Mobility Protocols and Handover Optimization
Design, Evaluation and Application
Inbunden, Engelska, 2014
1 939 kr
Produktinformation
- Utgivningsdatum2014-05-07
- Mått175 x 252 x 28 mm
- Vikt885 g
- FormatInbunden
- SpråkEngelska
- SerieIEEE Press
- Antal sidor480
- FörlagJohn Wiley & Sons Inc
- ISBN9780470740583
Tillhör följande kategorier
Dr. Ashutosh DuttaDr. Ashutosh Dutta obtained his Ph.D. in EE from Columbia University, M.S. in Computer Science from NJIT, USA and BSEE from NIT, Rourkela, India. As a seasoned mobility and security architect and an accomplished networking and computer science expert with 20-plus years experience, Ashutosh directed multiple IT operations, led the research and development for leading global technology corporations and top university and has in-depth expertise in developing and implementing research, analysis and design initiatives.His career spanning 25 years includes LMTS (Lead Member of Technical Staff) at AT&T, NJ; CTO Wireless at NIKSUN, NJ; Senior Scientist in Telcordia Technologies, NJ; CRF Director at Columbia University, NY and Computer Engineer with TATA Motors, India. Ashutosh’s research interests include wireless Internet, multimedia signaling, mobility management, 4G networks, IMS (IP Multimedia Subsystems), VoIP and session control protocols. He has published more than 80 conference, journal papers and Internet drafts, three book chapters, and has given tutorials in mobility management at various conferences. Ashutosh has 19 issued security and mobility related US patents.Ashutosh is a senior member of IEEE and ACM. He has served as an IEEE volunteer and leader at the section, region, chapter, society, MGA, and EAB level. Ashutosh is recipient of the 2009 IEEE Region 1, IEEE MGA and 2010 IEEE-USA Leadership Awards.Prof. Henning SchulzrinneProf. Henning Schulzrinne, Levi Professor of Computer Science at Columbia University, received his Ph.D. from the University of Massachusetts in Amherst, Massachusetts. He was an MTS at AT&T Bell Laboratories and an associate department head at GMD-Fokus (Berlin), before joining the Computer Science and Electrical Engineering departments at Columbia University. He served as chair of the Department of Computer Science from 2004 to 2009, as Engineering Fellow at the US Federal Communications Commission (FCC) in 2010 and 2011, and as Chief Technology Officer at the FCC since 2012.He has published more than 250 journal and conference papers, and more than 70 Internet RFCs. Protocols co-developed by him, such as RTP, RTSP and SIP, are now Internet standards, used by almost all Internet telephony and multimedia applications. His research interests include Internet multimedia systems, ubiquitous computing, and mobile systems.He is a Fellow of the IEEE, has received the New York City Mayor's Award for Excellence in Science and Technology, the VON Pioneer Award, TCCC service award, the IEEE Region 1 William Terry Award for Lifetime Distinguished Service to IEEE and the UMass Computer Science Outstanding Alumni recognition.
