Mobile IPv6 based Mobile Networks are becoming increasingly important with the widespread
popularity of wireless internet connectivity. For large networks, an extension, namely, the Hierarchical
Mobile IPv6 is used, which suffers from overloading of the Home Agent as every packet sent has to pass
through it and this produces a significant loss in performance. In this paper, a method to improve the
mobility using the fast handover of Mobile IPv6 (FMIPv6) and the Reverse Routing Header Protocol is
proposed. Simulation results at different packet intervals show that, the proposed scheme is able to
reduce the average delay and achieve an optimum level of throughput.
Route Optimization (RO) in Mobile Internet Protocol
Version Six (MIPv6) is a technique that enables a
Mobile Node (MN) and a Corresponding Node (CN)
to communicate directly by bypassing the Home Agent
(HA). RO is usually faced with the problem of Internet
Protocol (IP) multilayer tunnels due to pinball or suboptimal
routing. The generic consideration in
designing route optimization scheme is to use
minimum signaling information in the IPv6 packet
header. In order for optimization to take place in
MIPv6, a protocol called route optimization protocol
must be introduced. Route optimization protocol is
used basically to improve performance. Also RO can
also be described as a mechanism that eliminates the
inefficiency in tunneling of packets from MRs to their
HA before being sent to CNs over the Internet.
However, Network Mobility (NEMO) can be described
as a network whose point of attachment to the Internet
varies with time.
The tradeoff between the two protocols can provide a
significant impact on the networks. Furthermore, one
potential choice of selecting any of the protocols can
increase or decrease the degree of application in used.
The tradeoff in offloading solution can vary from
mobile access network and core mobile network.
Optimizing traffic breakout and support for mobility
are paramount to service operators. The study focused
on the development and evaluation of an experimental
test bed of route optimization in MIPv6 and
NEMO.The tradeoff between the two protocols was
examined. The results of the experimental test bed
shows the benefit of next generation of Internet
system, especially for real-time applications that
need to provide seamless connection with low handoff
latency.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIScscpconf
As the future generation networks are envisioned to be heterogeneous in nature, seamless
mobility in such networks is an important issue. While IETF work groups have standardized
various mobility management protocols, such as Mobile IPv6 (MIPv6), Fast Handovers for
Mobile IPv6 (Predictive FMIPv6, and Reactive FMIPv6), Hierarchical Mobile IPv6 (HMIPv6),
Proxy Mobile IPv6 (PMIPv6) and Fast Handovers for PMIPv6 (Predictive FPMIPv6, and
Reactive FPMIPv6), out of which some are host based and some are network based, the
decision regarding which protocol suits the future networks is still a research issue. The study
of various mobility management protocols in terms handover latency and the number of hops is
needed to evaluate these protocols. Even though much study has been done in literature in terms
of handover latency, study still needs performance evaluation in terms of average hop delay. In
this paper we study various mobility management protocols by applying simple numerical
analysis. The study is carried out for performance evaluation of various mobility management
protocols in terms of average hop delay, wireless link delay, wired part delay, and binding
update and registration delay. In this work, the average hop delay is estimated in terms of total
handover latency and total number of hops contributing to each protocol. The study enables us
to make a few important observations regarding the performance of these mobility management
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...cscpconf
Intelligent transportation system (ITS) consists of moving networks, where the network mobility
(NEMO) basic support is adopted as a mobility management protocol for moving networks.
Even though NEMO basic support (NBS) provides a basic mobility support for ITS systems, the
mobile routers (MR) need to participate in the mobility signaling. In the literature, network
based mobility management such as Proxy Mobile IPv6 (PMIPv6) based solutions are explored
for mobility management. However, the signaling overhead incurred due to this approach is still
need to be optimized. In this paper, we introduce a bulk binding update solution for the
registration of MR with local mobility anchor (LMA) in moving networks. The bulk binding
update procedure uses a group identifier for group of MRs during the periodic binding update
process which reduces the signaling overhead compared with the basic PMIPv6 based
approach. The numerical results demonstrate that the proposed approach gives a better
performance in terms of signaling overhead and handover latency than NBS, and simplePIMPv6 based solutions.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
Route Optimization (RO) in Mobile Internet Protocol
Version Six (MIPv6) is a technique that enables a
Mobile Node (MN) and a Corresponding Node (CN)
to communicate directly by bypassing the Home Agent
(HA). RO is usually faced with the problem of Internet
Protocol (IP) multilayer tunnels due to pinball or suboptimal
routing. The generic consideration in
designing route optimization scheme is to use
minimum signaling information in the IPv6 packet
header. In order for optimization to take place in
MIPv6, a protocol called route optimization protocol
must be introduced. Route optimization protocol is
used basically to improve performance. Also RO can
also be described as a mechanism that eliminates the
inefficiency in tunneling of packets from MRs to their
HA before being sent to CNs over the Internet.
However, Network Mobility (NEMO) can be described
as a network whose point of attachment to the Internet
varies with time.
The tradeoff between the two protocols can provide a
significant impact on the networks. Furthermore, one
potential choice of selecting any of the protocols can
increase or decrease the degree of application in used.
The tradeoff in offloading solution can vary from
mobile access network and core mobile network.
Optimizing traffic breakout and support for mobility
are paramount to service operators. The study focused
on the development and evaluation of an experimental
test bed of route optimization in MIPv6 and
NEMO.The tradeoff between the two protocols was
examined. The results of the experimental test bed
shows the benefit of next generation of Internet
system, especially for real-time applications that
need to provide seamless connection with low handoff
latency.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIScscpconf
As the future generation networks are envisioned to be heterogeneous in nature, seamless
mobility in such networks is an important issue. While IETF work groups have standardized
various mobility management protocols, such as Mobile IPv6 (MIPv6), Fast Handovers for
Mobile IPv6 (Predictive FMIPv6, and Reactive FMIPv6), Hierarchical Mobile IPv6 (HMIPv6),
Proxy Mobile IPv6 (PMIPv6) and Fast Handovers for PMIPv6 (Predictive FPMIPv6, and
Reactive FPMIPv6), out of which some are host based and some are network based, the
decision regarding which protocol suits the future networks is still a research issue. The study
of various mobility management protocols in terms handover latency and the number of hops is
needed to evaluate these protocols. Even though much study has been done in literature in terms
of handover latency, study still needs performance evaluation in terms of average hop delay. In
this paper we study various mobility management protocols by applying simple numerical
analysis. The study is carried out for performance evaluation of various mobility management
protocols in terms of average hop delay, wireless link delay, wired part delay, and binding
update and registration delay. In this work, the average hop delay is estimated in terms of total
handover latency and total number of hops contributing to each protocol. The study enables us
to make a few important observations regarding the performance of these mobility management
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...cscpconf
Intelligent transportation system (ITS) consists of moving networks, where the network mobility
(NEMO) basic support is adopted as a mobility management protocol for moving networks.
Even though NEMO basic support (NBS) provides a basic mobility support for ITS systems, the
mobile routers (MR) need to participate in the mobility signaling. In the literature, network
based mobility management such as Proxy Mobile IPv6 (PMIPv6) based solutions are explored
for mobility management. However, the signaling overhead incurred due to this approach is still
need to be optimized. In this paper, we introduce a bulk binding update solution for the
registration of MR with local mobility anchor (LMA) in moving networks. The bulk binding
update procedure uses a group identifier for group of MRs during the periodic binding update
process which reduces the signaling overhead compared with the basic PMIPv6 based
approach. The numerical results demonstrate that the proposed approach gives a better
performance in terms of signaling overhead and handover latency than NBS, and simplePIMPv6 based solutions.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
The article looks into the current state of the art of dynamic routing protocols with respect to their
possibilities to react to changes in the Quality of Service when selecting the best route towards a
destination network. New options that could leverage information about the ever changing QoS parameters
for data communication are analysed and a Cisco Performance Routing solution is described more in
detail. The practical part of this work focuses on a design and implementation of a test bed that provides a
scalable laboratory architecture to manipulate QoS parameters of different data communications flowing
through it. The test bed is used in various use cases that were used to evaluate Cisco Performance Routing
optimization capabilities in different scenarios.
Optimized Link State Routing (OLSR) protocol is a proactive type of routing protocol that uses Multipoint
Relay (MPR) set as the virtual backbone structure. The existing literature has identified various issues with
respect to its backbone structure and has accordingly proposed improvements. In this paper, the focus is on
improving the OLSR protocol by employing a Connected Dominating Set (CDS) based virtual backbone
structure that is dynamically adaptable to rapid topology changes. A new Dynamically Adaptable Improved
Optimized Link State Routing (DA-IOLSR) protocol is proposed that uses the local topology information to
adapt the virtual backbone to topology changes. This assumes significance especially in networks that
experience very high mobility. Changes in the network topology caused by node additions, node deletions
and node mobility are taken care of. Simulations are carried out to assess the performance of DA-IOLSR
protocol and OLSR protocol. Packet delivery achieved by both the protocols is examined under varying
mobility by using various combinations of node speed and pause time values. It is found that DA-IOLSR
protocol provides better packet delivery as compared to OLSR protocol, under varying mobility conditions.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Mobile ad hoc network become nowadays more and more used in different
domains, due to its flexibility and low cost of deployment. However, this
kind of network still suffering from several problems as the lack of resources.
