首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Proxy Mobile IPv6 (PMIPv6) is a networked-based handover protocol for the IP layer, i.e., the layer 3 mobility management protocol. In this work, we integrate fast handover and IEEE 802.21 Media Independent Handover (MIH) Services with PMIPv6 to improve the handover performance over the heterogeneous wireless network environment. Since it may have multiple candidate destination networks to which a Mobile Node can select for handover, it needs to consider not only the signal strength but also the corresponding networking situation for the proper selection of the next network. To reduce the packet loss situation, the multicast mechanism is adopted to forward packets to these candidate destination networks during the handover processing period. In this work, a Forward Fast Media Independent Handover Control Scheme for Proxy Mobile IPv6 (FFMIH-PMIPv6) is proposed based on the aforementioned concerns. Through the simulations for performance analysis, it shows that the proposed FFMIH-PMIPv6 can have better handover performance in terms of handover latency, packet loss rate and throughput.  相似文献   

2.
3.
Seamless handover process is essential in order to provide efficient communication between mobile nodes in wireless local area networks. Despite the importance of a signal strength prediction model to provide seamless handovers, it is not embedded in standard mobility management protocols. In this article, we propose a smart handover prediction system based on curve fitting model to perform the handover (CHP) algorithm. The received signal strength indicator parameter, from scanning phase, is considered as an input to the CHP in order to provide a prediction technique for a mobile node to estimate the received signal strength value for the access points in the neighborhood and to select the best candidate access point from them in an intelligent way. We implemented the proposed approach and compared it with standard protocols and linear regression‐based handover prediction approach. Simulation results in complex wireless environments show that our CHP approach performs the best by predicting the received signal strength value with up to 800 ms in advance from real obtained value via scanning phase. Moreover, our CHP approach is the best in terms of layer 2 and overall handover latency, in comparison with standard protocols and linear regression approach, respectively. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

4.
In order to ensure that the Mesh network mobile client video,voice and other real-time strong applications without interruption,a secure and efficient handover authentication was very important.To protect the privacy of mobile nodes,an anonymity handover authentication protocol was proposed based on group signature for wireless mesh network.Compared with other handover authentication protocols based on group signature,the proposed scheme did not involve the group signature correlation operation,and the group signature algorithm was only carried out on the router.The pro-posed protocol not only enhances the security but also performs well in authentication efficiency and privacy-preserving.  相似文献   

5.
6.
快速增长的移动数据业务需求推动着IPv6和3G不断向前发展.文章对移动IPv6的通信原理以及超3G网络系统进行了分析并在此基础上对IPv6在超3G网络中的实现进行了探讨.  相似文献   

7.
Recently, the world has become increasingly mobile, and people have started communicating by wireless networking. Mobile IPv6 enables mobile users to communicate with each other while moving. In this study, a mobile IPv6 network was implemented by the IEEE 802.11 specification, and its performance was analyzed using TCP and UDP applications. The experimental results indicate that throughput stabilized for UDP applications after about 6–14 seconds. However, TCP applications were found to stabilize throughput in 10–20 seconds. The evaluation results reveal that TCP applications perform less well in mobile IPv6 networking than UDP applications. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

8.
Handover delay performance is a critical issue to support real-time applications in wireless networks. To address this issue, this paper presents an Enhanced fast handover Triggering Mechanism (ETM) to improve the handover performance of mobile nodes (MNs) in Fast Proxy Mobile IPv6 (FPMIPv6). Making use of the information from the link layer, the ETM predicts two cases that the MNs perform in the reactive handover mode. Then, it establishes the bi-directional tunnel in advance for fast handover. As a result, the reactive handover delay is significantly reduced. Integrating the ETM into FPMIPv6 forms an enhanced Fast Proxy Mobile IPv6 (eFPMIPv6) protocol. Simulation experiments show that with the presented ETM mechanism, the eFPMIPv6 outperforms the original FPMIPv6 in terms of the overall handover performance.  相似文献   

9.
宋姗姗  尚涛  刘建伟 《通信学报》2013,34(Z1):35-267
提出了一个面向移动IPv6层次化网络的快速接入认证方案,从效率和安全性2个方面提高移动IPv6层次化网络接入认证的性能。首先,利用向量网络地址编码方法实现网络数据传输,提高家乡注册性能;其次,提出一种基于格的层次化签名方案,在接入认证过程中实现双向认证,提高认证过程的安全性。方案分析表明,所提出的接入认证方案具有强不可伪造性并可以抵御网络中的重放攻击,同时可以减少整个接入认证过程的延迟时间。  相似文献   

10.
一种基于SIP与移动IPV6的异构网络切换方法   总被引:2,自引:2,他引:0  
随着移动通信技术的发展,诞生了各种可供接入的网络,如GPRS,WALN等.它们传输速率和原理各不相同,不同异质接入网络之间的切换已经成为对下一代无线网络的一个基本要求.本文介绍了一种新的切换机制,首先分别介绍了SIP技术与移动IPv6技术的原理,然后结合SIP与移动IPv6技术提出一种全新的无缝切换机制,最后总结并提出了有待进一步研究的相关问题.  相似文献   