- About the Authors xvForeword xviiPreface xixAcknowledgements xxiiiList of Abbreviations xxv1 Introduction 11.1 Types of Mobility 21.1.1 Terminal Mobility 21.1.2 Personal Mobility 51.1.3 Session Mobility 61.1.4 Service Mobility 71.2 Performance Requirements 71.3 Motivation 81.4 Summary of Key Contributions 92 Analysis of Mobility Protocols for Multimedia 132.1 Summary of Key Contributions and Indicative Results 132.2 Introduction 142.3 Cellular 1G 152.3.1 System Architecture 152.3.2 Handoff Procedure 172.4 Cellular 2G Mobility 172.4.1 GSM 172.4.2 IS-95 192.5 Cellular 3G Mobility 232.5.1 WCDMA 242.5.2 CDMA2000 262.6 4G Networks 272.6.1 Evolved Packet System 282.6.2 WiMAX Mobility 312.7 IP-Based Mobility 342.7.1 Network Layer Macromobility 342.7.2 Network Layer Micromobility 402.7.3 NETMOB: Network Mobility 462.7.4 Transport Layer Mobility 492.7.5 Application Layer Mobility 492.7.6 Host Identity Protocol 502.7.7 MOBIKE 522.7.8 IAPP 532.8 Heterogeneous Handover 552.8.1 UMTS–WLAN Handover 552.8.2 LTE–WLAN Handover 582.9 Multicast Mobility 612.10 Concluding Remarks 713 Systems Analysis of Mobility Events 733.1 Summary of Key Contributions and Indicative Results 753.2 Introduction 753.2.1 Comparative Analysis of Mobility Protocols 773.3 Analysis of Handoff Components 783.3.1 Network Discovery and Selection 803.3.2 Network Attachment 803.3.3 Configuration 813.3.4 Security Association 813.3.5 Binding Update 823.3.6 Media Rerouting 833.4 Effect of Handoff across Layers 833.4.1 Layer 2 Delay 843.4.2 Layer 3 Delay 843.4.3 Application Layer Delay 853.4.4 Handoff Operations across Layers 853.5 Concluding Remarks 904 Modeling Mobility 914.1 Summary of Key Contributions and Indicative Results 914.2 Introduction 924.3 Related Work 924.4 Modeling Mobility as a Discrete-Event Dynamic System 934.5 Petri Net Primitives 944.6 Petri-Net-Based Modeling Methodologies 964.7 Resource Utilization during Handoff 974.8 Data Dependency Analysis of the Handoff Process 994.8.1 Petri-Net-Based Data Dependency 994.8.2 Analysis of Data Dependency during Handoff Process 1004.9 Petri Net Model for Handoff 1054.10 Petri-Net-Based Analysis of Handoff Event 1134.10.1 Analysis of Deadlocks in Handoff 1144.10.2 Reachability Analysis 1204.10.3 Matrix Equations 1224.11 Evaluation of Systems Performance Using Petri Nets 1234.11.1 Cycle-Time-Based Approach 1234.11.2 Floyd-Algorithm-Based Approach 1244.11.3 Resource–Time Product Approach 1254.12 Opportunities for Optimization 1284.12.1 Analysis of Parallelism in Handoff Operations 1294.12.2 Opportunities for Proactive Operation 1294.13 Concluding Remarks 1305 Layer 2 Optimization 1315.1 Introduction 1315.2 Related Work 1315.3 IEEE 802.11 Standards 1325.3.1 The IEEE 802.11 Wireless LAN Architecture 1335.3.2 IEEE 802.11 Management Frames 1345.4 Handoff Procedure with Active Scanning 1355.4.1 Steps during Handoff 1355.5 Fast-Handoff Algorithm 1375.5.1 Selective Scanning 1375.5.2 Caching 1385.6 Implementation 1425.6.1 The HostAP Driver 1425.7 Measurements 1425.7.1 Experimental Setup 1425.7.2 The Environment 1425.7.3 Experiments 1435.8 Measurement Results 1435.8.1 Handoff Time 1435.8.2 Packet Loss 1435.9 Conclusions and Future Work 1466 Mobility Optimization Techniques 1496.1 Summary of Key Contributions and Indicative Results 1496.1.1 Discovery 1496.1.2 Authentication 1506.1.3 Layer 3 Configuration 1516.1.4 Layer 3 Security Association 1526.1.5 Binding Update 1526.1.6 Media Rerouting 1536.1.7 Route Optimization 1546.1.8 Media-Independent Cross-Layer Triggers 1556.2 Introduction 