You are on page 1of 4

2009 IEEE International Conference on Services Computing

Mobility Management for Seamless flow of


Real Time Information in Heterogeneous
Networks
Adiline Macriga. T Dr. P. Anandha Kumar

Research Scholar, Department of Information & Communication, MIT Campus, Anna University Chennai,
Chennai – 600025. email: adiline_shanker@rediffmail.com, adiline.IT@ssec.edu.in
Asst. Professor, Department of Information Technology, MIT Campus, Anna University Chennai,
Chennai – 600025. email: anandh@annauniv.edu

 WiMax is considered the data transmission rate and the


Abstract— Today’s Industrial growth mainly depends on volume of information communicated is high. As we consider
the real time and on line information rather than stored the Adhoc Network the path tracing and the nearby node
data. It is a challenging one for the communication identification is faster and there is no need for a standard
industry to provide the required information continuously architecture. As the major of the different networks are
without delay. As the communication industry is combined with certain QoS without disturbing the existing
considered the major factor is the interconnection between infrastructure a fast seamless flow of voluminous information
the different networks and the cooperation between the in real time application can be achieved. As the data
service providers in the form of QoS. The major issue is transmission is considered the major part is affected based on
the mobility management (MM) to provide and maintain the initiation & delay such as authentication delay, handover
connectivity between the different networks. Here in this delay, session initiation, activation which is being carried out
paper an approach is proposed for MM based on the only after the control had reached the service point. In the
session management, location management[4][9] which proposed work the transmission of information is purely
are common to any type of network. By considering and controlled by categorizing the type of information that is
having the control over the common control management being transmitted such as the information ready for
techniques the flow of information is maintained without/ transmission is online or offline. Coming to on line either
with delay based on the services offered ie., either online voice communication, Multimedia communication or real-
service or offline service. Moreover the proposed work time information transmission etc., Considering the offline the
also concentrates on the allocation of the transmission information is stored file or images etc,. Among the above one
channel is purely based on the type of information the real time video[2] transmission is considered as the major
transmission applications involved such as data, voice, application because delay cannot be permitted and one more
voice & data, multimedia information, video images[1] [2], thing the mobility should be managed without any break in the
real time video applications etc. Based on the type of transmission path. As today’s requirement mainly focuses on
application and also the network and the service provider voluminous information in real time which includes audio and
a common procedure is being followed so as to provide a video files where the continuity in the transmission path has to
seamless transmission. be maintained to give a seamless flow of information.
Index Terms— Heterogeneous Networks, Mobility Therefore, to provide a seamless flow of information in the
Management, session management, location management heterogeneous[14] environment, MM is considered as a major
role. In the proposed work a generic tree is dynamically
I. INTRODUCTION created from the geographical map generated between the
source and the destination and also updations are made quite
In the heterogeneous networks, generally the entire networks in advance so that as the device in mobility crosses the
(eg., WLAN, 3G, 3GPP, Adhoc Networks[3], WiMax) network the controls are just being communicated and
operating on the Radio Frequencies under wireless[7] mode processed in the background and the real communication takes
available for communication are brought under a single head place without any interruption. The rapidly growing demand
based on their common operating procedures and functions. for “anywhere, anytime” high-speed access to IP-based
As a common mode the basic functions of the networks are services is becoming one of the major challenges for mobile
requesting, tracing, sending, acknowledging, authenticating, networks[5]. As the demand for mobility increases, mobile
authorizing, receiving, updating, forwarding, controlling, terminals need to roam freely across heterogeneous networks,
registering, managing. As the radio frequency is considered posing the challenge of network integration into an All-IP
the signal strength, maximum coverage, power level are taken ubiquitous access platform [7]. Mobile IPv6 stands as de facto
as the major factor. Todays cellular network[6][13] has a wide solution for mobility management [10][15] in next-generation
coverage area and also a good signal strength and as the systems. Fig 1 gives a diagrammatic representation for the
network evolution and the state at 2010, the high demand for
heterogeneity.

978-0-7695-3811-2/09 $26.00 © 2009 IEEE 524


DOI 10.1109/SCC.2009.83
1974 Ipv4 was designed to interconnect LANs
1998 Ipv6 responds to new networking
Complexities (LAN, PAN, P2P, WLAN)
2002 MIPv4 enables terminal mobility (FA-
HA-FA)
2004 MIPv6 improves terminal mobility in
homogeneous environments
2006 Mobility in 4G systems
2010 Seamless mobility in Heterogeneous
networks (Voip, Sip, MIP)

Fig 1. Networking evolution and driver protocols.

