13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Architecture and Algorithms for Real-Time Mobility Management 53rate is less than 1. This ensures that a processor is not used at its full capacity whileothers are unused.3.2.2 Registration AlgorithmThe registration procedure is a task runn<strong>in</strong>g on the HA with the highest priority. Itcan preempt any other mobility management task for a given user. For example, dur<strong>in</strong>ga tunnel<strong>in</strong>g procedure, if a registration request is received for the same user, thetunnel<strong>in</strong>g process will be delayed until the registration is done. The different stages ofthe algorithm are described as follow.1. MN sends a registration request to the HA.2. HA verifies IF a task other than the registration is <strong>in</strong> process for the same user.IF yes THEN the task is preempted <strong>by</strong> the registration task.3. HA sends a response to the MN.4. IF request accepted THEN registration procedure done ELSE MN retries UNTILrequest accepted.3.2.3 Discovery AlgorithmThe discovery algorithm <strong>in</strong>troduces also the notion of priority <strong>in</strong> a real-time environmentand it is based on the lifetime expiration and the rang<strong>in</strong>g. The discovery procedurehas the second highest priority. The different steps are described as follow.1. IF first time startup THEN MN sends a broadcast advertisement.2. FAs verify if no higher priority task is be<strong>in</strong>g executed for the same MN.IF yes THEN delay discovery process UNTIL high-priority task execution is done.3. FAs send responses back to MN.4. MN chooses FA with most strong signal strength and records the lifetime, the careof-addressand the FA’s IP address.5. IF lifetime expires or the MN starts go<strong>in</strong>g out of range (wick signal strength)THEN send registration request to Foreign Agents <strong>in</strong> the MN’s local database.IF no FA responds back THEN broadcast a discovery advertisement message.6. REPEAT steps 2 through 4 UNTIL registration succeed.7. IF registration succeeds THEN MN sends new location <strong>in</strong>formation to HA forlocation update.3.2.4 Rout<strong>in</strong>g and Tunnel<strong>in</strong>g AlgorithmThe new rout<strong>in</strong>g and tunnel<strong>in</strong>g algorithm also <strong>in</strong>troduces the notion of priority <strong>in</strong> areal-time environment. This procedure has the lowest priority. Thus, dur<strong>in</strong>g a tunnel<strong>in</strong>gprocedure, if a registration procedure is received for the same user, the locationprocedure will be suspended until the registration is done. The steps of the algorithmare the follow<strong>in</strong>g:1. HA receives data for an MN.2. HA verifies if a registration request is made for the same user.IF yes THEN HA suspends tunnel<strong>in</strong>g process until registration is done.3. IF MN <strong>in</strong> local network THEN delivered packets us<strong>in</strong>g normal IP packets deliveryprocedure ELSE forward packets to MN via its current FA.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!