Performance Analysis of Inter-Domain Handoff Scheme Based on Virtual Layer in PMIPv6 Networks for IP-Based Internet of Things

Lately, we see that Internet of things (IoT) is introduced in medical services for global connection among patients, sensors, and all nearby things. The principal purpose of this global connection is to provide context awareness for the purpose of bringing convenience to a patient’s life and more effectively implementing clinical processes. In health care, monitoring of biosignals of a patient has to be continuously performed while the patient moves inside and outside the hospital. Also, to monitor the accurate location and biosignals of the patient, appropriate mobility management is necessary to maintain connection between the patient and the hospital network. In this paper, a binding update scheme on PMIPv6, which reduces signal traffic during location updates by Virtual LMA (VLMA) on the top original Local Mobility Anchor (LMA) Domain, is proposed to reduce the total cost. If a Mobile Node (MN) moves to a Mobile Access Gateway (MAG)-located boundary of an adjacent LMA domain, the MN changes itself into a virtual mode, and this movement will be assumed to be a part of the VLMA domain. In the proposed scheme, MAGs eliminate global binding updates for MNs between LMA domains and significantly reduce the packet loss and latency by eliminating the handoff between LMAs. In conclusion, the performance analysis results show that the proposed scheme improves performance significantly versus PMIPv6 and HMIPv6 in terms of the binding update rate per user and average handoff latency.


Introduction
Lately, we see that Internet of things (IoT) is introduced in medical services for global connection among patients, sensors, and all nearby things. Healthcare applications utilizing body sensor networks generate a vast amount of data. Cloud computing among with the Internet of Things (IoT) concept is a new trend for efficient managing and processing of sensor data online. Cloud computing is becoming increasingly popular. A large number of data are outsourced to the cloud by data owners [1,2]. a1111111111 a1111111111 a1111111111 a1111111111 a1111111111 modification to the TCP/IP protocol stack of the MN without the MN is able to change the connection without changing the IP address. Fig 2 shows the PMIPv6 network architecture.
The initial connection procedure for the PMIPv6 domain of the MN is shown in Fig 3. When the MN is connected to the link, MAG, through an MN Attach, acquires the ID and profile information of the MN. The profile information of the MN may be obtained using a Policy Server. Within the profile of MN ID, the IPv6 address of the LMA, and the IP address setting method on the access link are described as essential and may also include the home network address of the further IPv6 MN. When MAG has acquired a profile, it transmits a PBU message to register the current location of the MN to the LMA [14]. LMA receives a PBU and sends a PBA message that contains information on the MN to the MAG HNP to produce a bidirectional IP tunnel between the Binding Cache Entry (BCE) and MAG-LMA to hold the state reached in the MN. If the MAG receives a PBA to set an IP tunnel between MAG-LMA and set the routing table for the data transmission to the MN, thereafter, the MN is an RS/RA procedure on its Home Network Prefix (HNP) after acquiring information, such as the address setting method, to set the IP address.
The packets are sent to the MAG via the IP tunnel between MAG-LMA, and the LMA is received and forwarded to the MN after the address set is sent to the MN in the PMIPv6 domain outside the domain. After the transmitting packet from MN is passed to the LMA using an IP tunnel from the MAG, it is transmitted again on the LMA as a destination [15]. The MN in the PMIPv6 domain handoff procedure is shown in  The previous MAG (pMAG) is detected via the MN Detach; the MN is not present on the access link. PBU to the LMA will be notified of the departure of the MN through a message. The LMA performs an operation for deleting the Binding Cache Entry (BCE) related to the MN and sends a PBA. When the MN is connected to the new MAG (nMAG), nMAG performs the initial access procedure of the MN, and the MN sends the HNP information to the MN received during the initial connection via the assigned RS/RA message exchange. Thus, the MN may use a Home of Address (HoA) allocated first. However, packets that are exchanged between the MN and the CN are transmitted via the technique through the PMIPv6 MAG and LMA, as well as the MAG and LMA in the CN of the MN. The transmission scheme through the following alternative routes requires long transfer delays and significant processing costs. Various performance-enhancing techniques have been proposed to address this problem.

