Professional Documents
Culture Documents
Research Article
Performance Evaluation of Distributed Mobility
Management Protocols: Limitations and Solutions for
Future Mobile Networks
Copyright © 2017 J. Carmona-Murillo et al. This is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly
cited.
Mobile Internet data traffic has experienced an exponential growth over the last few years due to the rise of demanding multimedia
content and the increasing number of mobile devices. Seamless mobility support at the IP level is envisioned as a key architectural
requirement in order to deal with the ever-increasing demand for data and to efficiently utilize a plethora of different wireless
access networks. Current efforts from both industry and academia aim to evolve the mobility management protocols towards
a more distributed operation to tackle shortcomings of fully centralized approaches. However, distributed solutions face several
challenges that can result in lower performance which might affect real-time and multimedia applications. In this paper, we conduct
an analytical and simulated evaluation of the main centralized and proposed Distributed Mobility Management (DMM) solutions.
Our results show that, in some scenarios, when users move at high speed and/or when the mobile node is running long-lasting
applications, the DMM approaches incur high signaling cost and long handover latency.
point of failure [5]. With these limitations, the IETF has the communication peer, the Correspondent Node (CN). A
recently proposed the Distributed Mobility Management Home Agent (HA) serves as the anchor node in the HN that
(DMM) paradigm, which can be deemed as a novel and tracks the network connection point (location) of a user as
promising approach to handle mobility [6]. In DMM, the core the user moves. Periodically, or whenever the MN changes
idea is that the mobility anchors are distributed within the its point of attachment to the network, the MN registers a
network, topologically closer to the users, with the aim of new care-of-address (CoA) with the HA through Binding
providing almost optimal routing support and an efficient use Update (BU) messages, informing of its current location and
of network resources to improve the scalability required for establishing a tunnel between the HA and the MN located in
next generation mobile networks [7]. a visited network. In MIPv6, the HA is the centralized part of
However, despite the fact that a number of mobility the system since it is on the critical path of both signaling and
management approaches are being designed towards a more data forwarding for mobile users.
distributed operation aiming to mitigate problems related to For its part, PMIPv6 has been standardized as an exten-
centralized operation, there are instances where DMM incurs sion to MIPv6. PMIPv6 introduces two network entities,
higher costs and the performance of the network might be namely, the Local Mobility Anchor (LMA) and the Mobile
compromised. Access Gateway (MAG). The former is the home agent for
In this article, we develop an analytical framework that the MN in a PMIPv6 domain, where the mobility is managed
allows the evaluation and comparison of mobility protocols by PMIPv6. The latter is an access router (AR) that manages
in order to identify the benefits and limitations of the DMM the mobility-related signaling for an MN that is attached to
paradigm. This analytical model is an extension of our it. When a handover occurs from one MAG to another, the
previous work [8], adding many refinements and extensions binding is updated at the LMA by means of Proxy Binding
to achieve a unified model which can evaluate both central- Update (PBU) and Proxy Binding Acknowledgment (PBA)
ized and distributed mobility protocols in terms of mobility messages. In this procedure, the LMA updates the associated
costs and handover performance. Additionally, the proposed Binding Cache Entry, which contains, among other informa-
model uses a new parameter, namely, Mobility Anchor Load tion, the mobile node identifier, the Home Network prefix,
(MAL), which is defined as the current data generated by and the Proxy Care-of-Address (PCoA), which is the MAG’s
a mobile node (MN) to the number of mobility anchors address according to where the MN is currently attached.
associated with the MN, to observe the average load of each Once the MN is registered, the LMA is its topological anchor
of the different anchors distributed across the network. We point for the IPv6 prefix that is uniquely assigned to the MN
consider MIPv6 and PMIPv6 as two main representatives (Home Network Prefix). As a result of the registration, an
for the centralized mobility management paradigm and IP bidirectional tunnel is created between the LMA and the
Host-Based DMM [9], Network-Based DMM [10], and our MAG, so mobility is provided in a transparent way to the user.
DM3 (Distributed Mobility Management MPLS) proposal This operation of PMIPv6 is shown in Figure 2.
