Mobility Protocols and Handover Optimization
eBook - ePub

Mobility Protocols and Handover Optimization

Design, Evaluation and Application

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Mobility Protocols and Handover Optimization

Design, Evaluation and Application

About this book

This book provides a common framework for mobility management that considers the theoretical and practical aspects of systems optimization for mobile networks.

In this book, the authors show how an optimized system of mobility management can improve the quality of service in existing forms of mobile communication. Furthermore, they provide a theoretical approach to mobility management, as well as developing the model for systems optimization, including practical case studies using network layer and mobility layer protocols in different deployment scenarios.  The authors also address the different ways in which the specific mobility protocol can be developed, taking into account numerous factors including security, configuration, authentication, quality of service, and movement patterns of the mobiles.

Key Features:

  • Defines and discusses a common set of optimization methodologies and their application to all mobility protocols for both IPv4 and IPv6 networks
  • Applies these technologies in the context of various layers: MAC layer, network layer, transport layer and application layer covering 802.11, LTE, WiMax, CDMA networks and protocols such as SIP, MIP, HIP, VoIP, and many more
  • Provides a thorough analysis of the required steps during a mobility event such as discovery, network selection, configuration, authentication, security association, encryption, binding update, and media direction
  • Includes models and tables illustrating the analysis of mobility management as well as architecture of sample wireless and mobility test beds built by the authors, involving inter-domain and intra-domain mobility scenarios

This book is an excellent resource forprofessionals and systems architects in charge of designing wireless networks for commercial (3G/4G), LTE, IMS, military and Ad Hoc environment. It will be useful deployment guide for the architects wireless service providers. Graduate students, researchers in industry and academia, and systems engineers will also find this book of interest.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Mobility Protocols and Handover Optimization by Ashutosh Dutta,Henning Schulzrinne in PDF and/or ePUB format, as well as other popular books in Technology & Engineering & Electrical Engineering & Telecommunications. We have over one million books available in our catalogue for you to explore.

Chapter 1
Introduction

Wireless connectivity to communications and information has advanced the world towards ubiquitous computing. In the space of less than thirty years, cell phones have become ubiquitous and wireless data access has become common. However, this access has brought with it a variety of technical problems. Radio physics and power constraints, the need to reuse spectrum, economic constraints on facility placement, and service balkanization due to competitive and political factors force us to implement wireless systems as cells of limited range. Furthermore, cells may use very different wireless technologies or provide fundamentally different services, such as VoIP (Voice over IP), streaming, or direct short-range communications for telematics. We then need handoff mechanisms, often in multiple protocol layers, to allow a mobile terminal to move from cell to cell and maintain service continuity.
Mobility can be described as movement of a terminal, resulting in the release of the terminal's binding to the current cell (point of attachment to the network) and the establishment of bindings to the new cell being entered, while preserving the existing sessions associated with higher-level services. The cellular telephony community has long implemented service- and technology-specific mobility protocols that hand off voice sessions as the user moves from cell to cell. Because voice service quality is highly sensitive to service interruptions, cell-to-cell handoffs in a cellular environment have been highly optimized and are not noticed by the public. Tripathi et al. (1998) summarized some of the handoff technologies associated with cellular mobility. Pollini (1996) discussed some of the trends in handover design in cellular networks that may affect the optimization of handover performance.
For IP traffic, the IETF has defined mobility protocols for both IPv4 (Perkins, 2002b) and IPv6 (Johnson et al., 2004). However, IP traffic is dramatically more diverse than cellular voice in the range of link layer technologies used to support IP traffic, the number of economic units supplying IP services, and the authentication protocols and services running above IP. This diversity has meant that the IETF could not easily design access-specific handoff optimization techniques such as soft handoff (Chen and Mary, 2003; Wong and Lim, 1997), often seen in cellular voice, into the mobility standards. As a result, unoptimized Mobile IP handoffs can take a few seconds to perform, and degrade the quality of service in the process.
IP's transformation from a service supporting email and file transfer to the base layer for network convergence means that the constraints on handover performance are becoming much more stringent. Handovers cannot interrupt real-time services. The mechanisms and design principles needed for building optimized handovers in the context of mobile Internet services are poorly understood and need better analysis. To the best of our knowledge, none of the existing work has attempted to model the systems aspects of a mobility event nor was intended to systematically analyze the elementary operations involved in a mobility event. This body of work is also lacking in the ability to predict the performance of a mobility event. Some of the existing work has focused on optimizing only parts of a mobility event in an ad hoc manner, specific to a mobility protocol, without providing a comprehensive approach to solving the optimization problem in all layers or functional modules. We provide an overview of this related work for each of these mobility functions along with a detailed description of the proposed techniques in Chapter 6.
This book is intended to contribute to a general theory of optimized handover, especially with respect to the mobility of Internet-based applications. The contributions fall into four categories:
  1. Identification of fundamental properties that are rebound during a mobility event. Analysis of these properties provides a systematic framework for describing mobility management and the operations that are intrinsic to handover.
  2. A model of the handover process that allows one to predict performance both for an unoptimized handover and for specific optimization methodologies under conditions of resource constraints. This model also allows one to study behavioral properties of the handoff system such as data dependency and deadlocks.
  3. A series of optimization methodologies, experimental evaluations of them, and optimization techniques that can be applied to the link, network, and application layers and preserve the user experience by optimizing a handover.
  4. Application of the model to represent optimizations, and comparison of the results with experimental data.

