International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
__________________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 333
Zero Down 24*n Mobile Network Connectivity
D.Kadhirvelu G.Aghila
Research Scholar, Professor and Head, NIT
Bharathiar university Puducherry,karaikal
Abstract— Today, lots of connectivity problem in wireless mobile communication are due to weak signal strength. To overcome
this problem a novel idea of utilizing and enabling the service mobility between heterogeneous mobile service providers has been
explored. The basic idea behind the work is to make the heterogeneous providers to work together and to establish and extend
the connection in a spontaneous fashion, without making pre-established roaming agreements. At present roaming agreements
are set manually between the providers, but it is costly and time-consuming process. The idea is when the user moves out of the
home coverage area or when the signal gets down in a mobile terminal even when the mobile terminal is not in use, the
connections have to be extended to provide 100 % connectivity to the user by the available foreign network which eliminates the
problem of “not reachable” condition in mobile network. So for, the related works focuses on extension of connectivity only
while the call is in progress. But this paper fully concentrate on 24 hrs * N days connectivity whether the user call is on or off
progress by proposing a model called the PAC(Pre-Authenticated Connection) and it is designed by using HFNF(High
Frequency network first)technique which establish roaming agreements directly between operators before the connection is
disconnected. This architecture ensures the connectivity except in the case of power loss. In future we plan to extend the
connectivity even in power loss by balancing the power in spine hierarchy.
Keywords— PAC, HFNF, CTRESH, DTRESH, Handoff.
I. INTRODUCTION
The GSM systems have the ability to make and receive phone calls to and from other networks. For the consumers to get the
desired service and high coverage the different network agent can join together to give the desired service. At present different
network agent join together via static roaming procedure which is said in [21,22]. As pre-roaming agreements can’t be established
with all possible provider the users will be disconnected if service is unavailable in home network. To overcome the above problem,
“instant agreement” for roaming between different various network agent is proposed so that the users can get services from multiple
network agent. To overcome the same issue PAC mechanism is proposed to establish the connection before the pervious connection
with home network gets disconnected. This paper address the ability to decide correctly the time to call PAC mechanism based on
the strength of signal. This work also proposes a architecture with a modification in an physical layer of OSI model with Pre
authentication connection module which establish an instant connection with foreign network. Knowledge based mechanisms are
proposed to establish spontaneous roaming agreements.
This proposed architecture consists of knowledge based system with the databases that hold profile, intersystem handover control
rules and the network management system. Based on this mechanism a Fuzzy-Based algorithm is designed which identifies the
correct time to do the handover to the other foreign network to extend the service dynamically. The supportive idea of this work is
presented in section 2.The architecture of proposed PAC mechanism is described in section 3.The open trust model is explained in
section 4.The detailed working procedure and handoff is explained in section 5. Algorithm for rules and negotiation is explained in
section 6.Section 7 explains about handoff initiation procedure. Section 8 explains about handoff monitoring procedure. Section 9
concludes the concept with future idea.
II. BACKGROUND AND RELATED WORK
The service portability across network boundaries has been dealt in detail in Reference [1] and the same concept in the virtual
Home Environment [2],[3],[4],[5] has been described by emulating the behavior of the user home network. Reference [6] describes
the access to mobile services over unlicensed network.UMA helps to perform handover between different wireless networks with the
help of dual-mode handsets. The concept of Application-Layer Mobility is introduced by Schulzrinne [7] and Wedlund [8]. The
roaming problem regarding network integration is described in Reference [9]. AMBIENT provide a way for devices to connect to
each other via any network, through the instant agreements. To reduce scanning time Reference [10] is described and to reduce
handover delay time reference [11,12] is used and [13,14] reduce the authentication delay during handover. All the above described
mechanism does not or very weakly consider the weak signal strength problem, which requires a need of the solution. This paper
provides a PAC (Pre Authentication Connection) model based on HFNF (High Frequency Network First) mechanism.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
__________________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 334
III. ARCHITECTURAL DESIGN OF PAC(PRE AUTHENTICATION CONNECTION)
MECHANISM
To enable instant connection with foreign network, the new PAC module is designed and it is illustrated in the following fig 1.
In the architecture a new module named pre-authentication connection is introduced which is used to establish connection before the
connection between the two host gets disconnected.
[3]
((
[1]
[1]- Request Service [2]- PAC Connection
[3]- Negotiation [4]- Connection
Established if
Fig.1. Pre-Authentication Connection with Partnership Negotiation
When the signal strength falls below the level, the EAP-AC passes the request of service to foreign network server. Once when
the foreign network server identifies that the request is not from home network, the first level basic trust is established using the
network id and as the second stage negotiation is done for instant connection.
IV. TRUST ESTABLISHMENT BETWEEN PROVIDERS – OPEN TRUST MODELS
For immediate, on-demand services, basic trust must be established between the providers before the start of the negotiation
procedure .The trust models is used between two providers to establish trust between them to perform negotiation at the faster rate.
If one network receives an request from unknown network for the usage of its service, the beginning level basic trust is established
between the providers before the start of negotiation procedure. Here the network Id is enough to establish trust between the
providers, as every network posses individual Id while establishing the network infrastructure. Once basic trust is established other
negotiation is done in advance before the connection with home network is disconnected. In other words the providers exchange
roaming agreement dynamically for settlement procedure, processes, agreement suspension and termination, airtime charges,
wholesale rate, and other required features [24] .The novelty in this trust establishment is the use of network ID to identify the
network provider.
V. WORKING PAC MECHANISM FOR INSTANT CONNECTION
A . Mobile Information Service and PAC
In Mobile device when signal gets weak while the call is in progress or the call is not in progress, the neighboring available
network is to be identified and communicated to optimize the handover. The information of nearby networks is obtained by MIS
using query-response mechanisms. The MIS information is used to make the decision for handover at appropriate time. Using this
information intelligent handover decisions is done. The MIS represents information by standard XML (Extended Markup Language)
format. MIS discovers information regarding all neighboring networks and exchanges information regarding network id to establish
basic trust in HFNF basis .
