fuzzy logic-based mobility management · pdf filechapter ii literature review ... 2.2.3 3g...

149
FUZZY LOGIC-BASED MOBILITY MANAGEMENT SCHEME FOR CELLULAR RADIO SYSTEM RIZAL MUNADI THESIS SUBMITTED IN FULFILMENT FOR THE DEGREE OF DOCTOR OF PHILOSOPHY FACULTY OF ENGINEERING AND BUILT ENVIRONMENT UNIVERSITI KEBANGSAAN MALAYSIA BANGI 2011

Upload: ngodieu

Post on 06-Feb-2018

227 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

FUZZY LOGIC-BASED MOBILITY MANAGEMENT SCHEME FOR CELLULAR RADIO SYSTEM

RIZAL MUNADI

THESIS SUBMITTED IN FULFILMENT FOR THE DEGREE OF DOCTOR OF PHILOSOPHY

FACULTY OF ENGINEERING AND BUILT ENVIRONMENT UNIVERSITI KEBANGSAAN MALAYSIA

BANGI

2011

Page 2: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

SKEMA PENGURUSAN MOBILITI BERASASKAN LOGIK KABUR BAGI SISTEM RADIO SELULAR

RIZAL MUNADI

TESIS YANG DIKEMUKAKAN UNTUK MEMPEROLEH IJAZAH DOKTOR FALSAFAH

FAKULTI KEJURUTERAAN DAN ALAM BINA

UNIVERSITI KEBANGSAAN MALAYSIA BANGI

2011

Page 3: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

iii

DECLARATION

I hereby declare that the work in this thesis is my own except for quotations and

summaries which have been duly acknowledged.

12 July 2011 RIZAL MUNADI P23689

Page 4: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

iv

ACKNOWLEDGMENT

All praise belongs to Allah who has bestowed upon me the strength and will to complete this thesis. Peace and blessings of Allah be upon His Messenger, the Prophet Muhammad and his family.

I then wish to express my deep and lasting appreciation to the many individuals who have contributed towards the completion and submission of this thesis. May Allah reward His blessing on them for their sincere cooperation. Among those that I take pleasure to mention includes:

My former first supervisor Assoc. Prof. Zainol Abidin Abdul Rashid, and the

first supervisor Prof. Mahamod Ismail and co-supervisor Assoc. Prof. Ir. Dr. Mardina Abdullah for their guidance, valuable advises and encouragement, time and knowledge through the entire work and writing this thesis. For a short period this work is supported by IRPA grant: 04-02-02-0029, I would like to express many thanks to the IRPA Secretariat, Ministry of Science, Technology and Innovation (MOSTI) of Malaysia, for sponsoring this work. I am also grateful for the conferment of UKM Zamalah scholarships that have helped financially for five semesters.

My colleagues at SMRG laboratory, Dr. Tariqul Islam, Dr. Awad Momani, Dr. Wayan Suparta, and Sumazly Sulaiman.

I also wish to thank all laboratory assistants and technicians in the Department of Electrical, Electronics and Systems Engineering and ANGKASA staffs for their cooperation and support.

Also, I want to thank, Dr. Heikki Kaaranen for discussion and explanation

about UMTS network via email and Torsten Rüdenbusch for permission and giving all the pictures from his book. They are the author of two books used as reference and become a very meaningful for the content of this thesis.

My parents, Boerhanoeddin S. Moehdy and Rostina for their support and constant pray. Also, I want to express my appreciation to my sister and brothers.

Finally, I must state that it would have been impossible for me to do any important work to finalize this thesis without pray and warm support of my wife, Sitti Yudrika and my children: Fathan Mumtaz Yunadi, Rania Zharifah Mumayyaz and Farras Hammam Yunadi. They surrounded me with a very kind atmosphere and plenty of understanding. They allowed me the time to write I should have enjoyed with them both instead. May Allah accept and bless this work and effort for, eventually, everything is done in seeking His pleasure.

Page 5: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

vi

ABSTRACT Mobility management plays an important role in wireless mobile networks in effectively delivering services to the mobile users. In cellular network, mobility management has allowed mobile subscribers to move freely across different networks while maintaining its quality of service for a variety of applications. Location management is one of the main tasks of mobility management which has two basic procedures: location update and paging, which is used to manage call delivery and to maintain connection while roaming in service area. The biggest challenge in location management research is to find the most favorable trade off between location update and paging. Many location management techniques have been explored to reduce signaling cost of the Second Generation and the Third Generation wireless network such as location area design, database distribution, paging, static and dynamic location update schemes. The location management cost depends mainly on subscribers’ mobility behavior and its performance which is typically measured by the number of location update performed and the number of cells paged. The objective of this research is to propose, validate and evaluate the performance of location update scheme using fuzzy logic technique for cellular radio system. Two kinds of mobility model based on random walk mobility and street lane mobility are developed and then tested using balanced and un-balanced location area models. The service area in both models consists of 49 cells which are divided into seven clusters. The clusters of unbalanced model are not uniform in terms of the number of cells. A population of mobile subscribers is generated in accordance to the mobility models. A combination of distance, time, and movement scheme is used to evaluate location update cost. Performance evaluation with fuzzy logic technique uses residence time and speed of mobile subscriber as input parameters. The results of street-lane and four-direction random walk mobility models show that most mobile subscribers are distributed in the center cluster of simulated balanced and unbalanced location area. Meanwhile, eight-direction random-walk mobility model indicates that most of mobile subscribers are concentrated at certain edge-cluster of simulated service area of both balanced and un-balanced location area models. Based on the location update of combination schemes tested, an unbalanced model indicates slightly lower location update activities compared to balanced model. The results of using fuzzy logic technique show that location update cost using fuzzy logic is decreased. The reductions are varied depended on the strategies implementation. These results prove that user’s mobility has influenced location management cost in cellular radio service area.

Page 6: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

v

SKEMA PENGURUSAN MOBILITI BERASASKAN LOGIK KABUR BAGI SISTEM RADIO SELULAR

ABSTRAK

Pengurusan mobiliti memainkan peranan yang penting dalam rangkaian bergerak tanpa wayar bagi menyediakan perkhidmatan kepada pelanggan bergerak secara berkesan. Bagi rangkaian selular, pengurusan mobiliti membenarkan pelanggan berpindah secara bebas melintasi rangkaian yang berbeza di samping mengekalkan kualiti perkhidmatan untuk pelbagai aplikasi. Pengurusan lokasi merupakan satu tugas utama daripada pengurusan mobiliti yang mempunyai dua prosedur asas: kemaskini lokasi dan keloi yang digunakan untuk mengurus penghantaran panggilan dan mengekalkan sambungan semasa perayauan di dalam kawasan perkhidmatan. Cabaran terbesar dalam penyelidikan pengurusan lokasi adalah untuk mendapatkan timbal balik yang paling baik antara kemaskini lokasi dan keloi. Beberapa kaedah pengurusan lokasi telah dikaji untuk mengurangkan kos pengisyaratan dalam rangkaian tanpa wayar Generasi Kedua dan Generasi Ketiga seperti rekabentuk kawasan lokasi, taburan pangkalan data, keloi, skema kemaskini lokasi statik dan dinamik. Kos pengurusan lokasi secara asasnya bergantung kepada kelakuan mobiliti pelanggan dan prestasinya lazimnya diukur berdasarkan jumlah kemaskini yang dihasilkan dan jumlah sel yang dikeloi. Objektif bagi penyelidikan ini adalah untuk mencadangkan, mengesahkan dan menilai prestasi skema kemaskini lokasi yang menggunakan teknik logik kabur bagi sistem radio bersel. Dua jenis model mobiliti berasaskan model mobiliti yang bergerak secara rawak dan model mobiliti lorong jalan telah dibangunkan dan kemudian diuji dengan menggunakan model kawasan perkhidmatan: model lokasi kawasan terimbang dan tak terimbang. Kawasan perkhidmatan mengandungi 49 sel yang dibahagikan kepada tujuh kelompok. Setiap kelompok dari model tak terimbang adalah tidak sama dari segi bilangan sel. Sekumpulan pelanggan bergerak yang dijana mengikut model-model mobiliti ini. Gabungan dari skema jarak, masa dan pergerakan telah digunakan untuk menilai kos kemaskini lokasi. Penilaian prestasi bagi logik kabur menggunakan parameter masukan masa tinggal, ketumpatan dan kelajuan pelanggan bergerak. Keputusan dari model mobiliti mengikut lorong jalan dan jalan rawak empat arah menunjukkan bahawa bahagian tengah dari kawasan perkhidmatan mempunyai taburan pelanggan terbanyak untuk model lokasi kawasan terimbang dan lokasi kawasan tak terimbang. Seterusnya, keputusan penggunaan mobiliti jalan rawak lapan arah menunjukkan taburan pelanggan terbanyak tersebar di dalam kelompok yang bersempadan dengan pusat kawasan perkhidmatan untuk kedua model lokasi bagi kawasan terimbang dan kawasan tak terimbang. Berdasarkan pelbagai gabungan skema kemaskini lokasi yang diuji, model kawasan tak terimbang memperlihatkan isyarat kemaskini lokasi yang lebih rendah dibandingkan model kawasan terimbang. Keputusan menggunakan kaedah logik kabur menunjukkan bahawa kos kemaskini lokasi berjaya dikurangkan. Pengurangan adalah bergantung pada strategi yang digunapakai. Keputusan ini membuktikan bahawa mobiliti pengguna mempengaruhi kos pengurusan lokasi dalam kawasan perkhidmatan radio selular.

Page 7: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

vii

CONTENTS

Page

DECLARATION iii

ACKNOWLEDGMENT iv

ABSTRAK v

ABSTRACT vi

CONTENTS vii

LIST OF FIGURES x

LIST OF TABLES xiii

LIST OF ABBREVIATIONS xiv

CHAPTER I INTRODUCTION

1.1 Introduction 1

1.2 Problem Statement 6

1.3 Research Objective 7

1.4 Research Motivation and Scope 8

1.5 Thesis Contribution 9

1.6 Thesis Organization 10

CHAPTER II LITERATURE REVIEW

2.1 Introduction 11

2.2 Cellular Technology Evolution and Network 11

2.2.1 Cellular technology evolution 13 2.2.2 2G network architecture 16 2.2.3 3G network architecture 18

2.3 Radio Resource Management 25

2.3.1 Cellular network database 26 2.3.2 Calling process 28 2.3.3 Signaling process 29 2.3.4 Connected mode status 31

2.4 Mobility Management 35

2.4.1 Mobility models in cellular system 36 2.4.2 Random walk mobility model 38 2.4.3 Fluid flow mobility model 40

2.4.4 Random Gauss-Markov model 41

Page 8: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

viii

2.4.5 Random direction mobility model 41 2.4.6 City area, zone area and street unit mobility model 42

2.5 Location Management 44

2.6 Location Update 45

2.6.1 Registration area location update schemes 47 2.6.2 Movement-based scheme 48 2.6.3 Timer-based scheme 49 2.6.4 Distance-based scheme 50 2.6.5 Adaptive direction-based scheme 51

2.7 Paging Scheme 52

2.7.1 Blanket polling paging scheme 52 2.7.2 Shortest distance first paging scheme 53 2.7.3 Sequential paging scheme 53 2.7.4 Selective paging scheme 54

