Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
3Activity

Table Of Contents

Chapter 1. Introduction
1.1. Motivation
1.2.1. Requirements from user’s perspective
1.2.2. Requirements from network’s perspective
1.2.3. Requirements from service’s perspective
1.3. Issues to be resolved to achieve seamless roaming
1.4. Objective of thesis
1.5. Methodology
1.6. Outline
2.1. Evolution of cellular and wireless networks
2.1.1. Roadway for cellular networks
2.1.1.1. 1G
2.1.1.2. 2G
2.1.1.3. 2.5G
2.1.1.4. 3G
2.1.2. Pre 4G
2.2. Wireless technologies evolution
2.2.1. WLAN
2.2.2. WIMAX
2.2.3. Broadband networks (IEEE 802.20
2.2.4. IEEE 802.22
Broadband networks (IEEE 802.20)
2.3. 4G networks
2.3.1. Motivations for 4G networking
2.3.2. 4G networking
2.4. Interworking in 4G networks
2.4.1. Loose coupled architecture
2.4.1.1. Intra-3GPP network mobility solution
2.4.2. Tight coupled architecture
2.4.3. Interworking through 3GPP
2.4.3.1. UMA Release 6 [21]
2.4.3.2. I-WLAN interworking Architecture
2.4.3.3. I-WLAN Evolution: Release 7 [22]
2.4.4. SSCAN
2.4.5. MIH IEEE 802.21
2.4.5.1. MIH Architecture
2.4.6. ETSI TI SPAN
2.4.7. 3GPP LTE evolution architecture
2.5. Handover and roaming mechanisms
2.5.1. Handover Management
2.5.1.1. Cell discovery & Measurement
2.5.1.2. Network selection and Handover decision
2.5.1.3. Handover execution
2.5.2. Security in Wireless and cellular networks
2.5.2.1. Security solutions for today’s 802.11 WLAN
a. IEEE 802.1X Port Based Network Access Control:
2.5.2.2. Security Solutions for WIMAX
2.5.2.3. GSM Security
Figure 16. VSGSN and HGGSN using Inter PLMN Backbone
Figure 17. VSGSN and VGGSN using VPLMN Intra GPRS Backbone
2.5.3. Mobility management
2.5.3.1. Mobility at Layer 2
2.5.3.2. Mobility at layer 3
a. MIPV4
b. MIPv6
c. Network Based Mobility
2.5.3.3. Macro Mobility
a. Hierarchical MIPv6
b. Fast handover MIPv6 (FMIPv6)
2.5.3.4. Micro mobility
a. IDMP
c. HAWAII
2.5.3.5. MOBIKE
2.5.3.6. Management through upper layer
2.5.4. Handover triggering mechanisms
2.6. Summary
Chapter 3. Seamless Roaming Architecture
3.1. Introduction
3.2. Proposed RII Architecture
3.2.1. Global RII
3.2.5.1. Network Selection
3.2.5.2. Handover management
3.2.6. Security Management
3.2.6.1. Mobility management
3.2.6.2. QoS Management
3.2.6.3. Presence Management
3.2.7. Interworking models
3.2.7.1. Tight coupled architecture
3.2.7.2. Loose coupled architecture
3.3. Interworking through WLAN, WIMAX and 3G
3.3.1.1. Handover from UTRAN to WLAN AN
3.3.1.2. Handover from WLAN AN to UTRAN
3.3.2.2. Handover from WLAN AN to UTRAN
3.4. Testbed implementation and Results
3.4.1. Introduction
3.4.2. Testbed Scenarios and Services
3.4.3. Testbed description
3.4.3.1. Cellular Networks
3.4.3.2. WLAN Network (WISP Operator)
3.4.3.3. WIMAX Access Network
3.4.3.4. SIP Server Architecture:
3.4.4. Testing
3.5. SLA and Network Management
Screenshot of UE equipped with WLAN, WIMAX and Cellular network
SLA and Network Management
3.5.1. Policy Management
3.5.2. User Policy Management
3.5.3. Network operator management
3.5.4. SLA Management
3.5.5. Database Management
3.5.5.1. User Database
3.5.5.2. Operator SLA database in the RII architecture
3.6. Comparisons
3.7. Summary
4.1. Security Authentication
4.1.1. Authentication using Global RI user identity
4.2. Mobility management
4.2.1.1. Overview of the solution