Once the base trust is established with a neighboring providers, the other providers will be in FIFO stack. Before making
negotiation with target provider to establish spontaneous connection, the foreign provider will check whether the home provider
belongs to same list of providers to whom the spontaneous connection is already established earlier. If so then the negotiation is
avoided with the home provider and connection is established based on the rules that is accepted in earlier negotiation .This reduces
[3] [3]
[4]
[1]
[1]- Request Servic [2]- PAC Connection
[3]- Negotiation [4]- Connection
Established if Condition satisfied
[2]
FORIGN PROVIDER
PAC
Home Provider
USER
EAP-AC
PAC
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
__________________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 335
the time and cost of negotiation and avoids repetition of same work. All this work will be done in advance once the signal falls
below the D-thresh hold value, the service can be extended without any delay in time and data loss..
If the home provider is not the member of the foreign provider then negotiates.have to be initiated by Open Trust Model by
using network id and negotiation is done between them by instantly framing the rules as needed to establish spontaneous connection
with two network providers. The connection will be established before the connection gets disconnected because of poor signal. Up
to this level the spontaneous connection is established but handoff doesn’t take place. The hand off will occur only when needed,
even though the pre-connection is established between the network. The hand off decision is done by fuzzy algorithm.
B. Handoff Types
The Handoff mechanism keeps the connection of MT active even when the signal strength gets weaker by changing the
coverage area of one network attachment point to another. Here this work uses vertical handoff since handover is done between
different network providers depending on received signal strength (RSS) .Handoffs can also be classified as soft or hard handoff. In
soft handoff or a make before break handoff MT establish the new connection with the target point before the old connection gets
dropped. The proposed work inherits the soft handoff concept since it establishes pre connection with the foreign provider before
the old connection with the home network gets dropped.
C. Handoff Algorithm Features
An efficient handoff algorithm that is used must be fast so that the user must not experience low quality in their service by
interruption. When the signal falls below the thresh value and no handoff is done, user may feel poor quality of service. A handoff
algorithm must be efficient to make correct decision while calling handoff procedure. The user must feel the good quality of service
after handoff procedure is initiated.
D. Handoff Process
The handoff process consists of 5 stages. 1. Network discovery, 2.Pre-Authenticated connection, 3.Handoff decision, and
4.Handoff execution 5. Handoff monitoring
 Network Discovery- The work of network discovery is to identify or search all the available reachable service broadcasted
by different network providers. This process is always active all time even when no packets is transferred .This is because
only then pre connection can be established when the signal of active network falls below the thresh value. This task is
done and active spontaneous connection is established and the handoff will be done only when needed.
 Pre-Authentication Connection -Once the reachable network is discovered it is maintained in the stack in the High
Frequency First order. In FIFO manner basic trust is established between the home network and foreign network. Once
after basic trust is established, negotiation is performed between the providers and if negotiation succeeds connection is
established else negotiation is done with the other network in the stack.
 Handoff Decision and Mechanism- Handoff is the technique of transferring the service from one coverage area to another
coverage area. This transferring must be done only when the signal strength falls bellow and affects the quality of service.
The calling of handoff procedure is invoked based on the signal strength of active network. The mechanism for handoff
must present in the mobile terminal. In this type, the handoff time is of 0.1 sec. The Mobile searches all the available
networks and measures the signal strengths from surrounding BSs and makes the evaluations to makes Pre Authentication
connection.
 Handoff execution-The handoff procedure will be executed only when SNR is less then D Thresh value. If SNR is less then
C Thresh value pre-connection is established with foreign network and communication between the networks will not be
disconnected until SNR falls below the D thresh value. The handoff procedure will be invoked only when SNR value is less
then D thresh value.
 Handoff Monitoring-The monitoring module will be present in both home network and foreign network. Once when the
handoff execution procedure is invoked then monitoring also will be activated to monitor the signal strength of home
network periodically
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
__________________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -336
HOME N/W MOBILE TERMINAL MIS
FORIGN N/W
SCAN
BASIC TRUST
ESTABLISHED
CONNECTION
KNOWLEDD ESTALISHED
1
NO
Fig.2. PAC and Monitoring System
WIRELESSN/W
SELECTION &
HANDOFF DONE
HAND OFF TO
HOME N/W
HOME N/W MOBOLE TERMINAL MIS
FOREIGN N/W
BASIC TRUST
ESTABLISHED
CONNECTION
ESTABLISHED
=0
=0
=1
NO NO
YES
CONNECTION ESTABLISHED
SNR<CTR
SNR<DTR
SCAN ALL FORIGN
NETWORK &INPUTS
N/W ID & TRESH VALUE
HFNF
APPLICATION
NEGOTIATE
HOME N/W
TRESH VALUE
PAC
CHECHK 0 OR 1
MONITORING
>CTR <CTR
<CTR
CAPTURE SNR
VALUE
WAIT
PREPARE HOME
N/W CONNECTION
APPLICATION
MONITORING
<CTR
>CTR
WIRELESS N/W
SELECTION & HANDOFF
DONE
DATA BASE
NMS
RULE BASED
CAPTURE SNR
VALUE
WAIT
PREPARE HOME
N/W CONNECTION
Wireless N/W
selection & handoff
Done
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
__________________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -337
VI. ALGORITHM FOR NEGOTIATION.
The Negotiation algorithm is used only after basic trust is established with the high frequency networks. Once the basic level
trust is established with the strongest network which is identified by the mobile terminal the negotiation algorithm is invoked for
performing negotiation with the foreign network. If negotiation gets succeed pre connection will be established else next high
frequency network will taken in to account which available in stack for the negotiation. The process is continued until negotiation
gets succeeded. Spontaneous connection is done in 5 stages as discovery, pre-connection, decision, execution and monitoring
phases. Execution phase is performed using MIP, the concept of decision making and fuzzy logic is applied while performing pre
connection with the foreign network. The algorithm consists of two parts:
 Pre-connection Initiation Algorithm which is present in fuzzy engine establish the connection with the foreign
network before the service gets disconnected.
 An algorithm is present to perform negotiation which selects the Network from the available network.
