• 沒有找到結果。

Using multilevel hierarchical registration strategy for mobility management

N/A
N/A
Protected

Academic year: 2021

Share "Using multilevel hierarchical registration strategy for mobility management"

Copied!
14
0
0

加載中.... (立即查看全文)

全文

(1)

Informatics and

Computer Science

Using Multilevel Hierarchical Registration Strategy for

Mobility Management

J Y H I - K O N G W E Y

Network Planning Laboratory, Telecommunications Laboratories, Directorate General of Telecommunications, Ministry of Transportation and Communications, Taiwan, R.O.C. and Institute of Computer and Information Science, National Chiao Tung University, Hsinchu, 300, Taiwan, R.O.C.

L I R - F A N G SUN

Network Planning Laboratory, Telecommunications Laboratories, Directorate General of Telecommunications, Ministry of Transportation and Communications, Taiwan, R. O. C and

W E I - P A N G YANG*

Institute of Computer and Information Science, National Chiao Tung University, Hsinchu, 300, Taiwan, R.O.C.

A B S T R A C T

This paper proposes a multilevel hierarchical registration strategy for mobility management in highly mobile distributed environments to facilitate UPCS. The pro- posed strategy is based on distributed hierarchical databases in telecommunication networks to form a hierarchical tree: the lowest-level nodes of tree are service nodes, and the other nodes are address information nodes. Our strategy registers personal information in service nodes and keeps track of roaming users' address information in address information nodes, respectively. A send-on-demand protocol of personal informa- tion for reducing transaction and lock time of user's home database, and real-time updates and queries in service nodes are investigated. Furthermore, the proposed strategy has been evaluated not only for mobile communication services, but also for worldwide personal communication services in mobility data acquisition, ubiquitous services availability, registration information recovery, and network changes' aspects.

*To whom all correspondence should be addressed. This work was supported in part by the National Science Council, Republic of China, under Contract NSC84-2213-E009- 006.

INFORMATION SCIENCES 89, 63-76 (1996) © Elsevier Science Inc. 1996

(2)

Finally, a cost analysis model demonstrates the feasibility of database memory size, updates cost, queries cost, and communications cost in our proposal.

1. INTRODUCTION

With the recent developments in the field of wireless access and hand-held portables, the rapidly expanding technology of Personal Com- munication Services is to enable users the capability of ubiquitous commu- nicating with each other regardless of the geographic location of either party. The existing techniques for identifying users and locating portables are to match and to page the portables [3]. Paging the portables has two purposes. One is to announce the service area identifier for portables. From the broadcasted service area identifier, the portables can determine whether they should register in this new location and deregister their old location. The other purpose is to wake up the portables once the calls are coming. An existing technique used in the conventional cellular network [1, 2, 8] usually partitions the communication coverage into many service areas with associated databases that include service information. The biggest challenge presented by this technique is the mobility management of portables, users, and services [10].

Many researchers have found that mobility management problems are typically the integration of personal and portable profile database manage- ment, portable and user location registration strategies, ubiquitous services availability, and communication protocol technologies [5-10]. The issue of database queries for tracking mobile users has been discussed in [5] by partitioning the users' location knowledge across the network. This ap- proach conceals two drawbacks. The partition of user mobility patterns to maintain a certain degree of knowledge about users' whereabouts is an optimal partitioning problem that minimizes the expected cost of querying and updating. The optimal partitioning problem makes this approach not easily implemented. Query processing is another disadvantage in the presence of imprecise knowledge about the locations of users.

Hierarchical information handling and information localization schemes in the framework of Intelligent Network have been discussed in [4]. These hierarchical schemes have been proved to be better for adding a new network to the networks already providing services, for autonomously updating the database contents, and for universal accessing capabilities. However, this approach should make copies from the central database to local databases frequently. The consistency of replicated data will be difficult to maintain, and the semantic interoperation between databases is

(3)

MULTILEVEL H I E R A R C H I C A L REGISTRATION STRATEGY 65 another unsolvable technique. The drawbacks of hierarchical schemes have been partially solved by an efficient tracing and fully distributed location registration strategy [11]. Unfortunately, that location registration algorithm has not considered the mobility management of service, and interworking between service logic and the interworking between service logic and service data over a network boundary. It only demonstrated the registration strategy of portables.

