Registration-Area-based Location Management. Location Management: Context Mobility Management: Enables users to support mobile users, allowing them to.

Slides:



Advertisements
Similar presentations
Lecture 7. Network Flows We consider a network with directed edges. Every edge has a capacity. If there is an edge from i to j, there is an edge from.
Advertisements

Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Data and Computer Communications
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin LECS – UCLA Modified and Presented by Sugata Hazarika.
Location Management in Cellular Networks By Priyanka Patel ( ) Instructor: Prof. Ivan Stojmenovic.
Mobility Management in Mobile Wireless Systems Lecture 9.
Small-world Overlay P2P Network
Location and Handoff Management Lecture 10. Location and Handoff Management The current point of attachment or location of a subscriber (mobile unit)
AHOP Problem and QoS Route Pre-computation Adam Sachitano IAL.
Wireless & Mobile Networking: Channel Allocation
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
Adaptive Routing Proshanto Mukherji CSC 457: Computer Networks University of Rochester.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 A DATA MINING APPROACH FOR LOCATION PREDICTION IN MOBILE ENVIRONMENTS* by Gökhan Yavaş Feb 22, 2005 *: To appear in Data and Knowledge Engineering, Elsevier.
Delivery, Forwarding, and Routing
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
UCSC 1 Aman ShaikhICNP 2003 An Efficient Algorithm for OSPF Subnet Aggregation ICNP 2003 Aman Shaikh Dongmei Wang, Guangzhi Li, Jennifer Yates, Charles.
Lecture 1: Mobility Management in Mobile Wireless Systems Ing-Ray Chen CS 6204 Mobile Computing Virginia Tech Fall 2005.
The Zone Routing Protocol (ZRP)
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
© The McGraw-Hill Companies, Inc., Chapter 3 The Greedy Method.
A Theoretical Study of Optimization Techniques Used in Registration Area Based Location Management: Models and Online Algorithms Sandeep K. S. Gupta Goran.
Energy Efficient Routing and Self-Configuring Networks Stephen B. Wicker Bart Selman Terrence L. Fine Carla Gomes Bhaskar KrishnamachariDepartment of CS.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Modeling and simulation of systems Simulation optimization and example of its usage in flexible production system control.
HERO: Online Real-time Vehicle Tracking in Shanghai Xuejia Lu 11/17/2008.
Network Aware Resource Allocation in Distributed Clouds.
Location Management Schemes. Location Management: Context Mobility Management: Enables users to support mobile users, allowing them to move, while simultaneously.
1. 2 Anatomy of an IP Packet IP packets consist of the data from upper layers plus an IP header. The IP header consists of the following:
Mutual Exclusion in Wireless Sensor and Actor Networks IEEE SECON 2006 Ramanuja Vedantham, Zhenyun Zhuang and Raghupathy Sivakumar Presented.
On the Cost/Delay Tradeoff of Wireless Delay Tolerant Geographic Routing Argyrios Tasiopoulos MSc, student, AUEB Master Thesis presentation.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
Location Management in PCS Networks Report of Dissertation By Manikanta Velaga (Adm. No ) Sanjoy Mondal (Adm. No ) M.Tech (CA)
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
CSE 598/494 – Mobile Computing Systems and Applications Class 13:Location Management Sandeep K. S. Gupta School of Computing and Informatics Arizona State.
A Comparative Cost Analysis of Degradable Location Management Algorithms in Wireless Networks Ing-Ray Chen and Baoshan Gu Presented by: Hongqiang Yang,
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
Routing and Routing Protocols
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
KAIS T On the problem of placing Mobility Anchor Points in Wireless Mesh Networks Lei Wu & Bjorn Lanfeldt, Wireless Mesh Community Networks Workshop, 2006.
Ding-Chau Wang, Weiping He, Ing-Ray Chen Virginia Tech Presented by Weisheng Zhong and Xuchao Zhang CS 5214 (Fall 2015)
Murat Demirbas Onur Soysal SUNY Buffalo Ali Saman Tosun U. San Antonio Data Salmon: A greedy mobile basestation protocol for efficient data collection.
Design and Analysis of Optimal Multi-Level Hierarchical Mobile IPv6 Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems (by I R Chen, Baoshan Gu and S-T Cheng) Presented.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Movement-Based Check-pointing and Logging for Recovery in Mobile Computing Systems Sapna E. George, Ing-Ray Chen, Ying Jin Dept. of Computer Science Virginia.
Dynamic Bandwidth Reservation in Cellular Networks Using Road Topology Based Mobility Predictions InfoCom 2004 Speaker : Bo-Chun Wang
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
William Stallings Data and Computer Communications
Authors: Jiang Xie, Ian F. Akyildiz
A Study of Group-Tree Matching in Large Scale Group Communications
Chapter 3: Wireless WANs and MANs
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
ECE 544 Protocol Design Project 2016
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Data and Computer Communications
Effective Replica Allocation
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Cellular Telephone Networks
Presentation transcript:

