Seamless Mobility Management

Author(s):  
Sulata Mitra

The next generation wireless networks will be heterogeneous wireless environments because of the coexistence of a large variety of wireless access technologies. The different networks have different architectures and protocols. So it is difficult for a user to roam from one radio system to another which can be solved by using the Internet protocol as a common interconnection protocol as it needs no assumptions about the characteristics of the underlying technologies. An all-IP wireless network is an IP-based wireless access system that makes wireless networks more robust, scalable, and cost effective. The nodes in such a network are mobile nodes as they change their location and point of attachment to the Internet frequently. The mobility management is an important research issue in an all-IP wireless network for providing seamless roaming facility to mobile nodes from one wireless system to another. The dynamic resource management is also required in this environment to ensure sufficient resource in the selected route for transmission or reception of the data packets during seamless roaming of the mobile nodes. This chapter is aimed at the researchers and the policy makers making them aware of the different means of mobility management and resource management for mobile nodes in all-IP wireless networks.

2016 ◽  
pp. 749-777
Author(s):  
Sulata Mitra

The next generation wireless networks will be heterogeneous wireless environments because of the coexistence of a large variety of wireless access technologies. The different networks have different architectures and protocols. So it is difficult for a user to roam from one radio system to another which can be solved by using the Internet protocol as a common interconnection protocol as it needs no assumptions about the characteristics of the underlying technologies. An all-IP wireless network is an IP-based wireless access system that makes wireless networks more robust, scalable, and cost effective. The nodes in such a network are mobile nodes as they change their location and point of attachment to the Internet frequently. The mobility management is an important research issue in an all-IP wireless network for providing seamless roaming facility to mobile nodes from one wireless system to another. The dynamic resource management is also required in this environment to ensure sufficient resource in the selected route for transmission or reception of the data packets during seamless roaming of the mobile nodes. This chapter is aimed at the researchers and the policy makers making them aware of the different means of mobility management and resource management for mobile nodes in all-IP wireless networks.


Current innovation in the field of Mobile and Wireless network will increase the use of mobile devices which procreated in an outburst of traffic passing through the internet. Due to the explosion of traffic mobility management has become a challenge in future mobile and wireless networks. To deal with such an explosion, mobile networks are becoming flatter as compared to previous hierarchical mobile networks. This paper presents a detailed survey of solutions for currently mobility management such as Centralized mobility management techniques for mobile and wireless networks, described the limitation of Centralized Mobility Management which is hierarchical and centralized in nature and discussed an approach which removes the limitation of Centralized mobility management called as Distributed mobility management. This paper also discussed two different approaches of Distributed mobility management such as Client based Distributed mobility management and Network based Distributed mobility management.


2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Byungjoo Park ◽  
Ankyu Hwang ◽  
Haniph Latchman

Mobility management is an essential challenge for supporting reliable multimedia data streaming over wireless and mobile networks in the Internet of Things (IoT) for location-based mobile marketing applications. The communications among mobile nodes for IoT need to have a seamless handover for delivering high quality multimedia services. The Internet Engineering Task Force (IETF) mobility management schemes are the proposals for handling the routing of IPv6 packets to mobile nodes that have moved away from their home network. However, the standard mobility management scheme cannot prevent packet losses due to longer handover latency. In this article, a new enhanced data streaming route optimization scheme is introduced that uses an optimized Transmission Control Protocol (TCP) realignment algorithm in order to prevent the packet disordering problem whenever the nodes in the IoT environment are communicating with each other. With the proposed scheme, data packets sequence realignment can be prevented, the packet traffic speed can be controlled, and the TCP performance can be improved. The experimental results show that managing the packet order in proposed new scheme remarkably increases the overall TCP performance over mobile networks within the IoT environment thus ensuring the high quality of service (QoS) for multimedia data streaming in location-based mobile marketing applications.


Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


2013 ◽  
Vol 2013 ◽  
pp. 1-9 ◽  
Author(s):  
Faisal Kaleem ◽  
Abolfazl Mehbodniya ◽  
Kang K. Yen ◽  
Fumiyuki Adachi

A heterogeneous wireless network is characterized by the presence of different wireless access technologies that coexist in an overlay fashion. These wireless access technologies usually differ in terms of their operating parameters. On the other hand, Mobile Stations (MSs) in a heterogeneous wireless network are equipped with multiple interfaces to access different types of services from these wireless access technologies. The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC) principle. This is where the need for intelligent and efficient Vertical Handoffs (VHOs) between wireless technologies in a heterogeneous environment becomes apparent. This paper presents the design and implementation of a fuzzy multicriteria based Vertical Handoff Necessity Estimation (VHONE) scheme that determines the proper time for VHO, while considering the continuity and quality of the currently utilized service, and the end-users' satisfaction.