[8] as the distributed schemes. In addition to the analytical
evaluation, the model is validated through simulation. Our
numerical results demonstrate that there are instances where 2.2. Distributed Mobility Management. As briefly alluded to
DMM incurs higher signaling costs and longer handover above, CMM requires a single handed mobility anchor, for
latency than CMM protocols, which can compromise the example, HA at MIPv6 and LMA at PMIPv6, to allow for
performance of the network. These situations are those in session continuity when MNs are moving across different
which users are moving at a high speed and the MN is networks. Nowadays, most of the deployed architectures,
running long-lasting applications. Even under these condi- such as 3GPP networks, have a small number of centralized
tions, our DMM solution mitigates the limitations of DMM anchors managing the traffic of thousands of mobile users.
approaches and generally outperforms both the centralized These centralized approaches have certain limitations for
and the distributed schemes. handling a large volume of mobile data traffic such as nonop-
The rest of the paper is organized as follows. In Section 2, timal routing, scalability problems, and reliability/robustness
we briefly present background information about centralized [5]. In order to address these limitations, a new paradigm has
and Distributed Mobility Management protocols. Then, Sec- been recently proposed which has gained attention: the so-
tion 3 describes the analytical model used to compare CMM called Distributed Mobility Management. In essence, DMM
and DMM solutions. The results of the numerical analysis are develops a new concept for handling mobility, with the
given in Section 4 and Section 5 presents the performance main characteristics being that the anchors are placed closer
evaluation through simulation. Finally, Section 6 concludes (topologically) to the user, distributing the control and data
the paper. plane mobility functions among entities located at different
places in the core/access network.
A representative proposal of a DMM solution which
2. Background is based on Mobile IPv6 is detailed in [9] (Host-Based
DMM, HB-DMM). In this work, the authors attempt to
2.1. Centralized Mobility Management. In order to enable improve the performance of mobility support by extending
seamless mobility in MIPv6 [11] (see Figure 1), the mobile the MIPv6’s HA to the AMA (Access Mobility Anchor),
node (MN) is assigned with a permanent home address in which is a new mobility anchor defined for the proposed
its Home Network (HN) and establishes a connection with Host-Based DMM approach. These AMAs are distributed at
Mobile Information Systems 3
Binding cache
MN anchored
ID HoA CoA
at PrefH::/64
HA
MN1 PrefH::MN1 PrefB::MN1
Correspondent node
AR3
IP-IP tunnel
Internet
Care-of-address Care-of-address
obtained in visited obtained in visited
network 1 and network 2 and
offered by AR1 offered by AR2
AR1 AR2
BS2
CoA1 BS1 CoA2
Move
Home Home
address MN uses PrefH::MN as address
MN1 home address during the
complete session
PrefA::/64 PrefB::/64
Binding cache
MN anchored
at PrefH::/64 LMA ID Prefix PCoA
Correspondent MN1 PrefH::MN1 MAG2
node
AR3
IP-IP tunnel
Localized
Proxy mobility Proxy
CoA1 domain CoA2
Proxy care-of-
address obtained in Proxy care-of-address
visited network 1 AR1/ AR2/ obtained in visited
MAG1 MAG2 network 2
BS1 BS2
Move
Home Home
address MN uses PrefH::MN as address
home address during the
MN1
complete session
PrefA::/64 PrefB::/64
Internet CN2
IP-IP tunnel
AMA1
AMA2
Care-of-address
obtained in the first Care-of-address
visited network 1 obtained in the
and offered by AR1 second visited
PrefB::/64 network and
offered by AR2
CoA1 = PrefA::mn1/64
BS1 BS2
Home address Move CoA2 = PrefB::mn1/64
CoA1 = PrefA::mn1/64
MN1 PrefA::/64 Home address
the edge of the access network level and the MN configures of the MN in the mobility signaling, the architecture is
its address based on the provided network prefix from the partially distributed and relies on a centralized database
AMA. When an MN moves to an adjacent access network, (Mobility Context DB). This DB stores ongoing sessions for
served by another AMA, a new address is configured in the the MNs. Thus, upon a handover, the new MAR retrieves the
MN based on the network prefix obtained at the new access IP addresses of the anchoring MAR(s) for the MN’s sessions
network, while it keeps the previous address. As a result of from the database. Then, the new MAR proceeds to update
the signaling between the serving AMA and the origin AMA, the location by sending a PBU to each anchoring MAR. The
a bidirectional tunnel is created between them. As depicted basic operation of NB-DMM is depicted in Figure 4.
