Mobility Protocols and Handover Optimization
eBook - ePub

Mobility Protocols and Handover Optimization

Design, Evaluation and Application

Ashutosh Dutta, Henning Schulzrinne

  1. English
  2. ePUB (adapté aux mobiles)
  3. Disponible sur iOS et Android
eBook - ePub

Mobility Protocols and Handover Optimization

Design, Evaluation and Application

Ashutosh Dutta, Henning Schulzrinne

DĂ©tails du livre
Aperçu du livre
Table des matiĂšres
Citations

À propos de ce livre

This book provides a common framework for mobility management that considers the theoretical and practical aspects of systems optimization for mobile networks.

In this book, the authors show how an optimized system of mobility management can improve the quality of service in existing forms of mobile communication. Furthermore, they provide a theoretical approach to mobility management, as well as developing the model for systems optimization, including practical case studies using network layer and mobility layer protocols in different deployment scenarios. The authors also address the different ways in which the specific mobility protocol can be developed, taking into account numerous factors including security, configuration, authentication, quality of service, and movement patterns of the mobiles.

Key Features:

  • Defines and discusses a common set of optimization methodologies and their application to all mobility protocols for both IPv4 and IPv6 networks
  • Applies these technologies in the context of various layers: MAC layer, network layer, transport layer and application layer covering 802.11, LTE, WiMax, CDMA networks and protocols such as SIP, MIP, HIP, VoIP, and many more
  • Provides a thorough analysis of the required steps during a mobility event such as discovery, network selection, configuration, authentication, security association, encryption, binding update, and media direction
  • Includes models and tables illustrating the analysis of mobility management as well as architecture of sample wireless and mobility test beds built by the authors, involving inter-domain and intra-domain mobility scenarios

This book is an excellent resource forprofessionals and systems architects in charge of designing wireless networks for commercial (3G/4G), LTE, IMS, military and Ad Hoc environment. It will be useful deployment guide for the architects wireless service providers. Graduate students, researchers in industry and academia, and systems engineers will also find this book of interest.

Foire aux questions

Comment puis-je résilier mon abonnement ?
Il vous suffit de vous rendre dans la section compte dans paramĂštres et de cliquer sur « RĂ©silier l’abonnement ». C’est aussi simple que cela ! Une fois que vous aurez rĂ©siliĂ© votre abonnement, il restera actif pour le reste de la pĂ©riode pour laquelle vous avez payĂ©. DĂ©couvrez-en plus ici.
Puis-je / comment puis-je télécharger des livres ?
Pour le moment, tous nos livres en format ePub adaptĂ©s aux mobiles peuvent ĂȘtre tĂ©lĂ©chargĂ©s via l’application. La plupart de nos PDF sont Ă©galement disponibles en tĂ©lĂ©chargement et les autres seront tĂ©lĂ©chargeables trĂšs prochainement. DĂ©couvrez-en plus ici.
Quelle est la différence entre les formules tarifaires ?
Les deux abonnements vous donnent un accĂšs complet Ă  la bibliothĂšque et Ă  toutes les fonctionnalitĂ©s de Perlego. Les seules diffĂ©rences sont les tarifs ainsi que la pĂ©riode d’abonnement : avec l’abonnement annuel, vous Ă©conomiserez environ 30 % par rapport Ă  12 mois d’abonnement mensuel.
Qu’est-ce que Perlego ?
Nous sommes un service d’abonnement Ă  des ouvrages universitaires en ligne, oĂč vous pouvez accĂ©der Ă  toute une bibliothĂšque pour un prix infĂ©rieur Ă  celui d’un seul livre par mois. Avec plus d’un million de livres sur plus de 1 000 sujets, nous avons ce qu’il vous faut ! DĂ©couvrez-en plus ici.
Prenez-vous en charge la synthÚse vocale ?
Recherchez le symbole Écouter sur votre prochain livre pour voir si vous pouvez l’écouter. L’outil Écouter lit le texte Ă  haute voix pour vous, en surlignant le passage qui est en cours de lecture. Vous pouvez le mettre sur pause, l’accĂ©lĂ©rer ou le ralentir. DĂ©couvrez-en plus ici.
Est-ce que Mobility Protocols and Handover Optimization est un PDF/ePUB en ligne ?
Oui, vous pouvez accĂ©der Ă  Mobility Protocols and Handover Optimization par Ashutosh Dutta, Henning Schulzrinne en format PDF et/ou ePUB ainsi qu’à d’autres livres populaires dans Technology & Engineering et Electrical Engineering & Telecommunications. Nous disposons de plus d’un million d’ouvrages Ă  dĂ©couvrir dans notre catalogue.

