SlideShare a Scribd company logo
1 of 4
International Journal Of Computational Engineering Research||Vol, 03||Issue, 5||
www.ijceronline.com ||May ||2013|| Page 14
Work Done on Avoidance of Bottleneck in PCS Network
Alka1
, Sidhi Pandey2
, Pratima Singh3
1, 2, 3
(Computer Science & Engineering, Institute of Technology & Management, India)
I. INTRODUCTION
We studied the various replication techniques to replicate HLR in PCS network. Replication is the key strategy
for improving reliability, fault tolerance and availability in Distributed System. Personal Communication
Service (PCS) network is the integration of cellular Network and conventional wired network. To support user
mobility, the locations of the mobile stations (MSs) should be constantly tracked using a database. The
widespread deployment of PCS will lead to a tremendous increase in the number of updates and queries to the
location database. The centralized, stand-alone Home Location Register (HLR) in GSM can be a potential
bottleneck. In case of the location database failure, incoming calls may be lost. According to the analysis of the
load in HLR, we suggest replicating the HLR in order to increase its capacity and reliability. We compare all the
replication strategies in order to maintain availability, consistency and fault-tolerance in PCS Network to avoid
bottleneck.
1.1. Multi HLR Architecture Scheme in PCS Network:
In conventional HLR-VLR scheme, De-registration of a Mobile Terminal from a Visitor Location
Register is always explicit. Explicit in the sense that stale entries of Visitor Location Register s are removed
with the help of Home Location Register. Actually Home Location Register sends De-registration message to
the Visitor Location Register to remove the stale entries when a Mobile Terminal changes its Visitor Location
Register. This explicit De-registration increases the total cost by increasing the traffic load. To reduce the traffic
load following De-registration strategies were proposed [2].
(A) Distance Based De-registration Scheme.
(B) Time-Based De-registration Scheme.
(C) Polling-Based De-registration Scheme.
(D) Group De-registration Scheme.
(E) Movement-Based De-registration Scheme.
In the proposed architecture, we have several HLRs zone wise or circle wise instead of a single Home Location
Register. It reduces the storage overhead of the Home Location Register. Each Home Location Register can
serve more than one Visitor Location Register and each Visitor Location Register can serve more than one RAs.
Simply we can say that this architecture contains several conventional HLR-VLR architectures.
II. PERFORMANCE ANALYSIS OF MULTI HLR ARCHITECTURE:
An analytical model to evaluate the performance of multi HLR architecture has been presented here
along with the group de-registration strategy implemented in same architecture. Here all HLRs are located at the
same layer and they are communicating each other in point-to-point basis. In this analysis, hierarchal trees of R
layers are being used. The layer R contains the roots of all trees and leaves of all trees are at the level 1. It means
both roots and leaves reside on the same layer.
Following terms are being used in the performance analysis:-
mx,y Layer of the closest common node to RA x and RA y.
p Probability that the MT move is intra-VLR.
ABSTRACT
This paper contains work done on avoiding the bottleneck from network using some formulas
and techniques that we have surveyed and studied. This is done by replicating the primary copy of HLR
at same level which provide all services of primary HLR when it is not in serving mode. Also we have
analyzed its performance and drawn results on this basis.
KEYWORDS: PCS, Location Management, HLR-VLR, Replicated databases, mobile computing.
Work Done On Avoidance…
www.ijceronline.com ||May ||2013|| Page 15
n New RA of the MT.
a Old RA of the MT.
P (mx,y=i) is defined as the probability that the closest common node to LA x (RA x) and LA y(RA y) is in layer
i. This probability can be given by the following equation.
We furthermore denote the costs of various operations used in this analysis as follows:
T (i, j): Cost of transmitting a message over a link between two adjacent layers i and j.
Cm (i): Cost of accessing or updating a database in layer i.
Mmulti HLR-VLR(explicit): Estimated cost of a location update in the explicit multi HLR-VLR scheme.
MmutiHLR-VLR (group): Estimated cost of a location update using group de-registration scheme in multi HLR-VLR
architecture.
Estimated cost of location update in explicit stand alone HLR-VLR scheme is given as:
The first part of Eq. (2) is the cost of location update in intra-VLR move. The second part illustrates the scenario
after an inter-VLR move. T (1, L) =T (1, 2) +T (2, 3) +……..+T (L-1, L) is equal to the cost of traversing links
between a node of layer 1(i.e., VLR) and the node of layer R (i.e., where an HLR is located). This cost is
multiplied by 4 because new VLR sends registration request to the HLR, the latter sends cancellation request to
the old VLR, old VLR sends an acknowledgement in response to the HLR and finally HLR confirms the
registration of new MT at the new VLR.
Transmission cost of the message is described as follows:
T(1,L)=T(1,2)+T(2,3)+……..+T(L-1,L)
T (1, 2) will give the result 2; T (2, 3) will give the result 3 and so on.
Estimated cost of location update with group de-registration scheme is given as follows:
