92,99 €
This book provides a common framework for mobility management that considers the theoretical and practical aspects of systems optimization for mobile networks.
In this book, the authors show how an optimized system of mobility management can improve the quality of service in existing forms of mobile communication. Furthermore, they provide a theoretical approach to mobility management, as well as developing the model for systems optimization, including practical case studies using network layer and mobility layer protocols in different deployment scenarios. The authors also address the different ways in which the specific mobility protocol can be developed, taking into account numerous factors including security, configuration, authentication, quality of service, and movement patterns of the mobiles.
Key Features:
This book is an excellent resource forprofessionals and systems architects in charge of designing wireless networks for commercial (3G/4G), LTE, IMS, military and Ad Hoc environment. It will be useful deployment guide for the architects wireless service providers. Graduate students, researchers in industry and academia, and systems engineers will also find this book of interest.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 866
Veröffentlichungsjahr: 2014
Cover
Title Page
Copyright
Dedication
About the Authors
Foreword
Preface
Organization of the Book
Intended audience
Acknowledgements
List of Abbreviations
Chapter 1: Introduction
1.1 Types of Mobility
1.2 Performance Requirements
1.3 Motivation
1.4 Summary of Key Contributions
Chapter 2: Analysis of Mobility Protocols for Multimedia
2.1 Summary of Key Contributions and Indicative Results
2.2 Introduction
2.3 Cellular 1G
2.4 Cellular 2G Mobility
2.5 Cellular 3G Mobility
2.6 4G Networks
2.7 IP-Based Mobility
2.8 Heterogeneous Handover
2.9 Multicast Mobility
2.10 Concluding Remarks
Chapter 3: Systems Analysis of Mobility Events
3.1 Summary of Key Contributions and Indicative Results
3.2 Introduction
3.3 Analysis of Handoff Components
3.4 Effect of Handoff across Layers
3.5 Concluding Remarks
Chapter 4: Modeling Mobility
4.1 Summary of Key Contributions and Indicative Results
4.2 Introduction
4.3 Related Work
4.4 Modeling Mobility as a Discrete-Event Dynamic System
4.5 Petri Net Primitives
4.6 Petri-Net-Based Modeling Methodologies
4.7 Resource Utilization during Handoff
4.8 Data Dependency Analysis of the Handoff Process
4.9 Petri Net Model for Handoff
4.10 Petri-Net-Based Analysis of Handoff Event
4.11 Evaluation of Systems Performance Using Petri Nets
4.12 Opportunities for Optimization
4.13 Concluding Remarks
Chapter 5: Layer 2 Optimization
5.1 Introduction
5.2 Related Work
5.3 IEEE 802.11 Standards
5.4 Handoff Procedure with Active Scanning
5.5 Fast-Handoff Algorithm
5.6 Implementation
5.7 Measurements
5.8 Measurement Results
5.9 Conclusions and Future Work
Chapter 6: Mobility Optimization Techniques
6.1 Summary of Key Contributions and Indicative Results
6.2 Introduction
6.3 Discovery
6.5 Layer 3 Configuration
6.6 Layer 3 Security Association
6.7 Binding Update
6.8 Media Rerouting
6.9 Media Buffering
6.10 Route Optimization
6.11 Media-Independent Cross-Layer Triggers
6.12 Concluding Remarks
Chapter 7: Optimization with Multilayer Mobility Protocols
7.1 Summary of Key Contributions and Indicative Results
7.2 Introduction
7.3 Key Principles
7.4 Related Work
7.5 Multilayer Mobility Approach
7.6 Concluding Remarks
