Skip to main content

Handling a Device Changing from 3G to Wi-Fi Without Breaking Established Connections

  • Conference paper
  • First Online:
New Trends in Networking, Computing, E-learning, Systems Sciences, and Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 312))

Abstract

The vertical handover is the ability for a device, such as a smartphone, to change between cellular data and Wireless LANs without losing any established connections. Previous approaches rely on tunneling to achieve this. This research aims to demonstrate a new approach to the problem, without tunneling, using a new intermediate layer 4 protocol running on top of TCP. The newly developed concept was tested through three scenarios that proved the mechanism works.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cisco Systems, IEEE 802.21 [Online] Available At: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_12-2/122_ieee.html [Accessed 28 11 2013]

  2. Yang & Mi-Jeong, 2008. 3GE-WLAN Vertical Handover Experience using Fast Mobile IPv6. [Online] Available At: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&tp=&arnumber=4493993 [Accessed 27 03 2013]

  3. Information Sciences Institute, 1981. TRANSMISSION CONTROL PROTOCOL. [Online] Available at: http://www.ietf.org/rfc/rfc793.txt [Accessed 27 03 2013].

  4. Postel, J., 1980. User Datagram Protocol. [Online] Available at: http://www.ietf.org/rfc/rfc768.txt [Accessed 27 03 2013].

  5. Khitrova, T., 2010. Implementation of Diffie-Hellman Algorithm of Key Exchange. [Online] Available at: http://www.codeproject.com/Articles/70330/Implementation-of-Diffie-Hellman-Algorithm-of-Key [Accessed 27 03 2013].

  6. Cisco Systems, 2013. Network Topology Icons. [Online] Available at: http://www.cisco.com/web/about/ac50/ac47/2.html [Accessed 23 01 2013].

  7. Optimizing Downloads for Efficient Network Access [Online] Available at: https://developer.android.com/training/efficient-downloads/efficient-network-access.html [Accessed 25 11 2013]

  8. Android Developers, 2013. Intents and Intent Filters. [Online] Available at: http://developer.android.com/guide/components/intents-filters.html [Accessed 17 04 2013].

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richard Sims .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sims, R., Bauer, C. (2015). Handling a Device Changing from 3G to Wi-Fi Without Breaking Established Connections. In: Elleithy, K., Sobh, T. (eds) New Trends in Networking, Computing, E-learning, Systems Sciences, and Engineering. Lecture Notes in Electrical Engineering, vol 312. Springer, Cham. https://doi.org/10.1007/978-3-319-06764-3_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06764-3_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06763-6

  • Online ISBN: 978-3-319-06764-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics