• Nem Talált Eredményt

PhD.ThesisSzalayM´at´e NovelMobilityManagementAlgorithms

N/A
N/A
Protected

Academic year: 2023

Ossza meg "PhD.ThesisSzalayM´at´e NovelMobilityManagementAlgorithms"

Copied!
99
0
0

Teljes szövegt

(1)

Department of Telecommunications

Novel Mobility Management Algorithms

PhD. Thesis

Szalay M´at´e

Research supervisor: Dr. Imre S´andor

Budapest, 2006.

(2)
(3)

I hereby certify that this material, which I now submit for assessment on the programme of study leading to the award of PhD is entirely my own work and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work.

Alul´ırott Szalay M´at´e kijelentem, hogy ezt a doktori ´ertekez´est magam k´esz´ıtettem, ´es abban csak a megadott forr´asokat haszn´altam fel. Minden olyan r´eszt, amelyet sz´o szerint, vagy azonos tartalomban, de ´atfogalmazva m´as forr´asb´ol ´atvettem, egy´ertelm˝uen, a forr´as megad´as´aval megjel¨oltem.

Budapest, 2006.10.03.

...

Szalay M´at´e

A dolgozat b´ır´alata ´es a v´ed´esr˝ol k´esz¨ult jegyz˝ok¨onyv a k´es˝obbiekben a d´ek´ani hivatal- ban el´erhet˝o.

(4)
(5)

Contents

1 Introduction 1

1.1 Motivation . . . 1

1.2 Background . . . 1

1.3 Terminology . . . 2

1.4 An Engineering Problem . . . 3

1.5 Research Goals . . . 4

1.5.1 Universal Location Management Model . . . 4

1.5.2 Novel Mobility Management Mechanisms . . . 4

1.6 Research Methodology . . . 4

1.7 Structure . . . 5

2 Related Work 6 2.1 IP Mobility . . . 6

2.1.1 Mobile IPv4 . . . 6

2.1.2 Mobile IPv6 . . . 7

2.2 Markov Chains . . . 8

2.3 Location Management . . . 8

2.3.1 Hierarchical Location Management . . . 8

2.3.2 Paging . . . 9

2.3.3 Location Management Algorithms . . . 9

2.4 Cellular Network Structure Models . . . 10

2.5 Modelling the MN movement and packet delivery . . . 11

3 Mobility Management Classification 13 3.1 Introduction . . . 13

3.1.1 Mobility Management Hierarchy . . . 13

3.2 Single-layer (Flat) Solutions . . . 14

3.2.1 Exact Location is Known . . . 14

3.2.2 Exact Location is not Known . . . 16

3.2.3 Summary of Single-layer Solutions . . . 17

3.3 Hierarchical Solutions . . . 18

3.3.1 Two Layers . . . 18

3.3.2 More Layers . . . 20 iii

(6)

3.3.3 Summary of Multi-layer Solutions . . . 20

3.4 Empty Classes . . . 20

4 LTRACK 22 4.1 Introduction . . . 22

4.2 LTRACK Network . . . 22

4.3 Mechanisms . . . 23

4.3.1 Locating the Mobile Node . . . 23

4.3.2 Handover . . . 24

4.4 Qualitative Analysis . . . 25

4.5 Simulation . . . 27

4.5.1 LTRACK vs. Other Protocols . . . 27

4.5.2 Limiting the Number of Tracking Handovers . . . 28

4.5.3 Using LTAs . . . 29

4.5.4 Limiting the Number of Visited Nodes . . . 30

4.6 Analytical Model . . . 31

4.6.1 LTRACK Network Model . . . 31

4.6.2 Parameters . . . 32

4.6.3 LTRACK Over Tree Topology Network . . . 33

4.6.4 Cost Function . . . 34

4.6.5 Handover Model . . . 35

4.6.6 Modelling the existing solutions . . . 41

4.6.7 Optimizing LTRACK . . . 41

4.6.8 Analysis and Comparison . . . 48

4.7 Summary . . . 55

5 Hierarchical Paging 56 5.1 Introducing Hierarchical Paging . . . 56

5.1.1 The Approach . . . 56

5.1.2 Mechanisms . . . 56

5.2 Qualitative Considerations . . . 57

5.3 Analytical Model . . . 58

5.3.1 Network Model . . . 58

5.3.2 Mobility Model . . . 58

5.3.3 Markov-model . . . 59

5.4 Changing the Parameters . . . 64

5.4.1 The Effect of the Number of Subnetworks (k) . . . 64

5.4.2 Flat vs. Hierarchical Paging . . . 65

5.4.3 The Effect of the Size of the Network (L) . . . 66

5.4.4 The Effect of the Mobility Ratio (p) . . . 66

5.5 Simple Simulations . . . 70

5.5.1 Simulation Environment . . . 70

5.5.2 Simulation Goals . . . 70

(7)

5.5.3 Simulation Parameters . . . 70

5.5.4 Simulation Results . . . 70

5.6 Advanced simulations . . . 71

5.6.1 Simulation Environment . . . 71

5.6.2 Simulation Goals . . . 71

5.6.3 Simulation Parameters . . . 71

5.6.4 Simulated Algorithms . . . 72

5.6.5 Comparative Simulation . . . 72

5.6.6 Cost Coefficients . . . 74

5.7 Special Considerations . . . 75

5.7.1 More Layers . . . 75

5.7.2 A Specific Problem . . . 75

5.7.3 Dynamic Allocation of Layers . . . 76

5.8 Summary . . . 76

6 Conclusions and Future Work 77 6.1 Conclusions . . . 77

6.2 Application of the Results . . . 78

6.3 Future Work . . . 78

List of Figures 80

List of Abbreviations 82

References 83

Publications 87

(8)
(9)

Chapter 1 Introduction

1.1 Motivation

Over the past few years there has been extreme growth in wireless communications. While mobile telephony remains one of the most widespread mobile application, mobile web browsing, sending and receiving email or even mobile banking are becoming more and more widely used. There is a fierce competition among service providers, and efficiency is very important factor in this competition. A provider that can use its infrastructure in a more efficient way has a competitive advantage over the others.

1.2 Background

Any mobility protocol has to solve two separate problems: location management (some- times called reachability) and session continuity (sometimes referred to as handover man- agement). Location management means keeping track of the positions of the mobile nodes in the mobile network, session continuity means to make it possible for the mobile node to continue its sessions (e.g. phone calls) when the mobile node moves to another cell and changes its service access point.

In my thesis I am concentrating on location management and not session continuity.

It is important to note, that for this reason the terms location management and mobility management are used interchangeably.

Location management has to address the following questions[4]:

When should the mobile terminal update its location to the network?

1

(10)

When a call arrives, how should the exact location of the called mobile equipment be determined?

How should user location information be stored and disseminated throughout the network?

These problems are usually solved in two stages: location registration (or update or tracking) and call delivery (or searching)[1].

The solution usually use a hierarchical approach, see Section 3.1.1.

