location management proposals: survey and evaluation

133
Location Management Proposals: Survey and Evaluation by Atif Aluim Siddiqi, B.Se. Eng. University of Enginhg & Technology, Lahore, Pakistan A thesis subrnittecî to the Facuity of Graduate Studies and Research in the partial Milment of the requirement for degree of MSc. in Ioformatioa and Systems Science Department of Systems and Computer Engineering Carleton University 1 125 Colonel By Drive Ottawa, Ontario, K 1 S SB6 Canada. Apni 1,1999 (B Copyright 1999, Atif Aham Sibiiqi

Upload: others

Post on 03-Feb-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Location Management Proposals:

Survey and Evaluation

by

Atif Aluim Siddiqi, B.Se. Eng.

University of E n g i n h g & Technology, Lahore, Pakistan

A thesis subrnittecî to

the Facuity of Graduate Studies and Research

in the partial Milment of

the requirement for degree of

MSc. in Ioformatioa and Systems Science

Department of Systems and Computer Engineering

Carleton University

1 125 Colonel By Drive

Ottawa, Ontario, K 1 S SB6

Canada.

Apni 1,1999

(B Copyright 1999, Atif Aham Sibiiqi

National Library Biûliitheque nationale du Canada

Acquisitions and Acquisitions et Bibliographii Services services bibliographiques 395 welligton Street 395. rue Wdlingtm OttawaûN K I A W OüawaON K1AûN4 Canada CaMda

The author has granted a non- exclusive Licence dowing the National Library of Canada to reproduce, loan, distribute or seU copies of this thesis in microfom, paper or electronic formats.

The author retains ownership of the copyright in this thesis. Neither the thesis nor substantial extracts fkom it may be printed or otherwise reproduced without the author's permission.

L'auteur a accordé une licence non exclusive permettant à la Bibliothèque nationale du Canada de reproduire, prêter, distribuer ou vendre des copies de cette thèse sous la forme de microfiche/fih, de reproduction sur papier ou sur format électronique .

L'auteur conserve la propriété du droit d'auteur qui protège cette thèse. Ni la thèse ni des extraits substantiels de celle-ci ne doivent être imprimés ou autrement reproduits sans son autorisation.

Abstract

The challenge of supporthg rapidly gmwing numbers of mobile users, wMe coilstrained

by limiteci radio spectruni is being fâced by cellular network operators worldwide. The

standard technique for cellular networks is to decreax radio ce11 size, thereby rnaintaining

a supportable subscriber density. However, smaller size d t in i n d signalhg for

location management procedures, which reduces the bandwidth available for user traffic.

S e v d location management schemes have b e n proposed to improve the performance

of such networks, but a fair assessrnent and comparison of their performance is diacuit

without a realistic mobility d e i , since the performance of location management

schemes depends considerably on subscriber mobility patterns. Some of the methods used

in the Literahue are reviewed and comented upon. The strategies are then classified in

several categories on the basis of theïr hctioIliility. Finally, some proposais are selected

that concentrate on the location updating and paging overhead.

To analyze the performance of the selected ptoposals, two mobility models were used in

this thesis. The fïrst was a realistic, measurement-based, place and tirnedependent

individual mobility model to simulate the mobility behavior of actual people. The second

was a random mobility mode1 based on simplifieci assumption, such as a unifonn

distribution of the direction of travel for each mobile subscriber, as being used in a

number of proposed schemes.

From the results it is clear that the mobility model bas a signifiant impact and the results

described in various schemes using a random mobility mode1 may not reflect the relative

performance when deploying schemes in actuai systems.

iii

Acknowledgements

1 would Iüre to express my sincere îhanùs to my thesis supervisor, Dr. Thomas Kum, for

his invaluable guidance and helpnil suggestions during the course of this thesis. This

thesis would not have been possible but for his enthusiasm for research and his

rmarkable reviewing speed-

1 would like to thank all the d e n t s of tht Bmadband Network Lab for puthg up the

nice working atmosphere and the staff of the Department of Systems and Cornputer

Engineering for theis help in the development of this thesis.

1 would iike to thak my ~ t s and brothers for their prayers and support,

encouragement and guidance throughout my acadernic pursuits.

Last, but wt the least, I would WEe to thank my wife who provided me with a continuous

source of inspiration and for her patience and strong support without which the research

would not have been possible.

Table of Contents

ACCEPTANCE SEEET ............................................................... II

.................................. ~STRACT.....o.....oœœ.m.œ..m..............m.om........m œœ..œ.UI

ACKNOWLEDGEMENTS ...~............................................................. IV

TABLE OF CONTENTS ......................................................................... V

LIST OF TABLES ......wmœ..~..œœ..œ.œmU.m.wœU...œ.e...o.œHom,~..œ..~.oo..... .. VU LIST OF FIGURES ....................................................................... \1II

LIST OF ACRONYMS .................................................................................. X

3.1 -1 : 1 Variations in Implementing Location Areas ............... ... ........ 29

v

INTRODUCTION ........ .....-..œœ..H.H1.. wœœœœ ......... .. ................ 1

............................................. Generai Concepts in Location Management 1

.................................................................................... Problem Definition 4

................................................................................................. Motivation 5

............................................................ Basic Proposal and Thesis Outline 7

LOCATION MANAGEMENT PROCEDURES ......... .œœœ.mH.œ .m.....m...... 9

GSM L d o n Management Fundamentals .............................................. 9

The Architecture of GSM Netwock ........................................................ 9 Location Management Proceduces in GSM ................... ,.., ........... 13

IS-4 1 L d o n Management Fundarnentals ..... ..... .. .. .......................... 23

...................................................................... C~nclusions .................. ..... 24

PREVIOUS WORK ON LOCATION MANAGEMENT

PROPOSALS WITZ5 CLASSIFICATION au--- ..w.oo*.œœ a-œmeœo.*.œ. 26

Classification of Location Management Strategies ................................. 27

Location Updating and Paging Reposais ......................................... ... 27

3.1.1.2 LocationUpdatingwithAltcrnativeTriggas ................................... 3 8

3.1 2 Interrogation-Basai Proposais ........................................................... 4 0

3 . 2 1 Disbn'butedDatabaseArchitecnue ..................................................... 42

3.1.2.2 Hybrid Database Architecture ........................................................... 46

CHAPTER 4

CHAPTER 5

CHAPTER 6

Proposais Evduation ......................... ...................... . 54

Conclusions ............................................................................................. 72

MOBILITY MODELS AND EXPERIMENTAL SETUP ................ 77

Realistic Mobiiity Mode1 ........................................................................ 79

Random Mobility Mode1 .,... ......... .......,. ....................................... 80

Simulation Procedure .............................................................................. 81

Goals and Constraints of the Algorithms ............................................. 82

Siunmaiey ................................................................................................. 89

PERFORMANCE ANALYSIS ~ . ~ œ ~ . o O O ~ O O ~ ~ O O . m ~ ~ œ O H . H O ......................... 91

Description of Data and Procedures ....................,................ ...-.......... 92

Cornparison of Location Management-Related Signaling ...................... 93

OveraU Average Performance .............................................................. 93

Total Location Management Cost ..................................................... 102

CONCLUSIONS AND FUTURE WORK .. ..O.-.HI.H..H..OO~.OH.."* ..... 1 15

Conclusions .....................................................~..................................... 115 Future Work .................................. ..., .................................................. 116

List of Tables Table 5.1 : 99.h Confidence Intervai Estimation of Location Updates under the

Reaüstic Mobiiity Model ....................................................... ..................... . 95

Table 5.2: 99.h Confidence Intewai Estimation ofLocation Updates under the

Random Mo bility Model . ......... - . .. -. . .. .. . -. .. .... . .. .. .. . . .... . . . . - -. .. . . .. . . -. ..-...... . .. . . . . 9 7

Table 5.3 : 95% Confidence Interval Estimation of Number of Cells Paged for 6

Incomhg Caiis under the Realistic Mobility Model ...... .... ,. .... .. . .. ...... .. .. . . .. . . . 1 0 1

Table 5.4: 99% Confidence Intervai Estimation of Nimber of Ce& Paged for 12

Incomïng Catls under the ReaJistic Mobility Model ..,-.--.,......-.......tY....tY...tYtY.... 1 O I

Table 5.5: 99% Confidence Interval Estimation of Number of Cells Paged for 6

Incoming Calls under the Random Mobility Model ..,....................... ... .. . . . . .. . 1 02

Table 5.6: 99% Confidence Interval Estimation of Number of Cds Paged for 12

Incoming Calls under the Random Mobility Model .........-.............. ....... 102

Table 5.7: 99% Confidence Interval Estimation of Total Location Management Cost

for c = 5 and 6 1ncomi.g Calls under the Realistic Mobiüty Model ............. 107

Table 5.8: 99% Codidence interval Estimation of Total Location Management Cost

for c = 5 and 12 Incoming Calls under the Realistic Mobility Model ........... 1 O7

Table 5.9: 99% Confidence Interval Estimation of Totd Location Management Cost

for c = 10 and 6 Incorning Cails under the Realistic Mobility Model ........... 1 O8

Table 5.10: 99% Confidence Interval Estimation of Total Location Management Cost

for c = 10 and 12 Incoming Cails under the Realistic Mobility Model ...... 108

Table 5.1 1 : 99% Confidence laterval Estimation of Total Location Management Cost

for c = 5 and 6 Incoming Calls under the Raadom Mobiiity Model ............ 113

Table 5.12: 9% Confidence latemal Estimation of Total Location Management Cost

for c = 5 and 12 Incoming Calls under the Random Mobility Model .......... 1 13

Table 5.13: 99?4 Confidence intemal Estimation of Total Location Management Cost

for c = 10 and 6 Incoming Calls under the Random Mobiiity Made1 .......... 1 14

Table 5.14: 99% Confidence Inte~al Estimation of Total Location Management Cost

for c = 1 O and 12 Incoming Cails under the Random Mobility Model . ....... 1 14

vii

List of Figures

Figure 2.1. Architecture of a GSM NctworSc ................................................................... 10

............................................. Figure 2.2. Message Exchange for GSM Location Updates 15

Figure 2.3 : Message Exchange for GSM Intemgation and Paging ................................. 21

Figure 3.1 : ClassXcation of Location Management Roposals ........................................ 28

Figure 4.1: Total Location Management Cost under the Realistic Mobility Model for

Z = 3747Sy6t7 ... ............................o~....~~.....r....o.....................~............... ... 84

Figure 4.2: Total Location Management Cost under the Randorn Mobility Model for

2 = 1,2,3.4.5.6, 7 ............................................................................................. 86

Figure 4.3: Total Location Management Cost under the Realistic Mobility Model for

T = 1,2,3,4,5,6, 7 ............................................................................................. 88

Figure 4.4: Total Location Management Cost under the Random Mobiiity Model for

T = 1,2,3,4.5,6, 7 ............................................................................................. 89

Figure 5.1 : Global Average Number of Location Updates versus Elapsed Time under

the Realistic Mobiity Mode1 ................... ... ...........O........................... 9 4

Figure 5.2: Global Average Number of Location Updates vemis Elapsed Time under

the Random Mobility Mode1 ................................................................... 9 6

Figure 5.3: Global Average Number of Cells Paged for 6 Inwming Calls versus

Elapsed Time under the Realistic Mobility Mode1 ....................................... 98

Figure 5-4: Global Average Number of Ceiis Paged for 12 hcoming Calls versus

Elapsed Time under the Realistic Mobility Mode1 ........................................ 98

Figure 5.5: Global Average Number of Ce& Pa@ for 6 Incoming Calk versus

Elapsed T i e mder the Ibndom Mobility Mode1 ..................................... 9 9

Figure 5.6: Global Average Number of CeUs Pageà for 12 Incominp Calls versus

Elapsed T i e under tbe Random Mobility Mode1 .............. .... .............. 100

Figure 5.7: Global Total Location Management Cost (c = 5) for 6 Incoming Calls

versus Ehpsed T h e Mder the M o b i i Mode1 ........................... 104 Figure 5.8: Global Total Location Management Cost (c = 5) for 12 Incominp Calls

vctsus Elapsed Thne imda the Redistic M o b ' ï Mode1 ................... ..... 105

viü

Figure 5.9: Global Total Location Management Cost (c=lO) for 6 Iacoming Calls

versus Elapsed T'me under the Realistic Mobility Mode1 ........................... 106

Figure 5.10: Globd Total Locaiion Management Cost (c = 10) for 12 Incominp Calls

versus Elapsed Time under the R-c Mobility Mode1 ......................... 1 06

Figure 5.1 1 : Global Total Location Management Cost (c = 5) for 6 Incoming Calls

versus Elapsed Time under the Random Mobility Mode1 ........... ...- .... 109

Figure 5.12: Global Total Location Management Cost (c = 5) for 12 Incoming Calls

versus Elapsed Time under the Randorn Mobility Mode1 .......................... 1 10

Figure 5.13: Global Total Location Management Cost (c = 10) for 6 Incoming Calls

versus Elapsed T h e under the Radom Mobiiity Mode1 .......................... 1 1 I

Figure 5.14: Global Total Location Management Cost (c = 10) for 12 Incoming Caiis

versus Elapsed Tiie undtr the Radom Mobilïty Mode1 .............. ,,. ..... 1 12

List of Acronyms

PCS

MT

HLR

VLR

BS

BTS

RAILA

PA

MSC

LU

PSTN

PFSHLR

PFDHLR

OSPFDHLR

GPC

MAP

TLA

LMTs

LCMR

HOPPER

HIPER

DR

STP

RDB

HDB

TGMTS

PHs

PACS

Personal Communication Services

Mobie Terminal

Home Location Register

Visitor Location Register

Base Station

Base Transceiver Station

Registration Area in 1s-41/ Location Area in GSM

Paging Area

Mobile Switcbiag Center

Lacation Update

Public Switching Telephone Network

Pointer Fomarding with Single HLR

Pointer Forwarding with Distributed HLR

One-Step Pointer Forwarding with Distributed HLR

Global Personal Communication

Mobile Application Part

Two-Location Algorithm

Location Management Techniques

Locai Cail to Mobility Ratio

Hierarchical Online Parametric ProfilE Replication

Hierarchical P d l E Repl idon

Directory Registers

Signal Transfer Point

Regional DataBase

Home DataBase

Third Generation Mobile Telec0111113unication Systems

Pasonai Handyphoae System

Personal Access Communication System

Chapter 1

Introduction

1.1 Generd Concegrs in Locaiion Management

In the past few years, &et demand bas gmwn rapidIy for Personai Communication

Services (PCSs) such as digital cellular mobile radio systems, the Peisonal Access

Communication System (PACs), and the Japanese Personal Handyphone System (PHs).

This can be attribua to several factors, including decreasiag prias, impmved radio

coverage, and compact lightweight terminais. These second-generation wireless

communication systems are designad for particuiar applications and envùonments.

Customer demand for these systems has i n d dramatically every year. In Japan, for

example, the subscriber growth rates h m September 1995 to September 19% have nsen

by 129% for digital cellular mobile radio systems (PDC) and 288% for PHS [23]. in

gened, as the numkr of subscribers increases given a fixed radio spectrum allocation,

the size of raâio average cells must deaease, in order to accommodate the higher

subscriber densities. This mates many challenges, especially concenllng location

management. PCS, which are higher-capacity and lower-power cellular networks with

smder cells, face simiiar location management issues.

Compareci to second-generation systems and apart nom the increased traac demands, the

employment of location management and handoff procedures in a microcellular

environment, in conjuncton with the huge number of Location Updates (Lus), wiil

generate a considerable "mobility-related signaling" load. The increase of mobility-

related signaling apart nom the radio liak wiil have a major impact on the number of

database transactions, thus causing the database to be a possible bottleneck at the h e d

network side. Consequently, given the scarcity of radio mornes, methods for s i m g

load reduction are emerging for Thkd Generation Mobile Telecommunication Systems

(TGMTS). it is obvious that optimization techniques and enicient network planning

algorithms are criticai issues conceming overall TGMTS performance.

Location management is concemed with the procedures required to enable the netwodc to

maintain location information for each subscriber, or more specificaily, for each active

mobile terminai with a registered subscnkr, and to efficienuy hande the establishment

of incoming calls.

The location management procedures are required in cellular networks to manage

subscriber mobility. In general, mobiity management can k divideci into three different

aspects: temiinal, service and personal mobility, with the latter king the goal of modern

cellular systems. Temiiaal mobility is a network capability that enables mobile tenmioals

to access telecommunication services fiom any location, while in motion, and the

capabi1ity of the network to Locate and ideni& a mobile terminai as it m e s . In contrast,

personal mobility allows customers to access the network, independent of the location

and type of terminal that a customer happens to use at a given tirne. This is accomplished

by allocathg an identity numba not only to the terminal, but also to the subscriber, and

keephg an association between the subsaiber and the terminal. In practice, this invo1ves

the use of a personaiized smaa card which can be iasated into any compatible tcmiinal,

and which allows calls to be made and received at that partidar terminal, witb proper

billing and c d routing. Service mobility enables customers to access the same type of

network services, regdess of their cunent locations and tenninals in use, as if the

customers were at home or office.

The two hdamental procedures that comprise the basis of location management are

location updaîhg and paging. For the network to route incornhg calls to a mobile user,

each mobile user is requirtd to report its Location to the network at specinc points in tirne.

This reporting is known as Location Update (LU). Tecminal paging is the pmcess of

contacthg a specïfied user at its current address. Paging messages are broadcast in one or

more paging areas, contained within the cumnt location area, and idorm the target user

of the incomiog call. These concepts will be defined in more detail below.

The smaliest unit of location information that cellular networks are concemed about is a

radio cell. A ceii is the geographical area over which the average si@ strength h m the

radio transmitter that defines the cell is over some tbreshold, as compared to neighbo~g

cek and fkquencies. Cens are ideally represented as hexagons, aithough in reality,

interference and paîh losses due to irregular tmain and neigbboring cells, as weii as

power controf algonthms, smear cell boundaries into fuzzy, irregular shapes.

With the conventionai location management strategies, the network coverage m a is

divided into srnalier ce11 clusters caifd Location Areas (LAS) and Paging Areas (PAS).

LA is the granularity at which the nenvork keeps track of the location of the Mobile

Terminal (MT), Le., LA is that group of ceUs in which the MT must be located (provided

that the system is WU-fûnctioning and the M ï is powered-on). PA is the set of celis over

which a paging message is sent to Wonn the subscri'ber of an incornhg cali. Ln most

operational systems, LA and PA are identicai. For this teason, any grouping of cells for

location management purposes is usually caiied a LA.

The relationship between location updates, paging, location areas, and paging areas can

best be illustrateci by the two e-e approaches to location management. The f k t

approach is known as the Always-Updatt, in which each mobile user aansmits an update

message whenever it moves into a new ceil, and the Never-Update, in which the users

never send update messages regarding theù l d o n . Clearly, imder the former sttategy

the overhead due to transmissions of upda!e messages is very high, especidly in networks

with small ceils and a large number of highly mobiie users, but the overhead of finding

users is zero since the curent location of each user is always known. With the latter

stmtegy there is no overhead for updffting but whenever there is a need to fhd a particular

user, a network-wide search is quired, and this overhead is very high.

