2011
DOI: 10.1007/978-3-642-21771-5_11
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of IP-Based Mobility Protocols and Fast Handover Algorithms in IEEE 802.11 Based WLANs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Moreover, lack of measurements in Wi-Fi plot in this area indicates a loss of connectivity for this technology in the case ofmore resilient NV2 the same conditions were sufficient to maintain a link. When analyzing the above results we need to remember, thatin the case of WLAN technologies link activation requires a number of higher level procedures to be completed, such as searching for available networks, network selection based on number of criteria (e.g., network name, supported security mechanisms), authentication, association and dissemination of cryptographic keys [71]. Each of the procedures requires a successful exchange of messages between communicating devices.…”
Section: Field Deployment Experimentsmentioning
confidence: 99%
“…Moreover, lack of measurements in Wi-Fi plot in this area indicates a loss of connectivity for this technology in the case ofmore resilient NV2 the same conditions were sufficient to maintain a link. When analyzing the above results we need to remember, thatin the case of WLAN technologies link activation requires a number of higher level procedures to be completed, such as searching for available networks, network selection based on number of criteria (e.g., network name, supported security mechanisms), authentication, association and dissemination of cryptographic keys [71]. Each of the procedures requires a successful exchange of messages between communicating devices.…”
Section: Field Deployment Experimentsmentioning
confidence: 99%
“…Moreover, such mobility mechanisms are at best applicable only in the case of homogeneous networks and address only the link layer [21] mobility issues. As such, they are not sufficient to address Internet mobility across heterogeneous networks.…”
Section: Limitations Of Data Link Layermentioning
confidence: 99%
“…Mobility in 802.11 means change of physical access point when the MN moves between access points in the extended service set (ESS) infrastructure. The whole handover (handoff) procedure is composed of a number of phases [21], among which detection, scanning and IEEE 802.1x authentication are operations that consume the most time (see Table 2). Minimization of scanning time (Tscan) can be achieved by employing one of the algorithms proposed in literature (see e.g., [22]).…”
Section: Limitations Of Data Link Layermentioning
confidence: 99%
“…The process is not a straightforward one even in within a homogenous system under consolidated management, and it only gets more difficult when we need to perform it across administrative network boundaries or between two different access technologies. Due to the task complexity and many different scenarios which contribute to its necessity, taxonomy of handover types and solutions is an extensive one [39], which makes it impractical to include in this paper. Instead, a review of some general areas for process optimizations and a few chosen approaches to the problem in example environment of the most popular WLAN technologies are presented.…”
Section: Handover Supportmentioning
confidence: 99%