共查询到20条相似文献,搜索用时 15 毫秒
1.
Meng-Shu Chiang Chung-Ming Huang Pham Binh Chau Shouzhi Xu Huan Zhou Dong Ren 《Telecommunication Systems》2017,65(4):699-715
Proxy Mobile IPv6 (PMIPv6) is a networked-based handover protocol for the IP layer, i.e., the layer 3 mobility management protocol. In this work, we integrate fast handover and IEEE 802.21 Media Independent Handover (MIH) Services with PMIPv6 to improve the handover performance over the heterogeneous wireless network environment. Since it may have multiple candidate destination networks to which a Mobile Node can select for handover, it needs to consider not only the signal strength but also the corresponding networking situation for the proper selection of the next network. To reduce the packet loss situation, the multicast mechanism is adopted to forward packets to these candidate destination networks during the handover processing period. In this work, a Forward Fast Media Independent Handover Control Scheme for Proxy Mobile IPv6 (FFMIH-PMIPv6) is proposed based on the aforementioned concerns. Through the simulations for performance analysis, it shows that the proposed FFMIH-PMIPv6 can have better handover performance in terms of handover latency, packet loss rate and throughput. 相似文献
2.
3.
A smart handover prediction system based on curve fitting model for Fast Mobile IPv6 in wireless networks 下载免费PDF全文
Ali Safa Sadiq Kamalrulnizam Abu Bakar Kayhan Zrar Ghafoor Jaime Lloret SeyedAli Mirjalili 《International Journal of Communication Systems》2014,27(7):969-990
Seamless handover process is essential in order to provide efficient communication between mobile nodes in wireless local area networks. Despite the importance of a signal strength prediction model to provide seamless handovers, it is not embedded in standard mobility management protocols. In this article, we propose a smart handover prediction system based on curve fitting model to perform the handover (CHP) algorithm. The received signal strength indicator parameter, from scanning phase, is considered as an input to the CHP in order to provide a prediction technique for a mobile node to estimate the received signal strength value for the access points in the neighborhood and to select the best candidate access point from them in an intelligent way. We implemented the proposed approach and compared it with standard protocols and linear regression‐based handover prediction approach. Simulation results in complex wireless environments show that our CHP approach performs the best by predicting the received signal strength value with up to 800 ms in advance from real obtained value via scanning phase. Moreover, our CHP approach is the best in terms of layer 2 and overall handover latency, in comparison with standard protocols and linear regression approach, respectively. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
4.
In order to ensure that the Mesh network mobile client video,voice and other real-time strong applications without interruption,a secure and efficient handover authentication was very important.To protect the privacy of mobile nodes,an anonymity handover authentication protocol was proposed based on group signature for wireless mesh network.Compared with other handover authentication protocols based on group signature,the proposed scheme did not involve the group signature correlation operation,and the group signature algorithm was only carried out on the router.The pro-posed protocol not only enhances the security but also performs well in authentication efficiency and privacy-preserving. 相似文献
5.
6.
快速增长的移动数据业务需求推动着IPv6和3G不断向前发展.文章对移动IPv6的通信原理以及超3G网络系统进行了分析并在此基础上对IPv6在超3G网络中的实现进行了探讨. 相似文献
7.
Jiann‐Liang Chen Yu‐Feng Lee Yao‐Chung Chang 《International Journal of Network Management》2006,16(1):29-43
Recently, the world has become increasingly mobile, and people have started communicating by wireless networking. Mobile IPv6 enables mobile users to communicate with each other while moving. In this study, a mobile IPv6 network was implemented by the IEEE 802.11 specification, and its performance was analyzed using TCP and UDP applications. The experimental results indicate that throughput stabilized for UDP applications after about 6–14 seconds. However, TCP applications were found to stabilize throughput in 10–20 seconds. The evaluation results reveal that TCP applications perform less well in mobile IPv6 networking than UDP applications. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
8.
Handover delay performance is a critical issue to support real-time applications in wireless networks. To address this issue, this paper presents an Enhanced fast handover Triggering Mechanism (ETM) to improve the handover performance of mobile nodes (MNs) in Fast Proxy Mobile IPv6 (FPMIPv6). Making use of the information from the link layer, the ETM predicts two cases that the MNs perform in the reactive handover mode. Then, it establishes the bi-directional tunnel in advance for fast handover. As a result, the reactive handover delay is significantly reduced. Integrating the ETM into FPMIPv6 forms an enhanced Fast Proxy Mobile IPv6 (eFPMIPv6) protocol. Simulation experiments show that with the presented ETM mechanism, the eFPMIPv6 outperforms the original FPMIPv6 in terms of the overall handover performance. 相似文献
9.
10.
11.
12.
Seil Jeon Namhi Kang Younghan Kim 《AEUE-International Journal of Electronics and Communications》2012,66(5):390-394
The basic standard protocol for supporting network mobility (NEMO) (i.e., NEMO-BSP specified by IETF) introduces several performance problems, such as multiple tunneling overhead and packet delivery latency, because it exploits mobile IPv6 (MIPv6), which was proposed for host mobility. To improve the basic NEMO solution, two network-based NEMO approaches, rNEMO and N-PMIPv6, have been proposed. The rNEMO is able to reduce significant packet tunneling overhead. The N-PMIPv6, on the other hand, reduces location update cost, but it leads to packet tunneling overhead. Thus, they commonly waste network resources in both wired and especially wireless network. No efficient and practical solutions for minimizing both the location update overhead and packet tunneling overhead have been presented until now. This situation motivated us to propose a resource-efficient network mobility scheme (RENEMO), reducing resource utilization required for network mobility support. We show that the proposed RENEMO outperforms both rNEMO and N-PMIPv6 in terms of network resource. 相似文献
13.
