This document summarizes research on simulating and modeling mobile computing protocols. It discusses issues like address binding, network infrastructure for mobility, and TCP connection management in mobile environments. It then reviews several papers that use simulation to evaluate performance of mobile protocols. One paper models handoff management algorithms in urban areas. Another compares the performance of Mobile IP and a multicast-based approach. A third evaluates Mobile IP and Route Optimization Mobile IP in wireless networks. The document concludes with discussing analytical modeling of mobility in cellular networks.
Edwin Hernandez Presentation for Local Computer Networks n 2004Dr. Edwin Hernandez
This document discusses predictive mobile IP to improve performance for vehicles moving at high speeds. It proposes using predictable trajectory and mobility information, network-originated handoffs, and distributed registration. It describes simulating standard mobile IP and a "ghost" predictive approach using Kalman filters to track location. The predictive method uses ghost mobile nodes and foreign agents to register ahead of time, improving handoff speed and TCP throughput by around 1.5x over standard mobile IP at speeds up to 80m/s.
This document introduces RAMON, a Rapid-Mobility Network Emulator. RAMON uses a hybrid approach of network simulation and emulation to more accurately and rapidly test mobile network protocols under conditions of high speed mobility. It connects actual wireless network hardware and uses attenuation controls to emulate speed, allowing testing of protocols without the complexity and time costs of full network simulation. RAMON provides a lower-cost alternative to simulation for studying how protocols perform under realistic high-speed mobility scenarios.
The document summarizes Edwin Hernandez's Ph.D. dissertation which proposes a network emulation testbed called RAMON to evaluate protocols for rapidly mobile environments. RAMON uses real wireless hardware and programmable attenuators to emulate node mobility and wireless signal propagation. It also introduces "ghost nodes" which use location tracking and predictive registration to improve the performance of Mobile IP handoffs for high-speed mobility. Experimental results using RAMON show that a predictive "Ghost Mobile IP" approach can improve TCP throughput by 50-100% compared to standard reactive Mobile IP.
This document provides instructions for using RAMON, a network emulator with multiple PCs and embedded computers. It describes the IP addressing of the emulator machine and embedded devices. It also provides information on required software, usernames/passwords, and example emulation scripts to simulate network conditions between different nodes.
Mobility Management Approaches for Mobile IP NetworksWSO2
This document compares different approaches for mobile IP networks, including Mobile IP (MIP), Hierarchical Mobile IP (HMIP), Hierarchical Distributed Dynamic Mobile IP (HDDMIP), and Dynamic Hierarchical Mobile IP (DHMIP). It also discusses multicast-based approaches like Multicast Hierarchical Mobile IP (MHMIP). An analysis shows that MHMIP provides the best performance for mean handoff delay and mean bandwidth per call for high mobility terminals. It is recommended to use MHMIP for most cases, but to use DHMIP if inter-gateway foreign agent handoffs are frequent or the number of links in the MHMIP path is high.
Throughput Performance Analysis VOIP over LTEiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Mobile IP allows mobile nodes to change their point of attachment between IP networks while maintaining ongoing connections. It defines entities like mobile nodes, home agents, and foreign agents to facilitate IP packet delivery to the mobile node's current location. The key operations in Mobile IP are agent discovery, registration of the mobile node's new location with its home agent, and tunneling of packets from the home agent to the foreign agent or mobile node's care-of address.
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
Edwin Hernandez Presentation for Local Computer Networks n 2004Dr. Edwin Hernandez
This document discusses predictive mobile IP to improve performance for vehicles moving at high speeds. It proposes using predictable trajectory and mobility information, network-originated handoffs, and distributed registration. It describes simulating standard mobile IP and a "ghost" predictive approach using Kalman filters to track location. The predictive method uses ghost mobile nodes and foreign agents to register ahead of time, improving handoff speed and TCP throughput by around 1.5x over standard mobile IP at speeds up to 80m/s.
This document introduces RAMON, a Rapid-Mobility Network Emulator. RAMON uses a hybrid approach of network simulation and emulation to more accurately and rapidly test mobile network protocols under conditions of high speed mobility. It connects actual wireless network hardware and uses attenuation controls to emulate speed, allowing testing of protocols without the complexity and time costs of full network simulation. RAMON provides a lower-cost alternative to simulation for studying how protocols perform under realistic high-speed mobility scenarios.
The document summarizes Edwin Hernandez's Ph.D. dissertation which proposes a network emulation testbed called RAMON to evaluate protocols for rapidly mobile environments. RAMON uses real wireless hardware and programmable attenuators to emulate node mobility and wireless signal propagation. It also introduces "ghost nodes" which use location tracking and predictive registration to improve the performance of Mobile IP handoffs for high-speed mobility. Experimental results using RAMON show that a predictive "Ghost Mobile IP" approach can improve TCP throughput by 50-100% compared to standard reactive Mobile IP.
This document provides instructions for using RAMON, a network emulator with multiple PCs and embedded computers. It describes the IP addressing of the emulator machine and embedded devices. It also provides information on required software, usernames/passwords, and example emulation scripts to simulate network conditions between different nodes.
Mobility Management Approaches for Mobile IP NetworksWSO2
This document compares different approaches for mobile IP networks, including Mobile IP (MIP), Hierarchical Mobile IP (HMIP), Hierarchical Distributed Dynamic Mobile IP (HDDMIP), and Dynamic Hierarchical Mobile IP (DHMIP). It also discusses multicast-based approaches like Multicast Hierarchical Mobile IP (MHMIP). An analysis shows that MHMIP provides the best performance for mean handoff delay and mean bandwidth per call for high mobility terminals. It is recommended to use MHMIP for most cases, but to use DHMIP if inter-gateway foreign agent handoffs are frequent or the number of links in the MHMIP path is high.
Throughput Performance Analysis VOIP over LTEiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Mobile IP allows mobile nodes to change their point of attachment between IP networks while maintaining ongoing connections. It defines entities like mobile nodes, home agents, and foreign agents to facilitate IP packet delivery to the mobile node's current location. The key operations in Mobile IP are agent discovery, registration of the mobile node's new location with its home agent, and tunneling of packets from the home agent to the foreign agent or mobile node's care-of address.
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
The document discusses Mobile IP, which allows mobile devices to change their point of connection to the internet without changing their IP address. It describes key concepts like the home agent, foreign agent, care-of address, and registration process. Mobile IP addresses issues like triangular routing and proposes optimizations like reverse tunneling to improve efficiency when a mobile node changes locations.
The document discusses modeling a 4G LTE system in MATLAB. It provides an overview of 4G LTE standards and features, and presents a case study of modeling the downlink physical layer of an LTE system in MATLAB. Key aspects covered include channel coding, OFDM, MIMO, link adaptation, and options for simulation acceleration and connecting system design to implementation through code generation.
Mobile Network Layer protocols and mechanisms allow nodes to change their point of attachment to different networks while maintaining ongoing communication. Key concepts include:
- Mobile IP adds mobility support to IP, allowing nodes to use the same IP address even when changing networks. It relies on home agents and care-of addresses.
- Registration allows mobile nodes to inform their home agent of their current location when visiting foreign networks. Tunneling and encapsulation techniques are used to forward packets to mobile nodes' current locations.
- Various routing protocols like DSDV have been developed for mobile ad hoc networks which have no fixed infrastructure and dynamic topologies.
This document provides an overview of Mobile IP, including its key requirements, terminology, and technical processes. Mobile IP allows devices to change networks without losing connectivity by updating their location through registration with a home agent. It aims to remain compatible with existing IP standards while providing transparency to higher-level applications and efficiency at scale. The document explains concepts such as home and foreign networks, care-of addresses, agents, registration, tunneling, and optimization techniques.
4 lte access transport network dimensioning issue 1.02saeed_sh65
The document discusses several key aspects of an LTE access transport network:
1. It describes the five major interfaces of an eNodeB including S1, X2, OM, clock, and co-transmission interfaces.
2. It explains the protocols used on the S1 and X2 interfaces including SCTP, GTP-U, and X2AP.
3. It provides an overview of the different layers - layers 1, 2, and 3 - that can be used as transport bearer networks for an LTE system and their characteristics.