Registration-Area-based Location Management

Location Management: Context Mobility Management: Enables users to support mobile users, allowing them to move, while simultaneously offering them incoming calls, data packets, and other services. Consists of: 1. Location management: tracking mobiles and locating them prior to establishing incoming calls (deliverying pending messages). 2. Handoff management (a.k.a. automatic link transfer): rerouting connections with minimal degradation of QoS.

Location Management in Personal Communication Systems (PCS) Keeps track of the location of each user (location tracking) Used in call delivery and in location-dependent services Cells organized in clusters called Registration Areas (RAs) One Location Register for each RA. One Home Location Register for each user. When current LR  HLR then it is called Visitor Location Register (VLR). MH BS MSS

Location Management Problem In static networks, a terminal’s network address serves two purposes: 1. End-node identifier 2. Location (access point) identifier Location management keeps mapping between an end-node identifier and its location identifier Basically a directory problem.

Registration Area-Based Location Management Registration area == a group of cells; update only when crossing a registration area boundary

Location Management: Basic Operations Two primitive operations: 1. Lookup (a.k.a. search/find/paging/locating) operation: is the procedure by which the network finds the location of the mobile. required when a call (message) to a user is placed (to be delivered) 2. Update (a.k.a tracking/move/registration) operation: is the procedure by which the network elements update information about the location of the mobile. required when a user changes its “location” The information gathered during updating/tracking is used during the locating operation

Lookup/Update in PCS Lookup: when a call is placed from cell i to user x, the VLR at cell i is queried first, and only if the user is not found there, is x’s HLR contacted. Update: when user x moves from cell i to j, in addition to updating x’s HLR, the entry of x is deleted from VLR at cell i, and a new entry for x is added to the VLR at cell j.

Location Management infrastructure-based mobile networks maintains location information of mobile elements Location information is used to properly route data and calls to mobile elements Two basic operations Location information update (set info) Location information search (acquire info) Cost-based description Cost, as a metric of resource use. Load of Location management L=f s c s + f u c u Location Management execution costs Update operations Search operations fufu fsfs cucu cscs rates

Location Management: Schemes Several schemes have been developed which are motivated by fundamental trade-off between search operation cost and update operation cost. Schemes which try to minimize one cost tend to increase the other cost Try to optimize the aggregate cost or normalized cost. Categorization: 1. Update Scheme: Static or Dynamic Static update scheme: registration areas Dynamic update scheme: distance/time/movement based strategy 2. Locating Scheme: Static or Dynamic Static location scheme: page all the cells in the network Dynamic location scheme: expanding ring search centered at last reported location of the the user 3. Database Architecture: Flat or Hierarchical

Selection of LM Schemes Cost of location updates and lookups Maximum service capacity of each location database = the maximum rate of updates and lookups that each database can service Space restrictions (size of the location database) Type and relative frequency of call to move operations (call-to-mobility ratio (CMR)).