6LoWPAN
The Internet of Things (IoT) can be implemented by highly constrained devices such as Smart City, Smart Health Care, or Smart Car [5]. These devices have lowperformance properties due to their constraints in terms of memory capacity, computation capability and energy autonomy [16]. For several years, we have seen devices using constrained connectivity and communication capacity in low-power Wireless Personal Area Networks (LoWPANs). To extend the Internet to smart devices, the IETF working group has recently defined IPv6 over low-power Wireless Personal Area Network (6LoWPAN). 6LoWPAN defines an adaptation layer to send IPv6 packets through IEEE 802.15.4 physical and medium access control layers. The 6LoWPAN adaptation layer is needed to reduce the size of IPv6 packets and make it suitable for 127 byte IEEE 802.15.4 frames. 6LoWPAN consists of a header compression scheme, fragmentation scheme and a scheme for framing IPv6 link local addresses [17]. Therefore, the adaptation layer is defined between the IP layer and the MAC layer to transport IPv6 packets over IEEE 802.15.4 links. The adaptation layer is responsible for fragmentation, reassembly, header compression, decompression, mesh routing and addressing for packet delivery under mesh topology [5].

Proposed Scheme
Recently, efficient use of the IP mobility management protocols from the network, given the explosive growth of consumer mobile service, has been required. Wireless mobile services consumes significantly more bandwidth and cost compared with existing services in the current network. IP mobility management is still one of the most difficult research topic despite the development of various protocols by the Internet Engineering Task Force (IETF). Mobile IPv6 (MIPv6) [13] was developed as a host-based mobility management protocols such as for universities and companies and much research was done in the societies. Since then, Fast Mobile IPv6 (FMIPv6) [18] and the Hierarchical Mobile IPv6 (HMIPv6) [19] were developed as extended protocols to complement the weakness of the MIPv6. However, this protocol may not yet have been used effectively because of limitations on the physical network having host- based mobility management protocols that require the mobility processing to the UE. Fig 5  illustrates the PMIPv6 network architecture for the IP-based Internet of Things. To solve the above problem, we propose an inter-domain handoff scheme based on a virtual layer in PMIPv6 networks, which reduces signal traffic during location updates by Virtual LMA (VLMA) on the top original Local Mobility Anchor (LMA) Domain. If the Mobile Node (MN) moves to a Mobile Access Gateway (MAG)-located boundary of an adjacent LMA domain, it changes itself into virtual mode, and this movement will be assumed to be a part of the VLMA domain. In the proposed scheme, MAGs eliminate global binding updates for MN between LMA domains and significantly reduce the packet loss and latency by eliminating the handoff between LMAs.
