02.11.2012 Views

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

Handover mechanisms in next generation heterogeneous wireless ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

LIST OF FIGURES<br />

Figure 4.9 The cumulative first-passage-time probabilities of enter<strong>in</strong>g <strong>in</strong>to boundaries<br />

[n=6] ................................................................................................................................ 72<br />

Figure 4.10 The mean number of possible cell cross<strong>in</strong>gs ............................................... 73<br />

Figure 4.11 NTC exchange f<strong>in</strong>ish ratio vs. time [Size of r<strong>in</strong>gs=6, MCRT=30m<strong>in</strong>s] ...... 74<br />

Figure 4.12 Number of mobile users vs. NTC exchange f<strong>in</strong>ish ratio ............................. 75<br />

Figure 4.13 Size of r<strong>in</strong>gs vs. Number of mobile users required per cell [MCRT=30m<strong>in</strong>s]<br />

......................................................................................................................................... 76<br />

Figure 4.14 Cumulative signall<strong>in</strong>g cost vs. time [MCRT=30m<strong>in</strong>s] ................................ 77<br />

Figure 4.15 Number of mobile users per cell vs. regional NTC pattern construction time<br />

......................................................................................................................................... 78<br />

Figure 4.16 NTC update <strong>in</strong>terval vs. NTC exchange error rate ...................................... 79<br />

Figure 5.1 RSS-based handover decision algorithm ....................................................... 84<br />

Figure 5.2 Network selection problem <strong>in</strong> a PLMN-WLAN <strong>in</strong>terwork<strong>in</strong>g ...................... 88<br />

Figure 5.3 Trust-assisted handover algorithm flow chart ............................................... 92<br />

Figure 5.4 Trust coefficient function (with H � 6)<br />

....................................................... 93<br />

Figure 5.5 An Analysis of delay <strong>in</strong> WLAN�UMTS handover ..................................... 96<br />

Figure 5.6 <strong>Handover</strong> delay vs. Trust density [ p � 50%<br />

] ............................................... 102<br />

Figure 5.7 Load balance factor vs. Trust density [ p � 50%<br />

] ........................................ 103<br />

Figure 5.8 <strong>Handover</strong> delay vs. Trust density vs. Probability of no TA [THOA, ETS=10]<br />

....................................................................................................................................... 104<br />

Figure 5.9 <strong>Handover</strong> delay vs. Trust density vs. Probability of no TA [MHOA] ........ 104<br />

Figure 5.10 The effect of THOA ETS on handover delay ............................................ 105<br />

Figure 5.11 The effect of THOA ETS on load balance factor ...................................... 106<br />

Figure 5.12 Comparison of the THOA and the MHOA on QoS .................................. 109<br />

Figure 6.1 A trust model for security analysis of handover .......................................... 112<br />

Figure 6.2 Classification of fast authentication approaches.......................................... 115<br />

Figure 6.3 An overview of trust associations for fast authentication ............................ 118<br />

Figure 6.4 Fast authentication ticket <strong>generation</strong> procedure .......................................... 122<br />

Figure 6.5 Fast authentication procedure ...................................................................... 124<br />

Figure 6.6 Session key renewal procedure <strong>in</strong>itiated by MH ......................................... 126<br />

Figure 6.7 Session key renewal procedure <strong>in</strong>itiated by AN .......................................... 127<br />

Figure 7.1 General Media Independent <strong>Handover</strong> reference model [119] ................... 139<br />

eff<br />

- viii -<br />

A<br />

A

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!