An alternative strategy for location update and paging in

Computer Communications 27 (2004) 1509–1523
www.elsevier.com/locate/comcom
An alternative strategy for location update and paging in mobile networks
Alejandro Quintero*, Oscar Garcia, Samuel Pierre
Department of Computer Engineering, Mobile Computing and Networking Research Laboratory (LARIM),
École Polytechnique de Montréal, Montreal, Canada H3T1J4
Received 30 May 2003; revised 31 May 2004; accepted 4 June 2004
Available online 31 July 2004
Abstract
In mobile systems, the influence of mobility on the network performance must be strengthened, mainly due to the huge number of mobile
users and the small of cells. This paper presents a profile-based strategy combined with a built-in memory method to reduce the signaling cost
during the location update processes by increasing the intelligence of the location procedure. This strategy associates to each user a list of
cells where it is likely to be with a given probability in each period of time. The list is ranked from to the least likely place where a user is
found. When a call arrives for a mobile, it is paged sequentially in each location within the list. When a user moves between location areas in
the list, no location update is required. The implementation of this strategy has been subject to extensive tests. The results obtained confirm
the efficiency and the effectiveness of PBS to significantly reduce the costs of both location updates and call delivery procedures, in
comparison with IS-41 and other strategies well-known in the literature.
q 2004 Elsevier B.V. All rights reserved.
Keywords: Location update; Mobility management; Profile-based location; IS-41
1. Introduction
In mobile systems, a user must be able to access services
while moving from one location to another. This problem is
called mobility management which contains two components: location management and handoff management.
This paper is concerned only with the location management.
Most current networks divide the coverage area into many
location areas (LA), which are sets of many adjacent cells. In
each cell, every mobile unit (MU) communicates with a node
B through wireless links. The base stations are connected to a
radio network controller (RNC) that serves that LA.
Location management is the process that allows the
network to know the attachment point of the mobile user for
call delivery. Current location management procedures
involve a certain database architecture and the transmission
of signaling messages over the network. Third-generation
mobile networks will be characterized by high user density
and high mobility, which will increase the number of
location updates and handoff messages, thus limiting the
switching capacity and available bandwidth. Compared to
second generation systems and apart from the increased
* Corresponding author. Tel.: þ 1-514-3404711; fax: þ 1-514-3403240.
E-mail address: [email protected] (A. Quintero).
0140-3664/$ - see front matter q 2004 Elsevier B.V. All rights reserved.
doi:10.1016/j.comcom.2004.06.001
traffic demands, location and handover procedures in a
micro-cellular environment, in conjunction with the huge
number of users, will generate a considerable mobility
signaling load [15]. These bottlenecks are the motivation for
the studies of new or improved schemes to support the
increasing subscriber population [17].
User mobility information can be used to assist user
mobility management (traffic routing), to manage network
resources (resource allocation, call admission control,
congestion and flow control), and to analyze handoff
algorithms in integrated wired/wireless networks [22].
Also, users’ patterns of mobility can also be useful for
systems recovery [8].
The location management methods are classified into
two major groups [25]: non-memory-based methods and
memory-based methods. The first group includes the
methods based on algorithms and network architectures,
while the second group includes the methods based on
learning processes which require the knowledge of users’
mobility behaviour. The strategy proposed in this paper
belongs to the second group.
Location management occurs in two stages: location
update and call delivery. When an MU performs a
location update procedure, it provides the network with its
location information. Call delivery means that the network
1510
A. Quintero et al. / Computer Communications 27 (2004) 1509–1523
Nomenclature
BS
CMR
HLR
ILD
LSTP
LA
MSC
MU
PBS
base station
call-to-mobility ratio
home location register
intermediate location database
local signal transfer point
location area
mobile switching center
mobile unit
profile based strategy
is queried for the location information of the called mobile.
Location update occurs when a mobile moves from one LA
to another. A location search procedure is performed when a
mobile is called. The goal is to find the called mobile’s
current cell in an accurate way.
In North America, IS-41 standard [5] is used for both
location update and call delivery procedures [7,26].
This standard deploys a two-level database architecture
consisting of one HLR (Home Location Register) and many
Visitor Location Registers (VLR). The HLR for a given
network contains the network’s subscriber profiles and the
VLR stores the profiles of the users that are currently
roaming in its associated LA.
Current cellular systems use geographic-based
registration in which a registration occurs when a user
crosses the location area [17]. Reduction of the signaling
and database access traffic constitutes an important research
challenge. Several alternative strategies have been proposed
recently to improve the performance of the IS-41 location
management scheme [10,19,21,24].
In profile-based strategy, if the position of a user is
always known in advance, then no explicit registration is
necessary. Thus, the optimum location area is a single cell
which minimizes paging cost [17]. Stationary users on fixed
schedules exhibit this type of behaviour. It may be possible
to group people into classes depending upon the
predictability of their daily routine. In Ref. [4], an user
mobility pattern (UMP) scheme is introduced for location
update and paging in wireless systems where mobile
terminals maintain their history data in a database called
user mobility history. During a location update, a UMP is
derived from user mobility history and registered to the
network. Unless the mobile terminal detects that it has
moved out of the registered UMP, it does not perform any
other location update. The dynamic location management
techniques are also proposed in Refs. [1,8,11,14,23,27].
In Ref. [30], a call admission control and bandwidth
reservation schemes in wireless cellular networks have been
developed. In order to guarantee the handoff dropping
probability, the authors propose to statistically predict user
mobility based on the mobility history of users. The mobility
prediction scheme is motivated by computational learning
theory, which has shown that prediction is synonymous with
PCR
PCS
SS7
SCP
SSP
STP
RNC
TLDN
UMP
VLR
predictive channel reservation
personal communication system
signaling system no. 7
service control point
service switching point
signal transfer point
radio network controller
temporary location directory number
user mobility pattern
visitor location register
data compression. In order to utilize resource more
efficiently, the scheme predicts not only the cell to which
the mobile will handoff but also when the handoff will
occur. Based on the mobility prediction, bandwidth is
reserved to guarantee some target handoff dropping
probability.
Safa et al. [19] present a built-in memory model to
reduce the signaling and database access traffic due to users’
mobility in wireless networks. The model is based on the
IS-41 standard with the addition of a small built-in memory
to the MU and a pointer table to each LA. In other work,
Safa et al. [20] present a scheme for improving the basic
location strategy proposed in IS-41 standard. The scheme
essentially consists of adding to the current network
architecture a pointer table and a location data table.
Mobility management issues of multitier PCS networks
were presented in Refs. [2,6]. Hwang et al. [12] propose a
direction-based location update scheme with line paging for
reducing paging costs. This approach is based on a
conventional two-dimensional random walk model, where
the directions of the mobile units are assumed to be
independent and identically distributed. In Ref. [13],
an extended search is proposed for the location procedure.
