• Title/Summary/Keyword: mobility networks

Search Result 1,021, Processing Time 0.034 seconds

Modeling and Performance Analysis of Zone-Based Registration Considering Cell by Cell Expansion of Location Area (셀 단위로 증가하는 위치영역을 고려한 영역기준 위치등록의 모형화 및 성능 분석)

  • 김경희;백장현;정호연
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.3
    • /
    • pp.67-79
    • /
    • 2003
  • An efficient mobility management for mobile stations plays an important role in mobile communication networks. Even though many a mobility management schemes have been proposed, most of mobile communication networks adopt the mobility scheme based on zone-based registration. This paper studies the mobility management scheme that combines zone-based registration and 2-step selective paging. We assume cell by cell registration area, not ring by ring registration area of previous studies, and set up a new mobility model based on 2-dimensional random walk model considering the characteristic of zone-based registration to evaluate its performance exactly. We provide numerical results using proposed model to demonstrate the performance of zone-based registration and 2-step selective paging under various circumstances.

Secure Pre-authentication Schemes for Fast Handoff in Proxy Mobile IPv6

  • Baek, Jaejong
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.2
    • /
    • pp.89-96
    • /
    • 2016
  • In mobile communication, there are various types of handoff for the support of all forms of mobility. Proxy mobile IPv6 (PMIPv6) enables local network-based mobility management of a mobile node without any effect of mobility-related signaling. Recently, PMIPv6 has been considered for supporting mobility management in LTE/SAE-based mobile networks. To support seamless mobility in heterogeneous mobile networks, the overall cost of handoffs needs to be minimized and the procedure should be guaranteed to be secure. However, the reduction of the authentication cost has not been fully investigated to provide seamless connectivity when mobile users perform a handoff between the PMIPv6 domains. This paper proposes secure pre-authentication schemes, completing an authentication procedure before performing a handoff, for a fast handoff in PMIPv6. Analytic models have been used for measuring the authentication latency and for the overhead cost analysis. In addition to providing fast authentication, the proposed pre-authentication schemes can prevent threats such as replay attacks and key exposure.

Optimal Mobility Management of PCNs Using Two Types of Cell Residence Time (이동 통신망에 있어서 새로운 셀 체류시간 모형화에 따른 최적 이동성 관리)

  • 홍정식;장인갑;이창훈
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.27 no.3
    • /
    • pp.59-74
    • /
    • 2002
  • This study investigates two basic operations of mobility management of PCNs (Personal Communication Networks), i.e., the location update and the paging of the mobile terminal. From the realistic consideration that a user either moves through several cells consecutively or stays in a cell with long time, we model the mobility pattern by introducing two types of CRT (Cell Residence Time). Mobility patterns of the mobile terminal are classified Into various ways by using the ratios of two types of CRT. Cost analysis is performed for distance-based and movement-based location update schemes combined with blanket polling paging and selective paging scheme. It is demonstrated that in a certain condition of mobility pattern and call arrival pattern, 2-state CRT model produces different optimal threshold and so, is more effective than IID ( Independently-Identically-Distributed) CRT model. An analytical model for the new CRT model is compact and easily extendable to the other location update schemes.

The VLR Overflow Control Scheme considering Mobility of Mobile Users in Wireless Mobile Networks

  • Oh, Sun-Jin
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.4
    • /
    • pp.601-609
    • /
    • 2003
  • In wireless mobile networks, the service area is partitioned into several registration areas (RAs). Every RA is associated with a mobility database called Visitor Location Register (VLR). The VLR is used to achieve the location management of the mobile terminals. When a mobile terminal enters a new RA, the VLR stores the current location information of the mobile terminal before serving any mobile services. At that time, if the VLR is full, the registration procedure fails, and the system can not deliver services to the mobile user under the existing cellular technology To resolve this problem, we propose a VLR overflow control scheme considering mobility of mobile users to accomodate incoming users during VLR overflow. The performance of the proposed scheme is evaluated by an analytic model in terms of costs for the location search and the location update, and compared with those of the overflow control scheme proposed by Lin[1].

  • PDF

Handover Protocol for Mobility Support in Ubiquitous Sensor Network (USN에서의 이동성을 위한 핸드오버 인증 프로토콜)

  • Bruce, Ndibanje;Kim, TaeYong;Lee, HoonJae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.203-206
    • /
    • 2012
  • The System of communication with wireless devices is experiencing a huge growth. While traditional communication paradigms deal with fixed networks, mobility raises a new set of questions, techniques, and solutions. In order to realize service mobility, there is a need of protocol that can support mobility while nodes are communicating without any disruption of their connection status. This paper proposes a handover authentication protocol for mobility support. Careful considerations must be taken in priority to security issues since many unreliable public and private resources; both networks and devices are involved. The protocol is based on public key cryptography with Diffie-Hellman algorithm which provides security against both leakage-resilience of private keys on untrustworthy devices and forward secrecy.