Chapter 8: Optimizations for Simultaneous Mobility
8.1 Summary of Key Contributions and Indicative Results
8.2 Introduction
8.3 Illustration of the Simultaneous Mobility Problem
8.4 Related Work
8.5 Key Optimization Techniques
8.6 Analytical Framework
8.7 Analyzing the Simultaneous Mobility Problem
8.8 Probability of Simultaneous Mobility
8.9 Solutions
8.10 Application of Solution Mechanisms
8.11 Concluding Remarks
Chapter 9: Handoff Optimization for Multicast Streaming
9.1 Summary of Key Contributions and Indicative Results
9.2 Introduction
9.3 Key Principles
9.4 Related Work
9.5 Mobility in a Hierarchical Multicast Architecture
9.6 Optimization Techniques for Multicast Media Delivery
9.7 Experimental Results and Performance Analysis
9.8 Concluding Remarks
Chapter 10: Cooperative Roaming
10.1 Introduction
10.2 Related Work
10.3 IP Multicast Addressing
10.4 Cooperative Roaming
10.5 Cooperative Authentication
10.6 Security
10.7 Streaming Media Support
10.8 Bandwidth and Energy Usage
10.9 Experiments
10.10 Application Layer Mobility
10.11 Load Balancing
10.12 Multicast and Scalability
10.13 An Alternative to Multicast
10.14 Conclusions and Future Work
Chapter 11: System Evaluation
11.1 Summary of Key Contributions and Indicative Results
11.2 Introduction
11.3 Experimental Validation
11.5 Systems Validation Using Petri-Net-Based Models
11.6 Scheduling Handoff Operations
11.7 Verification of Systems Performance
11.8 Petri-Net-Based Modeling for Multi-Interface Mobility
11.9 Deadlocks in Handoff Scheduling
11.10 Analysis of Level of Concurrency and Resources
11.11 Trade-off Analysis for Proactive Handoff
11.12 Concluding Remarks
Chapter 12: Conclusions
12.1 General Principles of Mobility Optimization
12.2 Summary of Contributions
12.3 Future Work
A: RDF Schema for Application Layer Discovery
A.1 Schema Primitives
B: Definitions of Mobility-Related Terms
References
Index
End User License Agreement
xv
xvii
xviii
xix
xx
xxi
xxiii
xxv
xxvi
xxvii
xxviii
xxix
xxx
xxxi
xxxii
xxxiii
xxxiv
1
2
3
4
5
6
7
8
9
10
11
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
41
40
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
70
62
63
64
65
66
67
68
69
71
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
243
244
245
246
247
248
249
250
251
252
253
254
255
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
382
381
383
384
385
386
387
388
389
391
392
393
394
395
396
397
399
400
401
402
403
404
405
406
407
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
Cover
Table of Contents
Preface
Chapter 1: Introduction
Figure 1.1
Figure 2.1
Figure 2.2
Figure 2.3
Figure 2.4
Figure 2.5
Figure 2.6
Figure 2.7
Figure 2.8
Figure 2.9
Figure 2.10
Figure 2.11
Figure 2.12
Figure 2.13
Figure 2.14
Figure 2.15
Figure 2.16
Figure 2.17
Figure 2.18
Figure 2.19
Figure 2.20
Figure 2.21
Figure 2.22
Figure 2.23
Figure 2.24
Figure 2.25
Figure 2.26
Figure 2.27
Figure 2.28
Figure 2.29
Figure 2.30
Figure 2.31
Figure 2.32
Figure 2.33
Figure 2.34
Figure 2.35
Figure 2.37
Figure 2.38
Figure 2.39
Figure 2.40
Figure 2.41
Figure 2.42
Figure 3.1
Figure 3.2
Figure 3.3
Figure 3.4
Figure 3.5
Figure 3.6
Figure 3.7
Figure 3.8
Figure 3.9
Figure 3.10
Figure 4.1
Figure 4.2
Figure 4.3
Figure 4.4
Figure 4.5
Figure 4.6
Figure 4.7
Figure 4.8
Figure 4.9
Figure 4.10
Figure 4.11
Figure 4.12
Figure 4.13
Figure 4.14
Figure 4.15
Figure 4.16
Figure 4.17
Figure 4.18
Figure 4.19
Figure 4.20
Figure 4.21
Figure 4.22
Figure 4.23
Figure 4.24
Figure 4.25
