Mobility Protocols and Handover Optimization: Design, Evaluation and Application

Book description

This book provides a common framework for mobility management that considers the theoretical and practical aspects of systems optimization for mobile networks.

In this book, the authors show how an optimized system of mobility management can improve the quality of service in existing forms of mobile communication. Furthermore, they provide a theoretical approach to mobility management, as well as developing the model for systems optimization, including practical case studies using network layer and mobility layer protocols in different deployment scenarios. The authors also address the different ways in which the specific mobility protocol can be developed, taking into account numerous factors including security, configuration, authentication, quality of service, and movement patterns of the mobiles.

Key Features:

  • Defines and discusses a common set of optimization methodologies and their application to all mobility protocols for both IPv4 and IPv6 networks

  • Applies these technologies in the context of various layers: MAC layer, network layer, transport layer and application layer covering 802.11, LTE, WiMax, CDMA networks and protocols such as SIP, MIP, HIP, VoIP, and many more

  • Provides a thorough analysis of the required steps during a mobility event such as discovery, network selection, configuration, authentication, security association, encryption, binding update, and media direction

  • Includes models and tables illustrating the analysis of mobility management as well as architecture of sample wireless and mobility test beds built by the authors, involving inter-domain and intra-domain mobility scenarios

  • This book is an excellent resource forprofessionals and systems architects in charge of designing wireless networks for commercial (3G/4G), LTE, IMS, military and Ad Hoc environment. It will be useful deployment guide for the architects wireless service providers. Graduate students, researchers in industry and academia, and systems engineers will also find this book of interest.