Handoff scheme using virtual layer between the LMAs Layer concept. The concept of micro-cells was adopted to improve the system capacity in a place with a high user density. However, the smaller cell size is to increase the BU frequency of the MN, and the signaling traffic associated with mobility management increases as a result. Each domain consists of a group of cells, and each cell of the LMA service area belongs to exactly one domain LMA. The location of the MN in a mobile network is confirmed by the LMA in that it belongs to the domain and the MAG to which the MN belongs in the LMA domain, as informed periodically. Additionally, it detects the change in the MN from the LMA domain and sends a BU message to the network. However, the overlap scheme is to prevent the short-term changes due to the MN moving along a boundary of two LMA domains where BU traffic increases. That is, LMA overlapped domain traffic may be reduced (Fig 6). The w  Fig 6(c), the MN should overcome a number of cells larger than the size of the overlapped area to send the BU message (in this case, two). This scheme significantly reduces the traffic signal compared with a scheme that does not overlap, but it has the disadvantage that it does not overlap the cells of the LMA domain uniformly. As a result, it is more complex to manage the BU message to the LMA because the overlapped domain, otherwise VLMA, is required for a larger number of schemes. In addition, all BU requests in PMIPv6 are served by the LMA. Thus, the link of the traffic of the LMA should be minimized because it leads to a worse result. In this paper, to reduce the BU ratio effectively and eliminate the overhead, we propose a method of distributing the signal traffic from the LMA to the MAG. This scheme is for the MAG in the boundary zone of the LMA. It is configured to receive the LMA option from all adjacent LMAs and perform the change, not the handoff between the LMA, when the MN is connected with the MAG of the border areas of overlap with the LMA domain. The LMA changes because the MN disconnects after it is moved to another LMA while maintaining the connection to the current LMA. Thus, it is the same procedure as the handoff between LMA; additional packet loss and handoff delay will not occur. If the MN moves to the LMA domain boundary of the adjacent MAG, it changes to virtual mode, and the motion is considered to be within the VLMA domain. Because the MN performs the LMA change within the MAG boundary region, packet loss and additional handoff delay are not generated. The location management scheme proposed in this paper introduces the concept of a virtual layer. As shown in Fig 7, the entire region is divided into seven LMAs, drawn with a thick line (LMA2-LMA8), as mentioned previously, each LMA domain has a single associated VLMA. The original hierarchy of the LMA domain name is a Layer-1, extended VLMA that may overlap. It is important that there is a virtual layer of another part of the region using the three lines named 'Layer-2'. The size of the VLMA is the same as that of the LMA, and each VLMA is placed in the center of three LMAs and combined. Groups that are managed by the LMA domain are composed of three VLMA domains of Layer-2 and one LMA domain of Layer-1 (Fig 7); LMA_i, j represents LMA i of Layer j.
For example, LMA_5,1 consists of LMA_2,2, LMA_4,2, and part of LMA_5,2. The LMA domain of Layer-1 is connected to three VLMA domains, representing the LMA of Layer-2. LMA_5 is connected with VLMA_2, 4, and 5. The proposed structure is effective to prevent the occurrence of the ping-pong effect if the MN is moved along the boundary of two adjacent LMA domains or the location updates signal traffic through the cell using a virtual layer dispersion.
Operating Procedure. Each MN monitors the broadcast message of the MAG. If the current LMA domain is different from the previously registered LMA domain, MN starts the location update to inform the system of the new LMA domain. When incoming session requests from the MN arrive, the system starts responding to register it. The proposed scheme can be implemented by a unique ID assigned to each LMA domain of Layer-1 and -2, covering the service area by homologous LMA domains. Although the original LMA domain partially Performance Analysis of Inter-Domain Handoff Scheme Based on Virtual Layer overlaps with the virtual layer domain of VLMA, each cell is managed by the other two, but the MN is registered in the domain of only one LMA domain. The initial selection is determined depending on the distance to the center of the cell from the cells residing in the two LMA domains. A shorter distance governs the LMA domain selection, whereas it is selected at random when the distance is the same. The MN of cell A in Fig 7 is in both LMA_5,1 and LMA_2,2, but it is registered in LMA_2,2, closer to the center cell. Similarly, the MN is registered in the cell B LMA_5,1. BU is generated when MN is outside the current domain of the LMA. In addition, MN, to prevent the ping-pong effect, is caused to move along the boundary of two adjacent LMA domains and always be registered with the LMA domain different from the previous layer in the extension group. The MN (Layer-1 belongs to the registered LMA_5,1) is in cell B in Fig 7. It is assumed that through cell C (LMA_4,1 and belongs to LMA_4,2), it moves to cell D. Therefore, MN is registered in LMA_4,2, belonging to the Layer-2 non-LMA_4,1. This approach prevents a continuous BU when the MN moves around the boundary cells. BU is required if MN travels through cells C and D each time, but BU is not required if the registered LMA_4,2 belongs to cells C and D. As a result, the overlap scheme reduces traffic signals by the BU. Three LMAs are connected to VLMA: e.g., VLMA_4 in Fig 7 is connected with LMA_4, 5, and 7. The LMA and VLMA handle the traffic of each LMA domain of Layer-1 and -2. BU is not generated when the MN is moving in the three adjacent LMA domains to be processed by the VLMA. Thus, the proposed scheme significantly reduces the traffic going to the LMA in VLMA (performance evaluation results are presented in Chapter 4).
