MOBILITY MANAGEMENT USING PROFILE REPLICATION BASED ON TOTAL NETWORK TRAFFIC STATISTIC DATA

PREM NATH1*, CHIRANJEEV KUMAR2*
1Department of Computer Science and Engineering, Indian School of Mines (ISM), Dhanbad, India-826004
2Department of Computer Science and Engineering, Indian School of Mines (ISM), Dhanbad, India-826004
* Corresponding Author : k_chiranjeev@yahoo.co.uk

Received : 12-01-2012     Accepted : 15-02-2012     Published : 24-03-2012
Volume : 3     Issue : 1       Pages : 353 - 357
J Inform Syst Comm 3.1 (2012):353-357

Cite - MLA : PREM NATH and CHIRANJEEV KUMAR "MOBILITY MANAGEMENT USING PROFILE REPLICATION BASED ON TOTAL NETWORK TRAFFIC STATISTIC DATA ." Journal of Information Systems and Communication 3.1 (2012):353-357.

Cite - APA : PREM NATH, CHIRANJEEV KUMAR (2012). MOBILITY MANAGEMENT USING PROFILE REPLICATION BASED ON TOTAL NETWORK TRAFFIC STATISTIC DATA . Journal of Information Systems and Communication, 3 (1), 353-357.

Cite - Chicago : PREM NATH and CHIRANJEEV KUMAR "MOBILITY MANAGEMENT USING PROFILE REPLICATION BASED ON TOTAL NETWORK TRAFFIC STATISTIC DATA ." Journal of Information Systems and Communication 3, no. 1 (2012):353-357.

Copyright : © 2012, PREM NATH and CHIRANJEEV KUMAR, Published by Bioinfo Publications. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided the original author and source are credited.

Abstract

Location management is most important aspect in personal communication services (PCS) to keep track of mobile users. Most of the location management schemes are designed based on certain assumptions and few factors like call-to-mobility ratio (CMR). But many other factors like location update, handover, paging, sms (short message services), etc. are excluded, which are important enough to be considered. In the proposed paper, we have proposed a mobility management scheme using profile replication based on total network traffic statistic data of mobile user instead of using single factor CMR. The proposed scheme is more realistic in determining the replication of mobile user’s profile as compared to the prior schemes.

Keywords

Mobility Management, Profile Replication, Replication Factor (RF).

Introduction

In personal communication services (PCS), services to the mobile users are provided irrespective of their location and movement. A mobile user should be tracked and located in order to set up a call [1-3,13] . Location tracking operation in a PCS networks is expensive because many signal flows and database queries are needed to achieve the task. A well-known basic and simple scheme is two-tier Home location register/Visitor location register (HLR/VLR) scheme to update the location of each mobile user using HLR and VLR.
Many location management schemes are developed in the manner which tries to minimize one cost and tends to increase the other cost but tries to optimize the aggregate cost. These schemes can be classified as static and dynamic [9,11] . Most of the schemes proposed for location management are developed based on the notion of call-to-mobility (CMR) factor and some schemes, generally forwarding pointer schemes exploit the mobility pattern of mobile nodes to reduce the signaling cost to query the HLR. Recent advancements in location management schemes focus on per-user-based scheme in which location update and searching of mobile nodes can be adapted dynamically based on users’ call and mobility patterns. For example, when the frequency of incoming calls is higher than the mobile user’s mobility rate, that is, when the CMR value is high, the caching/replication schemes [4,7] is effective but when CMR is low, the forwarding pointer schemes as proposed in [20] is effective. Therefore, under the notion of per-user-based location management schemes, the better schemes can be selected based on the value of CMR. There is another scheme called hybrid scheme proposed in [5,13] that combines replication and forwarding techniques.
Most of the prior schemes is based on certain intuitions and assumptions and hence might not correctly model real system. Since the mobile users' mobility behavior in a wireless communication system is complicated and some of these prior schemes are oversimplified and they only specifically focus on certain factors like CMR. Also these schemes do not consider factors like total location update, handover, paging, etc. These factors are important enough to be considered while designing the mobility management scheme. Therefore, the prior mobility management schemes (caching, replication, and hybrid) lack adequate mobility parameters in consideration and thus lack accuracy to reflect the real mobility behavior of mobile users.
The proposed scheme relies on the plurality of network traffic statistic data. We use expression “mobile node” and “mobile user” interchangeable in this paper. The rest of this paper is organized as follows. Section 2 contains the location management procedure involved in hybrid scheme [5] . Section 3 elaborates the proposed scheme. Section 4 contains the performance evaluation of proposed scheme and existing scheme (Hybrid). Section 5 ends with conclusion and future study.

