In today's digital cellular mobile radio networks, features like power control and handover are related to periodic measurements of level and quality at the mobile ( downlink/forward ) and at the base station ( uplink/reverse ) receiver. The measurements values and corresponding signaling events of all customer's calls in a specific cell under investigation could be observed by the network operator at the protocol interface between base station controller unit. Statistical evaluation of such mass data produced by customer calls and collected at the protocol interface is an important aid to optimize the base station subsystem parameters in an operating network. The almost only drawback is that there is no exact information available about the position of the mobile. Position determination is limited to the statement "lies in" or "lies out" of the coverage boundaries - which are known only roughly - of the cell under investigation.

From all these observations, location management plays an important role in GSM mobile system. Location management methods for mobile systems have been introduced by Sami Tabbane, ESPTT. Several proposals have been made in the past addressing the problems associated with the cost of location management. Overview about these contributions will be studied first, and then the new location management methods will be introduced.

Location management schemes are essentially based on users' mobility and incoming call rate characteristics. The network mobility process has to face strong antagonism between its two basic procedures: location and paging. The location procedure allows the system to keep the user's location knowledge, more or less accurately, in order to be able to find him, in case of a coming call, for example. Location registration is also used to bring the user's service profile near its location and allows the network provide him rapidly with his services. The paging process achieved by the system consisting of sending paging messages in all cells where the mobile terminal could be located. Therefore, if the location cost is high (and thus the user location knowledge is accurate), the paging cost will be low (paging messages will be only be transmitted over a small area) and vice versa.

I/ PRESENT LOCATION MANAGEMNET METHODS

1/ LEVEL 0: NO LOCATION MANAGEMENT

In early wide area wireless system (not yet cellular), human operators had to process the calls and the users' locations were not managed by the system. A user was able to generate a call through any base station (BS), and paging messages addressed to the called mobiles were transmitted through all BSs. The main characteristics of these systems were very large cells, and lower user population and call rates.

Small-capacity cellular systems (with a few tens of BSs serving a few thousand users) may also not use a location management method, even when the standard allows it. if subscriber number and calling rates do not require it, the location management method is not activated; resource consumption for finding users is not so important that its reduction is mandatory.

This level 0 method is therefore as simple as could be: no location management is realized; the system does not track the mobiles. A search for a called user must therefore be done over complete radio coverage area and within a limited time. This method is usually referred to as flooding algorithm. It is used in paging systems because of the lack of an uplink channel allowing a mobile to inform the network of its whereabouts. It is also used in the small private mobile networks because of their small coverage area and user populations.

The main advantage of not locating the mobile terminals is obviously simplicity; in particular, there is no need to implement special databases. Unfortunately, it does not fit large networks dealing with high numbers of users and high incoming call rates.

2/ LEVEL 1: MANUAL REGISTRATION

This method requires the user to locate himself by achieving a special procedure if he wishes to receive his incoming calls. From the network site, this method is relatively simple to manage because it just requires the management of an indicator, which stores the current location of the user. The mobile is also relatively simple; its task is just limited to scanning the channels to detect paging messages.

This method is currently used in telepoint cordless systems (such as CT2). The user has to register itself each time he moves to a new island of CT2 beacons. To page a user, the network first transmits messages through the beacon with which he registered and, if the mobile dose not answer, extends the paging to neighboring beacons.

The main drawback of this method is the constraint for a user to register each time he moves. Nevertheless, this low ergonomic can be balanced by the low equipment and management costs of the network, which allow the operator to offer users attractive fees.

3/ LEVEL 2: USE OF LOCATION AREAS FOR AUTOMATIC LOCATION MANAGEMENT

Presently, the location method most widely implemented in the first- and second-generation cellular system (NMT, GSM, IS-95, etc.) makes use of location areas (LAs) (figure 2). In these wide-area radio networks, location management is done automatically.

Location areas allow the system to track the mobiles during their roaming in the networks: subscriber location is known if the system knows the LA in which the subscriber is located. When the system must establish a communication with the mobile, the paging only occurs in the current user LA. Thus, resource consumption is limited to this LA; paging messages are only transmitted in the cells of this particular LA.

Implementing LA-based methods requires the use of databases. Generally, a home database and several visitor databases are included in the network architecture. There are also several locations updating methods that can be implemented based on LA structuring.

a/ Periodic location updating

This method is simplest because it just requires the mobile to periodically transmit its identity to the network. Its drawback is its resource consumption, which is user_dependent and can be unnecessary if the user does not move from a LA for several hours. Generally, this method is combined with the next one.

b/ Location updating on LA crossing

This method (figure 3) first requires each BS to periodically broadcast the identity of its LA. Second, the mobile is required to permanently listen to network broadcast information (on the broadcast channel) and to store the current LA identity. Of the received LA number differs from the stored one, a location update (LU) procedure is automatically triggered by the mobile.

The advantage of this method is that it only requires LUs when the mobile actually moves. A highly mobile user will generate a lot of LUs; a low mobility user will only trigger a few.