in Figure 3, this solution creates multiple tunnels between Additionally, we introduce DM3 [8]. This solution relies
AMAs and, in cases where a high mobility rate exists, the on a distributed architecture that is based on Mobile IPv6. The
system performance might be critically compromised by the aim is to achieve efficient and flexible mobility management
frequent registrations and maintenance of multiple tunnels. with QoS support taking advantage of both new Distributed
Network-Based DMM (NB-DMM) [10] is a Distributed Mobility Management approach and MPLS (Multiprotocol
Mobility Management approach that has in common with Label Switching) features. HB-DMM and NB-DMM propos-
PMIPv6 the fact that it is network-based; that is, it exempts als can suffer both tunnelling and signaling overhead in an
the MN from participating in any mobility signaling, so no environment where the mobile user moves frequently and
network software upgrade is required at the MN for mobility creates new sessions during its movements. In that case,
support because distributed mobility anchors perform mobil- HB-DMM and NB-DMM establish an excessive number of
ity signaling on behalf of the MN. In NB-DMM, the mobility tunnels that could make the solution inefficient. To provide
management functionalities are moved to the access routers more flexibility to the architecture, distributed anchor nodes
level in order to anchor the traffic closer to the MN. Each in DM3, called Mobility Distributed Anchors (MDA), can be
AR is required to have both mobility anchoring and location located in different places in the access network, in particular,
functionalities, and it is referred to as a mobility capable not necessarily in the edge of the network. Thus, an MN will
access router (MAR). In NB-DMM, a new session is anchored be anchored to a MDA when it ingresses the visited network.
at the current AR and initiated using the current IPv6 address. When a handover occurs, only the path from the MDA to
When a handover occurs before the end of the session, then the new AR will be modified and the data packets will be
the data traffic of this session is tunnelled between the current forwarded to the MN through the MDA. This way, the path is
MAR and the anchoring MAR for this session. In order to composed of a set of forwarding paths that will adapt to track
achieve a network-based solution without the participation host mobility and localize signaling in an area close to the
Mobile Information Systems 5
Mobility
CN1 MAR2’s binding cache
context DB
Address Status MA Tunnel
CN2
HNP1::/64 HNP2::/64
MN1
BS2
BS1
HNP1::MN1 Move
HNP2::MN2
location of the MN. Figure 5 illustrates an overview of DM3 For the purpose of offering a complete analysis, we
solution. compare these metrics in both distributed (HB-DMM, NB-
There have been some works evaluating the performance DMM, and DM3) and centralized (MIPv6 and PMIPv6)
of DMM solutions and comparing them with centralized mobility solutions. The parameters used in the analysis are
approaches. Particularly comprehensive are [12, 13]. Both shown in the Notations.
highlight the advantages of DMM compared with centralized
solutions. In our work, we also consider a DMM solution, 3.1. Signaling Cost. As we have described previously, one of
DM3, which allows more flexible placement of anchor points, the main functionalities for any IP mobility management
and accordingly analyze the effect of user movement on the protocol is the process of ensuring that the MN’s mobility
performance of different mobility solutions. session is kept up to date while an MN moves among subnets.
Such tasks require control messages that need to be sent
Finally, other distributed solutions have been proposed
among the mobility agents in the network. In general, a
for Network Mobility (NEMO) instead of host mobility. These
mobility management protocol requires that an MN sends
NEMO proposals are out of the scope of this paper and are a location update to its mobility anchor whenever it moves
presented in detail in [14]. from one subnet to another. This location registration is
required even though the MN does not communicate with
3. Analytical Modelling others while moving. The signaling cost associated with
location updates may become very significant as the number
Mobility, by its own nature, affects both control and data of MNs increases.
plane in the communication. When an MN moves, new Moreover, this cost depends on the size of the signaling
signaling is introduced and a change in the routing path is messages and the number of hops in every level 3 handover
needed in order to deliver the data packets to the new location process during the time interval that the MN communication
of the MN. Moreover, mobility management protocols intro- remains active. Thus, we refer to the aggregate signaling cost
duce tunnelling as an inherent mechanism to offer seamless of registration update for a session as 𝐶𝑠 . In MIPv6 and
mobility to the user. Under this framework, in this section, PMIPv6 cases, the registration update is needed with the
we evaluate the parameters involved in mobility aspects, mobility anchor (HA or LMA). Hence,
such as the cost functions of traffic routing, registration 𝐶𝑠MIP = 2 ⋅ 𝑠𝑢 ⋅ ℎMN-HA ⋅ 𝑁ℎ
updates, tunnelling overhead, handover latency, packet loss, (1)
and Mobility Anchor Load. 𝐶𝑠PMIP = 2 ⋅ 𝑠pu ⋅ ℎMAG-LMA ⋅ 𝑁ℎ .
