11
An Experimental Cross-Layer Approach to Improve the Vertical Handover Procedure in Heterogeneous Wireless Networks Rosario G. Garroppo, Stefano Giordano, Stefano Lucetti, Giuseppe Risi, Luca Tavanti Abstract – Users of next generation wireless devices will be likely to move across a heterogeneous network environment. This will give them the possibility to always exploit the best connection to the global Internet. In order to keep a seamless connection, the handover between different access technologies, also known as vertical handover, must be as smooth as possible. The current evolution of network architectures toward an all-IP core favours the use of the Mobile IPv6 protocol to handle such handovers. However, this protocol still presents several drawbacks, mainly related to the assumption of static devices and wired connections. Hence we have designed and implemented a software module that exploits information from the lower layers (e.g. physical) to extend the capabilities of Mobile IPv6 to wireless environments. We have then evaluated both the plain Mobile IPv6 and our proposed implementation over an experimental testbed. The outcome of the assessment proves the effectiveness of our solution and reveals the possibility to perform a seamless vertical handover in heterogeneous wireless networks. Index Terms – Mobile IPv6, vertical handover, handover decision, IEEE 802.11 WLAN. I. INTRODUCTION The number of mobile devices embedding multiple interfaces for different wireless access technologies (e.g. cellular, Wi-Fi, Bluetooth) is growing fast. This will enable users of next generation wireless networks to enjoy ubiquitous access to a plethora of services in an always best connected (ABC) mode. ABC will give them the possibility to keep alive their ongoing communications while moving freely across heterogeneous networks, with seamless service continuity achieved without the need of any active switching operation. In this context, the main obstacle is the loss of service that may occur during the handover process, i.e. when the terminal leaves the current network to join another network (or network operator). More precisely, we speak of vertical handover, since it takes place in an environment of overlaid networks and involves a change in the access technology. The vertical handover process is deeply different from the traditional horizontal handover, in which the user just moves from one base station or access point to another, both belonging to the same network and usually to the same operator (as it happens e.g. in GSM and UMTS networks). In this case, the network drives and handles most of the operations and automatically Manuscript received November 30, 2005; revised March 6, 2006. Rosario G. Garroppo, Stefano Giordano, Stefano Lucetti, Giuseppe Risi, and Luca Tavanti are all with the Dept. of Information Engineering, University of Pisa, Via Caruso 16, 56122 Pisa, Italy. E-mail: {r.garroppo, s.giordano, s.lucetti, g.risi, luca.tavanti}@iet.unipi.it cares for the routing of packets, user authentication, accounting, and so on. In contrast, a vertical handover requires an active participation of the mobile terminal, which must choose the network to connect to depending on the user requirements, the available resources, and other parameters. The terminal also has to inform all the devices involved in the communication of its new position, caring to provide updated routing information and other useful data. Hence, a vertical handover poses much more issues for the user to experience a seamless service. In the remainder of the paper we only address the vertical handover, which we will refer to with the simple term handover. The occurrence of a service rupture mainly depends on the type of handover. Basically, we can distinguish a soft handover and a hard handover. In the first case, the user’s terminal decides whether and when to change network. Thus it can leave the old network after having performed all the configuration and signalling to be admitted and connected to the new network. In this way it is possible to completely avoid losses. In contrast, a hard handover is often caused by the current network that suddenly becomes unavailable. The mobile device has therefore to find and join a new network in the fastest possible way, in order to reduce the period of service interruption. To ease the handover process, different access systems such as cellular, wireless LANs, short-range devices, and even wired access (e.g. Ethernet, xDSL) should be coordinated to deal efficiently with various environments and user demands. The current evolution of wireless networks toward all-IP architectures can offer a common platform for this harmonization. Solutions will be possible which completely integrate with natively IP-based wired networks. In this context, the support for terminal mobility can be handled by the Mobile IPv6 protocol (MIPv6, see [1]), which may work with any kind of application over any kind of access network. Yet, MIPv6 specification and realizations suffer from some shortcomings. MIPv6 has been considered mainly for the horizontal handover, and it has become a valuable solution for global mobility. However, the latency introduced in the handover process may become a significant hurdle in a situation of micro mobility, such as office or home environments, where more stringent requirements are often in place. The paper describes how we have addressed this issue, focusing in particular on reducing the handover decision time. We have at first analysed the performance of the current implementation of MIPv6 by means of a geographical testbed. 40 JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL. 2, NO. 1, MARCH 2006 1845-6421/05/5171 © 2006 CCIS

An Experimental Cross-Layer Approach to Improve the

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Microsoft Word - JCOMSS-FWS-5171_v3.docAn Experimental Cross-Layer Approach to Improve the Vertical Handover Procedure in Heterogeneous
Wireless Networks Rosario G. Garroppo, Stefano Giordano, Stefano Lucetti, Giuseppe Risi, Luca Tavanti
Abstract – Users of next generation wireless devices will be likely to move across a heterogeneous network environment. This will give them the possibility to always exploit the best connection to the global Internet. In order to keep a seamless connection, the handover between different access technologies, also known as vertical handover, must be as smooth as possible. The current evolution of network architectures toward an all-IP core favours the use of the Mobile IPv6 protocol to handle such handovers. However, this protocol still presents several drawbacks, mainly related to the assumption of static devices and wired connections. Hence we have designed and implemented a software module that exploits information from the lower layers (e.g. physical) to extend the capabilities of Mobile IPv6 to wireless environments. We have then evaluated both the plain Mobile IPv6 and our proposed implementation over an experimental testbed. The outcome of the assessment proves the effectiveness of our solution and reveals the possibility to perform a seamless vertical handover in heterogeneous wireless networks.
Index Terms – Mobile IPv6, vertical handover, handover decision, IEEE 802.11 WLAN.
I. INTRODUCTION
The number of mobile devices embedding multiple interfaces for different wireless access technologies (e.g. cellular, Wi-Fi, Bluetooth) is growing fast. This will enable users of next generation wireless networks to enjoy ubiquitous access to a plethora of services in an always best connected (ABC) mode. ABC will give them the possibility to keep alive their ongoing communications while moving freely across heterogeneous networks, with seamless service continuity achieved without the need of any active switching operation.
In this context, the main obstacle is the loss of service that may occur during the handover process, i.e. when the terminal leaves the current network to join another network (or network operator). More precisely, we speak of vertical handover, since it takes place in an environment of overlaid networks and involves a change in the access technology. The vertical handover process is deeply different from the traditional horizontal handover, in which the user just moves from one base station or access point to another, both belonging to the same network and usually to the same operator (as it happens e.g. in GSM and UMTS networks). In this case, the network drives and handles most of the operations and automatically
Manuscript received November 30, 2005; revised March 6, 2006. Rosario G. Garroppo, Stefano Giordano, Stefano Lucetti, Giuseppe Risi,
and Luca Tavanti are all with the Dept. of Information Engineering, University of Pisa, Via Caruso 16, 56122 Pisa, Italy.
E-mail: {r.garroppo, s.giordano, s.lucetti, g.risi, luca.tavanti}@iet.unipi.it
cares for the routing of packets, user authentication, accounting, and so on. In contrast, a vertical handover requires an active participation of the mobile terminal, which must choose the network to connect to depending on the user requirements, the available resources, and other parameters. The terminal also has to inform all the devices involved in the communication of its new position, caring to provide updated routing information and other useful data. Hence, a vertical handover poses much more issues for the user to experience a seamless service. In the remainder of the paper we only address the vertical handover, which we will refer to with the simple term handover.