    Table of contents

    1. Cover
    2. Title Page
    3. Copyright
    4. Dedication
    5. About the Authors
    6. Foreword
    7. Preface
      1. Organization of the Book
      2. Intended audience
    8. Acknowledgements
    9. List of Abbreviations
    10. Chapter 1: Introduction
      1. 1.1 Types of Mobility
      2. 1.2 Performance Requirements
      3. 1.3 Motivation
      4. 1.4 Summary of Key Contributions
    11. Chapter 2: Analysis of Mobility Protocols for Multimedia
      1. 2.1 Summary of Key Contributions and Indicative Results
      2. 2.2 Introduction
      3. 2.3 Cellular 1G
      4. 2.4 Cellular 2G Mobility
      5. 2.5 Cellular 3G Mobility
      6. 2.6 4G Networks
      7. 2.7 IP-Based Mobility
      8. 2.8 Heterogeneous Handover
      9. 2.9 Multicast Mobility
      10. 2.10 Concluding Remarks
    12. Chapter 3: Systems Analysis of Mobility Events
      1. 3.1 Summary of Key Contributions and Indicative Results
      2. 3.2 Introduction
      3. 3.3 Analysis of Handoff Components
      4. 3.4 Effect of Handoff across Layers
      5. 3.5 Concluding Remarks
    13. Chapter 4: Modeling Mobility
      1. 4.1 Summary of Key Contributions and Indicative Results
      2. 4.2 Introduction
      3. 4.3 Related Work
      4. 4.4 Modeling Mobility as a Discrete-Event Dynamic System
      5. 4.5 Petri Net Primitives
      6. 4.6 Petri-Net-Based Modeling Methodologies
      7. 4.7 Resource Utilization during Handoff
      8. 4.8 Data Dependency Analysis of the Handoff Process
      9. 4.9 Petri Net Model for Handoff
      10. 4.10 Petri-Net-Based Analysis of Handoff Event
      11. 4.11 Evaluation of Systems Performance Using Petri Nets
      12. 4.12 Opportunities for Optimization
      13. 4.13 Concluding Remarks
    14. Chapter 5: Layer 2 Optimization
      1. 5.1 Introduction
      2. 5.2 Related Work
      3. 5.3 IEEE 802.11 Standards
      4. 5.4 Handoff Procedure with Active Scanning
      5. 5.5 Fast-Handoff Algorithm
      6. 5.6 Implementation
      7. 5.7 Measurements
      8. 5.8 Measurement Results
      9. 5.9 Conclusions and Future Work
    15. Chapter 6: Mobility Optimization Techniques
      1. 6.1 Summary of Key Contributions and Indicative Results
      2. 6.2 Introduction
      3. 6.3 Discovery
      4. 6.5 Layer 3 Configuration
      5. 6.6 Layer 3 Security Association
      6. 6.7 Binding Update
      7. 6.8 Media Rerouting
      8. 6.9 Media Buffering
      9. 6.10 Route Optimization
      10. 6.11 Media-Independent Cross-Layer Triggers
      11. 6.12 Concluding Remarks
    16. Chapter 7: Optimization with Multilayer Mobility Protocols
      1. 7.1 Summary of Key Contributions and Indicative Results
      2. 7.2 Introduction
      3. 7.3 Key Principles
      4. 7.4 Related Work
      5. 7.5 Multilayer Mobility Approach
      6. 7.6 Concluding Remarks
    17. Chapter 8: Optimizations for Simultaneous Mobility
      1. 8.1 Summary of Key Contributions and Indicative Results
      2. 8.2 Introduction
      3. 8.3 Illustration of the Simultaneous Mobility Problem
      4. 8.4 Related Work
      5. 8.5 Key Optimization Techniques
      6. 8.6 Analytical Framework
      7. 8.7 Analyzing the Simultaneous Mobility Problem
      8. 8.8 Probability of Simultaneous Mobility
      9. 8.9 Solutions
      10. 8.10 Application of Solution Mechanisms
      11. 8.11 Concluding Remarks
    18. Chapter 9: Handoff Optimization for Multicast Streaming
      1. 9.1 Summary of Key Contributions and Indicative Results
      2. 9.2 Introduction
      3. 9.3 Key Principles
      4. 9.4 Related Work
      5. 9.5 Mobility in a Hierarchical Multicast Architecture
      6. 9.6 Optimization Techniques for Multicast Media Delivery
      7. 9.7 Experimental Results and Performance Analysis
      8. 9.8 Concluding Remarks
    19. Chapter 10: Cooperative Roaming
      1. 10.1 Introduction
      2. 10.2 Related Work
      3. 10.3 IP Multicast Addressing
      4. 10.4 Cooperative Roaming
      5. 10.5 Cooperative Authentication
      6. 10.6 Security
      7. 10.7 Streaming Media Support
      8. 10.8 Bandwidth and Energy Usage
      9. 10.9 Experiments
      10. 10.10 Application Layer Mobility
      11. 10.11 Load Balancing
      12. 10.12 Multicast and Scalability
      13. 10.13 An Alternative to Multicast
      14. 10.14 Conclusions and Future Work
    20. Chapter 11: System Evaluation
      1. 11.1 Summary of Key Contributions and Indicative Results
      2. 11.2 Introduction
      3. 11.3 Experimental Validation
      4. 11.5 Systems Validation Using Petri-Net-Based Models
      5. 11.6 Scheduling Handoff Operations
      6. 11.7 Verification of Systems Performance
      7. 11.8 Petri-Net-Based Modeling for Multi-Interface Mobility
      8. 11.9 Deadlocks in Handoff Scheduling
      9. 11.10 Analysis of Level of Concurrency and Resources
      10. 11.11 Trade-off Analysis for Proactive Handoff
      11. 11.12 Concluding Remarks
    21. Chapter 12: Conclusions
      1. 12.1 General Principles of Mobility Optimization
      2. 12.2 Summary of Contributions
      3. 12.3 Future Work
    22. A: RDF Schema for Application Layer Discovery
      1. A.1 Schema Primitives
    23. B: Definitions of Mobility-Related Terms
    24. References
    25. Index
    26. End User License Agreement

    Product information

    • Title: Mobility Protocols and Handover Optimization: Design, Evaluation and Application
    • Author(s):
    • Release date: May 2014
    • Publisher(s): Wiley-IEEE Press
    • ISBN: 9780470740583