Target access router selection in advanced mobility scenarios
Transcript of Target access router selection in advanced mobility scenarios
Target access router selection in advanced mobility scenarios
D. Di Sorte*, M. Femminella, L. Piacentini, G. Reali
Dipartimento di Ingegneria Elettronica e dell’Informazione (D.I.E.I.), University of Perugia, via G. Duranti 93, 06125 Perugia, Italy
Received 1 April 2004; revised 27 April 2005; accepted 9 May 2005
Available online 2 June 2005
Abstract
To provide nomadic users with QoS-enabled services, advanced mobility management will prove to be of fundamental importance in the
future Internet. Mobile IP is the reference protocol supporting mobility at IP level. However, it has been widely recognised that it could
perform poorly, especially with QoS demanding applications. In order to improve Mobile IP performance, the discovery and selection of the
target access router to hand over to will play a crucial role. In this paper, we present a novel approach for Candidate Access Router Discovery
and Target Access Router selection. The process is fully distributed, multicast-based, and allows timely intra and inter-access router
handover, which can be either intra or inter-technology. The effectiveness of the solution to drive mobile terminal handovers has been tested
by simulations.
q 2005 Elsevier B.V. All rights reserved.
Keywords: IP mobility; Multicast; Candidate access router discovery; Access router selection
1. Introduction
IP mobility protocols (i.e. Mobile IPv4/v6, [5,6]) enable
mobile nodes (MNs) to execute IP layer handover between
access routers (ARs). Basic Mobile IP (MIP) protocols are
well known for their poor performance and inability to
support a seamless handover. In [1], the Authors define the
seamless handover as ‘a handover in which there is no
change in service capability, security, and quality’.
A number of different approaches to improve MIP have
been proposed so far: (i) micro-mobility solutions [7], which
aim to limit the handover range of MIP procedures, thus
reducing handover latency and signalling burden; (ii)
context transfer solutions [3,4], the goal of which is to
quickly re-establish information states (context) associated
with the MN in the new AR upon handover, thus avoiding
re-initiation of the signalling procedure to set-up the service
from scratch; (iii) fast handover procedures to minimise
packet losses and latency [10,11].
0140-3664/$ - see front matter q 2005 Elsevier B.V. All rights reserved.
doi:10.1016/j.comcom.2005.05.004
* Corresponding author. Tel: C39 075 585 3630; fax: C39 075 585
3654.
E-mail addresses: [email protected] (D. Di Sorte), femminella@
diei.unipg.it (M. Femminella), [email protected] (L. Piacentini),
[email protected] (G. Reali).
All the proposed enhancements assume that the new AR
to hand over to is known. This is indeed the missing step in
the overall seamless handover procedure. Thus, in advanced
mobility scenarios, it is important to discover the set of
potential target ARs and to select the most appropriate one
before handing over. A candidate access router discovery
(CARD) procedure collects information about the ARs
which are candidates (CARs) for the MN handover [2,8,9].
It is then possible to identify the Target AR (TAR), i.e. the
one that best matches the MN’s requirements and the CARs’
capabilities.
The CARD requires two essential functions to be
performed:
† reverse address translation, which means to use layer 2
addresses to determine the coverage areas which is
served through a port of an AR, thus with its IP address
(layer 3 coverage). This is important to speed-up MIP
handovers, and is implemented by binding the layer 2
identifier (L2 ID) of each access point (AP) with the IP
address of the CAR connected to it. MNs are assumed to
listen to the L2 beacons transmitted by surrounding APs
periodically and to learn their L2 IDs. This information
is then exchanged with the current AR. The CARD
procedures can then support MNs with layer 3
information. Thus, in order to start the handover process,
MNs do not have to wait for the MIP router
Computer Communications 29 (2006) 337–357
www.elsevier.com/locate/comcom
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357338
advertisement from the new AR and fast handover
procedures may be executed ([10,11]). Note that the
capacity of performing frequency scanning is actually a
minimum requirement for all wireless technologies;
† discovery and update of service capabilities (SCs) of
CARs. In general, an SC is the set of parameters
(available bandwidth, price, security support, radio
access technology, etc.) that characterises the network
service provided to the MN. An SC includes all the most
important parameters that influence handover decisions.
Thus, the final aim is to drive the MN operation
according to specific objectives, such as (i) to balance
the traffic load on the access network, (ii) to drive the
MN towards the cheapest wireless access, (iii) to drive
the MN towards an access which guarantees the same
level of quality of service (QoS).
The first goal of this paper is to present a novel CARD
approach.
We start by assuming that the network is controlled by a
single operator (Fig. 1 shows the reference network
scenario) and that the provider of the IP connectivity
(Connection Service Provider, CSP) is also the owner of the
network infrastructure (Network Service Provider, NSP).
The result of this assumption is that, without any
commercial agreement there are no logical reasons for a
CSP to induce its mobile customers to move to other access
domains. In fact, this would imply a loss of traffic and
revenues in favour of competitors. Moreover, unless specific
agreement has been made, any CSP is usually unwilling to
give other organisations confidential information regarding
its own network (current bandwidth, security policies, etc).
Thus, we assume that our CARD procedure will be confined
Fig. 1. Reference net
within a single administrative domain. Then, we also
indicate an extension to manage the case of different
NSPs co-ordinated by a single CSP.
The proposed Push-Mode-Multicast CARD (PMM
CARD), already outlined in [22], is fully distributed and
allows each AR to dynamically self-construct a map of the
surrounding wireless coverage; the main innovation of our
approach with respect to previous proposals is the use of
push-mode multicast transmissions. We use multicast in a
push-mode in order not only to strongly reduce the latency
due to explicit queries, but also to lower the signalling
burden. The advantages in terms of signalling burden and
discovery time of the PMM CARD solutions with respect to
those proposed by the IETF within the Seamoby WG [2] are
presented in [22].
In this work, we assume that the access network is
heterogeneous and that terminals may have reconfiguration
capabilities so as to be able to access different radio access
technologies (RATs). We assume that all terminals have a
single active radio interface at a given time to save power.
This also implies the constraint of MNs not being allowed to
scan for beacons of RATs different from the one currently
being used, with the result that they cannot obtain coverage
information from them.
In homogeneous networks, handover is typically driven
by metrics which are strictly related to the received power
level [17]. In heterogeneous mobile environments, more
complex metrics combining a higher number of parameters
have to be defined (e.g. price, bandwidth, priority, power
consumption, reliability, etc.) [18–20].
In this paper, we present a novel TAR metric capable of
driving layer 2 and layer 3 handovers. Our goal is to support
intra and inter-AR handovers, which can be intra and
work scenario.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357 339
inter-technology. The metric takes into account the
bandwidth availability and received power level, together
with a statistical factor which helps to drive inter-
technology handovers by inferring about layer 2 coverage.
The paper is structured as follows. In the Section 2, we
summarise the current state of the art about CARD. In
Section 3, our PMM CARD procedure is described in detail.
In Section 4, the TAR approach is presented together with
the selection metric used. In Section 5, we describe the
simulation model and analyse the performance of the
procedure obtained from simulation trials. In particular, we
show results concerning the capability of the CARD/TAR
approach to drive inter-technology handovers. Finally,
Section 6 reports some concluding remarks.
2. Related works
In order to enable a seamless IP-layer handover, a CARD
solution must include two important tasks: (i) the reverse
address translation from L2 IDs; (ii) the discovery and
update of SCs. As mentioned the introduction, the former
function is needed to speed up the handover process,
whereas the latter function provides the TAR selection
process with the necessary information about the service
capabilities of the candidate wireless accesses in order to
drive the MN towards the most appropriate AP and AR. The
scope of the CARD process is an IP network with a number
of ARs that control a set of APs, which may be
heterogeneous. Handovers can be both inter and intra-
technology, intra and inter AR, at both layer 2 and layer 3.
We assume that each AR manages a number of APs;
consequently, the coverage area of an AR is the union of the
coverage areas of the relevant APs. Two ARs are
neighbours if their wireless coverage areas overlap.
Since MNs are generally assumed to be able to
periodically listen to the L2 beacons transmitted by the
surrounding APs, in [21] the authors propose an initial,
straightforward solution to enable the two CARD functions.
This consists of embedding the IP address, IP prefix, and
service capabilities in L2 beacons. However, this approach
has three main drawbacks. The first is strictly conceptual:
encapsulating layer 3 data within layer 2 control frames
violates the protocol layer architecture. The second is that
Fig. 2. Steady phase: message exchange for a
this approach would require some modifications to the
standard of existing technologies. Finally, to save wireless
bandwidth, it is not recommended to stuff beacons with a
large amount of additional information.