In this case, the called mobile is paged first where it last was
in contact with the network, prior to search in the whole
location area. Complexity is the main problem with these
approaches, but the reductions in cost are significant.
In Ref. [22], the scheme called predictive channel
reservation (PCR) is proposed. Channel reservation packets
are sent to the adjacent cells based on the extrapolation of
MU’ mobility starting from a certain threshold of proximity
to the neighbouring cell. This results in a significant
reduction in handoff blocking rates with only small
increases in new calls’ blocking rates. The base station
(BS) uses the current location and movement direction of
each mobile and predicts its trajectory.
Aljadhai and Znati [3] deal with the question of assuring
the quality of service through the exact knowledge of the
trajectory followed by the mobile. It is crucial to have
a mechanism of prediction of the user’s trajectory.
The proposed algorithm integrates the admission and call
control to assure that QoS is going to be available during all
the communication. With the estimations of trajectories,
A. Quintero et al. / Computer Communications 27 (2004) 1509–1523
arrival and departure times, the system is ready to support
the quality requirements. The required resources are
reserved just for the residence time in these cells. It favors
the deterministic users by updating dynamically the size of
the window of likely cells. With this approach, it is not
necessary to stock the user’s profile.
Xie and Akyildiz [29] introduce a novel distributed
and dynamic regional location management for Mobile
IP where the signaling burden is evenly distributed and
the regional network boundary is dynamically adjusted
according to the up-to-date mobility and traffic load
for each terminal. In their system, each user has its
own optimized system configuration which results in the
minimal signaling traffic. In order to determine
the signaling cost function, a new discrete analytical
model is developed which captures the mobility and
packet arrival pattern of a mobile terminal. This model
does not impose any restrictions on the shape and the
geographic location of subnets in the Internet. Given the
average total location update and packet delivery cost, an
iterative algorithm is then used to determine the optimal
regional network size.
Wu et al. [28] present a new analytic framework for
dynamic location management of PCS networks. Based on
the theory of hexagonal cellular patterns, a novel twodimensional Markov walk model with six states is proposed
to characterize the dynamic behavior of the intercell
movements for a mobile station.
Several mobility managements methods are proposed
in the literature. In most cases, they are analysed with
theorical assumptions about the user’s motion process
and call arrival process. These theoretical assumptions
can not cope with real behaviour. The classical method
that is used widely in current networks uses fixed and
network wide location areas. All subscribers have the
same cell borders to send location updating messages.
That leads to a signalling traffic burst on the signalling
channels of cells that are on the location area border,
whereas other cells have idel control channels.
The profile-based location strategy sets up a list to relate
a location probability to a time value. Each time an
incoming connecion request is coming, the system looks
in the list to find the most probable location and pages
the subscriber in order of descending probability. If the
user is not found in one of the locations recorded in the
list the whole service area has to be paged. This method
makes intensive use of the historical movement pattern
and reduces the signalling due to mobility management.
This paper proposes a profile-based strategy combined
with a built-in memory method to reduce the signaling cost
of location update by increasing the intelligence of the
location procedure. Section 2 describes the profile-based
strategy and presents some adaptation and implementation
details. Section 3 presents a performance evaluation.
Finally, Section 4 summarizes the main results.
1511
2. Profile-based approach
We present a profile-based strategy (PBS) with a built-in
memory method to reduce the location update by increasing
the intelligence of the location procedure. This proposed
strategy associates to each user a list of cells to determine
the user’s movement at each period of time. Users can be
divided into three categories according to the predictability
of their routines [17]. The system uses each class in a
different way to optimize resource consumption.
We distinguish three types of users: deterministic, quasideterministic and random. Deterministic users have a very
high probability of being in an area known in advance by the
system; quasi-deterministic users have a certain likelihood
to be where the system expects them to be, but they actually
could not be there; random users have positions at a given
moment which are unpredictable and the strategy proposed
here does not apply to them. The predictability of the two
first types of users can be used by the network to reduce the
number of location updates, at the expense of a somehow
higher call set up delay or cost in a purely profile-based
strategy. Because mobility and call arrival patterns vary
among users, it is highly desirable that location registration
and call delivery procedures can be adjusted dynamically on
a per-user basis.
The built-in memory model is based on Ref. [19] and the
IS-41 standard with the addition of a small built-in memory
to the MU and a pointer table to each LA (Fig. 1). In this
model, an MU’s anchor LA is defined as the LA for which
the MU’s location data has been updated at the network
database HLR. The MU built-in memory stores the address
of its anchor LA. The pointer table comprises two columns:
the MU identification number and the MU’s current LA.
The pointer table of an LA stores the current LA addresses
of the MUs which consider this particular LA as their anchor
LA. When the MU moves to a new LA, the new LA queries
the MU’s anchor LA to update the pointer table, i.e. to
create a pointer between the MU’s anchor LA and the new
LA. Consequently, no location update operation is
Fig. 1. Network architecture.
1512
A. Quintero et al. / Computer Communications 27 (2004) 1509–1523
performed at the HLR. When the MU is called, its HLR is
queried to determine its anchor LA. If it no longer resides in
that LA, then the call is forwarded to the MU’s current LA
by traversing a single pointer.
When the MU is roaming outside of the set of frequent
areas for an intra-ILD move, the mobile’s anchor LA creates
a pointer to the current LA. When a mobile unit moves
towards a new ILD, the new location area becomes its new
anchor LA and the old one is deleted. While the MU is
roaming within its list of frequently visited cells, it only
registers when moving to a new ILD, to update the pointers
at distant ILD and avoid queries to HLR when a call is made
from the same ILD. The ILD can have the exact location
information or the list of cells. In the last case, a sequential
paging is performed.
The cost reduction depends on behavior of each class of
users. It can be expected when the user follows its expected
behavior (mostly within the list), location update cost is
reduced but paging delay can increase.
2.1. Location update procedure
When an MU moves to a new LA, a location update
procedure is performed. Different procedures are followed
depending on whether the move is intra-ILD or inter-ILD, as
well as depending on the situation in relation to the list.
Each user is assigned a set of likely location areas.
This information is a function of his past history and the
network updates it with a certain regularity. The number of
areas to keep in the list is another design factor. The list is
stored at the MU’s side in order for the mobile to know
when it leaves or enters the list to perform a location
update procedure, and at the network’s side. It can be stored
at the HLR or the ILD, as we explain later in this paper.
Let’s call {Ai }i¼1;;k ; the set of areas, A1 is the most likely
area, A2 is the second, etc. The areas are ordered in
decreasing probability.
We define local list as a set of location areas Ai which are
all under the coverage of one local signal transfer point
(LSTP). The list will be stored at the ILD associated to the
LSTP. And we define global list as a set in which there are
location areas that belong to different LSTPs. In this case, the
list is stored at the HLR. The LA where the called mobile is
roaming is stored at the ILD, and the HLR stores the list of
ILDs. In this case, the list for the user is not {Ai }i¼1;;k ; but
{Ii }i¼1;;k ; where Ii is LSTP area i where the user is likely to be.
