Fig 3 - uploaded by A. Hamid Aghvami
Content may be subject to copyright.
Pointers between M-PDP and mobility/routing contexts at the SGSN.

Pointers between M-PDP and mobility/routing contexts at the SGSN.

Source publication
Article
Full-text available
This paper proposes a multicast mechanism for the universal mobile telecommunication system (UMTS). Our scheme relies on establishing multicast tunnels throughout the network that allow multicast packets to be transferred in an optimal manner on shared links toward multiple destinations. We describe the mechanisms of the scheme in establishing and...

Context in source publication

Context 1
... order to facilitate location updates, each PDP or RAB context belonging to a multicast user stores the identifier of the M-PDP or M-RAB context that it is associated with. The M-PDP or M-RAB context identifiers are inserted into the PDP or RAB contexts at group registration and removed when a subscriber leaves a multicast group. Fig. 3 illustrates the pointers utilized by an M-PDP context maintained at the SGSN. An MUC at the SGSN acts as a pointer to the MM and PDP contexts of a multicast user, with the IMSI as well as the TI and NSAPI pair serving as the keys for identi- fying the matching mobility and routing contexts, respectively. Similarly, an M-RAB context at ...

Similar publications

Article
Full-text available
In this study, the authors present results of a call testing campaign using voice over long term evolution (VoLTE) technology on the radio access network of the operator Telecom Italia mobile. The quality of the voice call is expressed by means of the mean opinion score (MOS). The electromagnetic propagation environment has been reproduced within a...
Conference Paper
Full-text available
Wireless communication technologies like GPRS, UMTS and WLAN, combined with the availability of high-end, affordable mobile devices enable the development of advanced and innovative mobile services. Devices such as mobile phones and personal digital assistants let the users access a wide range of new offerings whenever and wherever they happen to b...
Conference Paper
Full-text available
In this work we describe a reactive algorithm for management of mobile controlled vertical handover (VHO) in dual-mode terminals provided with UMTS and IEEE 802.11 network interface cards (NICs). The VHO aims at providing service continuity and maximize throughput while limiting the so called ldquoping-pong effectldquo. We collected experimental re...
Article
Full-text available
In this project, third generation (3G) technologies research had been carried out to design and optimization conditions for 3G network. The 3G wireless mobile communication networks are growing at an ever faster rate, and this is likely to continue in the foreseeable future. Some services such as e-mail, web browsing etc allow the transition of the...
Conference Paper
Full-text available
Handover is the main technique that is responsible for the mobility management in the cellular network. The decisions of handover from each cell is only limited to a certain number of cells called neighbors and the list that contains these neighbors is called the neighboring cell list (NCL). Improper construction of NCL may result in either missing...