Method for selecting LMA by MAG. Fig 8 shows the PBU. The new flag P is included in the BU message to register a PBU message in the LMA (Fig 8). The P flag is set to 1 for proxy registration and is sent to the MN and set to 0 for registering directly. The variable-length field indicates a length of an integer multiple of 8 octets long, such as the full mobility header length. This field contains zero or more TLV (type, length, and value)-encoding mobility options. Other types of defined options for encoding are described in 6.2 of [13], and the added R and M flags aregiven in [19] and [20], respectively. In this proposed scheme, modifying some of the Handoff Indicator options in the message comprises new extension flags I and V, and the extended flag has the following properties. The I flag indicates the classification of the layer (0 indicates the first layer and means a virtual layer), and the V flag indicates that the MAG signaled a physical connection with VLMA. The MAG is in this case will be considered in the Layer-1 LMA and will be ignored for any option that LMA cannot understand. Network operators may place several LMA at different distances from the MAG within the respective domain. The LMA domain is used to select PMIPv6 in Fig 4, as in the initial network entry process of the MN, so that MAG has the Policy Profile of Performance Analysis of Inter-Domain Handoff Scheme Based on Virtual Layer the MN. MN locates the MAG by the profile information of the MN (MN's ID, provided MAG, LMA network address, before and after the move circumstances of the MN), the process proceeds to the search process to select the optimal LMA between the two layers of the proposed method. After the search process of MAG sends a PBU message to the LMA to finish the binding, it uses the new expansion flag in the PBU message, described above. Set the Proxy Care of Address (pCoA) of the layer corresponding to the LMA to receive the information required for basic PMIPv6 operation. That is, the search process selects for MAG an appropriate LMA in the profile of the MN. The received information consists of the preference values of LMA, a valid lifetime field, the distance field, IP address fields, and some flags: the I flag, which distinguishes from the virtual layer and the hierarchy, and the V flag that determines the VLMA and physical connections. MAG will send a return value passed because the search process, again with LMA and preference values corresponding to the MAG position information of the PBU message in PMIPv6, is registered with the PBU message. The search procedure is described in detail as follows. Depending on the position of the MAG where the MN approaches the boundary, the value of preference is also reduced by one and transmitted to the MN through an RA message.
In the proposed scheme, when MAG is located on the border, the value of preference is always maintained at 1 when the MN is connected to the network; the MAG is aware that the MN has arrived at the boundary of the LMA domain. MAG causes MN to check the physical connection (V flag) between LMA1 and VLMA1 and then execute the LMA change. As shown in Fig 9, the value of LMA1 preference is 1, and the value of VLMA1 preference is 3 in the MAG7-belonging MN. Therefore, the value of the I flag is 0 from LMA1 and from VLMA1 is 1, so VLMA1 is selected. After the current link to VLMA1 is changed, the physical connection is established, and then the V flag values that are physically connected to the current LMA domain are checked. If there is a physical connection, perform the LMA change. If two LMA domains are overlapping and MN is in the area, such as an overlapping region of MAG5, MAG6, and MAG7, MN belongs to the MAG and will receive transmission information via the search process using the MN Policy Profile from LMA1 and VLMA1. Preference values are used to hide the location information of MAG of the LMA domain; MAGs are sent to the LMA through the PBU message after Preference is reduced to 1. For example, when the MN is in MAG7, the preference values are 1 through the search process from LMA1 of Layer-1; after VLMA1 of Layer-2 receives the preference value of 3 through the procedure, a PBU updates to LMA1 and VLMA1. When the MN moves from MAG6 to MAG7, handoff occurs between LMAs and packets are received from the CN via LMA1 and MAG7 (passage 1). MAG7 is located on the border MAG in the overlap region from the MN changes to VLMA1 from LMA1. The data packets pass through MAG7 and VLMA1 (passage 2) and are transmitted to the MN. MAG7 is located at the domain inside, so MAG7 does not incur handoff between LMAs. Fig 10 shows an operational flowchart of the LMA according to the movement of the MN by the proposed scheme. Some of the LMAs receive navigation information when the subnet of the MAG is changed. It selects the LMA and inserts navigation information to the Handoff Indicator option. After transmitting the PBU and after receiving a PBA, sequentially, it receives data from the CN and LMA via the tunnel.
