ArticlePDF Available

Fast handover support in a WLAN environment: Challenges and perspectives

Authors:

Abstract and Figures

While handover management has traditionally used radio-technology-specific mechanisms, the need for integration of this diverse network environment has obviated the "push" of the handover functionality to the generic IP layer that serves the rendezvous point of underlying technologies. In this context, we study and analyze the implications of the link-layer agnostic operation of IP handover control on handover performance, having as a reference the fast mobile IPv6 protocol. We show that the behavior of the protocol (i.e., whether a reactive or proactive operation will be executed) is highly dependent on the timely availability of link layer information. A non-exhaustive list of generic link-layer triggers used for this purpose, as identified by the IEEE 802.21 WG, is also presented. Last, we apply this generic framework to a WLAN environment running fast mobile IPv6 and study the improvements in fast handoff support.
Content may be subject to copyright.
IEEE Network • May/June 2005
14
0890-8044/05/$20.00 © 2005 IEEE
he explosion of mobile data communications, the emer-
gence of multitechnology environments with diverse
capabilities, the integration of such environments at
both terminal and network sides, and the great variety
of offered end-user services have completely changed the role
of handover management, which nowadays faces the challenge
of adaptation to such heterogeneous and multiparametric envi-
ronments. Traditionally, handover management in cellular net-
works is carried out by technology-specific mechanisms since it
has only involved intratechnology handovers, given the single-
tier network landscape and the capabilities of single-mode ter-
minals. By intratechnology handovers we mean handovers
between equipment of the same technology [1], such as Uni-
versal Mobile Telecommunications System (UMTS) to UMTS
or Global System for Mobile Communications (GSM) to
GSM. Another important aspect is that such handovers, even
after the integration of the IP and telecom worlds that brought
the IP layer to the terminal side, are transparent to the IP
layer and still only involve layer 2 mechanisms (i.e., radio-tech-
nology-specific mechanisms). Therefore, intratechnology hand-
over in such networks is in some way synonymous with the
notion of layer 2 handover.
In all cases, session continuity and minimal handover dis-
ruption time has always been the primary goal of handover
management. This concept of
handover seamlessness is, how
-
ever, very much dependent on the service being provided. For
example, in pure voice networks such as GSM, seamlessness is
perceived as delivering the voice service with bounded hand-
over latency in order not to disturb voice conversation. In
General Packet Radio Service (GPRS)/UMTS networks offer-
ing data services as well, handover seamlessness of a Web ses-
sion is interpreted as minimizing packet loss without further
concerns on additional delays. This target is more easily
reached by certain technologies, such as UMTS, that support
macrodiversity, that is, the capability of a terminal to
send/receive radio frames to/from more than one base stations
(BSs) at the same time (a layer 2 capability). Therefore, a
mobile terminal can be serviced in parallel by more than one
BSs and thus perform soft handover, where no break in radio
communication occurs. For other technologies, such as wire-
less LANs (WLANs), no such capability is supported. The
mobile terminal cannot be serviced in parallel by more than
one access point (AP) — the BS equivalent in WLAN termi-
nology — and therefore has to break its communication with
its current AP before establishing a connection with a new
one. This break in communication is from a layer 2 perspec-
tive.
The need for integration of this heterogeneous network
environment and the emergence of multimode terminals have
placed extra requirements on handover management. It is
common sense that this functionality needs to be “pushed” to
the IP layer, which is generic enough and serves as the ren
-
dezvous point for all underlying technologies. Therefore,
handovers between APs of different types (intertechnology
handovers) are better treated at the IP layer, the lingua franca
of communication protocols. In addition to this well accepted
decision of the research community, the need for migration of
technology-specific core infrastructures toward all-IP networks
has been identified, and great effort is also put in this direc-
tion [2, 3]. This makes more evident the fact that in the near
future, intertechnology handoffs will be handled at the IP
layer since the IP gateway of such evolved networks will not
be a distant network entity but rather collocated with the
radio-specific gateway, for example, the serving GPRS support
node (SGSN) or radio network controller (RNC) in the
UMTS network.
In this context, handoff techniques in conjunction with
mobility management mechanisms
at the IP layer will be the
main research topic within the broader handover management
field. Certainly, such techniques are not coming to replace the
well-performing soft handover capabilities of certain radio
technologies but have a different application area. For exam-
T
T
Lila Dimopoulou, Georgios Leoleis, and Iakovos S. Venieris
National Technical University of Athens, Greece
Abstract
While handover management has traditionally used radio-technology-specific mech
-
anisms, the need for integration of this diverse network environment has obviated
the “push” of the handover functionality to the generic IP layer that serves the ren
-
dezvous point of underlying technologies. In this context, we study and analyze the
implications of the link-layer agnostic operation of IP handover control on handover
performance, having as a reference the Fast Mobile IPv6 protocol. We show that
the behavior of the protocol (i.e., whether a reactive or proactive operation will be
executed) is highly dependent on the timely availability of link layer information. A
non-exhaustive list of generic link-layer triggers used for this purpose, as identified
by the IEEE 802.21 WG, is also presented. Last, we apply this generic framework
to a WLAN environment running Fast Mobile IPv6 and study the improvements in
fast handoff support.
Fast Handover Support in a WLAN
Environment: Challenges and Perspectives
DIMOPOULOU LAYOUT 5/4/05 12:15 PM Page 14
IEEE Network • May/June 2005
15
ple, there is no gain in removing macrodiversity functionality
from interconnected UMTS radio access networks and using
IP techniques instead. IP handoff mechanisms will, however,
be triggered more often since users’ movement in this evolved
environment will result in more frequent changes of their IP
path. In other words, inter-access router (AR) handovers will
be common in the mobility of users. The support of
seamless
IP handovers
becomes an even more challenging task in cases
where radio communication is lost when switching between
APs (e.g., switch from UMTS to WLAN radio communication
or handover between WLAN APs belonging to different IP
subnets). Several techniques can be employed for the IP
handover mechanism not to simply react to the restoration of
radio communication, but to proactively take actions and
establish state information in the involved ARs. The difficulty
of this task lies in the inherent nature of the IP layer, which
assumes no cooperation with underlying technologies and
consequently is not informed of impending handovers.
In the following, we attempt to obviate the need for such
cooperation between layers. More specifically, we provide a
thorough analysis of the Mobile IPv6 (MIPv6) [4] and Fast
MIPv6 [5] protocol operation, focusing on their contributing
factors to handover delay. We further examine to what degree
the enhancements offered by Fast MIPv6 operation toward
seamless handover support are dependent on the timely avail-
ability of handoff-related information. A generic framework is
presented where link layer triggers assist in the IP handover
preparation and execution phases targeted at optimal synchro-
nization of layer 2 and 3 handovers. Then the application of
such a framework in a WLAN network environment running
Fast MIPv6 is further studied. Lastly, we conclude the article.