Because of the growth of mobile communications and the limitations of resources (es- pecially frequency), more and more efficient algorithms are needed for routing, call man- agement and location management.

1.3 Terminology

In a wireless network service access points are usually calledbase stations. The node that is moving around in the mobile network is calledmobile node ormobile equipment. Mobile nodes are connected to the network via base stations, each of the base stations covers one cell, and there are wireless links between the base stations and the mobile equipments.

Base stations are interconnected with routers to form a network; this network usually uses fixed and sometimes microwave links.

As the mobile node is moving around, it changes its point of connection to the network from time to time. The event, when the mobile equipment moves to a new service access point is called handover or handoff.

In a mobile network the terms location and position usually do not mean geographical position, but they refer the location of the mobile node within the network, the service access point (base station) it is connected to at a specific moment of time. Although there are exceptions (like Location Based Services, LBS where the geographical location is important), throughout this paper both position and location refer to the location from the network point of view.

To let the network have location information about a specific mobile node, location update messages are sent to the network. Location updates are usually sent at handovers but some protocols may require them to be sent periodically even if no handover takes place.

The network doesn’t always have exact location information about every mobile. If a

(11)

mobile has to be found in the network, and its exact location is not known,searching takes place. See Chapter 3 for a detailed analysis of update and searching.

1.4 An Engineering Problem

In a mobile network bothtracking andsearching have a cost. Here, cost doesn’t necessarily mean a cost paid in money, it refers to a general “price” that is to be payed in money, time, algorithm complexity, wasting of resources, shorter equipment battery lifetime, lower user satisfaction, etc.

Consider one scalar parameter of a mobility management solution. If an increase in the parameter value increases some cost factors and does not change others on the whole range, then there is no conflict: the lower parameter value, the better. If changing the parameter might increase some cost factors and decrease others then there is a “conflict”

which might lead to an optimization problem.

In this sense, there is a general “conflict” between tracking and searching. The scalar parameter is the frequency (and perhaps accuracy) of location updates. If more update messages are sent then the network will have more accurate position information of the mobile node most of the time. On one hand, update messages have a cost, but on the other hand, if we have more accurate position information, the (expected) cost of the searching procedure will be smaller.

The price of sending updates more frequently is paid in higher signalling load on the network, higher communication channel usage, shorter battery life for the mobile node. The price of searching is paid in more signalling, more communication channel usage, longer search procedures (lower user satisfaction), and perhaps higher algorithm complexity.

Thus, updating more frequently makes the total cost of updates higher, but the total cost of searching lower; and updating less frequently makes the total cost of updates lower, but the total cost of searching higher.

Of course this is just an oversimplified model of the problem of location management, but it is easy to see that depending on how various costs (time, money, signalling load) are compared to each other, this can lead to optimization problems. There can be optimum update “frequencies” which lead to the lowest total (update and searching together) cost possible.

My thesis addresses this problem.

(12)

1.5 Research Goals

1.5.1 Universal Location Management Model

There are several location management algorithms in the literature. For a good survey on them, see [1]. The first research goal was to provide a universal model, or classification system for location management. The model should be general enough that it covers most (if not all) of today’s location management algorithm, and should enable us to classify and compare various algorithms.

1.5.2 Novel Mobility Management Mechanisms

To make mobility management more efficient, we can either tune the parameters of an existing algorithm to suit the environment better or completely new algorithms can be designed. The most important research goal was to find novel mobility management mech- anisms and build algorithms that use them. The efficiency of an algorithm depends on several factors, so we usually can’t say that an algorithm is better than another one in every scenario and at every parameter setting, this was not my goal. My goal was to find new location management algorithms that outperform most of today’s solutions at reasonable parameter settings of reasonable scenarios.

1.6 Research Methodology

To find out if my new location management methods are indeed more efficient than others, I had three approaches: analytical considerations, simulations and measurements. When developing novel algorithms, in the early phase usually simulations and analytical methods are used; those are the approaches that I have used in my work. To use the third approach – measurements – my algorithms would have had to be implemented, which is usually a time (and money) consuming process, which should normally follow the previous two.

To use an analytical method, first a mathematical model had to be constructed. I have defined the mathematical model for both of my new algorithms. Both of the models make use of Markov-chains extensively. For the mobile network I used a simple graph model, the mobility model was taken from literature with some minor extensions.

I have also created several simulations. I haven’t used any specific simulation tools, but built my own simulation framework in C++. Some of the simulations are created using

(13)

MATLAB[17], others are built upon my own simulation framework.

1.7 Structure

This dissertation is structured as follows:

After the introduction, in Chapter 2 the related work is presented very briefly. Mobility and location management are explained in general, and some mathematical modelling techniques, such as Markov chains are introduced. A brief survey is given on state-of-the- art location management methods which are related to or can be compared to my own algorithms.

In Chapter 3 I introduce my own classification system of mobility management algo- rithms. This is a general classification method that can be used to classify existing and new algorithms and which has led to the invention of Hierarchical Paging.

LTRACK, my first mobility management algorithm is introduced in Chapter 4. First the network architecture and mechanisms are described, then qualitative analysis, simula- tions and quantitative analysis are presented. My algorithm is compared to other location management algorithms, and it is examined how changes in various parameters affect the performance of LTRACK.

My second mobility management algorithm – called Hierarchical Paging – is presented in Chapter 5. After qualitative considerations an analytical model is presented for it, which is compared to my simulations of Hierarchical Paging. The analytical results and simulation results fit very well. Simulations are also used to compare Hierarchical Paging to other location management algorithms, and the parameter ranges where Hierarchical Paging is most efficient.

Finally, in Chapter 6 the conclusions are drawn, possible applications of my result and possible future directions in this research area are presented.

(14)

Chapter 2

Related Work

2.1 IP Mobility

This section gives a short introduction to IP mobility, possible solutions and potential problems. The purpose of the section is to show how the general principles and mechanisms introduced in Chapter 1 correspond to the principles and mechanisms of a real-world protocol.

2.1.1 Mobile IPv4

Regarding the static Internet, IP packets are routed depending only on their IP destination address. In this manner, the IP address is used to route the packet. On the other hand, it is also used to identify a host or network. Having a mobile environment, the node identified by an IP address might move away while the packets are still delivered along the same static route. To resolve this problem in the Mobile IP protocol, two IP addresses are used:

one to identify the host and another one for routing purposes. With this strategy the identification role of the IP address is kept while the other address can be used for routing.

The protocol consists of three different sub-protocols.

The Agent Discovery is where Mobility Agents advertise their availability on each link on which they provide service. After receiving such an advertisement the MN decides whether it is in the Home Network or in a Foreign Network. (We do not discuss the case when the HN is detected since then no mobility support is needed.) For the second step, the Mobile Node Registers its Care-of Address with its Home Agent. This is an update or tracking procedure The CoA is obtained from the FN either with any external assignment

6

(15)

mechanism or with the advertisements received. For more details on Care of Addresses, see [22].