1566.3 Discovery 1566.3.1 Key Principles 1566.3.2 Related Work 1576.3.3 Application Layer Discovery 1586.3.4 Experimental Results and Analysis 1616.4 Authentication 1646.4.1 Key Principles 1666.4.2 Related Work 1666.4.3 Network-Layer-Assisted Preauthentication 1696.4.4 Experimental Results and Analysis 1736.5 Layer 3 Configuration 1776.5.1 Key Principles 1796.5.2 Related Work 1806.5.3 Router-Assisted Duplicate Address Detection 1806.5.4 Proactive IP Address Configuration 1806.5.5 Experimental Results and Analysis 1836.6 Layer 3 Security Association 1836.6.1 Key Principles 1846.6.2 Related Work 1846.6.3 Anchor-Assisted Security Association 1846.6.4 Experimental Results and Analysis 1876.7 Binding Update 1906.7.1 Key Principles 1916.7.2 Related Work 1916.7.3 Hierarchical Binding Update 1926.7.4 Experimental Results and Analysis 1956.7.5 Proactive Binding Update 1996.8 Media Rerouting 1996.8.1 Key Principles 2006.8.2 Related Work 2006.8.3 Data Redirection Using Forwarding Agent 2016.8.4 Mobility-Proxy-Assisted Time-Bound Data Redirection 2026.8.5 Time-Bound Localized Multicasting 2056.9 Media Buffering 2106.9.1 Key Principles 2116.9.2 Related Work 2116.9.3 Protocol for Edge Buffering 2126.9.4 Experimental Results and Analysis 2156.9.5 Analysis of the Trade-off between Buffering Delay and Packet Loss 2196.10 Route Optimization 2206.10.1 Key Principles 2216.10.2 Related Work 2216.10.3 Maintaining a Direct Path by Application Layer Mobility 2216.10.4 Interceptor-Assisted Packet Modifier at the End Point 2226.10.5 Intercepting Proxy-Assisted Route Optimization 2246.10.6 Cost Analysis and Experimental Analysis 2266.10.7 Binding-Cache-Based Route Optimization 2296.11 Media-Independent Cross-Layer Triggers 2326.11.1 Key Principles 2326.11.2 Related Work 2326.11.3 Media Independent Handover Function 2336.11.4 Faster Link-Down Detection Scheme 2386.12 Concluding Remarks 2417 Optimization with Multilayer Mobility Protocols 2437.1 Summary of Key Contributions and Indicative Results 2437.2 Introduction 2447.3 Key Principles 2457.4 Related Work 2457.5 Multilayer Mobility Approach 2467.5.1 Policy-Based Mobility Protocols: SIP and MIP-LR 2477.5.2 Integration of SIP and MIP-LR with MMP 2487.5.3 Integration of Global Mobility Protocol with Micromobility Protocol 2507.5.4 Implementation of Multilayer Mobility Protocols 2507.5.5 Implementation and Performance Issues 2527.6 Concluding Remarks 2558 Optimizations for Simultaneous Mobility 2578.1 Summary of Key Contributions and Indicative Results 2578.2 Introduction 2588.2.1 Analysis of Simultaneous Mobility 2588.3 Illustration of the Simultaneous Mobility Problem 2608.4 Related Work 2628.5 Key Optimization Techniques 2628.6 Analytical Framework 2628.6.1 Fundamental Concepts 2628.6.2 Handoff Sequences 2638.6.3 Binding Updates 2648.6.4 Location Proxies and Binding Update Proxies 2658.7 Analyzing the Simultaneous Mobility Problem 2678.8 Probability of Simultaneous Mobility 2708.9 Solutions 2728.9.1 Soft Handoff 2738.9.2 Receiver-Side Mechanisms 2738.9.3 Sender-Side Mechanisms 2758.10 Application of Solution Mechanisms 2768.10.1 Mobile IPv6 2778.10.2 MIP-LR 2798.10.3 SIP-Based Mobility 2808.11 Concluding Remarks 2829 Handoff Optimization for Multicast Streaming 2859.1 Summary of Key Contributions and Indicative Results 2859.2 Introduction 2869.3 Key Principles 2899.4 Related Work 2909.5 Mobility in a Hierarchical Multicast Architecture 2919.5.1 Channel Announcement 2939.5.2 Channel Management 2939.5.3 Channel Tuning 2939.5.4 Local Advertisement