2.8 Application of Optimization Technique 54

2.8.1 Graph theory 54 2.8.2 Fuzzy logic 57 2.8.3 Neuro-fuzzy 65

2.9 Summary 66

CHAPTER III RESEARCH METHODOLOGY

3.1 Introduction 67

3.2 Simulation Environment 67

3.3 Cell Clustering Model 69

3.4 Mobility Model 72

3.4.1 Random walk mobility model 73 3.4.2 Street lane model 74

3.5 Mobility Management Evaluation 76

3.6 Computer Simulation Development 78

3.7 Development Design Using Fuzzy Logic Technique 81

3.8 Summary 85

CHAPTER IV LOCATION UPDATE AND PAGING RESULTS

4.1 Introduction 86

4.2 Mobility Models Analysis 87

4.2.1 Random walk mobility model analysis 88 4.2.2 Street lane model analysis 88

Page 9: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

ix

4.3 Location Management Cost 89

4.3.1 Location update cost 90 4.3.2 Paging cost 92 4.3.3 Location update and paging cost analysis 92

4.4 Summary 99

CHAPTER V FUZZY LOGIC TECHNIQUE AND RESULTS

5.1 Introduction 101

5.2 Graph Analysis 101

5.3 Fuzzy Logic Analysis 107

5.4 Performance Evaluation 111

5.5 Summary 112

CHAPTER VI CONCLUSION

6.1 Introduction 114

6.2 Conclusion 115

6.3 Future Work 116

REFERENCES 117

APPENDIX

A List of Publications 127

B Pantern Index 129

C Psedo Code 130

Page 10: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

x

LIST OF FIGURES

Figure No. Page

1.1 Subscriber market share in Malaysia 2

1.2 Asia Pacific top 10 markets by customers 3

1.3 Worldwide mobile subscriptions 4

1.4 Total cellular subscriptions worldwide 5

1.5 Mobile subscriptions distribution 5

2.1 Cellular technology evolution 15

2.2 Cellular standards evolution 16

2.3 GSM network architecture 17

2.4 Cell coverage area types 18

2.5 UMTS areas 18

2.6 International mobile subscriber identity 20

2.7 Structure of international mobile subscriber identity 21

2.8 Structure of location area identity 21

2.9 UMTS release 99 network architecture 23

2.10 UMTS release 4 24

2.11 UTRAN architecture 25

2.12 Two-level hierarchy of databases: HLR And VLR 27

2.13 Call routing for a mobile terminating call 29

2.14 Initial UE radio access 30

2.15 UTRAN - connected mode states 31

2.16 RRC signaling connection (message flow) 35

2.17 A concept map of mobility models 37

2.18 Random walk mobility model 40

2.19 Location update diagram in GSM 46

2.20 Movement-based 49

2.21 Timer-based 50

2.22 Distance-based 51

Page 11: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

xi

2.23 Movement and timing 51

2.24 Graph and value 55

2.25 Graph matrices 56

2.26 Isomophism graph and matrices 56

2.27 Fuzzy set to charaterize the room temperature 59

2.28 Union operation 60

2.29 Intersection operation 61

2.30 Complement Operation 61

2.31 Fuzzy inference system 64

2.32 An example of fuzzy sets 65

3.1 Hexagonal cell geometry 68

3.2 Simulation service area 69

3.3 Balanced-cell model 71

3.4 Unbalanced-cell model 72

3.5 Random walk with certain direction 74

3.6 Street lane layout 75

3.7 Simulation flow chart 80

3.8 Triangular function 82

3.9 Membership function of input variable “Speed” 83

3.10 Membership function of input variable “Density” 83

3.11 Membership function of input variable “Restime” 84

3.12 Membership function of output variable “Results” 84

4.1 Initial MSs in the simulation area 87

4.2 An example of MS trajectory using random walk mobility model 88

4.3 An example of highway model for the proposed model 89

4.4 A MS travels path 91

4.5 Location update performance 93

4.6 Paging performance 94

4.7 Signaling in VLR system 95

4.8 Signaling in HLR system 96

4.9 Total of signaling transaction 96

Page 12: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

xii

4.10 Network efficiency performance of proposed strategies 97

4.11 A mixed LU and Paging signaling activities 98

4.12 Comparison of mixed LU-Paging strategies performance 99

5.1 Unique pattern of 4-directions 102

5.2 MS distribution for scheme A using balanced-cell strategy 103

5.3 MS distribution for scheme B using balanced-cell strategy 104

5.4 MS distribution for scheme C using balanced-cell strategy 104

5.5 MS distribution for scheme A using unbalanced-cell strategy 105

5.6 MS distribution for scheme B using unbalanced-cell strategy 105

5.7 MS distribution for scheme C using unbalanced-cell strategy 106

5.8 Movement pattern of the tested schemes 106

5.9 Direction scheme pattern distribution 107

5.10 If-then structure in fuzzy environment 108

5.11 Surface of residence time and density 109

5.12 Surface of speed and residence time 110

5.13 Surface of speed and density 110

5.14 An example of result using fuzzy logic 111

Page 13: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

xiii

LIST OF TABLES

Table No. Page

2.1 MCC, MNC, and Network Operators 20

2.2 Mobility model matching real-world 38

3.1 Symmetrical cell clustering 70

3.2 Asymmetrical cell clustering 71

3.3 Threshold value of movement direction 73

3.4 Pattern index 78

4.1 Strategy for mixed LU-Paging pair 98

5.1 Pattern distributions 103

5.2 The proposed 10-set of fuzzy rules 108

5.3 Conventional and fuzzy results comparison 112

Page 14: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

xiv

LIST OF ABBREVIATIONS 1G First Generation of Cellular Technology

2G Second Generation of Cellular Technology

3G Third Generation of Cellular Technology

3GPP Third Generation Partnership Project

AMPS Advanced Mobile Phone Service

AuC Authentication Center

BCH Broadcast Channel

BS Base Station

BSS Base Station Subsystem

CCPCH Common Control Physical Channel

CD Call Delivery

CDMA Code Division Multiple Access

CIC Cell Identification Code

CPICH Common Pilot Channel

CPT Cell Priority Transition

CN Core Network

DCCH Dedicated Control Channel

DCH Dedicated Transport Channel

EDGE Enhanced Data Rates for Global Evolution

EGPRS Enhanced General Packet Radio Service

ETSI European Telecommunications Standard Institute

FDD Frequency Division Duplex

FFMM Fluid Flow Mobility Model

FHLS Fuzzy Hierarchical Location Service

FIS Fuzzy Inference System

FNN Fuzzy Neural Network

GERAN GPRS/EDGE Radio Access Network

GLA Gateway Location Area

GLR Gateway Location Register

Page 15: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

xv

GMSC Gateway Mobile Switching Center

GPRS General Packet Radio Service

GSM Global System for Mobile Communication

GR Group Registration

HSCSD High Speed Circuit Switched Data

HLR Home Location Register

HSDPA High-Speed Downlink Packet Access

HSPA High-Speed Packet Access

HSS Home Subscriber Server

IMSI International Mobile Subscriber Identity

IMTS Improved Mobile Telephone Service

IPG Individual Profile Graph

IPv6 Internet Protocol version 6

ISDN Integrated Services Digital Network

LA Location Area

LAC Location Area Code

LAI Location Area Identity

LMA Local Mobility Anchor

LU Location Update

MAG Mobile Access Gateway

MANET Mobile Ad-hoc Network

MCC Mobile Country Code

MCMC Malaysian Communications and Multimedia Commission

MDP Markovian Decision Process

MGW Media Gateway

MBMS Multimedia Broadcast and Multicast Service

MM Mobility Management

MNC Mobile Network Code

MNP Mobile Number Portability

MRDMM Modified Random Direction Mobility Model

MSRN Mobile Station Roaming Number

Page 16: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

xvi

MSC Mobile Switching Center

MSIN Mobile Subscriber Identity Number

MSISDN Mobile Subscriber ISDN

NMT Nordic Mobile Telephony

NAS Non Access Stratum

NLU No Location Update

NFS Neuro Fuzzy System

NSS Network Switching Subsystem

NU Neighborhood Update

P-CCPCH Primary Common Control Physical Channel

PLMN Public Land Mobile Network

PMIPv6 Proxy Mobile IPv6

PSCH Primary Synchronization Channel

PSS Packet-Switched Streaming Services

PSTN Public Switched Telephone Network

RA Routing Area

RAC Routing Area Code

RAI Routing Area Identity

RDMM Random Direction Mobility Model

RGMM Random Gauss-Markov Model

RNC Radio Network Controller

RNS Radio Network Subsystem

RR Radio Resource

RRM Radio Resource Management

RWMM Random Walk Mobility Model

RWyMM Random Waypoint Mobility Model

SCCP Signaling Connection Control Part

SGSN Serving GPRS Support Node

SMS Short Message Service

SS7 Signaling System Number 7

SSCH Secondary Synchronization Channel

Page 17: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

xvii

TACS Total Access Communication System

TMSI Temporary Mobile Subscriber Identity

TCH Transport Channel

TDD Time Division Duplex

TDMA Time Division Multiple Access

UE User Equipment

UMTS Universal Mobile Telecommunications System

UPH User Profile History

URA UTRAN Registration Areas

UTRAN UMTS Terrestrial Radio Access Network

UMTS Universal Mobile Telecommunications System

VLR Visitor Location Register

WCDMA Wideband Code Division Multiple Access

Page 18: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

CHAPTER I

INTRODUCTION

1.1 INTRODUCTION

Over the last few years, worldwide cellular market shows tremendous growth.

Cellular phone manufacturers, cellular operators, and customers are the three key

players behind the rapid growth of cellular phone market. Cellular phone

manufacturers keep niche market by launching new models of cellular phones on a

regular basis. On the other hand, cellular operators or cellular network providers

improve quality of service and offer additional value added services as an attempt to

retain existing customers and intensified promotional efforts to attract new prospects

subscriber. In addition, the purchasing power of consumers or the economic growth of

a country also has a very significant role. Nowadays, most people are familiar with

cellular communication technology even in developing or poor countries. It must be

recognized that the cellular phone technology has a considerable impact for life today.

The success story of cellular communication that attract more users did not

happen in the First Generation (1G) of cellular technology when it came to market. In

the first generation, there are some technology disadvantages such as lack of security,

limited features and services. In addition, cellular phone prices and communication

tariff are too expensive for most people are another reason this technology is not

preferred and then shorten its business life cycle. Later, the Second Generation (2G)

of cellular technology comes and has dramatically changed cellular market. Cellular

operators revise their communication tariff structures, a new feature: Short Message

Service (SMS) is introduced and make it competitive to attract more subscribers. In

this stage, voice quality has been improved, data communication capability is added,

Page 19: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

2

and digital technology has been applied to the 2G communication system have

attracted many people to be customers. At this moment, the 2G of cellular technology

is still available and while the Third Generation (3G) of cellular technology gradually

operates to serve customer with more features and services.

The cellular services in Malaysia is essentially an oligopoly market comprising

Celcom, Digi and Maxis. In Malaysian Communications and Multimedia Commission

(MCMC) report of the fourth quater 2007, the cellular service providers in Malaysia

have a combined total of 22.1 million subscriptions; the cellular service market is

among the more matured markets in the region with a penetration rate of 80.8 per 100

inhabitants (MCMC 2007). The market share penetration around 2005 to 2006 is

shown in Figure 1.1.

Figure 1.1 Subscriber market share in Malaysia

Source: MCMC 2007

In Malaysia, Mobile Number Portability (MNP) was introduced in 2007 to

cellular subscribers by the MCMC and then adopted by operators. This

implementation is expected to lead to a more competitive and efficient

telecommunications environment. Number portability is a circuit-switch network

feature that provides consumers with the ability to change service providers, locations,

or service types without changing their telephone numbers. MNP will be particularly

beneficial to business users as it enables them to change service providers whilst

saving them the cost, time and effort associated with a mobile number change. In the

ASEAN region, Singapore has adopted in 1997, but on the other hand, this model is

not offered in Indonesia which has bigger market compared to Malaysia and

Subscriber Market Share - 2005

Maxis; 41%

Digi; 24%

Celcom; 35%

Subscriber Market Share - 2006

Maxis; 42%

Digi; 27%

Celcom; 31%

Page 20: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

3

Singapore. One of the cellular operators in Indonesia, PT Telkomsel, Tbk. has more

than 90 million cellular subscribers.

In many countries, the registered cellular phone subscribers can be more than

the total number of people. This can be assumed that many people have more than one

cellular subscription, possibly one for private use and one for work. In this way,

cellular technology has enabled market penetration to become more than 100% in

certain country. In Asia Pacific region, there are five of the world’s ten largest mobile

markets - China and India, which are the number one and two respectively and

Indonesia, Japan and Pakistan, the sixth, eighth and tenth largest. These five countries

occupy the top five places in the regional list, which is completed through the addition

of the Philippines, Vietnam, Thailand, South Korea and Bangladesh as shown in

Figure 1.2.

