Systems Optimization for Mobility Management
Ashutosh DuttaElectrical Engineering Department
Columbia UniversityApril 1, 2010April 1, 2010
1
Thesis committeeProf. Henning Schulzrinne – Thesis AdvisorDr. Bryan LylesProf. Nicholas MaxemchukProf. Dan RubensteinProf. Yechiam Yemini
Outline• Motivation• Vision• Key Contributions• Sample Results -Experimental and • Sample Results -Experimental and
Modeling• Conclusions • Future work• Publications and Patents
2
Motivation• Cellular mobility typically involves handoff across
homogeneous access technology – Optimization techniques are carefully engineered to improve
the handoff performance• IP-based mobility involves movement across access
technologies, administrative domains, at multiple layers and involve interaction between multiple protocols– Mechanisms and design principles for optimized handover – Mechanisms and design principles for optimized handover
are poorly understood– Currently there are ad hoc solutions for IP mobility
optimization, not engineering practice – No formal methodology to systematically discover or
evaluate mobility optimizations – No methodology for systematic evaluation or prediction of
"run-time" cost/benefit tradeoffs
3
MSC
BSC 2
VLRAUC
EIR
BSS
HLR
Cellular mobility – GSM – an example
HLR – Home Location RegisterMSC - Mobile Switching Center
AUC – Authentication CenterBSC – Base Station ControllerBSS – Base Station SystemBTS – Base Transceiver StationEIR – Equipment Identity Register
VLR – Visitor Location Register
MH
nPoAoPoABTS A
BSC 1
Serving Cell
BSC 2
Target Cell
Move
nPoA nPoABTS B BTS CBTS D
AdministrativeDomain B
CorrespondingHost
IPch
N2
ConfigurationAgent
AuthenticationAgent
Authorization Agent
RegistrationAgent
RegistrationAgent
Administrative Domain A
ConfigurationAgent
Authorization Agent
SignalingProxy
AuthenticationAgent
SignalingProxy
Layer 2
Mobility Illustration in IP-based 4G network
Backbone
L2 PoA
128.59.10.7207.3.232.10
210.5.240.10
128.59.11.8
N1N1
N2
N1- Network 1 (802.11)N2- Network 2 ( CDMA/GPRS)
L3 PoA 207.3.232.10
MobileHost
Layer 3 PoA
L2 PoA Layer 2 PoA
Layer 2 PoA
L3 PoA
128.59.9.6
L3 PoA
A
B
CD
900 ms media interruption
802.11 802.11
h/o delay900 ms
802.11 802.11
4 Seconds media interruption h/o delay 4 s
Handoff Delay~ 18 s
802.11 CDMA
18 Seconds media interruptionh/o delay18 s
5
What is the vision?• IP-based mobility needs to provide handoff
performance comparable to cellular mobility• In order to transition ad hoc optimization
approaches to engineering best practice we need the following:– Framework or model that can analyze the mobility event
in a systematic way, can verify and predict the in a systematic way, can verify and predict the performance under systems resource constraints
– A set of fundamental design principles to optimize handoff components across layers
– A set of well defined methodologies to verify the optimization techniques for mobility in an IP-based network
6
Design and development of series of optimization mechanisms for handoff components across multiple layers
My Key Contribution
Systematic analysis of handoveroperations across multiple layers based on abstraction of common functions
7
Modeling of the handover processes that allows performance predictions for both un-optimized handover and for specific optimization
Verification of the handoff optimization techniques by building experimental systems and comparing the results with model-based prediction
HandoverEvent
Network discovery &selection
Networkattachment
Configuration Securityassociation
Bindingupdate
Mediareroute
P1 P2 P3 P4 P5 P6
System decomposition of handover process
selection
Channeldiscovery
L2 association
Routersolicitation
Domainadvertisement
Identifieracquisition
DuplicateAddressDetection
AddressResolution
Authentication(L2 and L3)
Keyderivation
Identifierupdate
Identifiermapping
Bindingcache
Tunneling
Buffering
Forwarding
Bi-casting/Multicasting
Serverdiscovery
IdentifierVerification
Subnetdiscovery
P11
P13
P12
P21
P22
P23
P31
P32
P33 P41
P42P51
P52
P53
P54
P61 P62
P63
P64
8
Proposed optimization mechanisms for handoff mechanisms for handoff
components
9
Network and resource discovery Problem: Discovery of the network elements and resources during handoverin a heterogeneous access network depends upon respective layer 2 discoverymechanism that introduces delays
My proposal: Application layer proactive discovery of network elements andresources in the neighboring networks using cross layer triggersand caching mechanism
Key advantages: Key advantages: 1)Provides the ability to discover the network elements prior to handover without relying on underlying layer 2 discovery mechanism after the handover 2) eliminates layer 2 scanning delay during handover by caching the channel number
Related work: Shin et al., Montavont et al. Velayos et al. IEEE 802.11k
My publications: ACM Mobiquitous 2005, IEEE Broadnets 2006, IEEE 802.21 (2005)
10
Application layer proactive discovery enables layer 2 independence during inter-technology handover process
Layer 2 authenticationProblem: 1) During inter-technology handover, layer 2 authentication isperformed by the respective access networks after layer 2 handover2) Existing Layer 2 pre-authentication is not supported across subnets
My proposal: Network layer assisted layer 2 pre-authentication mechanismbootstraps layer 2 authentication process in the neighboring networks beforehandoff occurs
Key advantages: 1) Enables pre-authentication during handover across Key advantages: 1) Enables pre-authentication during handover across subnets, administrative domains and heterogeneous access (802.11, CDMA). 2) Reduces layer 2 authentication delays
Related work: IEEE 802.11i, IEEE 802.11r, Bargh et al., Mishra et al., Forte et al. ,Georgiadeset al.
