Cargando…

Mobility Protocols and Handover Optimization : Design, Evaluation and Application.

This book provides a common framework for mobility management that considers the theoretical and practical aspects of systems optimization for mobile networks. In this book, the authors show how an optimized system of mobility management can improve the quality of service in existing forms of mobile...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Dutta, Ashutosh
Otros Autores: Schulzrinne, Henning
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken : Wiley, 2014.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Title Page; Copyright; Contents; About the Authors; Foreword; Preface; Acknowledgements; List of Abbreviations; Chapter 1 Introduction; 1.1 Types of Mobility; 1.1.1 Terminal Mobility; 1.1.2 Personal Mobility; 1.1.3 Session Mobility; 1.1.4 Service Mobility; 1.2 Performance Requirements; 1.3 Motivation; 1.4 Summary of Key Contributions; Chapter 2 Analysis of Mobility Protocols for Multimedia; 2.1 Summary of Key Contributions and Indicative Results; 2.2 Introduction; 2.3 Cellular 1G; 2.3.1 System Architecture; 2.3.2 Handoff Procedure; 2.4 Cellular 2G Mobility; 2.4.1 GSM; 2.4.2 IS-95.
  • 2.5 Cellular 3G Mobility2.5.1 WCDMA; 2.5.2 CDMA2000; 2.6 4G Networks; 2.6.1 Evolved Packet System; 2.6.2 WiMAX Mobility; 2.7 IP-Based Mobility; 2.7.1 Network Layer Macromobility; 2.7.2 Network Layer Micromobility; 2.7.3 NETMOB: Network Mobility; 2.7.4 Transport Layer Mobility; 2.7.5 Application Layer Mobility; 2.7.6 Host Identity Protocol; 2.7.7 MOBIKE; 2.7.8 IAPP; 2.8 Heterogeneous Handover; 2.8.1 UMTS-WLAN Handover; 2.8.2 LTE-WLAN Handover; 2.9 Multicast Mobility; 2.10 Concluding Remarks; Chapter 3 Systems Analysis of Mobility Events; 3.1 Summary of Key Contributions and Indicative Results.
  • 3.2 Introduction3.2.1 Comparative Analysis of Mobility Protocols; 3.3 Analysis of Handoff Components; 3.3.1 Network Discovery and Selection; 3.3.2 Network Attachment; 3.3.3 Configuration; 3.3.4 Security Association; 3.3.5 Binding Update; 3.3.6 Media Rerouting; 3.4 Effect of Handoff across Layers; 3.4.1 Layer 2 Delay; 3.4.2 Layer 3 Delay; 3.4.3 Application Layer Delay; 3.4.4 Handoff Operations across Layers; 3.5 Concluding Remarks; Chapter 4 Modeling Mobility; 4.1 Summary of Key Contributions and Indicative Results; 4.2 Introduction; 4.3 Related Work.
  • 4.4 Modeling Mobility as a Discrete-Event Dynamic System4.5 Petri Net Primitives; 4.6 Petri-Net-Based Modeling Methodologies; 4.7 Resource Utilization during Handoff; 4.8 Data Dependency Analysis of the Handoff Process; 4.8.1 Petri-Net-Based Data Dependency; 4.8.2 Analysis of Data Dependency during Handoff Process; 4.9 Petri Net Model for Handoff; 4.10 Petri-Net-Based Analysis of Handoff Event; 4.10.1 Analysis of Deadlocks in Handoff; 4.10.2 Reachability Analysis; 4.10.3 Matrix Equations; 4.11 Evaluation of Systems Performance Using Petri Nets; 4.11.1 Cycle-Time-Based Approach.
  • 4.11.2 Floyd-Algorithm-Based Approach4.11.3 Resource-Time Product Approach; 4.12 Opportunities for Optimization; 4.12.1 Analysis of Parallelism in Handoff Operations; 4.12.2 Opportunities for Proactive Operation; 4.13 Concluding Remarks; Chapter 5 Layer 2 Optimization; 5.1 Introduction; 5.2 Related Work; 5.3 IEEE 802.11 Standards; 5.3.1 The IEEE 802.11 Wireless LAN Architecture; 5.3.2 IEEE 802.11 Management Frames; 5.4 Handoff Procedure with Active Scanning; 5.4.1 Steps during Handoff; 5.5 Fast-Handoff Algorithm; 5.5.1 Selective Scanning; 5.5.2 Caching; 5.6 Implementation.