SlideShare a Scribd company logo
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
DOI : 10.5121/ijcnc.2014.6406 65
INTERNET SERVICE PROVIDER-MOBILE
BORDER GATEWAY ROUTE
OPTIMIZATION TECHNIQUE IN MOBILE
IP BASED ON DIFFERENT ISPS
STRUCTURES (ISP-MBG)
Sherif Kamel Hussein
Department of Communications and Electronics
October University for Modern Sciences and Arts
Giza - Egypt
ABSTRACT
Due to the proliferation in the number of users that are accessing the internet and due to the increase in
the number of the electronic devices that support mobility like mobiles, laptops and many others that
definitely lead to the need of a protocol that supports a mobility. Mobile Internet Protocol is a
recommended Internet protocol designed to support the mobility of a user (host). This protocol provides a
continuous connectivity for any mobile host . In the traditional Mobile IP all packets forwarded to the
Mobile host from the correspondent node will be forwarded via the Home Agent (HA) and that leads to
the triangle routing problem .
(ISP MBG) technique is used as a route optimization technique for solving the triangle routing problem
in conventional Mobile IPv4. This technique has been implemented on .net platform .The study of this
technique was discussed before using 2 similar Internet Service Providers and the simulation results
provided a better performance compared with the Conventional Mobile IP Technique. In this paper the
simulator will be used to study the performance of the (ISP MBG) technique using two different Internet
Service Providers ( ISPs) structures separated by a single Mobile Border Gateway ( MBG).Simulation
results shows also a better performance compared with the conventional Mobile IP technique .
KEYWORDS
Internet Service Provider, Point of Presence, Mobile IP Border Gateway, PoPs Virtual Mobile IP
Network.
1. INTRODUCTION
Mobile IP is an open standard protocol defined by the Internet Engineering Task Force (IETF)
RFC 2002. That allows users to keep the same IP address, stay connected, and maintain
ongoing applications while roaming or travelling between networks. The operation of Mobile
IP protocol is based on three main functions ,Agent Discovery , Registration and Tunneling [1].
The main problem of Mobile IP is the triangle routing problem in which all the traffics sent by
the Correspondent node (CN) to Mobile Node (MN) will be intercepted by the Home Agent
(HA) which is a main router serving the home network for the Mobile Node .Home Agent will
tunnel the transmitted packets to the Foreign Agent (FA) which is a router serving the foreign
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
66
network where the mobile node is located .The Foreign Agent then de- tunnels the received
packets and forward the packets finally to the Care of Address (CoA) of the Mobile Node on the
foreign Network [2].
The route taken by the transmitted packets from the Mobile Node to the Correspondent Node is
Triangular in nature which definitely leads to an increase in the delay time and also decrease in
network throughput. Internet Service Provider Mobile Border Gate Way ( ISP MBG) is a route
optimization technique based on using multiple Internet Service Providers (ISPs) separated by a
multiple Mobile Border Gateways (MBGs). This technique has been studied and discussed
before based on using two similar Internet Service Providers structures and the simulation
results showed a better performance compared with the conventional Mobile IP technique . In
This paper the technique will be studied based on using two different Internet Service Providers
Structures[3-4].
The paper is divided into five sections. The second section: introduces the route optimization
technique Internet Service Providers Mobile Border Gateway (ISP MBG) for two similar ISP
structures . The third section: presents the implementation of ISP MBG technique based on
two different ISPSs Structures . Section 4: introduces the evaluation and the simulation results
for the proposed ISP MBG technique compared with conventional Mobile IP technique.
Conclusion and future work are presented in section 5.
2. INTERNET SERVICE PROVIDER MOBILE BORDER
GATEWAY TECHNIQUE [5]
The design is composed of a number of N Internet Service Providers ISP1, ISP2,…….., ISPN,
each covers a definite and different geographical place. They are separated by an L Mobile IP
Border Gateways (MBGs) .Each ISP is serving S equal Areas. Each Area is divided into M
Zones and each Zone is served by K number of Points of Presence nodes (PoPs).Each PoP is
serving X number of nodes with a range W of Addresses. The nodes are classified as either
Local Nodes or Foreign Nodes based on whether they are located in the same Agent or in
different Agents. Each Area is served by an Agent which is considered as a Home Agent for the
local nodes inside the Area or as a Foreign Agent for the nodes located outside the Area .For
each Internet Service Provider there are K PoPs Virtual Networks (PVNs) which handle the
state information for all Mobile Nodes and Correspondent Nodes. Figure 1 show the structure
for a given ISP . Figure 2 show an example of PoPs Virtual Networks (PVNs) for a given ISP.
Figure 1. Structure For a Given ISP
ISP
Area 1
(Agent
Area 2
(Agent
Area S-1
(Agent S-
Area S
(Agent
Zone Zone 2 Zone M- Zone
PoP 1 PoP PoP K- PoP
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
67
PVNi
∀i∈1..k
PoPi(Area1,Zone1), PoPi (Area1,Zone2),…, PoPi (Area1, ZoneM),
PoPi (Area2,Zone1), PoPi (Area2,Zone2), …., PoPi
(Area2,ZoneM),…..,
PoPi (Areas ,Zone1), PoPi (AreaS,Zone2)……. PoPi (AreaS,ZoneM).
Figure 2. PoPs Vitual Network for a Given ISP
ISP MBG technique is supporting both the tunneling and routing techniques.MBG will either
maintain the binding information (Home address, Care-of-Address) or only the home
information based on whether the ISP MBG technique is using tunneling or routing technique
in forwarding the packets between the Correspondent Nodes and the Mobile Nodes [5-6].
2.1 ISP MBG Technique Operation Sequence
When a connection is to be started between two nodes the Correspondent Node and Mobile
Node , the execution of the ISP MBG technique will be started by checking the location of both
nodes.If both nodes are located in the same Internet Service Provider (ISP) so the
Correspondent Node will start asking for an information about the Mobile Node by connecting
first to its nearest home PoP. That PoP will search its neighboring PoPs through the PoP Vitual
networks. One of these PoPs should have an information about the Mobile Node and the
connection will be started. In case if both MN and CN are in different ISPs, the same sequence
will be taken but the only difference is that the PoP that is connected to the MN through the PoP
virtual network (PVN) will connect to Mobile Border Gateway (MBG) which maintains the
original home information for the destined MN.MBG will then connect to the nearest PoP in the
destination ISP which is connected to a new virtual Network of the Mobile Node and then the
connection will be started directly between the Correspondent Node (CN) and the Mobile Node
(MN).Figure 3 shows the operation sequence for ISP MBG technique in both cases . In case 1
both MN and CN are in the same Agent but in case 2 both MN and CN are in different Agents
[5-6].