The first part of this Equation number (3) is the cost of location update in intra-VLR move. The second
part illustrates the scenario after an intra-VLR move. When an MT leaves its RA and enters into new RA the
new VLR sends a registration request to the HLR. HLR keeps the identification of the MT into the OML of the
old VLR. After performing the MT’s profile update by accessing its database HLR sends the acknowledgement
message along with the OML of new VLR. We see that HLR database is being consulted three times. The first
access is done for putting the MT’s identification into the old VLR’s OML, second time for updating the MT’s
current location information and third time for emptying the OML of new VLR, further the entries of this OML
is sent back with the acknowledgement. At the VLR side database is being consulted twice, first for the
registration of new MT and second for de-registration of the entries sent by the HLR.
In part 3 of this equation, we are generalizing the movement of an MT when MT leaves its resident-
HLR and enters into new serving-HLR and then after it again changes its serving-HLR to another serving-HLR.
A cost of 4 is being added to it because of the following reasons: Let an MT leaves its resident-HLR and enters
into a serving-HLR say serving-HLR1. Again the same MT leaves this serving-HLR1 and enters into another
serving-HLR say serving-HLR2. In registration process of MT in serving-HLR2, it sends location update to
Work Done On Avoidance…
www.ijceronline.com ||May ||2013|| Page 16
resident-HLR (cost incurred is 1), on reception of this message, resident-HLR updates the location information
of MT and sends a location cancellation message to serving-HLR1 (cost incurred is 1). On reception of this
message, the serving-HLR1 deletes the location information of this MT. The serving-HLR1 acknowledges the
resident-HLR about the location cancellation message (cost incurred is 1). Finally the resident-HLR
acknowledges the serving-HLR2 (cost incurred is 1) and location registration takes place at the serving-HLR2.
As all HLRs are the same level hence message exchange cost between the two HLRs is T (1, 1) =1.
III. RESULTS
In this section the numerical values of explicit de-registration scheme and group de-registration scheme
implemented in the multi HLR-VLR architecture are evaluated and compared. Fig (6) and (7) show the
performance of location update schemes with R=5 and R=3 respectively.
Figure 1: Location update cost for R=5
Figure 2: Location update cost when R=3
Work Done On Avoidance…
www.ijceronline.com ||May ||2013|| Page 17
Probability shows that the MT will reside in its resident-HLR. Probability and indicate that MT will be
in serving-HLRs. When has value 1 then MT is not changing its resident-HLR. Probability p defines the MT’s
intra VLR move. If p equals to 1 then MT is not changing its location. When p tends to 0, it means MT’s move
is not local. When and p are equal to 1, MT is in its resident-HLR and not changing its location and hence
location update cost is 1. When and p equals to 0, it means MT is not in its resident-HLR and its move is not
local with respect to serving-HLR. When and p equal to 0, it shows the maximum degree of movement.
IV. CONCLUSION
Conventional architecture has a single HLR and that’s why it suffers from call misrouting and
bottleneck during peak load. To remove this, several conventional architectures are group together to form multi
HLR architecture. In this scheme we store the user profile in HLRs zone wise. This approach reduces the
storage load on HLR and hence minimizes the possibility of bottleneck. Now in this architecture even in high
load appropriate information is fetched from HLRs and we significantly minimize the possibility of call
misrouting.
Analysis done in the last section shows that total cost incurred into the location management in the
proposed multi HLR-VLR architecture using group de-registration scheme is efficient than the explicit de-
registration scheme. The proposed architecture is free from the problem of bottleneck as we are not entirely
relying on one HLR. We have not any stale entry of MT in any VLR as we have associated the de-registration
process of the MT with its movement and saved sufficient cost by implementing group de-registration scheme
instead of conventional explicit de-registration.
REFERENCES
[1] W.F. Ames. Numerical Methods for Partial Differential Equations. Academic Press, 1977.
[2] R. Aris. Discrete Dynamic Programming. Blaisdel, 1964.
[3] D.R. Bailes and C.J. Taylor. The Use of Symmetry Chords for Expressing Grey Level Constraints. In Proc. British Machine
Vision Conference, pages296-305. Springer, 1992.
[4] D.H. Ballard. Generalizing the Hough Transform to Detect Arbitrary Shapes. Pattern Recognition, 13:111-122, 1981.
[5] R. Bellman. Dynamic Programming. Princeton University Press, 1957.
[6] A. Blake and M. Isard. Active Contours. Springer, 1998.
[7] G.J. Borse. Numerical Methods with Matlab. PWS, 1997.
[8] J.P Boyd. Chebyshev and Fouirer Spectral Methods. Springer, 1985.
[9] W. Cheney and D. Kincaid. Numerical Mathematics and Computing. Brook-s/Cole, 1985.
[10] J.H. Chuang. Potential-Based Approach for Shape Matching and Recognition. Pattern Recognition, 29:463-470, 1996.
[11] P.G. Ciarlet and J.L. Lions. Handbook of Numerical Analysis, Volume 5. El-sevier, 1997.
[12] L.D. Cohen. NOTE On Active Contour Models and Balloons. Computer Vision and Image Processing:
Image Understanding, 53:211-218, March 1991.