Enabling Mobility Support in IPv6 Networks
Mobile IP has been widely accepted as the most appropriate
protocol for addressing the needs of IP mobility management
in future wireless mobile networks. It suffers, though, from
several well-known weaknesses. As further elaborated below,
the main weakness is the introduced latency in restoring the
communication path to the host’s new point of attachment. It
can be said that MIP is a
path update protocol rather than a
handover management protocol. Note that the handover func-
tionality is not to be confused with the path update function
-
ality. The former involves a time-critical operation that
“locally” redirects packets to the host’s new location for pre-
serving transparency to running services, whereas the latter
reestablishes the path after the handoff has been performed
and IP connectivity regained [6].
Handover management is responsible for maintaining the
active sessions of the mobile host (MH) as the latter moves
across the coverage area of various APs. Here, we are con-
cerned with handovers that result in a change of the network-
layer (IP) connectivity of the host. Note, however, that this is
not always the case since a change in link-layer connectivity
does not necessarily result in an IP handover. A handover
control protocol should ensure that handoffs are fast and
smooth; that is, they should be performed without significant
delays and without loss of packets; a requirement that is also
dependent on the provided service. As handover delay we
define the time between the delivery of the last packet to the
host from the old AP and the delivery of the first packet from
the new AP. Among the most adopted handover schemes are
the establishment of temporary tunnels between the old and
new APs, and the bicasting of packets to both APs. Both of
these schemes might also employ buffering techniques.
Regardless of the handover mechanism used within an IP
access network, it should be stressed that the handover per-
formance is also highly dependent on the underlying radio
technology and the information the latter provides to the IP
layer. For example, a radio layer that provides indications to
the IP layer of an impending handover enables the prepara
-
tion and possibly completion of the IP handover before the
MH loses its layer 2 (L2) connectivity. Alternatively, a hand
-
over decision can be solely based on layer 3 (L3) indications
and completely independent of the L2 technology, resulting in
greater handover delay and a greater possibility of service dis-
ruption. It is evident that each approach has its pros and cons;
thus, it remains to be decided within the standardization bod-
ies to what degree these two layers should be coupled and
synchronized. All these issues are discussed in detail below.
Mobile IPv6: Does It Suffice for Seamless Handover
Support?
Mobile IPv6 [4] comprises the Internet Engineering Task
Force (IETF) solution to handling mobility of hosts in IPv6
networks. It extends the basic IPv6 functionality by means of
header extensions rather than being built on top of it, as is the
case with MIPv4. Its fundamental principle is that an MH
should use two IP addresses: a permanent address, the home
address, assigned to the host and acting as its global identifier,
and a temporary addres, the care-of address (CoA), providing
the host’s actual location. An MH, while attached to its home
network, is able to receive packets destined to its home
address, forwarded by means of conventional IP routing
mechanisms. When the host crosses the boundaries of its cur-
rent serving network, movement detection is performed in
order to identify its new point of attachment and further
acquire a new CoA (nCoA). In its simplest form, movement
detection consists of the receipt of a router advertisement
from an AR other than the one currently serving the host.
The new CoA is obtained through stateful or stateless IPv6
address autoconfiguration mechanisms; however, the time
needed for the autoconfiguration procedure and binding man-
agement to complete make MIP operation inadequate for fast
handoff support.
Once configured with a CoA, the MH needs to send a
binding update (BU) message to its home agent (HA) to reg-
ister this “temporary” address, which is referred to as the pri-
mary CoA. Only one CoA should be registered with the HA
at a time, although the MH may have formed more than one
CoA. According to typical MIP operation, the correspondent
host (CH) addresses the MH at the latter’s home address, and
consequently does not need to implement the specific IPv6
extensions that actually form MIPv6.
In the opposite case — when the CHs are augmented with
MIPv6 functionality — route optimization can be used for
direct delivery of packets to the MH without intervention of
the HA. Keep in mind that route optimization is integrated
into MIPv6 and does not constitute a set of optional exten-
sions. The MH transmits BUs to its communicating CHs for
the latter to associate the MH’s home address with a CoA.
Data packets are not encapsulated for delivery to the MH, as
is the case in MIPv4, but instead an IPv6 routing header is
used for this purpose. These packets have as their destination
address the MH’s CoA. The home address information,
required to preserve transparency to upper layers and ensure
session continuity, is included in the routing header. In the
reverse direction, packets have as source address the host’s
CoA, while the home address is included in the newly defined
home address destination option [4].
Before proceeding, we should further explain why stateless
address autoconfiguration adds delay to the handoff proce-
dure. As defined in [7], the stateless address autoconfigura-
DIMOPOULOU LAYOUT 5/4/05 12:15 PM Page 15
IEEE Network • May/June 2005
16
tion mechanism allows a host to generate its own addresses in
the following way. ARs advertise prefixes that identify the
subnet(s) associated with a link, while hosts generate an
inter-
face identifier
, used as a suffix that uniquely identifies an inter-
face on each subnet. A global address is formed by combining
the two. The formation of an address must be followed by the
duplicate address detection (DAD) procedure in order to
avoid address duplication on links. First, the link-local address
of the host is generated and tested for its uniqueness. This
address, as indicated by its name, serves the communication
of hosts on the same link, and is formed by appending the
interface identifier to the link-local prefix (FE80::). After the
assignment of the link-local address to the interface, global
addresses are formed and should also be tested for unique-
ness. This is needed since all of an interface’s unicast address-
es are not necessarily generated from the same interface
identifier. In brief, the address autoconfiguration is composed
of the following steps:
1 The host generates a link-local address for its interface on a
link. When in handoff, it can use the same interface identi-
fier used in the previous link.
2
It then performs DAD to verify the uniqueness of this
address (i.e., the interface identifier on the new link).
3 It uses the prefix(es) advertised by routers for forming a
global address to be able to communicate with hosts other
than the neighboring ones. DAD is also needed here for
each generated global address.
The most time-consuming procedure is DAD execution,
not to mention the resource consumption it causes on wireless
links. In particular, during DAD the host transmits a neighbor
solicitation for the tentative link-local address and waits for
RetransTimer ms [8] till it considers the address unique. DAD
only fails if in the meantime the host receives a neighbor
advertisement for the same address, meaning that another
host is using the questioned address, or if another host is in
the process of performing DAD for the same address and has
also transmitted a neighbor solicitation. It is therefore
deduced that at least a link-wide round-trip is needed for per-
forming DAD while 2.5–3 round-trips are required in total for
the whole autoconfiguration procedure if router discovery
(step 3) is performed in the sequence.
In addition to the autoconfiguration delay, the handoff
delay is further increased by the time needed for the BU pro
-
cedure to complete; until then, all packets addressed to the
host’s previous CoA are lost. IETF has proposed the Fast
MIPv6 protocol for eliminating the aforementioned autocon-
figuration delay while also decorrelating the binding manage-
ment delay from handoff delay. The protocol, however, per-
forms satisfactory with respect to the achieved handoff
disruption time in the presence of link-layer triggers, as elabo
-
rated on in the following section.
Fast Handovers in Mobile IPv6
Fast MIPv6 (FMIPv6) [5] comes to address the following
problem: how to allow an MH to send packets as soon as it
detects a new subnet link, and how to deliver packets to an
MH as soon as its attachment is detected by the new AR. In
other words, FMIP’s primary aim is to eliminate the factors of
delay introduced by the address autoconfiguration procedure.
