Conference PaperPDF Available

Analysis of the packet dropping constituency in Proxy-based mobile IPv6 over WLANs

Authors:

Abstract and Figures

WiFi networks carrying IPv6 traffic with Proxy-based mobility support are to considered here. The performance of the handover function is first tested through the analysis of the effects of the packet size and inter-arrival times. Then, the sequence of events occurring during the handover period are scrutinized to observe the drawbacks that led to the obtained results. Finally, some suggestions are given to decrease the number of dropped packets, and thus improving the performance of the system.
Content may be subject to copyright.
Analysis of the Packet Dropping Constituency in
Proxy-based Mobile IPv6 over WLANs
W. Alayed
Department of Computer Engineering
King Saud University
Riyadh, Saudi Arabia
N.E. Rikli
Department of Computer Engineering
King Saud University
Riyadh, Saudi Arabia
Email: rikli@ksu.edu.sa
Abstract WiFi networks carrying IPv6 traffic with Proxy-
based mobility support are to considered here. The performance
of the handover function is first tested through the analysis of the
effects of the packet size and inter-arrival times. Then, the
sequence of events occurring during the handover period are
scrutinized to observe the drawbacks that led to the obtained
results. Finally, some suggestions are given to decrease the
number of dropped packets, and thus improving the
performance of the system.
KeywordsPMIPv6; handover; wlan; packet drop; delay.
I. INTRODUCTION
Mobile networking technology are geared toward
supporting the requirements of the current and future smart and
sophisticated mobile devices, such as cellular phones, personal
digital assistants (PDAs), and laptop computers. The shifting to
an all IP-based network that additionally should integrate all
wireless technologies in the 4G wireless network era including
all cellular networks, WiFi, WiMAX, ad hoc networks, have
led to the new developments in mobility functions of the IP
stack. Proxy Mobile IPv6 (PMIPv6) has been suggested as a
promising mobility management scheme due to its scalable
features in mobility support for IPv6 nodes in a network by
network-based management, which does not require the nodes
to be directly involved into the IP mobility management
functions.
Proxy Mobile IPv6 is the mobility protocol proposed by the
Network based Localized Mobility Management (NetLMM)
group of the IETF to be handled entirely without the mobile
node (MN) involvement [1]. This protocol is based on Mobile
IPv6 (MIPv6), extending the MIPv6 signaling messages and
reusing the Home Agent (HA) concept. The main difference
between PMIPv6 and MIPv6 is that the MIPv6 is Host-Based
while PMIPv6 is Network-Based Localized Mobility
Management which provides mobility support to MN without
their involvement. This is achieved by relocating relevant
functionality for mobility management from the MN to the
network [2] which gives the service provider the opportunity to
control the network in terms of traffic and QoS.
Other advantages of PMIPv6 include freeing up of the MN
from doing any mobility related activities and thereby saving
its resources for other purposes. Also, the signaling traffic
volume will be reduced and there will not be any tunneled
packets in the access network. These aspects become very
important since the access networks in mobile networks usually
are air interfaces. Further, PMIPv6 is also becoming a very
attractive mobility management protocol for mobile network
operators as seen by its inclusion in current 3rd Generation
Partnership Project (3GPP) standardization as a possible
alternative mobility management protocol for the Long Term
Evolution (LTE) technologies.
The performances have been evaluated using metrics such
as handover latency, service disruption time, and binding
update cost, and under various network environments and
technologies. Based on the obtained results, some
improvements have been suggested by researchers. In [3], a
Handover Coordinator for PMIPv6 is proposed to serve the
mobile node while it is in the overlap region of the current and
next coverage area. Simulation results show an improvement in
both delay and packet loss during handover. The cost may be
high due to need to place this handover coordinator entity in all
overlap regions.
In [4], a bi-casting based PMIPv6 scheme that duplicates
packets to the current and candidate points of attachment was
proposed. As in the previous case, this scheme minimizes
handover delay and packet loss. Its drawback is the inefficient
utilization of network resources such as backhaul bandwidth
and buffer space.
In [5], a fast-multicast handover procedure for PMIPv6,
where mobile nodes are unaware of mobility, was introduced.
The handover procedure optimizes multicast group
management by utilizing the context of mobile nodes.
Consequently, the service interruption time was minimized,
and the buffering functionality prevents the multicast packet
loss.
