Advertisement

Seamless Handoff of Ping-Pong Calls in Mobile Wimax Networks

  • Balu Sridevi
  • G. V. Shirley Julia
  • S. Rajaram
Part of the Communications in Computer and Information Science book series (CCIS, volume 420)

Abstract

Wireless Networking is a promising technology that allows users to access a broad range of information and applications. The global boom in the number of users of the global internet has led to the development of fixed and mobile broadband technologies providing support for high speed streaming multimedia and unhampered quality of service. WiMAX technology given by IEEE 802.16e is one such technology that offers promising features in terms of high bandwidth, extended coverage area and low cost. WiMAX also suffers from certain issues like handoff delay and security threats. The ping-pong effect occurs due to the frequent movement of mobile units between the two Base Stations (BS) and thus experiences unwanted handoff delay at both BS. This paper proposes the algorithm for identification of ping-pong calls from normal re-entries, process them separately such that the handoff delay and resource wastage due to ping-pong calls are reduced. The proposed algorithm deals with caching of the key and uplink mapping parameters for the ping-pong users in order to reduce the overhead of the long network entry process. The network model was developed using Network Simulator and the algorithm was implemented in MATLAB GUIDE which gets connected to the database developed in MYSQL.

Keywords

WiMAX Handover Ping-pong Authentication IEEE 802.16e 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Andrews, J.G., Ghosh, A., Mohammed, R.: Fundamentals of WiMAX: Understanding Broadband Wireless Networking. Prentice Hall (2007)Google Scholar
  2. 2.
    Tang, S.-Y., Muller, P., Sharif, H.R.: Wimax security and quality of service. John Wiley & Sons Ltd. (2010)Google Scholar
  3. 3.
    Sridevi, B., Rajaram, S.: GUI based cost effective handoff management in the WiMAX Network entry process using key caching mechanism. In: SEISCON 2011. IEEE Explore (February 2012)Google Scholar
  4. 4.
    Hsu, S.F., Lin, Y.B.: A key caching mechanism for reducing WiMAX authentication cost in Handoff. IEEE Trans. Veh. Tech. 58(8) (October 2009)Google Scholar
  5. 5.
    Markopoulos, A., Pissaris, P., Kyriazakos, S., Sykas, E.D.: Efficient location-based hard handoff algorithms for cellular systems. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol. 3042, pp. 476–489. Springer, Heidelberg (2004)Google Scholar
  6. 6.
    Feher, Z., Veres, A.: Ping-Pong Reduction Using Sub Cell Movement Detection. In: IEEE 75th Vehicular Technology Conference (VTC Spring), pp. 1–5 (2012)Google Scholar
  7. 7.
    Kang, H., et al.: Ping-pong Call Resuming Procedure during HO, IEEE 802.16Broadband Wireless Access Working Group Project, IEEE 802.16e/03-26r (2004)Google Scholar
  8. 8.
    Sridevi, B., Rajaram, S.: Compressed Key Exchange and Key Caching in PKMv2-EAP Mobile WiMAX Authentication. European Journal of Scientific and Research (March 2012)Google Scholar
  9. 9.
    Sridevi, B., Rajaram, S.: Dynamic Inter Arrival Time Based Seamless Handoff for Mobile WiMAX Ping-Pong Calls Bypassing PKMv2 EAP Authentication. International Journal of Computer Network and Information Security, 56–64 (June 2012)Google Scholar
  10. 10.
    Ray, S.K., Pawlikowski, K., Sirisena, H.: Handover in Mobile WiMAX Networks: The State of Art and Research Issues. IEEE Communications Surveys & Tutorials 12, 376–398 (2010)CrossRefGoogle Scholar
  11. 11.
    Wang, S.S., Wu, C.-H.: Effective handoff method using mobile location information. In: Proceedings of the Fifty Third IEEE Conference on Vehicular Technology, pp. 2585–2589 (2001)Google Scholar
  12. 12.
    Becvar, Z., Mach, P., Simak, B.: Improvement of handover prediction in mobile WiMAX by using two thresholds. Journal of Computer Networks 55(16), 3759–3773 (2011)CrossRefGoogle Scholar
  13. 13.
    Tseng, P.H., Feng, K.T.: ‘A Predictive Movement Based Handover Algorithm for Broadband Wireless Networks’. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Las Vegas, USA, pp. 2834–2839 (2008)Google Scholar
  14. 14.
    Kang, H., Koo, C., Son, J., Lim, H.: Resource Remain type for Drop or Ping Pong Call Recovery, IEEE 802.16Broadband Wireless Access Working Group Project, IEEE 802.16e/03-26r1 (March 5, 2004a), http://www.ieee802.org/16/tge/contrib/C80216e-0426r1.pdf
  15. 15.
    Sridevi, B., Rajaram, S.: Automated secured handoff delay reduction by minimizing authentication cost in mobile WiMAX network entry process. International Journal of Innovation and Technology Management; (ISSN: 1741-5179 , Impact factor 0.727 - As indicated in Annexure I of refereed journal list given in Anna University Portal)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Balu Sridevi
    • 1
  • G. V. Shirley Julia
    • 1
  • S. Rajaram
    • 2
  1. 1.Department of ECEVelammal College of Engineering and TechnologyIndia
  2. 2.Department of ECEThiagarajar College of EngineeringIndia

Personalised recommendations