Reducing Binding update in NEMO Supported PMIPV6
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 3
Abstract
Proxy Mobile IPV6 (PMIPV6) is a network-based mobility management protocol,designed to keep track of individual mobile node’s mobility. Numerous research works are in progress to enhance functionality of PMIPV6 to support NEtwork MObility (NEMO) as well. NEMO-BSP (NEMO Basic Support Protocol) is the protocol designed for NEMO and it is the extension of MIPV6. But NEMO-BSP cannot be directly used in PMIPV6 due to differences in the underlying protocols. IETF standard has given many design criterions for the protocol which supports NEMO in PMIPV6. This research work concentrates on two among the design considerations called “Resource-efficient handoff management” and “Minimal packet loss during handoff”. While mobile network chan ges its point of attachment in PMIPV6 network, lot of Binding updates (BU) and Binding acknowledgements (BA) are sent over-the-air to handoff, to register new location of nodes in mobile network and acquire network prefix for them. By using the fact that a ll nodes in the mobile network move together, this research work combines individual BU and BA of all nodes in mobile network and sends them together. By grouping the BUs and BAs, handover time and number of signaling messages to be exchanged during mobile network movement are reduced drastically
Authors and Affiliations
S Ananthi Jebaseeli , Dr. J. Sundararajan
Improving the Efficiency of Call Admission Control in Wireless Cellular Communication Networks by Frequency Sharing Techniques
In this paper, a two-tier cellular communication wireless network is characterized by overlapping the service area for managing the new calls users having different mobility speed. The overlapping property of the two-tie...
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) – A Neural Network Approach
The rapid development and expansion of World Wide Web and network systems have changed the computing world in the last decade and also equipped the intruders and hackers with new facilities for their destructive purposes...
A Novel Routing Protocol for Providing Anonymity in MANET
Mobile Ad Hoc Networks (MANETs) using anonymous routing protocols hidden node identity and external routes having anonymity protection. Anonymous routing protocols use either hop-by-by hop encryption or redundant traffic...
An Effective Method of Eye Detection Using Segmentation and Projection
Face detection and eye detection has long been the subject of interest in practical implementation of image processing and vision. Moreover the exact pupil detection of eye is the cream of research as the basic step of r...
Requirement and Result of Verifying the Program Code
The verification of Java/C++ codes is critical, especially for special projects where human life will be at stake. A system is required that uses integrated reasoning to split each verification condition into a conjuncti...