Alternatively, to change the subnet of the LMA instead of the subnet of MAG owing to the movement of the MN, MAG sends a PBU to the insert to change the navigation information, and the LMA receives the data through the tunnel after receiving a PBA. Additionally, when the MAG serving the MN does not change the subnet of the LMA, it checks the preference value. If the value is 1, it changes the LMA, and the selected LMA domain has a value greater than 1. Messages flow to improve handoff performance by changing the LMA (Fig 11), and the MN moves to MAG7 in MAG6 based on the network connection mode of Fig 9. MAG6 and MAG7 will receive LMA1 and VLMA1 from the search. When the MN is in MAG7, the value of the LMA1 preference is 1, and the value of the VLMA1 preference is 3. When the MN of LMA1 is changing the MAG, the MAG keeps the MN using the LMA navigation information to select the new LMA.
The MAG registers the preference values, and corresponding values are transmitted in the search process after a PBU message to the location information of the MAG with the PBU message changes to the LMA selected. Additionally, because the MN, when the MN receives the RA, has already changed from LMA1 to VLMA1, MN completes the handoff, and MAG sends a PBU message only to VLMA1. When the MN is in MAG6 or MAG7 and LMA1 and VLMA1 to both, the MN performs a search to select the current serving MAG, and LMA receives the respective information. Fig 12 shows the change in LMA according to the movement of the MN. The first MN is located in A and binds with LMA_5.1. When the MN moves to B, it is changed to the time LMA_4.2. When the MN moves to D via C at position B and is in LMA_4.2, LMA to the BU is not required. If MN arrives in E, there is a need to change LMA and change the LMA in VLMA. MN is required to update the location while moving to G. Table 1 describes the location update executed as the MN moves to O from A. Thus, the proposed scheme performed LMA changes 9 times, and BU must perform the changes from    • L HoTI : Home test initialization (HoTI) message size, 64.
• L Pr RtAdv : The proxy router advertisement message size, 80.
A cost analysis model was developed for evaluating the performance of the proposed IP mobility management protocol. Signal cost C ðÁÞ BU is the mobility signal overhead accumulated to support the mobility service of the MN. That is, C ðÁÞ BU is calculated as the product of the hop size of the distance and mobility signaling messages [22,23]. C ðÁÞ PD is the cumulative cost of packet delivery traffic overhead caused by the transmission of a packet in the routing path. That is, C ðÁÞ PD is calculated as the product of the data packet size and the hop distance. C ðÁÞ PT is similar to the C ðÁÞ PD packet tunneling cost but is used mainly to examine the tunneling overhead. C ðÁÞ PT is Performance Analysis of Inter-Domain Handoff Scheme Based on Virtual Layer calculated as the product of the IPv6 tunneling distance and hop size. Finally, the total cost of C ðÁÞ T is defined as the sum of C ðÁÞ BU and C ðÁÞ BU and C ðÁÞ PD [24]. HMIPv6. One of the MNs in HMIPv6 is managed precisely by the MAP. Because MN is used to set up a local CoA in the new access network of a given MAP domain, MN is updated only if there is new location information for MAP. This is because the MAP functions as a local HA for the MN, so it registers the movement of the MN to the HA and the CN for a given transmission MAP domain. Movement of the MN in the HMIPv6 access network is managed by the MAP, which is limited from the inside domain handover. Thus, signal charges for HMIPv6 C ðHMIPv6Þ BU are equal to Eq (1).
