• Title/Summary/Keyword: host based mobility

Search Result 94, Processing Time 0.031 seconds

Performance Analysis of Mobile Home Network Based on Bluetooth (블루투스 기반 이동 Home Network의 성능 분석)

  • Park Hong-Seong;Jeong Myoung-Soon
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.1 no.1
    • /
    • pp.51-64
    • /
    • 2002
  • This paper analyzes performance measures of a Bluetooth_based mobile home network system. The home network system consists of terminals with Bluetooth interfaces, access points (AP), a home PC, and a gateway A mobile host in wireless terminals uses Mobile IP for supporting the mobility This paper considers four types of data traffic, which are new connection traffic, handoff traffic, Internet data traffic, and control data traffic and suggests a queueing system model of the home network system, where the AP and the home PC are modeled as M/G/1 with four priority queues and the gateway is modeled as M/G/1 with a single queue The generation rate and service time of individual traffic influence their performance measures. Based ell the suggested model, we propose the elapsed time of data traffic in terms of the number of cells, the number of Home PCs, arrival rates of four types of traffic and the service rates of AP/Home PCs/Gateway To analyze influences on the elapsed time with respect to arrival rate of four types of traffic, some examples are given.

  • PDF

A Framework and Policy Scenarios of Policy-based Mobile IP Networks (정책기반 이동 IP 네트워크의 프레임워크와 정책 시나리오)

  • 강승완;김태경;이정환;유상조
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.105-108
    • /
    • 2003
  • Because of increasing the notebook computer and PDA, users' requirement with respect to mobility is growing more and more. However, current IP protocol is not changed IP address and can not deliver IP packets on new location of host in case moving another network. To solve this problem, the IETF has proposed mobile IP. The network management for maintaining stable and efficient environment is more difficult according to being various by complicated network environment and requirements of provided service and user. The recent rises concern about policy-based network technology. Therefore, this paper proposed a framework of policy-based network and developed policy scenarios using the presented policy language of mobile IP.

  • PDF

A Framework for Proactive Handover in Wireless Networks (무선 네트워크에서 사전 핸드오버를 위한 프레임워크)

  • Duc, Thang Le;Le, Duc Tai;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.173-174
    • /
    • 2014
  • Handover is constantly a challenging issue in wireless networks. Most of the existing solutions are host-based, which are implemented on the wireless terminals and leave the decision making to the terminals. This paper studies the problem of network-based handover in the wireless networks with the constraints of low latency as well as low computational time. To address this problem, we employ the software-defined network (SDN) architecture to facilitate handover. According to the operational model of the SDN, we define a workflow for all involved network entities, and then design a framework implementing the workflow as a complete handover system. The proposed framework aims to establish a channel conveying the mobility-related information of devices and the context information of their vicinity from the switches/access routers to the controllers. Based on collected information, the controller can optimally execute the handover.

The Implementation of Spatial Database Transaction Model (FTMSD) supporting Mobile Host (이동 호스트를 지원하는 공간 데이터베이스 트랜잭션 모델(FTMSD)의 구현)

  • Lee, Young-Geol;Kim, Sung-Hee;Bae, Young-Ho;Jeong, Mi-Young;Jung, Hyun-Meen
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.175-181
    • /
    • 2006
  • AMobile-supported spatial database systems have been introduced with development of mobile computing technology, they offer an advantage that we can access the data wherever we are. However, the studies on database system in traditional distributed environments must be reconsidered again, because of characteristics of mobile database system such as mobility and instability of wireless network. A new transaction model should be required for considering the characteristics, since especially a mobile computing environment is location-dependent, compared with the location transparency in a distributed computing environment. In other aspect, normally mobile host may be moving not in all space, but in some limited path. That is, a host is moving along the roads or the geographical features adjacent to the roads. The transaction processing should be considered not on the spatial coordinate but on the geographical features. In this paper, the feature based transaction processing model is proposed to process location-dependent transaction efficiently.

  • PDF

Intermediate Node Mobility Management Technique by Real-Time Monitoring in CCN Environment (CCN 환경에서 실시간 모니터링에 의한 중간노드 이동성 관리 기법)

  • Ko, Seung-Beom;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.5
    • /
    • pp.783-790
    • /
    • 2022
  • The development of SNS and video platforms provided an opportunity to explode the activation of content production and consumption. However, in the legacy system, due to the host-based location-oriented data transmission, there are inherent limitations in efficient operation and management. As an alternative to this, a Contents Centric Network (CCN) was studied. In this paper, when intermediate nodes located between the information provider and the information requester between the real-time streaming services in the CCN environment move or restrict their use, failure through monitoring of wireless reception strength to solve problems like disconnection of transmission quality at the information consumer. We propose a stable intermediate node management mechanism through active response before occurrence.

The Authentication Mechanism Using Public-Key infrastructure in Mobile IP Registration Protocol (Mobile-IP 등록 프로토콜에서 공개키를 이용한 인증 방안)

  • 박상준;홍충선;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.3C
    • /
    • pp.211-219
    • /
    • 2002
  • Mobile IP(RFC2002) is representative protocols that support mobility to host. In this paper, we propose a mobile IP registration protocol using public-key based certificates and CA(certification authority). Our proposed protocol authenticates the registration message of mobile node and prevents replay attack and minimal use of public key cryptography, Also, Our proposed protocol directly authenticates between agents and mobile nodes using certificates. Though the computer simulation, we prove that our proposal has better performance than the previous public-key based Mobile IP registration protocol.

