SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 3, Issue 6 (Sep-Oct. 2012), PP 20-35
www.iosrjournals.org

    Extended Study on the Performance Evaluation of ISP MBG
         based Route Optimization Scheme in Mobile IPv4
                                                  sherif kamel
Abstract: Mobile IP has seen slow deployment for two major reasons; the need for enhancing edge routers
with Home Agent/Foreign Agent functionality and the fact that triangle routing in such systems is not efficient.
Triangle Routing is defined as the route that must be taken through the Home Agent for any traffic sent by the
Correspondent Node to the Mobile Node. This route is triangle in nature and longer than the normal path
between the Corresponded Node and the Mobile Node. Many protocols and research efforts have been
developed to solve this problem.
         Internet service Provider (ISP MBG) is one of the proposed techniques used for solving the triangle
routing problem in conventional Mobile IPv4. This paper will provide a further study on the performance
evaluation of Route Optimization in Mobile IPv4 based on ISP MBG scheme.
       The proposed technique has been implemented and tested on the Microsoft.net platform. Simulation
results prove that the new framework has solved the Triangle Routing Problem in Mobile IP by providing a
shorter route with a minimum transmission time for all the datagrams transferred between the Correspondent
Nodes and the Mobile Nodes.
Keywords: Mobile IP, Triangle Routing Problem, Route Optimization, Internet Service Provider, Point of
Presence, Mobile IP Border Gateway, PoPs Virtual Network.

                                           I.           Introduction
         Today, the number of wireless and mobile devices connected to the Internet is strongly growing.
Wireless links and networks, mobile users and mobility related services form an increasing part of the internet
infrastructure. These wireless and mobile parts are normally connected to larger, wired networks. Mastering the
key concepts in mobile, wireless and wired technology areas are therefore of increasing importance in the
society of today. Mobile IP is an internet protocol, defined by the Internet Engineering Task Force (IETF) that
allows users keep the same IP address, and stay connected to the internet while roaming between networks. The
key feature of Mobile IP design is that all required functionalities for processing and managing mobility
information are embedded in well defined entities, the Home Agent (HA), Foreign Agent (FA), and Mobile
Nodes (MNs) [1, 2]. When a MN moves from its Home Network (HN) to a Foreign Network (FN), the corret
delivery of packets to its current point of attachment depends on the MN's IP address, which changes at every
new point of attachment. Therefore, to ensure packets delivery to the MN, Mobile IP (MIP) allows the MN to
use two IP addresses: The Home address and Care-of-Address (CoA). The home address is static and assigned
to the MN at the HN; CoA on the other hand is dynamic and represents the current location of the MN [2].
         Original MIP has many problems such as home agent faults tolerance [3], HA overloading, and triangle
routing problem. Triangle routing problem is considered as one of the main problems facing the implementation
of MIP. When a Corresponding Node (CN) sends traffic to the MN, the traffic gets first to the HA, which
encapsulates this traffic and tunnels it to the FA. The FA de-tunnels the traffic and delivers it to the MN. The
route taken by this traffic is triangular in nature, and the most extreme case of routing can be observed when the
CN and the MN are in the same subnet. Many protocols have been invented to solve the triangle routing
problem, such as forward tunneling and binding cache [], bidirectional route optimization [], the smooth handoff
technique [5], a virtual home agent [6], and a port address translation based route optimization scheme [7]. Also,
Kumar et al. [8] presented a route optimization technique in which the tunneling is done at one level above the
HA in a hierarchical network instead of tunneling at the HA.
         This paper provides an extended study on the performance of (ISP MBG) based route optimization in
Mobile IPv4 [9]. This study is based on changing the system parameters including number of nodes, number of
zones and number of pops serving each zone and check the performance of this scheme compared with
conventional Mobile IP scheme. The paper is divided into 6 sections. Section 2 presents some basic concepts
about Mobile IP while Section 3 introduces the concept of the Triangle Routing Problem in Mobile IP. Section 4
presents the ISP MBG technique used to optimize the Triangle Routing Problem in the Conventional Mobile IP
technique. Section 5 introduces the analysis and evaluation of the proposed ISP MBG technique compared with
the conventional Mobile IP technique. Finally section 6 presents the concluding remarks and the future work.


                                                www.iosrjournals.org                                    20 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
                                     II.       Mobile IP
       Mobile IP is a modification to IP that allows nodes to continue to receive datagrams no matter where
they happen to be attached to the Internet. It involves some additional control messages that allow the IP nodes
involved to manage their IP routing tables reliably. Scalability has been a dominant design factor during the
development of Mobile IP, because in the future a high percentage of the nodes attached to the Internet will be
capable                                                                                                       of
mobility [10, 12].

2. 1 Mobile IP Terminologies
       Concerning the Mobile IP a set of terminologies are considered and defined as follows:
      Mobile Node (MN)          a host or router that changes its point of attachment from one network or
                                subnetwork to another
      Home address (Ha)         an IP address that is assigned for an extended period of time to a Mobile
                                Node in the Home Network.
      Home Agent (HA)           a router on a Mobile Node’s Home Network which tunnels datagrams
                                for delivery to the Mobile Node when it is away from home, and
                                maintains current location information for the Mobile Node.
      Home Network (HN)         a network, possibly virtual, having a network prefix matching that of a
                                Mobile Node’s Home Address.
      Foreign Agent (FA)        a router on a Mobile Node’s Visited Network which provides routing
                                services to the Mobile Node while registered. The Foreign Agent de-
                                tunnels and delivers datagrams to the Mobile Node.
      Foreign Network           any network other than the Mobile Node’s Home Network.
      (FN)
      Care-of-Address (CoA) the termination point of a tunnel toward a Mobile Node, for datagrams
                                forwarded to the Mobile Node while it is away from home.

            Correspondent           a peer with which a Mobile Node is communicating, it may be
            Node (CN)               either mobile or stationary.
            Link                    a facility or medium over which nodes can communicate at the
                                    link layer. A link underlies the network layer.
            Node                    a host or a router
            Tunnel                  the path followed by a datagram while it is encapsulated
            Virtual Network         a network with no physical instantiation beyond its router
                                    (with a physical network interface on another network).
            Visited Network         a network other than a Mobile Node’s Home Network to
                                    which the Mobile Node is currently connected.
            Visitor List            the list of Mobile Nodes visiting a Foreign Agent.
            Mobile Binding          the association of Home Network with a Care-of-Address,
                                    along with the remaining lifetime of that association

2. 2 Operation of Mobile IP
       Mobile IP is doing the following three relatively separate functions: Agent Discovery, Registration and
Tunneling [10, 11].

2. 2. 1 Agent discovery
The discovery process in Mobile IP is very similar to the router advertisement process defined in Internet
Control Message Protocol (ICMP). For the purpose of discovery, a router or another network node that can act
as an agent periodically issues a router advertisement ICMP message with an advertisement extension [10, 11].

2. 2. 2 Registration
        Once a Mobile Node has recognized that it has transferred on a Foreign Network and has acquired a
Care-of-Address, it needs to alert a Home Agent on its Home Network and requests that the Home Agent
forwards its IP traffics. The registration process involves four steps: Registration Request to Foreign Agent,
Foreign Agent Relays the Request to Home Agent, Registration Reply from the Home Agent to the Foreign
Agent and finally the Foreign Agent Relays the Reply to the Mobile Node [10, 11].

2. 2. 3 Tunneling


                                            www.iosrjournals.org                                       21 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
       Once a Mobile Node is registered with a Home Agent, the Home Agent must be able, to intercept IP
datagrams sent to the Mobile Node’s Home Network so that these datagrams can be forwarded via tunneling.
       In the most general tunneling case as shown in Figure 1; the source, the encapsulator, the decapsulator
and the destination are separate nodes. The encapsulator node is considered the entry point of the tunnel, while
the decapsulator node is considered the exit point of tunnel. Multiple source-destination pairs can use the same
tunnel between the encapsulator and decapsulator [10, 11].

                                                    Tunneling
                   Encapsulation                                                  Decapsulation



                      Source                                                       Destination
                                        Figure 1. General Tunneling

      Three options for encapsulation (tunneling) are available for use by the Home Agent on behalf of the
Mobile Node mainly: IP-ln-IP Encapsulation, Minimal Encapsulation, and General Routing Encapsulation
(GRE).

2. 3 Mobile IP Operation Sequence
       With the three relatively separated functions; Agent Discovery, Registration and Tunneling; a rough
outlines of the operation of Mobile IP Protocol is described as shown in Figure 2 [12].




          Mobile agents (Foreign Agents and Home Agents) advertise their presence via agent-advertisement
messages. A Mobile Node receives an agent advertisement and determines whether it is on its Home Network or
a Foreign Network. When the Mobile Node detects that it is located on its Home Network, it operates without
mobility services. When a Mobile Node detects that it has moved to a Foreign Network, it obtains a CoA on the
Foreign Network. The CoA can be either a Foreign Agent CoA or a Co-located CoA, then the Mobile Node
registers its new CoA with its Home Agent through the exchange of a registration request and registration reply
message, possibly by way of a Foreign Agent. Datagrams sent to the Mobile Node’s Home Network are
intercepted by its Home Agent, tunneled by the Home Agent to the Mobile Node’s CoA, received at the tunnel
endpoint (either at a Foreign Agent or at the Mobile Node itself), and finally delivered to the Mobile Node. In
the reverse direction, datagrams sent by the Mobile Node may be delivered to their destination using standard IP
routing mechanisms, without necessarily passing through the Home Agent.

                                III.         Triangle Routing Problem
       One of the basic problems facing the implementation of Mobile IP is the Triangle Routing Problem,
since all the traffics between CN and MN should have to pass through a longer path than the normal one. This
section introduces the definition and the drawbacks of the Triangle Routing Problem as shown in the following
subsections.

3. 1 Triangle Routing Definition
       Triangle Routing Problem is considered as one of the problems facing the implementation of Mobile IP.
When a CN sends traffics to a MN, the following sequence must be done:
1. Packets first get the HA.
2. Home Agent encapsulates these packets and tunnels them to the FA.
3. The Foreign Agent de-tunnels the packets and delivers them to the Mobile Node.
                                            www.iosrjournals.org                                       22 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
         As shown in Figure 3, the route taken by these packets is triangle in nature, and the most extreme case
of routing can be observed when the Correspondent Node and Mobile Node are in the same subnet [13].

                                          Datagram MN-CN
                             CN                                           MN

                                                                         Datagram CN- MN
                                                                   3         Detunneld

                                          1                   FA

                                                          2
                                                 HA
                                                          Tunneled datagram
                   Figure 3. Illustration of the Triangle Routing Problem in Mobile IPv4

3. 2 Triangle Routing Drawbacks
         Conventional Mobile IP technique allows transparent interoperation between Mobile Nodes and their
Correspondent Nodes, but forces all datagrams for a Mobile Node to be routed through its Home Agent. Thus,
datagrams to the Mobile Node are often routed along paths that are significantly longer than optimal. This
indirect routing can significantly delay the delivery of the datagrams to Mobile Nodes, and it places an
unnecessary burden on the networks and routers along its path through the internet. The Triangle Routing
drawbacks can be mentioned as follows:
1. Increases the delays per packet in datagrams transferred to the Mobile Node.
2. Wastes the network resources.
3. Home Agent bottle neck.
4. Delimits the scalability of Mobile IP protocol.