A hybrid method which combines the two previous ones can also be implemented. The mobile generates its LUs each time it detects a LA crossing. Nevertheless, if no communication (related to a LU or a call) has occurred between the mobile (in idle mode, ie., powered on but not communicating) and the network for a fixed period, the mobile generates a LU. This periodic LU typically allows the system to recover user location data in case of a database failure.

4/ GSM EXAMPLE

The GSM standard defines a database structure based on:

·        An HLR (Home Location Register) where all subscriber related information is stored (access right, user location, etc.). Security parameters and algorithms are managed by the authentication center (AuC) which is often considered part of the HLR.

·        Several VLRs. Each VLR stores part of the data regarding the users located in its related LAs.

The location management method defined in GSM combines the periodic LU method and the LU on the border crossing. The VLR stores the LA identifier, and the HLR stores the VLR identifier.

This consists of three main types of LU procedures: The intra-VLR LU, the inter_VLR LU using TMSI (temporary mobile subscriber identity), and the inter_VLR LU using IMSI (international mobile subscriber identity). A fourth one, the IMSI attach procedure, is triggered when the mobile is powered on in the LA where it was powered off.

In the following, we present the most complete LU, which is inter_VLR using MISI. This procedure mainly consists of the following steps:

·        A signaling channel is allocated to the MS, and a LU is requested.

·        The MS provides the network with its IMSI, which allows the new VLR (VKR2) to load authentication data from the HLR/AuC, mainly the triplets for the authentication and the ciphering procedures.

·        The VLR is then able to authenticate the MS; if this step succeeds, it updates the location at the HLR. The HLR informs the old HLR (VLR1) to remove the user's data stored in VLR1.

·        Ciphering may be required id available.

·        · A new TMSI is allocated to the MS, and , after acknowledgment of its LU request ( first message sent by the MS ), the channel finally released

5/ LIMITS OF PRESENT LOCATION MANAGEMENT METHODS

The LA-based location management methods are the most adapted and widely used in current cellular (GSM, IS-54 and IS-95…), in trunk systems such as trans_European trunk radio (TETRA), in cordless systems like Digital European Cordless Telecommunication (DECT), Personal Access Communication System (PACS), Personal Handyphone systems (PHS), and so on. Nevertheless, the traffic and processing generated may lead to congestion problems in high-density systems. One of the main concerns of the system designers is therefore to define methods allowing the system to reduce the overhead traffic as much as possible.

Several location management methods proposed within these last years, which attempt to reduce the overhead traffic. Followings are location management methods for third_generation system written by Sami Tabbane who presently teaches and performs research at ESPTT. His research topics of interest are location management techniques, handover procedures, and cellular networking planning.

II/ LOCATION MANAGEMENT METHODS FOR THIRD-GENERATION SYSTEMS

He classifies the location management methods into two major groups (figure 5). In the first, he concludes all methods based on algorithms and network architecture, mainly on the processing capabilities of the system. The second group gathers the methods based on learning processes, which require the collection of statistics on users' mobility behavior, for instance. The second method emphasizes the information capabilities of the network.

1/ MEMORYLESS METHODS

a/ Database architecture

He divides into three cases:

·        Centralized database architecture: presents an architecture where a unique centralized database is used. This is well suited to small and medium networks, typically based on a star topology.

·        Distributed database architecture: uses several independent databases according to geographical proximity or service providers. It is best suited to large networks including subnetworks managed by different operators and service providers. The GSM worldwide network, defined as the network made up of all interconnected GSM networks in the world, can be such an example of a large network. The main drawbacks of this architecture are clearly the cost of database system acquisition, implementation, and management.

·        Hybrid database architecture: combines the centralized and distributed architectures. In this case, a central database (HLR-like) is used to store all user information. Other small databases (VLR-like) are distributed all over the network. These VLR databases store portions of HLR user records. A single GSM network is an example of such architecture.

b/Optimizing fixed network architecture

In second-generation cellular networks and third-generation systems, signaling is managed by the intelligent network (IN). Appropriately organizing mobility functions and entities can help reduce the signaling burden at the network site. The main advantage of these propositions is that they allow us to reduce the network mobility costs independent of the radio interface and LA organization. For example, it is proposed to use different degrees of decentralization of the control functions. Thus, using adapted signaling network nodes, interconnection allows mobility costs to be reduced.

c/ Combining location areas and paging areas

In current systems, a LA is defined as both an area in which to locate a user and an area in which to page him. LA size optimization is therefore achieved by taking into account two antagonistic procedures, locating and paging. Based on this observation, several proposals have defined location management procedures, which make use of LAs and paging areas (PAs) of different sizes. One method often considered consists of splitting an LA into several PAs (figure 6)

An MS registers only once, that is, when it enters the LA. It does not register when moving between different PAs of the same LA. For an incoming call, paging messages will broadcast in the PAs according to a sequence determined by different strategies. For example, the first PA of the sequence can be the one where the MS was last detected by the network. The drawback of this method is the possible delay increase due to large LAs

d/ Multilayer LAs

In present location management methods, LU traffic is mainly concentrated in the cells of the LA border. Based on this observation and to overcome this problem, Okasaka has introduced the multilayer concept. In his method, each MS is assigned to a given group, and each group is assigned one or several layers of LAs

According to figure 6, it is clear that group 1 and group 2 MSs will not generate Lus in the same cells, thus allowing the LU traffic load to be distributed over the cells. Nevertheless, this location updating method, although it may help channel congestion, does not help reduce the overall signaling load generated by LUs.