More Related Content

What's hot

MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONMODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONijwmn
 
Dimensioning of Multi-Class Over-Provisioned IP Networks
Dimensioning of Multi-Class Over-Provisioned IP NetworksDimensioning of Multi-Class Over-Provisioned IP Networks
Dimensioning of Multi-Class Over-Provisioned IP NetworksEM Legacy
 
NEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNEL
NEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNELNEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNEL
NEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNELijcseit
 
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay SelectionAn Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selectioninventy
 
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...IRJET Journal
 
Outage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channelOutage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channeleSAT Publishing House
 
Short term traffic volume prediction in umts networks using the kalman filter...
Short term traffic volume prediction in umts networks using the kalman filter...Short term traffic volume prediction in umts networks using the kalman filter...
Short term traffic volume prediction in umts networks using the kalman filter...ijmnct
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...ijmnct
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksAbir Hossain
 
Optimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVOptimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVTELKOMNIKA JOURNAL
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...TELKOMNIKA JOURNAL
 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...ijwmn
 
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP ConstraintsAn Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP ConstraintsEM Legacy
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocolchirag bhatt
 
E04124030034
E04124030034E04124030034
E04124030034IOSR-JEN
 
TCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANsTCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANsambitlick
 

What's hot (19)

MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONMODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
 
Dimensioning of Multi-Class Over-Provisioned IP Networks
Dimensioning of Multi-Class Over-Provisioned IP NetworksDimensioning of Multi-Class Over-Provisioned IP Networks
Dimensioning of Multi-Class Over-Provisioned IP Networks
 
NEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNEL
NEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNELNEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNEL
NEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNEL
 
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay SelectionAn Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selection
 
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...
 
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
A Batch-Arrival Queue with Multiple Servers and Fuzzy Parameters: Parametric ...
 
Outage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channelOutage analysis of simo system over nakagami n fading channel
Outage analysis of simo system over nakagami n fading channel
 
Short term traffic volume prediction in umts networks using the kalman filter...
Short term traffic volume prediction in umts networks using the kalman filter...Short term traffic volume prediction in umts networks using the kalman filter...
Short term traffic volume prediction in umts networks using the kalman filter...
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networks
 
Optimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVOptimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADV
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
 
A046020112
A046020112A046020112
A046020112
 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
 
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP ConstraintsAn Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
 
D04622933
D04622933D04622933
D04622933
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocol
 
E04124030034
E04124030034E04124030034
E04124030034
 
TCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANsTCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANs
 

Viewers also liked

DOP ile İlgili Genel İlkeler
DOP ile İlgili Genel İlkelerDOP ile İlgili Genel İlkeler
DOP ile İlgili Genel İlkelerBCanKARA
 
Cerfs et-biches-ette
Cerfs et-biches-etteCerfs et-biches-ette
Cerfs et-biches-etteRenée Bukay
 
