Mobile IP GPS SOFT HAND OFF , SIMULTANEOUS BINDING IN

advertisement
Fast Handoffs with GPS Routing
For Mobile IP
Mustafa Ergen, Sinem Coleri
(ergen,csinem)@EECS.Berkeley.Edu
Department of EECS
University of California, Berkeley
Abstract
Mobile IP is designed to support uninterrupted
connectivity of mobile computers as they roam from
place to place. The general structure and the goals of
today’s mobile IP protocol are described. The previous
works to achieve fast handoff and to decrease the
control traffic is given. Then, our proposed system
using GPS (Global Positioning System) with its handoff
mechanisms and the changes that it brings to the
current system together with its improvements in
handoff and traffic are outlined. The simulation results
using network simulator (ns2) and C++ are presented.
1. Introduction
The Internet is expected to become a huge wired
network that consists of wireless attachment points at the
edges that connect the wireless mobile users inside their
coverage area to the wired part of the network.
The primary aim of Mobile IP is to support
mobility in addition to portability for computers without
charge. Portability, which means the operability of the
computer at any point of attachment except the time during
which it changes its point of attachment, is achieved today.
The aim of Mobile IP is to maintain these computers in
almost continuous reachability even when moving.
Wireless connections are expected to be
performed through radio or infrared attachments like the
cellular telephone technology. However, the limited
geographical coverage and the charging problems are not
yet solved for these systems. The coverage problem is only
solved by cellular telephone technology. However, this
brings the charging of connections. By ignoring the social
and economic concerns, we will work on the adaptation of
this cellular idea to Mobile IP.
As wireless computing becomes more prevalent,
the need for the achievement of real-time services through
wireless links increases. The need for real-time services
can only be solved through tiling the world into smaller
cells. These smaller cells bring also transceivers of lower
power for mobile nodes.
1
Although higher bandwidth, which is required for
real-time services, increases the quality of services
provided to users, small wireless cells cause frequent
handoffs. Frequent handoffs bring the frequent location
updates so an increase of the latency in the re-routing of
packets in handoffs. Therefore, although the wireless
sources improve in the future, high quality of service
cannot be achieved without making the handoffs
transparent to users.
Our system achieves fast handoffs by both using
hierarchical structure of the network [11] and GPS (Global
Positioning System) devices in the routers. According to
the hierarchical structure, the network is thought to be
composed of administrative or geographical domains. Each
domain has a hierarchical tree of foreign agents that
includes a domain foreign agent at the top. Using a GPS
device, each router knows its own position. With a special
advertisement messaging scheme, they make other routers
inside the domain learn their positions. They will then use
this position information to send the packets directed to
one foreign agent to the adjacent foreign agents in addition
to this foreign agent. Besides, we use this geographical
information of domain foreign agents to decide whether to
send the registration request to home agent or to the
previous domain foreign agent of the mobile host, which
brings local home agent functionality to domain foreign
agents if mobile host does not go away from this domain.
This paper addresses the course project of a
graduate course on High Speed Communication Networks
given at UC-Berkeley by Prof. Jean Walrand in the 20002001 academic year.
Different Mobile IP systems have been proposed
by several companies. In section 2, a brief overview of the
general structure of their proposed systems and the
fundamental differences between them are described. In
Section 3, the previous works on achieving fast handoff
and less traffic of advertisement messaging are introduced.
In section 4, the basic architecture of our system is
presented with the possible improvements that it brings to
the current structure. In Section 5, the performance results
of our simulations in Network Simulator (ns2) and C++
are presented. Section 6 highlights the areas for future
work. Section 7 concludes the paper.
2.Current Mobile IP Architecture
The basic structure of today’s Mobile IP has four
entities:
Mobile Host (MH): Host or router that is portable
with wireless network hardware while retaining a constant
IP address.
Home Agent (HA): A stationary router on a
mobile host home network that keeps the current location
information of this host and forwards the packets
accordingly.
Foreign Agent (FA): A router that has a
connection with the mobile host as it moves and that
delivers the packets coming to it by having both a radio
and wired Internet connection.
Corresponding Host (CH): Any host on the
Internet that sends packets to the mobile host.
HA
CH
Source
Location
Directory
(not enhanced by mobility binding) the routing is still via
HA. Also, there are proposals which address this problem.
The fundamental differences between most of the
proposed Mobile IP systems are in the following areas:
(i) How does a HA know where a MH is?
(ii) How can CHs send directly to the current FA
of the MH avoiding the triangular trip via HA?
The system objectives in judging these different
systems are performance as non-mobile protocols,
scalability and security. The first goal, achieving the
performance as non-mobile protocols, requires nontriangular routing since the packets go directly to the
destination address in non-mobile protocols. Additionally,
this performance issue requires fast handoffs when the user
moving from one cell to another since the user should not
understand that he is roaming from cell to cell. The second
goal, scalability, is necessary in order to avoid the
bottleneck of the MH location database as the number of
MHs increases. The third goal, security, is necessary in
order prevent the redirection of packets to malicious
eavesdroppers.