In [6], a Packet Lossless PMIPv6 with authentication has
been proposed to reduce packet losses. This was achieved by
allowing the previous mobile access gateway to register to a
Local Mobility Anchor on behalf of a new MAG during layer 2
handoff. Then, the new MAG buffers packets during handover
after registration and thus reduces packet loss. Additionally, an
Authorization and Accounting function was suggested to
authenticate the MN and to receive MNs probes securely.
In this paper, we will concentrate on a WiFi environment
where we will study the performance of the existing techniques
and suggest and analyze improvements. The rest of the paper is
organized as follows. In the next section we will present the
PMIPv6 architecture and operation, followed by the simulation
model, then the results will be presented, and finally we will
conclude with the main results and future work.
II. PROXY MOBILE IPV6
A. Architecture
The core functional entities in the PMIPv6 infrastructure
are as shown in Figure 1:
Figure 1: PMIPv6 domain basic configuration.
Mobile' Access' Gateway' (MAG):!"#$%! &'($()!
*&+,-+.%!(#&!.-/$0$()!+&01(&2!%$3'10$'3! -'! /&#10,!-,! 1! 45!
(#1(!$%! 1((16#&2! (-! $(%! 166&%%! 0$'78! "# &! 49:! $%! ;%;100)! (#&!
166&%%! +-;(&+!,-+! (#&! 45<! $8&8!(#&! ,$+%(! #-*! +-;(&+! $'! (#&!
=-610$>&2! 4-/$0$()! 41'13&.&'(! $',+1%(+;6(;+&8! ?(! $%!
+&%*-'%$/0&! ,-+! 2&(&6($'3! (#&! .-@&.&'(%! -,! 1'! 45! 1'2!
*&+,-+.%! .-/$0$()A+&01(&2! %$3'10$'3! B$(#! (#&! =49! B#$0&!
+&3$%(&+$'3!(#&!45!(-!=498! "#&+&! 1+&! .;0($*0&! 49:%! $'!1!
C4?C@D!2-.1$'!EFG8!
Local' Mobility' Anchor' (LMA):!"#$%! $%! 1'! &'($()!
B$(#$'!(#&!/167/-'&!'&(B-+7!(#1(!.1$'(1$'%!1!6-00&6($-'!-,!
+-;(&%! ,-+! $'2$@$2;10! 45%! B$(#$'! (#&! C4?C@D! 2-.1$'8! ?(!
16(%!$'!1!%$.$01+!B1)!(-!(#&!#-.&!13&'(!HI9J!$'!4?C@D!1'2!
$(!$%!+&%*-'%$/0&!,-+!.1$'(1$'$'3!(#&!%(1(&!-,!(#&!45%!;%$'3!
(#&!/$'2$'3!616#&!&'(+$&%!EFG8!!
B. Operation
When a MN enters the PMIPv6 domain, it has the option to
send a Router Solicitation message. The MAG detects the
attachment and contacts the LMA by sending a Proxy Binding
Update message (PBU). The LMA processes the PBU message
and assigns the MN with Home Network Prefixes. It also sets
up a Binding Cache Entry (BCE) in an internal cache table.
The BCE main fields are the Mobile Node Identifier (MN-ID),
the prefix assigned and the MAG’s IP address visible from the
LMA (the Proxy Care-of Address (P-CoA)). Then, it sends a
Proxy Binding Acknowledgement (PBA) to the MAG which
includes the assigned home prefix(es). The LMA also sets up a
bidirectional tunnel with the MAG that can be used for
forwarding traffic.
As soon as the MAG receives the PBA, it sends a Router
Advertisement message (RA) to the MN with the available
prefixes for which the MN uses to configure its IP address. The
MN can use either the state-full or state-less modes for IP
configuration, based on the modes that are permitted on the
link as indicated by the (RA) message. Once the address is
configured on the MN, it becomes ready to send and receive
packets. This procedure is shown in Figure 2.
Figure 2: PMIPv6 message signaling [7].
Any packets directed to the MN are first received by the
LMA. The LMA checks the packets destination address,
compares it with the internal cache, and forwards them using
the bidirectional tunnel to the MAG that the MN is connected
to. The MAG receives the packets, removes the outer header,
and forwards the packet to the MN. The MN can send packets
to the pertinent MAG, which then forwards them to the LMA
using the tunnel. The LMA removes the outer header and
routes them to the CN.