My publications: ACM Mobiquitous 2007, IRTF-MOBOPTS, IETF-HOKEY, Springer journal
11Proactive generation of layer 2 security keys using network layer assisted pre-authentication provides an access independent solution
System evaluation – Network layer assisted layer 2 pre-authentication
Typesof authentication
Current approach
My proposedmethod
HandoffOperation
NonRoaming
Roaming NonRoaming
Roaming
AP discovery(avg.)
460 ms 460 ms 0 0
Authentication Authorization
61 ms 599 ms 177 ms
(proactive)
831 ms
(proactive)
Home AAA
Authentication
VisitedAAA
Radius/Diameter
Roaming AAA Domain
Experimental results
Non-Roaming: [email protected]: [email protected]
Authorization (avg.)
(proactive) (proactive)
Key configuration (avg.)(2 AP)
N/A N/A 16 ms(proactive)
17 ms(proactive)
Association+ 4 Way handshake(avg.)
18 ms 17 ms 15 ms 17 ms
Total 539 ms 1076 ms 208 ms 865 ms
Time affecting handover
539 ms 1076 ms 15 ms 17 ms
12
IEEE 802.11i Pre-authentication
AuthenticationAgent
MN
PSK PSK
AP0
AP1AP2
Association&
4-way handshake
Network A
Network B
L3 assistedPre-authentication
Experimental Testbed
Layer 3 identifier configuration (IP address)Problem: Configuration process contributes to the handoff delay due toIP address acquisition and duplicate address detection process
My proposals Key advantages(Proactive) layer 3 identifier configuration over a secured proactive tunnel andlocal caching of IP address
Post handoff IP address acquisition and duplicate address detection delays are avoided
Router assisted duplicate addressdetection by using periodic multicast ofARP-cache (Reactive)
Client does not need to perform ARP for duplicate address detection
Related work: Optimistic DAD, Passive DAD, Rapid Commit RFC 4039
My publications: IEEE Sarnoff 2005, 2007 Springer Journal on Wireless Personal Communication
13
Pre-caching of layer 3 network identifier at the mobile and duplicate address detection by the network reduces post handoff layer 3 configuration delay at the expense of additional resources
Layer 3 security associationProblem: During mobile’s repeated handoff, layer 3 securityassociation (IPSec) between the mobile and communicating host needs to bere-established when the layer 3 identifier (e.g., IP address) changes
My proposals Key advantages
Establish security context proactively in the new network by using pre-registrationmechanism (Proactive)
Mobile does not need to re-initiate the security association with the proxy server after the handover to the target network
Maintain security association by Reduces handover delays by avoiding re-
Related work: Miu et al., Bahl et al., Rodriguez et al.
My publications: WMASH 2004, ACM MC2R 2005, Communication Magazine 2007
14
Layer 3 security binding can be maintained by way of proactive security context transfer or by hiding the IP address change.
Maintain security association byhiding IP address change using an externalHome agent (Reactive)
Reduces handover delays by avoiding re-keying process for security associationin mobile VPN
System evaluation – Layer 3 security optimization
Handoff components optimized
P-CSCF P-CSCF S-CSCFAS
HSSI-CSCFPDSN
FA
HA
Home NetworkVisited Network 1
Visited Network 2
DHCP
DHCP
Router
192.168.30.0/24
PDSNFA
CN
Domain: research.telcordia.com
1502 1408 5980 195
Nonoptimized
Typ
es o
f han
doff
Link (PPP) Termination
Layer 2 (802.11) Delay
Link (PPP) Activation
MIP-Solicitation
MIP-Binding Update
15
FA
AP1AP2
802.11b802.11b
RAN Emulatorran01
Delay Controller
RAN Emulator
ran02
Delay Controller
Mobile Node
192.168.30.33
0 0 0
89
0 5000 10000 15000
Proactive Security Context
Time in ms
Typ
es o
f han
doff
MIP-Binding Update
DHCP Trigger
DHCP Inform
SIP Registration
Layer 3 Security
Media Redirection
Fig 1. Experimental results Fig 2. Experimental testbed
Binding update (single host mobility)Problem: Distance between the mobile node and the correspondent node or thehome agent contributes to the binding update delay resulting in overall handoffdelay and packet loss
My proposals Key advantagesProactive binding update over a secureproactive tunnel (Proactive)
Eliminates post-handoff binding update delay
Hierarchical binding update mechanismusing an anchor agent for network layer andapplication layer mobility protocols (Reactive)
Reduces network global signaling update for intra-domain subnet mobility (e.g., 70% reduction for 10 subnets/domain )
Related work: MIP-RR, RFC 4857, HMIPv6 RFC 4140, Politis et al. Lee et al. Zeadally et al.
My publications: PIMRC 2004,ACM MC2R,MILCOM 2003, 2005, WCM 2003, 2008, Wiley journal on WCM , 1 patent approved
16
Binding update optimization can be obtained using reactive , proactive or cross layer feedback techniques
Multi-layer mobility using cross layerfeedback (layer 2 and application layer)(Cross Layer)
Adapts binding update (global vs. local) based on mobile’s movement and application (50% throughput improvement for high mobilityscenario)
Media rerouting (unicast traffic)Problem: In-flight handoff packets are lost during handoff process and needto be redirected to the mobile
My proposals Key advantages
Proactive localized multicasting of in-flight data to the neighboring networks (Proactive)
Suitable for intra-domain mobility and does not need any additional network element
Mobile controlled buffering at the edgerouter of the target network (Proactive)
Ability to control buffering period dynamically based on handoff duration during proactive handoff
Mobility proxy assisted time-bound Reactive forwarding technique to forward
Related work: FMIPv6 , Malki et al., Moore et al., Krishnamurty et al.,
My publications: IEEE WCM 2003, IEEE PIMRC 2006, IEEE WCM 2008, WCNC 2007
17
- Placement of media redirection agent closer to the mobile for reactive forwarding- Placement of buffering module and amount of buffering need to be controlled for proactive handoff
Mobility proxy assisted time-bound redirection of in-flight data from previousNetwork (Reactive)
Reactive forwarding technique to forward in-flight data in case of longer binding update delay
Indicative optimized handoff systemI built media independent pre-authentication system based onsome of the key optimization techniques that I developed.