Location Management in Hybrid Scheme [5]

Under hybrid scheme [5] , the communication system applies the optimal number of replicas and the optimal forwarding chain length in order to minimize the total signaling cost. A lookup table is built up and applied to all mobile nodes at runtime to identify the optimal number of replicas and the optimal forwarding chain length to be used for each mobile node. The lookup table is kept at HLR to reduce the runtime overhead of determining the optimal number of replicas and forwarding chain length of a mobile. But this scheme adds more processing at HLR and also creates complexity by adding look up tables for mobile nodes at HLR.
A location update under hybrid strategy [5] proceeds when mobile node enters a new RA. The value of threshold K is checked. In case of threshold (K) is reached new chain is started and h replications of mobile node’s profile are made otherwise new MSC/VLR links with old MSC/VLR and K is incremented. The call delivery in hybrid scheme [5] takes place as follows. The caller VLR/MSC checks whether it has replica of called mobile node or not. If replica of called node found, it sends call request to the first VLR/MSC in the forwarding chain. Otherwise the caller VLR/MSC sends location request message to the HLR of called mobile node and gets the routing information. HLR sends the routing information which includes the first VLR/MSC of the forwarding chain. The caller VLR/MSC contacts the current VLR/MSC of the called mobile node through first VLR/MSC in the forwarding chain and call setup is made.

Proposed Profile Replication Scheme

We have proposed a novel per user’s profile replication scheme which is based on the total network traffic statistic data of the mobile user. We have observed that in most of the existing schemes, especially in [4-5,7,20] CMR plays greater importance. It is very much obvious that CMR represents a ratio only, which barely shows whether a mobile node is more active in calling or moving. But there are other factors like handover, location update, paging, SMS, etc which are also important in deciding the locality of a mobile user. Therefore, all these factors are considered together in the proposed scheme in order to predict the optimal replication probability (rorp). The number of replication of a mobile user’s profile is decided based on the rorp.
We have defined the entity called replication factor (RF) in terms of number of mobile terminated calls (mtci,j), number of handover (ph), number of location update (pl), number of paging (pp), and number of SMS (smsi,j) within a certain time period recorded by VLR/HLR of a mobile node.



Where, mtci,j is the number of mobile terminated calls to mobile node i from mobile node j and smsi,j is the number of SMS to mobile node i from mobile node j.

Replication Strategy

Suppose a mobile node MNi is currently under VLRm and a correspondent node CNj is under VLRn. There are mtci,j calls and smsi,j from CNj to MNi in time period T. There are ph number of handover, pl number of location update, pp number of paging under VLRm in time T. Following steps are adapted while deciding the replication of mobile node’s working profile:
1. HLR periodically accesses the replication factor (RF) in time T of a mobile node referred by VLRn.
2. Now, HLR accesses the total mobile node’s working profile reference made in time T by all the MSC/VLRs from which calls and SMSs are generated to mobile node and HLR decides the optimal replication probability (rorp) of VLRn as follows:




