address) or only the home information (Home address)
for all the transferred nodes (Mobile Nodes) from one Internet Service Provider to another. That depends on
whether we are using tunneling or routing technique to forward the traffics generated in one Internet
www.iosrjournals.org 24 | Page
6. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
Service Provider and destined to Mobile Node located in another Internet Service Provider. Also, using
multiple MBGs will distribute uniformly the processing load among them.
2. Each Internet Service Provider is divided into a number of approximately S equal areas. Each area is served
by an Agent that is considered as Home Agent for the nodes within that area and as Foreign Agent for all
the nodes transferred from the other areas.
3. Each area is divided into multiple equal M zones where each zone is served by a fixed K equal number of
Points-of-Presence (PoPs).
Figure 7 shows an example of the areas and PoPs classifications of each area for an Internet Service Provider.
4. For each Internet Service Provider assuming that we have K PoPs virtual networks (PVNs) that can be
placed in a fashion that is similar to (Ping-Pong) overlay network creation. This virtual network handles
state information about all Mobile Nodes and Correspondent Nodes. For example, when a Mobile Node
registers with one Points-of-Presence (PoPs), in one of the defined zones, the registration information will
be available to all other zones through the PVN connecting that PoP with the other equivalent PoPs in the
other zones. Figure 8 shows an example of PoPs Virtual Networks (PVNs) for ISP.
PoPi(Area1,Zone1), PoPi (Area1,Zone2),…, PoPi (Area1, ZoneM),
PVNi PoPi (Area2,Zone1), PoPi (Area2,Zone2), …., PoPi (Area2,ZoneM),…..,
i1..k PoPi (Areas ,Zone1), PoPi (AreaS,Zone2)……. PoPi (AreaS,ZoneM).
Figure 8. PVNs for ISP
5. Each PoP serving a definite X number of nodes with a range W of addresses. The nodes that are within the
same agent serving the PoP are called Local Nodes and those are in different agents, and transferred to the
agent serving that PoP; are called External Nodes. The range of W addresses for each PoP is divided as
follows:
1. A addresses for local nodes that are in service (Home address)
2. B addresses for local nodes that are in waiting (Home address)
3. C addresses for external nodes that are in service (Care-of- Address)
4. D addresses for external nodes that are in waiting (Care-of-Address)
4.1.2 Sequences of ISP MBG Technique
When a node is generated, it will be supported by the PoP serving its position, all of the home
information concerning that node will be saved at that PoP. When a Mobile Node (MN) moves to another area
or agent, the new agent will provide the node with the Care-of-Address. The home information for the node in
the new position could be accessed through the PoP Virtual Networks (PVNs) that connects the node's home
PoP to its new position serving the PoP. Figure 9 shows the operation sequence of the proposed technique.
The operation sequence for the proposed algorithm depends on whether both of the Correspondent Node
and the Mobile Node are located in the same Internet Service Provider or both belong to different Internet
Service Providers. So, when Correspondent Node needs to establish connection with the Mobile Node we have
the following cases:
1. Both CN and MN belong to the same Internet Service Provider.
www.iosrjournals.org 25 | Page
7. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
a. CN connects to its home PoP (Pk-1)asking about the information for the Mobile Node.
b. The correspondent PoP searches its neighboring PoPs (P1, P2,….Pk-2, Pk) in the same Zone, one of them is
guaranteed to be connected to the virtual network of the Mobile Node.
c. The PoP which is connected to the Mobile Node's Virtual Network (i.e. P 1) connects directly to the Mobile
Node and the connection is established.
2. Both CN and MN belong to different Service Providers
a. The Mobile IP Border Gateway will keep the home information (Home address) for all the Mobile Nodes that
are transferred form one ISP to another.
b. The Correspondent Node connects to its home PoP (Pk-1) asking about the information for the Mobile Node.
c. The Correspondent PoP will ask its neighboring PoPs (P1, P2,….Pk-2, Pk) about the Mobile Node's home
information. One of the PoPs (P1) is guaranteed to be connected to the virtual network of Mobile Node.
d. The PoP which is connected to the MN's Virtual Network (i.e. P1) connects to MBG which has the original
home information for the destined MN. MBG connects to the nearest PoP in the destination ISP which is
connected to the new virtual network of Mobile Node
e. The connection is established between Correspondent Node and Mobile Node.
V. Evaluation of ISP MBG Technique
Simulation modeling is based on system programming such as data structures, flowcharts, programming
languages and other tools that can be used to build up and characterizing system performance. For simplicity, it
is preferable to depend on the simulation model.
