SlideShare a Scribd company logo
1 of 6
Download to read offline
Venkadesh.R, Dr.K. Rajan / International Journal of Engineering Research and Applications
              (IJERA)                ISSN: 2248-9622           www.ijera.com
                    Vol. 2, Issue 5, September- October 2012, pp.057-062
An Effective Solution to Reduce Web Traffic In Wireless Network
              Architecture By Using Proxy Servers
                             Venkadesh.R* and Dr.K. Rajan **
                     *( Vice-Principal, Vel Tech Engineering College Chennai-62, India.)
                          **( Principal, Vel Tech Engineering college, Chennai-62. )

ABSTRACT
         The Higher-Level and Lower-Level Proxy           maximum data rate of about 480 Kbps to be offered
servers is an effective solution to reduce Web            by the EDGE system. We note that one major
traffic and integrated wireless network                   shortcoming of the WLAN services is its limited
architecture using Proxy servers to support               service coverage. That is, due to lack of national
mobility management. The technique takes                  wireless infrastructure, the WLAN service providers
advantage of the existing functionalities of proxy        can offer services only in limited areas such as
servers to provide mobility support for                   airport and convention center. As a result, users
applications such as Web browsing, HTTP and               traveling outside of the WLAN areas cannot obtain
FTP, without modifying the IP protocol stack of           any services at all. On the other hand, many cellular
the mobile host. The architecture uses proxy              network operators have a nation-wide footprint,
servers to force all packets originating from             although the data rate will not be comparable with
mobile hosts to a close-by mobility-aware router          that of the WLAN. For the reason, an integrated
so that the latter can maintain active data               MAR and WLAN network for enhanced, seamless
connections during handoffs across different              wireless data services that take advantage of the wide
networks. By deploying multiple proxy and                 coverage of the cellular networks and provide high
mobility-aware router pairs and by assigning              data rate through WLAN whenever it is possible is an
mobile hosts to proxy servers dynamically, the            ideal solution.
proposed architecture provides efficient mobility                   A schematic represent of the integrated (or
management functionalities, and is inherently             overlaid) WLAN architecture is presented in detail.
scalable. This paper describes performance and            The network (e.g., the CDPD, EDGE or W-CDMA
building simulation models for evaluating mobility        network) continues to be used to provide services for
of proxy servers. The basic idea of the proposed          vehicles and pedestrians with moderate data-rate
method is the system takes advantage of the               services in wide areas and roads. In addition, the
existing proxy supports in network applications to        architecture overlays WLAN’s at places such as
maintain network connection during a handoff              airport, convention center, and stadium, on top of the
and to reduce Web traffic than existing scheme.           WLAN. The idea is that users located inside the
                                                          service area of WLAN are expected to be less mobile
Keywords—Destination server, Higher- Level                and equipped with sufficient computation and radio
proxy Server, Lower-Level Proxy server, Mobile            capability (e.g., laptop computer with WLAN air-
Aware Router, Mobile Host.                                interface card) for high data-rate services. Thus, these
                                                          users are served by the WLAN instead of the network
I. INTEGRATED           WIRELESS          NETWORK         for enhanced services when possible. The rest of this
ARCHITECTURE                                              paper is as follows. In the next section, we further
          THE wireless service providers will start to    elaborate the advantages of using such integrated
provide new, enhanced wireless data services using        wireless architecture. We also relate our work to
the 3rd generation (3G) wireless technologies such as     previous research in the same general area. Section 3
the EDGE (Enhanced Data Rates for GSM                     describes in detail the architecture design,
Evolution) and W-CDMA (Wideband Code Division             components of the system, as well as it basic
Multiple Access) networks. However, it is clear that      operations. In section 4, we extend the architecture
customers will expect services with data rate higher      for wide area cases where multiple proxies are
than that to be provided by the 3G networks. To meet      desired. We conclude in Section 5.
the growing demand for better data services, many
companies have started to provide high-speed data         II. ADVANTAGES AND MOTIVATION FOR
services using wireless local-area networks (WLAN)        INTEGRATED     WIRELESS   NETWORK
in places such as airports, convention centers, hotels,   ARCHITECTURE
etc. Such an approach is particularly feasible and                 It is well known that mobile users expect
attractive due to the maturity of WLAN technologies       high-speed wireless data services to meet their needs
such as the IEEE 802.11b, which can provide a data        for mobile communications and computing. In
rate of 11 Mbps, for example, far exceeding the           particular, there is an important market segment of
                                                          wireless data services for business users (e.g.,



                                                                                                   57 | P a g e
Venkadesh.R, Dr.K. Rajan / International Journal of Engineering Research and Applications
                  (IJERA)               ISSN: 2248-9622           www.ijera.com
                       Vol. 2, Issue 5, September- October 2012, pp.057-062
traveling warriors with laptop computers) who       III. INTEGRATED NETWORK ARCHITECTURE
demand for mobile computing services at public      USING PROXY SERVERS
places such as airport and convention center. Due to               In the integrated network environment,
radio propagation difficulty, such indoor areas may       mobile terminals are allowed to move between the
not be served well by future networks. In contrast, the   network and the WLAN. Since both types of
indoor environment can be served much more cost           networks use their own IP addresses for routing, there
effectively in terms of coverage and data rate by         is a need for a scheme that can maintain the data flow
WLAN. In addition, a single network may not be            (connection) between the server and the mobile
adequate to handle traffic for a potentially large        terminals, regardless of the actual serving network.
number of users in a concentrated area such as an         Traditional mobility management schemes, such as
airport. WLAN can be deployed easily to provide           Mobile IP, reside at the IP layer of the protocol stack,
enough capacity to meet customers’ traffic demand in      thus requiring significant changes on the mobile side,
the indoor areas.                                         which has hindered the wide deployment of such
          One important advantage of the integrated       mechanisms. In this paper, we focus on web-based
WLAN network is that the WLAN technologies have           applications in the integrated MAR/WLAN networks.
become mature and the 3G network will be available        That is, users make use of the http (Hyper-text
very soon. Another crucial advantage is that although     transfer protocol) to access required data. Examples
the WLAN service providers can offer services at          of such applications include access to web page and
selected areas, only carriers with a national footprint   web-based email. Architecture of the integrated
can provide seamless wireless data services to users      network is presented in detail, where mobile
using the integrated network anywhere throughout          terminals access data from a remote server via the
the nation. Customers will be served well with much       wireless access network in use (i.e., network or
improved data rate by the WLAN at locations where         WLAN) and possibly through the public Internet.
they are less mobile, have time to perform serious                 An approach to supporting continuous data
mobile computing (e.g., read emails or log onto           connection for mobile users is through the use of a
computers at office) and expect premium services.         proxy server. The proxy is connected directly to a
While customers are located outside of WLAN areas,        mobility-aware router (MAR), which is a router with
they can still access services through the network        mobile management and related functionalities and
with moderate data rate. The idea of supporting users     the MAR is then connected t o various wireless
across different types of networks has been tossed        access networks. One can view the proxy and the
around for some time [2]. Several experimental            mobility-aware router as a single, combined entity,
systems have been tested including research projects      although the two can be physically separate pieces of
at Stanford University and CMU [4][5].The                 equipment. The essence here is that all the traffic
momentum of WLAN and the expected popularity of           going to and coming from proxy server must pass
3Gb wide area cellular data systems significantly         through the MAR. For instance, the MAR can be the
increase the chance of wide deployment of such an         gateway of the subnet where the proxy server is
architecture. Clearly, at the core of such systems is     located. The proxy handles functions that
the mobility management scheme that can maintain          traditionally reside in a proxy server, such as
users connections after a vertical handoff, a handoff     transcoding, caching, etc., and it can be completely
between different types of networks. Mobile IP is the     unaware of the mobility of the client; whereas the
most widely studied approach for handling mobility,       MAR handles routing functions and mobility
where packets from and to the mobile host are             management, and provides a “static” location of the
tunneled through a home agent at its home network         mobile client to the proxy application layer.
so that the server that is corresponding with the
mobile hose can be shielded from the mobility of the      3.1      System Components
mobile host [1]. To resolve certain scalability                    The system has five key components:
problem associated with mobile IP, several new            mobile host (as referred to as client), Higher-level
schemes have been studied, most noticeably the            proxy server, Lower-level proxy server, MAR, and
Cellular IP from Columbia University and the Hawaii       destination data server. Their roles in the system are
project from Bell Labs [3][6]. All of these solutions,    as follows and as shown in the Fig. 1.
including Mobile IP, require significant changes on
the mobile host and system architecture[7]. In this
paper, we propose a scheme that minimizes these
changes, and yet is able to provide mobility
management to a wide range of applications very
quickly.