Эволюция освещения
Эволюция освещенияЭволюция освещения
Эволюция освещенияOLYAVASYUK
 
Sergey Boytsov, State Scientific Research Institute of Organization and Infor...
Sergey Boytsov, State Scientific Research Institute of Organization and Infor...Sergey Boytsov, State Scientific Research Institute of Organization and Infor...
Sergey Boytsov, State Scientific Research Institute of Organization and Infor...Sosiaali- ja terveysministeriö / yleiset
 

Viewers also liked (8)

E035425030
E035425030E035425030
E035425030
 
DOP ile İlgili Genel İlkeler
DOP ile İlgili Genel İlkelerDOP ile İlgili Genel İlkeler
DOP ile İlgili Genel İlkeler
 
G035438049
G035438049G035438049
G035438049
 
FacilitiesPoster
FacilitiesPosterFacilitiesPoster
FacilitiesPoster
 
F035431037
F035431037F035431037
F035431037
 
Cerfs et-biches-ette
Cerfs et-biches-etteCerfs et-biches-ette
Cerfs et-biches-ette
 
Эволюция освещения
Эволюция освещенияЭволюция освещения
Эволюция освещения
 
Sergey Boytsov, State Scientific Research Institute of Organization and Infor...
Sergey Boytsov, State Scientific Research Institute of Organization and Infor...Sergey Boytsov, State Scientific Research Institute of Organization and Infor...
Sergey Boytsov, State Scientific Research Institute of Organization and Infor...
 

Similar to C035414017

A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...CSCJournals
 
Design & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDLDesign & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDLijsrd.com
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 ijngnjournal
 
Distributed database architecture for global roaming in next generation mobil...
Distributed database architecture for global roaming in next generation mobil...Distributed database architecture for global roaming in next generation mobil...
Distributed database architecture for global roaming in next generation mobil...Mumbai Academisc
 
An Efficient Cooperative Media Access Control Based Relay Node Selection In W...
An Efficient Cooperative Media Access Control Based Relay Node Selection In W...An Efficient Cooperative Media Access Control Based Relay Node Selection In W...
An Efficient Cooperative Media Access Control Based Relay Node Selection In W...Christo Ananth
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
 
IRJET - A Review on Analysis of Location Management in Mobile Computing
IRJET -  	  A Review on Analysis of Location Management in Mobile ComputingIRJET -  	  A Review on Analysis of Location Management in Mobile Computing
IRJET - A Review on Analysis of Location Management in Mobile ComputingIRJET Journal
 
Researchpaper a survey-on-de-registration-schemes-in-pcs-network
Researchpaper a survey-on-de-registration-schemes-in-pcs-networkResearchpaper a survey-on-de-registration-schemes-in-pcs-network
Researchpaper a survey-on-de-registration-schemes-in-pcs-networkRajeev Ranjan
 
Assessing Buffering with Scheduling Schemes in a QoS Internet Router
Assessing Buffering with Scheduling Schemes in a QoS Internet RouterAssessing Buffering with Scheduling Schemes in a QoS Internet Router
Assessing Buffering with Scheduling Schemes in a QoS Internet RouterIOSR Journals
 
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESIJCNCJournal
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
Location and Mobility Aware Resource Management for 5G Cloud Radio Access Net...
Location and Mobility Aware Resource Management for 5G Cloud Radio Access Net...Location and Mobility Aware Resource Management for 5G Cloud Radio Access Net...
Location and Mobility Aware Resource Management for 5G Cloud Radio Access Net...Md Nazrul Islam Roxy
 
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKSPERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKScscpconf
 
Performance analysis of resource
Performance analysis of resourcePerformance analysis of resource
Performance analysis of resourcecsandit
 
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...pijans
 
A Survey On Secure Cooperative Bait Detection Approach For...
A Survey On Secure Cooperative Bait Detection Approach For...A Survey On Secure Cooperative Bait Detection Approach For...
A Survey On Secure Cooperative Bait Detection Approach For...Jennifer Perry
 
Performance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive andPerformance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive andeSAT Publishing House
 
Performance evaluation of proactive, reactive and hybrid routing protocols wi...
Performance evaluation of proactive, reactive and hybrid routing protocols wi...Performance evaluation of proactive, reactive and hybrid routing protocols wi...
Performance evaluation of proactive, reactive and hybrid routing protocols wi...eSAT Journals
 

Similar to C035414017 (20)

A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...
A New Location Caching with Fixed Local Anchor for Reducing Overall Location ...
 