Personal communication Service provides seamiess and uninterrupted communication to

mobile subscribers. PCS users carrying M T s can communicate with a reaiote texminai

(mobile or static) regardless o f its cumnt location and mobility pattern. However, unlike

static networks, such as the intemet, where muting information is embedded in the

address of each node on the network, the c u m t location of a MT c a ~ o t be obtained

fiom its identification numberber A location management scheme, therefore, is necessary to

effectively keep tracfc of the MT'S a d to locate a d e d MT when a cal1 is initiated.

Consider the problem of routing a cail to a mobile unit M. A muest for a connection ta

M is generated fiom some point P in the nehuork. Since mobile units change locations, a

physical address must be found. The means by which the network obtains infiormation

about unit location is through some combination of paging (issuing polling signais in

likely locations) and registration (the unit identifjing its location). A fair amount of

previous work develops paging and registration procedures that mlliimize some cost

hction ( u d y signahg over the wireless andlor fixed network) for simple mobility

models or specinc systems.

Another body of work addresses the problem of how to optimdly store and update

location information throughout the network. Specificaiiy, network resources at point P

must have some knowledge of how to route a cal1 to unit M. A number of possibilities

exist. For example, should there be a centrai databasey which contains the exact location

of every mobile termioal, should every location have its own copy of the database, or

should locations have partial information? if so, how should it be ordered and updated?

Thus one body of literature opthizes location Somation gathering (paging and

registration); whereas the other assumes terminal locations arp known and optimiZe

dis Semination of Location uifonaation over the network. Both, however, make

assumptions about the trrmioal mobility eitber through the use of simple mobility models

or by more general intuitive notions such as Iocality of movement.

As desdbed in Chapter 2, location management as currendy perfôrmed is suitable for a

relatively small number of subs~ribers~ in a cellular environment that uses relatively large

cells. The definition of location areas, which uui obviously greatiy influence the location

updating and psging trsffic, is performed staticaily, using aggregte statistics and traflic

patterns- While the overail number of subscribers is relatively low, and the location areas

are moderately large, the signaling M c volume remains acceptable-

One of the important issues in cellular ~ t w o k s is the design and analysis of strategies

for tracking the mobile users. In these networks, whenever tiiere is a need to establish

communication with aay particular user, the network has £bt to find out which base

station can communicate with that user- This is due to the fact that the users are mobile

and codd be anywhere within the atea wvered by the network.

In recent years, many sophisticated location management schemes 11-27 have been

proposed to reduce profile lookup and update response t h e s and sigaaling tratnc. These

methods ufilize techniques such as data replication, caching, pointer fowarding and

hierrachicai database schemes. Review of several papers is given in chapter 3. It is

important to note that the actual @ormance of tbese proposais depends strongly upon

user behavior. For example, the merits of caching and data replication schemes are

fûnctions of user mobility and calling patterns. Furthemore, different schemes optimize

their pe&omance to different aspects of user behavior. As a mult, accurate user behavior

models are required when evaluating the performance of location management schemes.

The motivation behind this thesis is the realiPltion that in order to quantitatively and

realistically assess any location management scheme, an accuTate and plausible mobility

model must be used. A mobility model is an adytical or statistical representation of the

daily movements of mobile subscn'bers. In cellular mobile communication networks the

number of users aiiocated to a particular base station is a andom variable due to the

mobile nature of the users. This inherent fkature affects the behavior of the system in

terms of the offered td f ic - So, the iafluence of the mobility and trafnc of users must be

studied,

I.4 Basic Propasal and Thesis Outhe

As users become accustomed to wireless comm~cations, they expect to be reachable

anywhere' anytime, and in any communication medium. This places a burden on the fïxed

network to keep track of the user's locations to provide seamiess communications as

users move fmm o w place to another. A number of location management schemes have

been proposed in order to impmve upon the performance of existuig location

management algorithms, especially in second-and-third-generation cellular systems.

Some are! nlatively easy to Unplement, sow might provide high sigaaling savings on the

radio lhk, and some seem to be interesthg h m a theoreticdconceptual point of view-

The first contribution of this thesis is the detailed survey of some of the recent location

management proposais. The second contribution is the use two mobility models to

compare the performance of dinerent location management algorithms and showing the

impact of the mobility mode1 on the relative performance of these schemes.

Chapter 2 discusses the procedures involved in location management, both in general

terms and as implemented in the GSM cellular network standard and a brief review of IS-

41 standard In chapter 3, previous wodc on location management is reviewed by

arranging different proposah in dinetent categones. The advantages and disadvantages of

various approachcs are d i s c d Furthemore several algorithms wiii be selected

amongst these proposais for fiiahr evafuation wing two mobility m d s : a rraüstic

mobility mode1 and a random mobility model.

The mobility models that fomied the basis of the simulation study are describeci in

Chapter 4. A description of selected aîgorithms and their implementation under both

mobiiity models is also described in this chapter. In Chapter 5, the results h m the

simulation study are presented and analyzed. Conclusions fiom the simuiation and

possible futinc wolk are discussed in Chapter 6.

Chapter 2

Location Management Procedures

2.1 GSM Location Management Fundamenfafs

GSM is the second generation Pan Europcan Digitai cellular standard that has rapidly

gained market share worldwide since its debut in 1991. It has been chosen to provide

PCS in Europe, partly because widespcead roaming is a key requirement in PCS. Unlike

d o g fht-generation systems such as AMPS (Advanced Mobile Phone Services) used

in the United States GSM tranSniits digital signais over the radio interface as well as

internally between different network elements. It provides ISDN compatibility in terms of

user sewïces offered and general protocol structure, altbough not in terms of data rates,

since the allocated radio spectnim is Limite&

The location management concepts and procedures will be expiaincd in greater detail by

lookuig at their impiementation in the GSM digital cellular standard. For many location

management proposais, a scheme similar to the one used in GSM is used as the standard

of cornparison-

2. I . 1 The Architecfure of GSM Ne~work

The fimctional architecture of a GSM network c m be divided into two levels: the

stationary and mobile level. The stationary level comprises of the base station subsystem

and the network switching system while the mobile level consists of mobile terminais, as

r

BSC BSC BSC BSC

BTS BTS BTS BTS BTS BTS BTS BTS

Figure 2. 1: Architecture of u GSM Network

shown in Figure 2.1. Each subsystcm is comprisexi of hctional entities that

commUILicate through various interfaces using specified protocols.

Mobile tevel:

Mobile level consists of Mobile Terminais that communicate with base stations via

wireless links. Mobile tenninals are either vehicle-mounted or hand-held terininais used

by subscribers to send a d receive information- The GSM mobile terminai consists of two

entities: the mobiie equipment itself and a smart card called the Subscriber Identity

Module (SI . ) - The SIM card is an integrai part of the GSM design, which allows the

implementaîion of personai mobility. A subscriber cm plug the SIM card into any GSM

terminai and is able to place and receive d i s , with proper routing and billing.

Base Sfotron Subsvsrcm=

The Base Station Subsystem is composed of two parts, the Base Transceiver Station

(BTS) and the Base Station ConWer @SC) and handes almost al1 radio resource

aspects of GSM. The Base Transceiver Station houses the radio transceivers that define a

ceil and it also bandles the radio-Iink pmtocols with the MT. A BTS is assigned a set of

fkequencies in such a way that interference h m other ceiis in the network reusing the

same fiequencies is kept to a minimum, while maintaining enough radio channels in a

celi to handle the required subscriber density. The Base Station Controiier manages the

radio resources for one or more BTS. It handles setup and release of radio c h e l s ,

kquency hopping, and inter BTS handoff.

Mobile Swiîching Cemter:

At the stationary level, the Mobile Switching Center (MSC) is a central office, wbich

provides the d l processing and chawel setup hctiodity. The MSC interconnects

Mobile Tenninals (MTs) with other Mïs through Base Stations (BSs) or interoperates

with other MSCs and public k e d networks. The hctionality of the MSC is provided in

conjunction with the following databases de- in the GSM architecture, which together

with the MSC fom the Netwodc Switching Subsystem:

Home Location Register (HLR)

Visitor Location Register (VLR)

The MSC and the databases communicate using the Mobile Application Part (MAP)

protocol, which uses the SeTvices of Signahg System No. 7 (SS7) that is used as a

transport mechanism for cal1 control and database transactions.

Horne Locatioa Rcgistcr:

The Home Location register @LR) in GSM contains the pemument subscriber

parameters n r h as the type o f services subscribed, the quality of service (QoS)

requirernents, the b i b g idonnation, and the cumnt locations of the MTs. For each

subscriber there is a pointer to a Visitor Location Regista to assist routing incorning

calls. There is logically one HLR per GSM network, although it may be implemented as a

distributed database.

V~srtor Lucorion RegMer:

The Visitor Location register (VLR) is a dynamïc dadxae, whose entries change as

subscriber move within one or more location areas (group of cells). VLR contains

detailed information on Iocaîion anà Service data regardhg those MTs entering its

average area for the muting of iaooming and outgohg calls- The VLR also obtains

subscriber parameters h m the HLR and updates the HLR regardhg the status of

suppkmentary semices, if needd Aithough the VLR can k impIcmented as an

independent entity, al i manufhcturers of switching equipment t&e implement the VLR

together with the MSC. The c o m b i i o n of the VLR and MSC speeds up access times to

information thai the MSC requires drPing cal1 processing.

The Authentication Center (AuC) is a strongiy protected database that handles the

authentication and encryption keys for every single subscriber in the HLR and VLR The

Authentication Center contairis a register cded the Equipment Identity Register (ER)

**ch identifies stolen or huddently alterad phones that transmit identity data that does

not match with information contained in either the HLR or VLR

2.1.2 Locution Management PIocedwes in GSM

For mobility management, GSM takes the intemediete approach between full-system

paging and per-cell location updating, using location areas and paging areas (which are

equivalent in GSM) made up of one or more cells [25]. The actual assigrnent of cells to

location areas is operator-defineci, and ïs wnstrained only by the fmt that a location area

cannot contain cells belonging to more than one MSC.

Location Uphte and Registrafion:

Location updating is the procedure for keeping the network infomed of where the mobile

is roaming. Location updating is always initiateci by the mobile terminal on either

detecting that it is in a new location area by periodically monitoring the location

information broadcast by the network on the broadcast channel, and cornparhg it to the

information previously stored in its memoiy, or by receiving an indication h m the

network it is not known in the VLR upon eyiag to estabiish a mobility management

comection. No lofetion updatcs are nquirrd whüe roemiag within the same location

area.

Location updates and location registrations are very similar, and ciiffer only in additionai

daîa t r a n s f d on the network side for location registrations. If the mobile terminal

registm at a VLR for the £ïrst time, no subscnber information exist there yet, and it must

be requested fomi the HLR For location updates between location areas under the same

VLR, the subscRbcr information already exists.

The steps involved and messages exchanged for location updating are illustrateci in

Figure 2.2, and explained below:

1. The mobile terminal must fÜst be synchronîzed to the base station, to be able to

receive and decode Broadcast Control Channel (BCCH). The BCCH broadcasts

information necessary for MT to be able to properly access the network, including the

identity of the network, location area, and cell, idonnation for handoff and ce11

selection, information describing the cumnt wntrol structure, parameters for properly

transmitting on the random access channel, and other ceU options.

2. The MT transmits a CHANNEL-REQUEST message on the Random Access

Channel (RACH). This message contains only 8 information bits in total, and

includes the teason for the mobile access (3 to 6 bits) and a randorn discrirninator

used to prevcnt duplicate channel assignments. In this case, the reason for access is

location updating.

3. If the= is no collision of the access burst, and the MT is not bamd h m accessing the

1s

LA or ceil, the B a Transceiver Station (BTS) measures the Uansmission delay, and

sen& a CHAANE - REQUIRED message to the Base Station Controllci (BSC).

4. The BSC selects a signaling cbimnel @ossibly hill rate) and sends its description in a

CHANNEL-ACTIVATION to the BTS. If the BTS is able to allocaie thaî channel, it

responds with a positive CHANNEL-ACTIVATION ackiowledgement.

MS BTS BSC MSC VLR HLR VLR(Ptcvious)

Figure 2.2: Message Exchange for GSM Locution U w e s .

if the BTS charme1 activation was successfbî, the BSC wiiI fonmrd an

IMMEDMTE-ASSIGN commmd to the BTS, which forwards it to the MT as an

IMMEDIATE_ASSIGNMENT message, describing the assigned radio chamel, on

the Access Grant Channel (AGCH).

The MT accesses the assigned channel, using the given timing advance and power

control parameters, and traasmts an initial message uidicating its identity ([MSI or

TMSI), the mobile .quipment classmark (indicating its capabilities), and the type of

location update in a LOCATION-UPDATE-REQUEST message. (This layer 3

message is acnially piggybacked on a layer 2 fiame, whose ackmwledgement

establishes the layer 2 conneaion and tes0Ives any access contention issues that may

ex&)

The BTS sends an ESTABLISH INDICATION message to the BSC contirming the

setup of the channei, and carrying the layer 3 location update request idonnation.

The BSC sets up an SCCP (Sigoaling System No.7) connection with the Mobile

services Switching Center (MSC). At this point, the MT can communicate with the

MSC. Communication between the MSC and the MT is forwarded transparently by

the base station subsystem. The BSC forwards a COMPLETE-LAER 3-INFO

message to the MSC, which wntains the location update request information fom the

MT.

The MSC uses the Mobile Application Protoc01 (MM) to commuicate with the

appropriate location registers to complete the location update. The MSC sentis a

WMAPUPDATETELOCATIONNAREA message (service request, technically) to its

VLR, &ch includes the information received h m the MT, such as the IMSI or

TMSI, the location update type, and the new Lacation Area Identifier (LAI).

10. At this point, a few optional procedures may be invoked These include authentication

of the mobile, activation of the ciphering mode, and verifidon of the International

Mobile Equipment Identity -1) status to ensure that the h4T itseif is not Iisted as

being stolen or incompatible. These procedures will not be described here, but their

presence, and additional signahg Ioad, shoald be noted.

1 1. I f the MT is allowed to register with the VLR, the subscriber's HLR is notified of the

change in VLR area through the MAP-UPDATE-LûCATiON service request. Some

variations are possible hem, such as if the MT included its TMSI in the location

update request the previous VLR would be queried to obtain the subscriber's IMSI

(since TMSI is only valid in wnjunction with a LAI). In that case, subsequent

procedures, as describeci here, would be slightly modifie& since a TMSI realiocation

may be invoked The e c e identification to the HLR includes the IMSI and VLR

address.

12. Upon receiving the MAPJJPDATE_LOCATION service identification, the HLR

sen& a MAP-CANCEL-LOCATION request to the subscriber's previouus VLR This

deletes any subscriber information h m the previous VLR, which then sen& a

MAP_CANCELLOCAnON acknowledgement to the HLR-

13. The HLR then sen& a MAPMAPINSERTTSUBSCRIBERUBDATA request to the new

VLR Clearly, if the subscriber registers for the first t h e in the new VLR, no prior

subscription information wiil exist. This request sen& information such as the

subscriber's MSISDN, the type of Nbscni Services, details on subscnbed

supplementary d c e s (such as caii foMlardiag address), and any restrictions on the

subSCTiber (such as toaming, or operator detedeci barring). This information is

necessary for service provision by the new VLR and MSC. Upon receipt of this

information, the requcst will be acbiowledgernent by the VLR

14. Once the subscription information is slightly aeknowledgement by the new VLR the

HLR will have completed the l d o n updatiag, and wül acknowiedge the

MAPMAPUPDATETELOCATiON request previously sent by the new VLR, which in him

will acknowledge the previous MAPMAPUPDATETELOCATIONNAREA request that the

VLR tiad received h m the MSC.

15. Upon completion of the network side location updatiog functions, indicated by the

MAP-UPDATE-LOCAnON-AREA aclnowledgement, the MSC will send a

LOCA~ON-WPDATE-REQUEST message to the MT. This message is

transparently forwarded by the BSC and BTS, using the Direct Transfer Application

Part (DTAP) over the existiiig dedicated signaling connection to the MT.

16. The location update is now complete. Unless the MT had previous1y indicated that it

wants to maintain the existing signalhg 1- or the network quires it for any

additional signaLing, the link is released when the MT receives a

CHANNEL - RELEASE request b m the network (or the MT timer for receiving this

message expires).

Interr01~uftion and Paging:

By definition, a mobile subscriber is not k t l y assoCiated with a fixeci telephone link.

When an incoming cal1 h m the fixed network @SN) is direct& at the mobile network,

the currently senring MSC for the target subsCnber must be fomd, and a wnnection must

be established to tbat switch for the duration of the call. This is the generai call routing

procedure, and interrogation is the mobile network fùnction that determine what MSC the

incoming caii shouid be routed u>.

As described previously, the mobiie network maintains the currmt location of the

subscriber in the HLR. Typidy, because of legal, administrative, or technical reasons,

only certain mvitches are designated as Gateway MSCs (GMSCs) which are able to

directly query the HLR to obtain information for mobile terminating calls. GMSCs,

usually in the destination subscriber's home mobile network, receive incoming calls nom

the PSTN, query the appropriate HLR for the intended subscriber's current location, and

forward the dl to the proper destination MSC. Aithough not technically impossible,

PSTN switches are generally not able to ditectly query GSM network databases, such as

the HLR

As for the description of location updates, the mobile terminaihg cal1 setup procedm

described below and shown in Figure 2-3, is for the most case and assumes a successfid

outcorne-

1. The onginaihg PSTN switch wilI be able to derive address of the GMSC h m the

dialed digits (the intendecl mobile subscriber7s MSISDN), and will send an ISUP

Initial Address Message 0 to the GMSC indicatirig an inwming call.

2. The GMSC is able to derive the desthmion subscriber's HLR h m the first few digits

of the MSISDN. The GMSC will scad a MAIMAPSENDEM)ROUTMGOINF0RMATiON

reqwst, with the destination MSISDN, to the HLR The GMSC uitimately requires a

roamhg number WSRN) which it can use to route the cail to the destination MSC.

3. The HLR maps the MSISDN to the IMSI, and look up the cumnt location of the

destination subdber-. This a d w s is n o d y in the fonn of the address of the

subscriber's ~ t r n t The HLR sen& a MAP PROVIDE ROAMING-NüMI3E.R

request to the cumnt KR, giving the IMSI of the subsaiber and the cumnt MSC

(which is generally ignored, since there is in practice a one-to-one relationship

between VLR and MSC).

4. The VLR aüocates a roaming number (MSRN) fiom its assigned pool, and rnaps the

IMSI to the MSRN. A q n s e with the allocated roaming number, to

MM-PROVIDE-ROAMING NLTMBER requea is sent to the HLR

5. The HLR forwards the MSRN to the GMSC in response to the

MAP-SEND-ROUTiNG INFORMATION request. The GMSC is the able to

continue with the cal1 routing, and se& an IAM to the destination MSC, with the

new MSRN.

6. Upon receipt of the IAM, the MSC sen& a MAPMAPSENDENDINFOOFOROINCOMING

CALL request to the VLR *ch indicates the MSRN and any otha information that

may have been hchded in the original IAM message, such as bearer service type. A

~esponse to this rcquest is not fortvadeci to the MSC util the subrriber has

successfuily responded to the paging.

Receipt of the MAP-SEND-MOFOR-mC0MINGCALL request triggers the

VLR to issue a MAP-PAGE request back to the MSC. This request to page the

mobile station includes the IMSI of the destination subscriber and the LAI that is

stored in the VLR

The MSC sen& a PAGING message to the appropriate BSCs, which includes the

IMSI, TMSI (if one has been allocated), a list of the cek to be pages, and, if

applicable and known, the type of c h e l rrqugcd for he hwdng cal1 (e-g., speech

or data).