                                                                                                   58 | P a g e
Venkadesh.R, Dr.K. Rajan / International Journal of Engineering Research and Applications
                 (IJERA)                ISSN: 2248-9622           www.ijera.com
                       Vol. 2, Issue 5, September- October 2012, pp.057-062
                                                                                                                    fashion.    This way, after an address change, the
                                                                                                                    mobile host can continue to send and receive through
         SERVER                                                                                                     the same TCP connection created before the IP
                                                                                                                    address change, using the new routing IP address.
                                              INTERNET
                                                                                                                    The TCP connection related information, such as
                                                                                                                    sequence and port number, remains the same during
                                                                                                                    the handoff.

                                                                                                        3.1.2       Higher-level Proxy Server:
                                      HIGHER - LEVEL PROXY                                                                    The Higher-Level proxy fetches information
                                            SERVER                                                                  from the destination server and then forwards it to the
                                                                                                                    mobile host. The significance of the proxy in the
                                                                                                                    architecture is that, it provides a means to direct
                                                                                                                    traffic from and to a client to a single point, where
          LOWER - LEVEL                                                       LOWER - LEVEL                         mobility management functions can be carried out. In
          PROXY SERVER                                                        PROXY SERVER                          our design, this is accomplished by the MAR.

                  MAR                                                               MAR
                                                                                                        3.1.3       Lower-level Proxy Server:
                                                                                                                              The Lower-level proxy can be a generic
                                                                                                                    proxy, which handles application layer functions. For
                                                                                                                    example, upon receiving a request from a mobile
  NETWORK                   NETWORK                                                                                 host, it checks whether the requested content is
                                                                 NETWORK                    NETWORK                 already cached locally. If so, the cached information
                                                                                                                    is sent to the host without issuing a real request to the
                                                                                                                    Higher - level Proxy server. If the requested data
                  Mobile                                Mobile             Mobile                                   does not exist in the proxy and its neighbors, it
Mobile                               Mobile                                                    Mobile               communicates with Higher-Level Proxy server.
                                                                                                        3.1.4
 Fig .1 Integrated MAR in Wireless Network Architecture by using Higher-level and lower-level Proxy Servers 3.1.5   Mobility Aware Router:
                                                                                                                              The Mobility Aware Router (MAR) is the
                                                                                                                    core of the system. Together with the mobile host, it
                                                                                                                    provides the mobility support such that packets can
 3.1.1 Mobile host:                                                                                                 be delivered to the mobile even when it moves from
            Each mobile host is assigned a unique ID                                                                one network to another. Depending on whether the
 across the system. For instance, this ID can be a                                                                  mobile is aware of the existence of the MAR, the
 routable permanent IP address of the mobile at its                                                                 mobile may send the control messages, such as
 home network. The same terminal can be assigned                                                                    registration and location update, directly to the MAR;
 with different (temporary) IP addresses for routing                                                                or to the proxy server, in which case, the MAR will
 purposes while being served by the network and                                                                     intercept these packets and act accordingly. Note that
 WLAN. Such IP addresses are referred to as routing                                                                 since MAR can see all the packets exchanged
 IP addresses in the following.                                                                                     between the proxy and the outside machine, it is
            The client software is set up to use the proxy                                                          fairly easy for it to scan for particular port numbers
 for its Web, ftp, and other network accesses. The                                                                  set aside for the control messages and intercepts
 proxy feature has been incorporated in almost all the                                                              those packets.
 WEB browsers currently on the market, thus making                                                                            To keep track of the mobile hosts, the MAR
 the propose scheme accessible to most users. The                                                                   maintains a table that maps the permanent unique ID
 client may need to go through certain registration and                                                             of the host to its current IP addresses. MAR also
 authentication procedure prior to gaining access to                                                                needs to include in the table IP addresses used by the
 the proxy. A demon is also run at the background                                                                   client in the past, in order to maintain the active
 such that whenever the routing IP address for the                                                                  connections after a handoff. The past IP addresses in
 mobile host changes, a notification is delivered to                                                                the table may be removed upon closing of all the
 update the record at the MAR. Details about the                                                                    connections using the IP address or after all the
 registration and location update process are discussed                                                             associated connections have stayed idle for a certain
 later in the paper.                                                                                                period of time. If IP addresses are reused very often,
            In order to maintain an active connection                                                               the TCP port number may also be used to identify
 during a handoff, where the routing IP address of the                                                              connections.
 mobile host is changed, it is assumed that the client
                                                     3.1.6                                                          Destination Data Server:
 software identifies a TCP connection only through its                                                                        No modification is required at the
 port number. In other words, the host machine does                                                                 destination data server. In fact, the data server is not
 not relate TCP connections with the IP address in any



                                                                                                                                                             59 | P a g e
Venkadesh.R, Dr.K. Rajan / International Journal of Engineering Research and Applications
                  (IJERA)                ISSN: 2248-9622           www.ijera.com
                        Vol. 2, Issue 5, September- October 2012, pp.057-062
    aware of whether it is accessed by a proxy or a client     Lower-level Proxy server with            very   simple
    directly, neither is it aware of the client mobility.      calculations is described as in (1).

    3.2 System Operations
              In this section, we illustrate the key           (1)
    operations involved in this architecture, namely                     MAR can then use this table to handle
    registration, packet delivery, mobility update, and        packets sent to and from the mobile host. During the
    contact initiation.                                        registration and authentication process, the proxy
                                                               server may further obtain user information from a
    3.2.1 Registration and Authentication:                     centralized server, where user account information is
              To begin a service session from a wireless       maintained. In the mean time, the proxy server may
    access network, a mobile host initiates the                inform the centralized server that it is the one serving
    authentication and authorization process with the          this particular mobile, in case any other machine
    access network. At the successful conclusion of the        needs to contact the mobile hosts.
    authentication process, a (temporary) routing IP
    address is assigned to the mobile host by the network      3.2.2 Mobility Update:
    in use. The information regarding which proxy to use                The mobility update procedure takes place
    may be programmed on the mobile host or may be             when an active terminal moves to a different network
    dynamically obtained from the system during the            that requires a new routing IP address, e.g. from the
    registration process. In the first case, a script may be   network into a WLAN or vice versa. It is understood
    written to indicate the proxy server to be used based      that the terminal has the capability to detect the
    on the interface that is accessed. The second option       existence of the new network that it has just entered
    allows the network to inform the client of the proxy       into before initiating the authentication process. Upon
    to be used as part of the registration process. The        receiving the new routing IP address, the mobile
    advantage of the second approach is that the system        sends to the MAR a message that includes mobile’s
    can assign the mobile the proxy dynamically based          unique ID, the new IP address, and possibly its
    on its needs. For instance, the one that is closest to     previous routing IP address. The MAR then updates
    the mobile’s current location may be assigned to           its table accordingly, i.e., fill in the “current IP
    improve the efficiency of the routing. This aspect will    address” field with the new address, move the old IP
    be further elaborated later in this paper.                 address to the “past IP addresses” list if there are
                            TABLE 1                            active connections tied to this IP address, or
     MAPPING OF TERMINAL PERMANENT INTO                        otherwise, remove it from the record completely.
    ROUTING IP ADDRESSES