The occurrence of a service rupture mainly depends on the type of handover. Basically, we can distinguish a soft handover and a hard handover. In the first case, the user’s terminal decides whether and when to change network. Thus it can leave the old network after having performed all the configuration and signalling to be admitted and connected to the new network. In this way it is possible to completely avoid losses. In contrast, a hard handover is often caused by the current network that suddenly becomes unavailable. The mobile device has therefore to find and join a new network in the fastest possible way, in order to reduce the period of service interruption.
To ease the handover process, different access systems such as cellular, wireless LANs, short-range devices, and even wired access (e.g. Ethernet, xDSL) should be coordinated to deal efficiently with various environments and user demands. The current evolution of wireless networks toward all-IP architectures can offer a common platform for this harmonization. Solutions will be possible which completely integrate with natively IP-based wired networks. In this context, the support for terminal mobility can be handled by the Mobile IPv6 protocol (MIPv6, see [1]), which may work with any kind of application over any kind of access network.
Yet, MIPv6 specification and realizations suffer from some shortcomings. MIPv6 has been considered mainly for the horizontal handover, and it has become a valuable solution for global mobility. However, the latency introduced in the handover process may become a significant hurdle in a situation of micro mobility, such as office or home environments, where more stringent requirements are often in place.
The paper describes how we have addressed this issue, focusing in particular on reducing the handover decision time. We have at first analysed the performance of the current implementation of MIPv6 by means of a geographical testbed.
40 JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL. 2, NO. 1, MARCH 2006
1845-6421/05/5171 © 2006 CCIS
Original scientific paper
We have then designed and developed a software module, called IMM (an acronym for Interface Management Module), that has been integrated in the MIPv6 stack. The goal of IMM is extending the Mobile IPv6 to better support interface selection and movement detection. The same geographical testbed has been used to evaluate the enhancements brought by our solution.
The paper is organised as follows. Section II outlines recent work in the field of vertical handover. Section III describes and characterizes the handover process, including a short description of the Mobile IPv6 protocol. The proposed solution is presented in Section IV, followed by a description of the experimental testbed in Section V. Section VI reports the outcome of our tests, and finally Section VII concludes the paper.
II. RELATED WORK
The interoperability of cellular networks and wireless LANs has recently become a hot topic for standardization bodies such as 3GPP, ETSI and IETF. The European Telecommunications Standards Institute (ETSI) first introduced a classification of the coupling between a WLAN and a cellular network [2]. When loosely coupled, the two networks are independent of each other and only connected through the global Internet for exchanging signalling data. User data transit over separate paths. In tightly coupled configurations, the WLAN is just an extension of the cellular radio access subsystem. Therefore it must implement and support most of the features of the cellular network. Both signalling and user data transit over the core of the cellular network. Each approach has its pros and cons. In the present paper we focus on the loosely coupled solution, which we believe is more general, given that in most cases WLANs and cellular networks are managed by different operators. Note that in such a scenario the procedures of authentication, authorization and accounting also play an important role. Still, from the point of view of the Mobile IPv6, these are activities of the upper layers, and therefore we did not inserted them in our study.
The Third Generation Partnership Project (3GPP) is now studying how to exploit WLAN access to enhance the services offered to users of 3G networks. In a recent specification [3], 3GPP plans to reuse the functionalities of the cellular network (e.g. subscription, authentication, authorization, accounting, routing) in the WLAN. This will be achieved relying solely on the existing capabilities of the WLAN, without imposing new constraints on it.
The Session Initiation Protocol (SIP) has been proposed for the provision of seamless handover for real-time services. Both 3GPP and the Internet Engineering Task Force (IETF) have converged on it. However the two proposals do not use the same features of SIP, hence they pose compatibility problems [4]. In addition, 3GPP has not yet specified how to use SIP to provide service continuity. Other issues come from the fact that SIP works at application level and does not integrate with lower layer protocols. This may cause extra delays due to the traversal of the whole OSI protocol stack. Working at lower layers may thus result more effective.
Solutions at IP layer are mostly based on Mobile IP, either
in version 4 or 6. Clearly, Mobile IPv6 (MIPv6) looks more promising given the ongoing transition towards the IPv6 Internet. Several works have already evaluated the performance of this protocol and proposed enhancements. However, with specific regard to the issues of vertical handover, the number of contributions is still limited. Chakravorty et al. [5] carried out an experimental study on mobility between GPRS and 802.11 networks. The authors highlighted the problems raised by the disparity in the characteristics (in terms of bandwidth and round trip time) of the two networks. They also proposed and evaluated some optimization techniques (such as Fast Router Advertisements, Client-based Router Advertisement Caching, Client-Assisted Simulcast of Binding Updates) at network layer. For example, Fast Router Advertisement can minimise the execution time of the handover by increasing the frequency of router advertisements, but may also cause overhead problems in narrowband WWAN links. As the authors themselves point out, more optimizations are still possible, particularly in the direction of cross-layer solutions.
One such solution has been proposed by Ylianttila et al. [6]. The authors have defined a “transition region” as the area where the signal varies around a predefined threshold. They have then proposed two solutions that analyse how the effective data rate, the terminal speed, and the handover delay act on throughput when the mobile device enters or leaves the transition region. The analysis considers both the received signal strength (RSS) and the dwell time (the period during which the terminal uses a high date rate even though the RSS is below the threshold). An RSS-based algorithm compares the received signal strength with the threshold to decide to start the handover. The aim of this algorithm is to maximize the throughput in the transition region by choosing the link with the broadest bandwidth. Unfortunately, given the high variability of the RSS, this kind of algorithms induce the so called “ping-pong” effect. More handover processes are carried out, with a considerable increase in the latency.
III. THE VERTICAL HANDOVER PROCESS
In the present section we will give a short outline of the Mobile IPv6 protocol (the details can be found in [1]) and a characterization of the handover process. This characterization is by now rather common in literature (see e.g. [5][7]).
A. The Mobile IPv6 protocol
Mobile IPv6 has been introduced to support IP mobility of user devices, which in this context are named Mobile Nodes (MNs). When a MN moves to another network, it sends Binding Update (BU) messages to its Home Agent (HA) and Correspondent Nodes (CNs). The CNs are nodes the MN is communicating with. When they receive a BU, they should update the path over which the data packets are sent, in order to reach the MN in the new network. However, it may happen that a CN is not able to understand the BU messages (e.g. if it does not support Mobile IPv6). In such a case, data traffic is sent to the HA that redirect it to the MN. The task of the HA is in fact to trace all the MN movements in order to keep the continuity of the connections. These procedures are followed for both horizontal and vertical handovers.
GARROPPO et al.: AN EXPERIMENTAL CROSS-LAYER APPROACH TO IMPROVE VERTICAL HANDOVER 41
There are two factors that make optimizing the handover procedure a hard task. The first is related to the implementation of Mobile IPv6, the other is intrinsic of the MIPv6 protocol.
