Mobility Protocols and Handover Optimization - Ashutosh Dutta - E-Book

Mobility Protocols and Handover Optimization E-Book

Ashutosh Dutta

0,0
92,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

This book provides a common framework for mobility management that considers the theoretical and practical aspects of systems optimization for mobile networks.

In this book, the authors show how an optimized system of mobility management can improve the quality of service in existing forms of mobile communication. Furthermore, they provide a theoretical approach to mobility management, as well as developing the model for systems optimization, including practical case studies using network layer and mobility layer protocols in different deployment scenarios.  The authors also address the different ways in which the specific mobility protocol can be developed, taking into account numerous factors including security, configuration, authentication, quality of service, and movement patterns of the mobiles.

Key Features:

  • Defines and discusses a common set of optimization methodologies and their application to all mobility protocols for both IPv4 and IPv6 networks
  • Applies these technologies in the context of various layers: MAC layer, network layer, transport layer and application layer covering 802.11, LTE, WiMax, CDMA networks and protocols such as SIP, MIP, HIP, VoIP, and many more
  • Provides a thorough analysis of the required steps during a mobility event such as discovery, network selection, configuration, authentication, security association, encryption, binding update, and media direction
  • Includes models and tables illustrating the analysis of mobility management as well as architecture of sample wireless and mobility test beds built by the authors, involving inter-domain and intra-domain mobility scenarios

This book is an excellent resource forprofessionals and systems architects in charge of designing wireless networks for commercial (3G/4G), LTE, IMS, military and Ad Hoc environment. It will be useful deployment guide for the architects wireless service providers. Graduate students, researchers in industry and academia, and systems engineers will also find this book of interest.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 866