基于IPv6技术的无线传感器网络是一门新兴的网络技术,人们对它的研究尚处于起步阶段。在此主要论述IPv6技术在无线传感器网组网应用,对使用无线与有线相结合的通信方法,通信协议和算法的研究,使得视频监控系统信号,通信系统信号以及检测系统信号在同一个通信平台上互不干涉的平稳的传输信息。就IPv6无线传感器网络与现有网络的互联互通方式,关键技术和算法等方面进行概述。 相似文献
14.
15.
A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6 总被引:1,自引:0,他引:1
Jong-Hyouk Lee Youn-Hee Han Sri Gundavelli Tai-Myoung Chung 《Telecommunication Systems》2009,41(4):279-292
This paper presents comparative results on Hierarchical Mobile IPv6 and Proxy Mobile IPv6. The two mobility support protocols
have similar hierarchical mobility management architectures but there are, however, clearly different perceptions: Hierarchical
Mobile IPv6 has specific properties of a host-based mobility support protocol, whereas Proxy Mobile IPv6 is based on a network-based
mobility support protocol. Thus, it is important to reveal their mobility characteristics and performance impact factors.
In this paper, a cost based evaluation model is developed that evaluates the location update cost, the packet delivery cost,
and the wireless power consumption cost based on the protocol operations used. Then, the numerical results are presented in
where impacts of the various system parameters are evaluated. The results demonstrate that Proxy Mobile IPv6 always outperforms
Hierarchical Mobile IPv6 due to its ability to avoid the mobility signaling sent by the mobile host, and its reduced tunneling
overhead during communications with other nodes. 相似文献
16.
The paper proposes a hierarchical and low‐power IPv6‐address configuration scheme for wireless sensor networks based on the cluster‐tree architecture. In the scheme, a wireless sensor network is divided into multiple clusters and the generation algorithm of a cluster is proposed. A cluster‐tree architecture for wireless sensor networks is presented and a layered IPv6 address format for a cluster head and a cluster member is created. The stateless address configuration strategy and the stateful address configuration strategy are effectively combined to develop the IPv6 address configuration scheme. In the scheme, the duplicate address detection of the IPv6 address assigned for a cluster member is performed in the cluster where the cluster member locates, and the IPv6 address configuration for the cluster members in the different clusters can be carried out at the same time. The paper also addresses the mobility of sensor nodes and their failure. From the theoretical and simulative perspectives, the paper analyzes the performance parameters, including duplicate address detection cost, address configuration cost and address configuration delay time, of the proposed scheme, Strong DAD and MANETConf. Analytical and simulative results show that the performance of the proposed scheme is better. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
17.
18.
19.
Wu‐Hsiao Hsu Yuh‐Pyng Shieh Sheng‐Cheng Yeh 《International Journal of Communication Systems》2011,24(2):139-152
This paper proposes a differentiated service (DiffServ)‐based bandwidth‐constrained network layer anycast routing for a mobile IPv6 network. The proposed algorithm comprises three steps: (1) When moving into a new foreign network, the mobile node (MN) chooses a feasible path to easily locate the nearest server that can serve it. To perform path selection, a multi‐level list structure (MLLS) is defined and used to store the available bandwidth and hop count of a path. (2) An ingress extended edge router (E‐ER) uses the multi‐level list algorithm (MLLA) to examine the MLLS for selecting the feasible path with the smallest number of hops that satisfies the MN bandwidth request. (3) The E‐ER uses a condition of path change (CPC) variable to determine whether it should optimize the route between itself and the server. Simulation results indicate that the proposed algorithm offers better performance than the existing related approaches in terms of the average running time, request blocking rate, and reducing the control overhead of the simulated network. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
20.
Hero Modares Amirhossein Moravejosharieh Rosli Bin Salleh Jaime Lloret 《ETRI Journal》2014,36(1):51-61
In the Mobile IPv6 (MIPv6) protocol, a mobile node (MN) is a mobile device with a permanent home address (HoA) on its home link. The MN will acquire a care‐of address (CoA) when it roams into a foreign link. It then sends a binding update (BU) message to the home agent (HA) and the correspondent node (CN) to inform them of its current CoA so that future data packets destined for its HoA will be forwarded to the CoA. The BU message, however, is vulnerable to different types of security attacks, such as the man‐in‐the‐middle attack, the session hijacking attack, and the denial‐of‐service attack. The current security protocols in MIPv6 are not able to effectively protect the BU message against these attacks. The private‐key‐based BU (PKBU) protocol is proposed in this research to overcome the shortcomings of some existing MIPv6 protocols. PKBU incorporates a method to assert the address ownership of the MN, thus allowing the CN to validate that the MN is not a malicious node. The results obtained show that it addresses the security requirements while being able to check the address ownership of the MN. PKBU also incorporates a method to verify the reachability of the MN. 相似文献