A . Working Of Fuzzy Handoff Decision Algorithm
Only when the unavailability of an old network service is detected the handoff decision function is called. Then the two-part
algorithm is executed to perform the handoff from old service to new foreign network. The algorithm consists of the following
functional blocks.
 a IPB transforms the received signal strength as the inputs
 a rule base structure block contains a number of IF-THEN rules;
 a database block contains the membership functions which is used the fuzzy rules;
 The decision operation weather to perform negotiation or not are performed by interference engine by using fuzzy
rules;
 A OPB performs the operation of displaying the final output.
VII. HANDOFF INITIATION ALGORITHM
The procedure to calculate and select an appropriate time to transfer the present service to other network for extending the
service without any detonation in QOS is needed. To perform this, fuzzy concept is used for computing the handoff value which is
used to decide whether handoff is needed from UMTS home network to UMTS foreign network. The work consists of two handoff
technique. 1.Handoff from home UMTS provider to foreign UMTS provider, and 2. Handoff from foreign UMTS provider to from
home UMTS provider
A. Handoff From Home UMTS Provider to Foreign UMTS
In mobile terminal, handoff initiation algorithm is implemented which provide rules for decision making. A MT which is
connected to a UMTS network detects a new foreign UMTS network, and calculates the handoff factor to decide whether the MT
should perform the handoff operation to the foreign UMTS. For intelligent handoff decision, parameters such as received signal
strength is sent as input to establish the basic trust between the networks and then the negotiation procedure is invoked to establish
the pre connection .Once after establishing pre connection the handoff initiation algorithm can be called any time to perform the
handoff operation to extent the service without affection the service quality. The RSSI and data rate indicate the availability of the
target network. The values of the RSSI input parameters are given as input to the initiate algorithm.
The algorithm then transforms the frequency value to pre connection function .The Pre connection function checks the
membership of the network in the data base with the set of If-Then rules to identify weather the negotiation is to be initiated or it has
already performed. If the network is the member, no negotiation is needed and pre connection can be established immediately else
negotiation function must be called to perform the negotiation. Once after establishing pre connection the handoff can be performed
any time when needed. If the signal strength falls below the D thresh value the handoff initiation procedure is invoked to perform the
handoff from current network service to foreign network.
The variable Handoff Factor is defined from 0 to 1, with the maximum membership of the sets “Higher” and “Lower” at 0 and
1, respectively. The fuzzy rule base contains IF-THEN rules such as:
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
__________________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -338
 IF RSSI is weak, network coverage area is bad, data rate is low, QoS is undesirable, THEN handoff factor is higher
 IF RSSI is medium, network coverage area is medium ,data rate is medium, QoS is acceptable, THEN hand off
factor is average and pre-connection is done
 IF RSSI is strong, data rate is high, network coverage area is good, QoS is desirable, THEN handoff factor is lower
The crisp handoff factor computed after defuzzification is used to determine when a handoff and pre-connection is required as
follows:
if handoff factor < 0.15, then initiate handoff;
if handoff factor < 0.60, then initiate Pre connection by negotiation;
if handoff factor > 0.60, do nothing;
B. Handoff from Foreign Network To Home Network
When home network extend its service by establishing spontaneous connection with foreign network, the monitoring module
which is present in foreign network will Searches for home network signal periodically. If SNR value is above C Thresh, MT
switches from foreign UMTS to Home UMTS. Two thresholds defined to avoid “Ping-Pong” effect. An exponential moving average
of the SNR is used. Only SNR of the Home UMTS is monitored as MT prefers home network because of the short term spontaneous
agreement. , we need to have an accurate and timely handoff decision to maintain the connectivity before the loss of service.
VIII. HANDOFF MONITORING
In the work Monitoring module is introduced both in Home and foreign provider which helps the Foreign provider to switch of
the guest user to their home network when SNR value is above the C thresh value. The monitoring module will be initiated once the
hand off is done with foreign provider. Both the Monitoring module that is present in home and foreign provider will ping pong and
communicate each other and exchange the SNR value. The SNR value will be monitored periodically and hand off is initiated
based on the C thresh value
IX. CONCLUSION
The PAC and monitoring architecture work together instantly and securely without pre-established formal roaming agreement.
Instant and dynamic roaming are established through 2 stage process. In step1 only basic trust and pre-connection is established,
handoff is not done. In step 2 handoff is performed only when needed by using fuzzy concepts. Once after initiating handoff
monitoring is done to return the service to home network. As a future work power balancing approach using SPINE hierarchy can be
adopted to avoid the dropping of connection due to power loss.
REFERENCES:
[1] ETSI, “ETSI TS 22.70. Universal Mobile Telecommunication System (UMTS): Virtual Home Environment,” Draft Version,
June 1997.
[2] M. Grech, “Customized Applications for Mobile Network Enhanced Logic (CAMEL),” 3GPP TS 22.078, 3GPP, 2005.
[3] Mobile Execution Environment (MExE) Service description,” 3GPP TS 23.057, 3GPP, 2005.
[4] Open Service Access (OSA) Stage 2, Rel. 7,” 3GPPTS 23.198, 3GPP, 2006.
[5] Universal Subscriber Identity Module (USIM) Application Toolkit (USAT) Rel. 7,” 3GPP TS 31.111, 3GPP, 2006.
[6] 3GPP, “3GPP Release 6, Technical Specifications and Technical Reports for a UTRAN-based 3GPP system,” January 2006.
[7] H. Schulzrinne and E. Wedlund, “Application-Layer Mobility Using SIP,” SIGMOBILE Mob. Comput Commun. Rev., vol. 4,
no. 3, pp. 47–57, 2000.
[8] E. Wedlund and H. Schulzrinne, “Mobility Support using SIP,” in IEEE/ACM Multimedia Conference WOWMON, 1999.
[9] B. Ahlgrn, L. Eggert, B. Ohlman, and A. Schieder, “Ambient Networks: Bridging Heterogeneous Network Domains,” in Proc.
16th Annual IEEE International Symposium on Personal Indoor and Proc. 16 th Annual IEEE International Symposium on
Personal Indoor and Mobile Radio Communications (PIMRC), Berlin,Germany, September 2005.