Veröffentlichungsjahr: 2014

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

Title Page

Copyright

Dedication

About the Authors

Foreword

Preface

Organization of the Book

Intended audience

Acknowledgements

List of Abbreviations

Chapter 1: Introduction

1.1 Types of Mobility

1.2 Performance Requirements

1.3 Motivation

1.4 Summary of Key Contributions

Chapter 2: Analysis of Mobility Protocols for Multimedia

2.1 Summary of Key Contributions and Indicative Results

2.2 Introduction

2.3 Cellular 1G

2.4 Cellular 2G Mobility

2.5 Cellular 3G Mobility

2.6 4G Networks

2.7 IP-Based Mobility

2.8 Heterogeneous Handover

2.9 Multicast Mobility

2.10 Concluding Remarks

Chapter 3: Systems Analysis of Mobility Events

3.1 Summary of Key Contributions and Indicative Results

3.2 Introduction

3.3 Analysis of Handoff Components

3.4 Effect of Handoff across Layers

3.5 Concluding Remarks

Chapter 4: Modeling Mobility

4.1 Summary of Key Contributions and Indicative Results

4.2 Introduction

4.3 Related Work

4.4 Modeling Mobility as a Discrete-Event Dynamic System

4.5 Petri Net Primitives

4.6 Petri-Net-Based Modeling Methodologies

4.7 Resource Utilization during Handoff

4.8 Data Dependency Analysis of the Handoff Process

4.9 Petri Net Model for Handoff

4.10 Petri-Net-Based Analysis of Handoff Event

4.11 Evaluation of Systems Performance Using Petri Nets

4.12 Opportunities for Optimization

4.13 Concluding Remarks

Chapter 5: Layer 2 Optimization

5.1 Introduction

5.2 Related Work

5.3 IEEE 802.11 Standards

5.4 Handoff Procedure with Active Scanning

5.5 Fast-Handoff Algorithm

5.6 Implementation

5.7 Measurements

5.8 Measurement Results

5.9 Conclusions and Future Work

Chapter 6: Mobility Optimization Techniques

6.1 Summary of Key Contributions and Indicative Results

6.2 Introduction

6.3 Discovery

6.5 Layer 3 Configuration

6.6 Layer 3 Security Association

6.7 Binding Update

6.8 Media Rerouting

6.9 Media Buffering

6.10 Route Optimization

6.11 Media-Independent Cross-Layer Triggers

6.12 Concluding Remarks

Chapter 7: Optimization with Multilayer Mobility Protocols

7.1 Summary of Key Contributions and Indicative Results

7.2 Introduction

7.3 Key Principles

7.4 Related Work

7.5 Multilayer Mobility Approach

7.6 Concluding Remarks

Chapter 8: Optimizations for Simultaneous Mobility

8.1 Summary of Key Contributions and Indicative Results

8.2 Introduction

8.3 Illustration of the Simultaneous Mobility Problem

8.4 Related Work

8.5 Key Optimization Techniques

8.6 Analytical Framework

8.7 Analyzing the Simultaneous Mobility Problem

8.8 Probability of Simultaneous Mobility

8.9 Solutions

8.10 Application of Solution Mechanisms

8.11 Concluding Remarks

Chapter 9: Handoff Optimization for Multicast Streaming

9.1 Summary of Key Contributions and Indicative Results

9.2 Introduction

9.3 Key Principles

9.4 Related Work

9.5 Mobility in a Hierarchical Multicast Architecture

9.6 Optimization Techniques for Multicast Media Delivery

9.7 Experimental Results and Performance Analysis

9.8 Concluding Remarks

Chapter 10: Cooperative Roaming

10.1 Introduction

10.2 Related Work

10.3 IP Multicast Addressing

10.4 Cooperative Roaming

10.5 Cooperative Authentication

10.6 Security

10.7 Streaming Media Support

10.8 Bandwidth and Energy Usage

10.9 Experiments

10.10 Application Layer Mobility

10.11 Load Balancing

10.12 Multicast and Scalability

10.13 An Alternative to Multicast

10.14 Conclusions and Future Work

Chapter 11: System Evaluation

11.1 Summary of Key Contributions and Indicative Results

11.2 Introduction

11.3 Experimental Validation

11.5 Systems Validation Using Petri-Net-Based Models

11.6 Scheduling Handoff Operations

11.7 Verification of Systems Performance

11.8 Petri-Net-Based Modeling for Multi-Interface Mobility

11.9 Deadlocks in Handoff Scheduling

11.10 Analysis of Level of Concurrency and Resources

11.11 Trade-off Analysis for Proactive Handoff

11.12 Concluding Remarks

Chapter 12: Conclusions

12.1 General Principles of Mobility Optimization

12.2 Summary of Contributions

12.3 Future Work

A: RDF Schema for Application Layer Discovery

A.1 Schema Primitives

B: Definitions of Mobility-Related Terms

References

Index

End User License Agreement

Pages

xv

xvii

xviii

xix

xx

xxi

xxiii

xxv

xxvi

xxvii

xxviii

xxix

xxx

xxxi

xxxii

xxxiii

xxxiv

1

2

3

4

5

6

7

8

9

10

11

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

41

40

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

70

62

63

64

65

66

67

68

69

71

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

243

244

245

246

247

248

249

250

251

252

253

254

255

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

382

381

