TL;DR: Another contention-free LU algorithm is presented that is hybrid in the sense that LUs are temporally or geographically triggered, which alleviates inefficiencies inherent to temporal triggered LU in Wong.
Abstract: In forthcoming personal communication systems (PCSs), small cells are deployed to achieve high spectral efficiency. This has significant impacts on location tracking of mobile users. The increase in location update (LU) load leads to more contention on the reverse control channel. Thus, many algorithms are designed to distribute the LU load to a larger number of cells. This avoids the inefficiency of random accessing due to high offered load. In an alternative approach (Wong 1995), a contention-free LU algorithm is proposed. Two or more mobile units are permitted to register with a base station simultaneously without contention. A probabilistic paging mechanism called Bloom filtering is used to select cells to be paged. Since there is no contention in LU, inefficiencies due to random accessing are bypassed. In this paper, we present another contention-free LU algorithm. It is hybrid in the sense that LUs are temporally or geographically triggered. The use of hybrid LU alleviates inefficiencies inherent to temporal triggered LU in Wong. Three selective paging schemes are considered in this paper. Tradeoff between paging delay and paging bandwidth is addressed. The performance of this algorithm is compared to Wong and other conventional strategies. Numerical results show that the new algorithm compares favorably with previous proposed strategies.
I N personal communication systems (PCSs), microcells and picocells are extensively deployed.
The efficiency of geographic LU deteriorates dramatically when small cells are deployed.
1) For systems employing a static strategy, the location areas are globally defined for all MUs.
As noted in [15] , these strategies are amenable to implementation only when the size of the location area is small.
A contention-free LU scheme and the probabilistic paging mechanism are outlined in Section III.
II. SYSTEM MODEL
The authors assume that each cell is identically shaped.
The actual shape could be arbitrary as long as the cells are packed regularly.
By the memoryless property of exponentially distributed random variable, the call arrival time is uniformly distributed in the update cycle.
Every MU has a unique mobile unit identity vector (MUID) for unique identification during paging.
The authors also assume that the maximum propagation delay of pulses from the MUs to a base station is much smaller than the bit time of an LU message.
III. CONTENTION-FREE LOCATION UPDATE ALGORITHM
A base station receives the superimposition of pulses from all MUs in the local cell and store it as a cell vector.
The zero in the th bit in the cell vector conveys significant information.
After the network "filter" out cells to be paged, the MUID of the called MU is then broadcasted on the paging channel of the matched cells.
This happens when the targeted MU leaves a cell between the call arrival time and the most recent LU cycle.
This in turn increases the system paging cost.
A. Location Update Protocol
Under the new protocol, the reverse control channel periodically allocates registration slots with period .
Only LU messages are allowed in these slots.
All other control messages such as call setup negotiations can contend for the channel in other unreserved time slots.
If more than one MU enters the given cell since the last registration slot, the received cell vector is a superimposition of several BFIDs.
The authors need to fix some notation to help their subsequent discussion.
B. Paging Protocol
When an MU is called, the system retrieves the most recent cell vectors from each cell.
These cell vectors are used to locate an MU via Bloom filtering.
There is a finite probability that the targeted MU has just left the cell when the call arrives.
The first matching cycle uses the most recently received group of cell vectors.
In all three cases, if the targeted MU cannot be located after all the matching cycles, the remaining cells will be flooded.
V. PERFORMANCE EVALUATION
Since the radio bandwidth is a more critical resource than the bandwidth of a fixed network, the authors define the cost function to be a weighted sum of location update and paging data rate per MU per hour on the radio link.
The expected value of the cost function for the proposed algorithm is derived in Theorem 1.
Let be the most recent registration slot in the window when the targeted MU updates at cell 0.
The cell will be paged if there is a match with any one of the cell vectors.
Thus, paging bandwidth is conserved by trading off paging delay.
TABLE II OPTIMIZED PARAMETERS VALUES FOR VARIOUS STRATEGIES
Assume the mobile population consists of low-mobility MUs, that is, .
That means that on average, an inactive MU will need to register only once every registration slots.
Battery power in the mobile handset can be saved.
Thus the expected number of LUs received per registration slot is times smaller than the time-based Bloom filter algorithm.
For this reason, the hybrid algorithm outperforms the time-based counterpart when the average mobility is low.