When the MN leaves the network for a handover, the
MAG will detect its disconnection and send a signal to the
LMA about this disconnection. This is signal is a
deregistration message. The LMA starts a timer for the entry
corresponding to that MN in the binding cache table. If a PBU
message for that MN is received before the timer times out, a
result of a new attachment during a handover, then the LMA
updates the Binding Cache Entry for that MN and the timer is
cancelled. If the timeout happens, then the LMA removes the
Binding Cache Entry corresponding to that MN from the
internal table. This procedure is shown in Figure 3.
Figure 3: Mobile Node Handover -Signaling call flow [7].
III. SIMULATION MODEL
The network topology of the test network is as shown in
Figure 4. It consists of two WiFi subnets, serviced by MAG1
and MAG2. Each network is operating at 11Mbps data rate
and with a coverage area of 20 m2. The mobile node (MN) is
assumed moving in a straight line from MAG1 (p-MAG)
towards MAG2 (n-MAG) with a constant speed of 50m/s. The
source of the data stream is the Correspondent Node (CN),
which generates a CBR traffic consisting of fixed sized UDP
packets at fixed intervals.
We have chosen a simple network and simple mobility
model to get a tractable simulation model. This will allow us
to concentrate on monitoring the operation of PMIPv6 without
including the other factors such as congestion, random
movement … etc.
The wired links are duplex links that operate at 100 Mbps
with default delay of 1 ms except for the (CN-LMA) link
which has a default delay of 10 ms. The queuing is a drop tail
queue with a maximum length of 30 packets.
Figure 4: PMIPv6 network setup.
IV. RESULTS AND DISCUSSIONS
The simulation of the network in Figure 4 has been
implemented using ns-2.29-nist. The obtained results are to be
discussed into two parts. First, we present the performance
results obtained at various links in the network. Then, in the
second part we correlate these results to the actual operation of
the protocol.
A. Link-based performance
1) CN-MN
Different simulation scenario results are shown in Figure 5
and Figure 6. In Figure 5 is shown the packet drop rate as a
function of the inter-arrival time and with packet size as a
parameter. We notice that the packet drops increase as the
traffic intensity increases (inter-arrival time decreases), and
that the two parametric curves are almost identical.
Figure 5: Interval and packet size impact on (end-to-end)
drops.
In Figure 6 is shown the end-to-end delay as a function of
the inter-arrival time with the packet size as a parameter. At
heavy traffic, the queuing delay increases the end-to-end delay,
while at lower traffic intensities the total delay is almost
constant, and consists merely of the propagation and
transmission delays.
Figure 6: Interval and packet size impact on (end-to-end)
average delay.
We may notice that the average end-to-end delay (CN-MN)
and the end-to-end total packet drops differ for each case only
due to the change in traffic intensity, and do not have anything
to do with PMIPv6.
2) MAG-MN
However, the PMIPv6 impact is significant on the MAG-
MN link as shown in Figure 7 and Figure 8. The variation in
dropped packets is noticeable for both the changes in packet
size and inter-arrival times. In all cases however, there is a
steady decrease in the dropping rate as the inter-arrival times
are increased. At high traffic intensity, it is more for smaller
packet size, and then it switches after 0.02 sec inter-arrival
time, where it becomes higher for the larger packet size.
Figure 7: Interval and packet size impact on (MAG-to-
MN) drops.
The variation in the delay due to the increase in traffic
intensity is small, while that due to the packet size is
noticeable. In fact, there is a constant gap between the
performances with different packet sizes, and practically
constant performance with a fixed packet length, as shown in
Figure 8.
Figure 8: Interval and packet size impact on (MAG-to-
MN) average delay.
After running many simulation experiments, it became
clear that packet sizes and inter-arrivals do not have that much
impact on the overall simulation results. Knowing that the
LMA is always sending packets to the MAGs at constant rate
explains why the average delay (MAG->MN) for a specific
packet size is the same.
B. Tracing the dropped packets
Figure 9 shows the times when the successfully received
packets were sent. In the first part, the packets were sent
through the current MAG (p-MAG), while in the second they
were sent through the new MAG (n-MAG). There is a clear
gap between the two segments, which corresponds to the
dropped packets. This interval includes the handover period.
