Stochastic models in queueing theory
Stochastic models in queueing theory
An Update Algorithm for Replicated Signaling Databases in Wireless and Advanced Intelligent Networks
IEEE Transactions on Computers - Special issue on mobile computing
Design and evaluation of a replicated database for mobile systems
Wireless Networks
IEEE Transactions on Parallel and Distributed Systems
Supporting mobile commerce applications using dependable wireless networks
Mobile Networks and Applications
An aggressive approach to failure restoration of PCS mobility databases
ACM SIGMOBILE Mobile Computing and Communications Review
Locating Objects in Mobile Computing
IEEE Transactions on Knowledge and Data Engineering
Measuring the Reliability and Survivability of Infrastructure-Oriented Wireless Networks
LCN '01 Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
Improving the Dependability of Wireless Networks Using Design Techniques
LCN '01 Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
Per-User Checkpointing for Mobility Database Failure Restoration
IEEE Transactions on Mobile Computing
International Journal of Network Management
Broadcast Approach for UMTS Mobility Database Recovery
IEEE Transactions on Mobile Computing
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Backoff strategies for demand re-registration in PCS database failure recovery
Computer Communications
Fast recovery from database/link failures in mobile networks
Computer Communications
Hi-index | 0.00 |
This paper studies failure restoration of mobility databases for personal communication networks (specifically, VLRs and HLRs). We model the VLR restoration with and without checkpointing. The optimal VLR checkpointing interval is derived to balance the checkpointing cost against the paging cost. We also model GSM periodic location updating (location confirmation) to quantify the relationship between the location confirmation frequency and the number of lost calls. The HLR failure restoration procedures for IS-41 and GSM are described. We show the number of lost calls in a HLR failure. Both the procedures in IS-41 and GSM cannot identify the VLRs that need to be accessed by the HLR after a failure. An algorithm is proposed to identify the VLRs, which can be used to aggressively restore a HLR after its failure.