This document provides an introduction to mobile computing. It defines mobile computing as using a computer while on the move, involving mobility, computing, and network connectivity. The key aspects of mobile computing are discussed, including mobile communication infrastructure, software, hardware, and devices. Common network types that enable mobile computing like WLAN, MAN, WAN, and wireless networks are also summarized. The relationship between mobile computing and wireless networking is described, with wireless networking providing the basic communication capabilities. Examples of mobile computing applications are given for various fields.
Mobile IP allows mobile nodes to change their point of attachment to the internet while maintaining ongoing communications. It includes the following key entities:
- Mobile nodes can move between home and foreign networks while keeping their IP address.
- Foreign agents provide services to visiting mobile nodes and advertise care-of addresses for tunneling packets to mobile nodes' current locations.
- The home agent maintains a location registry with mobile nodes' care-of addresses and tunnels packets to their current points of attachment when away from home.
- Dynamic Host Configuration Protocol (DHCP) can be used by mobile nodes to obtain temporary IP addresses at foreign networks to use as their care-of addresses.
This document discusses how the theoretical peak throughput of 300 Mbps for LTE systems is calculated. It provides background information on key aspects of the LTE physical layer that influence throughput calculations, including bandwidth, modulation schemes, coding rates, and duplexing methods. The document then examines the calculations for theoretical throughput for both Frequency Division Duplexing (FDD) and Time Division Duplexing (TDD) LTE systems.
IV B.Tech I Sem CSE&IT JNTUK R10 regulation students have Mobile computing paper. This slides especially contains UNIT - 5 total material required for end exams
LTE network planning and analysis tools allow for detailed modeling and prediction of network coverage metrics like RSRP, RSRQ, and RS-SINR. Multiple antenna configurations including MIMO can be modeled to increase coverage and throughput while reducing interference. Monte Carlo traffic simulations statistically model user distribution and traffic to predict cell capacity. The network planning process in Cellular Expert involves preparing project data, designing and analyzing the network through coverage predictions and traffic modeling, planning backhaul connections, and reporting/documentation.
The document discusses how to characterize and dimension user traffic in 4G networks. It describes how to define data traffic in terms of data speed and data tonnage. Data speed is the rate at which data is transferred, while data tonnage refers to the total amount of data exchanged. The document provides examples of data speed metrics used in 3GPP standards and outlines factors to consider when calculating expected data usage per subscriber based on typical mobile application usage patterns and available data plans. Dimensioning user traffic accurately is important for designing 4G networks to meet capacity demands.
Abstract— Scheduler is the backbone of intelligence in a LTE network. Scheduler will often have clashing needs that can make its design very complex and non-trivial.
The overall system throughput needs to be maintained at the best possible value without sacrificing the cell edge user experience.
In this paper, authors compared different scheduler designs for voice and packet services. They explained the role of configuration parameters through simulations. These parameters control the tradeoff between the sector throughput and the fairness in system through. They explained a possible scheduler implementation.
Mobile IP uses encapsulation and tunneling to forward data to mobile nodes. When a mobile node registers with its home agent while connected to a foreign network, the home agent intercepts datagrams for the mobile node and encapsulates them by adding a new IP header. This creates a tunnel to the mobile node's care-of address. Common encapsulation methods include IP-in-IP, minimal encapsulation, and GRE. Tunneling allows datagrams to be forwarded across networks while hiding the details of the encapsulated datagram. Loops can occur if the source IP matches the tunnel endpoint, so routers discard these datagrams.
This document discusses diagnosing LTE traffic faults through drive testing. It provides probes and indicators for issues related to insufficient resources for scheduling, coding with low values, poor coverage, abnormal receive power, and other potential problems. Diagnosis involves checking for operations and external events that could affect service rates. Specific alarms and their impacts are also listed. The document is marked as confidential information that requires permission before spreading.
This document discusses Mobile IP and key concepts related to it. Mobile IP allows mobile devices to stay connected to the internet as they move between different networks. It extends the IP protocol to make mobility transparent to applications. The key mechanisms in Mobile IP are discovering a device's care-of-address in a foreign network, registering that address with the home agent, and tunneling packets to the device's current location using that care-of-address.
This document discusses the mobile network layer and Mobile IP. It introduces key concepts like mobile nodes, home agents, foreign agents and care-of addresses. It describes the goals of mobility support in the network layer and discusses protocols and mechanisms like agent discovery, registration, tunneling, encapsulation and optimizations to Mobile IP. The document provides details on various message formats and packet headers used in Mobile IP operations.
The document discusses various parameters used in LTE drive testing including:
- RSRP, RSRQ, SINR, RSSI, CQI, PCI, BLER, and throughput which provide information on signal strength, quality, and performance. Phone-based drive testing allows monitoring of these parameters and correlation with data performance. MIMO and handovers between LTE and other technologies can also be evaluated. Key metrics include coverage, capacity, and end-user experience.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document presents an analytical model to reduce handoff latency in next generation wireless networks using Fast Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6). It first provides background on mobility support in IP networks and issues with Mobile IPv4. It then summarizes various approaches proposed in literature to minimize handoff delay, including FMIPv6, HMIPv6, seamless IP, optimized smooth handoff, and approaches to reduce latency from duplicate address detection. The document focuses on modeling the handoff latency in FMIPv6 and HMIPv6 and analyzing factors that influence latency from the link and network layers during the handoff process. It aims to determine the probability distribution of handoff latency under different traffic
A WAN (Wide Area Network) is a network that covers a broad area (i.e., any telecommunications
network that links across metropolitan, regional, national or international boundaries) using leased
telecommunication lines. Business and government entities utilize WANs to relay data among
employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of
telecommunication allows a business to effectively carry out its daily function regardless of location. The
Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and
individuals for almost any purpose imaginable.
This document provides an overview of the Evolved Packet Core (EPC) network. It discusses the background and objectives of developing the EPC. The EPC architecture includes the Mobility Management Entity (MME), Serving Gateway (SGW), Packet Data Network Gateway (PDN-GW), and Home Subscriber Server (HSS). It also describes how the EPC interconnects with 2G, 3G, and CDMA networks. Major services like data, voice, and messaging are supported. Key functions of the EPC include authentication, policy and charging control, packet routing, mobility management, and IP address allocation.
This document provides an overview of the Evolved Packet Core (EPC) network. It discusses the background and objectives of developing the EPC. The EPC architecture includes the Mobility Management Entity (MME), Serving Gateway (SGW), Packet Data Network Gateway (PDN-GW), and Home Subscriber Server (HSS). It also describes how the EPC interconnects with 2G, 3G, and CDMA networks. Major services like data, voice, and messaging are supported. Key functions of the EPC include authentication, policy and charging control, packet routing, mobility management, and IP address allocation.
The document discusses Mobile IP, which allows mobile devices to change their point of connection to the internet without changing their IP address. It describes key concepts like the home agent, foreign agent, care-of address, and registration process. Mobile IP addresses issues like triangular routing and proposes optimizations like reverse tunneling to improve efficiency when a mobile node changes locations.
The document discusses modeling a 4G LTE system in MATLAB. It provides an overview of 4G LTE standards and features, and presents a case study of modeling the downlink physical layer of an LTE system in MATLAB. Key aspects covered include channel coding, OFDM, MIMO, link adaptation, and options for simulation acceleration and connecting system design to implementation through code generation.
Mobile Network Layer protocols and mechanisms allow nodes to change their point of attachment to different networks while maintaining ongoing communication. Key concepts include:
- Mobile IP adds mobility support to IP, allowing nodes to use the same IP address even when changing networks. It relies on home agents and care-of addresses.
- Registration allows mobile nodes to inform their home agent of their current location when visiting foreign networks. Tunneling and encapsulation techniques are used to forward packets to mobile nodes' current locations.
- Various routing protocols like DSDV have been developed for mobile ad hoc networks which have no fixed infrastructure and dynamic topologies.
This document provides an overview of Mobile IP, including its key requirements, terminology, and technical processes. Mobile IP allows devices to change networks without losing connectivity by updating their location through registration with a home agent. It aims to remain compatible with existing IP standards while providing transparency to higher-level applications and efficiency at scale. The document explains concepts such as home and foreign networks, care-of addresses, agents, registration, tunneling, and optimization techniques.
4 lte access transport network dimensioning issue 1.02saeed_sh65
The document discusses several key aspects of an LTE access transport network:
1. It describes the five major interfaces of an eNodeB including S1, X2, OM, clock, and co-transmission interfaces.
2. It explains the protocols used on the S1 and X2 interfaces including SCTP, GTP-U, and X2AP.
3. It provides an overview of the different layers - layers 1, 2, and 3 - that can be used as transport bearer networks for an LTE system and their characteristics.
This document provides an introduction to mobile computing. It defines mobile computing as using a computer while on the move, involving mobility, computing, and network connectivity. The key aspects of mobile computing are discussed, including mobile communication infrastructure, software, hardware, and devices. Common network types that enable mobile computing like WLAN, MAN, WAN, and wireless networks are also summarized. The relationship between mobile computing and wireless networking is described, with wireless networking providing the basic communication capabilities. Examples of mobile computing applications are given for various fields.
Mobile IP allows mobile nodes to change their point of attachment to the internet while maintaining ongoing communications. It includes the following key entities:
- Mobile nodes can move between home and foreign networks while keeping their IP address.
- Foreign agents provide services to visiting mobile nodes and advertise care-of addresses for tunneling packets to mobile nodes' current locations.
- The home agent maintains a location registry with mobile nodes' care-of addresses and tunnels packets to their current points of attachment when away from home.
- Dynamic Host Configuration Protocol (DHCP) can be used by mobile nodes to obtain temporary IP addresses at foreign networks to use as their care-of addresses.
This document discusses how the theoretical peak throughput of 300 Mbps for LTE systems is calculated. It provides background information on key aspects of the LTE physical layer that influence throughput calculations, including bandwidth, modulation schemes, coding rates, and duplexing methods. The document then examines the calculations for theoretical throughput for both Frequency Division Duplexing (FDD) and Time Division Duplexing (TDD) LTE systems.
IV B.Tech I Sem CSE&IT JNTUK R10 regulation students have Mobile computing paper. This slides especially contains UNIT - 5 total material required for end exams
LTE network planning and analysis tools allow for detailed modeling and prediction of network coverage metrics like RSRP, RSRQ, and RS-SINR. Multiple antenna configurations including MIMO can be modeled to increase coverage and throughput while reducing interference. Monte Carlo traffic simulations statistically model user distribution and traffic to predict cell capacity. The network planning process in Cellular Expert involves preparing project data, designing and analyzing the network through coverage predictions and traffic modeling, planning backhaul connections, and reporting/documentation.
The document discusses how to characterize and dimension user traffic in 4G networks. It describes how to define data traffic in terms of data speed and data tonnage. Data speed is the rate at which data is transferred, while data tonnage refers to the total amount of data exchanged. The document provides examples of data speed metrics used in 3GPP standards and outlines factors to consider when calculating expected data usage per subscriber based on typical mobile application usage patterns and available data plans. Dimensioning user traffic accurately is important for designing 4G networks to meet capacity demands.
Abstract— Scheduler is the backbone of intelligence in a LTE network. Scheduler will often have clashing needs that can make its design very complex and non-trivial.
The overall system throughput needs to be maintained at the best possible value without sacrificing the cell edge user experience.
In this paper, authors compared different scheduler designs for voice and packet services. They explained the role of configuration parameters through simulations. These parameters control the tradeoff between the sector throughput and the fairness in system through. They explained a possible scheduler implementation.
Mobile IP uses encapsulation and tunneling to forward data to mobile nodes. When a mobile node registers with its home agent while connected to a foreign network, the home agent intercepts datagrams for the mobile node and encapsulates them by adding a new IP header. This creates a tunnel to the mobile node's care-of address. Common encapsulation methods include IP-in-IP, minimal encapsulation, and GRE. Tunneling allows datagrams to be forwarded across networks while hiding the details of the encapsulated datagram. Loops can occur if the source IP matches the tunnel endpoint, so routers discard these datagrams.
This document discusses diagnosing LTE traffic faults through drive testing. It provides probes and indicators for issues related to insufficient resources for scheduling, coding with low values, poor coverage, abnormal receive power, and other potential problems. Diagnosis involves checking for operations and external events that could affect service rates. Specific alarms and their impacts are also listed. The document is marked as confidential information that requires permission before spreading.
This document discusses Mobile IP and key concepts related to it. Mobile IP allows mobile devices to stay connected to the internet as they move between different networks. It extends the IP protocol to make mobility transparent to applications. The key mechanisms in Mobile IP are discovering a device's care-of-address in a foreign network, registering that address with the home agent, and tunneling packets to the device's current location using that care-of-address.
This document discusses the mobile network layer and Mobile IP. It introduces key concepts like mobile nodes, home agents, foreign agents and care-of addresses. It describes the goals of mobility support in the network layer and discusses protocols and mechanisms like agent discovery, registration, tunneling, encapsulation and optimizations to Mobile IP. The document provides details on various message formats and packet headers used in Mobile IP operations.
The document discusses various parameters used in LTE drive testing including:
- RSRP, RSRQ, SINR, RSSI, CQI, PCI, BLER, and throughput which provide information on signal strength, quality, and performance. Phone-based drive testing allows monitoring of these parameters and correlation with data performance. MIMO and handovers between LTE and other technologies can also be evaluated. Key metrics include coverage, capacity, and end-user experience.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
The document presents an analytical model to reduce handoff latency in next generation wireless networks using Fast Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6). It first provides background on mobility support in IP networks and issues with Mobile IPv4. It then summarizes various approaches proposed in literature to minimize handoff delay, including FMIPv6, HMIPv6, seamless IP, optimized smooth handoff, and approaches to reduce latency from duplicate address detection. The document focuses on modeling the handoff latency in FMIPv6 and HMIPv6 and analyzing factors that influence latency from the link and network layers during the handoff process. It aims to determine the probability distribution of handoff latency under different traffic
A WAN (Wide Area Network) is a network that covers a broad area (i.e., any telecommunications
network that links across metropolitan, regional, national or international boundaries) using leased
telecommunication lines. Business and government entities utilize WANs to relay data among
employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of
telecommunication allows a business to effectively carry out its daily function regardless of location. The
Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and
individuals for almost any purpose imaginable.
This document provides an overview of the Evolved Packet Core (EPC) network. It discusses the background and objectives of developing the EPC. The EPC architecture includes the Mobility Management Entity (MME), Serving Gateway (SGW), Packet Data Network Gateway (PDN-GW), and Home Subscriber Server (HSS). It also describes how the EPC interconnects with 2G, 3G, and CDMA networks. Major services like data, voice, and messaging are supported. Key functions of the EPC include authentication, policy and charging control, packet routing, mobility management, and IP address allocation.
This document provides an overview of the Evolved Packet Core (EPC) network. It discusses the background and objectives of developing the EPC. The EPC architecture includes the Mobility Management Entity (MME), Serving Gateway (SGW), Packet Data Network Gateway (PDN-GW), and Home Subscriber Server (HSS). It also describes how the EPC interconnects with 2G, 3G, and CDMA networks. Major services like data, voice, and messaging are supported. Key functions of the EPC include authentication, policy and charging control, packet routing, mobility management, and IP address allocation.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
The information and communication technologies (ICT) integrate different types of wireless communication to
provide IT-enabled services and applications. The great majority end devices are equipped with multiple network
interfaces such as Wi-Fi and 4G. Our goal is to integrate the available network interfaces and technologies to
enhance seamless communication efficiency and increase resources utilization. We proposed a heterogeneous
network management algorithm based on machine learning methods which includes roaming and sharing
functions. The roaming function provides the multiple network resources in physical and media access control
layers. The sharing function supports multiple network resources allocation and the service handover process
based on the Multi-Path TCP protocol. The simulation result also shows that the proposed scheme can increase
the network bandwidth utilization effectively. The sharing system could be used in home, mobile and vehicular
environments to realize ubiquitous social sharing networks.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
1) The document describes a machine learning-based network sharing system that uses Multipath TCP to integrate multiple network interfaces and allocate bandwidth resources for multiple users.
2) The system includes roaming and sharing functions, where roaming chooses the best network and sharing allocates resources across available networks.
3) A heterogeneous network management algorithm is proposed that monitors network status, predicts handovers between networks, and uses a machine learning approach to optimize resource utilization and load balancing across different network interfaces.
This document proposes a new telecommunications architecture that aims to simplify converged networks handling TDM and IP. It involves a modular router/protocol machine that performs telecom functions rather than using complex concurrent protocols. The machine translates between legacy and IP networks and can transfer different data streams and signaling. It uses proprietary protocols internally to efficiently process data while maintaining standards-based interfaces. This modular design allows flexibility in implementation and scale as well as supporting centralized or distributed architectures and redundancy. The core components are connected via buses and coordinated by a main system controller to implement the routing functions.
