Pre-authenticated and adaptive IP mobility for WLAN nodes

Biju Issac*, Khairuddhin Ab Hamid, C. E. Tan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

When a mobile node roams to another network/subnet, new resource reservation has to be made between the sender and receiver. If enough resources are not available, the Quality of Service may be disrupted and the connection may fail. If resources are reserved indiscriminately, then most of them would be unused and performance degradation would be the result. We would like to propose a pre-authenticated and adaptive micro-mobility management architecture in IP networks. We use pre-authentication to hasten the handoff process. Also the mobility predictor block used will help in reserving the resources aptly. The packets are generally classified based on the ToS field in IPv4 (or traffic class and the flow label fields in IPv6). Here we focus more on the special case of wireless local area networks (WLANs) installation within a building or in a restricted campus. In this paper, we propose a fast and adaptive IP micro mobility management scheme with mobility prediction for WLAN nodes. We also present some basic simulation on WLAN mobile node roaming.

Original languageEnglish
Title of host publicationProceedings of DFMA 2006 - 2nd International Conference on Distributed Frameworks for Multimedia Applications
PublisherIEEE
Pages88-95
Number of pages8
ISBN (Print)1424404096, 9781424404094
DOIs
Publication statusPublished - 29 Jan 2007
EventDFMA 2006 - 2nd International Conference on Distributed Frameworks for Multimedia Applications - Pulau Pinang, Malaysia
Duration: 15 May 200617 May 2006

Conference

ConferenceDFMA 2006 - 2nd International Conference on Distributed Frameworks for Multimedia Applications
CountryMalaysia
CityPulau Pinang
Period15/05/0617/05/06

Fingerprint

Dive into the research topics of 'Pre-authenticated and adaptive IP mobility for WLAN nodes'. Together they form a unique fingerprint.

Cite this