研究生: |
劉宗樺 Liu, Zong-Hua |
---|---|
論文名稱: |
SIP-BASED MOBILE VPN AND MOBILITY MANAGEMENT IN WiMAX NETWORKS 以SIP為基礎之移動式虛擬私有網路與WiMAX網路之移動管理 |
指導教授: |
陳志成
Chen, Jyh-Cheng |
口試委員: | |
學位類別: |
博士 Doctor |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2010 |
畢業學年度: | 98 |
語文別: | 英文 |
論文頁數: | 72 |
中文關鍵詞: | SIP協定 、移動式虛擬私有網路 、移動管理 、全球互通微波存取網路 、允入控制 、統計與隨機程序 、無線網路 、效能分析 |
外文關鍵詞: | SIP protocol, mobile VPN, mobility management, WiMAX networks, admission control, statistics and stochastic process, wireless networks, performance analysis |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
In this thesis, we focus on two critical issues in all-IP wireless networks: mobile virtual private networks and mobility management in WiMAX networks.
We first study the IETF’s mobile virtual private network(MVPN) and propose an alternative SIP-based MVPN. Because the proposed architecture is based on SIP, the problems inherited from Mobile IP are not problems in our architecture. In addition, there is no need to tunnel a packet three times as that in IETF MVPN. In this thesis, we also propose analytical models to evaluate and compare the performance of the proposed SIP-based MVPN with the IETF MVPN. The results show that the proposed SIP-based MVPN can reduce packet delivery cost significantly. It is especially suitable for real-time applications.
Mobility management is a critical issue for wireless networks, especially for highspeed data transmissions in next-generation wireless systems. WiMAX forum is developing and standardizing the WiMAX Forum Network Architecture, which is regarded as one of the next-generation wireless networks. In the architecture, WiMAX Forum has defined a twotiered mobility management to reduce handover delay and avoid service disruption. However, it leads to another problem: when to perform ASN GWrelocation? The standards only define the ASN GWrelocation procedures without specifying when the ASN GWrelocation should be performed. It is left for vendors and operators to develop their own proprietary solutions. In this thesis, we propose an algorithm which incorporates traditional admission control algorithms and Wiener Process to determine when to carry out ASN GW relocation. We further develop an analytical model to analyze the proposed algorithm. Simulations are also conducted to evaluate the performance of the proposed algorithm. The results show that the proposed algorithm can improve the performance significantly in terms of blocking probability, dropping probability, average serving rate, and average signaling overhead.
在本論文中,我們將探討全IP無線網路中的關鍵性議題:移動式虛擬私有網路與WiMAX網路之移動管理。
首先,我們研究由IETF所提出的移動式虛擬私有網路(MVPN),並且提出以SIP為基礎的MVPN (SIP-based MVPN)為替代方案。由於所提出的架構是以SIP為基礎,原本由Mobile IP所衍生的問題將不存在於本系統之中。另外,在IETF MVPN中,傳送封包需要經過三次Tunneling,本方法則不需要。在本論文中,我們也提出分析架構,並且檢視與比較SIP-based MVPN與IETF MVPN的網路效能。實驗結果顯示我們所提出的SIP-based MVPM可以顯著地降低封包傳遞成本。尤其是針對即時性的應用,本方法特別適合。
在無線網路中,移動管理是另一個重要問題,尤其是針對下一代無線系統的高速資料傳輸。全球互通微波存取(WiMAX)討論會正在發展被視為下一代無線通訊網路,稱之為WiMAX Forum Network Architecture,並且制定相關標準。在此網路架構中,為了降低換手延遲和服務中斷,WiMAX討論會定義了兩階層的移動管理機制。然而,此移動機制卻產生另一個問題:何時啟動Access Service Network閘道器(ASN GW)的置換?標準文件只有定義ASN GW置換的程序但沒有說明何時啟動。此問題留待製造商或系統業者發展專屬的方法。在本論文中,我們提出演算法,透過整合傳統的允入控制和Wiener Process來決定何時啟動ASN GW置換程序。我們更進一步提出分析模型來分析所提出的方法,並且建構多種模擬來檢視演算法的效能。結果顯示所提出的方法明顯地改善了使用者被阻塞或中斷的機率、平均服務率及平均訊號成本負擔等效能指標。
[1] S. Vaarala and E. Klovning, “Mobile IPv4 traversal across IPsec-based VPN gateways.” IETF RFC 5265, June 2008.