VI. NUMERICAL STUDIES
The authors present a numerical study to compare the performance of four location tracking strategies.
There are no synchronization overheads in this case since each MU updates periodically.
The cost of paging scheme 2 approximately lies between paging scheme 1 and 3.
Compared with the geographic-based strategy, the HBF algorithm always has lower cost, except when mobility is low.
The slope for the hybrid algorithms is less steep than that of the time-based Bloom filter algorithm.
VII. IMPLEMENTATION OF THE HBD IN THE FIXED NETWORK
The authors investigate the performance of the HBF algorithm in the fixed backbone network.
Thus, the new VLR must retrieve the IMSI of the MU from the old VLR through an authentication procedure.
The location vector in each cell is periodically sent to the HLR Mbits/h.
The signaling overhead of the GSM is not scalable to large population.
VIII. DISCUSSION
The proposed algorithm gives comparable performance to the geographic-based strategy for a wide range of mobility.
The authors assume that network flooding is used subsequently.
The HBF is superior to other strategies in the sense that it reduces control overhead on the radio link without a corresponding increase of the fixed network overhead.
Thus the HBF algorithm is scalable to large mobile population.
In contrast to traditional random access and deterministic paging, the contention-free LU and probabilistic paging schemes offer an alternative paradigm on location tracking.
TL;DR: A novel two-dimensional Markov walk model with six states is proposed to characterize the dynamic behavior of the intercell movements for a mobile station, finding a broad class of isotropic processes having an identical uniform steady-state distribution of the six directions, but distinct circulant transition probability matrices.
Abstract: This paper presents a new analytic framework for dynamic location management of PCS networks. Based on the theory of hexagonal cellular patterns, a novel two-dimensional Markov walk model with six states is proposed to characterize the dynamic behavior of the intercell movements for a mobile station. We discover a broad class of isotropic processes having an identical uniform steady-state distribution of the six directions, but distinct circulant transition probability matrices. Six special isotropic processes exhibiting IID, directional, turning, ping-pong, h-spin, and t-spin mobility patterns are identified for performance comparison. We also generalize the selective paging strategy by introducing the concept of probabilistic selective paging (PSP) to reduce the paging cost. A unified analysis using recursive computations is carried out to compute the exact probability distribution for the number of per-call location updates. We calculate the location profile with respect to an incoming call and derive an exact expression of the average paging cost for PSP. With its ability to distinguish subtle performance variations and unveil new features of various dynamic location management schemes, our analytic framework is demonstrated to provide more precise and insightful results than conventional analysis.
38 citations
Cites methods from "A contention-free mobility manageme..."
...A contention-free scheme for multiuser mobility management was developed by using mobile unit and Bloom filter identity vectors [ 16 ]....
TL;DR: It is shown that even in the worst case when mobile users appear equally in all the cells of the network, the concurrent search approach is able to reduce the average paging cost by 25%.
Abstract: In this paper, we propose to concurrently search for a number of mobile users in a wireless cellular network based on the probabilistic information about the locations of mobile users. The concurrent search approach guarantees that all k mobile users will be located within k time slots. It is shown that even in the worst case when mobile users appear equally in all the cells of the network, the concurrent search approach is able to reduce the average paging cost by 25%. More importantly, this is achieved without an increase in the worst case paging delay or in the worst case paging cost. Depending on the total number of mobile users to be located, total number of cells in the network, and the probabilistic information about the locations of mobile users, the reduction of the average paging cost due to the usage of the concurrent search approach ranges from 25% to 88%. The case in which perfect probabilistic information is unavailable is also studied.
36 citations
Cites methods from "A contention-free mobility manageme..."
...In [27], probabilistic paging is used for contentionfree mobility management....
TL;DR: Simulation results prove that this new scheme offers significant improvements in the requisite performance metrics of call blocking probability, call dropping probability, and bandwidth utilization, under a variety of differing traffic conditions.
Abstract: In this paper, an advanced call admission control strategy is proposed in which bandwidth is allocated more efficiently and effectively to neighbouring cells by exploiting key mobility parameters to provide consistent Quality of Service (QoS) guarantees for multimedia traffic. Concomitantly, to ensure continuity of on-going calls with better utilization of resources, bandwidth is borrowed from existing adaptive calls without affecting the minimum QoS guarantee. The performance of the scheme is compared with other techniques including the rate-based borrowing scheme and implicit QoS provisioning strategy. Simulation results prove that this new scheme offers significant improvements in the requisite performance metrics of call blocking probability, call dropping probability, and bandwidth utilization, under a variety of differing traffic conditions.
