Mobility Management in Mobile Computing and Networking Environments
نویسنده
چکیده
This chapter analyzes and proposes some mobility management models and schemes by taking into account their capability to reduce search and location update costs in wireless mobile networks. The first model proposed is called the built-in memory model; it is based on the architecture of the IS-41 network and aims at reducing the homelocation-register (HLR) access overhead. The performance of this model was investigated by comparing it with the IS-41 scheme for different call-to-mobility ratios (CMRs). Experimental results indicate that the proposed model is potentially beneficial for large classes of users and can yield substantial reductions in total user-location management costs, particularly for users who have a low CMR. These results also show that the cost reduction obtained on the location update is very significant while the extra costs paid to locate a mobile unit simply amount to the costs of crossing a single pointer between two location areas. The built-in memory model is also compared with the forwarding pointers’ scheme. The results show that this model consistently 701 E. Chocolate Avenue, Suite 200, Hershey PA 17033-1240, USA Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.irm-press.com IRM PRESS This chapter appears in the book, Wireless Inf mation Hi hways, edited by D mitrios Ka saros, Alexandros Nanopoulos and Yannis Manalopoulos. Copyright © 2005, IRM Press, an imprint of Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited.
منابع مشابه
Access and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملThe TIMELY adaptive resource management architecture
Mobile computing environments that seek to support communication-intensive applications need to provide sustained end-to-end networking resources to static and mobile ows in the presence of scarce and variable wireless bandwidth, bursty wireless channel error, and user mobility. In order to achieve this goal, we present the TIMELY adaptive resource management architecture and algorithms for res...
متن کاملChallenges and Solutions to Adaptive Computing and Seamless Mobility over Heterogeneous Wireless Networks
Recent years have witnessed the rapid evolution of commercially available mobile computing environments. This has given rise to the presence of several viable, but non-interoperable wireless networking technologies-each targeting a niche mobility environment and providing a distinct quality of service. The lack of a uniform set of standards, the heterogeneity in the quality of service, and the ...
متن کاملA review of methods for resource allocation and operational framework in cloud computing
The issue of management and allocation of resources in cloud computing environments, according to the breadth of scale and modern technology implementation, is a complicated issue. Issues such as: the heterogeneity of resources, resource dependencies to each other, the dynamics of the environment, virtualization, workload diversity as well as a wide range of management objectives of cloud servi...
متن کاملAdaptive Service in Mobile Computing Environments
Emerging communication-intensive applications require signiicant levels of networking resources for eecient operation. In the context of mobile computing environments, limited and dynamically varying available resources, stringent application requirements, and user mobility make it diicult to provide sustained quality of service to applications. This paper addresses the above issues, and propos...
متن کاملVirtual Repositories in Delay Tolerant Networks
The lack of contemporaneous end-to-end paths often characterize mobile computing environments, for which Delay Tolerant Networking is designed. In this work, we present a novel routing protocol using Virtual Repositories to assist in location-based forwarding when the location of a destination node is unknown. We compare the protocol to other existing protocols under two mobility models, Random...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015