The distribution of the location information is as follows:
† If the user is within its associated local list, the HLR
knows the current ILD. The current ILD has the local list
and the distant pointers at others ILDs have the current
ILD.
† If the user is within its associated global list, the HLR
knows the global list. The current ILD has the current
location area and the distant pointers at others ILDs have
the current ILD.
† If the user is outside its associated list, the HLR has
its current ILD. The current ILD has its anchor LA
and the anchor LA stores a pointer to the current LA.
MU’s anchor LA is defined as the LA for which the
MU’s location data has been updated at the network
database HLR.
This distribution determines the algorithm proposed in
this work. We assume that the list is stored at two places:
† The terminal itself, in a built-in memory to allow it to
know when it is entering or exiting the list (‘personalized LA’). However, the system must update the list
when the user exhibits new habits and must transmit it
to the MU.
† The switch that will conduct the search, this is the
LSTP if the list is local, or the HLR if the list is global.
A.
When the MU’s move is intra-ILD, we have to
consider the following situations:
I
Move between two zones inside the list:
1. If the list is local, no update is performed.
If it is global, the current LA is registered at
the ILD.
II. Move between two zones outside the list. We
assume that the MU has its anchor LA registered
in a built-in memory and that it is transferred to
the ILD and to the location data tables (Fig. 2);
1. The MU moves into a new LA and sends a
location update registration message to the
new RNC/VLR;
2. The RNC of the new LA registers the MU
and its anchor LA and sends a cancellation
message to the old RNC;
3. The new LA sends also a message to the
anchor LA in order to create a pointer to it.
No update is performed at the current ILD;
4. and 5.
The new LA receives an acknowledgment from
the old RNC and the anchor LA.
III. Move to exit the list
1. The RNC of the new LA registers the MU
with the new VLR as the new anchor LA
at the ILD. If the list is local, it is
deactivated;
Fig. 2. Updating procedure for an intra-ILD move outside the list.
A. Quintero et al. / Computer Communications 27 (2004) 1509–1523
2.
B.
The ILD registers the new MU and sends a
notification message to the HLR if the list is
global;
3. The HLR sends an acknowledgment message to the current ILD and updates its table
(registering the new ILD);
4. The current ILD sends an acknowledgment
message to the current RNC/VLR.
IV. Move to enter the list:
1. The RNC of the new LA sends a registration
notification message to the current ILD;
2. The current ILD registers the current LA for
the MU if the list is global, or activates the
local list;
3. The ILD deletes the profile of the MU and
sends a cancellation message to the old
anchor LA;
4. The old anchor VLR sends a cancellation
message to the previous LA;
5. The previous LA deletes the profile of the
MU and sends an acknowledgment to the
anchor LA;
6. The old anchor VLR deletes the profile of
the user and sends an acknowledgment to the
ILD;
7. If the list is global, the ILD sends a message
to the HLR to activate the global list and
receives an acknowledgment;
8. The ILD sends an acknowledgment to the
current RNC/VLR.
When the MU’s move is inter-ILD, we have to
consider the following situations:
I. Move within the list: If this move exists, the list
can only be local, given that it contains zones
belonging to more than one LSTP. The steps to
follow are:
1. The MU moves into a new LA and sends a
registration message to the new RNC/VLR;
2. The RNC of the new LA sends a message to
register the zone;
3. The new ILD registers the zone and sends a
message to delete the profile at the old ILD;
4. The old ILD deletes the MU’s profile and
sends an acknowledgment to the new ILD;
5. The new ILD updates the distant pointers
and receives the acknowledgments;
6. The new ILD sends an acknowledgment to
the new RNC.
II. Move outside of the list:
1. The MU moves to a new LA and sends a
location update message to the RNC/VLR of
the new LA;
2. The RNC of the new LA registers the MU
and its old anchor LA and it determines the
new anchor LA. Then it sends a registration
notification message to the current ILD;
3.
1513
The current ILD registers the MU as
belonging to its coverage area and sends a
location update message to the HLR and to
the old ILD;
4. The old ILD sends a cancellation message to
the old anchor LA;
5. The old anchor VLR sends a cancellation
message to the previous LA;
6. The previous LA deletes the profile of the
MU and sends an acknowledgment to the
anchor LA;
7. The old anchor VLR deletes the profile of
the user and sends an acknowledgment to the
old ILD;
8. The old ILD and the HLR send an acknowledgment to the current ILD and update their
information;
9. If there are distant pointers:
i. The current ILD sends a location
update message to all the distant ILDs
that point to the MU;
ii. the distant ILDs update their pointers
and send an acknowledgment;
10. The current ILD sends an acknowledgment
to the current RNC/VLR.
III. Move to exit the list:
1. The MU moves to a new LA and sends a
location update message to the RNC/VLR of
the new LA;
2. The RNC of the new LA registers the MU
and sends a registration notification message
to the current ILD;
3. The current ILD registers the profile of the
MU, deletes the old LA or deactivate the
local list and sends a location update
message to the HLR;
4. The HLR sends an acknowledgment to the
current ILD and updates its table;
5. If there are distant pointers:
i. The current ILD sends a location
update message to all the distant ILDs
that point to the MU;
ii. the distant ILDs update their pointers
and send an acknowledgment;
6. The current ILD sends an acknowledgment
to the current RNC/VLR.
IV. Move to enter the list:
1. The MU moves to a new LA and sends a
location update message to the RNC/VLR of
the new LA;
2. The RNC of the new LA knows that it is the
point of entry in the local list. Then it sends
a registration notification message to the
current ILD;
3. The local ILD registers the LA of the MU or
activates the local list, sends a location
1514
A. Quintero et al. / Computer Communications 27 (2004) 1509–1523
4.
5.
6.
7.
8.
9.
update message to the HLR (to register the
list) and to the old ILD (to delete the profile
of the MU);
The old ILD sends a cancellation message to
the old anchor LA;
The old anchor VLR sends a cancellation
message to the previous LA;
The previous LA deletes the profile of the
MU and sends an acknowledgment message
to the anchor VLR;
The old VLR deletes the user’s profile and
sends an acknowledgment to the old ILD;
The HLR updates the list and the old ILD,
then sends an acknowledgment to the current
ILD;
If there are distant pointers:
i. The current ILD sends a cancellation
message or an update message if the list
is local to the distant ILDs that store a
pointer;
ii. The distant ILDs update their pointers
and send an acknowledge message;
3.
The ILD forwards the message to the anchor RNC
of the called MU;
4. The anchor RNC assigns a TLDN (temporary
location directory number) to the called mobile
and forwards it to the calling RNC;
5. The calling RNC sets up a connection to the called
RNC using this TLDN.
