Implementation of Cellular IP and Its Performance Analysis
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 1
Abstract
In the current Cellular IP architecture, only one gateway serves the entire CIP network. So, the gateway is single point of failure for all the mobile hosts who rely on it to be connected to the Internet. Cellular IP requires that a mobile host be using exactly one gateway to the Internet backbone with Mobile IP at a time.When multiply gateways are used in a cellular IP network, the optimal design for the multiple domains is needed. The cellular IP protocol provides better performance for hand-off than other protocol using micromobility. A set of base station cluster together on the same cellular IP network. This kind of domain base network is superior to mobile IP in support of routing optimization and QoS. Experiment were conduct to explore load our protocol and survey the packet loss. This result so that the load of control packet is negligible for cellular IP and the number of lost packet can be successfully reduced. This thesis developed to design cellular IP architecture and fault detection mechanism and recover the protocol of cellular IP
Authors and Affiliations
Sujoy Halsana
A Study of Various Spoofing Attacks and Attackers in Wireless Networks.
Abstract: Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional se...
An Analysis of VANET Topology Based Routing Approach on Various Parameters
Abstract: Vehicular ad hoc network (VANET) is a peculiar subclass of mobile ad-hoc network (MANET) that has the potential in improving road safety and in providing travellers comfort. Currently it has gained an imp...
An innovative scheme for representation of signed numbers employing ternary logic and method of development of semiconductor optical amplifiers based wavelength encoded optical ternary half adder
Abstract: In binary logic, two different logical states are used to represent signed as well as unsigned numbers. In case of signed numbers one bit, usually the Most Significant Bit is solely devoted to represent the sig...
An encrypted mechanism for securing cloud data from data mining attacks
Abstract: Cloud Computing is a vast infrastructural and rising pool which provides huge storage of data in one sphere. Organizations nowadays are in the marathon of equipping the whole system in a cloud form. In th...
http://publishers.indexcopernicus.com/edit_journal_listissues.php
Abstract : The emerging ultra wideband (UWB) system offers a great potential for the design of high speed short-range wireless communications. In order to satisfy the growing demand for higher data rates, one possi...