Quantifying the Benefits of Exploiting User Profiles in Cellular Networks
نویسندگان
چکیده
The manner in which users cross cell boundaries in a cellular network has a high degree of predictability due to temporal and spatial locality in user mobility. This is so because user typically take predictable routes during specific times of the day, and these routes cut across cell coverage areas in an ordered sequence. This mobility information on a per-user basis, referred to as user profiles, can be maintained in Home Location Register (HLR) and Visitor Location Register (VLR) databases in the cellular network in order to provide improved Quality of Service (QoS) to cellular users. This QoS improvement can be achieved by exploiting per-user profile to reserve cell resources–particularly the channel bandwidth–prior to cell crossings thereby reducing the handoff blocking (dropout) probability. We consider a model in which the network provides a profile-based QoS at a premium to subscribed users while supporting non-profile users as well. We propose and study the performance of a simple channel-reservation algorithm in which profiled users are allowed to reserve channels prior to entering a cell. A key design issue is to study the impact of the reservation distance and the reservation granularity on the network resource utilization. Through simulation and analysis, we show that this simple algorithm yields significant improvement in the dropout probability of profiled users, and there is an optimal value of the reservation distance and the reservation granularity parameters which results in maximal improvement in the dropout probability of profiled and non-profiled users. Finally, we have developed a simple but approximate analytical model to study the benefits of profiling in cases when simulation might be time consuming. Keywords— User profiles, Channel-reservation algorithm, Quality of Service, Dropout probability, Simulation, Analytical model, Reservation distance, Reservation granularity.
منابع مشابه
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملA social recommender system based on matrix factorization considering dynamics of user preferences
With the expansion of social networks, the use of recommender systems in these networks has attracted considerable attention. Recommender systems have become an important tool for alleviating the information that overload problem of users by providing personalized recommendations to a user who might like based on past preferences or observed behavior about one or various items. In these systems...
متن کاملPrediction of user's trustworthiness in web-based social networks via text mining
In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have binary relationships, there is no direct rating available. Therefore, a new method is required t...
متن کاملImproving the performance of recommender systems in the face of the cold start problem by analyzing user behavior on social network
The goal of recommender system is to provide desired items for users. One of the main challenges affecting the performance of recommendation systems is the cold-start problem that is occurred as a result of lack of information about a user/item. In this article, first we will present an approach, uses social streams such as Twitter to create a behavioral profile, then user profiles are clusteri...
متن کاملExploring and Exploiting Quantum-Dot Cellular Automata
The Full Adders (FAs) constitute the essential elements of digital systems, in a sense that they affect the circuit parameters of such systems. With respect to the MOSFET restrictions, its replacement by new devices and technologies is inevitable. QCA is one of the accomplishments in nanotechnology nominated as the candidate for MOSFET replacement. In this article 4 new layouts are presente...
متن کامل