Review Article

Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey

Figure 3

Handover procedure in layer 3.