Design & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDLDesign & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDL
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
 
Distributed database architecture for global roaming in next generation mobil...
Distributed database architecture for global roaming in next generation mobil...Distributed database architecture for global roaming in next generation mobil...
Distributed database architecture for global roaming in next generation mobil...
 
An Efficient Cooperative Media Access Control Based Relay Node Selection In W...
An Efficient Cooperative Media Access Control Based Relay Node Selection In W...An Efficient Cooperative Media Access Control Based Relay Node Selection In W...
An Efficient Cooperative Media Access Control Based Relay Node Selection In W...
 
Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...Congestion control based on sliding mode control and scheduling with prioriti...
Congestion control based on sliding mode control and scheduling with prioriti...
 
IRJET - A Review on Analysis of Location Management in Mobile Computing
IRJET -  	  A Review on Analysis of Location Management in Mobile ComputingIRJET -  	  A Review on Analysis of Location Management in Mobile Computing
IRJET - A Review on Analysis of Location Management in Mobile Computing
 
Researchpaper a survey-on-de-registration-schemes-in-pcs-network
Researchpaper a survey-on-de-registration-schemes-in-pcs-networkResearchpaper a survey-on-de-registration-schemes-in-pcs-network
Researchpaper a survey-on-de-registration-schemes-in-pcs-network
 
Assessing Buffering with Scheduling Schemes in a QoS Internet Router
Assessing Buffering with Scheduling Schemes in a QoS Internet RouterAssessing Buffering with Scheduling Schemes in a QoS Internet Router
Assessing Buffering with Scheduling Schemes in a QoS Internet Router
 
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODESADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
ADAPTIVE HANDOVER HYSTERESIS AND CALL ADMISSION CONTROL FOR MOBILE RELAY NODES
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
Location and Mobility Aware Resource Management for 5G Cloud Radio Access Net...
Location and Mobility Aware Resource Management for 5G Cloud Radio Access Net...Location and Mobility Aware Resource Management for 5G Cloud Radio Access Net...
Location and Mobility Aware Resource Management for 5G Cloud Radio Access Net...
 
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKSPERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKS
 
Performance analysis of resource
Performance analysis of resourcePerformance analysis of resource
Performance analysis of resource
 
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...
 
A Survey On Secure Cooperative Bait Detection Approach For...
A Survey On Secure Cooperative Bait Detection Approach For...A Survey On Secure Cooperative Bait Detection Approach For...
A Survey On Secure Cooperative Bait Detection Approach For...
 
Ijebea14 272
Ijebea14 272Ijebea14 272
Ijebea14 272
 
Performance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive andPerformance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive and
 
Performance evaluation of proactive, reactive and hybrid routing protocols wi...
Performance evaluation of proactive, reactive and hybrid routing protocols wi...Performance evaluation of proactive, reactive and hybrid routing protocols wi...
Performance evaluation of proactive, reactive and hybrid routing protocols wi...
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

