• Title/Summary/Keyword: handover detection

Search Result 25, Processing Time 0.025 seconds

Fast Handover Provision Mechanism through Reduction of CoA Configuration Time (CoA 설정 시간 단축을 통한 빠른 핸드오버 제공 메카니즘)

  • Choi, Ji-Hyoung;Lee, Dong-Chul;Kim, Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.79-82
    • /
    • 2007
  • Recently the diffusion of the advancement of mobile communication technique and mobile terminal increased, The users were demanded seamless services when carrying and moving. It proposed the FMIPv6 (Fast Handoff for Mobile IPv6) from the IETF like this meeting this requirement. The handover procedure of the FMIPv6 causes to defecate with movement detection, new CoA configuration and binding update. But, the delay occurs from each process, when the DAD(Duplicate Address Detection) of the CoA executing, the big delay occurs. This paper proposes a scheme of delay reduction, it omits DAD process and stores in the AR(Access Router) relates in the CoA of the mobile terminal information.

  • PDF

Fast Handover Provision Mechanism through Reduction of CoA Configuration Time (CoA 설정 시간 단축을 통한 빠른 핸드오버 제공 메카니즘)

  • Jin, Sung-Ho;Choi, Ji-Hyoung;Kim, Dong-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.11
    • /
    • pp.2027-2031
    • /
    • 2007
  • Recently the diffusion of the advancement of mobile communication technique and mobile terminal increased, The users were demanded seamless services when carrying and moving. It proposed the FMIPv6(Fast Handoff for Mobile IPv6) from the IETF like this meeting this requirement. The handover procedure of the FMIPv6 causes to defecate with movement detection, new CoA configuration and binding update. But, the delay occurs from each process, when the DAD(Duplicate Address Detection) of the CoA executing, the big delay occurs. This paper proposes a scheme of delay reduction, it omits DAD process and stores in the AR(Access Router) relates in the CoA of the mobile terminal information.

A Network-based Movement Detection Scheme for Proxy Mobile IPv6 over IEEE802.11 Networks (IEEE 802.11 네트워크에서 Proxy Mobile IPv6의 네트워크기반 이동성 감지 기법)

  • Kim, A-Ram;Han, Youn-Hee;Choi, Hyung-Young;Min, Sung-Gi;You, Heung-Ryeol
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.505-509
    • /
    • 2007
  • Proxy Mobile IPv6 (PMIPv6)는 Mobile Node (MN)가 스스로 이동성을 지원하지 않더라도 Mobile Access Gate가 MN대신 이동성을 처리하여 IPv6 이동성을 지원하는 기술이다. 좀 더 향상된 핸드오버 성능을 얻기 위해 Proxy Mobile IPv6에서도 버퍼링을 통한 패킷 손실을 줄이는 기법을 사용할 수 있다. 하지만, IEEE 802.11 네트워크에서는 Handover 발생 직전에 MN이 어떠한 통보도 AP로 하지 않기 때문에 Handover시에 패킷 손실을 줄이기 위한 패킷 버퍼링 방법을 사용하기가 어렵다. 본 논문에서 PMIPv6에서 MAG와 AP가 MN의 이동성을 감지하여 버퍼링을 시작하고 Handover가 발생하였을 경우에 대비해 버퍼링을 하는 Cross-layer 버퍼링 방법을 제안한다. 이를 통해 PMIPv6에서도 MN의 변경 없이 Handover시에 발생하는 패킷 손실을 최소화 할 수 있다. 또한 간단한 성능 비교를 통하여 제안 방법이 기존 PMIPv6보다 우수함을 알 수 있다.