The document discusses Internet of Things (IoT) network architecture and design. It provides an overview of key aspects of IoT architecture including drivers behind new network architectures, comparing IoT architectures from ETSI and IoT World Forum, and presenting a simplified IoT architecture model. The core IoT functional stack is also explained, covering the things layer, communications network layer, and application and analytics layer. Specific protocols and technologies for each layer are described such as LoRa, CoAP, MQTT, and more.
This document provides a draft costing manual for a mobile LRIC model for the Cayman Islands. It outlines the methodology used to dimension the mobile network, including determining the required number of radio nodes, switching nodes, and transmission links based on technical assumptions around spectrum availability, traffic distribution, and capacity planning. The model is designed to take various input assumptions regarding costs, technical specifications, and usage volumes, and then calculate the incremental costs of providing mobile network services through outputs such as BU LRIC costs for different services. A case study demonstrates how the inputs flow through the model to determine incremental costs.
Abstract Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. It is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud. This document describes the various features of Fog Computing and a case study along with the actual implementation of fog computing in traffic analysis to understand how fog computing is applied to the edge environment. This document also contains the difference between the fog computing and cloud computing. Keywords— Fog Computing, Characteristics of Fog computing, Application of Fog computing, Difference between Cloud computing and Fog Computing.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
One Variable to Control Them All for Openflow (and Application in Docker Netw...DaoliCloud Ltd
"One Variable to Control Them All", a novel formulation of using Openflow, to achieve Network Virtualization, SDN, Network Function Virtualization, Service Chain QoS. An application in Docker networking is demo shown in www.daolicloud.com
This document discusses vertical handover in heterogeneous wireless networks. It begins by introducing the concept of vertical handover which allows seamless switching between different wireless technologies like 3G cellular networks and WiFi networks. It then discusses some of the challenges in managing vertical handovers, particularly achieving seamlessness and automation. Several decision strategies for vertical handover are proposed to address these challenges and achieve the goal of always providing users with the best available connection. The document goes on to describe the typical phases of the vertical handover process - information gathering, decision, and execution. It also discusses factors that influence the handover decision like network conditions, user preferences, and quality of service requirements.
This document discusses decision strategies for vertical handovers in heterogeneous wireless networks. It begins by introducing the concepts of vertical handovers and heterogeneous networks. It then discusses some key aspects of handover management including the three phase process (information gathering, decision, execution), types of handovers, and control mechanisms. Several vertical handover decision strategies are then summarized, including those based on decision functions, user-centric approaches, and multiple attribute decision making. The strategies aim to select the optimal network by evaluating different criteria like network conditions, user preferences, quality of service, and applying weighting and algorithms. The document provides an overview of recent research on improving handover decisions between different wireless technologies.
The document provides an overview of LTE (Long Term Evolution) technology and SAE (System Architecture Evolution). It discusses:
1) SAE introduces a simplified Evolved Packet Core and removes the RNC to enable a flat "all-IP" network architecture. This allows seamless integration with other wireless technologies.
2) LTE uses OFDMA for the downlink and SC-FDMA for the uplink. It supports MIMO to increase data rates. The physical layer uses orthogonal subcarrier modulation while maintaining low latency.
3) Together, LTE and SAE provide the mobile network evolution needed for next-generation networks by improving spectral efficiency, latency, and integration with other access technologies
This document provides an overview of 3G concepts including UMTS and the 3GPP standardization process. It discusses the key aspects of UMTS including its benefits over 2G technologies, the evolution of UMTS network architectures from Release 99 to Release 5, and the main network elements defined in each release. The document aims to educate readers on 3G concepts and the transition from 2G to 3G networks.
The document provides an overview of Janet Abbate's book "Inventing the Internet" which explores the history of the development of the Internet from 1959 to 1994. The book examines the social and cultural factors influencing the Internet's evolution from ARPANET to a global network. It analyzes how the Internet was shaped by collaboration and conflict between various players including government, military, computer scientists, and businesses. The author traces the technological development of the Internet and links it to organizational, social, and cultural changes during that period.
Internet of Things – Technical landscape (1).pptxEhabRushdy1
This document provides an overview of the technical landscape of the Internet of Things (IoT). It discusses the evolution of IoT concepts supported by technologies like RFID, WiFi, and NFC. It then covers the main phases of data handling in an IoT environment: data collection using short and long-range communication technologies, data transmission across networks, and data processing, management and utilization using cloud computing, service-oriented architecture, and peer-to-peer networks. The document also introduces edge computing, fog computing and their roles in IoT applications.
IRJET- Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET Journal
The document discusses efficient and secure communication in vehicular ad hoc networks (VANETs). It proposes a Cluster based reliable routing (CRR) protocol. Vehicles are clustered based on their velocity, and a Cluster Controller (CC) is elected based on transmitter heights and position to manage communication among cluster members. The CRR protocol aims to address the challenging routing issues posed by the highly dynamic topology of VANETs.
This document discusses the need for network simulation tools to test telecom network components before deployment. It describes the key requirements for building an efficient simulation tool that can accurately model a complex telecom network, including 3G and UMTS networks. Specifically, it discusses modeling internet traffic and using semi-Markovian models to generate traffic. It also covers the importance of considering physical layer factors like RF path loss and mechanisms like power control when simulating UMTS networks. The document provides details on the algorithms and architecture needed for a simulation tool to generate traffic according to specified models and evaluate network performance and capacity.
This document discusses the need for network simulation tools to test telecom network components before they are deployed. It describes the key requirements for building an efficient simulation tool that can accurately model a complex telecom network, including 3G and UMTS networks. Specifically, it discusses the need to generate realistic traffic patterns and loads, model protocols and interfaces, and consider physical layer factors like RF path loss and power control mechanisms. The document provides details on using semi-Markovian models to generate traffic according to different states and distributions. It also outlines the overall architecture of a packet load generator tool to simulate network elements and evaluate their performance under different traffic scenarios.
IRJET - A Review on Analysis of Location Management in Mobile ComputingIRJET Journal
This document reviews location management in mobile computing. It discusses various location management schemes including location updates and location queries. Static update strategies like location areas and reporting cells are described, as well as dynamic update strategies that account for user mobility and call frequency. Key components of location management systems are outlined, including base stations, base station controllers, cells, handoffs, home location registers, and location areas. Issues in location management like location registration, paging, and call delivery are also summarized. The document provides an overview of the important area of location management for tracking user locations in mobile networks.
Similar to Mobile Survey on Simulation for Networks (20)
Propuesta para la creación de un Centro de Innovación para la Refundación ...Dr. Edwin Hernandez
Propuesta para un Centro de Certificacion de Telefonos Moviles e impacto social en Startups y otros MYPIMES Propuesta creada para el Gobierno de HONDURAS.
EGLA Communications proporciona software y tecnología para la emulación inalámbrica de condiciones de red y RF percibidas por dispositivos móviles en redes 3G, 4G y 5G. Su tecnología patentada MobileCAD ha sido licenciada por grandes fabricantes de software y está disponible para licenciar. MobileCAD emula condiciones de red y RF usando servidores 1U/2U y puede interactuar con herramientas de emulación de red para simular el rendimiento de múltiples parámetros de dispositivos móviles
Next Generation Spaces for Startups, Access Control, 3D Printed Design, and access control including a business plan for 5G systems to deploy in any co-working area.
Analisis del Fraude Electoral e inyección de votos a nivel presidencial en el año 2017. Evidencia en los archivos JSON y errores en la firma electronica que permitían la inyección de votos al TREP de HONDURAS.
EGLAVATOR - Innovation, intellectual property services, and capital 2022 - 1Dr. Edwin Hernandez
Wireless Patents:
US Patent 7,213,330 . US Patent 7,697,508, US Patent 8,213,417
Startups and Ventures in Boca Raton, Florida.