31 citations
Cites background from "A contention-free mobility manageme..."
...Table I summarizes the simulation parameters [3][12][15] whose values were carefully chosen to represent a realistic scenario for the simulation....
TL;DR: Current location management schemes for mobile network are discussed and compared with respect to their cost consumption in terms of bytes and the key issues are addressed in the context of location management for future generation mobile network.
Abstract: Location management is an important area of mobile computing. Location management in mobile network deals with location registration and tracking of mobile terminals. The location registration process is called location update and the searching process is called paging. Various types of location management methods exist such as mobility based location management, data replication based location management, signal attenuation based location tracking, time, zone and distance based location update etc. In this paper, existing location management schemes are discussed and compared with respect to their cost consumption in terms of bytes. Finally the key issues are addressed in the context of location management for future generation mobile network. Different types of location management schemes for mobile network are discussed.The location management cost in terms of message is calculated for these schemes.Comparative analysis is performed between the methods based on cost.Future scopes of location management are also explored.
TL;DR: Simulation results prove that this new CAC strategy involving for the first time, a bandwidth reservation scheme that is influenced by the direction attribute of a mobile terminal, integrates thedirection attribute into the conventional Guard Channel (GC) scheme.
Abstract: This paper proposes a new advanced Call Admission Control(CAC) strategy involving for the first time, a bandwidth reservation scheme that is influenced by the direction attribute of a mobile terminal (MT). Aside from the Quality-of-Service (QoS) parameters, the direction attribute plays a key role in efficiently reserving resources for MTs supporting multimedia communications for different QoS classes. The framework for a direction-based CAC system is entirely distributed and may be viewed as a message passing system, where MTs inform their neighbouring base stations (BS) not only of their QoS requirements, but also of their mobility parameters. The base stations then predict future demand and reserve resources accordingly, only admitting those terminals that can be adequately supported. The bandwidth reservation scheme proposed in this paper, integrates the direction attribute into the conventional Guard Channel (GC) scheme. Simulation results prove that this new scheme offers significant improvements in both Call Blocking Probability (CBP) and bandwidth utilization, under a variety of differing traffic conditions.
18 citations
Cites background from "A contention-free mobility manageme..."
...[13] Yuen W H A and Wong W S, “A Contention-Free Mobility Management Scheme Based on Probabilistic Paging”, IEEE Transactions on Vehicular Technology, vol. 50, no. 1, pp. 48-58, January 2001....
[...]
...Some recent schemes of call admission control strategies like Rate-based Borrowing Scheme [7], Schemes based on Probabilistic Paging [13] are also not suitable for real time multimedia communications....
[...]
...Keeping the CBP low while at the same time maximizing the bandwidth utilization under the condition of continuous connection is one of the most important challenging tasks facing protocol designers [7][13]....
[...]
...The values for the simulation parameters are chosen carefully in order to closely represent realistic scenarios [3][10][13] and yet make the simulation feasible....
TL;DR: Analysis of the paradigm problem demonstrates that allowing a small number of test messages to be falsely identified as members of the given set will permit a much smaller hash area to be used without increasing reject time.
Abstract: In this paper trade-offs among certain computational factors in hash coding are analyzed. The paradigm problem considered is that of testing a series of messages one-by-one for membership in a given set of messages. Two new hash-coding methods are examined and compared with a particular conventional hash-coding method. The computational factors considered are the size of the hash area (space), the time required to identify a message as a nonmember of the given set (reject time), and an allowable error frequency.The new methods are intended to reduce the amount of space required to contain the hash-coded information from that associated with conventional methods. The reduction in space is accomplished by exploiting the possibility that a small fraction of errors of commission may be tolerable in some applications, in particular, applications in which a large amount of data is involved and a core resident hash area is consequently not feasible using conventional methods.In such applications, it is envisaged that overall performance could be improved by using a smaller core resident hash area in conjunction with the new methods and, when necessary, by using some secondary and perhaps time-consuming test to “catch” the small fraction of errors associated with the new methods. An example is discussed which illustrates possible areas of application for the new methods.Analysis of the paradigm problem demonstrates that allowing a small number of test messages to be falsely identified as members of the given set will permit a much smaller hash area to be used without increasing reject time.