where α and β are weighting factors for a wired link and a wireless link, respectively. They are used to emphasize the link stability. Packet delivery cost for C ðHMIPv6Þ PD in HMIPv6: the data packets are sent from the CN to the MN, whereas the MN arrives smoothly, staying in the MAP domain. That is, data packets for the MN are always sent on a route directly by bypassing the HA. However, in HMIPv6, MAP is tunneled to the HA and the CN for the transmission of data packets for the MN. That is, when the data packet is sent from the CN to the MN that arrives in the MAP, MAP compresses the data packets sent to the MN. Therefore, C ðHMIPv6Þ PD is the same as Eq (2).
where λ S is the average session arrival rate at the MN's wireless interface, E(S) is the average session length in packets, P ðHMIPv6Þ D is the path directly in HMIPv6 and is the same as in Eq (3).
where $ is the IPv6 tunneling overhead. The packet tunneling cost for HMIPv6 C ðHMIPv6Þ PT is equal to Eq (4).
where PT ðHMIPv6Þ D is the path directly in HMIPv6 as the tunneling overhead and is given by Eq (5).
The total cost for HMIPv6 C ðHMIPv6Þ T is equal to Eq (6).
PMIPv6. As with HMIPv6, PMIPv6 precisely manages the movement of the MN. However, unlike HMIPv6, which allows the connection point of the entity to be changed, the general MN PMIPv6 domain provides mobility services, such as LMA and MAG. Some mobility signaling messages sent from the MN do not exist in PMIPv6. Considering this, the signal is equal to the cost of C ðPMIPv6Þ BU for the PMIPv6 Formula (7).
The cost of the signal is reduced compared with the formula for C ðHMIPv6Þ BU shown in Eq (1). This is when the MAG detects the movement of the MN in the access network, on behalf of the MN, and sends a PBU message. However, as shown in [9], a dual mobility signal is generated. MN sends a registration cancellation PBU message to the LMA, announcing the release of the MN in the access network managed by the previous MAG (pMAG) as the connection point is changed. Of course, the new MAG (nMAG), by sending a PBU message, detects the movement of the MN to register the MN to the LMA. The packet transmission cost in PMIPv6 is shown in Eq (8).
In the formula above, the P ðPMIPv6Þ D route cost directly from PMIPv6 is the same as in Formula (9).
The packet tunneling cost C ðPMIPv6Þ PT for PMIPv6 is shown in Eq (10).
where PT ðPMIPv6Þ D is the path directly in the PMIPv6 tunnel overhead, as in Formula (11).
The total cost for the PMIPv6 C ðPMIPv6Þ T is equal to Eq (12).
Proposed Scheme. Our proposed method is to minimize the occurrence of the MN handoff when moving by adding a virtual layer on PMIPv6. That is, in the case of the PMIPv6 techniques, when the handoff occurs when the MAG serves the MN to connect through the VLMA Preference according to the value of the MAG sends a PBU to the LMA change procedure changes the previous LMA, the LMA receives an ACK from the handoff receiving a PBU to VLMA already known, without the need to complete and is transmitted to the PBA. Thus, the signal cost C ðPMIPv6Þ BU is equal to Formula (13).
The signal cost from the above equation is reduced, compared with C ðPMIPv6Þ BU as shown in Eq (7). This is because sending a PBU message affects only nMAG. A dual-mobility signal is not generated as in PMIPv6. There is no need to transmit a registration cancellation PBU message to the LMA for the MN because it does not change the connection point of the separation process procedure of the MN in the access network managed by the pMAG. NMAG also registers the MN, sending a PBU message by detecting the movement of the MN to the LMA. As with PMIPv6, the data packets sent from the CN to the MN are transferred smoothly to the MN. MAG tunnels to the LMA after receiving the first data packet. The ends of the bidirectional tunnel established between LMA and MAG are called the LMA address, as a secondary proxy address, and the MAG address, respectively, and C ðPMIPv6Þ D is the same as in Eq (14).