3. Previous Work on Fast Handoffs
Encapsulation
FA
MH
Decapsulation
H
Figure 1: General Structure of Mobile IP
The earliest mobile IP protocols have proposed
the following scheme: When a CH wants to send a packet
to a MH, it assigns the destination address of the packet as
the constant IP address of the MH. Then the packet goes to
the HA of the MH. The HA has the location information
for the MH as another IP address, which is named care-ofaddress. At this stage, the HA tunnels the packet by
encapsulating it with the destination address as the care-ofaddress of the MH. The packet is received at the tunnel
end point, which is either the FA or the MH and delivered
to MH. When the MH moves, it informs the HA of the
current location.
The basic problem with the above system is the
triangle routing. Datagrams with destination address of
MH have to first go to the HA even if CH and MH are near
each other and both away from HA. This problem is solved
with mobility binding, which is a functionality of the CH to
have an entry for MH. When a CH wants to send a
datagram to MH for the first time, the normal procedure of
packet forwarding is implemented. Then either HA or MH
informs the CH of the current care-of-address of MH so
that the following packets are forwarded directly to this
care-of-address. When the MH moves from one FA to
another FA, again either the MH or the HA informs the
CH of the current location so that CH will send the packets
directly to MH avoiding triangle routing. For ordinary CH
2
The problem of excessive mobility management
traffic and time has been addressed in various works
during the past years. The main problem in the system
developed to solve the triangle routing problem is that it
requires a lot of signaling between the MH, HA and CHs
and a lot of time to reroute packets even if MH moves
inside a very small area.
One of the proposed solutions is the hierarchical
mobility
scheme
proposed
by
Caceres
and
Padmanabhan[6]. In this system, the network consists of
domains, each of which includes a domain foreign agent
keeping track of all the regional movements of the MHs
inside the domain. The disadvantage is that the updating
procedure of the mobile node entry in the routing table of
the domain foreign agent takes time, which may cause the
loss of MH packets coming in between. To solve this
problem, they propose the buffering of the packets coming
to old FA. This can decrease the number of lost packets
due to handoff. However, in the real-time case, learning
the new place of the MH and sending them to the new
location can take so much time that it is better to ignore
them instead of causing additional overhead in the
network.
Another alternative proposed by Charles
Perkins[11] is to form a hierarchy of foreign agents. Every
foreign agent is supposed to know its ancestors in the tree.
Then the registrations due to the handoff from one FA to
another will only be up to the lowest common ancestor in
the tree. This prevents the trip of the registration messages
to the domain foreign agent each time the MH moves.
However, all FAs in the route from the domain foreign
agent to the MH’s FA have to keep the MH location
information and this may cause bottleneck as the number
of MHs increases. In addition, when their lowest common
ancestors is very high up the tree, the handoff can again
take a lot of time.
The proposed scheme by Seshan et al. [7]is to
assign each MH a multi-cast address. When a MH registers
a FA, this FA identifies the handoff targets and makes
them join to the multi-cast group. These handoff targets
buffer the last packets to transmit them in case of a hand–
off. This avoids the wasteful trip to HA to make it aware of
the new position. However, multicast address conflicts
may occur if one packet passes through another network
where the same multi-cast address is used.
The solution brought to the multi-cast conflict
problem by C. L. Tan et al. [5] is to assign a multi-cast
address to each MH by domain foreign agent inside the
domain. They propose dynamic virtual macro-cells (DVM)
for each FA containing the FAs around it and assign a
multicast address to each DVM in addition to each mobile
in the domain. They propose the allocation of a range of
multi-cast address to each domain to eliminate the multicast address conflict completely. However, this will
require a continuous messaging between all routers to
learn about the new multi-cast addresses allocated by
them. Moreover, in the last proposals, an intelligent
neighborhood discovery mechanism is needed to eliminate
the manual configuration of handoff targets and DVM
members. Also, an inter-domain handoff mechanism needs
to be described for these systems since they ignore the
handoffs between different domains by using hierarchical
structure.
4. Proposed System
Our proposed system aiming at improving
handoff for real-time applications assumes that the
network contains the domains, which have a hierarchical
structure of FAs, and that each router knows the positions
of all routers inside its domain. This can be achieved by a
special advertisement messaging and GPS (Global
Positioning System) devices at each router although
today’s routers do not have such a capability. Then the
packets coming to MH will first go to the domain foreign
agent. At this time, domain foreign agent and the other
routers will cooperate with each other by using location
information in order to achieve fast handoffs. Our system
reaches smooth handoff goal even in inter-domain
movements by using location information.
4.1 Structure of the Network
Home Network
Internet
The Internet is composed of administrative or
geographical domains as shown in Figure 2.
The structure of each domain is given in Figure 3.
Every domain has a hierarchy of foreign agents that
includes a domain foreign agent at the top. Every FA
knows its ancestors and its children in the tree.
Gateway
DFA
FA1
FA3
FA2
FA4
FA5
Figure 3: Structure of the domain
4.2 Handoff Mechanisms
4.2.1 Intra-Domain Handoffs
Our system uses the hierarchical structure in order
to eliminate the wasteful trip to HA for each movement of
the MH inside the domain. Each domain has one domain
foreign agent (DFA), which is the ancestor of all other
routers inside this domain.