[10] Shin, S., Forte, G., Rawat, A.S., & Schulzrinne, H. (2004).ReducingMAClayer handover latency in IEEE 802.11 wireless
LANs. Proceedings of ACM 2004 MOBIWAC, September 2004, Philadelphia, USA.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
__________________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -339
[11]. Dutta, A., Madhani, S., Chen, W., Altinas, O., & Schulzrinne, H. (2004). Fast handover schemes for application layer mobility
management. In: Proceedings of IEEE PIMRC. September 2004, Barcelona, Spain
[12]. Park, S., Kim, P., & Volz, B. (March 2005). Rapid commit option for DHCP v4. IETF RFC 4039.
[13]. Bargh, M. S., Hulsebosch, R. J., Eertink, E. H., Prasad, A., Wang, H. et al. Fast authentication methods for handovers between
IEEE 802.11 wireless LANs. In: Proceedings of ACM WMASH 2004. Philadelphia.
[14]. Shin, M., Mishra, A., Arbaugh,W. A., et al. (2004). Improving the latency of 802.11 hand-offs using neighbor graphs.
M/USENIX International Conference on Mobile Systems, Applications and Services (Mobisys), June, 2004, Boston, MA.
[15]. Velyaos, H., & Karlsson, G. Techniques to reduce the IEEE 802.11b handoff time. KungiTekniska Hogskolen, Stockholm,
Sweden, Technical Report TRITA.
[16] M. Ylianttila et al., “Optimization scheme for Mobile Users Performing Vertical Handoffs between IEEE 802.11 and
GPRS/EDGE Networks”, Proc. of IEEE GLOBECOM’01, San Antonio, Texas, USA, Nov 2001, pp. 3439-3443.
[17] H. Wang et al., “Policy-enabled Handoffs across Heterogeneous Wireless Networks”, Proc. of Mobile Comp. Sys. and Apps.,
New Orleans, LA, Feb 1999.
[18] A. A. Koutsorodi et al., “Terminal Management and Intelligent Access Selection in Heterogeneous Environments”, Mobile
Networks and Applications, (2006) 11, pp. 861-871
[19] Q. Song and A. Jamalipour, “Network Selection in an Integrated Wireless LAN and UMTS Environment using Mathematical
Modeling and Computing Techniques”, IEEE Wireless Communications, June 2005, pp. 42-48.
[20] P. M. L. Chan et al., “Mobility Management Incorporating Fuzzy Logic for a Heterogeneous IP Environment”, IEEE
Communications Magazine, December 2001, pp. 42-51.
[21]. Weroam service: http://www.weroam.com
[22].Comfone service: http://www.comfone.com/_main_pages/services/broker/key2roam.htm
[23]Ambient Networks Security Architecture document
http://www.ambientnetworks.org/phase1web/publications/D7_2_Ambient_Network_Security_Architecture_PUdf
[24] J. Strassner, “Policy Based Network Management”, Morgan Kaufman Publishers, (2003)

More Related Content

PDF
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
PDF
Irrational node detection in multihop cellular networks using accounting center
PDF
Irrational node detection in multihop cellular
PDF
Selfish Node Isolation & Incentivation using Progressive Thresholds
PDF
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
PDF
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
PDF
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
PDF
Ijarcet vol-2-issue-3-875-880
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular
Selfish Node Isolation & Incentivation using Progressive Thresholds
Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Ijarcet vol-2-issue-3-875-880

What's hot (19)

PDF
Link Reliability based Detection and Predecessor base Route Establishment for...
PDF
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
PDF
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
PDF
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PDF
Low-cost wireless mesh communications based on openWRT and voice over interne...
PDF
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
PDF
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
PDF
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
PDF
A vertical handover decision approaches in next generation wireless networks ...
PDF
A review on distributed beam forming techniques an approach in wireless rela...
PDF
Enhance the Throughput of Wireless Network Using Multicast Routing
PDF
Fast Mobile IPv6 Handover Using Link and Location Information
PDF
Analysis of security roaming network and privacy preserving mechanism
PDF
SUBSIDING ROUTING MISBEHAVIOR IN MANET USING “MIRROR MODEL
PDF
“Reducing packet loss in manet”
PDF
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
PDF
NGN Next Generation Networks
PDF
A comparative analysis of number portability routing schemes
PDF
Estimation of Harvested Energy from the Traffic Patterns Associated with Nodes
Link Reliability based Detection and Predecessor base Route Establishment for...
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
A Study on Hardware and Software Link Quality Metrics for Wireless Multimedia...
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
Low-cost wireless mesh communications based on openWRT and voice over interne...
DATA FALSIFICATION LENIENT SECURE SPECTRUM SENSING BY COGNITIVE USER RELIABIL...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
ALLOCATION OF POWER IN RELAY NETWORKS FOR SECURED COMMUNICATION
A vertical handover decision approaches in next generation wireless networks ...
A review on distributed beam forming techniques an approach in wireless rela...
Enhance the Throughput of Wireless Network Using Multicast Routing
Fast Mobile IPv6 Handover Using Link and Location Information
Analysis of security roaming network and privacy preserving mechanism
SUBSIDING ROUTING MISBEHAVIOR IN MANET USING “MIRROR MODEL
“Reducing packet loss in manet”
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
NGN Next Generation Networks
A comparative analysis of number portability routing schemes
Estimation of Harvested Energy from the Traffic Patterns Associated with Nodes
Ad

Viewers also liked (10)

PDF
Улучшить юзабилити сайта
PPTX
Kritika gupta pgp30030 sec_b
PDF
Presentation
PDF
GOOG_VALUATION
PDF
Разработка логотипа и фирменного стиля
DOC
Resume of Md. Masrur-Ul-Bari
PDF
Wills_Allison_Portfolio_2016
PDF
Optimal Capacitor Placement for IEEE 14 bus system using Genetic Algorithm
PDF
User manual v 1.0 yuva cyber cell
PPSX
03 Pencampuran dan Psikologi Warna
Улучшить юзабилити сайта
Kritika gupta pgp30030 sec_b
Presentation
GOOG_VALUATION
Разработка логотипа и фирменного стиля
Resume of Md. Masrur-Ul-Bari
Wills_Allison_Portfolio_2016
Optimal Capacitor Placement for IEEE 14 bus system using Genetic Algorithm
User manual v 1.0 yuva cyber cell
03 Pencampuran dan Psikologi Warna
Ad

Similar to Zero Down 24*n Mobile Network Connectivity (20)

PDF
Enhanced security in spontaneous wireless ad hoc
PDF
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
PDF
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
PDF
Volume 2-issue-6-2021-2029
PDF
Volume 2-issue-6-2021-2029
PDF
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
PDF
A Framework for Improving the Performance of MANET by Controlling Data Traffi...
