首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 562 毫秒
1.
陆斌 《通信学报》2007,28(3):125-129
在3G蜂窝网络中,归属位置寄存器(HLR)、网关位置寄存器(GLR)、访问位置寄存器(VLR)组成三级数据库结构。当漫游移动用户在GLR中的位置信息错误或过时时,对该用户的入呼将失败。由于三层结构设计中,GLR与HLR的通信一般涉及国际长途信令,使得GLR的故障恢复设计非常重要。为尽可能减少对长途资源的占有,对GLR故障恢复提出了一种新的算法并对其性能作了相应的分析。  相似文献   

2.
Haas  Zygmunt J.  Lin  Yi-Bing 《Wireless Networks》1998,4(5):419-426
This paper studies the database failure recovery procedure for cellular phone networks as part of the Electronic Industries Association/Telecommunications Industry Association Interim Standard 41 (EIA/TIA IS-41). Before the location information of the database is recovered, phone calls may be lost. The restoration process can be sped up by having the mobile phones to periodically confirm their existence by radio contact with the cellular network. We show that, under some cost assumptions, periodic update interval should be chosen to be approximately equal to the call interarrival time, with more frequent updates for more unreliable system. We also show that the cost of an optimized system is relatively small and stable, if the system is even moderately reliable. Finally, if the system is at least moderately reliable, the effects of call origination rate and the rate at which Location Areas are crossed, are rather small, assuming that the periodic update interval was chosen as stated above. Thus, in such cases, optimization of the size of the Location Area can be made independent of the optimization of the periodic update process.  相似文献   

3.
This paper proposes a restoration scheme based on mobility learning and prediction in the presence of the failure of mobility databases in personal communication systems (PCSs). In PCSs, mobility databases must maintain the current location information of users to provide a fast connection for them. However, the malfunction of mobility databases may cause some location information to be lost. As a result, without an explicit restoration procedure, incoming calls to users may be rejected. Therefore, an explicit restoration scheme against the malfunction of mobility databases is needed to guarantee continuous service availability to users. Introducing mobility learning and prediction into the restoration process allows systems to locate users after a failure of mobility databases. In failure-free operations, the movement patterns of users are learned by a neuro-fuzzy inference system (NFIS). After a failure, an inference process of the NFIS is initiated and the users' future location is predicted. This is used to locate lost users after a failure. This proposal differs from previous approaches using a checkpoint because it does not need a backup process nor additional storage space to store checkpoint information. In addition, simulations show that our proposal can reduce the cost needed to restore the location records of lost users after a failure when compared to the checkpointing scheme  相似文献   

4.
Mobility databases such as home location register and visitor location register are adopted to support mobility management in personal communications services networks. If a visitor location register fails or crashes, the subscribers' services will be seriously degraded due to the loss or corruption of location information. In this paper, we optimize utilization of demand re-registration messages for an adaptive p-persistent backoff database failure restoration scheme. An analytical model is developed and validated with simulations to obtain the optimal utilization using appropriate parameters so that the failed visitor location register is restored with the fastest speed. Some interesting aspects on the performance are studied and their deep insights are observed, such as effects of message sizes on choices of system parameters, effects of the inaccurate estimated number of stations, etc. One observation is that optimizations of utilization and successful transmission probability are two different goals, and a value to achieve the optimal successful transmission probability does not necessarily ensure optimal utilization. Furthermore, we also propose a scheme how to handle the problem with inaccurate (estimated) number of stations.  相似文献   

5.
In a cellular phone system, the service area is partitioned into several location areas (LAs). Every LA is associated with a mobility database called visitor location register (VLR). When a mobile user enters an LA, the user must register to the VLR before receiving any cellular service. If the VLR is full, the registration procedure fails and the system cannot deliver services to the user under the existing cellular technology. To resolve this problem, we propose a VLR overflow control scheme to accommodate the incoming mobile users during VLR overflow. Our scheme only requires minor modifications to the existing cellular mobility management protocols. Particularly, no modification is made to the mobile phones. An analytic model is proposed to investigate the performance of the overflow control scheme. When exercising the scheme, the call setup procedure for an “overflow” user is more expensive than that for a “normal” user. Under the range of input parameters considered in our study, we show that even if the VLR overflow situation is serious, the overhead for exercising the overflow control scheme is very low  相似文献   