The communication between the MH and FA is
achieved through the wireless network hardware of the
MH and one of the radio interfaces of the FA. Each FA
broadcasts a beacon packet with a beacon period. When a
MH wants to register to a FA, it registers with the DFA
and sends the address of the DFA to its HA. Therefore,
when a MH moves inside this domain, it does not need to
inform HA of its current FA.
Switching from one FA to another can still be a
problem inside the domain for real-time services since this
kind of services is not tolerable to delay. To solve this
problem, we propose to send each datagram directed to a
specific FA to all the FAs adjacent to this FA since the
MH is expected to move to one of these FAs if it changes
FA. While the current FA of the MH is forwarding packets
to the MH, the adjacent FAs buffer the last packets in
order to forward these packets to the MH if a handoff
occurs.
Our system involves two ways of achieving
smooth handoff by sending the packets to all the FAs
adjacent to the FA of the MH without needing multi-cast
address.
First way of Fast Intra-Domain Handoff:
According to the first way, the following
exchange of messages takes place:
Foreign Network
Figure 2: Structure of the Internet
3

DFA takes the encapsulated packet coming from HA
or CH and decapsulates it.
 DFA looks at the destination address and finds from
its visitor list the care-of-address of MH.
 DFA finds the adjacent FAs of the MH’s FA from the
location-IP address table. Then from its routing table,
it decides to which of its branches it should send these
packets in order to cover all of the adjacent FAs, and
sends these packets to these branches by encapsulating
them.
 When the routers at the end of these branches take the
packets, they decapsulate the packet, check the
location-IP address to find the adjacent FAs of the
MH’s FA and decides to which of its branches it
should send these packets, and send them with
encapsulation.
By applying this method at each of the routers taking
the encapsulated packets, we achieve the multi-cast
forwarding of datagrams without allocating any multi-cast
address.
the new FA and the registration time to DFA. Then it
immediately starts to receive packets from the new FA.
The disadvantage of the first method is that it sends the
packets to all of the FAs adjacent to the current FA all the
time. This increases the traffic in the domain even if the
MH does not move at all.
The advantage of the second way is that it does
not create traffic if the MH does not move. It only creates
extra traffic when FA does not know the new location of
the MH. However, if the number of links between the old
and new FAs is very high, the forwarding of packets from
the old to new FA can take time and can increase the realtime delay.
The second way of intra-domain handoffs can
also be improved with appropriate additional hardware.
For instance, MH may order FA to begin to send the data
to the adjacent FAs when it starts to receive weak signal
from FA. Moreover, MH can send the location direction of
its movement in order that its packets come to FAs in that
direction.
Second way of Fast Intra-Domain Handoff:
According to the second way, the following
exchange of messages occurs:
 DFA takes the encapsulated packet coming from HA
or CH and decapsulates it.
 DFA looks at the destination address and finds from
its visitor list the FA that the MH is connected to and
sends the packet to that FA.
 The FA taking the encapsulated packet decapsulates
the packet and checks whether the destination address,
the constant IP address of the MH, is inside its visitor
list.
 FA decides whether to send the packet over the radio
link, send the packets to adjacent FAs or ignore them.
 If MH is inside its visitor list, it sends the packet
via radio link.
 If MH is not inside its visitor list but inside its
cache list, this means that MH has just left this
FA. If the destination address of this cache list
entry is “all ones”, this means that FA does not
know the new care-of-address of the MH. Since
MH has moved to one of its adjacent routers, it
finds its adjacent routers from the location-IP
address table and sends the coming packets to its
adjacent FAs. If the destination address is not “all
ones”, this means that FA knows the new care-ofaddress of the MH and send the incoming packet
only to this address.
 If MH is neither inside its visitor list not inside its
cache list, it buffers the packet.
Performance of Intra-Domain Handoff Mechanisms:
Our system aims at providing real-time services,
which means providing minimum delay for each packet
and minimum number of lost packets.
Delay
We can separate the time needed to complete the
handoff into two parts: the discovery time and the handoff
latency.
The discovery time is the time from roaming out
of the old FA’s cell until hearing beacon from the new FA.
In the worst case, this discovery time is equal to the
beacon period. The worst case situation occurs when the
MH leaves just immediately after the reception of the
beacon packet.
The handoff latency is the time from sending a
registration request to new FA until it accepts the request.
This means that this time includes the travel time of the
registration request message from MH to DFA and the
travel time of the registration reply message from DFA to
MH.
According to the first way of intra-domain
handoffs, the time necessary for the MH to take the first
packet is given by the sum of the discovery time and
handoff latency time.
Comparison of Two Ways of Intra-Domain Handoffs:
The advantage of the first way is that it provides
the minimum delay for the reception of the next packet
from the new FA. The MH only waits for the discovery of
4
Handoff time=discovery time+handoff latency
According to the second way of intra-domain
handoff, the handoff time depends on how much time is
necessary to go packets from old FA to new FA. This
depends on the traffic of the links that the packets pass by
and on the number and length of the links between them.