To overcome the aforementioned drawbacks, it is
necessary to define a network-assisted CARD process.
The solution presented in the framework of the IETF
Seamoby WG is as follows. When an MN remains under the
coverage of an AR (current AR), it obtains L2 IDs from the
beacons of some other APs, and passes them to its current
AR at a TAR event. The current AR is in charge of
providing the MN with either the IP addresses of CARs and
the relevant service capabilities (if the TAR algorithm is run
in the MN), or the TAR IP address (if the selection
algorithm is carried out at the current AR). This means that
not only the signalling messages to resolve L2 addresses
between an MN and its current AR, but also service
capabilities must be exchanged. Thus, a basic requirement is
that each AR is able to obtain information about the state of
the neighbouring wireless coverage (i.e. the AR–AP pairs)
and store it in a local cache. The state stored by the AR
should contain the IP address of the neighbouring ARs, the
L2 IDs of the relevant APs and the service capabilities
associated with the AR–AP pairs. This information may be
used by the current AR to offer an alternative wireless
access to an MN under its own coverage. The operations
described need a continuous, dynamic signalling exchange
between the network entities involved in the CARD process.
The complete message exchange between the MN, its
current AR, and a CAR is depicted in Fig. 2. This exchange
takes place during the ‘steady phase’ of the CARD process
on completion of the coverage map in the current AR. The
capability exchange between the current AR and CARs may
be performed either upon an MN request, or when the
capability lifetime expires. In Fig. 2, we have assumed that
the MN is in charge of both triggering and performing the
TAR selection. The MN communicates the current list of L2
IDs received (step 2), since they are candidate wireless
accesses for a possible handover, and must be considered for
the TAR selection.
As regards the message exchange in the steady phase,
some security considerations apply. Since the SC exchange
is the key element of any CARD process, IPsec Security
Associations (SAs) [23] among ARs is a valuable tool to
ddress mapping and capability update.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357340
protect it. Integrity check and authentication are mandatory
IPsec functions, whereas ensuring confidentiality is up to the
specific operator’s policy. As regards message exchange
between an MN and an AR, an SA is definitely needed for
an integrity check and authentication when the AR sends
CARD/TAR information to the MN, since false information
would drive the MN towards an incorrect, or bogus TAR. In
addition, if an operator wishes to hide information
exchanged on the air interface concerning network
capabilities, confidentiality also has to be supported.
An important issue of any CARD approach is the
discovery of the IP addresses of the neighbouring ARs
(‘discovery phase’), and the determination of the (L2 ID)/(IP address) mapping to be stored in the local cache.
Specifically, the discovery phase consists of discovering the
neighbouring ARs/APs, so as to build a map of the wireless
coverage of the surrounding area at both layer 2 and layer 3
for each AR. This information is clearly useful only in the
case of dense wireless coverage. This situation is realistic
for an operator offering a seamless wireless network service,
which can deploy a CARD mechanism to support TAR.
The accuracy of a CARD solution greatly depends on the
ability of an AR to obtain accurate information about
geographically neighbouring ARs, and to exchange SCs
with them. A further consideration is that a manual, address-
mapping configuration at ARs would not be a good solution
because (i) it is not feasible in large wireless networks; (ii) it
would not permit any adaptation to variable network
topologies; (iii) the coverage area of an AR (i.e. of its
APs) could not be easily and exactly determined. For these
reasons, a solution for automatically building the coverage
map at each AR is needed. Below we illustrate the solutions
proposed in literature, which can be classified in two
separate, general schemes: (i) handover-based solutions,
which use the first plain MIP handover between two ARs to
infer knowledge about the surrounding wireless coverage;
(ii) solutions which analyse and estimate the radio coverage
situation by using the information obtained by MNs from L2
beacons.
2.1. Handover-based CARD approach
The basic idea of a handover-based solution [2,9] is that
two ARs discover they are neighbours once an MN has
executed a plain MIP handover between them. Thus, an AP
connected with a neighbouring AR is discovered after a
plain MIP handover is accomplished through that particular
AP, which implies a layer 2 handover. After this handover,
the MN has to send a signalling message to the new, current
AR containing the IP address of the old AR and the L2
address of the old AP. Thus, if the association (L2 ID)/(IP
address) was unknown, the current AR can create a new
entry in its cache. Then, the new current AR is in charge of
informing the old one by means of a specific signalling
message that both of them are neighbours, so that the old AR
can update its own coverage map as well.
This message exchange can be used by the new AR to
check with the old AR to see whether the MN was indeed
attached to it during a reasonable past interval so as to trust
its information.
The handover-based approach presents some drawbacks.
Firstly, the first handover, involving an as yet undiscovered
AP by the old AR towards an AR (bootstrap handover),
cannot be driven by the CARD procedure; this could be a
weakness not only for delay-sensitive applications, but also
in a highly dynamic access network topology. In addition,
the time needed to complete the discovery phase could
increase in the case of dense wireless coverage. In fact, in
the latter case, handovers are driven by the TAR process
towards previously discovered APs, so that a non-driven
handover (discovery event) is carried out only when there is
no alternative. Finally, if an MN switches between two APs,
whose coverage areas are very close but do not overlap, then
this would result in false coverage information sent to the
network. In other words, it would imply an enlargement of
the CARD table with useless coverage data.
2.2. Centralised L2 beacon-based approach
This solution is illustrated in [2,8]. The basic idea is that
each AR must register with a centralised server, by
indicating its own IP address and the L2 IDs of the APs
associated with it. This server is a database that is
dynamically updated by ARs. Its task is to process queries
from ARs to resolve L2 IDs and to contribute to the building
of the wireless coverage map in ARs.
The process develops as follows. When an MN discovers
the L2 IDs of APs during frequency scanning, the MN
passes one or more of them to its current AR. If unknown, the
current AR sends them to the centralised server, which
returns the IP addresses of the relevant ARs. This mechanism
enables those (AR,AP) pairs with wireless coverage
overlapping with the one of the current (AR,AP) pair to be
identified. Thus, MNs can be regarded as L2 sensors used to
identify candidate wireless accesses to hand over to.
We expect an L2 beacon-based solution to speed up the
discovery phase when compared with the handover-based
approach [22], due to the higher number of events (L2
beacon listening), which trigger the discovery of new
wireless resources.
As regards security considerations, this message
exchange must establish specific SAs to guarantee integrity,
authentication and, if needed, confidentiality. In addition,
malicious MNs could communicate false information (e.g.
L2 IDs of APs that do not have a wireless coverage
overlapping with the current AR). This would cause storing
of incorrect wireless coverage information in routers.
Therefore, as highlighted in [13], if MNs cannot be trusted,
an L2 beacon-based procedure is inefficient from a security
point of view.
The server-based solution proposed by the Seamoby WG
extends the CARD protocol to support an AR-server
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357 341
message exchange, whereas in [8], the Authors make use of
the SLP (Service Location Protocol) architecture with a
centralised Directory Agent. ARs act as SLP User Agents,
that is they send service requests to the Directory Agent.
A distributed SLP architecture has also been proposed
in [8].
3. The CARD approach
In this section, we present the Push-Mode-Multicast
CARD (PMM CARD), which is a proposal to perform the
CARD procedure within an administrative domain. Then we
extend the procedure towards an inter-domain scope.
The PMM CARD is network-assisted, distributed and
based on push-mode multicast transmission. Our final goal
is to define a CARD process able to provide the TAR
process with all the necessary information needed to
properly drive intra and inter-technology handovers.
We assume that MNs are either classical single-mode
terminal or adaptive terminals. The latter may be either re-
configurable terminals based on the software defined radio
paradigm or simply multi-mode terminals. In any case, we
assume that they are capable of listening to layer 2 beacons
transmitted by surrounding APs. However, in the case of
multi-mode terminals, we assume that such terminals do not
scan for beacons of RATs other than the one currently in
use. The rationale of this assumption is that, with a number
of network interfaces, scanning for beacons on all interfaces
could result in a large drain on power.
3.1. The discovery phase
As regards the discovery phase, we follow a distributed
L2 beacon-based approach. It allows us (i) to avoid the
drawbacks of a centralised solution, (ii) to avoid the
bootstrap handover, (iii) to improve the precision and
accuracy of the coverage information, and (iv) to speed up
the discovery phase [22].
