On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems

Size: px
Start display at page:

Download "On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems"

Transcription

1 On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems Ing-Ray Chen, Baoshan Gu, and Sheng-Tzong Cheng Presented by: Iman Saleh Hardik Patel

2 Agenda Introduction Problem Specification System Model Integrated Location and Service Management Schemes Cost Models Performance Evaluations Conclusion

3 Introduction Personal Communications Service (PCS) provides a wide range of information services, such as personal banking service, personalized stock market information, location dependent travel information, etc. for which a mobile user (MU) sends requests to a server and the server sends replies to the mobile user. Constraints: User is not static How to tackle problem of personal mobility of MU in PCS. Suggestions: Create per-user service proxy for each mobile user to tackle the problem of personal mobility. Objective: Reduce communication cost for service.

4 Personal Communications Service (PCS) Servers Stock Market Weather Info Requests Replies

5 Approaches to tackle problem of PCS The service proxy Performs tasks such as tracking locations of the MU Maintaining service context information for the service engaged Accepting service requests from the MU Transforming requests into proper formats and Forwarding server replies to the MU. The personal proxy: Explicitly tracks the MU location Eliminates the overhead for the server application to first check with the underlying location management system to know the current MU location before data delivery.

6 Cont d Shortcomings: Since all client-server communications must go through the personal proxy, if the personal proxy is static in location, it is likely that inefficient server-proxy-mu triangle routes may be used for data delivery, resulting in high communication costs. If the proxy is mobile to stay closer to the MU, extra network costs will be incurred to inform the server applications of the address change whenever the proxy changes its location.

7 Alternative: Divided the problem in two sets: Location Management: the most popular scheme in PCS networks is the basic Home Location Register/Visitor Location Register (HLR/VLR) Each MU has an HLR. Whenever an MU enters a VLR, the system updates its HLR location database so that, when a call arrives, the HLR location database knows exactly which VLR contains the MU. Service management: Allows an MU to maintain ongoing connections while roaming among different VLRs and enables the MU to inform its HLR. The proxy used to forward messages to an MU must explicitly track the location of the MU. The extra communication costs are incurred to notify the proxy when the MU moves across a location registration area boundary

8 Problem Specification Investigate the notion of integrated location and service management for minimizing network cost without making the assumption of fully replicated servers in VLRs in the PCS network. Investigate and identify the best integrated location and service management scheme that can be applied on an individual user basis to minimize the overall cost incurred to the PCS network per time unit for servicing location and service operations of all users.

9 Approach to the solution & Key concepts Use a per-user service proxy as a gateway between the MU and all client-server applications engaged by the MU concurrently. The proxy keeps track of service context information such as the current state of the execution for maintaining service continuity. We always co-locate the MU s service proxy with the MU s location database that stores the current location of the MU, so that the service proxy knows the current location of the MU all the time. Location handoff: Whenever the MU moves across a registration area boundary, a location handoff occurs for the location management system to update the location database. Service handoff: Updating the service proxy when location handoff occurs.

10 PCS Signaling Network Architecture

11 PCS system: Challenge Managing services in roaming environment Server HLR VLR VLR VLR How to find new VLR? Overhead by VLR in contacting HLR!!

12 Basic HLR/VLR scheme A mobile user is permanently registered under a location register HLR. When the mobile user enters a new VLR area, it reports to the new VLR, which, in turn, informs the HLR by means of a location update operation. When a call is placed, the system first searches the MU s current location through the HLR and then the call is delivered.

13 Integrating location and service management. The VLR which performs the last registration operation with the HLR will become the anchor in an anchor area. Within an anchor area, we use a local anchor to maintain a location management database to keep track of the location of the MU within the anchor area. Anchor area may cover a large geographic area spanning several VLRs, when an MU crosses a VLR boundary, it may still be in the anchor area. Advantage: A location update operation within the anchor area is only processed by the anchor without going to the HLR database, thus reducing the communication cost for update operations.