Where,
• m is the number of calls to the considered mobile node from different users and n is the number of SMSs to considered mobile node from different users
• a is the handover computation factor applied on mobility rate (lm), MTC (mobile terminated call), MOC (mobile originated call), and other cause d.
• b is the location update computation factor applied on mobility rate and other cause e.
• g is the paging computation factor applied on MTC and other cause f.
3. If VLRn has higher optimal replication probability (suppose rorp³ 0.5) then working profile of mobile node is replicated to VLRn and such records (Replication Table) are kept at HLR.
The proposed system model has been shown in [Fig-1] . Working profile (WP) of a mobile user is replicated at h VLRs by HLR. This replication is done periodically, for example once in a day. Replication is done only when the total cost of accessing a HLR is more than the cost of maintenance user’s profile by a VLR for certain time period. Suppose there are w number of HLR access by a VLR for certain mobile user in time T and cost of maintaining the user’s working profile (WP) is uwp, then as per the cost details given in section 4,
fuwp ≤ wz and N´uwp is within the bearable limit of storage capacity of a VLR
Where N, f, and z are the total number of working profiles of different mobile users maintained by the VLR, the cost of accessing other network elements except HLR, and the cost of accessing HLR and getting location information of a mobile user.

Location Update in Proposed Scheme

• The location of a mobile node is updated as follows:
• The mobile node sends a location update message to the serving BTS.
• The serving BTS sends message to serving MSC/VLR.
• The serving MSC/VLR forwards it to the mobile node’s HLR.
• The HLR updates the location of the mobile node and sends location deregistration message to old VLR.
• HLR sends an update message to all VLRs where mobile node’s profile replica is stored. All VLRs update the mobile node’s profile replica.

Call Setup in Proposed Scheme

The call setup is carried out asas shown in [Fig-2] . The calling user sends call request (RQ-Call) to its VLR/MSC via BTS. The VLR/MSC checks whether it has working replica of called mobile user or not. If replica is there, it contacts the VLR/MSC of called mobile user directly. Otherwise it gets (RQ-LO) routing information (Routing-Info) from HLR of the called mobile user and call setup is made thereafter.

Performance Analysis

The variables/references and values used [5,11,18] are given in Table-2.

Location Management Cost of Proposed Scheme

We assume that the location update proceeds in the same way as in IS-41/GSM but the replication update to the VLRs where replication by HLR takes place in T time.
1. Cost of Location Update:

pL = C1 + C2 + 2C4 + 2uvlr + uhlr + h(C4 + uwp) (3)

And the call setup (mobile terminated call to a particular mobile node) cost per call is given in equation (4).

pc = C1 + C2 + rorp(2C2 + 2C3 + up + uvlr)+ [] C4 + uvlr + rorp (C4 + uwp) + (1-rorp)(2C2 + 3C4 + up + uvlr + rorp´up) ] (4)

Suppose there are lc numbers of mobile terminated calls in time T.
So we have,



pT = (1+lc)(C1+C2) + 2C4 + 2uvlr + uhlr + h(C4 + uwp)+ lc [ rorp(2C2+ 2C3 + up + uvlr) + (1-rorp) {C4 + uvlr + rorp(C4 + uwp)+ (1-rorp)(2C2+ 3C4 + up+ uvlr + rorp´up)} ] (6)
And the average cost involved in location management per call is obtained as given in equation (7).

The Cost of Location Management Involved in Hybrid Scheme [5]

The location update cost of hybrid scheme as discussed in section 2, is calculated as follows. Suppose yLH is the location update cost. First we determine the probability of crossing a RA which is a crucial factor involved in building and maintaining the chain. Let rK is the probability of crossing K registration area (RA), so using the proposal given in [18,21] , we have for K=0, 1, 2, … (8)
So,



The cost of call setup in hybrid scheme as discussed in Section 2 is as follows:



(10)

Therefore, the total cost involved in location management in hybrids scheme is given in equation (11).


(11)

Where K¢ =1, 2, 3, …, K
And the average cost involved in location management is obtained as given in equation (12).

(12)

The cost comparisons of hybrid and proposed location management schemes have been shown in [Fig-3] , [Fig-4] , [Fig-5] , and [Fig-6] . Referring to [Fig-3] , probability factors rrep and rorp range from 0.1 to 0.99 (10% to 99%) and the number of replications, calls are considered equal and fixed. The number of VLRs accessed to reach current VLR in the chain in hybrid scheme is kept at the best, i.e. K¢=1. Referring to [Fig-4] , the probability factors rrep, and rorp are kept fixed at 50% and number of calls (lc) is fixed at 5. But the number of replications (h) varies from 1 to 10. Referring to [Fig-5] , the probability factors rrep, and rorp are kept fixed at 50% and number of replications (h) is fixed at 5, but number of calls (lc) and threshold (K) vary from 1 to 10. Referring to [Fig-6] , the probability factors rrep, and rorp are kept fixed at 50% and number of replications (h) is fixed at 5, but number of calls (lc) and K¢ vary from 1 to 10.