MS BTS BSC MSC VLR HLR GMSC

Figure 2.3: Message Ekchmge for GSM Interrogation und Paging.

9. The BSC sen& PAGINGGCOMMAND messages to each BTS specinecl in the

previous PAGING message. The PAGING-COMMAND message includes the

identity of the mobile subscriber (IMSI or TMSI) to be used, the paging group of the

subscriber, and the type of channel requirrd, if applicable.

10. Paging groups are sections of the complete paging channel, in which di paghg

messages for particuiar groups of subscribers are normally sent. S i n a mobile

termlliats, in generat, need to listen only to thek own paging group, and a paging

group is much shorter (in tenns of the number of transmitted timeslots) than the

cornpiete paging channel, less time û spent Listening to the paging channel, thus

conserving battery power. This concept is known as discontinuous reception.

1 1. There are three types of PAGING-REQUEST messages that may be tranSI11itted over

the radio interfi. These ciiffer in the type of identifier OMS1 or TMSI) used and the

number of paging requests that may be sent in one message. Ail messages are 23

octets (184 bits) long, and since a TMSI is shorter than an IMSI, more TMSI paging

requests can be sent per message (up to 4 with a PAGiNG-REQUEST-TYPE 3

message). Due to the unpredictability of the radio environment, paging messages are

n o d y repeated an operator-conf&urable number of times, to decrease the chance

of lost pages (for example, if the subscriber was temporarily in a shadowed am.)

12. When the MT successfully d v e s a paging message, it initiates a channel

assignment procedure, identical to the f k t few steps of the location update procedure,

with the exception that the establisbmt cause is 'respoox to paging' ïnstead of

'location updatc'. A context is maintained on the network side to complete the circuit

for the cal1 once the MT has responded to the page and a radio-signaling Link has been

establistied

Until the early 199ûs O.S. cellular customers that m e d between different cellular

systems haà to register manually each time they entered a new market covered by a

different senice provider, diiring long distance tmvel. This required the user to call an

operator to request registration. In the early 1 WOs, US. cellular carriers implewnted the

network protocol standard IS41 to d o w different cellular systems to automatically

accommodate subscribers who roam into their coverage region. This is called

intemperator roaming. IS41 allows MSCs of dinmnt semice providers to pass

information about their subscribers to other MSCs on demand.

IS-41 relies on a feature of AMPS (Advance Mobiie Phone Services) called autonomous

registration. Autonomous r e g i d o n Û a pocess by which a mobile notifies a serving

MSC of its presence and location. The mobile accomplishes this by periodically keying

up and transmitting its identity information, which allows the MSC to constantly update

its customer list. The registration command is sent in the overhead message of each

control charnel at five or ten minutes intmals, and includes a timer value that each

mobile uses to detemiine the precise time at which it should respond to the serving BS

with a registration transmission so that the MSC can validate and update the customer

list. I M L aiiows the MSCs of the neighbring systems to automatically handle the

registration and location validation of roarners so that users no longer n a d to manuaily

register as they travel. The visited system creates a VLR record for each new roemer and

notifies the home system via IS-41 so it can update its own HLR

The 1s-41 and GSM location management strategies are very similar, except for the

folIodg differences. In GSM, when the new VLR receïves the registration dErmation

fkom the HLR, it assigns a new TMSI to the M ï for the new location area The HLR also

pmvides the new VLR with all relevant subscriber profile information required for caii

handling as part of the afnrmation massage. Thus, in contrast with 1s-41, authenticaiion

and subscriir profile infoRnati011 are obtained nom the HLR and the oid VLR, not just

the HLR

The procedure for delivering cak to mobile users in IS-41 is very similar to that in GSM.

The sequence of messages between the der's and cailed party's MSCNtRs and the

HLR is identical to that show in d flow diagrams for GSM, although the names and

contents, and lengths of messages may be diffmnt, see 1261 for more detailed

descriptions of the IS-4 1 mobility management strategy.

2.3 Conclusions

The detailed operation of the location management procedures in a practicai mobile

network, specXcally a GSM network, serves to show the considerations that must be

taken into ac«>unt when developing new location management algorithms. For example,

many proposais do not consider that at pfe~ent, and likeiy for several years, mobile

networks and fixed networks are disjoint. They do not have integrated switching and

signaling hctions, due to not only technical constraints, but also legal and

adminisirative ones.

At this point, it shodd be notai that location updating, interrogation, and pagllig are

relatively complex Ui terms of signalhg on both the radio interfàce and within the fked

network, and that there are several factors that should be considered for an efficient

location management scheme. Some of the practical issues will be discussed in the

literature review in Chapter 3.

Chapter 3

Previous Work on Location Management Proposals

with Classification

Emerging mobile and PCS enable communication with a person at any time and at any

place. PCS introduce three capabilities: termid mobility provideci by wïreless access,

personal mobility b a d on personal numbers, and service mobility through management

of user Service profiles. Mobility management is an important issue in PCS. One of the

main tasks of mobility management is location tracking. Location tracking fiinctions

provide PCS with the methods to keep the location of mobile users and termjnals. In

PCS, subscriber mobility is wntrolled t h u g h location registration and update. The

overall location management fiznctioaality is compriseci of three intet-related aspects of

Iocation updating, interrogation, and paging. Different researchers have concentraid on

different system resources (such as database storage capacity), quaiity of seNice

parameters (such as call setup delay) etc. The proposais are evaluated in ternis of the

overail goals of location management:

Minimize signaling, both over the radio interface and within the network, to teduce

bandwidth and in- capacity.

. . . Muumue caii setup Qlays in order to maintain acceptable quaiity of service.

. . . Minunue the amount of data stored for esch subscriber, to d u c e equiprnent cost.

. . . Muumue the computational complexity of algorithm, to duce hardware costs,

conserve battery power. and improve response times etc.

In general these goals are coaflicting and trade-offs must be made. Typidy, proposais

concentrate on improving one paaicuiar aspect by compromisiag on another.

3.1 CIussificotion of Location Management Sbotegies

Different propos& exist with the goal of improving some aspect of location

management Some concentrate on improving signaling and querying efficiency of the

network-side while other concentrate on reducing radio interface signalhg in t e m s of

paging. Thus location management proposais f& in two broad categories: those that

concentrate on the interrogation aspect of location management and those that focus on

location updating and paging algonthms. Figure 3.1 shows our classification of location

management schemes.

3.1.1 Location Upddng and Paghg Roposufs

Location updaîbg and paging algorithms focus on reducing the overail number of

location updating and paging messages sent over the air interface to minimize the totai

location management cost. This can be achieved if the location of the mobile user is

known in advance, so that iastead of sending paging messages to aii the cells in the LA,

only the cell hosting the subscriber is paged.

Current PCS networks partition their coverage areas Uno a number of LAS. Each LA

consists of a p u p of d s , and each MT pedomis a location update when it enters a LA.

Location Management Strategies

Location

Variations in hplementing Location Updating Location Areas with Alternative

Static Dynamic Time Distance Movement

Figure 3. I r Clars~cation of Location Mùnagemeni Proposcls-

When an incoming cal1 arrives, the network Locates the MT by siniultaneously paghg ail

cells within the LA. Th- are a number of inefficiencies associateci with this location

update and paghg scheme:

MTs that are Locaîed aroimd LA boundaries and make muent movements back and

forth between two LAS may perfonn excessive location updates.

Requiring the network to poil aii the cell witbin the LA each time a cal1 arrives may

resuit in an excessive volume of wireless broadcast m c .

The mobility and cal1 arrïval patterns of each MT vary, and it is g e n d y diacult to

select a LA size that is optimal for ai i users.

The location updating and m g sûategies can be divided iato two categones; one that

makes use of LAS while the other one does not,

3.I.l. I Variations in I~Iementing Location Areas

h the conventional location-updating methods like GSM, cells are grouped to form

disjoint LAS; these are disjoint in the sense that one ceil is included in only one LA.

Location areas aliow the system to track the mobiles during their roaming in the

network(s): subscribet location is hown if the system knows the LA in which the

subscriber is locatd When the system has to d l i s h a communication with the mobile

(to route an incornhg d l , typically), the paging only occurs in the cumnt LA. Thus

resource consumption is limited to this LA; paging messages are only transmitted in the

cells of this particular LA. To provide additional capacity, while constrained by the fixeci

available radio specûum, operaton have been using progressively smailer oells, through

ce11 sptitting and sectorization. To accommodate this trend, either the number of cells and

submibers per location area mrin increase (to maintain the same geographical size for

the location areas), or the geographicai size of location areas mut decrease (to maintain

the same number of cells per location azea). Assuming the wrmt subscriber mobility

patterns and location management algonthms, the number of paging messages wiU

increase in the former case, and the number of location updetes will bcrease in the latter

case.

The above s i w o n arises because location areas are geographidy fked, and apply to

all subscribers, regadess of th individuai subscriber mobiity ppttenis. This can be

illustrated by considering an exampie with a fiut subscnber (for exampie, driving a car)

and a slow subscriber (for example, a -an). The fast subscriber may cross several

location areas during a trip, while the m a n may not even cross one. The fast

subscriber can be handled efficiently by aeating large location areas to avoid numerous

location updates. However, if thae large location areas would also apply to the

pedestrians subscr i i , significant signaling would k wasted piiging over the entire

location a m , when paging over a much srnalier location area (or smallcr m g areas

within the location area) would suffice.

The LA-based location update and pa@g scheme is a static scheme because it cannot be

adjusted based on the parameters of a MT h m tirne to tirne. One of the pmblems with

this scheme is that location and paghg amas are stat idy d e W . The detemiinaton of

which celi belong to whifh location areas (and implicitly, paging areas, since the two are

usually identicai) is t b u g h a spatially and temporally static procedure using aggregate

data.

In [II, an intelligent method for locating users, d e d an Alternative Strategy (AS) is

intrduced. This proposal is bascd on the observation that the mobility behavior of a

majonty of the users can be predicted. The strategy c m d u c e sipnaiing messages

involved in mobility management proceduces, leading to savings in system resources.

This approach reinforces the information capabilities ofthe system, and provides tools for

prediction by integrating (ùi the system) more information about tbc extexnai world.

The user profile may be buiit up by monitoring the user over some period of t h e . This

long-terni user profile seldom changes, although the achial updating procedures are not

specified. The location accuracy may be improved by mordering the pagïng areas in the

long-temi profile according to short-temi or medium-term algorithms, or by paging

concentrically around the last known location area. The former approach attempts to

reorder the paging areas so that areas asociated with a higher probability of containing

the subsCnber are paged fïrst, reducing signaling and delay. Call arrival and origimtion

rates f?om particular paging areas may be used for a medium-tem reordering of the user

profile. AiteRlSitively, estirnateà distance tmreled since the last known location may be

used at the tirne of an incoming di to determine which areas to page first The paper

rnentioned th* with this approach, and using dinerent mobility models, parameters and

evduation methods, very high signaüng swings have beea reported.

Gregow P.Poilrrri and Ckik-Lin 1:

The strategy in [2] proposed a Rome-Based Strategy (PBS) to d u c e the signaling

trafic on the radio ünk by increasing the inteiligcnce within the h e d network- The

system maintains a sequential list of the moa likely places where each user is located (in

tenns of a given set of LAS). The list is &ed h m the most to the least likely place

where a user is fomd When a c d anives for a mobile, it is paged sequentially in each

location withi. the list. When the user moves between location areas in this List, no

location update ïs required, The lin may k pmvided by the user or may be based on each

user's past mobility history.

The Profile-Based strategy relies on the observation that most users follow regimented

daily schedules that can be exploited to estimate their curent location. If the system

knows that at a given tiw the user is most likely to be in a certain location a m , second

most likely to be in a second location area, etc., the system can maintain a List of Wely

locations ordered fiom most to 1- likely. When a cal1 arrives for a user, it is paged

sequentially in the order indicated by the list.

In [3], an analytical fnunework is presented for analyzing the performance of different

schernes for Location management. ThÏs paper considers two paging methods together

with location updating techniques. The paging techniques considered are simui~mous

paging and se~uentiai paging. In case of simultaneous paging, ail celis inside a LA wiii

be paged simuitaneously when there is a caü to any one ce11 in the LA. In sequential

paging, paging is done in k-ce11 PAS sc~uc~ltially until the callad MT is foimd The

paging tranic depends on the average number of paged cells till the MT' is located This

formulation leads to a closed fonn expressions for the cost of location management in

tenns of the d-arriva1 rate, boundary crossing rak, the size of the LA, the maximum

acceptable average paging delay, the total number of celis controiled by the Mobile

Switching Center (MSC), etc.

It is suggested that the best strategy is sequential paging combined with some intelligent

feahires. As suggested, useiùl information related to the MT, such as the most recent

interdon area and its speed, can k kept tmck of, and this information can be used in

carrying out the paging process. This extra idormation wil l increase the probability of

fmding the MT in the fint area paged. Of course, this depends on the user spad and the

t h e lapse between the last update of user location and cal1 received. Paging is still done

sequentidly, and the dinenace resides in the way in which the paging base stations are

selected (Le., the added 'intelligence'). This inteuigent paging does lead to a c o a

reduction compareci to random sequential paging at an expense of extra complexity.

fi-Bing Lui:

The proposai in [4] studies a special case of AS [l] called the Two-Location Algorithm

(T'LA). In TLA, two locations to track the location of the MT are considered. On the

other han& AS allows more than two user locations in the profile. When a phone cal1

arrives, two LA identifiers are used to find the actual location of the portabie. The order

of the identifïers selected to locate the MT affects the performance of the algorithm. The

MT has a small built-in memory to store the identinm for the two most recently visited

LA'S. The record of the MT in the Home Location Register (HLR) also bas an extm field

to store the correspondhg two locations. The f h t memory location stores the most

recently visited LA.

When the h4T joins the network, the location is storeci in its memory, and a registration

operation is required to modify the HLR record. When the MT moves to a new location,

it checks i f the new location is in the memory. I f the new location is not found, the

identifier for the LA that the MT just lefk is kept, and the other address is replaced by the

address for the new LA. A registration operation is rquired to make the same

modification in the HLR record. If the addsess for the new location is already in the

memory, no registration operation is performeci. The order of the addresses selected to

locate the portable affects the performance of the algorithm. If the MT is located in the

first try ( r e f d to as l d o n hit), then the paguig cost for the TLA is the same as the

IS41 algorithm. Otherwise, an extra pmalty is incurred by TLA to locate the MT for the

second try ( r e f d to as location miss; the second try is always successful). Mer the

second try, the HLR identifies the LA where the MT is visiting.

Recent research efforts focus primarily on dynamic location update mechanisms, which

perfom location ripdate based on the mobility of the MTs and the fiequency of incoming

calls. Several pmposals suggest the use of user profiles to individuak the location areas.

A personal, or individwihd, location area, anchored a r m d the ce11 in which the

location update occurs, would consist of the most Wrely cells that the subscriber couid

traverse. The infortnation to create the personal l d o n area is derived h m the user

profile, which contains a record of previous transitions h m ceii to d l , together with the

length of t h e spent in each cell. Some location management proposais are baseà on

grouping subscribers with similar behavior. Other proposais consider the use of multiple

LA leveIs to track iocations of mobile tenninals. The nominal LA sizes at each level are

different Each mobile terminal is registered at a LA of suitable level, and the registered

level is dynatnidly changed according to its past as well as present mobiüties.

Anna Errc rurdXkm =ou:

The proposecl algorithm in [5] ailows a MT to trammit update messages only at specific

cells (the number of which is s d , cornpared to the total numbcr of ceils in the

network), while restricting every search for a mobile user to a small subset of cells.

In a simple cellular network, there is one base station per cell and a large number of base

stations in the system. In the proposed scheme, a subset of base stations d e d reporting

centers is selected among al1 base stations. The cells associa with these base stations

are referred to as reporting cells, while other ceiis are cded non-reporting celis. The

vicinity of reporting ceii i is the collection of al1 non-reporting cells that are reachable

from cell i without crossing another reporting ceU. Atm, ceLi i is in the vicinity of itself.

The fkquency witb which the mobile usen enter a reporting ce11 conesponds to the

updating cost for the cell. The higher the frrsuency, the higher the updating cost. If the

ceil with highest fbquency is selcctad as a non-reporting cell, the users do not need to

upàate theV location wheneveer they enter tbis ceU- This reduces the total updaing cost by

the largest amount for the entire network. This step is continueci, and the celi with the

highest fkquency among aii remaining reporting celis is reselected. This procedure

continues until ail cells are t r i d

The proposed stmtegy provides a partition scheme to optimize the size of the location

area domain. Simulations are pccforrned to compare the pedomÿioce of three schemes:

always update, aiways seaich and the proposed scheme. The resuits show that the

proposed scheme perfoms better than the other two.

LR Hu and SSAtappoporf:

The paper in [6] proposes an efficient multilayer mobility management scheme that is

especiaily suitable for hierarchical cellular stnictures. The scheme accounts for pst as

weli as present terminal mobilities and dynamically changes the hierarchical level of the

location area to which the mobile terminal registers. ïhe nominal LA sizes at each level

are different. Each mobile terminal is registered at a LA of suitable level; highly mobile

temiinals such as an aircraft will tend to register at the highest level where location areas

are formecl by spotbeams, Low mobility terminals such as pedestrians will tend to register

at the lowest level where location areas are fomied by microcells or clusters of

microcells. The location-updating rate that is genemted by a mobile temiinal tends ta

rernain fixed over a wide range of temünal mobilities.

The system uses multipie rrgistration levels to track the locations of mobile terminah.

Based on the dweli t h e , time that an active MT stays in the LA of a given registration

level, of a mobile terminal in the prcvious LA, a mobile terminal is switched to a suitable

level of location management. Mobile terminais tracked by the proposcd scheme are seen

to generate signaüng wfnc at a very stable rate over a broad clas of terminal mobility.

This fature may prevent the system fiom excessive signaling t d i c due to high mobility

usm and can be used to set the requïred long-term total sigoaling n.afnc.

Thomas Kunz and John Scourk:

The proposal in [7J disasses a stochastic mobility model based on daily activity patterns,

providing a redistic balance ktween completely detenninistic and completely random

mobiity moâels. Activities, together with their location and duration, are selected ushg

subscriber-specific data, as well as randomly selected &ta h m tables derivecl nom

trafic planning surwy deta The path to the next activity's destination, represented as a

sequence of traverseci radio cells, generates cell crossings used for location update

rneasurements. The cunent location of simulated subscribers is continuously tracked and

used for paging measurements.

The model was used as a tool for developing a location management algorithm utilinng

user profiles for the dynamic d o n of location and pagïng areas. Based on the number

of times a subscriber had moved fiom the current cell to the neighboriag cells a personal

location area is dynamically defined during a location update. A history of the average

time spent in each ce11 is used dynamically to determine a subset of cells within the

personal location area most likely to contain the subscriber, and whicb is paged first

The proposed algorithm is comlrirr#i with the aigorithm currently in systems like GSM. It

is show that the proposed algorithm significantly d u c e the total signahg cost, for

nearly all different subscriber types dehed, levels of incorni. calls, woik location

variability, and dynamic location area size as compared to currenly used techniques.

AU prrviously d i s d variations in LA implcmentaîio~ls rcly on the same location-

updating mechanism: a location updating procedure is pdomed if the MT exits its

curent LA; psging is always p e r f o d inside the LA. Other location-update schemes

have been proposed that do not require the division of the network average ana in LAS.