It achieves this by informing the MH of the new AR’s adver
-
tised prefix, and validating the prospective nCoA from any
duplication on the new link prior to the host’s movement.
The MH is already configured with the new address at the
time it attaches to the new link. Typically, it can start sending
packets in the uplink direction, setting the new address as the
source address of these packets. In the downlink direction, a
factor of delay is introduced before the new AR (nAR) can
start delivering packets to the host. The nAR needs to per-
form neighbor discovery as soon as it receives packets for a
host, in order to detect its presence and resolve its link layer
address. This operation results in considerable delay that may
last multiple seconds. In order to circumvent this delay, the
FMIPv6 procedure requires that an MH announce its attach-
ment through a fast neighbor advertisement (FNA) message
that allows nAR to consider it reachable.
Although the host quickly regains IP connectivity as
described above, it cannot maintain its active sessions with
communicating CHs due to the following:
The MH cannot start sending packets to CHs setting as the
source address the new CoA prior to sending a BU to
them; the CHs will drop these packets (CHs drop received
packets that reveal a binding
home address–CoA not pre-
sent in their caches).
• The MH will not be able to receive packets from CHs at its
new address until the CHs update their caches. Therefore,
for this period of time downstream packets sent to the old
address will be lost.
These two problems are basically addressed by setting up a
bidirectional tunnel between the old AR and the MH at its
nCoA, and requiring both oAR and nAR to buffer traffic dur-
ing handover execution. The tunnel remains active until the
MH completes the BU with its communicating hosts. To CHs,
the MH is located at the old subnet; the old path is temporar
-
ily extended with the branch
old AR–nCoA of host to allow
communication to continue during the IP handoff transition
period. The full path is reestablished when the BU procedure
completes.
In brief, the operation of the protocol (Fig. 1) is as follows:
the host sends a router solicitation for proxy (RtSolPr) mes-
sage to its default AR so as to obtain information (e.g., prefix,
link layer address) related to available APs. The host has pos
-
sibly discovered other APs by means of layer 2 methods (radio
channel scanning). The AR serving the user responds with a
proxy router advertisement (PrRtAdv) containing the request-
ed information for another AR and thus allowing the MH to
perform address autoconfiguration as if it had already migrat-
ed to a new link. The host, after formulating a prospective
new CoA, sends a fast BU (FBU) to its AR instructing the
tunneling of packets addressed to its old CoA (oCoA) toward
its nCoA. The AR currently serving the host (referred to as
old AR, oAR) starts buffering newly coming packets with
oCoA as their destination and exchanges handover initiate
(HI) and handover acknowledge (HAck) messages with the
Figure 1. FMIPv6 protocol operation: predictive behavior.
RtSol
Pr
PrRtAd
v
PAR
MH
L2
handover
FBU
Data
forwarding
FNA
Data delivery
FBack
FBack
HAck
HI
Buf
fering
NAR
Buf
fering
DIMOPOULOU LAYOUT 5/4/05 12:15 PM Page 16
IEEE Network • May/June 2005
17
nAR to initiate the process of the MH’s handover. This
HI/HAck message exchange also serves the validation (DAD)
of the nCoA already formed by the host. The oAR responds
to the MH with a fast binding acknowledge (FBack) message
on both links (old and new) and starts the tunneling of
buffered and arriving data toward the MH’s nCoA. The MH,
as soon it attaches on the new link, transmits an FNA to
inform the nAR of its presence. Packets from this point on
are delivered to the MH with FBack most probably the first
packet on the new link.
It should be stressed here that the sequence of messages
described above, corresponding to a predictive behavior of the
protocol, poses some requirements for the
information made
known to the MH and the
timing of its availability. This infor-
mation includes:
• The MH becoming aware of the impending handover, prior
to the L2 handover execution, to have enough time to send
the FBU message
The MH becoming aware of the nAR’s L2 address to be
able to send the FNA immediately after attaching to the
new link without the need for router discovery, and of the
new subnet’s prefix to form a prospective CoA and request
from the oAR the redirection of packets to this new address
If part of this information is not made available to the IP
layer prior to the layer 2 handover, the fast handover protocol
reverts to reactive behavior where the FBU is sent from the
new link (encapsulated in the FNA message). Moreover, addi
-
tional delay may occur due to the possible need for router dis-
covery [9].
A qualitative analysis showing the effects of MIPv6 and
FMIPv6, with or without expedited information, on the hand
-
off disruption time (fourth column) and the time period when
packets reaching oAR are lost (third column) is presented in
Table 1. For the analysis, the following assumptions were
made:
The one-way delays between two nodes in both directions
are the same (e.g., the propagation delays from MH to
oAR and from oAR to MH are equal).
When FBU is sent from the old link, all downstream packets
sent to the MH from oAR prior to the receipt of the FBU
are delivered to the MH (i.e., the MH does not execute L2
handover immediately after the transmission of the FBU).
• Duplicate address detection and router discovery are per-
formed in sequence. Router discovery also includes the
DAD delay for the global address.
Link Layer Assistance for Fast MIP Handovers
In the previous sections, we identified the need for link-layer
triggers (i.e., events fired at the link layer module and com-
municated to the network layer modules) to aid the IP hand-
over preparation and execution, and illustrated how
cross-layer information exchange speeds up the handover pro-
cedure. In this direction, great effort on defining a generic
interface to facilitate such event delivery is allocated nowa-
days by standards organizations such as the IETF and IEEE.
Link layer triggers are delivered to network layer modules as
events for reporting changes in respect to link and physical
layer conditions. In addition, they provide indications regard-
ing the status of the radio channel. These indications take the
form of (threshold crossing) measurement reports for particu-
lar parameters (e.g., signal strength, interference status, error
rate) that in general characterize the quality of the wireless
medium. In this way, the network layer is informed that cer
-
tain events (e.g., link establishment or disconnection) have
taken place at particular moments, and consequently can exe-
cute the entire handover procedure in a more timely fashion
and in synchronization with the layer 2 handover. More accu-
rate estimations can be performed in respect to the anticipa
-
tion of a handover, since the report to the IP layer of events
such as radio conditions (e.g., the progressive deterioration in
quality of the signal received) may be utilized for intelligent
handover prediction. Table 2 presents a preliminary list,
extracted from [10], of link layer triggers based on the IEEE
802 suite.
The MIP specification, dealing with a simple network layer
mobility supporting mechanism, has made no assumptions as
to the technology used for the underlying layer, resulting in
both link and network layers operating independent of one
another. This constitutes one of the main shortcomings of
MIPv6 that render it inappropriate for fast handover support.
On the other hand, the FMIPv6 specification and proposed
optimizations over simple MIPv6 operation are clearly based
on reliable prediction of handover that enables proactive con-
Table 1. Effects of MIPv6 and FMIPv6 on packet loss and handoff disruption time.