Key advantages: MPA provides a secure and seamless mobility optimizationframework that supports
– Inter-subnet, Inter-domain and Inter-technology handoff– Works with any mobility management protocol (e.g., SIP, MIPv4, MIPv6,
ProxyMIPv6)– Supports layer 2 pre-authentication– Supports layer 2 pre-authentication– Supplements FMIPv6’s inability to support inter-domain handover
TimeConventional Method
AP AP AP AP DiscoveryDiscoveryDiscoveryDiscovery
APAPAPAPSwitchingSwitchingSwitchingSwitching
MPA
Pre-authentication
IP address configuration & Binding update
Time
ClientAuthentication
Packet Loss Period
AP AP AP AP DiscoveryDiscoveryDiscoveryDiscovery
My publication: Mobiquitous 2005, WCM 2008, IRTF (MOBOPTS)
System Evaluation: Media Independent Pre-authentication Architecture
MN-CA keyAR
Network 3
ARMN-CA keyNetwork 2
INTERNETInformation
Server
Current AR
AR
Network 4
CN
TN AA CAAR
AA CA
Mobile
CurrentNetwork 1
AR
AP1 Coverage Area AP 2 & 3 Coverage Area
AP3AP2AP1 CTNTN
CTN – Candidate Target NetworksTN – Target Network
19
Home Network HA
Media Independent Pre-authentication Mechanism
2. DATA [CN<->A(Y)] over proactive handovertunnel [AR<->A(X)]
Domain XDomain Y
CN
Data in new domain
1. DATA[CN<->A(X)]
MN-CA key
Preconfiguration
MN-AR key3. DATA[CN<->A(Y)]
BU
Proactive handover
Tunneled Data
InformationServer
Proactivediscovery
BufferModule
AA
AR
CA
CN: Correspondent NodeMN: Mobile NodeAA: Authentication AgentCA: Configuration AgentAR: Access Router
A(X)
L2 handoff procedure
Domain Ypre-authenticationData in old
domain
MN
A(Y)
Proactive handovertunneling end
procedure
MN
20
System evaluation - MPA – Intra-technology handover (802.11 – 802.11)
Mobility Type
Mobile IPv6 SIP mobility
HandoffParameters
Buffering Disabled+ RO Disabled
Buffering Enabled+ RODisabled
Buffering Disabled+ RO Enabled
BufferingEnabled+ ROEnabled
BufferingDisabled
BufferingEnabled
L2 handoff (ms)
4.00 4.0 4.00 4.00 4.00 4.00
Results: Media independent proactive handoff
802.11 802.114 sAAA
nARL3 PoA
MN
AP1L2 PoA
AP0(L2 PoA)
Pre-authentication
Network ANetwork B
Pre-configuration
pARL3 PoA
CoreNetwork DHCP
server PANA server
Buffering module
Tunnelingmodule
MN
HA (MIP)Home Network
ProactiveHandoverTunnel
CN
Network C Network D
(ms)
L3 handoff(ms)
1.00 1.00 1.00 1.00 1.00 1.00
Avg. packet loss
1.3 0 0.7 0 1.50 0
Avg. inter-packet interval (ms)
16.00 16.00 16.00 16.00 16.00 16.00
Avg. inter-packet arrival time during handover (ms)
21 45 21 67 21 29.00
Avg. packet jitter (ms)
n/a 29.00 n/a 51.00 n/a 13.00
Buffering period (ms)
n/a 50.00 n/a 50.00 n/a 20.00
Avg. Buffered Packets
n/a 2.00 n/a 3.00 n/a 3.00
21
Non-optimized handoff (200 packets loss, ~ 4 s handover delay)
Media Independent Pre-auth handoff (No packet loss – 5 ms handoff delay)
802.11 802.11Interruption
MNMN
Proposed mobility modelingProposed mobility modeling
22
Schedulingof handoveroperations
Relevantoptimizationprinciples
Example experimental mobility systems I have built PotentialTargetMobilitySystem
SIP-basedFast handoff
MobileVPN
MediaIndependentPre-authentication
Simultaneous Mobility
Optimized handoffIn IMS
Muti-layerMobility
Multicast fast handoff
Sequential Direct path between CH and MH X
Limit binding update between CH and MH X X
Maintain Security associationbetween end-points
X
Anchor-basedForwarding
X X
Post-handoff triggers X
Proactive Pre-handoff triggers X X
Target mobility system design
23
Proactive network discovery X
Proactive authentication X
Proactive identifier configuration X
Proactivebinding update
X X
Dynamic Buffering X
Proactive context transfer X
Parallel Discovery of Layer 2 and Layer 3 PoA X
Binding updateduring configuration
X
Mobility model Problem: In the absence of any formal mechanism it is difficult to predict orverify the systems performance of un-optimized handover or any specifichandoff optimization technique
My Proposal I model the handoff-related processes as Discrete EventDynamic Systems (DEDS) and use Deterministic Timed Transition Petri Net(DTTPN) to build various un-optimized mobility models and their associatedoptimization techniquesoptimization techniques
Key advantages : 1)This model can predict systems performance foroptimized handoff operations 2) can design optimal path for sequence ofexecution of events based on expected performance and resourceconstraints 3) can verify systems behavior (e.g.,deadlocks) during handover
Related work: Molina-Remirez et al., Jaimes-Romero et al., Mostafa et al.