Our goal in this section is to shade some light on how the
packets are dropped and why. We hope by doing so, to
improve the performance of this handover technique.
1) Sending Times
From Figure 10, it is clear that while the mobile node is
moving and the signal strength gets below the minimum
threshold at p-MAG, the LMA still continues to send packets
to p-MAG. It stops only when the LMA receives a PBU from
n-MAG, at the new connection point.
Figure 9: Sending time for successful packets.
The second portion shows that all the packets that arrived at
p-MAG were sent unsuccessfully, since the connection with
the MN was lost.
Figure 10: Sending time for dropped packets.
Tracing PMIPv6 performance applied on WiFi network
shows that all packets have been sent from the LMA during the
period (time from p-MAG loosing the signal until the LMA
receives a PBU from n-MAG) are dropped as it is shown in
Figures 9 and Figure 10. It is clear that all dropped packets are
sent from the LMA to p-MAG before the LMA receives a PBU
from n-MAG. But the p-MAG still carries on trying to send
them to the MN that is no longer connected to it.
2) Packet Exchange
During the handover period a sequence of events has been
recorded in a typical handover scenario. The first part, as
shown in Figure 11, corresponds to the loss of connectivity
between the MN and the p-MAG without any action being
taken. It starts when the first packet is retransmitted (although
other reasons may be the cause).
We notice that after a packet is sent and an ACK is not
received, it will be resent up to seven times. After the seventh
trial the packet is dropped. This explains why the packet drops
still occur even after the PMIPv6 handover is completed.
Figure 11: Handover period in details - part 1.
The second part, as shown in Figure 12, starts when the
MN realizes that it is disconnected from the p-MAG, and starts
scanning for a new network. The scanning operation may be
repeated over various channels, and stops when it chooses the
channel over which the available access point is operating.
Then, the MN sends a Probe request to the n-MAG. We notice
that packets are still sent from the LMA to p-MAG where they
are all dropped.
The third and last part starts when the n-MAG accepts the
connection and sends an Association response to MN and a
PBU to LMA, and the handover is complete. The packet drop
ends after the Association Response between the n-MAG and
MN has been confirmed.
Table 1 shows a detailed summary for the dropped packets.
Knowing that for a total of 29 packets that are dropped only 7
are dropped before the MN has established a connection to n-
MAG, which means that there are 22 packets, i.e. most of the
packets, can be saved.
So, our suggestions are based on this remark, which tries to
avoid such loss to improve the performance of the system.
Thus we suggest the following:
Whenever the n-MAG sends a probe response to
the MN it also sends a (Stop sending) signal to the
LMA. Consequently, the LMA will stop
forwarding packets to the p-MAG and holds them
in its queue. As soon as the MN is successfully
connected to n-MAG, it restarts forwarding those
packets again to n-MAG.
When the BCE is updated at the LMA, the LMA
should send a message to p-MAG requesting all
the queued packets targeted to the MN to be sent
back. Then the LMA will forward those packets to
the n-MAG.
The LMA stops sending packets to the p-MAG
after a number of drops. After several packet
drops, the LMA should notice that the MN has lost
connection to its p-MAG. Therefore, the LMA
should stop sending packets to p-MAG and waits
until the MN gets connected to n-MAG.
Afterwards, the LMA forwards its queued packets
to the n-MAG.
We believe that these suggestions when implemented will
both decrease the total packets loss and increase the capacity
efficiency of the system. The only hurdle that may hinder such
achievement is the programing efficiency of the protocol that
will allow this in real time.
Figure 12: Handover period in details - part 2.
Figure 13: Hanover period in details - part 3.
Table 1: Drops count in details.
Total packet drop
29
Dropped packets id
1034-1063
Number of packet drops before the connection
to MAG2 has been established
7
Dropped packet (s) id before the connection to
MAG2 has been established
1034-1040
Number of packet drops after the connection
to MAG2 has been established
22
Dropped packet (s) id after the connection to
MAG2 has been established
1041-1063
V. CONCLUSION
In this paper, we have considered a WiFi network
consisting of two overlapping networks and a MN moving in a
straight line between them. PMIPv6 was considered as the
means of handover at layer three. The purpose of this setup
was to study the detailed operation of the standard and discover
any possible inefficiencies.