Figure 4.26
Figure 4.27
Figure 5.1
Figure 5.2
Figure 5.3
Figure 5.4
Figure 5.5
Figure 5.6
Figure 5.7
Figure 5.8
Figure 5.9
Figure 5.10
Figure 6.1
Figure 6.2
Figure 6.3
Figure 6.4
Figure 6.5
Figure 6.6
Figure 6.7
Figure 6.8
Figure 6.9
Figure 6.10
Figure 6.11
Figure 6.12
Figure 6.13
Figure 6.14
Figure 6.15
Figure 6.16
Figure 6.17
Figure 6.18
Figure 6.19
Figure 6.20
Figure 6.21
Figure 6.22
Figure 6.23
Figure 6.24
Figure 6.25
Figure 6.26
Figure 6.27
Figure 6.28
Figure 6.29
Figure 6.30
Figure 6.31
Figure 6.32
Figure 6.33
Figure 6.34
Figure 6.35
Figure 6.36
Figure 6.37
Figure 6.38
Figure 6.39
Figure 6.40
Figure 6.41
Figure 6.42
Figure 6.43
Figure 6.44
Figure 6.45
Figure 6.46
Figure 6.47
Figure 6.48
Figure 6.49
Figure 6.50
Figure 6.51
Figure 7.1
Figure 7.2
Figure 7.3
Figure 7.4
Figure 7.5
Figure 7.6
Figure 7.7
Figure 8.1
Figure 8.2
Figure 8.3
Figure 8.4
Figure 8.5
Figure 8.6
Figure 8.7
Figure 8.8
Figure 8.9
Figure 8.10
Figure 8.11
Figure 8.12
Figure 8.13
Figure 9.1
Figure 9.2
Figure 9.3
Figure 9.4
Figure 9.5
Figure 9.6
Figure 9.7
Figure 9.8
Figure 9.9
Figure 9.10
Figure 9.11
Figure 9.12
Figure 9.13
Figure 9.14
Figure 9.15
Figure 9.16
Figure 10.1
Figure 10.2
Figure 10.3
Figure 10.4
Figure 10.5
Figure 10.6
Figure 10.7
Figure 10.8
Figure 10.9
Figure 10.10
Figure 10.11
Figure 10.12
Figure 11.1
Figure 11.2
Figure 11.3
Figure 11.4
Figure 11.5
Figure 11.6
Figure 11.11
Figure 11.12
Figure 11.13
Figure 11.14
Figure 11.15
Figure 11.16
Figure 11.17
Figure 11.18
Figure 11.19
Figure 11.20
Figure 11.21
Figure 11.22
Figure 11.23
Figure 11.24
Figure 11.25
Figure 11.26
Figure 11.27
Figure 11.28
Figure 11.29
Figure 11.30
Figure 11.31
Figure 11.32
Figure 11.33
Figure 11.34
Figure 11.35
Figure 11.36
Figure 11.37
Figure 11.38
Figure 11.39
Figure 11.40
Figure A.1
Figure A.2
Table 1.1
Table 2.1
Table 2.2
Table 2.3
Table 2.4
Table 2.5
Table 3.1
Table 3.2
Table 3.3
Table 3.4
Table 4.1
Table 4.2
Table 4.3
Table 4.4
Table 4.5
Table 5.1
Table 5.2
Table 5.3
Table 5.4
Table 5.5
Table 6.1
Table 6.2
Table 6.3
Table 6.4
Table 6.5
Table 6.6
Table 6.7
Table 6.8
Table 6.9
Table 8.1
Table 8.2
Table 10.1
Table 10.2
Table 10.3
Table 11.1
Table 11.2
Table 11.3
Table 11.4
Table 11.5
Table 11.6
Table 11.7
Table 11.8
Table 11.9
Table 11.10
Ashutosh Dutta
AT&T, USA
Henning Schulzrinne
Columbia University, USA
© 2014, John Wiley & Sons, Ltd
Registered office
John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom
For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com.
The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. It is sold on the understanding that the publisher is not engaged in rendering professional services and neither the publisher nor the author shall be liable for damages arising herefrom. If professional advice or other expert assistance is required, the services of a competent professional should be sought.
MATLAB® is a trademark of The MathWorks, Inc. and is used with permission. The MathWorks does not warrant the accuracy of the text or exercises in this book. This book's use or discussion of MATLAB® software or related products does not constitute endorsement or sponsorship by The MathWorks of a particular pedagogical approach or particular use of the MATLAB® software.
Library of Congress Cataloging-in-Publication Data
Dutta, Ashutosh.
Mobility protocols and handover optimization : design, evaluation and application / Ashutosh Dutta, Henning Schulzrinne.
pages cm
Includes bibliographical references and index.