My Publications: PIMRC 2007, HICSS, 2009 (Nominated for best paper) 24
Dependency analysis among handover operationsHandoff Process Precedence
RelationshipData it depends on
P11 – Channel Discovery P00 Signal-to-Noise Ratio valueP12 – Subnet discovery P21,P22 Layer 2 beacon ID
L3 router advertisementP13 – Server discovery P12 Subnet address
Default router addressP21- Layer 2 association P11 Channel number
MAC address Authentication key
P22- Router solicitation P21, P12 Layer 2 bindingP23- Domain advertisement P13 Server configuration
Router advertisementP31 – Identifier acquisition P23,P12 Default gateway
Subnet address Subnet address Server address
P32 – Duplicate addressdetection
P31 ARPRouter advertisement
P33 – Address resolution P32, P31 New identifierP41 – Authentication P13 Address of authenticatorP42 – Key Derivation P41 PMK (Pairwise Master Key) P51 – Identifier update P31,P52 L3 Address
Uniqueness of L3 addressP52 – Identifier verification P31 Completion of COTIP53 – Identifier mapping P51 Updated MN address
at CN and HAP54 – Binding cache P53 New Care-of-address mappingP61 – Tunneling P51 Tunnel end-point address
Identifier addressP62 – Forwarding P51, P53 New address of the mobileP63 – Buffering P62, P51 New identifier acquisition P64 – Multicasting/Bicasting P51 New identifier acquisition
25
Experimental results for resource usage for handover operations – 802.11 access
Petri nettransitions
Samplehandoff operations
Resource Consumption
Bytes exchanged
CPU samples
Power (nanojoules)
t00 Layer 2 un-reachability test 43 5 51600t01 Layer 3 unreachability 86 3 103200t11 Discover layer 2 channel 109 3 130800t12 Discover layer 3 subnet 110 4 132000t13 Discover server 126 5 540000t21 Layer 2 association 99 2 118800t22 Router solicitation 70 4 84000t23 Domain advertisement 226 4 271200t31 Identifier acquisition 1426 5 1711200t32 Duplicate address detection 164 6 196800t32 Duplicate address detection 164 6 196800t33 Address resolution 60 3 72000t41 Layer 2 open authentication 94 3 112800t42 Layer 2 EAP 2842 6 3410400t43 Four-way handshake 504 4 604800t51 Master key derivation (PMK) 0 10 0
t52 Session key derivation (PTK) 0 6 0
t61 Identifier update 204 4 422400t62 Identifier verification 148 6 177600t63 Identifier mapping 0 8 0t64 Binding cache 0 3 0t71 Fast binding update 110 3 132000
t72 Local caching 0 6 0
t81 Tunneling 60 2 72000t82 Forwarding 100 2 120000t83 Buffering 120 3 144000t91 Local id mapping 40 4 48000
t92 Multicasting/bicasting 192 2 230400 26
Petri net modeling of handoff processes
p11 p21 p22 p12 p23 P52 t53 p53
t64p64
p61
t31 t32 t33
p31 p32 p33
t70
Resource network capacity
PotentialParallelOperation
Connected
P00 t01
t11
t41
p41
t13
p13t42
p42
t21 t22t12 t23 t52 t51 P51
t62
p62
t63
p63
t54 p54
Resource Battery
Resource CPU
Connected
Summary of results from Petri net modeling• MATLAB-based mobility models using Petri nets
– Multi-interface mobility (802.11, CDMA)– Optimized security association– Hierarchical binding update– Forwarding of in-flight data– Layer 3 configuration– Simultaneous mobility– Multicast mobility– Cross layer triggers
• Prediction of handover performance under different handoff schedules• Prediction of handover performance under different handoff schedules– Sequential, parallel, proactive
• Effect of concurrency on handoff operations– Additional resources vs. cycle time
• Verification of system behavior– Deadlock analysis due to data and resource
28
Scheduling of handoff operations
Resources CPU
PC
Resource s
Battery
PB
4-way
handshake
completet3
t4 t5
P2
P3
t2
Scanning
Authentication
Network
Discovered
4-way
Handshake
Operation
P1
Resources
Network capacity
Mobile
Authenticated
Connected
Association
P0
P01
P02
2 2
t1
PA
Batterypower
scanning Authentication 4-way Handshake
t2 t3 t4 t5P2 P3 P4
Association
Connected
MobileDisconnected
Network capacity
CPUcycles
P1
PA
PB
PC
P0
t1Disconnection
NetworkDiscovered
Mobileauthenticated
1 token
29
Association
Networkdiscovery
P11
t11
PA2
4-way Handshake(SA)
t1
t4 t5
P2 P3
Connected
Disconnected
Pre-authentication
Current Network Target Network
PA1
PC
PB1
PD
t12
t13
APKey installation
P12
P1
PC CPU
Battery
PB
t3
t4
t5
P2
t2
Scanning
Authentication
Network
Discovered
4-way
Handshake
P1
Resources
Network Capacity
Mobile
Authenticated
Connected
P0
P01
P02
2
t1
P03
P3Association
4
PA
C. Proactive operations
B. Parallel operations – Level of concurrency =2
D. Parallel operations – Level of concurrency = 3
A. Sequential operations
A. Sequential : Does not meet systems performance Cycle time C =100
B. Concurrent: does not meet systems performance for C= 100
Verification of handoff systems performance using Floyd algorithm
C. Proactive – meets systems performance C=100
time C =100
D. Concurrent– meetssystems performance C= 410 30
Deadlock analysis for simultaneous mobility using MATLAB models
Deadlock Scenario (non-optimized) Deadlock verification (deadlock exists)
31
Deadlock Scenario (non-optimized) Deadlock verification (deadlock exists)
Deadlock avoidance with retransmission Deadlock verification (No deadlock)
Conclusions• This thesis contributes to the general theory of optimized
handover – It addresses the need for a formal systems model that can characterize
a mobility event, associated optimization methodologies and can provide handoff performance predictions
• Developed a systematic analysis of handover event across all layers
• Developed a series of optimization techniques for handoff components across several layers and verified these techniques by applying to several experimental handoff techniques by applying to several experimental handoff scenarios
• Developed Petri net models for handoff that can – Validate systems performance of any type of handoff optimization – Evaluate handoff schedule to obtain a specific systems performance– Analyze the behavioral properties (e.g., deadlock)
• Optimization techniques, their analysis and models will support construction of new customized mobility protocols
32
Future Work• Current Petri net model can be enhanced to study