Many solutions are proposed to face these problems, among these solutions
there is the clustering approach. This approach tries to partition the network
into a virtual group. It is considered as a primordial solution that aims to
enhance the performance of the total network, and makes it possible to
guarantee basic levels of system performance. In this paper, we study some
schemes of clustering such as Dominating-Set-based clustering, Energyefficient
clustering, Low-maintenance clustering, Load-balancing clustering,
and Combined-metrics based clustering.
QoS Oriented Coding For Mobility Constraint in Wireless Networksiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
An admission control scheme should play the role of a coordinator for flows in a data communication network, to provide the guarantees as the medium is shared. The nodes of a wired network can monitor the medium to know the available bandwidth at any point of time. But, in wireless ad hoc networks, a node must consume the bandwidth of neighboring nodes, during a communication. Hence, the consumption of bandwidth by a flow and the availability of resources to any wireless node strictly depend upon the neighboring nodes within its transmission range. We present a scalable and efficient admission control scheme, Multi-hop Bandwidth Management Protocol (MBMP), to support the QoS requirements
in multi-hop ad hoc networks. We simulate several options to design MBMP and compare the performances of these options through mathematical analysis and simulation results, and compare its effectiveness with the existing admission control schemes through extensive simulations.
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...ijasuc
Mobile Ad-Hoc network is a collection of mobile nodes in communication without using infrastructure.
As the real-time applications used in today’s wireless network grow, we need some schemes to provide
more suitable service for them. We know that most of actual schemes do not perform well on traffic which
is not strictly CBR. Therefore, in this paper we have studied the impact, respectively, of mobility models
and the density of nodes on the performances (End-to-End Delay, Throughput and Packet Delivery ratio)
of routing protocol (Optimized Link State Routing) OLSR by using in the first a real-time VBR (MPEG-4)
and secondly the Constant Bit Rate (CBR) traffic. Finally we compare the performance on both cases.
Experimentally, we considered the three mobility models as follows Random Waypoint, Random
Direction and Mobgen Steady State. The experimental results illustrate that the behavior of OLSR change
according to the model and the used traffics.
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...IJERA Editor
This paper proposes a load balancing algorithm using fuzzy logic so that maximum Quality of Experience can
be achieved. Avoidance of congestion is one of the major performance objectives of traffic engineering in
MPLS networks. Load balancing can prevent the congestion caused due to inefficient allocation of network
resources. Another aspect of the network performance is Quality of Experience (QoE). QoE in
telecommunications terminology, it is a measurement used to determine how well that network is satisfying the
end user's requirements. The Mean Opinion Score (MOS) is an important factor in determining the QoE. MOS
is a measurement of the quality delivered by the network based on human perception at the destination end.
Specifically we can tell mean opinion score (MOS) provides a numerical indication of the perceived quality of
received media after compression and/or transmission.
PERFORMANCE COMPARISON OF PACKET SCHEDULING ALGORITHMS FOR VIDEO TRAFFIC IN L...ijmnct
In this paper we have studied downlink packet scheduling algorithms proposed for LTE cellular networks.
The study emphasize on three most promising scheduling algorithms such as: FLS, EXP rule and LOG rule.
The performance of these three algorithms is conducted over video traffic in a vehicular environment using
LTE-Sim simulator. The simulation was setup with varying number of users from 10 - 60 in fixed bounded
regions of 1 km radius. The main goal this study is to provide results that will help in the design process of
packet scheduler for LTE cellular networks, aiming to get better overall performance users. Simulation
results show that, the FLS scheme outperforms in terms of average system throughput, average packet
delay, PLR; and with a satisfactory level of fairness index.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...IJCNCJournal
The importance of IPv6 Routing Protocol for Low power and Lossy Networks (LLNs), also called RPL, has motivated in the development of a robust and quality of service (QoS) oriented Multi-Constraints Adaptive Link Quality Index (MALQI) based routing protocol. Unlike classical RPL protocols, MALQI enables mobile-RPL while ensuring fault-resilient, reliable and QoS communication over LLNs. MALQI protocol exploits key novelties such as signal strength based mobile node positioning, average received signal strength indicator (ARSSI) and ETX based objective function for fault tolerant best forwarding path selection. The functional architecture of MALQI enables it to be used as the parallel to the link layer RPL that even in the case of link failure can assist efficient data delivery over LLNs. Once detecting link outage, MALQI can execute node discover and best forwarding path selection to assist QoS delivery. Contiki-Cooja based simulation reveals that MALQI based mobile-RPL outperforms other state-of-art routing protocols.
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET Journal
Ritu Parasher, Yogesh Rathi "A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Mobile ad-hoc network (MANET) is an autonomous wireless network, deploy without any fixed infrastructure and assistance of base stations. Each node in network shares wireless link for interconnections and not only operates as an end system, but also as a router to forward packets. Since the network nodes are mobile, can be move in any direction with varying paces that generate high dynamicity of network so the protocols that are developed for general ad hoc networks are unsuitable for such an environment. In addition, on-hand routing protocols performance decreases as size of network increased. In this context, to enhance the recitation of routing in MANETs, we propose a new approach in this paper, named Advanced Ad hoc On-Demand Distance Vector (A_AODV). It is a modified version of traditional AODV routing protocol, shrink the active path whenever optimal pathway is available and switches the traffic on it. Simulation studies are conducted using NS2 to prove that proposed approach enhance network performance when network size, load or the mobility increases
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...TELKOMNIKA JOURNAL
The stages of the process of Genetic Algorithm (GA), are: Encoding Genotype and Chromosome;
Set Initialization Population; Evaluation Fitness Function; and Selection Process as well as in the later
stages Cross Over Process and Mutation. Outputs from the tests performed in this study can be obtained
by comparing the Genes of the Child (condition data traffic on the UMTS Hybrid - 802.11g network after
the GA) against Gen Holding (traffic data before the GA process).
The research was conducted by calculating the environmental factors, namely: The scheme Two
- Ray Model Propagation and Overlapping Channel Interference Factor, the Doppler Effect be ignored
because the User Equipment (UE) is considered not to shift significant arenas on the IEEE 802.11g
networks. The results of the research is as follows: In the process of cross over, there is a significant
change in the bandwidth, data traffic capacity and Power parameter changes by 9 MHz, 36 MB, and 40
dBm. In the process of mutation, there is a significant change in the bandwidth, data traffic capacity, and
Power parameter by 17 MHz, 32 MB, and 20 dBm.
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
The knowledge on handover behaviour in WiMAX
network is essential for network management and planning
in order to achieve optimum system throughput. In this paper
we have analysed the handover behaviour of transparent relay
in several configurations for the IEEE 802.16j Mobile Multihop
Relay (MMR) WiMAX network. The simulation was
performed using NCTUns tool and adopted the hard handover
mechanism for three different relay network topologies with
varying mobile station speeds. The result shows the handover
for internal network is faster than the external network and
by appropriate relay deployment the system throughput can
be increased up to 14.39%.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Transmit antenna subset selection in mimo ofdm system using adaptive mutuatio...ijmnct
Multiple input multiple output techniques are considered attractive for future wireless communication
systems, due to the continuing demand for high data rates, spectral efficiency, suppress interference ability
and robustness of transmission. MIMO-OFDM is very helpful to transmit high data rate in wireless
transmission and provides good maximum system capacity by getting the advantages of both MIMO and
OFDM. The main problem in this system is that increase in number of transmit and receive antennas lead
to hardware complexity. To tackle this issue, an effective optimal transmit antenna subset selection method
is proposed in paper with the aid of Adaptive Mutation Genetic Algorithm (AGA). Here, the selection of
transmit antenna subsets are done by the adaptive mutation of Genetic Algorithm in MIMO-OFDM system.
For all the mutation points, the fitness function are evaluated and from that value, best fitness based
mutation points are chosen. After the selection of best mutation points, the mutation process is carried out,
accordingly. The implementation of proposed work is done in the working platform MATLAB and the
performance are evaluated with various selection of transmit antenna subsets. Moreover, the comparison
results between the existing GA with mutation and the proposed GA with adaptive mutation are discussed.
Hence, using the proposed work, the selection of transmit antenna with the maximum capacity is made and
which leads to the reduced hardware complexity and undisturbed data rate in the MIMO-OFDM system
In this paper, Space Time Block Code (STBC), Spatial Multiplexing (SM) and hybrid model with OFDM
are designed for Rayleigh fading channel. Combination of SM and STBC forms hybrid MIMO model. The
performances of the above mentioned models with different modulations such as Quadrature Phase Shift
Keying (QPSK) and Quadrature Amplitude Modulation (QAM) with multiple antennas are measured with
respect to BER. In this paper, it is shown that Hybrid MIMO provides low BER. Thus, in wireless
communication, hybrid model improves the data rate and link reliability.