NFT, BlockChain, Wireless Communications, Cloud Computing, Artificial Intelligence, Media Streaming, Hardware,
US Patents No. 10,123,074, US Patent No. 10,524,002 , US Patent No. 11,140,441
MEVIA is a personalization platform with a strong IP with 3 issued US Patents, 1 pending US Patent and 1 pending European Patent. US Patent No. 10,123,074 “Method, System, And Apparatus For Multimedia Content Delivery To Cable TV And Satellite Operators”
US Patent No. 10,524,002
US Patent No. 11,140,331
US Pat Appl. 17/493,490
Este documento proporciona consejos para mejorar las ventas digitales. Recomienda aumentar el tráfico a un sitio web a través de videos, podcasts y redes sociales que integren la marca. También sugiere optimizar el sitio para los motores de búsqueda mediante el uso de palabras clave relevantes y dominios relacionados, y menciona herramientas como Yoast para mejorar el posicionamiento en buscadores. Finalmente, recomienda automatizar parte del proceso de optimización de motores de búsqueda mediante el uso de intelig
Securing 4G and LTE systems with Deep Learning and VirtualizationDr. Edwin Hernandez
In a world of mobile communications, the best solution for 4G and 5G systems is creating your own private network to secure all communications and sensitive information send and received by a mobile phone. EGLA CORP can assist you with that paradigm and our virtualization system based on MOBILECAD.
Our deep learning partnership with BLUEHEXAGON brings unique opportunities for 4G and 5G systems.
EGLAVATOR is a technology and office space incubator located in Boca Raton, FL, We assist different startups with advices, office space, affordable services and access to Gb internet and a TV & Podcast Studio.
This document describes a patented technology called Cloud to Cable that enables broadcasting of cloud-based apps and services to cable, satellite, and other broadcasting systems. It allows cloud and web apps to amplify their reach to over 900 million subscribers globally across these platforms. The technology provides a software-defined multimedia platform and edge servers to deliver a true multi-platform experience, bridging the gap between traditional broadcasting systems and the cloud. Several success stories and product offerings that have utilized this technology are highlighted.
MEVIA - Entertaiment and Cloud-based Solution for Yachts Dr. Edwin Hernandez
Entertainment at sea is powered by MEVIA. MEVIA is a patented technology that delivers multimedia content to mobile, web, smart TVs, and set-top boxes.
NextGENTV broadcasting with Cloud to Cable (ATSC 3.0) - Broadcasting to CABSATDr. Edwin Hernandez
CloudtoCable is a patented technology that allows HTML5 content from websites and cloud-based media providers to be broadcast to cable, satellite, and NextGEN TV systems without major complications. It works by taking HTML5 content and reformatting it into the required format for delivery to cable operator head ends or broadcast stations. This allows any HTML5 content like videos, TV shows, social media, and more to be integrated into cable, satellite, and NextGEN TV systems. CloudtoCable is covered by at least two US patents and has partnerships with companies in cloud-based media and NextGEN TV broadcasting.
New Revenue Opportunities for Cloud Apps and Services with CloudtoCableDr. Edwin Hernandez
CloudtoCable brings new revenue generating opportunities to Cloud-Based Applications with Music and Video Services in two main arenas: Cable & Satellite and the new ATSC 3.0 or NextGenTV
EGLA CORP: Innovation, Intellectual Property Services, and CapitalDr. Edwin Hernandez
EGLA CORP is a FL-based tech corporation that enables startups, and technologies to be created for monetization. Our incubator, EGLAVATOR hosts a TV Studio, Multimedia Streaming startups, 4G & Wireless, Health TECH, and others.
EGLA offers a music package for cable TV and IPTV operators delivered through their "Cloud to Cable" technology. They have successfully distributed music content to over 20 million subscribers in Latin America. Some of EGLA's customers include Cablevision Mexico, Axtel TV, Claro TV, TIGO, and others. They also launched Sky Brasil's streaming music service SKY TUNES, making thousands of songs available on mobile, web, and cable TV.
1. Simulation and modeling of mobile protocols
Mobile computing survey
Edwin Hernandez
David Witter
Mobile Computing – CIS 6930
Dr. Sumi Helal
Feb 24th, 1999
2. TABLE OF CONTENTS
SIMULATION AND MODELING OF MOBILE PROTOCOLS ........................................................ 3
ABSTRACT ............................................................................................................................................ 3
INTRODUCTION - NOMADIC COMPUTING OVER THE INTERNET................................................................. 3
Address binding................................................................................................................................ 4
Network Infrastructure...................................................................................................................... 4
TCP connection management............................................................................................................ 5
MOBILITY PERFORMANCE.............................................................................................................. 6
HAND-OFF MANAGEMENT ALGORITHMS FOR URBAN AND SUB-URBAN ENVIRONMENTS UNDER REALISTIC
VEHICLE MOBILITY CONDITIONS ........................................................................................................... 6
PERFORMANCE OF TRANSPORT PROTOCOLS OVER A MULTICASTING-BASED ARCHITECTURE FOR INTERNET
HOST MOBILITY .................................................................................................................................... 7
PERFORMANCE E VALUATION OF MOBILE IP PROTOCOLS IN A WIRELESS ENVIRONMENT ......................... 8
REPLICATED SERVERS FOR IP-HOST MOBILITY....................................................................................... 10
ANALITICAL SIMULATION OF MOBILE NETWORKS .............................................................. 13
MOBILITY AND PERFORMANCE MODELING IN CELLULAR COMMUNICATION NETWORKS .......................... 13
Network Modeling .......................................................................................................................... 13
Cell modeling ................................................................................................................................. 15
REFERENCES................................................................................................................................... 18
2
3. Simulation and modeling of mobile protocols
Abstract
Mobile computing protocols are becoming one of the most important issues in state-of-the-art
technologies. In this paper we will provide important issues in terms of modeling and simulation of mobile
protocols. First, the survey discusses the theoretical issues in mobile or nomadic computing environment,
afterwards some performance measurements papers are explained, they show simulations done to routing
and hand-off optimizations. Finally, an analytical point of view is presented using queuing theory analysis
in pico-cell networks.
Introduction - Nomadic computing over the internet
There are several answers to the problem of mobility, mobile-IP is one of them, but there are other
frameworks found for instance in [Li98], where an universal personal computing (UPC) paradigm is
presented. The term nomadicity refers to the system support needed to provide a rich set of computing and
communication capabilities and services for mobile users in a transparent, integrated and convenient form
as they move between different places. The desired characteristics for nomadicity include independence of
location, motion, computing platform, communication device, and communication bandwidth, and the
widespread availability of access to remote files, systems and services.
There are some other standards for nomadicity, such as the Universal Personal
Telecommunication, studied by the CCITT (ITU), which is based on the intelligent network architecture
and focused on extending point-to-point connection-oriented services provided by the public switched
telephone network to mobile users. In addition to those efforts, the Telecommunications Information
Networking Architecture (TINA) has defined and validated an open architecture for telecommunications
systems providing personal mobility functions. Both frameworks, as explained before are designed to be
applicable in the Intelligent Network (IN) and Broadband ISDN (Integrated Services Digital Network).
The UPC paradigm presented by [Li98] follows these design issues:
• Only regular users of the internet are considered, each user should belong to a home network, a place
where the user is properly registered.
• Each mobile user has a service profile at her home network where all the services are defined.
• Services and terminal control have to be logically separated.
• Each user and her current terminal has to be identified by the Logical User Identifier (LIU) and Logical
Terminal Identifier (LTI), respectively, that are independent of each others as well as their curretn
location.
3
4. • Location information management of mobile objects is a key issue on UPC, the algorithms for
searching and updating locations of mobile users and terminals should not adversely burden the
internet in terms of traffic overhead and protocol processing.
• Adaptation capabilities should be provided to harmonize the differences in operating environments,
input, output, display and storage formats.
• Certain intelligent agents may be incorporated to optimize the UPC operations through optimal
functional divisions between terminals and networks.
Address binding
To enable personal mobility, a logical user identifier or LUI is needed to uniquely and directly
identify a user irrespective of a terminal used. The LUI is used as the basis for sending and receiving
messages and for charging a user for services. The terminals are identified by the LTI regardless of whether
they are fixed or mobile. LUI should be unique and it might be a number or a name or even a picture, it
might be the user@domain string. The IP address could be the analog to the LTI.
Network Infrastructure
It is composed by a User’s Home Agent (UHA), a Terminal’s Home Agent (THA) and a Foreign
Agent (FA) which are configured in each self-administrative domain of the conceptual multi-network
internet architecture to support personal and terminal mobility in UPC.