mobility in ad hoc networks• Enhancement to generate automatic schedule of
handoff operations given a set of resource constraints, performance objectives and dependence relationship
• Ability to design a customized mobility protocol that will define its own set of elementary operations for will define its own set of elementary operations for each of the desired handoff functions
• Future models should consider resource utilization among the network components (e.g., access point, router, server) in a distributed fashion
• I envision specification of the functional components of mobility protocols and tools that search for context specific optimizations, such as caching, proactive feature and cross layer techniques 33
List of Relevant Publications and PatentsMobility Fast-Handoff – Techniques, Systems prototyp e and Experiments• A. Dutta, H. Schulzrinne, S. Madhani, O. Altintas, and Wai Chen, “Optimized fast-handoff schemes for application layer
mobility management, “ Mobile Computing and Communications Review (MC2R). ACM MC2R, Vol 7, Issue 1, January 2003.• N. Nakajima, A. Dutta, S. Das, and H. Schulzrinne, “Handoff delay analysis and measurement for SIP}based mobility in IPv6,
“ In ICC 2003 - Personal Communication Systems and Wireless LANs}, Anchorage,Alaska,USA, May.• P-yu Hsieh, A. Dutta, H. Schulzrinne, ``Application Layer Mobility Proxy for Real-time communication,'' 3G Wireless, May
2003, San Francisco.• A. Misra, S. Das,A. Dutta, A. McAuley, S.Das, “IDMP based fast-handoff and paging in IP-based 4G mobile networks,” IEEE
Communications Magazine, 40(3):138--145, March 2002.• A. Dutta, J. Chennikara, W. Chen, O. Altintas, H. Schulzrinne, ``Multicasting streaming media to mobile users,'' IEEE
Communication Magazine, October 2003 Issue • D. Wong, A. Dutta, J. Burns, K. Young, and H. Schulzrinne, “A multilayered mobility management scheme for auto-configured
wireless IP networks”, IEEE Wireless Communication Magazine}, 10(5), October 2003.• A. Dutta, S. Madhani, W. Chen, O. Altintas, H. Schulzrinne, “GPS assisted Fast-handoff Mechanism for Real-Time • A. Dutta, S. Madhani, W. Chen, O. Altintas, H. Schulzrinne, “GPS assisted Fast-handoff Mechanism for Real-Time
Communication,”, IEEE Sarnoff Symposium, April 2006, Princeton.• A. Dutta, S. Das, P. Li, A. McAuley, Y. Ohba, S. Baba, H. Schulzrinne, ``Secured Mobile Multimedia Communication for
Wireless Internet,'' IEEE ICNSC 2004, Taipei, Taiwan • A. Dutta and H. Schulzrinne, “MarconiNet: overlay mobile content distribution network,” IEEE Communications Magazine,
42(2):64--75, 2004.• A. Dutta, S. Madhani, W. Chen, O. Altintas, and H. Schulzrinne, “Fast-handoff schemes for application layer mobility
management”, 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications}, volume 3, September 2004.
• A. Dutta, T. Zhang, S. Madhani, K. Taniuchi, K. Fujimoto, Y. Katsube, Y. Ohba, H. Schulzrinne, ``Secure Universal Mobility for Wireless Internet,'' ACM WMASH 2004, Philadelphia.
• K.D. Wong and A. Dutta, “ Simultaneous mobility in MIPv6,” 2005 IEEE International Conference on Electro Information Technology}, page 5, May 2005. (Best Paper Award).
• A. Dutta, T. Zhang, S. Madhani, K. Taniuchi, K. Fujimoto, Y. Katsube, Y. Ohba, H. Schulzrinne Secure Universal Mobility for Wireless Internet, (Extended version) ACM MC2R, July 2005.
34
List of Relevant Publications
Mobility Fast-Handoff – Techniques, Systems prototyp e and Experiments (contd.)• A. Dutta, T. Zhang, Y. Ohba, K. Taniuchi, and H. Schulzrinne, “MPA assisted proactive handoff scheme,” ACM
Mobiquitous, 2005, page 155. San Diego, CA.• A. Dutta, S. Das, D. Famolari, Y. Ohba, K. Taniuchi, T. Kodama, and H. Shulzrinne, “Seamless handover across
heterogeneous networks-an IEEE 802.21 centric approach,” Proceedings of IWS-WPMC, Aalborg, Denmark, 2005.• A. Dutta, S. Das, D. Famolari, Y. Ohba, K. Taniuchi, V. Fajardo, T. Kodama, and H. Schulzrinne, “Secured seamless
convergence across heterogeneous access networks,” World Telecommunication Congress}, Budapest, May 2006.• K. D. Wong, A. Dutta, H. Schulzrinne, and K. Young, “Simultaneous mobility: analytical framework, theorems and
solutions,” Wireless Communications and Mobile Computing}, 7(5), 2007.• A. Dutta, S. Das, D. Famolari, Y. Ohba, K. Taniuchi, V. Fajardo, T. Kodama, and H. Schulzrinne, “Secured seamless
convergence across heterogeneous access networks,” World Telecommunication Congress}, Budapest, May 2006. • A. Dutta, H. Schulzrinne, K.D Wong, ``Supporting Continuous Services to Roaming Clients, The Handbook of Mobile
Middleware,” CRC Press, Edited by Bellavista and Corradi.• A. Dutta, S. Madhani, T. Zhang, Y. Ohba, K. Taniuchi, and H. Schulzrinne, “Network discovery mechanisms for fast-• A. Dutta, S. Madhani, T. Zhang, Y. Ohba, K. Taniuchi, and H. Schulzrinne, “Network discovery mechanisms for fast-
handoff,” Broadnets, San Jose, 2006. IEEE.• A. Dutta, Eric van den Berg, D. Famolari, V. Fajardo, Y. Ohba, K. Taniuchi, and H. Schulzrinne, “Dynamic buffering scheme
for mobile handoff,” IEEE PIMRC, 2006, Helsinki.• T. Chiba, A. Dutta, and H. Schulzrinne, “Trombone Routing Mitigation Techniques for IMS/MMD Networks,” Proceedings
of IEEE WCNC}, Hong Kong, March 2007.• T. Chiba, H. Yokota, A. Dutta, D. Chee, and H. Schulzrinne, Route Optimization for Proxy Mobile IPv6 in IMS Network,”
Proceedings of the 2008 International Conference on Signal Processing and Communication Systems}.• R. Lopez, A. Dutta, Y. Ohba, and H. Schulzrinne, “Network-layer assisted mechanism to optimize authentication delay
during handoff in 802.11 networks,” ACM Mobiquitous, Philadelphia, PA, June 2007.• A. Dutta, S. Das, D. Famolari, Y. Ohba, and H. Schulzrinne, “Seamless Proactive Handover across Heterogeneous Access
Networks,” Wireless Personal Communication}, 43(3):837--855, August 2007.• A. Dutta, S. Chakravarty, K. Taniuchi, V. Fajardo, Y. Ohba, D. Famolari, H. Schulzrinne, ``An Experimental Study of
Location Assisted Proactive Handover,'' IEEE Globecom 2007, Internet Protocol Symposium, Washington D.C.
