Systems Modeling for IP-Based Handoff Using Timed Petri Nets

The mechanisms and design principles needed for achieving optimized handoff for mobile Internet services are poorly understood and need better analysis. This paper contributes to the general theory of optimized handoff and addresses the need for a formal model that can characterize a mobility event and the associated mobility optimization methodologies. It provides a systematic and formal approach to analyzing a mobility event. After a thorough analysis of the abstract operations associated with several mobility protocols, it determines that these basic handoff operations form a set of discrete events that can be modeled as Discrete Event Dynamic System (DEDS). It then uses Deterministic Timed Petri nets to model the mobility event and evaluate the performance under different scheduling schemes. This model also helps to validate optimization methodologies that could lead to a set of design principles for any new mobility protocol as well as evaluate its effectiveness.

[1]  Wlodzimierz M. Zuberek Hierarchical analysis of manufacturing systems using Petri nets , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[2]  Edna Barros,et al.  Using Petri nets for data dependency analysis , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[3]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[4]  W. Douglas Maughan,et al.  Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.

[5]  David Munoz-Rodriguez,et al.  Modeling resource management in cellular systems using Petri nets , 1997 .

[6]  M. W.,et al.  Timed Petri Nets in Modeling and Analysis of Simple Schedules for Manufacturing Cells , 2003 .

[7]  Jiacun Wang,et al.  Timed Petri Nets: Theory and Application , 1998 .

[8]  寺岡 文男,et al.  Protocol for carrying Authentication for Network Access (PANA) を利用したネットワークアクセス認証システムの実装と検証 , 2007 .

[9]  Charles E. Perkins,et al.  Mobility support in IPv6 , 1996, MobiCom '96.

[10]  Greg Daley,et al.  Goals of Detecting Network Attachment in IPv6 , 2005, RFC.

[11]  Antonio F. Gómez-Skarmeta,et al.  Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[12]  J. Sokol,et al.  Petri net based performance evaluation of USAIA's bandwidth partitioning for the wireless cell level , 2001, Proceedings 9th International Workshop on Petri Nets and Performance Models.

[13]  Kazukuni Kobara,et al.  On the Impact of Security on the Latency in WLAN 802.11b: Analytical Study , 2005 .

[14]  Jari Arkko,et al.  Network Discovery and Selection Problem , 2008, RFC.

[15]  Dan Forsberg,et al.  Protocol for Carrying Authentication for Network Access (PANA) , 2008, RFC.