Performance Analysis of Inter-Domain Handoff Scheme Based on Virtual Layer where P ðPMIPv6Þ D is directly in the path cost and is equal to the PMIPv6 proposed Formula (15).
The packet tunneling cost C ðPPMIPv6Þ PT for the proposed PMIPv6 is shown in Eq (16).
In the formula above, PT ðPPMIPv6Þ D is the tunneling path overhead directly equal to that of PMIPv6 proposed in Eq (17).
The total cost of the proposed C ðPPMIPv6Þ T of PMIPv6 is shown in Eq (18).

Results of Numerical Analyses
This section shows the cost analysis of the mobility management protocol. Assuming that the coverage of the MAG circle exceeds the boundary of the MN, which is equal to the ratio μc Formula (19) [22], then In the formula above, ν is the average velocity of the MN, and R refers to the coverage radius of the MAG.
Parameter Setting. We use the default value of the variable as follows: The average value of the number of hops between the CN and HA is h C−H = 4. The average value of the number of hops between the CN and the gate is h C−G = 6. The average number of hops between the HA and the gate is h H−G = 4. The average value of the number of hops between the gate and the AR is h G−A = 4. The average number of hops between the AR and MN is h A−M = 1. the average session length in packets is E(S) = 10. Inter-LMA handoff probability is α = 1. Intra-LMA handoff probability is β = 1.5. the ratio of data packets going through HA is ω = [0.1, 0.9]. the IPv6 tunneling overhead is $ ¼ 40bytes½6; 10.
Signal Cost. Figs 14 and 15 show the signal cost of the mobility management protocols. R is fixed to 500m, and ν is varied from 0 to 30m/s. This protocol provides local mobility services, such as HMIPv6, and PMIPv6 in Fig 15 shows the result of good performance swings. When supporting mobility services, it incurs less mobility signal cost. As ν increases, the signal cost also increases. However, when HMIPv6, PMIPv6, and the proposed scheme are compared, the proposed scheme incurs much less signal cost. Mobility services for the MN are managed locally by the MAP in HMIPv6. While the MN changes the connection point in a given HMIPv6 domain, the only exchange of messages is between the MN and the LBU and LBAck MAP.
In addition to the MN in the PMIPv6 mobility services and PBAck, only a PBU message is exchanged between the MAG and the LMA. The proposed scheme shows better performance than PMIPv6. Next, ν is fixed at 20m/s, and R is in the range of 400-800m. As shown in Fig 14,  HMIPv6, PMIPv6, and the proposed method produce better results than other mobility management protocols. With the MN and MN of FMIPv6 within MIPv6, a BU message is sent to the HA, and the CN must be updated each time the connection point is changed to the new location information. However, HMIPv6, PMIPv6, and the MN of the proposed technique are managed locally, so mobility signals are minimized. Furthermore, if the proposed method and PBAck PBU message exchange improved more than the number of PMIPv6 and showed slightly better performance than HMIPv6. Additionally, for FMIPv6 in Figs 14 and 15, it can be seen that it is the highest consumption protocol. This phenomenon is due to the additional mobility signal being generated during the handover and the buffering mechanism for the rapid handling.  Fig 17. In Fig 17, ω and E (S) are fixed at 0.2 and 10 and, compared with λs, show the variation in packet transmission cost. As λs increases, the cost of any mobility management protocol packet transfer is also increased, exponentially. However, in MIPv6, the analysis shows better performance than the others because the packets are sent to the transmission path routed almost directly from CN. Next, λs and E(S) are fixed at 1 and 10, respectively, and ω is set from 0.1 to 1. In Fig 17,  HMIPv6, PMIPv6, and the proposed method do not affect anything in ω, whereas MIPv6 and FMIPv6 have a tremendous impact on ω. ω in MIPv6 and FMIPv6 for packet transmission costs increases dramatically. This is because the quantity of data packets going through the indirect path also increases. Additionally, the packets will be tunneled overhead for FMIPv6 consumption more than the others.