The only location information available to the network is the last point of contact with the

MT, either because of a location update, a connection, or another MT-Network

interaction. These non-LA~riented location-updating methods are inherently

individualized, which would permit parameter opthizaîion for each user individually.

Several dynamic location update and paging schemes are described below:

The tirne-based location update m& [8] is the simples because it just requires the

mobile to periodicaiiy transmit its identity to the network without regarding to its

mobility and incornhg cal1 arriva1 rate. Each MT has a tuner ninniog. On expiration of

the timer, a location update is performed and the tirner is set to zero, and then begins to

nin again. Whenever a user is looked for by the system, it is first searcheci at the ce11 it is

iast reported to, say i. if it is not found thm, thni it is seamhed in cells i + j for wery j -

Accordhg to the movement-based strategy [8], each mobile user counts the number of

cell boundary aossings and updates its location when the count exceeds a predenned

parameter M (this number is r e f d to as movement tbreshold). When a mobiie is

paged, it can be fond within a neighborhood of atmost M celis away h m the previous

reporthg cell. In this case, each mobile needs to keep track of the number of cet1

boundary crossings since its last location +te.

Distance-ked:

In a third propasai, a MT performs a l d o n update when its distance h m the ce11

where it perfonned the last location updaîe exceeds a predefined value D (this distance

value is refened to as the distance threshold). A distance-based location update scherne is

considered in [9]. The authors introduce an iterative algorithm that can generate the

optimal thrtshold distance, which d t s in minimum cost. When an incoming dl

k v e s , cells are paged in a shortestdistance-ffirst-order such that ceiis closest to the ce11

where the last location update occumd are poileci m. The delay in locating a MT is

therefore proportionai to the distance traveled since the last location m e . Resuits

dernonstrateci that depending on the mobiiity and cail arriva1 parameters, the optimal

movement threshold varies widely .

One study [IO] compareci thrte difEerent location updating strategies with respect to the

update costs, paging costs, and total costs of tracking mobile users by constructing an

objectaienteci environment in Java In their cornparison of the différent update

strategies, the authors claim thai the distance-based methd gïves the lowest combined

location updaîing and paging cost.. The the-based strategy causes updates periodicaily

independent of how a user moves, so the update cost of this strategy is steadïer than that

of the other strategies. However the paging cost increases rapidly in proportion to MR,

the Mobiiity Rate, which is defiwd as the average number of ceils changed by the user

per unit tirne-

In case of movement and distance-based strategies, for low the update coats of these

strategies are smaller than, and the paging costs are larger than that of the tirne-based

strategy. While, for a high MR, these strategies resuit in larger update cost and smalla

paging cost than the tirne-based strategy.

Severai proposais have attempted to impmve the signaliag and querying efficiency of the

network-side database queryuig rquited by location management, with a secondasy goal

of reducing radio interface signalhg in terms of paging. The driving requirement is to

remove the bottieneck that may &se as a d t of a centralized HLR, which must be

queried for every incoming cail and eveq location update associated with the subscriber.

LA partitioning, and thus mobility menagement cost, p d y dies on the system

architecture (e-g., database locations). Designing an appropriate database organhtion can

reduce this signaling t r a c .

Research in the area of database architectures generally falls into two categorics. First,

extensions to the GSM location management strategy are developed which aim to

improve the GSM scheme while keeping the basic database archi- mchangd This

type of solution has the advantage of easy adaptation to the current PCS networks without

major modification. Anotthcr category of rtsearch mults in completely new database

architectures which require a new set of schemes for location registration and cal1

delivery .

Three kinds of network database architectures are cloxly rdated to mobility management

schemes. The fkst is a centralid database architecture- Al1 user information is stored in

a central database. This architecture is simple and bas the advantage of easy operation and

control, if it is applied to a system that provides compamîively srnail-sale service in a

limited area.

The second architecture is a hierarchical (distributed) database architecture which uses

several independent databases accordhg to the geographicai pmximity or service

providersers The two level HLRNLR architecture as described in GSM 1251 and

1s-41 [2q standards are replaced by a large number of location databases. The location

databases are organkd as a tree with the mot at the top and the leaves at the bottom.

Each leaf4evel &tabase sesees a location registration area and stores user informaiion.

Each database in the higher-levels stores pointers to the next lower-level database that

stores user idonnation or has a pointer ta a lower-level database.

The third case is the hybnd database architecture that combines the cenîraiized and

distributed database architectures. In thls case, a centrai database (HLR-Iike) is used to

store a i l user information. Other d l e r chbases (VLR-like) are distributed aU over the

network. These Visitor Location Re&- (VLR) da?ahes store portions of HLR user

records. This c m lower the congestion probabïlity in the HLR to some degree but has

overheads in multiple database operation because the VLR has to obtain MT information

from the old VLR and delete it in the old VLR. A single GSM network is an example of

such architecture. In some cases there can be more than one FERS distributed in the

network.

3.1.2.1 Dàstràbufed Database Architecture

Jan Jannink, Derek Lam, N~~oyonun Sivukumcrr, Jennger Wdom a ~ d Dondd C.Cox=

The basic idea behind [ I l ] is the concept of me-long numbeiing without making use of

HLRNLR In IS41 and GSM, each subscnber is assigned a phone number fhat contains

enough infoxmation for the network to derive the location of the HLR These phone

numbers are, therefore, geographical and are tied to specific HLRs.

In a basic hierazchical model, each leaf4evel database services a zone and stores profile

of users located in that u n e . Each database in the higher levels of the hierarchy stores

"pointerst' (user ID + database ID) ta the next lower level daîdmse that stores the d s

profile or has a pointa to a lowa level cbbase. ?hae is a conceptuai "mot" daîabase

that stores a pointer for every user. In practice, the root may be distributed among several

databases so thaî no one Antahace ne& to store aU user pointers or seNice di root level

queries and updates. This simple hierarcbical LMT provides me-long numbering since

there is no concept of a "home site" for a user as in HLRNLR.

When user A calls user B, the Location lookup for B's pmfiie fint pmpagates up the

hierarchy fiom A's zone to the !kt database that c o n t a a pointer to B's profile. The

query then popagates down the hierarchy foiiowing pointers to B's proNe until it is

found in the leaf-levef daîabase that services the zone in which B is currently l~cafed.

When user A moves fiom the current zone to another wne, the current zone ships a copy

of A's profile to the next zone, and defetes its own copy. The A.rtahases dong the path to

the least common ancestor of both zones are then upàated so that the pointers to A's

profle reflect the new location of A. The idea behind profile repiication is to reduce the

latency of profile lookup at the expense of increased update and storage CO* Essentidy,

a user's profile is replicaîed at a set of daîabases such that the benefit of local lookups at

these databases outweighs the update cost due to the user's mobility. For this the

aigorithm cornputes the Local C d to Mobility Ratio (LCMR) of the subscriber, defïned

as the number of calls f h n a particular switcil to a particular subscriber, relative to the

number of location updates penormed by the subscriber. If the LCMR is greater than

some predefined riinimum tbreshold value, the user profiie is replicated.

In [12], the authors developed another LMT, Hierarchicai Mine Parametric PronlE

Replication (HOPPER), that uses a hierarchical organhtion of databases and on-lim

profile replication to achieve Me-long numbering with scalability and efficiency. In

contrast to off-line schemes, the on-üne replication technique uses on-line LCMR

estimates and dynamicaüy mîgraîes replicas to appropriate databases. On-line schemes

have the advantage tbat they can adapt to changes in user calling and mobitity patterns by

dynamically migrating replicas mund the network. Due to practical storage constraints,

it may not be possible to place replicas at all locations where there are expected benefits.

By dynamicaily adjusting the locations of replicas, on-line schemes cm increase the

"usefiilnessn of a replica and schieve the same lodoip @ormance of off-line schemes

with d e r storage requirements.

Slilomi LWev et ai:

In (131, the authors suggested a &ta structure for location management in mobile

networks. The data structure is based on the tree location daîabase stmcture. The

algorithm replaces the root and some higher levels of the tree with another structure that

balances the average load of seamh request The new structure of the upper levels

improves the performance of the tree structure by spreading the load of queries. For this

modification the authors use a set-ary butterfly network which is a generaihtion of the

k-ary buttedly network. The mot of the modified tree has to maintain the location

information for only some portion of the mobile terminais. This inturn keeps the number

of update messages small; only the embedded me for the mobile tennllral for which the

location update message has been sent is involved in the update. The proposai aiso

suggested modifying the lower level of the tree to refiect bettrr neighbor relation between

geograpbic cells to support simple location &ta management. This is done by adding

comections to the lowest level of the tree such that any two MSCs that comspond to

neighboring geographic regions wiU have either a conmion parent or a direct link

connecting them. This may d t in efficient local broadcasts and may support handoffs-

The modification of the lower level supports a handoff procedure d l e d 'follow-me

handoff. The update of the proposed location databe ensures correct location data

following any number of transient faults that corrupt the location database information,

and thus is ~e~stabilizing.

The goal of a location management scheme should be to provide efficient searches and

updates. In [14] the authors present strategies for updates, search-updates and a search

protml. A search-updak occurs after a successfirl search, when location information

corresponding to the searched tenuinai is updated at some terminais. The authors present

several location management strategies based on a hierarchical tree st~cture database.

The structure co11sists of MTs, BSs, and MSCs. The base stations are located at the leaf

level of the tree. Each BS maintirinr iaformation of the temiinals residing in its c d .

There is a unique 'home' address for every mobile rermuial. The home address is the

identifier or name of the mobile terminal. The physical address of a mobile terminal

might change, but its home ad- remairis the same irrespective of the terminal's

location. Each MSC maintains an address-mapping table that maps the home adàress to

the physical address of the MT residing in the subtree ben& i t

The paper presents the results of simulations Camed out to evaluate the perfomance of

various static location management strategies for various d-mobility -S. The cost

metric is the number of messages reqwd for each operation (searc4 update and search-

update). The prformance parameter of interest is the total cost, defined as the sum of

average update cost, average search cost, and the average search-update cost. Simulations

show that perfonning search-updaîes siificantly d u c m the total costs.

3.1.2.2 Hybrid Databuse Architecture

Sliivakumor mà Wrciem:

The proposal by Shivakumar aad Widom [15] discusses replication of the user profiley

containing the subscriber's current location, in severai location registers. Assuming an

integrated network mhitecnite, outgohg calls h m a particular zone (ana controlled by

a VLR) would f k t check the local VLR, in an attempt to avoid querying a distant

centralized database¶ Le., the HLR, for the cumnt location of a specinc mobile

submiber. The decision of where to place the replicated profiles, given the costs for

updating the replicated records, is based on a niinimum-cost, m a x i m d o w algorithm

described in the paper. The HLR maintains the cumnt location of its mobile subscribers,

and manages the ripdatia$ of aU their replicated records.

The algorithm requires the construction of a flow network, which is a graph containhg

nodes for each subscriber and each zone in the network. The edges between the

subscriber nodes and the zone nodes have attributes that requin estimates for the number

of location updatcs p e r f o d by a particuiar subscriber. These estimates together with

estimates on the replicaticm costs and dadmse capacities, are used by the minimum-cost

m;urimum-flow algorithm to determine for which subscribers, and in which nodes,

replication of the user pronle would k cost-efficient. The possibility of varying mobility

and caii arriva1 paaems is considercd, and four algonthms are presented for modifying

the flow network and minimum-cosî, maximum-flow algorithm to avoid having to

recompute the entire algorithm, which is exponentiaily bound.

The Reverse Virtuai CaU (RVC) setup is a rhcme for delivaing mobile tcmiinal cal1

[16]. It allows, d e r the constraint that the LA is not srnaiier than the VLR area, a

reduction in the number of signahg messages exchanged ktwecn the called and calling

databases and switches. The prirnary motivation is that too much effort is king exerted

by the f k d network to track users wbo seldom d v e calls. An added factor is that a

very high perctntage of c d attempts fa1 and consume much of the network resources

~~lllecessarily. The goai of this papct is to deiiver calls without keeping track of user

locations and to min- the cost of Wed cail attempts. RVC combines paging with

physically reverseci cal1 setup to fonn a logically fonuard caii setup.

As in GSMY al1 existing cellular standards allocate networic murces (voice tninks) pnor

to paging a mobile termina. If the terminal does not respond, the network must tear down

these resources. Users who simply do not leave their phones tunied on cause large

portions of failed cal1 attempts- In RVC setup, voice tnmks are not teserveci untii the

mobile is found and willïng to accept the call. Moreover, the signaling load and the delay

incurred by the currently standardized H L R M B method of tracking mobile users are

expected to be high. RVC can function within the exiniag ceUuiar paging network or

within an integrated ovalaid paging netwok In RVC, instead of setîing up voice tnmks

to the tenninating switch w h m the d e e last registered and instnicting the terminating

switch to page the mobile, the signaling system is used to insmict the base stations of the

global paging network to page the network. The poiging signai contains the ID of the

d e r . if the callee decides to accept the cal& the mobile terminal automatically initiates a

cal1 setup to the cder. The c d is routed h m the texmi~ting switch to the originating

switch and is bridged to the cailer. The caiI is completed in such a way that the RVC

feature is tmqaent to both the d e r and the d e e .

Josevk S. M. Ho and lm F. Akv-

A Dynamic Hierarchical Dataôase Architecture for Location Management in PCS

Networùs is proposed in [lq. The proposed scheme ailows the dynamic adjmtments of

user location information distribution based on the mobility and calling patterns of the

MT. A unique distribution strategy is determuied for each MT, and location pointers are

set up at selected remote locations that indicate the current location of the MTs-

Both the IS-41 and GSM standards employ a two-level database architecture consisting of

the HLR and the VLRs. The proposed algorithm introduces a location management

scheme based on a three-level database architecture. Unda this approach, an additionai

level of databases d e d the Directory Registers (DRs) is introdud Each DR

determines the location information distribution strategies for its associatecl MTs.

Location pointers are then set up at selected remote DRs indicating the current location of

the MT. The fwictions of the HLR, the VLRs and the MSCs remain primarily uncbanged.

The distribution strategy for each MT is unique and is determineci baseci on its mobiiity

and caii arrivai parameters. The proposal inttoduces an algorithm for determining the per-

user location information distribution stmtegy, which reduces the signaling, and datebase

access costs for location management. The cost reduction is most significant when the

Local Call to Mobïiüty Ratio (LCMR) is low and the cost of accessing the HLR is high.

It is demonstrateci that the proposed location management scheme results in signincant

saving in both the signaling and database acctss costs for location regisîratïon and cail

delivery. Based on the cost parameters considered in the analysis, the signaling and

database access cost can k reduced by as much as 70./0 and 50% rrspectively, cornpanxi

to the IS-4 1 standard.

RJIwr a d Y-Bhg Lin:

For a mobile which fkquently moves across LAS but seldom has an incoming c d ,

traditional IS-41 registration operation is wastefiil in netwo~k cost since every registration

operation mut update the HLR to record the most ment location of a mobile. Infact,

access to the HLR is much more expensive than access to VLR Based on these

observations, the pointer forwarâing with single HLR (PFSHLR) [18] scheme is

proposed to reduce the waste.

The basic idea is that instead of reporthg a location change to the HLR, wery time the

MT moves to an ana belongiag to a different VL& the reporthg can be ehninated by

simply setting up a forwarding pointer nom the old VLR to the new VLR A mobile

arriving in a new LA sen& a registration message to the VLR of the new LA. ïnstead of

sending a message to infotm the KLR, the new VLR sen& a message to inform the old

VLR about the mobile's departure. On receiving this message, the old VLR deletes the

obsolete record for the mobile and creates a forwarding pointer pointing to the new LA.

When a c d for the h4T is initiate4 the network locates the MT by first detennining the

VLR at the beginning of the pointer chah and then follows the pointers to the cunent

serving VLR of the MT. To minimiie the delay in locating a MT, the length of the

pointer chah is limited to a predefined m u m value. When the length of the pointer

chah reaches the maximum value, additional fowarding is not allowed, and the location

chauge must be reporteci to the Hi& when the next movement occurs. It is demonstrated

that, depending on the mobility and cal1 arriva1 parameters, this scheme may not always

resdt in a reduction in cost k m the original IS-41 schenie.

Yi-Bing Lin and Wen-Nung Tsak

Another scheme combining pointer forwarding with distributed HLRs (PFDHLR), was

proposed in [19]. The basic idea is that in IS-41 the HLR must determine the VLR

currently serving the d e e and query it by sending a route-request signal. Therefore, the

HLR rnay becorne a bottleneck due to heavy signaihg trafnc generated by location

tracking- Lin proposes a pointer forwarding with a distributed HLR (PFDHLR) scheme to

elirninate this overhead in a distributed HLR environment, In this scheme, HLRs are

distributed in remote Public Switching Telephone Networks (PSTNs). Like pointer

forwarding with a single HLR strategy, every HLR in PFDHLR records a LA where the

mobile may &S. When an incoming cal1 is originated nom some ternote PSTN, the

HLR will be directly queried. Next, the HLR at the PSTN queries the VLR recordecl in

the entry associated with the callee. If the mobile is found in this LA, a cal1 wiil be

delivemi, otherwise, the system will tnre the mobile through the forwarding pointer

chain starting from thst LA. This scheme effectively and efficientiy implements the

distributed HLR notation. However, it has some potential side effects. The length of the

pointer chain may increase. Because of the distributcd nature of the HLRs, the total

incoming calls wiU be smed by different HL&. Therefore, the d-to-mobility ratio for

each distributed HLR is VN times that in PFSHLR, where N is the number of remote

PSTNs. The expected length of each pointer chain increases considerably when the cail-

to-mobility ration is srnail.

Kiren-Lhng Sue and CMèn-Chao Tseng:

A scheme considering a one-step pointer forwarding strategy for location tracking in a

distributed HLR enviro~ment is considered in [20]. In this scheme, every distributed

HLR has one record for an authorued mobile. This records the individual LA/VLR where

the mobile was found the last time by an individual HLR DifEerent HLRs may record

different LANLRs as the head of their own locating paths, so they may have different

locating paths; therefore one cellular system with N distributed HLRs may have n

different ïocating pointer chains, n < N, for the same mobile. Whenever a mobile registers

in a new LA, the VLR for the new LA wiU maintain an entry for this mobile. This entry

is the common rear of the n locathg pointer chains. Sirnilar to a double-linked lïst, every

such entq must record the previous nodes in the n locatïng pointer chains. In this rnanner,

the VLR can send a deregktmtion message through ail locating paths. This message is

forwarded to the proper VLR via the previous link in each entry. Nexî, al1 locating paths

are migrated to guarantee that each pointer chain's length among the VLRs does wt

exceed one.

Simulations wcre canied out to compare the three pointer forwafding strategies aawly,

PFSHLR, PFDHLR and OSPFDHLR Simulation results demonstrate that, compared

with PFDHLR, OSPFDHLR can reduce the cal1 delivery tirne/ cost signincandy,

particulariy when the number of distributed HLRs is growing.

The proposai in Dl] explores the use of replicated databases for management of astomet

data (e.g., mobility data, call routing logic) in global, intelligent, and wireless networks.

Two schemes namely full and partial data replication schemes, which are compatible 4 t h

indu* protocol standards (iS41, GSM etc.), are analyzed and a cornparison is made

with the traditional, centralized database scheme. In centraiized database design, al1 call

setup and other signaling hctions access the centralized database in the signaling

network.