The performance of the network was tested for the delay
and packet drop. Then, the sequence of events happening
during the handover period has been observed. Based on our
observations, some suggestions have been proposed to decrease
the number of dropped packets and improve the performance
of the system.
In our future work, these suggestions will be implemented
and tested through simulation. Their effects on other
performance criteria will be also analyzed.
REFERENCES
EKG ?L"M<! N5&(B-+7A/1%&2! =-610$>&2! 4-/$0$()! 41'13&.&'(<N! $'!
O#1+(&+A$&(,A'&(0..APQ<!FPKP8!!
EFG "8! 4&0$1<! O8! R8! S&+'1+2-%<! 28! 08! T8! 9'(-'$-! <! M8! :$;%(! 1'2! 48!
O102&+-'<! N?C! M0-B! 4-/$0$()! $'! C4?C@D! S1%&2! 5&(B-+7%U!
V-0;($-'! W&%$3'! 1'2! LX*&+$.&'(10! L@10;1($-'<N! Y$+&0&%%!
C&+%-'10! O-..;'$61($-'%<! @-08! Q<! '-8! DK<! *8! DPZ[DF\<! ]!
5-@&./&+!FPKK8!!
EZG =8! 41313;01<! I8! O#1'! 1'2! T8! M10-B-<! N96#$&@$'3! V&1.0&%%!
4-/$0$()! (#+-;3#!I1'2-@&+! O--+2$'1($-'! $'! 1! 5&(B-+7A/1%&2!
=-610$>&2! 4-/$0$()! 41'13&2! I&(&+-3&'&-;%! L'@$+-'.&'(<N! $'!
C&+%-'10! ?'2--+! 1'2! 4-/$0&! ^12$-! O-..;'$61($-'%! HC?4^OJ<!
FPKP!?LLL!FK%(!?'(&+'1($-'10!V).*-%$;.!-'<!FPKP8!!
EQG R8A?8! _$.<! V8AR8! _-#! 1'2! 58AV8!_-<! NSAC4?C@DU! C4?C@D! B$(#!
S$61%($'3!,-+!V-,(!I1'2-@&+<N!$'! KK(#!?'(&+'1($-'10!O-',&+&'6&!
-'!92@1'6&2!O-..;'$61($-'!"&6#'-0-3)<!FPP`8!!
E]G R8AI8! =&&! 1'2! "8! L+'%(<! NM1%(! C4?C@D! 4;0($61%(! I1'2-@&+!
C+-6&2;+&! ,-+! 4-/$0$()Aa'1B1+&!4-/$0&! 5-2&%<N! $'! ?LLL! \Z+2!
b&#$6;01+!"&6#'-0-3)!O-',&+&'6&!Hb"O!V*+$'3J<!FPKK8!!
EDG V8! ^);<! :8Ac8! _$.<! S8! _$.! 1'2! c8! 4;'<! N9! V6#&.&! (-! ^&2;6&!
C167&(! =-%%! 2;+$'3! C4?C@D! I1'2-@&+! 6-'%$2&+$'3!
9;(#&'($61($-'<N!$'!?'(&+'1($-'10!O-',&+&'6&!-'! O-.*;(1($-'10!
V6$&'6&%!1'2!?(%!9**0$61($-'%!?OOV9<!FPPd8!!
E\G L8!V8! :;'21@&00$<!_8!=&;'3<! b8!W&@1+1*100$<!_8! O#-B2#;+)!1'2!S8!
C1($<! NC+-X)! 4-/$0&! ?C@D! E^MO]FKZG<N! ?'(&+'&(! L'3$'&&+$'3!
"1%7!M-+6&!H?L"MJ<!FPPd8!
EdG 48!=$&/%6#<! L28<!98! 4;#1''1!1'2!T8!S0;.&<!N"+1'%$&'(! S$'2$'3!
,-+! C+-X)! 4-/$0&! ?C@D! E^MODP]dG<N! ?'(&+'&(! L'3$'&&+$'3! "1%7!
M-+6&!H?L"MJ<!FPKK8!
E`G OR8!S&+'1+2-%<! 98!2&! 01!T0$@1<! M8!:$;%(<!"8!4&0$1!1'2!^8!O-%(1<!N9!
C4?C@DA/1%&2! %-0;($-'! ,-+! W$%(+$/;(&2! 4-/$0$()! 41'13&.&'(!