Citations

... To implement the performance of the proposed work, the signalling cost should be analysed, same as that in [2], [8], [10], [11], the cost for signalling function consists of cost for transmission and cost for processing. The cost for transmission is directly proportional to two mobile nodes distance in the network. ...
Article
Full-text available
Access to internet has developed world wide and all the electronic devices are designed with wireless communication interface. Any time people can access internet from anywhere. So the Internet Engineering Task Force introduced the concept of moving network from one place to another. They used Virtual Private Network, but it cannot be used for real-time applications. In this paper, the people can communicate between private network and public network in a secured way using AES algorithm and the movement of network is considered. The Virtual Private Network gateway is used for the secured data transmission. The cost for signalling gets reduced by using this approach. The performance is evaluated using analytical models and simulations.
... However, there may be a situation when the communication cost in the wireless channel is higher than that between a RSU and the AAA server due to the contention among wireless nodes. Therefore, we also consider that the cost δ is in the range 0 < δ < 10 [35]. The cost ε between the RSU is generally less than one unit. ...
Article
VANETs have been developed to improve the safety and efficiency of transportation systems (V2V communications) and to enable various mobile services for the traveling public (V2I communications). For VANET technologies to be widely available, security issues concerning several essential requirements should be addressed. The existing security architectures and mechanisms have been studied separately in V2V and V2I networks, which results in duplicated efforts, security modules, and more complex security architectures. In this paper, we propose a unified security architecture and its corresponding security protocols that achieve essential security requirements such as authentication, conditional privacy, non-repudiation, and confidentiality. To the best of our knowledge, this paper is the first study that deals with the security protocol in V2V as well as the handover authentication in V2I communications. Our proposal is characterized by a low-complexity security framework, owing to the design and unification of the security architectures and modules. Furthermore, the evaluation of the proposed protocols proves them to be more secure and efficient than existing schemes. Copyright © 2010 John Wiley & Sons, Ltd.
... 4장에서 설명한 바와 같이, 시그널링 비 용 함수는 전송 비용과 처리 비용으로 구성된다. 우리는 전송비용이 발신지와 목적지 노드 사이의 거리에 비례한 다고 가정하고, 처리비용은 SIP 메시지[26], [27], [28], ...
Article
The mobile Virtual Private Network (MVPN) of Internet Engineering Task Force (IETF) is not designed to support NEwork MObility (NEMO) and is not suitable for real-time applications. Therefore, an architecture and protocol which supports VPN in NEMO are needed. In this paper, we proposed the cost-reduced secure mobility management scheme (CR-SeMMS) which is designed for real-time applications in conjunction with VPN and also which is based on the session initiation protocol (SIP). Our scheme is to support MVPN in NEMO, so that the session is well maintained while the entire network is moved. Further, in order to reduce the authentication delay time which considers as a delaying factor in hands-off operations, the signaling time which occurs to maintain the session is shortened through proposing the hands-off scheme adopting an authentication method based on HMAC based One Time Password (HOTP). Finally, our simulation results show the improvement of the average hands-off performance time between our proposed scheme and the existing schemes.
... On the other hand, an end-to-end cost analysis model for the evaluation of different one-to-many packet delivery schemes in UMTS is presented in research works [8] and [9]. In these works, the authors consider different transport channels for the transmission of the MBMS data over the UMTS interfaces. ...
... After the correct multicast packet reception at the e-NBs that serve multicast users, the e-NBs transmit the multicast packets to the multicast users via MTCH transport channels. The total telecommunication cost for the transmission of the data packets over M1 interface is derived from (8), where N eNB represents the number of e-NBs that participate in MBSFN transmission, N p the total number of packets of the MBSFN session, and D M1 is the cost of the delivery of a single packet over the M1 interface. ...
Article