We define the time necessary for packets to go from the
old FA to new FA as re-routing time. Handoff time will be
given by the following formula in the second case:
If rerouting time>(discovery time+handoff
latency)
Handoff time=rerouting time
else
Handoff time=discovery time+handoff latency
Packet Loss
If there were no handoff mechanism described
above and all packets going to the old FA were lost, the
number of lost packets would have been found by the
following formula:
number of packets lost = (discovery time +
handoff latency)/(packet inter-arrival time)
In the worst case, when discovery time is equal to
beacon period, this gives the following formula:
number of packets lost = (beacon period +
handoff latency)/(packet inter-arrival time)
The packet loss of our system implementations
depends on the size of buffers kept for each MH.
According to the first way of intra-domain
handling, where each adjacent FA takes all packets coming
to a FA, the number of lost packets are given as follows:
Registration time = (discovery time + handoff
latency)
If buffer size>(registration time/packet interarrival time)
packet loss=0
else
packet loss=(registration time/packet interarrival time)-buffer size
According to the second way of intra-domain
handoffs, where the FA sends to its adjacent FAs only if it
does not know the new location of the MH, the minimum
number of saved packets is given as follows:
Minimum number of saved packets=
(Registration time-re-routing time)/inter-arrival time
4.2.2 Inter-Domain Handoffs
The inter-domain handoffs will be needed more
and more as the battery-power of laptop computers
increases and the world becomes tiled into small wireless
cells. Therefore, our system tries to achieve fast handoffs
between the domains by using geographical information in
contrast to the other proposed mechanisms.
As the world is tiled into small cells, the
probability that a user will pass from one domain to
another increases. Suppose a user powers up his laptop
computer in Berkeley campus domain. Then he decides to
go to Los Angeles. He will work during the journey in his
car. He wants to stay connected to Internet during his
entire journey. Since today’s laptop computers have
enough electrical storage to last an entire day, he will be
5
able to stay connected to Internet with a proper protocol
and tiling of the places that he passes through into small
cells. Our system tries to make all handoffs transparent to
the user during his journey, which requires fast interdomain handoffs.
Our system gives local home agent functionality
to the DFA that the user is connected first as long as the
user roams inside a specific range of DFAs. This range is
found through a global angle and the distance between the
first DFA that the user has connected and home agent.
The procedure of changing domains without interdomain fast handoffs upon reception of the registration
request from a MH is as follows:
 The MH sending the registration request is not inside
the visitor list of the DFA receiving its packet.
 DFA sends registration request to the HA of the MH,
takes registration reply from HA, updates its visitor
list with the MH entry and sends the registration reply
to MH.
The procedure of changing domains with inter-domain
fast handoffs upon reception of the registration request
from a MH is described as follows (This is the procedure
of our system and we assume that the registration request
coming from the MH includes the location and IP address
of its old local home agent and the IP address and location
of its HA):
 The old local home agent DFA entry in the
registration request is not the same as the address of
the DFA receiving the packet.
 DFA decides whether to become the new local home
agent with the global tube algorithm.
 If it decides to become the new local home agent,
it sends the registration request to HA and takes
the registration reply from HA.
 If it does not decide to become the new local
home agent, it sends the registration request to the
old local home agent and receives the registration
reply from it.
 Then it sends the registration reply to MH by
encapsulating it with the care-of-address of the MH,
which includes the new local home agent information.
Global tube algorithm:
The main aim of the global tube algorithm is to
eliminate the unnecessarily long handoff times and the
traffic created to inform HA when MH changes domains.
Our system aims to use the DFA of the previously
connected domain as the local home agent and send
registration requests to the DFA of this domain as long as
the DFAs of the following domains lie inside an R radius.
This R radius is determined by the global tube in Figure 4.
LIFETIME
TYPE
New
DFA
Old
DFA
HOME ADDRESS
d2
d1

TARGETED DOMAIN FOREIGN AGENTS ADDRESS
R
CARE OF ADDRESS
HA
IDENTIFICATION
LOCAL HOME AGENT IP ADDRESS
LOCAL HOME AGENT GEOGRAPHICAL LOCATTON
Figure 4: Global Tube
HOME AGENT GEOGRAPHICAL LOCATION
The need for the global tube arises from the
necessity of an R radius depending on the location of the
DFA treated as a local home agent. If the local HA DFA is
near the HA, it is better to send the registration request to
HA instead of this DFA even if the difference between the
two DFAs is small. On the other hand, if the previous DFA
is far from the HA, it is better to send the registration
request to DFA instead of HA for the same distance
between the two DFAs. Therefore, the R radius must
decrease as the local HA DFA becomes nearer to the HA.
The global tube algorithm is as follows:
 Find the distance between previous DFA and HA, d 1.
 Find the R distance from the global  angle and the
distance d1 as follows:
R = d1 * tan()
 Find the distance between the local HA DFA and the
current DFA, d2.