Scenario 2
addresses the case where the called MU and the calling MU
are under an area covered by the same ILD but the called
MU is not roaming in its anchor LA (Fig. 3). A pointer has
to be crossed to reach the current LA which assigns a TLDN
to the call and transmits it to the calling RNC.
Scenario 3
addresses the case where there is a pointer at the calling ILD
towards the called unit and this one is roaming in its anchor
LA. The called MU is out of its associated list. The distant
pointer is crossed to reach the ILD that has the information
on the MU. This one is roaming in its anchor LA.
Scenario 4
addresses the case where the called mobile is outside the list
but it has a distant pointer at the location data table of the
calling ILD. The called mobile is not roaming in its anchor LA.
The current ILD updates the profile and sends an
acknowledgment to the current RNC.
3. Performance evaluation
2.2. Location search procedure
This procedure involves the determination of the current
LAs serving the cell where the MU is roaming We present
four possible scenarios according to the proposed location
management strategy:
Scenario 1
addresses the case where the called MU and the calling MU
are under an area covered by the same ILD and the called
MU is roaming in its anchor LA:
1. A call is initiated to an MU and forwarded to the
RNC of the calling unit;
2. The RNC sends a location request message to the
ILD that determines the anchor LA of the called
mobile;
The performance of location management schemes is
higly dependant on user’ mobility and incoming calls
characteristics [19]. All users can be classified according to
their call-to-mobility ratio (CMR). We assume that the link
costs and database access costs are defined, respectively, by
the delays of message transmission and updating. Besides,
we assume that an RNC/VLR covers only one location area.
The total cost of our strategy is the sum of the location
search cost, location update cost and list maintenance cost.
3.1. Analytical model
The cost of list update and maintenance must be
considered in order to compare the proposed strategy with
other existing strategies. We consider the following
Fig. 3. Location search procedure (Scenario 2).
A. Quintero et al. / Computer Communications 27 (2004) 1509–1523
maintenance costs: (a) Processing of the billing information
of the user to build the list; (b) Transfer of this list to the
place where it will be stored (ILD for the local lists, HLR for
the global list) and (c) Notification of the modifications in
the list to the mobile terminal.
We assume that the link costs and database access costs
are defined by the delays of message transmission and
updating or query, respectively. For each mobile unit, we
define the following quantities:
l:
m:
average number of calls to a target MU per time unit;
average number of times the user changes LA per time
unit;
v: probability that a pointer exists from the calling ILD to
the called ILD;
q: probability of an intra LSTP move (old and new LAs
are under the same ILD);
r: probability that the called MU is in its anchor LA;
t: probability that the calling and the called mobiles are
connected to the same LSTP;
m: probability that a user’s associated list consists of
location areas which are all under the same LSTP;
z: probability that a user is in one of the zones of its
associated list.
The size of the list has to be optimized for each particular
user, depending on his mobility patterns, in order to
minimize the total cost.
For analysis purposes, we consider the following costs:
Uintra : cost of a location update operation when the MU’s
move is intra-LSTP;
Uinter : cost of a location update operation when the MU’s
move is inter-LSTP;
Sx : cost of the location search operation using Scenario x;
UT : total cost of the location update procedure;
ST : total cost of the location search procedure;
CG : total cost per time unit for the location search and
location update.
Table 1 summarizes the location update scenarios
Table 1
Location update scenarios
Move
From
To
ILD
Uintra1
Uintra2
Uintra3
Uintra4
Uinter1
Inside the list
Outside the list
Inside the list
Outside the list
Inside the list
Inside the list
Outside the list
Outside the list
Inside the list
Inside the list
Intra-ILD
Intra-ILD
Intra-ILD
Intra-ILD
Inter-ILD
Uinter2
Uinter3
Uinter4
Outside the list
Inside the list
Outside the list
Outside the list
Outside the list
Inside the list
Inter-ILD
Inter-ILD
Inter-ILD
It has to be a
global list
1515
It can be seen that the following relations hold between
these quantities:
UT ¼ qUintra þ ð1 2 qÞUinter
Uintra ¼ qintra1 Uintra1 þ qintra2 Uintra2 þ qintra3 Uintra3
þ qintra4 Uintra4
Uintra ¼ qinter1 Uinter1 þ qinter2 Uinter2 þ qinter3 Uinter3
þ qinter4 Uinter4
where:
qintra1
qintra2
qintra3
qintra4
qinter1
qinter2
qinter3
qinter4
¼ Pr{stay within the list provided that the MU has
made an intra-ILD move} ¼ z2
¼ Pr{stay out of the list provided that the MU has
made an intra-ILD move} ¼ ð1 2 zÞ2
¼ Pr{move out of the list provided that the MU
has made an intra-ILD movement} ¼ zð1 2 zÞ
¼ Pr{enter the list provided that the MU has made
an intra-ILD movement} ¼ zð1 2 zÞ
¼ Pr{stay within the list provided that the MU has
made an inter-ILD move} ¼ z2
¼ Pr{stay out of the list provided that the MU has
made an intra-ILD move} ¼ ð1 2 zÞ2
¼ Pr{move out of the list provided that the
MU has made an intra-ILD movement} ¼
zð1 2 zÞ
¼ Pr{enter the list provided that the MU has
made an intra-ILD movement} ¼ zð1 2 zÞ
The total cost for the location search procedure is:
ST ¼ tð1 2 zÞðrS1 þ ð1 2 rÞS2 Þ þ ð1 2 tÞðvðð1 2 zÞ
ðrS3 þ ð1 2 rÞS4 ÞÞÞ
The total cost per time unit for location search and
location update is given by:
CG ¼ mUT þ lST
3.1.1. List maintenance
The goal is to achieve a list with an information as much
accurate as possible. This is a condition for the proposed
scheme to perform better than other standards. The system
should have two kinds of information, as stated in Ref. [26]:
(a) Long-term information, stored in a relatively static list,
obtained after the first month of subscription to the service,
for instance. This list would be updated when new
patterns of movements are detected by the system
(or customized by the user) and transmitted to the built-in
memory at the handset; (b) Short-term information:
changes depending on the recent behavior of the user
(last hours or days).
We consider the following maintenance costs:
† Processing of the billing information of the user to build
the list.
1516
A. Quintero et al. / Computer Communications 27 (2004) 1509–1523
† Transfer of this list to the place where it will be stored
(ILD for the local lists, HLR for the global list).
† Notification of the modifications in the list to the mobile
terminal.
The location update costs when the move is intra-ILD
are:
Uintra1 ¼ ð1 2 mÞ £ ðA1 þ Cb Þ
ð3:1Þ
We call CE1 ðkÞ the long-term cost and CE2 ðkÞ the shortterm cost. Both depend on the size k of the list.
