Wireless Internet. 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedings

Research Article

MIH-Based eNB Selection for Untrusted Networks

Download
130 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-06158-6_13,
        author={Fang-Yie Leu and Kun-Lin Tsai and Rui-Ting Hung},
        title={MIH-Based eNB Selection for Untrusted Networks},
        proceedings={Wireless Internet. 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedings},
        proceedings_a={WICON},
        year={2019},
        month={1},
        keywords={MIH CRRM Untrusted networks LTE-A WLAN},
        doi={10.1007/978-3-030-06158-6_13}
    }
    
  • Fang-Yie Leu
    Kun-Lin Tsai
    Rui-Ting Hung
    Year: 2019
    MIH-Based eNB Selection for Untrusted Networks
    WICON
    Springer
    DOI: 10.1007/978-3-030-06158-6_13
Fang-Yie Leu1,*, Kun-Lin Tsai1,*, Rui-Ting Hung1,*
  • 1: Tunghai University
*Contact email: leufy@thu.edu.tw, kltsai@thu.edu.tw, tom813813@gmail.com

Abstract

In recent years, some mobile phones are equipped with more than one Radio Access Technology (RAT) to make themselves adapt to a heterogeneous environment which comprises networks of different technologies. Also, during a User Equipment’s (UE’s) handover, it would be better if we can choose a suitable eNB as the next eNB (NeNB) to serve this UE. Generally, this can be achieved with the help of Common Radio Resource Management (CRRM). In this study, we propose a NeNB selection scheme, called NB lection ystem (eSeS), for two adjacent networks, e.g., Q and R, to select an appropriate eNB in R for UE before UE hands over from Q, i.e., source network, to R, i.e., target network. In order to enable the communication between different types of RATs, such as Long Term Evolution Advanced (LTE-A) and Wireless Local Area Network (WLAN), we utilize the IEEE 802.21 Media Independent Handover (MIH) as their common data exchange mechanism. With the CRRM, the load balance in a heterogeneous network environment can also be maintained. In our simulation, the performance of this scheme in untrusted network handover cases is better than that of PMIPv6 and FMIPv6.