Figure 3. Operation Sequence for the Proposed Technique
Agent1
PoP1
PoP2
PoP - PoP
PoP1
PoP2
PoP -
PoP1
PoP2
PoP -
PoP1
PoP2
PoP - PoP
PoP1
PoP2
PoP -
PoP1
PoP2
PoP -
Agent2
Area
1
Area 2
MBG
Home information for
the transferred MN
(Agent, Area, Zone,
PoP)
MN1
MN2
CN
PVN 1.c
2.e
2.d
2.a
1.a
2.b
1.b
2.c
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
68
2.2 ISP MBG System Parameters
The key point to establish any System is to define the system parameters .System Parameters
include the simulation parameters , data structures, and the connection parameters. Simulation
parameters are related to the system construction and defined by the number of ISPs, MBGs,
Areas, Zones, PoPs, and the in service or in waiting nodes covered by each PoP .The main data
structures used in the simulation are Nodes, POPs, Areas, Agents, and Mobile IP Border
Gateway (MBG). All the data structures are implemented in C sharp on a microsoft.net platform
[5-6].Finally the connection parameters are the parameters required for the design and the
implementation of the ISP MBG algorithm and are classified as follows:
1. The distance in km equivalent to the distance of 1 pixel.
2. Link speed for PoP connection
3. Link speed for Agents connection
4. PoP nodes count to serve.
5. PoP nodes count to wait
6. Agent nodes count to serve
7. Agent nodes count to wait
3. IMPLEMENTATION OF ISP MBG TECHNIQUE BASED
DIFFERENT ISPS STRUCTURES.
The Implementation of the ISP MBG technique is based on two different ISPs Structures. The
first ISP is serving only one Area with 2 Zones and 4 PoPs per Zone. The second ISP is serving
2 similar Areas with 3 Zones each, and 3 PoPs for every Zone. Each PoP is actually serving 100
nodes with 150 addresses as shown in figure 4. The addresses are classified as 100 addresses
available for the nodes in service and the remaining 50 Addresses for the nodes that are in the
waiting state.For the nodes in service we can split the addresses into 75 addresses for local
generating nodes and 25 addresses for external nodes. In a similar way the waiting nodes
addresses are divided equally between the local and the external generating nodes. The number
of nodes used in the simulation is about 2000 Nodes. Figure 5 shows the design architecture of
the proposed ISP MBG technique based different IPSs structures.
Figure 4. Nodes and Address Classifications for PoPi
PoP i
N1
N75 N76 N100 N101
N125
N126
N150
1-------75
Locally in
services
76-----100
Locally in
waiting
101-----125
Externally in
services
126-----150
Externally in
waiting
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
69
∑
∈∀ .....im
The total number of PoPs can be calculated by the following equation:
PN = Pik X Niz (1)
Where;
PN is the total number of PoPs
Pik is the number of PoPs within the zone in Internet Service Provider k
Ni is the total number of Zones in Internet Service Provider i
Also the Applicable total number of generating nodes can be calculated from the given
equation.
NT = PN x NC (2)
Where;
NT is the total number of generating nodes
NC is the total number of generating nodes in each connection.
Figure 5. System Construction
P3P2P1
P3P2P1
P3P2P1
Zone 1
Zone 2
Zone 3
Area 1
P3P2P1
P3P2P1
P3P2P1
Zone 1
Zone 2
Zone 3
Area 2
ISP 2
P2P1
P3 P4
MBG
Zone 1
P2P1
P3 P4
Zone 2
Area1
ISP 1
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
70
∑
−
+
∈∀ 1
1
.....
),(
zi
mm
m
PPD
∑
−
+
∈∀ 1
1
.....
),(
Z
m
mm
im
L
PPD
4. EVALUATION OF THE ISP MBG TECHNIQUE
To evaluate the performance of the proposed ISP MBG technique, the following five measuring
criteria are required: Link Distance, Transmission Time, Blocking, Buffering and Security.Link
distance will be calculated based on the distance between two connecting nodes and it is
calculated in kilometer equivalent to the number of pixel (1 pixel =0.2 Km).The Link distance is
calculated using the following equation:
Dt (Pi, Pz) = (3)
Where; P: Transmission point (PoP or MBG)
D: Euclidian distance
Dt: Total link distance between two transmission points
The transmission time will be calculated based on the location of both nodes, the Mobile Node
(MN) and the Correspondent Node (CN) and whether both are located in the same area, same
Internet Service Provider or either one in different areas or different Internet Service Providers.
the transmission time will be calculated using the following equation:
T (Pi, Pz) = (4)
Where; P: Transmission point (PoP or MBG)
T (Pi, Pz):Total transmission time between two points Pi and Pz
L: Link speed
D: Euclidian distance
Blocking will be calculated as the number of blocked connections and that will define the
network throughput taking into consideration that each connection has 2 nodes. Buffering is
considered as one of the network resources that must be optimally used. In conventional Mobile
IP buffering is based mainly on the storage buffers of the Agents whatever Home or foreign
Agent but in the proposed technique mainly is based on the PoPs storage Buffers and the PoPs
virtual Networks. Security is an important performance parameter to measure how much the
data and the information are secured while travelling from one network to another. Further
study for the performance of the proposed technique will be used to measure the evaluation for
both the buffering and the security parameters [7-8].
4.1 Simulation Results for the case of 2 different ISPs structures
For the case where two different ISPs are used, the first ISP consists of one Area of two Zones
and four PoPs per Zone, and the second ISP consists of two Areas ,each with three Zones and
three PoPs per Zones, the algorithm is applied for a range of 2000 Nodes The comparison
graphs will be detailed in the following subsections .
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
71
4.1.1 Simulation Results for Link distance
(a) Total Link Distance for the Conventional and the ISP MBG Techniques
Average Link Distance Per Connection (2 Different ISPs -
1st with 1 Area of 2 Zones and 4 PoPs, 2nd with 2 Areas of
3 Zones and 3 PoPs)
0
200
400
600
800
1000
1200
600
700
800
90010001100120013001400150016001700180019002000
#of Connections
Distanc(km)
ISP MBG Link Distance
Per Conection
Conventional Mobile IP
link Distance Per
Connection
(b) Average Link Distance for the Conventional and the ISP MBG Techniques
Figure 6. Link Distance Comparison
Form figures (6.a) and (6.b) we can see that, when different ISPs with different configurations
are connected to each other, the performance of the new technique still outperforms the
conventional techniques.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
72
4.1.2 Simulation Results for Transmission Time
Total Transmission Time Comparison (2 Different ISPs -
1st with 1 Area of 2 Zones and 4PoPs, 2nd with 2 Areas of 3
Zones and 3 PoPs)
0
1000
2000
3000
4000
5000
6000
7000
8000
600
700
800
90010001100120013001400150016001700180019002000
#of Connections
TotalTransmission
Time(sec)
ISP MBG Total
Transmission Time
Conventional Mobile
IP Yotal Transmission
Time
(a) Total Transmission Time for the Conventional and the ISP MBG Techniques
Average Transmission Time Per Connection (2 Different
ISPs -
1st with 1 Area of 2 Zones and 4 PoPs, 2nd with 2 Areas of
3 Zones and 3 PoPs)
0
5
10
15
600
700
800
90010001100120013001400150016001700180019002000
#of Connections
Transmissio
nTime(sec)
ISP MBG Transmission