6 Mobile Information Systems
ILER
CN
MPLS tunnel
PELER
NELER
Data path
before MN’s
movement
MN
The distributed approaches, such as DM3, HB-DMM, and 3.2. Data Packet Delivery Cost. The total data packet delivery
NB-DMM, update their movements with the distributed cost for a session is defined as 𝐶PD . This value is influenced
anchor, located closer to the location of the mobile node. by the size of the data messages multiplied by the number of
In HB-DMM, the mobility anchor is called AMA and is hops needed to forward packets from the CN to the MN and
located in the access router so AMA is the first IP capable vice versa.
router for the MN. In this approach, when a mobile node In MIPv6 and PMIPv6, packets are routed from the CN
moves, it registers its movement to the serving AMA (sAMA) to the MN’s anchor, HA or LMA, respectively, and then
that establishes bidirectional tunnels with previous AMA(s) forwarded to the MN through a tunnel that encapsulates the
which the MN was connected to. A similar phenomenon data packets. Note that the packet delivery mode considered
occurs with NB-DMM, where, upon handover, the new MAR in MIPv6 is the bidirectional IP tunnelling, that is, without
retrieves the IP addresses of the anchoring MARs for the MN route optimization. Thus, the expressions that represent the
from the DB. The new MAR then registers the MN at all cost can be expressed as follows:
these MARs. Apart from signaling the mobility management
protocol, DM3 also adds the cost of LSP procedure setup. MIP
Let 𝑛 be the number of valid addresses configured at the 𝐶PD = (𝑠𝑑 ⋅ ℎCN-HA + (𝑠𝑡 + 𝑠𝑑 ) ⋅ ℎHA-MN ) ⋅ 𝜆 𝑡 ⋅ 𝑡𝑠
MN in HB-DMM and NB-DMM (𝑛 = number of handover PMIP
instances + 1); assuming that the MN performs its handover 𝐶PD = (𝑠𝑑 ⋅ ℎCN-LMA + (𝑠𝑡 + 𝑠𝑑 ) ⋅ ℎLMA-MAG + 𝑠𝑑 (3)
while maintaining the communication sessions, we obtain
⋅ ℎMAG-MN ) ⋅ 𝜆 𝑡 ⋅ 𝑡𝑠 .
the following values for the signaling cost in the distributed
solutions:
In HB-DMM and NB-DMM, when an MN moves,
𝐶𝑠DM3 = 2 ⋅ 𝑠𝑢 ⋅ ℎMN-MDA ⋅ 𝑁ℎ + 2 ⋅ 𝑠𝑙 ⋅ ℎMDA-NELER ⋅ 𝑁ℎ the traffic established in the new network will be routed
𝑛−1 directly to the CN whereas the remaining connections will
𝐶𝑠HB = [2 ⋅ 𝑠𝑢 ⋅ ℎMN-sAMA + ∑ 2 ⋅ 𝑠𝑢 ⋅ ℎAMA𝑖 -sAMA ] be tunnelled to the MN’s corresponding anchoring MAR and
𝑖=1 then routed to the CN. 𝐶PD in these distributed solutions is
⋅ 𝑁ℎ (2)
HB NB 𝑑 𝑖
𝐶PD = 𝐶PD = (𝑃𝑛 ⋅ 𝐶PD + 𝑃ℎ ⋅ 𝐶PD ) ⋅ 𝜆 𝑡 ⋅ 𝑡𝑠 , (4)
𝑛−1
𝐶𝑠NB = [2 ⋅ 𝑠pu ⋅ ℎAR-DB + ∑ (2 ⋅ spu ⋅ ℎMAR𝑖 -sMAR )]
𝑖=1
where 𝑃𝑛 and 𝑃ℎ are, respectively, the probabilities that traffic
𝑑 𝑖
⋅ 𝑁ℎ . is new or handover traffic. 𝑃PD and 𝑃PD are the units of cost
Mobile Information Systems 7
of delivering one packet in the direct and indirect modes of latency (𝑇reg ) depends on the security mechanisms which
DMM, respectively. Then, these costs are expressed as follows: are not necessarily coupled with the mobility protocol. For
fairness, we assume that both 𝑇MD and 𝑇sec are the same for
𝑑
𝐶PD = 𝑠𝑑 ⋅ ℎCN-sMAR + 𝑠𝑑 ⋅ ℎsMAR-MN all protocols. Thus, for handover latency, only the registration
delay (𝑇reg ) depends on the mobility protocol and its specific
𝑖
𝐶PD = 𝑠𝑑 ⋅ ℎCN-MAR + (𝑠𝑡 + 𝑠𝑑 ) ⋅ ℎMAR-sMAR + 𝑠𝑑 (5) procedures [10].