 If d2>d1
The current DFA is the new local home agent
else
The previous DFA stays as local home agent
OTHER EXTENSIONS……
Figure 5: Registration Request Format
As can be seen from Figure-5, the only change in
the packet header is the association of old local home
agent DFA IP, old local home agent DFA location and HA
location to the extension of the Mobile IP message format.
The encapsulated format of this message is
expected to go from the FA that the MH is connected to
the DFA, and then from the DFA to either HA or the
previous DFA that the MH has visited.
The registration reply format that our system uses
is given in Figure 6.
TYPE
CODE
LIFETIME
HOME ADDRESS
4.3 Changes in Control Message of Mobile IP
TARGETED DOMAIN FOREIGN AGENTS ADDRESS
IDENTIFICATION
4.3.1 Changes in Registration Messages of
Mobile IP
LOCAL HOME AGENT IP ADDRESS
LOCAL HOME AGENT GEOGRAPHICAL LOCATTON
Our system uses the same Mobile Agent
discovery mechanism as Mobile IP. On the other hand, it
requires using the extension parts of the registration
messages of Mobile IP due to the use of domain foreign
agent concept and location information.
The registration request and reply messages are
used to inform the home agent of the current care-ofaddress of the MH and tells the HA how long it wants to
use this care-of-address.
The registration request format that our system
uses is given in Figure 5.
6
HOME AGENT GEOGRAPHICAL LOCATION
Figure 6: Registration Reply Format
As can be seen from Figure-6, the only change in
the packet header is the association of new local home
agent DFA IP, new local home agent DFA location and
HA location to the extension of the Mobile IP message
format. This registration reply message extensions is used
to inform the MH of the new local home agent
specifications.
4.3.2 Location Advertisement Messages
Our system assumes that each FA contains a GPS
device so knows its current location. Location
Advertisement Messages are used in order to send this
location information to all routers inside the same domain.
Each router is expected to have a location-FA
table, the entries of which include the IP address and the
location of each foreign agent care-of-address inside its
domain.
Each foreign agent advertises its position to its
neighbors. When one router gets the position of a foreign
agent, it has to make a decision whether to send this packet
to its neighbors and update its table. We know that each
router in Internet has a routing table and make routing
decisions according to this routing table. In order to
prevent creating loops and too much traffic with each
advertisement messages, every router will decide whether
to process a location advertisement message if it comes
from the router, which is the next router on the shortest
path going to the source of this location packet. The
processing of the location advertisement message includes
sending of the packet to all the neighbors of this router
except the router that the packet is coming from and
updating the table according to this location information.
This location advertisement messaging provides
each router to know all the FAs around each FA. This
avoids the manual configuration of handoff targets of each
FA.
assumes that each FA in the network covers only one cell
and acts as a base station.
4.4.1.2 Domain Foreign Agent Tasks
Processing of registration request message:



4.4 Entities of Our System
4.4.1 Domain Foreign Agent
4.4.1.1 Domain Foreign Agent Tables
Domain Foreign Agent (DFA) has two types of
tables: visitor list and location-FA table.
Visitor list keeps all the MHs visiting the domain
at this time. It includes the constant IP address of each of
these MHs and their current care-of-address. This current
care-of-address can either be the care-of-address of a FA
inside the domain that MH is connected to at that time or
the address of the DFA of another domain if MH has
moved to another domain while giving to this DFA a local
home agent functionality.
Location-FA Table is the table that keeps the
location information of each FA inside the domain
together with its care-of-address. This will be used in the
forwarding of MH packets to multiple FAs to provide fast
handoffs.
.
There may be various structures different from
our scheme. FA functionality and base station functionality
might be separated. Each FA may have more than one base
station so can cover more than one cell. This indicates that
Location-FA table can vary depending upon the network.
Although the structures vary, idea is the same. Our system
7
Upon reception of a registration request message,
DFA checks its visitor list to see whether MH is new
in the domain or was already roaming inside the
domain.
If the MH is in its visitor list, this means that this is an
intra-domain handoff. Therefore, the DFA only
updates the MH entry of its visitor list with the new
care-of-address.
If MH is not in the visitor list, this means that this is
an inter-domain handoff. It will decide whether to
register to HA or to the old local home agent.
 If the old local home agent entry of the
registration request is home agent of the MH
then DFA becomes the new local home agent of
this MH since this means that MH has just
powered up his computer.
 If the old local home agent entry of the
registration request is not home agent in interdomain handoff, then it will decide whether to
become the new local home agent or to connect
to the send registration request to the old one.
 If it decides to become the new local home
agent, it sends registration request to HA. HA
sends registration reply. Then the DFA
produces a new visitor list entry for this MH
and sends a registration reply to the MH.
 If it decides to know the old local home agent
DFA as the new local home agent, then it
only sends registration request to this DFA.
This old DFA updates its visitor list entry
with this MH and the current DFA. Then
sends a registration reply to the new DFA.
The new DFA produces a new visitor list
entry for this MH and sends a registration
reply to the FA of the MH.
Sending packets to MHs:

When a DFA takes a packet with destination address
as one of the MHs in its visitor list, then it directs
these packets to the corresponding care-of-address in
its visitor list.