14 Integrating location and service management. Service handoff: Migrates the service proxy and involves two operations an address-change operation to inform all application servers of the location change a service context transfer A service handoff occurs when a location handoff occurs as a location boundary area is crossed by the MU. A location handoff and a service handoff would occur when the MU crosses an anchor boundary in the integrated scheme.

15 Integrated Location and Service Management Schemes Centralized Fully Distributed Dynamic Anchor Static Anchor

16 Parameters

17 Parameters (Cont d)

18 Parameters (Cont d)

19 Centralized Scheme Service proxy and HLR centralized and colocated MU moves across a VLR boundary => location update operation to the HLR/proxy Call placed by MU => search operation at the HLR/proxy database MU requests service =>send request to the server through the service proxy => high communication cost Server replies to MU request => send reply to the MU through the service proxy => high communication cost Cupdate = T; Csearch = T; Cservice = T + T; CTotal = T*σ + T *λ + 2T * γ

20 Fully Distributed Scheme MU moves into a new VLR => location and service handoffs The location handoff location update operation to the HLR and proxy (same as in the centralized scheme) service proxy migrated to new VLR HLR and Server updates with new location The search request HLR database is accessed to know current VLR MU found within current VLR Cupdate = T + Mcs * τ3 + NsT Csearch = T Cservice = T Ctotal = (T + Mcs * τ3 + NsT)*σ + T *λ + T * γ

21 Dynamic Anchor Scheme Location Update If (this is an anchor boundary crossing movement) A location update message is sent to the HLR through the new VLR The service context is moved to the new VLR who now serves as the new anchor A location update message is sent to all application Servers Else The new VLR sends location update message to the anchor

22 Dynamic Anchor Scheme (Cont d) Call Delivery If (the local anchor is the current serving VLR) The anchor sends a response to the HLR that the MU is found Else The local anchor forwards the request to the current serving VLR The current VLR sends a location response to the HLR The HLR updates its record such that the current VLR becomes the new anchor The service context is moved to the current VLR (who is the new anchor) A location update message is sent to all application servers

23 Dynamic Anchor Scheme (Cont d) Service Request If (the current VLR is the local anchor) The request is sent to the server and then a response is sent back to the MU Else The current VLR forwards the request to the anchor The anchor forwards the service request/response to the server/mu

24 Dynamic Anchor Scheme (Cont d)

25 Dynamic Anchor Scheme (Cont d) Call delivery Call arrives and Cs is filled with a token If mark(flag) > 0 ServNonCvdC is enabled and current VLR is not same as anchor VLR HLR is queried to locate the anchor; anchor queries the current serving VLR and MU s location is returned Anchor is moved to current VLR If mark(flag)=0 ServCvdC is enabled and current VLR is same as anchor VLR HLR is queried to locate the anchor; anchor returns the MU s location immediately

26 Dynamic Anchor Scheme (Cont d) Location update When MU moves, token is placed in Ms If movement is intra-anchor with probability InA ServInM is enabled and a local anchor update is performed mark(flag) > 0 indicating current VLR!= anchor VLR If movement is inter-anchor with probability OutA ServOutM is enabled and the HLR is updated with current VLR (new anchor) service context is transferred from old anchor to new anchor and, application servers are updated with new address of proxy mark(flag) = 0 indicating current VLR = anchor VLR

27 Dynamic Anchor Scheme (Cont d) Service request MU sends a service request and token is placed in Ss If mark(flag) > 0 ServNonCvdS is enabled and current VLR is not anchor VLR. Request is sent to service proxy colocated with local anchor to forward to server Service proxy is co-located with anchor, so no extra cost to obtain MU s current location C If mark(flag) = 0 ServNonCvdS = T +τ 1 ServCvdS is enabled and current VLR is the anchor VLR Service proxy is co-located with anchor VLR C ServCvdS = T

28 Dynamic Anchor Scheme (Cont d) System costs Expected search cost C da search = N i= 1 P i C da i, call Expected location update cost C da update i= 1 Expected service request cost = N P C i da i, update C da service = N i= 1 P i C da i, service

