Fr. 150.00

MOBILITY PROTOCOLS AND HANDOVER OP - DESIGN EVALUATION AND APPLICATION

English · Hardback

Shipping usually within 3 to 5 weeks

Description

Read more

Informationen zum Autor Dr. Ashutosh Dutta Dr. Ashutosh Dutta obtained his Ph.D. in EE from Columbia University, M.S. in Computer Science from NJIT, USA and BSEE from NIT, Rourkela, India. As a seasoned mobility and security architect and an accomplished networking and computer science expert with 20-plus years experience, Ashutosh directed multiple IT operations, led the research and development for leading global technology corporations and top university and has in-depth expertise in developing and implementing research, analysis and design initiatives. His career spanning 25 years includes LMTS (Lead Member of Technical Staff) at AT&T, NJ; CTO Wireless at NIKSUN, NJ; Senior Scientist in Telcordia Technologies, NJ; CRF Director at Columbia University, NY and Computer Engineer with TATA Motors, India. Ashutosh's research interests include wireless Internet, multimedia signaling, mobility management, 4G networks, IMS (IP Multimedia Subsystems), VoIP and session control protocols.  He has published more than 80 conference, journal papers and Internet drafts, three book chapters, and has given tutorials in mobility management at various conferences. Ashutosh has 19 issued security and mobility related US patents. Ashutosh is a senior member of IEEE and ACM. He has served as an IEEE volunteer and leader at the section, region, chapter, society, MGA, and EAB level. Ashutosh is recipient of the 2009 IEEE Region 1, IEEE MGA and 2010 IEEE-USA Leadership Awards. Prof. Henning Schulzrinne Prof. Henning Schulzrinne, Levi Professor of Computer Science at Columbia University, received his Ph.D.  from the University of Massachusetts in Amherst, Massachusetts.  He was an MTS at AT&T Bell Laboratories and an associate department head at GMD-Fokus (Berlin), before joining the Computer Science and Electrical Engineering departments at Columbia University.  He served as chair of the Department of Computer Science from 2004 to 2009, as Engineering Fellow at the US Federal Communications Commission (FCC) in 2010 and 2011, and as Chief Technology Officer at the FCC since 2012. He has published more than 250 journal and conference papers, and more than 70 Internet RFCs.  Protocols co-developed by him, such as RTP, RTSP and SIP, are now Internet standards, used by almost all Internet telephony and multimedia applications.  His research interests include Internet multimedia systems, ubiquitous computing, and mobile systems. He is a Fellow of the IEEE, has received the New York City Mayor's Award for Excellence in Science and Technology, the VON Pioneer Award, TCCC service award, the IEEE Region 1 William Terry Award for Lifetime Distinguished Service to IEEE and the UMass Computer Science Outstanding Alumni recognition. Klappentext This book provides a common framework for mobility management that considers the theoretical and practical aspects of systems optimization for mobile networks.In this book, the authors show how an optimized system of mobility management can improve the quality of service in existing forms of mobile communication. Furthermore, they provide a theoretical approach to mobility management, as well as developing the model for systems optimization, including practical case studies using network layer and mobility layer protocols in different deployment scenarios. The authors also address the different ways in which the specific mobility protocol can be developed, taking into account numerous factors including security, configuration, authentication, quality of service, and movement patterns of the mobiles.Key Features:* Defines and discusses a common set of optimization methodologies and their application to all mobility protocols for both IPv4 and IPv6 networks* Applies these technologies in the context of various layers: MAC layer, network layer, transport layer and application layer covering 802.11, LTE, WiMax, CDMA networks and protocols su...