MIPL is a free implementation of Mobile IPv6 developed at the Helsinki University of Technology [8]. It does not support any kind of dynamic decision strategy to select the interface to use for network connection. Each active interface has a statically assigned priority, which is set when the MIPL module is first loaded into the kernel. The interface with the highest priority is marked as preferred (or primary) and selected for communication. The procedure to assign priorities is pseudo-stochastic; in fact, successive tries may lead to different interface priority assignments, hence to a different primary interface. The assigned priorities depend neither on the characteristics of the interface (wired vs. wireless, nominal data rate, etc.) nor on its status (active or inactive). This rigid scheme clearly does not consent any efficient management of the interfaces.
Mobile IPv6 decides to perform an handover on the basis of the Neighbour Unreachability Detection (NUD) algorithm [11]. The MN sets a timeout of 5 seconds after receiving each unsolicited Router Advertisement (RA) on the link of the interface with the highest priority. The originator of those RAs is the MN’s Default Router (DR). When the timeout expires, the MN sends a Neighbour Solicitation (NS) message to the DR. If it does not receive a Response Router Advertisement (RRA) in 200 ms, the MN assumes that the Default Router is no longer reachable and starts a survey on all its interfaces to acquire a new DR. This is performed sending Router Solicitation (RS) messages over all active interfaces and waiting for a Response RA. The interface that becomes the new primary interface is the one with the highest priority among those from where the MN has received a solicited Router Advertisement. Unfortunately, the delay introduced by this simple Layer 3 movement detection algorithm is pretty high and can easily spoil any technique for reducing the handover execution time.
B. Characterizing the vertical handover process
The vertical handover process in MIPv6 can be divided into two phases: handover decision and handover execution.
The first phase should produce a decision regarding both an “if” and a “when” the handover must be executed. The presence of overlapping networks should be exploited to always have the best connection. The user can choose his entry point in a heterogeneous network scenario with multiple points of access. However, moving to a different network should produce no noticeable service interruption. Hence, what networks are available and the quality of the links to the access points are factors that must be continuously monitored. In addition, user preferences, such as choosing the cheapest operator, or keeping the quality of the service at a desired level, must also be considered. All these data are the input of a decision algorithm that determines whether to perform an handover or not. An accurate choice of the quantity and quality of the data and the adoption of a smart algorithm are therefore the key to reducing the handover latency.
The handover execution phase encompasses all the
operations and signalling to attach the device to the new access router. It includes the registration procedures at the HA and with the CN, and the execution of the Return Routability procedure as well (registration of the Care-Of Address, CoA – see [1] for the details). It can be considered concluded when the first data packet is received through the new access router.
Both phases jointly contribute to the total handover latency. This time can alternatively be divided into three parts:
– Detection Time (DT). It is the time required by the MN to become aware of its movement, or to detect physical events that may lead to a handover (e.g. entering/leaving the coverage area of an access point).
– Configuration Time (CT). This measures the time the MN needs to find a new access router (by receiving Router Advertisements, RAs), to update its routing tables and to configure its interfaces with a new Care of Address (CoA). A CoA is a temporary address used to deliver the traffic to the MN registered in the new network.
– Registration Time (RT). It is the time that elapses between the forwarding of a Binding Update to the HA and CN and the moment the first data packet is received from the CN over the new route. The Registration Time is typically bounded by the Round Trip Time (RTT) experienced towards the HA and CN. Depending on the link, it may be very high. The most common technique to optimize the RT is using the link with the lowest RTT (usually the WLAN link) for the registration phase. Optimizing the handover execution, however, is out of the scope of this paper.
IV. THE INTERFACE MANAGEMENT MODULE
To overcome these drawbacks, we have developed a kernel module for the dynamic management of the interfaces of the MN. This module, named Interface Management Module (IMM), works in cooperation with the Mobile IPv6 implementation, extending its functionalities to better support interface selection and movement detection. The goal is to optimize the handover decision phase by means of a cross- layer approach. As shown in Fig. 1, IMM communicates with both the Link Layer and the Mobile IPv6 stack. Information gathered from the Link Layer is used to drive the selection of the primary interface.
Similarly to MIPL, IMM also sorts the available interfaces, assigning a different priority to each of them. Modifications to Mobile IPv6 implementation are then minimal, since MIPL already performs interface selection based on priority ranking. In contrast to MIPL, however, IMM takes into account the features of each network interface and can dynamically change the priorities. This implies that information on channel quality or link state must be continuously available to assign each interface the proper priority.
The current implementation of IMM assumes the MN is in a three layer overlay network. A LAN (Ethernet) is the lowest overlay, which provides a high speed link but allows no movement. An 802.11b WLAN is the intermediate overlay. It offers a reasonable movement opportunity and a fairly good data rate. The GPRS cellular network is the highest overlay, with low data rate but geographical coverage. IMM then characterizes the WLAN interface with the signal to noise ratio (SNR) of the radio channel (collected every 100 ms), and
42 JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL. 2, NO. 1, MARCH 2006
the Ethernet link simply by its status (either up or down). The GPRS link is assumed to be always available, so there is no need to monitor it.
Fig. 1. Architecture of the IMM.
In the design of IMM, we have chosen to favour the fastest
links as long as they are available. This implies that the lowest overlay layers should always be preferred. Thus, if all the interfaces are active, the Ethernet link has the highest priority, the 802.11 link the intermediate, and the GPRS link the lowest. The priority assignment algorithm, which drives the handover decision in dynamic conditions, is illustrated in Fig. 2. To determine the priority for the WLAN interface, we used a hysteresis mechanism. The current SNR is compared with two thresholds: SNRHIGH and SNRLOW, with SNRHIGH > SNRLOW. If the current SNR becomes greater than SNRHIGH, the link is assumed to be good and its priority is set higher than GPRS but lower than Ethernet. If SNR moves below SNRLOW, the WLAN link is reckoned to be poor and the interface priority becomes the lowest among the active interfaces. The choice of employing two thresholds is due to the need of reducing the “ping-pong” effect. The priority level assigned to the GPRS interface is kept constant, as the link is always available. As for the Ethernet link, if it is up, it gets the highest priority. If the link is broken, the interface is removed from the list of active interfaces. Whenever the link is restored, the interface is put back in the active interface list and is configured with the highest priority.
Fig. 2. The algorithm of priority updating.
When the state of any interface changes, the priorities are
updated. This may cause a change in the primary interface, hence an handover may be necessary. The handover process is started as soon as the MN, after updating the priorities, receives a Router Advertisement on an interface whose priority is higher than the currently preferred interface. With regard to the default MIPv6 procedure, employing the IMM no longer requires waiting for the timeout expiration of unsolicited RAs, and there is no need to transmit NS and RRA messages. Hence we expect that the proposed solution will significantly reduce the handover latency.
V. THE EXPERIMENTAL TESTBED
In our experimental testbed we have included a wired LAN, a wireless 802.11 network and wide area connectivity (WWAN). The testbed is depicted in Fig. 3. 6net is a native IPv6-based network built within a European project to test a variety of new IPv6 services and applications [9] .