The authors considered such mobility services acrou multiple, international networks.

Depending on the anticipted trafEc load and other engineering and economic

considerations, the world is divided imo two or more regions, each of wnich wvers a

group of coutries. It is assumeci that the global customers are based in the United States

and possibly are traveling in a foreign country. A awalized design, whm the customer

Location information is stored in a centraiized database is physically located in the home

country (USA). An identicai pair of Regional (RDBs) is installai in each

region and connected to the U.S. signaling network, e.g., via additional Signai Transfer

Points (STPs)-

The replicated database can be accessed for cail saup and other signaîing purposes as

foiiows. Caus initiated in the U.SA A. query the Home Database W B ) . On the other

han4 for c d s origioatod h m a visited country, quaies are fkst launched to the RDB. If

a c d is destined for a customer visitùig the region, the RDB has the customer record, and

is capable of handling the associated queries. Othenvise, when the RDB carmot find the

needed records, the queries are forwarded over the SignaLing network to the HDB for

f i d e r prcxessing.

The repiicated database design is M e r divided into two, full and partial, data

replication schemes. In the fidl replication scheme, each customer visiting a foreign

region has two complete replicated copies of customer data: one in the HDB and the other

in the RDB. In contrast, in the ceplication scheme, only the RDB keeps a complete

set of customer data, whereas the HDB maintains (replicaîes) only a subset of customer

data that are bfkquently updated. For example, the HDB d a s not keep the location data

for highly mobile, wireless customers visiting a foreign region. The idea of the partial

data replication scheme is to d u c e the overhead of updating certain customer &ta that

are ftequently changed.

The perforrnauce results indicate that the choice of the database architecane for global

seMces depends on the spcific aafnc and mobility parameters such as the proportion of

customers visiting a foreign region, the fiaction of calls generated overseas, the query-to-

update ratioy and the query-to-registration d o . Numerical resuits reveal that the fuîi

replication scheme outpedorms the centrafized one ova a wide range of parameters

mentioned befom. Furthemiore, i f some custowr data, such as location data for highly

mobile customers in wireless networks changes frequenly, and if each cal1 launches

multiple queries into the -y the partial replication scheme offers fiirther

performance impmvements.

It is diffidt to compare d.erent location management schemes since as yet there exists

no absolute bounds on optimum perfo~maace which c m be epplied to any procedute

regardless of assumptions about mobility, network structure, etc. In partïcular, there is a

real n d to obtain realistic performance evaluation models based on acW users'

movements taking into account network structure. Different researchers have

concentrated on différent system resources (such as database storage capacity), Quality of

Service parameters (such as cal1 setup May) etc. There have been several different

approaches to mobility modehg for location management, and some of the methods used

in the literature are reviewed.

Location update rates, cal1 to mobility ratios, and other metrics used in the proposais

depend on some description or model of subscriber movements between location areas- In

rnany cases, some type of random mobility model is used In certain wrs, where the

mobility model is expücitly required in mathematicai derivations, a oneaimensional

model is used to simplify the calcdations.

Static LAS:

Static schemes have the advantage tbat the LA sizes are pre-de- and the= is no need

to implement complex algonthms to caiculaîe dynamic LA size for each subscriber

according to its chanictciistics. The disadvantages are that they cannot be adjusted

according to the parameter of ttic individual user. For example, both slow-mobility

pedestnans and fast-moving vehicles are assigwd the same Sue location areas. SimilArly,

high-mobility time pxiods (e.g., morning nish hou) have the same lofaiion area

assignrnents as low-mobüity time penods, even though signifiant signalhg saviugs

codd be rea l ' i by using larger location areas during high-mobility time penods.

An analytical evaluation of Tabbane's proposal [ I l is given which assumes typical values

for certain parameters, such as cell size, average subscriber velocity, and average number

of cal1 arrivals and di origination. The size and number of signalhg messages generated

over each interface per unit time is the chosen cornparison metric. A simulation is also

used for cornparison. The mobility mode1 is a simple one, with a subscriber moving with

an average velocity and random direction, having a certain probability of remaining in a

certain paging area. The c d arriva1 and origiaation rates an imiformly distributed. The

Mobiiity Redictability Level (MPL) is a key parameter used in the wmparisoas to give

an estimate of the randormess of the mobility patterns, and is given by MPL = z',, p i ,

where k is the number of p@ng areas for the current time period, and pi is the prokbility

of locating a subscriber in area i Resuits were plotted cornparhg the number of messages

across various network intcrfâccs, and the ratio of total cost of the proposeci algorithm

versus the standard GSM aigoriîhm, as a fimction of the MPL.

The main advantage of the AS scheme is to save location updates by storing a wr's

mobility information in profiles. So, the more predictable the user's mobility, the lower

the mobility management cost. Drawbacks are a posïbility of increased peging delay

( d e n the system muçt page a user in merent locations in a sequentiai ma~ltler),

increased memory requirements for storing each user's characteristifs and LA

parameters, and profile updating costs for users, which do wt have long-temi periodic

mobility patterns. In addition, the methods for initializing the user profile, as well as

long-temi updates, are not clearly spifieci.

Gregow P.Pofini d Cllik-Un 1:

The analysis in [2] is the extension of Tabbane proposal [l] that is besed on the fixed

network prformance. Using a general cos formulation, the paper extends that

methodology to study the radio link bandwidth usage, fixed neîworks signaling load, and

cal1 setup deiay.

The proposal gmup people into classes depending upon the predictability of their daily

routine. Although plausible, such puping is fairly arbitrary since subscriber mobility

characteristics may change. In addition the profîle-based strategy of this paper is not

applicable for the random usen and is only applicable to either detemiinistic or quasi-

deterministic users-

The system maintains a List of likely locations ordered fiom most to least iikely. When a

call amives for a user, it is paged sequentidy in the order indicated by the Est. I f a user

moves between LAS in the list, a location update is not required- When a user leaves the

list, it wiil be required to manuaily register with the system. The paper does not discuss

the aigorithm for updating the lisr The benefits achieved by the profile-based strategy are

partially offset by the costs associated with updating the list The cos of list maintenance

is the cost associaîed with processing the user's billing records to form the lia;

tramfierring the iist to the location wtiere it is stored, Le., the switch that wiil conduct the

search and notifying the mobile of any additions and deletions to the l i a In addition, the

authors assumed that for a particuiar user, ali the location areas in the list are under the

control of the wmie switch, but in a reai system, the search list may span multiple

switches. The authors also assumed that aii the cens are identicai, and aii location areas

have the same number of ceiis. In practicai systems, these assumptions are not true; each

system wiii have to be evaiuated independently.

Considering the above assumptions, the authors sbowed thaî the location update t d E c is

reduced on both the radio and fixed networks links, the paging traffic is hcreased on the

radio iink, and the paging t d c remaïns the same in the nxed aetwork when ail of the

location areas are in the same Mobile Switching Center (MSC) coverage area and the list

is maintaineci local to the MSC. These savings are realized at the expense of an increase

in cal1 setup delay for mobile tenninated calls.

In [3], diffkrent pgkg t9chniques namely, simuitaneous and sequential paging are

introduced and arc compared in texms of relative paging delay and paging t d f ï c . The

authors assuwd that the LA is composeci of fixed number of square-sbaped cells,

although in reality, these assumptions are not tnie; each system will have to be evaluated

independently. It is a h assumed that the d-anival rate to each ceil is homogeneous

which is again not true since different cells have different dl arriva1 rates depending on

the users residing in.

One of the main advantages of the analytical k e w o r k presented in this paper is the

closed-fonn expression it provides for the cost of location management in terms of the

dl-arriva1 rate, boundary crossing rate, the size of the LA, the maximum acceptable

average pagiag delay, the total number of cells controlied by the MSC, etc., thereby

allowing valuable insight into the impact of each of these system parameters on the

overall cost of location management.

Y-Bing LUI:

Paper [4] studies a special case of AS called the Two-Location Aigorithm (TLA). It

analyzes the Signalhg System no. 7 (SS7) tranic cost of registration and cail deiivery for

a basic scheme based on IS41 and the TLA An analyticd approach assuming Poisson

cal1 arrivals and general roaming times in the LA was used to determine a probability

a(K), the probability that a mobile user moves across K LAS between two phone calls.

The evaluation of the algonthm uses different LA residence t h e distri'bution for different

termiwis and plots normaiized cost hctions, cornparhg the pmposed scheme with IS-

41 scheme.

The main advantage of this method is the reduction of Location Updates (LUS) whm a

mobile goes back and forth between two LAS. The algorithm shows that TLA can

outperform IS41 if the user mobility is higher than the c d muency or the user tends to

move back to the prevïously visited Location areas. But the performance of the TLA is

significantly lower than IS-41 when the variance of the LA resideace times is smaii.

Dynamic schernes ailow on-line adjustments based on the characteristics of each

individuai MT. For example, when the distance-based l d o n update scheme is used, a

diffèrent distance threshold clai be assigned to each hfï based on its mobility and cal1

mival pattern. However, some of these schemes require Monnation, such as the distance

between cells, tbat is not generally available to the MTs. Besides, the operaiion of

dynamic schemes may require signifiant computing power.

Anna Hac and Xmn Zhon:

In the evaluation of [SI, the metric used is total wst in terms of the subscriber's cali to

mobility ratio (incoming calls to Location @tes). Total cost is the surn of the total

searching and updating costs. The simulation results compare the total cost for the three

algorithms: always update, always search and the proposeci one, for a number of different

cal1 to mobfity ratios.

The proposed algorithm does not define the mabod to gather idonnation regarding the

m e n c y of a MT entering the c d . Another problem is the selection of reporthg ceils.

The problem of selecting reporthg centers is based on the volume of conîrol traftc about

the mobility of users and the fresuency with which they are located. If these rates change

dtamaticaüy, the reporthg centers have to be reseleaed It is suggested that in case of

reselection of reporting centers, a dynamic a i l d o n of the reporting centers is done, but

no mention is made of how to do this dynamic allocation.

The main advantage of this scheme is the reduction of total cost in finding the user and

the reduction in the consumption of the wireless channels The aigorithm to solve the

reporthg centers pmblem is well denwd and has the potential to simultaneously d u c e

the radio link bandwidth usage and fixed network sïgnaiing.

L. R Hu and SSR4ppopotî:

The analysis in [6] depends on the dwell the, definecl as the time the mobile terminal

stays within the LA of a given r e g i d o n level. The system uses multiple registraîion

levels to track the locations of MT. Based on the dweli time of an MT' in the previous LA,

an MT is switched to a suitable level for location management. Mobile terminais tracked

by the proposeci scheme are xen to gmerate signaling trafnc at a very stable rate over a

broad class of temiinal mobility. This feahm prevents the system fiom excessive

signalhg trasfic due to high mobiiity users and c m be w d to set the required long-tenn

totai sipnaüng trafic.

In the proposed scheme, thm are no nxed LA boundanes and, for each LA bouadary

cmssings, the mobile terminai is always plsced at the center of a new LA. Consequently,

three major benefits are &tain&

1. The location-updating iate is greatly nduced because a suitable LA is provideci for

each mobile, and the mobile temiinal is always placed at the center of a new L A

2. The location updating signahg traffic is evenly distributed because mobile terminais

roaming in the system wiil cross the LA boundary randomly at different cells.

3. The zigzag effect (muent updates) is elhinateci. Since the mobile terminai is always

placed at the center of a new LA on each location updating, it is unlikely to cross a LA

boundary shortiy a h an irpdating even ifits path is very inegularguiar

The proposed strategy considers homogeneous systems in temis of LA radius. In general

the ceus may have irregular shapes and different sizes. Extra computational compiexity is

required to calculate the dwell tirne.

Thomas Kunz and Jokn Seouriris:

The proposai in [7] attempts to utilize the mobility bistory of the submiber to

dynamically mate location areas for individual subscribers, and to dynaxnically

determine the most probable paghg a n a The mobility mode1 w d to evaluate the

proposed algorithm is based on activity theory bomwed fiom relattd work in trafnc

engineering and social science, and using raw &ta h m regional planning travel surveys.

in providing the lodo11 management cost savings, the dynamic algorithm requires some

additional logic and memory on the mobile station and network (base station a d o r

switch). In tmns of computation, the proposed algorithm requires the mobile station to

record the average time spent in each ceii, and the number of transitions h m one ceIl to

another- In addition, the comparison process whm entering a new ceil is more involved,

requiriag the cornparison of a ceil identifier against a lin of celi iéentifiers (the personal

location area), as opposed to the cornparison of a Location A m Identifier (LAI) aga* a

broadcast LAI. The numkr of cornparisons however is on the order of ten or twenty.

Another additional cost of the dynamic algorithm is the tmdssion of the usa profile to

the network. Only the information related to pghg needs to be ttansfkrrd This transfer

would genefauy be done during a location update, making use of the existing signalhg

c hannel.

Location Updoting W h Akrnotive Tri1pgers:

One of the advantage of non-LA-oriented methods is that the location updates can be

spread over vimially aii the cells of the network, resuiting in a more eveniy distributed

signaling load as cornpand to LA-oriented proposais, which would tend to cause a higher

(location updating) signaüng load rnainly on the LA borda cells.

Tl'me-Bared:

This strategy is simple and each mobile can update its location according to its local

clock. The advantage of this striategy is that the hquency of executing location update

process can be controllable regardles of movement of each subscriber, and update ma

does not jump compared with other strategies. Its drawback is its resource consumption,

which is user-independent and can be unnecessary if the user does not move for several

hours. A MT that mums to its starting location (the location where it had its last

interaction with the network) or a stationary MT will update its location while the

network aireaày knows this location.

One disadvantage of this strategy is that d e n a MT moves into and out of a particdar

ceil repeatedly (e-g.. a mobile located at the boundary of two ceils), it has to initiate an

update for every M boundaq crossings although no location update is necessary. Extra

logic and memory is required to be aware when the MT cross boundaries between ceiis.

The implementation of the distance-based strategy is more dinicult than the other two

since the mobile need information about the topology of the cellular network to derive the

distance information.

Centraiized Dofabase Architecture:

The centraüzed database structure that records al1 movements of MT in a central database

has a simple algorithm to locate the MT. However, its implementation is hpracticai

because the centraiized dataôase carmot support such a large number of M T s in a globai

system. With this scheme ail usem have to access only one central database in aIi

situations even if both the d e r and the c a k e are in the same location area, and thus it is

impractical to serve al1 users in real time using a single database, and it is impossible to

connect a cal1 in case that problems occur in an HLR Momver, the cost (Le., number of

operations in the daîabase) of an updaîe for a relocation is flxed, and does not depend on

the distance between the previous and cunent locations. For example, a movement within

a city and a movement to a new conrinent are treated the same, yet mmy movements are

likely to take place withh a city, while movements to another continent are rare. Due to

the dominahg disadvantages of cenealiad database architecture, most of today's

proposais are baseci on either the distributed or the hybrid database architemure.

Distributed Database Architecf ute: -- --

In Distributeci Daîabase Architecture, location information of the MTs is distributed

among a large number of location databases, organued as tree structure. The hierarchical

architecture helps to duce the total network signaüng t d 5 c and traveliing distance

when most calls received by the users and most regiçtration area crossings are

geographidly localized However, a large number of location databases have to be

accessed during location registration and cal1 delivery, *ch increases the wmplexity of

the management proceàure. For example, in a distributed algonthrin, ail related layer

nodes have to execute cornplex Iogic depending upon the received message type

whenever an update request or connection request is received. So the main drawbacks of

this architecture are the cost of database qstem acquisition, implementation, and

management. Momver, the performance of this architecture saongly depends on the

design of the tree structure and mobility characteristics of the users.

Jan Jannink, Derek hm, No~oyunaa Sivorkmw, Jennifrr Widom and DonaCd CC-

The analysis in [ I l ] depends on the L o d Cal1 to Mobiiiîy Ratio ('Cm) defined as the

numbei of caüs nom a particular switch to a pariicular subscriber, relative to the number

of moves of the subscriber in a given time period This ratio is computed to decide

whether to replicate the user profile at a set of or not sirh that the benefit of

local lookups at these databases outweighs the update cost due to the user's mobility.

From the simulations it is showed that more than 90% of the calls can be serviced by

local database lookups. The penalty paid for the latency improvement is an increase in

bandwidth requirement, and near doubling of memory requkements and update rates.

One of the desirable feature of 1111 is that instead of assumiag a nonrealistic mobility

model that incompletely characterizes human caüing and mobility penems, the authors

used a realistic call and movement model of the subscnirs to simulate accurately the

performance of the LMTs in a close approximation of a real geographical topology.

The algorithm for selecting databases where profile replicas are most advantageous to be

p l d is well defined. With the advances in fiber optic techwlogy and the dropphg of

storage prices, the flexiility of We-long numbering with fhst lodrups will become very

important.

P. Kkishrta ei al:

In the evaluation of 1141, the metnc used is total cost in texms of the suhcriber's cal1 to

mobiIity ratio. Total cost is the sum of average update cost, average search cost, and the

average search-update CO& The cost of a location @te and search is chamcterized by

the number of messages sent, size of messages and the distauce the messages need to

travel. Simulations were carried out to evaluate the @omurnce of various location

mamgment strategies.

The Logical Network Archi- (LNA) considercd in the proposal is a hicrarchical trec

structure consisting of BSs and MSCs which maintaias the idonnation of the MT

residing undemeath them. The paper does not discuss how to gather information

regarding the mobiity khavior of the users. It is assumeci that, initiaily, the location

information of the MTs is storeci in the corresponding MSCs i.e., each MSC shouid have

the coma location information for al1 the MTs residing in the celis in its subtree. It is

aIso assumeci that the message deIays in case of searcching the MT are negligible since

message delays are s m d l corn@ to the time ôetween cails and moves.

Considering the above assumptions, the authors showed that performing search-updates

significantly reciuced the search and total costs without significantly incteasing the cost of

updates. For the logical nehuork architecture assumed, it is shown that the combination of

L a y Updates (LUS) and Path Compression Updatte (PCU), namely LU-PC perfonns

better than the other strategies for most d-mobÿity patterns.

nie hybrid database structure wnsists of HLRs, whkh store the permanent MT

information within any network and VLRs in charge of roaming MTs in one or more

location areas. This can lower the congestion probability in the HLR somewhat but has

overheads in multiple àatabase operation because the VLR has to obtain Mïs idormation

fiom the old VLR and delete it in the old VLR Also, the access delay of VLR is not

negligible because the number of MT'S repinend in a VLR varies over time and al1

contents in the VLR have to be searcheci in order to query a MT'S infotmation-

Shivrikumru and W&wc

According to the scheme proposed in [15], user profiles are replicated at selected

locations for faster location loolarp. The replication decision is made by a centralized

system that must c o k t the rnobiüty and calling parameters of the whole user population

fiom time to tirne. This may not k feasible in current PCS networks because of the large

number of PCS network providers involved. Besides, generating and distributing the

replication decision for a large user population is a computationally intensive and time-

consuming process thaî may consume a significant amount of network bandwidth.

The algorithm is anaiytically compared to [24] and another similar approach, based on the

network query s k , and the location loolrup delay. An actual mobility mode1 is not used

to obtain any quantitative results, but raîher variables are used to represent the number of

location updates and the number of kcoming calls h m a particular zone, for generic

subscribers.