When a correspondent node wants to communicate with the MN, it sends the datagrams to its Home Address. The Home Agent intercepts the communication and tunnels the datagrams to the Care-of Address of the MN. The endpoint of the tunnel can be either a Foreign Agent or the Mobile Node itself. If it is delivered to a FA, the FA has to forward the packets to the MN. As the location of the mobile node is always exactly known to the network (Home Agent and Foreign Agent), no searching is required.

When the MN replies to the Correspondent Node it sends the packets directly to it.

This is called the Triangle Routing. (It is useful to note that if the CN is a mobile node as well, the protocol automatically works since having a mobile or a static node as a peer is indifferent. This can be considered as one of the main advantages of MIP.)

This routing system is far from optimal and there are many proposals to make it more effective. (One can think about an MN near to the CN but roamed to a network far form its HN.) UpdatingMobility Bindings by providing the CN with the CoA of the MN would shorten the path for the datagrams to be delivered. This is called route optimization and unfortunately has serious security issues Note that route optimization can be considered as a special update mechanism. It is also clear that the CN has to be capable to this protocol that is evidently a disadvantage of such an extension.

Also there is the problem of smooth handoffs that has to be solved and additional bindings from the FA to the MN has to be applied. This is the domain ofsession continuity.

Tunnelling the packets from the HA to the CoA also provides basic security for the communicating entities since the real destination address (the Home Address of the MN) is hidden from any intervening routers. This is useful because the location of the MN is hidden from many unauthorized networks elements. However, security issues still need further considerations since a corrupt FA can still easily access to possibly confident information.

2.1.2 Mobile IPv6

The Mobile IPv6 protocol [10, 6] provides IP mobility over IPv6. It uses the advantages of the newer IPv6 protocol and also the experiences gained from the Mobile IPv4 are taken into consideration.

As it is described earlier, in case of Mobile IPv4, when the Mobile Node is away from home, a Care-of Address is assigned to it, and can be reached transparently on his Home Address.

(16)

When the Mobile Node gets new CoA, it registers a Binding with a router in his home network. This association is recorded in theBinding Cache of the router. The MN now can be reached through the HA with IPv6 encapsulated, tunneled packets. The implementation of this mechanisms is part of reachability.

The MN can also send Binding Update to the Correspondent node and with this addi- tionalbinding the packets sent can be delivered directly to the MN. During this operation authorization of the MN and the CN is done using the IPv6 header, this mechanism can be considered a special case of reachability of location management.

A loss of these binding updates may occur when the CN is moving as well. If we take a short look at such a scenario, it can be seen that the Binding Update sent to a moving node might arrive to the former location of it and the communication between the two nodes will be lost [30].

2.2 Markov Chains

Using Markov chains is a widely used technique for mathematical representation of prob- lems in different fields of telecommunications[13]. For an introduction to Markov chains see Chapter 11 of [5].

I used discrete-time and continuous-time, finite-state and infinite-state Markov chains to model the handover processes and various mechanisms of LTRACK (Section 4.6.5) and Hierarchical Paging (Section 5.3.3).

2.3 Location Management

2.3.1 Hierarchical Location Management

Even if the covered area, where mobility is provided is not too large, mobility management is often handled in a hierarchical way for efficiency and scalability reasons[1]. As the characteristics that are observed at various levels can be quite different, it is not surprising, that the different solutions handle mobility the most efficiently at the different levels. This means that there is a hierarchy of different mechanisms working together the provide the most efficient solution for a given environment. For a detailed analysis of this area see Section 3.1.1.

(17)

2.3.2 Paging

If the exact position of the mobile is not known to the network, and it has to be determined, searching takes place. A widely used search mechanism in cellular networks is called paging.

It means that paging messages are broadcasted to the mobile nodes, and the mobile that the the network is paging has to reply the paging message.

There are various strategies for paging, for references see Section 2.3.3, for a more detailed explanation of paging see Section 3.2.2.

2.3.3 Location Management Algorithms

Neither the centralized approach of Mobile IP nor a naive paging approach is efficient enough on its own when covering a large area and providing services for several mobile users.

There is an increasing number of solutions for both location management and handover management in mobile networks that address this problem. Most of them use a hierarchical approach, and some introduce special mechanisms at various levels.

For some IP (Internet Protocol) based solutions see [4, 12, 26, 28]. Good general surveys on the topic are [31, 34]. These solution usually use a hierarchical approach, but none of them use location tracking, the main idea behind LTRACK, see Chapter 4.

Several studies have addressed paging, various paging methods are presented, usually considering cost minimizations. Almost all of these papers focus on the paging algorithm itself, but the paging is always just at a single (usually the bottom) level of the network (flat paging, see Chapter 3). Ramjee et al. examine and compare three different paging architectures and protocols [15], all flat. Hajek, Mitzel and Yang [2] show algorithms to op- timize registration and paging together. They examine serial and parallel paging, but none of their solutions introduces a hierarchy in the paging itself as my solution (Hierarchical Paging, see Chapter 5) does.

Usually, paging is used at the bottom level of a hierarchical mobility management solution, as in case of a GSM network [7, 25].

In their paper[29], Woo et al. optimize location management for a special types of networks, namely Two-Way Messaging networks.

The paper of Akyldiz et al.[1] is a good general survey on various existing and proposed mobility management algorithms.

None of the above solutions use or mention Location Tracking or Hierarchical Paging

(18)

as an alternative solution. An approach similar to LTRACK is used by RoamIP [28] but only for session continuity and not location management purposes.

2.4 Cellular Network Structure Models

Hexagonal cell structure is the most widely used model for cellular coverage. Figure 2.1 shows a cellular network with hexagonal cells and a subnetworks. The shape of the cells is close to the natural circle-shape, and each cell has six neighboring cells.

Figure 2.1: Subnetwork with hexagonal cells

For some simulations, a simplified cellular network structure was used where the area is covered using square-shaped cells, as in Figure 2.2. In this case, each cell has four neighboring cells, this model is less realistic than the hexagonal one, but it is more easy to handle it mathematically.

(19)

Figure 2.2: Subnetwork with square shaped cells

In both cases the cells can be grouped to form subnetworks. Subnetworks are usually logical and not geographical groups of cells, so cells belonging to the same subnetwork do not have to be neighboring (or even geographically close to) each other. Cells are often grouped to subnetworks to form paging areas (or for other hierarchical mobility management purposes), so cells belonging to the same subnetwork almost always form a geographically continuous “area”.

2.5 Modelling the MN movement and packet delivery

In this Section, the model for the MN movement and the packet delivery is be presented.

It is assumed that in a given time interval the MN changes its point of attachment with a constant rate. This will be modelled with a homogenous Poisson process as in other

(20)

works [8, 16]. Letλ denote the parameter of the Poisson process and so denote the rate of handovers of an MN.

The other parameter that can be introduced in a similar manner is the rate of receiving a call: µ. This can also be time- or location-dependent but we assume it is constant for the examined time interval.