Insertion 2949.5.5 Channel Monitor 2949.5.6 Security 2959.6 Optimization Techniques for Multicast Media Delivery 2969.6.1 Reactive Triggering 2969.6.2 Proactive Triggering 2979.6.3 Triggering during Configuration of a Mobile 2989.7 Experimental Results and Performance Analysis 2999.7.1 Experimental Results 2999.7.2 Performance Analysis 3029.8 Concluding Remarks 30510 Cooperative Roaming 30710.1 Introduction 30710.2 Related Work 30910.3 IP Multicast Addressing 31010.4 Cooperative Roaming 31110.4.1 Overview 31110.4.2 L2 Cooperation Protocol 31210.4.3 L3 Cooperation Protocol 31310.5 Cooperative Authentication 31410.5.1 Overview of IEEE 802.1x 31410.5.2 Cooperation in the Authentication Process 31510.5.3 Relay Process 31610.6 Security 31810.6.1 Security Issues in Roaming 31810.6.2 Cooperative Authentication and Security 31910.7 Streaming Media Support 32010.8 Bandwidth and Energy Usage 32010.9 Experiments 32110.9.1 Environment 32110.9.2 Implementation Details 32210.9.3 Experimental Setup 32210.9.4 Results 32310.10 Application Layer Mobility 32810.11 Load Balancing 32910.12 Multicast and Scalability 33010.13 An Alternative to Multicast 33010.14 Conclusions and Future Work 33111 System Evaluation 33311.1 Summary of Key Contributions and Indicative Results 33311.2 Introduction 33411.3 Experimental Validation 33411.3.1 The Media Independent Preauthentication Framework 33411.3.2 Intratechnology Handoff 33811.3.3 Intertechnology Handoff 34011.3.4 Cross-Layer-Trigger-Assisted Preauthentication 34211.3.5 Mobile-Initiated Handover with 802.21 Triggers 34411.3.6 Network-Initiated Handover with 802.21 Triggers 34511.3.7 Handover Preparation Time 34611.4 Handoff Optimization in IP Multimedia Subsystem 35011.4.1 Nonoptimized Handoff Mode 35011.4.2 Optimization with Reactive Context Transfer 35111.4.3 Optimization with Proactive Security Context Transfer 35211.4.4 Performance Results 35311.5 Systems Validation Using Petri-Net-Based Models 35511.5.1 MATLAB®-Based Modeling of Handoff Functions 35611.5.2 Petri-Net-Based Model for Optimized Security Association 36011.5.3 Petri-Net-Based Model for Hierarchical Binding Update 36111.5.4 Petri-Net-Based Model for Media Redirection of In-Flight Data 36211.5.5 Petri-Net-Based Model of Optimized Configuration 36411.5.6 Petri-Net-Based Model for Multicast Mobility 36411.6 Scheduling Handoff Operations 36511.6.1 Sequential Scheduling 36611.6.2 Concurrent Scheduling 36811.6.3 Proactive Scheduling 36811.7 Verification of Systems Performance 36911.7.1 Cycle-Time-Based Approach 36911.7.2 Using the Floyd Algorithm 37011.8 Petri-Net-Based Modeling for Multi-Interface Mobility 37111.8.1 Multihoming Scenario 37111.8.2 Break-Before-Make Scenario 37211.8.3 Make-Before-Break Scenario 37211.8.4 MATLAB®-Based Petri Net Modeling for Multi-Interface Mobility 37211.9 Deadlocks in Handoff Scheduling 37411.9.1 Handoff Schedules with Deadlocks 37511.9.2 Deadlock Prevention and Avoidance in Handoff Schedules 37711.10 Analysis of Level of Concurrency and Resources 38011.11 Trade-off Analysis for Proactive Handoff 38511.12 Concluding Remarks 38912 Conclusions 39112.1 General Principles of Mobility Optimization 39112.2 Summary of Contributions 39312.3 Future Work 394A RDF Schema for Application Layer Discovery 395A.1 Schema Primitives 395B Definitions of Mobility-Related Terms 399References 409Index 425
“It is a recommended resource for graduate students, researchers, and IT professionals interested in the study of handoff management.” (IEEE Communications Magazine, 1 April 2015)