Mobility Protocols and Handover Optimization
eBook - ePub

Mobility Protocols and Handover Optimization

Design, Evaluation and Application

Ashutosh Dutta, Henning Schulzrinne

  1. English
  2. ePUB (handyfreundlich)
  3. Über iOS und Android verfügbar
eBook - ePub

Mobility Protocols and Handover Optimization

Design, Evaluation and Application

Ashutosh Dutta, Henning Schulzrinne

Angaben zum Buch
Buchvorschau
Inhaltsverzeichnis
Quellenangaben

Über dieses Buch

This book provides a common framework for mobility management that considers the theoretical and practical aspects of systems optimization for mobile networks.

In this book, the authors show how an optimized system of mobility management can improve the quality of service in existing forms of mobile communication. Furthermore, they provide a theoretical approach to mobility management, as well as developing the model for systems optimization, including practical case studies using network layer and mobility layer protocols in different deployment scenarios. The authors also address the different ways in which the specific mobility protocol can be developed, taking into account numerous factors including security, configuration, authentication, quality of service, and movement patterns of the mobiles.

Key Features:

  • Defines and discusses a common set of optimization methodologies and their application to all mobility protocols for both IPv4 and IPv6 networks
  • Applies these technologies in the context of various layers: MAC layer, network layer, transport layer and application layer covering 802.11, LTE, WiMax, CDMA networks and protocols such as SIP, MIP, HIP, VoIP, and many more
  • Provides a thorough analysis of the required steps during a mobility event such as discovery, network selection, configuration, authentication, security association, encryption, binding update, and media direction
  • Includes models and tables illustrating the analysis of mobility management as well as architecture of sample wireless and mobility test beds built by the authors, involving inter-domain and intra-domain mobility scenarios

This book is an excellent resource forprofessionals and systems architects in charge of designing wireless networks for commercial (3G/4G), LTE, IMS, military and Ad Hoc environment. It will be useful deployment guide for the architects wireless service providers. Graduate students, researchers in industry and academia, and systems engineers will also find this book of interest.

Häufig gestellte Fragen

Wie kann ich mein Abo kündigen?
Gehe einfach zum Kontobereich in den Einstellungen und klicke auf „Abo kündigen“ – ganz einfach. Nachdem du gekündigt hast, bleibt deine Mitgliedschaft für den verbleibenden Abozeitraum, den du bereits bezahlt hast, aktiv. Mehr Informationen hier.
(Wie) Kann ich Bücher herunterladen?
Derzeit stehen all unsere auf Mobilgeräte reagierenden ePub-Bücher zum Download über die App zur Verfügung. Die meisten unserer PDFs stehen ebenfalls zum Download bereit; wir arbeiten daran, auch die übrigen PDFs zum Download anzubieten, bei denen dies aktuell noch nicht möglich ist. Weitere Informationen hier.
Welcher Unterschied besteht bei den Preisen zwischen den Aboplänen?
Mit beiden Aboplänen erhältst du vollen Zugang zur Bibliothek und allen Funktionen von Perlego. Die einzigen Unterschiede bestehen im Preis und dem Abozeitraum: Mit dem Jahresabo sparst du auf 12 Monate gerechnet im Vergleich zum Monatsabo rund 30 %.
Was ist Perlego?
Wir sind ein Online-Abodienst für Lehrbücher, bei dem du für weniger als den Preis eines einzelnen Buches pro Monat Zugang zu einer ganzen Online-Bibliothek erhältst. Mit über 1 Million Büchern zu über 1.000 verschiedenen Themen haben wir bestimmt alles, was du brauchst! Weitere Informationen hier.
Unterstützt Perlego Text-zu-Sprache?
Achte auf das Symbol zum Vorlesen in deinem nächsten Buch, um zu sehen, ob du es dir auch anhören kannst. Bei diesem Tool wird dir Text laut vorgelesen, wobei der Text beim Vorlesen auch grafisch hervorgehoben wird. Du kannst das Vorlesen jederzeit anhalten, beschleunigen und verlangsamen. Weitere Informationen hier.
Ist Mobility Protocols and Handover Optimization als Online-PDF/ePub verfügbar?
Ja, du hast Zugang zu Mobility Protocols and Handover Optimization von Ashutosh Dutta, Henning Schulzrinne im PDF- und/oder ePub-Format sowie zu anderen beliebten Büchern aus Technology & Engineering & Electrical Engineering & Telecommunications. Aus unserem Katalog stehen dir über 1 Million Bücher zur Verfügung.