Let us introduceρas the “mobility ratio” meaning the probability that the MN changes its FA before a call arrives. Here ρ = λ+µλ . In [8] rho is defined like ρ = 1−α(0). (Note that the ρ in the two works are not the same! The ρ in [8] would be ρ = µλ with our notation.)

In real systems it might be not true that the mobility ratio is homogenous. Parameters µ and λ might depend on the position, the specific user, the time of the day, etc. Our model does not handle this scenario. However, we can say that these constant values are some averages, and valid for specific users, at a specific network region in a specific time interval.

(21)

Chapter 3

Mobility Management Classification

3.1 Introduction

In this Chapter my general model of mobility networks is presented. It is a model in the sense that it is independent of technology and actual mobility solution, and it is general in the sense that it covers most of the current technologies and solutions.

By using this general model, the different mobility solutions can be classified. After classifying the mobility solutions of today, we may find that some classes are empty. A class may be empty for two reasons:

It is impossible or senseless to implement a mobility algorithm that belongs to that class. For example an algorithm belonging to another (specific) class obviously out- performs it in every sense.

No mobility algorithm has been invented yet that belongs to that class.

The latter case may be exciting; this is the case where our general and solution- independent mobility model has actually enabled us to invent something new that might be rather specific.

3.1.1 Mobility Management Hierarchy

The area where mobility is provided can vary widely from network to network. A satellite- based system may cover a whole continent (or even a whole planet), while a small-scale, targeted mobile network may cover only a building or a part of a building.

13

(22)

Even if the covered area is not too large, mobility management is often handled in a hierarchical fashion forefficiency andscalability reasons. The area that is covered is divided into smaller areas, the whole network is divided into sub-networks. These subnetworks together cover the whole area, and the areas covered by the subnetworks may even overlap sometimes. The point here is that all mobility within a subnetwork can be handled locally (within the boundaries of that subnetwork) in a completely transparent way for the other parts of the network. The subnetwork then can be again divided into sub-subnetworks. A solution that is not hierarchical is called flat, or single-layer.

A hierarchical solution can be more efficient than a flat one by using less resources for mobility management. And at the same time, hierarchical solutions usually scale much better with the size of the network and the number of mobile nodes than flat ones.

3.2 Single-layer (Flat) Solutions

In this Section I am going to address flat mobility management solutions. These solutions can either be used as a mobility management algorithm for a single-layer (flat) mobility network or as an algorithm on a specific single level of a hierarchical, multi-level mobility network. The later case is going to be discussed in Section 3.3.

So, we are not dealing with hierarchical solutions here. What kind of flat solutions are there? Our classification property will be wether the exact location is always known to the network or not. There are solutions where the network has exact location information of all the mobile nodes all the time, and there are solutions where the exact location is determined in an on-demand way. These solutions are discussed in detail in the next subsections.

3.2.1 Exact Location is Known

This is the more straightforward situation. The exact location of all the mobile nodes is known to the network all the time.

To enable the network to know have exact location information, the mobile node has to inform the network when it moves from one access point to another one, so a handover can take place. The messages that are sent between network nodes containing information about the current location of a mobile node are called location update messages.

The exact position of a mobile node can be stored in a central database or in a distrib- uted one.

(23)

Centralized Solutions

In case of a centralized solution there is an entity (network node) for every mobile node that has exact position information of it all the time. This network node can be the same for all the mobile nodes or there can be several of them scattered across the network; each one serving just a subset of the mobile nodes.

An example of the first case is the top-level mobility management of GSM [7, 25], where a network element called Home Location Register (HLR) has up-to-date position information for all the subscribers of a provider. (In fact, GSM has a hierarchical mobility management solution, and this is just the highest level of the hierarchy. The HLR does not know which base station the mobile node is connected to, just which network it is roaming in.)

An example of the second case (several position-storing nodes each covering a subset of the nodes) is the MobileIPv4 mobility management scheme[19, 23]. In this solution each mobile node has a so-called Home Agent (HA), which has exact location-information of the mobile node all the time. One HA can serve several mobile nodes, but there can of course be more Home Agents. Actually, there has to be several, because in the MobileIP scheme a HA can only serve mobile nodes that it shares the network part of the IP address with. So mobile nodes with home IP addresses on different networks have to have separate Home Agents.

While there are several Home Agents, this is not a distributed solution, because for each mobile node there is one Home Agent which has exact location information all the time.

It may be called Home Agent, Home Location Register or something else, the important point here is that there is one central network node for each mobile node which always has to know the exact position of the mobile node. Thus, every time the mobile node moves out from the coverage of a base station, a handover has to take place, and the central network node has to be notified. This solution obviously raises some efficiency and scalability problems.

If the central node is very far away (several hops away) from the mobile node, when the mobile node is moving, the location update messages have to travel a long distance, thus they consume a lot of resources and take a lot of time, causing long delays.

Another problem is that if a lot of mobile nodes that are served by the same central node are moving intensively, the central node may become overloaded by location update messages.

(24)

Distributed Solutions

There are solutions where the exact location of the mobile nodes is known to the network, but there is no single network element which has exact location information for even one of the mobile nodes all the time. We will call these solutions decentralized or distributed solutions.

An example of this distributed database case is the LTRACK mobility management method [C9, C11].

LTRACK (Location Tracking) is a mobility management approach introduced in 2003.

Chapter 4 of this thesis explains LTRACK in detail, so I’ll just give a short summary here.

An LTRACK network is built up from LTRACK nodes,and the mobile node is connected to one of the LTRACK nodes in the network, and it can change its point of connection.

An LTRACK node is a logical entity, it can be a base station of the network, or it can be a small subnetwork where mobility is handled locally (Hierarchical solution with LTRACK at the high level). Every mobile node has an entry in a home LTRACK register (HLR).

This register is similar to the Home Location Register of GSM networks or the Home Agent of the MobileIP scheme.

The HLR of LTRACK does not have exact location information, but the LTRACK network as a whole has, so when an incoming packet arrives, the exact location of the mobile node can be determined.

For each of the mobile nodes, the HLR stores the last address where it received location update message from. It is a ”next-hop” towards the mobile node. The mobile node is either connected to that LTRACK node, or that LTRACK node knows another ”next- hop” LTRACK node towards the mobile. Once an incoming call arrives, there is a series of LTRACK nodes pointing from the HLR to the mobile node, see Figure 4.1.

3.2.2 Exact Location is not Known

It is possible to define a single-layer scheme where the location of the mobile node is not always known to the network.

The advantage of this scheme is that the mobile node does not have to notify the network every time a handover takes place. Fewer location update messages imply smaller signalling load on the network, and longer battery life for the mobile node.