29 Dynamic Anchor Scheme (Cont d)

30 Static Anchor Scheme Same as the Dynamic Anchor scheme except that the anchor will remain at a fixed location as long as the MU stays in the same anchor area. The anchor moves only when the MU moves across an anchor boundary

31 Static Anchor Scheme (Cont d)

32 Static Anchor Scheme (Cont d) Anchor is fixed in an anchor area until the MU departs from that area Call delivery Cost from the HLR to the anchor (T) + anchor to the current VLR ( τ1 ) C ServC = T +τ 1 Location update If movement is intra-anchor with probability InA ServInM is enabled and a local anchor update is performed C ServInM = τ 1 If movement is inter-anchor with probability OutA ServOutM is enabled and HLR is updated with new anchor information Service context is transferred from old to new anchor Application servers are informed of the new anchor CServInM = T + M cs *τ 2 + N T s

33 Static Anchor Scheme (Cont d) Service request MU sends a service request and a token in placed in Ss ServS is enabled and service request is routed from the MU, to the proxy co-located with the anchor VLR and to the server C ServS = T +τ 1

34 Static Anchor Scheme (Cont d)

35 Performance Evaluation - Parameterization Where Cvl: Cost of transmitting a message (round trip) between a VLR and its LSTP. Clr: Cost of transmitting a message (round trip) between an LSTP and its RSTP. Cpstn: Communication cost (round trip) to pass through a PSTN. The communication between a VLR and the HLR will traverse through a VLR-LSTP-RSTP-PSTN path sequence.

36 Performance Evaluation Cost rate under different CMR and SMR values.

37 Performance Evaluation Cost rate under different Call to Mobility Ratio (CMR) values

38 Performance Evaluation Cost rate under different Service to Mobility Ratio (SMR) values

39 Performance Evaluation Cost rate under different context transfer cost values

40 Performance Evaluation Integrated versus decoupled location and service management: best cost rate under different SMR values.

41 Performance Evaluation Cost rate under different SMR values.

42 Conclusion The dynamic anchor scheme performs the best in most conditions except when the context transfer cost is high (when the server is heavy). The centralized scheme performs the best at low SMR and high CMR. The fully distributed scheme performs the best at high SMR and high CMR. The static anchor scheme is a relatively stable scheme, performing reasonably well under a wide range of parameter values examined in the paper. Different users with vastly different mobility patterns should adopt different integrated location and service management methods to optimize system performance.

43 Thank You

On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems

On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems Ing-Ray Chen, Baoshan Gu and Sheng-Tzong Cheng Abstract We investigate the notion of per-user

More information

Lecture 1: Mobility Management in Mobile Wireless Systems. Ing-Ray Chen. CS 6204 Mobile Computing Virginia Tech. Mobility Management

Lecture 1: Mobility Management in Mobile Wireless Systems. Ing-Ray Chen. CS 6204 Mobile Computing Virginia Tech. Mobility Management Lecture 1: Mobility Management in Mobile Wireless Systems Ing-Ray Chen CS 6204 Mobile Computing Virginia Tech Mobility Management Location o Management age e Search: find a mobile user s current location

More information

Keywords: mobility, registration, updation, history, pattern, CMR, packet delivery.

Keywords: mobility, registration, updation, history, pattern, CMR, packet delivery. Volume 5, Issue 9, September 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Appraisal

More information

Mobility Management usually includes two parts: location management and handoff management.

Mobility Management usually includes two parts: location management and handoff management. Part 9: Mobile Data / Mobility Management I. Mobile Data Services/ Management This broad area involves a lot of industrial applications. Mobile data services/ management is becoming another profitable

More information

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)

More information

GSM System Architecture

GSM System Architecture Intersystem Operation and Mobility Management David Tipper Associate Professor Graduate Program in Telecommunications and Networking University it of Pittsburgh Telcom 2700 Slides 6 http://www.tele.pitt.edu/tipper.html

More information

Global System for Mobile Communication Technology

Global System for Mobile Communication Technology Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special

More information

A Study of Application Recovery in Mobile Environment Using Log Management Scheme

