Location Management and Mobility Modeling in Wireless Systems

Author(s):  
Wenye Wang

One of the most salient features of wireless communications is that users can deploy a variety of wireless devices to communicate with others, regardless of their locations. Although mobility support provides flexibility and convenience, it introduces many challenging issues to network design, planning, and performance evaluation. With the increasing demand for multimedia applications, location-aware services, and system capacity, many recognize that modeling and management of location and mobility are becoming critical to locating mobile objects in wireless information networks. Location management and mobility modeling strongly influence the choice and performance of mobility and resource management algorithms, such as routing, handoff, and call admission control in many types of wireless networks. For these reasons, it is important to understand mobility modeling and location management mechanisms and the manner in which these mechanisms depend on the characteristics of mobile environments. This article is concerned with issues in, and methods for, location management and mobility modeling in wireless data networks. The most distinguished features of next generation wireless systems can be highlighted as reliable quality of service (QoS) for various applications and global roaming. Since the intrinsic characteristic of mobile communications is mobility support, wireless systems must be able to locate roaming mobile terminals (MTs) at any time to deliver services and to maintain connections, as the MTs move from one service area to another. Location management techniques enable mobile users to move around, even between different systems with dissimilar signaling formats and protocols, while simultaneously offering them incoming calls and maintaining services in progress. Therefore, the objective of mobility modeling is to estimate the current and future locations of a mobile user upon the arrival of a connection request, which involves many parameters, such as moving speed, call duration time, distance between the last known position and destination, and geographical conditions. Location management, however, deals with the problem of how to register or update new location of a mobile user with a wireless system, and how to locate a mobile terminal given the information in system databases.

2011 ◽  
pp. 177-212 ◽  
Author(s):  
Wenye Wang

Location modeling represents inclusive mobile objects and their relationship in space, dealing with how to describe a mobile object’s location. The goal of mobility modeling, on the other hand, is to predict or statistically estimate the movement of mobile objects. With the increasing demand for multimedia applications, location-aware services, and system capacity, many recognize that modeling and management of location and mobility is becoming critical to locating mobile objects in wireless information networks. Mobility modeling and location management strongly influence the design and performance of wireless networks in many aspects, such as routing, network planning, handoff, call admission control, and so forth. In this chapter, we present a comprehensive survey of mobility and location models, and schemes used for location-mobility management in cellular and ad hoc networks, which are discussed along with necessary, but understandable, formulation, analysis, and discussions.


Sensors ◽  
2021 ◽  
Vol 21 (1) ◽  
pp. 229
Author(s):  
Xianzhong Tian ◽  
Juan Zhu ◽  
Ting Xu ◽  
Yanjun Li

The latest results in Deep Neural Networks (DNNs) have greatly improved the accuracy and performance of a variety of intelligent applications. However, running such computation-intensive DNN-based applications on resource-constrained mobile devices definitely leads to long latency and huge energy consumption. The traditional way is performing DNNs in the central cloud, but it requires significant amounts of data to be transferred to the cloud over the wireless network and also results in long latency. To solve this problem, offloading partial DNN computation to edge clouds has been proposed, to realize the collaborative execution between mobile devices and edge clouds. In addition, the mobility of mobile devices is easily to cause the computation offloading failure. In this paper, we develop a mobility-included DNN partition offloading algorithm (MDPO) to adapt to user’s mobility. The objective of MDPO is minimizing the total latency of completing a DNN job when the mobile user is moving. The MDPO algorithm is suitable for both DNNs with chain topology and graphic topology. We evaluate the performance of our proposed MDPO compared to local-only execution and edge-only execution, experiments show that MDPO significantly reduces the total latency and improves the performance of DNN, and MDPO can adjust well to different network conditions.


2021 ◽  
Author(s):  
Vahid Jamali

Most algorithms developed so far for the optimization of Intelligent Reflecting Surfaces (IRSs) require knowledge of full Channel State Information (CSI). However, the resulting acquisition overhead constitutes a major bottleneck for the realization of IRS-assisted wireless systems in practice. In contrast, in this paper, focusing on downlink transmissions from a Base Station (BS) to a Mobile User (MU) that is located in a blockage region, we propose to optimize the IRS for illumination of the area centered around the MU. Hence, the proposed design requires the estimation of the MU’s position and not the full CSI. For a given IRS phase-shift configuration, the end-to-end BS-IRS-MU channel can then be estimated using conventional channel estimation techniques. The IRS reconfiguration overhead for the proposed scheme depends on the MU mobility as well as how wide the coverage of the IRS illumination is. Therefore, we develop a general IRS phase-shift design, which is valid for both the near- and far-field regimes and features a parameter for tuning the size of the illumination area. Moreover, we study a special case where the IRS illuminates the entire blockage area, which implies that the IRS phase shifts do not change over time leading to zero overhead for IRS reconfiguration.