[2] F. Adrangi and H. Levkowetz, “Problem statement: mobile IPv4 traversal of VPN gateways.” IETF RFC 4093, Aug. 2005.
[3] S.-C. Huang, Z.-H. Liu, and J.-C. Chen, “SIP-based mobile VPN for real-time applications,” in Proc. of IEEE Wireless Communications and Networking Conference, (New
Orleans, LA), pp. 2318–2323, Mar. 2005.
[4] Y.-W. Liu, J.-C. Chen, and L.-W. Lin, “Dynamic external home agent assignment in mobile VPN,” in Proc. of IEEE Vehicular Technology Conference, (Los Angles, CA), pp. 3281–3285, Sept. 2004.
[5] J.-C. Chen, Y.-W. Liu, and L.-W. Lin, “Mobile virtual private networks with dynamic MIP home agent assignment,” Wireless Communications and Mobile Computing, Wiley, vol. 6, pp. 601–616, Aug. 2006.
[6] J.-C. Chen, J.-C. Liang, S.-T. Wang, S.-Y. Pan, Y.-S. Chen, and Y.-Y. Chen, “Fast handoff in mobile virtual private networks,” in Proc. of IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM ’06), (Buffalo, NY), pp. 548–552, June 2006.
[7] A. Dutta, T. Zhang, S. Madhani, K. Taniuchi, K. Fujimoto, Y. Katsube, Y. Ohba, and H. Schulzrinne, “Secure universal mobility for wireless internet,” ACM Mobile Computing and Communications Review, vol. 9, pp. 45–57, July 2005.
[8] J.-C. Chen and T. Zhang, IP-Based Next-Generation Wireless Networks. Wiley, Jan. 2004. http://www.cs.nthu.edu.tw/˜jcchen/book.html.
[9] D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, S. Ehert, and D. Sisalem, “Survey of security vulnerabilities in Session Initiation Protocol,”IEEE Commun. Surveys Tuts., vol. 8, no. 3, pp. 68–81, 2006.
[10] D. Sisalem, J. Kuthan, and S. Ehlert, “Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms,” vol. 20, no. 5, pp. 26–31, 2006.
[11] S. Salsano, L. Veltri, and D. Papalilo, “SIP security issues: The SIP authentication procedure and its processing load,” vol. 16, pp. 38–44, Nov. 2002.
[12] D. Geneiatakis, G. Kambourakis, C. Lambrinoudakis, T. Dagiuklas, and S. Gritzalis,“A framework for protecting a SIP-based infrastructure against malformed message attacks,” Computer Networks, Elsevier, vol. 51, pp. 2580–2593, July 2007.
[13] D. Geneiatakis and C. Lambrinoudakis, “An ontology description for SIP security flaws,” Computer Communications, Elsevier, vol. 30, pp. 1367–1374, Mar. 2007.
[14] J. Xie and I. F. Akyildiz, “A novel distributed dynamic location management scheme for minimizing signaling costs in Mobile IP,” IEEE Trans. Mobile Comput., vol. 1, no. 3, pp. 163–175, 2002.
[15] W. Ma and Y. Fang, “Dynamic hierarchical mobility management strategy for mobile IP networks,” IEEE J. Sel. Areas Commun., vol. 22, pp. 664–676, May 2004.
[16] R. Rummler, Y. W. Chung, and A. H. Aghvami, “Modeling and analysis of an efficient multicast mechanism for UMTS,” IEEE Trans. Veh. Technol., vol. 54, pp. 350–365, Jan. 2005.
[17] S. Fu, M. Atiquzzaman, L. Ma, and Y.-J. Lee, “Signaling cost and performance of SIGMA: A seamless handover scheme for data networks,” Wireless Communications and Mobile Computing, Wiley, vol. 5, pp. 825–845, Nov. 2005.
[18] L. Kleinrock, Queueing Systems. Volume 1: Theory. Wiley, 1975.
[19] Y.-B. Lin, “Reducing location update cost in a PCS network,” IEEE/ACM Trans. Netw., vol. 5, pp. 25–33, Feb. 1997.
[20] “Air interface for fixed broadband wireless access systems,” Oct. 2004.
[21] “Part 16: air interface for fixed and mobile broadband wireless access systemsamendment 2: physical and medium access control layers for combined fixed and mobile
operation in licensed bands,” Feb. 2006.
[22] “WiMAX forum.” http://www.wimaxforum.org/home/.