C035414017

  • 1. International Journal Of Computational Engineering Research||Vol, 03||Issue, 5|| www.ijceronline.com ||May ||2013|| Page 14 Work Done on Avoidance of Bottleneck in PCS Network Alka1 , Sidhi Pandey2 , Pratima Singh3 1, 2, 3 (Computer Science & Engineering, Institute of Technology & Management, India) I. INTRODUCTION We studied the various replication techniques to replicate HLR in PCS network. Replication is the key strategy for improving reliability, fault tolerance and availability in Distributed System. Personal Communication Service (PCS) network is the integration of cellular Network and conventional wired network. To support user mobility, the locations of the mobile stations (MSs) should be constantly tracked using a database. The widespread deployment of PCS will lead to a tremendous increase in the number of updates and queries to the location database. The centralized, stand-alone Home Location Register (HLR) in GSM can be a potential bottleneck. In case of the location database failure, incoming calls may be lost. According to the analysis of the load in HLR, we suggest replicating the HLR in order to increase its capacity and reliability. We compare all the replication strategies in order to maintain availability, consistency and fault-tolerance in PCS Network to avoid bottleneck. 1.1. Multi HLR Architecture Scheme in PCS Network: In conventional HLR-VLR scheme, De-registration of a Mobile Terminal from a Visitor Location Register is always explicit. Explicit in the sense that stale entries of Visitor Location Register s are removed with the help of Home Location Register. Actually Home Location Register sends De-registration message to the Visitor Location Register to remove the stale entries when a Mobile Terminal changes its Visitor Location Register. This explicit De-registration increases the total cost by increasing the traffic load. To reduce the traffic load following De-registration strategies were proposed [2]. (A) Distance Based De-registration Scheme. (B) Time-Based De-registration Scheme. (C) Polling-Based De-registration Scheme. (D) Group De-registration Scheme. (E) Movement-Based De-registration Scheme. In the proposed architecture, we have several HLRs zone wise or circle wise instead of a single Home Location Register. It reduces the storage overhead of the Home Location Register. Each Home Location Register can serve more than one Visitor Location Register and each Visitor Location Register can serve more than one RAs. Simply we can say that this architecture contains several conventional HLR-VLR architectures. II. PERFORMANCE ANALYSIS OF MULTI HLR ARCHITECTURE: An analytical model to evaluate the performance of multi HLR architecture has been presented here along with the group de-registration strategy implemented in same architecture. Here all HLRs are located at the same layer and they are communicating each other in point-to-point basis. In this analysis, hierarchal trees of R layers are being used. The layer R contains the roots of all trees and leaves of all trees are at the level 1. It means both roots and leaves reside on the same layer. Following terms are being used in the performance analysis:- mx,y Layer of the closest common node to RA x and RA y. p Probability that the MT move is intra-VLR. ABSTRACT This paper contains work done on avoiding the bottleneck from network using some formulas and techniques that we have surveyed and studied. This is done by replicating the primary copy of HLR at same level which provide all services of primary HLR when it is not in serving mode. Also we have analyzed its performance and drawn results on this basis. KEYWORDS: PCS, Location Management, HLR-VLR, Replicated databases, mobile computing.
  • 2. Work Done On Avoidance… www.ijceronline.com ||May ||2013|| Page 15 n New RA of the MT. a Old RA of the MT. P (mx,y=i) is defined as the probability that the closest common node to LA x (RA x) and LA y(RA y) is in layer i. This probability can be given by the following equation. We furthermore denote the costs of various operations used in this analysis as follows: T (i, j): Cost of transmitting a message over a link between two adjacent layers i and j. Cm (i): Cost of accessing or updating a database in layer i. Mmulti HLR-VLR(explicit): Estimated cost of a location update in the explicit multi HLR-VLR scheme. MmutiHLR-VLR (group): Estimated cost of a location update using group de-registration scheme in multi HLR-VLR architecture. Estimated cost of location update in explicit stand alone HLR-VLR scheme is given as: The first part of Eq. (2) is the cost of location update in intra-VLR move. The second part illustrates the scenario after an inter-VLR move. T (1, L) =T (1, 2) +T (2, 3) +……..+T (L-1, L) is equal to the cost of traversing links between a node of layer 1(i.e., VLR) and the node of layer R (i.e., where an HLR is located). This cost is multiplied by 4 because new VLR sends registration request to the HLR, the latter sends cancellation request to the old VLR, old VLR sends an acknowledgement in response to the HLR and finally HLR confirms the registration of new MT at the new VLR. Transmission cost of the message is described as follows: T(1,L)=T(1,2)+T(2,3)+……..