35
List of Relevant Publications
Mobility Fast-Handoff - Modeling • A. Dutta, B. Lyles, H. Schulzrinne, T. Chiba, H. Yokota, A. Idoue, ``Generalized Modeling Framework for Handoff Analysis,''
IEEE PIMRC, September 2007, Athens.• A. Dutta, B. Lyles, H. Schulzrinne, J.Wang, ``Systems Modeling for IP-based Handoff using Timed Petri nets,'' IEEE HICSS,
January 2009, HAWAII (Nominated for Best Paper)
Performance - Mobility • K. D Wong, H-Yu Wei, A. Dutta, K. Young, H. Schulzrinne, ``Performance of IP Micro-Mobility Management Scheme using Host
Based Routing'', IEEE WPMC 2001, Aalborg.• F. Anjum, M. Elaoud, D. Famolari, A. Ghose, R. Vaidyanathan, A. Dutta, P. Agrawal, ``Voice Performance in WLAN Networks -
An Experimental Study,'' IEEE Globecom 2003, San Francisco.• A. Dutta, J. Burns, R. Jain, D. Wong, K. Young, and H. Schulzrinne, “Implementation and Performance Evaluation of Application
layer MIP-LR,” In Wireless Networks, Communications and Mobile Computing, 2005 International Conference on}, volume 2, Maui, HI, June 2005.
• A. Dutta , B. Kim, T. Zhang, S. Baba, K. Taniuchi, Y.Ohba, H.Schulzrinne, ``Experimental Analysis of Multi Interface Mobility Management with SIP and MIP,'' IEEE Wirelesscom 2005, Maui, HI
Mobility and Streaming Architecture• A. Dutta, H. Schulzrinne, Y. Yemini, "MarconiNet: An Architecture for Internet Radio and TV. 9th International Workshop on
Network Support for Digital Audio Video Systems (NOSSDAV 99), New Jersey, 23-25th June.• A. Dutta, H. Schulzrinne, ``A Streaming Architecture for Next Generation Internet,'' IEEE ICC 2001, June 11-14, 2001, Helsinki,
Finland.• A. Dutta, F. Vakil, J.C Chen, M. Tauil, S. Baba, H. Schulzrinne, "Application Layer Mobility Management Scheme for Wireless
Internet," in 3G Wireless May 2001,(San Francisco).• K. Chakrabarty, A. Misra, S. Das, A. McAuley, A. Dutta, S. Das, "Implementation and Performance Evaluation of TeleMIP,"
IEEE ICC, May 2001, Helsinki.• A. Misra, S. Das, A. Dutta, A. McAuley, S. Das, "IDMP-based Fast handoffs and paging in IP-based cellular Networks," in 3G
Wireless 2001, May 2001, San Francisco. • S. Das, A. Misra, A. McAuley, A. Dutta, S. Das, "A generalized mobility solution using a dynamic tunneling," in ICCCD2000,
Dec. 2000, Kharagpur, India. 36
List of Relevant PublicationsMobility and Streaming Architecture (contd.)• A. Misra, S. Das, A. McAuley, A. Dutta, S. Das, ``Integrating QoS Support in TeleMIP's Mobility Architecture," in ICPWC,
(Hyderabad, India), pp. 8, Dec. 2000. • A. Dutta, O. Altintas, H. Schulzrinne, W. Chen, ``Multimedia SIP sessions in a Mobile Heterogeneous Access Environment,'' 3G
Wireless 2002, San Francisco. • J. Chennikara, W. Chen, A. Dutta, O. Altintas, ``Application Layer Multicast for Mobile Users in Diverse Networks,'' IEEE
Globecom 2002, Taiwan.• S. Das, A. Dutta, A. McAuley, A. Misra, S. Das, ``IDMP: An Intra-Domain Mobility Management Protocol for Next Generation,''
IEEE Wireless Magazine, October 2002 - SAIC Best Paper• T. Chiba, H. Yokota, A. Idoue, A. Dutta, S. Das, Fuchun J. Lin, H.Schulzrinne, ``Mobility Management Schemes for
Heterogeneity Support in Next Generation Wireless Networks,'' NGI 2007, May 2007, Norway • A. Dutta, H. Schulzrinne, W. Chen, O. Altintas, "Mobility support for wireless streaming multimedia in MarconiNet," in IEEE
Broadband Wireless Summit, Interop 2001, (Las Vegas), pp. 7, May 2001.• A. Dutta, H. Schulzrinne, S. Das, A. McAuley, W. Chen, O. Altintas, `` MarconiNet supporting Streaming Media over Localized
Wireless Multicast,'' ACM M-Commerce 2002 Workshop, September, 2002, Atlanta.Wireless Multicast,'' ACM M-Commerce 2002 Workshop, September, 2002, Atlanta.• A. Dutta, R. Jain, K. D. Wong, J. Burns, K. Young, Henning Schulzrinne, ``Multilayerd Mobility Management for Survivable
Network,'' IEEE MILCOM Proceedings, October 2001, Boston.• Y. Ohba, S. Das, A. Dutta, ``Kerberized Handover Keying: A Media-Independent Handover Key Management Architecture,''
ACM Mobiarch 2007, Kyoto, Japan.• A. Dutta , F. Joe Lin, D. Chee, S. Das, B. Lyles, T. Chiba, H. Yokota, H. Schulzrinne "Architecture Analysis and Experimental
IPv6 testbed for Advances IMS,'' IMSAA 2007, Bangalore, India.