Handover supporting
mechanism
Figure reference
Time period when packets
reaching oAR are lost
Handoff disruption time (no packet recep-
tion at MH)
MIPv6 Figure 2a
D
L2
+ D
DAD
+ D
RD
+ D
MH-CH
+
D
CH-oAR
D
L2
+ D
DAD
+ D
RD
+ D
MIPR
FMIPv6 (completely reactive
case)
No information available
Figure 2b
D
L2
+ D
RD
+ D
MH-oAR
D
L2
+ D
RD
+ D
FMIP
FMIPv6 (reactive case)
nAR information (L2 address,
prefix) available
Figure 2c
D
L2
+ D
MH-oAR
D
L2
+ D
FMIP
FMIPv6 (FBack receipt at
new link)
nAR + impending handover
information available
Figure 2d
No loss, unless buffers over-
flow at oAR or nAR
Max (D
FMIP
— 2D
MH-oAR
, D
diff
+ D
L2
+ 2D
MH-
nAR
)
FMIPv6 (FBack receipt at
old link)
nAR + impending handover
information available
Figure 2e
No loss, unless buffers over-
flow at oAR or nAR
(DFMIP — 2D
MH-oAR
) + D
L3-L2
+ D
L2
+ 2D
MH-nAR
DIMOPOULOU LAYOUT 5/4/05 12:15 PM Page 17
IEEE Network • May/June 2005
18
figuration of the involved nodes. The availability of triggers
and furthermore the exact time they are fired — dependent
on protocol intelligence — influences handover takeoff and
actually determines whether proactive, reactive, or no fast
handover optimizations will eventually take place. We stress
here that the absence of accurate prediction (e.g., very early
or erroneous handover detection) may significantly undermine
the seamlessness promised by the protocol. The decision of
when the MH sends the FBU message is completely an issue
for the IP module to handle and should be based on a kind of
link quality crosses threshold or link going down event, with ref-
erence to Table 2. However, the handover process will not
make the correct decision unless adequate and timely deliv-
ered link layer information becomes available to it.
Last but not least, it is noted that an even more optimal
case than simple reporting of primitive link-layer information
to the network layer would be for the IP module itself to have
execution control of certain L2 handover-related actions. As
suggested in [11], this means an L2 interface becoming avail-
able to the IP module for ordering the execution of such
actions. In the context of the IEEE 802.11 WLAN technology,
the IP module could have the option, for example, to request
radio channel scanning. It is further envisioned that the IP
module will be enabled to set up or tear down a link layer
connection with a particular peer (i.e.,
an AP) on demand. This issue
becomes very important when the
handover decision is based, apart
from the radio signal characteristics,
on diverse factors ranging from QoS
support to security (authorization,
roaming agreements) and accounting
issues, the MH’s velocity, or even the
end user’s personal preferences.
A WLAN Case Study
In this section we investigate the
application of the above analysis in a
more realistic scenario involving a
MH’s fast handover when IEEE
802.11 WLAN standard [12] is uti-
lized for the radio medium access.
The standard foresees that an MH is
obliged to perform particular tasks in
order to hand over from one AP to
another located in its vicinity. Typical-
ly the WLAN link layer handover
comprises three distinct phases; dis-
covery, authentication, and associa-
tion, briefly described below.
Discovery: The MH is scanning the
wireless medium in order to find a
potential AP with which it may estab-
lish a radio link. The scanning proce-
dure is performed with the MH
locking on a radio channel where it
passively waits for AP beacons. Alter-
natively, instead of waiting for bea
-
cons to be transmitted, the MH may
actively request that each AP reply to
probe messages sent for this purpose.
In either case, the evaluation of each
of the received radio signals at the
mobile side finalizes the procedure or
instructs its continuation to a next
available channel until an AP is found
with which communication may be
established. The trigger for the initial
-
ization of the scanning procedure and
the criteria indicating its successful
outcome are implementation depen-
dent.
Authentication: The station and
AP selected by the scanning phase
exchange appropriate management
messages (in a two-handshake man
-
ner) for the station to authenticate
itself, if required, according to an
authentication algorithm. Note that
Figure 2. Handoff disruption time in MIPv6 and FMIPv6 depending on availability and
timing of handover-related information at the IP layer.
D
L2
: Layer 2 handover delay
D
DAD
: Delay for DAD execution
D
RD
: Delay for router discovery
D
MH-CH
: One way delay from MH to CH
D
MIPR
: Delay of MIP registration (MH-CH round trip delay)
D
CH-oAR
: One way delay from CH to oAR
D
MH-oAR
: Time needed for FBU (encapsulated in FNA if sent from new link) to reach oAR
D
FMIP
: Time needed for FMIP operation to complete (from time FBU is sent -
encapsulated in FNA if sent from new link - to time FBack is received)
D
L3-L2
: Time elapsed from completion of FMIP operation -L3 handover- to start of L2
handover (when there is no good synchronization between L3 and L2 handover
mechanisms). It can also be zero.
D
MH-nAR
: Time needed for FNA to reach nAR
D
diff
: Time between last packet receipt at old link and L2 handover start. It can also be
zero.
D
RD
Neighb
.
Adv.
A. MIPv6
Handoff disruption time
RtS
ol BU
RtAdv
Fir
st packet from CH
D
MIPR
D
DAD
D
L2
Link layer
hand
over
D
FMIP
RtSol
B. Completely
reactive
FMIPv6
FNA[FBU]BU
FBackRtAdv
First packet
from CH
D
MIP
R
D
DRD
D
L2
C. Reactive
FMIPv6
BU
RtSolPr PrRtAdv FBackFNA[FBU]
First packet from CH
D
MIPR
D
FMIP
D
L2
D. Predictive
FMIPv6
(FBack on
new link)
BU BU
PrRtAdv
RtSolPr
FBU FBack
First packet from CH
FNA[FBU]
First packet from CH
D
MIPR
2D
MH-oAR
2D
MH-nAR
D
diff
D
FMIP
D
L2
E. Predictive
FMIPv6
(FBack on
old link)
FNA
PrRtAdv
RtSolPr
FBU FBack BU
FBack (in case it reaches
nAR after FNA)
First packet received (FBack)
D
MIPR
D
FMIP
D
L3-L2
2D
MH-nAR
2D
MH-oAR
D
L2
DIMOPOULOU LAYOUT 5/4/05 12:15 PM Page 18
IEEE Network • May/June 2005
19
no authentication is performed if the AP supports open system
authentication.
Association: The station requests from the AP an associa-
tion identifier to be used for typical data delivery to the
MH. For the case where the APs involved in handover
belong to the same extended service set (ESS), that is, they
are part of the same data distribution system resulting in
the link layer handover to be transparent to the IP layer,
the standard foresees that both APs may communicate via a
specific-for-this-purpose Inter Access Point Protocol (IAAP
[13]) in order to enable the delivery to the new AP, over the
common distribution system, of already buffered data at the
old AP. However, in case of interdomain movement this is
not feasible.
Figure 3 depicts a best case scenario where the complete
set of optimizations has been used for both network and link
layers. Thus, a predictive FMIPv6 handover is presented, uti-
lizing the IEEE 802.21 specified “link layer trigger” model
for the coordination of FMIPv6 handoff message generation.