6.
In this letter, an integrated location information management strategy is proposed for mobile networks, where local anchor and replica are deployed to efficiently manage the location information of a mobile terminal (MT) based on its call and mobility characteristics. As an MT's user is roaming within the local signal transfer point (LSTP) region serving the user's home or workplace, the MT's location change is reported to a local anchor (LA)-the visitor location register (VLR) associated with the user's home or workplace. Meanwhile, the LA's location is replicated at several switches (called the replicas) originating relatively high call rates to the MT. As a result, the MT's home location register (HLR) needs to be accessed only when the MT changes its LSTP region or an incoming call for the MT is generated by a nonreplica originating switch. This is shown to reduce location tracking costs.  相似文献   

7.
In this paper, a novel Home Location Register(HLR) mobility database recovery scheme is proposed. With database backing-up and signal sending as its key processes, the presented scheme is designed for the purpose of both decreasing system costs and reducing number of lost calls. In our scheme, an algorithm is developed for an HLR to identify such VLRs that there are new MSs roaming into them since the latest HLR database backing up. The identification of those VLRs is used by the HLR to send Unreliable Roaming Data Directive messages to each of them to get the correct location information of those new MSs.Additionally, two kinds of relationships, one between the number of lost calls and the database backing-up period and the other between the backing-up cost and the period, are well analyzed. Both analytical and numerical results indicate that there will be an optimal HLR database backing-up period if certain system parameters are given and the total cost can be consequently minimized.  相似文献   

8.
In this paper, a home location register (HLR) for CDMA mobile communication system (CMS) is introduced. It stores the mobile station (MS) subscribers’ locations and supplementary service information. Call processing procedures for HLR are developed to receive and store subscriber's location coming from mobile exchange (MX) during the location registration, and to transfer subscriber's location and supplementary service information to the MX during the mobile-terminated call setup. For fast call processing by increasing database access speed, a memory-resident database management system is devised. For easy and secure HLR operation, administration and maintenance functions and overload control mechanisms are implemented. Designed HLR hardware platform is expandable and flexible enough to reallocate software blocks to any subsystems within the platform. It is configurable according to the size of subscribers. An authentication center (AC) is developed on the same platform. It screens the qualified MS from the unqualified. The calls to and from the unqualified MS are rejected in CMS. To authenticate the MS, the AC generates a new authentication parameter called “AUTHR“ using shared secret data (SSD) and compares it with the other AUTHR received from the MS. The AC also generates and stores seed keys called “A-keys” which are used to generate SSDs. The HLR requirements, the AC requirements, software architecture, hardware platform, and test results are discussed.  相似文献   

9.
In personal communication services (PCS), the complete location information and subscribers' profiles are kept in a database called the home location register (HLR). Another database, the visitor location register (VLR), is used to store partial location information. When a mobile user is called, the system queries the HLR to determine the location of the called party. Distributed databases have been introduced to improve the efficiency of querying the HLR. This paper presents an alternative means of constructing a distributed database. The proposed database design employs fixed pointers to link distributed data. Each database contains a portion of the system's information as well as several pointers. The pointers identify the location of real data, enabling the system to obtain the required information efficiently. The database of the proposed design is markedly smaller than the fully distributed databases since each database of the proposed design stores only partial information. Subscriber information is stored only in one database, thus allowing a single database, rather than multiple databases, to be updated. The single update presented herein notably reduces the signal traffic load. If the caller is in the registration area of some HLR, which holds the called party's information, the response time is significantly decreased since the transactions are served only by the local database. This phenomenon is referred to as the calling locality. The proposed method effectively shares the database and the network loading that originates from several databases' tracking mobile users in a PCS system. According to the results presented, this method is highly effective for systems with a heavy load and high calling locality. The single update feature of the proposed design reduces the traffic in the signaling link and the processing load of a database. However, the proposed method includes no fault tolerance and therein differs from the fully distributed design  相似文献   