4.4.2 (Normal) Foreign Agent
4.4.2.1(Normal) Foreign Agent Tables
(Normal) Foreign Agents (FA) has three types of
tables: visitor list, cache list and location-FA table.
Visitor list contains the MHs connected to this FA
at that time. It includes the constant IP address of all these
MHs. It updates this table according to the responses
coming from MHs to each beacon packet that it sends.
Cache list keeps all the MHs recently visited this
FA. When FA does not take a response for a MH in the
visitor list, it puts this entry to the cache list with a specific
lifetime. If it does not know the new care-of-address of this
MH, it puts an “all ones” entry as the new location of the
MH. If it learns the new place of the MH, it puts the new
care-of-address of the MH to the table. This list is used for
the second way of intra-domain handoff.
Location-FA table keeps the location information
and the care-of-address of each FA inside the domain.
4.4.2.2 (Normal) Foreign Agent Tasks
Processing of registration request message:



FA sends beacons periodically.
If it sees that a MH is newly connected to itself, it will
send the registration request to its DFA and update its
visitor list entry with this new MH entry upon the
reception of the registration reply from the DFA.
If it sees that some MHs are disconnected from itself,
it puts these entries to the cache list with a specific
lifetime.
Sending packets to MHs:
(for the first way of intra-domain hand-off)
 When a FA takes an encapsulated datagram sent to its
advertised care-of-address, it compares the inner
destination address to its entries of its visitor list.
 If this inner destination address matches the address of
one of the entries of the visitor list, it forwards the
decapsulated datagram to the MH.
 If this inner destination address does not match any
entry of visitor and cache list, it buffers the coming
packets in case there is a handoff.
(for the second way of intra-domain hand-off)
 When a FA takes an encapsulated datagram sent to its
advertised care-of-address, it compares the inner
destination address to its entries of its visitor list.
 If this inner destination address matches the address of
one of the entries of the visitor list, it forwards the
decapsulated datagram to the MH.
 If this inner destination address matches the address of
one of the entries of the cache list, and the
corresponding new location address is an “all ones”
address, then it finds the adjacent FA addresses from
its location-IP address table and sends the
decapsulated packet by encapsulating it with the
destination address of these FAs.
 If this inner destination address matches the address of
one of the entries of the cache list, and the
corresponding new location address is not an “all
ones”, then it sends the decapsulated packet by
encapsulating it with this destination address.
8

If this inner destination address does not match any
entry of visitor and cache list, it buffers the coming
packets in case there is a handoff.
4.5 Security
Mobile computing environment is very different
from the ordinary computing environment in terms of the
security. Since the links are wireless, the traffic can easily
be disrupted by malicious users. Our system provides the
security by using the Mobile IP features.
The protection against these malicious users is
obtained by inserting a time stamp or randomly generated
number into the identification field of the registration
request and reply messages. The home agent and the
mobile node have to agree on time stamp or random
number values. There are three kinds of authentication
extensions named as mobile-home, mobile-foreign and
foreign-home
authentication
extensions.
Security
Parameter Index (SPI) in these authentication extensions
defines the security context of authenticator computing.
The first connection of the MH to the Internet is
through the HA. HA and MH share keys that are
configured manually.
The manual configuration of keys between MH
and HA is not enough in our system since there are local
domain registrations. The problem is solved as it is solved
in the hierarchical Mobile IP structure. The home agent
will pick a registration key for use by MH and DFA. If the
DFA and HA share a security association, the FA wants
the registration key using this association and takes the
result back as a result of the registration reply. The HA
informs MH of this value using the usual key between
them. If the FA and HA do not have security association
but have public key, they use the public key with the
registration.
Our system sometimes requires sending a
registration request from one DFA to another DFA. We
assume that these DFAs share a security association or
public key in order to learn the registration key.
The procedure of sending packets to the adjacent
FAs is also secure in our system. When an adjacent FA
receives packets, it decapsulates and check its visitor list to
find appropriate MH whose home address is the same with
the decapsulated packet`s original source address. If it
finds, this means that secure registration is achieved so it
sends the packets. If it does not, it buffers them and does
not relay the packets unless the MH finishes its registration
procedure with the appropriate DFA.
5. Simulation Results
The performance of our algorithm can be
measured by examining the decrease in packet loss and
delay during a handoff.
The simulation scenario is split into two: IntraDomain Handoff and Inter-Domain Handoff. The
simulations are performed with Network Simulator (ns2)
and C++. We have measured packet loss and handoff time
in different wired link delays, wireless link delays and
beacon periods.
The handoff time is calculated by measuring the
round trip time of a 64 byte packet and by using the
beacon period. The packet loss is found by using the
handoff time calculated in ns2 and the network topology
formed in C++.
5.1. Simulation of Intra-Domain Handoff
The aim of the Intra-Domain Handoff simulation
is to measure how much time is required for a MH to
complete handoff, how many packets are saved by our
system compared to the current Mobile IP structure and
what is the inter-arrival time of the packets just before,
during and just after the handoff. Inter-arrival times,
handoff delay and packet loss is important for real time
systems.