Each AR organises this information in a specific table
format, the CARD table, where the notation APi,j denotes
the jth AP connected to the ith AR (ARi). An example of a
CARD table within ARh is reported in Table 1, where:
1. the upper rows of the table specify: (a) the L2 IDs and the
RAT identifier of the APs connected to the AR; (b) the
relevant service capabilities; (c) a statistic parameter
Table 1
Example of CARD table stored in ARh
IPAR APL2ID RAT SC P
ARh APh,p 0 SCh,p P
. . . .ARx APx,k 2 SCx,k P
. . . .ARy APyj 1 SCyj P
which provides some sort of coverage information at
layer 2 (e.g. with reference to Table 1, PrAP(h,s)/AP(h,p) is
an estimation of the probability of making a successful
layer 2 handover from APh,s to APh,p). This parameter is
clearly used only if the APs refer to different RATs, since
in this case it is not possible to rely on beacon listening.
In the following subsection we will describe how to
compute such a statistical parameter;
2. the other rows specify: (a) the L2 ID and the RAT
identifier of each geographically adjacent AP; (b) the
corresponding IP address of the relevant ARs; (c) the
associated service capabilities and the parameter report-
ing the probability of successfully completing an
handover towards ARh. It is worth noting that in this
case the probability of success refers to layer 3 handover.
To reduce the complexity of table management, the
entries of the CARD table are soft states, which are deleted
if they are not refreshed within a given time interval. This is
particularly helpful in the case of a dynamic network access
topology.
Part of the CARD procedure is based on the use of a
domain-wide, multicast group MGOP defined by the
network operator. MGOP includes all the ARs that provide
wireless connectivity and act as multicast hosts. MGOP is
used to resolve the IP address of the AR from the L2 ID of
any of its APs. For this purpose, when an AR starts to offer
wireless connectivity via some APs, it has to join MGOP and
to send its IP address to its multicast address, together with
the L2 IDs of the active APs under its IP scope. Thus, all
ARs in MGOP are informed of all the L2 and L3
configuration parameters of the new arrival. In turn, one
of the participants (e.g. the latest AR that has joined MGOP)
sends a unicast reply with the address mapping of all the
ARs currently active in MGOP. Below, this preliminary
phase will be referred to as the ‘initialisation phase’.
Since the coverage area of the new AR does not typically
overlap with the coverage of all ARs, only a subset of the
received information will be used to build the CARD table.
Nevertheless, we remark that the amount of address
mapping data to be exchanged during the initialisation
phase and to be managed within ARs is very limited and
simple.
Active ARs must promptly notify all ARs of all the
variations in their radio coverage (e.g. (de)activation of APs)
via MGOP. Consequently, the interested ARs can quickly
update their CARD table. Moreover, this mechanism speeds
rob APh,s Prob APh,t . Prob APh,n
rAP(h,s)/AP(h,p) PrAP(h,t)/AP(h,p) . PrAP(h,n)/AP(h,p)
. . .rAP(h,s)/AP(x,k) PrAP(h,t)/AP(x,k) . PrAP(h,n)/AP(x,k)
. . .rAP(h,t)/AP(y,j) PrAP(h,t)/AP(y,j) . PrAP(h,n)/AP(y,j)
Fig. 3. Message exchanges when a new AP is detected by an AR by means
of beacon listening by an MN.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357342
up the address resolution phase, thus avoiding the latency of
consulting a remote entity. In this sense, the mechanism is
proactive with respect to the time in which the information is
needed. This feature gives a clear advantage over the IETF
solutions, which are pull-mode based.
Once each active AR has stored the complete L2 and L3
address list, the discovery phase may take place. The reader
is invited not to mistake the address list for the CARD table,
which contains the information related to the surrounding
radio coverage at each AR.
Let us assume that an MN, located under coverage of the
sth AP connected to ARh (APh,s), enters the coverage area of
another AP connected to ARz (say, APz,k). The steps of the
discovery phase are (see Fig. 3):
1. the MN listens to the beacons of the new AP;
2. the MN notifies its current AR (ARh) of the L2 ID of the
new AP;
Fig. 4. CARD tab
3. if the detected AP does not appear in any row of its table,
ARh gets the IP address directly from the address list and
asks ARz for the SC relevant to APz,k. In addition, it
invites ARz to join its own local multicast group (namely,
MGh) and sends the SC associated with APh,s;
4. ARz sends a unicast reply, containing the SC associated
with the ARz–APz,k pair and the invitation to ARh to join
MGz;
5. the process ends when ARz and ARh join the multicast
groups MGh and MGz, respectively.
Clearly, the reciprocal invitations to join the local
multicast groups are sent only when two ARs are discovered
to be neighbours, i.e. the first time they discover each other.
As regards the second step, a question arises: when does
the MN send the list of L2 IDs to the current AR? This may
occur either (i) at a TAR event or (ii) periodically, if new L2
IDs have been received during the last Tbeacon seconds. The
latter option would result in a larger use of signalling and
would be particularly useful to better follow dynamic
network topology status.
Step No. 4 is carried out to update the CARD table
maintained in ARh (see Fig. 4), as well as the CARD table
maintained in ARz. If two ARs are discovered to be
neighbours, subsequent discovery events can also create
new entries on the CARD tables relevant to other APs.
To sum up, the procedure enables the geographical
proximity of an AR to be associated with its participation in a
given multicast group. Note that the procedure enables the
coverage map to be extended across all RATs under the
assumption that each RAT is configured as active on a subset
le update.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357 343
of the terminals moving in the relevant area. In addition, it is
worth noting that an MN can receive beacons (and send them
to the current AR) from all RATs during inter-technology
handover attempts when scanning different RATs.
3.2. The steady phase
After the transient discovery phase, the SC information
stored in CARD tables needs to be maintained. Local
multicast groups are used to manage the geographical
proximity of ARs. The generic ARh, managing the multicast
group MGh, multicasts update messages containing the SCs
associated with its APs. This event may occur both
periodically and as a result of significant variations in the
SCs. These updates are received by all the ARs included in
MGh which are neighbours of ARh. This process enables
ARs to continuously update the relevant SCs of their
neighbours stored in their CARD table. It is important to
remark that updates relevant to a given AR are sent in a
push-mode. In other words, they are controlled by the
sending AR, which decides when additional information
needs to be sent through its local multicast group. This
procedure also enables the signalling burden to be lowered
[22]. The update process can also be considered proactive,
in the sense that any AR always has all information updated
without having to issue an explicit query, as in the IETF
procedure.
Additional considerations regarding the statistical par-
ameters have to be made. Let us consider, for instance,
PrAP(h,s)/AP(x,l); such a value is simply evaluated as the
number of successful handover events between these two
APs, i.e. from APh,s to APx,l, divided by the total number of
attempts. Both the numerator (successful handovers,
NHO,SUCC) and the denominator (total number of handover
attempts, NHO,TOT) are initialised to 1 for each column in the
table stored in ARh, so that the corresponding probability is,
in turn, initialised to 1/1Z1. However, as previously said,
these fields are meaningful only for APs exploiting different
RATs.
In our approach, we consider as SC the amount of
available bandwidth of the link from the wireless interface
of an AP to the output port of the relevant AR. In a single
operator scenario other factors, such as connection price and
security associations, seem to be of less interest than the
available bandwidth, which is the basic parameter to
perform admission control for QoS-enabled services and
to execute load balancing actions.
3.3. Security considerations
As underlined in [15,16], in order to extend MIP to
support advanced network services, additional mechanisms
are needed to authenticate MNs and to authorise connec-
tivity according to local policies (e.g. pricing/accounting
strategies). RFC 2977 [15] describes an infrastructure which
enables AAA servers to authenticate MNs and authorise
them to access the network, whereas, in [16], the Authors
propose some extensions to MIP registration messages to
create Mobility SA between the MN and its home agent,
and/or between the MN and a foreign agent.
Since we propose a procedure to support advanced
network services, we assume that MNs are authenticated
when they access the network. Thus, the coverage
information provided by them and used in the network to
build wireless coverage maps is assumed reliable. False or
inexact coverage information provided by MNs may be due
to malfunction only. This unlucky event could cause an
incorrect expansion of the CARD tables and additional
signalling traffic in the network. Thus, incorrect TAR
selections might be performed, even if only for the MN
providing inexact information about its set of candidate
accesses. However, since the entries of the CARD tables
are soft states, as mentioned above, that incorrect
(and hopefully sporadic) information is not renewed, and
is deleted after a given lifetime.
To support a secure message exchange, an IPsec-based
solution has to be exploited to guarantee authentication,
integrity, and confidentiality. The extension of the
standardised point-to-point IPsec architecture towards
multicast is currently being investigated (e.g. see [14]).
3.4. An extension of the CARD solution towards
an inter-domain scenario
So far, the reference scenario of this paper is
characterised by a single NSP, which is the owner of the
network infrastructure. It is in charge of providing mobile
terminals with IP connectivity, thus acting also as a CSP.