5.1 System Parameters
The key point for establishing any system is to define its main parameters. This section introduces the
simulation parameters, data structure and connection parameters for the designated system respectively in the
following three subsections:
In [9] the simulation has been done for 2 similar ISPs each have 2 similar areas with 2 zones per each
area and 4 pops serving each zone and for a total of 640 nodes. As an extended study for this technique, the new
simulation is based on increasing the number of nodes for the total [600-2000] nodes and also number of zones
and number of pops will be changed to 4 zones per area and 6 pops serving each zone. This study is to show
how much the scheme is efficient even when the simulation parameters are changed to check the sustainability
of ISP MBG technique as a route optimization technique for Mobile IP.
5.1.1 Simulation Parameters
A network with two internet service providers is considered, each with two similar areas. In our
simulation there will be 2 structures one based an using 4 zones for each area and 4 pops serving each zone
another structure based on using 2 zones for each area and 6 pops serving each zone.
Each PoP actually is serving 100 nodes with 150 addresses. The addresses are classified as 100 addresses
for the nodes in service and 50 addresses for the nodes in waiting. The addresses for the nodes in service are
classified as 75 addresses for the local generating nodes and 25 addresses for the externally generating nodes.
By the same way for the addresses concerning the nodes in waiting. They are classified as 25 addresses for the
local generating nodes and 25 addresses for the externally generating nodes. The addresses for the nodes are
considered as integer numbers given to each node consecutively and depend on the location of the node, area,
zone, PoP, and ISP it belongs to. Figure 10 shows an example of the nodes and address classification for PoP i.
In the first structure the total number of zones all over the architecture design is 16 zones, each zone with
4 pops and the total number of pops is 64. In the second structure, the total number of zones all over the
www.iosrjournals.org 26 | Page
8. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
architecture design is 8 zones. Each zone with 6 pops and the total number of pops is 48. The total number of
pops can be calculated by the following equation:
PN = PK x NZ where; PN is the total number of PoPs
PK is the number of PoPs within the Zone
NZ is the total number of Zones
Each PoP is serving 100 nodes, the simulation is done for a total number of nodes equals to 600-2000
nodes.
NT = PN x NC where; NT is the total number of generating nodes
NC is the number of generating nodes in each connection.
PoP i
N150
N1 N126
N75 N76 N100 N125
N101 126-----150
1-------75 Externally in
Locally in 76-----100 101-----125 waiting
services Locally in Externally in
waiting services
Figure 10: Nodes and Address Classifications for PoPi
5.1.2 Data structures
The main data structures implemented in the simulation are: nodes, PoPs, ISPs, Areas, Agents, and
Mobile IP Border Gateway (MBG). The class definitions and the structure definitions for all the data structures
are implemented using C Sharp on the Microsoft.net platform.
5.1.3 Connection parameters
For the wireless communication design and implementation of the ISP MBG technique, the connection
parameters for the implemented algorithm are the key point for running the program. The connection parameters
can be classified as follows:
1. The distance in kilometers equivalent to the distance of 1 pixel.
2. Link speed for PoP connection
3. Link speed for Agents connection
4. PoP nodes count to serve.
5. PoP nodes count to wait
6. Agent nodes count to serve
7. Agent nodes count to wait
5.2 System Construction
Figure 11 shows the design architecture of the proposed ISP MBG techniques for 2 similar ISPs. Each
PoP can be identified using the following three parameters respectively; ISP number, Agent number and Zone
number:
Pi = PoPj,k,l i = j,k,l where; Pi: the ith PoP
j : Internet Service Provider number
k : Agent number
l : Zone number
Also, we have similar PoPs Virtual Networks (PVNs) for the two Internet Service Providers. Each
PVN connects all similar POPs in all Zones, Areas, Agents, ISPs. Also in figure 11 we can change the number
of agents, areas, zones and also the number of PoPs serving each zone based on the require parameters for
comparison between the conventional Mobile IP and MBG ISP techniques.
www.iosrjournals.org 27 | Page
9. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
5.3 Performance Parameters
To evaluate the performance of the ISP MBG technique, the following five measuring criteria are
measured: Link Distance, Transmission Time, Blocking, Buffering and Security.