However, a huge amount of processing for database queries and regis- tration would be crucial to provide Universal Personal Communication Services (UPCS) on a worldwide scale. Especially, a location registration strategy for portable and user in the focal issue in mobility management since the registration strategy depends on the network architecture and protocol functions evolution that dramatically affects the personal or portable profile management and the ubiquitous availability of services. However, portable and user location registration strategies commonly proposed are two-level hierarchical registration strategies [1, 2, 7], which are a system of home and visitor databases to keep track of portable and user locations. In addition, service information wherein users may have subscribed to an incoming call screening or speed dialing feature should be migrated to the nearest database addressed by the exchange serving users. Our idea is that service information should accompany users for real-time queries and updates, and avoid semantic interoperation between dis- tributed hierarchical databases.

This paper proposes a multilevel hierarchical registration strategy to support data management in highly mobile distributed environments. We are concerned with the layered network architecture and associated databases. Section 2 describes the proposed network architecture and algorithms for hierarchical registration. Section 3 demonstrates the effi- ciency of mobility management on portables, users, and services. An easy cost computation demonstrates the feasibility of our proposal in Section 4.

2. O U R H I E R A R C H I C A L A P P R O A C H 2.1. THE N E T W O R K A R C H I T E C T U R E

The telecommunication network is logically a hierarchical, multiway tree topology, as shown in Figure 1. The layered hierarchy of the telecom- munication network is local-level network, transit-level network, and global-level network. The transit-level network can be a transcontinental network, and the global-level network can be a number of satellite commu- nication systems. As the database plays the control role of offering

(4)

i.,ocal-leveVl \ / tlb"k / I I V I )" I I \

notwork ~

• denotes the node

O denotos the sorvic¢ area of node

Fig. 1. The hierarchical tree-like network architecture.

services, the database is really the brain of network [10]. It can be seen that one database can dominate and direct many exchanges. Furthermore, the database for UPCS emphasizes the mobility management. Thus, database connection and the operation relationship are key issues ad- dressed in this paper. We assume that the local-level network is a subset of the Public Switched Telephone Network, Integrated Services Digital Net- work (ISDN), broadband ISDN, or mobile network. These local-level networks can be a layered structure, and the databases of the local-level network cover all the service areas of users. For convenience of analysis, we need the following definitions.

DEFINITION 1. Service areas are the coverage regions of the lowest level of databases (the lowest level of nodes in Figure 1). In addition, service area is also the granularity unit of registration and updates.

DEFINITION 2. Each service area has a unique identifier. Let SA~f be the service area i controlled by database m; then S A m = U iSA m.

Initially, the portable has two types of location information. One is h o m e location (the portable's subscription location), and the other is visitor location (the portable's current location). Normally, h o m e location is static and cannot be changed after the time of subscription. On the other hand, visitor location will be changed dynamically if, and only if, the received location area identifier (LAI) is different from visitor location. The portable receives the service area identifier (SAI) from the broadcasting channel as

(5)

M U L T I L E V E L H I E R A R C H I C A L R E G I S T R A T I O N S T R A T E G Y 67 an LAI. The portable will compare this LAI with the location information stored in the portable. Once LAI is not equal to the home location identifier, the portable updates this visitor location with the LAI. From Definition 1, the portable invokes the portable mobility management procedure. By the way, the portable has to access service information and to exercise the service mobility feature on the network side. The next section will describe our proposed multilevel hierarchical tree for service mobility.

2.2. C O N S T R U C T I O N OF H I E R A R C H I C A L TREE

The proposed multilevel hierarchical tree is shown in Figure 2 with the portable B as an example. Each node in the tree topology is a database node. There are two types of databases in our proposal. The lowest level of nodes (horizontal databases) is service nodes. The nodes (databases) except for the lowest level are address information nodes. Service nodes cover all the service areas, and these nodes can be an H L R and VLR in IS-41 and GSM [1, 2], In brief, service nodes have all user's service information and execute service logic as a response to queries from the exchange, e.g., Service Switching Point or Mobile Switching Center. The address informa- tion nodes have two kinds of special information: one is the Directory Information Table (DIT) for registering the closest subordinate nodes. The DIT is useful for the shortest routing path in traversing the tree topology. The Forward Address Chain (FAC) is designed as a detailed address pointer which is similar to a pointer of the pointer forwarding scheme in