Moreover,
active channel scanning has been assumed to min-
imize the delay of waiting for AP beacons. The procedure is
initiated (not shown in Fig. 3) by the mobility management
module of the host requesting (in terms of registering) link
layer reports for certain radio channel parameters. It is con-
sidered that radio channel scanning is performed frequently
enough (when there is no requirement for real-time data
communication, for instance, or during power conservation)
so that instead of that the MH is informed about available
APs located in its vicinity. This results in frequent deliveries
of
Better_Signal_Quality_AP_Available triggers, containing
appropriate information for the APs’ identification. The
delivery of a
Link_Quality_Crosses_Threshold trigger to the
MH’s L3 module, given the parameter selected and the criti-
cality associated with it, is a first-level indication of an antici
-
pated handover. Hence, the handover decision module,
based on valid information contained on both
Better_Sig
-
nal_Quality_AP_Available
and Link_Quality_Crosses_Thresh-
old
triggers, requests that its default AR (i.e., oAR) proxy a
router advertisement on behalf of another AR. These trig-
gers provide an indication that a handover may be executed
in the near future. The degree of certainty of an impending
handover is high enough to justify triggering of the prepara-
tory procedure required for network layer information col
-
lection but not adequate to guarantee handover execution.
On the other hand, the delivery of the
Link_Going_Down
trigger provides the required credentials to the network layer
in respect to imminent execution of a handover. In other
words, it is interpreted as an instruction to start the han-
dover support mechanism.
From this point on, the FMIPv6 procedure is executed,
enabling the MH’s proactive address auto-configuration, the
buffering of arriving packets at oAR, and the establishment of
a bidirectional tunnel between the PAR and the MH (PAR
<-> nCoA). Special notice should be made with respect to
the moment just before the beginning of link layer handover.
As shown in Fig. 3, the
Link_Down trigger is fired by the MH
L2 module. We argue that for an advanced mobility manage-
ment mechanism, the network layer should be enabled to
request immediate execution of the scanning phase from the
link layer (as part of the primitives supported by it), that is, to
instruct execution of the L2 handover. For predictive hand-
over, this request should be made just after reception of the
FBack message on the old link. After finalization of the link
layer handover, the
Link_Up trigger is fired, instructing the
MH to send the FNA message to the nAR. When the nAR
successfully processes the FNA, packets queued at the oAR
and nAR during handover execution start flowing from nAR
toward the MH.
As aforementioned, the execution of a predictive or reac-
tive FMIPv6 handover depends on the time required to pre-
configure the MH and network node. This period is more or
less determined by the delivery of the
Link_Going_Down and
Link_Down triggers; more specifically, by the selection of the
monitored parameters, the choices made for their thresholds
(which actually cause each trigger to fire), and the implemen-
tation of the decision-making algorithm that results in the
execution of the handover management procedure. Obviously,
if one of these factors is carelessly dealt with, the MH’s hand-
over cannot be anticipated with a satisfactory degree of cer-
tainty.
Conclusions
We have presented a thorough analysis of the two representa-
tive and well-accepted protocols for IP mobility and fast hand-
over support in future mobile networks, Mobile IPv6 and Fast
Mobile IPv6, respectively. After obviating the inadequacy of
MIPv6 in achieving seamless handovers, Fast MIPv6 is pro-
posed as a solution to this problem. However, it is clearly
shown that the enhancements offered by Fast MIPv6 opera
-
tion toward seamless handover support are strongly depen-
dent on the timely availability of handoff-related information.
Table 2. Link layer triggers [10].
Link layer trigger Description
Link up The L3 process may start sending packets as a link has been established.
Link down This indicates that the link cannot be used for data transmission any longer.
Link quality crosses threshold
The link quality has remained under or over a preconfigured threshold for a certain period of time
so that the network layer may start preparing for a handover. It is not implied that the handover
should start immediately.
Link going down
A link down event will be fired in the near future (or at a certain time), so the network layer must
initiate the handover procedure.
Link going up
This trigger may be used for cases where the establishment of radio communication lasts long
enough to influence network layer decisions such as network detection and selection (e.g., for
avoiding the selection of a network).
Better signal quality AP available
The trigger specifies that the link layer receives radio signals with better link quality from a
different AP than the one currently connected.
DIMOPOULOU LAYOUT 5/4/05 12:15 PM Page 19
IEEE Network • May/June 2005
20
To this aim, it is essential that cooperation is established
among the network and link layers in order for the latter to
assist in IP handoff preparation and selection of the IP hand-
off execution time. An overview of generic link layer triggers,
based on the IEEE 802 suite, is also given; such triggers can
be used by IP handover modules to increase the degree of
certainty for an anticipated handover and to gather all
required information. An even more optimal case would be
for the IP module to have execution control over certain L2
handover-related actions (e.g., the execution of the scanning
phase in WLANs). These enhancements to the cross-layer
communication have last been applied and studied in a
WLAN environment running Fast MIPv6.
References
[1] J. Manner and M. Kojo, Eds., “Mobility Related Terminology,” RFC 3753,
June 2004.
[2] 3GPP TR 22.978 v0.4.0, “All-IP Network (AIPN) Feasibility Study,” June
2004.
[3] I. Guardini, P. D’Urso, and P. Fasano, “The Role of Internet Technology in Future
Mobile Data Systems,”
IEEE Commun. Mag., vol. 38, no. 11, Nov. 2000.
[4] D. Johnson, C. Perkins, and J. Arkko, “Mobility Support in IPv6,” RFC 3775,
June 2004.
[5] R. Koodli (Ed.), “Fast Handovers for Mobile IPv6,” Internet draft, draft-ietf-
mipshop-fast-mipv6-03.txt, Oct. 2004.
[6] A. K. Salkintzis,
Mobile Internet: Enabling Technologies and Services, CRC
Press, 2004.
[7] S. Thomson, T. Narten, and T. Jinmei, “IPv6 Stateless Address Autoconfigura-
tion,” Internet draft, draft-ietf-ipv6-rfc2462bis-07.txt, Dec. 2004.
[8] T. Narten
et al., “Neighbor Discovery for IP
Version 6 (IPv6),” Internet draft, draft-ietf-
ipv6-rfc2461bis-02.txt, Feb. 2005.
[9] P. McCann, “Mobile IPv6 Fast Handover for
802.11 Networks,” Internet draft, draft-ietf-
mipshop-80211fh-03.txt, Oct. 2004.
[10] V. Gupta and D. Johnston, “IEEE 802.21, A
Generalized Model for Link Layer Triggers,”
IEEE 802.21 Media Independent Handoff
Working Group, Mar. 2004 mtg. mins.,
http://www.ieee802.org/handoff/march04_
meeting_docs/Generalized_triggers-02.pdf,
Mar. 2004.
[11] K. Mitani
et al., “Unified L2 Abstraction for
L3-Driven Fast Handover,” Internet draft,
draft-koki-mobopts-l2-abstractions-02.txt,
Feb. 2005.
[12] ANSI/IEEE Std. 802.11, “Wireless LAN
Medium Access Control (MAC) and Physical
Layer (PHY) Specifications,” 1999.