                       IV.          ISP MBG Route Optimization Technique
        Before discussing the ISP MBG scheme it is important to mention the types of communications in
Mobile Networks. In this issue, communication types involve the following [14]:
1. Communication between Mobile Node (MN) and Correspondent Node (CN) within the same Network; in this
    case the Home Agent receives a packet destined to the Mobile Node from a Correspondent Node and both
    of MN and CN are in the same network as shown in Figure 4.


                                                                     HA
                                                    Mobile IP
                                                  Core network
                             HA : Home Agent
                                                        FA                FA
                             FA: Foreign Agent


                                                   Mobile               Mobile
                                                  Terminal             Terminal
                Figure 4. Connection between Two Mobile Terminals in the Same Network

2. Communication between Mobile Node (MN) and Corresponded Node (CN) in two different Networks; when
   both of the Mobile Node and Correspondent Node are located in different networks as shown in Figure 5. It
   is supposed for the binding information to be transferred between the two networks and that will lead to a
   security related problem. To solve this problem, Mobile IP Border Gateways (MBGs); which are devices
   within the mobile networks; will maintain the binding information that must be added to the Correspondent
   Node without adding functions to terminals in the external networks [14, 15].




                                              www.iosrjournals.org                                     23 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
                                                      Correspondent Node

                           HA: Home Agent
                                                            Other IP network
                         FA: Foreign Agent
                                        Gateway
                                                                HA
                                                            Mobile IP
                                                            network
                                          FA                   FA

                                      Mobile
                                     Terminal
 Figure 5. Connection between Mobile Terminal and Correspondent Node in two Different IP Networks

4.1 Objectives of ISP MBG Technique
       The main objective of the proposed technique is to solve the Triangle Routing Problem in the
Conventional Mobile IP technique. The proposed technique aims are:
1. Minimizing the average message delay.
2. Maximizing the network throughput (minimize the network blocking rate).
3. Using the network resources efficiently and eliminating the Home Agent (HA) processing bottleneck due to
    the fact that all communication from Correspondent Node (CN) to Mobile Node (MN) are necessarily
    routed through the Home Agent (HA).
4. Increasing the level of security between different networks by using the Mobile IP Border Gateway (MBG).
    This is important for maintaining the information that being used by the Correspondent Node (CN) such as
    incoming packets from the external network are tunneled or routed and delivered directly to the Mobile
    Node (MN) instead of routing through the Home Agent (HA).

4.1.1 Architectural design of ISP MBG Technique [9]
        Figure 6 presents the overall design of the proposed ISP MBG technique for the Route Optimization
Problem.




         Figure 6. Global Views for the Proposed ISP MBG Technique with an Example of PVN

The design introduces the following:
1. Having a number of N Internet Service Providers ISP1, ISP2... ISPN each covers a definite and different
   geographical place. They are separated by an L Mobile IP Border Gateways (MBGs) [14]. MBGs will
   maintain either the binding (Home address, Care-of-Address) or only the home information (Home address)
   for all the transferred nodes (Mobile Nodes) from one Internet Service Provider to another. That depends on
   whether we are using tunneling or routing technique to forward the traffics generated in one Internet

                                           www.iosrjournals.org                                      24 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
     Service Provider and destined to Mobile Node located in another Internet Service Provider. Also, using
     multiple MBGs will distribute uniformly the processing load among them.
2.   Each Internet Service Provider is divided into a number of approximately S equal areas. Each area is served
     by an Agent that is considered as Home Agent for the nodes within that area and as Foreign Agent for all
     the nodes transferred from the other areas.
3.   Each area is divided into multiple equal M zones where each zone is served by a fixed K equal number of
     Points-of-Presence (PoPs).

 Figure 7 shows an example of the areas and PoPs classifications of each area for an Internet Service Provider.




4.   For each Internet Service Provider assuming that we have K PoPs virtual networks (PVNs) that can be
     placed in a fashion that is similar to (Ping-Pong) overlay network creation. This virtual network handles
     state information about all Mobile Nodes and Correspondent Nodes. For example, when a Mobile Node
     registers with one Points-of-Presence (PoPs), in one of the defined zones, the registration information will
     be available to all other zones through the PVN connecting that PoP with the other equivalent PoPs in the
     other zones. Figure 8 shows an example of PoPs Virtual Networks (PVNs) for ISP.


                              PoPi(Area1,Zone1), PoPi (Area1,Zone2),…, PoPi (Area1, ZoneM),
           PVNi               PoPi (Area2,Zone1), PoPi (Area2,Zone2), …., PoPi (Area2,ZoneM),…..,
          i1..k             PoPi (Areas ,Zone1), PoPi (AreaS,Zone2)……. PoPi (AreaS,ZoneM).

                                            Figure 8. PVNs for ISP

5.   Each PoP serving a definite X number of nodes with a range W of addresses. The nodes that are within the
     same agent serving the PoP are called Local Nodes and those are in different agents, and transferred to the
     agent serving that PoP; are called External Nodes. The range of W addresses for each PoP is divided as
     follows:
1.   A addresses for local nodes that are in service (Home address)
2.   B addresses for local nodes that are in waiting (Home address)
3.   C addresses for external nodes that are in service (Care-of- Address)
4.   D addresses for external nodes that are in waiting (Care-of-Address)

4.1.2 Sequences of ISP MBG Technique
        When a node is generated, it will be supported by the PoP serving its position, all of the home
information concerning that node will be saved at that PoP. When a Mobile Node (MN) moves to another area
or agent, the new agent will provide the node with the Care-of-Address. The home information for the node in
the new position could be accessed through the PoP Virtual Networks (PVNs) that connects the node's home
PoP to its new position serving the PoP. Figure 9 shows the operation sequence of the proposed technique.
        The operation sequence for the proposed algorithm depends on whether both of the Correspondent Node
and the Mobile Node are located in the same Internet Service Provider or both belong to different Internet
Service Providers. So, when Correspondent Node needs to establish connection with the Mobile Node we have
the following cases:
1. Both CN and MN belong to the same Internet Service Provider.
                                            www.iosrjournals.org                                        25 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
a. CN connects to its home PoP (Pk-1)asking about the information for the Mobile Node.
b. The correspondent PoP searches its neighboring PoPs (P1, P2,….Pk-2, Pk) in the same Zone, one of them is
    guaranteed to be connected to the virtual network of the Mobile Node.
c. The PoP which is connected to the Mobile Node's Virtual Network (i.e. P 1) connects directly to the Mobile
    Node and the connection is established.
2. Both CN and MN belong to different Service Providers
a. The Mobile IP Border Gateway will keep the home information (Home address) for all the Mobile Nodes that
    are transferred form one ISP to another.
b. The Correspondent Node connects to its home PoP (Pk-1) asking about the information for the Mobile Node.
c. The Correspondent PoP will ask its neighboring PoPs (P1, P2,….Pk-2, Pk) about the Mobile Node's home
    information. One of the PoPs (P1) is guaranteed to be connected to the virtual network of Mobile Node.
d. The PoP which is connected to the MN's Virtual Network (i.e. P1) connects to MBG which has the original
    home information for the destined MN. MBG connects to the nearest PoP in the destination ISP which is
    connected to the new virtual network of Mobile Node
e. The connection is established between Correspondent Node and Mobile Node.




                             V.          Evaluation of ISP MBG Technique
        Simulation modeling is based on system programming such as data structures, flowcharts, programming
languages and other tools that can be used to build up and characterizing system performance. For simplicity, it
is preferable to depend on the simulation model.

5.1 System Parameters
       The key point for establishing any system is to define its main parameters. This section introduces the
simulation parameters, data structure and connection parameters for the designated system respectively in the
following three subsections:
         In [9] the simulation has been done for 2 similar ISPs each have 2 similar areas with 2 zones per each
area and 4 pops serving each zone and for a total of 640 nodes. As an extended study for this technique, the new
simulation is based on increasing the number of nodes for the total [600-2000] nodes and also number of zones
and number of pops will be changed to 4 zones per area and 6 pops serving each zone. This study is to show
how much the scheme is efficient even when the simulation parameters are changed to check the sustainability
of ISP MBG technique as a route optimization technique for Mobile IP.

5.1.1 Simulation Parameters
        A network with two internet service providers is considered, each with two similar areas. In our
simulation there will be 2 structures one based an using 4 zones for each area and 4 pops serving each zone
another structure based on using 2 zones for each area and 6 pops serving each zone.
        Each PoP actually is serving 100 nodes with 150 addresses. The addresses are classified as 100 addresses
for the nodes in service and 50 addresses for the nodes in waiting. The addresses for the nodes in service are
classified as 75 addresses for the local generating nodes and 25 addresses for the externally generating nodes.
By the same way for the addresses concerning the nodes in waiting. They are classified as 25 addresses for the
local generating nodes and 25 addresses for the externally generating nodes. The addresses for the nodes are
considered as integer numbers given to each node consecutively and depend on the location of the node, area,
zone, PoP, and ISP it belongs to. Figure 10 shows an example of the nodes and address classification for PoP i.
        In the first structure the total number of zones all over the architecture design is 16 zones, each zone with
4 pops and the total number of pops is 64. In the second structure, the total number of zones all over the
                                              www.iosrjournals.org                                         26 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
architecture design is 8 zones. Each zone with 6 pops and the total number of pops is 48. The total number of
pops can be calculated by the following equation:

          PN = PK x NZ         where; PN               is the total number of PoPs
                                                     PK          is the number of PoPs within the Zone
                                                     NZ          is the total number of Zones

         Each PoP is serving 100 nodes, the simulation is done for a total number of nodes equals to 600-2000
nodes.
         NT = PN x NC          where;     NT is the total number of generating nodes
                                           NC      is the number of generating nodes in each connection.


                                PoP i




                                                                                              N150

           N1                                                                         N126
                         N75        N76               N100                    N125
                                                                 N101                        126-----150
            1-------75                                                                       Externally in
            Locally in                  76-----100                   101-----125               waiting
             services                   Locally in                   Externally in
                                         waiting                       services

                               Figure 10: Nodes and Address Classifications for PoPi

5.1.2 Data structures
         The main data structures implemented in the simulation are: nodes, PoPs, ISPs, Areas, Agents, and
Mobile IP Border Gateway (MBG). The class definitions and the structure definitions for all the data structures
are implemented using C Sharp on the Microsoft.net platform.

5.1.3 Connection parameters
         For the wireless communication design and implementation of the ISP MBG technique, the connection
parameters for the implemented algorithm are the key point for running the program. The connection parameters
can be classified as follows:
1.     The distance in kilometers equivalent to the distance of 1 pixel.
2.     Link speed for PoP connection
3.     Link speed for Agents connection
4.     PoP nodes count to serve.
5.     PoP nodes count to wait
6.     Agent nodes count to serve
7.     Agent nodes count to wait

5.2 System Construction
         Figure 11 shows the design architecture of the proposed ISP MBG techniques for 2 similar ISPs. Each
PoP can be identified using the following three parameters respectively; ISP number, Agent number and Zone
number:
         Pi = PoPj,k,l   i = j,k,l where; Pi: the ith PoP
                                                        j : Internet Service Provider number
                                                        k : Agent number
                                                        l : Zone number

         Also, we have similar PoPs Virtual Networks (PVNs) for the two Internet Service Providers. Each
PVN connects all similar POPs in all Zones, Areas, Agents, ISPs. Also in figure 11 we can change the number
of agents, areas, zones and also the number of PoPs serving each zone based on the require parameters for
comparison between the conventional Mobile IP and MBG ISP techniques.