37
List of Relevant PublicationsTestbed - Mobility• A. Dutta, J.C Chen, S. Das, S. Madhani, A. McAuley, S. Baba, N. Nakajima, Y. Ohba, H. Schulzrinne, "Implementing a Testbed
for Mobile Multimedia, '' IEEE Globecom 2001, San Antonio.• A. Dutta, J. Burns, K. D Wong, R. Jain, K. Young, H. Schulzrinne, and A. McAuley, “Realization of Integrated Mobility
Management Protocol for Ad-Hoc Networks,” In MILCOM , volume 1, pages 448--454, 2002. • A. Dutta, P. Agrawal, S. Das, M. Elaoud, D. Famolari, S. Madhani, A. McAuley, M. Tauil, P. Li , and H. Schulzrinne, “Realizing
mobile wireless Internet telephony and streaming multimedia testbed,” Computer Communications, 27(8):725--738, 2004.• A. Dutta, K. Manousakis, S. Das, F.J Lin, T. Chiba, H. Yokota, A. Idoue, H.Schulzrinne, ``Mobility Testbed for 3GPP2-based
MMD Networks,'' IEEE Communication Magazine, July 2007.• S. Das, M. Tauil, Y.H. Cheng, A. Dutta, D. Baker, M. Yajnik, D. Famolari, ``Media independent handover: Features, applicability,
and realization,''IEEE Communication Magazine, January 2009.• M. Tauil, A. Dutta, Y.H. Cheng, S. Das, D. Baker, M. Yajnik, D. Famolari, Y. Ohba, V. Fajardo, K. Taniuchi, H. Schulzrinne,
``Realization of IEEE 802.21 services and pre-authentication framework,'' IEEE conference Tridentcom 2009, April 2009, Washington DC.
• M. Tauil, A. Dutta, Y.H. Cheng, S. Das, D. Baker, M. Yajnik, D. Famolari, Y. Ohba, V. Fajardo, K. Taniuchi, H. Schulzrinne • M. Tauil, A. Dutta, Y.H. Cheng, S. Das, D. Baker, M. Yajnik, D. Famolari, Y. Ohba, V. Fajardo, K. Taniuchi, H. Schulzrinne ``Integration of IEEE 802.21 services and pre-authentication framework,'' to appear in International Journal of Communication Networks and Distributed Systems.
• Survey Paper - Mobility • A. Dutta, O. Altintas, W. Chen, and H. Schulzrinne, “Mobility approaches for all {IP} wireless networks, In SCI, Orlando, Florida,
July 2002.• T. Chiba, H. Yokota, A. Idoue, A. Dutta, S. Das, Fuchun J. Lin, ``Gap Analysis and Deployment Architectures for 3GPP2 MMD
Networks,'' IEEE VT Magazine, March 2007. • A. Dutta, S. Das, T. Chiba, H. Yokota, A. Idoue, H. Schulzrinne, ``Comparative Analysis of Network Layer and Application
Layer IP Mobility Protocols for IPv6 Networks,'' WPMC 2006, San Diego, CA.
38
List of Relevant PublicationsPotpourri• A. Dutta, Y. Yemini, "Power Management of LEOs under bursty broadband traffic. AIAA's 17th International Conference on
Satellite Systems and Communication. AIAA, 1998 February,'' Yokohama, Japan, March 1998.• S. Khurana, A. Dutta, P. Gurung, H. Schulzrinne, ``XML based Wide Area Communication with Networked Appliances,'' IEEE
Sarnoff 2004, Princeton, NJ.• A. Dutta, A. McAuley, D. Wong, M. Elaoud, A. Cheng, M. Yajnik, I. Sebuktekin, K. Young, H. Schulzrinne, `` Integrated
Networking Technologies for Survivable Network,'' IEEE WCNC, March 2005, New Orleans.• T. Zhang, S. Madhani, A. Dutta, E. Van den Berg, Y.Ohba, K. Taniuchi, S. Mohanty, `` Implementation and Evaluation of
Autonomous Collaborative Discovery of Neighboring Networks,'' IEEE ITRE 2005.• A. Dutta, H. Cheng, S. Madhani, K.D. Wong, J. Chennikara, K. Young, H. Schulzrinne, A. Patel, ``Flexible Call Control
Framework for Supporting Multi-party Service,'' IEEE MILCOM 2005.• A. Dutta, J. Alberi, A. Cheng, B. Horgan , A. McAuley, D. Chee, B. Lyles, ``IPv6 Transition Techniques for Legacy Application,''
IEEE MILCOM 2006, Washington DC.• A. Dutta, C. Makaya, S. Das, D. Chee, F. J. Lin, S. Komorita, T. Chiba, H. Yokota, ``Self Organizing IP Multimedia Subsystem,''
IEEE IMSAA 2009, Bangalore. (3rd Best Paper Award) IEEE IMSAA 2009, Bangalore. (3rd Best Paper Award)
39
List of Patents Issued
1. Method for handling the simultaneous mobility of mobile hosts in infrastructure-based networks – US patent 7,319,689
2. System and method for receiving over a network a broadcast from a broadcast sourceUS Patent 7,296,0913. Seamless handoff across heterogeneous access networks using a handoff controller in a
service control unit – US patent 7,664,501 4. Method and system for host mobility management protocol – US Patent 7,184,4185. Methods and systems for a generalized mobility solution using dynamic tunneling agent –
US patent 6,992,9946. Application-layer multicast for mobile users in diverse networks – US patent 7,546,0826. Application-layer multicast for mobile users in diverse networks – US patent 7,546,082
40
Backup slidesBackup slides
41
Mobility/Function
AccessType
Network Discovery
Resource Discovery
TriggeringTechnique
DetectionTechnique
Configuration Key exchange/Authentication
Encryption BindingUpdate
MediaRerouting
GSM TDMA BCCH FCCH ChannelStrength
SCH TMSI SRES/A3 DES MSCContld.