Timr Per Connection
Conventional Mobile IP
Transmission Time Per
Connection
(b) Average Transmission Time for the Conventional and the ISP MBG Techniques
Figure 7. Transmission Time Comparison
Figures (7.a) and (7.b) show that the same argument applies when comparing the transmission
time performance and the results for the link distance simulation, the new technique
outperforms the conventional technique in the transmission time .
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
73
4.1.3 Simulation Results for Throughput
Throughput Comaprison (2 Different ISPs -
1st with 1 Area of 2 Zones and 4 PoPs, 2nd with 2 Areas of
3 Zones and 3 PoPs)
0
5
10
15
20
300
375
450
525
600
675
750
825
900
975
#of Connections
BlockedConnections
ISP MBG Blocking
Conventional Mobile IP
Blocking
Figure 8. Throughput Comparison
Figure 8 shows the throughput performance of the new techniques is still better than the
conventional techniques, similar to the case of same ISPs.
4.1.4 Buffering
Concerning Buffering; it has been found that the ISP MBG technique provides better buffering
than the Conventional Mobile IP technique. Using PVN is facilitating the process of accessing
the home information for any mobile nodes roaming between networks . Because of PVN
provides a virtual network among PoPs , the home information of Mobile Node could be
accessed without any redundancy of having multiple copies at each PoP .Comparatively in the
conventional Mobile IP technique the Home Agent Buffer should maintain the home
information for each node travelled to a foreign network and that definitely lead to the need of
high buffering size. On the other side it has been found that the cost for the Agent's buffers is
higher than that of the PoP's buffers [9].Further study will be conducted in the future to
elaborate in more details the comparison between buffering in both the conventional and the
proposed ISP MBG techniques.
4.1.5 Security
The Security design has a great concern in Mobile IP. In ISP MBG technique Mobile IP Border
Gateway (MBG) is used to keep the information (Home address or binding information) for all
Mobile Nodes roaming from one network to another so there will be no need for any
Correspondent Node (CN) to maintain any private information for the new IP network where
the Mobile Node is visiting . Comparatively, the conventional Mobile IP technique needs high
level of security to prevent the malicious users from intercepting the connection between the
MN and the CN which maintains the binding information (Ha, CoA). Further study will be
conducted in the future to Study the comparison between Security level in both the
conventional and the proposed ISP MBG techniques .
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
74
4.2 Performance Comparison Between The Conventional Mobile IP Technique
And the Proposed ISP MBG Technique Based Different IP Structures
Table1 summarize the performance comparison between the conventional Mobile IP technique
and the proposed ISP MBG techniques for different ISP structures respectively.
Table1. Comparative Parameters for the Conventional and the Proposed ISP MBG Techniques
[Different ISPs structures]
Technique
Parameters
ISP MBG
Technique
Conventional Mobile IP
Technique
Link Distance Shorter Link distance Longer link distance
Transmission Time Lower transmission time Higher transmission time
Blocking lower rate of blocking Higher rate of blocking
Buffering - Less buffering storages
- Lower cost
- More buffering storages
- Higher cost
Security Higher level of security Lower level of security
5. CONCLUSION AND FUTURE WORK
In this paper, a further study on the ISP MBG Route Optimization Technique has been
introduced to check the performance evaluation of the technique when two different ISPs
structures are used. The design and the sequence of operation for ISP MBG technique are
reviewed in this paper .The implementation of the case study for two different ISPs structures
is also detailed in this paper .
For different ISPs structures, the simulated network design of our case study is based on using
two different Internet Service Providers structure separated by one Mobile IP border gateway.
One ISP is composed of one Area, 2 Zones and 4 PoPs serving each Zone. Another ISP is
composed of 2 Areas, each has 3 Zones and 3 PoPs serving each Zone. Each PoP is serving 100
nodes with a range of 150 addresses. The simulation results for the Link Distance, Transmission
Time ,Blocking, Buffering, and Security show that the proposed (ISP MBG) technique still
outperforms the conventional Mobile IP technique.
This work can be extended to include investigation of using multiple ISPs and multiple MBGs.
In that case the MBG is not only restricted to hold the home information for the nodes crossing
their local ISP, or to guide in establishing the route to the MN located in an external ISP, but
rather the investigated subjects in that areas are continuing enhance the functionalities of MBG
to do more advanced tasks. Such tasks include, tunneling, conditional Processes for the route
optimization, and others.Moreover, using multiple MBGs will distribute the processing load
among the MBGs.
REFERENCE
1. Abbas Jamalipour, ( 2003) “The Wireless Mobile Internet”, John Wiley & Sons Ltd., England.
2. Philip J. and Nesser II, (2001) “Survey of IPV4 Addresses in Currently Deployed IETF standards”,
Internet-drafts, draft-ietf-ngtrans-ipv4 survey-01.text, work on progress.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
75
3. Sherif kamel Hussein, Khaled Mohamed Almustafa, “Triangle Routing Problem in Mobile IP”,
Journal of Communication and Computer , David Publishing ,JCC-E20140114-3 USA,2014.
4. Ramesh Bharti, Vishnu Kumar Sharma, Navneet, Aman Gupta4, (2013) ”A P2P Based Route
Optimization Architecture for Mobile IP Based on Simulation Work”, International Journal of
Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO
9001:2008 Certified Journal, Volume 3, Issue 2.
5. Sherif Kamel Hussein, (2012) "Extended Study on ISP MBG Route Optimization Technique in
Conventional Mobile IP 4 ", IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661
Volume 3, Issue 6 (Sep-Oct. 2012), PP 20-35 ww.iosrjournals.org.
6. Rajesh Singh Thakur, Babita Kubde, (2013)” Implementation of Route Optimization Mobile IP to
Analyze the TCP Performance during Handoff”, International Journal of Science and Research
(IJSR), India Online ISSN: 2319-7064,Volume 2 Issue 1.
7. Hero Modares, Amirhossein Moravejosharieh, Rosli Salleh, (2013) “ Secure Connection in Mobile
IPv6” Life Science Journal.
8. Susanna S Henry, Dr. V. Santhosh Kumar, (2012) ”Current status of Mobile Internet Protocol
Version 4 and its security Issues “,IJCSI International Journal of Computer Science Issues, Vol. 9,
Issue 2, No 2,.
9. www.Cisco.comgoLogistics
AUTHORS
Sherif kamel Hussein Hassan Ratib : Graduated from the faculty of engineering in 1989
Communications and Electronics Department ,Helwan University. He received his
Diploma MSc,and Doctorate in Computer Science ,Major Information Technology and
Networking. He has been working in many private and governmental universities inside
and outside Egypt for almost 13 years .He shared in the development of many industrial
courses .His research interest is GSM Based Control and Macro mobility based on Mobile
IP .