The first part of the handoff time, detection time,
simply depends on beacon period and agent solicitation.
Maximum detection time can be taken beacon period
unless MH sends agent solicitation.[5]
The second part of the handoff occurs after MH
detects the FA. It includes sending of a registration request
message to DFA and waiting for the registration reply
message.
According to this setup, the round-trip time for a
typical 1Mbps bandwidth and 4ms delay wireless link and
1ms delay wired link is found to be 19ms in Figure 8.
Registration Time with Variable Wireless Link
22
20
Round Trip Time
18
5.1.1 Simulation Scenario
DFA
1.2MB wireless
1MB wireless link
2MB wireless link
16
14
12
FA
FA
10
1
2
3
4
5
6
Wireless Delay
Figure8: Wireless Delay
M
H
The simulation results for different wired link
delays and a 1Mbps bandwidth and 4ms delay wireless
link are given in Figure 9. The handoff time is expected to
be approximately these round-trip times plus the beacon
period of the FAs.
Figure.7 Intra- Domain Handoff Scenario
Our simulation scenario is shown in Figure 7. In our
simulations, wired and wireless links are taken to be
10Mbps duplex and 1Mbps duplex links respectively. In
order to be able to examine the system for a real-time data
flow, the source of packets coming to MH is chosen to be a
packet audio source. This brings 20ms as packet interarrival time and 200 bytes as average packet size.
We measured :
 Registration time
 Packet sending time from old FA to new FA
 Calculated number of packets buffered in the new FA
 Maximum required beacon period according to
different buffer size
 Packet inter arrival time
by the help of this scheme.
Registration Period with variable Wired Line
40
35
30
Round Trip Time
M
H
25
20
4ms Wless Delay,10 MB Wired R, 1MB
Wless R
15
10
5
0
0
1
2
3
4
5
6
7
Wired Delay
Figure9: Wired Delay
5.1.2 Handoff Delay Performance
5.1.3 Optimum Beacon Period
The aim of this simulation is to measure the
handoff time of the MH roaming inside a domain. The
handoff time can be divided into two: FA detection time,
and registration requests and reply time between new FA
of the MH and DFA.
The buffer size and beacon period can be seen as
variables for the system to satisfy some specifications.
Therefore, the simulation to find the maximum beacon
period that FAs can use with different buffer sizes is
performed. The result is that as the size of the buffer
increases, the necessary beacon period increases for no
9
As can be seen from Figure 11, the maximum
time interval between the arrival of packets is 127ms.
The second way of the intra-domain handoff of
our system also brings improvement to bandwidth usage.
According to the first way of intra-domain handoff, when
MH is connected to a FA, all of the adjacent Fas take one
copy of each packet but there may be situations when MH
does not make any movement and remain attached to the
same FA. In that case, bandwidth in other cells is also
occupied.
For our second intra-domain handoff proposal,
the measurement of the time necessary for old FA to send
packet to a new FA and then the calculation of the number
of the packets that will be buffered when MH involves in
handoff is performed. Detection time and traffic may vary
and the number of buffered packets cannot be a constant
value. With a detection range between 50ms and 200ms,
the number of buffered packet changes in the range from 2
to 9 packets.
Figure10: Maximum Required Beacon Period
packet loss, as expected. In addition, the observation is that
as the wired link delay increases, the necessary beacon
period is almost constant but decreases slightly. The reason
for this is that as the wired link delay increases, the
necessary round trip time increases as much as the packet
arrival-times. However, since there is a constant discovery
time, the number of packets coming to the new FA at that
time slightly decreases.
Sending Time a packet from Old FA to New FA
14
12
Sending Time
10
5.1.4 Inter-Arrival Time Performance
A good inter-arrival time performance is
necessary for real time services. It has been demonstrated
that human ear can tolerate approximately 200 ms delay at
maximum.
The inter-arrival time performance simulation is
performed with a 100ms beacon period and a buffer size of
10 in 1Mbps bandwidth and 4 ms wireless delay and
10Mbps bandwidth and 4ms wired delay.
8
10MB Wired Rate
6
4
2
0
0
1
2
3
4
5
6
Figure12: Sending Time From old FA to new FA
Buffered Packets
12
50ms Beacon Period
100ms Beacon Period
150ms Beacon Period
200ms Beacon Period
10
Number of Packets
8
6
4
2
0
1
2
3
4
5
Wired Delay
Figure13: Number of Buffered Packets
Figure11: Time Interval Between Packets
10
7
Wired Delay
6
5.2. Simulation of Inter-Domain Handoff
Registration Request+Replay Time
80
70
60
50
Time to Register
In this part of the simulation, the comparison of
the round trip time of the current hierarchical structure and
our system with simulation scenario of MH movement in
different domains is performed.
We assume that the distance between DFAs can
be used to judge their physical layer distance. The reason
for this is that there is a strong relation between the
geographical distance and delay for macro movements
although we cannot say that IP addresses are distributed
geographically in micro movements.