PDF
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
PDF
Anomaly detection in the services provided by multi cloud architectures a survey
PDF
Automatic Management of Wireless Sensor Networks through Cloud Computing
PDF
Unified Billing-Realization of convergent architecture for charging and billi...
PDF
Performance Evaluation of Bidirectional Forwarding Detection (BFD) over the ...
PDF
C0941017
PDF
Secured client cache sustain for maintaining consistency in manets
PDF
Analysis of back propagation and radial basis function neural networks for ha...
DOCX
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
PDF
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
PDF
Wireless Network Intrinsic Secrecy
PDF
Introduction Pervasive computing demands the all-encompassing exploi.pdf
PDF
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...
Enhanced security in spontaneous wireless ad hoc
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Framework for Improving the Performance of MANET by Controlling Data Traffi...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
Anomaly detection in the services provided by multi cloud architectures a survey
Automatic Management of Wireless Sensor Networks through Cloud Computing
Unified Billing-Realization of convergent architecture for charging and billi...
Performance Evaluation of Bidirectional Forwarding Detection (BFD) over the ...
C0941017
Secured client cache sustain for maintaining consistency in manets
Analysis of back propagation and radial basis function neural networks for ha...
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKS
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
Wireless Network Intrinsic Secrecy
Introduction Pervasive computing demands the all-encompassing exploi.pdf
ANFIS Based Temporally Ordered Routing Algorithm to Enhance the Performance i...

More from AM Publications (20)

PDF
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
PDF
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
PDF
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
PDF
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
PDF
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
PDF
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
PDF
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
PDF
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
PDF
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
PDF
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PDF
INTELLIGENT BLIND STICK
PDF
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
PDF
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
PDF
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
PDF
OPTICAL CHARACTER RECOGNITION USING RBFNN
PDF
DETECTION OF MOVING OBJECT
PDF
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
PDF
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PDF
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
PDF
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
INTELLIGENT BLIND STICK
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
OPTICAL CHARACTER RECOGNITION USING RBFNN
DETECTION OF MOVING OBJECT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY

Recently uploaded (20)

PDF
Applications of Equal_Area_Criterion.pdf
PPTX
Software Engineering and software moduleing
PPTX
Feature types and data preprocessing steps
PDF
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
PPTX
mechattonicsand iotwith sensor and actuator
PPTX
Information Storage and Retrieval Techniques Unit III
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
Principal presentation for NAAC (1).pptx
PDF
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PDF
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
PDF
Unit1 - AIML Chapter 1 concept and ethics
PPTX
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PDF
Computer organization and architecuture Digital Notes....pdf
PPTX
Building constraction Conveyance of water.pptx
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPT
Chapter 1 - Introduction to Manufacturing Technology_2.ppt
Applications of Equal_Area_Criterion.pdf
Software Engineering and software moduleing
Feature types and data preprocessing steps
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
mechattonicsand iotwith sensor and actuator
Information Storage and Retrieval Techniques Unit III
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
20250617 - IR - Global Guide for HR - 51 pages.pdf
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Principal presentation for NAAC (1).pptx
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
MLpara ingenieira CIVIL, meca Y AMBIENTAL
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
Unit1 - AIML Chapter 1 concept and ethics
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
Computer organization and architecuture Digital Notes....pdf
Building constraction Conveyance of water.pptx
distributed database system" (DDBS) is often used to refer to both the distri...
Chapter 1 - Introduction to Manufacturing Technology_2.ppt

Zero Down 24*n Mobile Network Connectivity

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com __________________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 333 Zero Down 24*n Mobile Network Connectivity D.Kadhirvelu G.Aghila Research Scholar, Professor and Head, NIT Bharathiar university Puducherry,karaikal Abstract— Today, lots of connectivity problem in wireless mobile communication are due to weak signal strength. To overcome this problem a novel idea of utilizing and enabling the service mobility between heterogeneous mobile service providers has been explored. The basic idea behind the work is to make the heterogeneous providers to work together and to establish and extend the connection in a spontaneous fashion, without making pre-established roaming agreements. At present roaming agreements are set manually between the providers, but it is costly and time-consuming process. The idea is when the user moves out of the home coverage area or when the signal gets down in a mobile terminal even when the mobile terminal is not in use, the connections have to be extended to provide 100 % connectivity to the user by the available foreign network which eliminates the problem of “not reachable” condition in mobile network. So for, the related works focuses on extension of connectivity only while the call is in progress. But this paper fully concentrate on 24 hrs * N days connectivity whether the user call is on or off progress by proposing a model called the PAC(Pre-Authenticated Connection) and it is designed by using HFNF(High Frequency network first)technique which establish roaming agreements directly between operators before the connection is disconnected. This architecture ensures the connectivity except in the case of power loss. In future we plan to extend the connectivity even in power loss by balancing the power in spine hierarchy. Keywords— PAC, HFNF, CTRESH, DTRESH, Handoff. I. INTRODUCTION The GSM systems have the ability to make and receive phone calls to and from other networks. For the consumers to get the desired service and high coverage the different network agent can join together to give the desired service. At present different network agent join together via static roaming procedure which is said in [21,22]. As pre-roaming agreements can’t be established with all possible provider the users will be disconnected if service is unavailable in home network. To overcome the above problem, “instant agreement” for roaming between different various network agent is proposed so that the users can get services from multiple network agent. To overcome the same issue PAC mechanism is proposed to establish the connection before the pervious connection with home network gets disconnected. This paper address the ability to decide correctly the time to call PAC mechanism based on the strength of signal. This work also proposes a architecture with a modification in an physical layer of OSI model with Pre authentication connection module which establish an instant connection with foreign network. Knowledge based mechanisms are proposed to establish spontaneous roaming agreements. This proposed architecture consists of knowledge based system with the databases that hold profile, intersystem handover control rules and the network management system. Based on this mechanism a Fuzzy-Based algorithm is designed which identifies the correct time to do the handover to the other foreign network to extend the service dynamically. The supportive idea of this work is presented in section 2.The architecture of proposed PAC mechanism is described in section 3.The open trust model is explained in section 4.The detailed working procedure and handoff is explained in section 5. Algorithm for rules and negotiation is explained in section 6.Section 7 explains about handoff initiation procedure. Section 8 explains about handoff monitoring procedure. Section 9 concludes the concept with future idea. II. BACKGROUND AND RELATED WORK The service portability across network boundaries has been dealt in detail in Reference [1] and the same concept in the virtual Home Environment [2],[3],[4],[5] has been described by emulating the behavior of the user home network. Reference [6] describes the access to mobile services over unlicensed network.UMA helps to perform handover between different wireless networks with the help of dual-mode handsets. The concept of Application-Layer Mobility is introduced by Schulzrinne [7] and Wedlund [8]. The roaming problem regarding network integration is described in Reference [9]. AMBIENT provide a way for devices to connect to each other via any network, through the instant agreements. To reduce scanning time Reference [10] is described and to reduce handover delay time reference [11,12] is used and [13,14] reduce the authentication delay during handover. All the above described mechanism does not or very weakly consider the weak signal strength problem, which requires a need of the solution. This paper provides a PAC (Pre Authentication Connection) model based on HFNF (High Frequency Network First) mechanism.
