Handover Management in NGN
Abstract— The demands of network users for better, faster and secure services are ever increasing. The field of mobile networks is most dynamic in the world of networking. The Handoff Management in Next Generation Network has been a topic of interest for many researchers in the modern era. Handoff plays a vital role in NGN by providing connectivity without losing connection from one network to another. Different algorithms and techniques are used to for the Seamless handoff and to optimize handoff delay and data loss. The contemporary literature reveals that Next Generation mobile Networks consists of heterogeneous wireless networks i.e. WLAN, 3G and CDMA etc. After handoff from one network to another MH avail the resources of the visited network. During handoff MH must support the different radio access technologies. In this paper different handoff management areas are explored with the focus of different handoff algorithms, techniques, protocols and some proposed models. This summarized literature work acts as a learning guide for the academic world in the area of networks.
Key words—MH (Mobile Host, FA (Foreign Agent), GA (Gateway Agent), VHO (Vertical Handoff), CAC (Call Admission Control).
I. INTRODUCTION
In order to avoid call termination and data lose during mobility Handover mechanism is used. The process of breaking connection with one base station and gaining connectivity to another base station is called handoff or handover. In American English MS call transfer from one channel to another is known as Handoff and in British English it is known as Handover. If the cell size is small, more handover will occur. Such system requires greater resources to support and coordinate. Whichever ...
... middle of paper ...
...nd Rosli Salleh, “Handoff Techniques for 4G Wireless Mobile Internet”, 29th July 2007.
[6] Blazej Lewcio, Sebastian Moller, Marcel Waltermann, Niklas Kirschnick and Pablo Vidales, “Methods for Multimedia Services Adaptation in Next Generation Networks”
[7] Michael Mackay, Jose Moura and Christopher Edwards, “Flexible host-based Handoff for Next Generation Networks”, 13th April 2008.
[8] Ashutosh Dutta, Sbir Das, David Famolari and Henning Schulzrinner, “Seamless Handover across Heterogeneous Networks- An IEEE 802.21 Centric Approach”, 4th Nov 2008.
[9] Carolin Latze and Ulrich Ulte-nitsche, “Roaming, Accounting and Seamless Handover in EAP-TLS Authenticated Networks”, 25th Sep 2008.
[10] Pyung-Soo Kim and Young Jin Kim, “Hierarchical Mobile IPv6 Based Fast Vertical Handover using IEEE 802.21 Media Independent Handover Function”, 14th jan 2008.
Professor Cantu and Class, The first article is, Patient Safety and Quality: An Evidence-Based Handbook for Nurses. Chapter 34 “Handoffs: Implications for Nurses”, this article is applicable not only to my unit, but to every nurse in the profession. It is imperative that the translation of patient information from one person to the next during shift change, patient transfer, or transfer to another facility is clear, accurate, understandable, and complete, conveying all pertinent information about that patient. The article discusses why we have problems with handoffs, and different methods for handoff styles.
.... A. (2012). LTE, LTE-advanced, and WiMAX: Towards IMT-advanced networks. Chichester, West Sussex, U.K: Wiley.
Sending data through the internet efficiently has always posed many problems. The two major technologies used, Ethernet and Asynchronous Transfer Mode (ATM), have done an admirable job of porting data, voice and video from one point to another. However, they both fall short in differing areas; neither has been able to present the "complete" package to become the single, dominant player in the internet market. They both have dominant areas they cover. Ethernet has dominated the LAN side, while ATM covers the WAN (backbone). This paper will compare the two technologies and determine which has a hand-up in the data trafficking world.
Cell phones use radio frequencies to transmit signals. Radio Frequencies (RF) are a form of electrical waves similar to those used in radios, microwaves, radars or satellite stations. They are emitted from a transmitter, and received using an antenna. This telephony technology is restricted geographically to small zones called “Cells”. Every cell has a base station capable of sending and receiving radio waves. When a call is started a signal leaves the handheld unit headed to the closest base station. This station answers by allocating a specific channel to the unit. When this “channel” is established, modulated radio frequency signals are both received and transmitted. The head of the user is in the near field of use because the distance from the antenna to the head is a few centimeters. (Blettner & Berg 2000) If the antenna is inside the body of the phone, the exposure to Radio Frequencies is greater. The antenna might be requesting a stronger signal to contest with the interference of the battery or the actual shell of the phone’s body.
According to Sommerville (2011), the Provides interface are services provided by the component, where the Requires interface specifies what services are needed by the other components in the system to operate correctly, (p. 457). The hospital wants to improve the tracking of VOIP calls which are made within the hospital system. The emergency control room will have a system for the call-logging component which will record the calls made. The first component would be for tracking the phone calls. The Require interface can be the caller id service which feeds into the component. With the caller id service, the Provides interface will be to see the phone number calling to, the phone number calling from, the time of the call, the length of the call, and a log file to see all the calls place from a phone or all phones. To track the calls the management is going to wait to see the phones numbers of the internal calls are from and to. Management is going to also want to see the time of the call and how long the call lasted. If management believe employees are spending too much time on the phone talking and doing it more often than needed, management can pull a log of those tw...
Analysis of the Environment of the Mobile Network System Executive Summary 3 Glossary of Abbreviations 4 Introduction 5 Recent History
Taylor, P. and Bain, P. (2003) 'Call Centre Organizing in Adversity: From Excel to Vertex' in G. Gall (ed.)
Berean¡¦s existing network infrastructure is wire line, and uses a T1. Remote users access the network through a dial-up modem pool. Berean¡¦s wire line network model severely limits the accessibility and effectiveness of the Berean network. For example, employees in Berean facilities are unable to access the network easily from meetings, the cafeteria, or anywhere other than their offices. In addition, the effectiveness of remote users is limited by the slow speed of present-day dial-up modem connections.
The following is a case study about the Mobile Network Gives Haneda Airport Its Competitive Edge. It has components that describe about the WLAN components and the Role of WLAN at Airports
[10] Gregor Schaffrath, Anja Feldmann, Mario Kind, “Network Virtualization Architecture: Proposal and Initial Prototype” August, 2009.
G in 1G, 2G, 3G and 4G stands for the “Generation” of the mobile network. Today, mobile operators have started offering 4G services a higher number before the ‘G’ means more power to send out and receive more information and therefore the ability to achieve a higher efficiency through the wireless network. During the time of 1G, radio signals were transmitted in ‘Analogue’ form. 2G networks on the other hand, were based on narrow band digital networks. The 3rd generation of mobile networks has become popular and users access the Internet over devices like mobiles and tablets. This means a 3G network actually allows for more data transmission and therefore the network enables voice and video calling, file transmission, internet surfing, online TV, view high definition videos, play games and much more. 4th Generation mobile networks are believed to provide many value added features.
Wireless is everywhere today whether at home working from your WIFI network to work where you might be linked a wireless network or even through your phone through a 3G or 4G network to connecting to an open wireless networks. As you can see for the most part people are connecting to wireless from the moment they leave their home till they get to work and then back. While wireless comm...
Melford, RJ 1993, 'Network security ', The Internal Auditor, vol. 50, no. 1, p. 18.
Making a telephone call no longer should conjure up visions of operators connecting cables by hand or even of electrical signals causing relays to click into place and effect connections during dialing. The telephone system now is just a multilevel computer network with software switches in the network nodes to route calls get through much more quickly and reliably than they did in the past. A disadvantage is the potential for dramatic and widespread failures; for as has happened.