Opportunistic use of the 2.63.5 ghz band for broadband services in the west a...ijmnct
Wireless technology is increasing rapidly, and the vision of pervasive wireless computing and
communications offers the promise of many societal and individual benefits. While consumer devices such
as cell phones, PDAs and laptops receive a lot of attention, the impact of wireless technology is much
broader, e.g., through sensor networks for safety applications and home automation, smart grid control,
medical wearable and embedded wireless devices, and entertainment systems. One of these wireless
technologies is the Worldwide Interoperability for Microwave Access (WiMAX) technology. The explosion
of wireless applications in some parts of the world has created an ever-increasing demand for more radio
spectrum. This is not the case in the West African Sub-Region, especially Ghana where the 2.6GHz and
3.5GHz broadband access bands offering 190MHz and 140MHz bandwidth is underutilized. In this paper,
we look at usage of deployed 4G-WiMAX network in Ghana and advocate the need for policy to promote
the usage of licensed bands opportunistically by wireless devices and/or networks for application in
security, smart grid control, e-learning, telemedicine, e-governance, home and factory automation
The article looks into the current state of the art of dynamic routing protocols with respect to their
possibilities to react to changes in the Quality of Service when selecting the best route towards a
destination network. New options that could leverage information about the ever changing QoS parameters
for data communication are analysed and a Cisco Performance Routing solution is described more in
detail. The practical part of this work focuses on a design and implementation of a test bed that provides a
scalable laboratory architecture to manipulate QoS parameters of different data communications flowing
through it. The test bed is used in various use cases that were used to evaluate Cisco Performance Routing
optimization capabilities in different scenarios.
Optimized Link State Routing (OLSR) protocol is a proactive type of routing protocol that uses Multipoint
Relay (MPR) set as the virtual backbone structure. The existing literature has identified various issues with
respect to its backbone structure and has accordingly proposed improvements. In this paper, the focus is on
improving the OLSR protocol by employing a Connected Dominating Set (CDS) based virtual backbone
structure that is dynamically adaptable to rapid topology changes. A new Dynamically Adaptable Improved
Optimized Link State Routing (DA-IOLSR) protocol is proposed that uses the local topology information to
adapt the virtual backbone to topology changes. This assumes significance especially in networks that
experience very high mobility. Changes in the network topology caused by node additions, node deletions
and node mobility are taken care of. Simulations are carried out to assess the performance of DA-IOLSR
protocol and OLSR protocol. Packet delivery achieved by both the protocols is examined under varying
mobility by using various combinations of node speed and pause time values. It is found that DA-IOLSR
protocol provides better packet delivery as compared to OLSR protocol, under varying mobility conditions.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Mobile ad hoc network become nowadays more and more used in different
domains, due to its flexibility and low cost of deployment. However, this
kind of network still suffering from several problems as the lack of resources.
Many solutions are proposed to face these problems, among these solutions
there is the clustering approach. This approach tries to partition the network
into a virtual group. It is considered as a primordial solution that aims to
enhance the performance of the total network, and makes it possible to
guarantee basic levels of system performance. In this paper, we study some
schemes of clustering such as Dominating-Set-based clustering, Energyefficient
clustering, Low-maintenance clustering, Load-balancing clustering,
and Combined-metrics based clustering.
QoS Oriented Coding For Mobility Constraint in Wireless Networksiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
An admission control scheme should play the role of a coordinator for flows in a data communication network, to provide the guarantees as the medium is shared. The nodes of a wired network can monitor the medium to know the available bandwidth at any point of time. But, in wireless ad hoc networks, a node must consume the bandwidth of neighboring nodes, during a communication. Hence, the consumption of bandwidth by a flow and the availability of resources to any wireless node strictly depend upon the neighboring nodes within its transmission range. We present a scalable and efficient admission control scheme, Multi-hop Bandwidth Management Protocol (MBMP), to support the QoS requirements
in multi-hop ad hoc networks. We simulate several options to design MBMP and compare the performances of these options through mathematical analysis and simulation results, and compare its effectiveness with the existing admission control schemes through extensive simulations.
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...ijasuc
Mobile Ad-Hoc network is a collection of mobile nodes in communication without using infrastructure.
As the real-time applications used in today’s wireless network grow, we need some schemes to provide
more suitable service for them. We know that most of actual schemes do not perform well on traffic which
is not strictly CBR. Therefore, in this paper we have studied the impact, respectively, of mobility models
and the density of nodes on the performances (End-to-End Delay, Throughput and Packet Delivery ratio)
of routing protocol (Optimized Link State Routing) OLSR by using in the first a real-time VBR (MPEG-4)
and secondly the Constant Bit Rate (CBR) traffic. Finally we compare the performance on both cases.
Experimentally, we considered the three mobility models as follows Random Waypoint, Random
Direction and Mobgen Steady State. The experimental results illustrate that the behavior of OLSR change
according to the model and the used traffics.
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...IJERA Editor
This paper proposes a load balancing algorithm using fuzzy logic so that maximum Quality of Experience can
be achieved. Avoidance of congestion is one of the major performance objectives of traffic engineering in
MPLS networks. Load balancing can prevent the congestion caused due to inefficient allocation of network
resources. Another aspect of the network performance is Quality of Experience (QoE). QoE in
telecommunications terminology, it is a measurement used to determine how well that network is satisfying the
end user's requirements. The Mean Opinion Score (MOS) is an important factor in determining the QoE. MOS
is a measurement of the quality delivered by the network based on human perception at the destination end.
Specifically we can tell mean opinion score (MOS) provides a numerical indication of the perceived quality of
received media after compression and/or transmission.
PERFORMANCE COMPARISON OF PACKET SCHEDULING ALGORITHMS FOR VIDEO TRAFFIC IN L...ijmnct
In this paper we have studied downlink packet scheduling algorithms proposed for LTE cellular networks.
The study emphasize on three most promising scheduling algorithms such as: FLS, EXP rule and LOG rule.
The performance of these three algorithms is conducted over video traffic in a vehicular environment using
LTE-Sim simulator. The simulation was setup with varying number of users from 10 - 60 in fixed bounded
regions of 1 km radius. The main goal this study is to provide results that will help in the design process of
packet scheduler for LTE cellular networks, aiming to get better overall performance users. Simulation
results show that, the FLS scheme outperforms in terms of average system throughput, average packet
delay, PLR; and with a satisfactory level of fairness index.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
MULTI-CONSTRAINTS ADAPTIVE LINK QUALITY INDEX BASED MOBILE-RPL ROUTING PROTOC...IJCNCJournal
The importance of IPv6 Routing Protocol for Low power and Lossy Networks (LLNs), also called RPL, has motivated in the development of a robust and quality of service (QoS) oriented Multi-Constraints Adaptive Link Quality Index (MALQI) based routing protocol. Unlike classical RPL protocols, MALQI enables mobile-RPL while ensuring fault-resilient, reliable and QoS communication over LLNs. MALQI protocol exploits key novelties such as signal strength based mobile node positioning, average received signal strength indicator (ARSSI) and ETX based objective function for fault tolerant best forwarding path selection. The functional architecture of MALQI enables it to be used as the parallel to the link layer RPL that even in the case of link failure can assist efficient data delivery over LLNs. Once detecting link outage, MALQI can execute node discover and best forwarding path selection to assist QoS delivery. Contiki-Cooja based simulation reveals that MALQI based mobile-RPL outperforms other state-of-art routing protocols.
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc NetworkIRJET Journal
Ritu Parasher, Yogesh Rathi "A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Mobile ad-hoc network (MANET) is an autonomous wireless network, deploy without any fixed infrastructure and assistance of base stations. Each node in network shares wireless link for interconnections and not only operates as an end system, but also as a router to forward packets. Since the network nodes are mobile, can be move in any direction with varying paces that generate high dynamicity of network so the protocols that are developed for general ad hoc networks are unsuitable for such an environment. In addition, on-hand routing protocols performance decreases as size of network increased. In this context, to enhance the recitation of routing in MANETs, we propose a new approach in this paper, named Advanced Ad hoc On-Demand Distance Vector (A_AODV). It is a modified version of traditional AODV routing protocol, shrink the active path whenever optimal pathway is available and switches the traffic on it. Simulation studies are conducted using NS2 to prove that proposed approach enhance network performance when network size, load or the mobility increases
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...TELKOMNIKA JOURNAL
The stages of the process of Genetic Algorithm (GA), are: Encoding Genotype and Chromosome;
Set Initialization Population; Evaluation Fitness Function; and Selection Process as well as in the later
stages Cross Over Process and Mutation. Outputs from the tests performed in this study can be obtained
by comparing the Genes of the Child (condition data traffic on the UMTS Hybrid - 802.11g network after
the GA) against Gen Holding (traffic data before the GA process).
The research was conducted by calculating the environmental factors, namely: The scheme Two
- Ray Model Propagation and Overlapping Channel Interference Factor, the Doppler Effect be ignored
because the User Equipment (UE) is considered not to shift significant arenas on the IEEE 802.11g
networks. The results of the research is as follows: In the process of cross over, there is a significant
change in the bandwidth, data traffic capacity and Power parameter changes by 9 MHz, 36 MB, and 40
dBm. In the process of mutation, there is a significant change in the bandwidth, data traffic capacity, and
Power parameter by 17 MHz, 32 MB, and 20 dBm.