Consequently, the scope of the CARD procedure in such a
scenario is limited to the wireless coverage provided by the
NSP/CSP, since there are no reasons that could lead the
operator to support mobile customers to change the access
domain. In fact, this would clearly mean a loss of traffic
and consequently a loss of revenue in favour of
competitors.
However, in our opinion, there is another typical
network/business model which deserves to be considered.
Such a scenario is characterised by a CSP which, under
specific contractual agreements with a number of different
NSPs, is allowed to use their network infrastructure to
provide its subscribers with wireless connectivity. This
means that the wireless coverage of the CSP spans over a
number of NSPs, and thus an MN currently handled by
that CSP may access Internet services through ARs
belonging to different administrative domains, with
possible overlapping radio coverage. Consequently, the
scope of the CARD process has to be extended to support
handovers among those NSPs which have stipulated the
agreement with the considered CSP, and allows it to use
their network infrastructure to provide a wireless
connection service.
Fig. 5. Inter-domain CARD discovery phase.
1 At this level of the hierarchy, a manual configuration of CGWs may be
envisaged.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357344
Note that the choice of using multicast transmissions in
our PMM CARD is also inspired by the intra-domain scope
of our CARD approach, since it is well known that inter-
domain multicast transmissions might imply serious
problems. Thus, in this new scenario, the original procedure
needs to be modified to overcome drawbacks due to
multicast transmission through different administrative
domains. A possible solution is briefly described below.
The first step is the introduction of a new network entity
within each NSP, named CARD gateway (CGW), the goal
of which is to manage inter-domain CARD signalling
exchange. We remark that the signalling exchange among
CARD CGWs is managed with unicast transmissions. We
assume that CGW belongs to the MGOP, so that it has
knowledge of address mappings within each NSP built up
during the initialisation phase.
As regards the discovery phase, the basic idea is that the
CGW is polled by an AR only if it has not succeeded in
resolving a specific L2 ID. Then, upon reception of the
query regarding a given L2 ID, the CGW forwards such a
request towards the CGWs of those NSPs that may have
a radio coverage overlapped by the one of the current NSP.1
If a CGW finds the requested mapping in its local address
list, it contacts the AR associated with the L2 ID to enable
the communication between the two interested peer ARs.
In more detail, all the steps of the inter-domain CARD
process are reported below (refer to Fig. 5). We assume that
ARh belongs to NSP1 and ARz belongs to NSP2.
1. When an MN managed by APh,s enters the coverage area
of APz,k, if the involved APs use the same RAT, the MN
listens to the beacons transmitted by APz,k.
2. The MN notifies ARh of the L2 ID of APz,k.
3. If ARh is not able to resolve the mapping within NSP1, it
sends a unicast request to its CGW (namely, CGW1) with
the L2 ID to be resolved. This message also contains the
invitation for CGW1 to join MGh, the mapping between
the IP address of ARh and the L2 ID of APh,s, and the
relevant service capabilities.
NSP2NSP2
NSP3NSP3
INTERNETINTERNET
Multicast
Unicast
ARh
ARi
ARj
ARk
ARl
ARzCGW1CGW3
CGW2
NSP1SC update
Fig. 6. Inter-domain CARD steady phase.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357 345
4. CGW1 forwards (in unicast) the query towards the
CGWs of those NSPs that may have a radio coverage
overlapped by that of NSP1.
5. CGW2 finds out that the L2 ID belongs to an AP
managed by ARz, which is an AR of NSP2. At this stage,
if a local multicast group associated with ARh (the one
that issued the request to CGW1) does not already exist,
CGW2 will create it in NSP2, named MGARh/NSP2; such
a group will be used for future service capability updates
from ARh within NSP2. Then, CGW2 forwards the query
to ARz, inviting it to join to MGARh/NSP2, and
communicating the service capabilities associated with
the (ARh,APh,s) pair.
6. ARz replies to CGW2 with a message containing the
mapping between the IP address and the L2 ID, the
relevant service capabilities, and the invitation for CGW2
to join its local multicast group MGz. In addition, ARz
joins MGARh/NSP2.
7. CGW2 forwards the info from ARz to CGW1 and joins
MGz.
8. If a local multicast group associated with ARz (named
MGARz/NSP1) does not already exist, CGW1 will create
one in NSP1, and then forward the message with ARz
information to ARh, inviting it to join this (new) local
multicast group (MGARz/NSP1). Then, CGW1 joins
MGh.
9. Finally, ARh joins this new local multicast group
(MGARz/NSP1).
As regards the steady phase, this is executed exploiting
inter-domain, unicast signalling among CGWs and the new
multicast groups within NSPs (MGAR/NSP).
We assume that ARi, ARj, ARk, ARl and ARz have
wireless coverage overlapping with ARh, and thus have to
receive its updates (refer to Fig. 6). ARi, ARj, and ARh
belong to NSP1, whereas ARk and ARl belong to NSP3 and
ARz belongs to NSP2. After the completion of the discovery
phase, ARi, ARj and CGW1 belong to MGh, whereas ARz
belongs to MGARh/NSP2, and ARk and ARl belong to
MGARh/NSP3. Let us focus on a CGW. If an incoming
message is an SC update through an intra-domain multicast
message from an AR, the involved CGW has to forward it as
a unicast message to the appropriate CGWs. On the other
side, if the incoming message is an inter-domain unicast
update from another CGW, the relevant information is
multicasted within the NSP through the appropriate multi-
cast group. In Fig. 6, solid lines represent multicast
transmissions, whereas dashed lines are associated with
unicast messages.
Clearly, SAs among CGWs must be implemented to
ensure authentication, integrity and confidentiality of data
exchange.
We underline that the depicted procedure might also be
useful to manage a single, large administrative domain as a
number of smaller, co-ordinated sub-domains.
4. The TAR approach
As regards the TAR selection procedure, we assume that
it is performed at the current AR. This implies (i) a
substantial power saving at MNs, (ii) highly complex
terminal equipment is avoided, (iii) critical service
information is managed only among ARs (security issues),
(iv) bandwidth waste is avoided on wireless links, (v) the
possibility to dynamically set specific traffic management
policies for the operator.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357346
4.1. Handover management
TAR selection may be triggered by three different events:
1. at an explicit request by the customer;
2. periodically, as decided by the current AR, with period
TTAR, which can be dynamically adjusted by the AR on
the basis of the current load, with the aim of spreading it
evenly over the APs. A viable proposal is that each MN is
assigned a period equal to
TTAR Z max TD 1 KeKdSCC
� �; TTAR;min
n o(1)
where SC is the service capability, i.e. the amount of
bandwidth available in the AP, C is the capacity of the
AP, TD and d are design parameters. The higher the
available network resources, the longer the time period
TTAR. The value of TTAR is first determined at connection
set-up, then it is updated at each TAR event according to
the current load of the AR–AP pair the MN is attached to.
When the amount of traffic increases, the frequency of
TAR events also increases (up to a maximum fixed value
of 1/TTAR,min) with the aim of increasing the reactivity of
the CARD/TAR procedure to track system changes.
Clearly, this implies a more aggressive load balancing
action, at the cost, however, of increased complexity in
terms of signalling and computational burden;
3. at an explicit request from the MN, when it detects that
the power level of the received signal is rapidly
decreasing. In particular, this request is sent when the
received power PW is below a threshold PWopt. We
consider the MN to be outside the coverage area when
PW falls below the receiver sensitivity, PWmin.
Upon a TAR event, the MN is required to send its
handover preferences to the current AR. In our scenario,
three types of information are sent as preferences:
1. which types of RAT the MN is able to hand over to (this
information could also be maintained by the AR in the
MN context);
2. the set of the L2 IDs of the APs (of the same RAT of the
one currently active in the MN) the beacons of which
have been received by the MN during the final Tbeacon
seconds. We refer to this set of information as the TAR
beacon list;
3. the received power level PW of the surrounding APs of
the TAR beacon list.
If different ARs are CARs, a subset of them will have
to be selected by the current AR as TARs. The proposed
TAR algorithm aims to select a subset of maximum N
CARs (N is a design parameter), by means of a metric.
The current AR notifies the MN of the list of wireless
accesses to hand over to. At this point, the MN can try
the handover.
We remark that the TARs are not only the APs whose
beacons have been communicated by the MN (i.e. those
with the same RAT as the one currently active in the MN),
but also the APs with other RATs, the coverage areas of
which are supposed to overlap with that of the current AP.
As mentioned above, this information is inferred from the
relevant values of probability of achieving a successful
handover stored in the CARD table of the current AR.