List of contents

About the Authors xv
 
Foreword xvii
 
Preface xix
 
Acknowledgements xxiii
 
List of Abbreviations xxv
 
1 Introduction 1
 
1.1 Types of Mobility 2
 
1.1.1 Terminal Mobility 2
 
1.1.2 Personal Mobility 5
 
1.1.3 Session Mobility 6
 
1.1.4 Service Mobility 7
 
1.2 Performance Requirements 7
 
1.3 Motivation 8
 
1.4 Summary of Key Contributions 9
 
2 Analysis of Mobility Protocols for Multimedia 13
 
2.1 Summary of Key Contributions and Indicative Results 13
 
2.2 Introduction 14
 
2.3 Cellular 1G 15
 
2.3.1 System Architecture 15
 
2.3.2 Handoff Procedure 17
 
2.4 Cellular 2G Mobility 17
 
2.4.1 GSM 17
 
2.4.2 IS-95 19
 
2.5 Cellular 3G Mobility 23
 
2.5.1 WCDMA 24
 
2.5.2 CDMA2000 26
 
2.6 4G Networks 27
 
2.6.1 Evolved Packet System 28
 
2.6.2 WiMAX Mobility 31
 
2.7 IP-Based Mobility 34
 
2.7.1 Network Layer Macromobility 34
 
2.7.2 Network Layer Micromobility 40
 
2.7.3 NETMOB: Network Mobility 46
 
2.7.4 Transport Layer Mobility 49
 
2.7.5 Application Layer Mobility 49
 
2.7.6 Host Identity Protocol 50
 
2.7.7 MOBIKE 52
 
2.7.8 IAPP 53
 
2.8 Heterogeneous Handover 55
 
2.8.1 UMTS-WLAN Handover 55
 
2.8.2 LTE-WLAN Handover 58
 
2.9 Multicast Mobility 61
 
2.10 Concluding Remarks 71
 
3 Systems Analysis of Mobility Events 73
 
3.1 Summary of Key Contributions and Indicative Results 75
 
3.2 Introduction 75
 
3.2.1 Comparative Analysis of Mobility Protocols 77
 
3.3 Analysis of Handoff Components 78
 
3.3.1 Network Discovery and Selection 80
 
3.3.2 Network Attachment 80
 
3.3.3 Configuration 81
 
3.3.4 Security Association 81
 
3.3.5 Binding Update 82
 
3.3.6 Media Rerouting 83
 
3.4 Effect of Handoff across Layers 83
 
3.4.1 Layer 2 Delay 84
 
3.4.2 Layer 3 Delay 84
 
3.4.3 Application Layer Delay 85
 
3.4.4 Handoff Operations across Layers 85
 
3.5 Concluding Remarks 90
 
4 Modeling Mobility 91
 
4.1 Summary of Key Contributions and Indicative Results 91
 
4.2 Introduction 92
 
4.3 Related Work 92
 
4.4 Modeling Mobility as a Discrete-Event Dynamic System 93
 
4.5 Petri Net Primitives 94
 
4.6 Petri-Net-Based Modeling Methodologies 96
 
4.7 Resource Utilization during Handoff 97
 
4.8 Data Dependency Analysis of the Handoff Process 99
 
4.8.1 Petri-Net-Based Data Dependency 99
 
4.8.2 Analysis of Data Dependency during Handoff Process 100
 
4.9 Petri Net Model for Handoff 105
 
4.10 Petri-Net-Based Analysis of Handoff Event 113
 
4.10.1 Analysis of Deadlocks in Handoff 114
 
4.10.2 Reachability Analysis 120
 
4.10.3 Matrix Equations 122
 
4.11 Evaluation of Systems Performance Using Petri Nets 123
 
4.11.1 Cycle-Time-Based Approach 123
 
4.11.2 Floyd-Algorithm-Based Approach 124
 
4.11.3 Resource-Time Product Approach 125
 
4.12 Opportunities for Optimization 128
 
4.12.1 Analysis of Parallelism in Handoff Operations 129
 
4.12.2 Opportunities for Proactive Operation 129
 
4.13 Concluding Remarks 130
 
5 Layer 2 Optimization 131
 
5.1 Introduction 131
 
5.2 Related Work 131
 
5.3 IEEE 802.11 Standards 132
 
5.3.1 The IEEE 802.11 Wireless LAN Architecture 133
 
5

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.