MIPv6 does not incorporate any buffering mechanism;
⋅ ℎsMAR-MN . thus, data packets sent from the CN to the MN will be lost
For its part, DM3 distributes mobility by means of MDA while the MN performs its handover. Let 𝜆 𝑡 be the packet
anchors in the access network, so data sent from the CN go transmission rate; hence, this cost can be expressed as follows:
to the MDA through the ILER and finally are delivered to the MIP
𝑃loss = 𝑇ℎMIP ⋅ 𝜆 𝑡 ⋅ 𝑁ℎ , (9)
MN. Hence, the value of packet delivery cost in DM3 is
DM3
where 𝑇ℎMIP represents the handover delay due to the mobility
𝐶PD = (𝑠𝑑 ⋅ ℎCN-ILER + (𝑠𝑚 + 𝑠𝑑 ) ⋅ ℎILER-MDA management mechanisms of MIPv6. 𝑇ℎMIP can be written as
(6)
+ (𝑠𝑚 + 𝑠𝑑 ) ⋅ ℎMDA-MN ) ⋅ 𝜆 𝑡 ⋅ 𝑡𝑠 . 𝑇ℎMIP = 2 ⋅ 𝑡 (𝑠𝑢 , ℎMN-HA ) . (10)
3.3. Tunnelling Cost. To achieve seamless mobility, all mobil- Thus, packet loss can be defined as
ity protocols use a tunnel to forward packets. The tunnelling MIP
𝑃loss = 2 ⋅ 𝑡 (s𝑢 , ℎMN-HA ) ⋅ 𝜆 𝑡 ⋅ 𝑁ℎ . (11)
cost metric represents the cost of adding tunnelling overheads
to the data packet delivery cost, so tunnelling cost (𝐶𝑡 ) can With respect to the packet loss in PMIPv6, the behavior
be derived from it by setting data packets size to zero, 𝑠𝑑 = is very similar to MIPv6, with the difference that the mobility
0. In MIPv6 and PMIPv6, the traffic is tunnelled from the bindings, necessary to configure the correct routing with the
centralized anchor to the MN or the MAG agent. Hence, mobility anchor, are sent from the MAG to the LMA instead
of from the MN. Hence, 𝑃loss
PMIP
can be expressed as follows:
𝐶𝑡MIP = 𝑠𝑡 ⋅ ℎHA-MN ⋅ 𝜆 𝑡 ⋅ 𝑡𝑠
PMIP
(7) 𝑃loss = 𝑇ℎPMIP ⋅ 𝜆 𝑡 ⋅ 𝑁ℎ , (12)
𝐶𝑡PMIP = 𝑠𝑡 ⋅ ℎLMA-MAG ⋅ 𝜆 𝑡 ⋅ 𝑡𝑠 .
where 𝑇ℎPMIP is
On the other hand, DMM solutions forward data traffic
through a tunnel among the anchors. In DM3, MPLS technol- 𝑇ℎPMIP = 2 ⋅ 𝑡 (𝑠pu , ℎMAG-LMA ) . (13)
ogy is used instead of IPv6 over IPv6 tunnels. The reasoning
behind the idea is that since a tunnel is needed, employing Thus, we have that packet loss in PMIPv6 is
a technology that natively supports tunnelling seems to be a PMIP
natural choice. Thus, 𝑃loss = 2 ⋅ 𝑡 (𝑠pu , ℎMAG-LMA ) ⋅ 𝜆 𝑡 ⋅ 𝑁ℎ . (14)
𝐶𝑡HB = 𝑠𝑡 ⋅ ℎAMA-sAMA ⋅ 𝜆 𝑡 ⋅ 𝑡𝑠 Finally, the handover latency and packet loss in the
distributed solutions (HB-DMM, NB-DMM, and DM3) are
𝐶𝑡NB = 𝑠𝑡 ⋅ ℎMAR-sMAR ⋅ 𝜆 𝑡 ⋅ 𝑡𝑠 (8) shown next. The distributed proposals require the serving
mobility anchor (MAR and MDA) to exchange simultane-
𝐶𝑡DM3 = (𝑠𝑙 ⋅ ℎILER-MDA + 𝑠𝑚 ⋅ ℎMDA-MN ) ⋅ 𝜆 𝑡 ⋅ 𝑡𝑠 . ously the binding signaling with all previous anchors (MAR𝑖
and MDA𝑖 ) that keep an active connection with the MN.