Chapter 1
Introduction

Wireless connectivity to communications and information has advanced the world towards ubiquitous computing. In the space of less than thirty years, cell phones have become ubiquitous and wireless data access has become common. However, this access has brought with it a variety of technical problems. Radio physics and power constraints, the need to reuse spectrum, economic constraints on facility placement, and service balkanization due to competitive and political factors force us to implement wireless systems as cells of limited range. Furthermore, cells may use very different wireless technologies or provide fundamentally different services, such as VoIP (Voice over IP), streaming, or direct short-range communications for telematics. We then need handoff mechanisms, often in multiple protocol layers, to allow a mobile terminal to move from cell to cell and maintain service continuity.
Mobility can be described as movement of a terminal, resulting in the release of the terminal's binding to the current cell (point of attachment to the network) and the establishment of bindings to the new cell being entered, while preserving the existing sessions associated with higher-level services. The cellular telephony community has long implemented service- and technology-specific mobility protocols that hand off voice sessions as the user moves from cell to cell. Because voice service quality is highly sensitive to service interruptions, cell-to-cell handoffs in a cellular environment have been highly optimized and are not noticed by the public. Tripathi et al. (1998) summarized some of the handoff technologies associated with cellular mobility. Pollini (1996) discussed some of the trends in handover design in cellular networks that may affect the optimization of handover performance.
For IP traffic, the IETF has defined mobility protocols for both IPv4 (Perkins, 2002b) and IPv6 (Johnson et al., 2004). However, IP traffic is dramatically more diverse than cellular voice in the range of link layer technologies used to support IP traffic, the number of economic units supplying IP services, and the authentication protocols and services running above IP. This diversity has meant that the IETF could not easily design access-specific handoff optimization techniques such as soft handoff (Chen and Mary, 2003; Wong and Lim, 1997), often seen in cellular voice, into the mobility standards. As a result, unoptimized Mobile IP handoffs can take a few seconds to perform, and degrade the quality of service in the process.
IP's transformation from a service supporting email and file transfer to the base layer for network convergence means that the constraints on handover performance are becoming much more stringent. Handovers cannot interrupt real-time services. The mechanisms and design principles needed for building optimized handovers in the context of mobile Internet services are poorly understood and need better analysis. To the best of our knowledge, none of the existing work has attempted to model the systems aspects of a mobility event nor was intended to systematically analyze the elementary operations involved in a mobility event. This body of work is also lacking in the ability to predict the performance of a mobility event. Some of the existing work has focused on optimizing only parts of a mobility event in an ad hoc manner, specific to a mobility protocol, without providing a comprehensive approach to solving the optimization problem in all layers or functional modules. We provide an overview of this related work for each of these mobility functions along with a detailed description of the proposed techniques in Chapter 6.
This book is intended to contribute to a general theory of optimized handover, especially with respect to the mobility of Internet-based applications. The contributions fall into four categories:
  1. Identification of fundamental properties that are rebound during a mobility event. Analysis of these properties provides a systematic framework for describing mobility management and the operations that are intrinsic to handover.
  2. A model of the handover process that allows one to predict performance both for an unoptimized handover and for specific optimization methodologies under conditions of resource constraints. This model also allows one to study behavioral properties of the handoff system such as data dependency and deadlocks.
  3. A series of optimization methodologies, experimental evaluations of them, and optimization techniques that can be applied to the link, network, and application layers and preserve the user experience by optimizing a handover.
  4. Application of the model to represent optimizations, and comparison of the results with experimental data.