Domain Foreign Agent
Home Agent
40
30
20
10
0
5.2.1 Simulation Scenario
1
2
3
4
5
6
Distance From HA/DFA
We measured the round trip time between HA and
new DFA and between new DFA and old DFA. We
modeled the distance by increasing number of nodes and
link delays between HA and new DFA.
HA
Figure14: Comparison of Registration Time HA/DFA
As it can be seen from the Figure 14, in the global
tube of our system, our structure gives better results and
eliminates the handoff latency because of the far home
networks. Our method can be simply described as
distribution of home agent functionality locally.
6 Future Work
DFA
F
A
DFA
F
A
M
H
F
A
M
H
DFA
F
A
F
A
Our work can be investigated further in various
ways. Neighborhood discovery mechanism can be made
adaptive to different domain structures and different cell
size. Movement detection of the MH by the FA can be
investigated in order to decrease bandwidth usage.
Geographical distribution can be studied within the domain
and this geographical structure can be adapted to the adhoc networks and rooftop networks.  angle can be made
adaptive to the environment, i.e. country  , continental ,
city . In addition, 3-D volumes can be considered in
global tube calculations and procedures can be adjusted
accordingly. Finally, security concern between domains
can be investigated.
F
A
Figure13: Simulation Scenario
5.2.2 Handoff Delay Performance
As the frequency of the movement of MH
increases, it will change its domain frequently. Current
researches focuses on shielding MH movement within the
domain from HA. However, when people want to use their
devices without interruption when moving, MH will
request more handoffs. Domain change according to
previous structure requires MH to register HA and this
cause delay if the HA is away.
As described in , our system does not require to
inform HA as long as the new FA is inside the global tube.
The comparison of the registration times by our
system and the previous systems for mobile nodes whose
distances to home agents vary is performed with the ns
simulator.
11
7 Summary
In this paper, we have presented an algorithm for
acquiring fast handoffs and less control traffic in wireless
networks, which uses the hierarchical structure of the
network, which implies that internet is a network of
domains, and location information of the foreign agents
inside every domain of the network. We have shown the
necessary required changes in registration messages and
the format of location advertisement messages. We have
achieved an intelligent neighborhood discovery
mechanism eliminating the manual configuration of
adjacent FAs by these location advertisement messages.
Moreover, we have obtained fast handoffs inside the
domain by sending the packets to multiple foreign agents
without needing any multi-cast address allocation. We
have demonstrated that our scheme meets the delay
requirements of one of the most demanding real-time
applications, audio applications. Furthermore, we have
achieved faster handoffs between the domains in contrast
to all other systems ignoring inter-domain handoffs. By
using local home agent functionality inside the global tube,
we avoided the need to register home agent for each
domain change.
The popularity of real-time applications and
wireless networks has demonstrated the need for the
support of these applications over the wireless Mobile IP.
The requirement of bandwidth by the real-time
applications will be provided by tiling the world into
smaller cells, which brings frequent hand-off problem.
Since real-time applications are not delay tolerant, the fast
handoff described in this paper is required to achieve good
quality service in the future.
8 References
[1] C. Perkins. “Mobile IP Design Principles and
Practices” Addison-Wesley Wireless Communication
Series 1997.
[2] T. Blackwell, K. Chan, K. Chang, T. Charuhas, J.
Gwertzman, B. Karp, H. T. Kung, W. David Li, D. Lin, R.
Morris, R. Polansky, D. Tang, C. Young, J. Zao.”Secure
Short-Cut Routing for Mobile IP” Summer USENIX, June
1994.
[3] R. Jain, A. Puri and R. Sengupta. “Geographical
Routing Using Partial Information for Wireless Ad Hoc
Networks”
Technical Memorandum no. UCB/ERL M99/69.
[4] B. Karp and H. T. Kung , “GPSR: Greedy Perimeter
Stateless Routing for Wireless Networks” Proc. of
ACM/IEEE MobiCom 2000.
[5] C. L. Tan, S. Pink and K. M. Lye. “A Fast Handoff
Scheme for Wireless Networks” Proc. of ACM/IEEE
WoW-MoM 1999.
[6] R. Caceres and V. N. Padmanabhan. “Fast and scalable
handoffs for wireless internetworks.” Proc. of ACM/IEEE
MobiCom 1996.
[7] S. Seshan, H. Balakrishan, and R. H. Katz. “Handoffs
in cellular wireles networks: The daedalus implementation
and experience” Kluwer International Journal on Wireless
Personal Communications, January 1997.
[8] K. Malki and H. Soliman. “Fast Handoffs in Mobile
Ipv4” draft-elmaki-mobileip-fast-handoffs-03.txt,
September, 2000.
12
[9] A. Yegin, M. Parthasarathy, C. Williams. “Mobile Ipv6
Neighborhood Routing for Fast Handoff ” draft-yeginmobileip-nrouting-00.txt, September, 2000.
[10] R. Katz. “Adaption and Mobility in Wireless
Information Systems” IEEE Personal Communication,
First Quarter,1994.
[11] C. Perkins “Mobile-IP Local Registration with
Hierarchical Foreign Agents” draft-perkins-mobileiphierfa-00.txt, February,1996.
Download