                                                      www.iosrjournals.org                                   27 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in




5.3 Performance Parameters
        To evaluate the performance of the ISP MBG technique, the following five measuring criteria are
measured: Link Distance, Transmission Time, Blocking, Buffering and Security.

5.3.1 Link distance
         The link distance is calculated in kilometers equivalent to the pixels distance between the two
connecting nodes through the PoP links or the Agent links (1 pixel = 0.2km). The link distance can be calculated
and formulated using the following equation:

                 Dt (Pi, Pz) =                                                    Total Link Distance Comparison ( 6 POPs Per Zone)

                                                  230000
                            Total Distnace (km)




                                                  225000
                                                                                                                                 ISP MBG Total Link Distance
                                                  220000
                                                  215000                                                                         Conventional Mobile IP Total
                                                                                                                                 Link Distance
                                                  210000



       Where;    P: Transmission point (PoP or MBG)
                                                  205000
                                                                                00
                                                                                00
                                                                                00
                                                                                00
                                                                                00
                                                                                00
                                                                                00
                                                                                00
                                                                                00
                                                                                00
                                                                                00
                                                         0
                                                                0
                                                                0
                                                                                 0
                                                      60
                                                             70
                                                             80
                                                                              90
                                                                             10
                                                                             11
                                                                             12
                                                                             13
                                                                             14
                                                                             15
                                                                             16
                                                                             17
                                                                             18
                                                                             19
                                                                             20




                                                                                           #of Connections




                    D: Euclidian distance
                    Dt: Total link distance between two transmission points

5. 3. 2 Transmission time
         Measuring the transmission time depends on the location of both Mobile Node (MN) and
Correspondent Node (CN) and whether both are located in the same area, same Internet Service Provider or
either in different areas or different Internet Service Providers. The transmission time is calculated and
formulated using the following general form of equation:

                     T (Pi, Pz) =                                           800
                                                                                                   Average Link Distance Per Connection ( 6 POPs Per Zone)
                                                             Distanc (km)




                                                                            600                                                                                 ISP MBG Link Distance Per
                                                                                                                                                                Conection
                                                                            400                                                                                 Conventional Mobile IP link
                                                                                                                                                                Distance Per Connection
                                                                            200

                                                                             0



       Where;    P: Transmission point (PoP or MBG)
                                                                                                            00

                                                                                                            00

                                                                                                            00

                                                                                                            00

                                                                                                            00

                                                                                                            00

                                                                                                            00

                                                                                                            00

                                                                                                            00

                                                                                                            00

                                                                                                            00
                                                                                0

                                                                                       0

                                                                                              0

                                                                                                     0
                                                                             60

                                                                                    70

                                                                                           80

                                                                                                  90
                                                                                                         10

                                                                                                         11

                                                                                                         12

                                                                                                         13

                                                                                                         14

                                                                                                         15

                                                                                                         16

                                                                                                         17

                                                                                                         18

                                                                                                         19

                                                                                                         20




                                                                                                             #of Connections




                    T (Pi, Pz):Total transmission time between two transmission points P i and Pz
                    L: Link speed
                    D: Euclidian distance

5.3.3 Blocking
         Blocking is an important parameter to measure the overall performance of the network and its
throughput. The blocking is measured as the number of blocked connections. Each connection has a pair of
connecting nodes, (i.e. N connections = 2N Nodes).

5. 3. 4 Buffering
         Buffering is considered as one of the network resources that must be optimally used. In the
conventional Mobile IP technique, we have storage buffers for the agents whether they are Home Agents or
Foreign Agents. In the proposed ISP MBG technique, each PoP has its own storage buffers which hold a limited
number of nodes. The nodes are classified as nodes in service and nodes in waiting, with a range of addresses
for the nodes that are either locally generated within the Agent (Home addresses) or imported from the other
Agents. Using Point of Presence Virtual Network (PVN) will provide an efficient tool for accessing the Node's
information between PoPs.[The measuring evaluation of this parameter is out of our scope].

5. 3. 5 Security
         It is one of the rigid requirements for the performance evaluation between the conventional Mobile IP
technique and the proposed one. It is measured as how much the technique itself provides a self-securing
                                                                                                                                      www.iosrjournals.org                                    28 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
technique to protect the data transferred among the nodes located in different networks.[The evaluation of this
parameter is out of our scope].

5.4 Simulation Results
          The purpose of the simulation is to extend the study of the performance evaluation for ISP MBG
technique compared with the conventional Mobile IP technique. The simulation results for the 2 similar ISPs,
with 2 areas, 2 Zones per area and 4 PoPs per zone for the total number of 600 nodes has been discussed first
[9]. For further study of the ISP MBG technique with different ISPs structures, the running for the implemented
algorithm is done and calculated based on generating randomly a total number of nodes N= 2000 nodes in 15
steps, each step includes 100 more nodes (i.e 50 connections). In each step, the whole algorithm is executed, and
the connection is also randomly done between each pair of nodes. To obtain real results, the algorithm is
executed many times and the comparison is done based on the average values of the results.

5.4.1 Simulation Result for 2 Similar ISPs [2 Areas, 2 Zones/Area, 4 PoPs/Zone] [9]
5.4.1.1 Simulation Results for Link Distance (total 600 nods, 20 nods per connection)
         Figures 12.a and 12.b show the total link distance and the average link distance per connection for both
the proposed ISP MBG and the conventional Mobile IP technique respectively. It is clear that the proposed ISP
MBG technique outperforms the conventional Mobile IP technique. The route taken by the conventional Mobile
IP technique has to pass through the Home Agent which tunnels the data to the Foreign Agent. The route in the
proposed ISP MBG technique is taken through the home PoP of CN and the PoP virtual network of MN which
leads directly to the MN in case of one ISP. In case of using two Internet service Providers the route has to pass
through MBG to the MN's PoP virtual network in the second ISP which leads directly to the MN.


                                                                                                       ISP MBG                               Conventional Mobile IP

                                                     1200

                                                     1000
                                      Distanc (km)




                                                     800

                                                     600

                                                     400

                                                     200

                                                          0
                                                              1   3       5       7       9     11      13   15    17    19        21    23    25   27   29   31
                                                                                                     #of Connections (unit 10)



                                                          (a) Total Link Distance for the Conventional and ISP Techniqe


                                                                              ISP MBG                               Conventional Mobile IP

                                  350000

                                  300000
            Total Distnace (km)




                                  250000

                                  200000

                                  150000

                                  100000

                                  50000

                                          0
                                                      1       3       5       7       9        11      13     15    17        19        21    23    25   27   29   31
                                                                                                #of Connections ( Unit 10)


                                                      (b) Average Link Distances for the Conventional and ISP Techniqe
                                                                    Figure 12. Link Distance Comparison

5.4.1.2 Simulation results for transmission time
       Figure 13.a and 13.b show the total transmission time and the average transmission time (in seconds) per
connection against the number of connections for both the conventional Mobile IP technique and the ISP MBG
technique respectively. The figures show a great reduction in the transmission time using the proposed ISP
MBG technique, compared with the conventional one. That result is expected because of using PoPs and PVNs:


                                                                                              www.iosrjournals.org                                                      29 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
the home information for any node will be available anywhere among the networks and not only restricted on
the Home Agents that could be far away from the connecting nodes.


                                                                                                               ISP MBG                         Conventional Mobile IP


                                                                          6000
                                          Total Transmission Time (sec)




                                                                          5000

                                                                          4000

                                                                          3000

                                                                          2000

                                                                          1000

                                                                               0
                                                                                       1   2   3   4   5   6   7   8   9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
                                                                                                                                  #of Connections ( Unit 10)




                                                                               (a) Total Transmission Time for the Conventional and ISP Techniques

                                                                                                               ISP MBG                         Conventional Mobile IP

                                     20
                                     18
           Transmission Time (sec)




                                     16
                                     14
                                     12
                                     10
                                      8
                                      6
                                      4
                                      2
                                      0
                                                                    1      2       3   4   5   6   7   8   9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
                                                                                                                       #of Connections (unit 10)


                                                                           (b) Average Transmission Time for the Conventional and ISP Techniques
                                                                                         Figure 13. Transmission Time Comparison

5.4.1.3 Simulation Results for Blocking
         Figure 14 details the average number of blocking in both the conventional Mobile IP technique and the
proposed one. Each blocked connection is considered as single pair of connecting nodes. The figure shows that
as long as the number of connections  28 (i.e. number of nodes  560, "560= number of connections {28} x
number of generating nodes in each connection {20}").
         If the number of connection is increased (number of connections ≥ 28) meaning that the number of
nodes is also increased (number of nodes ≥ 560) the blocking rate will be increased for both the conventional
Mobile IP technique and the proposed one. The number of blocked connections using the newly proposed ISP
MBG technique is less than that of the conventional Mobile IP technique. In the conventional Mobile IP
technique, the HA is overwhelmed with an excessive amount of nodes' control messages compared with the
proposed technique in which the control messages are divided among the PoPs. Each PoP covers a number of
nodes and the virtual network between PoPs helps in getting the information easily. As the number of blocked
connections decreased that leads to increase the number of paired successful connections which means the
throughput will be increased.




                                                                                                                         www.iosrjournals.org                                                30 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in

                                                                                          ISP MBG                  Conventional Mobile IP



                                14

                                12
          Blocked Connections




                                10

                                8

                                6

                                4

                                2

                                0
                                             1                      3   5   7   9    11   13   15   17   19   21    23   25   27   29   31
                                                                                           #of Connections

                                                                                      Figure 14 Blocking Comparison

5.4.2. Simulation Results for 2 Similar ISPs [2 Areas, 4 Zones/Area, 4 PoPs/Zone, Number of Nodes 600-
2000 Nodes.]

5.4.2.1 Simulation Results for Link Distance

                                                                                Total Link Distance Comparison (4 Zones Per Area)
                                           230000
                                              Total Distnace (km)




                                           225000
                                           220000                                                                             ISP MBG Total Link
                                                                                                                              Distance
                                           215000
                                           210000
                                           205000


                                                                                     #of Connections

                                                                    (a) Total Link Distance for the Conventional and ISP Technique

                                                                            Average Link Distance Per Connection (4 Zones Per
                                                                                                  Area)
                                       800
                                     Distanc (km)




                                       600                                                                                    ISP MBG Link
                                                                                                                              Distance Per
                                       400
                                                                                                                              Conection
                                       200
                                         0


                                                                                    #of Connections


                                                                        (b) Average Link Distance for the Conventional and ISP Techniqe
                                                                                 Figure 15. Link Distance Comparison

         Figure 15.a and 15.b show that when the number of zones per area increases, the link distance for the
new technique increase due to redundancies in the virtual networks, but still it is better than the conventional
one (although close on performance)




                                                                                          www.iosrjournals.org                                     31 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
5.4.2.2. Simulation Result for Transmission Time
                                                                                 Total Transmission Time Comparison (4 Zones Per Area)



                                   Total Transmission
                                                         5000
                                                         4000

                                       Time (sec)
                                                                                                                                         ISP MBG Total
                                                         3000
                                                                                                                                         Transmission Time
                                                         2000
                                                         1000
                                                            0


                                                                                            #of Connections


                                                          (a) Total Transmission Time for the Conventional and ISP Techniques

                                                                             Average Transmission Time Per Connection (4 Zones Per
                                                                                                     Area)
                                        Transmission Time (sec)




                                                                  12
                                                                  10
                                                                   8                                                                      ISP MBG
                                                                   6                                                                      Transmission Timr Per
                                                                   4                                                                      Connection
                                                                   2
                                                                   0                                                                      Conventional Mobile
                                                                                                                                          IP Transmission Time
                                                                                                                                          Per Connection

                                                                                             #of Connections


                                       (b) Average Transmission Time for the Conventional and ISP Techniques
                                                     Figure 16. Transmission Time Comparison

         Figure 16.a and 16.b show that the transmission time required for both techniques are close to each
other due to redundancies in the virtual networks.