More Related Content

What's hot

Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
Pavan Kumar Sindgi
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
priya Nithya
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
Kathirvel Ayyaswamy
 
Paper jet vol 1 2737 7652-1-pb
Paper jet vol 1 2737 7652-1-pbPaper jet vol 1 2737 7652-1-pb
Paper jet vol 1 2737 7652-1-pb
nur hayati
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocol
Gaurav Dwivedi
 
IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit II
pkaviya
 
Mobile IP
Mobile IPMobile IP
Mobile IP
Mukesh Chinta
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
Rahul Hada
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ip
IJCNCJournal
 
Mobile IP 2
Mobile IP 2Mobile IP 2
Mobile IP 2
NULL CREATION
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
Ramesh Babu
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
SaranyaK68
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
NULL CREATION
 
Mobile computing
Mobile computingMobile computing
Mobile computing
SaranyaK68
 
Implementation of Cellular IP and Its Performance Analysis
Implementation of Cellular IP and Its Performance AnalysisImplementation of Cellular IP and Its Performance Analysis
Implementation of Cellular IP and Its Performance Analysis
IOSR Journals
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
Mobile network layer
Mobile network layerMobile network layer
Mobile network layer
Vikram Nandini
 
Unit 3
Unit 3Unit 3
4 lte access transport network dimensioning issue 1.02
4 lte access transport network dimensioning issue 1.024 lte access transport network dimensioning issue 1.02
4 lte access transport network dimensioning issue 1.02
saeed_sh65
 
Performance Model of Key Points At the IPTV Networks
Performance Model of Key Points At the IPTV NetworksPerformance Model of Key Points At the IPTV Networks
Performance Model of Key Points At the IPTV Networks
CSCJournals
 

What's hot (20)

Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Paper jet vol 1 2737 7652-1-pb
Paper jet vol 1 2737 7652-1-pbPaper jet vol 1 2737 7652-1-pb
Paper jet vol 1 2737 7652-1-pb
 
mobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocolmobile ip, Mobile COmmunication Internet Protocol
mobile ip, Mobile COmmunication Internet Protocol
 
IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit II
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ip
 
Mobile IP 2
Mobile IP 2Mobile IP 2
Mobile IP 2
 
Mobile computing unit-5
Mobile computing unit-5Mobile computing unit-5
Mobile computing unit-5
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Implementation of Cellular IP and Its Performance Analysis
Implementation of Cellular IP and Its Performance AnalysisImplementation of Cellular IP and Its Performance Analysis
Implementation of Cellular IP and Its Performance Analysis
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobile network layer
Mobile network layerMobile network layer
Mobile network layer
 
Unit 3
Unit 3Unit 3
Unit 3
 
4 lte access transport network dimensioning issue 1.02
4 lte access transport network dimensioning issue 1.024 lte access transport network dimensioning issue 1.02
4 lte access transport network dimensioning issue 1.02
 
Performance Model of Key Points At the IPTV Networks
Performance Model of Key Points At the IPTV NetworksPerformance Model of Key Points At the IPTV Networks
Performance Model of Key Points At the IPTV Networks
 