If the MN performs a layer 2 inter-technology handover,
the involved AR(s) must be made aware of any successful
and failed inter-technology handover to update the value of
the handover success probability in the CARD table. In the
case of a layer 3 handover, the new AR sends a positive
acknowledgement to the old AR whenever a handover of a
previously handled MN is successful. In the case of intra-
AR layer 2 handover, the current AR does not change, and it
recognises the layer 2 handover between two of its APs. As
regards any failed handover attempt, the old AR does not
receive any positive acknowledgement, thus it is also able to
infer these failures from the TAR list communicated to the
MN and from the positive acknowledgement it may have
received. It is clear that the additional processing and
signalling burden is the price to pay in order to make the
procedure capable of managing not only intra-technology,
but also inter-technology handovers.
In the following sub-section, we describe the TAR
selection algorithm, the aim of which is to provide the N
most appropriate CARs for the handover.
4.2. The TAR selection algorithm
The metric used represents the criterion which provides
the quality measure MTAR(APh,s,APz,k), of a supposed
handover from the current APh,s to a target APz,k. TAR
driven handovers may occur only towards the APs which
have an entry in the tables managed by the current AR. Our
proposal is that the score associated with a candidate ARz–
APz,k pair for a handover from the APh,s is given by
MTARðAPh;s;APz;kÞ Z f1ðSCz;kÞf2ðPWz;kÞf3ðPrAPðh;sÞ/APðz;kÞÞ
(2)
where the proposed functions fi, iZ1,2,3 are:
f1ðSCz;kÞ Z min 1; eb
SCz;kCðK1ÞjB
C
� �K1
( )if SCz;k R jB
0 otherwise
8><>:
(3)
f2ðPWz;kÞ Z 1 KeKg
PWz;kKPWminPTKPWz;k
� �if PWz;k OPWmin
0 otherwise
8<:
(4)
f3ðPrAPðh;sÞ/APðz;kÞÞ Z PrAPðh;sÞ/APðz;kÞ ZNHO; SUCC
NHO; TOT
(5)
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357 347
Since all the three proposed functions range between 0
and 1, the final score will also range between 0 and 1.
With reference to Eq. (3), B represents the MN
bandwidth demand to satisfactorily support the current
communication session, SCz,k is the service capability of
APz,k, C is the capacity of APz,k, and b is a design parameter.
In order to avoid ping-pong effects, the value of j is set to 1
for all but the current candidate, for which jZ0. The higher
the value of b, the higher the score associated with the
bandwidth (SCC(K1)jB) available after the hypothetical
execution of the handover, normalised by the capacity of the
AP taken into account. Moreover, if the new network access
cannot accommodate such a traffic flow with the necessary
bandwidth, its score is zero. This is a sort of admission
control function executed at the AR.
With reference to (4), PT is the standard value of the
transmission power associated with a given RAT, PWz,k is
the received power from the APz,k, and g is a design
parameter similar to b. Clearly, the higher the value of g, the
higher the sensitivity of the score function to power levels
below the optimum value PWopt.
With reference to (5), PrAP(h,s)/AP(z,k) is the estimation
of the handover success probability from APh,s to APz,k.
This probability value should approximate the percentage of
the APh,s coverage area which overlaps the APz,k coverage
area, thus a low score is given to the candidate APs with low
coverage areas overlapping with that of the current AP. This
parameter helps us in managing inter-technology handovers
without relying on coverage information from MNs. It is
worth noting that, for APs of the RAT currently used, f3 is
always set to 1 (since the overall process relies on beacon
detection), whereas, in the case of different RATs, f2 is
always set to 1 (since the MN does not estimate any power
level).
The set of handover management events includes all the
TAR executions (which may or not result in a handover
attempt) and non-assisted handovers. We define as a failure
event a handover management action that would not be
needed if the CARD/TAR functions worked properly. Thus,
at a given time, the probability, PrF, that a handover
management event fails is equal to
PrF Z PrF1 CPrF2 (6)
where PrF1 is the probability of having a non-assisted
handover (i.e. the TAR process has not been able to provide
a timely, appropriate solution), and PrF2 is the probability
that the MN does not succeed in attaching to the TARs (i.e.
the selection process forces the MN to try to connect to other
wireless accesses which are out of the coverage of the MN).
In other words, there are a couple of reasons for a non-zero
value of the failure probability of the handover management
process. Firstly, a failure may be caused by the movement of
MNs. In fact, upon a notable change of position, the wireless
accesses suggested by the TAR may be aged, so that the MN
may remain out of coverage. Then, another component of
the failure probability is due to the intrinsic characteristic of
the procedure, which, for inter-technology handovers, is
blind to the movement direction of MNs which are driven in
handing over.
In the following we will refer to PrF as the failure
probability of the CARD/TAR procedure.
Let us now illustrate the algorithm to select the list of
N TARs. In order for the selection procedure to make
sense, a CAR is selected only if its score is higher than
that of the current AR. In principle, the N candidates
with the highest score should be picked up. However, if
there are CARs of the current RAT with a score higher
than the current AR, the best of them is inserted at least
at the Nth rank of the handover list, independently of its
score. This policy enables to lower the probability of
handover failure after scanning all the N TARs provided
by the current AR. In fact, intra-technology attempts rely
on the results of previous L2 ID scanning process by the
MN.
5. Numerical results
In this section, we present some of the results obtained
from a simulation trial, the aim of which is (i) to test the
effectiveness of the proposed CARD/TAR approach in
terms of handoff success probability, and (ii) to test the
sensitivity of performance to variations of system
parameters.
We start by illustrating the main features of the
simulation model adopted. Then, we give details about the
simulation scenario, and finally we discuss the numerical
results.
5.1. Simulation model
In this sub-section, we describe the design approach and
the basic implementation choices to develop the simulator
used to evaluate the performance of the CARD/TAR
mechanism.
The simulator is flow-oriented and event-driven, where
packet transmissions are not simulated. In other words,
communications of signalling information occur instan-
taneously, and no delays are associated with information
transfer between network entities. The amount of access
network capacity is managed as a logical resource, part of
which may be allocated to an MN upon successful traffic
flow set-up.
We developed an object-oriented simulator by using the
CCC programming language. In more detail, we used the
event scheduler of the NS-2 simulator [24], and we added
our own CCC modules to manage MN mobility, CARD
functions, and TAR selection. In addition, we used the
OTcl interface of NS-2 to configure the simulation with our
own Tcl scripts. The set-up of the simulation was managed
by means of a Tcl script (typical of the NS-2 environment),
NS-2
SCHEDULERTclCL
ProprietaryTcl libraries
ProprietaryC++ libraries
INPUT FILES MATLABPOST-PROCESSING
SIMULATIONSCRIPTS
OUTPUT FILES
Fig. 7. Simulator architecture.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357348
which retrieves all the simulation parameters (relevant to
the network topology, RAT features, mobility model,
traffic load and TAR metric) by a number of input files
with a fixed structure and passes them to the CCCmodules by means of the CCC/OTcl interface. Output
files are then processed with Matlab to obtain performance
curves. The architecture of the simulator is depicted in
Fig. 7.
The events which populate the scheduler and imply the
update of the state variables are (i) the updates of the
positions of MNs, (ii) the set-up and tear-down of traffic
flows, and (iii) periodic events associated with the
CARD/TAR procedure (e.g. periodic CARD table
updates).
The coverage areas of APs are assumed to be circular
with a maximum radius denoted as rmax. The power
threshold PWopt corresponds to the one perceived at a
distance equal to 75% of the maximum coverage radius, and
it is calculated by using a quadratic attenuation law. This
simple propagation model does not invalidate the generality
of the CARD/TAR results. In fact, in order to analyse the
proposed algorithms, it is important to define the boundaries
of the coverage areas and the power threshold, regardless of
the specific propagation laws, the study of which is beyond
the scope of this paper. We implemented the coverage of an
AP as hard: so long as the received power level is higher
than PWmin, the MN is in coverage, whereas it is
disconnected when the received power level drops just
below that value.
The capacity, C, associated with an AP is considered as
net capacity, i.e. we assume ‘ideal’ layer 2 technologies,
without considering either the details relevant to trans-
mission aspects (e.g. fading and shadowing), or MAC
protocol features.