5.4.2.3 Simulation Result for Throughput
                                                                             Throughput Comaprison (4 Zones Per Area)

                                       20
             Blocked Connections




                                       15
                                                                                                                                          ISP MBG Blocking

                                       10
                                                                                                                                          Conventional Mobile IP
                                                                                                                                          Blocking
                                                 5

                                                 0
                                                                                    50

                                                                                            00

                                                                                                    50

                                                                                                            00

                                                                                                                    50

                                                                                                                            00

                                                                                                                                    50
                                           0

                                                                      0

                                                                             0
                                        60

                                                                   75

                                                                          90

                                                                                 10

                                                                                         12

                                                                                                 13

                                                                                                         15

                                                                                                                 16

                                                                                                                         18

                                                                                                                                 19




                                                                                          #of Connections


                                                                                         Figure 17. Throughput Comparison

        Figure 17 show that he new technique still outperforms the conventional one in the storage and
throughput, increasing number of zones increases the storage capabilities, so , less calls are blocked.

5.4.3 Simulation Results for 2 Similar ISPs [2 Areas, 2 Zones/Area, 6 PoPs/Zone, Number of Nodes 600-
2000 Nodes.]




                                                                                                   www.iosrjournals.org                                            32 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
5.4.3.1. Simulation Results for the link distance

                                                                                      Total Link Distance Comparison ( 6 POPs Per Zone)




                                                      Total Distnace (km)
                                                      230000
                                                      225000
                                                      220000                                                             ISP MBG Total Link
                                                                                                                         Distance
                                                      215000
                                                      210000
                                                      205000


                                                                                          #of Connections


                                                              (a) Total Link Distance for the Conventional and ISP Technique

                                                                                Average Link Distance Per Connection ( 6 POPs Per Zone)

                     800
             Distanc (km)




                     600
                                                                                                                           ISP MBG Link Distance
                     400                                                                                                   Per Conection
                     200
                                     0


                                                                                      #of Connections

                                                      (b) Average Link Distance for the Conventional and ISP Techniqe
                                                                   Figure 18. Link Distance Comparison

        Figure 18.a and 18.b show that when increasing number of pops per zone the link distance in the new
technique is less than that of the old technique, although they are close on the average.

5.4.3.2. Simulation Results for Transmission Time

                                                                                  Total Transmission Time Comparison ( 6 POPs Per Zone)
                                         Total Transmission




                                                      6000
                                             Time (sec)




                                                      4000                                                                ISP MBG Total
                                                                                                                          Transmission Time
                                                      2000
                                                                            0


                                                                                        #of Connections

                                                 (a) Total Transmission Time for the Conventional and ISP Techniques

                                                                                Average Transmission Time Per Connection ( 6 POPs Per Zone)
                            Transmission Time (sec)




                                                      20
                                                      15
                                                                                                                              ISP MBG Transmission
                                                      10                                                                      Timr Per Connection
                                                                5
                                                                0                                                             Conventional Mobile IP
                                                                                                                              Transmission Time Per
                                                                                                                              Connection

                                                                                         #of Connections


                             (b) Average Transmission Time for the Conventional and ISP Techniques
                                           Figure 19. Transmission Time Comparison


                                                                                           www.iosrjournals.org                                    33 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
         Figure 19.a and 19.b show that due to the increase of the POPs serving the zones, the calling node can
reach the mobile node much faster than in the old techniques, and it outperforms the conventional techniques on
the average transmission time.

5.4.3.3. Simulation Result for Throughput
                                                       Throughput Comaprison ( 6 POPs Per Zone)

                                      30
                Blocked Connections



                                      25
                                      20                                                                           ISP MBG Blocking

                                      15
                                                                                                                   Conventional Mobile IP
                                      10                                                                           Blocking
                                       5
                                       0
                                                              50

                                                                      00

                                                                              50

                                                                                      00

                                                                                              50

                                                                                                      00

                                                                                                              50
                                         0

                                                0

                                                       0
                                      60

                                             75

                                                    90

                                                           10

                                                                   12

                                                                           13

                                                                                   15

                                                                                           16

                                                                                                   18

                                                                                                           19
                                                                    #of Connections



                                                                   Figure 20. Throughput Comparison

        Figure 20 shows that the throughput of new technique is still better than conventional techniques

5.4.4 Buffering
       Concerning Buffering; it has been found that the proposed ISP MBG technique provides better buffering
than that of the Conventional Mobile IP technique. This is due to the fact that using PVN with the proposed
technique facilitates the process of handling and accessing information for the nodes in correspondences
between PoPs without any redundancy. Comparatively, the conventional technique requires more buffers due to
the redundancy of having a multiple copies of nodes' home information at each PoP of the Internet service
Provider. This leads to less use of buffering storages than that of the conventional technique which needs
storage buffer for each node to hold all of its information at each PoP. Also, as a cost wise, it has been found
that the cost for the Agent's buffers is higher than that of the PoP's buffers

5.4.5 Security
        The Security design has a great concern in Mobile IP. The proposed ISP MBG technique is considered as
the self securing system. Using Mobile IP Border Gateway (MBG) will keep the information (Home address or
binding information) for all Mobile Nodes crossing their network to another network. So, any CN in one
network does not need to maintain any private external information concerning the new IP network where the
MNs visit and all of the MN's information could be accessed directly through the Mobile Border Gateway.
Comparatively, the conventional Mobile IP technique needs rigid requirements for the authentication to prevent
the malicious users from interrupting the connection between MN and CN that maintains the binding
information (Ha, CoA).

                                                      VI.                  Conclusion and Future Work
       In this paper a further study on ISP MBG route optimization technique has been introduced to check the
performance evaluation of the technique when the simulation parameters [zones an pops] are changed.
       The design of technique is based on using a number of Internet Service Providers (ISPs) separated by a
Multiple Mobile IP Border Gateways (MBGs) which are used to keep the binding information or the home
information for the transferred Mobile Nodes between ISPs. Each ISP is composed of an approximately a
number of an equal areas, each is served by an agent and is composed of a multiple equal zones. Each zone is
served by a definite number of Points of Presences (PoPs). Each PoP is serving a number of nodes with a range
of addresses. Virtual Networks are used to connect the PoPs in such a way the redundancy in keeping the nodes
information will be minimized or almost cancelled. The main function of the proposed technique is to get the
shortest routing path for the packets transferred between the Correspondent Nodes and Mobile Nodes based on
the PoPs information, PVN and the MBG.The simulated network design of our case study is based on using two
Internet Service Providers separated by one Mobile IP Border Gateway. Each ISP is divided into two equal
areas. The simulation is applied twice once based on using 4 zones per each area and 4 pops serving each zone.
Another simulation is based on using 2 zones per area and 6 pops serving each zone.Each PoP is serving 100
nodes with a range of 150 addresses. The simulation results for the Link Distance, Transmission Time,
Blocking, Buffering and Security show that the proposed (ISP MBG) technique outperforms the conventional
Mobile IP technique by minimizing the Link Distance, Transmission Time, Blocking, Buffering. Also, it gives a
higher level of security than that used with conventional Mobile IP technique.

                                                                            www.iosrjournals.org                                            34 | Page
Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in
 This work can be considered applicable for the following: better performance related to the criteria of
 measuring parameters ,no addition of external hardware devices are required, more reliablility and flexibility of
 the simulation model, and scalability for using more PoPs and nodes .
          For more further study on the performance evaluation of ISP MBG route optimization technique,
 further evaluation will be done based on using 2 different ISP structures.

                                                           Reference
 [1]      C. Perkins." IP Mobility Support for IPv4", IETF RFC 3344 Ed., Oct. 2002.
 [2]      C. Smith and D. Collins, “3G Wireless Networks”, “McGraw-Hill, United States, 2002.
 [3]      Y. Huang, and M. Chuang, "Fault tolerance for home agents in mobile IP", 2006.
 [4]      C. Wu, A. Cheng, S. Lee, J. Ho, and D. Lee, "Bi-directional Route Optimization in Mobile IP Over Wireless LAN”, Institute of
          Information Science, Academia Sinica, Taiper, Taiwan, Vol. 2, pp 1168-1172. 2002.
 [5]      B. Ayani, "Smooth Handoff in Mobile IP", Master Thesis, University of California in Berkeley. May 2005.
 [6]      G. Qiang and A. Acampora, "A Virtual Home Agent based Route Optimization for Mobile IP", Wireless, 28 Sept. 2000.
 [7]      D. Badami, N. Thanthery, T. Best, R. Bhagvathula, R. Pendse, "Port Address Translation Based Route Optimization for Mobile
          IP", Vehicular Technology Conference, (5), PP. 3110-3114. 2004.
 [8]      C. Kumar, N. Tyagi, and R. Tripathi, "Performance of Mobile IP with New Route Optimization Technique". IEEE. International
          Conference, Institute of Engineering and Rural Technol, Allahadad, India, pp. 522-526. 2005.
 [9]      Sherif Kamel Hussein, Iman Saroit Ismail, S. H. Ahmed, "Solving the Triangle Routing Problem in Mobile IP", informatics
          journal, faculty of computers and information technology, Cairo University published issue, June 2006.
[10]      C.Kumar, N.Tyagi , Tripathi R., "Performance of Mobile IP with new Route Optimization Technique", IEEE International
          Conference, Institute of Engineering and Rural Technol, Allahadad, India, PP. 522-526, January 23-25, 2005.
[11]      D.Badami, N.Thanthry, T.Best, R.Bhagavathula and R.Pendse., "Port Address Translation based Route Optimization For Mobile
          IP", Vehicular Technology Conference, IEEE 60 th, Department of Electrical and Computer Engineering, Wichita State
          University, KS, USA, Vol. 5, PP. 3110-3114, September 26-29, 2004.
[12]      Moheb R. Girgis, Tarken, Mohamoud Youssef S. Takroni and Hassan S. Hassan, "Performance Evaluation of New Route
          Optimization Technique for Mobile ". IP International Journal of Netowrk Security & Its Applications (IJNSA), Vol., No. 3,
          October 2009.
[13]      C. Perkins, “IP Mobility Support for IPV4”, RFC 3344, Work on Progress, August 2002.
[14]      Y.Takagi ,T.Ihara and H.Obnishi,"Mobile IP Route Optimization Method for Next Generation Mobile Networks", Electonics-
          and-Communications in Japan,Part 1,Vol.86,No.2 ,PP.31-41, February 2003.
[15]      M.Caesar and J.Rexford , ,"BGP Routing Policies in ISP Networks " IEEE Network, University of California and Princeton
          University ,PP.5-11,November/December 2005.