+T(L-1,L) T (1, 2) will give the result 2; T (2, 3) will give the result 3 and so on. Estimated cost of location update with group de-registration scheme is given as follows: The first part of this Equation number (3) is the cost of location update in intra-VLR move. The second part illustrates the scenario after an intra-VLR move. When an MT leaves its RA and enters into new RA the new VLR sends a registration request to the HLR. HLR keeps the identification of the MT into the OML of the old VLR. After performing the MT’s profile update by accessing its database HLR sends the acknowledgement message along with the OML of new VLR. We see that HLR database is being consulted three times. The first access is done for putting the MT’s identification into the old VLR’s OML, second time for updating the MT’s current location information and third time for emptying the OML of new VLR, further the entries of this OML is sent back with the acknowledgement. At the VLR side database is being consulted twice, first for the registration of new MT and second for de-registration of the entries sent by the HLR. In part 3 of this equation, we are generalizing the movement of an MT when MT leaves its resident- HLR and enters into new serving-HLR and then after it again changes its serving-HLR to another serving-HLR. A cost of 4 is being added to it because of the following reasons: Let an MT leaves its resident-HLR and enters into a serving-HLR say serving-HLR1. Again the same MT leaves this serving-HLR1 and enters into another serving-HLR say serving-HLR2. In registration process of MT in serving-HLR2, it sends location update to
  • 3. Work Done On Avoidance… www.ijceronline.com ||May ||2013|| Page 16 resident-HLR (cost incurred is 1), on reception of this message, resident-HLR updates the location information of MT and sends a location cancellation message to serving-HLR1 (cost incurred is 1). On reception of this message, the serving-HLR1 deletes the location information of this MT. The serving-HLR1 acknowledges the resident-HLR about the location cancellation message (cost incurred is 1). Finally the resident-HLR acknowledges the serving-HLR2 (cost incurred is 1) and location registration takes place at the serving-HLR2. As all HLRs are the same level hence message exchange cost between the two HLRs is T (1, 1) =1. III. RESULTS In this section the numerical values of explicit de-registration scheme and group de-registration scheme implemented in the multi HLR-VLR architecture are evaluated and compared. Fig (6) and (7) show the performance of location update schemes with R=5 and R=3 respectively. Figure 1: Location update cost for R=5 Figure 2: Location update cost when R=3
  • 4. Work Done On Avoidance… www.ijceronline.com ||May ||2013|| Page 17 Probability shows that the MT will reside in its resident-HLR. Probability and indicate that MT will be in serving-HLRs. When has value 1 then MT is not changing its resident-HLR. Probability p defines the MT’s intra VLR move. If p equals to 1 then MT is not changing its location. When p tends to 0, it means MT’s move is not local. When and p are equal to 1, MT is in its resident-HLR and not changing its location and hence location update cost is 1. When and p equals to 0, it means MT is not in its resident-HLR and its move is not local with respect to serving-HLR. When and p equal to 0, it shows the maximum degree of movement. IV. CONCLUSION Conventional architecture has a single HLR and that’s why it suffers from call misrouting and bottleneck during peak load. To remove this, several conventional architectures are group together to form multi HLR architecture. In this scheme we store the user profile in HLRs zone wise. This approach reduces the storage load on HLR and hence minimizes the possibility of bottleneck. Now in this architecture even in high load appropriate information is fetched from HLRs and we significantly minimize the possibility of call misrouting. Analysis done in the last section shows that total cost incurred into the location management in the proposed multi HLR-VLR architecture using group de-registration scheme is efficient than the explicit de- registration scheme. The proposed architecture is free from the problem of bottleneck as we are not entirely relying on one HLR. We have not any stale entry of MT in any VLR as we have associated the de-registration process of the MT with its movement and saved sufficient cost by implementing group de-registration scheme instead of conventional explicit de-registration. REFERENCES [1] W.F. Ames. Numerical Methods for Partial Differential Equations. Academic Press, 1977. [2] R. Aris. Discrete Dynamic Programming. Blaisdel, 1964. [3] D.R. Bailes and C.J. Taylor. The Use of Symmetry Chords for Expressing Grey Level Constraints. In Proc. British Machine Vision Conference, pages296-305. Springer, 1992. [4] D.H. Ballard. Generalizing the Hough Transform to Detect Arbitrary Shapes. Pattern Recognition, 13:111-122, 1981. [5] R. Bellman. Dynamic Programming. Princeton University Press, 1957. [6] A. Blake and M. Isard. Active Contours. Springer, 1998. [7] G.J. Borse. Numerical Methods with Matlab. PWS, 1997. [8] J.P Boyd. Chebyshev and Fouirer Spectral Methods. Springer, 1985. [9] W. Cheney and D. Kincaid. Numerical Mathematics and Computing. Brook-s/Cole, 1985. [10] J.H. Chuang. Potential-Based Approach for Shape Matching and Recognition. Pattern Recognition, 29:463-470, 1996. [11] P.G. Ciarlet and J.L. Lions. Handbook of Numerical Analysis, Volume 5. El-sevier, 1997. [12] L.D. Cohen. NOTE On Active Contour Models and Balloons. Computer Vision and Image Processing: Image Understanding, 53:211-218, March 1991.