Thus, these metrics are expressed as follows:
3.4. Handover Latency and Packet Loss during a Session.
Another relevant metric for mobility management protocols 𝑇ℎHB = 2 ⋅ 𝑡 (𝑠𝑢 , ℎMN-AMA )
is the amount of packets lost during a session (𝑃loss ). This
𝑛−1
(15)
parameter is defined as the sum of lost packets per MN during
+ max (2 ⋅ 𝑡 (𝑠𝑢 , ℎAMA𝑖 -sAMA )) .
all handover operations, and it depends on the handover 𝑖=1
latency. In this section, we analyze Packet Loss and Handover
Hence, packet loss in HB-DMM is
Latency for both the centralized and the distributed solutions.
HB
With respect to handover latency of mobility protocols, this 𝑃loss = 𝑇ℎHB ⋅ 𝜆 𝑡 ⋅ 𝑁ℎ . (16)
metric is the sum of the layer 2 handover time (𝑇L2 ), the
movement detection time (𝑇MD ), the authentication latency Similar to the HB-DMM, the NB-DMM approach has
(𝑇sec ), and the time needed to exchange the mobility-related an analogous operation during handover, with the additional
signaling (𝑇reg ). The operations leading to 𝑇L2 are heavily requirement of retrieving the information from the database;
dependent on the wireless technology deployed and do not thus,
actually depend on the layer 3 mobility protocol. 𝑇MD is
𝑇ℎNB = 2 ⋅ 𝑡 (𝑠𝑢 , ℎAR-DB )
composed of exchanging the router solicitation (RS) and
router advertisement (RA) messages between the MN and 𝑛−1
(17)
the new AR over the wireless link. The authentication tasks + max (2 ⋅ 𝑡 (𝑠pu , ℎMAR𝑖 -sMAR )) .
𝑖=1
8 Mobile Information Systems
Home network
4 hops
CN 4 ho
ps
4 hops HA
ILER-LMA
4 hops
Context DB
2 hops 3 hops 4 hops
MDA 1 hop
AR-ELER- 1 hop
MAR-MAG
1 hop AR-ELER-
MAR-MAG
BS1
MN BS2
Thus, if a handover occurs, in-flight packets can be recovered the default values of the system parameters are assumed to be
and forwarded to the new location of the MN. The values of as follows.
𝑇ℎ and 𝑃loss can be defined as Traffic and network parameters are 𝑠𝑢 = 56 B, 𝑠pu = 76 B,
𝑠𝑑 = 1000 B, 𝑠𝑡 = 40 B, 𝑠𝑙 = 28 B, 𝑠𝑚 = 4 B, 𝜆 𝑡 = 8000 B/s, 𝑡𝑠 =
𝑇ℎDM3 = 2 ⋅ 𝑡 (𝑠𝑢 , ℎMN-MDA ) + 2 ⋅ 𝑡 (𝑠𝑙 , ℎMDA-NELER ) , 1000 s, and 𝑡𝑟 = 20 s.
(18) Figure 7 shows the comparison of signaling cost of
DM3
𝑃loss = 𝑡 (𝑠𝑢 , ℎMN-PELER ) ⋅ 𝜆 𝑡 ⋅ 𝑁ℎ .
registration update as a function of the cell residence time,
which varies from 20 to 140 seconds. As could be expected,
3.5. Mobility Anchor Load. In order to compare the load of a 𝐶𝑠 achieves the highest values when the cell residence time
mobility anchor both in CMM and in DMM, a new metric is is low. In conditions of very high mobility (the cell residence
analyzed. Mobility Anchor Load (𝐶MAL ) is defined as time takes low values), only DM3 can significantly maintain
generated data by a MN an acceptable value for this parameter.