                                                    www.iosrjournals.org                                                   35 | Page

Mais conteúdo relacionado

Mais procurados

An Empirical study on Peer-to-Peer sharing of resources in Mobile Cloud Envi...
An Empirical study on Peer-to-Peer sharing of resources in  Mobile Cloud Envi...An Empirical study on Peer-to-Peer sharing of resources in  Mobile Cloud Envi...
An Empirical study on Peer-to-Peer sharing of resources in Mobile Cloud Envi...IJECEIAES
 
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Istabraq M. Al-Joboury
 
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network ArchitectureImprovements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
 
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITIntroduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITGovt. P.G. College Dharamshala
 
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of  Wireless  Devices using the CloudA New Improved Storage Model of  Wireless  Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the CloudIJCNC
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureMobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureReza Rahimi
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESijcsit
 
Self-Tuning Data Centers
Self-Tuning Data CentersSelf-Tuning Data Centers
Self-Tuning Data CentersReza Rahimi
 
Capillary Networks – Bridging the Cellular and IoT Worlds
Capillary Networks –  Bridging the Cellular and IoT WorldsCapillary Networks –  Bridging the Cellular and IoT Worlds
Capillary Networks – Bridging the Cellular and IoT WorldsEricsson
 
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+PlatformFYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+PlatformTianwei_liu
 

Mais procurados (18)

An Empirical study on Peer-to-Peer sharing of resources in Mobile Cloud Envi...
An Empirical study on Peer-to-Peer sharing of resources in  Mobile Cloud Envi...An Empirical study on Peer-to-Peer sharing of resources in  Mobile Cloud Envi...
An Empirical study on Peer-to-Peer sharing of resources in Mobile Cloud Envi...
 
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
 
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network ArchitectureImprovements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
 
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITIntroduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of  Wireless  Devices using the CloudA New Improved Storage Model of  Wireless  Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the Cloud
 
Introduction of cloud By Pawan Thakur
Introduction of cloud By Pawan ThakurIntroduction of cloud By Pawan Thakur
Introduction of cloud By Pawan Thakur
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Software Defined Grid
Software Defined GridSoftware Defined Grid
Software Defined Grid
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureMobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
 
Self-Tuning Data Centers
Self-Tuning Data CentersSelf-Tuning Data Centers
Self-Tuning Data Centers
 
Capillary Networks – Bridging the Cellular and IoT Worlds
Capillary Networks –  Bridging the Cellular and IoT WorldsCapillary Networks –  Bridging the Cellular and IoT Worlds
Capillary Networks – Bridging the Cellular and IoT Worlds
 
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+PlatformFYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
 

Destaque (8)

B0110508
B0110508B0110508
B0110508
 
G0333946
G0333946G0333946
G0333946
 
C0351725
C0351725C0351725
C0351725
 
B0340710
B0340710B0340710
B0340710
 
C0121116
C0121116C0121116
C0121116
 
A0350107
A0350107A0350107
A0350107
 
F0112937
F0112937F0112937
F0112937
 
B0311219
B0311219B0311219
B0311219
 

Semelhante a D0362035

Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...IOSR Journals
 
Mobile Networking through Mobile IP
Mobile Networking through Mobile IPMobile Networking through Mobile IP
Mobile Networking through Mobile IPAshish Chandurkar
 
Seminar technical
Seminar technicalSeminar technical
Seminar technicalt4cashish
 
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IPA Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IPMartha Brown
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ipIJCNCJournal
 
Speed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessSpeed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessiaemedu
 
Speed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lanSpeed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless laniaemedu
 
ipgoals,assumption requirements
ipgoals,assumption requirementsipgoals,assumption requirements
ipgoals,assumption requirementsrajisri2
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overviewpriya Nithya
 
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2cscpconf
 
Fast Mobile IPv6 Handover Using Link and Location Information
Fast Mobile IPv6 Handover Using Link and Location InformationFast Mobile IPv6 Handover Using Link and Location Information
Fast Mobile IPv6 Handover Using Link and Location InformationCSCJournals
 

Semelhante a D0362035 (20)

Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
 
Mobile Networking through Mobile IP
Mobile Networking through Mobile IPMobile Networking through Mobile IP
Mobile Networking through Mobile IP
 
Seminar technical
Seminar technicalSeminar technical
Seminar technical
 
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IPA Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
A Proposed Technique For Solving The Triangle Routing Problem In Mobile IP
 
A review study of handover performance in mobile ip
A review study of handover performance in mobile ipA review study of handover performance in mobile ip
A review study of handover performance in mobile ip
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
Speed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessSpeed adaptive mobile ip over wireless
Speed adaptive mobile ip over wireless
 
Speed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lanSpeed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lan
 
ipgoals,assumption requirements
ipgoals,assumption requirementsipgoals,assumption requirements
ipgoals,assumption requirements
 
Mobility in network
Mobility in networkMobility in network
Mobility in network
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Unit 3
Unit 3Unit 3
Unit 3
 
ACN.pptx
ACN.pptxACN.pptx
ACN.pptx
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
NEMO
NEMONEMO
NEMO
 
Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
 
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
 
Fast Mobile IPv6 Handover Using Link and Location Information
Fast Mobile IPv6 Handover Using Link and Location InformationFast Mobile IPv6 Handover Using Link and Location Information
Fast Mobile IPv6 Handover Using Link and Location Information
 
50120140505003
5012014050500350120140505003
50120140505003
 

Mais de iosrjournals (20)