Figure 1.2 Asia Pacific top 10 markets by customers

Source: Anon 2009

One of the basic characteristics services of the cellular network that differs

from fixed communication is the user’s ability to perform or receive calls in mobile

activity. One of the 2G which dominantly appears world wide up to this time is Global

System for Mobile Communication (GSM). In fact, every day, there are more than one

million new additions to the GSM family of technology users receiving service from

Page 21: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

4

one of 700 commercial GSM networks across 218 countries and territories around the

world (Anon 2010a). In 2007, 3G Americas reported that the number of GSM

subscribers worldwide has reached 2.5 billion, a stunning 400% increase in GSM

subscribers from only six years ago, according to the estimates of Informa’s World

Cellular Information Service. “It’s unprecedented for almost any global industry to

achieve the growth and success demonstrated by the GSM family of technologies,

with an estimated 2.5 billion global customers today,” stated Chris Pearson, President

of 3G Americas (Anon 2010a). This can be attributed to several factors such as price,

people awareness, technology and features, cellular handset model, radio coverage

and services. 3G technology as a new entrant in the existing market gradually has

started to disrupt GSM market. As shown in Figure 1.3, Informa Telecoms & Media

report in December 2009 that the penetration of GSM subscribers have reached about

3.7 billion.

Figure 1.3 Worldwide mobile subscriptions

Source: Anon 2010b

The immediate motivating factor for 3G communication system is to increase

system capacity. This technology provides the ability to supplement 2G services.

Universal Mobile Telecommunications System (UMTS) is a 3G telecommunications

technology for mobile devices. The most common form of UMTS makes use of

Page 22: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

5

Wideband Code Division Multiple Access (WCDMA) that is an air interface standard

and most notably find in 3G mobile telecommunications networks. However, the fact

shows that one of the 2G technologies, at this moment GSM is still the most widely

installed wireless technology in the world. In Figure 1.4, GSM subscriptions reach 4

billion or 77% of total global subscriptions. In term of user distribution, 48% of GSM

subscriptions are in Asia Pacific countries which are the biggest market of mobile

users as shown in Figure 1.5.

Figure 1.4 Total cellular subscriptions worldwide

Source: Anon 2011a

Figure 1.5 Mobile subscriptions distribution

Source: Anon 2011b

Page 23: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

6

1.2 PROBLEM STATEMENTS

In cellular technology, communication service is determined by the availability of

services at the time of communication is done. As the number of subscribers increases

given a fixed radio spectrum allocation, in order to accommodate the higher

subscriber densities, more signaling consumes scarce radio bandwidth. Increased

signaling incurs additional cost to operators by consuming network resources thus

effecting revenue-generating traffic. To accomplish and minimize signaling activities,

a set of procedures of mobility tracking is performed which its main goal is to locate

cellular user. Therefore, the main solution for supporting the growing population is to

reduce cell size and to increase the bandwidth reuse (Jabbari et al. 1995 & Steele et al.

1995).

Two tasks in location management, Location Update (LU) and Paging

consume scarce resources like wireless network bandwidth and mobile equipment

power. Location management schemes are essentially based on users’ mobility and

incoming call rate characteristics (Tabbane 1997). Several location management

strategies have been proposed in the literature that attempt to minimize either the total

location management cost or individual costs of LU and paging. Intuitively, the

location accuracy depends in the location update frequency. The more frequent the

LU, the more accurate the location information. In other word, this frequent LU

activity will increase the cost of signaling and on the other hand the paging cost may

decrease.

The issue of location management cost has been a concern of many areas in

wireless communication. Several recent studies related to location management cost

including location update, paging and the use of fuzzy technique will be described. In

Vergados et al. (2007), they introduce a 2-level distributed database architecture

combined with the Group Registration (GR) location tracking strategy to be used in

3G wireless networks. With this strategy, the total location management cost is

reduced by updating the location of MSs in a registration area with a single route

response message to the HSS (Home Subscriber Server). Bae and Kim (2007)

proposed an adaptive location service on the basis of fuzzy logic called Fuzzy

Page 24: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

7

Hierarchical Location Service (FHLS) to minimize the sum of the location update cost

and paging cost. In a Mobile Ad-hoc Network (MANET) environment, Neighborhood

Update (NU), and location server update are two approaches to evaluate the cost

problem (Ye & Abouzeid 2008). Under a Markovian mobility model, the location

update decision problem is modeled as a Markovian Decision Process (MDP). Based

on the separable cost structure of the proposed MDP model, the location update

decisions on NU and LU can be independently carried out without loss of optimality.

Le et al. (2008) investigated update cost problem for database application which

introduce group update for traffic control using Group Update Time Parameter R-tree.

Another approach is applied an intelligent paging scheme with movement based LU

strategy to resolve the total cost (Chang et al. 2008). Zhao et al. (2009) study location

update cost using distance based. Osmani et al. (2009) proposed a method on mobility

management than can be used as an independent component to setup over different

hierarchical location services using fuzzy logic. They proved that the implemented

fuzzy logic has better management of location update operation in hierarchical

location services. Yi et al. (2010) investigate Proxy Mobile IPv6 (PMIPv6) as a

network-based mobility management protocol to support mobility for Internet

Protocol version 6 (IPv6). In the Mobile Access Gateway (MAG) incurs a high

signaling cost to update the location of a mobile node to the remote Local Mobility

Anchor (LMA) if the mobile node moves frequently. Their new mobility management

scheme proposal intended to minimize signaling cost using the pointer forwarding and

achieved superior performance than PMIPv6 scheme. Wang et al. (2010) worked on

the Cell Priority Transition (CPT) mechanism to reduce the location update cost for

the femtocell network. Their study shows that the proposed CPT mechanism reduces

the location update cost for femtocell networks. Singh and Karnan (2010) have

investigated location update cost and proposed an intelligent approach by taking a

User Profile History (UPH). Therefore, in this research, location management cost is

the issue to be solved in this thesis.

1.3 RESEARCH OBJECTIVE

In this thesis, the research objective is to find the minimum cost of location

management operation using mobility management concept in cellular communication

Page 25: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

8

system. This cost can be done by analyzing the cost of location update and paging

process. To meet the objective of this research, a set of dynamic location management

schemes and mobility models for cellular network are proposed and run using

software simulator. The details research objective have to achieve are as follow:

a. To develop mobility models and simulator using MATLAB® for location

management schemes.

b. To evaluate the users’ mobility behavior of the models tested.

c. To evaluate the performance of the dynamic location management schemes.

d. To optimize the total cost of location management using Fuzzy Logic

technique.

1.4 RESEARCH MOTIVATION AND SCOPE

The increasing number of users, global connectivity, quality of service and the highly

intense competition in the mobile communications industry are a challenge that must

be faced by 2G and 3G providers of mobile communications. In cellular network, user

can roam the network and has its mobility services. This is the advantage for cellular

user; however, user mobility affects quality of service, and makes capacity planning

more difficult. User profile behavior is different in terms of mobility. Mobility models

have been proposed in many literatures for cellular and ad hoc network. Mobility

models are not comprehensive because of new applications, limited conditions and

network topology. For this reason, in this thesis a new street lane mobility model is

proposed while random walk mobility model also used to evaluate location

management problem. In the proposed location management strategy, mobility models

are independent to cellular technology generation. Both in 2G and 3G have the same

network element, Home Location Register (HLR) and Visitor Location Register

(VLR) and these databases are used to evaluate the location management

performance. To overcome all the critical issues regarding user mobility and signaling

activities should be done by optimizing the location management tasks. In this thesis,

pedestrian is not considering to evaluate because its speed can be zero. For highly

speed user, mobility can be divided into slow and high speed. As mentioned in many

studies, of the two tasks: location update and paging, there is a trade-off (Roy et al.

2007) and offer an opportunity to find an optimal solution. In this research, to evaluate

Page 26: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

9

the cost of location management operation, the calculation cost is carried out with the

proposed mobility models, random walk mobility model and street lane mobility

model. These two mobility models used to evaluate some location management

schemes including location update and paging strategies. To optimize the result, fuzzy

logic technique is implemented and compares to the proposed conventional location

management schemes. The choice of mobility models in the simulation of this thesis is

not reflected the real user mobility. The simulation results have only obtained under

the defined parameters and the tested model. Since this simulation approach its

technology independent and can be used for any wireless technology, the result might

be varied to a certain wireless technology. This is the limitation of this work. For

further investigation, it needs to get the real value and used to evaluate location

management cost problem.

1.5 THESIS CONTRIBUTION

This research is about mobility management and location management cost. The

contributions of this thesis include:

a. The proposed street lane mobility model.

The street lane mobility model consists of three-lanes as the number of lanes is

commonly found on a highway. The model constructed is used to evaluate the

flow and distribution of users. For example, a car (user) is prohibited to jump

its position such as from lane number 1 to lane number 3.

b. The performance evaluation of users’ mobility behavior using pattern approach

and graph theory.

Highway users have limitation in terms of exchange of direction. The change

is only possible when the user speed up or slow down by moving vehicles into

lanes that are available. To identify the characteristics of mobility in highway

user behavior, a pattern that occurs can be studied using graph theory.

c. The performance evaluation of dynamic location management schemes.

LU and paging operations are the main activities to evaluate based on the

proposed schemes. The cost of conventional mechanism results are analyzed

and compared to fuzzy logic.

d. The cost optimization of using fuzzy logic technique in location management.

Page 27: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

10

To optimize the cost result, fuzzy logic technique is selected and used to

evaluate the location management cost.

1.6 THESIS ORGANIZATION

In this chapter, a brief overview of cellular technology and market is introduced. At a

glance, the concept mobility management is described. The research objective and

scope are addressed in this thesis. Chapter 2 discusses the procedures involved in

location management, both in general terms, and as implemented in the 2G

technology, GSM, and 3G. Also mobility modeling, the previous work on location

management is reviewed. The advantages and disadvantages of various approaches

are discussed. Two tasks of location management, location update and paging, and

their related schemes, fuzzy technique are discussed. Methodology, the proposed and

tested mobility model: street lane mobility and random walk mobility are explained in

Chapter 3. In this thesis, the direction of user mobility is chosen randomly with the

probability 0.25. These direction choices represent to the real street model which a

vehicle can be moved forward, backward, turn right or left. For street lane mobility

model, a vehicle in the highway or street with 3 lanes can change or shift to a level up

or down only. The proposed mobility models are the basis of the simulation study and

then implemented to compute the location management cost using conventional

mechanism and then compare to the proposed fuzzy logic technique. In Chapter 4, the

result from the simulation study are presented and analyzed. Graph theory analysis

and fuzzy logic results are presented in Chapter 5. Finally, the performance of the

simulation result in location management and user behaviour including fuzzy logic

result will be summarizing in the Chapter 6.

Page 28: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

CHAPTER II

LITERATURE REVIEW

2.1 INTRODUCTION

In this chapter, background of cellular technology evolution, 2G and 3G radio network

systems, mobility management including network and location management, calling and

signaling process will be presented. 1G is outdated technology and no longer in operation.

Now, 2G and 3G technology is available. 2G technology is in the mature cycle and still

exists at the moment. This network was built mainly for voice services and slow data

transmission while 3G network technology provides fast data transmission which vastly

increases quality of service run on the 3G networks. Many mobility models and location

management schemes for wireless technology will be reviewed. Graph theory and

optimization techniques such as fuzzy logic, genetic algorithm, neural network technique

which use in many application also will be described.

2.2 CELLULAR TECHNOLOGY EVOLUTION AND NETWORK

The development and history of the cellular technology has seen a tremendous number of

changes since the first cellular telephones were introduced. The main development that

distinguished the first generation cellular phones from the previous generation was the

use of multiple cell sites, and the ability to transfer calls from one site to the next as the

user travelled between cells during a conversation. The early cellular telephones were

very large and could certainly not be placed in a pocket like the handphones of today.