WWAN connectivity is provided by the GPRS (General Packet Radio Service) network operated by TIM, one of the four Italian cellular operators. Starting from the terminal, the GPRS network infrastructure includes a Base Transceiver Station (BTS), a Base Station Controller (BSC), the Service GPRS Support Node (SGSN), and eventually the Gateway GPRS Support Node (GGSN). The GGSN is responsible for acting as a gateway between the GPRS packet network and the public Internet. All these elements are property of the cellular operator and we had no control on them. Instead, the rest of the testbed has been deployed in our laboratory. It includes a number of desktop PCs, one IEEE 802.11 Access Point (AP) and a laptop acting as the MN. Three different IPv6 subnets have been configured. Subnets A and B are used to complete the overlay network, whereas Subnet C hosts the CN. Subnet A is the Home Network. Each PC is running a Linux GNU/Debian distribution; the MN, CN and HA run the MIPLv1.1 implementation of Mobile IPv6 [8].
Fig. 3. The experimental testbed.
The PCs involved in the experiment are: – nx9005. This is the Mobile Node. It is equipped with an
Ethernet interface connected to Subnet A, a PCMCIA 802.11b interface to connect to the AP belonging to Subnet B, and a PCMCIA Globetrotter GPRS network card to connect to the GPRS network.
GARROPPO et al.: AN EXPERIMENTAL CROSS-LAYER APPROACH TO IMPROVE VERTICAL HANDOVER 43
– Granpa. This is the CN. It represents a generic host of the Internet, and runs a number of services, among which an FTP server and the MGEN traffic generator.
– Archimede. It acts as the Home Agent for the MN. It is attached to Subnet A.
– Godel. It acts as an IPv6 router, and does not need any Mobile IPv6 knowledge.
Since the GPRS network currently supports only IPv4, we set up a static tunnel of IPv6 in IPv4 between our router (Godel) and the MN. All IPv6 traffic coming from the MN through the GPRS interface is encapsulated into IPv4 packets. Once they reach Godel, they are decapsulated. The same happens in the opposite direction for all the traffic addressed to the GPRS interface of the MN.
A. The Measurement Tool
The MAGNET [10] toolkit has been chosen to gather a detailed description of the active TCP sessions, to collect the statistics of the Mobile IPv6 protocol and to identify the messages exchanged during the three phases of the handover procedure. This measurement tool offers a framework to monitor any arbitrary kernel event of the Linux operating system and is available as a patch for the 2.4.19 kernel. An extension to MAGNET [11] has been necessary in order to support the 2.4.22 kernel, which is required by the MIPLv1.1 implementation. Furthermore, the TCP tracking engine has required a further extension in order to export all the TCP related variables and statistics, such as the Congestion Window Size, the Retransmission Time Out, the Smoothed Round Trip Time, as well as all the events related to the Mobile IPv6 protocol.
VI. EXPERIMENTAL ANALYSIS
To evaluate the improvements of the proposed IMM over the plain Mobile IPv6, we have performed a number of tests using both UDP and TCP traffic. Within the reference scenario of Fig. 3, the MN moves across the overlay network triggering the handovers. At first, the MN is connected to its Home Network (Subnet A) through the Ethernet interface. At the same time it is also under the coverage area of both the WLAN and the GPRS networks. Next, it gets disconnected from Subnet A. This forces a first handover towards the WLAN access network (Subnet B). Lastly, the MN is moved away from the AP, thus leading to a second handover towards the GPRS network. The MN is then moved along the inverse path, to perform two more handovers, the first from the GPRS network to the WLAN, and the second from the WLAN to Ethernet, when it is finally reconnected to its Home Network.
The modified version of MAGNET has been used to obtain all TCP parameters and to collect the exact timestamp of each UDP packet along with its sequence number. It has also been used to track all MIPv6 messages related to the handover procedure. These have been reported in the figures as vertical lines. For the sake of clarity, however, we have drawn only the most meaningful, omitting for example the messages of the Return Routability and Care-of Address registration procedures (Home Test Init, Care-of Test Init, Home Test, Care-of Test, etc.).
The handovers are considered completed when the MN
sends the Binding Update (BU) message to the CN (in same cases when the data transfer is resumed). This triggers the execution of the Route Optimization procedure and the subsequent routing of the packets along the new route.
Note that in most cases the duration of the experiments based on the MIPL and IMM implementations are different (since MIPL often takes longer) and the points of occurrence of the handovers are not the same. Hence the scales on the horizontal axis of many of the following figures are different too.
A. TCP traffic
The TCP session consisted in downloading a 50 MB data file from the Correspondent Node towards the MN. Statistics on the TCP connection have been measured both at the sender side (the CN) and at the receiver side (the MN). Each handover is detailed and commented in the following subsections.
A.1. Ethernet to WLAN Handover
The first handover involves a passage from the wired connection to the wireless LAN. This is obtained by simply unplugging the cable from the mobile device. Thus we can measure how promptly the mobile procedures react to a sudden change in the network state.
When the plain MIPL is in place (see Fig. 4), we can see how the default timeout of the NUD procedure causes a long service interruption. The last RA is received shortly after 1 second from the beginning of the test, and the device is disconnected from the Ethernet at 1.6 s. The Router Solicitation is sent out at 6.3 s, and the data transfer is resumed only at 8.1 s, after the registration of the mobile device with the CN. We can then compute the total handover duration time, that is 6.5 seconds.
Fig. 4. Relevant TCP traffic data and SNR at the MN for the Ethernet
to WLAN handover with MIPL.
The improvement brought by IMM is highlighted in Fig. 5 (note that the scale on the abscissa is different from Fig. 4). The device is notified of the lost availability of the wired connection (at 1.95 s). It immediately reacts by sending an RS over all interfaces. At 2.5 s it receives a RA from the WLAN interface so it can start the configuration and registration
44 JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL. 2, NO. 1, MARCH 2006
phases, that finally lead to resuming the data transfer at 5.2 s. The overall length of the handover is reduced to 3.3 seconds, most of which employed by the registration procedure.
Fig. 5. Relevant TCP traffic data and SNR at the MN for the Ethernet
to WLAN handover with IMM.
A.2. WLAN to GPRS Handover
As in the previous case, when employing MIPL, the WLAN interface is used until the timeout on the receipt of a Router Advertisement transmitted by the Default Router in Subnet B expires. Analysing Fig. 6, we can see that the SNR assumes increasingly lower values, thus leading to many packet losses and retransmissions. This has an impact on the CN as well. Fig. 7 reports traffic data registered at the CN. In particular, some points in the interval 43-62 s, that refer to transmitted TCP segments, have no corresponding ACK. Those data packets, in fact, had never been received by the MN (see Fig. 6, where there are no data points between 43 ad 62 seconds). This leads to the expiration and subsequent increase of the retransmission timeout (RTO), as can be seen in Fig. 8, that plots the values of all relevant TCP parameters at the CN (note that SRTT and RTO are plotted on a logarithmic scale, while the grid refers to the linear scale of CWND and SSTHRESH).
The handover process, however, is not started until 49.5 s, when a first Router Solicitation is cast by the MN on every interface. Unfortunately an RA is received over the WLAN, which is then kept as the primary interface even if no data can flows through it due to the very low SNR.
This behaviour finds an explanation in the IEEE 802.11b standard [14]. It should be noted that RAs have a multicast destination address. According to the standard, the AP maps this packet to a broadcast MAC frame and decreases the transmission bit rate (to 2 Mbps) for backward compatibility with non-b/g cards. This allows the RAs to be received with higher probability than data packets, which are unicast and therefore transmitted by the AP at the highest rate and with a less robust modulation.