10.
Mobility database that stores the users’ location records is very important to connect calls to mobile users on personal communication networks. If the mobility database fails, calls to mobile users may not be set up in time. This paper studies failure restoration of mobility database. We study per-user location record checkpointing schemes that checkpoint a user’s record into a non-volatile storage from time to time on a per-user basis. When the mobility database fails, the user location records can be restored from the backup storage. Numeric analysis has been used to choose the optimum checkpointing interval so that the overall cost is minimized. The cost function that we consider includes the cost of checkpointing a user’s location record and the cost of paging a user due to an invalid location record. Our results indicate that when user registration intervals are exponentially distributed, the user record should never be checkpointed if checkpointing costs more than paging. Otherwise, if paging costs more, the user record should be always checkpointed when a user registers.  相似文献   

11.
Dynamic mobile user location update for wireless PCS networks   总被引:1,自引:0,他引:1  
The basic architecture of a personal communication network consists of a wireline network and mobile terminals. Each mobile terminal communicates with the wireline network through a nearby base station. In order to route incoming calls to a destination mobile terminal, the network must keep track of the location of each mobile terminal from time to time. This is achieved bylocation update such that each mobile terminal reports its current location to the network at specific time points. When an incoming call arrives, the network will page the mobile terminal starting from the last updated location. A trade-off, therefore, exists between the frequency of location update and the number of locations paged in order to track down the mobile terminal. This paper introduces a location update policy which minimizes the cost of mobile terminal location tracking. A mobile terminal dynamically determines when to update after moving to a new cell based on its mobility pattern and the incoming call arrival probability. The performance of this scheme is close to that of the optimal policy reported earlier. However, the processing time requirement of this scheme is very low. The minimal computation required by this scheme enables its usage in mobile terminals which has limited energy supply and computational power.  相似文献   

12.
13.
In most current implementations of CT2 telepoint systems, only handset initiated calls are allowed. This paper describes a design to allow two-way calling for the CT2 public telepoint system with minimal modifications to the current CT2 infrastructure and the public switched telephone network (PSTN). The design makes use of centralized databases in the home location register (HLR) and visitor location registers (VLR) to track the location of handsets. This location information is stored in the VLR and HLR, and is used by the PSTN to route incoming calls destined for CT2 handsets to the appropriate CT2 telepoint base station (TBS). The TBS connect to the PSTN local exchanges (LE) through the integrated services digital network (ISDN) basic rate interfaces (BRI) for fast out-of-band signaling. We present simulation results of the system with the objective of determining where congestion might occur within the system and to understand the impact of the new implementation on the PSTN. The results indicate that the performance of the system will be limited by the VLR processing speed and the number of ISDN BRI's connecting the ISDN front end (IFE) to the PSTN  相似文献   

14.
Real-time interception systems for the GSM protocol   总被引:1,自引:0,他引:1  
A GSM protocol interceptor is a device located in a (possibly) closed area that listens to information exchanged between base stations (BSs) and mobile stations (MSs). This paper presents three new interception systems for security purposes. The first one (detector) forces all idle MSs nearby to generate activity, which can be used to activate an alarm of MS presence. The second one (selective interceptor) monitors information exchange between MS and BS and, in case of MS activity, (1) extracts messages containing MS identifiers and (2) checks identifiers in a local cache to decide if an external jamming unit should block individual calls (either incoming or outgoing). The third system (enhanced selective interceptor) combines the previous two systems to improve blocking performance. We analyze transactions of the GSM protocol that are relevant to interception system operation. Those transactions impose real-time constraints that we quantify. We present real tests and simulations that address the feasibility of the systems.  相似文献   