383

384

385

386

387

388

389

391

392

393

394

395

396

397

399

400

401

402

403

404

405

406

407

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

441

442

Guide

Cover

Table of Contents

Preface

Chapter 1: Introduction

List of Illustrations

Figure 1.1

Figure 2.1

Figure 2.2

Figure 2.3

Figure 2.4

Figure 2.5

Figure 2.6

Figure 2.7

Figure 2.8

Figure 2.9

Figure 2.10

Figure 2.11

Figure 2.12

Figure 2.13

Figure 2.14

Figure 2.15

Figure 2.16

Figure 2.17

Figure 2.18

Figure 2.19

Figure 2.20

Figure 2.21

Figure 2.22

Figure 2.23

Figure 2.24

Figure 2.25

Figure 2.26

Figure 2.27

Figure 2.28

Figure 2.29

Figure 2.30

Figure 2.31

Figure 2.32

Figure 2.33

Figure 2.34

Figure 2.35

Figure 2.37

Figure 2.38

Figure 2.39

Figure 2.40

Figure 2.41

Figure 2.42

Figure 3.1

Figure 3.2

Figure 3.3

Figure 3.4

Figure 3.5

Figure 3.6

Figure 3.7

Figure 3.8

Figure 3.9

Figure 3.10

Figure 4.1

Figure 4.2

Figure 4.3

Figure 4.4

Figure 4.5

Figure 4.6

Figure 4.7

Figure 4.8

Figure 4.9

Figure 4.10

Figure 4.11

Figure 4.12

Figure 4.13

Figure 4.14

Figure 4.15

Figure 4.16

Figure 4.17

Figure 4.18

Figure 4.19

Figure 4.20

Figure 4.21

Figure 4.22

Figure 4.23

Figure 4.24

Figure 4.25

Figure 4.26

Figure 4.27

Figure 5.1

Figure 5.2

Figure 5.3

Figure 5.4

Figure 5.5

Figure 5.6

Figure 5.7

Figure 5.8

Figure 5.9

Figure 5.10

Figure 6.1

Figure 6.2

Figure 6.3

Figure 6.4

Figure 6.5

Figure 6.6

Figure 6.7

Figure 6.8

Figure 6.9

Figure 6.10

Figure 6.11

Figure 6.12

Figure 6.13

Figure 6.14

Figure 6.15

Figure 6.16

Figure 6.17

Figure 6.18

Figure 6.19

Figure 6.20

Figure 6.21

Figure 6.22

Figure 6.23

Figure 6.24

Figure 6.25

Figure 6.26

Figure 6.27

Figure 6.28

Figure 6.29

Figure 6.30

Figure 6.31

Figure 6.32

Figure 6.33

Figure 6.34

Figure 6.35

Figure 6.36

Figure 6.37

Figure 6.38

Figure 6.39

Figure 6.40

Figure 6.41

Figure 6.42

Figure 6.43

Figure 6.44

Figure 6.45

Figure 6.46

Figure 6.47

Figure 6.48

Figure 6.49

Figure 6.50

Figure 6.51

Figure 7.1

Figure 7.2

Figure 7.3

Figure 7.4

Figure 7.5

Figure 7.6

Figure 7.7

Figure 8.1

Figure 8.2

Figure 8.3

Figure 8.4

Figure 8.5

Figure 8.6

Figure 8.7

Figure 8.8

Figure 8.9

Figure 8.10

Figure 8.11

Figure 8.12

Figure 8.13

Figure 9.1

Figure 9.2

Figure 9.3

Figure 9.4

Figure 9.5

Figure 9.6

Figure 9.7

Figure 9.8

Figure 9.9

Figure 9.10

Figure 9.11

Figure 9.12

Figure 9.13

Figure 9.14

Figure 9.15

Figure 9.16

Figure 10.1

Figure 10.2

Figure 10.3

Figure 10.4

Figure 10.5

Figure 10.6

Figure 10.7

Figure 10.8

Figure 10.9

Figure 10.10

Figure 10.11

Figure 10.12

Figure 11.1

Figure 11.2

Figure 11.3

Figure 11.4

Figure 11.5

Figure 11.6

Figure 11.11

Figure 11.12

Figure 11.13

Figure 11.14

Figure 11.15

Figure 11.16

Figure 11.17

Figure 11.18

Figure 11.19

Figure 11.20

Figure 11.21

Figure 11.22

Figure 11.23

Figure 11.24

Figure 11.25

Figure 11.26

Figure 11.27

Figure 11.28

Figure 11.29

Figure 11.30

Figure 11.31

Figure 11.32

Figure 11.33

Figure 11.34

Figure 11.35

Figure 11.36

Figure 11.37

Figure 11.38

Figure 11.39

Figure 11.40

Figure A.1

Figure A.2

List of Tables

Table 1.1

Table 2.1

Table 2.2

Table 2.3

Table 2.4

Table 2.5

Table 3.1

Table 3.2

Table 3.3

Table 3.4

Table 4.1

Table 4.2

Table 4.3

Table 4.4

Table 4.5

Table 5.1

Table 5.2

Table 5.3

Table 5.4

Table 5.5

Table 6.1

Table 6.2

Table 6.3

Table 6.4

Table 6.5

Table 6.6

Table 6.7

Table 6.8

Table 6.9

Table 8.1

Table 8.2

Table 10.1

Table 10.2

Table 10.3

Table 11.1

Table 11.2

Table 11.3

Table 11.4

Table 11.5

Table 11.6

Table 11.7

Table 11.8

Table 11.9

Table 11.10

MOBILITY PROTOCOLS AND HANDOVER OPTIMIZATION

DESIGN, EVALUATION AND APPLICATION

Ashutosh Dutta

AT&T, USA

 

Henning Schulzrinne

Columbia University, USA

 

 

 

 

 

© 2014, John Wiley & Sons, Ltd

Registered office

John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom

For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com.

The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. It is sold on the understanding that the publisher is not engaged in rendering professional services and neither the publisher nor the author shall be liable for damages arising herefrom. If professional advice or other expert assistance is required, the services of a competent professional should be sought.

MATLAB® is a trademark of The MathWorks, Inc. and is used with permission. The MathWorks does not warrant the accuracy of the text or exercises in this book. This book's use or discussion of MATLAB® software or related products does not constitute endorsement or sponsorship by The MathWorks of a particular pedagogical approach or particular use of the MATLAB® software.