Mobility Management

As the metrics for mobility initially the status of the PDA


(Mobility device) is being identified: Fig 3 Traditional location updating architecture
i. Source stable Destination dynamic The goal of the algorithms in this section is to support
ii. Source dynamic Destination stable constant-time implementations of the query methods. Both of
iii. Source dynamic Destination dynamic the algorithms that we consider use space proportional
iv. Source stable Destination stable to V2 for the private data fields. The primary disadvantage of
Note: The dynamic speed for the PDA is considered as the the general approach for a huge network is overcome by
vehicular speed (250Kms/Hr) generating the graph dynamically by fixing the boundary of
the source and the destination.
1. Location Tracking
a. All-pairs shortest-paths by fixing the boundaries
The solutions to the all-pairs shortest-paths problem are all
classes with a constructor and two query methods:
a dist method that returns the length of the shortest path
from the first given vertex to the second; and one of two
possible path methods, either path, which returns a reference
to the first edge on the shortest path, or pathR, which returns
a reference to the final edge on the shortest path. If there is no
such path, the path method returns 0 and dist is undefined.
We use path or pathR as convenient for the algorithm
under scrutiny; in practice, we might need to settle upon one
or the other (or both) in the interface and use various transfer
functions in implementations.
class GraphS //
{ // implementations and private members hidden
GraphS(GRAPH G)
Edge path(int, int)
Edge pathR(int, int)
Fig 2. Location tracking using the all pair shortest path double dist(int, int)
algorithm. }
The first all-pairs shortest-paths ADT method
In this case the fourth state is considered as the source stable implementation that we consider solves the problem by using
and destination stable and the shortest path is identified based Dijkstra's algorithm to solve the single-source problem for
on the signal strength and also the feasibility with minimum each vertex. We build an array of GraphSPT objects, one to
handover. In this section, two classes that solve the all-pairs solve the single-source problem for each vertex. This method
shortest-paths problem is being considered as a base. The first generalizes the BFS-based method for unweighted undirected
method is to run Dijkstra's algorithm from each vertex to get graphs. It is also similar to our use of a DFS that starts at each
the shortest paths from that vertex to each of the others. If the vertex to compute the transitive closure of unweighted
priority queue with a heap is implemented, the worst-case digraphs.
running time for this approach is proportional to VE lg V, and b. Computing the diameter of a network
can improve this bound to VE for many types of networks by
This client illustrates the use of the interface in It finds the
using a d-ary heap. The second method, which allows to
longest of the shortest paths in the given network, prints the
solve the problem directly in time proportional to V3, is an
path, and returns its weight (the diameter of the network).
extension of Warshall's algorithm that is known as Floyd's
static double diameter(Graph G)
algorithm.
{ int vmax = 0, wmax = 0;