Uintra2 ¼ 2Cv þ 8A1 þ 4L
ð3:2Þ
lO
Uintra3 ¼ Cv þ Cb þ 2A1 þ L þ ðCh þ 2Ar þ 2R þ 2D
is the number of calls originated by the mobile per
time unit;
is the number of received calls per time unit;
is the observation period to recalculate the
probabilities.
l
T
We suppose that the mobile terminal visited nj times the
location area Aj during the observation period.
The proposed list update algorithm is as follows:
† The long-term list is updated when the systems estimates
that a new pattern of movement exists. If the system
changes the “static” list every M1 location update
operations, the normalized cost for the long term list is:
SE1 ¼ ðlO þ lÞ £ CE1 ðkÞ=M1
† The short-term list is based on users’ recent events,
and may be re-ordered dynamically. If the mobile
is located frequently in a given area, this is placed
first in the list until the next update. This re-evaluation
is done every M2 location update operations, so the
cost is:
SE2 ¼ ðlO þ lÞ £ CE2 ðkÞ=M2
þ LÞ £ ð1 2 mÞ
ð3:3Þ
Uintra4 ¼ 8A1 þ Cb þ 4L þ 2Cv þ ðCh þ L
þ 2ðD þ R þ Ar ÞÞ £ ð1 2 mÞ
ð3:4Þ
The estimated location update cost for an intra-ILD move
can be deduced from Eqs. (3.1) –(3.4):
Uintra ¼ z2 Uintra1 þ ð1 2 zÞ2 Uintra2 þ zð1 2 zÞUintra3
þ zð1 2 zÞUintra4 ¼ z2 ½ð1 2 mÞðA1 þ Cb Þ
þ ð1 2 zÞ2 ð2Cv þ 8A1 þ 4LÞ
þ zð1 2 zÞ½3Cv þ 10A1 þ 2Cb þ 5L
þ ð1 2 mÞð4ðD þ R þ Ar Þ þ 2Ch þ 2L
ð3:5Þ
Let Uk be the cost for updating a distant pointer (located
at another distant ILD), from another ILD, including the
acknowledgment:
Uk ¼ k £ ð2 £ ðL þ 2 £ D þ RÞ þ Cb Þ
ð3:6Þ
The total maintenance cost of the list is:
SE ¼ SE1 þ SE2
and the total cost for the PBS strategy is:
For inter-ILD moves, the costs are expressed:
Uinter1 ¼ 2A1 þ 3L þ 2R þ 4D þ 2Cb þ
The costs for traversing various network elements are:
A1 :
D:
Ar :
L:
R:
Cv :
Cb :
Ch :
Cost of transmitting a message on A-link between
service switching point (SSP) and LSTP;
Cost of transmitting a message on D-link between
LSTP and RSTP;
Cost of transmitting a message on A-link between
RSTP and service control point (SCP);
Cost of processing and routing a message by LSTP;
Cost of processing and routing a message by
RSTP;
Cost of a database update or query at the VLR;
Cost of a database update or query at the ILD;
Cost of a database update or query at the HLR.
Uk
ð3:7Þ
K
CPBS ¼ CG þ SE
3.2. Cost analysis
X
Uinter2 ¼ 3Cv þ 8A1 þ 2Cb þ 7L þ 6D þ 4R þ 2Ar
X
þ Ch þ Uk
ð3:8Þ
k
Uinter3 ¼ Cv þ 2A1 þ Cb þ 3L þ 4D þ 3R þ 2Ar
X
þ Ch þ Uk
ð3:9Þ
k
Uinter4 ¼ 8A1 þ 2Cb þ 7L þ 6D þ 4R þ 2Ar þ 2Cv
X
þ Ch þ Uk
k
ð3:10Þ
A. Quintero et al. / Computer Communications 27 (2004) 1509–1523
From Eqs. (3.7) – (3.10), the cost for an inter-ILD
location update operation is given by:
The equation for the global cost per time unit is the
following:
CG ¼ mUT þ lST
Uinter ¼z2 Uinter1 þ ð1 2 zÞ2 Uinter2 þ zð1 2 zÞUinter3
þ zð1 2 zÞUinter4
X ¼ z2 2A1 þ 3L þ 2R þ 4D þ 2Cb þ Uk
1517
ð3:18Þ
3.3. Cost comparison
k
þ ð1 2 zÞ 3Cv þ 8A1 þ 2Cb þ 7L þ 6D
X þ 4R þ 2Ar þ Ch þ Uk þ zð1 2 zÞ
Pollini and Chih-Lin [17] proposed a strategy, which we
call Pollini, for location management, and Safa et al. [19]
proposed another strategy, which we call Safa, for solving
the same problem. To be able to compare our strategy to
IS-41, Pollini and Safa, we have to calculate the costs for the
location update and location search operations.
2
k
þ Cv þ 2A1 þ Cb þ 3L þ 4D þ 3R
X þ 2Ar þ Ch þ Uk þ zð1 2 zÞ
3.3.1. Comparison with IS-41
Uis41 : Cost for a location update operation
Sis41 :
Cost for location search operation
Cis41 : Total cost per time unit for location search and
location update operations.
k
þ 8A1 þ 2Cb þ 7L þ 6D þ 4R þ 2Ar
X þ 2Cv þ Ch þ Uk
ð3:11Þ
k
where
Scenarios 1 and 2 deal with the situation in which the
called and calling mobiles are under the same ILD.
In Scenario 1 ðS1 Þ; the called mobile is roaming under its
anchor LA:
Uis41 ¼ 4ðA1 þ L þ Ar þ D þ RÞ þ 2Cv þ Ch
ð3:19Þ
Sis41 ¼ 4ðA1 þ L þ Ar þ D þ RÞ þ Cv þ Ch
ð3:20Þ
and
Cis41 ¼ mUis41 þ lSis41
S1 ¼ 4A1 þ 2L þ Cv þ Cb
ð3:12Þ
In Scenario 2 ðS2 Þ; the called mobile is not found in its
anchor LA. The cost of Scenario 2 is equivalent to the cost
of Scenario 1 plus the cost of traversing a pointer, this is
S2 ¼ S1 þ ð2A1 þ LÞ
ð3:13Þ
In scenarios 3 and 4 (S3 ; S4 ), a distant pointer exists at the
calling ILD towards the current ILD of the called mobile.