5.3.1 Link distance
The link distance is calculated in kilometers equivalent to the pixels distance between the two
connecting nodes through the PoP links or the Agent links (1 pixel = 0.2km). The link distance can be calculated
and formulated using the following equation:
Dt (Pi, Pz) = Total Link Distance Comparison ( 6 POPs Per Zone)
230000
Total Distnace (km)
225000
ISP MBG Total Link Distance
220000
215000 Conventional Mobile IP Total
Link Distance
210000
Where; P: Transmission point (PoP or MBG)
205000
00
00
00
00
00
00
00
00
00
00
00
0
0
0
0
60
70
80
90
10
11
12
13
14
15
16
17
18
19
20
#of Connections
D: Euclidian distance
Dt: Total link distance between two transmission points
5. 3. 2 Transmission time
Measuring the transmission time depends on the location of both Mobile Node (MN) and
Correspondent Node (CN) and whether both are located in the same area, same Internet Service Provider or
either in different areas or different Internet Service Providers. The transmission time is calculated and
formulated using the following general form of equation:
T (Pi, Pz) = 800
Average Link Distance Per Connection ( 6 POPs Per Zone)
Distanc (km)
600 ISP MBG Link Distance Per
Conection
400 Conventional Mobile IP link
Distance Per Connection
200
0
Where; P: Transmission point (PoP or MBG)
00
00
00
00
00
00
00
00
00
00
00
0
0
0
0
60
70
80
90
10
11
12
13
14
15
16
17
18
19
20
#of Connections
T (Pi, Pz):Total transmission time between two transmission points P i and Pz
L: Link speed
D: Euclidian distance
5.3.3 Blocking
Blocking is an important parameter to measure the overall performance of the network and its
throughput. The blocking is measured as the number of blocked connections. Each connection has a pair of
connecting nodes, (i.e. N connections = 2N Nodes).
5. 3. 4 Buffering
Buffering is considered as one of the network resources that must be optimally used. In the
conventional Mobile IP technique, we have storage buffers for the agents whether they are Home Agents or
Foreign Agents. In the proposed ISP MBG technique, each PoP has its own storage buffers which hold a limited
number of nodes. The nodes are classified as nodes in service and nodes in waiting, with a range of addresses
for the nodes that are either locally generated within the Agent (Home addresses) or imported from the other
Agents. Using Point of Presence Virtual Network (PVN) will provide an efficient tool for accessing the Node's
information between PoPs.[The measuring evaluation of this parameter is out of our scope].
5. 3. 5 Security
It is one of the rigid requirements for the performance evaluation between the conventional Mobile IP
technique and the proposed one. It is measured as how much the technique itself provides a self-securing
www.iosrjournals.org 28 | Page
10. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
technique to protect the data transferred among the nodes located in different networks.[The evaluation of this
parameter is out of our scope].
5.4 Simulation Results
The purpose of the simulation is to extend the study of the performance evaluation for ISP MBG
technique compared with the conventional Mobile IP technique. The simulation results for the 2 similar ISPs,
with 2 areas, 2 Zones per area and 4 PoPs per zone for the total number of 600 nodes has been discussed first
[9]. For further study of the ISP MBG technique with different ISPs structures, the running for the implemented
algorithm is done and calculated based on generating randomly a total number of nodes N= 2000 nodes in 15
steps, each step includes 100 more nodes (i.e 50 connections). In each step, the whole algorithm is executed, and
the connection is also randomly done between each pair of nodes. To obtain real results, the algorithm is
executed many times and the comparison is done based on the average values of the results.
5.4.1 Simulation Result for 2 Similar ISPs [2 Areas, 2 Zones/Area, 4 PoPs/Zone] [9]
5.4.1.1 Simulation Results for Link Distance (total 600 nods, 20 nods per connection)
Figures 12.a and 12.b show the total link distance and the average link distance per connection for both
the proposed ISP MBG and the conventional Mobile IP technique respectively. It is clear that the proposed ISP
MBG technique outperforms the conventional Mobile IP technique. The route taken by the conventional Mobile
IP technique has to pass through the Home Agent which tunnels the data to the Foreign Agent. The route in the
proposed ISP MBG technique is taken through the home PoP of CN and the PoP virtual network of MN which
leads directly to the MN in case of one ISP. In case of using two Internet service Providers the route has to pass
through MBG to the MN's PoP virtual network in the second ISP which leads directly to the MN.