_1 b,c,d . Directory Information Table

Forward Address Chain

/ \ \

e O

f 0

z O

iO

k O

' 0 n O

B's home location

(6)

[7]. The FAC points to the roaming nodes of users. Therefore, the FAC table is useful for two purposes: the call originating database can quickly acquire the exact position of call terminating database and make a shortest routing path, and new service nodes can acquire personal information from users' old service nodes.

The proposed strategy has bottom-up registering and deregistering properties. All service executions are of interaction between service nodes and their associated exchanges. Address information nodes are of address and information forwarding registration or deregistration only, and do not invoke service interaction. Therefore, the memory sizes of address informa- tion nodes are minimum. Address information nodes are intelligent highway system for service nodes. There is obviously no semantic interoperation problem between address information nodes and service nodes.

2.3. STATIC DATA AND DYNAMIC DATA

From the service provision point of view, exchanges should arm call model and trigger points for dialing number, and service nodes have service execution programs and service information about users. There- fore, we assume that call model and trigger points in the exchanges, and service execution programs in service nodes conform to international standards such as the relationship of SSP and SCP [10, 11]. Thus, our idea concentrates on the mobility management issue of service information.

Generally, service information consists of dynamic data and static data. Dynamic data are created and changed with time such as location informa- tion. On the contrary, static data are created in the service subscription procedure and maintained unchangeable. Static data include user profile, service profile, portable profile, and charging profile. In other words, this information is user-oriented information. Therefore, dynamic data can be created freely, and static data should be moved elsewhere for realizing service mobility.

2. 4. THE ALGORITHMS

This section presents algorithms that achieve the mobility management of portables, users, and services. Our algorithms are not only suitable for portable users, but for users who can register or deregister themselves by public telephone sets. However, we demonstrate the portable's case here. All mobility management procedures are initiated by the portables' mov- ing. For ease of discussion, we will describe the proposed algorithm in four

(7)

M U L T I L E V E L H I E R A R C H I C A L R E G I S T R A T I O N S T R A T E G Y 69 steps: D I T and FAC table construction, users roaming, portable and user registration, and service information creation. The algorithm of our hierar- chical registration strategy is described as follows.

Step 1. (Construction) All of the databases are interconnected as a distributed hierarchical tree proposed in Section 2.2 by way of a high-speed data link. Take Figure 2 as an example: D I T ( a ) = {b,c,d}; D I T ( c ) = {h,i,j}; D I T ( d ) = { k , l , m .... }; F A C ( a ) = { B - ~ c - O j .... }; F A C ( c ) = { B - O j .... }; and FAC(d) = O.

Step 2. (Roaming) The portables are moving from one service node to another. If the power of the portable is on, the portable will receive the broadcasted LAI of service node. The portable will compare this LAI, e.g., co, with the uisitor location memorized in the portable. If visitor location is not equal to co, then the portable performs Step 3.

Step 3. (Registration) The portable sends a message to this new service node. Seruice node creates location information (dynamic data) for this new comer, and sends an information registration message to its address information node. The address information node examines the FAC table; if the content of the FAC table of this portable directly points to service node, then it updates FAC table; otherwise, it modifies the FAC table and redirects this registration message upward or downward, depending on the FAC content. In our example (Figure 3), FAC(d) = {B -o k}; F A C ( a ) = {B -o d ~ k .... }; FAC(c) = {B -o out .... }; and FAC(j) = {B -o out}.

Step 4. (Send-on-demand) The deregister service node sends personal information (static data) as a response to new service node along with the hierarchical path.

I b,¢,d Directory information Table

~

w

a

a

r

d

Address Chain

, . . . !

/

/ \

/

I

/ \ \

e

k 0

I 0

m O

B's home

B's visitor

location

location

Fig. 3. A forward address chain registration example.

(8)

With the above definitions and algorithm, it can be seen that the shortest routing path exists between the user home database and the visitor database. Thus, we have the following theorem.