Conclusion and Future Scope

It is very much obvious from the illustrations shown in [Fig-3] , [Fig-4] , [Fig-5] , and [Fig-6] that the proposed scheme outperforms the prior hybrid scheme. The total cost of location management involved in proposed scheme is less than total cost involved in prior hybrid scheme. The proposed scheme is more realistic while considering the replication factor (RF) as compare to the factor CMR used in prior scheme (replication, caching, and forwarding pointer). We believe that the effects of factor h/lc over total location management cost in proposed scheme can be considered for further study.

References

[1] Chien-Hsing Wu, Lin Huang-Pao, Lan Leu-Sing (2002) IEEE Transactions on Mobile Computing, 1(3), 208-220.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[2] Alejandro Q., Oscar G., Samuel P. (2004) Computer Communication, 27, 1509-1523.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[3] Xian W., Pingzhi F., Li Jie, Yi-Pan (2008) IEEE Transactions on Vehicular Technology , 57(6), 3815-3831.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[4] Jain R., Lin Y.B., Lo C. and Mohan S. (1994) IEEE Journal Selected Areas in Communications, 12(8), 1434-1444.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[5] Ing-Ray Chen and Baoshan Gu (2003) IEEE Transactions on Mobile Computing, 2(1), 3-15.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[6] Po-Jen Chuang, Shien-Da Chang and Tun-Hao Chao (2009) Tamkang Journal of Science and Engineering, 12(1), 29-44.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[7] Shivakumar N., Jannink J. and Widom J. (1997) ACM-Baltzer J. Mobile Networks and Nomadic Applications, 2(2), 129-140.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[8] Jie Li, Yi Pan (2004) Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[9] Yi-hua Z., Victor C.M. Leung (2008) IEEE Transactions on Wireless Communication, 7(9), 3507-3516.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[10] Xiao Y. (2003) IEEE Communications Letters, 7(8), 358-360.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[11] Berzin Oleg (2009) Computer Networks 53, 2153-2181.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[12] Yu Liu, Qiang Shen, ZhiJun Zhao and Hui Tang (2011) Journal of Networks, 6(4).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[13] Md. Mohsin Ali, Md. Ziaur Rahman Khan, and Md. Ashraful Alam (2010) International Journal of Computer Applications 3(7).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[14] Kong K. (2008) IEICE Transactions on Communications, 91(11), 3595-3607.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[15] Lin Y.B. (1998) IEEE Transaction on Vehicular Technology, 47(1), 58-64.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[16] Wenchao Ma and Yuguang Fang (2005) IEEE Transactions on Vehicular Technology, 54(3).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[17] Jinkyung HWANG and Myong-Soon Park (2003) IEICE Trans. Communication, 86(11).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[18] Jie Li, Yi Pan, and Xiaohua Jia (2002) IEEE Transactions on Vehicular Technology, 51(5), 1109-1119.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[19] Wenchao Ma and Yuguang Fang (2002) IEEE Transactions on Mobile Computing, 1(1), 32-45.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[20] Kant C.R., Arun P. and Prakash N. (2007) IET Communications, 1(6), 1224-1229.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[21] Xian Wang; Pingzhi Fan; Jie Li; Yi Pan (2008) IEEE Transactions on Vehicular Technology, 57(6), 3815-3831.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

Images
Fig. 1-
Fig. 2-
Fig. 3- Total Cost Comparison Varying the Probability (rorp, rrep)
Fig. 4- Total Cost Comparison Varying No. of Replications
Fig. 5- Total Cost Comparison in Different Scenarios
Fig. 6- Total Cost Comparison in Different Scenarios
Table 1-