On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems
|
|
|
- Annabelle Gibbs
- 10 years ago
- Views:
Transcription
1 On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems Ing-Ray Chen, Baoshan Gu, and Sheng-Tzong Cheng Presented by: Iman Saleh Hardik Patel
2 Agenda Introduction Problem Specification System Model Integrated Location and Service Management Schemes Cost Models Performance Evaluations Conclusion
3 Introduction Personal Communications Service (PCS) provides a wide range of information services, such as personal banking service, personalized stock market information, location dependent travel information, etc. for which a mobile user (MU) sends requests to a server and the server sends replies to the mobile user. Constraints: User is not static How to tackle problem of personal mobility of MU in PCS. Suggestions: Create per-user service proxy for each mobile user to tackle the problem of personal mobility. Objective: Reduce communication cost for service.
4 Personal Communications Service (PCS) Servers Stock Market Weather Info Requests Replies
5 Approaches to tackle problem of PCS The service proxy Performs tasks such as tracking locations of the MU Maintaining service context information for the service engaged Accepting service requests from the MU Transforming requests into proper formats and Forwarding server replies to the MU. The personal proxy: Explicitly tracks the MU location Eliminates the overhead for the server application to first check with the underlying location management system to know the current MU location before data delivery.
6 Cont d Shortcomings: Since all client-server communications must go through the personal proxy, if the personal proxy is static in location, it is likely that inefficient server-proxy-mu triangle routes may be used for data delivery, resulting in high communication costs. If the proxy is mobile to stay closer to the MU, extra network costs will be incurred to inform the server applications of the address change whenever the proxy changes its location.
7 Alternative: Divided the problem in two sets: Location Management: the most popular scheme in PCS networks is the basic Home Location Register/Visitor Location Register (HLR/VLR) Each MU has an HLR. Whenever an MU enters a VLR, the system updates its HLR location database so that, when a call arrives, the HLR location database knows exactly which VLR contains the MU. Service management: Allows an MU to maintain ongoing connections while roaming among different VLRs and enables the MU to inform its HLR. The proxy used to forward messages to an MU must explicitly track the location of the MU. The extra communication costs are incurred to notify the proxy when the MU moves across a location registration area boundary
8 Problem Specification Investigate the notion of integrated location and service management for minimizing network cost without making the assumption of fully replicated servers in VLRs in the PCS network. Investigate and identify the best integrated location and service management scheme that can be applied on an individual user basis to minimize the overall cost incurred to the PCS network per time unit for servicing location and service operations of all users.
9 Approach to the solution & Key concepts Use a per-user service proxy as a gateway between the MU and all client-server applications engaged by the MU concurrently. The proxy keeps track of service context information such as the current state of the execution for maintaining service continuity. We always co-locate the MU s service proxy with the MU s location database that stores the current location of the MU, so that the service proxy knows the current location of the MU all the time. Location handoff: Whenever the MU moves across a registration area boundary, a location handoff occurs for the location management system to update the location database. Service handoff: Updating the service proxy when location handoff occurs.
10 PCS Signaling Network Architecture
11 PCS system: Challenge Managing services in roaming environment Server HLR VLR VLR VLR How to find new VLR? Overhead by VLR in contacting HLR!!
12 Basic HLR/VLR scheme A mobile user is permanently registered under a location register HLR. When the mobile user enters a new VLR area, it reports to the new VLR, which, in turn, informs the HLR by means of a location update operation. When a call is placed, the system first searches the MU s current location through the HLR and then the call is delivered.
13 Integrating location and service management. The VLR which performs the last registration operation with the HLR will become the anchor in an anchor area. Within an anchor area, we use a local anchor to maintain a location management database to keep track of the location of the MU within the anchor area. Anchor area may cover a large geographic area spanning several VLRs, when an MU crosses a VLR boundary, it may still be in the anchor area. Advantage: A location update operation within the anchor area is only processed by the anchor without going to the HLR database, thus reducing the communication cost for update operations.
14 Integrating location and service management. Service handoff: Migrates the service proxy and involves two operations an address-change operation to inform all application servers of the location change a service context transfer A service handoff occurs when a location handoff occurs as a location boundary area is crossed by the MU. A location handoff and a service handoff would occur when the MU crosses an anchor boundary in the integrated scheme.