1.1 Types of Mobility

There are several types of mobility, such as terminal mobility, personal mobility, session mobility, and service mobility. Schulzrinne and Wedlund (2000a) introduced several different types of mobility to support multimedia traffic for an IP-based network. We briefly review each type of mobility.

1.1.1 Terminal Mobility

Terminal mobility allows a device to move between networks while continuing to be reachable for incoming requests and maintaining existing sessions during movement. It allows an established call or session to continue when an MS (mobile station) moves from one cell to another without interruption in the call or session.
Terminal mobility may also arise from a change in the network condition, whereby a mobile may switch between two neighboring networks even without any movement. We describe here the types of terminal mobility that arise from different types of handoffs. Handoff, often also known as handover, is a process that results when a mobile disconnects from one point of attachment in a network and reconnects to another point of attachment in the same or a different network.
The handoff process can be either hard or soft. With hard handoff, the link to the prior base station is terminated before or as the user is transferred to the new cell's base station. Thus, the mobile is linked to no more than one base station at a given time. Initiation of the handoff may begin when the signal strength at the mobile received from the target base station is greater than that from the current base station. As the mobile moves into a new cell, its signal is abruptly handed over from its current cell (or base station) to the new one. In the old analog systems, hard handover could be heard as a click or a very short beep. In digital cellular systems, this is not noticed. However, in an IP-based handoff scenario, hard handover contributes 4–15 s of delay (Dutta et al., 2005c). With soft handoff (Wong and Lim, 1997), the MS continues to receive and accept radio signals from the base stations that are part of the previous as well as the new cell for a limited period of time. The MS signal is also received at multiple base stations. In order to ensure the layer 2 independence requirement of mobility management schemes, a maximum acceptable handoff time (MAHT) is required, which will vary based on the access type.
In an end-to-end wireless IP environment, four logical levels of handoff procedures can be defined:
  • Layer 2 handoff. This allows an MS to move from one layer 2 point of attachment to another layer 2 point of attachment that belongs to the same subnetwork. Each layer 2 point of attachment may be equippedwith same or a different type of radio access technology. One subnetwork may consist of multiple layer 2 radio access networks. The IP address of the mobile host remains the same during this handoff.
  • Subnet handoff. This allows an MS to move from a radio access network within a subnet to an adjacent radio access network within another subnet that belongs to the same administrative domain. The IP address of the mobile may or may not change.
  • Domain handoff. This allows an MS to move from one subnet within an administrative domain to another in a different administrative domain. Domain handoff can...

Inhaltsverzeichnis

Zitierstile für Mobility Protocols and Handover Optimization

APA 6 Citation

Dutta, A., & Schulzrinne, H. (2014). Mobility Protocols and Handover Optimization (1st ed.). Wiley. Retrieved from https://www.perlego.com/book/1011787/mobility-protocols-and-handover-optimization-design-evaluation-and-application-pdf (Original work published 2014)

Chicago Citation

Dutta, Ashutosh, and Henning Schulzrinne. (2014) 2014. Mobility Protocols and Handover Optimization. 1st ed. Wiley. https://www.perlego.com/book/1011787/mobility-protocols-and-handover-optimization-design-evaluation-and-application-pdf.

Harvard Citation

Dutta, A. and Schulzrinne, H. (2014) Mobility Protocols and Handover Optimization. 1st edn. Wiley. Available at: https://www.perlego.com/book/1011787/mobility-protocols-and-handover-optimization-design-evaluation-and-application-pdf (Accessed: 14 October 2022).

MLA 7 Citation

Dutta, Ashutosh, and Henning Schulzrinne. Mobility Protocols and Handover Optimization. 1st ed. Wiley, 2014. Web. 14 Oct. 2022.