[13] IEEE Draft 802.1f/D5, “Recommended Prac-
tice for Multi-Vendor Access Point Interoper
-
ability via an Inter-Access Point Protocol
Across Distribution Systems Supporting IEEE
802.11 Operation,” Jan. 2003.
Biographies
LILA V. DIMOPOULOU [M] (lila@telecom.ntua.gr)
received a Dipl.-Ing. degree from the National
Technical University of Athens (NTUA), Greece,
in 2000. Since 2000 she has been working at
the Telecommunication Laboratory of NTUA as a
Ph.D. student. Her research interests include IP
mobility management, mobile Internet access,
seamless handoffs in heterogeneous environ
-
ments, 3G-WLAN interworking, and 4G net-
works. She is a member of the Technical
Chamber of Greece.
G
EORGIOS A. LEOLEIS [StM] (gleol@telecom. ntua.gr) He received a Dipl.-
Ing. degree from NTUA in 2000. Since 2000 he has been a research
associate in the Telecommunications Laboratory of the School of Electrical
and Computer Engineering at NTUA and a Ph.D. student in the area of
communication networks. His research interests include mobility support in
IP and cellular networks, handover support in WLANs, IP multicasting, and
MBMS support for UMTS. He is a member of the Technical Chamber of
Greece.
I
AKOVOS S. VENIERIS [M] (venieris@cs.ntua.gr) received a Dipl. -Ing. degree from
the University of Patras,Greece, in 1988, and a Ph.D. degree from NTUA in
1990, all in electrical and computer engineering. During 1991–1992 he was
with the National Defense Research Center, Athens, Greece, performing
research in the area of telecommunication networks for military applications.
From 1992–1994 he was a research associate in the Telecommunications Labo-
ratory of NTUA. In 1994 he became an assistant professor in the Electrical and
Computer Engineering Department of NTUA where he is now an associate pro-
fessor. His research interests are in the fields of broadband communications,
Internet, mobile networks, intelligent networks, internetworking, signaling, ser
-
vice creation and control, distributed processing, agents technology, and perfor-
mance evaluation. He has over 100 publications in the above areas. He has
received several national and international awards for academic achievement.
He has been exposed to standardss body work and has contributed to ETSI and
ITU-T. He has participated in several European Union and national projects
dealing with B-ISDN protocols, mobile networks, intelligent networks, ATM
switching and access techniques, Intelligent software, and Internet technologies.
He is an Associate Editor of
IEEE Communication Letters, a member of the edi
-
torial board of
Computer Communications (Elsevier), and has been a guest edi
-
tor for
IEEE Communications Magazine. He is a reviewer for several journals
and has been a member of the Technical Program Committee and session
chairman of several international conferences. He is a member of the Technical
Chamber of Greece.
Figure 3. IEEE 802.11 trigger-assisted proactive fast MIPv6 handover.
Lin
k
down
Lin
k
up
FBU
Link-layer
hand
over
(nAR buffering)
HI
HAck
RtS
olPr
Probe request
FBack
Data tunneling
Probe request/response
Authentication
Association request/response
(oAR
buff
ering)
Bett
er
signal
qual
ity
AP
available
Sca
n
request
Lin
k
quality
cross
es
threshold
Lin
k
going
dow
n
PrRt
Adv
FBack
FNA
Lin
k
down
Lin
k
up
L3
MH
L2
MH
L2
oAP
L3
oAR
L2
nAP
L3
nAR
FBack
DIMOPOULOU LAYOUT 5/4/05 12:15 PM Page 20
... Many reports agree on the definition of handover as the process occurring when MC Some reports called the HH as Intra-Technology handover and the VH as Inter-Technology handover [56]. While the Intra-system handover is defined between sectors of the same system, the inter-system handover happens between different systems [53]. ...
... Reactive Handover (RH) delays handover as much as possible i.e. handover starts only when MC loses completely its current AP signal [56]. [47], which permits a single connectivity with one AP [45]. ...
... Algunos trabajos llaman la HH como un handover de intra-tecnología y la VH como handover de Inter-tecnología [56]. Sin embargo el handover de intra-sistema es definido como el handover entre los sectores de un mismo sistema pero el handover de intersistema es el handover entre diferentes sistemas [53]. ...
Thesis
Full-text available
Real Time Multimedia Applications (RTMAs) provided by wireless networks, such as Wireless Fidelity (WiFi), suffer video services short disruptions, causing video streaming packets loss. Mobile Clients (MC) could experience disruptions in disconnection zones: Handover zones, out of coverage zones or through holes where sudden signal drop occurs. Up to our knowledge, the holes problem was not studied in previous works. Therefore, our objective was to develop a protocol in order to avoid video streaming packets loss during short disruptions in WiFi networks. This is the first study addressing this issue considering the presence of holes. We proposed a protocol based on novel mathematical specifications for the Coverage Area (CA), it consists of two important techniques, the Received Signal Strength Indicator (RSSI) Gradient Predictor and Filter, and the buffer management and transmission speed control technique. The protocol was specified and verified using the Specification and Description Language (SDL), and it was simulated by a specific Java simulator derived from the SDL diagram. The experimental test of the Gradient Predictor and Filter demonstrated its efficiency in predicting the next MC coverage level, and its ability of mitigating the holes effect. It showed the best performance in comparison with the Kalman filter and the Grey Model. The simulation results proved that the protocol is suitable for all types of disconnections caused by holes, handover, or out of coverage constituting a new advance comparing to previous available techniques. Moreover, it offered sufficient amount of video frames in MC Buffer (MCB) to be consumed during the mentioned disconnections (even for long time) resulting in continuous adequate video playing and offering enough time to the user to move from a CA to another without interruptions. This protocol could help in overcoming disruption issues providing continuous adequate quality RTMA for users. This interesting work has been published in two international journals, and has been presented in two international conferences; one paper was awarded a certificate of merit. Future work includes the development of the mathematical specifications of MC movements and the RSSI Gradient predictor and filter, which will support the protocol to be suitable for all movements even the non periodic patterns
... A FAST DL-MAP-IE (Downlink-MAP) based MAC messaging system was developed in [177] to provide downlink traffic during handoff process. The network layer handover strategies, such as MIPV6 [178], are applied when the vehicle move from one network (or subnet) to another [178]. These handover approaches suffer from limitations such as packet loss, high latency, and they are not scalable. ...
... A FAST DL-MAP-IE (Downlink-MAP) based MAC messaging system was developed in [177] to provide downlink traffic during handoff process. The network layer handover strategies, such as MIPV6 [178], are applied when the vehicle move from one network (or subnet) to another [178]. These handover approaches suffer from limitations such as packet loss, high latency, and they are not scalable. ...