  • PDF

Seamless and Robust Vehicular MIPv6: VMIPv6 for Vehicular Ad hoc Network (자동차 무선 네트워크 환경에서 연속적이고 견고한 IPv6기반의 이동성 프로토콜)

  • Oh, Ha-Young;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.122-134
    • /
    • 2010
  • With the rapidly increasing demand of traffic applications, the need to support seamless and robust multimedia services in the Vehicular Ad hoc Network is growing. Fast handover for the MIPv6 (FMIPv6) developed to solve the MIPv6's problem as well as Mobile IPv6 (MIPv6) for basic mobility protocol have been developed to support seamless handover in mobile environment. However, MIPv6 and FMIPv6 are useless for Quality-of-Service (QoS) services such as multimedia applications due to the long handover latency and the packet loss problem. In this paper, we propose a seamless and robust handover scheme that supports multimedia services in Vehicular Ad hoc Network using oCoA and background DAD. Through performance evaluation, we show that the proposed scheme is more proper for Vehicular Ad hoc Network than other schemes.

Perofrmance Analysis of Mobility Support Protocol in Each Layer (계층간 이동성 지원 프로토콜들의 성능 분석)

  • Lee, Hyo-Beom;Kim, Kwang-Ryoul;Hwang, Seung-Hee;Min, Sung-Gi
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.2
    • /
    • pp.134-142
    • /
    • 2007
  • Several mobility supporting protocols have been proposed across OSI reference layers. Each protocol has similar or different characteristics based on its operating layer which affect a handover latency. In this paper, we analyze handover performance of most representative protocols in each layer. For analysis, we use SUBNET model based Markovian model and movement model. In result, difference of protocol handover latency is not occurred by DAD but also by security, movement detection, message processing time.

Performance Enhancement of Handover in Mobile IPv6 Networks (IPv6 네트워크에서 핸드오버 성능개선 방안)

  • Seo, Jae-Kwon;Lee, Kyung-Geun
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.101-104
    • /
    • 2005
  • 이동성을 지원해야 하는 노드들이 증가하고 시간 임계적인 실시간 서비스가 확대됨에 따라, 이동중에도 끊김없는 서비스를 제공하기 위하여 다양한 방법들이 제안되고 있다. IETF에서 제안된 Mobile IPv6는 노드가 Home으로부터 떨어진 다른 곳으로 이동하여도 CoA로 주소를 지정함으로써 노드의 이동성을 지원하고 있다. 새로 생성된 CoA는 그 주소가 유일함을 확인하기 위하여 DAD(Duplicate Address Detection)를 거치게 되는데 이 과정에서 최소 1000ms가 소요된다. 이런 지연시간은 MN(Mobile Node)이 고속으로 이통할 때 FMIPv6(Fast Handover for Mobile IPv6)에서 패킷손실이 발생하거나 지연시간이 긴 리액티브 모드로 동작하게 되어 끊김없는 서비스를 지원 할 수 없게 된다. 본 논문에서는 이러한 문제를 해결하기 위하여 핸드오버 시 필요한 새로운 주소 생성과 중복주소 검출 과정을 핸드오버 이전에 이통 가능한 주변 AR이 수행하는 방안을 제안하고 FMIPv6에 적용하여 그에 따른 성능을 분석한다.

  • PDF

Seamless Lawful Interception Handover for 3G IP Multimedia Subsystem (IMS)

  • In, Hoh Peter;Lee, Myoung-Rak;Kim, Do-Hoon;Kim, Nung-Hoe;Yoon, Byung-Sik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.7
    • /
    • pp.1329-1345
    • /
    • 2011
  • After the 9.11 terror attack, lawful Interception (LI) has emerged as an important tool for anti-terrorist activity. Law enforcement agents and administrative government bodies effectively monitor suspicious target users of permanent IP-based network devices by LI in Packet Data Networks (PDNs). However, it is difficult to perform LI in monitoring migrating users from a location to another, who change their IPs due to the proliferation of portable Internet devices enabling 3G IP Multimedia Subsystems (IMS). The existing, manual handover technique in 3G IMS makes it even more difficult to continue the LI activities due to time-lag reissuance of LI authority warrants when the target users move to a new LI jurisdiction via a roaming service. Our proposed model is a seamless LI handover mechanism in 3G IMS to support mobility detection of the target users. The LI warrants are transferred to the new LI agent automatically with the target users when they move to a new LI jurisdiction. Thus, time-lag human intervention of reissuance of the LI warrants is removed and enables the LI authorities to continue monitoring. In the simulation of our proposed mechanism, the quality of lawful interception achieves a mean score of over 97.5% out of the possible 100% maximum score, whereas the quality of the existing mechanism has a mean score of 22.725%.