Long Term Evolution (LTE) is the most promised latest step towards the 4th generation of radio technologies designed to increase the capacity and speed of mobile communications with main target the support of the so-called “Mobile Broadband”. To support Multimedia Broadcast/Multicast Services (MBMS), LTE offers the possibility to transmit Multimedia Broadcast multicast service over a Single Frequency Network (MBSFN), where a time-synchronized common waveform is transmitted from multiple cells for a given duration. In this manuscript we analytically present the MBSFN delivery method and evaluate its performance. The critical parameters of primary interest for the evaluation of the scheme are the packet delivery cost and its scalability. To this direction, a telecommunication cost analysis of the MBMS service is presented based on the transmission cost over the air interface, as well as the costs of all interfaces and nodes of the MBSFN architecture. Based on this cost analysis we determine the ideal number of cells that should participate in the MBSFN transmission in order to improve the overall MBSFN performance. Since the performance of the MBSFN scheme mainly depends on the configuration of the LTE network that is under investigation, we consider different network topologies, MBSFN deployments and user distributions.
... A broadcast of newly created FEC packets benefits all the receivers, which have not successfully reconstructed the original source block. The Raptor encoder can generate as many encoding symbols as desired (on the fly) from the source symbols of a source block of data [15]. Raptor codes subdivide files into a number of source blocks and the FEC repair symbols are generated for each source block. ...
... The purpose of file repair procedure is to repair lost or corrupted file segments that appeared during the download of the MBMS service [15]. At the end of the MBMS data transmission, each user identifies the missing segments of the transmitted file and sends a file repair request message to the file repair server. ...
Article
Full-text available
Long Term Evolution (LTE) systems have been specified and designed to accommodate small, high per-formance, power-efficient, end-user devices. The evolved Multimedia Broadcast/Multicast Service (e-MBMS) fea-ture is introduced by the 3rd Generation Partnership Project (3GPP) as a complement to the existing MBMS service in order to accommodate multicast groups that are interested in receiving the same data. MBMS service is provided by MBMS over a Single Frequency Network (MBSFN) and/or Point-To-Multipoint (PTM) transmission methods. One of the challenges of MBMS is the complete error recovery of the transmitted files, a matter of great importance since the distribution of binary data must result in 100% error-free download. To fulfill this tight requirement, Forward Error Correction (FEC) mechanism has been proposed by 3GPP. In this work, we investigate the reliable multicasting by introducing a transmission method that combines the advantages of MBSFN and PTM transmission methods. We compare several FEC-based file recovery methods and evaluate them against various network parameters in a realistic simulation environment. The comparison is based on a cost-oriented analysis of MBMS service that takes into account the transmission cost over all the interfaces and nodes of the LTE architecture. The simulation results are performed with the aid of a new simulation tool and show that the performance of the file repair schemes depend on the network configuration.
... Furthermore, the authors of [8] proposed analytical approaches for the evaluation and validation of MBSFN enabled networks. Finally, there have been several studies for PTM over UMTS networks [9], [10]. ...
Conference Paper
Full-text available
Long Term Evolution (LTE) systems allow the transmission of rich multimedia services by utilizing the Multimedia Broadcast/Multicast Service (MBMS) over a Single Frequency Network (MBSFN). During MBSFN transmission a time-synchronized common waveform is transmitted from multiple cells. The rd Generation Partnership Project (3GPP) has specified that Point-to-Multipoint (PTM) transmission can be used in combination with MBSFN to provide MBMS-based services. In this paper we evaluate the combined transmission scheme in terms of Resource Efficiency (RE). The evaluation is performed through simulation experiments for various user distributions and LTE network configurations. The experiments are conducted with the aid of a proposed algorithm, which estimates the Spectral Efficiency (SE) of each cell and the RE of the network, and is also able to formulate the optimal network deployment that maximizes the network’s RE. For each of the examined scenarios, we present the most efficient solution (in terms of RE) selected by our algorithm and we compare it with other transmission schemes.
... A broadcast of newly created FEC packets benefits all the receivers, which have not successfully reconstructed the original source block. The Raptor encoder can generate as many encoding symbols as desired on the fly from the source symbols of a source block of data [8]. Raptor codes subdivide files into a number of source blocks and the FEC repair symbols are generated for each source block. ...
Conference Paper
Full-text available
With the booming of multimedia services, the rd Generation Partnership Project (3GPP) has introduced the evolved Multimedia Multicast/Broadcast Service (e-MBMS) feature for LTE systems. The main objective of MBMS is to introduce real broadcast distribution capabilities into cellular systems. This purposed 3GPP to introduce the MBMS over a Single Frequency Network (MBSFN) operation. In this work we investigate the provision of MBMS service over a combination of MBSFN and PTM transmission schemes. We focus on the file repair procedure, because the distribution of binary data via MBMS must result in 100% error-free downloaded files. In order to achieve this goal, MBMS offers a Forward Error Correction (FEC) mechanism. Our simulation results show that there are some file repair schemes that achieve better performance as far as different network configurations are concerned. Furthermore, we compare all the file recovery methods and evaluate them against various network parameters in a realistic simulation environment.
