• Title/Summary/Keyword: 멀티캐스트 핸드오프

Search Result 56, Processing Time 0.022 seconds

Handoff Control Algorithm for Mobile Hosts in the Internet Multicast Environments (인터넷 멀티캐스트 환경에서의 이동 단말을 위한 핸드오프 제어 방안)

  • Son, Ji-Yeon;Won, Yu-Jae;Park, Jun-Seok;Kim, Myeong-Gyu;Hwang, Seung-Gu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2649-2658
    • /
    • 1999
  • This paper proposes a new solution to support Internet Multicast for mobile hosts. The proposed algorithm is based on the remote subscription approach of IETF Mobile IP that mobile node re-subscribes to its desired multicast groups while at a foreign network. In addition, we adopt the bi-directional tunneling to minimize the disruption of multicast service due to movement of a host from network to another. This paper also analyzes the handoff latencies and data packet loss amount of our algorithm and compares to other approaches. Our analysis shows that the proposed algorithm has good robustness, scalability and routing efficiency.

  • PDF

A Policy of Movement Support for Multimedia Multicast Service in Wireless Network (무선 네트워크 환경에서 멀티미디어 멀티캐스트 서비스를 위한 이동성 지원 기법)

  • 이화세;홍은경;이승원;박성호;정기동
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.6
    • /
    • pp.1034-1045
    • /
    • 2003
  • In this paper, we study a multicast transport technique for multimedia services of mobile hosts in wireless network environments. To reduce packet loss during hand-off, we propose a Pre-join scheme in overlapped area and a Buffering scheme in crossover routers. To support seamless service in real time multimedia application, these scheme use an optimal path routing which was provided in remote subscription scheme and a prediction scheme of host movements which was considered overlapped area. To evaluate the peformance of our scheme, we compare Bi-direction tunneling of mobile If, Remote subscription, and MoM by using NS-2. As a result, our scheme shows better performance in network overhead, packet loss and bandwidth's use than other schemes.

  • PDF

The Design and Evaluation of Mobile Multicasting Protocol in 3-Tiered Mobile Computing Environment (3-계층 이동 컴퓨팅 환경에서 이동 멀티캐스팅 프로토콜의 설계 및 평가)

  • 김재수;박규석
    • Journal of Korea Multimedia Society
    • /
    • v.1 no.1
    • /
    • pp.120-129
    • /
    • 1998
  • The mobile computing is a new network environment that support s wireless network connection seamless while the portable computer is moving. This environment involves the problem of re-establishing of new network connection. The mobile computing should provide multicasting service, because multicasting is widely-used application service which delivers messages to the members of the groups. In this paper, we proposed 3-tiered mobile multicasting protocol that transfers multicast packets efficiently and reliablely. Also, we analyzed the performance of 3-tiered mobile multicasting protocol comparing with other mechanism. Our protocol is superior to other mechanism in the aspects of the handoff costs and packet delivery costs.

  • PDF

A Study on Information Exchange Scheme for Reliability in the Wireless Multicasting (무선 멀티캐스팅에서 신뢰성을 위한 정보 교환 기법에 관한 연구)

  • Im, Ji-Yeong;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.247-256
    • /
    • 2002
  • In a wireless multicasting when a mobile host moves to the new bate station being in the same multicast group it needs to exchange information about data delivery between base stations to receive data from the new base station at once. However it is inefficient to use the existence schemes because it takes too much time to exchange information and many overheads. The next, a mobile host moving to the base station not being in the same multicast group, the old base station will pre-forward data to neighboring base stations to avoid transmission delay. However, if other mobile hosts move at short interval, the old base station may retransmit the same data to the same neighboring base stations. In this paper we proposed called Information Exchange Scheme (IES). In IES in the same multicast grope the base stations exchange information locally so it takes the minimum time and overheads to use IES. Also in IES the neighboring base stations delay to delete data for continuous moving of other MHs. We also present how our scheme is efficient by producing cost ad simulating.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

A Performance Analysis of the Virtual CellSystem for Mobile Hosts (이동 호스트를 위한 가상 셀 시스템의 성능 분석)

  • Lim, Kyung-Shik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.10
    • /
    • pp.2627-2640
    • /
    • 1998
  • In this paper, we analyze the performance of the virtual cell system[1] for the transmission of IP datagrams in mobile computer communications. A virtual cell consistsof a group of physical cells shose base stationsl are implemented b recote bridges and interconnected via high speed datagram packet switched networks. Host mobility is supported at the data link layer using the distributed hierachical location information of mobile hosts. Given mobility and communication ptems among physical cells, the problem of deploying virtual cells is equivalent to the optimization cost for the entire system where interclster communication is more expesive than intracluster communication[2]. Once an iptimal partitionof disjoint clusters is obtained, we deploy the virtual cell system according to the topology of the optimal partition such that each virtual cell correspods to a cluser. To analyze the performance of the virtual cell system, we adopt a BCMP open multipel class queueing network model. In addition to mobility and communication patterns, among physical cells, the topology of the virtual cell system is used to determine service transition probabilities of the queueing network model. With various system parameters, we conduct interesting sensitivity analyses to determine network design tradeoffs. The first application of the proposed model is to determine an adequate network bandwidth for base station networking such that the networks would not become an bottleneck. We also evaluate the network vlilization and system response time due to various types of messages. For instance, when the mobile hosts begin moving fast, the migration rate will be increased. This results of the performance analysis provide a good evidence in demonsratc the sysem effciency under different assumptions of mobility and communication patterns.

  • PDF