A Study of Application Recovery in Mobile Environment Using Log Management Scheme A Study of Application Recovery in Mobile Environment Using Log Management Scheme A.Ashok, Harikrishnan.N, Thangavelu.V, ashokannadurai@gmail.com, hariever4it@gmail.com,thangavelc@gmail.com, Bit Campus,

More information

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling Administrivia No lecture on Thurs. Last work will be out this week (not due, covers wireless) Extra office hours for next week and the week after. Channel Partitioning, Random Access and Scheduling Channel

More information

Cellular Technology Sections 6.4 & 6.7

Cellular Technology Sections 6.4 & 6.7 Overview Cellular Technology Sections 6. & 6.7 CSC 9 December, 0 Cellular architecture evolution Cellular telephony and internet terminology Mobility for cellular mobiles 6- Components of cellular architecture

More information

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push

More information

Mobile SCTP Transport Layer Mobility Management for the Internet

Mobile SCTP Transport Layer Mobility Management for the Internet Mobile SCTP Transport Layer Mobility Management for the Maximilian Riegel Siemens AG, Munich, Germany E-mail: maximilian.riegel@icn.siemens.de Dr. Michael Tüxen Siemens AG, Munich, Germany E-mail: michael.tuexen@icn.siemens.de

More information

802.11: Mobility Within Same Subnet

802.11: Mobility Within Same Subnet What is Mobility? Spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same AP mobile user, (dis) connecting from using DHCP mobile user, passing through multiple

More information

Chapter 10 VoIP for the Non-All-IP Mobile Networks

Chapter 10 VoIP for the Non-All-IP Mobile Networks Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256

More information

Advanced SIP Series: SIP and 3GPP Operations

Advanced SIP Series: SIP and 3GPP Operations Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.

More information

Toolkit for vulnerability assessment in 3G networks. Kameswari Kotapati The Pennsylvania State University University Park PA 16802

Toolkit for vulnerability assessment in 3G networks. Kameswari Kotapati The Pennsylvania State University University Park PA 16802 Toolkit for vulnerability assessment in 3G networks Kameswari Kotapati The Pennsylvania State University University Park PA 16802 Contents Motivation Solution Overview Methodology Overview 3G Attack Graph

More information

Wireless and Mobile Network Architecture

Wireless and Mobile Network Architecture Wireless and Mobile Network Architecture Chapter 13: VoIP Service for Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Dec. 2006

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Wireless and Mobile Network Architecture

Wireless and Mobile Network Architecture Wireless and Mobile Network Architecture Chapter 7: GSM Network Signaling Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Nov. 2006 1 Outline

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Mobile Networking. SS7 Network Architecture. Purpose. Mobile Network Signaling

Mobile Networking. SS7 Network Architecture. Purpose. Mobile Network Signaling Purpose The purpose of this white paper is to inform the reader about mobile networking technology. For further information, see. Mobile Network Signaling Telecommunications signaling is the transmission

More information

1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS

1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS Implementing roaming for OpenBTS 1 Introduction One of the main advantages of OpenBTS TM system architecture is absence of a legacy GSM core network. SIP is used for registering, call control and messaging.

More information

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated 3GPP2 Workshop, Boston, MA Title: Source: Contact: Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated Jen M. Chen QUALCOMM Incorporated 858-658-2543

More information

Log Management Support for Recovery in Mobile Computing Environment

Log Management Support for Recovery in Mobile Computing Environment Log Management Support for Recovery in Mobile Computing Environment J.C. Miraclin Joyce Pamila, Senior Lecturer, CSE & IT Dept, Government College of Technology, Coimbatore, India. miraclin_2000@yahoo.com

More information

GSM - Global System for Mobile Communications

GSM - Global System for Mobile Communications GSM - Global System for Mobile Communications VLR BTS BSC GMSC PSTN MS HLR 1) Overview of GSM architecture 2) GSM channel structure 05-1 GSM - Global System for Mobile Communications VLR BTS BSC GMSC PSTN

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

A Scalable Multi-Server Cluster VoIP System

A Scalable Multi-Server Cluster VoIP System A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu mcliang@nuk.edu.tw {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department