THEOREM 1. With information on D I T and FAC, the send-on-demand protocol assures that personal information is routed along with the shortest path in the proposed network topology.

3. EVALUATION OF GLOBAL DATA MANAGEMENT

As mentioned in Section 2, the proposed hierarchical tree is simple and efficient. There have been real-time location tracking, updating, and registration features, but no maintenance of replication. The hierarchical topology of databases is also scaleable and configurable. We illustrate the following issues to examine its efficiency of data management.

3.1. MOBILITY DATA UPDATING

As discussed in Section 2.3, static data are retrieved from the home service node and dynamic data are created locally. Dynamic data are updatable while the portable is moving. Service nodes proposed in this paper are really mobility data stores. These nodes store all of the service information for users served in their service areas. From Definition 1, the visitors' service nodes are the granularity unit of registration and update. These registrations and updates operate in the sense of real time. How- ever, there is no mobility data updating in the home service nodes and address information nodes. Further, the semantic interoperation between the distributed hierarchical databases is only dependent on the interface standard of the communication protocol.

3.2. DATA ACQUISITION DURING QUERYING DATABASE

In some cases, service node receives the users' call setup request with registration at the same time. As mentioned in our algorithm, caching service information in visitor service node is completed after the registra- tion procedure. Therefore, visitor service node suspends the call setup request until the completion of the registration procedure. This call suspension results in incorporating data acquisition into querying service node (horizontal database) [5]. The distributed hierarchical databases and registration algorithm proposed here solve this type of query processing with data acquisition. Our algorithm for this type of query is very natural

(9)

MULTILEVEL HIERARCHICAL REGISTRATION STRATEGY 71 to complete in two steps: registering the location first, and then serving the query from the copied personal information.

The speed in retrieving personal information from home sertYice node (old) to visitor service node (new) is dependent on the transmission medium and message length. Regardless of the processing time in interme- diate nodes, we know that the transcontinental terrestrial radio link only takes 10-20 ms propagation delay. Even the satellite link has a propaga- tion delay of about one quarter of a second with a 50 Mbps data stream. Therefore, the performance of data acquisition is reasonable and accept- able in our proposal.

3.3. SERVICE MOBILITY

The target of this paper is to present a solution of mobility management for portables, users, and services. Service mobility is also the most difficult among these three kinds of mobility. In our algorithm, service information, especially personal information, is roaming with users. Wherever users locate, service information follows and is stored in the nearest service node. Service mobility in this sense is ubiquitous and seamless services of course.

3.4. RECOVERY

In some cases, the visitor service node may lose the visitors' service information; service node will recover a piece of information from the users' "primary copy" in their home service nodes. However, the proposed hierarchical tree is a fully distributed architecture, and complies with the rules of location independence, replication independence, and DBMS independence. The recovery control is simple enough, and only remote caches personal information again while users are repowering on or making a call.

3.5. NETWORK EXPANSION

Tree topology is a connected acyclic graph. An acyclic graph is also termed a forest. In this paper, the network expansion is similar to connect- ing two forests. The only difference between network expansion in our topology and two forest connections is that two forests can be formed as a forest by way of an edge, but two hierarchical trees are unified as one by way of two links and one additional address information node. There are no modifications in the existing address information nodes, except for the reconfiguration of the DIT and FAC table in the new node.

(10)

4. COST ANALYSIS

The proposed multilevel hierarchical registration strategy should be simple, efficient, and cost-effective. Simplicity and efficiency are easier to examine from network topology. Cost-effectiveness is the most important point for proving the feasibility of the proposed strategy. The cost analyses considered in this section are database memory size, updates cost, queries cost, and communications cost.

4.1. DATABASE MEMORY SIZE

Consider the cost analysis model in Figure 4, and assume that users and traffic patterns are of uniform distribution. For simplicity, we let the population of users be the sizes of memory equivalently. Let X~ denote the database memory size for users in SA i, Pi denote the probability of user roaming outside

SA i,

and Mi denote the branch number of subtree i + 1. In our proposed hierarchical tree, there are two types of memory sizes to be determined: the memory size for address information node in each level, and the memory size for each service node. Therefore, the mandatory memory size for users in the address information node is

and

X2 ''

pQ/'

', / " ,

.,:ii _ . . .