Viewers also liked

Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...
IJCNCJournal
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
IJCNCJournal
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
IJCNCJournal
 
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rswReal time audio translation module between iax and rsw
Real time audio translation module between iax and rsw
IJCNCJournal
 
A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...
IJCNCJournal
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified golden
IJCNCJournal
 
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
IJCNCJournal
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
IJCNCJournal
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
IJCNCJournal
 
Pwm technique to overcome the effect of
Pwm technique to overcome the effect ofPwm technique to overcome the effect of
Pwm technique to overcome the effect of
IJCNCJournal
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdns
IJCNCJournal
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
IJCNCJournal
 
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IJCNCJournal
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
IJCNCJournal
 
Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...
IJCNCJournal
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocol
IJCNCJournal
 
A comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesA comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemes
IJCNCJournal
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
IJCNCJournal
 
Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...
IJCNCJournal
 

Viewers also liked (19)

Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
 
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rswReal time audio translation module between iax and rsw
Real time audio translation module between iax and rsw
 
A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified golden
 
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
Pwm technique to overcome the effect of
Pwm technique to overcome the effect ofPwm technique to overcome the effect of
Pwm technique to overcome the effect of
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdns
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
 
Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocol
 
A comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesA comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemes
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...
 

Similar to Internet service provider mobile

A Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IPA Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
Martha Brown
 
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
IOSR Journals
 
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
IJCSIS Research Publications
 
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
IOSR Journals
 
ACN.pptx
ACN.pptxACN.pptx
ACN.pptx
SrinivaS K
 
Speed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lanSpeed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless laniaemedu
 
Speed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessSpeed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessiaemedu
 
OSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdfOSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdf
KOLOYOYO
 
50120140505003
5012014050500350120140505003
50120140505003
IAEME Publication
 
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
cscpconf
 
Comparision study of MobileIPv4 and MobileIPv6
Comparision study of MobileIPv4 and MobileIPv6Comparision study of MobileIPv4 and MobileIPv6
Comparision study of MobileIPv4 and MobileIPv6
rahulmonikasharma
 
Comparision study of MobileIPv4 and MobileIPv6
Comparision study of MobileIPv4 and MobileIPv6Comparision study of MobileIPv4 and MobileIPv6
Comparision study of MobileIPv4 and MobileIPv6
rahulmonikasharma
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
IJCNCJournal
 
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IPPERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
IJNSA Journal
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangAnil Nembang
 
Multi Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless SystemsMulti Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless Systems
Chaitanya Krishna
 
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
nooriasukmaningtyas
 
Zigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for iotZigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for iot
eSAT Publishing House
 

Similar to Internet service provider mobile (20)

A Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IPA Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
 
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
 
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
Route Optimization in MIPv6 Experimental Test bed for Network Mobility: Trade...
 
A01230105
A01230105A01230105
A01230105
 
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
 
ACN.pptx
ACN.pptxACN.pptx
ACN.pptx
 
Speed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lanSpeed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lan
 
Speed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessSpeed adaptive mobile ip over wireless
Speed adaptive mobile ip over wireless
 
OSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdfOSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdf
 
50120140505003
5012014050500350120140505003
50120140505003
 
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
BULK BINDING UPDATE PROCEDURE FOR PMIPV6 BASED INTELLIGENT TRANSPORTATION SYS...
 
Comparision study of MobileIPv4 and MobileIPv6
Comparision study of MobileIPv4 and MobileIPv6Comparision study of MobileIPv4 and MobileIPv6
Comparision study of MobileIPv4 and MobileIPv6
 
Comparision study of MobileIPv4 and MobileIPv6
Comparision study of MobileIPv4 and MobileIPv6Comparision study of MobileIPv4 and MobileIPv6
Comparision study of MobileIPv4 and MobileIPv6
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IPPERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
PERFORMANCE EVALUATION OF A NEW ROUTE OPTIMIZATION TECHNIQUE FOR MOBILE IP
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
 
Report
ReportReport
Report
 
Multi Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless SystemsMulti Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless Systems
 
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
 
Zigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for iotZigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for iot
 

More from IJCNCJournal

Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 

More from IJCNCJournal (20)

Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Internet service provider mobile