Page 29: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

12

The idea of the first cellular network was brainstormed in 1947. It was proposed

to be used for military purposes as a way of supplying troops with more advanced forms

of communications (Kaul et al. 2008). In the 1960s, a new system launched by Bell

Systems, called Improved Mobile Telephone Service (IMTS) was introduced. In 1979,

Japan was the first country in the world operated cellular system and then followed by

some European countries. All the first European cellular systems are generally

incompatible with one another because of the different frequencies and communication

protocols used. Later, these systems are replaced by the Pan European digital standard as

the 2G technology which was first deployed in 1990 which all of Europe dedicated for

cellular telephone service (Maloberti 1989). The 2G technology offered a more attractive

package to buy, besides the traditional voice service, provided some data services and

more supplementary services. The 3G technology comes to market and is expected to

complete the globalization of mobile communication. The first pre-commercial 3G

network was launched by NTT DoCoMo in Japan branded FOMA, in May 2001 on a pre-

release of Wide Code Division Multiple Access (WCDMA) technology (Anon 2005). The

second network to go commercially live was by SK Telecom in South Korea on the

1xEV-DO technology in January 2002. By May 2002, the second South Korean 3G

network was by KT on EV-DO and thus the Koreans were the first to see competition

among 3G operators. In Europe, 3G networks were launches in Italy and the UK by the

Three/Hutchison group, based on WCDMA. In the mid 2000s, an evolution of 3G

technology was implemented, namely High-Speed Downlink Packet Access (HSDPA). It

is an enhanced 3G cellular technology communications protocol in the High-Speed

Packet Access (HSPA) family, also coined 3.5G, 3G+ or turbo 3G, which allows

networks based on Universal Mobile Telecommunications System (UMTS) to have

higher data transfer speeds and capacity. The 3G technology provided better quality,

faster connectivity and higher capacity at lower cost to consumers. The trend is that 3G

will mostly be based on GSM technical solutions for two reasons: GSM technology

dominates the market and the great investment made in GSM should be utilized as much

as possible (Kaaranen et al. 2005).

Page 30: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

13

2.2.1 CELLULAR TECHNOLOGY EVOLUTION

There was an enormous variety of the First Generation (1G) systems that were

introduced. In this era, there were three dominating automatic systems for mobile

communications in the world: Advanced Mobile Phone Service (AMPS) in the US, Total

Access Communication System (TACS) in the UK and Ireland, and Nordic Mobile

Telephony (NMT) in Finland and Sweden. In the first generation, traffic was highly

unbalanced. Less than one third of calls were incoming calls, the remaining were

outgoing (Tabbane 1997).

In 1981, the first multinational cellular service has introduced in Europe when

the Nordic Mobile Telephone System or NMT450 began operating in Denmark, Sweden,

Finland, and Norway in the 450 MHz range (Nack 2003). Around this era, some

European countries have their own system and incompatible to others. Europeans quickly

realized the disadvantages of each European country operating on their own mobile

network. Later, a new plan to create a single European wide digital mobile service with

advanced features and easy roaming was started. The technology named as Global

Systems Mobile Telecommunications that later known as one of the 2G. The acronym

GSM had been changed from Groupe Spéciale Mobile. GSM was an all digital system

that started new from the beginning. By April of 1991 commercial service of the GSM

network had begun. Just a year and half later in 1993 there were already 36 GSM

networks in over 22 countries (Déchaux & Scheller 1993). It was a remarkable

technology step in many sense. First, it was the first technology that was properly

specified before implementation. Second, compared with analogue radio technologies,

GSM radio was designed in such a way to provide more capacity and features. In GSM

technology, roaming capability is introduced and offered which bounded by an agreement

between parties. Roaming is a general term referring to the extension of connectivity

service in a location that is different from the home location database where the service

was registered. Roaming ensures that the cellular device is kept connected to the network,

without losing the connection. This feature is not available in the first cellular generation.

Page 31: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

14

The 2G cellular technologies can be divided into Time Division Multiple Access

(TDMA) and Code Division Multiple Access (CDMA) standards depending on the type

of multiplexing used. It allows slow data communications, but its primary focus is voice.

Among the 2G cellular technology, GSM which is TDMA-based has shown a very wide

acceptance in terms of world market penetration and subscriptions.

In 2G, the operators have evolved their systems to support the transmission of

data. Three different upgrade path have been developed for GSM carriers, and two of this

solutions also support IS-136. In US, TDMA standard with digital control channel is

termed as IS-136 (Ojanperä & Prasad 2001). Another previous standards are IS-54, IS-41,

and IS-95. The three TDMA upgrade options include: High Speed Circuit Switched Data

(HSCSD), General Packet Radio Service (GPRS), and Enhanced Data Rates for Global

Evolution (EDGE). These options provide significant improvements in Internet access

speed over today’s GSM and IS-136 technology. GPRS system is known as 2.5G and has

enabled operators to offer services in a more efficient form. This new technology makes it

possible for users to make telephone calls and transmit data at the same time.

Theoretically, GPRS terminals can provide up to 150-170 kbps data speeds downstream,

but realistically they only can serve with a maximum downstream speed of 50 kbps and

upstream 10-28 kbps. For EDGE technology increase the transmission rate up to 384

kbps. In some instances EDGE (2.75G) evolution systems may also be known as

Enhanced General Packet Radio Service (EGPRS) systems. The cellular technology

evolution is shown in Figure 2.1.

Page 32: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

15

Figure 2.1 Cellular technology evolution

Source: Prasad & Ruggeiri 2003

A common, global mobile communication system naturally creates a lot of

political desires. In the case of 3G, this can be seen even in the naming policy of the

system. The most natural term is “third generation” (3G). In different parts of the world,

different issues are emphasized and, thus, the global term 3G has a regional synonym. In

Europe, 3G has become Universal Mobile Telecommunications System (UMTS). In

Japan and the US, the 3G system often carries the name IMT-2000. This name is a family

of standards for mobile telecommunications defined by the International

Telecommunication Union (Smith & Collins 2000). In the US, the CDMA2000 is also an

aspect of 3G cellular systems and represents the evolution from the IS-95 system. The

cellular technology and cellular standards evolution as shown in Figure 2.2.

Page 33: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

16

Figure 2.2 Cellular standards evolution

Source: Ames & Gabor 2000

2.2.2 2G NETWORKS ARCHITECTURE

Global System for Mobile Communications technology has become by far the most

successful 2G standard. The architecture of 2G technology is similar to the 1G system.

The GSM network architecture is organized as a multi-tiered hierarchical structure and

can be divided into two main subsystems: Network Switching Subsystem (NSS) and Base

Station Subsystem (BSS) as shown in Figure 2.3. The main element in the NSS is the

Mobile Switching Center (MSC), which contains the Visitor Location Register (VLR),

Home Location Register (HLR), and Authentication Center (AuC). The NSS is the

component of a GSM system that carries out call switching and mobility management

functions for mobile phones roaming on the network of base stations. It is owned and

deployed by mobile phone operators and allows mobile devices to communicate with

each other and telephones in the wider Public Switched Telephone Network (PSTN). The

MSC represents the edge toward the BSS and on the other side as Gateway MSC

(GMSC), the connection point to all external networks, such as the PSTN or Integrated

Services Digital Network (ISDN). GSM is a circuit-switched network, which means that

there are two different types of physical links to transport control information (signaling)

and traffic data (circuit).

Page 34: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

17

Figure 2.3 GSM network architecture

Source: Kreher & Rüdenbusch 2005

In GSM, it is distinguished between cells and location areas. A cell is defined as

the area in which one can communicate with a certain base station. In other words, the

cell is related to the Base Station (BS). Cell coverage is formed by an antenna structure,

but the traffic within a cell is maintained by transceiver. The minimum number of

transceiver in a cell is one and the maximum implementations is four to six tranceiver per

cell (Kaaranen et al. 2005). By using multiple cells, a single network can handle a large

amount of simultaneous users on an otherwise limited number of radio frequencies. Based

on cell coverage, cell can be divided into Pico, Micro, Macro and Mega cell. Cell area

types are depicted in Figure 2.4.

Page 35: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

18

Figure 2.4 Cell coverage area types

Source: Akyildiz et al. 1998

2.2.3 3G NETWORKS ARCHITECTURE

The area of 2G will be continuously used in UMTS. A new group of locations specifying

the UTRAN Registration Areas (URAs) is configured in UMTS Terrestrial Radio Access

Network (UTRAN) as shown in Figure 2.5. These areas will be smaller Routing or LAs

and will be maintained by UTRAN itself. The different areas are used for mobility

management tasks such as Location Update and Paging procedures.

Figure 2.5 UMTS areas

Source: Kreher & Rüdenbusch 2005

Page 36: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

19

The UMTS basically contains four logical definitions:

a. Location Area

A location area is a set of cells throughout which a mobile or User Equipment (UE)

will be paged. The LA consists of cells: the minimum is one cell and the maximum is

all the cells under one VLR. A LA is defined as the area associated with one VLR. On

networks where there is a one-one mapping between MSCs and VLRS, the LA

corresponds to the area controlled by one MSC. On a change of LA, the UE need to

perform a location update in order to register its presence in the new VLR and erase

its presence in the old VLR. In this case, the HLR also needs to be updated. If the UE

is engaged in communication, a handoff must be performed between the different

MSCs. Note that handoff between MSCs belonging to different network-providers is

impossible.

The LA is identified by the Location Area Identity (LAI) within an active area and

consists of Mobile Country Code (MCC), Mobile Network Code (MNC), and

Location Area Code (LAC). The MCC and MNC have the same format as in the IMSI

(International Mobile Subscriber Identity) number. The IMSI acts as a unique

database search key in the HLR, VLR, AuC and Serving GPRS Support Node

(SGSN) as depicted in Figure 2.6. When the MS is roaming outside the home

network, the visited serving network is able to recognize the home network by

requesting this unique number.

Page 37: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

20

Figure 2.6 International mobile subscriber identity

Source: Kaaranen et al. 2005

MCC and MNC numbering use the ITU E.212 standard (ITU 2008). For example,

MCC and MNC of network operators are shown in Table 2.1.

Table 2.1 MCC, MNC, and network operators

Country

Code

MCC MNC Network Operator Country

60 502 12 Maxis Malaysia

60 502 16 Digi Malaysia

60 502 19 Celcom Malaysia

62 510 01 Indosat (Satelindo) Indonesia

62 510 10 Telkomsel Indonesia

62 510 11 Excelcom Indonesia

62 510 21 Indosat-M3 Indonesia

Source: ITU 2008

Page 38: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

21

MSIN is the Mobile Subscriber Identity Number that consists of 9 to10 digits (this

number is stored in the USIM card). The LAC is just a number identifying a LA.

The LAI is a globally unique number and within the same network the same LAC

should clearly not be repeated as a single VLR or cannot handle duplicate LAC.

The UE listens to the LAI(s) from the Broadcast Channel (BCH). For example, in

Indonesia, Telkomsel’s subscriber, MCC will be 510, MNC will be 10, and MSIN

can be unique number of 10 bit long, like 8126900406. So the number will be

MCC+MNC+MSIN = 510108126900406. This IMSI number, 510108126900406

then corresponding E.214 address will be formed by replacing MCC (510) by

Indonesia Country Code (CC), (62) and replacing MNC, (10) with National

Destination Code (NDC), (812) and keeping MSIN as is (as long as it is less than

equal to 15 digits). This number follows the ITU-T recommendation E.164 (ITU

2010) and ITU-T recommendation E.214 on numbering (ITU 2005). The IMSI

and LAI structure are shown in Figure 2.7 and Figure 2.8.