More information

Escrow techniques for mobile sales and inventory applications

Escrow techniques for mobile sales and inventory applications Wireless Networks 3 (1997) 235 246 235 Escrow techniques for mobile sales and inventory applications Narayanan Krishnakumar a, and Ravi Jain b a Fidelity Investments, Mail Zone H4A, 82 Devonshire St.,

More information

Key Components of WAN Optimization Controller Functionality

Key Components of WAN Optimization Controller Functionality Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications

More information

COMPARING CALL CONTROL IN MICROSOFT OCS 2007 AND IBM LOTUS SAMETIME UNIFIED TELEPHONY

COMPARING CALL CONTROL IN MICROSOFT OCS 2007 AND IBM LOTUS SAMETIME UNIFIED TELEPHONY SUBSCRIPTION SERVICE May 9, 2008 COMPARING CALL CONTROL IN MICROSOFT OCS 2007 AND IBM LOTUS SAMETIME UNIFIED TELEPHONY COMPANY(S) MENTIONED: IBM, Microsoft, Nortel, Siemens. PRODUCT(S) / SERVICE(S): IBM

More information

GSM GSM 03.07 TECHNICAL November 1996 SPECIFICATION Version 5.0.0

GSM GSM 03.07 TECHNICAL November 1996 SPECIFICATION Version 5.0.0 GSM GSM 03.07 TECHNICAL November 1996 SPECIFICATION Version 5.0.0 Source: ETSI TC-SMG Reference: TS/SMG-030307Q ICS: 33.020 Key words: Digital cellular telecommunications system, Global System for Mobile

More information

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM Lecture overview History of cellular systems (1G) GSM introduction Basic architecture of GSM system Basic radio transmission parameters of GSM Analogue cellular systems 70 s In the early 70 s radio frequencies

More information

Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging

Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Aravind. P, Kalaiarasan.A 2, D. Rajini Girinath 3 PG Student, Dept. of CSE, Anand Institute of Higher Technology,

More information

GSM Architecture Training Document

GSM Architecture Training Document Training Document TC Finland Nokia Networks Oy 1 (20) The information in this document is subject to change without notice and describes only the product defined in the introduction of this documentation.

More information

WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks

WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks K. D. Cho et al., IEEE INFOCOM 2012 Workshop, pp. 316-321, March 2012. January 17, 2013 Byeong-Gi Kim Park Laboratory,

More information

Secure Networking Using Mobile IP

Secure Networking Using Mobile IP Secure Networking Using Mobile IP Alexandros Karakos and Konstantinos Siozios Democritus University of Thrace eepartment of Electrical and Computer Engineering GR-671 00 Xanthi, GREECE Abstract. The increasing

More information

How To Understand The Performance Of A Cell Phone Network

How To Understand The Performance Of A Cell Phone Network Survivability Analysis for Mobile Cellular Networks David W. Tipper *, Chalermpol Charnsripinyo *, Hyundoo Shin * Teresa A. Dahlberg ** * Department of Information Science and Telecommunications, University

More information

Mobile Communications: Satellite Systems

Mobile Communications: Satellite Systems Mobile Communications: Satellite Systems Mobile Communication: Satellite Systems - Jochen Schiller http://www.jochenschiller.de 1 History of satellite communication 1945 Arthur C. Clarke publishes an essay

More information

The GSM and GPRS network T-110.300/301

The GSM and GPRS network T-110.300/301 The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic

More information

Lecture 8a: WWW Proxy Servers and Cookies

Lecture 8a: WWW Proxy Servers and Cookies Internet and Intranet Protocols and Applications Lecture 8a: WWW Proxy Servers and Cookies March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Terminology Origin

More information

Expert Reference Series of White Papers. The Role of Session Manager in Applying Features to Calls via Sequenced Applications, Part 1

Expert Reference Series of White Papers. The Role of Session Manager in Applying Features to Calls via Sequenced Applications, Part 1 Expert Reference Series of White Papers The Role of Session Manager in Applying Features to Calls via Sequenced Applications, Part 1 1-800-COURSES www.globalknowledge.com The Role of Session Manager in