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com __________________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 334 III. ARCHITECTURAL DESIGN OF PAC(PRE AUTHENTICATION CONNECTION) MECHANISM To enable instant connection with foreign network, the new PAC module is designed and it is illustrated in the following fig 1. In the architecture a new module named pre-authentication connection is introduced which is used to establish connection before the connection between the two host gets disconnected. [3] (( [1] [1]- Request Service [2]- PAC Connection [3]- Negotiation [4]- Connection Established if Fig.1. Pre-Authentication Connection with Partnership Negotiation When the signal strength falls below the level, the EAP-AC passes the request of service to foreign network server. Once when the foreign network server identifies that the request is not from home network, the first level basic trust is established using the network id and as the second stage negotiation is done for instant connection. IV. TRUST ESTABLISHMENT BETWEEN PROVIDERS – OPEN TRUST MODELS For immediate, on-demand services, basic trust must be established between the providers before the start of the negotiation procedure .The trust models is used between two providers to establish trust between them to perform negotiation at the faster rate. If one network receives an request from unknown network for the usage of its service, the beginning level basic trust is established between the providers before the start of negotiation procedure. Here the network Id is enough to establish trust between the providers, as every network posses individual Id while establishing the network infrastructure. Once basic trust is established other negotiation is done in advance before the connection with home network is disconnected. In other words the providers exchange roaming agreement dynamically for settlement procedure, processes, agreement suspension and termination, airtime charges, wholesale rate, and other required features [24] .The novelty in this trust establishment is the use of network ID to identify the network provider. V. WORKING PAC MECHANISM FOR INSTANT CONNECTION A . Mobile Information Service and PAC In Mobile device when signal gets weak while the call is in progress or the call is not in progress, the neighboring available network is to be identified and communicated to optimize the handover. The information of nearby networks is obtained by MIS using query-response mechanisms. The MIS information is used to make the decision for handover at appropriate time. Using this information intelligent handover decisions is done. The MIS represents information by standard XML (Extended Markup Language) format. MIS discovers information regarding all neighboring networks and exchanges information regarding network id to establish basic trust in HFNF basis . Once the base trust is established with a neighboring providers, the other providers will be in FIFO stack. Before making negotiation with target provider to establish spontaneous connection, the foreign provider will check whether the home provider belongs to same list of providers to whom the spontaneous connection is already established earlier. If so then the negotiation is avoided with the home provider and connection is established based on the rules that is accepted in earlier negotiation .This reduces [3] [3] [4] [1] [1]- Request Servic [2]- PAC Connection [3]- Negotiation [4]- Connection Established if Condition satisfied [2] FORIGN PROVIDER PAC Home Provider USER EAP-AC PAC
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com __________________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 335 the time and cost of negotiation and avoids repetition of same work. All this work will be done in advance once the signal falls below the D-thresh hold value, the service can be extended without any delay in time and data loss.. If the home provider is not the member of the foreign provider then negotiates.have to be initiated by Open Trust Model by using network id and negotiation is done between them by instantly framing the rules as needed to establish spontaneous connection with two network providers. The connection will be established before the connection gets disconnected because of poor signal. Up to this level the spontaneous connection is established but handoff doesn’t take place. The hand off will occur only when needed, even though the pre-connection is established between the network. The hand off decision is done by fuzzy algorithm. B. Handoff Types The Handoff mechanism keeps the connection of MT active even when the signal strength gets weaker by changing the coverage area of one network attachment point to another. Here this work uses vertical handoff since handover is done between different network providers depending on received signal strength (RSS) .Handoffs can also be classified as soft or hard handoff. In soft handoff or a make before break handoff MT establish the new connection with the target point before the old connection gets dropped. The proposed work inherits the soft handoff concept since it establishes pre connection with the foreign provider before the old connection with the home network gets dropped. C. Handoff Algorithm Features An efficient handoff algorithm that is used must be fast so that the user must not experience low quality in their service by interruption. When the signal falls below the thresh value and no handoff is done, user may feel poor quality of service. A handoff algorithm must be efficient to make correct decision while calling handoff procedure. The user must feel the good quality of service after handoff procedure is initiated. D. Handoff Process The handoff process consists of 5 stages. 1. Network discovery, 2.Pre-Authenticated connection, 3.Handoff decision, and 4.Handoff execution 5. Handoff monitoring  Network Discovery- The work of network discovery is to identify or search all the available reachable service broadcasted by different network providers. This process is always active all time even when no packets is transferred .This is because only then pre connection can be established when the signal of active network falls below the thresh value. This task is done and active spontaneous connection is established and the handoff will be done only when needed.  