... It is important to mention that several previous research works examine the performance of PTM and MBSFN transmissions. More specifically, an end-to-end cost analysis model for the evaluation of different one-to-many packet delivery schemes in Universal Mobile Telecommunication System (UMTS) is presented in research works [2] and [3]. In these works, the authors consider different transport channels for the transmission of the MBMS data over UMTS systems. ...
Conference Paper
Full-text available
The 3rd Generation Partnership Project (3GPP) has introduced the evolved Multimedia Broadcast/Multicast Service (e-MBMS) feature for cellular systems as an evolution to the existing MBMS service. To support e-MBMS in Long Term Evolution (LTE) systems, 3GPP recommends the use of Point-to-Multipoint (PTM) transmissions and MBMS over a Single Frequency Network (MBSFN). MBSFN is a new feature where a time-synchronized common waveform is transmitted from multiple cells. In this paper we investigate the provision of MBMS service over a combination of MBSFN and PTM transmission methods. A cost analysis of the MBMS service is presented based on the transmission cost over all the interfaces and nodes of the LTE architecture. We evaluate the performance of this transmission scheme from telecommunication cost perspective and we compare it with other transmission schemes. The performance evaluation has been performed with the aid of a new simulation tool that estimates the cost for the MBMS provision under different network topologies, MBSFN deployments and user distributions.
... We perform the cost evaluation in terms of telecommunication cost. It should be noted that although other studies like [14] consider the cost of multicast group management as part of the total telecommunication cost, this study does not follow the same approach. The reason is that this study focuses only on the actual data transmission along with its cost. ...
Article
3rd Generation Partnership Project (3GPP) has standardized the use of forward error correction (FEC) for the provision of reliable data transmission in the mobile multicast framework. This error control method inevitably adds a constant overhead in the transmitted data. However, it is so simple as to meet a prime objective for mobile multicast services; that is scalability to applications with thousands of receivers. In this paper, we present a study on the impact of application layer FEC on mobile multicast transmissions. We examine whether it is beneficial or not, how the optimal code dimension varies based on network conditions, which parameters affect the optimal code selection, and how this can be done. Additionally, we focus on one of the most critical aspects in mobile multicast transmission, which is power control. The evaluation is performed with the aid of a novel scheme that incorporates the properties of an evolved mobile network, as they are specified by the 3GPP. Copyright © 2010 John Wiley & Sons, Ltd.
... The universal mobile telecommunications system (UMTS) multicast architecture [9] employs standard Internet Protocol (IP) multicast protocols. A multicast mechanism for UMTS has been proposed [10], which establishes multicast tunnels throughout the UMTS network that allow multicast packets to be transferred on shared links toward multiple destinations. The tradeoffs between the broadcast, multiple-unicast, and multicast approaches for one-to-many packet-delivery services in the UMTS have been investigated [11]. ...
Article
Mobile Worldwide Interoperability for Microwave Access (WiMAX) includes a multimedia multicast/broadcast service (MBS), but delay-sensitive applications such as video and audio streaming require the combination of efficient handling of wireless-link bandwidth and reduced handover delays, which remains a challenge. To reduce the handover delay in the MBS, the IEEE 802.16e standard introduces an MBS zone, which is a group of base stations that are broadcasting the same multicast packets. However, this raises the MBS traffic load on Mobile WiMAX networks, particularly the wireless part. This paper presents an MBS architecture that is based on location-management areas (LMAs), which can increase the sizes of MBS zones to reduce the average handover delay without too much bandwidth waste. An analytical model is developed to quantify service-disruption time, bandwidth usage, and blocking probability for different sizes of MBS zones and LMAs while considering user mobility, user distribution, and MBS session popularity. Using this model, we also propose how to determine the best sizes of MBS zones and LMAs, along with performance guarantees. Analytical and simulation results demonstrate that our LMA-based MBS scheme can achieve a bandwidth-efficient multicast delivery while retaining an acceptable service-disruption time.