2/ MEMORY-BASED METHODS

The design of memory-based location management methods has been motivated by the fact that systems do a lot of repetitive actions, which can be avoided if predicted. This is particularly the case for LUs. Indeed, present cellular systems achieved everyday, at the same peak hours, almost the same LU processing. Systems act as memoryless processes. Short-term and long-term memory processes can help the system avoid these repetitive actions. Some methods have thus been proposed that be based on user and system behavior observation and statistics.

a/ Short-term observation for dynamic LA and PA size

In current systems, the size of LAs is optimized according to mean parameter values, which in practical situations vary over a wide range during the day and from one user to another.

Based on this observation, it is proposed to manage user location by defining multilevel Lass in a hierarchical cellular structure. At each level the LA size is different, and a cell belongs to different LAs of different sizes. According to past and present MS mobility behavior, the scheme dynamically changes the hierarchical level of the LA to which the MS register. LU savings can thus be obtained.

A variant of this strategy requires from mobiles to register in the cells where they are camped on. Registrations involve a periodic timer which value has to be optimized. Thus rather than paging a mobile in all cells of a LA, the mobile will be paged only in the cells visited during the last period: these are cells the mobile camped on during its traversal of the LA.

In figure 6, high coming call rate and low-mobility users are directed to small LAs, medium-mobility users are directed to medium-sized LAs, and high-velocity and low coming call rate users are directed to large LAs.

Adapting the LA size to each user parameter values may be difficult to manage in practical situations. This led to definition of a method where the LAs sizes are dynamically adjusted for the whole population, not per user as in the previous method. Statistical information about users and mobility in the network is collected in databases and computed. Networks characteristics in function of time, place, density, and so on are thus evaluated. Results of this computation allow the network to dynamically (daily, weekly, monthly, yearly.) adjust LAs sizes. For instance, during the day, when call rates are high, it is preferable to deal with small LAs. Conversely, at night the call rate is much lower, and therefore larger LAs are better.

b/ Individual user patterns

Observing that users show repetitive mobility patterns, the alternative strategy (AS) is defined; its main goal is to reduce the traffic related to mobility management - thus reduce the LUs - by taking advantage of users' highly predictable patterns. In AS, the system handles a profile recording the most probable mobility patterns of each user. The profile of the user can be provided and updated manually by the subscriber himself or determined automatically by monitoring the subscriber's movements over period of time.

The main savings allowed by this method are due to the non-triggered LUs when the user keeps moving inside his profile LAs. So, the more predictable the users' mobility, the lower the mobility management cost.

A variant of this method, called the Two-Location Algorithm (TLA), is proposed and studied. In this strategy, a mobile stores the two most recently visited LA addresses. The same is done at the HLR level. Obviously, the main advantage of this method relies on the reduction of LUs when a mobile goes back and forth between two LAs.

c/ Predicting short-term movements of the subscriber

The method uses a process, which predicts the movements of the MS according to its direction, velocity, and so on. Processing and prediction are made at both the MS and the HLR. When actual movements of the MS do not fit with those predicted, a registration is triggered by the mobile to inform the network of its actual location. Otherwise, no exchange is required, which allows savings in LU processing and signaling.

d/ Mobility statistics

A mobility management method similar to AS is defined. It is called Statistical Paging Area Selection (SPAS) and is based on location statistics collected by each MS, which periodically reports them to the network. These statistics consist of a list of the average duration the MS had been located in each LA. A priority rule is determined to settle the sequence of LAs visited by the mobile. If this sequence id different from the last one reported to the network, the MS transmits it; otherwise, nothing is done. The paging process is achieved in the same way as in AS. When the MS moves to an area that is not on the reported list, it has to process a temporary location registration to the network.

In " A Predictive Mobility Management Algorithm for Wireless Mobile Computing and Communications ', G. Y. Liu and G. Q. Maguire proposed the method provide a means of allowing preconnection and pre-assignment of data or services at the location before the user moves into it, so he can immediately receive service or data. This method clearly applies to location management. Just as are the previous two methods, it is based on users' movement history patterns. Called Mobile Motion Prediction (MMP), it allows the system to predict the future location of the user. Schematically, the MMP combines two movement models: Movement circle (MC), based on a closed-circuit model of user movement behavior, and Movement Track, used to predict routine movements. MC is used to predict long-term regular movements.

The author, finally, mentions the method proposed in " Comparing the PCSS Location Tracking Strategies" by Y. B. Lin and S. Y. Hwang. The method makes use of a cache memory for reducing the search cost. The proposal is to store the location of the frequently called mobiles in a local database (i.e. cache). This scheme allows the number of queries to the HLR to be reduced; thus reducing the signaling traffic at he fixed network side between the local database and the HLR.

 

Zdroje:http://www.utdallas.edu/~kim97



Klub Inteligentnich Zakazniku    Spolecenske hry skladem