  • PDF

Key Challenges of Mobility Management and Handover Process In 5G HetNets

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.139-146
    • /
    • 2022
  • Wireless access technologies are emerging to enable high data rates for mobile users and novel applications that encompass both human and machine-type interactions. An essential approach to meet the rising demands on network capacity and offer high coverage for wireless users on upcoming fifth generation (5G) networks is heterogeneous networks (HetNets), which are generated by combining the installation of macro cells with a large number of densely distributed small cells Deployment in 5G architecture has several issues because to the rising complexity of network topology in 5G HetNets with many distinct base station types. Aside from the numerous benefits that dense small cell deployment delivers, it also introduces key mobility management issues such as frequent handover (HO), failures, delays and pingpong HO. This article investigates 5G HetNet mobility management in terms of radio resource control. This article also discusses the key challenges for 5G mobility management.

Design of a Paging Scheme based on user Mobility Classes for Advanced Cellular Mobile Networks (차세대 이동통신망을 위한 사용자 이동패턴에 근거한 페이징 기법의 설계)

  • Jeon, Wha-Sook;Jeong, Dong-Geun
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.216-223
    • /
    • 2002
  • This paper proposes an efficient location management scheme for next-generation cellular mobile networks. In the proposed scheme, the users are classified into two classes according to their mobility patterns; high mobility users (HMU) and low mobility users (LMU). We design the intelligent location management strategy based on theme user mobility classes. The performance of the proposed scheme is compared with that of pure intelligent paging scheme by computer simulation. As a result, it is shown that the proposed scheme provides the better performance than the pure intelligent paging scheme.

A Per-User-based Enhanced Distributed Mobility Management Scheme in PMIPv6 Networks (PMIPv6 네트워크에서 사용자 기반의 향상된 분산형 이동성 관리 기법)

  • Kong, Ki-Sik
    • Journal of Digital Contents Society
    • /
    • v.17 no.3
    • /
    • pp.111-118
    • /
    • 2016
  • Proxy mobile IPv6 (PMIPv6), which is a centralized mobility management protocol, are dependent on a local mobility anchor (LMA) to process all control and data traffics. Therefore, it has serious problems such as the tremendous traffic concentration into the core network and the triangle routing. In this paper, therefore, in order to alleviate these drawbacks, we propose a PMIPv6-based enhanced distributed mobility management scheme considering a user's traffic locality. Performance evaluation results indicate that in most cases, except for when a user's mobility rate is relatively very higher than the traffic rate, the proposed scheme shows better performance result than that of PMIPv6. Besides, it is demonstrated that the proposed scheme can be an effective alternative that can distribute the significant loads on the LMA of the core networks to the MAGs of the edge networks.

Stochastic Mobility Model for Energy Efficiency in MANET Environment (MANET 환경에서 에너지 효율적인 Stochastic 노드 이동 모델)

  • Yun, Dai-Yeol;Yoon, Chang-Pyo;Hwang, Chi Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.444-446
    • /
    • 2021
  • MANETs(Mobile Ad-hoc Networks) are composed of mobile nodes that are not subordinate to fixed networks and have the feature that can form their own networks. they are used in various fields for specific goals. The mobility model in MANET can be applied in various ways depending on the purpose of usage. The random mobility model has the advantage of being simple and easy to implement, so it is being used the most. In a MANET, it is assumed that each node moves independently. The random movement model is a good model for expressing this independence of each node. However, it is insufficient to express the characteristics of all nodes with only random properties of individual nodes. This paper limits the stochastic mobility model applicable in MANET. we compare the proposed stochastic mobility model and the random mobility model. We confirm that the proposed mobility model is applied to the routing protocol to show improved characteristics in terms of energy consumption efficiency.

  • PDF

Autonomous routing control protocol for mobile ad-hoc networks

  • Kim, Dong-Ok;Kang, Dong-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.17-20
    • /
    • 2008
  • A clustering scheme for ad hoc networks is aimed at managing a number of mobile devices by utilizing hierarchical structure of the networks. In order to construct and maintain an effective hierarchical structure in ad hoc networks where mobile devices may move at high mobility, the following requirements must be satisfied. The role of each mobile device for the hierarchical structure is adaptive to dynamic change of the topology of the ad hoc networks. The role of each mobile device should thus change autonomously based on the local information. The overhead for management of the hierarchical structure is small. The number of mobile devices in each cluster should thus be almost equivalent. This paper proposes an adaptive multihop clustering scheme for highly mobile ad hoc networks. The results obtained by extensive simulation experiments show that the proposed scheme does not depend on mobility and node degree of mobile devices in the ad hoc network, which satisfy the above requirements.

  • PDF