Article
Full-text available
As modern vehicles are capable to connect to an external infrastructure and Vehicle-to-Everything (V2X) communication technologies mature, the necessity to secure communications becomes apparent. There is a very real risk that today's vehicles are subjected to cyber-attacks that target vehicular communications. This paper proposes a three-layer framework (sensing, communication and control) through which automotive security threats can be better understood. The sensing layer is made up of vehicle dynamics and environmental sensors, which are vulnerable to eavesdropping, jamming, and spoofing attacks. The communication layer is comprised of both in-vehicle and V2X communications and is susceptible to eavesdropping, spoofing, man-in-the-middle, and sybil attacks. At the top of the hierarchy is the control layer, which enables autonomous vehicular functionality, including the automation of a vehicle's speed, braking, and steering. Attacks targeting the sensing and communication layers can propagate upward and affect the functionality and can compromise the security of the control layer. This paper provides the state-of-the-art review on attacks and threats relevant to the communication layer and presents countermeasures.
... Therefore, FMIPv6reduces the handover delay as well as the packet loss. The authors of [10] studied how some link-layer triggers of the 802.21 [9] could potentially enhance the performance of FMIPv6. In this sub-section is discussed how FMIPv6 [17] impacts some of the future network requirements already discussed. ...
... Another advantage of FMIPv6 is it allows users to have full control of their mobile networking needs [22]. In addition, [10] shows that the behavior of FMIPv6 (whether a reactive or proactive operation is executed) is highly dependent on the timely availability of link layer information. Finally, FMIPv6 operation requires a single HA per network domain. ...
Article
Full-text available
Some traffic characteristics like real-time, location-based, and community-inspired, as well as the exponential increase on the data traffic in mobile networks, are challenging the academia and standardization communities to manage these networks in completely novel and intelligent ways, otherwise, current network infrastructures can not offer a connection service with an acceptable quality for both emergent traffic demand and application requisites. In this way, a very relevant research problem that needs to be addressed is how a heterogeneous wireless access infrastructure should be controlled to offer a network access with a proper level of quality for diverse flows ending at multi-mode devices in mobile scenarios. The current chapter reviews recent research and standardization work developed under the most used wireless access technologies and mobile access proposals. It comprehensively outlines the impact on the deployment of those technologies in future networking environments, not only on the network performance but also in how the most important requirements of several relevant players, such as, content providers, network operators, and users/terminals can be addressed. Finally, the chapter concludes referring the most notable aspects in how the environment of future networks are expected to evolve like technology convergence, service convergence, terminal convergence, market convergence, environmental awareness, energy-efficiency, self-organized and intelligent infrastructure, as well as the most important functional requisites to be addressed through that infrastructure such as flow mobility, data offloading, load balancing and vertical multihoming.
... The efficiency of FMIPv6 protocol operation depends largely on link-layer (L2) triggering. The timing as well as the cri-teria upon which such triggers are generated directly impacts the performance of FMIPv6 [36], [37]. If generated too early, it causes higher probability of wrong handover prediction while, if generated too late, the MN may go into the reactive mode, thus incurring high packet losses. ...
Article
Full-text available
The emerging mobility management schemes for the fifth generation (5G) of mobile networks mostly follow the network-based protocol principles, which do not involve the mobile node (MN) in their operation. Such solutions have not been able to meet the ultra-low handover latency requirement in complex mobility scenarios in 5G. These objectives can be potentially achieved through increased involvement ofMN in the handover operation, which can now be conveniently effectuated through virtualization technologies. In this regard, the classical host-based Fast Handovers for Mobile IPv6 (FMIPv6) protocol has potential to offer several benefits due to its distinctive features such as link-layer assistance for handover preparation, in-advance new care-of address (nCoA) formulation and buffering services. Several enhancements to the FMIPv6 protocol have also been proposed, which improve its handover performance. Many of these enhancements focus on the baseline FMIPv6 specification, while others aim to enhance its operation by adding support features such as mobile multicast, vertical handovers, QoS (Quality of Service) assurance as well as security support. Moreover, several enhancements to the access-technology specific solutions for FMIPv6 have also been proposed. This paper aims to provide a systematic review of FMIPv6 enhancements in order to gain insight into its advantages as well as its shortcomings. Based on the review, the paper also discusses the evolution prospects of FMIPv6 towards 5G. Finally, some of its potential limitations along with possible research directions in the context of 5G are also indicated.
... In this approach, previous AP and new AP will coordinate to speed up the re-association process of the mobile device to the new AP. Reference [79] provides a through review of the existing fast handover strategies for Wireless Local Area Network networks. ...
Article
Full-text available
While the current generation of mobile and fixed communication networks has been standardized for mobile broadband services, the next generation is driven by the vision of the Internet of Things and mission-critical communication services requiring latency in the order of milliseconds or submilliseconds. However, these new stringent requirements have a large technical impact on the design of all layers of the communication protocol stack. The cross-layer interactions are complex due to the multiple design principles and technologies that contribute to the layers' design and fundamental performance limitations. We will be able to develop low-latency networks only if we address the problem of these complex interactions from the new point of view of submilliseconds latency. In this paper, we propose a holistic analysis and classification of the main design principles and enabling technologies that will make it possible to deploy low-latency wireless communication networks. We argue that these design principles and enabling technologies must be carefully orchestrated to meet the stringent requirements and to manage the inherent tradeoffs between low latency and traditional performance metrics. We also review currently ongoing standardization activities in prominent standards associations, and discuss open problems for future research.
... Therefore, those already extracted features on the source cloudlet provide an excellent resource for us to predict the mobile user's target cloudlet without any additional cost at the mobile user side. Although some previous work [9]- [12] proposed several radio handoff prediction approaches in traditional wireless networks, they all are limited to the network environment without the aid from captured frames. To the best of our knowledge, our work is the first one that proposes using the captured frame features to predict mobile users' target cloudlet. ...
... In this approach, previous AP and new AP will coordinate to speed up the re-association process of the mobile device to the new AP. Reference [79] provides a through review of the existing fast handover strategies for Wireless Local Area Network networks. ...
Preprint
Full-text available
While the current generation of mobile and fixed communication networks has been standardized for mobile broadband services, the next generation is driven by the vision of the Internet of Things and mission critical communication services requiring latency in the order of milliseconds or sub-milliseconds. However, these new stringent requirements have a large technical impact on the design of all layers of the communication protocol stack. The cross layer interactions are complex due to the multiple design principles and technologies that contribute to the layers' design and fundamental performance limitations. We will be able to develop low-latency networks only if we address the problem of these complex interactions from the new point of view of sub-milliseconds latency. In this article, we propose a holistic analysis and classification of the main design principles and enabling technologies that will make it possible to deploy low-latency wireless communication networks. We argue that these design principles and enabling technologies must be carefully orchestrated to meet the stringent requirements and to manage the inherent trade-offs between low latency and traditional performance metrics. We also review currently ongoing standardization activities in prominent standards associations, and discuss open problems for future research.
... They introduced a new networkbased mobility called Proxy MIPv6 (PMIPv6) that ignores the MNs performance in mobility management [11][12][13]. While mobile experts introduced the fast handover mobile IPv6 (FMIPv6) to minimize the handover latency considering handover preparation [3,[14][15][16][17][18][19], the network mobility protocol (NEMO) is developed to enhance the performance of handover for a collection of MNs operating in a network 123 on the go, for example, a bus, train or subway [20][21][22][23][24][25][26][27]. However, the security issue in this paper will not be considered as being out of its scope. ...
