Advertisement

MIH-Based eNB Selection for Untrusted Networks

  • Fang-Yie Leu
  • Kun-Lin Tsai
  • Rui-Ting Hung
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 264)

Abstract

In recent years, some mobile phones are equipped with more than one Radio Access Technology (RAT) to make themselves adapt to a heterogeneous environment which comprises networks of different technologies. Also, during a User Equipment’s (UE’s) handover, it would be better if we can choose a suitable eNB as the next eNB (NeNB) to serve this UE. Generally, this can be achieved with the help of Common Radio Resource Management (CRRM). In this study, we propose a NeNB selection scheme, called eNB Selection System (eSeS), for two adjacent networks, e.g., Q and R, to select an appropriate eNB in R for UE before UE hands over from Q, i.e., source network, to R, i.e., target network. In order to enable the communication between different types of RATs, such as Long Term Evolution Advanced (LTE-A) and Wireless Local Area Network (WLAN), we utilize the IEEE 802.21 Media Independent Handover (MIH) as their common data exchange mechanism. With the CRRM, the load balance in a heterogeneous network environment can also be maintained. In our simulation, the performance of this scheme in untrusted network handover cases is better than that of PMIPv6 and FMIPv6.

Keywords

MIH CRRM Untrusted networks LTE-A WLAN 

References

  1. 1.
    Leung, K.: WiMAX Forum/ 3GPP2 proxy mobile IPv4, IEFT RFC 5563. https://tools.ietf.org/html/rfc5563 (2010). Accessed 15 Jan 2018
  2. 2.
    Stanley, D.: Control and provisioning of wireless access points (CAPWAP) protocol binding for IEEE 802.11, IETF RFC 5416. https://tools.ietf.org/html/rfc5416 (2009). Accessed 27 Aug 2018
  3. 3.
    Xia, F.: DHCPv6 prefix delegation in long-term evolution (LTE) networks, IETF RFC 6653. https://tools.ietf.org/html/rfc6653 (2012). Accessed 10 Aug 2018
  4. 4.
    Begerow, P., Krug, S., Rubaye, A.A., Renhak, K., Seitz, J.: Delay tolerant handover for heterogeneous networks. In: 39th Annual IEEE Conference on Local Computer Networks, pp. 370–373 (2014)Google Scholar
  5. 5.
    IEEE Standard for Local and metropolitan area networks.: Part 21: Media independent handover services. http://ieeexplore.ieee.org/document/4769367/ (2009). Accessed 04 Aug 2018
  6. 6.
    Mzoughi, H., Zarai, F., Kamoun, L.: Interference—Limited radio resources allocation in LTE_A system with MIH cooperation. In: The Asia-Pacific Conference on Communications (APCC), pp. 174–179 (2016)Google Scholar
  7. 7.
    Wang, G., Chen, L.: Performance comparison between utility based and MIH schemes in vertical handover. In: The 9th IEEE Conference on Industrial Electronics and Applications, pp. 203–207 (2014)Google Scholar
  8. 8.
    Kim, P.S., Jang, M.S., Lee, E.H.: An IEEE 802.21 MIH functionality assisted proxy mobile IPv6 for reducing handover latency and signaling cost. In: 2013 10th International Conference on Information Technology: New Generations, pp. 692–695 (2013)Google Scholar
  9. 9.
    Chiu, D.M., Jain, R.: Analysis of the increase and decrease algorithms for congestion avoidance in computer networks. Comput. Netw. ISDN Syst. 17(1), 1–14 (1989)CrossRefGoogle Scholar
  10. 10.
    Wu, L., Sandrasegaran, K.: A survey on common radio resource management. In: The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (2007)Google Scholar
  11. 11.
    Houda, M., Zarai, F., Obaidat, M.S., Kamoun, L.: Optimizing handover decision and target selection in LTE-A network-based on MIH protocol. In: IEEE International Conference on Communications, pp. 299–304 (2014)Google Scholar
  12. 12.
    Leu, F.Y., Cheng, C.C.: MIH-based Congestion control with seamless handover in untrusted heterogeneous networks. In: The 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2017), pp. 502–510 (2017)Google Scholar
  13. 13.
    Mussabbir, Q.B., Yao, W., Niu, Z., Fu, X.: Optimized FMIPv6 using IEEE 802.21 MIH services in vehicular networks. IEEE Trans. Veh. Technol. 56(6), 3397–3407 (2007)CrossRefGoogle Scholar
  14. 14.
    Ha, J., Kim, J.Y., Kim, J.U., Kim, S.H.: Dynamic load balancing architecture in heterogeneous wireless network environment. In: The 9th International Symposium on Communications and Information Technology (ISCIT 2009), pp. 248–253 (2009)Google Scholar
  15. 15.
    Wang, Y., Yuan, J., Zhou, Y., Li, G., Liu, F., Zhang, P.: Handover management in enhanced MIH framework for heterogeneous wireless networks environment. Wirel. Pers. Commun. 52(3), 615–636 (2010)CrossRefGoogle Scholar
  16. 16.
    Buiati, F., Villalba, L.J.G., Corujo, D., Sargento, S., Aguiar, R.L.: IEEE 802.21 information services deployment for heterogeneous mobile environments. IET Commun. 5(18), 2721–2729 (2011)CrossRefGoogle Scholar
  17. 17.
    Koodli, R.: Mobile IPv6 fast handovers, IETF RFC 5568. https://tools.ietf.org/html/rfc5568 (2009). Accessed 09 Aug 2018
  18. 18.
    Devarapalli, V.: Proxy Mobile IPv6, IETF RFC 5213. https://tools.ietf.org/html/rfc5213 (2008). Accessed 09 Mar 2018
  19. 19.
    Seamless and secure mobility. https://www.nist.gov/publications/seamless-and-secure-mobility. Accessed 17 Mar 2018

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.Department of Computer ScienceTunghai UniversityTunghaiTaiwan
  2. 2.Department of Electric EngineeringTunghai UniversityTunghaiTaiwan

Personalised recommendations