On the other hand, if the exact location is not known, then the mobile node has to be found in some way, in case it has to be contacted (for example an incoming call or packet

(25)

arrives). In cellular networks, the procedure when the mobility network determines the exact position of the mobile node is called paging. Paging messages are broadcasted to the mobile nodes, and the mobile that the the network is paging has to reply the paging message. The simplest solution for paging is to flood the whole network with paging requests (all the base stations broadcast it in all the cells of the network), and have the mobile node answer it with a location update message. Of course this method of paging is very expensive in the sense of signalling load. There are some other, more sophisticated strategies for paging (see Section 2.3.3), but the process is usually very costly (in the sense of signalling load and radio frequency usage) compared to other procedures of mobility management. For example an advanced paging method can first try to find the mobile node in the cell it was last known to stay in, and then move further and further away from that cell until the mobile node is found. If the mobile nod has not moved a long distance since the last location update, it is going to be found without much effort, if it has moved a lot, the procedure might take longer, and consume more resources. The advantage of this method compared to the naive, one-step paging procedure is that it may require much fewer paging messages, the disadvantage is that it may take much longer.

A real-life example where paging is used is the lower level of the GSM network archi- tecture [7, 25]. The cells of the network are grouped into location areas (LA). Each cell belongs to exactly one location area, and every base station periodically broadcasts the location area identifier (LAID) of the location area it belongs to. To save the battery and to reduce signalling, the mobile node can switch to idle mode. When in idle mode, the mobile node has to send location updates only when it moves to a new location area, but does not have to notify the network when it keeps moving around within a location area.

3.2.3 Summary of Single-layer Solutions

Table 3.1 shows the attributes of possible single-layer mobility solutions along with some examples.

Table 3.1: Single-layer mobility management algorithms Single-layer mobility management

Exact location is known Exact location is not known Centralized Distributed

MobileIP, Home Agent LTRACK GSM paging

(26)

3.3 Hierarchical Solutions

Mobility networks that cover larger areas usually don’t have a “flat” structure, but imple- ment some kind of hierarchy. As it was explained in Section 3.1.1, the network is divided into subnetworks. Mobility within a subnetwork (intra-subnetwork mobility) is handled by the lower level mobility management, while inter-subnetwork mobility is handled by a higher level mobility management solution.

In this Section I am going to discuss how my general mobility model can be extended to cover these hierarchical solutions too.

In my model, top-level mobility management, which handles inter-subnetwork mobility management is considered as a single-layer mobility management algorithm. The only difference is that the mobile node does not move form base station to base station but from subnetwork to subnetwork. The inner structure of the subnetwork and all the events happening and data stored within the subnetwork are hidden from this higher-level mobility management algorithm.

Locating the mobile node in a single-layer network means finding which base station it is connected to, locating it in the top-level of the hierarchy means to find which subnetwork it is staying in.

3.3.1 Two Layers

Consider a two-layer mobility network: there is a top layer (or top level) and a bottom layer (or bottom level). Both of the layers are implemented using a single-layer mobility management solution. The specific mobility management solution can be the same for the two layers or it can be different. In this subsection some examples are discussed for this scenario.

Centralized Top Level, Paging at the Bottom Level

In this example the centralized solution is implemented at the top level, and the position is not always known at the bottom level. It means that the network is divided into sub- networks, and for every mobile node there is a central entity that always knows which subnetwork the mobile node is currently staying in, but within the subnetwork, the exact position is not always known, thus paging is used.

This special case is used in real-life, public cellular networks, such as GSM implement this scheme. In GSM terminology, the subnetworks are called location areas (LA).

(27)

Centralized Top and Bottom levels

Our model allows the use of the same solution at different levels. If both the top and bottom levels are centralized, there is an entity that always has the information which subnetwork the mobile node is staying at, and for each subnetwork there is an entity that has exact position information for the mobile node as long as it is staying at that subnetwork. Several hierarchical extensions of MobileIP, for example [24] or [9] use this scheme.

Paging at Top and Bottom Levels

At first it seems that if the location is known neither at the top level nor at the bottom level, and paging is used at both levels than this scheme is no different from the single- layer paging scheme (see Section 3.2.2). Actually, this is not the case, because although the exact location is not known at the bottom level, it is known wether the mobile is actually within that subnetwork or not. And this makes an important difference.

Consider a network where mobility management is handled in this fashion. The network is divided into subnetworks, and there is an entity in each subnetwork that is responsible for the mobility management. This entity is going to be referred to as root node. It either knows the exact location of the mobile node within the subnetwork, or it can determine it by using a paging algorithm.

Thus, while the mobile node is moving within a subnetwork, no location updates are sent. There is no handover at all in the top level, so when the mobile node has to be found the top level knows which subnetwork the mobile is currently in, and within that subnetwork paging is used. In this case the gain of the scheme is high over the single-layer paging scheme, because the broadcast of paging messages is limited to the subnetwork.

When the mobile node moves to a new paging area, the root nodes of both the old and the new subnetworks have to be notified, but inter-subnetwork mobility can still be handled locally. So the old root node learns that the mobile node is not in its subnetwork anymore, and the new root node learns that the mobile node is in its subnetwork.

When an incoming call or packet arrives destined to the mobile node, the old root node is contacted first, because top level mobility management still “thinks” that the mobile node is in the old subnetwork. But the old root node knows that the mobile node is not there, so a top level paging takes place. This top level paging means that gateway of the network (or other central entity) “pages” all the root nodes of the subnetworks, and the root node of the new subnetwork is going to give a positive reply. This top level paging is

(28)

still requires much less signalling than a single layer paging, so it is much more efficient.

Although this scheme is much more efficient than single-level paging, its scalability might be a problem. If some smart paging algorithm is used at the top-level, this solution might become feasible. To decide wether it is profitable to use hierarchical paging instead of single layer paging various parameters such as mobility intensity, incoming call intensity, various signalling and processing costs have to be taken into account.

I know of no implementation of this scheme, this is an example where the general model helped to discover something ”specific”. This scheme, called Hierarchical Paging is described in detail in Chapter 5.

3.3.2 More Layers

Of course our model for mobility networks can handle more than two layers. If there are several mobility management levels in a network, each level may use any kind of single-layer solution.

For example if there are several layers (levels), but a centralized solution is used at all of them, the scheme is very similar to Dynamics Mobile IP [9].

Dynamics Mobile IP introduces a tree topology hierarchy of Foreign Agents between the Home Agent and the mobile node. All the handovers are handled as locally as possible;

within the smallest subtree that contains both the old and the new base stations.

3.3.3 Summary of Multi-layer Solutions

Table 3.2 shows the summary of two-layer mobility solutions. Different columns represent different top-level mobility management solutions, different rows correspond to different bottom-level solutions.

3.4 Empty Classes

In the classification process, classes were defined, and then mobility management algo- rithms were put in these classes. Recall from 3.1, that if a class turns out to be empty (ie.

there is no algorithm in it), it can mean two things:

either it is senseless or inefficient to implement a mobility management algorithm that belongs to that class (for example algorithms in another class clearly outperform the class in every aspect),

(29)

Table 3.2: Two-layer mobility management algorithms Top level

Centralized (Ex- act location is known)

Decentralized (Exact location is known)

Exact location is not known Centralized

(Exact lo- cation is known)

TELEMIP, Dy- namics MobileIP

Bottom level

Decentralized (Exact lo- cation is known)

LTRACK LTRACK

Exact loca- tion is not known

GSM LTRACK with

paging

Hierarchical Paging

or no algorithms have been invented so far that belong to that class.