User’s Home Agent (UHA): Each mobile user has a home network. The UHA in each network maintains
a list of users calling the network home, and the pertinent information for each user, including service
profile and location information.
Terminal’s Home Agent (THA): The network should have a THA which maintains a home list of
database identifiers of all mobile terminals that call the network home. They are the mobile hosts in
mobile-ip. Terminal related information such as LTI, terminal profile, terminal authentication key, and
current terminal location are stored in the THA.
Foreign Agent (FA): As mobile users and terminals migrate over the internet, they need to access network
computing resources and services from different networks connected to the internet. Each network serving
mobile terminals should have a FA which enables users and terminals to be temporarily associated with the
network. Each FA should provide two list one of visiting users and another one of visiting terminals. There
is a binding to the UHA and THA to enable packet redirection.
4
5. TCP connection management
Another important issue is the TCP connection management. TCP utilizes the three way
handshake protocol, with a sequence of ACK – SYN – ACK, we have to recall the state machine for the
TCP handshake defined in the TCP protocol.. In [Li98] is proposed three different solutions for mobile
communication in TCP links. a) a Transparent Solution b) The TCP layer solution c) the middleware layer
solution.
In the Transparent Solution, the UHA has two finite states machines, it establishes a
communication link using TCP between the source and then initiates a communication link to the Mobile
Terminal (MT) or host. In fact [Li98] point out that the TCP connection between the UHA and the MT is
supported by mobile-ip. However, movements of the MT will require routing optimization and cache
validation techniques.
Meanwhile the TCP Layer Solution , the source request to set up a connection to the UAH using
an IP address of the MT. The UHA transfers the message to the MT, the message is tunneled and the MT
piggyback the source. The TCP layer of the source is modified with the new IP address piggybacked by the
MT. The main problem with this solution is the lack of transparency between the source and the
destination, and this modification should be taken into consideration by the IETF which is not feasible.
Finally the Middleware Layer Solution, in which the middleware is aware of the mobility of the
MT at the UHA, therefore when the MT is moved and the directory service is requested the middleware
should provide the source of information with updated addresses. This is similar to the TCP layer solution
but it can be implemented in alignment with OSI principles.
5
6. Mobility Performance
A common subject for research in mobile computing is performance of protocols and wireless
simulation. At the physical access level, one can discuss hand-off issues between micro and macrocells.
Moving to a higher level, issues involving the performance of Mobile IP versus Route Optimization Mobile
IP are of keen importance as to which will be implemented in the future Internet. Another solution to
mobility in IP is multicasting. This approach is promising due to the mobile host not needing to change IP
addresses as it roams. Finally, a paper on replicated home-agents improving the load balance and
availability.
Hand-off Management Algorithms for Urban and Sub-urban Environments Under
Realistic Vehicle Mobility Conditions
While studying mobile computing and the challenges this field faces, one begins to realize that
many of the problems parallel those faced by the cellular communication community. This paper discusses
ways to lower the number of hand-offs needed when traveling through an urban area. The technique
discussed here for cellular service could be targeted at the same challenge facing mobile computing.
Before begin, the basics must be discussed. In a wireless environment, there are two types of
coverage. Microcells usually provide coverage to congested areas such as an airport or business area.
These are also called hot spots. Microcells cover an area with a radius of approximately 100m.
Macrocells, on the other hand, are much larger and usually cover and area with several microcells within it.
Macrocells are responsible for providing service to the suburban area as well as travelers through the urban
area. See the figure below.
Macrocell
Microcells
The process used to determine whether a user should be handed from the macrocell to the
microcell depends on the classification of the user. A fast user, one that is travelling quickly through the
region, would be assigned to the macrocell. A slow user, one that may be seated at a conference, would be
6
7. assigned to a microcell. This scheme works well except when a user is travelling through the region but is
slowed considerably by a congested area with many traffic lights and is classified as slow. Under the
current approach, the user would experience many hand-offs from one macrocell to the other. This method
is grossly inefficient and increases the chance of the user becoming disconnected.
Dr. Iera of the University of Reggio Calabrai, Italy [Iera08] purposed a solution to this problem.
A fast user connected to the macrocell is given a time bonus when he reaches the border of a microcell. If
the user travels through the microcell in time less than t_threshold, the user gets keeps 100% of the time
bonus for the next microcell. If the traveler takes time less than t_threshold + time bonus, but greater than
t_threshold, the time bonus us decreased for the next microcell. If the traveler takes more time than
t_threshold + time bonus, then the traveler is immediately assigned to a microcell.
In order to test this method, an elaborate traffic simulator was used in conjunction with the newly
purposed algorithm. Varying the number of traffic lights as well as varying the light duration set the
simulator parameters. Results were rather promising, as the average number of hand-offs per call
decreased from 4.25 to 2.8. This improvement came at a cost though, as the number of calls blocked and
forcefully terminated increased slightly with the new algorithm. This drawback can be contributed to the
overloading of the macrocell in this scheme. Since the drawback seems small compared to the
improvement in the number of hand-offs, this algorithm show promise for both the wireless communication
environment.
Performance of Transport Protocols over a Multicasting-based Architecture for
Internet Host Mobility
Although Mobile IP is gaining momentum towards being the standard, other solutions to mobility
have been researched. One of those possible solutions is to use IP multicasting. IP multicasting provides
packet delivery to location independent addresses and allows hosts to leave and join multicast groups.
These abilities parallel the needs of host mobility in the wireless network environment.
Jayanth Mysore and Vaduvur Bharghavan wrote this paper to explore the performance of Mobility
Support using Multicasting in IP (MSM-IP) versus the standard Mobile IP protocol. In order to provide
more complete results, both UDP and TCP were run over both MSM-IP and Mobile IP. Before discussing
the results, the reader needs to understand how MSM-IP and Mobile IP work.
In Mobile IP, each mobile host has its own home address. When the host moves from its home
subnetwork to another, the mobile host receives a care-of-address. The care-of-address is a dynamic
identifier that reflects the current point of attachment. When a correspondent host sends packets to the
mobile host, the packets first go to the home agent. The home agent, who knows the care-of-address,
forwards these packets to the mobile host. The mobile host, on the other hand, can send packets directly to
the correspondent host. Thus, the name triangle routing originated.
MSM-IP takes advantage of multicast routing to support host mobility. Multicast routing uses the
virtual interconnection of tunnels over the existing internet. The source of data packets is the root of the
7
8. distribution tree, while the mobile host would be at lowest level. When a mobile host moves to a different
network, it sends an IGMP registration message to the local multicast router. Due to common case
mobility, the new multicast router will be close to the previous multicast router that was servicing the
mobile host. Therefore, on the lowest level of the distribution tree will have to be modified making
handoff with MSM-IP efficient.
In order to test UDP performance with MSM-IP, 16 different test were run. The variables for each
test were cold versus hot switching, uploading or downloading, 100Kbps or 400Kbps throughput and
constant versus Poisson traffic distributions. Cold switching means the mobile host handed of before
registering with the new network, while hot switching means the mobile host did register with the new
network before handoff. Performance results were impressive as the maximum packet loss was 1 and the
maximum number of duplicates was 3. In most cases thought, the number of duplicates was 0.
To study the performance of TCP, the authors compared the distribution of the sequence numbers
of the packets received to time during a switch. A constant slope on a graph would represent a constant
steam of data uninterrupted during a switch. MSM-IP performed well, only showing less than a two-
second delay before full recovery. When compared to Mobile IP, MSM-IP once again faired well. MSM-
IP showed a significant performance gain, especially when the network was simulated with a larger delay.
With a delay larger than 100ms, ACKs sent by the mobile host from its new location are not recognized, so
the correspondent host continues to send packets to the old interface. Since the mobile host is no longer at
this interface, all the data packets get lost. These lost data packets are interpreted as network congestion,
and TCP consequently slows down transmission. MSM-IP does not have this problem, as the mobile host
does not need to change multicast addresses.
This paper has presented a reasonable alternative to Mobile IP through MSM-IP. MSM-IP uses
multicasting so that packets destined for a mobile host do not need to travel through a home agent. It also
reduces the number of packets lost during handoff because the correspondent host does not need a binding
update to learn the new care-of-address. Although MSM-IP looks like a promising alternative, it is not a
realistic widely-used solution because an effective IP multicasting infrastructure covering the entire internet
is not in place.