Chfi-Lin, Grcrpory P.PoUini and R i c k d D. GilCin:

In the evaluaîion of [lq, the metrics used is the radio link costs, nXed network signaling

load, and c d sencp delay. Conventional approaches iike GSM resewe voice tnmks pnor

to knowing whether a caii is successful or not. In Reverse Virtuai Cal1 setup, voice tnmks

are not reserved until the MT is found and willing to accept the call. Alternatively, the

called party may choose to have the c d routed to a voie mailbox or simply retum the

cal1 via a wired phone, if one is nearby. Thus in addition to sahg the umecessary tNnk

allocation, there is a s8ving in signalirig messages. The cail setup delay is shown to

reduced by about 50 percent when using RVC scheme.

The proposed RVC scheme is compared with the GSM scheme and it is shown that the

RVC c d setup delay is l e s than the GSM c d setup delay. Che of the features of the

RVC strategy is that it can fiinction within the existing cellular paging networic like

GSM. The page is sent as usual and may be acknowledged. However the originaîing

switch does not setup the cd, but instead, waits for a cail to amive h m the called party,

and then bridges the two connedon. Only a few new nxed network SS7 signaling

messages are needed to implement this pmtocol, which rrrr mentioned in the algorithm.

Josepk S. M. Ho und Jan E Akyildk

In 1171, the authors intmdiced a Location management scheme baseci on a three-1evel

database architectirn. The analysis depends on the Local Cal1 to Mobility Ratio (LCMR).

The signaling and database access overhead for cal1 delivery can be reduced if a remote

pointer exists at the DR of the calling MT. However, additional processing is required

after each movement to update the remote pointers. Similarly, the signaling and database

access overhead for location registration can be reduced if location change is reported to

the HLR only after inter-DA movements. However, this will incrrsse the database access

overhead for cal1 deüvery, as an additional DR access is necessary to locate a caüed MT.

The paper assumes that the cost for database access a d the cost for transmitting signaling

messages are available. An enhancement to the proposed location management scheme is

introduced which lowm the inter-DA movement probability and thus d t s in

additional reduction in the signahg and Aatahaîe access costs.

One of the features of the proposed algorithm mentioued by the authors is thet it can be

employed with the existing celiuiar system like I S 4 . The fiinctions of the network

elements iike HL& n R etc remain mostiy unchangeci M e the DRs handle additionai

processing. The papa gives a compatison of the IS41 scheme with the proposed one.

Based on the coa parameters considerd in the analysis, it is show tbat the signahg and

database access cost is reduced by as much as 70% and 50% re~pectively, cornpared to

the 1s-41 standard. The steps for implementing the algorithm are weil defineci in the

Pape=-

R Juin and Yi-Bùtg Lin:

In [18], a pointer-forwarding scheme with single HLR is proposed and is compared with

IS-41 scheme. When an incoming c d arrives in a single HLR environment, the

forwarding pointers are traced to fïnd the actual location of the MT. Each tirne a user

moves, the user's HLR mwt initiate updates to all the replicas of the user's profile, and

the network will have to cany the packets generated by the ripdates. Hence, the larger the

number of replicas, the more work perfonned by the HLR and the network. Because of

the heavy signaihg tratnc generated by PCS location tracking, the HLR may becorne a

bottieneck. An additionai consideration is the higher storage -ment of databases in

zones in order to store the replicated pmEiles.

The PFSHLR scheme ù cornpanxi to the IS41 scheme and it is pmved that when the cal1

fkquency is much lowa than the MT move fiequency (LCMR), pointer forwarding may

outperform IS41. When the caii îkquency is higher than the M ï moves fkequency,

pointer forwarding behaves identidly to IS-41.

In 1191 a pointer forwarding nrattgy has been proposed to avoid the expaisive HLR

access each t h e a mobile moves to a new LA. Since no regiseation to the HLR is

perfonned when a user moves to the new locations, the cost of updating multiple HLRs is

eiiminated in PFDHLR nius, the advantage of using distributed HLR for pointer

forwarding is obvious h m the aspect of database delay. However, it is Wcuit to

implement distributed HLRs in 1s-41. For MT registration, it may be required to update

some or aU HLRs. Thus, extra traffic is gewrated for multiple HLR updates.

The PFDHLR has some potential side effects. The length of the folwarding pointer chain

may inmease in a distributed HLR environment. Because of the distributed HLRs in

several regions, the total incoming d i s will be SM by ail HL&. Therefore, the

average cal1 arrivai rate in each distributed HLR is 1M times thai in PFSHLR, where N is

the number of HLRs. The reason why N divides the cail mival rate is due to the

assumption that the incoming calls are unifody shared by distn'buted HLRs. This

de- LCMR and the expected number of forwarding pointers increases significantiy.

Kuen-Lbg Sue piid CliKn-Chao Tse~g:

The analysis in [20] is the extension of the proposal in 1191. Similar to PFDHLR,

OSPFDHLR also incorporates the concept of dktributed HL& with pointer forwarding-

This strategy m p t s to migrate the locating c h a h in a distributed HLRs system when a

mobile issues a registration operation so that the forwarding pointer chah does not

exceed one.

The proposed stmtegy pmvides an upper bound on the location tracking tirne owing to

the fact that the length of any locathg path does not exceed one. Furthermore, obsolete

entries in local databases VLRs can be reclaimed in this strategy.

One disadvantage of the proposed algorithm is the increase in the data structure of each

entxy in K R . This data stn~ctwe depends on the number of distributed HLRs in the

cellular network. The more HL&, the bigger will be the data structure that will increase

the complexity of the system.

Another potential problem is that adjusting the forwarding pointers needs some extra

signaling capacity between VLRs. For a mobile which ofim moves across the LA

boundary, but does not frequently receive calls, wnsiderable sigoaüag capacity will be

wasted.

Kin & le un^ and Yonahm L m

One of the advantages of the proposal in 1211 is that c d setup time and response times

for signaling fiinctions cari be reduced. Due to the local availability of the necessary

customer data, tnuismission cost for signaling messages for calls originating nom the

visiteci country or region, and possibly signaüng resources can k saveci. However these

savings and the reduced load on the HDB have to be considemi together with the COS of

additional transmission and database management in the foreign region. Another fwor

thai can degrade the pclfonnance of the replicaîed design is the query-to-update ratio. If

the ratio is high (Le., the customer informaiion is seldom changed), the overhead in

updating the repli& records d l be minimal. Othewise (e-g., for a mobile customer

moving nom location to location), the upâate overhead can be signincaat

Locatîng mobile objects in a worldwide system requires a Scalable location service. An

object can be a telephone or a notebook cornputer, but also a data object (Web page may

move as its owner changes cornputers), a nle or an electronic document (a sharecl

electronic document may travel between its users). Another example is a mobile agent

that moves through the network in search of specific resources for its owner.

As mentioned earlïer, mobile radio communications raise two major problems. First, we

need to improve the signaling and querying efficiency of the network-side database.

Second, we need to reduce radio intediace signaling in temis of location ripdatiag and

paging. This thesis will focus on the second issue and compare the pedionnance of

several propos& on the basis of total signaling cost, i.e., location updaîing and paging

costs.

Several recent location management stratepies have been cummented upon in this

chapter. They al1 seem to have their own advantages and disaàvantages. Some are

reiatively easy to impiement, some might provide high signaüng savings on the d o

link, and some seem to be interesting h m a theoretidconcepniai point of view. At besf

the proposals above were evaluated based on some version of a random mobility model,

typically one-dimensional. CIearly, such simplifications for as critical a component of

location management as subscriber mobility is not satidactory. A random mobility model

fails to take into account certain aspects of travel such as trip purpose, and so-called

attraction zones, where people spend a large proportion of theu the. Random mobüity

rnodels may have provided a mugh model for certain early users of cellular telephones,

such as travelling salespersom, whose movements were fairly random. However, as

wireless technology increasingiy becornes a customer item, such mobility patterns will no

longer reflect reality. There is a aeed to anaiyze the performance of the proposed

strategies by using a more realistic user mobility behavior model iustead of the random

one.

Mer a carefui review of the above-mentioned schemes, severai proposals have been

selected for cornparison against the general goals of location management The reason for

selecting these proposais is that these strategies have the same goal of reducing the

signaiïng tranic due to location management procedures: location updating and paging.

The selection consists of thor proposais that can minimiie signaiing, both over radio

interface and within the network, to d u c e bandwidth usage and increase capacity with

least computational complexity. The paformance meesiaa that are considered in this

theses are the numba of location update messages, the nuxnber of celis paged, and the

total location management cost One of the desirable f m in the evaluaîion of these

aigorithms is that hstead of assuming a nonrealistic mobiïty model that incompletely

c- human mobility paaera~, realistic movement model of the subscribers is

used to simulaie accurateIy the performance of the locaîïon management techniques in a

close approximation of a reai geographical topology.

The select& location updating and paging algorithms for performance cornparison are as

follows:

+ Reprting Centers Algorithm [5].

Distance-Based Algorithm [9J

F W Locution Area Shtegy (a implemented in Cwent Cellulm Networks) [25].

The algorithm in [4] is the extension of Tabbane's proposal in [1] with a difference that

two locations are considered to track the location of the mobile user as compared to AS

which allows more than two user locations in the profile for each arbitrarydefmed time

period. The locations for the two most reccntly visited LAS are stored in the MT. Same

two LA addresses are also storeci in the HLR in an order depending upon the user's

movement Location update is only performed if the LA address of the new ce11 is not

fomd in the memoxy. ï'his may result in las location updating cost as compareci to the

GSM, especially when the user m o v a back and forth between two LAS. When a phone

cal1 arrives, the two addresses in the )ILR are used to fïnd the a d location of the MT.

I f the MT is located in the first @y, thm the paging cost for =A is the saw as the GSM

algorithm. ûtheLYYise extra penalty incurs in T'LA to locate the MT for the second try.

The proposal in [SI adckses the major poblem of reducing the use of radio fesources

for location updating d paging activitiesy thus miniminng the tratnc on the radio link

which is considered as the most rarce resource. The aigorithm in the paper uses a

partition scheme to optimize the size of the location area domain that mhhkes the total

cost for the entire network rather than for each individual user. A f k a carefiil sdection of

reporting centers (ceils with the lowest fkequency of mobile users), the MT is dowed to

transmit update messages only at these reporthg centers, while restricting every search

for the mobile user to a srnall subset of cells. Wbenever there is a need to establish

communication with a particuiar mobile usery the user is searched for in al1 cells that are

in the vicinity of the reporthg center to which the user fast reported. This may reduce the

signalhg cost in terms of location updating and paging.

Ideaily, the mobility tracking scherne used for each user shouid depend on the user's cal1

to mobility pattern, so the standard approach, in which al1 cells in the location area are

paged when a cali arrives, may be wastefûl of wireless resowces (especially if the user is

not very mobile and gets muent calls of short duration). In order to conserve these

resources, the network must have the capability to seiectively page to a gtoup of celis in

which the probability of fïnding the user is maximum. On the 0th hami, keepïng closer

track of the user's l d o n involves additional expendmires since the MT uses power for

iistening to the kacons broadcast by the radio c b e l (to detect changes in his location)

and for alerting the aetwork of a location change. These ~flections lead us to include the

Distance-Bad Strategy [9] for fiirtber evaluation. By using this strategy the system

knows that the user is within distance D h m the ce11 whae he has last rrported. This

may r e d t in l e s paging signaling in case of a c d mival. Also the user only has to send

a location update signal when he crosses the threshold distance D b m the ce11 where he

iast updated his Location. This wil l resuit in the signaihg reduction for location updating.

The location management stmtegies in [7] and [25] are seiected for cornparison purposes.

The algorithm in [7J is based on a dynamic selection of cells to fom a LA each thne a

user moves to a new ce11 and is clairrieci to be better than the GSM dgorithm. The GSM

approach is the digital cellular standard currently under use in Europe, and is based on a

staîic set of LAS. Due to the diverse nature, both of these algorithms will contribute in the

cornparison of the above mentioned proposais.

Chapter 4

Mobility Models and Experimental Setup

Location management has received a fair amount of attention recently, as higher capacity

cellular sysiems are king developed. As can be seen in the Iieyiew of different Location

management algorithms in Chapter 3, most authors have used simple random mobility

modeis to evaluate the performance of k i r proposais. To reflect the &y to &y

movements of actuai mobile users, a mobility mode1 may be needed which is more

redistic than a random mobility model. This chapter presents a realistic mobility rnodel

designed to simulaîe realistic mobility behavior patterns of the mobile users. A random

mobility model is also presented as most of the previous work is based on simplistic

models that incompletely characterize human mobility pattem. The two mobility models

will be used for the performance evaluation of selected proposais fiom Chapter 3. The

procedures used for computing the optimal parameter values for selected proposais are

also mentioned.

A mobiiity model, in the context of location management, is a model of the daily

movements of mobile subscnbers, or more precisely, the daily movements of registered

mobile stations. Such a model is of paramout importance in mobility management

midies. The number of paghg and location update messages, required for cornparisons of

the efficiency of different location management schemes, depends fiindamentally on wr

mobiiïty patterns. Thm have ken several proposais for location management algonthms

in the ment past mentioned in Chapter 3, to irnprove upon the current methoà of using

statically dehed location anas describeci in Chaptcr 2. In attempting to quantifi. the

performance of their proposais, most authors have used mobility models that are overly

simplified and unreaiistic, completely random, or dependent upon many assumed

%ypicai9 values for key variables.

DiEerent location management pposals nsct differently to the randomness of users

behavior. Random mobility models have been fhquently used in the past due to their

simplicity, and the faft that d y usm of cellular commUILications had typidly been

very mobile subscribers whose behavior could be reiatively weii modeled as random.

With the tremendous p w t h of cellular comrnUILiCations, random mobility modek are no

longer accurate for the majority of subsdbers, whose behavior is more mutine. A

random mobility model would cause very biased resuits for proposais that attempt to

utilize the behavioral aspacts of subscriber mobility, for example, the importance of home

and workplace as trip origins and destinations.

The mobility model that formed the bask of the simulation study is the same as presented

in 17. A brie€ overview of the mobility model is given hen. Interested readers axe

referred to 171 for a detailed description of the mobility model.

The mobility model description is followed by a description of our random mobility

model. As mentioned in the previous chapter, random mobüity models fail to take into

account certain observeci aspect of travel such as trip purpose, and places where people

spend a large proportion of their day, nich as home, office, etc. The selected proposals

will also be simulaiecl mder a random mobility model and a detailed cornparison is done

for the selected proposals under both mobility models. A description of selected

algorithms and theV implementation mder both mobility modeis foilows ne%

The goal of the mobility model is to provide, at the individual subscriber level, a set of

paths traversed on a daily basis. Using this informafion, location management algorithm

can be cornparrd accordhg to the relative number of location updates and paging

messages they generate. The mobility model used here is the activity-ôased mobility

model [q. The input data for this mobility model was derived h m the trip survey

conducted by the Regional Municipality of Waterloo in 1987. The driving parameter in

the model is the wncept of activity, which is equivalent to trip purpose. Each activity has

an associated time of the day, duration, and Iocation. An activity is selected based on the

previous activity and the cumnt time period- Once the next activity is selected, its

drwtion is determined h m chronologicaliy sorted trip nwey records, by calculating the

Merence between the arriva1 time of one trip record, and the deparhm t h e of the

following îrip -rd Finally the location of the activity is selected, based on certain

heuristics and type of activity. Since the current location of the submiber is already

known, once the location for the next activity is selected, the intermediate route (in terms

of cells crossed) is determined h m a geographicai lookup table. The subscnber stays in

the destination celï for the duration of activity, and the quence is repeated. As opposed

to a randorn mobility modei, w h m thae is no concept of subscribers with different

mobility patterns, four différent user groups are de- with different mobiiïty behavior.

As the model will be used to evaluate location management algorithms, a period of

several days will be sirnulated to allow the system to reach steady m e . The finai output

fiorn the model wül therefore be a list of celis traverseâ by an individual subscriber over

a period of several days, together with the amoiint of time spent in each c d .

In a random mobility model, a user moves to a neighboring cell with random and equal

probability. Two -11s are calied neighbo~g ceils if a mobile user c m move h m one of

them to another, without crossing any other c d . As opposed to the redistic mobility

model where four categories of person type were defineci, the analysis presenteû for the

random mobility model in the sequel will refa to a particular user (arbitrarily chosen).

According to the c d layout considered in this study, a ceil can have at the most six

neighboring cells. In a realistic mobility model a number of ceils may be crossed between

the origin and destinaton of a trip; the subscriber will spend some amount of t h e at the

destination, which wili likely be longer than the tirne spent in the intennediate cells. In a

random mobiiity model thm is no concept of destination celi, thus every next

neighboring cell is selected with equai probability. The d d o n for which a user stays in

a celï is selected randomly (ranging fiom O - 8 hours at the most).

A discrete event simulation schedules events in a queue to occur at certain times baseci on

a global clock, and these events are dequeued in chronologieal order and acteci upon

based on the event type. The occurrence of a particular type of event triggers a

corresponding fimctïon. The simulation is starteci with an initial aipgeneratïon event,

whose parameters are enterd by the user. The tripgeneration fûnction creates and queues

a set of cell-change events. A ceii-change function perfonns any location updating

fùnctions that may be triggered when a change of celi occurs. The tripgenemtion

function also mates and queues another tripgeneration ment

Cal1 arrivals are not mdeled using the typid Poisson arrivai proces, since the model is

not very realistic for individu81 subscribers receiving d s . A subscriber is much more

likely to receive a c d at 2 PM than at 2 AM, a fact not accoimted for by a Poisson model.

A dl-arriva1 hct ion generates and queues cal1 arrivais for the next 24 hours based on a

heuristic probability distribution for cal1 arrival tirne. The call-8RivaI fünction also

queues an event that will trigger the generation of the next set of cal1 arrivals.

For the reaiistic mobility model, four independent variables are used as inputs to the

simulation. Person type and work location variability parameterizes the mobility aspects,

while the number of daily cail arrivals aff'éct the location management algorithrns. For

each wmbination of the independent variables, a number of repetitions of the simuiation

are executed, each with a randomly selected set of intemat parameters (such as home

location).

For the random m o b ' i model, as there is no concept of user graups, home cell etc, the

only input is the number of incornkg a i ls . The tripgCIlCrafion event, ceiî-change eveat

and d l - h v a l event are the same for the random mobility model as for the rdistic

mobity model.

The simulation continues nmning mtil the master clock crosses a userdefineci threshold,

nominally set at 15 simulateci days. Outprit daaiIing l-*on apdatt and paging messages

generated by the différent location management algorithms is logged to extemal files,

which are analyzed by separate software.

4.4 Goals und Consttainis of fkc Algorihm

In Chapter 3, diffamt proposais w m compared agaïnst the general goals of location

management. These same goals form the basic requirements for the selection of the

selected algoriîbms. Certain trade-offs are necessary since many of the goals are

contradictory in practice. Priority was given to m h h k b g the bandwidth required for

location updates and paghg. Providing adequate quality of smice in tmns of cal1 setup

delay (due to p@ng delay), as well as preserving battcry Me, were dm given high

priority in the selection procedure. The description of the s e I d algorithms dong with

the e>q>erimental setup of both models for the aigorithms follows.