ISP MBG Conventional Mobile IP
1200
1000
Distanc (km)
800
600
400
200
0
1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31
#of Connections (unit 10)
(a) Total Link Distance for the Conventional and ISP Techniqe
ISP MBG Conventional Mobile IP
350000
300000
Total Distnace (km)
250000
200000
150000
100000
50000
0
1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31
#of Connections ( Unit 10)
(b) Average Link Distances for the Conventional and ISP Techniqe
Figure 12. Link Distance Comparison
5.4.1.2 Simulation results for transmission time
Figure 13.a and 13.b show the total transmission time and the average transmission time (in seconds) per
connection against the number of connections for both the conventional Mobile IP technique and the ISP MBG
technique respectively. The figures show a great reduction in the transmission time using the proposed ISP
MBG technique, compared with the conventional one. That result is expected because of using PoPs and PVNs:
www.iosrjournals.org 29 | Page
11. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
the home information for any node will be available anywhere among the networks and not only restricted on
the Home Agents that could be far away from the connecting nodes.
ISP MBG Conventional Mobile IP
6000
Total Transmission Time (sec)
5000
4000
3000
2000
1000
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
#of Connections ( Unit 10)
(a) Total Transmission Time for the Conventional and ISP Techniques
ISP MBG Conventional Mobile IP
20
18
Transmission Time (sec)
16
14
12
10
8
6
4
2
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
#of Connections (unit 10)
(b) Average Transmission Time for the Conventional and ISP Techniques
Figure 13. Transmission Time Comparison
5.4.1.3 Simulation Results for Blocking
Figure 14 details the average number of blocking in both the conventional Mobile IP technique and the
proposed one. Each blocked connection is considered as single pair of connecting nodes. The figure shows that
as long as the number of connections 28 (i.e. number of nodes 560, "560= number of connections {28} x
number of generating nodes in each connection {20}").
If the number of connection is increased (number of connections ≥ 28) meaning that the number of
nodes is also increased (number of nodes ≥ 560) the blocking rate will be increased for both the conventional
Mobile IP technique and the proposed one. The number of blocked connections using the newly proposed ISP
MBG technique is less than that of the conventional Mobile IP technique. In the conventional Mobile IP
technique, the HA is overwhelmed with an excessive amount of nodes' control messages compared with the
proposed technique in which the control messages are divided among the PoPs. Each PoP covers a number of
nodes and the virtual network between PoPs helps in getting the information easily. As the number of blocked
connections decreased that leads to increase the number of paired successful connections which means the
throughput will be increased.
www.iosrjournals.org 30 | Page
12. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
ISP MBG Conventional Mobile IP
14
12
Blocked Connections
10
8
6
4
2
0
1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31
#of Connections
Figure 14 Blocking Comparison
5.4.2. Simulation Results for 2 Similar ISPs [2 Areas, 4 Zones/Area, 4 PoPs/Zone, Number of Nodes 600-
2000 Nodes.]
5.4.2.1 Simulation Results for Link Distance
Total Link Distance Comparison (4 Zones Per Area)
230000
Total Distnace (km)
225000
220000 ISP MBG Total Link
Distance
215000
210000
205000
#of Connections
(a) Total Link Distance for the Conventional and ISP Technique
Average Link Distance Per Connection (4 Zones Per
Area)
800
Distanc (km)
600 ISP MBG Link
Distance Per
400
Conection
200
0
#of Connections
(b) Average Link Distance for the Conventional and ISP Techniqe
Figure 15. Link Distance Comparison
Figure 15.a and 15.b show that when the number of zones per area increases, the link distance for the
new technique increase due to redundancies in the virtual networks, but still it is better than the conventional
one (although close on performance)
www.iosrjournals.org 31 | Page
13. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
5.4.2.2. Simulation Result for Transmission Time
Total Transmission Time Comparison (4 Zones Per Area)
Total Transmission
5000
4000
Time (sec)
ISP MBG Total
3000
Transmission Time
2000
1000
0
#of Connections
(a) Total Transmission Time for the Conventional and ISP Techniques
Average Transmission Time Per Connection (4 Zones Per
Area)
Transmission Time (sec)
12
10
8 ISP MBG
6 Transmission Timr Per
4 Connection
2
0 Conventional Mobile
IP Transmission Time
Per Connection
#of Connections
(b) Average Transmission Time for the Conventional and ISP Techniques
Figure 16. Transmission Time Comparison
Figure 16.a and 16.b show that the transmission time required for both techniques are close to each
other due to redundancies in the virtual networks.
5.4.2.3 Simulation Result for Throughput
Throughput Comaprison (4 Zones Per Area)
20
Blocked Connections
15
ISP MBG Blocking
10
Conventional Mobile IP
Blocking
5
0
50
00
50
00
50
00
50
0
0
0
60
75
90
10
12
13
15
16
18
19
#of Connections
Figure 17. Throughput Comparison
Figure 17 show that he new technique still outperforms the conventional one in the storage and
throughput, increasing number of zones increases the storage capabilities, so , less calls are blocked.