The expiration of the second RA timeout is thus necessary to restart the procedure and bring to a complete handover. The Binding Update is thus sent only at 55.5 s, and the file transfer is resumed through the GPRS networks at 62 s. Hence we can assume the handover decision time, i.e. the time to understand that a handover is needed, to go from the last received packet
(at 43 s) to 49.5 seconds, and the handover execution phase to last 12.5 seconds. Summarizing, the whole handover process using the plain MIPv6 protocol takes about 19 seconds. During this period the file transfer is suspended, five retransmissions are necessary to the deliver a packet to the MN, and TCP needs roughly 3 more seconds to reach a regime over the GPRS network.
15.3
15.32
15.34
15.36
15.38
15.4
15.42
15.44
15.46
5
10
15
20
25
30
35
SNR of wlan1
BU to CN
Fig. 6. Relevant TCP traffic data and SNR at the MN for the WLAN
to GPRS handover with MIPL.
15.3
15.32
15.34
15.36
15.38
15.4
15.42
15.44
15.46
S E
Received Ack number Sent Seq number
Fig. 7. Relevant TCP traffic data at the CN for the WLAN to GPRS
Handover with MIPL. Fig. 9, Fig. 10 and Fig. 11 refer to the handover performed
using the proposed IMM. The first noticeable thing is that the data transfer is interrupted for a very short time. The WLAN interface is used while the measured SNR is higher than the SNRLOW threshold. As soon as this condition becomes false (at 36.6 s), IMM marks the GPRS interface as preferred. So, when the MN receives an RA message through the GPRS network, it decides to start an handover (at 38.8 s), which is completed in less than 2 seconds.
Note that when the MN switches to the GPRS network, the CN does not receive immediately the ACK packets (refer to Fig. 10, at 38.8 s). Hence, when the RTO expires, the CN retransmits the first unacknowledged packet and the Contention Window parameter (CWND) is set to 1 (Fig. 11, time 39.1 s). When the CN receives an ACK by means of the new connection, the CWND is increased and the file transfer is recovered.
GARROPPO et al.: AN EXPERIMENTAL CROSS-LAYER APPROACH TO IMPROVE VERTICAL HANDOVER 45
1
2
3
4
5
6
7
8
0.1
1
10
SSTRHESH CWND SRTT RTO
Fig. 8. TCP parameters at the CN for the WLAN to GPRS Handover
with MIPL.
5
10
15
20
25
30
35
RA from GPRS & BU to HA BA from HA
BU to CN
Fig. 9. Relevant TCP traffic data and SNR at the MN for the WLAN
to GPRS handover with IMM.
18.3
18.35
18.4
18.45
18.5
18.55
18.6
18.65
S E
Ack number Seq number
Fig. 10. Relevant TCP traffic data at the CN for the WLAN to GPRS
handover with IMM.
0.1
1
10
SSTRHESH CWND SRTT RTO
Fig. 11. TCP parameters at the CN for the WLAN to GPRS handover
with IMM.
A.3. GPRS to WLAN Handover
The behaviour of the standard MIPL implementation is reported in Fig. 12. The MN performs the handover as soon as it receives a Router Advertisement over the WLAN interface. However, the link quality is not yet good enough to sustain the communication. Hence, after a few sent TCP ACKs, the data transfer is suspended. It takes about 10 seconds to reach a zone where the SNR is sufficient to correctly receive at least some packets. The overall handover time can therefore accounted to be around 18 seconds. Note that in this case, assuming that casting a BU to the CN concludes the handover is not correct, as no data is moved after that event. Rather a service interruption occurs, and therefore we must consider the interruption time as the handover duration.
When using IMM (see Fig. 13), the handover can only be triggered after the SNR at the MN has become higher than the SNRHIGH threshold (for the moment, IMM just marks the WLAN as preferred). The link quality towards the 802.11 AP is then good enough to guarantee the delivery of the TCP packets. So, when a RA is received on the WLAN interface, the configuration and registration procedures are started. They are then completed in a very short time thanks to the good quality and speed of the new interface. Note that during the handover packets are received on both wireless interfaces. This realises a soft handover which allows to keep the service interruption at a minimum. From the user perspective no interruption is even experienced.
A.4. WLAN to Ethernet Handover
In this last case, the handover performs well with and without the IMM module. In fact, as soon as the MN gets connected to the cabled LAN, the receipt of a Router Advertisement on this link triggers the handover procedure, which concludes very quickly and causes no service interruption or slowing down. For the sake of brevity, we do not include any figure for this test, given the strong similarity of the results for the two approaches.
46 JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL. 2, NO. 1, MARCH 2006
Fig. 12. Relevant TCP traffic data and SNR at the MN for the GPRS
to WLAN handover with MIPL.
Fig. 13. Relevant TCP traffic data and SNR at the MN for the GPRS
to WLAN handover with IMM.
B. UDP traffic
The impact of IMM on UDP traffic has been analysed using the same experimental testbed shown in Fig. 3. As in the TCP test, the Mobile Node moves in the overlay networks triggering four vertical handovers. An UDP session has been set up with packets generated at the Correspondent Node (using the MGEN [13] traffic generator) and directed to the MN. To avoid losses in the GPRS network, we have limited the rate of the traffic to a value lower than the GPRS available throughput. In the environmental conditions of the experiments, we managed to get a sustained data rate of about 30 kbps through the GPRS network. MGEN has consequently been configured to generate 30 packets per second, with a payload size of 64 bytes. Adding the IPv6 and UDP headers, this results in an offered traffic data rate of about 27 kbps.
The patterns of the received UDP packets at the MN along with the cumulative number of lost packets are plotted in Fig. 14 and Fig. 15, using respectively the MIPL implementation and the IMM. It is immediately evident how MIPL causes more packet losses and performs longer handovers than IMM.
The general behaviour of the two implementations during the four handovers was very similar to what has already been described in the previous Section. What makes this series of tests different, is the distinct nature and response of the two
transport protocols. Therefore, in this section we focus only on the most evident differences with TCP.
0
500
1000
1500
2000
2500
3000
3500
4000
4500
100
200
300
400
500
600
700
800
900
Sequence Number of received UDP packets Lost UDP packets
Fig. 14. Received and lost UDP packets at the MN with MIPL.
0
500
1000
1500
2000
2500
3000
10
20
30
40
50
60
70
80
Sequence Number of received UDP packets Lost UDP packets
Fig. 15. Received and lost UDP packets at the MN with IMM.
B.1. Ethernet to WLAN Handover
Fig. 16 and Fig. 17 are the close-ups of Fig. 14 and Fig. 15 in the proximity of the first handover, from the Ethernet to the 802.11 network.
As for the TCP test, the NUD procedure prevents the MN to promptly react to the loss of connectivity created to the disconnection of the cable at 4.7 s. The first reaction occurs at around 8.6 s, when a Router Solicitation is cast over all the interfaces as a consequence of the expired timeout. The BU completes the handover with a total delay of about 5.2 seconds. During this period, about 160 UDP packets are lost.
When the IMM is in use (see Fig. 17), the loss of the Ethernet connection (at 15.6 s) is notified to the Mobile IPv6 engine, causing the Default Router to be set as unreachable. The MN quickly sends an RS message and after a few hundreds of milliseconds it receives an RA on the WLAN interface. The Care-of Address registration procedure is then started and at 17 s the MN is able to receive packets from the CN. The total handover latency is reduced to about 1.5 seconds, leading to a loss of only 44 packets.