As regards the mobility model, we implemented the
Gauss–Markov model [12]. We used this model since it
avoids sharp direction changes, by allowing previous speed
and direction to influence future mobility. The equations
controlling MNs mobility are:
sn Z asnK1 C ð1 KaÞsave Cffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffið1 Ka2Þ
psxnK1
dn Z adnK1 C ð1 KaÞdave Cffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffið1 Ka2Þ
pdxnK1
8<: (7)
xn Z xnK1 CsnK1 cosðdnK1Þ
yn Z ynK1 CsnK1 sinðdnK1Þ
((8)
where sn and dn are the speed and the direction of the MN
at time n, 0%a%1 is the tuning parameter used to modify
the random nature of the motion, save and dave are constant
values representing the average values of sn and dn, sxnK1
and dxnK1are Gaussian random variables with zero mean
and variance l and, b, respectively. Clearly, xn and yn
represent the surface co-ordinates of the MN position in
the area at time n. The position of an MN is updated with
the step fixed at 1 s. The default value of the average
speed was set equal to 1.5 m/s, whereas the parameter a
was set to 0.5 and b was set to p/2. The initial value of
the direction was set to 0. However, when a MN reaches a
distance from the border of the simulation area inferior
than the 5% of the area side, this value is shifted by p (or
by Gp/4 if the MN reaches one of the corners of the
simulation area).
We assume that an MN is instantaneously aware it is
under the coverage of an AP (i.e. it immediately listens to
the relevant beacons).
The network is loaded with homogeneous CBR flows
with bandwidth equal to B. Calls are generated with a
Poisson arrival process with an average frequency l, and the
call duration is modelled as an exponentially distributed
random variable with mean 1/m. An MN can be in one of the
three following states: (i) disconnected (DISC), if it is not
under the coverage of any AP; (ii) connected (CONN), if it
is under the coverage of an AP; (iii) in communication
(COMM), if it is under the coverage of an AP and has an
active communication session, and therefore uses an amount
of the AP bandwidth equal to B.
Table 2
Characteristic parameters of radio access technologies
RAT parameters RAT1 RAT2 RAT3
f (frequency) 5.4 GHz 2.4 GHz 2 GHz
rmax (maximum radius) 20 m 30 m 40 m
C (capacity) 10 Mb/s 5 Mb/s 2 Mb/s
GT (transmission gain) 1 1 1
GR (reception gain) 1 1 1
PT (transmitted power) 100 mW 100 mW 100 mW
PWopt (power threshold) 8.7 nW 19.5 nW 15.8 nW
PWmin (receiver sensitivity) 4.9 nW 11 nW 8.9 nW
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357 349
Before running our simulations, we validated all the
features added to the base version of NS-2. In more details,
we executed the following steps:
† validation of the Gauss–Markov mobility model by
comparing the characteristics of MN trajectories
obtained by our implementation with those presented
in [12];
† validation of the dynamics of the CARD table
construction by analysing the discovery events triggered
by a number of MNs with deterministic trajectories;
† validation of the CARD table data in the steady phase by
an exhaustive comparison with the overlapping of the
radio coverage provided by the APs;
† validation of the traffic generation process and band-
width allocation mechanism in APs by analysing the
output results of simulations with a number of MNs with
deterministic trajectories;
† validation of the TAR mechanism by means of (i) a
check of the (AR,AP) pair an MN is attached to before
and after a TAR event, and (ii) a consistency check
between the TAR scores associated with the (AR,AP)
pairs around a given MN, as well as the actual position of
the MN and resource availability of the accesses.
The performance curves shown in Section 5.3 are
obtained by averaging 60 simulation runs. The (small)
confidence intervals are not shown to improve the neatness
of the figures.
5.2. Simulation scenario
The network topology simulated consists of a single
administrative domain with a number of APs and ARs. We
envisage the presence of three different RATs. The main
peculiarities of RATs are reported in Table 2.
The whole network area is a square with a side measuring
150 m. We ran simulations over three different coverage
maps.
In the first coverage configuration (referred to as ‘sparse’
coverage), all the area is covered by at least one RAT. This
assumption implies that only a multi-mode terminal can
move anywhere within the area without losing the wireless
connectivity. The number of APs is 44 (27 of RAT1, 11 of
RAT2, 6 of RAT3) and the number of ARs is 8.
The second coverage (referred to as ‘medium’ coverage)
is characterised by a higher amount of wireless access
resources than in the previous one. The total number of APs
is 50 (30 of RAT1, 13 of RAT2, 7 of RAT3) and the number
of ARs is 10.
Finally, the third network configuration (referred to as
‘dense’ coverage) is characterised by a coverage which
ensures that the whole area is covered by at least one AP for
each RAT; this means that each RAT provides a full coverage
of the area. Consequently, also a single mode terminal can
move anywhere within the area without losing the wireless
connection. The number of APs is 72 (42 of RAT1, 19 of
RAT2, 11 of RAT3) and the number of ARs is 14.
The association AR–APs in the network was designed
according to the following criteria: (i) an AR has to be
connected to APs of different RATs (at least 2); (ii) APs
connected to the same AR should be very close to each other,
possibly with overlapping coverage; (iii) the minimum
distance between two APs of the same RAT is equal to the
maximum radius reported in Table 2. This condition is used
to limit the coverage overlapping of APs with the same
technology. In addition, the coverage maps were designed so
that the wireless network resources are uniformly distributed
over the area. The output capacity of ARs was set at 45 Mbps.
Simulation results are relevant to homogeneous flows.
Each flow is associated with a bandwidth value, B, equal to
128 Kbps. The number of MNs is 1800. In order to test the
procedure and to limit the number of rejected calls and failed
handovers due to lack of resources (especially in the middle
of the square area where the density of MNs is higher than at
the borders), we loaded the network with an average amount
of traffic equal to 30% of the total capacity. We set the
average call duration equal to 5 min (i.e. mZ1/300 sK1), thus
l is equal to 2.50, 2.96, and 4.2 sK1, corresponding to an
average load of 740, 888, and 1258 Erlangs, relevant to the
sparse, medium, and dense coverage, respectively. As
regards the TAR selection process, we ran three simulations
with a maximum number (N) of handover attempts towards
TARs equal to 2, 3 (default value), and 4, respectively.
The TAR selection is triggered by either the MN, when
the received power level from the current AP drops below
the threshold PWopt, or periodically by the current AR, with
period TTAR, computed from (1), with values of TD equal to
30 (default value), 60, and 90 s, TTAR,minZ0.1TD seconds,
and dZ2 ln 10 (so that TTAR(SC/CZ0.5)Z0.9TD).
We also analysed the sensitivity of the model with respect
to MN speed, set equal to 0.5, 1 and 1.5 m/s (default value).
The power control in MNs is assumed to be executed
every second.
The parameters b and g in the TAR function are selected
according to the following criteria:
† for each RATi, iZ1,2,3, the value of b is set in such a
way that, when the amount of the available bandwidth
(SC-B, for candidate ARs, and SCCB, for the current
100
101
0
0.2
0.4
0.6
0.8
1
Service Capabilities (Mb/s)
f 1(SC
)
RAT1, C = 10 Mb/s
RAT2, C = 5 Mb/s
RAT3, C = 2 Mb/s
5 10 15 20 25 30
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Received Power Level (PW) in nW
f 2(P
W)
RAT1, γ = 36 106, PW
opt = 8.7 nW
RAT2, γ = 16 106, PW
opt = 20 nW
RAT3, γ = 20 106, PW
opt = 16 nW
Fig. 8. Metric functions f1 and f2.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357350
one) is higher than, or equal to 0.8Ci, Ci being the full
capacity of RATi, then the weight associated with the
service capability is equal to 1. This implies that the
value of b is equal to bZ0.866 for all RATs. For values
of SC lower than 0.8Ci, such a weight rapidly decreases,
and consequently the importance of the load balancing
criterion increases;
† for each RATi with iZ1,2,3, the value gi is set so that the
function f2(PWopt,i)Z3/4; in other words, when the
power level is equal to the value of PWopt,i which
0 500 1000 150.9
0.95
1
Simulation tim
Han
dove
r su
cces
s pr
obab
ility
N = 3T
D = 30 s
speed = 1.5 m/
Fig. 9. Probabilities of successful ha
characterises the RATi itself, we set the weight
associated with the received power level equal to 3/4.
For values of received power lower than PWopt,i, this
weight rapidly decreases. Consequently, the power-
based criterion becomes important when the received
power level from an AP is lower than PWopt. The final
result gave values of g as g1Z36.5!106, g2Z16.2!106, and g3Z20!106, for RAT1, RAT2 and RAT3,
respectively. In this way, we take into account different
characteristics of RATs, i.e. the signal strength that, as
00 2000 2500 3000e (seconds)
P1, Dense cov
P2, Dense cov
P3, Dense cov
s
ndover: dense coverage case.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357 351
all channel specific factors, cannot be straightforwardly
compared.
The curves relevant to f1 and f2 are reported in Fig. 8.
As regards the update of the service capabilities, ARs
multicast the update of the available bandwidth, SC, to an
AP either periodically, with period equal to TSCZ60 s, and
upon variations of SC of at least 5% from the one previously
communicated.