1.1 Types of Mobility

There are several types of mobility, such as terminal mobility, personal mobility, session mobility, and service mobility. Schulzrinne and Wedlund (2000a) introduced several different types of mobility to support multimedia traffic for an IP-based network. We briefly review each type of mobility.

1.1.1 Terminal Mobility

Terminal mobility allows a device to move between networks while continuing to be reachable for incoming requests and maintaining existing sessions during movement. It allows an established call or session to continue when an MS (mobile station) moves from one cell to another without interruption in the call or session.
Terminal mobility may also arise from a change in the network condition, whereby a mobile may switch between two neighboring networks even without any movement. We describe here the types of terminal mobility that arise from different types of handoffs. Handoff, often also known as handover, is a process that results when a mobile disconnects from one point of attachment in a network and reconnects to another point of attachment in the same or a different network.
The handoff process can be either hard or soft. With hard handoff, the link to the prior base station is terminated before or as the user is transferred to the new cell's base station. Thus, the mobile is linked to no more than one base station at a given time. Initiation of the handoff may begin when the signal strength at the mobile received from the target base station is greater than that from the current base station. As the mobile moves into a new cell, its signal is abruptly handed over from its current cell (or base station) to the new one. In the old analog systems, hard handover could be heard as a click or a very short beep. In digital cellular systems, this is not noticed. However, in an IP-based handoff scenario, hard handover contributes 4–15 s of delay (Dutta et al., 2005c). With soft handoff (Wong and Lim, 1997), the MS continues to receive and accept radio signals from the base stations that are part of the previous as well as the new cell for a limited period of time. The MS signal is also received at multiple base stations. In order to ensure the layer 2 independence requirement of mobility management schemes, a maximum acceptable handoff time (MAHT) is required, which will vary based on the access type.
In an end-to-end wireless IP environment, four logical levels of handoff procedures can be defined:
  • Layer 2 handoff. This allows an MS to move from one layer 2 point of attachment to another layer 2 point of attachment that belongs to the same subnetwork. Each layer 2 point of attachment may be equippedwith same or a different type of radio access technology. One subnetwork may consist of multiple layer 2 radio access networks. The IP address of the mobile host remains the same during this handoff.
  • Subnet handoff. This allows an MS to move from a radio access network within a subnet to an adjacent radio access network within another subnet that belongs to the same administrative domain. The IP address of the mobile may or may not change.
  • Domain handoff. This allows an MS to move from one subnet within an administrative domain to another in a different administrative domain. Domain handoff can...

Table of contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Dedication
  5. About the Authors
  6. Foreword
  7. Preface
  8. Acknowledgements
  9. List of Abbreviations
  10. Chapter 1: Introduction
  11. Chapter 2: Analysis of Mobility Protocols for Multimedia
  12. Chapter 3: Systems Analysis of Mobility Events
  13. Chapter 4: Modeling Mobility
  14. Chapter 5: Layer 2 Optimization
  15. Chapter 6: Mobility Optimization Techniques
  16. Chapter 7: Optimization with Multilayer Mobility Protocols
  17. Chapter 8: Optimizations for Simultaneous Mobility
  18. Chapter 9: Handoff Optimization for Multicast Streaming
  19. Chapter 10: Cooperative Roaming
  20. Chapter 11: System Evaluation
  21. Chapter 12: Conclusions
  22. A: RDF Schema for Application Layer Discovery
  23. B: Definitions of Mobility-Related Terms
  24. References
  25. Index
  26. End User License Agreement