2+1,(A/&+'1+2-%A2..A*.$*APK<N!W44!Y-+7$'3!:+-;*<!FPKF8!
... In wireless networks, the packet is dropped if the retransmitted information is still erroneous. This causes retransmission of the data, which is a waste of bandwidth and time and leads to poor network performance [2][3][4]. In addition, packets can be lost due to errors, congestion in a queue due to high traffic, collisions, hidden nodes, and link failures. ...
Article
Full-text available
The high and variable packet loss in wireless networks due to the unreliable nature of wireless channels, interference, link or router failure, fading, and shadowing wireless link are the main problems and challenges in implementing a reliable wireless network. Packet loss probability is the most important performance measure for real-time applications. Packet loss is due to errors, congestion in the queue because of high traffic, collision, hidden nodes, and link failures. In this paper, we focus on the links failure problem. To address this problem, improve the performance of wireless networks, and enhance and make the network survivability and availability more reliable, a new efficient binary joint network and channel coding (B-JNCC) technique is proposed. B-JNCC combines low-complexity parity-check (LCPC) channel coding and the wireless network erasure correcting with router code to detect lost packets to reduce the bit error rate and increase the packet delivery ratio over a wireless multiaccess channel. B-JNCC is applied at the receiver node. Simulation results show that the proposed B-JNCC outperforms the binary symbol-wise JNCC, non-binary JNCC (NB-JNCC), and NB separate network-channel coding.
... In a wireless networks the packets lost is primarily due to the link failure that leads to lower performance of the networks [1][2][3]. In addition, packets can be lost due to errors, congestion in a queue due to high traffic, collision, and hidden nodes [4]. ...
Article
Full-text available
In wireless networks packets are lost because of queue congestion during high traffic, collisions, hidden nodes, and link failures. The problem of dropped packets becomes more critical in real-time applications, such as video conferences and remote controls. This paper presents a new wireless network coding (WNC) scheme and router detection packet loss (RDPL) algorithm for retrieving packets that are lost in a wireless network. In the WNC scheme, a router combines (encodes) packets originating from the same or different sources and forwards the packets to another router. In the RDPL algorithm, the coding router sends a negative acknowledge to the upper layer routers whenever it receives only one packet or two identical packets. The proposed WNC–RDPL method increases the transmission capacity and packet delivery ratio (PDR). The architecture has been evaluated for one, two, three, and four link failures. The simulation results show that the WNC–RDPL approach obtain 100% PDR gains compared with well-known linear network coding schemes.
Conference Paper
Handover characteristics over WiMAX networks using PMIPv6 are studied. A special look is taken at the QoS provisioning, that includes an analysis of the effects of the packet size and inter-arrival times on the average delay, the packet dropping rate, and the fragmentation rate. Then, this is followed by a thorough analysis of the sequence of packets exchange during the handover period. Finally, some changes in the PMIpv6 protocol that ought to improve the system performance are suggested, including means of decreasing the number of fragmented packets.
Article
Full-text available
The ability of offloading selected IP data traffic from 3G to WLAN access networks is considered a key feature in the upcoming 3GPP specifications, being the main goal to alleviate data congestion in cellular networks while delivering a positive user experience. Lately, the 3GPP has adopted solutions that enable mobility of IP-based wireless devices relocating mobility functions from the terminal to the network. To this end, the IETF has standardized Proxy Mobile IPv6 (PMIPv6), a protocol capable to hide often complex mobility procedures from the mobile devices. This paper, in line with the mentioned offload requirement, further extends PMIPv6 to support dynamic IP flow mobility management across access wireless networks according to operator policies. Considering energy consumption as a critical aspect for hand-held devices and smart-phones, we assess the feasibility of the proposed solution and provide an experimental analysis showing the cost (in terms of energy consumption) of simultaneous packet transmission/reception using multiple network interfaces. The end-to-end system design has been implemented and validated by means of an experimental network setup. KeywordsProxy Mobile IPv6–Flow mobility–Experimental evaluation
Conference Paper
Full-text available
This paper proposes an extension of proxy mobile IPv6 (PMIPv6) with bicasting for soft handover, named B-PMIPv6. The proposed scheme is compared with the existing PMIPv6 handover scheme by the theoretical analysis and the network simulator. From the experimental results, we can see that the proposed B-PMIPv6 scheme can provide smaller handover latency and reduce packet loss than the existing schemes.