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
The knowledge on handover behaviour in WiMAX
network is essential for network management and planning
in order to achieve optimum system throughput. In this paper
we have analysed the handover behaviour of transparent relay
in several configurations for the IEEE 802.16j Mobile Multihop
Relay (MMR) WiMAX network. The simulation was
performed using NCTUns tool and adopted the hard handover
mechanism for three different relay network topologies with
varying mobile station speeds. The result shows the handover
for internal network is faster than the external network and
by appropriate relay deployment the system throughput can
be increased up to 14.39%.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Transmit antenna subset selection in mimo ofdm system using adaptive mutuatio...ijmnct
Multiple input multiple output techniques are considered attractive for future wireless communication
systems, due to the continuing demand for high data rates, spectral efficiency, suppress interference ability
and robustness of transmission. MIMO-OFDM is very helpful to transmit high data rate in wireless
transmission and provides good maximum system capacity by getting the advantages of both MIMO and
OFDM. The main problem in this system is that increase in number of transmit and receive antennas lead
to hardware complexity. To tackle this issue, an effective optimal transmit antenna subset selection method
is proposed in paper with the aid of Adaptive Mutation Genetic Algorithm (AGA). Here, the selection of
transmit antenna subsets are done by the adaptive mutation of Genetic Algorithm in MIMO-OFDM system.
For all the mutation points, the fitness function are evaluated and from that value, best fitness based
mutation points are chosen. After the selection of best mutation points, the mutation process is carried out,
accordingly. The implementation of proposed work is done in the working platform MATLAB and the
performance are evaluated with various selection of transmit antenna subsets. Moreover, the comparison
results between the existing GA with mutation and the proposed GA with adaptive mutation are discussed.
Hence, using the proposed work, the selection of transmit antenna with the maximum capacity is made and
which leads to the reduced hardware complexity and undisturbed data rate in the MIMO-OFDM system
In this paper, Space Time Block Code (STBC), Spatial Multiplexing (SM) and hybrid model with OFDM
are designed for Rayleigh fading channel. Combination of SM and STBC forms hybrid MIMO model. The
performances of the above mentioned models with different modulations such as Quadrature Phase Shift
Keying (QPSK) and Quadrature Amplitude Modulation (QAM) with multiple antennas are measured with
respect to BER. In this paper, it is shown that Hybrid MIMO provides low BER. Thus, in wireless
communication, hybrid model improves the data rate and link reliability.
Opportunistic use of the 2.63.5 ghz band for broadband services in the west a...ijmnct
Wireless technology is increasing rapidly, and the vision of pervasive wireless computing and
communications offers the promise of many societal and individual benefits. While consumer devices such
as cell phones, PDAs and laptops receive a lot of attention, the impact of wireless technology is much
broader, e.g., through sensor networks for safety applications and home automation, smart grid control,
medical wearable and embedded wireless devices, and entertainment systems. One of these wireless
technologies is the Worldwide Interoperability for Microwave Access (WiMAX) technology. The explosion
of wireless applications in some parts of the world has created an ever-increasing demand for more radio
spectrum. This is not the case in the West African Sub-Region, especially Ghana where the 2.6GHz and
3.5GHz broadband access bands offering 190MHz and 140MHz bandwidth is underutilized. In this paper,
we look at usage of deployed 4G-WiMAX network in Ghana and advocate the need for policy to promote
the usage of licensed bands opportunistically by wireless devices and/or networks for application in
security, smart grid control, e-learning, telemedicine, e-governance, home and factory automation
At this present scenario, the demand of the system capacity is very high in wireless network. MIMO
technology is used from the last decade to provide this requirement for wireless network antenna
technology. MIMO channels are mostly used for advanced antenna array technology. But it is most
important to control the error rate with enhanced system capacity in MIMO for present-day progressive
wireless communication. This paper explores the frame error rate with respect to different path gain of
MIMO channel. This work has been done in different fading scenario and produces a comparative analysis
of MIMO on the basis of those fading models in various conditions. Here, it is to be considered that
modulation technique as QPSK to observe these comparative evaluations for different Doppler frequencies.
From the comparative analysis, minimum amount of frame error rate is viewed for Rician distribution at
LOS path Doppler shift of 0 Hz. At last, this work is concluded with a comparative bit error rate study on
the basis of singular parameters at different SNR levels to produce the system performance for uncoded
QPSK modulation.
Secured transmission through multi layer perceptron in wireless communication...ijmnct
In this paper, a multilayer perceptron guided encryption/decryption (STMLP) in wireless communication
has been proposed for exchange of data/information. Multilayer perceptron transmitting systems at both
ends generate an identical output bit and the network are trained based on the output which is used to
synchronize the network at both ends and thus forms a secret-key at end of synchronizations of the
networks. Weights or hidden units of the hidden layer help to form a secret session key. The plain text is
encrypted through chaining , cascaded xoring of multilayer perceptron generated session key. If size of the
final block of plain text is less than the size of the key then this block is kept unaltered. Receiver will use
identical multilayer perceptron generated session key for performing deciphering process for getting the
plain text. Parametric tests have been done and results are compared in terms of Chi-Square test, response
time in transmission with some existing classical techniques, which shows comparable results for the
proposed technique. Variation numbers of input vectors and hidden layers will increase the confusion
/diffusion of the schemeand hence increase the security. As a result variable energy based techniques may
be achieved which may be applicable devices/interface of the heterogeneous sizes of the network/device.
Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting
to develop “Bring Your Own Device” policies to allow their employees to use their owned devices in the
workplace. BYOD offers many potential advantages: enhanced productivity, increased revenues, reduced
mobile costs and IT efficiencies. However, due to emerging attacks and limitations on device resources, it is
difficult to trust these devices with access to critical proprietary information. Therefore, in this paper, the
potential attacks of BYOD and taxonomy of BYOD attacks are presented. Advanced persistent threat (APT)
and malware attack are discussed in depth in this paper. Next, the proposed solution to mitigate the attacks
of BYOD is discussed. Lastly, the evaluations of the proposed solutions based on the X.800 security
architecture are presented.
An enhanced group mobility protocol for 6 lowpan based wireless body area net...Kamal Spring
Due to the high volume and velocity of big data, it is an effective option to store big data in the cloud, as the cloud has capabilities of storing big data and processing high volume of user access requests. Attribute-Based Encryption (ABE) is a promising technique to ensure the end-to-end security of big data in the cloud. However, the policy updating has always been a challenging issue when ABE is used to construct access control schemes. A trivial implementation is to let data owners retrieve the data and re-encrypt it under the new access policy, and then send it back to the cloud. This method, however, incurs a high communication overhead and heavy computation burden on data owners. A novel scheme is proposed that enable efficient access control with dynamic policy updating for big data in the cloud. Developing an outsourced policy updating method for ABE systems is focused. This method can avoid the transmission of encrypted data and minimize the computation work of data owners, by making use of the previously encrypted data with old access policies. Policy updating algorithms is proposed for different types of access policies. An efficient and secure method is proposed that allows data owner to check whether the cloud server has updated the ciphertexts correctly. The analysis shows that this policy updating outsourcing scheme is correct, complete, secure and efficient.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Efficient addressing schemes for internet of thingsIJECEIAES
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with constrained application protocol (CoAP-DPMIP) and PMIPv6 with constrained application protocol (CoAP-PMIP). It also provides the optimized transmission path to reduce the delay handover in IoT network. The PMIPv6 described the IPv6 address of mobile sensor device for efficient mobility management. The network architecture explains three protocol layers of open systems interconnection model (OSI model). The OSI layers are data link layer, network layer and transport layer. We have proposed the distance estimation algorithm for efficient data frames transmission. This paper mainly focuses the secure data transmission with minimum loss of error. The evaluation result proved that proposed technique performance with delay, energy, throughput and packet delivery ratio (PDR). Also, it measures the computational time very effectively.
A FUTURE MOBILE PACKET CORE NETWORK BASED ON IP-IN-IP PROTOCOLIJCNCJournal
The current Evolved Packet Core (EPC) 4th generation (4G) mobile network architecture features complicated control plane protocols and requires expensive equipment. Data delivery in the mobile packet core is performed based on a centralized mobility anchor between eNode B (eNB) elements and the network gateways. The mobility anchor is performed based on General Packet Radio Service tunnelling protocol (GTP), which has numerous drawbacks, including high tunnelling overhead and suboptimal routing between mobile devices on the same network. To address these challenges, here we describe new mobile core architecture for future mobile networks. The proposed scheme is based on IP encapsulated within IP (IP-in-IP) for mobility management and data delivery. In this scheme, the core network functions via layer 3 switching (L3S), and data delivery is implemented based on IP-in-IP routing, thus eliminating the GTP tunnelling protocol. For handover between eNB elements located near to one another, we propose the creation of a tunnel that maintains data delivery to mobile devices until the new eNB element updates the route with the gateway, which prevents data packet loss during handover. For this, we propose Generic Routing Encapsulation (GRE) tunnelling protocol. We describe the results of numerical analyses and simulation results showing that the proposed network core architecture provides superior performance compared with the current 4G architecture in terms of handover delay, tunnelling overhead and total transmission delay.
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
Ensuring the best quality of smart multimedia services becomes an essential goal for modern enterprises so there is always a need for effective IP mobility smart management schemes in order to fulfill the following two main functions: (I) interconnecting the moving terminals around the extended indoor smart services. In addition, (II) providing session continuity for instant data transfer in real-time and multimedia applications with negligible latency, efficient bandwidth utilization, and improved reliability. In this context, it found out that the Generalized Multi-Protocol Label Switching (GMPLS) over LTE-A network that offers many advanced services for large numbers of users with higher bandwidths, better spectrum efficiency, and lower latency. In GMPLS, there is an elimination of the routing searches and choice of routing protocols on every core LTE-A router also it provides the architecture simplicity and increases the scalability. A comparative assessment of three types of IPv6 mobility management schemes over the LTE-A provided by using various types of multimedia. By using OPNET Simulator 17.5, In accordance with these schemes, it was proven that the IPv6-GMPLS scheme is the best choice for the system's operation, in comparison to the IPv6-MPLS and Mobile IPv6 for all multimedia offerings and on the overall network performance.
An overview of internet engineering task force mobility management protocols...IJECEIAES
In recent years, internet protocol mobility management has become one of the most popular research areas in networking. Mobility management protocols are in charge of preserving continuing communications as a user roam between different networks. All existing internet protocols (IP), like MIPv6, and PMIPv6, rely on a centralized mobility anchor to control mobile node traffic and signaling. The disadvantages of centralized mobility management (CMM) include ineffectiveness in handling massive volumes of traffic, poor scalability, wasteful use of network resources, and packet delay. When CMM is required to handle mobile media, which demands a huge amount of information and frequently needs quality of services (QoS) such as session continuance and reduced latency, these difficulties become apparent. It drives the need for distributed mobility management protocol (DMM) systems to manage the growing amount of mobile data, the overwhelming of this is video communication. DMM approaches could be regarded as an innovative and effective method to deal with mobility. An overview of the CMM protocol and its drawbacks are analyzed. This study examines the various DMM protocol techniques and their performance metrics are compared to highlight similarities and differences. The study reveals the network-based DMM protocol improves overall handoff time and packet loss.In recent years, internet protocol mobility management has become one of the most popular research areas in networking. Mobility management protocols are in charge of preserving continuing communications as a user roam between different networks. All existing internet protocols (IP), like MIPv6, and PMIPv6, rely on a centralized mobility anchor to control mobile node traffic and signaling. The disadvantages of centralized mobility management (CMM) include ineffectiveness in handling massive volumes of traffic, poor scalability, wasteful use of network resources, and packet delay. When CMM is required to handle mobile media, which demands a huge amount of information and frequently needs quality of services (QoS) such as session continuance and reduced latency, these difficulties become apparent. It drives the need for distributed mobility management protocol (DMM) systems to manage the growing amount of mobile data, the overwhelming of this is video communication. DMM approaches could be regarded as an innovative and effective method to deal with mobility. An overview of the CMM protocol and its drawbacks are analyzed. This study examines the various DMM protocol techniques and their performance metrics are compared to highlight similarities and differences. The study reveals the network-based DMM protocol improves overall handoff time and packet loss.
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile hosts that form a temporary network
without a centralized administration or wired infrastructure. Due to the high mobility of nodes, the network
topology of MANETs changes very fast, making it more difficult to find the routes that message packets use.
Network control with Quality of Service (QoS) support is a key issue for multimedia applications in MANET.
Most of the real time applications have stringent requirements on bandwidth, delay, delay-jitter, packet loss
ratio, cost and other QoS metrics. This paper proposes a Multi-constrained QoS routing with mobility
prediction protocol. If the node has enough resources to transmit data packets, it uses the Global
Positioning System (GPS) to get the location information of the mobile nodes and selects the routing path
with the maximum Route Expiration Time (RET). A set of static and mobile agents are used to find the
multicast routes and transmit the packets. Extensive simulations have been conducted to evaluate the
performance of MC_MAODV using Network Simulator (NS-2). The simulation results show that the
proposed protocol achieves good performance in terms of improving packet delivery ratio and minimizing
end-to-end delay.
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very interesting way out for providing Internet access to vehicles in the road. However, due to the several specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is to select the more reliable route to the mobile gateways, by reducing the communication overhead and performing seamless handover. The proposed protocol is compared with one recent protocol based on packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol ameliorates significantly the network performance in the contrast of the other protocol.
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very
interesting way out for providing Internet access to vehicles in the road. However, due to the several
specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the
Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an
Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as
gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles
gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is
to select the more reliable route to the mobile gateways, by reducing the communication overhead and
performing seamless handover. The proposed protocol is compared with one recent protocol based on
packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol
ameliorates significantly the network performance in the contrast of the other protocol.
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
WiMAX is based on the standard IEEE 802.16e-2009 for wireless access in Metropolitan Area Networks. It
is one of the solutions for 4G IP based wireless technology. WiMAX utilizes Orthogonal Frequency
Division Multiple Access which also supports Multicast and Broadcast Service with appropriate
Modulation and Coding Scheme. Presently, Scheduling and Resource allocation algorithm in Opportunistic
Layered Multicasting provides multicasting of layered video over mobile WiMAX to ensure better QoS.
Initially, the knowledge based allocation of subcarriers is used for scheduling. In addition, to reduce the
burst overhead, delay and jitter, SWIM (Swapping Min-Max) algorithm is utilized. Another promising
technology that can greatly improve the system performance by exploring the broadcasting nature of
wireless channels and the cooperation among multiple users is the Cooperative Multicast Scheduling
(CMS) technique. The simulation results show, Swapping Min-Max performs better with lesser number of
bursts, Zero jitter and with optimal throughput. The results with Cooperative Multicast Scheduling show
the enhanced throughput for each member in the Multicasting Scenario.
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
In networks, many application protocols such as CoAP, REST, XMPP ,AMQP have been proposed for IoT communication which includes p2p or S2S. In MANET Network convergence does the way for improvements in Internet of Things (IoT) communication with high potential for a wide range of applications. Each protocol focuses on some aspects of communication in the IoT. Hence, these application protocols have indicated of how IoT has integrated to enhanced and developed of a new service that require to guarantees
the wide range offered by the quality of services. In this paper, we will introduce a smart pathway that can be bridge the gap between IoT services with its real data traffic. Therefore, we enhanced the MANET routing protocol for computing two or more paths to pass the more that one high priority real traffic data via these paths to improve the gloomy picture of this protocol in the context of IoT. In particular, the good services
with high timely delivery of urgent data such as real time data environmental monitoring. After surveying the published and available protocol interoperability given for urban sensing. In this research, we have proposed a novel solution to integrate MANET overlays, and collaboratively formed over MANET, to boost urban data in IoT. Overlays are used to dynamic differentiate and fasten the delivery of high priority real application time data over low-latency MANET paths by integrating with the original specifications. Our experimental results showed the effectiveness on the network such as the overhead and network congestion. In addition, the initial
results of the light-weight improved the routing protocol over the baseline protocols in terms of the delay of reciveing the packets between nodes which lead to increase the throughput by reducing loss packets.
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksIJAEMSJORNAL
Abstract— In Next generation wireless Networks, the received signals (RSS) from different networks do not have a same meaning since each network is composed of its specific characteristics and there is no common pilot signal. Then, RSS comparisons are insufficient for handoff decision and may be inefficient and impractical. A more complex decision criterion that combines a large number of parameters or factors such as monetary cost, bandwidth, and power consumption and user profile is necessary. Though there are a lot works available for vertical handoff decision (VHD) for wireless networks, the selection of best network is still challenging problem. In this paper we propose a Fuzzy based vertical handoff decision controller (FVHDC) Which performs handover decision based on the output of fuzzy based rules.
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
Hybrid networks are next generation of wireless networks that could be a
combination of Mobile wireless adhoc (MANET) networks and Wireless Infrastructure
networks. They are increasingly utilized in wireless communications that are extremely
supporting real time transmission with restricted Quality of Service. Invalid reservation and
race condition issues happens in MANET. In existing system, QoS-Oriented Distributed
routing protocol (QOD) is employed to boost the QoS support capability of hybrid networks,
it transforms the packet routing problem to resource scheduling problem that has 5
algorithms. They are, QoS guaranteed neighbor selection algorithm, Distributed packet
scheduling algorithm, Mobility based segment resizing algorithm, Traffic redundant
elimination algorithm and Data redundancy elimination based transmission algorithm. The
main drawback of hybrid networks is so far examined in minimum transmission hops and has
less beneficial feature with restricted number of mobile access points, mobility speeds, and
mobile workloads and with different network sizes. It will extremely perform on random
way point model and less in real mobility model. This paper present Data Transparent
Authentication to authenticates data streams by adjusting interpacket delay. Data Transparent
Authentication while not Communication overhead is an approach which reduces breakdown
of original information or sends out of band authentication data.
Similar to Improvement in the mobility of mobile ipv6 based mobile networks using reverse routing header protocol and fast handoff (20)
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Improvement in the mobility of mobile ipv6 based mobile networks using reverse routing header protocol and fast handoff
1. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013
IMPROVEMENT IN THE MOBILITY OF MOBILE IPV6
BASED MOBILE NETWORKS USING REVERSE
ROUTING HEADER PROTOCOL AND FAST HANDOFF
Mohit Bagde1 and P. Sankar2
1
Department of Information Science and Technology, College of Engineering, Guindy,
Anna University, Chennai, India
2
Department of Electronics and Communications Engineering, Jerusalem College of
engineering, Chennai, India
ABSTRACT
Mobile IPv6 based Mobile Networks are becoming increasingly important with the widespread
popularity of wireless internet connectivity. For large networks, an extension, namely, the Hierarchical
Mobile IPv6 is used, which suffers from overloading of the Home Agent as every packet sent has to pass
through it and this produces a significant loss in performance. In this paper, a method to improve the
mobility using the fast handover of Mobile IPv6 (FMIPv6) and the Reverse Routing Header Protocol is
proposed. Simulation results at different packet intervals show that, the proposed scheme is able to
reduce the average delay and achieve an optimum level of throughput.