Permanent ID       Current            Past routing IP          3.2.3 Packet Delivery:
                 routing       IP   addresses                         The packet delivery process is indicated below
                 address                                       step by step. The IP addresses represent the
P_ID1              IPm1               T_IPm11,                 following: IPm: current address of the mobile; IPp :
                                    T_IPm12, ..                address of the proxy server; IPs : destination server
                                                               address. Let’s now discuss this process step by step.
P_ID2               IPm2              T_IPm21, T_IP
                                                               3.2.3.1 Mobile host sends a packet to the proxy
                                    m22,…
                                                               server indicating the content that it would like to
                                                               access. The source and destination addresses of the
…                   …                  ....
                                                               packet are IPm and IPp respectively.
                                                                3.2.3.2 On its way to the proxy server, the message
                                                               first reaches the MAR. The MAR updates its table to
              After gaining access to the access network,      indicate that there is a new connection from this
    the terminal may need to register with the proxy           mobile at the IP address IPm.
    server, and pass the authorization and the                  3.2.3.3 The packet is then forwarded to proxy,
    authentication process, prior to receiving services
                                                               which either returns a cached copy of the requested
    from the proxy server. In this process, on piece of the
                                                               information or forwards the request to the actual
    information for identifying the mobile host is its
                                                               destination server. In the latter case, the new packet
    unique ID. The terminal also forwards the current
                                                               has source and destination IP address IPp and IPs
    routing IP address, together with its unique ID, to the
                                                               respectively; and the reply from the destination server
    MAR, so that the MAR can establish an entry for the        is naturally destined for the proxy server. In both
    mobile. Assume that we requests from n Hosts and N         cases, at some point, the proxy will have the data
    is the number of requests from a client with               ready to send back to the mobile host.
    identification number is denoted as i. R refer to          3.2.3.4 The proxy sends the data back to the mobile
    Mobility aware router and S denoted by sum of
                                                               host using the same IP address from which the initial
    requests from clients. To enhance performance of           request was received. The MAR, upon detecting a
                                                               packet destined for the mobile host looks up its table


                                                                                                        60 | P a g e
Venkadesh.R, Dr.K. Rajan / International Journal of Engineering Research and Applications
              (IJERA)                ISSN: 2248-9622           www.ijera.com
                    Vol. 2, Issue 5, September- October 2012, pp.057-062
to find out the current routing IP address of the            multiple proxy servers, where each of the access
mobile host, by matching the destinations IP                 networks can be a wireless network, a WLAN and a
addresses with the ones in the table. If the mobile has      combination of types of wireless networks, as long as
obtained a new IP address, the destination IP address        each access network uses one IP address for routing.
of the packet is replaced with the current routing IP        The proxy/MAR pair can be placed at different
address of the mobile host, while keeping the TCP            geographic locations. The solution techniques
header information unchanged. Alternatively, the             described above apply to the architecture as well. To
proxy may be partially mobility aware, i.e., it can          provide scalability to the system, given the existence
look up the table itself and use the current IP address      of multiple proxy/MAR pair, there is a need for an
for reply, which would accomplish the same result.           assignment algorithm to associate a mobile host with
3.2.3.5 The client removes the IP header                     a particular proxy/MAR pair. One such assignment is
information from the packets received and forwards           to allow an MAR to serve as a gateway route for a
them to the upper layer such as TCP. As mentioned            given, distinct set of permanent IP addresses for a
previously, the client has been setup such that it can       number of mobile hosts. This way, regardless of the
continue to send and receive packets through the             network attachment point for a terminal, a fixed,
same TCP connection after the IP address change.             unique proxy/MAR pair provides the needed packet
3.2.3.6 If there are new packets need to be                  routing and processing capabilities[5][7]. The
delivered, the mobile will always use its current IP         response time Tnext is predicted as m service response
address, regardless of the IP address that was used to       time values in consecutive monitoring periods y.
create the TCP connection.                                      Tnext = y^(0)(m+1)= y^(1)(m+1) - y^(1)(m) (2)
                                                                      =(1-ea)( y(0)(1) – b/a) e-am         (3)
3.2.4 Contact Initiation:
          It is often desirable to be able to contact the               Where a is developing factor and b is grey
mobile host, without having the mobile first initiate        effect factor. The mobile host is informed of the
the contact. For example, an email server may want           proxy assignment during the registration process, as
to push an urgent email message to the mobile host.          it tries to gain access to the access network and the
To accomplish this task, the contacting machine              proxy service.
needs to contact the centralized server that
coordinates among proxies serving mobile hosts, to                                     2
obtain the information as to which proxy is currently                                 1.8
serving the targeted mobile host based on its unique                                  1.6
ID, and then contacts that proxy server directly. The
                                                                                      1.4
                                                                 Process time( sec)




proxy server, together with the MAR, upon receiving
such packets will go through the same table lookup                                    1.2
                                                                                                                       Reduce Web
procedure as to the regular data packets, to obtain the                                1
                                                                                                                       Traffic
mobile’s current IP address and delivers the request                                  0.8
to the host.                                                                                                           Efficient Mobility
                                                                                      0.6                              Management
          In summary, the key function of the proxy
server in the integrated architecture is to force all                                 0.4                              Maintain
packets originating from a given mobile terminal for                                  0.2                              Connection
web-based applications to go through the proxy, thus
                                                                                       0
passing through and being processed by the MAR.
Packets destined for the terminal are routed properly                                         20   40   60   80
from the MAR to the destination server. The use of                                          Number of Proxy (10^3 in km)
the proxy server in this architecture takes advantage
of existing functions of Web proxies to enable
mobility management, with no modification
requirement to the IP protocol stack. This will
certainly enable easy deployment of this mechanism.                                         Fig .2 Performance Estimation
In fact the techniques described above also apply to
                                                                      If during the period when the mobile
terminal movement between one network and
another, as well as between one WLAN and another,            remains registered, it roams a long distance and it
as long as the access networks use different IP              becomes inefficient to keep the mobile on the same
addresses for routing.                                       proxy server, the mobile can be “handed off” to a
                                                             new proxy server. From this point on, all the new
                                                             connections will go through the new proxy, while the
IV AN INTEGRATED ARCHITECTURE USING                          old one continue to use the old proxy. In above Fig
   MULTIPLE PROXY SERVERS                                    .2, as expected, we find the growth of process time
         Another advantage of the architecture               versus number of proxy be linear, that is, the process
presented in this paper is that it is inherently scalable.   time is proportional to the number of proxy, and so
An integrated MAR and WLAN architecture using