Author(s):  
A. Alexiou

As communications technology is being developed, users’ demand for multimedia services raises. Meanwhile, the Internet has enjoyed tremendous growth in recent years. Consequently, there is a great interest in using the IP-based networks to provide multimedia services. One of the most important areas in which the issues are being debated is the development of standards for the universal mobile telecommunications system (UMTS). UMTS constitutes the third generation of cellular wireless networks which aims to provide high-speed data access along with real-time voice calls. Wireless data is one of the major boosters of wireless communications and one of the main motivations of the next-generation standards. Bandwidth is a valuable and limited resource for UMTS and every wireless network in general. Therefore, it is of extreme importance to exploit this resource in the most efficient way. Consequently, when a user experiences a streaming video, there should be enough bandwidth available at any time for any other application that the mobile user might need. In addition, when two different applications run together, the network should guarantee that there is no possibility for any of the above-mentioned applications to prevail against the other by taking all the available channel bandwidth. Since Internet applications adopt mainly TCP as the transport protocol, while streaming applications mainly use RTP, the network should guarantee that RTP does not prevail against the TCP traffic. This means that there should be enough bandwidth available in the wireless channel for the Internet applications to run properly.


Author(s):  
Steven Lanzisera ◽  
Kristofer S.J. Pister

Localization or geolocation of wireless sensors usually requires accurate estimates of the distance between nodes in the network. RF ranging techniques can provide these estimates through a variety of methods some of which are well suited to wireless sensor networks. Noise and multipath channels fundamentally limit the accuracy of range estimation, and a number of other implementation related phenomena further impact accuracy. This chapter explores these effects and selected mitigation techniques in the context of low power wireless systems.


2018 ◽  
Vol 7 (2) ◽  
pp. 768
Author(s):  
Muruganandam. A ◽  
Anitha. R

A Wireless Sensor Network (WSNs) is popular developing the field in industrial and other major markets. Wireless data security is the central theme in the WSNs application where security of transmitted data is more concerned. Due to the significant concentration of energy efficiency and performance analysis in WSN, providing secured communication is a challenging issue. To overcome this interdependent problem Game theory can be used. Game theory is applied here to select different routes to transfer the data from source to destination. The performance of the WSNs can be increased by providing security for transmitted data. The graph for throughput, end to end delay, delivery, and packet loss ratio are generated using NS2 simulation tool.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Zhonglin Chen ◽  
Shanzhi Chen ◽  
Hui Xu ◽  
Bo Hu

The ultradense network (UDN) is one of the most promising technologies in the fifth generation (5G) to address the network system capacity issue. It can enhance spatial reuse through the flexible, intensive deployment of small base stations. A universal 5G UDN architecture is necessary to realize the autonomous and dynamic deployment of small base stations. However, the security of the 5G UDN is still in its infancy, and the data communication security among the network entities is facing new challenges. In this paper, we proposed a new security based on implicit certificate (IC) scheme; the scheme solves the security problem among the access points (APs) in a dynamic APs group (APG) and between the AP and user equipment (UE). We present each phase regarding how two network entities obtain the Elliptic Curve Qu-Vanstone (ECQV) implicit certificate scheme, verify each other’s identity, and share keys in an UDN. Finally, we extensively analyze our lightweight security communication model in terms of security and performance. The simulation on network bandwidth evaluation is also conducted to prove the efficiency of the solution.


2009 ◽  
Vol 83-86 ◽  
pp. 571-578 ◽  
Author(s):  
Musbah Mahfoud ◽  
Daryoush Emadi

Aluminum has experienced significant growth in several sectors over the last decade as a result of its properties and performance attributes. Aluminum is being recognized by different sectors such as automotive, construction, aerospace, etc. as a one of the best candidate material for various applications. Increasing demand for aluminum-based products and further globalization of the aluminum industry have contributed significantly to the higher consumption of aluminum scrap for re-production of aluminum alloys. In automotive applications, for example, the opportunities for continued growth in powertrain and suspension applications plus lightweighting of body structures offer the potential for considerable further growth. Today, a large amount of the aluminum going into new products is coming from recycled products. This represents a growing "energy bank" of aluminum that will become available for recycling at the end of vehicles' lives, and thus recycling is becoming a major issue, and it is essential to tackle this problem before it is too late. The future growth offers opportunity for new recycling technologies and practices to maximize scrap quality, improve efficiency and reduce cost. The present paper highlights some of the current development work in recycling, the challenges facing the implementation of recycling technologies and the future prospective of the idea.


Sign in / Sign up

Export Citation Format

Share Document