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 DOI : 10.5121/ijcnc.2014.6406 65 INTERNET SERVICE PROVIDER-MOBILE BORDER GATEWAY ROUTE OPTIMIZATION TECHNIQUE IN MOBILE IP BASED ON DIFFERENT ISPS STRUCTURES (ISP-MBG) Sherif Kamel Hussein Department of Communications and Electronics October University for Modern Sciences and Arts Giza - Egypt ABSTRACT Due to the proliferation in the number of users that are accessing the internet and due to the increase in the number of the electronic devices that support mobility like mobiles, laptops and many others that definitely lead to the need of a protocol that supports a mobility. Mobile Internet Protocol is a recommended Internet protocol designed to support the mobility of a user (host). This protocol provides a continuous connectivity for any mobile host . In the traditional Mobile IP all packets forwarded to the Mobile host from the correspondent node will be forwarded via the Home Agent (HA) and that leads to the triangle routing problem . (ISP MBG) technique is used as a route optimization technique for solving the triangle routing problem in conventional Mobile IPv4. This technique has been implemented on .net platform .The study of this technique was discussed before using 2 similar Internet Service Providers and the simulation results provided a better performance compared with the Conventional Mobile IP Technique. In this paper the simulator will be used to study the performance of the (ISP MBG) technique using two different Internet Service Providers ( ISPs) structures separated by a single Mobile Border Gateway ( MBG).Simulation results shows also a better performance compared with the conventional Mobile IP technique . KEYWORDS Internet Service Provider, Point of Presence, Mobile IP Border Gateway, PoPs Virtual Mobile IP Network. 1. INTRODUCTION Mobile IP is an open standard protocol defined by the Internet Engineering Task Force (IETF) RFC 2002. That allows users to keep the same IP address, stay connected, and maintain ongoing applications while roaming or travelling between networks. The operation of Mobile IP protocol is based on three main functions ,Agent Discovery , Registration and Tunneling [1]. The main problem of Mobile IP is the triangle routing problem in which all the traffics sent by the Correspondent node (CN) to Mobile Node (MN) will be intercepted by the Home Agent (HA) which is a main router serving the home network for the Mobile Node .Home Agent will tunnel the transmitted packets to the Foreign Agent (FA) which is a router serving the foreign
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 66 network where the mobile node is located .The Foreign Agent then de- tunnels the received packets and forward the packets finally to the Care of Address (CoA) of the Mobile Node on the foreign Network [2]. The route taken by the transmitted packets from the Mobile Node to the Correspondent Node is Triangular in nature which definitely leads to an increase in the delay time and also decrease in network throughput. Internet Service Provider Mobile Border Gate Way ( ISP MBG) is a route optimization technique based on using multiple Internet Service Providers (ISPs) separated by a multiple Mobile Border Gateways (MBGs). This technique has been studied and discussed before based on using two similar Internet Service Providers structures and the simulation results showed a better performance compared with the conventional Mobile IP technique . In This paper the technique will be studied based on using two different Internet Service Providers Structures[3-4]. The paper is divided into five sections. The second section: introduces the route optimization technique Internet Service Providers Mobile Border Gateway (ISP MBG) for two similar ISP structures . The third section: presents the implementation of ISP MBG technique based on two different ISPSs Structures . Section 4: introduces the evaluation and the simulation results for the proposed ISP MBG technique compared with conventional Mobile IP technique. Conclusion and future work are presented in section 5. 2. INTERNET SERVICE PROVIDER MOBILE BORDER GATEWAY TECHNIQUE [5] The design is composed of a number of N Internet Service Providers ISP1, ISP2,…….., ISPN, each covers a definite and different geographical place. They are separated by an L Mobile IP Border Gateways (MBGs) .Each ISP is serving S equal Areas. Each Area is divided into M Zones and each Zone is served by K number of Points of Presence nodes (PoPs).Each PoP is serving X number of nodes with a range W of Addresses. The nodes are classified as either Local Nodes or Foreign Nodes based on whether they are located in the same Agent or in different Agents. Each Area is served by an Agent which is considered as a Home Agent for the local nodes inside the Area or as a Foreign Agent for the nodes located outside the Area .For each Internet Service Provider there are K PoPs Virtual Networks (PVNs) which handle the state information for all Mobile Nodes and Correspondent Nodes. Figure 1 show the structure for a given ISP . Figure 2 show an example of PoPs Virtual Networks (PVNs) for a given ISP. Figure 1. Structure For a Given ISP ISP Area 1 (Agent Area 2 (Agent Area S-1 (Agent S- Area S (Agent Zone Zone 2 Zone M- Zone PoP 1 PoP PoP K- PoP
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 67 PVNi ∀i∈1..k PoPi(Area1,Zone1), PoPi (Area1,Zone2),…, PoPi (Area1, ZoneM), PoPi (Area2,Zone1), PoPi (Area2,Zone2), …., PoPi (Area2,ZoneM),….., PoPi (Areas ,Zone1), PoPi (AreaS,Zone2)……. PoPi (AreaS,ZoneM). Figure 2. PoPs Vitual Network for a Given ISP ISP MBG technique is supporting both the tunneling and routing techniques.MBG will either maintain the binding information (Home address, Care-of-Address) or only the home information based on whether the ISP MBG technique is using tunneling or routing technique in forwarding the packets between the Correspondent Nodes and the Mobile Nodes [5-6]. 2.1 ISP MBG Technique Operation Sequence When a connection is to be started between two nodes the Correspondent Node and Mobile Node , the execution of the ISP MBG technique will be started by checking the location of both nodes.If both nodes are located in the same Internet Service Provider (ISP) so the Correspondent Node will start asking for an information about the Mobile Node by connecting first to its nearest home PoP. That PoP will search its neighboring PoPs through the PoP Vitual networks. One of these PoPs should have an information about the Mobile Node and the connection will be started. In case if both MN and CN are in different ISPs, the same sequence will be taken but the only difference is that the PoP that is connected to the MN through the PoP virtual network (PVN) will connect to Mobile Border Gateway (MBG) which maintains the original home information for the destined MN.MBG will then connect to the nearest PoP in the destination ISP which is connected to a new virtual Network of the Mobile Node and then the connection will be started directly between the Correspondent Node (CN) and the Mobile Node (MN).Figure 3 shows the operation sequence for ISP MBG technique in both cases . In case 1 both MN and CN are in the same Agent but in case 2 both MN and CN are in different Agents [5-6]. Figure 3. Operation Sequence for the Proposed Technique Agent1 PoP1 PoP2 PoP - PoP PoP1 PoP2 PoP - PoP1 PoP2 PoP - PoP1 PoP2 PoP - PoP PoP1 PoP2 PoP - PoP1 PoP2 PoP - Agent2 Area 1 Area 2 MBG Home information for the transferred MN (Agent, Area, Zone, PoP) MN1 MN2 CN PVN 1.c 2.e 2.d 2.a 1.a 2.b 1.b 2.c