                                                                                                                           61 | P a g e
Venkadesh.R, Dr.K. Rajan / International Journal of Engineering Research and Applications
              (IJERA)                ISSN: 2248-9622           www.ijera.com
                    Vol. 2, Issue 5, September- October 2012, pp.057-062
our analysis method has time complexity of O(n).                   Conference on Worldwide Computing and
Just as it is with traditional Web proxies, multiple               its Applications (WWCA'98), March 1998.
proxy/MAR pairs may form a hierarchical structure.           [6]   R. Ramjee, T. La Porta, L. Salgarelli, S.
In other words, requests can be sent from one proxy                Thuel, K. Varadhan, L. Li, “IP-based access
to another proxy in the case the originating proxy                 network infrastructure for next- generation
cannot provide the service required by the mobile                  wireless data networks,” IEEE Personal
host. This paper describes performance and building                Communications, PP. 34-41 AUG 2000.
simulation models for evaluating mobility of proxy           [7]   Zhimei Jiang, Kin K.Leung Byoung-Jo
serveris described in (2) and (3). The basic idea of the           J.Kim Paul Henry, “Seamless Mobility
proposed method is the system takes advantage of the               Management”,          IEEE        Personal
existing proxy supports in network applications to                 Communications PP 559- 564, 2002, AT &
reduce web traffic and maintain network connection                 T Labs Research, NJ.
during a handoff.

V CONCLUSION                                               Venkadesh.R completed his B.E. Computer Science
          In conclusion, this paper presents a proxy                        and Engineering from University of
based mobility management scheme. The system                                Madras in 1999 and M.Tech
takes advantage of the existing proxy supports in                           Electronics and Communication
network applications to maintain network connection                         Engineering from Pondicherry
during a handoff. More specifically, a mobility aware                       University in 2004. He has 10 years
router that is coupled with the Lower-level proxy is                        of    teaching     experience    in
an effective solution to reduce web traffic and is able                     engineering colleges. He has
to detect the network change of mobile host and            published 2 international Journals, 4 International
forward the packets based on the mobile’s current IP       Conferences, attended workshops and Faculty
address. The main advantage of this scheme is that it      Development programmes. Interested area is
requires little changes at the client, hence will be       Communication and Networking. At present he is
easier to implement. Because it depends on the             working as Vice-Principal and Assistant Professor,
availability of proxy support, applications without        Department of Electronics and Communication
such supports will not be able to take advantage of        Engineering,     Vel Tech Engineering college,
this architecture. However, as more and more               Chennai-62, India.
applications, from email to multimedia applications,
are becoming Web based and are accessible through                            K.Rajan completed his B.E.
Web browser, this architecture is able to provide                            Electrical and Electronics and M.E.
mobility support for a wide range of them.                                   Applied Electronics at P.S.G.
                                                                             College        of       Technology,
REFERENCE                                                                    Coimbatore. He has completed his
  [1]    P. Bhagwat, C. Perkins, and S. Tripathi,                            Ph.D. from J.N.T.U. Anantapur, AP
         “Network layer mobility: An architecture                            in high frequency power system for
         and      survey,”,      IEEE     Personal         industrial and commercial zones. He has 19 years of
         Communications, PP. 54-64 JUN 1996.               industrial experience in R&D, production and 9 years
  [2]    E. Brewer, R. Katz, Y. Chawathe, S.               of teaching experience in engineering colleges. He
         Gribble, T. Hodes, G. Nguyen, M. Stemm,           has published 4 international and national journals.
         T. Henderson, E. Amir, H.Balakrishnan, A.         He also presented papers in 14 international and
         Fox, V. Padmanabhan, S. Seshan, “A                national conferences. Interested area is power
         network architecture for heterogeneous            electronics and power system. At present he is
         mobile computing,” IEEE Personal                  working as Principal in Vel Tech Engineering
         Communications PP. 8-24 OCT 1998.                 College. – RS Trust.
  [3]    Campbell, S. Kim, A. Valko, C. Wan, Z.
         Turanyi, “Design, implementation. and
         evaluation of cellular IP,” IEEE Personal
         Communications, pp. 42-49 AUG 2000.
  [4]    A. Hills and D. Johnson. A Wireless Data
         Network Infrastructure at Carnegie Mellon
         University.         IEEE         Personal
         Communications, 3(1): PP. 56-63, February
         1996.
  [5]    Kevin Lai, Mema Roussopoulos, Diane
         Tang, Xinhua Zhao, Mary Baker, "
         Experiences with a Mobile Testbed,"
         Proceedings of the Second International


                                                                                                 62 | P a g e

More Related Content

What's hot

Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...IJECEIAES
 
Telecommunication network2222
Telecommunication  network2222Telecommunication  network2222
Telecommunication network2222Chirag_pahuja
 
Practical active network services within content-aware gateways
Practical active network services within content-aware gatewaysPractical active network services within content-aware gateways
Practical active network services within content-aware gatewaysTal Lavian Ph.D.
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing securityZachariah Pabi
 
An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...Tal Lavian Ph.D.
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesIJARIIT
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET Journal
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notesgouse_1210
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
 
IRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET Journal
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Uvaraj Shan
 
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Editor IJCATR
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocolsiosrjce
 
Ericsson Review: HSPA evolution for future mobile-broadband needs
Ericsson Review: HSPA evolution for future mobile-broadband needsEricsson Review: HSPA evolution for future mobile-broadband needs
Ericsson Review: HSPA evolution for future mobile-broadband needsEricsson
 
Terabit Network- Tbps Network
Terabit Network- Tbps NetworkTerabit Network- Tbps Network
Terabit Network- Tbps Networkvishal gupta
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2IAEME Publication
 

What's hot (18)

Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...Analysis of back propagation and radial basis function neural networks for ha...
Analysis of back propagation and radial basis function neural networks for ha...
 
Telecommunication network2222
Telecommunication  network2222Telecommunication  network2222
Telecommunication network2222
 
Practical active network services within content-aware gateways
Practical active network services within content-aware gatewaysPractical active network services within content-aware gateways
Practical active network services within content-aware gateways
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
7.chapter
7.chapter7.chapter
7.chapter
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
 
IRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network Architecture
 
Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...Node selection in p2 p content sharing service in mobile cellular networks wi...
Node selection in p2 p content sharing service in mobile cellular networks wi...
 
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...Comparative Analysis of Quality of Service for Various Service Classes in WiM...
Comparative Analysis of Quality of Service for Various Service Classes in WiM...
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
Ericsson Review: HSPA evolution for future mobile-broadband needs
Ericsson Review: HSPA evolution for future mobile-broadband needsEricsson Review: HSPA evolution for future mobile-broadband needs
Ericsson Review: HSPA evolution for future mobile-broadband needs
 
Terabit Network- Tbps Network
Terabit Network- Tbps NetworkTerabit Network- Tbps Network
Terabit Network- Tbps Network
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2
 

Viewers also liked

Assssoria de Planos e Desenvolvimento
Assssoria de Planos e DesenvolvimentoAssssoria de Planos e Desenvolvimento
Assssoria de Planos e DesenvolvimentoPortaldoValle
 
Programa de la 12a. Mostra Sant Cugat Actiu
Programa de la 12a. Mostra Sant Cugat ActiuPrograma de la 12a. Mostra Sant Cugat Actiu
Programa de la 12a. Mostra Sant Cugat ActiuPremsa Sant Cugat
 
Edital - PPP de Eficiência Energética de Caruaru
Edital  - PPP de Eficiência Energética de CaruaruEdital  - PPP de Eficiência Energética de Caruaru
Edital - PPP de Eficiência Energética de Caruarugabinetedigitalcaruaru
 