Example basic scheme Never-update Zero update cost Will have to search the entire network based on the last-known location Always-update No search cost Distance-based update Time-based update

LM improvements Update/search trade-off optimizations Principle of update/search trade-off The more effort spent in updating the information, the less effort needed to seek the information And vice versa Redistribute rates of updates and searches to overall load reduction L = f s c s + f u c u ↓ L = ↓ f s c s + ↑ f u c u Forwarding Pointers, Location Caching etc. Characteristic: optimal point depends on call to mobility ratio (CMR = f s / f u ) Non-trade-off optimizations Do not conform to the update- search trade-off principle Unilateral reduction of one (or more) load components L = f s c s + f u c u ↓ L = ↓ f s c s + f u c u Predictive registration, predictive paging Characteristic: optimal point depends on knowledge of the terminal mobility and/or call model.

RA overlapping as LM improvement Can contain more of a mobile terminal’s mobility a Less registrations a,b,c eliminate registrations of “border movements” b Load balancing a Minimize call loss d a Okasaka and Onoe, Proceedings IEEE VTC’91 b Markoulidakis et al., ACM/Baltzer Wireless Networks 1(1):17-29, 1995 d Bejerano and Cidon, Proceedings ACM MobiCom’98 c Wang and Akyildiz, Proceedings ACM MobiCom’00

Intra and Inter-RA Handoffs Let mobile m be in cell c and registered in RA k (c  RA k ). move from cell c to cell d. In any configuration, we define two types of handoffs: Intra-RA handoff: if d  RA k. Inter-RA handoff: if d  RA k. after handoff the mobile is registered in RA l such that d  Core(l).

Intra- and Inter-RA Calls An intra-RA call is one in which both the caller mobile and the callee mobile are in the same RA. An inter-RA call is one in which both the caller mobile and the callee mobile are in different RA.

Non-overlapping & Overlapping RAs Inter-RA hand-off: a user changes cells and RAs Intra-RA hand-off: a user changes cells within an RA. Inter-RA hand-off doesn’t happen as long as the hand- off can be intra-RA. A non-overlapping cell is serviced by one LR. A overlapping cell is serviced by multiple LRs. Reduction of inter-RA hand- offs. No overlapping With overlapping A B C C B A

Registration Area Overlapping Advantages: Each RA can provide service to more mobiles within their covered area. Reduces the number of inter-RA handoffs Reduce the load to update mobile’s HLR. Disadvantages: the communication overhead for call-delivery and intra-RA handoff is increased. the increase in overhead depends upon the underlying network topology. If this overhead is ignored then the extreme configuration in which each RA has all the cells in the system becomes the “optimal” configuration.

Dynamic resizing of registration areas

Proposed Scheme Dynamically adapts the registration areas to the aggregate call and mobility pattern such that 1. the expected update overhead on mobiles decreases 2. the expected overall signaling system load does not exceed a predefined limit.

Some Notations Core(k): set of cells directly connected to MSS k. RA k : Registration Area of MSS k. a dynamic set of cells. Configuration C = {RA 1, RA 2,..., RA M }. Reconfiguration: changing of configuration The MSSs periodically reconfigure the system in a distributed manner at fixed interval of time T.

Permissible Configurations Property 1: An RA has at least one cell.  no RA is empty i.e. all MSSs are used. G = (V,E): cell adjacency graph V: set of all cells in the system E: (v 1,v 2 )  E iff cells v 1 and v 2 are neighbors. Property 2: The subgraph of G induced by any RA is connected.  no RA has any group of cells disconnected from the remaining cells. Property 3: RA k  Core(k) = Core(k). Initially, RA k = Core(k).

Effect on Intra-Handoff and Call Delivery Costs Even though mobiles a and b belong to the same RA, any calls between them would need to go through two MSSs.