5.3. Simulation results
Our goal is to verify the effectiveness of the
CARD/TAR procedure, in particular as regards the
capability of not only self-constructing the coverage map
of the whole area, but also of driving both inter and intra-
technology handovers.
Initially, the CARD table stored in a generic AR contains
only the information relevant to the APs connected to the
AR itself, then, as time goes by, this table self-constructs
according to the information provided by the MNs. As
regards the data collected to generate statistics, we consider
only those relevant to the MNs in the COMM state.
Let us first analyse the simulations in the case of dense
coverage, with TDZ30 s, MN speed equal to 1.5 m/s, and
NZ3.
0 500 1000 150
0.2
0.4
0.6
Simulation tim
Fai
lure
pro
babi
lity
N = 3T
D = 30 s
speed = 1.5 m/s
Fig. 10. Failure probabilities
Fig. 9 shows the cumulative probability of successfully
handing over within the first, second and third attempt. As
expected, we can see that after a brief transient period
needed for self-constructing the CARD tables, the prob-
ability of successfully handing over towards the best-scored
CARs rapidly converges to values close to 1. Clearly, the
successful handover probability increases with the number
of attempts.
As regards the efficiency of the procedure to drive
handovers, the failure probability of the CARD/TAR
procedure versus simulation time is depicted in Fig. 10.
We compute the failure probability of the overall
process to manage handovers, PrF, as the number of failure
events (defined in Section 4.2) over the number of
handover management events (i.e. the number of TAR
process executions plus the number of non-assisted
handovers).
In the case of dense coverage, PrF is approximately 5.6%.
This value is the result of two different contributions (see
(6)). The former, PrF1, is equal to 5.27%, whereas the latter
is equal to 0.33%. Note that, considering a single run, out of
a total number of 186165 successful handovers, 149114 of
them (80%) are driven by the procedure. It is worth noting
that a high number of TAR events provide an empty TAR
list so that the MN is advised to remain under the current
coverage (about the 77% of TAR executions).
00 2000 2500 3000e (seconds)
Inter-technology, dense covGlobal, dense cov
: dense coverage case.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357352
Fig. 10 also shows that the probability of failing an inter-
technology handover is approximately 20% at the end of the
simulation, when the probability values in the CARD tables
become stable.
We note that the performance of the CARD/TAR
procedure is extremely satisfactory for dense wireless
coverage. This result is to be expected for two main reasons:
1. inter-technology handovers (the most critical ones) are
not so frequent since:
a. each RAT covers the whole area;
b. the discovery of the surrounding coverage provided
by the current RAT depends on the MN capability to
pick up the L2 beacons transmitted by the
surrounding APs. In general, we can expect the
mechanism to work better when the overlapping
area between neighbour APs belonging to the same
RAT is substantial;
c. the traffic load on offer is not heavy. This also means
that inter-technology handovers are not so often
solicited by a load-balancing action.The distribution
of successfully driven handovers, classified as intra
and inter-technology handovers, together with their
distribution over the three different RATs, is
summarised in Table 3 for a single run. Driven
intra-technology handovers are equal to 92.28% of
the total driven handovers and equal to 73.91% of
the total handovers. As expected, most handovers
occur within RAT1, which has the largest capacity.
On the other hand, driven inter-technology hand-
overs are equal to 7.72% of the total driven
handovers and equal to 6.18% of the total handovers;
2. overlapping between the coverage areas of different
RATs is high enough to keep the failure probability of
inter-technology handover attempts sufficiently low as
not to degrade the performance of the overall procedure.
Consequently, if we consider a coverage with an amount
of resources lower than those in the dense coverage, a
deterioration of the performance of the procedure is to be
expected.
Let us analyse what happens in the case of medium and
sparse coverage. Figs. 11–13 show the cumulative
Table 3
Driven Handover distribution: dense coverage case
Handover Type Involved RATS % Total %
Intra-technology RAT1/RAT1 66.43 92.28
RAT2/RAT2 20.53
RAT3/RAT3 5.32
Inter-technology RAT1/RAT2 2.31 7.72
RAT1/RAT3 0.27
RAT2/RAT1 3.1
RAT2/RAT3 0.87
RAT3/RAT1 0.24
RAT3/RAT2 0.93
probability of a successful handover within the first, second
and third attempt, respectively, in all the coverage cases. It
is clear that performance improves from sparse to medium
coverage and from medium to dense coverage. This trend is
highlighted in Fig. 14, where the probability of failure
increases when compared with the dense coverage case.
This is due to a lower amount of wireless network resources,
hence to a reduced overlapping of coverage areas of
different RATs. As a result, the percentage of driven
handovers remains nearly constant for medium coverage
(99995 out of a total of 124681, i.e. 80%) and rapidly
decreases for sparse coverage (67695 out of a total of
93005, i.e. 72.8%). Note that the number of handovers for
MNs in the COMM state is higher in the case of dense
coverage since the amount of active flows is higher than in
the other two cases. As regards the percentage of inter-
technology driven handovers, it generally rises when the
coverage area provided by a single RAT decreases; it is
equal to 11.54% in the case of sparse coverage. In addition,
the probability of failing the CARD/TAR process increases
from 5.6% for dense coverage up to approximately 6% for
medium and 7.2% for sparse coverage (PrF1 is equal to
5.5%, whereas PrF2 is equal to 1.7%). We remark that, as
expected, PrF2 has increased considerably with respect to
the dense coverage case, since inter-technology handovers
are needed more frequently.
Let us now analyse the performance of the procedure in
the case of sparse coverage when N ranges in the set {2, 3,
4}, TD in the set {30, 60, 90 s}, and the average speed of the
MNs in the set {0.5, 1, 1.5 m/s}. We expect a performance
improvement when N increases, TD decreases, and MN
speed decreases. In fact, lower values of TD imply more
frequent TAR actions, thus a better performance of the
CARD/TAR procedure, which is able to quickly track the
network changes and the MN position. Moreover, by
increasing the value of N means that the TAR list, provided
to the MNs by the current AR, includes a higher number of
CARs to try to hand over to, and this implies an
improvement in the performance of the procedure.
Furthermore, we expect the process to work better when
the speed of MNs is decreased, since the probability of
having a non-assisted handover due to large movement will
thus decrease. Note that the values of the MN speed
(walking speed) that we have chosen are typical of the
network scenario simulated, where the radius of the APs
ranges from 20 to 40 m.
Fig. 15 shows the cumulative probability of a successful
handover within the first N handover attempts for cases NZ2, NZ3, and NZ4, with TDZ30 s and MN speed equal to
1.5 m/s. The improvement is clear for each handover
attempt. We note in particular the improvement of the
successful handover probability at the last attempt. This
value varies from 0.885 for NZ2, to 0.905 for NZ3, and,
finally, to 0.91 for NZ4. This improvement induces only a
negligible decrease in the failure probability of the
CARD/TAR procedure.
0 500 1000 1500 2000 2500 30000.7
0.75
0.8
0.85
0.9
0.95
1
Simulation time (seconds)
Han
dove
r su
cces
s pr
obab
ility
at t
he fi
rst a
ttem
pt
N = 3T
D = 30 s
speed = 1.5 m/s
P1, Dense cov
P1, Medium cov
P1, Sparse cov
Fig. 11. Probability of successful handover at the first attempt: dense, medium, and sparse coverage.
0 500 1000 1500 2000 2500 30000.82
0.84
0.86
0.88
0.9
0.92
0.94
0.96
0.98
1
Simulation time (seconds)
Han
dove
r su
cces
s pr
obab
ility
at t
he s
econ
d at
tem
pt
P2, Dense cov
P2, Medium cov
P2, Sparse cov
N = 3T
D = 30 s
speed = 1.5 m/s
Fig. 12. Probability of successful handover within the second attempt: dense, medium, and sparse coverage.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357 353
0 500 1000 1500 2000 2500 30000.8
0.82
0.84
0.86
0.88
0.9
0.92
0.94
0.96
0.98
1
Simulation time (seconds)
Han
dove
r su
cces
s pr
obab
ility
at t
he th
ird a
ttem
pt
P3, Dense cov
P3, Medium cov
P3, Sparse cov
N = 3T
D = 30 s
speed = 1.5 m/s
Fig. 13. Probability of successful handover within the third attempt: dense, medium, and sparse coverage.
0 500 1000 1500 2000 2500 30000
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
Simulation time (seconds)
Fai
lure
pro
babi
lity
Dense cov, inter-technologyDense cov, globalMedium cov, inter-technologyMedium cov, globalSparse cov, inter-technologySparse cov, global
N = 3T
D = 30 s
speed = 1.5 m/s
Fig. 14. Failure probabilities: sparse, medium, and dense coverage.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357354
1 1.5 2 2.5 3 3.5 40.8
0.82
0.84
0.86
0.88
0.9
0.92
0.94
Handover attempt index
Han
dove
r su
cces
s pr
obab
ility
Sparse cov, N=2Sparse cov, N=3Sparse cov, N=4
TD
= 30 s
speed = 1.5 m/s
Fig. 15. Probability of successfully handing over versus handover attempts for NZ2,3,4: sparse coverage.