Performance Evaluation of Mobile IP Protocols in a Wireless Environment
As the need for mobile access to the internet increases, solutions for IP in a wireless environment
are needed. The two protocols with the most momentum are Mobile IP (MIP) and Route Optimization
Mobile IP (ROMIP). In this paper, the performance in terms of overhead for control, packet delay and
packet loss for both MIP and ROMIP are compared using simulation.
8
9. In order to discuss the performance measurements of the two protocols, the differences between
the protocols must be discussed. Traditional MIP uses triangle routing, as the packet path from the
correspondent host to the mobile host is different than from the mobile host to the correspondent. This is
because the correspondent host only knows the
mobile host’s home address. Any packet sent to the Correspondent Mobile
Host Host
home address is tunneled by the home agent to the
mobile host’s care-of-address. One can see from the
diagram that there is a certain amount of inefficiency
in this method. ROMIP tries to address this Home Agent
inefficiency.
With ROMIP, correspondent host sends packets directly to the mobile host. The correspondent
host maintains a cache of care-of-addresses for mobile hosts receiving packets, which allows the
correspondent to send packets directly to the mobile host. Whenever a mobile host moves to another
foreign subnet, the mobile host must send a binding update to both its home agent and the previous foreign
agent. The home agent then sends a binding update to any correspondent host that needs the new care-of-
address. The previous foreign agent uses the binding update to forward any packets it receives to the
differently located mobile host. This forwarding continues until all the correspondent hosts have updated
their care-of-address for the mobile host.
The results from the simulation are what one would expect. The ROMIP protocol outperformed
the traditional MIP when the session size (time) was substantial (>100kbit). When the session time was
smaller than this, the overhead needed for ROMIP outweighed the benefit from the route optimization. As
the session size increased past 100kbits, ROMIP’s end-to-end packet delay remained constant while MIP’s
skyrocketed exponentially. The greater performance observed for ROMIP at higher session lengths can be
contributed to two factors.
First, the route between the correspondent host and the mobile host must be physically shorter due
to the definition of a triangle. If the physical distance is shorter, the transmission time will also be shorter.
Included in this factor is that the home agent requires processing time to tunnel packets to the mobile host.
These two delays contribute to a constant delay for every packet sent. A second factor contributing for the
higher performance is the flooding of home agents. In MIP, every packet sent to a mobile host must pass
through the home agent. If the home agent is servicing several hosts that roaming, packet congestion at the
home agent becomes a serious problem. This explains why the end-to-end packet delay for MIP increased
exponentially with longer session times.
In this paper, two popular approaches to host mobility in a wireless environment were compared
through simulation. The Route Optimization Mobile IP outperformed the standard Mobile IP at longer
session lengths. At session lengths less than 100kbits, ROMIP performs poorly due to the overhead
9
10. required for route optimization. Any session exceeding 100Kbits allows the route optimization to be
beneficial. Since most sessions are longer than 100kbits, ROMIP seems to be the most attractive solution.
Replicated servers for ip-host mobility
In [Jue98], an extension for the mobile-ip protocol is presented in terms of the use of replicated
home-agents to handle multiple request for different mobile hosts groups. Replication will provide load-
balancing and avoid the single-point of failure provided by the home-agent.
We have to recall that in the mobile-ip architecture, a foreign agent and a home agent are required
for mobility. The mobile host moves to another network where the foreign agent expect to receive a
`registration packet in order to keep track of the mobile host and make the home-agent forward the
information to the proper destination.
The approach followed here consists in the use of not one, if not several replicated home-agents,
using different techniques to access and load balance between each other. The basic mobile-ip protocol has
evolved out of the efforts of the mobile IP working group and specifies mobility support under Ipv4. The
home-agent is usually a router or host in the mobile host’s home network which maintain mobility bindings
(a permanent IP address to a temporary IP address translation) for the mobile host. Meanwhile, the foreign
agent may be a router or host in the network where the mobile host is visiting, and it provides the mobile
host with a temporary IP address. If the number of available IP addresses in the foreign network is limited,
then the foreign agent may act as a proxy server for the mobile host, in this case the temporary IP address
will belong to the foreign agent’s IP address.
The protocol proposed in [Jue98] the mobile host will have the IP addresses of all the home agents in
the home network. When the mobile hosts sends a registration request (issue of Mobile-IP protocol). It will
randomly choose one of the home agents to service the request. As defined in the mobile-IP protocol, it is
assumed that each mobile registration request has an unique identification and a lifetime which defines the
time for which the registration is valid. This time is defined by Treg. The registration packet also contains
the IP address of the mobile host, and the temporary IP address of the mobile host. As part of the mobility
binding, the agent maintains the following information:
1. The unique registration numbers
2. The permanent IP address of the mobile host
3. The temporary IP address of the mobile host
4. A boolean variable called PROXY (on or off), which indicates if the proxy is on or not. If proxy is ON,
then the home agent is acting as a proxy for the mobile host and responds with a proxy ARP reply
whenever an ARP query is received for the mobile host. If it is off, a different home agent is serving
the mobile host.
10
11. 5. Treg which defines the time for which the registration is valid.
With multiple home agents load balancing will be achieved by allowing a home agent to transfer
control of a mobile host to another home agent based on some load balancing algorithm. The load
balancing algorithms consist of two parts: a) A transfer policy which determines when a transfer should
take place and b) a Selection policy which determines to which home agent the control should be
transferred.
In fact, [Jue98] choose different load balancing strategies, for instance for policy transfer, three
approaches were made:
• Timer-based: In this approach, each home agent maintains a timer for each mobile host that is serving.
The time value will be referred to as the stream transfer time and will be denoted as Tstt. When a home
agent acquires control of a mobile host, it starts the timer after the first packet for the mobile host is
received. When Tstt expires, a new home agent is selected, and a registration request is forwarded to a
new home agent.
• Counter-based: This approach is different, the home agent counts the number of packets forwarded to
each mobile host. When the counter reaches a specified limit, the home agent transfers the registration
of the mobile host to another home-agent. This counter is referred as Tstc
• Threshold-based: For each mobile host, the home-agent maintains a count of the number of packets in
its queue which are destined to the mobile host. When the number of packets in the queue for a given
mobile host exceeds the threshold, the home-agent forwards that mobile host’s registration to another
home agent. The threshold value will be referred as Tsth
There is not much difference between policies requires some extra overhead, in other words, re-register
the mobile host to a new home-agent and selection procedure involved. As shown here is expected to see
that the Timer-based approach will lead to switching from home-agents even though the traffic is zero. This
situation is not present in the counter based approach. The values for thresholds and timeouts were modeled
in the paper.
There is another factor in this protocol, and it is the selection of the next home-agent, three different
policies where also studied in this paper:
• Random policy: The next home-agent is selected randomly from all home agents, including the home
agent attempting the transfer.
• Round-robin policy (RR): The home agent are logically ordered and the next home agent is selected
using a simple round-robin policy
11
12. • Join the Shortest Queue (JSQ) policy. The home agent which has the minimum number of queued
packets is selected as the next home-agent. Similar to the random policy, the current home-agent may
also be selected as the next home-agent.
Random and RR are easier to implement, intuitively JSW will provide a better performance, but
leading to a lot of overhead.
The simulation was executed using the following assumptions:
• There are N identical home-agents
• A home-agent is modeled as a single-server queue which servers both data packets and overhead
packets
• The arrival process is modeled as a MMPP (Markov Modulated Poisson Process) with arrival rate λ
during an ON period and 0 during an off period.
• The duration of an off period is exponentially distributed and with a mean 1/σ1 seconds
• The duration of the on period is exponentially distributed and with a mean 1/σ2 seconds
• The service time of a data packet is defined by µ per second
• The service time of an overhead packet is exponentially distributed with a service rate of µ/C packets
per second, by changing C it is possible to model different overhead costs.
• The registration overhead is negligible
The analytical model was tested using non-preemptive queues and shadow-servers approximations,
having the sources or mobile hosts equally distributed and assigned to the home-agents and burst-level load
balancing, where Tstt is set to an infinite value and is used as a reference point for comparison with the
proposed load balancing scheme
All the simulative analysis lead to conclude that by providing a mechanism which allows incoming
packet streams to be transferred from one home-agent to another, the system’s performance is improved
taken as a reference a single-server. The results provided here showed that a random policy yielded to
modes load balancing gains, and the JSQ policy performs much better than the random selection.
