A network-based mobility management scheme for future Internet
โ Scribed by Ping Dong; Hongke Zhang; Hongbin Luo; Ting-Yun Chi; Sy-Yen Kuo
- Publisher
- Elsevier Science
- Year
- 2010
- Tongue
- English
- Weight
- 961 KB
- Volume
- 36
- Category
- Article
- ISSN
- 0045-7906
No coin nor oath required. For personal study only.
โฆ Synopsis
The current Internet was originally designed for ''fixed" terminals and can hardly support mobility. It is necessary to develop new mobility management schemes for the future Internet. This paper proposes an Identifiers Separating and Mapping Scheme (ISMS), which is a candidate for the future Internet mobility management, and discusses the basic principles and detailed message flow. ISMS is a network-based mobility management scheme that takes advantage of the identity and location separation. The mobility entities in the core network are responsible for the location management. ISMS is designed to satisfy the requirements of faster handover, route optimism, advanced management, location privacy and security. The average handover delay of ISMS is on the order of milliseconds only, which is far smaller than that of Mobile IPv6. Analyses show that ISMS can reduce packet overhead on wireless channels. We build a prototype and perform some experiments. Results verify the feasibility of ISMS.
๐ SIMILAR VOLUMES
The growing "elds of wireless networks and asynchronous transfer mode (ATM) are merging to form wireless ATM networks. This paper addresses dynamic bandwidth allocation, connection admission procedures, routing, and location management strategies in wireless ATM. More precisely, we investigate the i
This paper introduces a location-based locating strategy for Personal Communication Services (PCS) systems. In the proposed scheme, location updates are based on the value of a movement counter. The update of the movement counter is based on information on the locations visited by a mobile terminal
## Abstract A mobile ad hoc network does not require fixed infrastructure to construct connections among nodes. Due to the particular characteristics of mobile ad hoc networks, most existing secure protocols in wired networks do not meet the security requirements for mobile ad hoc networks. Most se
The concept of a person-based number is attractive due to several pressing demands in implementation of current wireless communication systems. Some of these are: sudden proliferation in number of area codes; the need for freedom from number changes due to changes in service provider, location, or a