Enhanced Mobility Management Mechanism in IP based-IMT Network Platform($IP^2$) (IP 기반-IMT 네트워크에서의 이동관리 메카니즘 향상기법)

  • Jung, Byeong-Hwa;Park, Soo-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1307-1310
    • /
    • 2005
  • $IP^2$(IP based-IMT Network Platform)은 유비쿼터스 플랫폼으로서 백본 망에서 IP 를 IPha(IP host address)와 IPra(IP routing address)으로 두 가지를 사용하여서 이동성을 지원한다. 그리고 MN(Mobile Node)도 Active 상태와 Dormant 상태로 두 가지 상태로 나뉘는데 Dormant 상태에서 상대방이 통신을 요청하면 페이징(Paging) 과정을 통해서 Active 상태로 전이된다. 페이징을 할 때 LA(Location Area)에 속해있는 모든 셀(Cell)에 페이징 메시지를 전송하게 됨으로서 네트워크의 자원을 과도하게 사용하게 된다. 이것을 해결하기 위해서 프럭시(Proxy) 를 두는 방안을 제안하였다. 프럭시에서 MN 들이 존재하는 셀 정보를 유지 함으로서 페이징 요청이 있을 때 정확한 셀에 메시지를 전송하게 되기 때문에 네트워크 자원의 낭비를 줄일 수 있다.

  • PDF

Identification of mobile terminal for mobility support in all-IP Network (All-IP 기반 이동성 지원 네트워크에서 이동 단말 식별 체계)

  • Kim, Sang-Eon;Park, Se-Jun;Chang, Byung-Soo;Lee, Sang-Hong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.318-322
    • /
    • 2005
  • An IP address plays both endpoint identifier and location identifier in wire based network. However, one IP address can not provide both endpoint identifier and location identifier for mobile Internet environment such as cellular network and portable Internet. To resolve this problem, mobile IPv4 and mobile IPv6 technologies are developed. These technologies are based on the concept of separation the endpoint identifier from location identifier. This paper describes some results of the recent studies such as mobile IPv4, mobile IPv6, host identify protocol and so on. Also, we propose the criteria to decide which technologies are suitable for deployment in the practical network environment.

  • PDF

Security Threats Analysis for Network-based Mobile IPv6 (네트워크 기반 Mobile IPv6 보안 취약점 분석)

  • Kim, Hyun-Gon;Seo, Jae-Hyeon;Oh, Byeong-Kyun;Ahn, Tae-Nam;Kim, Jin-Hyung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.137-147
    • /
    • 2007
  • In the host-based Mobile IPv6, a mobile node is responsible for doing the signaling to its home agent to enable session continuity as it moves between subnets. To remove the mobile node's signalling processing load, the network-based Mobile IPv6 has been proposed recently. It allows session continuity for a mobile node without its involvement in mobility management. The proxy mobility agent in the network performs the signaling and does the mobility management on behalf of the mobile node. However, to make secure communications for a mobile node, security mechanisms against diverse attacks should be adopted. To do this, first of all security threats to the network-based Mobile IPv6 should be also identified and analyzed. Potential attack objectives may be to consume network services at the cost of a legitimate mobile node and, eavesdropping and fabrication of user traffic through interception of a mobile node's communications. This paper identifies and discusses security threats to the network-based Mobile IPv6 in details. The results of threats analysis are limited to threats that are peculiar to the network-based Mobile IPv6 except threats to IPv6 in general.

LFH: Low-Cost and Fast Handoff Scheme in Proxy Mobile IPv6 Networks with Multicasting Support (프록시 모바일 IPv6 네트워크에서 멀티캐스팅을 지원하는 저비용의 빠른 이동성관리 기법)

  • Kim, Eunhwa;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.6
    • /
    • pp.265-278
    • /
    • 2013
  • With the recent advancements in various wireless communication technologies, the importance of mobile multicasting is coming to the fore, in an effort to use network resources more efficiently. In the past, when various mobile IP-based multicast techniques were proposed, the focus was put on the costs needed for network delivery for providing multicast services, as well as on minimizing the multicast handover delay. For techniques using MIPv6 (Mobile IPv6), a host-based mobility management protocol, however, it is fundamentally difficult to resolve the problems of handover delay and tunnel convergence. To resolve these problems, a network-based mobility management protocol called PMIPv6 (Proxy Mobile IPv6) was standardized. Although performance is improved in PMIPv6 over MIPv6, it still suffers from the problems of handover delay and tunnel convergence. In this paper, to overcome these limitations, a technique called LFH (Low-cost and Fast Handoff) is proposed for fast and low-cost mobility management with multicasting support in PMIPv6 networks. To reduce the interactions between the complex multicast routing protocol and the multicast messages, a simplified proxy method called MLD (Multicast Listener Discovery) is implemented and modified. Furthermore, a TCR (Tunnel Combination and Reconstruction) algorithm was used in the multicast handover procedure within the LMA (Local Mobility Anchor) domain, as well as in the multicast handover procedure between domains, in order to overcome the problem of tunnel convergence. As a result, it was found that LFH has reduced multicast delay compared to other types of multicast techniques, and that it requires lower costs as well.