KEYWORDS
Fast handoff; Reverse Routing Header Protocol; Hierarchical Mobile IPv6; Wired-wireless networks;
Network Mobility; Home Agent; Mobile Networks.
1. INTRODUCTION
With the advent of information technology, the Internet has grown by leaps and bounds, and
there is widespread speculation that there may come a time when all the IP addresses are used
up. This would create several problems, including but not limited to, browsing the web, online
banking, videoconferencing and every other service the Internet provides. Although it seems
implausible that 4.3 billion addresses would become depleted, most Regional Internet Registries
have become exhausted. This was the sole motivation behind the IPv6 protocol that can support
3.4×1038 addresses and is the Internet Engineering Task Force (IETF) successor technology.
The IPv6 allows for stateless address auto configuration and has network security (IPsec) as a
design requirement. Additionally, the IPv6 avoids triangular routing thereby improving
mobility.
The Mobile IPv6(MIPv6) is an IETF standard that allows mobile device users to move from
their Home Network to another while maintaining a permanent IP address, thereby ensuring
location transparency (similar to a Distributed System Environment). This facility allows for
seamless and continuous internet connectivity. However, the reason for the lack of popularity in
deploying Mobile IPv6 is due to poor handoff latency and other drawbacks leading to packet
loss and poor performance for live audio and video streaming-based applications. MIPv6 has
not seen commercial interest because it requires the mobile equipment itself to participate in the
mobility process and this reduces the battery life of the mobile equipment. While MIPv6
manages mobility for a single host, the Network Mobility Basic Support Protocol (NEMO BSP)
DOI : 10.5121/ijmnct.2013.3602
19
2. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013
Although host-based Mobile IPv6 protocols have been studied extensively, a different approach
where the entire network moves, known as Network Mobility (NEMO) is of great interest in the
manages mobility for an entire network. NEMO exhibits several features such as bandwidth
conservation, reduced signalling and improved manageability, etc., though it also has a few
drawbacks, like fragmentation, jitter, packet delay and severe bottleneck in the home link etc. An
extension of the Mobile IPv6, the Hierarchical Mobile IPv6 based mobile networks have issues,
such as the rapidly changing point of attachment of the mobile router, which in turn leads to
binding update storm, double registration etc. Due to the rapidly changing topology of the mobile
network, location updates must be performed at the Home Agent (HA) and every packet sent has
to pass through the HA. This simply, overloads the Home Agent and in turn, leads to the dropping
of packets at the HA, which eventually, leads to delay in the handover and degrades the overall
network performance.
In this paper, by using the fast handover of Mobile IPv6, a reduction in the delay incurred during
handover is proposed in the form of a soft handover scenario using improved router
advertisements. To eliminate the route discovery for acknowledgements, the Reverse Routing
Header Protocol (RRH) is employed. The purpose of this protocol is to record the route through
which the packet travels from the Correspondent Node to the Mobile Node.
The rest of this paper is organized as follows: Section 2 explains the related works. In Section 3,
the background of fast handover of Mobile IPv6 and the packet loss scenario are explained along
with the proposed system. In Section 4, the system setup and transfer of data is explained. Section
5, explains the simulation and testing of the proposed system. The concluding remarks are given
in Section 6.
2. RELATED WORKS
One of the most interesting and recent research challenges in the world of wireless networks is to
design and enable a seamless handover, while reducing latency and simultaneously maintaining
an optimized routing mechanism. In [1] the existing IPv6 mobility management protocols such as
the Proxy Mobile IPv6, Fast MIPv6 and Hierarchical MIPv6, and their characteristics, and
their findings on handover performance have been compared and analyzed. The analysis serves to
highlight the differences among the various protocols, but discusses the MIPv6 protocols which
were initially developed to support mobility in individual hosts, rather than the network in its
entirety. Addressing this issue, solutions have been proposed [2] to support Network Mobility
(NEMO) based on a Mobile Router concept. The main focus is on various Route Optimization
(RO) techniques in mobile ad-hoc networks (MANETs), to compensate for the inefficient routing
and delay owing to the usage of Bi-Directional Tunnel (BDT) which helps to solve the Pinball
routing problem. Although the paper highlights the reduction in traffic congestion, it lacks any
testing done in real-time to support it.
Even though the two extensions to MIPv6, Fast MIPv6 (FMIPv6) and Hierarchical MIPv6
(HMIPv6) provide significantly better throughput in terms of performance and signalling
overhead, a third scheme fast handover over Hierarchical MIPv6 (FHMIPv6) provides the best of
both schemes. HMIPv6 which depends primarily on the concept of the Mobility Anchor Point
(MAP) and FMIPv6 which depends on Access Routers (AR), have their implementation applied
in the most straightforward way. The paper [3] proposes an improved version of FHMIPv6 as the
MAP tries to prevent any redundant binding updates (during fast handover) to take place. It reuses
some of the handover information obtained by analysing the pattern in which the Mobile Node
(MN) moves and improves the handover process. Key features of this paper are that the rate of
20
3. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013
packet loss and handover latency are shown to reduce and the throughput and network
performance is improved, especially in networks in which mobile nodes have a zigzag pattern of
movement. Simulations are performed by means of Network Simulation-2 (NS-2) and the results
are tabulated.
field of Next-Generation Wireless Networks (NGWNs). An unrelated but equally interesting
protocol is the Optimized Route Cache (ORC) protocol, which is used to provide a sense of
mobile transparency by maintaining the route that the entire network takes. A hybrid scheme
called OwR that combines the ORC protocol with the Reverse Routing Header protocol (RRH) is
proposed in [4]. With a few modifications, the OwR is shown to be stable and at least as effective
as the RRH alone. Moreover, ORC works on a best effort basis thereby limiting the number of
sessions that the routing can be optimized for. Nevertheless, simulation results have shown that,
the performance of OwR can be improved and the cost of RO in a nested network can be
decreased.
NEMO allows users on the move, to stay connected to the internet and this emphasizes the
significance of the mobility management of a mobile network in heterogeneous networks like
802.11 WLAN or UMTS. Mobile nodes in such networks are restricted by the bandwidth
associated with that network’s configuration. The problem of controlling the traffic flows due to
the varying bandwidth, of each application further increases complexity of the management
scheme. Thus, it is essential to prioritize traffic flow and allocate a minimum bandwidth
guarantee. A comprehensive study of the performances of the mobility protocols namely,
Mobile IPv6 and NEMO-BSP (NBS) has been made in [5]. The study revolves around a dynamic
Quality of Service (QoS) provisioning mechanism which compares factors like packet delay,
packet forwarding and packet loss rates and integrates this mechanism into the mobility protocols
to provide QoS in the aforementioned heterogeneous networks.
The MIPv6 served only as a global solution to manage mobility in networks however, the
Hierarchical MIPv6 (HMIPv6) was later designed to improve the performance, both in micro and
macro networks by introducing a hierarchy. An Optimal Choice of Mobility Management
(OCMM) is proposed in [6] that focuses not on the performance, but rather on the application
scopes of these two protocols, and chooses the better one among them depending on user criteria
and specifications. It is also shown that, the OCMM outperforms both MIPv6 and HMIPv6 in
terms of the total cost including average registration and packet delivery costs; yet the authors do
not address the issue of RO, and the packet overhead remains largely inefficient.
An alternative solution to the problem of devising a framework of the mobility management
scheme is explained in [7], which is based on the movement pattern of the user. The seamless
handover is the main factor that provides a measure of performance and the main idea in this
paper is the enhancement of a pre-existing model, called Seamless Handoff Architecture for
Mobile IPv6 (S-MIPv6) by simplifying the existing architecture and perfecting the prediction
algorithms that are being used.
To combat the large overhead incurred in Mobile IPv6, the two existing mechanisms of RO and
BDT have been studied and an improved tunnelling based routing method with a better
performance is shown to have lesser overhead, allowing for larger payloads to be sent with lesser
delay [8]. Regarding the issue of smooth handovers, the FMIPv6, which is a cross layer handover
scheme, makes use of a Link Layer (L2) trigger to invoke handovers and by further analyzing the
MN, a predictive algorithm is developed that supports an adaptive handover trigger scheme (IMPAHT). The premature L2 trigger causes serious performance loss, and measures to compensate
the same are addressed in [9].
21
4. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013
Seamless and smooth handovers have been a huge technical challenge in mobile wireless
networks, and the providing for continuous services while moving through heterogeneous
wireless networks, is the main issue in the fourth generation wireless Networks. An intelligent
context-aware solution that points out the importance of multi-homing is proposed in [10]. It is
based on advanced decision approaches like fuzzy logic and analytical hierarchy processes.