Dynamically Resizing RAs We need to find optimal configuration (allowing overlapping RAs) i.e. configuration which minimizes load on MSSs. When move and call patterns periodically change, a static scheme may not provide a good solution. Our Approach: Allow RAs to be dynamically adapted. Periodically resize RAs to minimize MSS load: Resizing criterion: load reduction due to lesser number of inter-RA handoffs > increase in load due to more expensive call delivery and intra-RA handoffs. If resizing criterion is ignored then each RA will grow to maximum size.

Inclusion and Exclusion Boundary In order to facilitate orderly growth and shrinking of RAs, an MSS only includes and excludes cells from its RAs current boundary. Two types of boundary: 1. Internal Boundary 2. External Boundary MH BS MSS

Problem Formulation Assume an initial non-overlapping topology and configuration Assumption for greater applicability Still applicable to topologies that inherently support overlapping Find the inherent impact of a cell inclusion Keep track of cell-to-cell hand-off and call rates, with respect to users of one registration area: – n c ( r, i, s, j ), n u ( r, i, s, j ) Use those rates with the inherent impact of cell inclusion to see if it is beneficial to include a cell Restrictions Cannot exclude cells that initially belonged to the RA Core of RA

Inclusion/Exclusion Decision The decision to include or exclude a candidate cell is based on whether the resulting configuration will have a lower expected load on MSS. For a given system configuration A, mobility pattern M, and call C, SystemLoad(A,M,C) is the combined signaling load (in terms of message time complexity) as a result of all the handoffs due to M and call- deliveries due to C: SystemLoad(A,M,C) =  Load(k,M,C). In case of inter_RA handoffs and call-deliveries we spilt the signaling overhead equally between the two MSSs involved.

What changes when a cell x is included to an RA r mobility to the cell x from cells of the RA r is now intra-RA mobility mobility from the cell x to the rest of the RA r performed by users already registered in r is now intra-RA mobility. calls to x from cells of r are now intra- RA calls. calls from users of r that are in x to rest of r are now intra-RA calls. Mobility of users in r that move out of cell x into a new RA is now inter-RA mobility. Inter-RA calls of users in r that call from cell x is inter-RA call loading to r. Call the decreasing part of the load Cost inc and the increasing part Cost dec. Now intra-RA hand-offs Here inter-RA hand-offs Now retaining previous RA New inter-RA hand-offs RA border Here Inter-RA calls Now Intra-RA calls New Inter-RA calls Mobile terminals registered in RA Mobile terminals not registered in the RA

Finding the signaling costs There are three cases of signaling costs in a quadruplet ( r, i, s, j ) 1. Cells i, j are both core cells 2. One cell is core cell, the other is non-core cell (included) 3. Both cells i, j are non- core Assuming a typical signaling protocol derive the costs for each operation avav acac  vc  vv

Algorithm Outline 1. Calculate the cells along the RA periphery – Both inside and outside the periphery 2. Send data requests to those cells 3. Receive data responses from cells – Those values n c ( r, i, s, j ), n u ( r, i, s, j ) 4. For each cell, calculate if it should be included or excluded – Make sure that there are no holes created in the geographical continuity of RA 5. Send inclusion or exclusion cells Calculate border cells Query border cells for statistics Calculate what to include and what to exclude Notify cells of their inclusion or exclusion LR cell s

Simulation Discrete Event Simulation using SES Workbench Mobility Models: 1. Highway 2. Urban 1. 1-Dimensional Random Walk 400 cells divided in nine RAs 10,000 MHs call frequency: 1 call per hr to 1 call per 15 min move frequency: 1 handoff per hr to 1 call per 15 min 2. 2-Dimensional Random Walk 50x50 cells organized as 5x5 RA.

Highway Model Highway Systems: Overlapping does not help

Urban Model Urban systems (localized traffic): Overlapping does help Uses a random walk model transition probability of a MH moving farther from a pre-defined pole of attraction drops progressively with the distance from that pole.