My LTRACK mobility management method was not invented this way (it was in- troduced a year before the classification system), but Hierarchical Paging (introduced in Chapter 5 was actually invented by finding and empty class and then realizing (and prov- ing) that efficient algorithms can be designed that belong to that class.

(30)

Chapter 4 LTRACK

4.1 Introduction

LTRACK (Location Tracking) is my completely new approach for location management in mobile networks. It was introduced in [C9].

The basic idea behind LTRACK is to find a compromise between the Mobile IP scheme (where the HA has exact location information) and the GSM scheme (where only the LA and no further information is known).

The exact location of the mobile node is not stored in a central database, but the information is shared among the network nodes that the mobile node had visited recently.

The searching “runs” through the chain of these nodes. [J1, J3, C9]

4.2 LTRACK Network

An LTRACK network is built up from LTRACK nodes. A mobile node is connected to one of the LTRACK nodes in the network, and it can change its point of connection.

Every mobile node has an entry in a home LTRACK register (HLR). The HLR of LTRACK does not have exact location information, but when an incoming packet arrives, the exact location of the mobile node can be determined.

LTRACK nodes can be routers in the real world. How are base stations connected the network of LTRACK nodes? There are three different approaches:

Base stations are LTRACK nodes too.

Base stations are connected to LTRACK nodes.

22

(31)

Hierarchical approach.

The naive solution is to define base stations as LTRACK nodes too. When the mobile equipment moves from one base station to another, it moves from one LTRACK node to another. In this scheme the routing functionality and the base station functionality get mixed up, which is usually undesired.

An approach that uses a more structured network is to connect base stations to LTRACK nodes. In this scheme LTRACK nodes are similar to GSM Base Station Controllers (BSC).

An LTRACK node can serve several base stations. When a mobile equipment moves from a base station to another one, and both base stations are served by the same LTRACK node, the old and new LTRACK nodes are the same. That is the only LTRACK node that has to be notified. When the old and new base stations are served by different LTRACK nodes, an LTRACK handover takes place. This solution decreases the number of required LTRACK handovers for the same number of handovers. Thus, a smaller number of hops will be needed when trying to find the mobile node.

The hierarchical approach is to define LTRACK nodes as small networks. The net- works at the lower hierarchy level can be any kind of mobility networks, they can even be LTRACK networks. Thus a two or more level LTRACK network can be built.

4.3 Mechanisms

4.3.1 Locating the Mobile Node

In LTRACK, each mobile node has a unique identifier similar to IP addresses or phone numbers. This unique identifier is connected to its home address. It is similar to the home address of the Mobile IP scheme. For each of the mobile nodes, the HLR stores the last address where it received location update message from. It is a ”next-hop” towards the node. The mobile node is either connected to that LTRACK node, or that LTRACK node knows a ”next-hop” LTRACK node towards the mobile.

Once an incoming call arrives, there is a series of LTRACK nodes pointing from the HLR to the mobile node, see Figure 4.1.

LTRACK nodes has to be able to find routes to each other. This can be solved for example by using LTRACK over an IP network, thus letting IP routing do the job.

(32)

Tracking Handover

Tracking Handover

1

2

3

Figure 4.1: LTRACK locating the mobile node

4.3.2 Handover

When the mobile node moves from one LTRACK node to another, a handover takes place.

The LTRACK node that the mobile moves away from is called the old LTRACK node, the one it moves to is called the new LTRACK node.

There are two different kinds of handover in LTRACK: normal handover and tracking handover. In a normal handover the mobile equipment updates its entry in the HLR. It sends the address of the new LTRACK node to the HLR. In case of a tracking handover the mobile sends the address of the new LTRACK node to the old LTRACK node. Figure 4.2 depicts the two different handover types of LTRACK.

Incoming calls always arrive to the home address of the mobile nodes, the HLR handles them. So the HLR has to locate the mobile node. It sends a request to the LTRACK node where it received the last normal handover message from. That LTRACK node either still has the mobile node connected to it, or knows a next hop LTRACK node towards the mobile node where it forwards the request. Thus, a normal handover can be followed by some tracking handovers before another normal handover takes place.

(33)

Tracking Handover

Normal Handover

Location Update Message

Location Update Message New

Path

Figure 4.2: LTRACK Handover Types

4.4 Qualitative Analysis

If only normal handovers are used, the location management scheme becomes very similar to the Mobile IP scheme. The HLR always has exact location information about the mobile equipment, it is basically like the Home Agent of MobileIP.

The disadvantage of normal handovers is that they generate much more signaling traffic on the network than tracking handovers. The old and new LTRACK nodes are usually

“close” to each other, the HLR can be further away, so this can be an important point.

Another advantage of tracking handovers is the following. Consider a series of tracking handovers between two normal handovers as the mobile node is wandering around in the LTRACK network. If it connects to the same LTRACK node two times on its path (i.e.

(34)

it moves away from it and returns later) thus generating a loop, the locating request message coming form the HLR will not loop. See Section 4.6.5 for further analysis of this phenomenon. The LTRACK nodes will directly forward the request to the LTRACK node towards which the mobile node left the last time. So if the mobile node moves back and forth between two LTRACK nodes, it would require a lot of signaling with normal handovers (Mobile IP scheme), but it is no problem with tracking handovers.

Who decides when should normal and tracking handovers be used? The answer may depend on our design goals. Either the mobile node can decide or the network can force a specific handover type. It is important that a normal handover can always be used, but there are some limitations on the use of tracking handovers. Handovers are usually initiated by the mobile equipment based on power or bit error rate measurements. A tracking handover can only be carried out successfully if communication between the mobile node and the old LTRACK node is also possible, not just between the mobile and the new LTRACK node. This means that tracking handover is a soft-handover type. With a small workaround, a hard variant of tracking handovers can be defined that can be used even if the mobile can only communicate to the new LTRACK node. The old LTRACK node can be notified indirectly by sending the notification message to the new LTRACK node which forwards it the old one. This is a scheme used by several micro mobility protocols[12, 3, 21].

Thus, by using tracking handovers we can minimize signaling traffic on the network.

Why should normal handovers be used at all then? Obviously, if a lot of tracking handovers are used consecutively, the path from the HLR to the mobile node may get very long. It means that it will take several hops, and thus a long time for the HLR to locate the mobile node. As this should be avoided, normal handovers should also be used. It is important to see, that even if there were several tracking handovers since the last normal handover, the path is not necessarily very long. If the mobile visits only 5 LTRACK nodes on its path, but moves back and forth between them several times, locating the mobile node can’t take more than 5 hops.

