PDA

View Full Version : Location management techniques for mobile systems



ptt3i
2010-06-28, 07:29 PM
Locating users in mobile environment is an essential problem in PCS that becomes more challenging as the network size increases and the user population grows. In third generation mobile systems, the signaling traffic and processing overhead of location updates is expected to grow tremendously leading to poor performance. Therefore location management schemes should aim at reducing the cost of updates.

ncinta
2010-06-29, 03:14 AM
Please identify the file and confirm whether it is the Elsevier paper as described below:
Location management techniques for mobile systems





References and further reading may be available for this article. To view references and further reading you must purchase (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a) this article.


Amal Elnahashttp://www.sciencedirect.com/scidirimg/entities/REcor.gif (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=high&_orig=search&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=f3108801b4c11ded1ff1b55ff5c3ad75#m4.cor*), http://www.sciencedirect.com/scidirimg/entities/REemail.gif (amal@dataxprs.com.eg) and Noha Adlyhttp://www.sciencedirect.com/scidirimg/entities/REemail.gif (noha@dataxprs.com.eg)

Faculty of Engineering, Computer Science Department, Alexandria University, 21544, Alexandria, Egypt


Received 1 January 2000;
revised 23 June 2000;
accepted 23 September 2000. ;
Available online 19 December 2000.

Abstract

Locating users in mobile environment is an essential problem in PCS that becomes more challenging as the network size increases and the user population grows. In third generation mobile systems, the signaling traffic and processing overhead of location updates is expected to grow tremendously leading to poor performance. Therefore location management schemes should aim at reducing the cost of updates. Yet, the lookup delay should be kept minimum. This paper aims at classifying the various approaches used for location management of mobile users by grouping them into two main categories. The first category comprises techniques that focused on reducing the cost of looking up a user and adjusted the update process accordingly. These are classified into replication, caching and selective paging techniques. The second category consists of techniques that focused on reducing the cost of updates and maneuvered the update policy to reduce the lookup cost by informing the system with the maximum possible information about user's mobility. This could be achieved by the use of statistic collection, estimation or prediction processes. We classify those schemes into three main classes: schemes based on forwarding pointers, learning-based schemes and prediction-based schemes. By investigating the technical significance of each class a new direction for future research is proposed which favors the second category of location techniques and emphasis the importance of adopting suitable learning and prediction techniques to optimize the overall location cost.


Article Outline

1. Introduction (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#toc1)2. System model (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#sec1)3. Lookup and paging techniques (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#sec2)3.1. Replication (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#sec3)3.1.1. Working set replication (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#toc2)3.1.2. User profile replication (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#toc3)3.1.3. Hierarchical replication (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#toc4)3.2. Caching (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#sec4)3.2.1. Caching in two-tier architecture (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#toc5)3.2.2. Caching in hierarchical architecture (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#toc6)3.3. Selective paging techniques (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#sec5)3.3.1. Selective paging given the location probability (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#sec6)3.3.2. Selective paging using geographical information (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#sec7)3.3.3. Selective paging using mobility information (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#toc7)4. Location update techniques (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#sec8)4.1. Forwarding pointers techniques (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#toc8)4.2. Learning-based techniques (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#toc9)4.3. Prediction based techniques (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#toc10)4.3.1. Location management (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#toc11)4.3.2. Resource reservation (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#toc12)5. Conclusion (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#sec9)References (http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#bibl1)


http://www.sciencedirect.com/cache/MiamiImageURL/B6V0C-41XV9MJ-1-1C/0?wchp=dGLbVlW-zSkzVFig. 1.

View Within Article
(http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6V0C-41XV9MJ-1&_user=10&_coverDate=12%2F31%2F2000&_rdoc=1&_fmt=full&_orig=search&_cdi=5643&_sort=d&_docanchor=&view=c&_searchStrId=1384375157&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=874902e0d0ac308f712b7adee50ad59a#fig1)





Corresponding author. Tel.: +20-203-582-4477; fax: +20-203-492-8200

Information Sciences (http://www.sciencedirect.com/science/journal/00200255)
Volume 130, Issues 1-4 (http://www.sciencedirect.com/science?_ob=PublicationURL&_tockey=%23TOC%235643%232000%23998699998%23222342%23FLA%23&_cdi=5643&_pubType=J&view=c&_auth=y&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=b6a168ce767bd50ef7a54c14ba653d14), December 2000, Pages 1-22

ptt3i
2010-06-29, 04:06 AM
Please identify the file and confirm whether it is the Elsevier paper as described below:
Location management techniques for mobile

What is the purpose of this post,baby?

:time: