• Title/Summary/Keyword: Handover scheme

Search Result 325, Processing Time 0.023 seconds

Loop Cancellation and Path Optimization of Path Extension Handover in a Wireless ATM LAN (무선 ATM LAN 환경에서 경로 확장 기법의 루프 제거 및 경로 최적화 알고리즘 연구)

  • 최우진;박영근
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.5A
    • /
    • pp.602-610
    • /
    • 2000
  • There has been increasing interest in broadband services to mobile terminals. Wireless ATM will be used to support broadband services for future generation mobile service. We propose an algorithm for handover in wireless ATM LANs. We have studied how to treat the loop cancellation and optimization of path extension handover scheme, and present path optimization algorithms : polyangular loop cancellation and triangular loop cancellation. We express the location of MT(mobile terminal) by direction angle, and the direction angles can be converted into direction vectors. Using direction vectors, we can find the current optimal path of MT. The analysis and the experimental results show that the proposed scheme provides the better performance than that of anchor rerouting scheme in average handover delay, handover disruption delay, and buffer requirements.

  • PDF

Call Admission Control Based on Adaptive Bandwidth Allocation for Wireless Networks

  • Chowdhury, Mostafa Zaman;Jang, Yeong Min;Haas, Zygmunt J.
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.15-24
    • /
    • 2013
  • Provisioning of quality of service (QoS) is a key issue in any multi-media system. However, in wireless systems, supporting QoS requirements of different traffic types is a more challenging problem due to the need to simultaneously minimize two performance metrics - the probability of dropping a handover call and the probability of blocking a new call. Since QoS requirements are not as stringent for non-real-time traffic, as opposed to real-time traffic, more calls can be accommodated by releasing some bandwidth from the already admitted non-real-time traffic calls. If the released bandwidth that is used to handle handover calls is larger than the released bandwidth that is used for new calls, then the resulting probability of dropping a handover call is smaller than the probability of blocking a new call. In this paper, we propose an efficient call admission control algorithm that relies on adaptive multi-level bandwidth-allocation scheme for non-realtime calls. The scheme allows reduction of the call dropping probability, along with an increase in the bandwidth utilization. The numerical results show that the proposed scheme is capable of attaining negligible handover call dropping probability without sacrificing bandwidth utilization.

A novel ID-based multi-domain handover protocol for mesh points in WMNs

  • Zhang, Xue;Li, Guangsong;Han, Wenbao;Ji, Huifang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2512-2529
    • /
    • 2015
  • Wireless mesh networks (WMNs) provide an efficient and flexible method to the field of wireless networking, but also bring many security issues. A mesh point may lose all of its available links during its movement. Thus, the mesh point needs to handover to a new mesh point in order to obtain access to the network again. For multi-domain WMNs, we proposed a new ID-based signcryption scheme and accordingly present a novel ID-based handover protocol for mesh points. The mutual authentication and key establishment of two mesh points which belong to different trust domains can be achieved by using a single one-round message exchange during the authentication phase. The authentication server is not involved in our handover authentication protocol so that mutual authentication can be completed directly by the mesh points. Meanwhile, the data transmitted between the two mesh points can be carried by the authentication messages. Moreover, there are no restrictions on the PKG system parameters in our proposed multi-domain ID-based signcryption scheme so our handover scheme can be easily applied to real WMNs circumstances. Security of the signcryption scheme is proved in the random oracle model. It shows that our protocol satisfies the basic security requirements and is resistant to existing attacks based on the security of the signcryption. The analysis of the performance demonstrates that the protocol is efficient and suitable for the multi-domain WMNs environment.

A Handover Management Scheme Based on User-Preferences and Network-Centric Approach

  • Khan, Murad;Park, Gisu;Cho, Wooseong;Seong, Gihyuk;Han, Kijun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.344-357
    • /
    • 2015
  • With the increase in a number of access technologies and data rates, a continuous connection among different networks is demand of the future wireless networks. In the last decade, user connectivity among different access networks remained a challenging job. Therefore, in this article, we proposed a user-centric and user-perspective based network selection mechanism for fast handover management in heterogeneous wireless networks. The proposed scheme selects the most appropriate network among available networks on the basis of resources i.e. cost, data rate, and link quality. Initially, we load the Media Independent Information Service (MIIS) with the information of cost and data rate provided by different network operators. Similarly, Mobile Node (MN) is also loaded with the user preferred cost and data rate for different applications. The MN obtains the information of cost and data rate from MIIS server upon a predefined threshold, and make a decision for handover according to its current cost and data rate. Furthermore, we employ an optimal threshold mechanism for initiation of the handover execution phase to minimize false handover indications. The proposed scheme is based on a survey for network selection and its implementation in C programming language to validate its performance and accuracy. The simulation result shows that the proposed scheme performs superior then the schemes present in the current literature.

Optimal Vertical Handover Control Policies for Cooperative Wireless Networks

  • Papadaki, Katerina;Friderikos, Vasilis
    • Journal of Communications and Networks
    • /
    • v.8 no.4
    • /
    • pp.442-450
    • /
    • 2006
  • Inter-operability between heterogeneous radio access technologies (RATs), in the sense of seamless vertical han-dover (VHO) support with common radio resource management (CRRM) functionalities, has recently attracted a significant research attention and has become a prominent issue in standardization fora. In this paper, we formulate the problem of load balancing between cooperative RAT's as a mathematical program and by trading off a pre-defined delay tolerance per request we propose a vertical handover batch processing (VHBP) scheme. To quantify the performance of the proposed VHBP scheme we compare it with a baseline processing scheme, where each VHO request is processed independently under a number of different network scenarios. Numerical investigations reveal significant net benefits of the proposed scheme compared with the baseline, both in terms of achieved load balancing levels but also with regard to the acceptance rate of the VHO requests.