𝐶MAL = In fact, in DM3, this cost remains almost constant regard-
number of mobility anchors
(19) less of the mobility rate. Apart from DM3, in this zone of fre-
𝑁 ⋅ 𝜆 ⋅ 𝑡 ⋅ (𝑁ℎ + 1) quent handover, the behavior of DMM and CMM solutions
= 𝑠 𝑠 𝑠 , can be easily distinguished. Both HB-DMM and NB-DMM
𝑁𝑚
reach the highest costs whereas the centralized solutions
where 𝑁𝑠 is the total number of communication sessions of take intermediate values. This negative effect suffered by
an MN and 𝑁𝑚 is the number of mobility anchors associated DMM solutions in scenarios of frequent movements among
with the MN. This parameter is 𝑁𝑚 = 1 in MIPv6 and different subnets is due to the fact that the signaling messages
PMIPv6 and 𝑁𝑚 = 𝑁ℎ + 1 in HB-DMM and NB-DMM. The in HB-DMM and NB-DMM solutions are exchanged among
value of this parameter in DM3 goes from 𝑁𝑚 = 1 ⋅ ⋅ ⋅ 𝑁ℎ . all the ARs that have been visited by the MN during its
Additional discussion about this parameter will be made in movement and an active connection remains. This complex
the next section. address and tunnel management effect causes a significant
increment in the signaling cost of the distributed protocols.
However, the centralized solutions only need to notify the HA
4. Numerical Investigations
or LMA each time the MN moves to an adjacent network,
This section discusses the performance evaluation of MIPv6, minimizing the overall cost.
PMIPv6, DM3, HB-DMM, and NB-DMM. Relative distances However, as cell residence time increments (the mobility
in hops for the numerical analysis are shown in Figure 6 and of the nodes is lower), the behavior of signaling cost in
Mobile Information Systems 9
250 ×104
18
16
200
14
Signaling cost (KB)
10
100 8
6
50
4
2
0
20 40 60 80 100 120 140
0
Cell residence time (s) 2000 4000 6000 8000 10000 12000 14000
Transmission rate (bytes/s)
Mobile IPv6 Host-Based DMM
Proxy Mobile IPv6 Network-Based DMM Mobile IPv6 DM3
DM3 Proxy mobile IPv6 HB-DMM = NB-DMM
Figure 7: Signaling cost of registration updates. Figure 8: Packet delivery cost versus transmission rate.
4500
0.95 1800
0.9 1600
0.85 1400
0.8 1200
Handover latency (s)
0.7 800
0.65 600
0.6 400
0.55 200
0.5 0
2 3 4 5 6 7 8 9 10 20 25 30 35 40 45 50 55 60
n(Nh + 1) Cell resident time (sec)
tunnelling instead of IPv6 tunnelling. MPLS tunnels generate any anchoring node in which an active session remains. As
an overhead of 4 bytes, whereas IPv6 tunnels add an extra can be seen in the figure, the distance between the MN and
overhead of 40 bytes. For this reason, MIPv6 and PMIPv6 the distributed mobility anchor increases as the MN moves
costs rise significantly with respect to DM3. across the network. Thus, the dependency of DMM protocols
With respect to HB-DMM and NB-DMM, the MN is also shown on the number of movements made by the MN
initiates new sessions after the handover using the new IP and, more specifically, on the number of connections that still
address. The data traffic of these new sessions is routed in a remain established in previous cells.
more optimal way. As a result, the tunnelling cost is lower. Figure 11 shows the amount of packet loss during all of the
Next, the results of both handover latency and packet loss connection sessions for each approach. These results show the
are shown. Figure 10 shows the variation of the handover large difference between the proposals which have buffering
latency as a function of 𝑛 = 𝑁ℎ + 1. In this case, the main mechanisms and those which do not. Mobile IPv6, Mobile
MPLS, and Host-Based DMM have the largest amount of
difference in the handover latency of the mobility manage-
packet loss due to the lack of a buffering mechanism during
ment protocols is the signaling exchanged during handover,
handover disruption time.
necessary to maintain active ongoing IP flows when the MN
In order to minimize the packet loss, DM3 includes mech-
changes its point of attachment to the network.