[23] “WiMAX forum network architecture (Stage 2: architecture tenets, reference model and reference points),” Feb. 2009.
[24] “WiMAX forum network architecture (Stage 3: detailed protocols and procedures),” Feb. 2009.
[25] K. Etemad, “Overview of mobile WiMAX technology and evolution,” IEEE Commun. Mag., vol. 46, pp. 31–40, Oct. 2008.
[26] L. Nuaymi, WiMAX: technology for broadband wireless access. John Wiley, 2007.
[27] Z.-H. Liu, S.-Y. Pan, and J.-C. Chen, “Access service network (asn) gateway relocation algorithms in WiMAX networks,” in Proc. of IEEE International Conference on Communications (ICC), pp. 2674–2679, May 19–23, 2008.
[28] Y. Fang and Y. Zhang, “Call admission control schemes and performance analysis in wirelessmobile networks,” IEEE Trans. Veh. Technol., vol. 51, pp. 371–382,Mar. 2002.
[29] D. Hong and S. S. Rappaport, “Traffic model and performance analysis for cellular mobile radio telephone systems with prioritized and nonprioritized handoff procedures,”IEEE Trans. Veh. Technol., vol. 35, pp. 77–92, Aug. 1986.
[30] Y.-B. Lin, S.Mohan, and A. Noerpel, “Queueing priority channel assignment strategies for PCS hand-off and initial access,” IEEE Trans. Veh. Technol., vol. 43, pp. 704–712,
Mar. 1994.
[31] B. Li, S. T. Chanson, and C. Lin, “Analysis of a hybrid cutoff priority scheme for multiple classes of traffic in multimedia wireless networks,” Wirel. Netw., vol. 4, no. 4, pp. 279–290, 1998.
[32] R. Ramjee, D. Towsley, and R. Nagarajan, “On optimal call admission control in cellular networks,” Wirel. Netw., vol. 3, no. 1, pp. 29–41, 1997.
[33] M. D. Kulavaratharasah and A. H. Aghvami, “Teletraffic performance evaluation of microcellular personal communication networks (PCN’s) with prioritized handoff procedures,”IEEE Trans. Veh. Technol., vol. 48, no. 1, pp. 137–152, 1999.
[34] R. Garg and H. Saran, “Fair bandwidth sharing among virtual networks: a capacity resizing approach,” in Proc. of IEEE INFOCOM, pp. 255–264, Mar. 26–30, 2000.
[35] J. Yao, J. W. Mark, T. C. Wong, Y. H. Chew, K. M. Lye, and K.-C. Chua, “Virtual partitioning resource allocation for multiclass traffic in cellular systems with QoS constraints,” IEEE Trans. Veh. Technol., vol. 53, pp. 847–864, May 2004.
[36] S. C. Borst and D. Mitra, “Virtual partitioning for robust resource sharing: computational techniques for heterogeneous traffic,” IEEE J. Sel. Areas Commun., vol. 16, pp. 668–678, June 1998.
[37] J. C. Hull, Options, Futures, and Other derivatives. Prentice-Hall, 2000.
[38] A.-C. Pang, Y.-B. Lin, H.-M. Tsai, and P. Agrawal, “Serving radio network controller relocation for UMTS all-IP network,” IEEE J. Sel. Areas Commun., vol. 22, pp. 617–
629, May 2004.
[39] S. Pack, T. Kwon, and Y. Choi, “A mobility-based load control scheme at mobility anchor point in hierarchical mobile IPv6 networks,” in Proc. of IEEE GLOBECOM, pp. 3431–3435, Nov. 29–Dec. 3, 2004.
[40] J. P. Jue and D. Ghosal, “Design and analysis of a replicated server architecture for supporting IP-host mobility,” Cluster Computing, vol. 1, no. 2, pp. 249–260, 1998.
[41] A. Vasilache, J. Li, and H. Kameda, “Threshold-based load balancing for multiple home agents in mobile IP networks,” Telecommunication Systems, vol. 22, pp. 11–31,
Apr. 2003.
[42] H. Deng, X. Huang, K. Zhang, Z. Niu, and M. Ojima, “A hybrid load balance mechanism for distributed home agents in mobile IPv6,” in Proc. of IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 2842–2846, Sept. 7–10, 2003.
[43] P. J. Brockwell and R. A. Davis, Time Series: Theory and Methods. Springer Verlag, 1991.
[44] “The network simulator - ns-2.” http://www.isi.edu/nsnam/ns/.