15 Integrated Location and Service Management Schemes Centralized Fully Distributed Dynamic Anchor Static Anchor
16 Parameters
17 Parameters (Cont d)
18 Parameters (Cont d)
19 Centralized Scheme Service proxy and HLR centralized and colocated MU moves across a VLR boundary => location update operation to the HLR/proxy Call placed by MU => search operation at the HLR/proxy database MU requests service =>send request to the server through the service proxy => high communication cost Server replies to MU request => send reply to the MU through the service proxy => high communication cost Cupdate = T; Csearch = T; Cservice = T + T; CTotal = T*σ + T *λ + 2T * γ
20 Fully Distributed Scheme MU moves into a new VLR => location and service handoffs The location handoff location update operation to the HLR and proxy (same as in the centralized scheme) service proxy migrated to new VLR HLR and Server updates with new location The search request HLR database is accessed to know current VLR MU found within current VLR Cupdate = T + Mcs * τ3 + NsT Csearch = T Cservice = T Ctotal = (T + Mcs * τ3 + NsT)*σ + T *λ + T * γ
21 Dynamic Anchor Scheme Location Update If (this is an anchor boundary crossing movement) A location update message is sent to the HLR through the new VLR The service context is moved to the new VLR who now serves as the new anchor A location update message is sent to all application Servers Else The new VLR sends location update message to the anchor
22 Dynamic Anchor Scheme (Cont d) Call Delivery If (the local anchor is the current serving VLR) The anchor sends a response to the HLR that the MU is found Else The local anchor forwards the request to the current serving VLR The current VLR sends a location response to the HLR The HLR updates its record such that the current VLR becomes the new anchor The service context is moved to the current VLR (who is the new anchor) A location update message is sent to all application servers
23 Dynamic Anchor Scheme (Cont d) Service Request If (the current VLR is the local anchor) The request is sent to the server and then a response is sent back to the MU Else The current VLR forwards the request to the anchor The anchor forwards the service request/response to the server/mu
24 Dynamic Anchor Scheme (Cont d)
25 Dynamic Anchor Scheme (Cont d) Call delivery Call arrives and Cs is filled with a token If mark(flag) > 0 ServNonCvdC is enabled and current VLR is not same as anchor VLR HLR is queried to locate the anchor; anchor queries the current serving VLR and MU s location is returned Anchor is moved to current VLR If mark(flag)=0 ServCvdC is enabled and current VLR is same as anchor VLR HLR is queried to locate the anchor; anchor returns the MU s location immediately
26 Dynamic Anchor Scheme (Cont d) Location update When MU moves, token is placed in Ms If movement is intra-anchor with probability InA ServInM is enabled and a local anchor update is performed mark(flag) > 0 indicating current VLR!= anchor VLR If movement is inter-anchor with probability OutA ServOutM is enabled and the HLR is updated with current VLR (new anchor) service context is transferred from old anchor to new anchor and, application servers are updated with new address of proxy mark(flag) = 0 indicating current VLR = anchor VLR
27 Dynamic Anchor Scheme (Cont d) Service request MU sends a service request and token is placed in Ss If mark(flag) > 0 ServNonCvdS is enabled and current VLR is not anchor VLR. Request is sent to service proxy colocated with local anchor to forward to server Service proxy is co-located with anchor, so no extra cost to obtain MU s current location C If mark(flag) = 0 ServNonCvdS = T +τ 1 ServCvdS is enabled and current VLR is the anchor VLR Service proxy is co-located with anchor VLR C ServCvdS = T
28 Dynamic Anchor Scheme (Cont d) System costs Expected search cost C da search = N i= 1 P i C da i, call Expected location update cost C da update i= 1 Expected service request cost = N P C i da i, update C da service = N i= 1 P i C da i, service
29 Dynamic Anchor Scheme (Cont d)
30 Static Anchor Scheme Same as the Dynamic Anchor scheme except that the anchor will remain at a fixed location as long as the MU stays in the same anchor area. The anchor moves only when the MU moves across an anchor boundary
31 Static Anchor Scheme (Cont d)
32 Static Anchor Scheme (Cont d) Anchor is fixed in an anchor area until the MU departs from that area Call delivery Cost from the HLR to the anchor (T) + anchor to the current VLR ( τ1 ) C ServC = T +τ 1 Location update If movement is intra-anchor with probability InA ServInM is enabled and a local anchor update is performed C ServInM = τ 1 If movement is inter-anchor with probability OutA ServOutM is enabled and HLR is updated with new anchor information Service context is transferred from old to new anchor Application servers are informed of the new anchor CServInM = T + M cs *τ 2 + N T s
33 Static Anchor Scheme (Cont d) Service request MU sends a service request and a token in placed in Ss ServS is enabled and service request is routed from the MU, to the proxy co-located with the anchor VLR and to the server C ServS = T +τ 1
34 Static Anchor Scheme (Cont d)
35 Performance Evaluation - Parameterization Where Cvl: Cost of transmitting a message (round trip) between a VLR and its LSTP. Clr: Cost of transmitting a message (round trip) between an LSTP and its RSTP. Cpstn: Communication cost (round trip) to pass through a PSTN. The communication between a VLR and the HLR will traverse through a VLR-LSTP-RSTP-PSTN path sequence.