I0114549
I0114549I0114549
I0114549
 
H0124246
H0124246H0124246
H0124246
 
H0114044
H0114044H0114044
H0114044
 
G0145458
G0145458G0145458
G0145458
 
G0135059
G0135059G0135059
G0135059
 
G0123541
G0123541G0123541
G0123541
 
G0113839
G0113839G0113839
G0113839
 
F0144153
F0144153F0144153
F0144153
 
F0134249
F0134249F0134249
F0134249
 
F0122934
F0122934F0122934
F0122934
 
E0143640
E0143640E0143640
E0143640
 
E0133641
E0133641E0133641
E0133641
 
E0112128
E0112128E0112128
E0112128
 
D0142635
D0142635D0142635
D0142635
 
D0133235
D0133235D0133235
D0133235
 
D0121720
D0121720D0121720
D0121720
 
D0111420
D0111420D0111420
D0111420
 
C0141625
C0141625C0141625
C0141625
 
C0132131
C0132131C0132131
C0132131
 
B0140815
B0140815B0140815
B0140815
 

Último

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

D0362035

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 6 (Sep-Oct. 2012), PP 20-35 www.iosrjournals.org Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in Mobile IPv4 sherif kamel Abstract: Mobile IP has seen slow deployment for two major reasons; the need for enhancing edge routers with Home Agent/Foreign Agent functionality and the fact that triangle routing in such systems is not efficient. Triangle Routing is defined as the route that must be taken through the Home Agent for any traffic sent by the Correspondent Node to the Mobile Node. This route is triangle in nature and longer than the normal path between the Corresponded Node and the Mobile Node. Many protocols and research efforts have been developed to solve this problem. Internet service Provider (ISP MBG) is one of the proposed techniques used for solving the triangle routing problem in conventional Mobile IPv4. This paper will provide a further study on the performance evaluation of Route Optimization in Mobile IPv4 based on ISP MBG scheme. The proposed technique has been implemented and tested on the Microsoft.net platform. Simulation results prove that the new framework has solved the Triangle Routing Problem in Mobile IP by providing a shorter route with a minimum transmission time for all the datagrams transferred between the Correspondent Nodes and the Mobile Nodes. Keywords: Mobile IP, Triangle Routing Problem, Route Optimization, Internet Service Provider, Point of Presence, Mobile IP Border Gateway, PoPs Virtual Network. I. Introduction Today, the number of wireless and mobile devices connected to the Internet is strongly growing. Wireless links and networks, mobile users and mobility related services form an increasing part of the internet infrastructure. These wireless and mobile parts are normally connected to larger, wired networks. Mastering the key concepts in mobile, wireless and wired technology areas are therefore of increasing importance in the society of today. Mobile IP is an internet protocol, defined by the Internet Engineering Task Force (IETF) that allows users keep the same IP address, and stay connected to the internet while roaming between networks. The key feature of Mobile IP design is that all required functionalities for processing and managing mobility information are embedded in well defined entities, the Home Agent (HA), Foreign Agent (FA), and Mobile Nodes (MNs) [1, 2]. When a MN moves from its Home Network (HN) to a Foreign Network (FN), the corret delivery of packets to its current point of attachment depends on the MN's IP address, which changes at every new point of attachment. Therefore, to ensure packets delivery to the MN, Mobile IP (MIP) allows the MN to use two IP addresses: The Home address and Care-of-Address (CoA). The home address is static and assigned to the MN at the HN; CoA on the other hand is dynamic and represents the current location of the MN [2]. Original MIP has many problems such as home agent faults tolerance [3], HA overloading, and triangle routing problem. Triangle routing problem is considered as one of the main problems facing the implementation of MIP. When a Corresponding Node (CN) sends traffic to the MN, the traffic gets first to the HA, which encapsulates this traffic and tunnels it to the FA. The FA de-tunnels the traffic and delivers it to the MN. The route taken by this traffic is triangular in nature, and the most extreme case of routing can be observed when the CN and the MN are in the same subnet. Many protocols have been invented to solve the triangle routing problem, such as forward tunneling and binding cache [], bidirectional route optimization [], the smooth handoff technique [5], a virtual home agent [6], and a port address translation based route optimization scheme [7]. Also, Kumar et al. [8] presented a route optimization technique in which the tunneling is done at one level above the HA in a hierarchical network instead of tunneling at the HA. This paper provides an extended study on the performance of (ISP MBG) based route optimization in Mobile IPv4 [9]. This study is based on changing the system parameters including number of nodes, number of zones and number of pops serving each zone and check the performance of this scheme compared with conventional Mobile IP scheme. The paper is divided into 6 sections. Section 2 presents some basic concepts about Mobile IP while Section 3 introduces the concept of the Triangle Routing Problem in Mobile IP. Section 4 presents the ISP MBG technique used to optimize the Triangle Routing Problem in the Conventional Mobile IP technique. Section 5 introduces the analysis and evaluation of the proposed ISP MBG technique compared with the conventional Mobile IP technique. Finally section 6 presents the concluding remarks and the future work. www.iosrjournals.org 20 | Page
  • 2. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in II. Mobile IP Mobile IP is a modification to IP that allows nodes to continue to receive datagrams no matter where they happen to be attached to the Internet. It involves some additional control messages that allow the IP nodes involved to manage their IP routing tables reliably. Scalability has been a dominant design factor during the development of Mobile IP, because in the future a high percentage of the nodes attached to the Internet will be capable of mobility [10, 12]. 2. 1 Mobile IP Terminologies Concerning the Mobile IP a set of terminologies are considered and defined as follows: Mobile Node (MN) a host or router that changes its point of attachment from one network or subnetwork to another Home address (Ha) an IP address that is assigned for an extended period of time to a Mobile Node in the Home Network. Home Agent (HA) a router on a Mobile Node’s Home Network which tunnels datagrams for delivery to the Mobile Node when it is away from home, and maintains current location information for the Mobile Node. Home Network (HN) a network, possibly virtual, having a network prefix matching that of a Mobile Node’s Home Address. Foreign Agent (FA) a router on a Mobile Node’s Visited Network which provides routing services to the Mobile Node while registered. The Foreign Agent de- tunnels and delivers datagrams to the Mobile Node. Foreign Network any network other than the Mobile Node’s Home Network. (FN) Care-of-Address (CoA) the termination point of a tunnel toward a Mobile Node, for datagrams forwarded to the Mobile Node while it is away from home. Correspondent a peer with which a Mobile Node is communicating, it may be Node (CN) either mobile or stationary. Link a facility or medium over which nodes can communicate at the link layer. A link underlies the network layer. Node a host or a router Tunnel the path followed by a datagram while it is encapsulated Virtual Network a network with no physical instantiation beyond its router (with a physical network interface on another network). Visited Network a network other than a Mobile Node’s Home Network to which the Mobile Node is currently connected. Visitor List the list of Mobile Nodes visiting a Foreign Agent. Mobile Binding the association of Home Network with a Care-of-Address, along with the remaining lifetime of that association 2. 2 Operation of Mobile IP Mobile IP is doing the following three relatively separate functions: Agent Discovery, Registration and Tunneling [10, 11]. 2. 2. 1 Agent discovery The discovery process in Mobile IP is very similar to the router advertisement process defined in Internet Control Message Protocol (ICMP). For the purpose of discovery, a router or another network node that can act as an agent periodically issues a router advertisement ICMP message with an advertisement extension [10, 11]. 2. 2. 2 Registration Once a Mobile Node has recognized that it has transferred on a Foreign Network and has acquired a Care-of-Address, it needs to alert a Home Agent on its Home Network and requests that the Home Agent forwards its IP traffics. The registration process involves four steps: Registration Request to Foreign Agent, Foreign Agent Relays the Request to Home Agent, Registration Reply from the Home Agent to the Foreign Agent and finally the Foreign Agent Relays the Reply to the Mobile Node [10, 11]. 2. 2. 3 Tunneling www.iosrjournals.org 21 | Page
  • 3. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in Once a Mobile Node is registered with a Home Agent, the Home Agent must be able, to intercept IP datagrams sent to the Mobile Node’s Home Network so that these datagrams can be forwarded via tunneling. In the most general tunneling case as shown in Figure 1; the source, the encapsulator, the decapsulator and the destination are separate nodes. The encapsulator node is considered the entry point of the tunnel, while the decapsulator node is considered the exit point of tunnel. Multiple source-destination pairs can use the same tunnel between the encapsulator and decapsulator [10, 11]. Tunneling Encapsulation Decapsulation Source Destination Figure 1. General Tunneling Three options for encapsulation (tunneling) are available for use by the Home Agent on behalf of the Mobile Node mainly: IP-ln-IP Encapsulation, Minimal Encapsulation, and General Routing Encapsulation (GRE). 2. 3 Mobile IP Operation Sequence With the three relatively separated functions; Agent Discovery, Registration and Tunneling; a rough outlines of the operation of Mobile IP Protocol is described as shown in Figure 2 [12]. Mobile agents (Foreign Agents and Home Agents) advertise their presence via agent-advertisement messages. A Mobile Node receives an agent advertisement and determines whether it is on its Home Network or a Foreign Network. When the Mobile Node detects that it is located on its Home Network, it operates without mobility services. When a Mobile Node detects that it has moved to a Foreign Network, it obtains a CoA on the Foreign Network. The CoA can be either a Foreign Agent CoA or a Co-located CoA, then the Mobile Node registers its new CoA with its Home Agent through the exchange of a registration request and registration reply message, possibly by way of a Foreign Agent. Datagrams sent to the Mobile Node’s Home Network are intercepted by its Home Agent, tunneled by the Home Agent to the Mobile Node’s CoA, received at the tunnel endpoint (either at a Foreign Agent or at the Mobile Node itself), and finally delivered to the Mobile Node. In the reverse direction, datagrams sent by the Mobile Node may be delivered to their destination using standard IP routing mechanisms, without necessarily passing through the Home Agent. III. Triangle Routing Problem One of the basic problems facing the implementation of Mobile IP is the Triangle Routing Problem, since all the traffics between CN and MN should have to pass through a longer path than the normal one. This section introduces the definition and the drawbacks of the Triangle Routing Problem as shown in the following subsections. 3. 1 Triangle Routing Definition Triangle Routing Problem is considered as one of the problems facing the implementation of Mobile IP. When a CN sends traffics to a MN, the following sequence must be done: 1. Packets first get the HA. 2. Home Agent encapsulates these packets and tunnels them to the FA. 3. The Foreign Agent de-tunnels the packets and delivers them to the Mobile Node. www.iosrjournals.org 22 | Page
  • 4. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in As shown in Figure 3, the route taken by these packets is triangle in nature, and the most extreme case of routing can be observed when the Correspondent Node and Mobile Node are in the same subnet [13]. Datagram MN-CN CN MN Datagram CN- MN 3 Detunneld 1 FA 2 HA Tunneled datagram Figure 3. Illustration of the Triangle Routing Problem in Mobile IPv4 3. 2 Triangle Routing Drawbacks Conventional Mobile IP technique allows transparent interoperation between Mobile Nodes and their Correspondent Nodes, but forces all datagrams for a Mobile Node to be routed through its Home Agent. Thus, datagrams to the Mobile Node are often routed along paths that are significantly longer than optimal. This indirect routing can significantly delay the delivery of the datagrams to Mobile Nodes, and it places an unnecessary burden on the networks and routers along its path through the internet. The Triangle Routing drawbacks can be mentioned as follows: 1. Increases the delays per packet in datagrams transferred to the Mobile Node. 2. Wastes the network resources. 3. Home Agent bottle neck. 4. Delimits the scalability of Mobile IP protocol. IV. ISP MBG Route Optimization Technique Before discussing the ISP MBG scheme it is important to mention the types of communications in Mobile Networks. In this issue, communication types involve the following [14]: 1. Communication between Mobile Node (MN) and Correspondent Node (CN) within the same Network; in this case the Home Agent receives a packet destined to the Mobile Node from a Correspondent Node and both of MN and CN are in the same network as shown in Figure 4. HA Mobile IP Core network HA : Home Agent FA FA FA: Foreign Agent Mobile Mobile Terminal Terminal Figure 4. Connection between Two Mobile Terminals in the Same Network 2. Communication between Mobile Node (MN) and Corresponded Node (CN) in two different Networks; when both of the Mobile Node and Correspondent Node are located in different networks as shown in Figure 5. It is supposed for the binding information to be transferred between the two networks and that will lead to a security related problem. To solve this problem, Mobile IP Border Gateways (MBGs); which are devices within the mobile networks; will maintain the binding information that must be added to the Correspondent Node without adding functions to terminals in the external networks [14, 15]. www.iosrjournals.org 23 | Page