anisms to reduce losses. In all these solutions, the previous
In CMM solutions, this metric mainly depends on the serving router of the MN is the one responsible for initi-
time needed for establishing new binding with the HA/LMA ating the buffering mechanism. DM3 also achieves ordered
agent. Considering that all ARs are at the same distance from delivery thanks to the recovery mechanism described in
the centralized anchor, its handover latency is constant. The [8]. However, it is worth noting that handover latency in
location management function in DM3 is located at the MDA HB-DMM and NB-DMM is dependent on the number of
nodes and a node is always anchored by the same MDA connections as was depicted in Figure 10. Due to the impact
during all its session. That means that the AR needs to signal of the handover latency in packet loss, the value of 𝑁ℎ
the MDA in order to complete a handover operation. That highly affects its behavior when the sessions remain active
MDA is closer to the MN than the centralized anchor, so at previously visited networks. Thus, HB and NB-DMM
the handover latency of DM3 outperforms the centralized solutions offer acceptable results when the relation between
solutions when the MN performs few movements. Finally, the 𝑁ℎ and session duration is high, but the packet losses rise
value of 𝑛 also has an impact in HB and NB-DMM proposals. dramatically when the number of tunnels established with
Although the number of signaling messages required to current AMA/MAR increases.
perform handover in these mechanisms is high, the new Finally, the load of the mobility anchors is evaluated.
MAR/AMA node performs the signaling with all the anchor- Figure 12 shows the Mobility Anchor Load metric as the
ing nodes simultaneously. Therefore, this value is given by the function of the number of sessions established by the MN (𝑛)
maximum time needed to perform the Binding Update with at different access networks.
Mobile Information Systems 11
×105 ×108
8
6
7
5 Signaling cost (B) 6
Signaling cost (B)
4 5
3 4
3
2
2
1 1
0 0
5 10 15 20 25 30 35 40 45 50 5 10 15 20 25 30 35 40 45 50
Number of MNs Number of MNs
×1015 ×1014
12 18
16
10
8 12
10
6
8
4 6
4
2
2
0 0
5 10 15 20 25 30 35 40 45 50 5 10 15 20 25 30 35 40 45 50
Number of MNs Number of MNs
Figure 16: Packet delivery cost with a human-walk mobility model. Figure 18: Tunnelling cost with a human-walk mobility model.
×1015
12 ×1014
18
10 16
Routing cost (B)
not overloading links and nodes near the access routers. This
way, DM3 can significantly reduce the registration cost of
and improves the tunnelling cost of centralized protocols
distributed mechanisms, achieving signaling overhead values
significantly.
similar to centralized protocols.
The simulation results shown in this section (signaling
In Figures 16 and 17, we present the simulated results of
cost, packet delivery cost, and tunnelling cost) match the
accumulated packet delivery cost for different executions. In
numerical analysis previously presented in Section 4 and are
this case, HB-DMM and NB-DMM offer the same results
consistent with them, thus validating the analytical model.
because their data plane is similar, and the data are forwarded
The DMM solutions face several limitations in terms of
through the same path. In these figures, we can observe how
mobility signaling cost and this trend is also shown in
centralized solutions perform nonoptimal routing and their
the simulation results. With respect to the packet delivery
cost is higher.
cost, both analytical and simulation data follow the same
Finally, in Figures 18 and 19, the tunnelling costs of
pattern and DMM protocols reduce the cost with respect to
the mobility protocols are compared. The large difference
centralized ones. This also occurs with the tunnelling cost, in
between CMM and DMM solutions is highlighted. While
which costs of distributed solutions are much less than the
HB-DMM and NB-DMM introduce an insignificant tun-
centralized ones in both cases.
nelling cost, centralized solutions cause high overhead in the
network due to the tunnelling process. Both HB-DMM and
NB-DMM require tunnelling only between the distributed 6. Conclusions
nodes, located at the access routers, whereas the tunnelling
in centralized protocols is from the root of the domain. Mobility management protocols are evolving towards a dis-
DM3 offers low values, close to the distributed solutions, tributed operation in order to deal with increasing mobile
14 Mobile Information Systems
Advances in
Fuzzy
Systems
Modelling &
Simulation
in Engineering
Hindawi Publishing Corporation
Hindawi Publishing Corporation Volume 2014 http://www.hindawi.com Volume 2014
http://www.hindawi.com
International Journal of
Advances in Computer Games Advances in
Computer Engineering Technology Software Engineering
Hindawi Publishing Corporation Hindawi Publishing Corporation Hindawi Publishing Corporation Hindawi Publishing Corporation Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014
International Journal of
Reconfigurable
Computing