Informations

Année
2014
ISBN
9781118825372

Chapter 1
Introduction

Wireless connectivity to communications and information has advanced the world towards ubiquitous computing. In the space of less than thirty years, cell phones have become ubiquitous and wireless data access has become common. However, this access has brought with it a variety of technical problems. Radio physics and power constraints, the need to reuse spectrum, economic constraints on facility placement, and service balkanization due to competitive and political factors force us to implement wireless systems as cells of limited range. Furthermore, cells may use very different wireless technologies or provide fundamentally different services, such as VoIP (Voice over IP), streaming, or direct short-range communications for telematics. We then need handoff mechanisms, often in multiple protocol layers, to allow a mobile terminal to move from cell to cell and maintain service continuity.
Mobility can be described as movement of a terminal, resulting in the release of the terminal's binding to the current cell (point of attachment to the network) and the establishment of bindings to the new cell being entered, while preserving the existing sessions associated with higher-level services. The cellular telephony community has long implemented service- and technology-specific mobility protocols that hand off voice sessions as the user moves from cell to cell. Because voice service quality is highly sensitive to service interruptions, cell-to-cell handoffs in a cellular environment have been highly optimized and are not noticed by the public. Tripathi et al. (1998) summarized some of the handoff technologies associated with cellular mobility. Pollini (1996) discussed some of the trends in handover design in cellular networks that may affect the optimization of handover performance.
For IP traffic, the IETF has defined mobility protocols for both IPv4 (Perkins, 2002b) and IPv6 (Johnson et al., 2004). However, IP traffic is dramatically more diverse than cellular voice in the range of link layer technologies used to support IP traffic, the number of economic units supplying IP services, and the authentication protocols and services running above IP. This diversity has meant that the IETF could not easily design access-specific handoff optimization techniques such as soft handoff (Chen and Mary, 2003; Wong and Lim, 1997), often seen in cellular voice, into the mobility standards. As a result, unoptimized Mobile IP handoffs can take a few seconds to perform, and degrade the quality of service in the process.
IP's transformation from a service supporting email and file transfer to the base layer for network convergence means that the constraints on handover performance are becoming much more stringent. Handovers cannot interrupt real-time services. The mechanisms and design principles needed for building optimized handovers in the context of mobile Internet services are poorly understood and need better analysis. To the best of our knowledge, none of the existing work has attempted to model the systems aspects of a mobility event nor was intended to systematically analyze the elementary operations involved in a mobility event. This body of work is also lacking in the ability to predict the performance of a mobility event. Some of the existing work has focused on optimizing only parts of a mobility event in an ad hoc manner, specific to a mobility protocol, without providing a comprehensive approach to solving the optimization problem in all layers or functional modules. We provide an overview of this related work for each of these mobility functions along with a detailed description of the proposed techniques in Chapter 6.
This book is intended to contribute to a general theory of optimized handover, especially with respect to the mobility of Internet-based applications. The contributions fall into four categories:
  1. Identification of fundamental properties that are rebound during a mobility event. Analysis of these properties provides a systematic framework for describing mobility management and the operations that are intrinsic to handover.
  2. A model of the handover process that allows one to predict performance both for an unoptimized handover and for specific optimization methodologies under conditions of resource constraints. This model also allows one to study behavioral properties of the handoff system such as data dependency and deadlocks.
  3. A series of optimization methodologies, experimental evaluations of them, and optimization techniques that can be applied to the link, network, and application layers and preserve the user experience by optimizing a handover.
  4. Application of the model to represent optimizations, and comparison of the results with experimental data.