GARROPPO et al.: AN EXPERIMENTAL CROSS-LAYER APPROACH TO IMPROVE VERTICAL HANDOVER 47
0
100
200
300
400
500
42
44
46
48
50
Seq. N. of RX UDP packets SNR at WLAN interface
Ethernet down Last RA from Default Router
BU to CN
RS to All Interfaces RA from WLAN
Fig. 16. Received UDP packets and SNR at the MN for the LAN to
WLAN handover with MIPL.
100
120
140
160
180
200
220
240
13.5 14 14.5 15 15.5 16 16.5 17 17.5 18 45.5
45.6
45.7
45.8
45.9
46
46.1
46.2
46.3
46.4
46.5
Seq. N. of RX UDP packets SNR at WLAN interface
Ethernet down Last RA from default router
BU to CN
RS to All Interfaces RA from WLAN
Fig. 17. Received UDP packets and SNR at the MN for the LAN to
WLAN handover with IMM.
B.2. WLAN to GPRS Handover
After the completion of the first handover, the MN starts moving away from the WLAN coverage area. Fig. 18 shows the performance of the MIPL for this kind of handover. Note that the SNR falls to very low values. UDP packets sent by the CN start being corrupted and get lost. As no RAs are received, the NUD procedure forces the MN to send RS messages. Unluckily (as for the TCP-based experiment), the solicited Router Advertisements are received from both the WLAN and the GPRS interfaces. Consequently the MN remains in Subnet B (i.e. on WLAN). Only when channel conditions further degrades (leading to an almost complete loss of packets, after 70 s), does the handover take place. The overall handover duration is then more than 25 seconds, causing about 500 packets to be lost.
On the other hand, the adoption of the IMM can even allow an almost seamless handover, as shown in Fig. 19. As soon as the SNR at the MN falls below the SNRLOW threshold (at 49.2 s), the priority of the WLAN interface is lowered under that of the GPRS interface. Consequently, when the first unsolicited RA is received from the GPRS network, the handover execution is triggered. The handover latency is reduced to the duration of the Care-of Address registration,
and only 6 packets are lost. The short interruption of packet reception around 53 s is not related to the handover, but is due to a temporarily low quality of the GPRS link.
1000
1500
2000
2500
3000
5
10
15
20
25
30
35
Seq. N. of RX UDP packets SNR at WLAN interface
RA from GPRS BA from HA BU to CN
RS to all interfaces RA from WLAN
Fig. 18. Received UDP packets and SNR at the MN for the WLAN to
GPRS handover with MIPL.
15
20
25
30
35
N in
te rf
ac e
Time [sec.]
SNR < SNR_low
Seq. N. of RX UDP packets SNR_low threshold SNR at WLAN interface RA from GPRS & BU to HA BA from HA BU to CN
Fig. 19. Received UDP packets and SNR at the MN for the WLAN to
GPRS handover with IMM.
B.3. GPRS to WLAN Handover
The behaviour of the standard MIPL implementation is reported in Fig. 20. The MN performs the handover as soon as it receives a Router Advertisement over the WLAN. However, the link quality is not yet good enough to sustain the communication. Hence several (about 80) packets are lost. In the specific try, it takes about 4 seconds to reach a zone where the SNR is sufficient to correctly receive all packets. It is noteworthy that in another measurement run (not reported), the SNR after the handover was so bad that the MN performed another handover towards the GPRS. The overall handover time reached over 20 seconds.
When using the IMM (see Fig. 21), the handover is triggered after the SNR at the MN has become higher than the SNRHIGH threshold. The link quality towards the 802.11 AP is then good enough to guarantee the delivery of the streamed UDP packets. Since packets are received on both wireless interfaces, a soft handover is performed and packet losses are minimal. Only 5 packets are lost, including those that reach
48 JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL. 2, NO. 1, MARCH 2006
the MN out of order, because of the different delay of the GPRS access network.
3060
3080
3100
3120
3140
3160
3180
3200
3220
3240
2
4
6
8
10
BU to CN
SNR at WLAN interface RA from WLAN
Fig. 20. Received UDP packets and SNR at the MN for the GPRS to
WLAN handover with MIPL.
25
30
35
40
45
N in
te rf
ac e
Time [sec.]
SNR > SNR_high
Seq. N. of RX UDP packets SNR_high threshold SNR at WLAN interface
BU to CN RA from WLAN
Fig. 21. Received UDP packets and SNR at the MN for the GPRS to
WLAN handover with IMM. Also note that the MN sends the Binding Update message
to the CN twice, since it receives a packet from the CN through the GPRS network after having sent the first BU. This is due to relevant delay introduced by the GPRS network. Consequently there are some UDP packets “on-air” that reach the MN after the handover has successfully concluded.
B.4. WLAN to Ethernet Handover
As for the TCP test, the handover performs well with both implementations. Hence there is no need to report any figure.
VII. CONCLUSIONS
We have set up an experimental testbed to analyse the performance of the Mobile IPv6 protocol in heterogeneous wireless networks. In particular, we have focused on the issues raised by the vertical handover. From the analysis, we have found that the main cause of the excessive latency is the handover decision. In the standard MIPL implementation, the simple Layer 3 Neighbour Unreachability Detection (NUD) algorithm is the entity that triggers the execution of the
handover. The NUD procedure, however, has been designed for static nodes, and does not allow a prompt reaction to sudden changes in the state of the MN interfaces.
Therefore, we have developed a cross layer mechanism, the Interface Management Module (IMM), which takes advantage of the information on the state of all the available network connections. The proposed module has been evaluated in a geographical test-bed and has achieved a noteworthy reduction of the handover latency. This subsequently leads to decreasing packet losses in presence of UDP traffic and to a quicker recovery of TCP sessions. Additionally, with regard to the WLAN-to-cellular handover, inserting an hysteresis on the levels of SNR that trigger the handover has allowed to avoid the “ping-pong” effect that afflicts the standard MIPv6 handover procedure.
We can therefore conclude that the use of dynamic, state- dependent interface selection algorithms can dramatically enhance the performance of the MIPv6 vertical handover. By realizing a software module that implements such algorithms (the IMM), we have proved that this is a feasible idea, that supports both TCP and UDP traffic. Moreover, if sufficient intelligence is deployed in the IMM, phenomena like the “ping-pong” effect can be avoided. Also, the proposed solution offers enough flexibility to account for more information than the simple interface state. For example user preferences (cost, QoS requirements, etc) can be easily included in the software.
REFERENCES
[1] D. Johnson, C. Perkins, J. Arkko, “Mobility support in IPV6”, IETF RFC 3775, June 2004.
[2] ETSI TR 101 957, “Requirements and Architectures for Interworking between HIPERLAN/3 and 3rd Generation Cellular Systems”, August 2001.
[3] 3GPP, “Group Services and System Aspects; 3GPP Systems to Wireless Local Area Network (WLAN) Interworking; System Description (Release 6)”, TS 23.234, v.6.2.0, Sept. 2004.
[4] F.G. Marquez, M.G. Rodriguez, T.R. Valladares, T. de Miguel, L.A. Galindo, “Interworking of IP multimedia core networks between 3GPP and WLAN”, IEEE Wireless Communications, Vol. 12, Issue 3, June 2005.