11.
12.
The basic standard protocol for supporting network mobility (NEMO) (i.e., NEMO-BSP specified by IETF) introduces several performance problems, such as multiple tunneling overhead and packet delivery latency, because it exploits mobile IPv6 (MIPv6), which was proposed for host mobility. To improve the basic NEMO solution, two network-based NEMO approaches, rNEMO and N-PMIPv6, have been proposed. The rNEMO is able to reduce significant packet tunneling overhead. The N-PMIPv6, on the other hand, reduces location update cost, but it leads to packet tunneling overhead. Thus, they commonly waste network resources in both wired and especially wireless network. No efficient and practical solutions for minimizing both the location update overhead and packet tunneling overhead have been presented until now. This situation motivated us to propose a resource-efficient network mobility scheme (RENEMO), reducing resource utilization required for network mobility support. We show that the proposed RENEMO outperforms both rNEMO and N-PMIPv6 in terms of network resource.  相似文献   

13.
李娜 《现代电子技术》2012,35(16):82-85
基于IPv6技术的无线传感器网络是一门新兴的网络技术,人们对它的研究尚处于起步阶段。在此主要论述IPv6技术在无线传感器网组网应用,对使用无线与有线相结合的通信方法,通信协议和算法的研究,使得视频监控系统信号,通信系统信号以及检测系统信号在同一个通信平台上互不干涉的平稳的传输信息。就IPv6无线传感器网络与现有网络的互联互通方式,关键技术和算法等方面进行概述。  相似文献   

14.
15.
This paper presents comparative results on Hierarchical Mobile IPv6 and Proxy Mobile IPv6. The two mobility support protocols have similar hierarchical mobility management architectures but there are, however, clearly different perceptions: Hierarchical Mobile IPv6 has specific properties of a host-based mobility support protocol, whereas Proxy Mobile IPv6 is based on a network-based mobility support protocol. Thus, it is important to reveal their mobility characteristics and performance impact factors. In this paper, a cost based evaluation model is developed that evaluates the location update cost, the packet delivery cost, and the wireless power consumption cost based on the protocol operations used. Then, the numerical results are presented in where impacts of the various system parameters are evaluated. The results demonstrate that Proxy Mobile IPv6 always outperforms Hierarchical Mobile IPv6 due to its ability to avoid the mobility signaling sent by the mobile host, and its reduced tunneling overhead during communications with other nodes.  相似文献   

16.
The paper proposes a hierarchical and low‐power IPv6‐address configuration scheme for wireless sensor networks based on the cluster‐tree architecture. In the scheme, a wireless sensor network is divided into multiple clusters and the generation algorithm of a cluster is proposed. A cluster‐tree architecture for wireless sensor networks is presented and a layered IPv6 address format for a cluster head and a cluster member is created. The stateless address configuration strategy and the stateful address configuration strategy are effectively combined to develop the IPv6 address configuration scheme. In the scheme, the duplicate address detection of the IPv6 address assigned for a cluster member is performed in the cluster where the cluster member locates, and the IPv6 address configuration for the cluster members in the different clusters can be carried out at the same time. The paper also addresses the mobility of sensor nodes and their failure. From the theoretical and simulative perspectives, the paper analyzes the performance parameters, including duplicate address detection cost, address configuration cost and address configuration delay time, of the proposed scheme, Strong DAD and MANETConf. Analytical and simulative results show that the performance of the proposed scheme is better. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

17.
分析了移动TPv6原理,在基于PXA270处理器的嵌入式系统平台上移植了对IPv6有良好支持的 Linux操作系统及图形系统,随后在WLAN环境下采用MIPL实现移动IPv6协议,搭建了移动IPv6试验床,测试了开发的嵌入式移动IPv6系统的性能.  相似文献   

18.
IP化是控制与通信协议发展的必然趋势。考虑到原有BACnet协议的局限,文中提出一种设计以集成BACnet与实现了6LowPAN协议的Blip栈,从而充分利用符合IEEE 802.15.4标准的2.4GHz射频收发器CC2420的低功耗优势。  相似文献   

19.
This paper proposes a differentiated service (DiffServ)‐based bandwidth‐constrained network layer anycast routing for a mobile IPv6 network. The proposed algorithm comprises three steps: (1) When moving into a new foreign network, the mobile node (MN) chooses a feasible path to easily locate the nearest server that can serve it. To perform path selection, a multi‐level list structure (MLLS) is defined and used to store the available bandwidth and hop count of a path. (2) An ingress extended edge router (E‐ER) uses the multi‐level list algorithm (MLLA) to examine the MLLS for selecting the feasible path with the smallest number of hops that satisfies the MN bandwidth request. (3) The E‐ER uses a condition of path change (CPC) variable to determine whether it should optimize the route between itself and the server. Simulation results indicate that the proposed algorithm offers better performance than the existing related approaches in terms of the average running time, request blocking rate, and reducing the control overhead of the simulated network. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

20.
In the Mobile IPv6 (MIPv6) protocol, a mobile node (MN) is a mobile device with a permanent home address (HoA) on its home link. The MN will acquire a care‐of address (CoA) when it roams into a foreign link. It then sends a binding update (BU) message to the home agent (HA) and the correspondent node (CN) to inform them of its current CoA so that future data packets destined for its HoA will be forwarded to the CoA. The BU message, however, is vulnerable to different types of security attacks, such as the man‐in‐the‐middle attack, the session hijacking attack, and the denial‐of‐service attack. The current security protocols in MIPv6 are not able to effectively protect the BU message against these attacks. The private‐key‐based BU (PKBU) protocol is proposed in this research to overcome the shortcomings of some existing MIPv6 protocols. PKBU incorporates a method to assert the address ownership of the MN, thus allowing the CN to validate that the MN is not a malicious node. The results obtained show that it addresses the security requirements while being able to check the address ownership of the MN. PKBU also incorporates a method to verify the reachability of the MN.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号