36 Performance Evaluation Cost rate under different CMR and SMR values.
37 Performance Evaluation Cost rate under different Call to Mobility Ratio (CMR) values
38 Performance Evaluation Cost rate under different Service to Mobility Ratio (SMR) values
39 Performance Evaluation Cost rate under different context transfer cost values
40 Performance Evaluation Integrated versus decoupled location and service management: best cost rate under different SMR values.
41 Performance Evaluation Cost rate under different SMR values.
42 Conclusion The dynamic anchor scheme performs the best in most conditions except when the context transfer cost is high (when the server is heavy). The centralized scheme performs the best at low SMR and high CMR. The fully distributed scheme performs the best at high SMR and high CMR. The static anchor scheme is a relatively stable scheme, performing reasonably well under a wide range of parameter values examined in the paper. Different users with vastly different mobility patterns should adopt different integrated location and service management methods to optimize system performance.
43 Thank You
On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems
On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems Ing-Ray Chen, Baoshan Gu and Sheng-Tzong Cheng Abstract We investigate the notion of per-user
Lecture 1: Mobility Management in Mobile Wireless Systems. Ing-Ray Chen. CS 6204 Mobile Computing Virginia Tech. Mobility Management
Lecture 1: Mobility Management in Mobile Wireless Systems Ing-Ray Chen CS 6204 Mobile Computing Virginia Tech Mobility Management Location o Management age e Search: find a mobile user s current location
Mobility Management usually includes two parts: location management and handoff management.
Part 9: Mobile Data / Mobility Management I. Mobile Data Services/ Management This broad area involves a lot of industrial applications. Mobile data services/ management is becoming another profitable
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)
GSM System Architecture
Intersystem Operation and Mobility Management David Tipper Associate Professor Graduate Program in Telecommunications and Networking University it of Pittsburgh Telcom 2700 Slides 6 http://www.tele.pitt.edu/tipper.html
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
A Study of Application Recovery in Mobile Environment Using Log Management Scheme
A Study of Application Recovery in Mobile Environment Using Log Management Scheme A.Ashok, Harikrishnan.N, Thangavelu.V, [email protected], [email protected],[email protected], Bit Campus,
Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling
Administrivia No lecture on Thurs. Last work will be out this week (not due, covers wireless) Extra office hours for next week and the week after. Channel Partitioning, Random Access and Scheduling Channel
Cellular Technology Sections 6.4 & 6.7
Overview Cellular Technology Sections 6. & 6.7 CSC 9 December, 0 Cellular architecture evolution Cellular telephony and internet terminology Mobility for cellular mobiles 6- Components of cellular architecture
Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University
Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push
Mobile SCTP Transport Layer Mobility Management for the Internet
Mobile SCTP Transport Layer Mobility Management for the Maximilian Riegel Siemens AG, Munich, Germany E-mail: [email protected] Dr. Michael Tüxen Siemens AG, Munich, Germany E-mail: [email protected]
802.11: Mobility Within Same Subnet
What is Mobility? Spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same AP mobile user, (dis) connecting from using DHCP mobile user, passing through multiple
Chapter 10 VoIP for the Non-All-IP Mobile Networks
Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256
Advanced SIP Series: SIP and 3GPP Operations
Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.
Toolkit for vulnerability assessment in 3G networks. Kameswari Kotapati The Pennsylvania State University University Park PA 16802
Toolkit for vulnerability assessment in 3G networks Kameswari Kotapati The Pennsylvania State University University Park PA 16802 Contents Motivation Solution Overview Methodology Overview 3G Attack Graph
Wireless and Mobile Network Architecture
Wireless and Mobile Network Architecture Chapter 13: VoIP Service for Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Dec. 2006
Module 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
Wireless and Mobile Network Architecture
Wireless and Mobile Network Architecture Chapter 7: GSM Network Signaling Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Nov. 2006 1 Outline
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
Chapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
Mobile Networking. SS7 Network Architecture. Purpose. Mobile Network Signaling
Purpose The purpose of this white paper is to inform the reader about mobile networking technology. For further information, see. Mobile Network Signaling Telecommunications signaling is the transmission
1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS
Implementing roaming for OpenBTS 1 Introduction One of the main advantages of OpenBTS TM system architecture is absence of a legacy GSM core network. SIP is used for registering, call control and messaging.
Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated
3GPP2 Workshop, Boston, MA Title: Source: Contact: Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated Jen M. Chen QUALCOMM Incorporated 858-658-2543
Log Management Support for Recovery in Mobile Computing Environment
Log Management Support for Recovery in Mobile Computing Environment J.C. Miraclin Joyce Pamila, Senior Lecturer, CSE & IT Dept, Government College of Technology, Coimbatore, India. [email protected]
GSM - Global System for Mobile Communications
GSM - Global System for Mobile Communications VLR BTS BSC GMSC PSTN MS HLR 1) Overview of GSM architecture 2) GSM channel structure 05-1 GSM - Global System for Mobile Communications VLR BTS BSC GMSC PSTN
Chapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
CS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
A Scalable Multi-Server Cluster VoIP System
A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu [email protected] {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department
Escrow techniques for mobile sales and inventory applications
Wireless Networks 3 (1997) 235 246 235 Escrow techniques for mobile sales and inventory applications Narayanan Krishnakumar a, and Ravi Jain b a Fidelity Investments, Mail Zone H4A, 82 Devonshire St.,
Key Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM
Lecture overview History of cellular systems (1G) GSM introduction Basic architecture of GSM system Basic radio transmission parameters of GSM Analogue cellular systems 70 s In the early 70 s radio frequencies
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Aravind. P, Kalaiarasan.A 2, D. Rajini Girinath 3 PG Student, Dept. of CSE, Anand Institute of Higher Technology,
GSM Architecture Training Document
Training Document TC Finland Nokia Networks Oy 1 (20) The information in this document is subject to change without notice and describes only the product defined in the introduction of this documentation.
WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks
WAVE: Popularity-based and Collaborative In-network Caching for Content-Oriented Networks K. D. Cho et al., IEEE INFOCOM 2012 Workshop, pp. 316-321, March 2012. January 17, 2013 Byeong-Gi Kim Park Laboratory,
How To Understand The Performance Of A Cell Phone Network
Survivability Analysis for Mobile Cellular Networks David W. Tipper *, Chalermpol Charnsripinyo *, Hyundoo Shin * Teresa A. Dahlberg ** * Department of Information Science and Telecommunications, University
Mobile Communications: Satellite Systems
Mobile Communications: Satellite Systems Mobile Communication: Satellite Systems - Jochen Schiller http://www.jochenschiller.de 1 History of satellite communication 1945 Arthur C. Clarke publishes an essay
The GSM and GPRS network T-110.300/301
The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic
Lecture 8a: WWW Proxy Servers and Cookies
Internet and Intranet Protocols and Applications Lecture 8a: WWW Proxy Servers and Cookies March, 2004 Arthur Goldberg Computer Science Department New York University [email protected] Terminology Origin
Expert Reference Series of White Papers. The Role of Session Manager in Applying Features to Calls via Sequenced Applications, Part 1
Expert Reference Series of White Papers The Role of Session Manager in Applying Features to Calls via Sequenced Applications, Part 1 1-800-COURSES www.globalknowledge.com The Role of Session Manager in
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
Agenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
Mobile SMS and Data Roaming Explained
Mobile SMS and Data Roaming Explained Mobile SMS and data roaming explained Roaming is the ability of customers to use their mobile phones or other mobile devices outside the geographical coverage area
GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR
Update ( Update Procedure) Network Mobiles Maryland Maryland Other Rockville Bethesda Maryland Mobile Mobile Cell Cell HLR Vienna Cell 12-Jun-14 22:48 (Page 1) This sequence diagram was generated with
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems*
A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* Junho Jang, Saeyoung Han, Sungyong Park, and Jihoon Yang Department of Computer Science and Interdisciplinary Program
A Scheme for Implementing Load Balancing of Web Server
Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public
3GPP TR 23.912 V3.1.0 (2001-12)
TR 23.912 V3.1.0 (2001-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network; Technical report on Super-Charger (Release 1999) The present document
Mobile Communications
October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path
VIDEOCONFERENCING. Video class
VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)
Overview Voice-over over-ip (VoIP) ENUM VoIP Introduction Basic PSTN Concepts and SS7 Old Private Telephony Solutions Internet Telephony and Services VoIP-PSTN Interoperability IP PBX Network Convergence
Information Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340
XIX. Software Architectures Software Architectures UML Packages Client- vs Peer-to-Peer Horizontal Layers and Vertical Partitions 3-Tier and 4-Tier Architectures The Model-View-Controller Architecture
End-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
Trace Desktop Workforce / Fleet Management System
Trace Desktop Workforce / Fleet Management System Introduction TRACE is an extension of SD s Geographical Information System (SPACE) which incorporates a range of GPS tracking devices that enable users
THE UNIVERSITY OF AUCKLAND
COMPSCI 742 THE UNIVERSITY OF AUCKLAND SECOND SEMESTER, 2008 Campus: City COMPUTER SCIENCE Data Communications and Networks (Time allowed: TWO hours) NOTE: Attempt all questions. Calculators are NOT permitted.