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Central vs. Distributed Systems

Central vs. Distributed Systems By Donald W. Larson dwlarson@mac.com http://www.timeoutofmind.com Systems architecture is the framework in which individual systems are fitted together to create a larger system. The resulting architecture

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

Mobility Management Alternatives for Migration to Mobile Internet Session-Based Services

Mobility Management Alternatives for Migration to Mobile Internet Session-Based Services 1 Mobility Management Alternatives for Migration to Mobile Internet Session-Based Services Kazutaka Murakami 1, Oliver Haase 1, JaeSheung Shin 2, and Thomas F. La Porta 2, 1 Bell Labs Research, Lucent

More information

Smart Routers for Cross-Layer Integrated Mobility and Service Management

Smart Routers for Cross-Layer Integrated Mobility and Service Management Wireless Pers Commun DOI 10.1007/s11277-012-0583-9 Smart Routers for Cross-Layer Integrated Mobility and Service Management in Mobile IPv6 Systems Ding-Chau Wang Weiping He Ing-Ray Chen Springer Science+Business

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

Mobile SMS and Data Roaming Explained

Mobile SMS and Data Roaming Explained Mobile SMS and Data Roaming Explained Mobile SMS and data roaming explained Roaming is the ability of customers to use their mobile phones or other mobile devices outside the geographical coverage area

More information

GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR

GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR Update ( Update Procedure) Network Mobiles Maryland Maryland Other Rockville Bethesda Maryland Mobile Mobile Cell Cell HLR Vienna Cell 12-Jun-14 22:48 (Page 1) This sequence diagram was generated with

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems*

A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* Junho Jang, Saeyoung Han, Sungyong Park, and Jihoon Yang Department of Computer Science and Interdisciplinary Program

More information

Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744. The problem

Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744. The problem Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744 The problem How to support mobile users What do we mean by support? Make it easy and convenient to effectively

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

A network infrastructure for IP mobility support in metropolitan areas

A network infrastructure for IP mobility support in metropolitan areas Computer Networks 38 (2002) 181 206 www.elsevier.com/locate/comnet A network infrastructure for IP mobility support in metropolitan areas Cristina Hristea *, Fouad Tobagi Department of Electrical Engineering,

More information

3GPP TR 23.912 V3.1.0 (2001-12)

3GPP TR 23.912 V3.1.0 (2001-12) TR 23.912 V3.1.0 (2001-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network; Technical report on Super-Charger (Release 1999) The present document

More information

Mobile Communications

Mobile Communications October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path

More information

VIDEOCONFERENCING. Video class

VIDEOCONFERENCING. Video class VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

Replication architecture

Replication architecture Replication INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Roman Vitenberg 1 Replication architecture Client Front end Replica Client Front end Server Replica INF5040, Roman Vitenberg 2 INF 5040

More information

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2) Overview Voice-over over-ip (VoIP) ENUM VoIP Introduction Basic PSTN Concepts and SS7 Old Private Telephony Solutions Internet Telephony and Services VoIP-PSTN Interoperability IP PBX Network Convergence

More information

Information Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340

Information Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340 XIX. Software Architectures Software Architectures UML Packages Client- vs Peer-to-Peer Horizontal Layers and Vertical Partitions 3-Tier and 4-Tier Architectures The Model-View-Controller Architecture

More information

End-2-End QoS Provisioning in UMTS networks

End-2-End QoS Provisioning in UMTS networks End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1

More information

Trace Desktop Workforce / Fleet Management System

Trace Desktop Workforce / Fleet Management System Trace Desktop Workforce / Fleet Management System Introduction TRACE is an extension of SD s Geographical Information System (SPACE) which incorporates a range of GPS tracking devices that enable users

More information

THE UNIVERSITY OF AUCKLAND

THE UNIVERSITY OF AUCKLAND COMPSCI 742 THE UNIVERSITY OF AUCKLAND SECOND SEMESTER, 2008 Campus: City COMPUTER SCIENCE Data Communications and Networks (Time allowed: TWO hours) NOTE: Attempt all questions. Calculators are NOT permitted.

