02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HANDOVER MANAGEMENT<br />

When a MH is mov<strong>in</strong>g <strong>in</strong>to a WLAN’s radio coverage, it selects an Access Po<strong>in</strong>t (AP)<br />

to establish the WLAN connection. The network selection is determ<strong>in</strong>ed by the<br />

implemented handover decision algorithms at the mobile handset (Step 1). Then, the<br />

MH starts to get itself authenticated with the AAA server us<strong>in</strong>g its Network Access<br />

Identifier (NAI) (Step 2). The NAI may be modified and resent if the visited WLAN is<br />

unable to route the authentication request to the AAA server. The AAA messages may<br />

have to be routed via several AAA proxies, which could reside <strong>in</strong> the third-party<br />

networks. Once the MH’s identity is verified, the AAA server registers the MH’s 3G<br />

AAA server to the Home Subscriber Server (HSS) (Step 3) and sends the connection<br />

authorization <strong>in</strong>formation to the WLAN for tunnel establishment (Step 4). The WLAN<br />

stores the key<strong>in</strong>g materials and tunnell<strong>in</strong>g attributes for later communication with the<br />

MH. The rout<strong>in</strong>g enforcement (Step 5) at the WLAN Access Gateway (WAG) is<br />

optional for the MH to use 3G packet-based services. The WAG is on the path between<br />

the MH and the Packet Data Gateway (PDG). After the MH associates with the new<br />

network, <strong>in</strong> this case, the WLAN, it may explicitly <strong>in</strong>dicate to the previously attached<br />

network to perform disconnection (Step 6).<br />

Dur<strong>in</strong>g a handover across <strong>heterogeneous</strong> <strong>wireless</strong> networks, once the target network is<br />

determ<strong>in</strong>ed, the follow<strong>in</strong>g procedure is def<strong>in</strong>ed by the <strong>in</strong>terwork<strong>in</strong>g <strong>mechanisms</strong><br />

<strong>in</strong>clud<strong>in</strong>g mobility protocols, authentication methods, <strong>in</strong>tegration architecture and so<br />

forth. <strong>Handover</strong> algorithms are employed to determ<strong>in</strong>e the target network for handover,<br />

and make the correspond<strong>in</strong>g decision. This is driven by the <strong>in</strong>troduction of “Always<br />

Best Connected” (ABC) concept [34] <strong>in</strong> mobile service provision<strong>in</strong>g.<br />

- 29 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!