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 68 2.2 ISP MBG System Parameters The key point to establish any System is to define the system parameters .System Parameters include the simulation parameters , data structures, and the connection parameters. Simulation parameters are related to the system construction and defined by the number of ISPs, MBGs, Areas, Zones, PoPs, and the in service or in waiting nodes covered by each PoP .The main data structures used in the simulation are Nodes, POPs, Areas, Agents, and Mobile IP Border Gateway (MBG). All the data structures are implemented in C sharp on a microsoft.net platform [5-6].Finally the connection parameters are the parameters required for the design and the implementation of the ISP MBG algorithm and are classified as follows: 1. The distance in km equivalent to the distance of 1 pixel. 2. Link speed for PoP connection 3. Link speed for Agents connection 4. PoP nodes count to serve. 5. PoP nodes count to wait 6. Agent nodes count to serve 7. Agent nodes count to wait 3. IMPLEMENTATION OF ISP MBG TECHNIQUE BASED DIFFERENT ISPS STRUCTURES. The Implementation of the ISP MBG technique is based on two different ISPs Structures. The first ISP is serving only one Area with 2 Zones and 4 PoPs per Zone. The second ISP is serving 2 similar Areas with 3 Zones each, and 3 PoPs for every Zone. Each PoP is actually serving 100 nodes with 150 addresses as shown in figure 4. The addresses are classified as 100 addresses available for the nodes in service and the remaining 50 Addresses for the nodes that are in the waiting state.For the nodes in service we can split the addresses into 75 addresses for local generating nodes and 25 addresses for external nodes. In a similar way the waiting nodes addresses are divided equally between the local and the external generating nodes. The number of nodes used in the simulation is about 2000 Nodes. Figure 5 shows the design architecture of the proposed ISP MBG technique based different IPSs structures. Figure 4. Nodes and Address Classifications for PoPi PoP i N1 N75 N76 N100 N101 N125 N126 N150 1-------75 Locally in services 76-----100 Locally in waiting 101-----125 Externally in services 126-----150 Externally in waiting
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 69 ∑ ∈∀ .....im The total number of PoPs can be calculated by the following equation: PN = Pik X Niz (1) Where; PN is the total number of PoPs Pik is the number of PoPs within the zone in Internet Service Provider k Ni is the total number of Zones in Internet Service Provider i Also the Applicable total number of generating nodes can be calculated from the given equation. NT = PN x NC (2) Where; NT is the total number of generating nodes NC is the total number of generating nodes in each connection. Figure 5. System Construction P3P2P1 P3P2P1 P3P2P1 Zone 1 Zone 2 Zone 3 Area 1 P3P2P1 P3P2P1 P3P2P1 Zone 1 Zone 2 Zone 3 Area 2 ISP 2 P2P1 P3 P4 MBG Zone 1 P2P1 P3 P4 Zone 2 Area1 ISP 1
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 70 ∑ − + ∈∀ 1 1 ..... ),( zi mm m PPD ∑ − + ∈∀ 1 1 ..... ),( Z m mm im L PPD 4. EVALUATION OF THE ISP MBG TECHNIQUE To evaluate the performance of the proposed ISP MBG technique, the following five measuring criteria are required: Link Distance, Transmission Time, Blocking, Buffering and Security.Link distance will be calculated based on the distance between two connecting nodes and it is calculated in kilometer equivalent to the number of pixel (1 pixel =0.2 Km).The Link distance is calculated using the following equation: Dt (Pi, Pz) = (3) Where; P: Transmission point (PoP or MBG) D: Euclidian distance Dt: Total link distance between two transmission points The transmission time will be calculated based on the location of both nodes, the Mobile Node (MN) and the Correspondent Node (CN) and whether both are located in the same area, same Internet Service Provider or either one in different areas or different Internet Service Providers. the transmission time will be calculated using the following equation: T (Pi, Pz) = (4) Where; P: Transmission point (PoP or MBG) T (Pi, Pz):Total transmission time between two points Pi and Pz L: Link speed D: Euclidian distance Blocking will be calculated as the number of blocked connections and that will define the network throughput taking into consideration that each connection has 2 nodes. Buffering is considered as one of the network resources that must be optimally used. In conventional Mobile IP buffering is based mainly on the storage buffers of the Agents whatever Home or foreign Agent but in the proposed technique mainly is based on the PoPs storage Buffers and the PoPs virtual Networks. Security is an important performance parameter to measure how much the data and the information are secured while travelling from one network to another. Further study for the performance of the proposed technique will be used to measure the evaluation for both the buffering and the security parameters [7-8]. 4.1 Simulation Results for the case of 2 different ISPs structures For the case where two different ISPs are used, the first ISP consists of one Area of two Zones and four PoPs per Zone, and the second ISP consists of two Areas ,each with three Zones and three PoPs per Zones, the algorithm is applied for a range of 2000 Nodes The comparison graphs will be detailed in the following subsections .
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 71 4.1.1 Simulation Results for Link distance (a) Total Link Distance for the Conventional and the ISP MBG Techniques Average Link Distance Per Connection (2 Different ISPs - 1st with 1 Area of 2 Zones and 4 PoPs, 2nd with 2 Areas of 3 Zones and 3 PoPs) 0 200 400 600 800 1000 1200 600 700 800 90010001100120013001400150016001700180019002000 #of Connections Distanc(km) ISP MBG Link Distance Per Conection Conventional Mobile IP link Distance Per Connection (b) Average Link Distance for the Conventional and the ISP MBG Techniques Figure 6. Link Distance Comparison Form figures (6.a) and (6.b) we can see that, when different ISPs with different configurations are connected to each other, the performance of the new technique still outperforms the conventional techniques.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 72 4.1.2 Simulation Results for Transmission Time Total Transmission Time Comparison (2 Different ISPs - 1st with 1 Area of 2 Zones and 4PoPs, 2nd with 2 Areas of 3 Zones and 3 PoPs) 0 1000 2000 3000 4000 5000 6000 7000 8000 600 700 800 90010001100120013001400150016001700180019002000 #of Connections TotalTransmission Time(sec) ISP MBG Total Transmission Time Conventional Mobile IP Yotal Transmission Time (a) Total Transmission Time for the Conventional and the ISP MBG Techniques Average Transmission Time Per Connection (2 Different ISPs - 1st with 1 Area of 2 Zones and 4 PoPs, 2nd with 2 Areas of 3 Zones and 3 PoPs) 0 5 10 15 600 700 800 90010001100120013001400150016001700180019002000 #of Connections Transmissio nTime(sec) ISP MBG Transmission Timr Per Connection Conventional Mobile IP Transmission Time Per Connection (b) Average Transmission Time for the Conventional and the ISP MBG Techniques Figure 7. Transmission Time Comparison Figures (7.a) and (7.b) show that the same argument applies when comparing the transmission time performance and the results for the link distance simulation, the new technique outperforms the conventional technique in the transmission time .