Figure 2.7 Structure of international mobile subscriber identity

Source: ITU 2008

Figure 2.8 Structure of location area identity

Source: ITU 2008

Page 39: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

22

b. Routing Area

One or more Routing Area (RA) is controlled by the SGSN. Each UE informs the

SGSN about the current RA. RAs can consist of on one or more cells. Each RA is

identified by a Routing Area Identity (RAI). The RAI is used for paging and

registration purposes and consists of LAC and Routing Area Code (RAC)

The main radio 3G technology employed in UMTS is WCDMA whose variants

Frequency Division Duplex (FDD) and Time Division Duplex (TDD) were selected by

the European Telecommunications Standard Institute (ETSI) in 1998. Although, just like

traditional CDMA, the spread spectrum forms the underlying technique for WCDMA but

employing a different control channel and signaling of 3G systems, it is significantly

different from its counterpart. 3G systems promise faster communications services,

including voice, fax and Internet, anytime and anywhere with seamless global roaming.

In 3G technology, the networks have been developed in many release versions

since 1999. Figure 2.9 shows the basic structure of a UMTS Release 99 network. It

consists of two different radio access parts BSS and UTRAN and the Core Network (CN)

parts for circuit-switched and packet-switched applications. Release 99 (sometimes also

named Release 3) specifies the basic requirements to roll out a 3G UMTS RAN. All the

following release introduces a number of features that allow operators to optimize their

networks and to offer new services.

Page 40: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

23

Figure 2.9 UMTS release 99 network architecture

Source: Kreher & Rüdenbusch 2005

3GPP Release 4 introduces some major changes and new features in the CN

domains and the GPRS/EDGE Radio Access Network (GERAN), which replaces GSM

BSS, as shown in Figure 2.10. Some of the major changes are separation of transport

bearer and bearer control in the CS-CN and introduction of new interfaces in CS- CN.

The main trend in Release 4 is the separation of control and services of CS connections

and at the same time the conversation of the network to be completely IP-based. In CS

CN, the user data flow will go through Media Gateway (MGW), which are elements

maintaining the connection and performing switching functions when required.

Page 41: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

24

Figure 2.10 UMTS release 4

Source: Kreher & Rüdenbusch 2005

In 3GPP Release 5, all traffic incoming from UTRAN is designed to be IP-based.

By changing GERAN, the BSC will be able to generate IP-based application packets. In

this released, all interfaces will be IP-based rather than ATM-based. The databases known

from GSM/GPRS will be centralized in a Home Subscriber Server (HSS). In UMTS

Release 6, major improvements are made such as UMTS/WLAN Internetworking, IMS

“phase 2”, Push-to-Talk service, Packet-Switched Streaming Services (PSS), Multimedia

Broadcast and Multicast Service (MBMS), Network Sharing, Presence Service, and the

definition of various other new multimedia services. The UMTS development, at this

moment has reached Release 10.

In 3G network, two new network elements are introduced in UTRAN: Radio

Network Controller (RNC) and Node B. UTRAN as shown in Figure 2.11 is subdivided

into individual Radio Network Subsystem (RNS), where an RNC controls each RNS. The

RNC is connected to a set of Node B elements, each of which can serve one or several

Page 42: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

25

cells. RNC controls usage and reliability of radio resources. Existing GSM network

elements, such as MSC, HLR, and SGSN, can be extended to adopt UMTS requirements.

RNC will become the replacement for BSC, and Node B fulfills nearly the same

functionality as BTS.

Figure 2.11 UTRAN architecture

Source: Kreher & Rüdenbusch 2005

2.3 RADIO RESOURCE MANAGEMENT

Radio Resource Management (RRM) is a system level control of co-channel interference

and other radio transmission characteristics in wireless communication systems, for

example cellular networks, wireless networks and broadcasting systems. RRM involves

strategies and algorithms for controlling parameters such as transmit power, channel

allocation, handover criteria, modulation scheme, error coding scheme, etc. Static RRM

involves manual as well as computer aided fixed cell planning or radio network planning.

Static RRM schemes are used in many traditional wireless systems, for example 1G and

2G cellular systems. Dynamic RRM schemes adaptively adjust the radio network

parameters to the traffic load, user positions, quality of service requirements, etc.

Page 43: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

26

Dynamic RRM schemes are considered in the design of wireless systems, in view to

minimize expensive manual cell planning and achieve "tighter" frequency reuse patterns,

resulting in improved system spectral efficiency. Some schemes are centralized, where

several base stations and access points are controlled by a RNC. Others are distributed,

either autonomous algorithms in mobile stations, base stations or wireless access points,

or coordinated by exchanging information among these stations.

Gelabert et al. (2005) stated that RRM functions can be implemented in many

different algorithms which impacting on the overall system efficiency and on the operator

infrastructure cost. Additionally, RRM strategies are not subject of standardization, so

that they can be a differentiation issue among manufacturers and operators. RRM

strategies of legacy networks (GSM/GPRS) are of rather low dimensionality, such as only

a few parameters are needed to tune their optimality. In the case of UTRAN, it ought to

be mandatory to increase and harmonies the general knowledge on WCDMA RRM

strategies as long as multiple dimensions appears in the problem.

2.3.1 Cellular Network Database

In 2G and 3G cellular network, two-level hierarchy of databases, HLR and VLR are used

to record user’s data as shown in Figure 2.12. A HLR acts as the primary database

repository for subscriber information used to provide control and intelligence. HLR

subscriber information includes the IMSI, service subscription information, location

information (the identity of the currently serving VLR to enable the routing of mobile-

terminated calls), service restrictions and supplementary services information. The HLR

handles Signaling System Number 7 (SS7) transactions with both MSCs and VLR nodes,

which either request information from the HLR or update the information contained

within the HLR. SS7 is an out-of-band signaling system for the exchange of call control

information between network switching offices, in support of voice and non voice

services. When a user subscribes to the service, a permanent record is created in HLR.

The number of the records in the HLR is the number of the subscribers in the system. The

HLR also initiates transactions with VLRs to complete incoming calls and to update

Page 44: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

27

subscriber data. Traditional wireless network design is based on the utilization of a single

HLR for each wireless network, but growth considerations are prompting carriers to

consider multiple HLR topologies.

Figure 2.12 Two-level hierarchy of databases: HLR and VLR

Source: Bejerano 2000

A VLR is a database which contains temporary information concerning the

mobile subscribers that are currently located in a given MSC serving area, but whose

HLR is elsewhere. When a mobile subscriber roams away from his home location and

into a remote location, SS7 messages are used to obtain information about the subscriber

from the HLR, and to create a temporary record for the subscriber in the VLR. Normally,

the capacity of a VLR is much smaller than that of a HLR. For example, the capacity

of a typical VLR in Taiwan is around 250,000 to 500,000 records, and the typical

size of an HLR in Taiwan is around a million records (Lin 2001). The VLR may over

flow if too many mobile users move into the LA in some time periods.

Page 45: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

28

2.3.2 Calling Process

Unlike routing in a fixed network, where a terminal is wired to a central office, in

wireless technology, GSM and 3G users can roam nationally and even internationally.

The directory number dialed to reach a mobile subscriber is called the Mobile Subscriber

ISDN (MSISDN), which is defined by the E.164 numbering plan (ITU 2010). This

number includes CC and NDC which identifies the subscriber's operator. The first few

digits of the remaining subscriber number may identify the subscriber's HLR within the

home PLMN (Public Land Mobile Network).

When a mobile subscriber roams into a new location area (new VLR), the VLR

automatically determines that it must update the HLR with the new location information,

which it does using an SS7 Location Update Request Message. Then Location Update

Message is routed to the HLR through the SS7 network, based on the global title

translation of the IMSI that is stored within the SCCP Called Party Address portion of the

message. Signaling Connection Control Part (SCCP) is a routing protocol in SS7 protocol

suite in layer 4. The HLR responds with a message that informs the VLR whether the

subscriber should be provided service in the new location. Having determined the

appropriate HLR address, the MSC sends a routing information request to it.

When the HLR receives the Routing Information Request, it maps the MSISDN to

the IMSI, and ascertains the subscribers' profile including the current VLR at which the

subscriber is registered. The HLR then queries the VLR for a Mobile Station Roaming

Number (MSRN). The MSRN is essentially an ISDN telephone number at which the

mobile subscriber can currently be reached. The MSRN is a temporary number that is

valid only for the duration of a single call. The HLR generates a response message, which

includes the MSRN, and sends it back across the SS7 network to the MSC. Finally, the

MSC attempts to complete the call using the MSRN provided. As shown in Figure 2.13,

the most general routing procedure begins with the GMSC (Gateway Mobile Switching

Center) querying the called subscriber's HLR for an MSRN.

Page 46: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

29

Figure 2.13 Call routing for a mobile terminating call

Source: Anon 2006

2.3.3 Signaling Process

As the number of subscribers increases given a fixed radio spectrum allocation, in order

to accommodate the higher subscriber densities, more signaling consumes scarce radio

bandwidth. To achieve and minimize signaling activities, a set of procedures of mobility

tracking is performed which its main goal is to locate mobile user. In 3G network, if a UE

is switched on for the first time in a cell of the UMTS network it starts to perform the

following initial UE Radio Access procedure that can be described in four steps as shown

in Figure 2.14 (Kreher & Rüdenbusch 2005).

a. UE reads the Primary Synchronization Channel (PSCH), which is not scramble

and spread by a predefined spreading code. By reading this, the UE becomes time

synchronic with the Node B.

b. UE reads the Secondary Synchronization Channel (SSCH), which is also not

scrambled. The SSCH will transmit five hex values, which come out of a table. By

reading these values the UE will synchronize its frame to Node B and will get the

scrambling group of the actual used Node B.

Page 47: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

30

c. UE can now read the Common Pilot Channel (CPICH), which is scrambled with

one of eight primary scrambling codes of the scrambling group. It is a matter of

trial and error to find the correct code.

d. UE will read the Common Control Physical Channel (CCPCH), which uses the

same scrambling code as the CPICH, to get detailed information about UTRAN

and the CN, to allow the Primary Common Control Physical Channel (P-CCPCH)

to transport the BCH, and to be able to get paged, and to allow the S-CCPCH to

transport PCH. The system information in the BCH will also indicate the

secondary scrambling code of the actual Node B for further data transmission on

the Dedicated Transport Channels (DCH).

Figure 2.14 Initial UE radio access

Source: Kaaranen et al. 2005

The transition to the UTRAN Connected Mode from the Idle Mode can only be

initiated by the UE by transmitting a request for an RRC connection. The event is

triggered either by a paging request from the network or by a request from higher layers

in the UE. When the UE receives a message from the network that confirms the RRC

connection establishment, the UE enters the CELL_FACH or CELL_DCH state of

Page 48: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

31

UTRAN Connected mode. In case of a failure, to establish the RRC Connection, the UE

goes back to Idle Mode. The possible causes are radio link failure, a received reject

response from the network, or lack of response from the network (time out).

2.3.4 Connected Mode Status

The CELL_DCH state is shown in Figure 2.15 and charaterized by the following (Kreher

& Rüdenbusch. 2005):

a. A dedicated physical channel is allocated to the UE in uplink and downlink

b. Common/shared channels might be configured

c. The UE is known on cell level according to its current active set

d. Soft and Hard handover might be initiated

e. No cell update or URA update is initiated by the UE

f. The UE sends measurement reports to RNC according to the RNC setup

g. The UE can use DCH, downlink and uplink (TDD) shared Transport Channels

(TCH), and a combination of three transport channels.

Figure 2.15 UTRAN - connected mode states

Source: Kreher & Rüdenbusch 2005

Page 49: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

32

The CELL_DCH state is entered from the Idle Mode through the setup of an RRC

connection, or by establishing a dedicated physical channel from the CELL_FACH state.

The CELL_FACH state is characterized by the following:

a. No dedicated physical channel is allocated to the UE

b. The UE continuously monitors a FACH in downlink

c. The UE assigned a default common or shared transport channel in the uplink (e.g.

