Mobility Protocols and Handover Optimization
eBook - ePub

Mobility Protocols and Handover Optimization

Design, Evaluation and Application

Ashutosh Dutta, Henning Schulzrinne

Compartir libro
  1. English
  2. ePUB (apto para móviles)
  3. Disponible en iOS y Android
eBook - ePub

Mobility Protocols and Handover Optimization

Design, Evaluation and Application

Ashutosh Dutta, Henning Schulzrinne

Detalles del libro
Vista previa del libro
Índice
Citas

Información del libro

This book provides a common framework for mobility management that considers the theoretical and practical aspects of systems optimization for mobile networks.

In this book, the authors show how an optimized system of mobility management can improve the quality of service in existing forms of mobile communication. Furthermore, they provide a theoretical approach to mobility management, as well as developing the model for systems optimization, including practical case studies using network layer and mobility layer protocols in different deployment scenarios. The authors also address the different ways in which the specific mobility protocol can be developed, taking into account numerous factors including security, configuration, authentication, quality of service, and movement patterns of the mobiles.

Key Features:

  • Defines and discusses a common set of optimization methodologies and their application to all mobility protocols for both IPv4 and IPv6 networks
  • Applies these technologies in the context of various layers: MAC layer, network layer, transport layer and application layer covering 802.11, LTE, WiMax, CDMA networks and protocols such as SIP, MIP, HIP, VoIP, and many more
  • Provides a thorough analysis of the required steps during a mobility event such as discovery, network selection, configuration, authentication, security association, encryption, binding update, and media direction
  • Includes models and tables illustrating the analysis of mobility management as well as architecture of sample wireless and mobility test beds built by the authors, involving inter-domain and intra-domain mobility scenarios

This book is an excellent resource forprofessionals and systems architects in charge of designing wireless networks for commercial (3G/4G), LTE, IMS, military and Ad Hoc environment. It will be useful deployment guide for the architects wireless service providers. Graduate students, researchers in industry and academia, and systems engineers will also find this book of interest.

Preguntas frecuentes

¿Cómo cancelo mi suscripción?
Simplemente, dirígete a la sección ajustes de la cuenta y haz clic en «Cancelar suscripción». Así de sencillo. Después de cancelar tu suscripción, esta permanecerá activa el tiempo restante que hayas pagado. Obtén más información aquí.
¿Cómo descargo los libros?
Por el momento, todos nuestros libros ePub adaptables a dispositivos móviles se pueden descargar a través de la aplicación. La mayor parte de nuestros PDF también se puede descargar y ya estamos trabajando para que el resto también sea descargable. Obtén más información aquí.
¿En qué se diferencian los planes de precios?
Ambos planes te permiten acceder por completo a la biblioteca y a todas las funciones de Perlego. Las únicas diferencias son el precio y el período de suscripción: con el plan anual ahorrarás en torno a un 30 % en comparación con 12 meses de un plan mensual.
¿Qué es Perlego?
Somos un servicio de suscripción de libros de texto en línea que te permite acceder a toda una biblioteca en línea por menos de lo que cuesta un libro al mes. Con más de un millón de libros sobre más de 1000 categorías, ¡tenemos todo lo que necesitas! Obtén más información aquí.
¿Perlego ofrece la función de texto a voz?
Busca el símbolo de lectura en voz alta en tu próximo libro para ver si puedes escucharlo. La herramienta de lectura en voz alta lee el texto en voz alta por ti, resaltando el texto a medida que se lee. Puedes pausarla, acelerarla y ralentizarla. Obtén más información aquí.
¿Es Mobility Protocols and Handover Optimization un PDF/ePUB en línea?
Sí, puedes acceder a Mobility Protocols and Handover Optimization de Ashutosh Dutta, Henning Schulzrinne en formato PDF o ePUB, así como a otros libros populares de Technik & Maschinenbau y Elektrotechnik & Telekommunikation. Tenemos más de un millón de libros disponibles en nuestro catálogo para que explores.