ISBN 978-0-470-74058-3 (hardback)
1. Mobile communication systems. 2. Computer network protocols. I. Schulzrinne, Henning. II. Title.
TK6570.M6D84 2014
621.3845′6—dc23
2013036263
A catalogue record for this book is available from the British Library.
ISBN: 978-0-470-74058-3
1 2014
To my parents Ganesh and Pratima Dutta, my in-laws Late Haripada and Rekha De, my wife Sarmistha, my sons Srijoy and Arijit, and my family and friends. Their constant inspiration and support were invaluable while writing this book.
Ashutosh Dutta
To Carol, Nathan, and Ilta
Henning Schulzrinne
Dr. Ashutosh Dutta obtained his Ph.D. in Electrical Engineering from Columbia University, an M.S. in Computer Science from NJIT, USA, and a BSEE from NIT, Rourkela, India. As a seasoned mobility and security architect and an accomplished networking and computer science expert with 20-plus years' experience, Ashutosh has directed multiple IT operations, has led research and development for leading global technology corporations and top universities, and has in-depth expertise in developing and implementing research, analysis, and design initiatives.
His career, spanning 25 years, includes positions as LMTS (Lead Member of Technical Staff) at AT&T, New Jersey; CTO Wireless at NIKSUN, New Jersey; Senior Scientist at Telcordia Technologies, New Jersey; Director of Central Research Facilities at Columbia University, New York; and Computer Engineer at TATA Motors, India. Ashutosh's research interests include wireless Internet, multimedia signaling, mobility management, 4G networks, IMS (IP Multimedia Subsystem), VoIP, and session control protocols. He has published more than 80 conference and journal papers and Internet drafts, and three book chapters, and has given tutorials on mobility management at various conferences. Ashutosh has 21 issued security- and mobility-related US patents. Ashutosh serves as the Editor-in-Chief for the Journal of Cyber Security and Mobility published by River Publishers.
Ashutosh is a senior member of the IEEE and ACM. He has served as an IEEE volunteer and leader at the section, region, chapter, society, MGA, and EAB levels. Ashutosh is a recipient of the 2009 IEEE Region 1, IEEE MGA, and 2010 IEEE-USA Leadership Awards.
Professor Henning Schulzrinne, Levi Professor of Computer Science at Columbia University, received his Ph.D. from the University of Massachusetts at Amherst, Massachusetts. He was an MTS at AT&T Bell Laboratories and an associate department head at GMD-Fokus in Berlin before joining the Computer Science and Electrical Engineering departments at Columbia University. He served as Chair of the Department of Computer Science from 2004 to 2009 and as Engineering Fellow at the US Federal Communications Commission (FCC) in 2010 and 2011, and has been Chief Technology Officer at the FCC since 2012.
He has published more than 250 journal and conference papers, and more than 70 Internet RFCs. Some of the protocols codeveloped by him, such as RTP, RTSP, and SIP, are now Internet standards, used in almost all Internet telephony and multimedia applications. His research interests include Internet multimedia systems, ubiquitous computing, and mobile systems.
He is a Fellow of the IEEE; has received the New York City Mayor's Award for Excellence in Science and Technology, the VON Pioneer Award, the TCCC serviceaward, the IEEE Region 1 William Terry Award for Lifetime Distinguished Service to the IEEE, and the UMass Computer Science Outstanding Alumni recognition; and is a member of the Internet Hall of Fame.
In today's world, ubiquitous computing and wireless Internet roaming have become the norm. Pervasiveness needs to support secured and seamless mobility among heterogeneous access networks. During a mobility event, the user of a mobile device changes its point of attachment, and the existing communication is degraded because of the need to manage mobility at multiple layers. Though protocols have been proposed to manage these different layers, there is no systematic method for comprehensive analysis of a mobility event. An optimized mobility management scheme would handle mobility efficiently without degrading quality of service.
While numerous mobility protocols for different layers have been designed to support these kinds of handoffs, most optimization techniques are ad hoc and tightly coupled to a specific mobility protocol. It is essential we develop optimization techniques in a systematic way, so that they may be applied to any type of mobility protocol. These would take into account factors such as security, configuration, authentication, quality of service, and the mobile's movement pattern.
