13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Architecture and Algorithms for Real-Time Mobility Management 53rate is less than 1. This ensures that a processor is not used at its full capacity whileothers are unused.3.2.2 Registration AlgorithmThe registration procedure is a task runn<strong>in</strong>g on the HA with the highest priority. Itcan preempt any other mobility management task for a given user. For example, dur<strong>in</strong>ga tunnel<strong>in</strong>g procedure, if a registration request is received for the same user, thetunnel<strong>in</strong>g process will be delayed until the registration is done. The different stages ofthe algorithm are described as follow.1. MN sends a registration request to the HA.2. HA verifies IF a task other than the registration is <strong>in</strong> process for the same user.IF yes THEN the task is preempted <strong>by</strong> the registration task.3. HA sends a response to the MN.4. IF request accepted THEN registration procedure done ELSE MN retries UNTILrequest accepted.3.2.3 Discovery AlgorithmThe discovery algorithm <strong>in</strong>troduces also the notion of priority <strong>in</strong> a real-time environmentand it is based on the lifetime expiration and the rang<strong>in</strong>g. The discovery procedurehas the second highest priority. The different steps are described as follow.1. IF first time startup THEN MN sends a broadcast advertisement.2. FAs verify if no higher priority task is be<strong>in</strong>g executed for the same MN.IF yes THEN delay discovery process UNTIL high-priority task execution is done.3. FAs send responses back to MN.4. MN chooses FA with most strong signal strength and records the lifetime, the careof-addressand the FA’s IP address.5. IF lifetime expires or the MN starts go<strong>in</strong>g out of range (wick signal strength)THEN send registration request to Foreign Agents <strong>in</strong> the MN’s local database.IF no FA responds back THEN broadcast a discovery advertisement message.6. REPEAT steps 2 through 4 UNTIL registration succeed.7. IF registration succeeds THEN MN sends new location <strong>in</strong>formation to HA forlocation update.3.2.4 Rout<strong>in</strong>g and Tunnel<strong>in</strong>g AlgorithmThe new rout<strong>in</strong>g and tunnel<strong>in</strong>g algorithm also <strong>in</strong>troduces the notion of priority <strong>in</strong> areal-time environment. This procedure has the lowest priority. Thus, dur<strong>in</strong>g a tunnel<strong>in</strong>gprocedure, if a registration procedure is received for the same user, the locationprocedure will be suspended until the registration is done. The steps of the algorithmare the follow<strong>in</strong>g:1. HA receives data for an MN.2. HA verifies if a registration request is made for the same user.IF yes THEN HA suspends tunnel<strong>in</strong>g process until registration is done.3. IF MN <strong>in</strong> local network THEN delivered packets us<strong>in</strong>g normal IP packets deliveryprocedure ELSE forward packets to MN via its current FA.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!