A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks

  • Fu, Anmin;Zhang, Gongxuan;Yu, Yan;Zhu, Zhenchao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3250-3265
    • /
    • 2014
  • Integrated WiMAX and WiFi networks is of great potential for the future due to the wider coverage of WiMAX and the high data transport capacity of WiFi. However, seamless and secure handover (HO) is one of the most challenging issues in this field. In this paper, we present a novel vertical HO authentication scheme with privacy preserving for WiMAX-WiFi heterogeneous networks. Our scheme uses ticket-based and pseudonym-based cryptographic methods to secure HO process and to achieve high efficiency. The formal verification by the AVISPA tool shows that the proposed scheme is secure against various malicious attacks and the simulation result indicates that it outperforms the existing schemes in terms of communication and computation cost.

Hard Handover by the Adaptive Time-to-trigger Scheme based on Adaptive Hysteresis considering the Load Difference between Cells in 3GPP LTE System (3GPP LTE 시스템에서 셀 간 부하 차이를 고려하는 적응 히스테리시스 기반의 적응 타임-투-트리거 방법에 의한 하드 핸드오버)

  • Jeong, Un-Ho;Kim, Dong-Hoi
    • Journal of Broadcast Engineering
    • /
    • v.15 no.4
    • /
    • pp.487-497
    • /
    • 2010
  • In this paper, we propose a hard handover scheme which adaptively decides important handover parameters such as hysteresis and time-to-trigger values considering the load difference between the target and serving cells. First of all, the hysteresis value can be automatically adjusted according to the load difference, thus it is used to decide the handover trigger time. As a result, through the adaptive hysteresis scheme, handover drop rate is improved. However, this adaptive hysteresis scheme has a problem that the ping-pong effect, which occurs due to the frequent movement of mobile stations at the cell boundary, is increased. Therefore, to solve this problem, we propose a novel adaptive time-to-trigger scheme with the time-to-trigger which is in inverse proportion to the hysteresis value already established by the adaptive hysteresis scheme which adapts to the changing load difference between the target and serving cells. The simulation results show that the proposed adaptive time-to-trigger scheme based on the adaptive hysteresis is better than existing schemes in terms of handover drop rate and ping-pong generation.

A Seamless Handover Scheme for High-Speed Trains using Dual Mobile Routers (고속철도 환경에서 이중 이동 라우터를 이용한 끊김없는 핸드오버 방안)

  • Park Hee-Dong;Kwon Yong-Ha;Lee Kang-Won;Lee Sung-Hyub;Cho You-Ze;Yoon Yong-Ki
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.269-276
    • /
    • 2006
  • This paper proposes a seamless handover scheme for high-speed trains using dual mobile routers to minimize service disruption time and packet loss during handovers. In the proposed scheme, each of the dual mobile routers is located at each end of the moving network for space diversity. One of the two mobile routers can continuously receive packets from its home agent, while the other is undergoing a handover, but they act as one logical mobile router. Analytical and simulation results showed that the proposed scheme could provide no service disruption or packet losses during handovers.

An Efficient Multicast Scheme for Hierarchical Mobile IPv6 (계층적 Mobile IPv6를 위한 효율적 멀티캐스트 방안)

  • Kim, Byung-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7A
    • /
    • pp.597-602
    • /
    • 2005
  • This paper proposes an efficient multicast scheme for the hierarchical mobile IPv6(HMIPv6). If a mobility anchor point(MAP) in a new domain does not support multicasting, an entering group member cannot join the multicast group through the new MAP The group member thus keeps receiving multicast packets from its home agent(HA) using Mobile IPv6 (MIPv6). This increases the propagation delay of binding update (BU) messages. However, our scheme enables an entering group member to keep receiving packets from the old multicast MAP. It can also reduce tunneling costs, total delivery costs and handover latency. We simulated the performance of our scheme by comparing it with the seamless multicast handover in a hierarchical mobile Pv6 (M-HMIPv6) using the delivery cost and handover latency factors.

A Seamless Voice Call Handover Scheme for the 3G LTE System (3G LTE 시스템을 위한 끊김없는 음성 호 핸드오버 방법)

  • Kim, Kyung-Min;Jung, Hyun-Duk;Lee, Jai-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2A
    • /
    • pp.174-185
    • /
    • 2010
  • A seamless handover between the 3G LTE and legacy 3G system is required for the smooth deployment of the 3G LTE system which is the next generation cellular network system. Especially on voice call handover, the service interruption time is very sensitive for user's satisfaction and therefore, a seamless voice call handover scheme is necessarily required. However, handover between the 3G LTE and the 3G CS system is hard to be achieved due to the lack of interface between two systems and the restriction of radio resource. In this paper, a new network entity called SCSE is proposed and inter-working between the 3G LTE and the 3G CS systems is enabled. Also contributed to the feature of the SCSE, the handover procedure is simplified and the service interruption time is minimized as a consequence. The evaluation result shows that the proposed SCSE scheme exclusively meets the service interruption time requirement which is smaller than 300 ms.