Font Size: a A A

Research Of Location Management Model In Mobile Network

Posted on:2009-03-07Degree:MasterType:Thesis
Country:ChinaCandidate:Q F JiangFull Text:PDF
GTID:2178360272980484Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile telecommunication network and Internet, the boundary between mobile telecommunication network and Internet is disappearing, which will result in the born of a next generation mobile network which combines the mobile telecommunication network and Internet. One of the key features of the mobile network is that the mobile nodes move frequently, so the mobility management of mobile network is very important. Mobility management is composed of location management and handoff management, the problem of location management is mainly studied.In order to resolve the problem of single point of failure in Mobile IP and Dynamic Domain Name System, a mobile node location management model PLM (Peer-to-peer Location Management) based on Chord protocol is presented. All location servers in PLM model form a fully distributed structure P2P network.The mobile nodes' joining and leaving are organized via Chord protocol. All mobile nodes' location information are evenly distributed in each location server via SHA1 hash function in Chord protocol, so the load is balanced. When the number of location server node increases, the service ability also increase with the increased demand for services, therefore PLM model is scalable, and can well resolve the problem of single point of failure in the existing location management technology. Lookup delay and update delay are two important factors of the performance of a mobile node location management strategy.The shorter the delays are, the higher the performance is.The result of the PLM model simulation shows that the lookup delay and update delay of the PLM model are very short.In addition, authentication, data encryption and other security mechanisms of the PLM model are studied, these security mechanisms can guarantee nodes' mutual authentication and data's confidentiality, integrity, replay attack resistance.
Keywords/Search Tags:mobile network, location management, peer-to-peer, Chord protocol, single point of failure
PDF Full Text Request
Related items