Library of Congress Cataloging-in-Publication Data

Dutta, Ashutosh.

Mobility protocols and handover optimization : design, evaluation and application / Ashutosh Dutta, Henning Schulzrinne.

pages cm

Includes bibliographical references and index.

ISBN 978-0-470-74058-3 (hardback)

1. Mobile communication systems. 2. Computer network protocols. I. Schulzrinne, Henning. II. Title.

TK6570.M6D84 2014

621.3845′6—dc23

2013036263

A catalogue record for this book is available from the British Library.

ISBN: 978-0-470-74058-3

1 2014

 

 

 

 

To my parents Ganesh and Pratima Dutta, my in-laws Late Haripada and Rekha De, my wife Sarmistha, my sons Srijoy and Arijit, and my family and friends. Their constant inspiration and support were invaluable while writing this book.

Ashutosh Dutta

To Carol, Nathan, and Ilta

Henning Schulzrinne

About the Authors

Dr. Ashutosh Dutta obtained his Ph.D. in Electrical Engineering from Columbia University, an M.S. in Computer Science from NJIT, USA, and a BSEE from NIT, Rourkela, India. As a seasoned mobility and security architect and an accomplished networking and computer science expert with 20-plus years' experience, Ashutosh has directed multiple IT operations, has led research and development for leading global technology corporations and top universities, and has in-depth expertise in developing and implementing research, analysis, and design initiatives.

His career, spanning 25 years, includes positions as LMTS (Lead Member of Technical Staff) at AT&T, New Jersey; CTO Wireless at NIKSUN, New Jersey; Senior Scientist at Telcordia Technologies, New Jersey; Director of Central Research Facilities at Columbia University, New York; and Computer Engineer at TATA Motors, India. Ashutosh's research interests include wireless Internet, multimedia signaling, mobility management, 4G networks, IMS (IP Multimedia Subsystem), VoIP, and session control protocols. He has published more than 80 conference and journal papers and Internet drafts, and three book chapters, and has given tutorials on mobility management at various conferences. Ashutosh has 21 issued security- and mobility-related US patents. Ashutosh serves as the Editor-in-Chief for the Journal of Cyber Security and Mobility published by River Publishers.

Ashutosh is a senior member of the IEEE and ACM. He has served as an IEEE volunteer and leader at the section, region, chapter, society, MGA, and EAB levels. Ashutosh is a recipient of the 2009 IEEE Region 1, IEEE MGA, and 2010 IEEE-USA Leadership Awards.

Professor Henning Schulzrinne, Levi Professor of Computer Science at Columbia University, received his Ph.D. from the University of Massachusetts at Amherst, Massachusetts. He was an MTS at AT&T Bell Laboratories and an associate department head at GMD-Fokus in Berlin before joining the Computer Science and Electrical Engineering departments at Columbia University. He served as Chair of the Department of Computer Science from 2004 to 2009 and as Engineering Fellow at the US Federal Communications Commission (FCC) in 2010 and 2011, and has been Chief Technology Officer at the FCC since 2012.

He has published more than 250 journal and conference papers, and more than 70 Internet RFCs. Some of the protocols codeveloped by him, such as RTP, RTSP, and SIP, are now Internet standards, used in almost all Internet telephony and multimedia applications. His research interests include Internet multimedia systems, ubiquitous computing, and mobile systems.

He is a Fellow of the IEEE; has received the New York City Mayor's Award for Excellence in Science and Technology, the VON Pioneer Award, the TCCC serviceaward, the IEEE Region 1 William Terry Award for Lifetime Distinguished Service to the IEEE, and the UMass Computer Science Outstanding Alumni recognition; and is a member of the Internet Hall of Fame.

Foreword

In today's world, ubiquitous computing and wireless Internet roaming have become the norm. Pervasiveness needs to support secured and seamless mobility among heterogeneous access networks. During a mobility event, the user of a mobile device changes its point of attachment, and the existing communication is degraded because of the need to manage mobility at multiple layers. Though protocols have been proposed to manage these different layers, there is no systematic method for comprehensive analysis of a mobility event. An optimized mobility management scheme would handle mobility efficiently without degrading quality of service.

While numerous mobility protocols for different layers have been designed to support these kinds of handoffs, most optimization techniques are ad hoc and tightly coupled to a specific mobility protocol. It is essential we develop optimization techniques in a systematic way, so that they may be applied to any type of mobility protocol. These would take into account factors such as security, configuration, authentication, quality of service, and the mobile's movement pattern.