Anna Huc arid Xhn Z l t o ~

The proposal by Anna Hac [SI is based on minimizing the total signaling cost for the

entire network rather than for each individuai user or wr group. Since each user group

has its own characteristics and mobility patîems, each cell has a diffaent fkquency with

which the mobile users enter that ceIl. The fkquency with which the mobile w r s enter a

cell corresponds to the updating cost for the di. The higher the fkquency, the higher the

updating cost. The problem is how to choose the ce& as reportkg centers to mhhize

the total location management COS, Le., both updating and searching cost The concept of

total location mauagement cost is a way to observe the o v d effects and behavior of

different algorithms and is defïned in detail in the next chapter. Here it can be thought of

as linear combination of the number of location iipdatiag and paging messages. To cope

with the pmblem of reporting centers selection, the foiiowing approach is used.

To calculate the fiequency with whïch the mobile users enter the ce11 in the redistic

mobility mode1 simulations were nui for di f f int sets of input parameters and the output

results h m the simulations were used to evaiuate the movement of simulated subscribers

on a per ce11 basis. The rnovements and messages generated by each subscriber dong

with the path taken were Logged for 15 simulated days. For each combination of the two

independent variables @emn type, fixed work location) that parameteriz the mobility

aspects, one hmdred repetitions were run each with a randomly selected set of i n t d

parameters (initial start time, location of home, work, and school). Output detaihg the

path traversed by the subscribers dong with the fkcpency of subscriber entering in each

ceii is logged to an externa1 me. The fiquenies with which usen enter each ceIl were

added togetheq which gives the total tiequency at which al1 mobile users enter the cell.

The cek with the highest fkquency were sel& as non-reportuig centers by making

use of the reporthg center selection algorithrn mentioncd in [SI.

Simulations were nin with diffêrent values of vicinity Z for différent sets of input

panuneters and the output is logged to an extemal file for total location management con

caicdation. For each set of controlled variables (person type, fked work location,

maximai vicinity size @=3.4,5, f), and number of daily call dvals), ten repetitions

w m run, each with a differetlt set of internai parameters (initial start tirne, location of

home, wock, and school). The number of location updates and pages were tabulated, for

each Metent set of controiied vanables and the total cost was calculateci. From Figure

4.1, it c m be seen that the costs are relaîively independent of Z as diffêrent values of Z

Figure 4.1: Total Lacaîion Mimagement Cost d e r the Redistic MoOiMy Model for

Z = 3,4,5,6,7

give very similar @ormance- Thus the one giving the minimum location management

cost, Z = 5, is selected as the laqest vicinity SUC for final simulations.

In case of out random mobility model, as there is no concept of user groups and

destination tek, the concept of calculating the fkquency of mobile users in the ceiis

ciiffers h m the distic mobility model. As in the realisac mobility model, a user

traversed the shortest path in travelling fiom cell a to cell b and the number of times he

crosses each ceU is counted- In the random mobility model, the destination ceii can only

be one of the ne ighbo~g cells of the cell in which the subscriber cumntiy resides in.

The fhquency with which mobile users enter the -11s depends upon the number of times

the cell is selected as the next cell. Thus for calcuiating the fkequency, one thousand

repetitions were simdated five times. Out of five thousand simulation results, the in-ce11

fkequency was calculated.

After the fkquency calculation, the algorithm in [SI is used again for reporthg center

selection. Simulations were nm for d i n i n t values of vicinity (Z = I , 2,3,4,5,6,7). AArr a

carefiil review of al1 the results, Z = 2 was selected as the maximum vicinity size for the

random mobility model (Figwe 42). The cost difference between realistic and random

mobility model (Figwe 4-2 vs. Figure 4.2) results is due to the fact that unda a d is t ic

mobility model a user has to cross several cells to reach to the destination. Under the

random mobility model, the same ceiis can be reselected each thne as the destination ce11

so the user can keep moving betwan two celis which cm be in the vicinity of the same

reporthg cell.

Figure 4.2: Total Locatkm Mimagement Cost undet the Rudom Mobility M i e 2 for

2 = l,2,3,4,5,6,7

F M Loccrtian Area Sdrofw (a ih@kmetcd in Cment CeUuiar Nè!uorks):

In the Fixed Location Asea strategy [25], a N-cell system is panitioned into static location

areas- The mapping h m ceIl to location area is fixed. Location areas can have different

numbers of cells, dependhg on the number of mobile users and geographicai proxïmity.

A mobile initiates a location update when it moves h m one LA to another. in 171 four

Merent locations area groups were compared using the rdstic mobility model. Afkr a

carefiil review of the redts in [A, the location area mapping givhg the best results is

selected. The selected scheme partitions the 45 radio cells into total of eleven location

areas, with three to five cells in each.

Y-Bing LUI:

The LA mapping for the TLA schmie [4] is the same as that of the fked location area

strategy. TLA is implemmted by modifyiog the nxed location ana strategy. The

modifications were doae in two places. Fkt , one more field is added to the subscriber's

location record in the main database to hold the address of the second location area

Second, a few changes wcn made to the MT record to e x d s e TLA.

Dktance-Based Algorilkm*

In the DistanceBaseci Method [9], a MT @omis a location update when its distance

fkom the cell where it @ o d the last location update exceeds a predefhed value T

(this distance value is referred to as the distance threshold). To select the threshold

distance for the tealistic mobility modei, simulations were run with différent threshold T

values and the output is logged to an extemai file for total cost calculation. For each set of

controlled variables @erson type, nXed work location, tbreshold distance (T =

l.2.3.4.5.8.I O), and number of daily c d arrivais), ten tepetitions were nm, each with a

different set of interrial parameters (initiai start time, location of home, work, and school).

The number of location updates and pages were tabulsted for each set of contrdled

variables. From Figure 4.3, it can be seen thaî both T = 2 and T = 3 have very Nnilar

px50rmance, with T = 3 perforiniag slightly better. So a threshold value of T = 3 is

selected that gives the minimum location management CO&

Figure 4.3: Total Location Mànagement Cost under the ReaIistic Mobility Mode1 for

T = I,î,3,4,5,6,7

For the random mobility modei, fifieen simulations were nm with the différent values of

threshold distance (T = 1.2.3,4,5,8,10) and the total location management cost is

calculated, The resuits show that T = 1 and T = 2 resuits in the minimum values of the

total location management con showing very simiiar results (Figure 4.4). So T = 2 is

selected for final simulations.

Dyriamic Locatbn Management A&oriikrn=

The Dynamic Location Management Algorithm [q atternpts to u t i k the mobility

history of the subscribcr to dynamicaliy create location areas for individuai subsCnbers.

and to dynamidly determine the moa probable p@ng area The system starts with an

empty history record and develops a mobility history as the subscribers traversed baween

ceiis. The mobility history consists of the number of transitions the subscnba has made

Figure 4.4: Total Location Mmiogement Cost under the Random MobiZity Model

for T = 1,2,3,4,5,6,7

fkom ceil to ce& and the average duration of visits to each c d . A set of cells is selected

for the new location ana, S U C ~ that the probab'itty of the subscriber subsequently

roamhg within those cells is sufïïcientiy hia. For an incoming cd, the subset of the

location area where the subscriber is most iïkely to be found is paged first, based on the

subscrïber's average visit duration in each ceil.

An efficient mobiie location tracking sïrategy should minimize the combined cost of

paging and location update. This combined cost depends on a mobile's mobility as well

as its inwrning cail mival rate. Two mobility models, realistic mobility mode1 and

random mobility mcxicl, are prescnted that are used to simulate the mobility patterns of

the mobile users. The nalistic mobility mode1 is implemented to simulate the daiiy

movements of mobile subacribers (in temis of a sequence of radio cells), incorporatïng

reaiistic, hdividuaiized activity patterns and geographid focal points. The model is used

as a tool for cornparison of the selected proposais. A random mobility model is also

implemented as most authors have used some version of a random mobility modei for

performance evaluation of their proposai. Simulations were perfonned to analyze the key

performance pmneters of seiectcd dgoritbms under both moôility mdels. The NO

mobility m&Is wïil be used for the performance evaluation of the selected location

management algorithms.

Chapter 5

Performance Analysis

The selected location management algorithms are compareci in this chapter, primarify in

temis of radio bandwidth efficiency. As discussed in the previous chapters, one of the

most important goals of location management algorithms is efficient utiiization of radio

spectrum, which is a fixed and limîted resource. Maintabhg the number of location

updating and peging messages that m m be transmitted across the radio interface can

satisfy this requirement. Simulations are pafonned to analyze the performance of the

selected location management strategies. Results wii i be obtained for both realistic and

random mobility models. Statisticai analysis is performed to compare the performance of

selected algorithms under botb mobility models. The need for statistical output analysis is

based on the observation that the output data h m the simulation exhibits random

variabiiity when random number generators are used to produce the values of the input

variables; that is, two Merent streams of random numbers will produce two sets of

outputs which (pmbably) wiil ciiffer.

5.1 Description of Data and Procedures

The analysis involved performance evaluation of location management algorithau under

both reaiistic and =dom mobility models. The original output h m the mobility models

provided detaüs about paging and location update messages generated over time by a

91

simulated subscnber, for each select& algorithm. For the d is t ic mobility model, the

movements and messages genciated by each subscriber was logged for 15 simuiated

days an interval assumecl at the outset to be long enough for the model to reach steady

state. For each set of controlied variables (person type, fixed wodc location, and number

of daily call arrivals), thirty repetitions wcrr nin, each with a different set of internai

parameters (initial start tirne, location of home, woik, and schooi). The number of

location updates and pages were tabulateci, per simulated day, for each different algorithm

and for each &fiirent set of oontrolled variables. O v d , there were 120 parameter

combinations (4 person types x 2 fixed work location states x 3 daily call arrival levels x

5 algorithms) with 30 repetitions for each combination, for a total of 3600 individual

mns.

As in the realistic mobility model, the movemems and messages generated by a

subscriber in the random mobility model were also logged for 15 days. Thüty repetitions

were nui for a Merent vaiue of daily calI arrivals and a different initial start time. The

number of location updates and pages were tabulateci, per simulatecl &y, for each

different algorithm and for different cal1 arrivai rates. Overall, there were 15 parameter

combinations (3 daily di arriva1 levels x 5 algorithms) with 30 repetitions for each

combination, for a total of 450 individual mm.

Due to the number of independmt and dependent variables and the wmplexity of the

data, statistid adysis on the data was deliberately kept simple. Various meam,

standard deviations, and COIlfidcnce intervals at a 99% confidence level are calculateci

using MicroJOft Excel. Caiculation of confidence intervals helped evaiuating the

pe~omiance of the sel& algorithms. If the mean cost matrk of one aigorithm is better

than that of others and their respective confidence intervais do not ovalap than, based on

the data at han4 there is a strong statistical evidence that this algorithm is better than the

other. If there is an overiapping of the confidence intemals, then there is no strong

statistlcal evidence that one system design is better than the other a d the two rtlgonthms

show very similar pedomurnce.

5.2 Comparison of Locaion Managemien f-Re fated Signoling

The average number of location update and paging messages generated by the different

algorithms were compared. The total location management cost a rsther abstract but very

signifïcant concepf was also calculateci and used to compare the overail performance of

the algoritbms under both mobility models.

5.2.1 Overd Average Performunce

Location Ujdating:

The graph in Figure ' i l shows the cumulative number of location @te messages for

different algorithm averaged over al1 relevant variables @cm type and nXed work

location) for the realistic mobility model. It shows the overall relationship between

selected algorithms. Tnt reporting center sûategy performed the worse. This is evident

from the fkct that the reporthg centers are fked baseci on the reporthg center selection

Figure 5-1: Global Average N w n k of Location U w e s versus Elapsed Time under

the Realistic Mobility Mo&

algorithm mentioued in Chapter 4, and not created dynamidiy based on the mobility

behavior of the subscribers. According to the network topology used in this study, some

of the reporthg centers have a vicinity size of one, thus generating a lot of update

messages if the subscnbr traverses dong a path containhg these ceiis. The fixed

location area stmtegy better than the reporthg center strategy but worse than

distance-based strategy. As expected, the TLA strategy perfonned better than the fked

location area strategy which shows that the mobile users tend to move back to the

previously visited location area.

The dynamic location area strategy gives the best resuit. The 'leaming curve' associated

with the dynamic algorithm is clearly visible on the graph, As time progresses, the user

profile is able to provide better information for ceU selection. At first the results of the

TLA algorithm w m betkr than the dynamïc algonthm, but the dynamic stratcgy star&

performing betta &et six elapsed days, and the @ormance gap increased as time

Table 5.1 Mer demonstrates the results in Figure 5.1, showing the means, standard

deviations and 99% confidence intervals of al1 the five selemd algoritbms for the total

n u m k of location updates sent under the distic mobility model. It is clear h m the

table that there is stmng statistical evidence that dynamic algonthm is better than the rest

of the dgorithms.

Table 5.1: 99A Conmnce Interval Estimation ofhcation Urnes un&t the Realistic

MobiIity Mo&Z

Reporting Cemter

Tw*hmtion

Fid LA

Dyrrimic Algorithm

DiSena+pI.rA

The graph in Figure 5.2 shows that the two-location algorithm pdormed better than the

dynamic algonthm under the random mobüity model. It was expected, since the

randomness of cells visited does not aliow usefùi user profiles to be wiistru*cd for the

dynamic algorithm. For the two-hation strategy, the next sel& cell can be in the

same location ana as the previous ce& or the addnss of its location arcs is already

Man

138.48

118.76

135.88

100.08

125.45

StdDcv

44.95

3920

3828

26.88

34.45

99% Confidence Inîenrl '

[131.01- 145.951

[Il224 - 125.281 [12931- 1424

[95.61 - 104.551 [1i9.72 - 13 1-18]

present in the main memory as the last witcd LA, thus reducing the number of location

updates.

The reporting center algorithm pedormed the worse again for the same reason as

explained above. The nxcd location area strategy perfomed better under the =dom

mobility model than under the rralistic mobility model. This can be explained by

reasoning M a r to tk tw01Iocatiioa aigorithm case.

Figure 5.2: Global Average Number of Location CIpdms versus EZapsed Time under

the Random Mobility Madei

The number of location @tes gencratcd by every aigorithm under the randorn mobiiity

model are ais0 analyzed statistidy by caicuiating the means, standard deviations and

99% confidence intervals (Table 5-2). The resuits show m n g statisticai evidence that the

two-location aigorithm pedormed extremeiy weii, while the reporting center algorithm

Table 5.2: 99% Confidence lntmul Estimation of Location Upcims under the Radom

Mobility MO&I

The overail average number of cells paged is shown in Figures 5-3, 5-4, 5.5. und 5.6 for

levels of 6 and 12 incoming calls per day, rrspectively under both mobility models.

Under the realïstic mobility model, the resuits d e almoa linearly with the ciiffernit

incoming call levels, indieating that the dynamic paging algorithm performs better

relative to other algorithms regardes of paging load Dining the fïrst few days, while the

user profile is king compiled, the performance of the d y d c algorithm was somewhat

worse than other selected algorithm, as the reporting centa algorithm perfomed the

best,

This gap, however, typically disappeared a h 2 elapsed days after which the

performance of the dynamic algorithm is the bm The distance-based algorithm perfom

the worst for both incoming d l levels. This is evident h m the f e that if the mobile

user is not located in the neighboring ceiis in the first m g try, then extra pcnaiiy has to

be paid by paging ail the cells Mder the threshold distance T = 3.

Figure 5.3: Global Average Nmber of Cells Paged for 6 Imoming Ca& versus

EIapsed Time under the Realistic Mobility Mode1

Figwe 5.4: Global Average Nwnber of Celh Paged for 22 Ihcoming CaUs versur

EIapsed Time under the Realistic Mobiliîy Mo&Z

Figure 5.5: Global Average Number of Cells Pagedfor 6 Incornittg Calls v e r m

Elapsed Time d e r the Rondom Mobilis, Mode1

Under the random mobility mode], the reporting center strategy performs the best and the

two-location algorithm and dynamic algorithms perform the worst. For the dynamic

strategy, it was expected, since the randomness of ceUs visited does not aiiow usefiil user

profiles to be constructed and most of the tirne a large location area (whose maximum

size is bound by the algorithm) is selected as paging area. For the two-location algorithm,

its poor pe&onnance was also expected since if the user is not located in the fint try,

extra penaity incuis to locate the user for the second try, that is, the paging messages are

sent to the second LA in the memory.

Figure 5.6: Global Average Number of Cells Pagedfir 12 Incoming Calls versus

Elapsed Time Mder the R&m Mobility Modd

Despite the poor perfiorrnauce of the reporthg center algorithm with respect to the

number of location upâate messages sent under the random mobility model, its paging

cos is the minimum for both levels of incoming calls. This was somewhat expecteà. as

the number of cens paged in case of an incoming cal1 are amiost two.

The statisticai analysis for the number of ceiis paged for levels of 6 to 12 incoming calls

per &y d e r both mobility moàels is shown in Tables 5.3. 5.4, 5.5 and 5.6. For both

levels of incoming d s under the realistic mobility model, t h e is strong evidence that

the dynamic algorithm performs significantiy better while the distance-based algorithm

performs the worse (Table: 5.3,5.4).

Table 5.3: 99% Confdeence Interval Estimation of Number of CeZls Paged for 6 Incoming

Calk unrier the Redistic MobiZity Mode1

Table 5.4: 99% CoIrfidence Interval Estimahion of Nmber of Cells Pagedfor 12

Incoming Calls d e r the ReaZistic Mobility Mode1

Dynrmie Aigorithm L

D i t a n c ~ ~

Under the random mobility mode1 the statisticai analysis provides strong evidence that

the reporting center algorithm perform better than the other algorithms as its mean

403.9 1

849.75

number of ceUs paged is smaller for both levels of 6 (Toble 5.5) and 12 (Table 5-6)

incoming calls. Since there is overiapping between the confidence intervals of the

91-96

197.48

dynamic algorithm and the WO-location algorith, there is no signiscant diabence

l388.62 - 41 9.21

[8 1 6.92 - 882.581

between the resuIts of these two, but they are clearly the worst performers.

Table 5.5: 999 ConjWonn Inremal Esn'manon of Number of Cells Paged for 6 Ineoming

CalZs under the Random Mobility Mode1

Table 5.6: 99% Confidence Intemal Estimution of Nmber of Celk Paged for 12

hcoming Calls under the Radom Mobility Mode1

5.2.2 Total Locatio~ Managememt Cosl

The dynamic scheme performs best for location upâates and paging under the realistic

mobility model. Under the random mobiity model, the two-location strategy performs

best for location updates, but is nearly worse for pages dong with the dyaamic strategy,

due to trade-off between efficient location updating and p-g, while the reporthg center

strategy performs the best because of smaU paging area sizes. The total location

management cost defined in the Chapter 4 as the lin= combination of the number of

location iipiating end paghg messages, is a way to observe the o v d effects and

behavior of diffaent algorithms. It c m k defined in severai ways, such as the total

number of sigding messages crossing a specific interfkce, or the total size in bytes of al1

exchanged signaling messages. Some authors nmply rrpcsent cost as an abstract

constant- in this anaiysis, an intermediate approach has been taken, which is quantitative,

yet not limiteci to a specific technology. The location management cost is given by:

Nh is the number of location upâate messages generated, Np is the number of ceils paged

as a result of an incoming di, and c is a constant mpresenting the relative wst of updates

to pages. Since a location update is a much more expensive procedure in terms of

signaling t h pages, the two repmentative values of c are taken as 5 and 10. These

values ate somewhat arbitrary, but represent the approximate sUe and number of

signaiing messages required by a Location update amparrd to a paging message.