15.
This paper studies failure restoration of mobility databases for personal communication networks (specifically, VLRs and HLRs). We model the VLR restoration with and without checkpointing. The optimal VLR checkpointing interval is derived to balance the checkpointing cost against the paging cost. We also model GSM periodic location updating (location confirmation) to quantify the relationship between the location confirmation frequency and the number of lost calls. The HLR failure restoration procedures for IS-41 and GSM are described. We show the number of lost calls in a HLR failure. Both the procedures in IS-41 and GSM cannot identify the VLRs that need to be accessed by the HLR after a failure. An algorithm is proposed to identify the VLRs, which can be used to aggressively restore a HLR after its failure.  相似文献   

16.
3G移动网络中逆向GLR故障恢复算法及分析   总被引:1,自引:0,他引:1  
在3G网络中,当漫游用户在网关位置寄存器(GLR)中的位置信息不正确时,其位置查询将失败,此时将严重恶化系统性能,而传统的位置恢复算法需占用大量长途电路资源。为减少GLR位置恢复过程中对长途电路资源的占有及缩短GLR故障恢复时延,本文提出了一种新的算法逆向GLR故障恢复算法。该算法充分利用用户在访问位置寄存器(VLR)中的用户信息,从而避免在恢复过程中GLR和归属位置寄存器(HLR)的长途信令开销。通过对算法的性能作分析,证明所提出的算法是可行的。  相似文献   

17.
In mobile networks, the location of a mobile user needs to be traced for successful and efficient call delivery. In existing cellular networks, as a mobile user changes his/her location area (LA), a location registration request is sent to the home location register (HLR) to update the user profile to point to the new LA. With a large number of mobile subscribers, this conventional registration strategy will incur a high volume of signaling traffic. We propose a new location registration strategy, called Group Registration (GR), which efficiently reduces the location registration cost by reporting location changes to the HLR for multiple mobile terminals (MTs) in a single location update request message. Specifically, the IDs of the MTs newly moving into an LA are buffered and sent to the HLR for location update in the route response message of the next incoming call to any MT in the LA. An analytic model is developed and numerical results are presented. It is shown that the proposed GR strategy can achieve significant cost reductions compared to the conventional strategy and the local anchor strategy over a wide range of system parameters. Moreover, the GR strategy results in a much smaller call delivery latency than the local anchor strategy.  相似文献   

18.
This paper introduces a dynamic hierarchical database architecture for location management in personal communications service (PCS) networks. The proposed scheme allows the dynamic adjustments of user location information distribution based on the mobility and calling patterns of the mobile terminals (MTs). A unique distribution strategy is determined for each MT, and location pointers are set up at selected remote locations which indicate the current location of the MTs. This method effectively reduces the signaling and database access overhead for location registration and call delivery. Besides, the required processing is handled by a distributed network of directory registers and centralized coordination is not necessary. The functions of the other network elements, such as the home location register (HLR) and the visitor location registers (VLRs), remain primarily unchanged. This greatly facilitates the deployment of this scheme in current PCS networks  相似文献   

19.
Lee  Chae Y.  Chang  Seon G. 《Wireless Networks》2001,7(4):331-341
Location management is important to effectively keep track of mobile terminals with reduced signal flows and database queries. Even though dynamic location management strategies are known to show good performance, we in this paper consider the static location management strategy which is easy to implement. A system with single home location register and pointer forwarding is assumed. A mobile terminal is assumed to have memory to store the IDs of visitor location registers (VLRs) each of which has the forwarding pointer to identify its current location. To obtain the registration point which minimizes the database access and signaling cost from the current time to the time of power-off probabilistic dynamic programming formulation is presented. A Selective Pointer Forwarding scheme is proposed which is based on one-step dynamic programming. The proposed location update scheme determines the least cost temporary VLR which point forwards the latest location of the mobile. The computational results show that the proposed scheme outperforms IS-41, pure Pointer Forwarding, and One-step Pointer Forwarding at the expense of small storage and a few computations at the mobile terminals.  相似文献   

20.
1 Introduction For any multi-user communication system, it is a big problem that the call drops out to the user and service provider. The propagation conditions required for a satisfactory communication can not always be met owing to irregularities in cel…  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号