525
GraphS all = new GraphS(G); for (int s = 0; s < V; s++)
for (int v = 0; v < G.V(); v++) for (int t = 0; t < V; t++)
for (int w = 0; w < G.V(); w++) if (G.edge(s, t) != null)
if (all.path(v, w) != null) { p[s][t] = G.edge(s, t);
if (all.dist(v, w) > all.dist(vmax, wmax)) d[s][t] = G.edge(s, t).wt(); }
{ vmax = v; wmax = w; } for (int s = 0; s < V; s++) d[s][s] = 0.0;
int v = vmax; Out.print(v + ""); for (int i = 0; i < V; i++)
while (v != wmax) for (int s = 0; s < V; s++)
{ v = all.path(v, wmax).w(); Out.print("-" + v); } if (p[s][i] != null)
return all.dist(vmax, wmax); for (int t = 0; t < V; t++)
} if (s != t)
With Dijkstra's algorithm, we can find all shortest paths in a if (d[s][t] > d[s][i] + d[i][t])
network that has nonnegative weights in time proportional { p[s][t] = p[s][i];
to VE logd V, where d = 2 if E < 2 V, and d = E/V otherwise. d[s][t] = d[s][i] + d[i][t]; } }
For dense graphs, we could use an adjacency-matrix Edge path(int s, int t)
representation and avoid computing the reverse graph by { return p[s][t]; }
implicitly transposing the matrix (interchanging the row and double dist(int s, int t)
column indices), Developing an implementation along these { return d[s][t]; } }
lines is an interesting programming exercise and leads to a
compact implementation; however, a different approach, With this algorithm, we can find all shortest paths in a
which we consider next, admits an even more compact network in time proportional to V3.
implementation. Proof: The running time is immediate from inspection of the
code. The ith iteration of the loop computes a shortest path
c. Algorithm for all shortest paths for Dynamic Source
from s to t in the network that does not include any vertices
This class uses Dijkstra's algorithm to build an SPT for each with indices greater than i (except possibly the
vertex so that it can answer pathR anddist queries for any endpoints s and t). Assuming this fact to be true for the ith
pair of vertices. iteration of the loop, we prove it to be true for the (i+1)st
class GraphS iteration of the loop. A shortest path from s to t that does not
{ private GraphSPT[] A; include any vertices with indices greater than i+1 is either (i)
GraphSl(Graph G) a path from s to t that does not include any vertices with
{ indices greater than i, of length d[s][t], that was found on
A = new GraphSPT[G.V()]; a previous iteration of the loop, by the inductive hypothesis;
for (int v = 0; v < G.V(); v++) or (ii) comprising a path from s to i and a path from i to t,
A[v] = new GraphSPT(G, v); neither of which includes any vertices with indices greater
} than i, in which case the inner loop sets d[s][t]. An entry
Edge pathR(int s, int t) in the distance matrix has the length of the shortest known
{ return A[s].pathR(t); } path connecting the vertices corresponding to the given row
double dist(int s, int t) and column; the corresponding entry in the paths matrix gives
{ return A[s].dist(t); } the next vertex on that path.
}
The method of choice for solving the all-pairs shortest- Session Management
paths problem in dense graphs, was same as previous method, The session management protocol (SMP) lies in the
except that instead of using the logical or operation to keep application layer and the major work is to identify the required
track of the existence of paths, it checks distances for each resources based on the type of data/ information that has to be
edge to determine whether that edge is part of a new shorter transmitted / shared. Generally the data/ information can be
path. categorized based on their application and the usage. The
d. Algorithm for all shortest paths for Dynamic Source and different types of information types are given in fig. 4. Based
Destination on the application of the data/ information the session
management protocol is activated and the type of network is
After initializing the distances and paths matrices with the also selected. If the application involves huge data
graph's edges, we do a series of relaxation operations to transmission then the bandwidth is shared and the network is
compute the shortest paths. The algorithm is simple to chosen appropriately. The main goal is to provide a seamless
implement, but verifying that it computes the shortest paths is flow of information without connectivity failure as the
more complicated. terminals are in mobile.
class GraphS
{ private Edge[][] p; To support IP QoS, the Internet Engineering Task Force
private double[][] d; (IETF) recommends integrated services (IntServ) and
GraphSl(Graph G) differentiated services (DiffServ) [8]. These services also are
{ int V = G.V(); expected to be effective in all-IP-based 4G networks. Since
p = new Edge[V][V]; d = new double[V][V]; 4G networks will support multimedia traffic, we must visit the
for (int s = 0; s < V; s++) issue of providing IP QoS in IP based wireless access
for (int t = 0; t < V; t++) networks[8] and propose ITRAS for QoS support in 4G
d[s][t] = maxWT;