LigFlat - Campus Party - Pitch Deck 5min
LigFlat - Campus Party - Pitch Deck 5minLigFlat - Campus Party - Pitch Deck 5min
LigFlat - Campus Party - Pitch Deck 5minLigFlat Telecom
 
Ankara 19 25 de mayo
Ankara 19 25 de mayoAnkara 19 25 de mayo
Ankara 19 25 de mayogruntowa
 
ARRECIFES DEL PÉRMICO INFERIOR (CUENCA ENE, SECTOR MERIDIONAL): ORIGEN, CONST...
ARRECIFES DEL PÉRMICO INFERIOR (CUENCA ENE, SECTOR MERIDIONAL): ORIGEN, CONST...ARRECIFES DEL PÉRMICO INFERIOR (CUENCA ENE, SECTOR MERIDIONAL): ORIGEN, CONST...
ARRECIFES DEL PÉRMICO INFERIOR (CUENCA ENE, SECTOR MERIDIONAL): ORIGEN, CONST...Sector Energía y Minas - INGEMMET
 
Ligflat - FlatBlue - Media Empresa - Conta Controlada
Ligflat - FlatBlue - Media Empresa - Conta ControladaLigflat - FlatBlue - Media Empresa - Conta Controlada
Ligflat - FlatBlue - Media Empresa - Conta ControladaLigFlat Telecom
 
Relatório Caruaru Segura - Gerência da Mulher 2014
Relatório Caruaru Segura - Gerência da Mulher 2014Relatório Caruaru Segura - Gerência da Mulher 2014
Relatório Caruaru Segura - Gerência da Mulher 2014gabinetedigitalcaruaru
 
Crane 2013 slideshow
Crane 2013 slideshowCrane 2013 slideshow
Crane 2013 slideshowJose
 
Us20110225862
Us20110225862Us20110225862
Us20110225862Jin Song
 

Viewers also liked (20)

Me2521122119
Me2521122119Me2521122119
Me2521122119
 
Mc2521062109
Mc2521062109Mc2521062109
Mc2521062109
 
Assssoria de Planos e Desenvolvimento
Assssoria de Planos e DesenvolvimentoAssssoria de Planos e Desenvolvimento
Assssoria de Planos e Desenvolvimento
 
Tempo mario quintana
Tempo mario quintanaTempo mario quintana
Tempo mario quintana
 
Programa de la 12a. Mostra Sant Cugat Actiu
Programa de la 12a. Mostra Sant Cugat ActiuPrograma de la 12a. Mostra Sant Cugat Actiu
Programa de la 12a. Mostra Sant Cugat Actiu
 
Edital - PPP de Eficiência Energética de Caruaru
Edital  - PPP de Eficiência Energética de CaruaruEdital  - PPP de Eficiência Energética de Caruaru
Edital - PPP de Eficiência Energética de Caruaru
 
LigFlat - Campus Party - Pitch Deck 5min
LigFlat - Campus Party - Pitch Deck 5minLigFlat - Campus Party - Pitch Deck 5min
LigFlat - Campus Party - Pitch Deck 5min
 
Ankara 19 25 de mayo
Ankara 19 25 de mayoAnkara 19 25 de mayo
Ankara 19 25 de mayo
 
Ké'h
Ké'hKé'h
Ké'h
 
Aquest estiu, vine amb mi!
Aquest estiu, vine amb mi!Aquest estiu, vine amb mi!
Aquest estiu, vine amb mi!
 
Características Hidrogeológicas del valle del Colca
Características Hidrogeológicas del valle del ColcaCaracterísticas Hidrogeológicas del valle del Colca
Características Hidrogeológicas del valle del Colca
 
ARRECIFES DEL PÉRMICO INFERIOR (CUENCA ENE, SECTOR MERIDIONAL): ORIGEN, CONST...
ARRECIFES DEL PÉRMICO INFERIOR (CUENCA ENE, SECTOR MERIDIONAL): ORIGEN, CONST...ARRECIFES DEL PÉRMICO INFERIOR (CUENCA ENE, SECTOR MERIDIONAL): ORIGEN, CONST...
ARRECIFES DEL PÉRMICO INFERIOR (CUENCA ENE, SECTOR MERIDIONAL): ORIGEN, CONST...
 
Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
 
TwitRadar - SP 460
TwitRadar - SP 460TwitRadar - SP 460
TwitRadar - SP 460
 
Ligflat - FlatBlue - Media Empresa - Conta Controlada
Ligflat - FlatBlue - Media Empresa - Conta ControladaLigflat - FlatBlue - Media Empresa - Conta Controlada
Ligflat - FlatBlue - Media Empresa - Conta Controlada
 
Relatório Caruaru Segura - Gerência da Mulher 2014
Relatório Caruaru Segura - Gerência da Mulher 2014Relatório Caruaru Segura - Gerência da Mulher 2014
Relatório Caruaru Segura - Gerência da Mulher 2014
 
trabalhoSlide do blogger
trabalhoSlide do bloggertrabalhoSlide do blogger
trabalhoSlide do blogger
 
Crane 2013 slideshow
Crane 2013 slideshowCrane 2013 slideshow
Crane 2013 slideshow
 
Us20110225862
Us20110225862Us20110225862
Us20110225862
 
Us5517780
Us5517780Us5517780
Us5517780
 

Similar to M25057062

Case for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell SiteCase for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell SiteAviat Networks
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyaravindhawan
 
A XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud InfrastructureA XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...IJERA Editor
 
3G vs WIFI - Sai Kiran Kasireddy
3G vs WIFI - Sai Kiran Kasireddy3G vs WIFI - Sai Kiran Kasireddy
3G vs WIFI - Sai Kiran KasireddySai Kiran Kasireddy
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...IOSR Journals
 
Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...
Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...
Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...IBM India Smarter Computing
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
 
Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...IJECEIAES
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperMarc Curtis
 

Similar to M25057062 (20)

Case for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell SiteCase for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell Site
 
3g vs wifi
3g vs wifi3g vs wifi
3g vs wifi
 
A017220112
A017220112A017220112
A017220112
 
Wimax and lte
Wimax and lteWimax and lte
Wimax and lte
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
 
Fg24980983
Fg24980983Fg24980983
Fg24980983
 
S01725119124
S01725119124S01725119124
S01725119124
 
A XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud InfrastructureA XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud Infrastructure
 
Mcpp113,16,33,41
Mcpp113,16,33,41Mcpp113,16,33,41
Mcpp113,16,33,41
 
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
Verilog Based Design and Simulation of MAC and PHY Layers for Zigbee Digital ...
 