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 73 4.1.3 Simulation Results for Throughput Throughput Comaprison (2 Different ISPs - 1st with 1 Area of 2 Zones and 4 PoPs, 2nd with 2 Areas of 3 Zones and 3 PoPs) 0 5 10 15 20 300 375 450 525 600 675 750 825 900 975 #of Connections BlockedConnections ISP MBG Blocking Conventional Mobile IP Blocking Figure 8. Throughput Comparison Figure 8 shows the throughput performance of the new techniques is still better than the conventional techniques, similar to the case of same ISPs. 4.1.4 Buffering Concerning Buffering; it has been found that the ISP MBG technique provides better buffering than the Conventional Mobile IP technique. Using PVN is facilitating the process of accessing the home information for any mobile nodes roaming between networks . Because of PVN provides a virtual network among PoPs , the home information of Mobile Node could be accessed without any redundancy of having multiple copies at each PoP .Comparatively in the conventional Mobile IP technique the Home Agent Buffer should maintain the home information for each node travelled to a foreign network and that definitely lead to the need of high buffering size. On the other side it has been found that the cost for the Agent's buffers is higher than that of the PoP's buffers [9].Further study will be conducted in the future to elaborate in more details the comparison between buffering in both the conventional and the proposed ISP MBG techniques. 4.1.5 Security The Security design has a great concern in Mobile IP. In ISP MBG technique Mobile IP Border Gateway (MBG) is used to keep the information (Home address or binding information) for all Mobile Nodes roaming from one network to another so there will be no need for any Correspondent Node (CN) to maintain any private information for the new IP network where the Mobile Node is visiting . Comparatively, the conventional Mobile IP technique needs high level of security to prevent the malicious users from intercepting the connection between the MN and the CN which maintains the binding information (Ha, CoA). Further study will be conducted in the future to Study the comparison between Security level in both the conventional and the proposed ISP MBG techniques .
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 74 4.2 Performance Comparison Between The Conventional Mobile IP Technique And the Proposed ISP MBG Technique Based Different IP Structures Table1 summarize the performance comparison between the conventional Mobile IP technique and the proposed ISP MBG techniques for different ISP structures respectively. Table1. Comparative Parameters for the Conventional and the Proposed ISP MBG Techniques [Different ISPs structures] Technique Parameters ISP MBG Technique Conventional Mobile IP Technique Link Distance Shorter Link distance Longer link distance Transmission Time Lower transmission time Higher transmission time Blocking lower rate of blocking Higher rate of blocking Buffering - Less buffering storages - Lower cost - More buffering storages - Higher cost Security Higher level of security Lower level of security 5. CONCLUSION AND FUTURE WORK In this paper, a further study on the ISP MBG Route Optimization Technique has been introduced to check the performance evaluation of the technique when two different ISPs structures are used. The design and the sequence of operation for ISP MBG technique are reviewed in this paper .The implementation of the case study for two different ISPs structures is also detailed in this paper . For different ISPs structures, the simulated network design of our case study is based on using two different Internet Service Providers structure separated by one Mobile IP border gateway. One ISP is composed of one Area, 2 Zones and 4 PoPs serving each Zone. Another ISP is composed of 2 Areas, each has 3 Zones and 3 PoPs serving each Zone. Each PoP is serving 100 nodes with a range of 150 addresses. The simulation results for the Link Distance, Transmission Time ,Blocking, Buffering, and Security show that the proposed (ISP MBG) technique still outperforms the conventional Mobile IP technique. This work can be extended to include investigation of using multiple ISPs and multiple MBGs. In that case the MBG is not only restricted to hold the home information for the nodes crossing their local ISP, or to guide in establishing the route to the MN located in an external ISP, but rather the investigated subjects in that areas are continuing enhance the functionalities of MBG to do more advanced tasks. Such tasks include, tunneling, conditional Processes for the route optimization, and others.Moreover, using multiple MBGs will distribute the processing load among the MBGs. REFERENCE 1. Abbas Jamalipour, ( 2003) “The Wireless Mobile Internet”, John Wiley & Sons Ltd., England. 2. Philip J. and Nesser II, (2001) “Survey of IPV4 Addresses in Currently Deployed IETF standards”, Internet-drafts, draft-ietf-ngtrans-ipv4 survey-01.text, work on progress.
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 75 3. Sherif kamel Hussein, Khaled Mohamed Almustafa, “Triangle Routing Problem in Mobile IP”, Journal of Communication and Computer , David Publishing ,JCC-E20140114-3 USA,2014. 4. Ramesh Bharti, Vishnu Kumar Sharma, Navneet, Aman Gupta4, (2013) ”A P2P Based Route Optimization Architecture for Mobile IP Based on Simulation Work”, International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 2. 5. Sherif Kamel Hussein, (2012) "Extended Study on ISP MBG Route Optimization Technique in Conventional Mobile IP 4 ", IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 6 (Sep-Oct. 2012), PP 20-35 ww.iosrjournals.org. 6. Rajesh Singh Thakur, Babita Kubde, (2013)” Implementation of Route Optimization Mobile IP to Analyze the TCP Performance during Handoff”, International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064,Volume 2 Issue 1. 7. Hero Modares, Amirhossein Moravejosharieh, Rosli Salleh, (2013) “ Secure Connection in Mobile IPv6” Life Science Journal. 8. Susanna S Henry, Dr. V. Santhosh Kumar, (2012) ”Current status of Mobile Internet Protocol Version 4 and its security Issues “,IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 2,. 9. www.Cisco.comgoLogistics AUTHORS Sherif kamel Hussein Hassan Ratib : Graduated from the faculty of engineering in 1989 Communications and Electronics Department ,Helwan University. He received his Diploma MSc,and Doctorate in Computer Science ,Major Information Technology and Networking. He has been working in many private and governmental universities inside and outside Egypt for almost 13 years .He shared in the development of many industrial courses .His research interest is GSM Based Control and Macro mobility based on Mobile IP .