RACH or CPCH) that it can use anytime according to the access procedure for

that transport channel

d. No Soft or Hard handover might be initiated

e. UTRAN knows the position of the UE on the cell level according to the cell where

the UE last made a cell update

f. The UE performs Cell Updates, but no URA updates

g. In TDD mode, one or several USCH or DSCH transport channels may have been

established

In the CELL_FACH sub-state, the UE performs the following actions:

a. Listen to all FACHs in the cell

b. Listen to the BCH transport channel of the serving cell for the decoding of system

information messages

c. Initiates a cell update procedure on cell change of another UTRA cell

d. Transmits uplink control signals and small data packets on the RACH

The CELL_PCH state is characterized by the following:

a. No dedicated physical channel is allocated to the UE

b. UE selects a PCH with an algorithm and uses DRX for monitoring the selected

PCH via associated PICH

c. DCCHs/DTCHs are configured but cannot be used

d. No Soft or Hard handover might be initiated

e. No uplink activity is possible (state change to Cell_FACH is needed)

f. The UE performs Cell Updates, but no URA updates

Page 50: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

33

g. Position of the UE is known by UTRAN on the cell level according to the cell

where the UE last made a cell update in the CELL_FACH state

h. The UE sends Measurement Reports to RNC according to the RNC setup

In the CELL_PCH state the UE performs the following actions:

a. Monitor the paging occasions according to the DRX cycle and receive paging

information on the PCH

b. Listen to the BCH transport channel of the serving cell for the decoding of system

information messages

c. Initiates a cell update procedure on cell change

The DCCH logical channel cannot be used in this state. If the network wants to

initiate any activity, it needs to make a paging request on the PCCH logical channel in the

known cell to initiate any downlink activity.

The URA_PCH state is characterized by the following:

a. No dedicated channel is allocated to the UE

b. UE selects a PCH with an algorithm and uses DRX for monitoring the selected

PCH via an associated PICH

c. UE monitors Downlink PICH/PCH

d. No uplink activity is possible (state change to CELL_FACH is needed)

e. DCCHs/DTCHs are configured but cannot be used

f. Location of the UE is known on the URA level according to the URA assigned to

the UE during the last URA update in CELL_FACH state

In the URA_PCH state the UE performs the following actions:

a. Monitor the paging occasions according to the DRX cycle and receive paging

information on the PCH

b. Listen to the BCH transport channel of the serving cell for the decoding of system

information messages

c. Initiates a URA updating procedure on URA change

Page 51: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

34

The DCCH logical channel cannot be used in this state. If the network wants to

initiate any activity, it needs to make a paging request on the PCCH logical channel

within the URA where the location of the UE is known. If the UE needs to transmit

anything to the network, it goes to the CELL_FACH state. The transition to URA_PCH

state can be controlled with an inactivity timer, and optionally, with a counter, which

counts the number of cell updates. When the number of cell updates has exceeded certain

limits (a network parameter), the UE will change to the URA_PCH state. URA updating

is initiated by the UE, which, upon the detection of the Registration Area, sends the

network the Registration Area update information on the RACH of the new cell.

In Figure 2.16 shows an example of RRC Signaling Connection that consists of

four main transactions:

a. The Initial Direct Transfer procedure is used in the uplink to establish signaling

connections and signaling flows. It is also used to carry the initial higher layer,

Non Access Stratum (NAS) messages over the radio interface. A signaling

connection comprises one or several signaling flows. This procedure requests the

establishment of a new flow, and triggers, depending on the routing and if no

signaling connection exists for the chosen route for the flow, the establishment of

a signaling connection.

b. The Downlink Direct Transfer procedure is used in the downlink direction to carry

higher layer (NAS) messages over the radio interface.

c. The Uplink Direct Transfer procedure is used in the uplink direction to carry all

subsequent higher layer (NAS) messages over the radio interface belonging to a

signaling flow.

d. The Signaling Connection Release request procedure is used by the UE to request

from the UTRAN that one of its signaling connections should be released. The

procedure may, in turn, initiate the signaling flow release or RRC connection

release procedure.

Page 52: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

35

Figure 2.16 RRC signaling connection (message flow)

Source: Kreher & Rüdenbusch 2005

2.4 MOBILITY MANAGEMENT

Mobility Management (MM) is one of the major functions of a GSM or a UMTS network

that allows mobile phones to work. Mobility management is the process of keeping track

of and locating users so that calls arriving for them can be directed to their current

location (Brown & Mohan 1997). In GSM networks, MM is completely handled between

the MS and the Network Sub System (NSS). In UMTS networks, most MM functions are

handled equally between the UE and the CN (Kaaranen et al. 2005). The RNC partially

handles the UE’s movement within the RAN, using RRC procedures for this purpose. The

MM activities handled by the RNC are cell and URA updates.

The MM layer is built on top of the Radio Resource (RR) layer, and handles the

functions that arise from the mobility of the subscriber, as well as the authentication and

security aspects. Akyildiz et al. (1999) present a very comprehensive survey on all

aspects of mobility management. Fang & Ma (2004) have highlighted some schemes

related to mobility management such as IS-41 scheme, movement-based mobility

Page 53: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

36

management, pointer forwarding scheme, two-level pointer forwarding scheme, two

location algorithm, location anchoring scheme, and location profile based scheme. Sun

and Sauvola (2002) discusses the effects of mobility on both the architectures and

protocols for network communications

Mobility is a change of position that does not entail a change of location or the act

of changing location from one place to another, for example, the movement of people

from the farms to the cities. In general, mobility capability is the main service feature in

modern mobile or cellular communication and can be classified into terminal and user

mobility. Evaluation studies involve the consideration of user mobility behavior;

therefore, the accuracy of the results heavily depends on the assumed mobility models.

Mobility modeling approaches in literatures can be divided into analytical models and

computer simulation studies. Reseachers use analytical model, based on simplifying

assumption, may provide useful conclusions regarding critical network dimensioning

parameters (Markoulidakis & Sykas 1995, Madhavapeddy 1994, Hong & Rappaport

1986) and more realistic analytical model studies indicate that closed form solutions can

be derived for simple cases only (for example highways at free flow) (Frullone et al.

1992, Seskar et al. 1992). Mobility modeling is involved in the analysis of

(Markoulidakis et al. 1997):

a. Aspects related to location management (such as location area planning and

paging strategies)

b. Aspects related to radio resource management (such as multiple access technique

and channel allocation schemes)

c. Aspects related to propagation (such as fading and handoff decisions)

2.4.1 Mobility Models in Cellular System

In mobile communication, mobility modeling is involved in several aspects related to

signaling and traffic analysis (Markoulidakis et al. 1997). Mobility models play a key role

in studying different mobility management features such as registration, paging, handoff,

and database approaches. A mobility model with minimum assumptions and simple to

Page 54: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

37

analyze will be very useful under such circumstances (Chiang & Senoy 2004). Mobility

modeling is used in simulation attempt to portray the user mobility behavior and mobility

model should attempt to mimic the movement of real MSs. Choosing an appropriate

mobility model may not be a simple task. Bettstetter (2001) described a concept map

illustrating some criteria which can be for categorization mobility models as shown in

Figure 2.17. The shaded block, mobility model and border behavior model will be

implemented in this thesis simulation.

In mobility perspective, MS changes speed and direction. MSs are generated and

simulated not to travel in straight lines at constant speed throughout the course of the

entire simulation. In real situation, the direction of travel must change before reaching the

end destination. The speed of each interval must occasionally change and may even

decrease to zero. This chapter, only describe mobility models for cellular environment to

represent MSs movement.

Figure 2.17 A concept map of mobility models

Source: Bettstetter 2001

Page 55: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

38

Mobility models are classified into two categories (Madany et al. 2009). The first

category is called entity mobility models, where all nodes in the system move

independently from each other. The second category is called group mobility models,

where sets of nodes move as groups. As noted in Hong et al. (1999), cellular mobility

models focus their attention on individual movements. Rarely do more complicated issues

such as group movement come into play. As a result, in cellular mobility models:

Random Walk Model, Constant Velocity Fluid-Flow Model, and Random Gauss-Markov

Model are very common to test the behavior of cellular strategies. Madany et al. (2009)

characterize mobility models and have reviewed as shown in Table 2.2. In attribute to be

added column show some possibility to improve the model.

Table 2.2 Mobility model matching real-world

Real-world deployment

Best model to be used

Attribute to be added

Airport Random Waypoint Long and short pause time

Speed and direction dependency

Boundary handling

Campus Trace-base model for Darmouth College

Long and short pause time

City Section City section model Long and short pause time Freeway Freeway model Conference room

Obstacle mobility model

Group Long and short pause time

Path

Source: Madany et al. 2009

2.4.2 Random Walk Mobility Model

The Random Walk Mobility Model (RWMM) has proven to be one of the most widely

used because it describes individual movements relative to cells (Bar-Noy et al. 1994,

Rubin & Choi 1997, Zonoozi & Dassanayake 1997). Many entities in nature move in

extremely unpredictable ways. Specifically, in this model, a MS moves from its current

location to a new location by randomly choosing a direction and speed in which to travel.

Page 56: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

39

The RWMM as a memoryless mobility pattern has been described by Haas and Liang

(1999) because it retains no knowledge concerning its past location and speed values.

This characteristic inhibits the practicality of the RWMM because MSs typically have a

pre-defined destination and speed in mind, which in turn affects future destinations and

speeds. The new speed and direction are both chosen from pre-defined ranges, [speedmin,

speedmax] and [0, 2π] respectively. Each movement in random walk mobility model

occurs in a constant time interval t, at the end of which a new direction and speed are

calculated.

Many derivatives of the RWMM have been investigated including one-

dimensional, two-dimensional, three-dimensional, and d-dimensional random walks. In

1921, Polya proved that a random walk on a one or two-dimensional lattice returns to the

origin with a probability of 1.0 (Weisstein 2009). This characteristic ensures that the

random walk precisely represents a mobility model that test the movements of entities

around their starting points, without worry of the entities wandering away never to return.

Unfortunately, the simplicity of the RWMM is not always sufficient to produce realistic

results in our complex world.

In a 1-D RWMM, we imagine a gymnast standing in the middle of an infinitely

long balance beam. Given the results of a coin flip, the gymnast moves in a particular

direction at a random speed for time period, t. For example, if the coin flip results in head,

the gymnast moves to the right at the ramdomly chosen speed. In contrast, if the coin flip

results in tail, the gymnast moves to the left. After repeating this pattern for a large

number of times, a 1-D random walk is mapped.

In a 2-D RWMM, we visualize the same gymnast moving on a plannar surface.

For example, using a similar method as that mentioned in the 1-D random walk model,

we generate a 2-D model. Specifically, instead of visualizing a gymnast on a balance

beam we expand our environment to include an infinite floor mat. Instead of flipping a

coin, the gymnast uses a spinning ball. After spinning the dial, the gymnast moves in the

direction pointed to by the needle at a random speed for time t. In doing so, the gymnast

Page 57: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

40

randomly moves around a 2-D surface thus creating a 2-D random walk. Figure 2.18

shows an example of the movement observed from a 2-D model. In special case of

RWMM, a MS no longer travels for a constant time period t before changing direction. A

modified 2-D model that MS changes direction after travelling a specified distance is

illustrated in Figure 2.18.

Figure 2.18 Random walk mobility model

2.4.3 Fluid Flow Mobility Model

According to Lam et al. (1997), Fluid Flow Mobility Model (FFMM) describes

macroscopic movements instead of individual or microscopic movements. The behavior

of the generated traffic is similar to fluid or water flowing through a pipe. As a result, the

FFMM best represent traffic on highways and other similar situations with a constant

flow of MSs. In other word, the model is unable to accurately represent the movements of

individual MSs. As an example, a deterministic FFMM is used in Leung et al. (1994) to

represent the behavioral characteristic of traffic on a one-way, semi-infinete highway.

Hać and Sheng (1996) studied the influence of user movement of database placement

using fluid flow mobility model. Cars enter dan exit the highway at various locations.

Haas and Liang (1999) confirms that the FFMM is insufficient for individual movement

including stopping and starting, action commonly associated with an individual walking

around town or from class to class.

Page 58: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

41

2.4.4 Random Gauss-Markov Model

The Random Gauss-Markov Model (RGMM) is a model that uses one tuning

parameter to vary the degree of randomness in the mobility pattern (Madany et al.