WAP.PDF
WAP.PDFWAP.PDF
WAP.PDF
 
3G vs WIFI - Sai Kiran Kasireddy
3G vs WIFI - Sai Kiran Kasireddy3G vs WIFI - Sai Kiran Kasireddy
3G vs WIFI - Sai Kiran Kasireddy
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
 
Wireless and intranet
Wireless and intranetWireless and intranet
Wireless and intranet
 
Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...
Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...
Towards an Open Data Cente with an Interoperable Network (ODIN) Volume 5: WAN...
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...Flexible handover solution for vehicular ad-hoc networks based on software de...
Flexible handover solution for vehicular ad-hoc networks based on software de...
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_Paper
 

M25057062

  • 1. Venkadesh.R, Dr.K. Rajan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.057-062 An Effective Solution to Reduce Web Traffic In Wireless Network Architecture By Using Proxy Servers Venkadesh.R* and Dr.K. Rajan ** *( Vice-Principal, Vel Tech Engineering College Chennai-62, India.) **( Principal, Vel Tech Engineering college, Chennai-62. ) ABSTRACT The Higher-Level and Lower-Level Proxy maximum data rate of about 480 Kbps to be offered servers is an effective solution to reduce Web by the EDGE system. We note that one major traffic and integrated wireless network shortcoming of the WLAN services is its limited architecture using Proxy servers to support service coverage. That is, due to lack of national mobility management. The technique takes wireless infrastructure, the WLAN service providers advantage of the existing functionalities of proxy can offer services only in limited areas such as servers to provide mobility support for airport and convention center. As a result, users applications such as Web browsing, HTTP and traveling outside of the WLAN areas cannot obtain FTP, without modifying the IP protocol stack of any services at all. On the other hand, many cellular the mobile host. The architecture uses proxy network operators have a nation-wide footprint, servers to force all packets originating from although the data rate will not be comparable with mobile hosts to a close-by mobility-aware router that of the WLAN. For the reason, an integrated so that the latter can maintain active data MAR and WLAN network for enhanced, seamless connections during handoffs across different wireless data services that take advantage of the wide networks. By deploying multiple proxy and coverage of the cellular networks and provide high mobility-aware router pairs and by assigning data rate through WLAN whenever it is possible is an mobile hosts to proxy servers dynamically, the ideal solution. proposed architecture provides efficient mobility A schematic represent of the integrated (or management functionalities, and is inherently overlaid) WLAN architecture is presented in detail. scalable. This paper describes performance and The network (e.g., the CDPD, EDGE or W-CDMA building simulation models for evaluating mobility network) continues to be used to provide services for of proxy servers. The basic idea of the proposed vehicles and pedestrians with moderate data-rate method is the system takes advantage of the services in wide areas and roads. In addition, the existing proxy supports in network applications to architecture overlays WLAN’s at places such as maintain network connection during a handoff airport, convention center, and stadium, on top of the and to reduce Web traffic than existing scheme. WLAN. The idea is that users located inside the service area of WLAN are expected to be less mobile Keywords—Destination server, Higher- Level and equipped with sufficient computation and radio proxy Server, Lower-Level Proxy server, Mobile capability (e.g., laptop computer with WLAN air- Aware Router, Mobile Host. interface card) for high data-rate services. Thus, these users are served by the WLAN instead of the network I. INTEGRATED WIRELESS NETWORK for enhanced services when possible. The rest of this ARCHITECTURE paper is as follows. In the next section, we further THE wireless service providers will start to elaborate the advantages of using such integrated provide new, enhanced wireless data services using wireless architecture. We also relate our work to the 3rd generation (3G) wireless technologies such as previous research in the same general area. Section 3 the EDGE (Enhanced Data Rates for GSM describes in detail the architecture design, Evolution) and W-CDMA (Wideband Code Division components of the system, as well as it basic Multiple Access) networks. However, it is clear that operations. In section 4, we extend the architecture customers will expect services with data rate higher for wide area cases where multiple proxies are than that to be provided by the 3G networks. To meet desired. We conclude in Section 5. the growing demand for better data services, many companies have started to provide high-speed data II. ADVANTAGES AND MOTIVATION FOR services using wireless local-area networks (WLAN) INTEGRATED WIRELESS NETWORK in places such as airports, convention centers, hotels, ARCHITECTURE etc. Such an approach is particularly feasible and It is well known that mobile users expect attractive due to the maturity of WLAN technologies high-speed wireless data services to meet their needs such as the IEEE 802.11b, which can provide a data for mobile communications and computing. In rate of 11 Mbps, for example, far exceeding the particular, there is an important market segment of wireless data services for business users (e.g., 57 | P a g e
  • 2. Venkadesh.R, Dr.K. Rajan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.057-062 traveling warriors with laptop computers) who III. INTEGRATED NETWORK ARCHITECTURE demand for mobile computing services at public USING PROXY SERVERS places such as airport and convention center. Due to In the integrated network environment, radio propagation difficulty, such indoor areas may mobile terminals are allowed to move between the not be served well by future networks. In contrast, the network and the WLAN. Since both types of indoor environment can be served much more cost networks use their own IP addresses for routing, there effectively in terms of coverage and data rate by is a need for a scheme that can maintain the data flow WLAN. In addition, a single network may not be (connection) between the server and the mobile adequate to handle traffic for a potentially large terminals, regardless of the actual serving network. number of users in a concentrated area such as an Traditional mobility management schemes, such as airport. WLAN can be deployed easily to provide Mobile IP, reside at the IP layer of the protocol stack, enough capacity to meet customers’ traffic demand in thus requiring significant changes on the mobile side, the indoor areas. which has hindered the wide deployment of such One important advantage of the integrated mechanisms. In this paper, we focus on web-based WLAN network is that the WLAN technologies have applications in the integrated MAR/WLAN networks. become mature and the 3G network will be available That is, users make use of the http (Hyper-text very soon. Another crucial advantage is that although transfer protocol) to access required data. Examples the WLAN service providers can offer services at of such applications include access to web page and selected areas, only carriers with a national footprint web-based email. Architecture of the integrated can provide seamless wireless data services to users network is presented in detail, where mobile using the integrated network anywhere throughout terminals access data from a remote server via the the nation. Customers will be served well with much wireless access network in use (i.e., network or improved data rate by the WLAN at locations where WLAN) and possibly through the public Internet. they are less mobile, have time to perform serious An approach to supporting continuous data mobile computing (e.g., read emails or log onto connection for mobile users is through the use of a computers at office) and expect premium services. proxy server. The proxy is connected directly to a While customers are located outside of WLAN areas, mobility-aware router (MAR), which is a router with they can still access services through the network mobile management and related functionalities and with moderate data rate. The idea of supporting users the MAR is then connected t o various wireless across different types of networks has been tossed access networks. One can view the proxy and the around for some time [2]. Several experimental mobility-aware router as a single, combined entity, systems have been tested including research projects although the two can be physically separate pieces of at Stanford University and CMU [4][5].The equipment. The essence here is that all the traffic momentum of WLAN and the expected popularity of going to and coming from proxy server must pass 3Gb wide area cellular data systems significantly through the MAR. For instance, the MAR can be the increase the chance of wide deployment of such an gateway of the subnet where the proxy server is architecture. Clearly, at the core of such systems is located. The proxy handles functions that the mobility management scheme that can maintain traditionally reside in a proxy server, such as users connections after a vertical handoff, a handoff transcoding, caching, etc., and it can be completely between different types of networks. Mobile IP is the unaware of the mobility of the client; whereas the most widely studied approach for handling mobility, MAR handles routing functions and mobility where packets from and to the mobile host are management, and provides a “static” location of the tunneled through a home agent at its home network mobile client to the proxy application layer. so that the server that is corresponding with the mobile hose can be shielded from the mobility of the 3.1 System Components mobile host [1]. To resolve certain scalability The system has five key components: problem associated with mobile IP, several new mobile host (as referred to as client), Higher-level schemes have been studied, most noticeably the proxy server, Lower-level proxy server, MAR, and Cellular IP from Columbia University and the Hawaii destination data server. Their roles in the system are project from Bell Labs [3][6]. All of these solutions, as follows and as shown in the Fig. 1. including Mobile IP, require significant changes on the mobile host and system architecture[7]. In this paper, we propose a scheme that minimizes these changes, and yet is able to provide mobility management to a wide range of applications very quickly. 58 | P a g e