12
13. ANALITICAL SIMULATION OF MOBILE NETWORKS
Mobility and performance modeling in cellular communication networks
A simply analytical model for cellular communication networks can be found in [Camar98], where the
model assumes a finite population of mobiles moving in a finite number of cells. This model tries to
evaluate the Fixed Channel Allocation (FCA) factor, as well as, user load, mobility and distribution of users
among cells. This model is suitable for the future of Pico-cellular systems.
The main assumptions of the model are:
• A finite population of users moving in a finite set of cells
• Users are indistinguishable from each other and pass from a cell to another following a probability
transition patters with the same transmission rate
• A parameter called µP, or the cell transition rate. The model assumes a FCA assignment for the channel
frequencies.
According to the results shown in [Camar98], the use of uniform channel allocation scheme is worse
than the use of a non uniform one. In fact, minimum-blocking probability is obtained with a number of
channels allocated to each cell approximately proportional to the number of users in the cell.
Network Modeling
Hexagonal cells arranged in (2R –1) rows, as shown in Figure 1 can represent an ideal network.
As shown, there are R rows of K cells and (R-1) row of (K+1) cells. The total number of cells is M=RK +
(R-1)(K+1). We assume N users circulating in the network. It is supposed that the occupation time of a user
is defined by an exponential distribution with mean 1/µP i.e. the pdf of this random variable (called TP) is:
f T p (t ) = µ P e − µ Pt
13
14. K-1
K
1
2
K+K+1
K+1
K+2
M-K-1
M- 2K
M-K
M-K+1
M-1
M
Figure 1. Cellular Network
As far as mobility is concerned, each cell is modeled by an infinite server to consider its
occupation time. They also have assumed a probability of transition from one cell to another, indicated by
Pij
Now it is assumed a λI, for each cell, which is the effective arrival rate of users to the cell i. Where,
λi = ∑ j λ j pij , where I=1,2,…. M, (1)
M
however this term is used in conjunction with nI is the number of users in the ith cell, and by n=(n1, n2, …. ,
nM), is the state vector for the system.
The probability of a state n can be evaluated by:
1 M
P ( n) = ∏ hi (ni ) ,(2)
G 1
hi ( n i )
now the factor can be calculated by:
ni
1 λ
hi ( ni ) = i
ni ! µ P
(3)
where the arrival rate is given by (1), now the normalization constant G from (2) is calculated in the paper
as:
G=g(N,M), where g(N,M) is a recursive function defined by:
g(n,m)=1, n=0; m=1…M
14
15. g(n,m)=hm(n), m=1; n=1…N
n
g (n, m) = ∑ hm (k ) g (n − k , m − 1) , n=1…N, m=2…M,
k =0
the marginal state probability of the Mth cell is given by:
1
P ( nM = k ) = hM (k ) g ( N − k , M − 1) (4)
G
while the average number of users is given by:
N
E[nm ] = ∑ kP(nM = k ) =
k =1
1 N
= ∑ k ⋅ hM (k ) g ( N − k , M − 1) (5)
G k =1
Using little’s formula, the true arrival rate can be easily calculated as:
E ( nM )
λM ( N ) = = E (nM ) µ P (6)
E (T p )
it can be also shown that, the Utilization of the queue M, that is cell M, are given respectively by:
g ( N , M − 1)
U M (N ) = 1− (7)
G
g ( N − 1, M )
X M (N ) = 1− (8)
G
In this case Xm which is the throughput is expected to be:
λ M ( N ) = X M ( N ) (9)
Cell modeling
In addition to the Throughput and utilization equation mentioned in the previous section,
[Camar98] points out the need to model de cells in the network and specific processes such as call blocking
and hand-off blocking. For example, when considering the service offered to the users, the possibility to
make a call, the cell can be represented by a finite population (n) in a M/M/m/m/n queue. This is a loss
system where the maximum number of contemporary calls in progress is given by the number of channels
m assigned to the cell. As a resulting equation, the steady state probabilitie is given by:
15
16. n γ k
( )
k µ
Pk = c , where k=0,1,….,m (10)
m n γ
∑i=0 i ( µ )
i
c
And the probability that a user in a call attempt does not find a free channel is given by the probability that
all cell channels have been allocated to another users in the cell, and therefore:
n − 1 γ m
m ( µ )
PL = m c (11)
n − 1 γ i
∑ i ( µ )
i =0
c
in both equations (10) and (11), γ/µc represents the required load per user in erlangs, where γ is the average
number of call attempts in the time unit per user and 1/µc represents the average call duration.
In terms of call blocking, a state vector n=(n1, n2, …. , nM) is assumed. Then, the probability of the
jth cell (which contains nj users) a new call attempt is blocked Pbj(nj) can be obtained from PL on equation
11. Assuming only mobile-to-land and land-to-mobile calls and a perfect wired network, the blocking
probability of the entire cellular network is evaluated by a weighted mean of cells blocking probabilities,
where:
M nj
PB (n) = ∑ Pb j (n j ) (12)
j =1 N
Which if applied to the average equation for the whole system, it is obtained:
M N nj
PB = ∑ ∑ Pb j (n j ) P(n j ) (13)
j =1 n j = k j +1 N
Where kj and P(nj) represent respectively the number of channels and the probability to have nj
users in the jth cell. The index starts for nj ≤ kj because less users than channels the probability of blocking
is zero.
Now, it is also mention the way to model the hand-off blocking probability, which the probability
that a user with a call in progress; passing from one cell to another one, does not find a free channel in the
destination cell and thus the call has to be terminated. And by knowing the blocking probability it is easier
to say that:
16
17. N −1
Pbhj = ∑ Pb (n
n j = k j +1
j j ) P(n j ) (14)
in addition to taking into account Pb and P(n), the equation must take into consideration the probability of
transition, and the instant of transition it must consider N-1 users instead of N. The network hand-off
blocking probability PBH is obtained by the weighed sum of cell hand-off blocking probabilities where the
weights are given by the fraction of the arrival rate λaj(N) of users with a call in progress.
M λ aj ( N )
PBH = ∑ Pbhj (15)
∑i=1 λai ( N )
M
j =1
and the rate λaj(N) is given by:
M
λ aj ( N ) = ∑ X ai ( N ) pij (16)
i =1
The results coming out of the model, represent an analytical solution. According to the paper the
results provided were compared with a simulation executed in SMPL language, however no details and
comparisons are explained, however for simulation purposes several parameters where used such as:
B H H H +B
PB = PBH = PFT = PUC =
T T −H T −B T
Where B represents the blocked calls, T the new tried calls, TH the tried with Hand-off, H the
unsuccessful hand-offs. And FT stands for forced termination and UC for unsuccessful completion.
There are several assumptions from this model, first the matrix for transition probabilities between
cells, which can lead to have a non-homogeneous model in the network, but it requires son previous studies
of the cells in the model.
17
18. REFERENCES
[Camar98] P. Camarda, G. Shiraldi, et.al. “ Mobility and Performance Modeling in Cellular
Communication Networks”, Mobile Computing and Communication Review, Vol.1 No.
4, 1998, 25-32.
[Jue98] J. Jue, D. Ghosal “Design and Analysis of Replicated Server Architecture for Supporting
IP-Host Mobility”, Mobile Computing and Communication Review, Vol 2, No. 3, 1998,
16-23,
[Li98] Y. Li and V. Leung. “Supporting Personal Mobility for Nomadic Computing over the
Internet”, Mobile Computing and Communication Review, Vol. 1, Number 1, 1998,
22-31.
[Iera98] A. Iera, A. Fazio, et.al. “Hand-off management algorithms for urban and sub-urban
environments under realistic vehicle mobility conditions”, IEEE International Conference
on Communications v 3 1998. IEEE, Piscataway, NJ, USA,98CH36220. p 1375-1379
[Dell98] M. Dell’Abate, M. DeMarco and V. Trecordi “Performance evaluation of mobile IP
protocols in a wireless environment” IEEE International Conference on Communications
v 3 1998. IEEE, Piscataway, NJ, USA,98CH36220. p 1810-1816
[Mysore98] J. Mysore, B. Vaduvur. “Performance of transport protocols over a multicasting-based
architecture for Internet host mobility” IEEE International Conference on
Communications v 3 1998. IEEE, Piscataway, NJ, USA,98CH36220. p 1817-1823
18