What should decisions be based on? It is possible to limit the number of tracking handovers allowed between two normal handovers. If no more than n tracking handovers are allowed between two normal handovers, locating the mobile node should not need more than n hops. It can take less as we have seen, but not more.

Another approach can be to limit the time allowed between normal handovers.

It is also possible to cluster the network to LTRACK areas (LTAs). A normal handover is required when the mobile node moves from one LTA to another one. While roaming

(35)

around within the same LTA, tracking handovers are used. Locating the mobile node should not take more hops than the number of LTRACK nodes in the LTA. This scheme has the same drawback as the GSM scheme. If the mobile node moves back and forth between two neighboring cells that belong to different LAs, normal handovers will be used which results in generating a lot of signaling traffic.

These methods can also be combined. The network can be partitioned to LTAs, a normal handover is required when moving from one LTA to another, but the number of tracking handovers between normal handovers can also be limited within one LTA, so can the maximum time between normal handovers.

4.5 Simulation

I have written a simulation of LTRACK and other mobility management protocols in MathWorks MATLAB [17]. This Section presents my simulations and the analysis of the results.

4.5.1 LTRACK vs. Other Protocols

The purpose of the first simulations was to compare the signaling load of different loca- tion management solutions. The simulated network consisted of 36 square shaped (see Section 2.4) base stations arranged in a 6x6 grid and 14 routers interconnected to form a tree. Hierarchical Mobile IP is based upon a tree topology network, that is why I used this topology for comparisons. One mobile node was examined making a random walk with a length of 100 handovers. The network topology and the path of the mobile equipment were exactly the same in all cases. Four protocols were examined:

Mobile IP

Hierarchical Mobile IP

LTRACK (t= 3)

LTRACK (t= 10)

Variable t denotes the maximum number of tracking handovers allowed between two normal handovers. Signaling load was measured in signalling message hops. A message hop is a signalling message sent from one node to a neighboring node in the network. If

(36)

the message is “relayed”, a single message travels along multiple hops, which causes more signalling. Figure 4.3 shows the results of the simulations.

33 102

179 300

0 50 100 150 200 250 300 350

Mobile IP Hierarchical Mobile IP

LTRACK (t=3)

LTRACK (t=10)

Figure 4.3: Signalling requirements of various protocols

Figure 4.3 shows clearly that Hierarchical Mobile IP puts much less signaling load on the network than standard Mobile IP, but LTRACK does much better than them even using a small t value. It can also be read from the figure, that increasing t from 3 to 10 further increases the gain of LTRACK. This is what we should expect.

4.5.2 Limiting the Number of Tracking Handovers

In these simulations no incoming calls have arrived. A mobile node is moving along a predefined path in a small network and every handover is either a normal handover or a tracking one. The parameter is the number of tracking handovers between two normal handovers.

Simulations were run allowing 0 to 19 normal handovers (parameter t). By allowing 0 normal handovers between two tracking handovers we get the MobileIP scheme. Figure 4.4 shows the results of the simulations.

(37)

0 2 4 6 8 10 12 14 16 18 20 0

0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2

Tracking Handovers

S ig n a lin g L o a d

Figure 4.4: Limiting the number of tracking handovers

The results comply with our expectations. While increasing the consecutive tracking handover limit from 0 to 3, performance gets much better. While increasing it further from 3 to 8, performance still gets better. Above 8 we hardly get any improvement. The exact values may depend on the network topology and the mobility and incoming call rates (µ andλ), but while the limit is small (<10) increasing the limit makes LTRACK much more effective.

4.5.3 Using LTAs

The covered area can be clustered into LTRACK Areas (LTAs) as described earlier. Track- ing handovers are used while the mobile node stays within one LTA, normal handover is used when the mobile crosses LTA boundaries to move to another LTA. In my simulations the LTAs were rectangular, ten simulations were carried out with LTA sizes 1, 2, 4, 6, 8, 9, 12, 15, 16 and 20 cells. Note that an LTA size of 1 cell is basically the MobileIP scheme with only normal handovers. This is the reason why (LTA size-1) is plotted instead of LTA size on the xaxis, because in this way we get the MobileIP scheme at x= 0 as in the previous example. We expect similar characteristics, the bigger LTAs are used the better

(38)

performance we get. The results are depicted in Figure 4.5.

0 2 4 6 8 10 12 14 16 18 20

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2

Visited LTRACK Nodes

S ig n a lin g L o a d

Figure 4.5: Using LTAs

We get a similar plot to the previous one, where the number of consecutive tracking handovers were limited. Here the plot is not so smooth, because the shape of the various LTAs varied, some were squares, some were not. It can be read from Figure 4.5, that in this case it is a good idea to use LTRACK Areas up to the size of 8-12 cells, above that we get only slight improvements in performance.

4.5.4 Limiting the Number of Visited Nodes

It seems reasonable to limit the number of visited LTRACK nodes between two normal handovers (parameter v). Actually it is more efficient than to limit the number tracking handovers in the sense of signalling load, but the management is more complex. I carried out simulations for values 1 to 20. The value v 1 is used on the x axis to get the MobileIP scheme for x = 0 as in the previous examples. Higher v values should cause lower signaling load, thus higher performance. Figure 4.6 shows my results. As expected, the characteristics of the plot is similar to the one where the number of tracking handovers was limited(Figure 4.4).

(39)

0 2 4 6 8 10 12 14 16 18 20 0.2

0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2

LTA Size-1

S ig n a lin g L o a d

Figure 5. Using LTAs

Figure 4.6: Limiting the number of visited LTRACK nodes

4.6 Analytical Model

4.6.1 LTRACK Network Model

The network will be considered as a simple graph without loop edges or multiple edges.

The edges are the network links, vertices are the network nodes. Either all or a special subset of these can function as an Access Point, Foreign Agent, a simple router or even a Home Agent. It is also possible that the network is modeled on different layers. For example a node in the given graph can represent a simple router while in another model it might cover a whole subnetwork. With this approach, different network structures and parameters can be used to differentiate between these cases.

It is important to point out that one advantage of the LTRACK cost model presented is Section 4.6.4 is that it takes the network topology as a parameter. This makes it possible to calculate the costs using different network parameters which may be derived from the model of different networks. Since – as it will be addressed later – the handover cost is strongly dependent on the network structure, it is impossible to calculate it generally although most of the papers discuss how to determine the cost for location registration or

(40)

packet delivery network independently [16, 32, 33]. Discussions in these papers are similar to my fully linked topology case.

4.6.2 Parameters

In the discussion of parameters, sometimes the general term “FA” is going to be used, instead of the LTRACK-specific “LTRACK node” to emphasize that this model can be used to model other algorithms too.

Having possible access points, FAs and the network, it is a reasonable assumption that the probability of a MN moving from one access point to another is the same in both directions. Thus:

P rob(FAA FAB) = P rob(FAB FAA), (4.1) where stands for the movement from one FA to another.