4.2.1.2. AAA mobility extensions for PMIP integrated architecture
4.2.1.3. PMIP operation with new mobility extensions in MPA and HA
4.2.2.1. Mobility Registration
4.2.2.2. Registration Revocation
4.2.2.3. ARP, Proxy ARP and Gratuitous ARP
4.2.2.4. Back to home network
4.2.4. Macro Mobility
4.2.4.1. User mobility from one technology to another access technology
4.2.4.2. User terminal roaming from one operator network to another
4.2.5. Micro Mobility
4.2.7.2. AAA Mobility extension and PMIP packet formats
4.2.8. Testbed Setup
4.2.9. Results
4.2.10. Comparisons with existing mobility models and
4.2.10.1. Comparison with existing mobility models
4.2.10.2. Issues of IPv6 migrations
4.3. Summary
5.1. Introduction
5.2. Network Selection Management
5.2.1. Location identification
5.2.2. GIS model
5.2.3. User Mobility Prediction Model
5.2.4. Network Selection Algorithm
5.2.5. Network selection procedure in mobile terminal
5.2.6. Network selection procedure in Access networks
5.3. Security Management
5.3.1. Security context mechanisms
5.3.2. Authentication procedures in mobile terminal
5.3.2.1. During initial access:
5.3.2.2. SC management during handover in mobile terminal:
5.3.3. Authentication procedures in access networks
5.3.4. Message exchanges between different components
5.4. HO Management
5.4.1. HO management during initial access in mobile
5.4.2. HO management during handover in mobile
5.4.3. HO management in Access networks
5.5. Mobility Management
5.5.1. MM during initial access in mobile terminal:
5.5.2. MM during handover and roaming in mobile
5.5.3. MM access networks:
5.5.3.1. Client Mobile IP
5.5.3.2. Proxy Mobile IP
5.6. QoS and Presence Management
5.7. EAP Handover Extensions
5.8. Radius Roaming extensions
5.8.1. AAA NS extension
5.8.2. AAA SC extensions
5.8.3. Radius HO extension:
5.8.4. Mobility Request format:
5.9. TESTBED
5.9.1. WIMAX network domain
Chapter 6. Conclusions
6.1.1. Future Work
References
Annex A. WIMAX Study
A.1. Introduction
A.3. Architecture
A.3.1. Security in WIMAX Access Networks
A.3.2. Security in WLAN Access network
A.3.3. WIMAX Mesh Network
A.3.5. Network Operator and User perspectives
A.4. Testbed – Setup, Results
A.4.1. Testbed Setup
A.4.2. Results
A.5. Case Study – applicability
A.6. Video on demand using WIMAX networks
A.7. Multimedia streaming parameters
A.8. Settings
A.9. Results
Figure 92. CPE through put with the highest priority
A.10. Summary
Annex B. Abbreviations
Annex C. Publications
C.1. Journals
C.2. Book Chapters
C.3. Conferences and Workshops
C.4. Short papers and Posters
C.5. IETF RFC Proposals
C.6. Project Deliverables
C.7. Under Review
0 of .
Results for:
No results containing your search query
P. 1
200903Gondi-thesis

200903Gondi-thesis

Ratings: (0)|Views: 384 |Likes:
Published by Muhammad Ali

More info:

Published by: Muhammad Ali on Jan 20, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/27/2012

pdf

text

original

You're Reading a Free Preview
Pages 5 to 80 are not shown in this preview.
You're Reading a Free Preview
Pages 85 to 118 are not shown in this preview.
You're Reading a Free Preview
Pages 123 to 141 are not shown in this preview.
You're Reading a Free Preview
Pages 146 to 184 are not shown in this preview.
You're Reading a Free Preview
Pages 189 to 221 are not shown in this preview.

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->