1.1 Types of Mobility

There are several types of mobility, such as terminal mobility, personal mobility, session mobility, and service mobility. Schulzrinne and Wedlund (2000a) introduced several different types of mobility to support multimedia traffic for an IP-based network. We briefly review each type of mobility.

1.1.1 Terminal Mobility

Terminal mobility allows a device to move between networks while continuing to be reachable for incoming requests and maintaining existing sessions during movement. It allows an established call or session to continue when an MS (mobile station) moves from one cell to another without interruption in the call or session.
Terminal mobility may also arise from a change in the network condition, whereby a mobile may switch between two neighboring networks even without any movement. We describe here the types of terminal mobility that arise from different types of handoffs. Handoff, often also known as handover, is a process that results when a mobile disconnects from one point of attachment in a network and reconnects to another point of attachment in the same or a different network.
The handoff process can be either hard or soft. With hard handoff, the link to the prior base station is terminated before or as the user is transferred to the new cell's base station. Thus, the mobile is linked to no more than one base station at a given time. Initiation of the handoff may begin when the signal strength at the mobile received from the target base station is greater than that from the current base station. As the mobile moves into a new cell, its signal is abruptly handed over from its current cell (or base station) to the new one. In the old analog systems, hard handover could be heard as a click or a very short beep. In digital cellular systems, this is not noticed. However, in an IP-based handoff scenario, hard handover contributes 4–15 s of delay (Dutta et al., 2005c). With soft handoff (Wong and Lim, 1997), the MS continues to receive and accept radio signals from the base stations that are part of the previous as well as the new cell for a limited period of time. The MS signal is also received at multiple base stations. In order to ensure the layer 2 independence requirement of mobility management schemes, a maximum acceptable handoff time (MAHT) is required, which will vary based on the access type.
In an end-to-end wireless IP environment, four logical levels of handoff procedures can be defined:
  • Layer 2 handoff. This allows an MS to move from one layer 2 point of attachment to another layer 2 point of attachment that belongs to the same subnetwork. Each layer 2 point of attachment may be equippedwith same or a different type of radio access technology. One subnetwork may consist of multiple layer 2 radio access networks. The IP address of the mobile host remains the same during this handoff.
  • Subnet handoff. This allows an MS to move from a radio access network within a subnet to an adjacent radio access network within another subnet that belongs to the same administrative domain. The IP address of the mobile may or may not change.
  • Domain handoff. This allows an MS to move from one subnet within an administrative domain to another in a different administrative domain. Domain handoff can...

Table des matiĂšres

Normes de citation pour Mobility Protocols and Handover Optimization

APA 6 Citation

Dutta, A., & Schulzrinne, H. (2014). Mobility Protocols and Handover Optimization (1st ed.). Wiley. Retrieved from https://www.perlego.com/book/1011787/mobility-protocols-and-handover-optimization-design-evaluation-and-application-pdf (Original work published 2014)

Chicago Citation

Dutta, Ashutosh, and Henning Schulzrinne. (2014) 2014. Mobility Protocols and Handover Optimization. 1st ed. Wiley. https://www.perlego.com/book/1011787/mobility-protocols-and-handover-optimization-design-evaluation-and-application-pdf.

Harvard Citation

Dutta, A. and Schulzrinne, H. (2014) Mobility Protocols and Handover Optimization. 1st edn. Wiley. Available at: https://www.perlego.com/book/1011787/mobility-protocols-and-handover-optimization-design-evaluation-and-application-pdf (Accessed: 14 October 2022).

MLA 7 Citation

Dutta, Ashutosh, and Henning Schulzrinne. Mobility Protocols and Handover Optimization. 1st ed. Wiley, 2014. Web. 14 Oct. 2022.