Packet tunneling costs. Figs 18 and 19 show the costs of packet tunneling. In Fig 19, ω and E(S) are fixed at 0.2 and 10, respectively, compared with λs showing changes in packet Performance Analysis of Inter-Domain Handoff Scheme Based on Virtual Layer tunneling costs. The result is similar to that of the packet transfer cost. Thus, even if applying a local mobility management structure for managing the movement of the MN in the PMIPv6 and the proposed method in the HMIPv6 domain, there is an increase in packet tunneling overhead. For example, data packets from the MN in HMIPv6 must go through to the MN in the MAP. RO in MIPv6 is impossible in FMIPv6; that is, when ω = 1, HMIPv6, PMIPv6, and the proposed method showed good performance. Total costs. In this section, we analyze the total cost for each mobility management protocol. S φ is the mobility ratio, calculated by λs/μc(SMR), similar to the Call-To-Mobility ratio commonly used in performance evaluation studies of a wireless communication network.  Performance Analysis of Inter-Domain Handoff Scheme Based on Virtual Layer the fixed session. This phenomenon becomes greater as S φ is increased. HMIPv6, PMIPv6, and the proposed method reduce the cost of mobility signals in a high mobility rate environment. However, additional tunneling overhead is generated for the data packet delivery service for the MN. Next, ω is fixed at 1, and we again analyze the change in the total cost in Fig 21. HMIPv6 with PMIPv6 and the proposed technique can offer much better performance than other mobility management protocols in this analysis. As shown in Fig 21,  HMIPv6, PMIPv6, and the proposed method have high mobility rates and one low-session work environment; we can see that they provide better performance than the other mobility management protocols. Additionally, with the method proposed in this paper, it can be seen that the higher the mobility ratio with the proposed method, the better the performance. However, if the RO is possible, MIPv6 and FMIPv6 show better performance in packet delivery owing to a significantly reduced cost.

Conclusions
In this paper, we analyzed and compared existing IP mobility management protocols, including the virtual layer, based on PMIPv6 in terms of signal costs, packet transfer costs, packet tunneling costs, and total costs. In local mobility management, HMIPv6, PMIPv6, and the proposed scheme are regional approaches that manage the movement of the MN in a given mobility domain to reduce the number of mobility signaling messages for MN. That is, the movement of the MN is passed through the HA and CN. Thus, the signal costs will be significantly reduced in PMIPv6, the proposed scheme and HMIPv6 (Figs 14 and 15). RO should also be used to reduce the overhead of the data packet transmission. MIPv6, Predictive FMIPv6, and RO-enabled mobility management protocols, such as Reactive FMIPv6, showed better performance than HMIPv6, PMIPv6, and the proposed scheme. HMIPv6, PMIPv6 and the proposed scheme do not use an RO mechanism, and they use a tunneling technique for precisely maintaining the MN. However, additional tunneling overhead occurs at this time. The results can be seen in Figs 18 and 19. The performance of the proposed scheme can identify more clearly the improved performance of the other mobility scheme in this paper (Figs 20 and 21). Recently, mobile networks are increasing rapidly owing to performance improvements and rapid spread of mobile devices; quality improvement is required, including continuous service. Thus, this paper focused on mobility based on PMIPv6, one of the mobility management protocols. As shown in the performance analysis, according to the proposed scheme and a comparison, the proposed method provides better quality of service, minimizing the cost to the network, when handoff occurs during execution owing to the user's movement, compared with other mobility management protocols. HMIPv6 and PMIPv6 both showed good performance when the performance was evaluated in different environments, and the ranking was graded according to a given condition. However, the proposed method always showed the best performance and the lowest total cost. The analysis performed in this study was used to identify the properties and performance evaluation elements of each mobility management protocol in addition to helping make decisions about consumer network design.
Supporting Information S1 File. The Output Data of Performance Evaluation. (PDF)