  • 5. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in Correspondent Node HA: Home Agent Other IP network FA: Foreign Agent Gateway HA Mobile IP network FA FA Mobile Terminal Figure 5. Connection between Mobile Terminal and Correspondent Node in two Different IP Networks 4.1 Objectives of ISP MBG Technique The main objective of the proposed technique is to solve the Triangle Routing Problem in the Conventional Mobile IP technique. The proposed technique aims are: 1. Minimizing the average message delay. 2. Maximizing the network throughput (minimize the network blocking rate). 3. Using the network resources efficiently and eliminating the Home Agent (HA) processing bottleneck due to the fact that all communication from Correspondent Node (CN) to Mobile Node (MN) are necessarily routed through the Home Agent (HA). 4. Increasing the level of security between different networks by using the Mobile IP Border Gateway (MBG). This is important for maintaining the information that being used by the Correspondent Node (CN) such as incoming packets from the external network are tunneled or routed and delivered directly to the Mobile Node (MN) instead of routing through the Home Agent (HA). 4.1.1 Architectural design of ISP MBG Technique [9] Figure 6 presents the overall design of the proposed ISP MBG technique for the Route Optimization Problem. Figure 6. Global Views for the Proposed ISP MBG Technique with an Example of PVN The design introduces the following: 1. Having a number of N Internet Service Providers ISP1, ISP2... ISPN each covers a definite and different geographical place. They are separated by an L Mobile IP Border Gateways (MBGs) [14]. MBGs will maintain either the binding (Home address, Care-of-Address) or only the home information (Home address) for all the transferred nodes (Mobile Nodes) from one Internet Service Provider to another. That depends on whether we are using tunneling or routing technique to forward the traffics generated in one Internet www.iosrjournals.org 24 | Page
  • 6. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in Service Provider and destined to Mobile Node located in another Internet Service Provider. Also, using multiple MBGs will distribute uniformly the processing load among them. 2. Each Internet Service Provider is divided into a number of approximately S equal areas. Each area is served by an Agent that is considered as Home Agent for the nodes within that area and as Foreign Agent for all the nodes transferred from the other areas. 3. Each area is divided into multiple equal M zones where each zone is served by a fixed K equal number of Points-of-Presence (PoPs). Figure 7 shows an example of the areas and PoPs classifications of each area for an Internet Service Provider. 4. For each Internet Service Provider assuming that we have K PoPs virtual networks (PVNs) that can be placed in a fashion that is similar to (Ping-Pong) overlay network creation. This virtual network handles state information about all Mobile Nodes and Correspondent Nodes. For example, when a Mobile Node registers with one Points-of-Presence (PoPs), in one of the defined zones, the registration information will be available to all other zones through the PVN connecting that PoP with the other equivalent PoPs in the other zones. Figure 8 shows an example of PoPs Virtual Networks (PVNs) for ISP. PoPi(Area1,Zone1), PoPi (Area1,Zone2),…, PoPi (Area1, ZoneM), PVNi PoPi (Area2,Zone1), PoPi (Area2,Zone2), …., PoPi (Area2,ZoneM),….., i1..k PoPi (Areas ,Zone1), PoPi (AreaS,Zone2)……. PoPi (AreaS,ZoneM). Figure 8. PVNs for ISP 5. Each PoP serving a definite X number of nodes with a range W of addresses. The nodes that are within the same agent serving the PoP are called Local Nodes and those are in different agents, and transferred to the agent serving that PoP; are called External Nodes. The range of W addresses for each PoP is divided as follows: 1. A addresses for local nodes that are in service (Home address) 2. B addresses for local nodes that are in waiting (Home address) 3. C addresses for external nodes that are in service (Care-of- Address) 4. D addresses for external nodes that are in waiting (Care-of-Address) 4.1.2 Sequences of ISP MBG Technique When a node is generated, it will be supported by the PoP serving its position, all of the home information concerning that node will be saved at that PoP. When a Mobile Node (MN) moves to another area or agent, the new agent will provide the node with the Care-of-Address. The home information for the node in the new position could be accessed through the PoP Virtual Networks (PVNs) that connects the node's home PoP to its new position serving the PoP. Figure 9 shows the operation sequence of the proposed technique. The operation sequence for the proposed algorithm depends on whether both of the Correspondent Node and the Mobile Node are located in the same Internet Service Provider or both belong to different Internet Service Providers. So, when Correspondent Node needs to establish connection with the Mobile Node we have the following cases: 1. Both CN and MN belong to the same Internet Service Provider. www.iosrjournals.org 25 | Page
  • 7. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in a. CN connects to its home PoP (Pk-1)asking about the information for the Mobile Node. b. The correspondent PoP searches its neighboring PoPs (P1, P2,….Pk-2, Pk) in the same Zone, one of them is guaranteed to be connected to the virtual network of the Mobile Node. c. The PoP which is connected to the Mobile Node's Virtual Network (i.e. P 1) connects directly to the Mobile Node and the connection is established. 2. Both CN and MN belong to different Service Providers a. The Mobile IP Border Gateway will keep the home information (Home address) for all the Mobile Nodes that are transferred form one ISP to another. b. The Correspondent Node connects to its home PoP (Pk-1) asking about the information for the Mobile Node. c. The Correspondent PoP will ask its neighboring PoPs (P1, P2,….Pk-2, Pk) about the Mobile Node's home information. One of the PoPs (P1) is guaranteed to be connected to the virtual network of Mobile Node. d. The PoP which is connected to the MN's Virtual Network (i.e. P1) connects to MBG which has the original home information for the destined MN. MBG connects to the nearest PoP in the destination ISP which is connected to the new virtual network of Mobile Node e. The connection is established between Correspondent Node and Mobile Node. V. Evaluation of ISP MBG Technique Simulation modeling is based on system programming such as data structures, flowcharts, programming languages and other tools that can be used to build up and characterizing system performance. For simplicity, it is preferable to depend on the simulation model. 5.1 System Parameters The key point for establishing any system is to define its main parameters. This section introduces the simulation parameters, data structure and connection parameters for the designated system respectively in the following three subsections: In [9] the simulation has been done for 2 similar ISPs each have 2 similar areas with 2 zones per each area and 4 pops serving each zone and for a total of 640 nodes. As an extended study for this technique, the new simulation is based on increasing the number of nodes for the total [600-2000] nodes and also number of zones and number of pops will be changed to 4 zones per area and 6 pops serving each zone. This study is to show how much the scheme is efficient even when the simulation parameters are changed to check the sustainability of ISP MBG technique as a route optimization technique for Mobile IP. 5.1.1 Simulation Parameters A network with two internet service providers is considered, each with two similar areas. In our simulation there will be 2 structures one based an using 4 zones for each area and 4 pops serving each zone another structure based on using 2 zones for each area and 6 pops serving each zone. Each PoP actually is serving 100 nodes with 150 addresses. The addresses are classified as 100 addresses for the nodes in service and 50 addresses for the nodes in waiting. The addresses for the nodes in service are classified as 75 addresses for the local generating nodes and 25 addresses for the externally generating nodes. By the same way for the addresses concerning the nodes in waiting. They are classified as 25 addresses for the local generating nodes and 25 addresses for the externally generating nodes. The addresses for the nodes are considered as integer numbers given to each node consecutively and depend on the location of the node, area, zone, PoP, and ISP it belongs to. Figure 10 shows an example of the nodes and address classification for PoP i. In the first structure the total number of zones all over the architecture design is 16 zones, each zone with 4 pops and the total number of pops is 64. In the second structure, the total number of zones all over the www.iosrjournals.org 26 | Page
  • 8. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in architecture design is 8 zones. Each zone with 6 pops and the total number of pops is 48. The total number of pops can be calculated by the following equation: PN = PK x NZ where; PN is the total number of PoPs PK is the number of PoPs within the Zone NZ is the total number of Zones Each PoP is serving 100 nodes, the simulation is done for a total number of nodes equals to 600-2000 nodes. NT = PN x NC where; NT is the total number of generating nodes NC is the number of generating nodes in each connection. PoP i N150 N1 N126 N75 N76 N100 N125 N101 126-----150 1-------75 Externally in Locally in 76-----100 101-----125 waiting services Locally in Externally in waiting services Figure 10: Nodes and Address Classifications for PoPi 5.1.2 Data structures The main data structures implemented in the simulation are: nodes, PoPs, ISPs, Areas, Agents, and Mobile IP Border Gateway (MBG). The class definitions and the structure definitions for all the data structures are implemented using C Sharp on the Microsoft.net platform. 5.1.3 Connection parameters For the wireless communication design and implementation of the ISP MBG technique, the connection parameters for the implemented algorithm are the key point for running the program. The connection parameters can be classified as follows: 1. The distance in kilometers equivalent to the distance of 1 pixel. 2. Link speed for PoP connection 3. Link speed for Agents connection 4. PoP nodes count to serve. 5. PoP nodes count to wait 6. Agent nodes count to serve 7. Agent nodes count to wait 5.2 System Construction Figure 11 shows the design architecture of the proposed ISP MBG techniques for 2 similar ISPs. Each PoP can be identified using the following three parameters respectively; ISP number, Agent number and Zone number: Pi = PoPj,k,l i = j,k,l where; Pi: the ith PoP j : Internet Service Provider number k : Agent number l : Zone number Also, we have similar PoPs Virtual Networks (PVNs) for the two Internet Service Providers. Each PVN connects all similar POPs in all Zones, Areas, Agents, ISPs. Also in figure 11 we can change the number of agents, areas, zones and also the number of PoPs serving each zone based on the require parameters for comparison between the conventional Mobile IP and MBG ISP techniques. www.iosrjournals.org 27 | Page
  • 9. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in 5.3 Performance Parameters To evaluate the performance of the ISP MBG technique, the following five measuring criteria are measured: Link Distance, Transmission Time, Blocking, Buffering and Security. 5.3.1 Link distance The link distance is calculated in kilometers equivalent to the pixels distance between the two connecting nodes through the PoP links or the Agent links (1 pixel = 0.2km). The link distance can be calculated and formulated using the following equation: Dt (Pi, Pz) = Total Link Distance Comparison ( 6 POPs Per Zone) 230000 Total Distnace (km) 225000 ISP MBG Total Link Distance 220000 215000 Conventional Mobile IP Total Link Distance 210000 Where; P: Transmission point (PoP or MBG) 205000 00 00 00 00 00 00 00 00 00 00 00 0 0 0 0 60 70 80 90 10 11 12 13 14 15 16 17 18 19 20 #of Connections D: Euclidian distance Dt: Total link distance between two transmission points 5. 3. 2 Transmission time Measuring the transmission time depends on the location of both Mobile Node (MN) and Correspondent Node (CN) and whether both are located in the same area, same Internet Service Provider or either in different areas or different Internet Service Providers. The transmission time is calculated and formulated using the following general form of equation: T (Pi, Pz) = 800 Average Link Distance Per Connection ( 6 POPs Per Zone) Distanc (km) 600 ISP MBG Link Distance Per Conection 400 Conventional Mobile IP link Distance Per Connection 200 0 Where; P: Transmission point (PoP or MBG) 00 00 00 00 00 00 00 00 00 00 00 0 0 0 0 60 70 80 90 10 11 12 13 14 15 16 17 18 19 20 #of Connections T (Pi, Pz):Total transmission time between two transmission points P i and Pz L: Link speed D: Euclidian distance 5.3.3 Blocking Blocking is an important parameter to measure the overall performance of the network and its throughput. The blocking is measured as the number of blocked connections. Each connection has a pair of connecting nodes, (i.e. N connections = 2N Nodes). 5. 3. 4 Buffering Buffering is considered as one of the network resources that must be optimally used. In the conventional Mobile IP technique, we have storage buffers for the agents whether they are Home Agents or Foreign Agents. In the proposed ISP MBG technique, each PoP has its own storage buffers which hold a limited number of nodes. The nodes are classified as nodes in service and nodes in waiting, with a range of addresses for the nodes that are either locally generated within the Agent (Home addresses) or imported from the other Agents. Using Point of Presence Virtual Network (PVN) will provide an efficient tool for accessing the Node's information between PoPs.[The measuring evaluation of this parameter is out of our scope]. 5. 3. 5 Security It is one of the rigid requirements for the performance evaluation between the conventional Mobile IP technique and the proposed one. It is measured as how much the technique itself provides a self-securing www.iosrjournals.org 28 | Page
  • 10. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in technique to protect the data transferred among the nodes located in different networks.[The evaluation of this parameter is out of our scope]. 5.4 Simulation Results The purpose of the simulation is to extend the study of the performance evaluation for ISP MBG technique compared with the conventional Mobile IP technique. The simulation results for the 2 similar ISPs, with 2 areas, 2 Zones per area and 4 PoPs per zone for the total number of 600 nodes has been discussed first [9]. For further study of the ISP MBG technique with different ISPs structures, the running for the implemented algorithm is done and calculated based on generating randomly a total number of nodes N= 2000 nodes in 15 steps, each step includes 100 more nodes (i.e 50 connections). In each step, the whole algorithm is executed, and the connection is also randomly done between each pair of nodes. To obtain real results, the algorithm is executed many times and the comparison is done based on the average values of the results. 5.4.1 Simulation Result for 2 Similar ISPs [2 Areas, 2 Zones/Area, 4 PoPs/Zone] [9] 5.4.1.1 Simulation Results for Link Distance (total 600 nods, 20 nods per connection) Figures 12.a and 12.b show the total link distance and the average link distance per connection for both the proposed ISP MBG and the conventional Mobile IP technique respectively. It is clear that the proposed ISP MBG technique outperforms the conventional Mobile IP technique. The route taken by the conventional Mobile IP technique has to pass through the Home Agent which tunnels the data to the Foreign Agent. The route in the proposed ISP MBG technique is taken through the home PoP of CN and the PoP virtual network of MN which leads directly to the MN in case of one ISP. In case of using two Internet service Providers the route has to pass through MBG to the MN's PoP virtual network in the second ISP which leads directly to the MN. ISP MBG Conventional Mobile IP 1200 1000 Distanc (km) 800 600 400 200 0 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 #of Connections (unit 10) (a) Total Link Distance for the Conventional and ISP Techniqe ISP MBG Conventional Mobile IP 350000 300000 Total Distnace (km) 250000 200000 150000 100000 50000 0 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 #of Connections ( Unit 10) (b) Average Link Distances for the Conventional and ISP Techniqe Figure 12. Link Distance Comparison 5.4.1.2 Simulation results for transmission time Figure 13.a and 13.b show the total transmission time and the average transmission time (in seconds) per connection against the number of connections for both the conventional Mobile IP technique and the ISP MBG technique respectively. The figures show a great reduction in the transmission time using the proposed ISP MBG technique, compared with the conventional one. That result is expected because of using PoPs and PVNs: www.iosrjournals.org 29 | Page
  • 11. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in the home information for any node will be available anywhere among the networks and not only restricted on the Home Agents that could be far away from the connecting nodes. ISP MBG Conventional Mobile IP 6000 Total Transmission Time (sec) 5000 4000 3000 2000 1000 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 #of Connections ( Unit 10) (a) Total Transmission Time for the Conventional and ISP Techniques ISP MBG Conventional Mobile IP 20 18 Transmission Time (sec) 16 14 12 10 8 6 4 2 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 #of Connections (unit 10) (b) Average Transmission Time for the Conventional and ISP Techniques Figure 13. Transmission Time Comparison 5.4.1.3 Simulation Results for Blocking Figure 14 details the average number of blocking in both the conventional Mobile IP technique and the proposed one. Each blocked connection is considered as single pair of connecting nodes. The figure shows that as long as the number of connections  28 (i.e. number of nodes  560, "560= number of connections {28} x number of generating nodes in each connection {20}"). If the number of connection is increased (number of connections ≥ 28) meaning that the number of nodes is also increased (number of nodes ≥ 560) the blocking rate will be increased for both the conventional Mobile IP technique and the proposed one. The number of blocked connections using the newly proposed ISP MBG technique is less than that of the conventional Mobile IP technique. In the conventional Mobile IP technique, the HA is overwhelmed with an excessive amount of nodes' control messages compared with the proposed technique in which the control messages are divided among the PoPs. Each PoP covers a number of nodes and the virtual network between PoPs helps in getting the information easily. As the number of blocked connections decreased that leads to increase the number of paired successful connections which means the throughput will be increased. www.iosrjournals.org 30 | Page
  • 12. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in ISP MBG Conventional Mobile IP 14 12 Blocked Connections 10 8 6 4 2 0 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 #of Connections Figure 14 Blocking Comparison 5.4.2. Simulation Results for 2 Similar ISPs [2 Areas, 4 Zones/Area, 4 PoPs/Zone, Number of Nodes 600- 2000 Nodes.] 5.4.2.1 Simulation Results for Link Distance Total Link Distance Comparison (4 Zones Per Area) 230000 Total Distnace (km) 225000 220000 ISP MBG Total Link Distance 215000 210000 205000 #of Connections (a) Total Link Distance for the Conventional and ISP Technique Average Link Distance Per Connection (4 Zones Per Area) 800 Distanc (km) 600 ISP MBG Link Distance Per 400 Conection 200 0 #of Connections (b) Average Link Distance for the Conventional and ISP Techniqe Figure 15. Link Distance Comparison Figure 15.a and 15.b show that when the number of zones per area increases, the link distance for the new technique increase due to redundancies in the virtual networks, but still it is better than the conventional one (although close on performance) www.iosrjournals.org 31 | Page
  • 13. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in 5.4.2.2. Simulation Result for Transmission Time Total Transmission Time Comparison (4 Zones Per Area) Total Transmission 5000 4000 Time (sec) ISP MBG Total 3000 Transmission Time 2000 1000 0 #of Connections (a) Total Transmission Time for the Conventional and ISP Techniques Average Transmission Time Per Connection (4 Zones Per Area) Transmission Time (sec) 12 10 8 ISP MBG 6 Transmission Timr Per 4 Connection 2 0 Conventional Mobile IP Transmission Time Per Connection #of Connections (b) Average Transmission Time for the Conventional and ISP Techniques Figure 16. Transmission Time Comparison Figure 16.a and 16.b show that the transmission time required for both techniques are close to each other due to redundancies in the virtual networks. 5.4.2.3 Simulation Result for Throughput Throughput Comaprison (4 Zones Per Area) 20 Blocked Connections 15 ISP MBG Blocking 10 Conventional Mobile IP Blocking 5 0 50 00 50 00 50 00 50 0 0 0 60 75 90 10 12 13 15 16 18 19 #of Connections Figure 17. Throughput Comparison Figure 17 show that he new technique still outperforms the conventional one in the storage and throughput, increasing number of zones increases the storage capabilities, so , less calls are blocked. 5.4.3 Simulation Results for 2 Similar ISPs [2 Areas, 2 Zones/Area, 6 PoPs/Zone, Number of Nodes 600- 2000 Nodes.] www.iosrjournals.org 32 | Page
  • 14. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in 5.4.3.1. Simulation Results for the link distance Total Link Distance Comparison ( 6 POPs Per Zone) Total Distnace (km) 230000 225000 220000 ISP MBG Total Link Distance 215000 210000 205000 #of Connections (a) Total Link Distance for the Conventional and ISP Technique Average Link Distance Per Connection ( 6 POPs Per Zone) 800 Distanc (km) 600 ISP MBG Link Distance 400 Per Conection 200 0 #of Connections (b) Average Link Distance for the Conventional and ISP Techniqe Figure 18. Link Distance Comparison Figure 18.a and 18.b show that when increasing number of pops per zone the link distance in the new technique is less than that of the old technique, although they are close on the average. 5.4.3.2. Simulation Results for Transmission Time Total Transmission Time Comparison ( 6 POPs Per Zone) Total Transmission 6000 Time (sec) 4000 ISP MBG Total Transmission Time 2000 0 #of Connections (a) Total Transmission Time for the Conventional and ISP Techniques Average Transmission Time Per Connection ( 6 POPs Per Zone) Transmission Time (sec) 20 15 ISP MBG Transmission 10 Timr Per Connection 5 0 Conventional Mobile IP Transmission Time Per Connection #of Connections (b) Average Transmission Time for the Conventional and ISP Techniques Figure 19. Transmission Time Comparison www.iosrjournals.org 33 | Page
  • 15. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in Figure 19.a and 19.b show that due to the increase of the POPs serving the zones, the calling node can reach the mobile node much faster than in the old techniques, and it outperforms the conventional techniques on the average transmission time. 5.4.3.3. Simulation Result for Throughput Throughput Comaprison ( 6 POPs Per Zone) 30 Blocked Connections 25 20 ISP MBG Blocking 15 Conventional Mobile IP 10 Blocking 5 0 50 00 50 00 50 00 50 0 0 0 60 75 90 10 12 13 15 16 18 19 #of Connections Figure 20. Throughput Comparison Figure 20 shows that the throughput of new technique is still better than conventional techniques 5.4.4 Buffering Concerning Buffering; it has been found that the proposed ISP MBG technique provides better buffering than that of the Conventional Mobile IP technique. This is due to the fact that using PVN with the proposed technique facilitates the process of handling and accessing information for the nodes in correspondences between PoPs without any redundancy. Comparatively, the conventional technique requires more buffers due to the redundancy of having a multiple copies of nodes' home information at each PoP of the Internet service Provider. This leads to less use of buffering storages than that of the conventional technique which needs storage buffer for each node to hold all of its information at each PoP. Also, as a cost wise, it has been found that the cost for the Agent's buffers is higher than that of the PoP's buffers 5.4.5 Security The Security design has a great concern in Mobile IP. The proposed ISP MBG technique is considered as the self securing system. Using Mobile IP Border Gateway (MBG) will keep the information (Home address or binding information) for all Mobile Nodes crossing their network to another network. So, any CN in one network does not need to maintain any private external information concerning the new IP network where the MNs visit and all of the MN's information could be accessed directly through the Mobile Border Gateway. Comparatively, the conventional Mobile IP technique needs rigid requirements for the authentication to prevent the malicious users from interrupting the connection between MN and CN that maintains the binding information (Ha, CoA). VI. Conclusion and Future Work In this paper a further study on ISP MBG route optimization technique has been introduced to check the performance evaluation of the technique when the simulation parameters [zones an pops] are changed. The design of technique is based on using a number of Internet Service Providers (ISPs) separated by a Multiple Mobile IP Border Gateways (MBGs) which are used to keep the binding information or the home information for the transferred Mobile Nodes between ISPs. Each ISP is composed of an approximately a number of an equal areas, each is served by an agent and is composed of a multiple equal zones. Each zone is served by a definite number of Points of Presences (PoPs). Each PoP is serving a number of nodes with a range of addresses. Virtual Networks are used to connect the PoPs in such a way the redundancy in keeping the nodes information will be minimized or almost cancelled. The main function of the proposed technique is to get the shortest routing path for the packets transferred between the Correspondent Nodes and Mobile Nodes based on the PoPs information, PVN and the MBG.The simulated network design of our case study is based on using two Internet Service Providers separated by one Mobile IP Border Gateway. Each ISP is divided into two equal areas. The simulation is applied twice once based on using 4 zones per each area and 4 pops serving each zone. Another simulation is based on using 2 zones per area and 6 pops serving each zone.Each PoP is serving 100 nodes with a range of 150 addresses. The simulation results for the Link Distance, Transmission Time, Blocking, Buffering and Security show that the proposed (ISP MBG) technique outperforms the conventional Mobile IP technique by minimizing the Link Distance, Transmission Time, Blocking, Buffering. Also, it gives a higher level of security than that used with conventional Mobile IP technique. www.iosrjournals.org 34 | Page
  • 16. Extended Study on the Performance Evaluation of ISP MBG based Route Optimization Scheme in This work can be considered applicable for the following: better performance related to the criteria of measuring parameters ,no addition of external hardware devices are required, more reliablility and flexibility of the simulation model, and scalability for using more PoPs and nodes . For more further study on the performance evaluation of ISP MBG route optimization technique, further evaluation will be done based on using 2 different ISP structures. Reference [1] C. Perkins." IP Mobility Support for IPv4", IETF RFC 3344 Ed., Oct. 2002. [2] C. Smith and D. Collins, “3G Wireless Networks”, “McGraw-Hill, United States, 2002. [3] Y. Huang, and M. Chuang, "Fault tolerance for home agents in mobile IP", 2006. [4] C. Wu, A. Cheng, S. Lee, J. Ho, and D. Lee, "Bi-directional Route Optimization in Mobile IP Over Wireless LAN”, Institute of Information Science, Academia Sinica, Taiper, Taiwan, Vol. 2, pp 1168-1172. 2002. [5] B. Ayani, "Smooth Handoff in Mobile IP", Master Thesis, University of California in Berkeley. May 2005. [6] G. Qiang and A. Acampora, "A Virtual Home Agent based Route Optimization for Mobile IP", Wireless, 28 Sept. 2000. [7] D. Badami, N. Thanthery, T. Best, R. Bhagvathula, R. Pendse, "Port Address Translation Based Route Optimization for Mobile IP", Vehicular Technology Conference, (5), PP. 3110-3114. 2004. [8] C. Kumar, N. Tyagi, and R. Tripathi, "Performance of Mobile IP with New Route Optimization Technique". IEEE. International Conference, Institute of Engineering and Rural Technol, Allahadad, India, pp. 522-526. 2005. [9] Sherif Kamel Hussein, Iman Saroit Ismail, S. H. Ahmed, "Solving the Triangle Routing Problem in Mobile IP", informatics journal, faculty of computers and information technology, Cairo University published issue, June 2006. [10] C.Kumar, N.Tyagi , Tripathi R., "Performance of Mobile IP with new Route Optimization Technique", IEEE International Conference, Institute of Engineering and Rural Technol, Allahadad, India, PP. 522-526, January 23-25, 2005. [11] D.Badami, N.Thanthry, T.Best, R.Bhagavathula and R.Pendse., "Port Address Translation based Route Optimization For Mobile IP", Vehicular Technology Conference, IEEE 60 th, Department of Electrical and Computer Engineering, Wichita State University, KS, USA, Vol. 5, PP. 3110-3114, September 26-29, 2004. [12] Moheb R. Girgis, Tarken, Mohamoud Youssef S. Takroni and Hassan S. Hassan, "Performance Evaluation of New Route Optimization Technique for Mobile ". IP International Journal of Netowrk Security & Its Applications (IJNSA), Vol., No. 3, October 2009. [13] C. Perkins, “IP Mobility Support for IPV4”, RFC 3344, Work on Progress, August 2002. [14] Y.Takagi ,T.Ihara and H.Obnishi,"Mobile IP Route Optimization Method for Next Generation Mobile Networks", Electonics- and-Communications in Japan,Part 1,Vol.86,No.2 ,PP.31-41, February 2003. [15] M.Caesar and J.Rexford , ,"BGP Routing Policies in ISP Networks " IEEE Network, University of California and Princeton University ,PP.5-11,November/December 2005. www.iosrjournals.org 35 | Page