2014 ◽  
Vol 685 ◽  
pp. 591-594
Author(s):  
Hao Wang ◽  
Jin Tao Shi

As wireless networks edge closer towards wide-spread deployment, security issues become a central concern.This article analyses the wireless network security and the demand from wireless access control, wireless routing technology, and testing to protect the fields under the wireless network and safety of research progress. We point out its development direction based on the analysis and remark of problems remaining unsolved in wireless networks.


The forthcoming wireless networks provide the continuous services to their users for different applications by the integration of diverse wireless access technologies known as heterogeneous wireless network. The heterogeneous wireless network improves the Quality of Service for stationary and non-stationary mobile users. Even when users are in mobility the services are provided by means of handoff or handover. In this paper, the integration of three different wireless networks such as LTE, WiMAX and Wi-Fi networks and their vertical handoff performance analysis are presented. These diverse wireless networks which are considered for integration are modeled as a heterogeneous wireless network. This network is designed using QualNet simulator. Furthermore, the designed heterogeneous network, vertical handoff performance is estimated by using factors such as throughput, jitter and End to End delay. With these performance factors, the designed network’s Quality of Service (QoS) is estimated under mobility conditions.


Author(s):  
Isaac Chin Eian ◽  
Ka Yong Lim ◽  
Majesty Xiao Li Yeap ◽  
Hui Qi Yeo ◽  
Fatima Z

In recent years, wireless networks have undoubtedly become a convenient way to connect to the Internet and provide connection to everyone in any corner of the world. In fact, in this era, people are connected to the internet almost everyday and wireless networks give us this privilege in a seamless manner. A wireless network normally consists of access points and nodes where the access points are responsible to amplify the wireless signals, while the nodes are the gadgets that are receiving these signals. However, with such great convenience provided, many challenges are also faced by the users and stakeholders. With no physical connection to devices, wireless networks are evidently more vulnerable to invisible cyber attacks. In this research paper, it the security issues that cause issues in the wireless networks are discussed. Furthermore, an analytical review of privacy challenges found in these networks is performed; these challenges are segregated into security issues and privacy issues. The paper will then present the methods used in conducting a survey and gathering the research results along with further discussion on the results obtained through this study. Finally, a suitable solution is proposed to prevent and overcome the intrusions faced in terms of security and privacy in wireless network scenarios through detection and response mechanism for mitigation of the problems.


2017 ◽  
Vol 14 (1) ◽  
pp. 517-523
Author(s):  
V Sivasankaran ◽  
V Nagarajan

An important and modern trend in wireless network is managing and accessing in heterogeneous wireless networks structures effectively. Vertical handover or handoff technology is major and acting vital role in wireless communication, it has key challenging issues in wireless network, while handover gets call drop kind of latency and call quality minimization. So the communication networks needs an efficient and dynamic services and knowledge monitoring management to select network for handover of different network environments (example: WiMAX, WiFi, WLAN, etc.). In this paper we proposed the concepts of knowledgeable monitoring (KM-method), cognitive advisor (CA) and Advanced Handover Optimization (AHO) technique to improve effective network selection for seamless communication, while travels over heterogeneous wireless networks (HWN). KM-method monitoring and manage effective network selection and holding connected mobile nodes inform header files also maintaining re-initiate to next network information (network IP address, user ID, new path, etc.). CAVHO-Cognitive Advisor based Vertical Handover (VSH and V2H) and KM-methods perform and measures velocity and direction of mobility nodes through SRSS sequential Received Strength Signal. Also CA receives the nearest networks details of each another using nearest neighbouring concept with SDT ratio Algorithm. Optimization technique (AHO) performs dynamically balancing the threshold level of speed, load and quality based on Receiving signal strength and user preference. Simulation results of CAVHO Shows it secure and increases the handover probability of access also proposed system reduce delay and improve quality of services and throughput.


2018 ◽  
Vol 17 ◽  
pp. 01013
Author(s):  
Dapeng Huangfu ◽  
Xiaoping Tian ◽  
Xingjian Wang ◽  
Ping Chen

With the rapid development of Internet +, the dependence on wireless networks and wireless terminals are increasing. Campus wireless network has become the main network of teachers and students in campus on the internet. As there are uneven clients and a wide variety of intelligent terminals now. Simplified authentication and network security become the most urgent problem for wireless network. This paper used the Portal + Mac authentication method to realize the non-cognitive authentication of teachers and students on basis of the analysis of the advantages and disadvantages of mainstream authentication of campus wireless network, such as 802.1X authentication, Portal authentication, Mac authentication and DHCP authentication. Teachers and students only need portal certification at the first time, then surf the internet with non-perceived authentication at the second time and later. This method increases network security, and is better to meet the needs of teachers and students.


Sign in / Sign up

Export Citation Format

Share Document