30 40 50 60 70 80 900.82
0.83
0.84
0.85
0.86
0.87
0.88
0.89
0. 9
0.91
TD
(seconds)
Han
dove
r su
cces
s pr
obab
ility
Sparse cov, P1
Sparse cov, P2
Sparse cov, P3
N = 3speed = 1.5 m/s
Fig. 16. Probability of successfully handing over within the first, second, and third attempt versus TD: sparse coverage.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357 355
0.5 0.6 0.7 0.8 0.9 1 1.1 1.2 1.3 1.4 1.50.01
0.02
0.03
0.04
0.05
0.06
0.07
0.08
MN speed (m/s)
Failu
re p
roba
bilit
ySparse cov, globalSparse cov, Pr
F1Sparse cov, PrF2
N = 3T
D = 30 s
Fig. 17. Failure probabilities of the CARD/TAR process versus MN speed: sparse coverage.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357356
In addition, as expected from the above considerations,
the cumulative probability of successfully handing over
within the first, second and third attempt (N is fixed to 3 and
MN speed is equal to 1.5 m/s) slightly improves when TD
decreases, as shown in Fig. 16. The relevant improvement in
terms of failure probability is negligible.
Finally, Fig. 17 shows the strong improvement of the
failure probabilities (PrF, PrF1, and PrF2) of the CARD/TAR
process when the MN speed decreases (N is fixed to 3 and
TD to 30 s). It is worth noting that, as expected, the
improvement of the performance of the process is mainly
due to the fact that PrF1 lowers when the average MN speed
decreases. In fact, in this case, the number of non-assisted
handovers lowers considerably, since the CARD/TAR
process is able to better follow the MN movement. Clearly,
similar improvements have been verified also in the dense
and medium coverage scenarios. We stress that the effect of
the MN speed is much stronger than the one of N and TD.
We can conclude that the proposed approach works very
well even in the sparse coverage scenario, under the
assumption that MN speed is not too high.
6. Conclusions
We considered a framework in which an administrative
domain provides wireless access by means of heterogeneous
radio technologies. In this scenario, we proposed an intra-
domain distributed CARD/TAR procedure based on L2
beacon listening, to (i) dynamically self-construct a local
map at each AR of the surrounding wireless coverage,
together with the relevant capabilities, and (ii) select the
most suitable access to the network.
A novelty of the PMM CARD approach is the use of
push-mode multicast transmissions. This enables the
discovery phase to be speeded up and the signalling burden
to be lowered in the steady phase; a quantitative analysis of
these performance figures is presented in [22].
Another important aspect is that the proposed CARD
procedure is also able to provide the TAR algorithm with
the necessary, updated information to drive network-
assisted handovers at layers 2 and 3, both intra and inter-
technology. This algorithm, used to select the best AR–
AP for handing over to, is based on a set of criteria
which includes bandwidth availability and received
power level. The procedure is generally valid for multi-
mode terminals. In particular, we considered the very
challenging situation of multi-mode terminals with a
single network interface turned on. To infer knowledge
about the wireless coverage offered by the RATs
different from the one currently active on MNs, we
introduced a statistical parameter within the TAR metric
which is the probability to execute a successful inter-
technology handover.
D. Di Sorte et al. / Computer Communications 29 (2006) 337–357 357
We analysed the performance in terms of handover
success and failure probability of the CARD/TAR pro-
cedure by simulations. In particular, we have verified that
the procedure is very effective when the size of the
overlapping coverage areas among APs is considerable. In
this case, most of handovers are driven by our CARD/TAR
procedure, and inter-technology handovers, which are
clearly the critical ones, are not that frequent. The
probability of failure of inter-technology handover attempts
is sufficiently low and it does not significantly affect the
failure probability of the CARD/TAR process. In addition,
when the average speed of MNs is limited, we have shown
that the proposed approach works very well even in a sparse
coverage scenario.
Note that inter-technology handovers are generally
highly power consuming and potentially critical when
real-time services are supported. We stress that this
criticality is mainly due to the fact that the selection
procedure is blind and failures may occur. It is clear that, if
multi-mode terminals are allowed to simultaneously scan
for beacons on all network interfaces, the procedure is no
longer “blind”, and failures would be avoided. Note that the
intrinsic CARD/TAR characteristics (quick self-construc-
tion of coverage mapping, effective capability exchange,
load balancing) would remain unaltered. The price to pay
would be an increased complexity and power consumption
in terminals.
Acknowledgements
The authors would like to thank the anonymous referees
for their suggestions and comments that have improved the
quality of the paper. This work was performed under co-
financing by the Italian Ministry of Education, University,
and Research (MIUR) within the FIRB project PRIMO.
References
[1] J. Manner, M. Kojo, Mobility related terminology, IETF RFC 3753,
June, 2004.
[2] M. Liebsch, Candidate access router discovery, Internet draft,
September, 2004.
[3] J. Loughney, M. Nakhjiri, C. Perkins, R. Koodli, Context transfer
protocol, Internet draft, August, 2004.
[4] J. Kempf, Problem description: reasons for performing context
transfers between nodes in an IP access network, IETF RFC 3374,
September, 2002.
[5] C. Perkins, IP mobility support for IPv4, IETF RFC 3344, August,
3344, 2002.
[6] D.B. Johnson, C.E. Perkins, Mobility support in IPv6, MobiCom’96,
Rye, NY, USA, 1996.
[7] A.T. Campbell, J. Gomez, K. Sanghyo, C. Wan, Z.R. Turanyi,
A.G. Valko, Comparison of IP micromobility protocols, IEEE
Wireless Communications, February, 2002.
[8] D. Funato, X. He, C. Williams, A. Takeshita, M.D. Ali, J. Nakfour,
Geographically adjacent access router discovery protocol, Internet
draft, June, 2002.
[9] D. Trossen, G. Krishnamurthi, H. Chaskar, R.C. Chalmers, E. Shim, A
dynamic protocol for candidate access-router discovery, Internet
draft, March, 2003.
[10] R. Koodli, Fast handovers for mobile IPv6, Internet draft, October,
2004.
[11] K. El Malki, et al., Low latency handoffs in mobile IPv4, Internet
draft, June, 2004.
[12] T. Camp, J. Boleng, V. Davies, A survey of mobility models for ad
hoc network research, Wireless Communication and Mobile
Computing (WCMC) 2 (5) (2002) 483–502.
[13] E. Shim, J.P. Redlich, R.D. Gitlin, Secure candidate access router
discovery, IEEE Wireless Communications and Networking Con-
ference (IEEE WCNC), New Orleans, USA, March, 2003.
[14] IETF MSEC WG Homepage, http://www.ietf.org/html.charters/msec-
charter.html.
[15] S. Glass, T. Hiller, S. Jacobs, C. Perkins, Mobile IP authentication,
authorization, and accounting requirements, IETF RFC 2977,
October, 2000.
[16] C.E. Perkins, P.R. Calhoun, AAA registration keys for mobile IPv4,
Internet draft, October, 2003.
[17] G.P. Pollini, Trends in hand-over design, IEEE Communications
Magazine, March, 1996.
[18] P.M.L. Chan, R.E. Sheriff, Y.F. Hu, P. Conforto, C. Tocci, Mobility
management incorporating fuzzy logic for a heterogeneous IP
environment, IEEE Communications Magazine, December, 2001.
[19] K. Pahlavan, et al., Handoff in hybrid mobile data networks, IEEE
Personal Communications 7 (2) (2000).
[20] N.D. Tripathi, Generic adaptive handoff algorithms using fuzzy logic
and neural networks, PhD Thesis, Virginia Polytechnic Institute and
State University, 1997.
[21] W. Zhang, J. Jahnert, K. Dolzer, Design and evaluation of a hand-over
decision strategy for 4th generation mobile networks, IEEE Vehicular
Technology Conference, Jeju, Korea, 2003.
[22] N. Blefari-Melazzi, D. Di Sorte, M. Femminella, L. Piacentini, G.
Reali, Performance evaluation of a multicast-based solution for
wireless resources discovery, IEEE International conference on
Communications, Seoul, Korea, May 2005.
[23] R. Atkinson, S. Kent, Security Architecture for the Internet Protocol,
IETF RFC 2401, Nov, 1998.
[24] NS Web-site: http://www.isi.edu/nsnam/ns/.