SIP Based Architecture for Integration of 1xRTT Femtocells
SIP Based Architecture for Integration of 1xRTT Femtocells 2007 Tatara Systems Tatara Systems grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other copyrightable
CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 4 - Application Protocols, Performance Applications FTP: The File Transfer Protocol user at host FTP FTP user client interface local file
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
A distributed system is defined as
A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency
Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study
in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction
Web Caching and CDNs. Aditya Akella
Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion
INFORMATION FOR OBSERVERS. Transaction Costs Deducted from Equity (Agenda Paper 6C)
30 Cannon Street, London EC4M 6XH, United Kingdom Tel: +44 (0)20 7246 6410 Fax: +44 (0)20 7246 6411 E-mail: [email protected] Website: www.iasb.org International Accounting Standards Board This observer note
G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. [email protected]
How To Send An Msc To A Cell Phone From A Corporate Server In Ntokdomo (Ntimo) (Ntok) (Ntokdomo) (For A Ppl) ( For A Pn)
Corporate Solutions SMS Communications Module SMS Center Push Service Infrastructure for Enterprise Solutions There has been increasing need recently for new functionality in enterprise solutions, such
Locality Based Protocol for MultiWriter Replication systems
Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin [email protected] One of the challenging problems in building replication
Internet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
Communications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
Payment authorization Payment capture Table 1.3 SET Transaction Types
Table 1.3 lists the transaction types supported by SET. In what follows we look in some detail at the following transactions: Purchase request Payment authorization Payment capture Cardholder registration
IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at
Lecture 3: Scaling by Load Balancing 1. Comments on reviews i. 2. Topic 1: Scalability a. QUESTION: What are problems? i. These papers look at distributing load b. QUESTION: What is the context? i. How
Voice over IP Probe! for Network Operators and! Internet Service Providers
Voice over IP Probe! for Network Operators and! Internet Service Providers Product Presentation September 2011 2011 ADVENAGE GmbH Agenda Voice over IP Probe Key Facts VoIP Probe in a Nutshell Use Cases
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
Modeling Workflow Patterns
Modeling Workflow Patterns Bizagi Suite Workflow Patterns 1 Table of Contents Modeling workflow patterns... 4 Implementing the patterns... 4 Basic control flow patterns... 4 WCP 1- Sequence... 4 WCP 2-
SERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
EE6390. Fall 1999. Research Report. Mobile IP in General Packet Radio System
EE6390 Introduction to Wireless Communications Systems Fall 1999 Research Report Mobile IP in General Packet Radio System Kelvin K. W. Wong Ramzi Hamati Date: Dec. 6, 1999 1.0 Abstract Tunneling is one
AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING
AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING Gurpreet Singh M.Phil Research Scholar, Computer Science Dept. Punjabi University, Patiala [email protected] Abstract: Cloud Computing
Software Life-Cycle Management
Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema
Fixed versus Mobile Turning Convergence into Reality. Dieter Schuler, Wouter Franx Lucent Technologies
Fixed versus Mobile Turning Convergence into Reality Dieter Schuler, Wouter Franx Lucent Technologies Agenda Fixed Mobile Convergence Service Definition Operator Challenges IP Multimedia Subsystem the
VoIP Market India July 2014
VoIP Market India July 2014 Executive Summary Market Overview The Indian VoIP market is currently valued at INR x1 mn and is expected to attain a CAGR of x2% to reach INR x3 mn by 20-- Mobile VoIP market
An Examination of the Firewall/NAT Problem, Traversal Methods, and Their Pros and Cons
TRAVERSING FIREWALLS AND NATS WITH VOICE AND VIDEO OVER IP An Examination of the Firewall/NAT Problem, Traversal Methods, and Their Pros and Cons Traversing Firewalls and NATs With Voice and Video Over
CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT
81 CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 5.1 INTRODUCTION Distributed Web servers on the Internet require high scalability and availability to provide efficient services to
Cost Analysis of NEMO Protocol Entities
Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science, University of Oklahoma, Norman, OK 73019. Email: {shohrab, atiq}@ou.edu William Ivancic NASA