The difference is, once again, the cost of traversing a pointer
at the anchor LA:
S3 ¼ 4A1 þ 4L þ 2Cb þ Cv þ 4D þ 2R
ð3:14Þ
S4 ¼ S3 þ ð2A1 þ LÞ
ð3:15Þ
The final expression for the cost of a location update
operation is:
UT ¼ qUintra þ ð1 2 qÞUinter
ð3:16Þ
Using Eqs. (3.12) – (3.16), the location search cost can be
written as:
ST ¼ tðð1 2 zÞðrS1 þ ð1 2 rÞS2 ÞÞ þ ð1 2 tÞðvðð1 2 zÞ
ðrS3 þ ð1 2 rÞS4 ÞÞÞ
ð3:17Þ
ð3:21Þ
We define the relative cost of the proposed scheme as the
ratio of the total cost per time unit to that of the IS-41
scheme, as a function of the call-to-mobility ratio (CMR)
CG
Ut þ CMR £ St
¼
CIS41
Uis41 þ CMR £ Sis41
ð3:22Þ
where CMR ¼ l=m
3.3.2. Comparison with Pollini
To compare with Pollini strategy, we have to consider
that a location update operation is performed only when the
user exits his associated list. So, if z denotes the probability
of being inside the list, the average cost for a location update
operation according to the scheme presented in Ref. [17],
that we call Upollini ; is the following:
Upollini ¼ ð1 2 zÞð4ðA1 þ L þ Ar þ D þ RÞ
þ 2Cv þ Ch Þ
ð3:23Þ
In Ref. [17], an expression for the paging cost is deduced:
CPI ¼ CP ½1 þ vf ðE½K21 Þ
ð3:24Þ
where CP is the cost of paging when the user registers
explicitly, as in IS-41. It is also the cost of paging when the
call is completed in the first location area of the list. vf is the
cost of each paging attempt; E[K ] is the expected number of
location areas in which the system pages the user. It is clear
1518
A. Quintero et al. / Computer Communications 27 (2004) 1509–1523
that the probability of incurring CPI is z (i.e. the probability
of the user being inside the list), and the probability of
incurring CP is (1 2 z). Thus, the paging cost per location
search operation is as follows, using Eq. (9) in Ref. [17]:
Spollini ¼ zCPI þð12zÞCP ¼ CP ½1þzvf ðE½K21Þ
ð3:25Þ
We assume in this paper, for comparison purposes with
the proposed scheme, CP to be the paging cost to find an user
in a single location area in the IS-41 standard, without any
addition of intermediate tables or databases and CP ¼ LþA1 :
In order to obtain the location search cost, we have to add
the fixed cost to the HLR that will conduct the search, and
the cost to establish the TLDN communication channel after
the user has been found. The subsequent paging attempts
should not include these fixed costs. The final expression of
the paging cost per location search operation is:
Spollini ¼ ð4ðA1 þLþAr þDþRÞþCv þCh Þ
ð1þzvf ðE½K21ÞÞ
ð3:26Þ
The global cost for the Pollini strategy with the metrics
used in this paper is:
Cpollini ¼ mUpollini þ lSpollini
ð3:27Þ
3.3.3. Comparison with Safa
Let:
Usafa :
Ssafa :
Csafa :
Cost for a location update operation
Cost for location search operation
Total cost per time unit for location search and
location update operations
The following costs are calculated in Safa et al. [19]:
Usafa ¼ 8A1 þ 4L þ 2Cv þ ð1 2 qÞ
2L þ 4Ar þ 4D þ 4R þ Ch þ
X
!
Uk
ð3:28Þ
k
Ssafa ¼ 6A1 þ 5L þ 4Ar þ 4D þ 4R þ Cv þ Ch
2 pð2tðL þ R þ 2DÞ þ 4Ar þ 2R þ Ch Þ
2 rð2A1 þ LÞ
ð3:29Þ
And the total cost per time unit is
Csafa ¼ mUis41 þ lSis41
ð3:30Þ
model, which captures all relevant aspects of such strategy
in a concise way.
4.1. Comparison with others strategies
In this section, we present the numerical results of the
comparison between our solution and IS-41, Pollini and
Safa, in the cases of the deterministic and quasi-deterministic users. For these purposes, we will vary those
parameters that are more linked to the design of the
profile-based strategy:
† z; the probability of a user being roaming within his
associated list. Its value depends on the degree of
predictability of the customer’s behavior. Deterministic
users have a value of z which is close to 1.
Quasi-deterministic users range between 0.5 and 0.8.
Random users cannot be assigned a list, as we have
already seen. Their values for z would fall below 0.5.
† m; the probability of a user having a local list. It depends
on the geographical characteristics of the network and on
the mobility of the customer. When the size of an LSTP
is large because of the scattered location of mobile users,
we can estimate that the probability of a user moving
under the coverage of such an area is high; on the other
hand, if the LSTP covers a small area, the user is likely to
have his probable location areas among several LSTPs.
The behavior of the user also has an influence depending
on the mobility habits of the customer. The more often
and away he moves, the less likely he is to have a local
list. Table 2 illustrates these relations.
† n; the average number of tries when paging a user within
its list. This depends on the probability distribution of the
user and the size of the list. Uniform, linear and
exponential models are discussed in Ref. [3]. For each
of them, an average value for n is given as a function of k;
the size of the list in number of location areas.
Considering that a good number is 5 location areas in
the list for a user, and a linear-distribution, we find an
average value of 2. This is in fact a pessimistic
approximation, since we are assuming that the first
paging is never fruitful, but at the same time we propose
in this work an algorithm to take advantage of the
short-term events to improve the accuracy of the list.
† vf is the fraction of cost we incur into when paging after
the first time. We will consider always the most
pessimistic case, i.e. vf ¼ 1:
Table 2
Values for m according to users mobility and size of LSTP
Mobility of the user
4. Numerical results
This section presents a comparison with others
strategies for solving the same problem. Then, we present
the performance evaluation of PBS as well as a detailed
Size of LSTP
Small
Large
High
Low
m , 0:4
0:4 # m , 0:7
0:4 # m , 0:7
m $ 0:7
A. Quintero et al. / Computer Communications 27 (2004) 1509–1523
† We assume the following simulation parameters:
Cv ¼ 3; Ch ¼ 6; Cb ¼ 1; R ¼ 1; L ¼ 1:
4.1.1. Quasi-deterministic users (z ¼ 0.8)
For low values of CMR (high mobility), location update
cost dominates over location search cost. The proposed
strategy reports to HLR only when an inter-LSTP move is
performed and the list is local; if the list is global, the HLR
has to be informed when the user enters his ‘personal’ LA.
Thus, the cost reduction is greater for higher values of m
(local list). This reduction can reach 30% of the IS-41.
When CMR is high, the cost of location search dominates
and the saving in location update diminishes. When m
increases, so does the likelihood of a local search that does
not query the HLR but the ILD, resulting thus in a lower cost
in this scenario. In every case, a great amount of reduction is
obtained for the decrease in queries to the HLR when the
profile of the called unit is stored locally (decentralized
architecture). Fig. 4a shows the evolution of the relative cost
for the IS-41 scenario as a function of the CMR.