Management of Neighbor Cell Lists and Physical Cell Identifiers in Self-Organizing Heterogeneous Networks

  • Lim, Jae-Chan;Hong, Dae-Hyoung
    • Journal of Communications and Networks
    • /
    • v.13 no.4
    • /
    • pp.367-376
    • /
    • 2011
  • In this paper, we propose self-organizing schemes for the initial configuration of the neighbor cell list (NCL), maintenance of the NCL, and physical cell identifier (PCI) allocation in heterogeneous networks such as long term evolution systems where lower transmission power nodes are additionally deployed in macrocell networks. Accurate NCL maintenance is required for efficient PCI allocation and for avoiding handover delay and redundantly increased system overhead. Proposed self-organizing schemes for the initial NCL configuration and PCI allocation are based on evolved universal terrestrial radio access network NodeB (eNB) scanning that measures reference signal to interference and noise ratio and reference symbol received power, respectively, transmitted from adjacent eNBs. On the other hand, the maintenance of the NCL is managed by adding or removing cells based on periodic user equipment measurements. We provide performance analysis of the proposed schemes under various scenarios in the respects of NCL detection probability, NCL false alarm rate, handover delay area ratio, PCI conflict ratio, etc.

Secure Naming Prefix Allocation Scheme for Mobile Content Centric Networking (이동 콘텐츠 중심 네트워크에서의 안전한 네이밍 할당 방안)

  • Lee, Jihoon;Lee, Juyong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1466-1470
    • /
    • 2016
  • As individuals create many contents anytime and anywhere together with the widespread dissemination of smart devices as well as various social networking services (SNS), content centric networking (CCN) has regarded as a new networking technology. However, CCN is exposed to malicious attacks on the mobility management of mobile content sources during handover and high volume of control messages. Therefore, this paper presents a secure duplicate name detection (SecureDND) mechanism without additional control messages by signed information and secure token. It is shown from the performance evaluation that the proposed scheme can provide low control overhead, which results in the network scalability.

Development of a Ubiquitous Vision System for Location-awareness of Multiple Targets by a Matching Technique for the Identity of a Target;a New Approach

  • Kim, Chi-Ho;You, Bum-Jae;Kim, Hag-Bae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.68-73
    • /
    • 2005
  • Various techniques have been proposed for detection and tracking of targets in order to develop a real-world computer vision system, e.g., visual surveillance systems, intelligent transport systems (ITSs), and so forth. Especially, the idea of distributed vision system is required to realize these techniques in a wide-spread area. In this paper, we develop a ubiquitous vision system for location-awareness of multiple targets. Here, each vision sensor that the system is composed of can perform exact segmentation for a target by color and motion information, and visual tracking for multiple targets in real-time. We construct the ubiquitous vision system as the multiagent system by regarding each vision sensor as the agent (the vision agent). Therefore, we solve matching problem for the identity of a target as handover by protocol-based approach. We propose the identified contract net (ICN) protocol for the approach. The ICN protocol not only is independent of the number of vision agents but also doesn't need calibration between vision agents. Therefore, the ICN protocol raises speed, scalability, and modularity of the system. We adapt the ICN protocol in our ubiquitous vision system that we construct in order to make an experiment. Our ubiquitous vision system shows us reliable results and the ICN protocol is successfully operated through several experiments.

  • PDF