7,390 citations
"A contention-free mobility manageme..." refers background in this paper
...We label the time interval as theregistration memory windowat time ....
TL;DR: This paper considers both memoryless movement patterns and movements with Markovian memory along a topology of cells arranged as a ring and analyzes the performance of each one of the three strategies under such movements, and shows the performance differences between the strategies.
Abstract: Tracking strategies for mobile users in wireless networks are studied. In order to save the cost of using the wireless links mobile users should not update their location whenever they cross boundaries of adjacent cells. This paper focuses on three natural strategies in which the mobile users make the decisions when and where to update: the time-based strategy, the number of movements-based strategy, and the distance-based strategy. We consider both memoryless movement patterns and movements with Markovian memory along a topology of cells arranged as a ring. We analyze the performance of each one of the three strategies under such movements, and show the performance differences between the strategies.
601 citations
Additional excerpts
...The well-known distance-basedstrategy[5]anditsvariants [11], [14]belongto this category....
TL;DR: In this paper, a dynamic location area scheme is proposed for cellular networks, in which the size of location areas of a user is dynamically determined according to its current incoming call arrival rate and mobility as the signaling traffic in radio channels reaches the minimum.
Abstract: A dynamic location area scheme is proposed for cellular networks, in which the size of location areas of a user is dynamically determined according to its current incoming call arrival rate and mobility as the signaling traffic in radio channels reaches the minimum. The protocols and algorithms of the proposed scheme are presented, and its performance is compared with that of the conventional system.
TL;DR: A mobile user location management mechanism that incorporates a distance based location update scheme and a selective paging mechanism that satisfies predefined delay requirements is introduced.
Abstract: Wireless personal communication networks (PCNs) consist of a fixed wireline network and a large number of mobile terminals. These terminals are free to travel within the PCN coverage area without service interruption. Each terminal periodically reports its location to the network by a process called location update. When a call for a specific terminal arrives, the network will determine the exact location of the destination terminal by a process called terminal paging. This paper introduces a mobile user location management mechanism that incorporates a distance based location update scheme and a selective paging mechanism that satisfies predefined delay requirements. An analytical model is developed which captures the mobility and call arrival pattern of a terminal. Given the respective costs for location update and terminal paging, the average total location update and terminal paging cost is determined. An iterative algorithm is then used to determine the optimal location update threshold distance that results in the minimum cost. Analytical results are also obtained to demonstrate the relative cost incurred by the proposed mechanism under various delay requirements.
279 citations
Additional excerpts
...The well-known distance-basedstrategy[5]anditsvariants [11], [14]belongto this category....
TL;DR: The user location strategies specified in the IS-41 and GSM standards are described, and then, using a simple example, a simplified analysis of the database loads generated by each strategy is presented.
Abstract: The vision of nomadic personal communications is the ubiquitous availability of services to facilitate the exchange of information between nomadic end users independent of time, location, on access arrangements. To realize this, it is necessary to locate users who move from place to place. The strategies commonly proposed are two-level hierarchical strategies, which maintain a system of home and visited databases/spl mdash/home location register (HLR) and visitor location register (VLR)/spl mdash/to keep track of user locations. Two standards exist for carrying out two-level hierarchical strategies using HLRs and VLRs. The standard commonly used in North America is the Electronics Industry Association/Telecommunications Industry Association (EIA/TIA) Interim Standard 41 (IS-41), and in Europe the Global System for Mobile Communications (GSM). The authors introduce these two strategies for locating users and provide a tutorial on their usage. Different forms of mobility in the context of PCS and a reference model for a PCS architecture are discussed. The user location strategies specified in the IS-41 and GSM standards are described, and then, using a simple example, a simplified analysis of the database loads generated by each strategy is presented. Also briefly discussed are possible modifications to these protocols that are likely to result in significant benefits by reducing query and update rate to databases and/or reducing the signaling traffic.<>
255 citations
"A contention-free mobility manageme..." refers methods in this paper
...The geographic-based strategy is currently adopted by the wireless standards [GSM mobile application part (MAP) and IS-54 [4]]....