Due to the fact that Safa exploits the ‘locality’ of many
calls, the cost reduction achieved by our algorithm
comparatively to Safa is not as high as the reduction achieved
comparatively to IS-41. For low values of the CMR, the cost
reduction reaches 50% of Safa algorithm, and for high values
of the CMR the cost reduction is 85%. In this case,
when location search procedure dominates, the saving in
1519
cost from the decentralization is common to the two schemes.
In fact, if the list is local, the sequential paging degrades the
savings in costs (Fig. 4b). Cost reduction compared to Pollini
algorithm can reach 60% for high values of the CMR.
The reduction degrades for low values of CMR and if the list
is global. Whenever location search cost dominates
(CMR greater than 1), the proposed algorithm performs
better than Pollini. Actually, it has to be noted that Pollini
only considers local lists (Fig. 4c).
We can conclude that, with the presented cost structure,
PBS is less costly than IS-41, Safa and Pollini for users with
a high CMR, and that PBS performs significantly better than
IS-41, Safa and Pollini for CMRs lower than 5.
Now we study the variation of n, the number of tries in
the sequential paging that takes place whenever the user is
roaming in its associated list and receives a call.
As expected, when n increases the location search cost is
higher and the relative cost increases too. This effect is more
relevant for high values of CMR, when the location search
cost dominates. For lower CMRs, the savings are more
important for any value of n; but the curves diverge as
CMR increases. In comparison to IS-41, even with n ¼ 4
the reduction is 40%, and goes to 50%.
4.1.2. Deterministic users (z ¼ 0.99)
For deterministic users, the improvement obtained by
PBS is better than the case of quasi deterministic users.
Fig. 4. Comparison in the case of quasi-deterministic users when m varies. (a) Comparison between PBS and IS-41. (b) Comparison between PBS and Safa.
(c) Comparison between PBS and Pollini.
1520
A. Quintero et al. / Computer Communications 27 (2004) 1509–1523
Fig. 5. Comparison in the case of deterministic users when m varies. (a) Comparison between PBS and IS-41. (b) Comparison between PBS and Safa.
(c) Comparison between PBS and Pollini.
Fig. 5 shows the comparison between PBS, IS-41, Safa, and
Pollini when m ¼ varies. In terms of costs, PBS provides
better results than IS-41, Safa and Pollini, and the average
improvement rates are 55, 30 and 48%.
4.1.3. Random users (z ¼ 0.5)
The reduction in cost is more important if the list is local
when m ¼ 1: In terms of costs, PBS provides better results
than IS-41, Safa and Pollini when m varies, and the average
improvement rates are 30, 5 and 40% respectively (Fig. 6).
In the case m ¼ 0:5 and n varies, PBS still provides better
results than Pollini and IS-41 and the average improvement
rates are 30 and 25%, respectively. The cost is the same as in
Safa, no significant improvement is achieved.
4.2. Simulation results
To assess the accuracy of the presented analytical model,
this section presents a performance evaluation of PBS as
well as a detailed model, which captures all relevant
aspects of our approach in a concise way. The simulation
models both the call delivery and mobility behavior of
users offering the ability to consider different service types
and different MT groups over a range of cell-layout
scenarios. Three different cell layout scenarios have been
investigated. The first assumes macrocells only,
the second medium-size microcells while the third smallsize microcells [16].
In our experiments, 500 MTs are simulated and we
generated 1000 samples for each cell layout scenarios
assuming normal distributions using the statistics
estimated from the real data. We run simulations for the
probability of a user being roaming within his associated
list from 0.5 to 0.99. We assume that a user is within that
area covered by its list at least half of time. In practice, it
would not be performer to have a list of likely positions in
which a user is not found at least half of the time. In the
case of users whose position at a given moment is
unpredictable, and the past knowledge of their location
cannot predict their future location our strategy is not
applicable.
Finally, when the size of an LSTP is large because of
the scattered location of mobile users, we can estimate
that the probability of a user moving under the coverage
of such an area is high; on the other hand, if the LSTP
covers a small area, the user is likely to have his
probable location areas among several LSTPs.
Voice model: A stochastic process can describe the voice
traffic model, with arrival times corresponding to the
beginning times of sessions. The call arrival process is
assumed to be Poissonian while the call duration is
exponentially distributed [9,18]. The call arrival rate
(calls/MT/hour) is 3.
A. Quintero et al. / Computer Communications 27 (2004) 1509–1523
1521
Fig. 6. Comparison in the case of random users when m varies. (a) Comparison between PBS and IS-41. (b) Comparison between PBS and Safa. (c) Comparison
between PBS and Pollini.
Each session describes a complete phone call and
contains ON-OFF period. ON periods occur when voice is
generated whereas no voice is generated during OFF
periods. Fig. 7 illustrates call sessions. The ON period
distribution following an exponential law with mean 352 ms
and the OFF period also following an exponential law with
mean 650 ms. Within the ON period, voice arrive at a fixed
rate 1=t: Therefore, 1=t is the sampling rate. The call mean
time duration is 5 min. The exponential distribution has
the following probability density function:
fVoIP ðxÞ ¼ l·e
2 lx
;x $ 0
where l ¼ ð300xÞ21 ; x represents the time.
Mobility model: In this research the MTs are assumed
to be moving at the same velocity V; and their direction
movement is uniformly distributed over [0,2p].
The average number of LA crossing, C, of a zone of
perimeter P is given by C ¼ rPV=p; where r is the users
density in the LA. To perform this evaluation, we define
three classes of users depending on their velocity and the
cell radius that they are roaming in. These categories:
(a) users located in buildings, (b) pedestrians with a
speed following the Gaussian distribution with mean
value 5 km/h and variance 30%, (c) car passengers with
a speed following the Gaussian distribution with mean
value 20 km/h and variance 30%, and (c) car passengers
Fig. 7. Voice model.
with a speed following the Gaussian distribution
with mean value 100 km/h and variance 30% (Table 3)
[16,21]. Finally, we assume that a LA is a square of
5 £ 5 cells and we consider a network that contains 20
LAs. We set the density r to 1000 users per cell.
In Fig. 8a the PBS success probability is presented for the
varying number of LAs in the a user list. When a call arrive
for a mobile, it is paged sequentially in each location
within the list. If the MU is under an area covered by the list,
Table 3
Classes of users
Velocity (km/h)
Cell radius (km)
Class 1
Class 2
Class 3
Class 4
0.1
1
5
2
20
5
100
10
1522
A. Quintero et al. / Computer Communications 27 (2004) 1509–1523
Fig. 8. PBS performance. (a) Success probability for varying number of Las in the list and varying the user profile. (b) Normalized cost for varying number of
Las in the list and varying the user profile.
it is a success. Fig. 8b shows the normalized cost of the our
strategy for the varying number of LAs in the a user list.
a movement pattern which is repeated at the same time
of the day. Table 4 summarizes the average improvement
rates. These values are calculated as: average-improvement-rate ¼ (100- cost ratio) in percentage.