5.4.3 Simulation Results for 2 Similar ISPs [2 Areas, 2 Zones/Area, 6 PoPs/Zone, Number of Nodes 600-
2000 Nodes.]
www.iosrjournals.org 32 | Page
14. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
5.4.3.1. Simulation Results for the link distance
Total Link Distance Comparison ( 6 POPs Per Zone)
Total Distnace (km)
230000
225000
220000 ISP MBG Total Link
Distance
215000
210000
205000
#of Connections
(a) Total Link Distance for the Conventional and ISP Technique
Average Link Distance Per Connection ( 6 POPs Per Zone)
800
Distanc (km)
600
ISP MBG Link Distance
400 Per Conection
200
0
#of Connections
(b) Average Link Distance for the Conventional and ISP Techniqe
Figure 18. Link Distance Comparison
Figure 18.a and 18.b show that when increasing number of pops per zone the link distance in the new
technique is less than that of the old technique, although they are close on the average.
5.4.3.2. Simulation Results for Transmission Time
Total Transmission Time Comparison ( 6 POPs Per Zone)
Total Transmission
6000
Time (sec)
4000 ISP MBG Total
Transmission Time
2000
0
#of Connections
(a) Total Transmission Time for the Conventional and ISP Techniques
Average Transmission Time Per Connection ( 6 POPs Per Zone)
Transmission Time (sec)
20
15
ISP MBG Transmission
10 Timr Per Connection
5
0 Conventional Mobile IP
Transmission Time Per
Connection
#of Connections
(b) Average Transmission Time for the Conventional and ISP Techniques
Figure 19. Transmission Time Comparison
www.iosrjournals.org 33 | Page
15. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
Figure 19.a and 19.b show that due to the increase of the POPs serving the zones, the calling node can
reach the mobile node much faster than in the old techniques, and it outperforms the conventional techniques on
the average transmission time.
5.4.3.3. Simulation Result for Throughput
Throughput Comaprison ( 6 POPs Per Zone)
30
Blocked Connections
25
20 ISP MBG Blocking
15
Conventional Mobile IP
10 Blocking
5
0
50
00
50
00
50
00
50
0
0
0
60
75
90
10
12
13
15
16
18
19
#of Connections
Figure 20. Throughput Comparison
Figure 20 shows that the throughput of new technique is still better than conventional techniques
5.4.4 Buffering
Concerning Buffering; it has been found that the proposed ISP MBG technique provides better buffering
than that of the Conventional Mobile IP technique. This is due to the fact that using PVN with the proposed
technique facilitates the process of handling and accessing information for the nodes in correspondences
between PoPs without any redundancy. Comparatively, the conventional technique requires more buffers due to
the redundancy of having a multiple copies of nodes' home information at each PoP of the Internet service
Provider. This leads to less use of buffering storages than that of the conventional technique which needs
storage buffer for each node to hold all of its information at each PoP. Also, as a cost wise, it has been found
that the cost for the Agent's buffers is higher than that of the PoP's buffers
5.4.5 Security
The Security design has a great concern in Mobile IP. The proposed ISP MBG technique is considered as
the self securing system. Using Mobile IP Border Gateway (MBG) will keep the information (Home address or
binding information) for all Mobile Nodes crossing their network to another network. So, any CN in one
network does not need to maintain any private external information concerning the new IP network where the
MNs visit and all of the MN's information could be accessed directly through the Mobile Border Gateway.
Comparatively, the conventional Mobile IP technique needs rigid requirements for the authentication to prevent
the malicious users from interrupting the connection between MN and CN that maintains the binding
information (Ha, CoA).
VI. Conclusion and Future Work
In this paper a further study on ISP MBG route optimization technique has been introduced to check the
performance evaluation of the technique when the simulation parameters [zones an pops] are changed.