2009). RGMM was introduced in order to circumvent the unsiderable results as

mentioned in RWMM and FFMM. Liang and Haas (2003) stated that Gauss–Markov

model represents a wide range of user mobility patterns, including, the random-walk and

the constant velocity fluid-flow models. Gauss–Markov model captures the essence of the

correlation of a mobile’s velocity in time. Li, et al. (2006) propose a Gauss–Markov

process based fluid model that it is suitable for both vehicle traffic on highways and

pedestrian in street. In the RGMM, the velocity of a MS at time is given by the equation:

�� � �. ���� � �1 � � � √1 � ��. ���� (2.1)

where a is the tuning parameter used to vary the randomness, µ is a constant representing

the mean value of νn as n → ∞, and χn-1 is a random variable from a Gaussian distribution.

Totally random values are obtained by setting a = 0 and linear motion is obtained by

setting a = 1. Intermediate levels of randomness may be obtained by varying the value of

a between 0 and 1 (Tolety 1999). Further, the displacement of a MS is given by the

equation � � ∑ �����

��� . By allowing past velocities and directions to influence future

velocities and directions, the RGMM eliminates the problems encountered in the RWMM

and also in the FFMM.

2.4.5 Random Direction Mobility Model

The Random Direction Mobility Model (RDMM) was created in order to overcome a

flaw discovered in the Random Waypoint Mobility Model (Royer, et al. 2001). MSs using

Random Waypoint Mobility Model (RWyMM) often choose new destination and the

probability of choosing destination that is located in the center of the simulation area or

requires travel through the middle of the simulation area is high. In RDMM, MSs choose

Page 59: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

42

a random direction in which to travel instead of a random destination. After choosing a

random direction, a MS travels to the border of the simulation area. As soon as the

boundary is reached the MS stops for a certain period of time, choose another angular

direction (between 0 to 180 degrees) and continues to travel.

Royer et al. (2001) proposed Modified Random Direction Mobility Model

(MRDMM) which is a slight modification to the RDMM. In this modified version, MSs

continue to choose random directions but they are no longer forced to travel to the

simulation boundary before stopping to change direction. Instead, a MS chooses a random

direction and selects a destination anywhere along that direction of travel.

2.4.6 City area, Zone area and Street Unit Mobility Model

Markoulidakis et al. (1997) take an in-depth look at desirable characteristics of mobility

models including required inputs/outputs and issues that should be considered when

designing a specific mobility model. The represent a basic mobility model with a set of

input parameters, Sin and a set of output parameters, Sout. Sin includes a population, P,

which represent specific groups of MSs, a geographical area, G organized into regions,

and a time period, T. Sout includes a collection of functions that determine the location of

a MS, p over the set G at time t. By combining these elements with transportation theory,

three models were created and defined as: the city area, area zone, and street unit models.

Transportation theory works to determine the load a system should carry given a

geographical area of service. In order to calculate a given load, many different variables

are considered (Markoulidakis et al. 1997):

a. The purpose of a trip

b. The exact route taken including starting and ending points

c. Population groups such as student and working people

d. Period of users activities

e. A transportation system’s capacity and usage costs, and

f. Popular area attracting

Page 60: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

43

The city area model is represented of user mobility and traffic behavior within a

large-scale geographical area. A typical city area model possesses two key characteristics

according to transportation theory. First, cities usually develop in such a way that the

center of the city comprises a high concentration of work places and businesses.

Surrounding the center of the city is a fairly dense distribution of dwelling areas for the

people of the city, which commonly referred to as urban areas. As we move away from

the center of the city, we see gradual decrease in population density, thus representing

suburban and rural areas. The second key characteristic found in a typical city is a street

network that supports movements from center of the city through urban area and then into

the suburban and rural areas. Obviously, the focus in the city area model is to represent

large-scale flows of traffic within city limits.

The area zone model takes a slightly more redefined looking at mobility within a

city. Instead of looking at the entire city, the area zone model divides the city into

regions. This process is done using square-shaped building blocks and an orthogonal grid

representing a street network. Again, this model proves most useful for large-scale

interactions.

Finally, the street unit model attempts to model movements of individual MSs.

The authors (Markoulidakis et al. 1997) attempt to simulate realistic traffic conditions by

minimizing the travelling time for all MSs and implementing safe driving characteristics

such as a speed limit and a minimum distance allowed between any two MSs.

The city area, area zone, and street unit model lack specific details such as

calculations for the movements of MSs because of their theoritical models used to

describe simulation environments. Unfortunately, if obstacles and defined travel paths are

added to make these models more realistic, the high level of accuracy introduce an

overwhelming amount of computational effort and complexity if the mobility models are

simulated.

Page 61: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

44

2.5 LOCATION MANAGEMENT

Location management is concerned with the procedures that enable the system to know

the current location of a powered-on mobile station so that incoming call routing can be

completed. Current techniques for location management involve database architecture

design and the transmission of signaling message between various components of a

signaling network (Akyildiz 1999). Xie et al. (1993) used a general cost function for

location update and paging based on call arrival rate and the location updating rate. The

evaluation of the algorithm uses different call arrival probability functions and plots

normalized cost functions comparing the proposed scheme with a fixed scheme. An

analytical evaluation of Tabbane’s proposal (1995) is given which assumes typical value

for certain parameters, such as cell size, average user velocity, and average number of call

arrivals and call originations. The mobility model used in the simulation is a simple one,

with a user moving with an average velocity and random direction, having a certain

probability of remaining in a certain paging area. The Mobility Predictability Level

(MPL) is a key parameter used in the comparisons to give an estimate of the randomness

of the mobility patterns. Seskar et al. (1992) proposed a traffic model which stimulates

vehicle movement based on the relationship between vehicle speed, vehicle density per

street length, and volume of vehicles.

Okasaka et al. (1991) proposed a two-layer modification at the VLR level of the

VLR/HLR architecture in PCS networks. The two layers of Registration Areas (RA)

overlap such that the borders of the RAs in one layer are covered by RAs in the other

layer. This technique effectively reduces the location updates caused by user

“oscillations” at the RA borders. Assouma et al. (2006) analyzed a new procedure for

intersystem registration, updating, and paging processes. Two-tier registration database:

Home Location Register (HLR) and Visitor Location Register (VLR) is used in this

evaluation. For 3G system, Xiao et al. (2004) proposed four parameters: the HLR location

update cost, the GLR location update cost, the VLR location update cost, and the paging

cost, used for cost calculation of location management. GLR is Gateway Location

Register. In this concept, the service area is partitioned into Gateway Location Areas

Page 62: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

45

(GLAs) and then partitioned into Location Areas (LAs). An HLR location update is

performed when an UE crosses a boundary of a GLA; a GLR location update is

performed when an UE crosses a boundary of a LA. A VLR location update will happen

if a UE across multiple cells and exceeds a predetermined threshold value. An HLR

location update involves both a GLR location update and a VLR location update, and a

GLR location update involves a VLR location update.

CTotal = CHLR + CGLR + CVLR + CPaging (2.2)

Where, CTotal, CHLR, CGLR, CVLR, CPaging denotes the total cost, the HLR cost, the GLR

cost, the VLR cost, and the paging cost. If the value of CGLR is omitted, the formula will

be minimized. This can be achieved if no GLR is implemented. To evaluate the

calculation, the total cost is the sum of the LU cost (CLU), paging cost (CPaging), and cell

cost (CCell) as follows:

CTotal = CLU + CPaging + CCell (2.3)

2.6 LOCATION UPDATE

In daily life, many MSs travel and follow certain path or road. For example, a person

drives to his/her office every morning along a road, stays in the office most of the day,

and goes home after working along the same road; a mailman delivers mail along fixed

routes every day. If the network knows the mobile users’ daily route information, then the

location update signaling traffic burden can be mitigated.

In cellular networks, MS within a cell is tranparent to the netwok, and hence

location tracking is only required when the MS moves from previous cell to a new cell.

Before a MS gain access to services, the user has to register with the mobile network. To

validate the registration, the system will check the user identity and subscription status.

Registration is only required if there is a change of networks and therefore, a VLR of

current network has not yet issued a Temporary Mobile Subscriber Identity (TMSI) to the

Page 63: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

46

user. This means that the user has to report to network using his IMSI and receives a new

TMSI by executing a location registration procedure. Although location registration and

location update have a different procedure, both of these database register mechanisms

are closely interrelated.

The location updating procedures, and subsequent call routing, use the MSC and

two location registers: HLR and VLR. Location updates are not usually sent every time a

MS enters a new cell, but depend on a predefined strategy. The location updating

procedures is executed if the user recognizes that it is in a new location area which leads

to updating the location information in the HLR record. Location update is initiated by

MS when it reports its current location to the mobile network. A procedure related to

location updating is the IMSI attach and detach. A detach lets the network know that the

mobile station is unreachable, and avoids having to needlessly allocate channels and send

paging messages. An attach is similar to a location update, and informs the system that

the mobile is reachable again. An example of location update diagram in GSM is shown

in Figure 2.19.

Figure 2.19 Location update diagram in GSM

Page 64: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

47

LU algorithms can be divided into two main groups: static and dynamic. In static

scheme, LA boundaries are fixed; it can be zone-based (Saraydar 2000) or profile-based

(Tabbane 1995). The profile-based strategy proposed by Tabbane tries to reduce the

location tracking cost by taking advantage of most mobiles’ highly predictable patterns.

Although the performance of this strategy is much better than the fixed paging area

strategy currently adopted by most network operators, several important parameters such

as the time-varying probabilities and the approach to partition each MS moving period are

innocent. In dynamic scheme, the size of the LAs for user is not fixed but is optimized

according to its current arrival rate (Xie et al. 1993). In a static algorithm, LU is triggered

based on the topology of the network. Examples include the conventional LA based

scheme used in GSM systems. Akyildiz (1999) showed that static schemes have the

disadvantage that they cannot be adjusted according to the parameter of individual user.

For example, under the LA-based LU scheme, the LA size most suitable for one user may

be ineffective for another user. In a dynamic algorithm, LU is based on the user’s call and

mobility patterns. Some schemes that have investigated in recent studies are the distance-

based (Madhow et al. 1995, Ho & Akyildiz 1995), timer-based (Rose & Yates 1995), the

movement-based schemes (Akyildiz et al. 1996), and the activity-based (Scourias &

Kuhn 1999). Wong (2001) mentioned that the evaluations of various LU algorithms have

been proposed in the literatures are often performed under certain unrealistic assumptions.

In the following section, a survey of several location update schemes recorded in

literatures is described.

2.6.1 Registration Area Location Update Schemes

In location area registration method (Lo et al. 1994a & Lo et al. 1994b), the collection of

all cells in the system is partitioned into a number of disjoint location area. Each cell in a

LA broadcasts the location area ID to inform all MSs in which location area they reside

in. A MS is registered whenever it crosses the boundary of two LA and the location

management enables the network to track the location of user and its terminal, during a

call arrival. The network has to maintain the approximate location of each user. When a

connection needs to be established for a particular user, the network determines the

Page 65: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

48

location of the mobile terminal, within the cell granularity. The network has two

operations for the current location of a MS: LU and paging. MS updates its LU whenever

it crosses a cell boundary, the network can maintain its precise location thus obviating the

need for paging. However, if the call arrival rate is low, the network wastes its resources

by processing frequent LU information and the MS waste its power transmitting the LU

signal. If the MS does not perform LU frequently, a large coverage area has to be paged

when a call arrives which wastes radio bandwidth. Thus the central problem of location

management is to find a minimum cost for overall LU and paging cost.

To maintain the location of the user, there are two strategies in LU: Static and

Dynamic. In static strategy, the network decides when and where the MS should report to

the network of its location. In dynamic strategy, the MS informs the network of its

location when and where it could be. The MS transmits update messages according to

their movement and not in predetermined cell. Dynamic strategies are time-based,

movement based and distance based.

