Mipv6 Protocols: a Survey and Comparative Analysis

نویسندگان

  • K Vasu
  • Sudipta Mahapatra
چکیده

As the future generation networks are envisioned to be heterogeneous in nature, seamless mobility in such networks is an important issue. While IETF work groups have standardized various mobility management protocols, such as Mobile IPv6 (MIPv6), Fast Handovers for Mobile IPv6 (Predictive FMIPv6, and Reactive FMIPv6), Hierarchical Mobile IPv6 (HMIPv6), Proxy Mobile IPv6 (PMIPv6) and Fast Handovers for PMIPv6 (Predictive FPMIPv6, and Reactive FPMIPv6), out of which some are host based and some are network based, the decision regarding which protocol suits the future networks is still a research issue. The study of various mobility management protocols in terms handover latency and the number of hops is needed to evaluate these protocols. Even though much study has been done in literature in terms of handover latency, study still needs performance evaluation in terms of average hop delay. In this paper we study various mobility management protocols by applying simple numerical analysis. The study is carried out for performance evaluation of various mobility management protocols in terms of average hop delay, wireless link delay, wired part delay, and binding update and registration delay. In this work, the average hop delay is estimated in terms of total handover latency and total number of hops contributing to each protocol. The study enables us to make a few important observations regarding the performance of these mobility management protocols.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey of secure protocols in Mobile IPv6

Mobile IPv6, also known as MIPv6, is an IP-layer protocol that offers mobility support. The MIPv6 protocol allows Mobile Nodes (MNs) to remain connected to Correspondent Nodes (CNs), even when moving to foreign networks. Basically, MNs may change their position throughout the IPv6 network while retaining their existing connections by managing address variations in the Internet layer. Numerous a...

متن کامل

Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wireless networks

With the increasing demands for new data and real-time services, wireless networks should support calls with different traffic characteristics and different Quality of Service (QoS) guarantees. Instead of developing a new uniform standard for all wireless communications systems, 4G communication networks strive to seamlessly integrate various existing wireless communication technologies. IP has...

متن کامل

Comparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET

Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....

متن کامل

A comprehensive MIPv6 based mobility management simulation engine for the next generation network

Mobility management is one of the core requirements of the IPv6 based NGN to provide seamless handover services to mobile entities. In this regard, IETF has proposed protocols like Mobile IPv6 (MIPv6), Fast MIPv6 (FMIPv6) and Hierarchical MIPv6 (HMIPv6) to provide efficient mobility services. Due to the lack of deployment, there is not enough empirical data available to determine the efficacy o...

متن کامل

Enhancing SVO Logic for Mobile IPv6 Security Protocols

In order to protect Mobile Internet Protocol Version 6 (MIPv6), considerable researches have been made, consequently followed by various security protocols, which are based on public key cryptography. Especially, depending on a proper address based public key method, these protocols use each node’s address as a public key certificate to authenticate its public key because no global public key i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012