Signincant ciifferences in the relative cost of different algorithms mise as the number of

incornhg cal1 increases under the realistic mobility model- For relative wst c = 5, and 6

incoming caIls per &y (Figure 57), the distance-based dgorithm, reporting center

algorithm and the fixed location a m aigorithm have v 9 similar performance and incur

the highest costs. This is due to the excessive updatiag and paging costs r e q d by these

D Y -

O 1 2 3 4 5 6 7 8 9 1 0 1 1 1 2 1 3 1 4 1 5

Dey. Elrpœd

Figure 5.7: GlobaI Totd Location Mimagement Cos? (c = 5) for 6 lncoming Culls versais

Elapsed Time d e r the RealistÏc MobiIity Mo&

The dynamic algorithm outpedorms ail other algorithrns after a brief ' l e h g curve' of

about three elapsed days This was expected since the dynamic algorithm produced the

least location iipdate and paging messages. As the number of incoming cails increases

(Figue 5.8)' the gap between the dynamic algorithm and the other dgorithms increases.

Figure 5.8: Global Total Location Management Cost (c = 5) for 12 Incoming Calls

versur EZapsed Time d e r the Realistic Mobiliw Mode2

For a relatively larger cost of updaîes (c = IO), the worst performers are still the distance-

based, reporting centers and fbced location algorithm (Figures 5.9 ond 5.10) for both 6

and 12 levels of incornhg caiis. This was not surpnsing, since updates are relatively more

expensive, and these algorithms generate by far the largest number of updates. As before,

the two-location aigorithm e o r m s better thsn the other three but worse than the

dynamic algorithm. The two-location algorithm with corzesponding low rates of updates,

starts out the best of ail algorithms, but its large paging cost causes total cost to rise

significantly with a higher level of incoming calls.

The dynamic algorithm again outperforms the other algorithms, after a 'Learning c w e 7 of

two to three &YS. The gap between the total cost of the dynsmic and the other algorithms

is even pater for c = 10, since the updating efficiency of the dynamic algorithm

Figure 5.9: Globd Total Locution Mmgement Cosf (c = l O) for 6 Inconhg CaZZs

versus Elizpseed Time undet the Realistic Mobiliîy Mo&

Figure 5. IO: Global Total Location Mariagement Cost (c = IO) for 22 Incoming Ca&

versus Elapsed T h e un&r the Realistic Mobility Mdel

becomes even more important.

The statistifal analysis of the total location management c ~ a for c = 5 and c = 10, for 6

and 12 incornhg CSUS per day under the redistic mobility mode1 is show in Tables 5.7,

5.8, 5.9 and S. 1 O.

1 M a n I Stdïkv 1 99% Coafïàence Interval 1

Table 5.7: 99% Conjîdence Intewd fitimatzmanon of Tot& Location M i g e m e n t Cost for

c = 5 and 6 Incorning CaiIs under t h Redistic Mobilily Mudei

I M a i 1 Stdïkv 1 9!W6 Confdcciee Interval

Table 5.8: 9909 Confidence Interval Esn'mation of Tot& Location Management Cost for

C Dyaamic Algorithm

DUC.~tze-Bad

91 1.48

1492.85

181.44

23220

188 1 32 - 94 1 -641

11454.25 - 153 1 -451

Table 5.9: 99% C 0 n t . e Interval Estimution of Total Locaiion Management Cosrfor

c = 10 anà 6 Incoming Calk under the Realistic MobiZity M&

Table 5. IO: 9909 Coqfidence Intmai Estimation of Toid Locuiion Munagement Cost for

c = 10 und 22 Incoming CaZh Mder the Realistic Mobility Mo&Z

r

Reporting Ccater

TWO-Lmation

It can be seen that there is stmng statistïcal evidmce îhat the dynamic algorithm @omis

signincantly better than other algorithms while reporthg center, fixai LA and distance-

Man

2 124.98

1932.65

based sttategies perforrn worst for both levels of incoming calls.

Under the random mobility model, the relative performance of al1 algonduns is nearly

StdDev

453-42

369.45

opposite to their relative pedomiance under the realistic mobility model. For relative m s t

99% Coafdcice IntervaJ

c2049.6 - 220036] [la71 23 - 1994.07]

c = S and 6 incoming caLIs per day Figure S.II) , the dynamic algorithm that

outperforrned al1 the other algorithms under the reaiistic mobility model incurs the

highest cost This is due to the excessive paging cost i n c d by this algorith, which is

not offset by its inherently low upâating COS. This is expected, since the dynamic

algorithm rqu ires construction of the user profile that depends on the movement of the

mobile user. But in the random mobility model, the randomness of ceb visited did not

d o w usehi user profiles to be constructeci. The reporthg anter strategy that performed

the worst mder the distic mobilïty mode1 gives the best d t s unda the mndom

mobility model. This resuits h m the relatively low paging cost, and the gap increases as

more incoming calls arrive (Figure 5.12).

Figure 5.1 1: GIobd Total Location Mimagement Cos? (c = 5) for 6 Incoming C d s

versus EZqsed Time Meier the R-m MobiZiîy Model

Figure 5. I2: Global Tord Location Mànagemew Cost (c = 5) for I2 Incoming CalZs

versus Elapsed The under the Random Mobility Model

The performance of the distance-baxd strategy, which is initially not good but better than

the dynamic, the mm-location and the fïxed LA strategies for 6 incoming c d arrivais,

shows quite good resdts for increasing cal1 mivals. This is expected, since it perfoms

better in tmns of paging cost, which fomis an important proportion of the total cost for a

value of 5 for relative cost c. The @ormance of the two-location strategy, *ch was

better than the dyaamic and the fixed location area strategies due to its low location

update rate, reacbes the same as that of the dynamic sttategy as its large paging cost

causes total cos to rise signifïcantiy with a higher Level of inwming caiis.

For relatively more expensive updates (c = IO), the two-location algorithm is the least

expensive algonthm for 6 incoming calls (Figure 5. I3), but is overtaken by the reporthg

center strategy as the nimiber of incoming d s inmeases (Figure 5-24). This is because

the two location algorithm incurs low nites of updates and shows the best d t for l e s

incoming caiis, but its large pagine cost causes total cost to rise significantly with higher

levels of incoming calls.

Figure 5.13: Global Total Location Managernent Cost (c = 10) for 6 Incoming Calls

versus EZapsed The M e r the R&m Mobiiity Mudel

Figure 5.14: Global Total L m o n Munugement Cost (c = IO) for 12 Incoming Calk

versus Elupsed T h e un&r the R d o m Mobilily M&l

The statisticai analysis rcsults for c = 5 and c = 10, and 6 and 12 incorning d s per &y

under the random mobüity mode1 are shown in Tables 5.1 1. 5.12, 5.13 and 5.14. It can be

seen that for c = 5 and both 6 and 12 incoming c d s pet day, there is a strong statistical

evidence that the reporthg center strategy is ktter than the other algorithmî. On the same

statistical grounds it is evident îhaî the dynamic aigorithm is the worst performer under

the random mobiiity mode1 for the levels of 6 and 12 inooming caUs per &y and a

relatively smaii @te cust multiplier (c = 5).

Table 5.11: 99% Cor$dence Intervd Estimation of Tot& Locatzon Mimagement Cost for

c = 5 and 6 Incoming CulZs tmdor the RCUICiOm Mobiliîy Mo&

For a larger relative cost of updates (C = IO), the statistical d y s i s shows that the two-

location algonthm is bater than the rest of algorithm for 6 incornhg calls per &y while

for 12 incoming caiis per day the reporting center strategy proves to be the best.

Table 5-1 2: 99% ConEci;ence Interval Estimation of Total Location Mmgemenf Cost for

c = 5 and 12 Incorning C a k Mdol the Radom Mobüiry Mo&[

Table 5.13.- 9909 Cottjidence Interval Estinmiion of Total Location Mimagement Cost for

t

b

Repartibg Cater , T w o - m t b a

Table 5.14: 99% Confidence Interva2 Esrimution of Totd Location Mimagemeni Cost for

Mau

872.83

765.43

Reporting Cemttr

Two-lmcrtioa

FU^ LA

Dynrmic Algorithm

DUt.a~c-R.uri

StdDcv

5732

4736

Mean

1056.83

1228.8

1247.73

1323.87

1 1345

- 99% CooMemœ Intervil l

[845-88 - 899.781

[743,16 - 787.71

StdDev

53.78

68.57

67.42

94.57

78.6 1

99.k Confdence interval

[103155 - 1082.1 11 I

[11%.56 - 1261 -041

[12 16.03 - 1279,431

[1279.4 - 1 368341 I

[1097.44 - 1 17 1-46]

Chapter 6

Conclusions and Future Work

The increased demand for wireless mobile communicatio11~, coupled with the finite

available spectrum, ha, motivated investigation into altemaiive methods of tracking users

and delivering calls. A mobility management scheme that reduces signalhg aaffic load

and comection setq tirne is a pivotal issue in designing funire Personal Communication

Semce (PCS) networks to sati* Quality of Service requirements and to use network

resources efficiently. Particularly required is scalable mobility management, to meet the

explosive growth in number of users for the cumnt second-generation wireless

communication systems, and to materialize PCS concepts such as terminal, personal, and

service mobility. Many mobility management schemes have been proposed for the

reduction of signaiing aff ic. However, these schemes have not been sunicientiy

compared using a unified performance rncwrr that is fitae of assumptions as to mobility

mode1 or architecture.

6.1 Concfusions

In this thesis, we categorized the various mobility management schemes and cl- the

appropriate domain for each type. Some proposais were selected for fiuiher evduations

that are based on reducing the signaüng traac over the winless networks.

Two mobility models form the basis for comparative performance analysis in this thesis-

The f h t was a realistic, rneasurement-based, place and tirnedependent individuai

rnobility model to simulste the mobility behavior of actuai people. The second was a

random rnobiiity model based on simplified m p t i o n , such as a UZUform distribution of

the direction of travel for each mobile subscriber, as king used in a nmber of proposed

schemes. We analyzed the peiformance of each one of the five selected strategies under

both mobility models, and showed the performance d i f fmnas between the strategies. in

the realistic mobility model, overall, the dynamic algorithm significantly lowers the

location management costs, in terms of signaling messages generated, for al1 parameters

examinecl and the distance-based strategy is the worst one. In the random mobility model,

no single proposal shows consistent superior performance. In general, the reporthg center

strategy seems the best, while the dynamic strategy performed the worst-

From the results it is clear that the rnobility model has a significant impact a d the results

descfibed in various schemes using a random mobiiity model may not seflect the dative

perfomance when deploying schemes in actuai systems-

In this thesis we bave examined the impact of Location update and paging messages on

the radio inte-- These waluations have been made with a fbture wireless network

fkmework in min& ushg d s t i c and random mobility models for user movcments. The

seiection of algonthms was based on th assumptions that the RJource usage on the air

interface is of primary importance. ïhe signaling co~lsumes scarce fixed radio bandwidth,

and thus must be kcpt to a minimum. Anothcr impact of the location updstes k noticed at

the VLR/HLR side, where the transaction rates can be very high and may be a cause of

either saturation or reduction of the processing power dedicated to providing

sophisticated services to the subscrïbers. One area of fiture reseamh is to analyze the

performance of the different proposais undcr both mobility moâels on the basis of

database transactions, the processing overheads associated with them, the amount of

memory required, etc.

For the analysis of the selected proposais it was assumeci that the location update

messages are the major contributor to the total location management cost while the

number of incoming calls are wnsidered fixed for each set of readings. As can be seen in

Chapter 5, d l amvals also influence the performance of the location management

schemes especially when the mbscriber is not very mobile or receives a lot ofcalls during

roaming. Another fuhae set of experiments is to use redistic cal1 arrivd data dong with

reaiistic mobility patterns in order to thoroughly evaluate the xlected algorithm.

The model used here in this thesis tries to incorporate the structure of daily travel patterns

of the mobile users without making use of much simplifkd assumptions. Some of the

assumptions considered in this model are the notion of axed home and school cells. But

in reaiity, these ceiis may be different if the subscrii rnoves to a home (in a different

ceii). The question is that how d d e d do mobility models have to be? How to extend or

modify the mobility model to answer "WHAT-Iï" questions? For example, what wiil be

the effect on the system performance if we add another user group, such as school going

childrni? If we do not want îo make any simpl@ng assunptions, we can a l t d v e l y

collect traces of the actual movement of the mobile users h m a real life system. In this

way, we do not have to caîegorize mobile users into user groups and therefore we avoid

simplifjring assumptions that resuit h m the sornewhat arbitrary nature of such

groupings. However using traces, we have to caiiect data for each user separately and this

will result in higher overheads. It also becomes more difncult to experiment with

alternative scenhos to answer "WHAT-IF" questions if the user mobility is directiy

based on traces.

One area of fùture research is to perfom sensitivity analysis of the selected proposais and

analyze how they behave diaing peak hours. For this we have to make some changes in

the existing reaiistic mobility model to identify and anaiyze the proposal in peak hours

only.

Possible future uses and extensions of the realistic mobility model include modification

of the model to compare the performance of different handoff algorithms. This would

requirp enhancement of the simulation to maintain knowiedge of the duration of calls

(incoming and outgoing) as the subscnber moves h m ceIl to cell. Also, rather than

simulating the movement of individuaï s u b s c r i w the simulator has to deal with the

simultaiieous movement of many subscriôers to create hotspots and capacity congestion.

Bibliograp hy

[l] Sami Tabbane. An aiternative strategy for location tracking- XEEE Journal on

Selected Areas in Co~rununications, vo1.13,no.5, lune 1995. pp. 880-892-

[2] Gregory P. Pollini and Chih-Lin 1. A profile-based locution strutegy and its

performance. IEEE Journal on Selected Areas in Communications, Vol. 15, No. 8,

October 1997. pp. 141501423.

[3] Ozan K. Ton- and Sumita Mishra A Simple Analytical Fiamework for Location

Mmrogemeni in personal Commnicuhon Systerns. IEEE Transactions on Vehicular

Technology, vol. 47, No. 2, May 1998. pp. 428439.

[4] Yi-Bing Lin. Reducing location updrzre cost in a PCS network IEEE/ACM

Transactions on Nttworking, vol. 5, No. 1, February 1997. pp. 25-33.

[S] Anna Hac and Xian Zhou Locating Shategies for P e r s o ~ l Communication

Networksr A Novel Tracking Shategy. IEEE Journal on Selected Areas in

Communications, Vol. 15, No. 8, October 1997. pp. 1425-1436.

[6] L. R Hu and S.S.Rappaport. Adoptive location management scheme for global

persorral comnnmicati~ns~ IEEE Roceedings on Co~lllllunications., Vol. 144, No. 1,

February 1997. pp.54-60.

m John Scourias and Thomas Ktmz A Qvmnic hdbïidulized Locaîion Mimagement

Algorithm In Pracccdings of the 8th IEEE intemational Symposium on Personal, Indoor,

and Mobile Radio CommUILications, Helsùiki, Finiand Septernbcr 1997. pp. 1004-1008.

[8] A Bar-Noy, 1. Kessla and M. Sidi. Mobile users: To @te or na to @te?-

W~eless Networks, Vol. 1, pages 175-1 85,lWS.

[9] U. Madhow, M. 1. Hoaig and K Steiglitz. Optimiuaion of Wireless Resotaces for

Personai C o m m m i ~ a t i ~ ~ t ~ Mobilify Tracking. IEEWACM Transactions on Networkiag,

Vol. 3, December 1995. pp. 577-584.

[IO] Naoki Matsumaru, Kshirasagar Naik and David S.L Wei. Compming three location

management strategies for iracking mobile systems. PDPTA '98 Intedonal coderence.

pp. 771-777.

[ I l ] Jan Jannink, Derek Lam, Narayarian Shivakumar, Jennifer Widom and Donald C.

Cox. EBcient and flexible Iocation management techniques for wireless communication

systems. Wireless Netwoks 3. 1997- pp. 36 1-374.

[12] Derek Lam, Y i e i Cui,, Jemifier Widom and Donald C. Cox.. A location

Management technique to mpport lifeelong n m k r i n g in Personol communications

services. IEEE Global Telecommunications conference. November 1 997.

[13] Shlomi Dolev, Dhiraj K. Redhan and Iennifer L. Welch Modzjied tree structure for

location management in mobile environments. Cornputer Communications. 1 996- pp.

335-345-

(141 P. Krishna, Nath H. Vaidya, and Dhiraj K. nadhan. Stdc and a&ptive location

management in mobile wireless networkr. Cornputer Communications 19. 1996. pp. 32 1 -

334.

[15] Narayanan Shivakumar and Jennifer Widom. User profie replicorion for fater

location lookup in Mobile envit~nment~ In lP ACM International Coderence on Mobiie

Computing and Networking (MOBICOM), 1995. pp. 161 -1 69.

[la ChihoLin, Gregory P.Pollini and Richard D.Gitlih PCS mobility management using

the reverse virhcol cd1 se- algon'thm- IEEUACM Transactions on Networking, vol. 5,

No. 1, Febniary 1997. pp. 13-24.

[17] Joseph S. M. Ho and Ian F . Akyüdiz. Dynmnic Hierarchical &tabase Architecture

for Location manugement in PCS Networkr. IEEWACM Transactions on Networking,

vol. 5, No. 5, October 1997. pp. 646-660.

[18] R Jain and Yi-Bing Lin. An aurilimy user location strategy employing forwarding

pointers IO reduce network impacts of PCS. ACM-JCM Wireless Networks, pp. 1 97-2 10.

1995.

[19] Yi-Bing Lin and Wen-Nung Tsaï. Location tracking with distribuied HLR'S and

pointer forwurding. IEEE Transactions on Vehicular Techn01ogy, vol. 47, No. 1,

Febniary 1998. pp. 58-64.

[20] Kuen-Liang Sue and Chien-Chao Tseng. One-Step pointer fowmding strategy for

location tracking in distributed HLR environment. IEEE Joumai on Selected Areas of

Communications. Vol. 15, No. 8, October 1997. pp. 1455-1466.

[21] Kin K. Leimg and Yonatan Levy. Global Mobility Management by Replicated

Databases in Personal Communication Networh. IEEE Journai on Sel& Areas in

Communications, Vol. 15, No. 8, October 1997. pp. 1 582- 1 5%.

[22] John G. Markouliàakïq George L. Lyberopouios, Dimitrios F. Tsirkas, and

Efstathios D. Sykas. Mubility MùdeIing in Third-Generation Mobile Telecommunicutions

Systems. IEEE Personal Communications. August 1997. pp. 41-56.

1231 Hideaki Yoshino, Hisao Yamamoto and Hideaki Matsue. Mobility Mmugement

Schemes und the* Characteristics for Advanced Personal Communication Services in

Distributed Enva!romnents. IEICE Transactions on Communication., Vol. E81-B, No. 6,

June 1998.

1241 Ravi Jain. A caching strategy to reedce network impacts of PCS. EEE Journal on

Selected Areas in Communication, 12 (8), November 1994.

[25] Moe Rahnema. Overview of the GSM systern and protocol architecture- IEEE

Communications Magazine. Vo1.43. Aprill993.

[26] EIAIIIA. Cellular Radio-Telecommunicatiom Intersystem OperationsILS Technical

Report. IS-41 Revision C, 1995.

[27] Tranplan Associaies. Waerloo Region T m e l S m e y 1987: An OveMew of the

S M Y ~ ~ Findings. Regionai Municipaiity of Waterloo, Department of Planning and

Development, October 1989.