5. Conclusions
In this paper, we proposed a profile-based strategy with
a built-in memory method to reduce the signaling cost
location updates by increasing the intelligence of the
location procedures in mobile systems. The proposed
strategy associates to each user a list of cells to predict the
users’ movement at each period of time. The list is ranked
from to the least likely place where a user is found. When
a call arrives for a mobile, it is paged sequentially in each
location within the list. When a user moves between
location areas in the list, no location update is required.
The results showed that the profile-based strategy has
several advantages over the IS-41, Safa’s solution and
Pollini’s solution, i.e. if the position of a user is always
known in advance, then no explicite registration is
necesssary. Thus, the optimun location area is the one
that minimzes paging cost, a single cell. Deterministic
users exhibit this typs of behavior. We carried out
analytical, statistical and simulation based experiments
to evaluate the performance of our strategy. The results
obtained confirm the efficiency and the effectiveness of
PBS compared with IS-41 and other strategies well known
in the literature. The performance in comparison with the
classical is better for all possible user movement statistics.
This strategy is useful when the subscriber has
Table 4
The average improvement rates
IS-41
Strategy Safa
Strategy Pollini
Deterministic
users (%)
Quasi-deterministic
users (%)
Random
users (%)
65
35
60
55
30
48
30
5
40
References
[1] A. Abutalep, V. Li, Paging strategy optimization in personal
communication system, Journal ACM Wireless Networks 3 (1997)
195 –204.
[2] I. Akyildiz, W. Wang, A Dynamic Location Management Scheme for
Next-Generation Multi-Tier PCS Systems, IEEE Transactions on
Wireless Communications 1 (1) (2002) 178 –189.
[3] A. Aljadhai, T. Znati, Predictive mobility support for QoS provisioning in mobile wireless environments, IEEE Journal on Selected Areas
in Communications 19 (10) (2001) 1915– 1930.
[4] J. Cayirci, I. Akyildiz, User mobility pattern scheme for location
update and paging in wireless systems, IEEE Transactions on Mobile
Computing 1 (3) (2002) 236–247.
[5] EIA/TIA, Cellular radio-telecommunications intersystem operations,
Technical report, IS-41 Revision C EIA/TIA, 1996.
[6] P. Escalle, V. Giner, J. Oltra, Reducing location update and paging
costs in a pcs networks, IEEE Transactions on Wireless Communications 1 (1) (2002) 200–209.
[7] M. Gallagher, S. Randall, Telecommunications Networking with
IS-41, McGraw-Hill, New York, 1997.
[8] J. Gil, Y. Chan, C. Hwang, D. Park, J. Shon, Y. Jeong, Restoration
scheme of mobility databases by mobility learning and prediction in
PCS networks, IEEE Journal on Selected Areas in Communications
19 (10) (2001) 1962–1973.
[9] I. Habib, T. Saadawi, Multimedia traffic characteristics in
broadband networks, IEEE Communications Magazine 30 (7)
(1992) 48–54.
[10] J. Ho, I. Akyildiz, Dynamic hierarchical database architecture for
location management in PCS networks, IEEE/ACM Transactions on
Networking 5 (5) (1997) 646–660.
[11] J. Ho, I. Akyildiz, Mobile User Location Update and Paging
under Delay Constraints, ACM Wireless Networks 1 (4) (1995)
413–425.
[12] H. Hwang, M. Chang, C. Tseng, A direction-based location update
scheme with a line-paging strategy for PCS networks, IEEE
Communications Letters 4 (5) (2000) 149–151.
[13] N. Kruijt, D. Sparreboom, F. Schoute, R. Prasad, Location
management strategies for cellular mobile networks, Electronics
and Communication Engineering Journal (1998) 64–72.
A. Quintero et al. / Computer Communications 27 (2004) 1509–1523
[14] J. Li, H. Kameda, K. Li, Optimal dynamic mobility management for
PCS networks, IEEE/ACM Transaction Networking 8 (2000)
319–327.
[15] J. Markoulidakis, G. Lyberopoulos, D. Tsirkas, E. Sykas,
Mobility modeling in third-generation mobile telecommunications systems, IEEE Personal Communications 4 (4) (1997)
41–56.
[16] J. Markoulidakis, G. Lyberopoulos, M. Anagnostou, Traffic model for
third generation cellular mobile telecommunication systems, Wireless
Networks 4 (5) (1998) 389–400.
[17] G. Pollini, I. Chih-Lin, A profile-based location strategy and its
performance, IEEE Journal on Selected Areas in Communications 15
(8) (1997) 1415–1424.
[18] A. Quintero, Y. Elalamy, S. Pierre, Performance evaluation of a
broadband wireless access system subjected to heavy load, Computer
Communications 27 (9) (2004) 781–791.
[19] H. Safa, S. Pierre, J. Conan, A built-in memory model for reducing
location update costs in mobile wireless network, Computer
Communications 25 (14) (2002) 1343–1353.
[20] H. Safa, S. Pierre, J. Conan, An efficient location management scheme
for PCS networks, Computer Communications 24 (14) (2001)
1355–1369.
[21] H. Safa, S. Pierre, J. Conan, Evaluating location management schemes
for third generation mobile networks, Computer Communications 25
(18) (2002) 1711–1718.
1523
[22] X. Shen, J. Mark, J. Ye, User mobility profile prediction: An adaptive
fuzzy inference approach, Wireless Networks 6 (5) (2000) 363–374.
[23] S. Sen, A. Bhattacharya, S. Das, A selective location update strategy
for PCS users, ACM Journal Wireless Networks 5 (5) (1999)
313–326.
[24] B. Suh, J. Choi, J. Kim, Design and performance analysis of
hierarchical location management strategies for wireless mobile
communication systems, Computer Communications 23 (5) (2000)
550–560.
[25] S. Tabbane, Location management methods for 3rd generation mobile
systems, IEEE Communications Magazine 35 (8) (1997) 72–78.
[26] S. Tabbane, An alternative strategy for location tracking, IEEE
Journal on Selected Areas in Communications 13 (5) (1995) 880–892.
[27] V. Wong, V. Leung, An adaptive distance-based location update
algorithm for next-generation PCS networks, IEEE Journal Selected
Areas in Communications 19 (10) (2001) 1942– 1952.
[28] C. Wu, H. Lin, L. Lan, A new analytic framework for dynamic
mobility management of PCS networks, IEEE Transactions On
Mobile Computing 1 (3) (2002) 208–220.
[29] J. Xie, I. Akyildiz, A novel distributed dynamic location management
scheme for minimizing signaling costs in mobile IP, IEEE
Transactions on Mobile Computing 1 (3) (2002) 163 –175.
[30] F. Yu, V. Leung, Mobility-based predictive call admission control and
bandwidth reservation in wireless cellular networks, IEEE Infocom
(2001) 518–526.