L.

(11)

M U L T I L E V E L H I E R A R C H I C A L R E G I S T R A T I O N S T R A T E G Y 73 It can be seen that the m e m o r y size for the D I T table is a small m a n d a t o r y portion, but the m e m o r y size for the F A C table varies while users are roaming.

T h e visitor roaming users with h o m e locations outside this SA i con- tribute the varying portion of m e m o r y size of {X/} 1 ~ i~ k. Let TRU(X i) be the total roaming users in this SAi; then from Eq. (1), we have T R U ( X ) =

h o m e roaming users + visitor roaming users = k - 2 ( 1 - P j + 1)PjMjX i Pi-lMi iXi l+ j = i M j - 1 x~ +Mk 1 - 1 , (2) where i = 1 . . . k - 1.

The higher the level of tree, the less the roaming probability across

service area. Therefore, the probability has P0 > P~ > "'" > P~-1 property, and the database m e m o r y in each node X~ has the rule X 1 > X 2 > . . . X k. Thus, we have TRU(Xi)<~Pi ,Mi_lXi_~ + k ( 1 -P~+,)P~M~X,

Mi-1

P i + l <~2Pi_,M i ,Xi_ ,, as M i = M i 1 = M a n d - - ~ - - ~ 0 " i

<e0 x0

=X~, where i = 2 . . . k - 1. (3) This implies that the m e m o r y size for the F A C table in address information node has an u p p e r bound of registering X l users. Similarly, the m e m o r y size for each service node is d e p e n d e n t on the population size of h o m e users, X 0, and F A C table size. Therefore, by Eqs. (2) and (3), we have the following theorem.

THEOREM 2. Total roaming users in proposed address information nodes have {TRU( X~) >~ TRU(Xi+ 1)}2 <~ i <~ k - I and {TRU( X ) ~ X l } i = 1 ... k"

In addition, we have the total service users, TSU= (FI~£dMi)Xo, in our model. If we let X0=100,000, M 0 = 1 0 0 , and M 1 = 1 0 , then TSU=

100,000,000. In this case (k = 2), the model is the same as that p r o p o s e d in [11]. F u r t h e r m o r e , there are 300 million telephones in the world; we can service t h e m in our model with the value of k = 3.

(12)

4.2. UPDATES COST

The update operations manipulated in address information nodes are only FAC table modifications since the D I T table is configured only once the hierarchical topology is changed. The volume of FAC table modifica- tion is dependent on the size of roaming users in each node. A m o n g these address information nodes in the tree topology, the maximum update volume, about PoMoXo, will occur in the X 1 nodes. However, [11] has proved the feasible update capability in these X~ nodes to cover 100 million portables.

The other updates from portables' registration are operated in service nodes. Because these nodes contain all the service information, these update operations are real-time and cost-effective in distance traveling measure. On this distributed processing architecture, it is quite easy and not costly to find a database fast enough to handle X 0 users in each service node.

4.3. QUERIES COST

Each time the user makes a call or the portable enters a new service node, querying activities occur between exchange and service node, and queries even occur with data acquisition between visitor service node and home service node. The queries cost is dependent on the number of querying messages.

In the case of queries with data acquisition, query messages are subject to the roaming probability Pi and branch factor Mi. Therefore, it is obvious that query messages should be less than either query messages in the centralized database scheme or query messages in the home database scheme. The query cost between exchange and service node is only a function of users, X 0, and traffic behavior; moreover, the cost is minimized while service node and exchange are collocated. Therefore, queries' costs in our approach are minimal.

4.4. COMMUNICATIONS COST

In our hierarchical registration strategy, we manipulate service informa- tion by way of a send-on-demand protocol from deregistered service node to new service node. As in T h e o r e m 1, information copy flows along the shortest path because of the D I T table and FAC information. T h e r e is no write-back operation from deregistered service node to home service node, and there is also no r e m o t e forward copy from home service node to new

(13)

M U L T I L E V E L H I E R A R C H I C A L R E G I S T R A T I O N S T R A T E G Y 75 service node. T h e r e is only a one-way shortest path communications cost occurring between deregistered service node and new service node.