By having a common framework and set of abstract functions that define mobility events, it will be easier to analyze any related protocol and derive associated optimization techniques. There is a dire need for a reference tool that details current best practices and provides a common framework to analyze the performance of mobility protocols and establish a set of versatile systems optimization techniques.
This book is intended to fill that void. It provides a theoretical approach to the management mobility events and develops this common framework, based on practical results from case studies of service provider, enterprise, military, and vehicular networks. It provides widely applicable deployment guidelines, and proposes a formal analysis of the mobility event that is unique and has not been presented in any other book. The book also introduces an abstract model that can be used to evaluate various types of optimization methodologies. By having such a model, it is easier to choose or design a set of protocols that can provide an optimized mobility management scheme specific to a customer's requirements.
Both advanced professionals and specialists responsible for designing future wireless networks will find this book useful. Graduate-level students will learn about the theory of mobility management and associated optimization techniques for different mobility protocols. This book describes new research ideas for providing a quality-of-service guarantee in terms of delay, packet loss, and resource utilization. Network designers can use this book to study the fundamental steps associated with a mobility event and to determine the basic principles of systems optimization for the steps of a handoff, and will find principles that can be appliedto any mobility protocol to achieve a desired quality of service, even with constrained resource parameters, in support of both real-time and non-real-time applications.
The authors Ashutosh Dutta and Henning Schulzrinne are well versed in the theoretical knowledge of mobility protocols, wireless Internet, and cellular systems, not to mention practical experience in developing and deploying mobile systems and networks. They are highly qualified to explain the details of different types of mobility protocols, handover optimization, and evaluation, and their application in different deployment scenarios.
Ashutosh Dutta is an accomplished networking and computer science professional with over 25 years of experience in directing multiple IT operations, designing and implementing enterprise-level and wide-area-level networks, and conducting research and development for leading global telecom corporations and academic institutions. He brings forth a unique combination of research, development, network performance analysis, deployment, and standards experience that gives him the ability to blend the theoretical aspects with best practices. Many of the results and experiments illustrated in the book are from the mobility test beds that he has designed and implemented. His 80-plus publications and 21 patents in the mobility and security areas make him an ideal contributor to this book.
Henning Schulzrinne, often known as the “father of Internet telephony,” has published more than 70 Internet RFCs, 250 publications, and multiple patents. Some of the protocols codeveloped by him are Internet standards today, used by almost all the popular Internet telephony and multimedia applications. He designed the original version of the application layer mobility protocol known as SIP. Henning has more than 25 years of experience as a chaired professor at Columbia University, a researcher at Bell Labs, a leader in the IETF, and a chief technology officer at the FCC. As a Ph.D. student advisor, Henning has guided numerous systems- and mobility-related Ph.D. theses. In fact, many of the book's chapters are based on Ashutosh's doctoral thesis work, conducted under Henning's supervision.
In summary, this book provides a comprehensive view of mobility management and optimization techniques by explaining different mobility protocols for various layers, as well as theory, design, and practical implementation and validation in mobility test beds. I recommend this book not only to networking professionals in charge of deploying enterprise and service provider mobility networks, but also to researchers, graduate students, systems engineers, and mobility architects.
Professor Zvi GalilJohn P. Imlay Jr. Dean of ComputingGeorgia Institute of TechnologyAtlanta, USA
In a span of less than thirty years, cell phones have become ubiquitous, and wireless voice and data have become one of the most common methods of communication today. Wireless networks have also evolved to support much higher bandwidth and lower end-to-end delay, supporting delay-sensitive applications such as interactive voice and video. For example, the 1G and 2G networks that were deployed in the late 1980s and early 1990s could only support data rates of up to a few tens of kilobits per second, in addition to voice communication, but by the start of the new millennium, they had evolved into 3G networks supporting up to 2 Mb/s data rate. Currently, 4G networks, primarily based on LTE, HSPA+, and, to a lesser extent, WiMAX, are being deployed that support multimedia communication and provide data transfer rates up to 100 Mb/s while reducing access packet delay to 50 ms. As these networks have been improving, there has also been a dramatic growth in the use of mobile devices and bandwidth-intensive applications, primarily in entertainment and interactive video. All of these applications are sensitive to disruptions due to handoffs between different cell sites and networks. Driven by increased data needs and limited spectrum availability, cell sizes are shrinking, leading to further increases in handoff frequency.
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