Conference Paper
Full-text available
Mobile IPv6 (MIPv6) is a presentative protocol which supports global IP mobility. MIPv6 causes a long handover latency that a mobile node (MN) doesnpsilat send or receive packets. This latency can be reduced by using Proxy Mobile IPv6 (PMIPv6). PMIPv6 is a protocol which network supports IP mobility without participation of the MN, and is studied in Network-based Localized Mobility Management (NETLMM) working group of IETF. There is much packet loss during handover in PMIPv6, although PMIPv6 reduces handover latency. In this paper, to reduce packet loss in PMIPv6 we propose Packet Lossless PMIPv6 (PL-PMIPv6) with authentication. In PL-PMIPv6 a previous mobile access gateway (pMAG) registers to a Local Mobility Anchor (LMA) on behalf of a new MAG (nMAG) during layer 2 handoff. Then, the nMAG buffers packets during handover after registration. Therefore, PL-PMIPv6 can reduce packet loss than them in MIPv6 and PMIPv6. Also, we use Authentication,Authorization and Accounting (AAA) infrastructure to authenticate the MN and to receive MNpsilas profiles securely. We shows performance of PL-PMIPv6 through comparison of packet loss during handover of MIPv6, PMIPv6 and PL-PMIPv6.
Conference Paper
As IP multicast allows the efficient use of network bandwidth for multipoint communication, it is expected to be an essential communication type for delivering multimedia services to mobile nodes (MNs). In this paper, we review current status of PMIPv6 multicast listener support being standardized in the IETF and point out limitations of the current approach. Then, we introduce a fast multicast handover procedure for a PMIPv6 environment wherein network-based mobility man- agement is deployed for mobility-unaware MNs. The introduced fast PMIPv6 multicast handover procedure optimizes multicast group management by utilizing the context of mobility-unaware MNs. We evaluate the proposed multicast handover procedure compared to the base one through the developed analytical models and confirm that introduced fast PMIPv6 multicast handover procedure provides the reduced service interruption time compared to the based one during handovers. Index Terms—Context Transfer, MultiMob, PMIPv6.
Conference Paper
The next generation wireless networks will comprise interworking heterogeneous wireless access network technologies. The interworking of these networks will enable access ubiquity, hence mobility, particularly vertical handover between the networks becomes topical. Thus, coordination within this diverse environment in terms of handover management is required to improve the handover performance. Furthermore, it is recommended to maintain simplicity in the resource-poor mobile devices and yet keep them powerful for efficiently running rich real-time multimedia applications during mobility. Thus, this paper motivates that the handling of handover operations must be kept in the network infrastructure. Consequently, the vertical handover mechanism introduced in the paper exploits the advantages of network-based mobility management in heterogeneous wireless networks and proposes the incorporation of a network-based handover coordinator to improve the handover performance between the networks in terms of handover delay and packet loss. After all, mobility management protocols do not support seamless handover on their own. The handover coordinator, therefore, ensures that the vertical handover between the networks is transparent to active connections during the handover period. Simulation results show the benefits of the handover coordinator to the network-based mobility management in a heterogeneous wireless access environment in terms of reduced handover delay and packet loss.
Proxy Mobile IPv6 Internet Engineering Task Force
  • E S Gundavelli
  • K Leung
  • V Devarapalli
  • K Chowdhury
  • B Pati
Transient Binding for Proxy Mobile
  • M Liebsch
  • A Muhanna
  • O Blume
M. Liebsch, Ed., A. Muhanna and O. Blume, "Transient Binding for Proxy Mobile IPv6 [RFC6058]," Internet Engineering Task Force (IETF), 2011.
A PMIPv6--based solution for Distributed Mobility Management draft--bernardos--dmm--pmip--01
  • Cj
  • A Bernardos
  • F De La Oliva
  • T Giust
  • R Melia
  • Costa
CJ. Bernardos, A. de la Oliva, F. Giust, T. Melia and R. Costa, "A PMIPv6--based solution for Distributed Mobility Management draft--bernardos--dmm--pmip--01," DMM Working Group, 2012.
Network--based Localized Mobility Management
IETF, "Network--based Localized Mobility Management," in Charter--ietf--netlmm--04, 2010.