Assume branch factor M i = M and total N nodes in the p r o p o s e d tree topology; then the depth of tree is log u N. Thus, we have m a x i m u m communications cost in 2 ( l o g u N - 1) steps for X k users. It is important to point out that there is about a { 1 - M 2 M 3 . . . M k

1X2/TSU}={1-PoP1}

percentage of users with two steps' communications cost. Therefore, the p r o p o s e d strategy for providing U P C S is of minimal communications cost.

5. C O N C L U S I O N

In this paper, we p r o p o s e a multilevel hierarchical registration strategy for UPCS. The p r o p o s e d hierarchical tree is simple and efficient for real-time location tracking, location updating, and registration, but no maintenance of data replication. The feasibility of our proposal has been examined by database m e m o r y size, updates cost, queries cost, and com- munications cost in our p r o p o s e d cost analysis model.

In addition, there is no semantic interoperation between distributed hierarchical databases. T h e p r o p o s e d tree topology is also scaleable and configurable. Thus, it is practical to realize o u r model in the real world. Finally, our a p p r o a c h creates location information freely, and personal information can accompany users with a s e n d - o n - d e m a n d data migration protocol to achieve the essence of mobility m a n a g e m e n t of portables, users, and services.

R E F E R E N C E S

1. Cellular radio telecommunications intersystem operations: Automatic roaming, EIA/TIA IS-41.3 (Revision B) (July 1991).

2. GSM Technical Specifications, ETSI, Sophia antipolis, 1992.

3. G. Brody, J. Parker, and J. Wassermann, Subscriber tracking and locating in personal communications networks, in Proc. XIV Int. Switching Syrup., Yokohama, Japan, vol. 1, 1992.

4. M. Fujioka, S. Sakai, and H. Yagi, Heirarchical and distributed information han- dling for UPT, IEEE Network Mag. 4(6):50-60 (1990).

5. T. Imielinski and B. R. Badrinath, Querying in highly mobile distributed environ- ments, in Proc. 18th VLDB Conf., 1992, pp. 41-52.

6. T. Imielinski and B. R. Badrinath, Data management for mobile computing, SIGMOD Rec. 22(1):34-39 (1993).

7. R. Jain and Y. B. Lin, An auxiliary user location strategy employing forward pointers to reduce network impacts of PCS, ACM-Baltzer Wireless Networks 1(2)(1995).

(14)

8. Y. B. Lin and S. DeVries, PCS network signaling using SS7, IEEE Personal Commun. Mag. (June 1995).

9. H.-J. v o n d e r Neyen, L. S. Chen, and A. J. Hooker, Impact of mobility on switching networks, in Proc. X I V Int. Switching Symp., Yokohama, Japan. vol. 1, 1992. 10. L. Schwartz, A personal communications services prototype using the advanced

intelligent network, in Proc. X I V Int. Switching Syrup., Yokohama, Japan, vol. 1, 1992.

11. J. Z. Wang, A fully distributed location registration strategy for universal personal communication systems, IEEE J. Sel. Areas in Commun. 11(6):850-860 (1993). Received 10 October 1994; ret~ised 1 March 1995

數據

Fig. 2.  The proposed multilevel hierarchical tree.

參考文獻

相關文件

Regarding the course timetable and the commencement arrangement, information will be announced via email upon completion of online registration in early September.. Lessons will

ix If more than one computer room is opened, please add up the opening hours for each room per week. duties may include planning of IT infrastructure, procurement of

Provide all public sector schools with Wi-Fi coverage to enhance learning through the use of mobile computing devices, in preparation for the launch of the fourth IT in

What are the factors of strengths, weaknesses, opportunities and threats for instant coffee producers in Indonesia?... What is the competitive strategy that should

competitive strategy to explore in order to provide some of the domestic banking wealth management business recommendations, and thus enhance the stability of domestic

This study chose a qualitative research method to explore more in-depth information access strategy for the establishment of many commodities, institute of emphasis from

Li, “Concurrent engineering: a strategy for procuring construction projects,” International Journal of Project Management, Vol. Towill and D.R., “Time compression and supply chain

Since the research scope of industrial structure optimization and transformation strategy in Taiwan is broad and complicated, based on theories of service innovation and