The design of technique is based on using a number of Internet Service Providers (ISPs) separated by a
Multiple Mobile IP Border Gateways (MBGs) which are used to keep the binding information or the home
information for the transferred Mobile Nodes between ISPs. Each ISP is composed of an approximately a
number of an equal areas, each is served by an agent and is composed of a multiple equal zones. Each zone is
served by a definite number of Points of Presences (PoPs). Each PoP is serving a number of nodes with a range
of addresses. Virtual Networks are used to connect the PoPs in such a way the redundancy in keeping the nodes
information will be minimized or almost cancelled. The main function of the proposed technique is to get the
shortest routing path for the packets transferred between the Correspondent Nodes and Mobile Nodes based on
the PoPs information, PVN and the MBG.The simulated network design of our case study is based on using two
Internet Service Providers separated by one Mobile IP Border Gateway. Each ISP is divided into two equal
areas. The simulation is applied twice once based on using 4 zones per each area and 4 pops serving each zone.
Another simulation is based on using 2 zones per area and 6 pops serving each zone.Each PoP is serving 100
nodes with a range of 150 addresses. The simulation results for the Link Distance, Transmission Time,
Blocking, Buffering and Security show that the proposed (ISP MBG) technique outperforms the conventional
Mobile IP technique by minimizing the Link Distance, Transmission Time, Blocking, Buffering. Also, it gives a
higher level of security than that used with conventional Mobile IP technique.
www.iosrjournals.org 34 | Page
16. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
This work can be considered applicable for the following: better performance related to the criteria of
measuring parameters ,no addition of external hardware devices are required, more reliablility and flexibility of
the simulation model, and scalability for using more PoPs and nodes .
For more further study on the performance evaluation of ISP MBG route optimization technique,
further evaluation will be done based on using 2 different ISP structures.
Reference
[1] C. Perkins." IP Mobility Support for IPv4", IETF RFC 3344 Ed., Oct. 2002.
[2] C. Smith and D. Collins, “3G Wireless Networks”, “McGraw-Hill, United States, 2002.
[3] Y. Huang, and M. Chuang, "Fault tolerance for home agents in mobile IP", 2006.
[4] C. Wu, A. Cheng, S. Lee, J. Ho, and D. Lee, "Bi-directional Route Optimization in Mobile IP Over Wireless LAN”, Institute of
Information Science, Academia Sinica, Taiper, Taiwan, Vol. 2, pp 1168-1172. 2002.
[5] B. Ayani, "Smooth Handoff in Mobile IP", Master Thesis, University of California in Berkeley. May 2005.
[6] G. Qiang and A. Acampora, "A Virtual Home Agent based Route Optimization for Mobile IP", Wireless, 28 Sept. 2000.
[7] D. Badami, N. Thanthery, T. Best, R. Bhagvathula, R. Pendse, "Port Address Translation Based Route Optimization for Mobile
IP", Vehicular Technology Conference, (5), PP. 3110-3114. 2004.
[8] C. Kumar, N. Tyagi, and R. Tripathi, "Performance of Mobile IP with New Route Optimization Technique". IEEE. International
Conference, Institute of Engineering and Rural Technol, Allahadad, India, pp. 522-526. 2005.
[9] Sherif Kamel Hussein, Iman Saroit Ismail, S. H. Ahmed, "Solving the Triangle Routing Problem in Mobile IP", informatics
journal, faculty of computers and information technology, Cairo University published issue, June 2006.
[10] C.Kumar, N.Tyagi , Tripathi R., "Performance of Mobile IP with new Route Optimization Technique", IEEE International
Conference, Institute of Engineering and Rural Technol, Allahadad, India, PP. 522-526, January 23-25, 2005.
[11] D.Badami, N.Thanthry, T.Best, R.Bhagavathula and R.Pendse., "Port Address Translation based Route Optimization For Mobile
IP", Vehicular Technology Conference, IEEE 60 th, Department of Electrical and Computer Engineering, Wichita State
University, KS, USA, Vol. 5, PP. 3110-3114, September 26-29, 2004.
[12] Moheb R. Girgis, Tarken, Mohamoud Youssef S. Takroni and Hassan S. Hassan, "Performance Evaluation of New Route
Optimization Technique for Mobile ". IP International Journal of Netowrk Security & Its Applications (IJNSA), Vol., No. 3,
October 2009.
[13] C. Perkins, “IP Mobility Support for IPV4”, RFC 3344, Work on Progress, August 2002.
[14] Y.Takagi ,T.Ihara and H.Obnishi,"Mobile IP Route Optimization Method for Next Generation Mobile Networks", Electonics-
and-Communications in Japan,Part 1,Vol.86,No.2 ,PP.31-41, February 2003.
[15] M.Caesar and J.Rexford , ,"BGP Routing Policies in ISP Networks " IEEE Network, University of California and Princeton
University ,PP.5-11,November/December 2005.
www.iosrjournals.org 35 | Page