This assumption makes us able to have a parameter describing the distance of the MN from the HA because moving closer to the HA has the same probability as of moving further away from it. (It is shown that if this parameter varies over time or position, the parameters of LTRACK will rely upon this dependency but the model can still be applied [J1].)

After accepting these assumptions we only have to deal with movements on the same average depth level that will be denoted bym R.

The second graph parameter g is obtained as follows:

Let us consider the shortest path leading from the old FAA and the new FAB of the MN, to its HA. Let g R denote the length of the average shortest path leading from FAB to the nearest node in the old path. (One will realize that it is equal to the number of signalling messages sent via the links by an optimal HMIP-like protocol. This will be described later.) Note that because of the equation 4.1 from our assumption above:

kFAA,HAk=kFAB,HAk=m.

It is obvious that 1 g m. The reason for choosing such a parameter is the mechanism of the LTRACK algorithm. When the call is routed “hop-by-hop” on a tree- like topology, 2g edges are involved since the signalling has to go “up” to the nearest common router just like when there is a handover in the HMIP case and then “down” to the new FA. Since the network structure is static there is no need to update the routing tables of the routers because the destination of the packet is the “next-hop” FA. According to this fact there is no need for additional processing when there is a “tracking handover”.

(41)

This makes LTRACK different from protocols such as the ones desribed in [16, 21, 20].

4.6.3 LTRACK Over Tree Topology Network

The tree topology is one of the most widely used ones when considering mobility networks, because most mobility management algorithms use a physical or logical tree topology network. After restricting the discussion to trees I will also generalize the model.

Recall from Section 4.6.2 that parameter m denotes the average depth of the network, and the average number of new graph edges involved in the signalling in case of a handover is denoted byg.

A new parameter is also introduced: the average degree of the network nodes: δ R.

Here, we still can have many different models for the network. One is that the base stations are located only at the leaves of the tree. We can say that the MN moves to each neighboring cell with the same probability and each cell has δ neighbors so let’s suppose that MN moves in a δ range in one step, so we consider that it can move to δ neighboring FA’s area with the same probability.

To calculate g, the possible movements are differentiated by their costs. We say that that the MN has δi ways to move between two leaves under different layer i−1 nodes, of which:

1 new edge is involved: δm (Circularly between the leaves under anm−1 layer node.)

2 new edges are involved: δm−1 (Circularly between the m−1 layer nodes under an m−2 layer node)

...

i new edges are involved: δm−(i+1) (Circularly between the m−(i+ 1) layer nodes under an m−i layer node)

...

m new edges are involved: δ (Circularly between the 2 layer nodes under a 1 layer node)

g = 1δm+ 2δm−1+ 3δm−2+...+

δ1+δ2+δ3+...+δm = δ

δ−1 m

δm1, (4.2) and the whole graph G(h) involved in an h movement of the MN: G(h) = gh+m.

(42)

To compare these results to others’ [16, 32, 33] it is worth mentioning that variableg is related to some given constants in previous works, for examplemf f u “transmission cost of location update between FAs”, or mf h uthe “transmission cost of location update between an FA and the HA”. Comparing the different approaches we should say that g = 2mf f u and m = 2mf h u = 2mf f u from [16]. The performance of the algorithm using g and the values above as additional constants will be discussed in Section 4.6.8.

Fully linked network graph approach

After discussing the effectiveness of a tree topology, another widely used one can be ex- amined. This is the fully linked graph (or full mesh). Actually, a full mesh is not a requirement, just consider a topology where the nodes that are geographically close to each other are connected. If all the neighboring nodes of a tree topology mobility network are connected, the result is a fully linked graph in this sense.

It is straightforward that in a fully linked graph g is close to 1. Since costs are not absolute cost values, m is close to g and δ loses its meaning. It means that we are always likely to have a link between the former and the new point of attachment.

A model, similar to this is used to examine the performance of the DHMIP algorithm [16, 32, 33] because the costs are constant between each pair of nodes (except for the Home Agent). However, it will be shown in Section 4.6.8 that it is crucial to make g dependent of m to discuss LTRACK correctly.

4.6.4 Cost Function

When modelling LTRACK, cost is derived from the weighted number of messages sent between the nodes in the network. Basically the following cost function is going to be used:

CALGORITHM =ph·eu·cu+pc·ed·cd, where

ph: Prob(“Making a handover”);

pc: Prob(“Receiving a call”);

cu: Cost of update on one edge;

(43)

cd: Cost of delivery on one edge;

eu: Number of edges involved for the update;

ed: Number of edges involved for the delivery.

One can see that the cost function is a simple expected value calculation. We have the obvious probability field (Ω,A, P) of two possible events: “Making a handover” and

“Receiving a call”, whereph+pc = 1. We say that a discrete probability field can be used to determine the optimal number of handovers and using it, we are able to compare our LTRACK algorithm to others. The reason is that there is no signalling when the MN is neither paged nor a handover takes place.

The number of edges involved will be derived from the network models above using the parametersgandmwhile the probabilities will be derived using the model of the algorithm.

The mobility ratio ρ and the handover/call rate λ/µ (introduced in Section 2.5) will be used to determine the probabilities of receiving a call or a packet.

Additional parameters are introduced such as the cost of update and delivery on an edge. These will be homogenous all over the network:

cu: The cost of update per edge between hops,

cd: The cost of delivery per edge between hops.

There are two main reasons for the introduction of these:

One is that the cost of the two different processes might be different.

The other is that the cost of these operations might be different for each protocol for the same kind of network structures with the same g and m parameters.

4.6.5 Handover Model

The handover model is based on Markov Chains (see Section 2.2). Unlike in [18] where a semi-Markov process is used to evaluate a Personal Communications Service (PCS) location-tracking algorithm: Three-location area (TrLA) and where each state of the Markov Chain modeled a cell in the network, my Markov-model will only focus on the state of the MN from the LTRACK point of view.

Hivatkozások

KAPCSOLÓDÓ DOKUMENTUMOK

In the literature, this term is used in different fields, e.g., it refers to the institutional arrangement at the macroeconomic (national) level, like the models of coordinated

In this paper we introduce the notion of generalized (p- order) Sierpinski-like triangle-pattern, and we proof that if p is an odd prime then the divisibility patterns, respect to p,

MacLennan's handling of time in this novel is two dimensional, it drives both back and forth in the course of time. Naturally he applies the.. traditional

Clearly, every small and frequent edge becomes a leaf edge in its subtree, thus if every node has at most D large child edges in the tree, then in every subtree each node has at most

emergency shelter area that is close to the residential areas is not different from the shelter areas on the top of the list, and the distance to the health facilities is high..

• They are compressed by the pressure of the water, they are bent and then jump back into shape like springs when the penguin leaves the then jump back into shape like springs when

energy difference between the two atomic orbitals increases, then the energy level of the antibonding orbital decreases and approaches the higher atomic energy level.. At the

Since A is discrete, there is an M such that the distance in between different elements of A is at least 2/M 1/d (just note that if there were different elements arbitrarily close