Pii: S0140-3664(00)00202-4

نویسندگان

  • Z. Mao
  • C. Douligeris
چکیده

This paper introduces a location-based locating strategy for Personal Communication Services (PCS) systems. In the proposed scheme, location updates are based on the value of a movement counter. The update of the movement counter is based on information on the locations visited by a mobile terminal (MT) since the last location update. In particular, the cell identi®ers and the corresponding movement counter values are maintained in the MT for a part of the visited cells since the last location update. When the MT enters a cell whose identi®er is not stored in the MT, the movement counter increases by one. If the movement counter reaches the update threshold, a location update is triggered; otherwise, the cell identi®er and the corresponding movement counter value are stored in the MT. When the MT enters a cell whose identi®er is in the MT, the movement counter is assigned with the counter value kept in the MT for this cell, and all cells with greater counter values in the MT are removed. The proposed scheme allows the dynamic selection of the update threshold according to each user's calling and mobility patterns. Analytical and simulation models have been developed to compare the proposed scheme with both the movement-based scheme and the distance-based scheme. Results demonstrate that when the call-to-mobility ratio (CMR) is low, the proposed scheme can achieve a signi®cant cost reduction compared to the movement-based scheme. For example, when the CMR is 0.01, a savings of around 25% in the optimal total cost per call arrival is achieved with the proposed scheme. Moreover, the proposed scheme is easier to implement than the distance-based scheme. q 2000 Elsevier Science B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Channel assignment for GSM half-rate and full-rate traffic

Global System for Mobile Communications (GSM) supports full-rate and half-rate calls. In this paper, we propose analytical and simulation models to study the performance of four channel assignment schemes for GSM half-rate and full-rate traac. Our study indicates that among the four schemes, the repacking scheme has the best performance for mixing half-rate and full-rate traac. We also observe ...

متن کامل

Data embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models

Three-dimensional (3D) graphics is about to become a full-fledged multimedia data type, prompted by increasing popularity of Virtual Reality Modeling Language (VRML) [15] and imminent standardization of MPEG-4 [16]. This paper presents several algorithms for embedding data in triangular meshes, arguably the most important component in both VRML and MPEG 4 in defining arbitrary shapes. A topolog...

متن کامل

Pii: S0140-3664(00)00246-2

Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the requirement of cryptographic key management. This paper examines some security issues on the Internet Key Exchange (IKE) protocol specified in RFC 2409. The investigation is intended for clarifying some specification am...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000