  • 3. Venkadesh.R, Dr.K. Rajan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.057-062 fashion. This way, after an address change, the mobile host can continue to send and receive through SERVER the same TCP connection created before the IP address change, using the new routing IP address. INTERNET The TCP connection related information, such as sequence and port number, remains the same during the handoff. 3.1.2 Higher-level Proxy Server: HIGHER - LEVEL PROXY The Higher-Level proxy fetches information SERVER from the destination server and then forwards it to the mobile host. The significance of the proxy in the architecture is that, it provides a means to direct traffic from and to a client to a single point, where LOWER - LEVEL LOWER - LEVEL mobility management functions can be carried out. In PROXY SERVER PROXY SERVER our design, this is accomplished by the MAR. MAR MAR 3.1.3 Lower-level Proxy Server: The Lower-level proxy can be a generic proxy, which handles application layer functions. For example, upon receiving a request from a mobile NETWORK NETWORK host, it checks whether the requested content is NETWORK NETWORK already cached locally. If so, the cached information is sent to the host without issuing a real request to the Higher - level Proxy server. If the requested data Mobile Mobile Mobile does not exist in the proxy and its neighbors, it Mobile Mobile Mobile communicates with Higher-Level Proxy server. 3.1.4 Fig .1 Integrated MAR in Wireless Network Architecture by using Higher-level and lower-level Proxy Servers 3.1.5 Mobility Aware Router: The Mobility Aware Router (MAR) is the core of the system. Together with the mobile host, it provides the mobility support such that packets can 3.1.1 Mobile host: be delivered to the mobile even when it moves from Each mobile host is assigned a unique ID one network to another. Depending on whether the across the system. For instance, this ID can be a mobile is aware of the existence of the MAR, the routable permanent IP address of the mobile at its mobile may send the control messages, such as home network. The same terminal can be assigned registration and location update, directly to the MAR; with different (temporary) IP addresses for routing or to the proxy server, in which case, the MAR will purposes while being served by the network and intercept these packets and act accordingly. Note that WLAN. Such IP addresses are referred to as routing since MAR can see all the packets exchanged IP addresses in the following. between the proxy and the outside machine, it is The client software is set up to use the proxy fairly easy for it to scan for particular port numbers for its Web, ftp, and other network accesses. The set aside for the control messages and intercepts proxy feature has been incorporated in almost all the those packets. WEB browsers currently on the market, thus making To keep track of the mobile hosts, the MAR the propose scheme accessible to most users. The maintains a table that maps the permanent unique ID client may need to go through certain registration and of the host to its current IP addresses. MAR also authentication procedure prior to gaining access to needs to include in the table IP addresses used by the the proxy. A demon is also run at the background client in the past, in order to maintain the active such that whenever the routing IP address for the connections after a handoff. The past IP addresses in mobile host changes, a notification is delivered to the table may be removed upon closing of all the update the record at the MAR. Details about the connections using the IP address or after all the registration and location update process are discussed associated connections have stayed idle for a certain later in the paper. period of time. If IP addresses are reused very often, In order to maintain an active connection the TCP port number may also be used to identify during a handoff, where the routing IP address of the connections. mobile host is changed, it is assumed that the client 3.1.6 Destination Data Server: software identifies a TCP connection only through its No modification is required at the port number. In other words, the host machine does destination data server. In fact, the data server is not not relate TCP connections with the IP address in any 59 | P a g e
  • 4. Venkadesh.R, Dr.K. Rajan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.057-062 aware of whether it is accessed by a proxy or a client Lower-level Proxy server with very simple directly, neither is it aware of the client mobility. calculations is described as in (1). 3.2 System Operations In this section, we illustrate the key (1) operations involved in this architecture, namely MAR can then use this table to handle registration, packet delivery, mobility update, and packets sent to and from the mobile host. During the contact initiation. registration and authentication process, the proxy server may further obtain user information from a 3.2.1 Registration and Authentication: centralized server, where user account information is To begin a service session from a wireless maintained. In the mean time, the proxy server may access network, a mobile host initiates the inform the centralized server that it is the one serving authentication and authorization process with the this particular mobile, in case any other machine access network. At the successful conclusion of the needs to contact the mobile hosts. authentication process, a (temporary) routing IP address is assigned to the mobile host by the network 3.2.2 Mobility Update: in use. The information regarding which proxy to use The mobility update procedure takes place may be programmed on the mobile host or may be when an active terminal moves to a different network dynamically obtained from the system during the that requires a new routing IP address, e.g. from the registration process. In the first case, a script may be network into a WLAN or vice versa. It is understood written to indicate the proxy server to be used based that the terminal has the capability to detect the on the interface that is accessed. The second option existence of the new network that it has just entered allows the network to inform the client of the proxy into before initiating the authentication process. Upon to be used as part of the registration process. The receiving the new routing IP address, the mobile advantage of the second approach is that the system sends to the MAR a message that includes mobile’s can assign the mobile the proxy dynamically based unique ID, the new IP address, and possibly its on its needs. For instance, the one that is closest to previous routing IP address. The MAR then updates the mobile’s current location may be assigned to its table accordingly, i.e., fill in the “current IP improve the efficiency of the routing. This aspect will address” field with the new address, move the old IP be further elaborated later in this paper. address to the “past IP addresses” list if there are TABLE 1 active connections tied to this IP address, or MAPPING OF TERMINAL PERMANENT INTO otherwise, remove it from the record completely. ROUTING IP ADDRESSES Permanent ID Current Past routing IP 3.2.3 Packet Delivery: routing IP addresses The packet delivery process is indicated below address step by step. The IP addresses represent the P_ID1 IPm1 T_IPm11, following: IPm: current address of the mobile; IPp : T_IPm12, .. address of the proxy server; IPs : destination server address. Let’s now discuss this process step by step. P_ID2 IPm2 T_IPm21, T_IP 3.2.3.1 Mobile host sends a packet to the proxy m22,… server indicating the content that it would like to access. The source and destination addresses of the … … .... packet are IPm and IPp respectively. 3.2.3.2 On its way to the proxy server, the message first reaches the MAR. The MAR updates its table to After gaining access to the access network, indicate that there is a new connection from this the terminal may need to register with the proxy mobile at the IP address IPm. server, and pass the authorization and the 3.2.3.3 The packet is then forwarded to proxy, authentication process, prior to receiving services which either returns a cached copy of the requested from the proxy server. In this process, on piece of the information or forwards the request to the actual information for identifying the mobile host is its destination server. In the latter case, the new packet unique ID. The terminal also forwards the current has source and destination IP address IPp and IPs routing IP address, together with its unique ID, to the respectively; and the reply from the destination server MAR, so that the MAR can establish an entry for the is naturally destined for the proxy server. In both mobile. Assume that we requests from n Hosts and N cases, at some point, the proxy will have the data is the number of requests from a client with ready to send back to the mobile host. identification number is denoted as i. R refer to 3.2.3.4 The proxy sends the data back to the mobile Mobility aware router and S denoted by sum of host using the same IP address from which the initial requests from clients. To enhance performance of request was received. The MAR, upon detecting a packet destined for the mobile host looks up its table 60 | P a g e