In order to further delve into the problem of what constitutes a seamless and smooth handover, it
is essential to understand the various problems that are associated with a MN that actually does
the handover. Radio interference and a reduction in the signal strength as the MN moves
from network are quite common. It is proved in [11] that trend-based handover triggering
schemes are better indicators of link failure than their threshold-based counterparts and also by
comparing existing handover triggering schemes, it is proposed that the use of frame
retransmission improves the quality of communication.
There are a number of delays that occur in Mobile IPv6 and these can be broadly classified into
Layer 2 (L2) and Layer 3 (L3) delays. Among them, Movement detection delay (in L2) and
Duplicate Address Detection (DAD in L3) are the most time-consuming of the delays. Two
solutions are proposed in [12], one for each layer. The first solution utilises fuzzy logic for L2
while the second solution implements Parallel DAD in L3. The researchers support their claims
with simulations showing a significant reduction in both the handover latency and a substantial
improvement in the rate of packet loss in both those layers.
Another trend of the wireless internet is the concept of a flatter architecture. There are many
challenges like reachability and scalability in the centralized management scheme. Some
important network entities and signalling procedures have been proposed and defined. In [13],
fast handoffs have been simulated in intra-domain as well as inter-domain networks. The
Signal-to-Noise Ratio (SNR) and the Signal-to-Interference Ratio (SIR) are link layer triggers
which are used to achieve fast handoff in a hierarchical domain, by enabling the handoff before
the MN reaches the destination routers.
Proxy Mobile IPv6 (PMIPv6) is a mobility management scheme that was primarily introduce to
reduce the handoff latency that occurs in normal Mobile IPv6. PMIPv6 serves to reduce the large
signalling overhead that occurs in Mobile IPv6, and ensures that the functionalities are carried out
by the mobile network itself. Although it is not known whether next generation networks will
make use of MIPv6, the use of IPv6 and PMIPv6 in real-time services have been tested in
Android and their respective challenges have been analysed [14]. They also go on to infer that,
with a few changes to the existing schemes, it is highly probable that they may provide support
for, not only the mobility management but also, the seamless handovers.
It might seem that PMIPv6 does offer some solution to the handoff latency issues of Mobile IPv6
but PMIPv6 has its own share of drawbacks. Solutions to some of the problems such as the
disruption latency and data loss due to traffic faced by PMIPv6 in localized domains are offered
in [15]. In theory, at least, PMIPv6 is shown to possess lower handoff latency as compared to
host-based mobility management protocols like MIPv6 or Hierarchical MIPv6. A Mobile Host
(MH) works in a reactive mode, and has some loss in communication performance; however, the
article proposes a proactive latency low handover mechanism, which utilises a make-beforebreak technique, in order to support the mobile host’s seamless and fast roaming in PMIPv6. This
would enable the mobile host to re-configure its interface more quickly after a handover.
A cross-layer integrated mobility and service management scheme, called Dynamic Mobile
Anchor Point with Smart Router (DMAPwSR) in Mobile IPv6 environments is proposed and
analyzed in [16]. The goal of DMAPwSR is to minimize the overall mobility and service
22
5. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013
management cost for serving mobile users with diverse mobility and service characteristics. The
basic idea of DMAPwSR is that, each MN can utilize its cross-layer knowledge to choose smart
routers to be its dynamic mobility anchor points (DMAPs), to balance the cost associated with
mobility services versus packet delivery services. An analytical model based on stochastic Petri
nets to analyze the DMAPwSR and compare its performance against Mobile IPv6 and HMIPv6,
was also developed.
3. THE PROPOSED SYSTEM
The system architecture for the proposed system is given in Figure 1. The solid lines indicate a
wired connection, whereas the dashed lines indicate a wireless connection. Here there is one MAP
indicating only one domain. A MAP marks the boundary of a sub network. All the routers
connected with it belong to one sub network. The handoff occurs when the mobile router changes
its point of attachment from one access router to another.
Figure 1. The proposed architecture
The AODV protocol is used, as it significantly reduces the control overhead, because the nodes
are informed in case of link failure (unlike what is seen in DSDV). The packets sent by the
Correspondent Node (CN) are intercepted by the Home Agent (HA), and the HA forwards these
packets to the respective Access Router (AR). The HA binding cache lookup is done on a per
packet basis. The return path for the acknowledgements is determined with the help of the reverse
routing header, as shown in Figure 2. A multi-hop wireless routing is simulated.
3.1 FAST HANDOVER
In the simplest terms, Handover can be thought of as terminating existing connectivity and
obtaining new IP connectivity. This switch in connectivity is performed by sending a successful
binding update to the Home Agent so that the Mobile Node can receive packets directly at the
new care of address (CoA). Therefore, it is necessary to reduce the latency due to the binding
updates and the IP connectivity. Moreover, there are problems of overloading brought about by
the location updates at the HA, when the Mobile Router (MR) rapidly changes its point of
attachment. The MAP marks the boundary of a sub-domain, and is a router based on which a
23
6. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013
mobile node’s regional CoA is assigned. Proactive handoffs between the current and the next
access router, bypass the HA and reduce the congestion due to excessive binding updates at the
HA. Figure 3 traces the steps involved in performing the handoff and how the RRH is used to get
the latest address of the MR via the Next access Router (NAR). Fast handover introduces four
new message types to be used along with MIPv6, which allows the anticipation of the Layer 3
handoff such that data traffic can be forwarded to the MR’s new location before it moves there.
The Router Solicitation for Proxy Advertisement (PrRtSol) and Proxy Router Advertisement
(PrRtAdv) messages are used for aiding movement detection. This results in reduced packet loss
due to layer 3 handoff latency.
Figure 2. Functioning of the proposed system
These messages are used between the MR and AR and between the Previous Access Router
(PAR, the access router to which mobile router is attached before handing off) and NAR (the
access router to which the MR handoffs to). Through the two PrRtSol and PrRtAdv messages, the
MN also devises a potential new care of address (NCoA) when it is still present on the PAR's link.
Hence, the latency due to the new prefix discovery subsequent to handover is eliminated. MR
initiates the procedure by sending the PrRtSol to the PAR which contains the link layer address.
MR will receive the PrRtAdv in response and forms the CoA according to the IPv6 address autoconfiguration. In order to reduce the binding update latency, the protocol specifies a binding
between the Previous CoA (PCoA) and NCoA. The MR sends a Fast Binding Update (FBU)
message to its PAR to establish this tunnel.
Finally, the routers could transfer network-resident contexts, such as access control, Quality of
Service (QoS), and header compression, in conjunction with handover. For these operations, the
protocol provides Handover Initiate and Handover Acknowledge messages, all of whose
definitions have been described in [17].
24
7. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013
Figure 3. Sequence diagram depicting fast handover in Mobile IPv6
3.2 REVERSE ROUTING HEADER
A nested mobile network may consist of a number of Bi-Directional Tunnels (BDTs) with a tunnel
between an MR and the HA associated with the MR. This results in the usage of many network
resources. To avoid this, a new routing header protocol called the Reverse Routing header protocol
(RRH) is proposed. According to the RRH, only a single bidirectional tunnel is enough between
the first MR and the HA, in order to forward the packets. The RRH records the route out of the
nested mobile network and is converted into a routing header for packets destined to the mobile
network. The Local Fixed Node (LFN) and a CN operation are left unchanged from the Mobile
IPv6. A CN can also be an LFN. An RRH is inserted by the first MR on the mobile network’s
outbound path, as part of the reverse tunnel encapsulation. It is removed by the associated HA
when the tunnel packet is decapsulated.
When applied to the NEMO problem, the RRH can be used to update the HA on the actual
location of the MR. Only the egress MRs which are not at the home network, and are
forwarding packets, update the HA on the move. The first hop for the return path is the last hop on
the path of the incoming packets that is between the HA and the MR of the mobile network. The
agent saves the IP address of the MR from the source field in the IP header. The full path to and
within the mobile network is piggy backed with the traffic on a per packet basis to cope with the
rapid movement. This makes the packet construction different from the Mobile IPv6. Subsequently
the MR sends an FBU to bind its newly formed CoA as the last message before the handover is
executed. After receiving the FBU from the MR, the PAR starts forwarding packets destined for
the MR to its new CoA.
3.3. SYSTEM SETUP AND DATA TRANSFER
The initial system setup is shown in Figure 4. The proposed system has been configured using the
TCL script languages in a wired-wireless scenario. There are 8 nodes in the scenario, out of which
7 nodes belong to the wired network, and only one is a mobile router which has mobility. The data
transfer from the correspondent node and the mobile router is shown in Figure 5. The simulation
time is setup to 80s. The CN communicates with the MN inside the mobile network through the
HA, which indicates that the MN is within the home network. The MN is registered with the HA,
25
8. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013
which keeps track of the location updates of the mobile network and its entities (MNs and/or sub
routers).
Figure 4. The initial system setup
The MAP divides the entire network into sub domains, i.e., all the entities under a MAP is
administrated by the MAP itself rather than the HA directly. This distributes the load on the HA.
The default access router for the mobile network is the HA but it has the capability to accept the
other base stations as the access routers, when the MR is away from the transmission range of the
HA. The packet transfer before handoff is through the HA to the MR, behind which the destined
node is available. All the intermediate routers add their own IP addresses to the data packet.
When the packet reaches the HA, the entire path through which the packet had travelled is
recorded as the header. The HA strips the header and encapsulates the packet, and establishes a
BDT to the MR. The MR then decapsulates the packet and reverses the header, i.e., the source now
becomes the destination and the destination in the RRH becomes the source of the packet.
