QoS and Cost-Aware Protocol Selection for Next Generation Wireless Network

被引:0
作者
Meenakshi Munjal
Niraj Pratap Singh
机构
[1] National Institute of Technology,Department of Electronics and Communication Engineering
来源
Journal of Network and Systems Management | 2019年 / 27卷
关键词
MADM algorithm; Mobility Management protocols; Prospect theory; Proxy Mobile Internet Protocol version 6 (PMIPv6); Seamless handoff;
D O I
暂无
中图分类号
学科分类号
摘要
In the growing area of Internet of Things (IoT), mobility management protocols become necessary because in today’s environment everything is movable so there is no dominance of static nodes. Mobility is a key aspect for the next-generation wireless network. So, mobility management mechanism is necessary for providing the seamless handoff to end user regardless of their location. Thus, Internet Engineering Task Force (IETF) has developed the Mobile IPv6 (MIPv6) for providing the mobility facility. But MIPv6 is not able to provide the mobility for next-generation wireless network due to large packet loss and high latency. Thus, Proxy MIPv6 (PMIPv6) is developed for providing the mobility for the next-generation network, but it has some limitation as well. In this paper, firstly a survey of various types of protocols based on PMIPv6 protocol is given. Then protocol is selected based on the Quality of Service (QoS) and signaling cost parameters. Two applications are considered i.e. streaming and background traffic class. For streaming traffic class, QoS (handoff latency) parameter is preferred and for background traffic class, signaling cost is preferred. Analytical Hierarchical Process (AHP) method is used for assigning the weight of different traffic class because user`s preferences play an important role in the decision-making process as it enhances the quality of experience of the user. Then multi-attribute decision making (MADM) and prospect theory are used for selection of protocols. Results show that different protocols are selected for different applications. The performance of MADM and prospect theory is shown in terms of accuracy.
引用
收藏
页码:327 / 350
页数:23
相关论文
共 85 条
[1]  
Duan X(2015)Authentication handover and privacy protection in 5G hetnets using software-defined networking IEEE Commun. Mag. 53 28-35
[2]  
Wang X(2014)Analytical evaluation of a time- and energy-efficient security protocol for IP-enabled sensors Comput. Electr. Eng. 40 539-550
[3]  
Astorga J(2016)Timer-Based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management IEEE Trans. Mob. Comput. 15 516-529
[4]  
Jacob E(2016)Securing Vehicular IPv6 Communications IEEE Trans. Dependable Secur. Comput. 13 46-58
[5]  
Toledo N(2008)An Analytical Framework for Performance Evaluation of IPv6-Based Mobility Management Protocols IEEE Trans. Wirel. Commun. 7 972-983
[6]  
Aguado M(2013)Performance analysis of fast handover for proxy Mobile IPv6 Inf. Sci. (Ny) 219 208-224
[7]  
Ko H(2012)Performance Analysis of PMIPv6-Based Network Mobility for Intelligent Transportation Systems IEEE Trans. Veh. Technol. 61 74-85
[8]  
Lee G(2016)A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology Comput. Commun. 74 3-15
[9]  
Pack S(2008)The Analytic Hierarchy and Analytic Network Measurement Processes: applications to Decisions under Risk Eur. J. Pure Appl. Math. 1 122-196
[10]  
Member S(2013)Mathematical Modeling for Network Selection in Heterogeneous Wireless Networks – A Tutorial IEEE Commun. Surv. Tutorials 15 271-292