Información

Año
2014
ISBN
9781118825372

Chapter 1
Introduction

Wireless connectivity to communications and information has advanced the world towards ubiquitous computing. In the space of less than thirty years, cell phones have become ubiquitous and wireless data access has become common. However, this access has brought with it a variety of technical problems. Radio physics and power constraints, the need to reuse spectrum, economic constraints on facility placement, and service balkanization due to competitive and political factors force us to implement wireless systems as cells of limited range. Furthermore, cells may use very different wireless technologies or provide fundamentally different services, such as VoIP (Voice over IP), streaming, or direct short-range communications for telematics. We then need handoff mechanisms, often in multiple protocol layers, to allow a mobile terminal to move from cell to cell and maintain service continuity.
Mobility can be described as movement of a terminal, resulting in the release of the terminal's binding to the current cell (point of attachment to the network) and the establishment of bindings to the new cell being entered, while preserving the existing sessions associated with higher-level services. The cellular telephony community has long implemented service- and technology-specific mobility protocols that hand off voice sessions as the user moves from cell to cell. Because voice service quality is highly sensitive to service interruptions, cell-to-cell handoffs in a cellular environment have been highly optimized and are not noticed by the public. Tripathi et al. (1998) summarized some of the handoff technologies associated with cellular mobility. Pollini (1996) discussed some of the trends in handover design in cellular networks that may affect the optimization of handover performance.
For IP traffic, the IETF has defined mobility protocols for both IPv4 (Perkins, 2002b) and IPv6 (Johnson et al., 2004). However, IP traffic is dramatically more diverse than cellular voice in the range of link layer technologies used to support IP traffic, the number of economic units supplying IP services, and the authentication protocols and services running above IP. This diversity has meant that the IETF could not easily design access-specific handoff optimization techniques such as soft handoff (Chen and Mary, 2003; Wong and Lim, 1997), often seen in cellular voice, into the mobility standards. As a result, unoptimized Mobile IP handoffs can take a few seconds to perform, and degrade the quality of service in the process.
IP's transformation from a service supporting email and file transfer to the base layer for network convergence means that the constraints on handover performance are becoming much more stringent. Handovers cannot interrupt real-time services. The mechanisms and design principles needed for building optimized handovers in the context of mobile Internet services are poorly understood and need better analysis. To the best of our knowledge, none of the existing work has attempted to model the systems aspects of a mobility event nor was intended to systematically analyze the elementary operations involved in a mobility event. This body of work is also lacking in the ability to predict the performance of a mobility event. Some of the existing work has focused on optimizing only parts of a mobility event in an ad hoc manner, specific to a mobility protocol, without providing a comprehensive approach to solving the optimization problem in all layers or functional modules. We provide an overview of this related work for each of these mobility functions along with a detailed description of the proposed techniques in Chapter 6.
This book is intended to contribute to a general theory of optimized handover, especially with respect to the mobility of Internet-based applications. The contributions fall into four categories:
  1. Identification of fundamental properties that are rebound during a mobility event. Analysis of these properties provides a systematic framework for describing mobility management and the operations that are intrinsic to handover.
  2. A model of the handover process that allows one to predict performance both for an unoptimized handover and for specific optimization methodologies under conditions of resource constraints. This model also allows one to study behavioral properties of the handoff system such as data dependency and deadlocks.
  3. A series of optimization methodologies, experimental evaluations of them, and optimization techniques that can be applied to the link, network, and application layers and preserve the user experience by optimizing a handover.
  4. Application of the model to represent optimizations, and comparison of the results with experimental data.

1.1 Types of Mobility

There are several types of mobility, such as terminal mobility, personal mobility, session mobility, and service mobility. Schulzrinne and Wedlund (2000a) introduced several different types of mobility to support multimedia traffic for an IP-based network. We briefly review each type of mobility.

1.1.1 Terminal Mobility

Terminal mobility allows a device to move between networks while continuing to be reachable for incoming requests and maintaining existing sessions during movement. It allows an established call or session to continue when an MS (mobile station) moves from one cell to another without interruption in the call or session.
Terminal mobility may also arise from a change in the network condition, whereby a mobile may switch between two neighboring networks even without any movement. We describe here the types of terminal mobility that arise from different types of handoffs. Handoff, often also known as handover, is a process that results when a mobile disconnects from one point of attachment in a network and reconnects to another point of attachment in the same or a different network.
The handoff process can be either hard or soft. With hard handoff, the link to the prior base station is terminated before or as the user is transferred to the new cell's base station. Thus, the mobile is linked to no more than one base station at a given time. Initiation of the handoff may begin when the signal strength at the mobile received from the target base station is greater than that from the current base station. As the mobile moves into a new cell, its signal is abruptly handed over from its current cell (or base station) to the new one. In the old analog systems, hard handover could be heard as a click or a very short beep. In digital cellular systems, this is not noticed. However, in an IP-based handoff scenario, hard handover contributes 4–15 s of delay (Dutta et al., 2005c). With soft handoff (Wong and Lim, 1997), the MS continues to receive and accept radio signals from the base stations that are part of the previous as well as the new cell for a limited period of time. The MS signal is also received at multiple base stations. In order to ensure the layer 2 independence requirement of mobility management schemes, a maximum acceptable handoff time (MAHT) is required, which will vary based on the access type.
In an end-to-end wireless IP environment, four logical levels of handoff procedures can be defined:
  • Layer 2 handoff. This allows an MS to move from one layer 2 point of attachment to another layer 2 point of attachment that belongs to the same subnetwork. Each layer 2 point of attachment may be equippedwith same or a different type of radio access technology. One subnetwork may consist of multiple layer 2 radio access networks. The IP address of the mobile host remains the same during this handoff.
  • Subnet handoff. This allows an MS to move from a radio access network within a subnet to an adjacent radio access network within another subnet that belongs to the same administrative domain. The IP address of the mobile may or may not change.
  • Domain handoff. This allows an MS to move from one subnet within an administrative domain to another in a different administrative domain. Domain handoff can...

Índice