More information

SIP Based Architecture for Integration of 1xRTT Femtocells

SIP Based Architecture for Integration of 1xRTT Femtocells SIP Based Architecture for Integration of 1xRTT Femtocells 2007 Tatara Systems Tatara Systems grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other copyrightable

More information

Adaptive MAP Selection with Load Balancing Mechanism for the Hierarchical Mobile IPv6

Adaptive MAP Selection with Load Balancing Mechanism for the Hierarchical Mobile IPv6 Tamkang Journal of Science and Engineering, Vol. 12, No. 4, pp. 481 487 (2009) 481 Adaptive MAP Selection with Load Balancing Mechanism for the Hierarchical Mobile IPv6 Ying-Hong Wang, Chih-Peng Hsu* and

More information

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol CS640: Introduction to Computer Networks Aditya Akella Lecture 4 - Application Protocols, Performance Applications FTP: The File Transfer Protocol user at host FTP FTP user client interface local file

More information

SIP : Session Initiation Protocol

SIP : Session Initiation Protocol : Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification

More information

A distributed system is defined as

A distributed system is defined as A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency

More information

Mobility Management in Wireless Mesh Networks Utilizing Location Routing and Pointer Forwarding

Mobility Management in Wireless Mesh Networks Utilizing Location Routing and Pointer Forwarding 1 Mobility Management in Wireless Mesh Networks Utilizing Location Routing and Pointer Forwarding Yinan Li, Ing-Ray Chen, Member, IEEE Abstract We propose and analyze LMMesh: a routing-based location management

More information

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction

More information

Web Caching and CDNs. Aditya Akella

Web Caching and CDNs. Aditya Akella Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion

More information

INFORMATION FOR OBSERVERS. Transaction Costs Deducted from Equity (Agenda Paper 6C)

INFORMATION FOR OBSERVERS. Transaction Costs Deducted from Equity (Agenda Paper 6C) 30 Cannon Street, London EC4M 6XH, United Kingdom Tel: +44 (0)20 7246 6410 Fax: +44 (0)20 7246 6411 E-mail: iasb@iasb.org Website: www.iasb.org International Accounting Standards Board This observer note

More information

How To Test The Performance Of A Gsm/ Network On A Cell Phone On A Pnet 2.5 (Gsm) On A Sim Sim (Gms) On An Ipn 2.2 (Ipnet) On The Ipnet

How To Test The Performance Of A Gsm/ Network On A Cell Phone On A Pnet 2.5 (Gsm) On A Sim Sim (Gms) On An Ipn 2.2 (Ipnet) On The Ipnet Interworking Internet Telephony and Wireless Telecommunications Networks Jonathan Lennox lennox@bell-labs.com Kazutaka Murakami kmurakami@belllabs.com Thomas F. La Porta tlp@bell-labs.com Bell Laboratories

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

How To Send An Msc To A Cell Phone From A Corporate Server In Ntokdomo (Ntimo) (Ntok) (Ntokdomo) (For A Ppl) ( For A Pn)

How To Send An Msc To A Cell Phone From A Corporate Server In Ntokdomo (Ntimo) (Ntok) (Ntokdomo) (For A Ppl) ( For A Pn) Corporate Solutions SMS Communications Module SMS Center Push Service Infrastructure for Enterprise Solutions There has been increasing need recently for new functionality in enterprise solutions, such

More information

Locality Based Protocol for MultiWriter Replication systems

Locality Based Protocol for MultiWriter Replication systems Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin lgao@cs.utexas.edu One of the challenging problems in building replication

More information

Internet Concepts. What is a Network?