By having a common framework and set of abstract functions that define mobility events, it will be easier to analyze any related protocol and derive associated optimization techniques. There is a dire need for a reference tool that details current best practices and provides a common framework to analyze the performance of mobility protocols and establish a set of versatile systems optimization techniques.

This book is intended to fill that void. It provides a theoretical approach to the management mobility events and develops this common framework, based on practical results from case studies of service provider, enterprise, military, and vehicular networks. It provides widely applicable deployment guidelines, and proposes a formal analysis of the mobility event that is unique and has not been presented in any other book. The book also introduces an abstract model that can be used to evaluate various types of optimization methodologies. By having such a model, it is easier to choose or design a set of protocols that can provide an optimized mobility management scheme specific to a customer's requirements.

Both advanced professionals and specialists responsible for designing future wireless networks will find this book useful. Graduate-level students will learn about the theory of mobility management and associated optimization techniques for different mobility protocols. This book describes new research ideas for providing a quality-of-service guarantee in terms of delay, packet loss, and resource utilization. Network designers can use this book to study the fundamental steps associated with a mobility event and to determine the basic principles of systems optimization for the steps of a handoff, and will find principles that can be appliedto any mobility protocol to achieve a desired quality of service, even with constrained resource parameters, in support of both real-time and non-real-time applications.

The authors Ashutosh Dutta and Henning Schulzrinne are well versed in the theoretical knowledge of mobility protocols, wireless Internet, and cellular systems, not to mention practical experience in developing and deploying mobile systems and networks. They are highly qualified to explain the details of different types of mobility protocols, handover optimization, and evaluation, and their application in different deployment scenarios.

Ashutosh Dutta is an accomplished networking and computer science professional with over 25 years of experience in directing multiple IT operations, designing and implementing enterprise-level and wide-area-level networks, and conducting research and development for leading global telecom corporations and academic institutions. He brings forth a unique combination of research, development, network performance analysis, deployment, and standards experience that gives him the ability to blend the theoretical aspects with best practices. Many of the results and experiments illustrated in the book are from the mobility test beds that he has designed and implemented. His 80-plus publications and 21 patents in the mobility and security areas make him an ideal contributor to this book.

Henning Schulzrinne, often known as the “father of Internet telephony,” has published more than 70 Internet RFCs, 250 publications, and multiple patents. Some of the protocols codeveloped by him are Internet standards today, used by almost all the popular Internet telephony and multimedia applications. He designed the original version of the application layer mobility protocol known as SIP. Henning has more than 25 years of experience as a chaired professor at Columbia University, a researcher at Bell Labs, a leader in the IETF, and a chief technology officer at the FCC. As a Ph.D. student advisor, Henning has guided numerous systems- and mobility-related Ph.D. theses. In fact, many of the book's chapters are based on Ashutosh's doctoral thesis work, conducted under Henning's supervision.

In summary, this book provides a comprehensive view of mobility management and optimization techniques by explaining different mobility protocols for various layers, as well as theory, design, and practical implementation and validation in mobility test beds. I recommend this book not only to networking professionals in charge of deploying enterprise and service provider mobility networks, but also to researchers, graduate students, systems engineers, and mobility architects.

Professor Zvi GalilJohn P. Imlay Jr. Dean of ComputingGeorgia Institute of TechnologyAtlanta, USA

Preface

In a span of less than thirty years, cell phones have become ubiquitous, and wireless voice and data have become one of the most common methods of communication today. Wireless networks have also evolved to support much higher bandwidth and lower end-to-end delay, supporting delay-sensitive applications such as interactive voice and video. For example, the 1G and 2G networks that were deployed in the late 1980s and early 1990s could only support data rates of up to a few tens of kilobits per second, in addition to voice communication, but by the start of the new millennium, they had evolved into 3G networks supporting up to 2 Mb/s data rate. Currently, 4G networks, primarily based on LTE, HSPA+, and, to a lesser extent, WiMAX, are being deployed that support multimedia communication and provide data transfer rates up to 100 Mb/s while reducing access packet delay to 50 ms. As these networks have been improving, there has also been a dramatic growth in the use of mobile devices and bandwidth-intensive applications, primarily in entertainment and interactive video. All of these applications are sensitive to disruptions due to handoffs between different cell sites and networks. Driven by increased data needs and limited spectrum availability, cell sizes are shrinking, leading to further increases in handoff frequency.

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!