Inter-domain mobility management based on the proxy mobile IP in mobile networks

Moneeb Gohar, Seok Joo Koh

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

System Architecture Evolution (SAE) with Long Term Evolution (LTE) has been used as the key technology for the next generation mobile networks. To support mobility in the LTE/SAE-based mobile networks, the Proxy Mobile IPv6 (PMIP), in which the Mobile Access Gateway (MAG) of the PMIP is deployed at the Serving Gateway (S-GW) of LTE/SAE and the Local Mobility Anchor (LMA) of PMIP is employed at the PDN Gateway (P-GW) of LTE/SAE, is being considered. In the meantime, the Host Identity Protocol (HIP) and the Locator Identifier Separation Protocol (LISP) have recently been proposed with the identifier-locator separation principle, and they can be used for mobility management over the global-scale networks. In this paper, we discuss how to provide the inter-domain mobility management over PMIP-based LTE/SAE networks by investigating three possible scenarios: mobile IP with PMIP (denoted by MIP-PMIP-LTE/SAE), HIP with PMIP (denoted by HIP-PMIP-LTE/SAE), and LISP with PMIP (denoted by LISP-PMIP-LTE/SAE). For performance analysis of the candidate inter-domain mobility management schemes, we analyzed the traffic overhead at a central agent and the total transmission delay required for control and data packet delivery. From the numerical results, we can see that HIP-PMIP-LTE/SAE and LISP-PMIP-LTE/SAE are preferred to MIP-PMIP-LTE/SAE in terms of traffic overhead; whereas, LISP-PMIP-LTE/SAE is preferred to HIP-PMIP-LTE/SAE and MIP-PMIP-LTE/SAE in the viewpoint of total transmission delay.

Original languageEnglish
Pages (from-to)196-213
Number of pages18
JournalJournal of Information Processing Systems
Volume12
Issue number2
DOIs
StatePublished - Jun 2016

Keywords

  • Comparison
  • HIP
  • LISP
  • LTE
  • MIP
  • Mobility management
  • PMIP
  • SAE

Fingerprint

Dive into the research topics of 'Inter-domain mobility management based on the proxy mobile IP in mobile networks'. Together they form a unique fingerprint.

Cite this