526
networks, where the decision of radio resource allocation mobile gateway can also be used by external clients, such as
follows IntServ or DiffServ policy. those outside the WiFi AP and WiMAX BS coverage areas,
but that have the opportunity to download data or attain
IntServ uses Resource Reservation Protocol (RSVP) to
Internet access through the dual gateway belonging to the
reserve bandwidth during the session setup. As a first step in
vehicular area network (VAN).Wireless 4G networks will
RSVP, the source sends a QoS request message of PATH to
utilize multiple radio access technologies including cellular
the receiver through intermediate routers that run an
networks, Wireless Metropolitan Area Networks, WLAN
admission and a policy control. If the sender receives RESV
(such as Wireless Fidelity (Wifi) (e.g., 802.11a, 802.11b, and
returned from the receiver through the reverse route as an
802.11i), HiperLAN, Ad-hoc networks), and Wireless
indication of QoS guarantee, it initiates the session. If each
Personal Area Network (WPAN) (such as Bluetooth). All
router along the path receives packets, it classifies and
these networks will be seamlessly integrated to form a
schedules them. IntServ ensures strict QoS, but each router
heterogeneous wireless network.
must implement RSVP and maintain per-flow state, which can
cause difficulties in a large-scale network.
REFERENCES
DiffServ, on the other hand, does not require a signaling [1] Jing-Ming Guo, Soo-Chang Pei, and Hua Lee, “Paired Sub image
protocol and cooperation among nodes. As the QoS level of a Matching Watermarking Method on Ordered Dither Images and Its
packet is indicated by the DS field of IP header (TOS (type of High-Quality Progressive Coding” IEEE TRANSACTIONS ON
MULTIMEDIA, VOL. 10, NO. 1, JANUARY 2008
service) field in IPv4, Traffic Class field in IPv6), each [2] Sai Shankar N, and Mihaela van der Schaar, “Performance Analysis of
domain can deal with it independently. After the packet is Video Transmission Over IEEE 802.11a/e WLANs, IEEE
classified, each router can mark, shape, or drop it according to TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO.
network status. Since DiffServ is not so rigorous as IntServ, it 4, JULY 2007
[3] Christopher Lott and Demosthenis Teneketzis, “Stochastic Routing in
is scalable in supporting QoS statistically. Ad-Hoc Networks”, IEEE TRANSACTIONS ON AUTOMATIC
CONTROL, VOL. 51, NO. 1, JANUARY 2006
[4] Yang Xiao, Yi Pan, Senior Member, and Jie Li, “Design and Analysis of
Location Management for 3G Cellular Networks”, IEEE
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
VOL. 15, NO. 4, APRIL 2004
[5] Yao Zhao, Yan Chen, Bo Li, and Qian Zhang, “Hop ID: A Virtual
Coordinate-Based Routing for Sparse Mobile Ad Hoc Networks” , IEEE
TRANSACTIONS ON MOBILE COMPUTING, VOL. 6, NO. 9,
SEPTEMBER 2007
[6] Haiyun Luo, Xiaqiao Meng, Ram Ramjee, Prasun Sinha, and Li (Erran)
Li, “The Design and Evaluation of Unified Cellular and Ad Hoc
Networks” IEEE TRANSACTIONS ON MOBILE COMPUTING,
VOL. 6, NO. 9, SEPTEMBER 2007
[7] Jia-Chun Kuo, and Wanjiun Liao, “Hop Count Distribution of Multihop
Paths in Wireless Networks With Arbitrary Node Density: Modeling and
Its Applications”, IEEE TRANSACTIONS ON VEHICULAR
TECHNOLOGY, VOL. 56, NO. 4, JULY 2007
[8] Xin Liu and Prasant Mohapatra, “On the Deployment of Wireless Data
Back-Haul Networks”, IEEE TRANSACTIONS ON WIRELESS
COMMUNICATIONS, VOL. 6, NO. 4, APRIL 2007
[9] Daniel Morris, Student Member, IEEE, and A. Hamid Aghvami, “A
Novel Location Management Scheme for Cellular Overlay Networks”,
IEEE TRANSACTIONS ON BROADCASTING, VOL. 52, NO. 1,
MARCH 2006
[10] Wenchao Ma, Yuguang Fang, and Phone Lin, “Mobility Management
Strategy Based on User Mobility Patterns in Wireless Networks” IEEE
TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO.
1, JANUARY 2007
[11] Daniel Morris and A. Hamid Aghvami, “Location Management
Fig.4 Information Classification Strategies for Cellular Overlay Networks—A Signaling Cost Analysis”
Conclusion IEEE TRANSACTIONS ON BROADCASTING, VOL. 53, NO. 2,
JUNE 2007
With the advent of research on moving networks[11][12] [12] Yi-hua Zhu, and Victor C. M. Leung, “Derivation of Moving Distance
Distribution to Enhance Sequential Paging in Distance-Based Mobility
(e.g., Network Mobility), in which the whole network is Management for PCS Networks”, IEEE TRANSACTIONS ON
mobile, the integration of WLANs and WMANs can improve WIRELESS COMMUNICATIONS, VOL. 5, NO. 11, NOVEMBER
mobile network connectivity. It is expected that public 2006
transportation (trains, buses, airplanes, ships, etc.) will [13] Ramón M. Rodríguez-Dagnino, and Hideaki Takagi, “Movement-Based
Location Management for General Cell Residence Times in Wireless
popularize Internet access through WiFi connectivity to
Networks”, IEEE TRANSACTIONS ON VEHICULAR
passengers while in movement. To this end, it will be TECHNOLOGY, VOL. 56, NO. 5, SEPTEMBER 2007
equipped with a bridge to communicate with external [14] Abdoul Djalil Assouma, Ronald Beaubrun, and Samuel Pierre, “Mobility
networks such as WiMAX. Moreover, seamless handover is Management in Heterogeneous Wireless Networks”, IEEE JOURNAL
still an issue as clients may be equipped with both interfaces, ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 3,
MARCH 2006
and the vehicle gateway may also give support to WiFi [15] Yan Zhang, and Masayuki Fujise, “Location Management Congestion
external connectivity through dual gateways/interfaces (WiFi/ Problem in Wireless Networks”, IEEE TRANSACTIONS ON
WiMAX) in order to offer fault tolerance and load balance VEHICULAR TECHNOLOGY, VOL. 56, NO. 2, MARCH 2007
between networks as well as new connectivity opportunities to
passengers. Apart from serving the movement network, the

527

You might also like