Internet Concepts. What is a Network? Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,

More information

Communications and Networking

Communications and Networking Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

Chapter 2 PSTN and VoIP Services Context

Chapter 2 PSTN and VoIP Services Context Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using

More information

Payment authorization Payment capture Table 1.3 SET Transaction Types

Payment authorization Payment capture Table 1.3 SET Transaction Types Table 1.3 lists the transaction types supported by SET. In what follows we look in some detail at the following transactions: Purchase request Payment authorization Payment capture Cardholder registration

More information

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS

More information

Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at

Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How

More information

Voice over IP Probe! for Network Operators and! Internet Service Providers

Voice over IP Probe! for Network Operators and! Internet Service Providers Voice over IP Probe! for Network Operators and! Internet Service Providers Product Presentation September 2011 2011 ADVENAGE GmbH Agenda Voice over IP Probe Key Facts VoIP Probe in a Nutshell Use Cases

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number

More information

Modeling Workflow Patterns

Modeling Workflow Patterns Modeling Workflow Patterns Bizagi Suite Workflow Patterns 1 Table of Contents Modeling workflow patterns... 4 Implementing the patterns... 4 Basic control flow patterns... 4 WCP 1- Sequence... 4 WCP 2-

More information

THE DEFINITIVE GUIDE TO PASSENGER INFORMATION SYSTEMS

THE DEFINITIVE GUIDE TO PASSENGER INFORMATION SYSTEMS WHITEPAPER THE DEFINITIVE GUIDE TO PASSENGER INFORMATION SYSTEMS Passenger information systems come in many different forms. They are comprised of direct methods of communication, such as websites and

More information

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

SERVICE DISCOVERY AND MOBILITY MANAGEMENT Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)

More information

EE6390. Fall 1999. Research Report. Mobile IP in General Packet Radio System

EE6390. Fall 1999. Research Report. Mobile IP in General Packet Radio System EE6390 Introduction to Wireless Communications Systems Fall 1999 Research Report Mobile IP in General Packet Radio System Kelvin K. W. Wong Ramzi Hamati Date: Dec. 6, 1999 1.0 Abstract Tunneling is one

More information

AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING

AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING Gurpreet Singh M.Phil Research Scholar, Computer Science Dept. Punjabi University, Patiala gurpreet.msa@gmail.com Abstract: Cloud Computing

More information

Software Life-Cycle Management

Software Life-Cycle Management Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema

More information

Software Design Specification

Software Design Specification 16 Software Design Specification of Alahamora p2p Network and Tool Software Design Specification Version 1.0.0 Project Title Team Title : Alahamora p2p Network and Tool : Alahamora Team Guide (KreSIT)

More information

Penetrating into Mobile Market

Penetrating into Mobile Market Penetrating into Mobile Market A Strategic Proposal James Ni O8/21/2008 Some Facts Wireline Network subscriber population is shrinking Mobile Network will replace Wireline Network Mobile phone is convenience,

More information

Fixed versus Mobile Turning Convergence into Reality. Dieter Schuler, Wouter Franx Lucent Technologies

Fixed versus Mobile Turning Convergence into Reality. Dieter Schuler, Wouter Franx Lucent Technologies Fixed versus Mobile Turning Convergence into Reality Dieter Schuler, Wouter Franx Lucent Technologies Agenda Fixed Mobile Convergence Service Definition Operator Challenges IP Multimedia Subsystem the

More information

VoIP Market India July 2014

VoIP Market India July 2014 VoIP Market India July 2014 Executive Summary Market Overview The Indian VoIP market is currently valued at INR x1 mn and is expected to attain a CAGR of x2% to reach INR x3 mn by 20-- Mobile VoIP market

More information

An Examination of the Firewall/NAT Problem, Traversal Methods, and Their Pros and Cons

An Examination of the Firewall/NAT Problem, Traversal Methods, and Their Pros and Cons TRAVERSING FIREWALLS AND NATS WITH VOICE AND VIDEO OVER IP An Examination of the Firewall/NAT Problem, Traversal Methods, and Their Pros and Cons Traversing Firewalls and NATs With Voice and Video Over

More information

CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT

CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 81 CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 5.1 INTRODUCTION Distributed Web servers on the Internet require high scalability and availability to provide efficient services to

More information

Cost Analysis of NEMO Protocol Entities

Cost Analysis of NEMO Protocol Entities Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science, University of Oklahoma, Norman, OK 73019. Email: {shohrab, atiq}@ou.edu William Ivancic NASA

More information