Article
The fast mobile internet protocol version 6 (FMIPv6) was suggested as a fast handover mechanism over the mobile wireless Internets in order to reduce the handover latency of a mobile node (MN). However, FMIPv6 was originally designed to deal with single MN’s. In mobile wireless Internet, a multiple MNs may do a handover at the same time as a consequence of its movement from one network to another new one. This will therefore lead to the bandwidth waste and low handover performance. This paper intends to propose a multiple handover-based mobile node (MHB-MN) control method and an enhanced FMIPv6 mechanism in order to resolve the abovementioned problem. The proposal of such an MHB-MN method aims at having one mobile node work as a guide for a group of neighboring MNs. This means that the guide of MN prepares itself for a handover before actually taking the initial steps of the actual handover operation. Based on obtained results, it is plainly observable that by MHB-MN method, the handover initiation time, handover latency and handover control messages can be reduced compared to those of FMIPv6. Furthermore, the contention of the wireless channel for multiple MNs can be improved by the use of fewer control messages. Finally, the paper introduces an analytical model to show that by enabling the MHB-MN method and enhancing the FMIPv6 method, a multiple of nodes can perform rapid handover processes with low handover latency compared to that of the FMIPv6 technique.
Article
Full-text available
The ITS (intelligent transport system) is working on designing intelligent vehicles with the help of Vehicular Adhoc Networks (VANETs). The motivation behind the VANETs is to provide a safe journey to the passenger by avoiding hazardous situations on the road like accidents and to provide communication between the vehicles on the move in order to transfer different types of messages, be it emergency or infotainment messages. VANETs consists of V2V (vehicle-to-vehicle), V2I (vehicle-to-infrastructure) and hybrid communication with unique features like Rapidly Changing Network Topology, Unbounded Network Size, Delay-sensitive Data Exchange, Potential Support from Infrastructure which makes it different from the other adhoc networks like MANETs. Due to these features the routing protocols used for other adhoc networks cannot be directly used for VANETs. Various new modified routing protocols are designed for VANETs. In this paper we will be discussing a little about the routing protocols for VANETs, covering almost all the major protocols being used in VANETs. The major issue which we are dealing in this paper is handover. Handover is a technique for mobility management in fast changing VANET which makes it important topic for research, since mobility management is always been a major issue in adhoc networks. There is a good amount of research information available on the mobility management for adhoc networks and for VANETs but we have not found much information about handover in VANETs. So in this paper, we have discussed about different handover techniques used for VANETs and improvements in those techniques from time to time. We have covered almost all the handover strategies and improvements made in them in the past one decade. We have represented all the handover techniques in a tabular form based on the different characteristics and features. In the end we have also given the scope which will help future researchers in their research. The paper is going to be a help to the researchers new in the field.
Article
In wireless networks, the handover in the network layer (L3) is usually initiated after the handover in the link layer (L2) is complete, so the total handover delay is equal to the sum of the L2 handover delay and the L3 handover delay. In order to reduce the total handover delay, this paper studies the correlations between the L2 messages and L3 ones, and proposes a cross-layering handover scheme. The main idea behind this scheme is to effectively combine the related messages in L2 and L3 and achieve the L3 handover with the L2 messages in order to minimize the effect of the L3 handover delay on the total handover delay. The performance of this scheme is evaluated, and the results show that this scheme effectively reduces the total handover delay.
Article
Full-text available
Mobile telephony and the Internet are the fastest growing businesses in the telecommunications market. This is why most operators and service providers are looking after the development of new services in both sectors, and newcomers are expected to enter the arena. The mobile operators foresee an increasing share of their revenues coming from new data services, while Internet service providers are attracted to wireless technology and mobility services both to reduce costs within the last-mile segment and to enrich their market share, providing ubiquitous access to the Internet and corporate intranets. In this scenario several wireless overlay networks will coexist, and their interworking will be a challenging objective. The employment of Internet technology, with its novel mobility and security extensions, seems to be the most attractive option for achieving that goal. In addition, the migration to a full IP network architecture, even within each specific wireless domain, will be another promising opportunity, already under consideration within several technical and standardization bodies. The envisioned role of Internet technology makes it worthwhile to undertake significant research efforts on the development of innovative IP-based mobile data systems, and opens promising opportunities for both telcos and Internet service providers.
Article
Full-text available
This document presents a generalized model for supporting L2 triggers in 802 networks. Key L2 triggers that can be used in the handoff process are also identified. Examples of the use of these triggers are given. These proposed triggers and the proposed trigger may form the basis for a generalized trigger service to be defined in 802.21. Feeback from developers of the layer 3 protocols that may use triggers is requested 2 Generalized Model for Link layer Triggers
Article
Full-text available
IP version 6 #IPv6# is being designed within the IETF as a replacement for the currentversion of the IP protocol used in the Internet #IPv4#. Wehave designed protocol enhancements for IPv6, known as Mobile IPv6, that allow transparent routing of IPv6 packets to mobile nodes, taking advantage of the opportunities made possible by the design of a new version of IP.InMobile IPv6, each mobile node is always identi#ed by its home address, regardless of its current point of attachment to the Internet. While away from its home IP subnet, a mobile node is also associated with a careof address, which indicates the mobile node's current location. Mobile IPv6 enables any IPv6 node to learn and cache the care-of address associated with a mobile node's home address, and then to send packets destined for the mobile node directly to it at this care-of address using an IPv6 Routing header.
Book
Consumers want it, businesses are demanding it. The migration of Internet services to a mobile environment is inevitable. But while the ability to be on the go and connected to the Internet sets the stage for increased efficiency and productivity, many technical challenges associated with user mobility and wireless connectivity remain. Mobile Internet: Enabling Technologies and Services addresses these challenges and thoroughly examines the cutting-edge technologies designed to meet them. Eminent academic and industry professionals explain the mobile and wireless network technologies that make mobile connectivity possible, including their respective characteristics, advantages, and disadvantages. Much of the book focuses on the mobility management techniques so necessary when the point of network attachment can change constantly. Macro-mobility and micro-mobility management protocols receive extensive attention, as do security concerns. Other key topics include interworking between WLAN and cellular networks, Internet access over WLANs, over GPRS and over satellites, multicasting, quality-of-service provisions, header compression schemes, and the problems inherent in video streaming over wireless IP networks. Little on our technological horizon is as certain or holds as much promise as the mobile Internet. This book offers a unique opportunity to become thoroughly acquainted with its context, services, and technologies.
Article
A generalized network model for asymmetrical and inhomogeneous coupled lines has been derived based on normal mode parameters. This model is useful for synthesis of single and multilayer coupled-line circuits, such as planar baluns and directional couplers. The synthesis procedures are described and have been verified by comparing with analysis results
IPv6 Stateless Address Autoconfigura-tion Internet draft, draft-ietf-ipv6-rfc2462bis-07.txt
  • S Thomson
  • T Narten
  • T Jinmei
S. Thomson, T. Narten, and T. Jinmei, " IPv6 Stateless Address Autoconfigura-tion, " Internet draft, draft-ietf-ipv6-rfc2462bis-07.txt, Dec. 2004.