Anchor
WCDMA CDMA PILOT SYNCChannel
ChannelStrength
Frequency TMSI SRES/A3
AES NetworkControl
Anchor
IS-95 CDMA PILOT SYNCchannel
ChannelStrength
RTC TMSI Diffie-HellmanAKA
Kasumi MSCContld.
AnchorMSC
CDMA1X-EVDO
EVDO PILOTChannel
SYNCChannel
ChannelStrength
RTC TMSI Diffie-Hellman/CAVE
AES MSC PDSN/MSC
Abstraction of mobility functions
EVDO CAVE
802.11 CSMA/CA
Beacon11R
11R802.21
SNR atMobile
Scanning.ChannelNumber,SSID
SSID,Channel number
Layer 2 authenticate802.1XEAP
WEP/WPA802.11i
Associate IAPP
Cell IP Any Gatewaybeacon
Mobilemsmt.
APbeaconID
GW Beacon MAC AddressAP address
IPSec IPSec RouteUpdate
IntermediateyRouter
MIPv4 Any ICMPRouter adv.FA adv.
ICMPRouterAdv.
FA adv.L2 triggering
FA adv FA-CoACo-CoA
IKE/PANAAAA
IPSec MIPRegistration
FARFAHA
MIPv6 Any StatelessProactive
CARD802.2111R
RouterAdv.
RouterPrefix
CoA IKE/PANAAAA
IPSEC MIP updateMIP RO
CHMAPHA
SIPM Any StatelessICMP Router
802.2111R
L3RouterAdv.
Router Prefix, ICMP
CoAAORRe-Register
INVITE exchange/AAA
IPSEC/SRTP/S/MIME
Re-INVITE B2BUACHRTPtrans
42
Detection of network attachmentProblem: Post handoff detection mechanisms of layer 2 and layer 3 points ofattachment are independent of each other causing additional delays duringlayer 3 handover
My proposal Key advantagesLink layer post handoff event triggers toexpedite detection of network layer PoA(Reactive)
Speed up the execution of upper layer operations
Provide layer 3 related information as partof access point discovery (Cross Layer)
Parallel operations across layers minimize the additional delays for detecting layer 3 point of attachment
Related work: Malki et al.,Tseng et al.,Teraoka et al.,Yokota et al.
My publications: WTC 2006, Springer Journal 2007, IEEE 802.21 (2005), IEEE Communication Magazine, 2009
43
• Cross layer triggers expedite the execution of upper layer operations
point of attachment
Binding update (simultaneous mobility)Problem: Simultaneous mobility problem arises due to non-receipt of bindingupdate by each of the mobiles when these are in an active session
My proposal Key advantagesTimer-based retransmission, forwardingand redirecting mechanism usingbinding update and location updateproxies
Eliminates vulnerability interval of binding update
Simultaneous bindings Soft-handoff approach, does not add to
Related work:Tilak et al., Dreibholz et al.
My publications: IEEE MILCOM, IEEE WCM, Journal on Computer Communication
1 patent approved
44
• Probability of occurrence of simultaneous mobility depends upon the binding update latency and handoff rates of the mobiles• Introduction of binding update and location update proxies reduces the vulnerability interval
handoff latency
0.6
0.8
1
1.2
Probabilityof
failure
Simultaneous mobility probability
Probability of failure vs. inter-handoff time
(50 ms handoff latency)
0
0.2
0.4
0 50 100 150 200 250 300
failure
Inter-handoff time in seconds
Media re-routing (Multicast)Problem: Mobile suffers from media interruption due to IGMP “join” latencyduring subnet handover
My proposal Key advantagesApplication layer triggering (e.g., RTCP)to join a multicast tree a hierarchicalmuticast architecture
Mobile does not need to depend uponIGMP query interval
Proxy-assisted proactive join prior tohandoff
Eliminates join latency during subnet handover
Related work: Wu et al., McAuley et al.Lin et al.
My publications: NOSSDAV 99, ICC 2001, IEEE Communication Magazine, 2004,
1 patent approved
46
Application layer triggering is a suitable technique that expedites multicast media delivery in a hierarchically scoped multicast architecture
10
100
Han
doff
late
ncy
for
mul
ticas
t str
eam
(se
cond
s)lo
g sc
ale
Non-opt
Reactive
Proactive
Parallel
Comparison of multicast handoff latency
10 0.2 0.4 0.6 0.8 1
Probability of presence of multicast group
Han
doff
late
ncy
for
mul
ticas
t str
eam
(se
cond
s)lo
g sc
ale
Parallel
Verification of deadlock due to lack of resources
48