Pre-Authentication Connection -Once the reachable network is discovered it is maintained in the stack in the High Frequency First order. In FIFO manner basic trust is established between the home network and foreign network. Once after basic trust is established, negotiation is performed between the providers and if negotiation succeeds connection is established else negotiation is done with the other network in the stack.  Handoff Decision and Mechanism- Handoff is the technique of transferring the service from one coverage area to another coverage area. This transferring must be done only when the signal strength falls bellow and affects the quality of service. The calling of handoff procedure is invoked based on the signal strength of active network. The mechanism for handoff must present in the mobile terminal. In this type, the handoff time is of 0.1 sec. The Mobile searches all the available networks and measures the signal strengths from surrounding BSs and makes the evaluations to makes Pre Authentication connection.  Handoff execution-The handoff procedure will be executed only when SNR is less then D Thresh value. If SNR is less then C Thresh value pre-connection is established with foreign network and communication between the networks will not be disconnected until SNR falls below the D thresh value. The handoff procedure will be invoked only when SNR value is less then D thresh value.  Handoff Monitoring-The monitoring module will be present in both home network and foreign network. Once when the handoff execution procedure is invoked then monitoring also will be activated to monitor the signal strength of home network periodically
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com __________________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -336 HOME N/W MOBILE TERMINAL MIS FORIGN N/W SCAN BASIC TRUST ESTABLISHED CONNECTION KNOWLEDD ESTALISHED 1 NO Fig.2. PAC and Monitoring System WIRELESSN/W SELECTION & HANDOFF DONE HAND OFF TO HOME N/W HOME N/W MOBOLE TERMINAL MIS FOREIGN N/W BASIC TRUST ESTABLISHED CONNECTION ESTABLISHED =0 =0 =1 NO NO YES CONNECTION ESTABLISHED SNR<CTR SNR<DTR SCAN ALL FORIGN NETWORK &INPUTS N/W ID & TRESH VALUE HFNF APPLICATION NEGOTIATE HOME N/W TRESH VALUE PAC CHECHK 0 OR 1 MONITORING >CTR <CTR <CTR CAPTURE SNR VALUE WAIT PREPARE HOME N/W CONNECTION APPLICATION MONITORING <CTR >CTR WIRELESS N/W SELECTION & HANDOFF DONE DATA BASE NMS RULE BASED CAPTURE SNR VALUE WAIT PREPARE HOME N/W CONNECTION Wireless N/W selection & handoff Done
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com __________________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -337 VI. ALGORITHM FOR NEGOTIATION. The Negotiation algorithm is used only after basic trust is established with the high frequency networks. Once the basic level trust is established with the strongest network which is identified by the mobile terminal the negotiation algorithm is invoked for performing negotiation with the foreign network. If negotiation gets succeed pre connection will be established else next high frequency network will taken in to account which available in stack for the negotiation. The process is continued until negotiation gets succeeded. Spontaneous connection is done in 5 stages as discovery, pre-connection, decision, execution and monitoring phases. Execution phase is performed using MIP, the concept of decision making and fuzzy logic is applied while performing pre connection with the foreign network. The algorithm consists of two parts:  Pre-connection Initiation Algorithm which is present in fuzzy engine establish the connection with the foreign network before the service gets disconnected.  An algorithm is present to perform negotiation which selects the Network from the available network. A . Working Of Fuzzy Handoff Decision Algorithm Only when the unavailability of an old network service is detected the handoff decision function is called. Then the two-part algorithm is executed to perform the handoff from old service to new foreign network. The algorithm consists of the following functional blocks.  a IPB transforms the received signal strength as the inputs  a rule base structure block contains a number of IF-THEN rules;  a database block contains the membership functions which is used the fuzzy rules;  The decision operation weather to perform negotiation or not are performed by interference engine by using fuzzy rules;  A OPB performs the operation of displaying the final output. VII. HANDOFF INITIATION ALGORITHM The procedure to calculate and select an appropriate time to transfer the present service to other network for extending the service without any detonation in QOS is needed. To perform this, fuzzy concept is used for computing the handoff value which is used to decide whether handoff is needed from UMTS home network to UMTS foreign network. The work consists of two handoff technique. 1.Handoff from home UMTS provider to foreign UMTS provider, and 2. Handoff from foreign UMTS provider to from home UMTS provider A. Handoff From Home UMTS Provider to Foreign UMTS In mobile terminal, handoff initiation algorithm is implemented which provide rules for decision making. A MT which is connected to a UMTS network detects a new foreign UMTS network, and calculates the handoff factor to decide whether the MT should perform the handoff operation to the foreign UMTS. For intelligent handoff decision, parameters such as received signal strength is sent as input to establish the basic trust between the networks and then the negotiation procedure is invoked to establish the pre connection .Once after establishing pre connection the handoff initiation algorithm can be called any time to perform the handoff operation to extent the service without affection the service quality. The RSSI and data rate indicate the availability of the target network. The values of the RSSI input parameters are given as input to the initiate algorithm. The algorithm then transforms the frequency value to pre connection function .The Pre connection function checks the membership of the network in the data base with the set of If-Then rules to identify weather the negotiation is to be initiated or it has already performed. If the network is the member, no negotiation is needed and pre connection can be established immediately else negotiation function must be called to perform the negotiation. Once after establishing pre connection the handoff can be performed any time when needed. If the signal strength falls below the D thresh value the handoff initiation procedure is invoked to perform the handoff from current network service to foreign network. The variable Handoff Factor is defined from 0 to 1, with the maximum membership of the sets “Higher” and “Lower” at 0 and 1, respectively. The fuzzy rule base contains IF-THEN rules such as:
  • 6. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com __________________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -338  IF RSSI is weak, network coverage area is bad, data rate is low, QoS is undesirable, THEN handoff factor is higher  IF RSSI is medium, network coverage area is medium ,data rate is medium, QoS is acceptable, THEN hand off factor is average and pre-connection is done  IF RSSI is strong, data rate is high, network coverage area is good, QoS is desirable, THEN handoff factor is lower The crisp handoff factor computed after defuzzification is used to determine when a handoff and pre-connection is required as follows: if handoff factor < 0.15, then initiate handoff; if handoff factor < 0.60, then initiate Pre connection by negotiation; if handoff factor > 0.60, do nothing; B. Handoff from Foreign Network To Home Network When home network extend its service by establishing spontaneous connection with foreign network, the monitoring module which is present in foreign network will Searches for home network signal periodically. If SNR value is above C Thresh, MT switches from foreign UMTS to Home UMTS. Two thresholds defined to avoid “Ping-Pong” effect. An exponential moving average of the SNR is used. Only SNR of the Home UMTS is monitored as MT prefers home network because of the short term spontaneous agreement. , we need to have an accurate and timely handoff decision to maintain the connectivity before the loss of service. VIII. HANDOFF MONITORING In the work Monitoring module is introduced both in Home and foreign provider which helps the Foreign provider to switch of the guest user to their home network when SNR value is above the C thresh value. The monitoring module will be initiated once the hand off is done with foreign provider. Both the Monitoring module that is present in home and foreign provider will ping pong and communicate each other and exchange the SNR value. The SNR value will be monitored periodically and hand off is initiated based on the C thresh value IX. CONCLUSION The PAC and monitoring architecture work together instantly and securely without pre-established formal roaming agreement. Instant and dynamic roaming are established through 2 stage process. In step1 only basic trust and pre-connection is established, handoff is not done. In step 2 handoff is performed only when needed by using fuzzy concepts. Once after initiating handoff monitoring is done to return the service to home network. As a future work power balancing approach using SPINE hierarchy can be adopted to avoid the dropping of connection due to power loss. REFERENCES: [1] ETSI, “ETSI TS 22.70. Universal Mobile Telecommunication System (UMTS): Virtual Home Environment,” Draft Version, June 1997. [2] M. Grech, “Customized Applications for Mobile Network Enhanced Logic (CAMEL),” 3GPP TS 22.078, 3GPP, 2005. [3] Mobile Execution Environment (MExE) Service description,” 3GPP TS 23.057, 3GPP, 2005. [4] Open Service Access (OSA) Stage 2, Rel. 7,” 3GPPTS 23.198, 3GPP, 2006. [5] Universal Subscriber Identity Module (USIM) Application Toolkit (USAT) Rel. 7,” 3GPP TS 31.111, 3GPP, 2006. [6] 3GPP, “3GPP Release 6, Technical Specifications and Technical Reports for a UTRAN-based 3GPP system,” January 2006. [7] H. Schulzrinne and E. Wedlund, “Application-Layer Mobility Using SIP,” SIGMOBILE Mob. Comput Commun. Rev., vol. 4, no. 3, pp. 47–57, 2000. [8] E. Wedlund and H. Schulzrinne, “Mobility Support using SIP,” in IEEE/ACM Multimedia Conference WOWMON, 1999. [9] B. Ahlgrn, L. Eggert, B. Ohlman, and A. Schieder, “Ambient Networks: Bridging Heterogeneous Network Domains,” in Proc. 16th Annual IEEE International Symposium on Personal Indoor and Proc. 16 th Annual IEEE International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), Berlin,Germany, September 2005. [10] Shin, S., Forte, G., Rawat, A.S., & Schulzrinne, H. (2004).ReducingMAClayer handover latency in IEEE 802.11 wireless LANs. Proceedings of ACM 2004 MOBIWAC, September 2004, Philadelphia, USA.
  • 7. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com __________________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -339 [11]. Dutta, A., Madhani, S., Chen, W., Altinas, O., & Schulzrinne, H. (2004). Fast handover schemes for application layer mobility management. In: Proceedings of IEEE PIMRC. September 2004, Barcelona, Spain [12]. Park, S., Kim, P., & Volz, B. (March 2005). Rapid commit option for DHCP v4. IETF RFC 4039. [13]. Bargh, M. S., Hulsebosch, R. J., Eertink, E. H., Prasad, A., Wang, H. et al. Fast authentication methods for handovers between IEEE 802.11 wireless LANs. In: Proceedings of ACM WMASH 2004. Philadelphia. [14]. Shin, M., Mishra, A., Arbaugh,W. A., et al. (2004). Improving the latency of 802.11 hand-offs using neighbor graphs. M/USENIX International Conference on Mobile Systems, Applications and Services (Mobisys), June, 2004, Boston, MA. [15]. Velyaos, H., & Karlsson, G. Techniques to reduce the IEEE 802.11b handoff time. KungiTekniska Hogskolen, Stockholm, Sweden, Technical Report TRITA. [16] M. Ylianttila et al., “Optimization scheme for Mobile Users Performing Vertical Handoffs between IEEE 802.11 and GPRS/EDGE Networks”, Proc. of IEEE GLOBECOM’01, San Antonio, Texas, USA, Nov 2001, pp. 3439-3443. [17] H. Wang et al., “Policy-enabled Handoffs across Heterogeneous Wireless Networks”, Proc. of Mobile Comp. Sys. and Apps., New Orleans, LA, Feb 1999. [18] A. A. Koutsorodi et al., “Terminal Management and Intelligent Access Selection in Heterogeneous Environments”, Mobile Networks and Applications, (2006) 11, pp. 861-871 [19] Q. Song and A. Jamalipour, “Network Selection in an Integrated Wireless LAN and UMTS Environment using Mathematical Modeling and Computing Techniques”, IEEE Wireless Communications, June 2005, pp. 42-48. [20] P. M. L. Chan et al., “Mobility Management Incorporating Fuzzy Logic for a Heterogeneous IP Environment”, IEEE Communications Magazine, December 2001, pp. 42-51. [21]. Weroam service: http://www.weroam.com [22].Comfone service: http://www.comfone.com/_main_pages/services/broker/key2roam.htm [23]Ambient Networks Security Architecture document http://www.ambientnetworks.org/phase1web/publications/D7_2_Ambient_Network_Security_Architecture_PUdf [24] J. Strassner, “Policy Based Network Management”, Morgan Kaufman Publishers, (2003)