[5] R. Chakravorty, P. Vidales, K. Subramanian, I. Pratt, J. Crowcroft, “Performance Issues with Vertical Handovers: Experiences from GPRS Cellular and WLAN hot-spots Integration”, Proceedings of IEEE PerCom, March 2004.
[6] M. Ylianttila, J. Mäkelä, K. Pahlavan, “Analysis of handoffs in a location-aware vertical multi-access network”, Computer Networks, Vol. 47, Issue 2, Feb. 2005.
[7] M. Bernaschi, F. Cacace, G. Iannello, S. Za, A. Pescape, “Seamless internetworking of WLANs and cellular networks: architecture and performance issues in a Mobile IPv6 scenario”, IEEE Wireless Communications, Vol. 12, Issue 3, June 2005.
[8] MIPL Mobile IPv6 for Linux, available at: http://www.mobile- ipv6.org.
[9] 6net – Large Scale International IPv6 Pilot Network, available at: http://www.6net.org.
[10] Monitoring Apparatus for General kerNel Event Tracing (MAGNET). Available at: http://public.lanl.gov/radiant/ research/measurement/magnet.html.
[11] MAGNeT+, available at: http://netgroup-serv.iet.unipi.it/ magnet.
[12] T. Narten, E. Nordmark, W. Simpson, “Neighbor Discovery for IP Version 6 (IPv6)”, IETF 2461, December 1998.
GARROPPO et al.: AN EXPERIMENTAL CROSS-LAYER APPROACH TO IMPROVE VERTICAL HANDOVER 49
[13] The Multi-Generator (MGEN), available at: http://pf.itd.nrl.navy.mil/mgen/mgen.html.
[14] IEEE 802.11b-1999, “Wireless LAN MAC and PHY specifications: Higher speed Physical Layer (PHY) extension in the 2.4 GHz band”.
Rosario G. Garroppo received the Laurea (M.Sc.) degree cum laude in Telecommunication Engineering in 1995 and the Ph.D. degree in Information Engineering in 1999 from the University of Pisa. Since December 2001, he is Assistant Professor at the University of Pisa. His research interests are in traffic modeling, QoS guarantee in mobile networks, performance
evaluation of telecommunication networks by means of simulation tools, traffic control in 802.11, and wireless sensors networks.
Stefano Giordano received the Laurea (M.Sc.) degree cum laude in Electronics Engineering in 1990 and the Ph.D. degree in Information Engineering in 1994, both from the University of Pisa. Since 2001 he is Associate Professor at the Department of Information Engineering of the University of Pisa (Telecommunication Networks Group) where he gives lectures in “Telecommunication Networks” and “Teletraffic
Engineering”. His research and professional interest is the area of broadband multimedia communications.
Stefano Lucetti received his M.Sc. (Laurea) degree cum laude in Telecommunication Engineering in 1999 and his Ph.D. in Information Engineering in 2003, both from the University of Pisa. He is now a postdoctoral fellow with the Telecommunication Networks Group of the University of Pisa. He has worked on teletraffic engineering and efficient radio resource
management in cellular networks. Currently, his research interests are mainly focused on mobility support in IPv6 networks and QoS issues in 802.11 wireless networks.
Giuseppe Risi received the M.Sc. degree in Telecommunication Engineering from the University of Pisa in 2001. He is now a research assistant with the Telecommunication Networks Group of the University of Pisa. His research interest is in the areas of mobility support in IPv6 networks and Voice over IP.
Luca Tavanti received the M.Sc. degree in Telecommunication Engineering from the University of Pisa in 2000. He has then spent six months at the BT Labs in Ipswich (UK), and two years with Simtel spa (Florence, Italy), working on monitoring of cellular networks. Since January 2004 he is a Ph.D. student at the Dept. of Information Engineering of the University of Pisa. He is actively working in the area of
wireless networks, mainly focusing on QoS provision and traffic control in WLANs, WMANs and ad-hoc networks.
50 JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL. 2, NO. 1, MARCH 2006
<< /ASCII85EncodePages false /AllowTransparency false /AutoPositionEPSFiles true /AutoRotatePages /All /Binding /Left /CalGrayProfile (Dot Gain 20%) /CalRGBProfile (sRGB IEC61966-2.1) /CalCMYKProfile (U.S. Web Coated \050SWOP\051 v2) /sRGBProfile (sRGB IEC61966-2.1) /CannotEmbedFontPolicy /Warning /CompatibilityLevel 1.4 /CompressObjects /Tags /CompressPages true /ConvertImagesToIndexed true /PassThroughJPEGImages true /CreateJDFFile false /CreateJobTicket false /DefaultRenderingIntent /Default /DetectBlends true /DetectCurves 0.0000 /ColorConversionStrategy /LeaveColorUnchanged /DoThumbnails false /EmbedAllFonts true /EmbedOpenType false /ParseICCProfilesInComments true /EmbedJobOptions true /DSCReportingLevel 0 /EmitDSCWarnings false /EndPage -1 /ImageMemory 1048576 /LockDistillerParams false /MaxSubsetPct 100 /Optimize true /OPM 1 /ParseDSCComments true /ParseDSCCommentsForDocInfo true /PreserveCopyPage true /PreserveDICMYKValues true /PreserveEPSInfo true /PreserveFlatness true /PreserveHalftoneInfo false /PreserveOPIComments false /PreserveOverprintSettings true /StartPage 1 /SubsetFonts true /TransferFunctionInfo /Apply /UCRandBGInfo /Preserve /UsePrologue false /ColorSettingsFile () /AlwaysEmbed [ true ] /NeverEmbed [ true ] /AntiAliasColorImages false /CropColorImages true /ColorImageMinResolution 300 /ColorImageMinResolutionPolicy /OK /DownsampleColorImages true /ColorImageDownsampleType /Bicubic /ColorImageResolution 300 /ColorImageDepth -1 /ColorImageMinDownsampleDepth 1 /ColorImageDownsampleThreshold 1.50000 /EncodeColorImages true /ColorImageFilter /DCTEncode /AutoFilterColorImages true /ColorImageAutoFilterStrategy /JPEG /ColorACSImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /ColorImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /JPEG2000ColorACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /JPEG2000ColorImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /AntiAliasGrayImages false /CropGrayImages true /GrayImageMinResolution 300 /GrayImageMinResolutionPolicy /OK /DownsampleGrayImages true /GrayImageDownsampleType /Bicubic /GrayImageResolution 300 /GrayImageDepth -1 /GrayImageMinDownsampleDepth 2 /GrayImageDownsampleThreshold 1.50000 /EncodeGrayImages true /GrayImageFilter /DCTEncode /AutoFilterGrayImages true /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /GrayImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >> /JPEG2000GrayACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /JPEG2000GrayImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >> /AntiAliasMonoImages false /CropMonoImages true /MonoImageMinResolution 1200 /MonoImageMinResolutionPolicy /OK /DownsampleMonoImages true /MonoImageDownsampleType /Bicubic /MonoImageResolution 1200 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.50000 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict << /K -1 >> /AllowPSXObjects false /CheckCompliance [ /None ] /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox true /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile () /PDFXOutputConditionIdentifier () /PDFXOutputCondition () /PDFXRegistryName () /PDFXTrapped /False /Description << /CHS <FEFF4f7f75288fd94e9b8bbe5b9a521b5efa7684002000500044004600206587686353ef901a8fc7684c976262535370673a548c002000700072006f006f00660065007200208fdb884c9ad88d2891cf62535370300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c676562535f00521b5efa768400200050004400460020658768633002> /CHT <FEFF4f7f752890194e9b8a2d7f6e5efa7acb7684002000410064006f006200650020005000440046002065874ef653ef5728684c9762537088686a5f548c002000700072006f006f00660065007200204e0a73725f979ad854c18cea7684521753706548679c300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c4f86958b555f5df25efa7acb76840020005000440046002065874ef63002> /DAN <FEFF004200720075006700200069006e0064007300740069006c006c0069006e006700650072006e0065002000740069006c0020006100740020006f007000720065007400740065002000410064006f006200650020005000440046002d0064006f006b0075006d0065006e007400650072002000740069006c0020006b00760061006c00690074006500740073007500640073006b007200690076006e0069006e006700200065006c006c006500720020006b006f007200720065006b007400750072006c00e60073006e0069006e0067002e0020004400650020006f007000720065007400740065006400650020005000440046002d0064006f006b0075006d0065006e0074006500720020006b0061006e002000e50062006e00650073002000690020004100630072006f00620061007400200065006c006c006500720020004100630072006f006200610074002000520065006100640065007200200035002e00300020006f00670020006e0079006500720065002e> /DEU <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> /ESP <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> /FRA <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> /ITA <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> /JPN <FEFF9ad854c18cea51fa529b7528002000410064006f0062006500200050004400460020658766f8306e4f5c6210306b4f7f75283057307e30593002537052376642306e753b8cea3092670059279650306b4fdd306430533068304c3067304d307e3059300230c730b930af30c830c330d730d730ea30f330bf3067306e53705237307e305f306f30d730eb30fc30d57528306b9069305730663044307e305930023053306e8a2d5b9a30674f5c62103055308c305f0020005000440046002030d530a130a430eb306f3001004100630072006f0062006100740020304a30883073002000410064006f00620065002000520065006100640065007200200035002e003000204ee5964d3067958b304f30533068304c3067304d307e30593002> /KOR <FEFFc7740020c124c815c7440020c0acc6a9d558c5ec0020b370c2a4d06cd0d10020d504b9b0d1300020bc0f0020ad50c815ae30c5d0c11c0020ace0d488c9c8b85c0020c778c1c4d560002000410064006f0062006500200050004400460020bb38c11cb97c0020c791c131d569b2c8b2e4002e0020c774b807ac8c0020c791c131b41c00200050004400460020bb38c11cb2940020004100630072006f0062006100740020bc0f002000410064006f00620065002000520065006100640065007200200035002e00300020c774c0c1c5d0c11c0020c5f40020c2180020c788c2b5b2c8b2e4002e> /NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken voor kwaliteitsafdrukken op desktopprinters en proofers. De gemaakte PDF-documenten kunnen worden geopend met Acrobat en Adobe Reader 5.0 en hoger.) /NOR <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> /PTB <FEFF005500740069006c0069007a006500200065007300730061007300200063006f006e00660069006700750072006100e700f50065007300200064006500200066006f0072006d00610020006100200063007200690061007200200064006f00630075006d0065006e0074006f0073002000410064006f0062006500200050004400460020007000610072006100200069006d0070007200650073007300f5006500730020006400650020007100750061006c0069006400610064006500200065006d00200069006d00700072006500730073006f0072006100730020006400650073006b0074006f00700020006500200064006900730070006f00730069007400690076006f0073002000640065002000700072006f00760061002e0020004f007300200064006f00630075006d0065006e0074006f00730020005000440046002000630072006900610064006f007300200070006f00640065006d0020007300650072002000610062006500720074006f007300200063006f006d0020006f0020004100630072006f006200610074002000650020006f002000410064006f00620065002000520065006100640065007200200035002e0030002000650020007600650072007300f50065007300200070006f00730074006500720069006f007200650073002e> /SUO <FEFF004b00e40079007400e40020006e00e40069007400e4002000610073006500740075006b007300690061002c0020006b0075006e0020006c0075006f0074002000410064006f0062006500200050004400460020002d0064006f006b0075006d0065006e007400740065006a00610020006c0061006100640075006b006100730074006100200074007900f6007000f60079007400e400740075006c006f0073007400750073007400610020006a00610020007600650064006f007300740075007300740061002000760061007200740065006e002e00200020004c0075006f0064007500740020005000440046002d0064006f006b0075006d0065006e00740069007400200076006f0069006400610061006e0020006100760061007400610020004100630072006f0062006100740069006c006c00610020006a0061002000410064006f00620065002000520065006100640065007200200035002e0030003a006c006c00610020006a006100200075007500640065006d006d0069006c006c0061002e> /SVE <FEFF0041006e007600e4006e00640020006400650020006800e4007200200069006e0073007400e4006c006c006e0069006e006700610072006e00610020006f006d002000640075002000760069006c006c00200073006b006100700061002000410064006f006200650020005000440046002d0064006f006b0075006d0065006e00740020006600f600720020006b00760061006c00690074006500740073007500740073006b0072006900660074006500720020007000e5002000760061006e006c00690067006100200073006b0072006900760061007200650020006f006300680020006600f600720020006b006f007200720065006b007400750072002e002000200053006b006100700061006400650020005000440046002d0064006f006b0075006d0065006e00740020006b0061006e002000f600700070006e00610073002000690020004100630072006f0062006100740020006f00630068002000410064006f00620065002000520065006100640065007200200035002e00300020006f00630068002000730065006e006100720065002e> /ENU (Use these settings to create Adobe PDF documents for quality printing on desktop printers and proofers. Created PDF documents can be opened with Acrobat and Adobe Reader 5.0 and later.) >> /Namespace [ (Adobe) (Common) (1.0) ] /OtherNamespaces [ << /AsReaderSpreads false /CropImagesToFrames true /ErrorControl /WarnAndContinue /FlattenerIgnoreSpreadOverrides false /IncludeGuidesGrids false /IncludeNonPrinting false /IncludeSlug false /Namespace [ (Adobe) (InDesign) (4.0) ] /OmitPlacedBitmaps false /OmitPlacedEPS false /OmitPlacedPDF false /SimulateOverprint /Legacy >> << /AddBleedMarks false /AddColorBars false /AddCropMarks false /AddPageInfo false /AddRegMarks false /ConvertColors /NoConversion /DestinationProfileName () /DestinationProfileSelector /NA /Downsample16BitImages true /FlattenerPreset << /PresetSelector /MediumResolution >> /FormElements false /GenerateStructure true /IncludeBookmarks false /IncludeHyperlinks false /IncludeInteractive false /IncludeLayers false /IncludeProfiles true /MultimediaHandling /UseObjectSettings /Namespace [ (Adobe) (CreativeSuite) (2.0) ] /PDFXOutputIntentProfileSelector /NA /PreserveEditing true /UntaggedCMYKHandling /LeaveUntagged /UntaggedRGBHandling /LeaveUntagged /UseDocumentBleed false >> ] >> setdistillerparams << /HWResolution [2400 2400] /PageSize [612.000 792.000] >> setpagedevice