  • 5. Venkadesh.R, Dr.K. Rajan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.057-062 to find out the current routing IP address of the multiple proxy servers, where each of the access mobile host, by matching the destinations IP networks can be a wireless network, a WLAN and a addresses with the ones in the table. If the mobile has combination of types of wireless networks, as long as obtained a new IP address, the destination IP address each access network uses one IP address for routing. of the packet is replaced with the current routing IP The proxy/MAR pair can be placed at different address of the mobile host, while keeping the TCP geographic locations. The solution techniques header information unchanged. Alternatively, the described above apply to the architecture as well. To proxy may be partially mobility aware, i.e., it can provide scalability to the system, given the existence look up the table itself and use the current IP address of multiple proxy/MAR pair, there is a need for an for reply, which would accomplish the same result. assignment algorithm to associate a mobile host with 3.2.3.5 The client removes the IP header a particular proxy/MAR pair. One such assignment is information from the packets received and forwards to allow an MAR to serve as a gateway route for a them to the upper layer such as TCP. As mentioned given, distinct set of permanent IP addresses for a previously, the client has been setup such that it can number of mobile hosts. This way, regardless of the continue to send and receive packets through the network attachment point for a terminal, a fixed, same TCP connection after the IP address change. unique proxy/MAR pair provides the needed packet 3.2.3.6 If there are new packets need to be routing and processing capabilities[5][7]. The delivered, the mobile will always use its current IP response time Tnext is predicted as m service response address, regardless of the IP address that was used to time values in consecutive monitoring periods y. create the TCP connection. Tnext = y^(0)(m+1)= y^(1)(m+1) - y^(1)(m) (2) =(1-ea)( y(0)(1) – b/a) e-am (3) 3.2.4 Contact Initiation: It is often desirable to be able to contact the Where a is developing factor and b is grey mobile host, without having the mobile first initiate effect factor. The mobile host is informed of the the contact. For example, an email server may want proxy assignment during the registration process, as to push an urgent email message to the mobile host. it tries to gain access to the access network and the To accomplish this task, the contacting machine proxy service. needs to contact the centralized server that coordinates among proxies serving mobile hosts, to 2 obtain the information as to which proxy is currently 1.8 serving the targeted mobile host based on its unique 1.6 ID, and then contacts that proxy server directly. The 1.4 Process time( sec) proxy server, together with the MAR, upon receiving such packets will go through the same table lookup 1.2 Reduce Web procedure as to the regular data packets, to obtain the 1 Traffic mobile’s current IP address and delivers the request 0.8 to the host. Efficient Mobility 0.6 Management In summary, the key function of the proxy server in the integrated architecture is to force all 0.4 Maintain packets originating from a given mobile terminal for 0.2 Connection web-based applications to go through the proxy, thus 0 passing through and being processed by the MAR. Packets destined for the terminal are routed properly 20 40 60 80 from the MAR to the destination server. The use of Number of Proxy (10^3 in km) the proxy server in this architecture takes advantage of existing functions of Web proxies to enable mobility management, with no modification requirement to the IP protocol stack. This will certainly enable easy deployment of this mechanism. Fig .2 Performance Estimation In fact the techniques described above also apply to If during the period when the mobile terminal movement between one network and another, as well as between one WLAN and another, remains registered, it roams a long distance and it as long as the access networks use different IP becomes inefficient to keep the mobile on the same addresses for routing. proxy server, the mobile can be “handed off” to a new proxy server. From this point on, all the new connections will go through the new proxy, while the IV AN INTEGRATED ARCHITECTURE USING old one continue to use the old proxy. In above Fig MULTIPLE PROXY SERVERS .2, as expected, we find the growth of process time Another advantage of the architecture versus number of proxy be linear, that is, the process presented in this paper is that it is inherently scalable. time is proportional to the number of proxy, and so An integrated MAR and WLAN architecture using 61 | P a g e
  • 6. Venkadesh.R, Dr.K. Rajan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.057-062 our analysis method has time complexity of O(n). Conference on Worldwide Computing and Just as it is with traditional Web proxies, multiple its Applications (WWCA'98), March 1998. proxy/MAR pairs may form a hierarchical structure. [6] R. Ramjee, T. La Porta, L. Salgarelli, S. In other words, requests can be sent from one proxy Thuel, K. Varadhan, L. Li, “IP-based access to another proxy in the case the originating proxy network infrastructure for next- generation cannot provide the service required by the mobile wireless data networks,” IEEE Personal host. This paper describes performance and building Communications, PP. 34-41 AUG 2000. simulation models for evaluating mobility of proxy [7] Zhimei Jiang, Kin K.Leung Byoung-Jo serveris described in (2) and (3). The basic idea of the J.Kim Paul Henry, “Seamless Mobility proposed method is the system takes advantage of the Management”, IEEE Personal existing proxy supports in network applications to Communications PP 559- 564, 2002, AT & reduce web traffic and maintain network connection T Labs Research, NJ. during a handoff. V CONCLUSION Venkadesh.R completed his B.E. Computer Science In conclusion, this paper presents a proxy and Engineering from University of based mobility management scheme. The system Madras in 1999 and M.Tech takes advantage of the existing proxy supports in Electronics and Communication network applications to maintain network connection Engineering from Pondicherry during a handoff. More specifically, a mobility aware University in 2004. He has 10 years router that is coupled with the Lower-level proxy is of teaching experience in an effective solution to reduce web traffic and is able engineering colleges. He has to detect the network change of mobile host and published 2 international Journals, 4 International forward the packets based on the mobile’s current IP Conferences, attended workshops and Faculty address. The main advantage of this scheme is that it Development programmes. Interested area is requires little changes at the client, hence will be Communication and Networking. At present he is easier to implement. Because it depends on the working as Vice-Principal and Assistant Professor, availability of proxy support, applications without Department of Electronics and Communication such supports will not be able to take advantage of Engineering, Vel Tech Engineering college, this architecture. However, as more and more Chennai-62, India. applications, from email to multimedia applications, are becoming Web based and are accessible through K.Rajan completed his B.E. Web browser, this architecture is able to provide Electrical and Electronics and M.E. mobility support for a wide range of them. Applied Electronics at P.S.G. College of Technology, REFERENCE Coimbatore. He has completed his [1] P. Bhagwat, C. Perkins, and S. Tripathi, Ph.D. from J.N.T.U. Anantapur, AP “Network layer mobility: An architecture in high frequency power system for and survey,”, IEEE Personal industrial and commercial zones. He has 19 years of Communications, PP. 54-64 JUN 1996. industrial experience in R&D, production and 9 years [2] E. Brewer, R. Katz, Y. Chawathe, S. of teaching experience in engineering colleges. He Gribble, T. Hodes, G. Nguyen, M. Stemm, has published 4 international and national journals. T. Henderson, E. Amir, H.Balakrishnan, A. He also presented papers in 14 international and Fox, V. Padmanabhan, S. Seshan, “A national conferences. Interested area is power network architecture for heterogeneous electronics and power system. At present he is mobile computing,” IEEE Personal working as Principal in Vel Tech Engineering Communications PP. 8-24 OCT 1998. College. – RS Trust. [3] Campbell, S. Kim, A. Valko, C. Wan, Z. Turanyi, “Design, implementation. and evaluation of cellular IP,” IEEE Personal Communications, pp. 42-49 AUG 2000. [4] A. Hills and D. Johnson. A Wireless Data Network Infrastructure at Carnegie Mellon University. IEEE Personal Communications, 3(1): PP. 56-63, February 1996. [5] Kevin Lai, Mema Roussopoulos, Diane Tang, Xinhua Zhao, Mary Baker, " Experiences with a Mobile Testbed," Proceedings of the Second International 62 | P a g e