Effect of CMR to load with respect to overlapping (1)

Effect of CMR to load with respect to overlapping (2)

Optimal Registration Sequence Problem

Impact of choice on subsequent registrations and impact of knowledge of mobility Without probabilities A mobile terminal can move to either RA 1 or RA 2 Assume that the registration choice is RA 2 However, the mobile terminal moves to the upper end of RA 1, and has to perform one more registration Bad choice, there will be two registrations total With probabilities 0.3 probability of moving to RA probability of moving to RA 2 Then we always choose the most probable On average: 70% of the times the choice will cause 1 registration 30% of the times the choice will cause 2 registrations 1 x x 0.3 = 1.3 registrations Concept of regions: We will refer to an overlapped portion as “region” Availability of registration areas is the same throughout a region Performing a second registration within the same region has no benefit RA 1 RA

Off-line Formulation We need to find the minimum number of registrations along a mobility path Assume a mobility path p from regions ‘a’ to ‘i’. (a) We can make a graph of region adjacency. (b) At each region we know the availability set A, the set of available RAs in the region Using a sort of inner product of mobility path p and availability sets, we make a new partially ordered directed graph. (c) If an edge goes from a node ( k, R i ) to ( m, R i ), then it has weight 0 If an edge goes from a node ( k, R i ) to ( m, R j ), then it has weight 1 Problem is now defined as shortest path problem Can be solved in linear time M(r, p): minimum number of registrations along path p with initial registration choice r (c)

On-line Formulation On-line computational model Need to make a decision at every new region Decision choices include retaining the registration choice so long as it is available. Knowledge of mobility Assumed to be given as a random walk graph With respect to walking across regions Can be extracted from statistical data. Problem formulated as: Find the averaged effect of a registration choice r to all probable subsequent paths p of length k, starting at region g : Expct( r,g,k ) =  all paths p Prob[ p ] × M(r,p) Length k is referred to as look-ahead depth Algorithm Straightforward computation of Expct Finds a registration that minimizes Expct Exponential complexity with respect to look-ahead depth Paths of length 1 Paths of length 2 Paths of length 3 Paths of length 4

Analysis of Competitiveness Competitiveness ratio of an on-line algorithm Defined with respect to a measure on a solution The maximum possible ratio of the measure of the algorithm’s solution over the measure of the off-line optimal solution for an arbitrary input Competitiveness is usually proved using an adversary approach Example for 2-competitive: There are three RAs: A, B, C For any move, we can move to an overlapping region not covered by the chosen RA Example on-line: (AB)B(AC)C(AB)A(BC)C(AB)B(AC)A Example off-line (AB)A(AC)(AB)B(BC)(AB)A(AC) Can be expanded to n -competitive for any arbitrary n. Unlimited lower bound However, for any given topology, there is an upper bound to the competitive ratio a (AB) (AC) (BC) B C A a Konjevod et al., ACM DIAL’M 2002

Average Case Comparison Determine probability that The Expct-minimizing algorithm matches the performance of off-line optimal The random approach matches the performance of the off-line optimal Analysis shows that there is a certain probability that: Random choice will match the optimal algorithm, P random ORS algorithm will match the optimal algorithm, P expct Comparison of those values shows that – P expct ≥ P random ORS algorithm is more likely to match the optimal algorithm

Minimizing Hard registrations Soft registration model Assumption: registrations while not on a hand-off are cheaper (soft registrations) Objective: Minimize hard registrations. Algorithm Pre-emptive application (use before we need) Minimize Expct(1), i.e., look-ahead 1 Converts hard registrations to soft registrations How cheap a soft registration can be to still have a benefit We use the load function to investigate If a is the increase in total number of registrations and b is the average update cost reduction (because hard registrations are converted to soft) Then: Analysis shows linear relation to registrations: The cost ratio between soft and hard registrations has to be at greater than the ratio of increase in total number of registrations.