Figure 5. Packet transfer before handoff
26
9. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013
Figure 6 shows the packet transfer after the handoff has occurred. When the MR moves out of the
transmission range of the HA, it broadcasts the router solicitation message. The receipt of this by
the current AR (HA in this case) indicates that the transmission of the packets intended for the
mobile network cannot be forwarded through it; so, it broadcasts a handoff initiation (HI) message
to the nearby routers. One of the routers accepts this request, and sends back the Handoff
Acknowledgement (HAck). The HA sends the acknowledgement back and the handoff is
completed.
Figure 6. Packet transfer after handoff
Figure 7. Screen shot of the Trace file
During fast handover, the change in the point of attachment of the mobile router should be carried
out without the loss of the communication data. The observation from the simulation is that
initially the router number 3 acts as the AR for the communication with the mobile router. When
the MR moves out of the range of router 3, router 6 acts as the new access router. It can be said
that data is being transferred from the PAR to the MN and also the transfer point is handed over to
the NAR indicating the packet transfer and handoff is taking place. Due to the bypassing of the
HA, the number of packets being dropped is very minimal.
27
10. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013
On employing RRH, it is expected that the acknowledgements should take the same route through
which the data packets had reached the destination node. Moreover, it is observed that, the HA
decapsulates the packet header and reverses the header.As the packets pass through the
intermediate router their address is added in the header. When the packet reaches the HA, the
entire path is known and the header is reversed to determine the path for the acknowledgements.
The QoS metrics, the throughput and the delay are used for the purpose of analysis. The packet
interval has been varied from 0.02 ms to 0.06 ms, and the average delay observed at the MR has
been plotted in Figure 8. The graph clearly indicates that when the packet interval reaches 0.04 ms,
the delay is reduced considerably. The delay is further reduced by 0.0001 when the packet interval
is 0.05 ms, after which there is again increase in the delay. The average delay is optimum when the
packet interval is at 0.04ms and is found to increase upwards from 0.05ms.
Figure 8. Packet Intervals versus Average Delay
Figure 9. Packet Intervals versus Average Throughput
Figure 9 shows the average throughput for various packet intervals. The graph indicates good
throughput at the beginning of the simulation after which there is a sudden decrease in the average
throughput. The average throughput is optimum when the packet interval is 0.03 ms and 0.04 ms.
The scenario been considered for the analysis purpose is the one where the data packets are
generated by the CN and are received by the MR which acts as the destination node. The MR
sends the acknowledgement back to CN on a per packet basis.
28
11. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013
Table 1. Analysis of Average Throughput and Average Delay Product (AT x AD)
Packet Interval
Average CW Size
Range
ATxAD
0.02
47.026744
69.8
0.0319
0.03
39.212015
57.8
0.0298
0.04
34.626122
50.9
0.0224
0.05
0.05
31.533755
29.275673
46.2
42.8
0.0224
0.0239
As per the simulation results, the optimum average throughput is observed at the packet interval
0.04 ms. The number of bytes sent is 2348320 bytes and that received is 2338960 bytes. A trade
off is achieved between the delay and throughput at 0.04 ms as observed in Table 1 such that the
product of average throughput and average delay is 0.0224 at 0.04 ms and on increasing the packet
interval further, the product is found to increase, suggesting the possibility of an increase in the
delay. Thus, the throughput of 0.996014 is found to be optimum for the minimum delay at an
interval of 0.04 ms.
5. CONCLUSION
A wired-wireless scenario that uses the TCP to implement a fast handover, incorporated with
NEMO to improve the mobility of the network, is proposed. To overcome the reverse tunnelling
and high data loss drawbacks of NEMO, the RRH protocol has been proposed as an extension,
which allows for acknowledgments to be sent until the session completes. The performance of
the proposed system is analysed in terms of throughput and average delay. It is concluded that, the
FHMIPv6 along with the RRH improves the performance in scenarios with CBR traffic. There is a
need to conduct further testing with various types of application traffic to observe the performance
of the proposed system. This proposal can be further applied to real world architectures in both
wired networks and mobile environments to test the efficacy for further validation.
REFERENCES
[1] Lee, J-H., Bonnin, J-M., You, I. & Chung, T-M., (2013) “Comparative Handover Performance
Analysis of IPv6 Mobility Management Protocols”, IEEE Transactions on Industrial
Electronics, Vol. 60, No.3, pp.1077-1088
[2]
Mosa, A.A., Hassan, A., Saeed, R.A. & Khalifa, O.O., (2011) “Evaluation of NEMO-based approaches
for route optimization”, in ICOM: 4th International Conference on Mechatronics, Kuala Lumpur,
Malaysia, pp.1-7.
[3]
Yu, H. & Tao, M., (2011) “Fast Handover in Hierarchical Mobile IPv6 Based on Motion Pattern
Detection of Mobile Node”, Wireless Personal Communications, Vol. 61, No.2, pp.303-321
[4]
Kong, R., Feng, J., Gao, R. & Zhou H., (2012) “A new route optimization scheme for network
mobility: Combining ORC protocol with RRH and using quota mechanism”, Journal of
Communications and Networks, Vol.14, No.1, pp.91-103
[5]
Noor, R.M. & Edwards, C., (2011) “A comparative performance analysis on NEMO-QoS and MIPv6QoS in heterogeneous environments,” Journal of Applied Sciences, Vol. 11, pp. 3130-3141
[6]
Wang, S., Cui, Y., Das, S.K., Li, W. & Jianping, W., (2011) “Mobility in IPv6: Whether and How to
Hierarchize the Network?,” IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No.10,
pp.1722-1729
29
12. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013
[7]
Pei, L. & Zhu, L., (2012) “Fast Handover Scheme Named ESMIPv6 for Mobile Wireless Network” in
GCN 2012: Proceedings of the 2nd International Conference on Green Communications and Networks,
Chongqing, China, pp 579-586.
[8]
Zolfagharnasab, H., (2012) “Reducing packet overhead in Mobile IPv6”, International Journal of
Distributed and Parallel Systems, Vol.3, No.3, pp.1-8
[9]
Tao, M., Yuan, H., Dong, S. & Yu, H., (2012) “Initiative movement prediction assisted adaptive
handover trigger scheme in fast MIPv6,” Computer Communications, Vol. 35, No.10, pp.1272-1282
[10] Zekri, M., Jouaber, B. & Zeghlache, D., (2010) “Context aware vertical handover decision making in
heterogeneous wireless networks” in IEEE 35th Conference on Local Computer Networks, Denver,
Colorado, pp.764-768.
[11] Lim, J. M-Y., Chow, C-O. & Ishii, H., (2013) “Handover Trigger Based on Frame
Retransmission Trend in Mobile IPv6,” Wireless Personal Communications, Vol. 70, No. 1, pp.41-56
[12] Anwar, F., Masud, M. H., Bari, s. & Latif, S. A., (2013) “Enhanced Handoff Latency Reduction
Mechanism in Layer 2 and Layer 3 of Mobile IPv6 (MIPv6) Network,” Australian Journal of Basic and
Applied Sciences, Vol. 7, No.6, pp. 658-671
[13]Yan, S., Jiayin, C. & Shanzhi, C., (2012) “A Mobile IPv6 based Distributed Mobility
Management Mechanism of Mobile Internet,” in Physics Procedia 2012: International Conference on
Solid State Devices and Materials Science, Macao, China, pp.2249-2256.
[14] Kellokoski, J., Koskinen, J., Rusanen, T., Kalliolahti, P. & Hämäläinen, T. A., (2013) “Proxy Mobile
IPv6-based Seamless Handover,” Internet of Things, Smart Spaces, and Next Generation Networking,
Lecture Notes in Computer Science Vol. 8121, pp.214-223
[15] Al-Surmi, I. & Othman, M., (2012) “Latency Low Handover Mechanism Considering Data Traffic
Lost preventing for Proxy Mobile IPv6 over WLAN,” Wireless Personal Communications, Vol. 70,
No.1, pp. 455-499
[16] Wang, D-C., He, W. and Chen, I-R., (2013) “Smart Routers for Cross-Layer Integrated Mobility and
Service Management in Mobile IPv6 Systems,” Wireless Personal Communications, Vol.69, No.1, pp.
449-469
[17] Koodli, R., (2009) “Mobile IPv6 Fast Handovers,” IETF RFC 5568
Authors
Dr. P. Sankar
P. Sankar received his B.Sc degree in Mathematics from University of Kerala , B.E in
Electronics and Telecommunication from the University of Poona, Pune, India, M.E in
communication systems from Madurai Kamaraj University, and received PhD from Anna
University, Chennai. He is currently working as Professor in the Department of Electronics
and Communication Engineering in Jerusalem College of Engineering, Chennai, India. He is
a member of IEEE and life member of ISTE. His areas of interests include Multimedia information
systems, Image and video processing and Computer Networks.
Mohit Bagde
Mohit Bagde is an undergraduate student in his final year pursuing Bachelor of Technology
(Information Technology) at College of Engineering, Guindy, Anna University, Chennai,
India 600025. His areas of interest are Wireless Networks, Distributed Systems and Graph
Theory.
30