2.6.2 Movement-based Scheme

In movement-based scheme, each MS counts the number of boundary crossings between

cells incurred by its movements. This scheme allows the dynamic selections of the

movement threshold on a per user basis. For implementation, the MS only needs a

counter to count the number of cell boundary crossing. The counter is reset if it reaches

the movement threshold. As shown in Figure 2.20, an example of a movement threshold

of 3 is used. In path B to C, MS has moves three times and this will be count by the

system. An analytical model was introduced by Akyildiz et al. (1996) to determine the

optimal movement threshold. The model applicable for mesh and hexagonal cell

configuration under the assumptions of a general cell residence time distribution and

symmetric random walk movement pattern. In 3G network, three level hierarchical

mobility database is used to study location update using movement base scheme (Ali et

al. 2007).

Page 66: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

49

Figure. 2.20 Movement-based

Liang and Hass (1999) proposed to use and identify the cell named as the Cell

Identification Code (CIC). With CIC, each cell is assigned a code, which is not necessarily

unique. The code is used to identify the cell’s orientation relative to cells within the same

location area and periodically broadcasts its identification codes through the downlink

control channel. The MS uses this information to facilitate the update decision.

2.6.3 Timer-based Scheme

This scheme does not require a MS to record or process location information during the

time between updates. For implementation, the timer threshold can be programmed into

the MS by a hard or software timer. Bar-Noy et al. (1995) proposed a timer-based scheme

whereas each MS updates its location every T time units (such as T=1 hour). A MS

performs location updates periodically at a constant time interval. Then, a variation of

time based scheme called the adaptive threshold scheme has been proposed (Pollini &

Chih-Li 1997). Here, the MS transmits the update message every T time units. This

threshold is not constant but varies with the current signaling load on the uplink control

channel of the base station. Numerical results, under the assumptions of one directional

linear model and random walk mobility pattern shows that the adaptive threshold scheme

has better performance that the static timer based scheme. Another approach in analytical

model has been introduced in Rose (1996) to study the timer-based scheme. The timer-

Page 67: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

50

based scheme is shown in Figure 2.21. As mentioned before in previous section, here, in

path B to C, MS has moves and this will be count by the system if the total threshold time

is reached or exceeded the threshold limit.

Figure 2.21 Timer-based

2.6.4 Distance-based Scheme

In this scheme, each MS performs a location update when its distance from the cell where

it performed the last location update exceeds a predefined value (distance threshold).

When the MS moves from cell to another cell, the MS needs to download a set of cell IDs

after each location update. In Bar-Noy et al. (1995), the authors compared the movement,

time and distance based schemes under the assumptions of the random walk mobility

movement and a ring topology of cells. The analytical result shows that the distance

based scheme gives the lowest management cost (Bhattacharya & Das 1999). Senzaki and

Chakraborty (2008) evaluates a combination of distance-based with selective paging.

Zhao et al. (2009) investigate the impact of call arrivals and the initial position of the MS

on the position of the LA. As shown in Figure 2.22, a MS travels from A to B and the

total distance can be longer than a direct route or a straight line from A to B. As it is not

limit the distance threshold, the system will discard its activity and no LU process is

recorded.

Page 68: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

51

Figure 2.22 Distance-based

2.6.5 Adaptive Direction-based Scheme

In this scheme (Ou et al. 2002), it is assumed that the movement of a MS can be divided

into steps and each step has a destination. A Gauss-Markov process is used to model the

movement of a MS in each step. The MS inspects its direction periodically and a location

update will be generated when its direction change is greater than the direction threshold

defined for the step. It is further assumed that the mobility pattern of a mobile terminal

may change with time and its mobility pattern over a long period of time can be divided

into a sequence of steps. The length of each step can be different and each step has a

destination such as shown in Fig. 2.23.

(a) (b)

Figure 2.23 Movement and timing

(a) MS in service area, (b) Timing diagram

Page 69: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

52

2.7 PAGING SCHEME

Paging is a mechanism to locate MS as a target when the network need to deliver a call.

In the current location areas scheme, to locate a mobile terminal within a location area, all

the cells within the location area are paged simultaneously. The paging cost will be the

maximum, and it is in proportion to the number of cells in the location area. If the paging

delay is not constrained, the cells in the location can be paged sequentially until the

mobile terminal is found. This will greatly reduce the number of cells to be paged,

thereby reducing the paging cost.

The paging delay is an important QOS (Quality of Service) metric in location

management (Senzaki & Chakraborty 2008). The paging delay cannot be arbitrarily large.

If the paging delay is large, the caller may perceive the delay. In addition, a mobile

terminal may move out of the current cell or even the current location area during the

paging process. In general, there is a trade-off between the paging cost and the paging

delay. If all the cells have to be paged simultaneously, the paging cost reaches the

maximum, whereas the paging delay is the minimum. On the other hand, if there is no

constraint on the paging delay, the cells can be paged sequentially in order of decreasing

probability, which leads to the minimal paging cost. Therefore, many researchers

proposed selective paging schemes to minimize the paging cost under an acceptable delay

constraint. Paging schemes can be grouped into two major types (Bar-Noy & Mansour

2004): delay bound and non-delay bound. Delay bound strategies are further classified as

blanket polling and sequential group paging. Non-delay constrainted strategies are

sequential and the shortest distance first paging.

2.7.1 Blanket Polling Paging Scheme

Existing systems use the blanket polling scheme, in which, when an incoming call arrives,

all cells in an location area are paged. In other words, the paging area is the same as the

location area. Such a scheme wastes significant bandwidth. Advantages of this scheme are

easy to use and reasonably fast (Xiao et al. 2007). This scheme is deployed on top of the

Page 70: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

53

location area based update scheme. The drawback of this scheme is if the number of LAs

are large, then the paging cost becomes correspondingly high (Wong & Leung 2000).

2.7.2 Shortest Distance First Paging Scheme

In this paging scheme, the network pages the MS starting from the cell where the MS last

updated its location, and moving toward in a shortest distance first order (Akyildiz et al.

1996). The distance is measured in terms of the number of cells away from the last update

location. If a threshold based update scheme (e.g., distance or movement) is used, the

paging or residing area of the MS is bounded. The MS can be located within a fixed

number of polling cycles. Grouping cells at different distances can incorporate the paging

delay constraint for each polling cycle.

2.7.3 Sequential Paging Scheme

In sequential paging, a location area is divided into smaller areas called a paging area and

the group of cells in a paging area is searched in one polling cycle. A polling cycle in a

sequential paging scheme is defined by the round trip time from the time when a paging

message is transmitted to the time when the response is received. Sequential paging

scheme is efficient to reduce paging load, but it may increase paging delay exponentially

(Lee et al. 2004). In this paging scheme, the current location of the MS is predicted based

on its location probability distribution. Polling signals are sent only to those cells in

which the user is likely to be present. An intuitive result derived by Rose & Yates (1995)

state that given the probability distribution on user location under no paging delay

constraint, the paging cost is minimized by sequentially polling the cells in decreasing

order of probability. Clearly, uniform location distribution gives the highest paging cost

and delay. When there is a maximum paging delay constraint, a group of cells can be

polled together in each polling cycle. Rose & Yates (1995) obtained that the optimal

paging sequence resulting in minimum paging cost with average paging delay constraint.

To determine the optimal group size to minimize paging cost can be used dynamic

programming (Putterman 1994).

Page 71: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

54

2.7.4 Selective Paging Scheme

In the selective paging scheme, its process consists of some iteration steps (Wan & Lin

1998). In each step, a subset of the cells is selected for paging according to a

predetermined selection criterion (such as distance). Casares-Giner and Garcia Escalle

(2009) applied aselective polling paging strategy based on the expected trajectory of MS.

A dynamic selective paging strategy was introduced into the location areas scheme in

(Abutaleb & Li 1997). The goal is also to minimize the paging cost, subject to a

constraint on the paging delay. The paging process terminates as soon as the MS is found

(Akyildiz et al. 1996). The paging delay is the major problem with this scheme.

2.8 APPLICATION OF OPTIMIZATION TECHNIQUES

In this section, graph theory is described and used in this thesis to evaluate the mobility

behavior. The rest, some application of optimization techniques are given to overview the

selected mechanism that can be used to solve the problems in location management. Only

fuzzy logic, genetic algorithm and neural network are explored and then evaluate. The

selected technique will be used in the next chapter.

2.8.1 Graph Theory

Pattern recognition is concerned with the classification of patterns into categories. This

field of study was devel oped in the early 1960s, and it plays an important role in many

engineering fields, such as medical diagnosis, computer vision, character recognition,

data mining, communication. There are two main categories of classification methods

(Leski 2004): supervised (discrimination) and unsupervised (clustering) ones. In

supervised classification, a set of data, called the training set, with class labels associated

with each datum. In Okasaka et al. (1991) proposal, the subscribers are grouped with

similar behavior. An approach using graph called the Individual Profile Graph (IPG) used

by Chuon et al. (2005) to evaluate location update and paging.

Page 72: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

55

Graph theory has a variety of applications which use a node for a vertex and a link

for an edge to fit the common terminology. A graph G with n vertices and m edges

consists of the vertex set V(G)={v1, v2, ..., vn} and edge set E(G)= {e1, e2, ..., em}, where

edge consists of two (possibly equal) vertices called endpoints. An element in V(G) is

called a vertex of G and an element in E(G) is called an edge of G. A simple graph is a

graph having no loops or multiple edges. For a graph G = (V,E), the underlying simple

graph UG is the simple graph with vertex V and (x, y) ∈E(UG) if and only if x ≠ y and

(x, y) ∈E. A graph is finite if its vertex set and edge set are finite.

Given a graph or digraph G with vertices indexes as V(G)={v1, v2, ..., vn}, the

adjacent matrix of G, written A(G), is the matrix in which entry aij is the number of copies

of the edges (vi, vj) in G. If vertex v belongs to edge e, then v and e are incident. The

incidence matrix M(G) of a loopless graph G has rows indexed by V(G) and columns

indexed by E(G), with mij = 1 if vertex vi belongs to ej; otherwise mij = 0. For a loopless

digraph, mij = +1 if vi is the tail of ej, mij = -1 if vi is the head of ej, and mij = 0 if

otherwise. An example is shown in Figure 2.24.

Figure 2.24 Graph and value

An isomorphism from G to H is a bijection f: V(G) → V(H) such that (u, v) ∈

E(G) if and only if (f(u), f(v)) ∈E(H). We say “ G is isomorphic to H,” written G≅ H, if

there is an isomorphism from G to H. When G is isomorphic to H and H is also

isomorphic to G, we may say G and H are isomorphic (to each other). Because an

adjancency matrix encodes the adjacency relation, isomorphism can be described using

w x y z

w 0 1 0 0

x 1 0 1 0

y 0 1 0 1

z 0 0 1 0

Page 73: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

56

adjacency matrices. The graph G and H are isomorphic if and only if we can apply

permutation to the rows of A(G) and the same permutation to the columns of A(G) to

obtain A(H). From the Figure 2.24, it can be transformed to make a new matrix as shown

in Figure 2.25.

Figure 2.25 Graph matrices

The graph G and H drawn in Figure 2.26 are 4-vertex paths. Define the function f: V(G)

→ V(H) by f(w)=a, f(x)=d, f(y)=b, f(z)=c. To show that f is an isomorphism, we check

that f preserves edges and non-edges. Note that rewriting A(G) by placing the rows in the

order w, y, z, x and the columns also in that order yields A(H), as illustrated in Figure

2.26; this verifies that f is an isomorphism. Another isomorphism maps w, x, y, z to c, b, d,

a, respectively.

y zw x w y z x a b c d

w

x

y

z

0 1 0 0

1 0 1 0

0 1 0 1

0 0 1 0

w

y

z

x

0 0 0 1

0 0 1 1

0 1 0 0

1 1 0 0

a

b

c

d

0 0 0 1

0 0 1 1

0 1 0 0

1 1 0 0

Figure 2.26 Isomophism graph and matrices

w x y z

w 0 1 0 0

x 1 0 1 0

y 0 1 0 1

z 0 0 1 0

a b c

w 0 0 1

x 0 1 1

y 1 1 0

z 1 0 0

Page 74: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

57

2.8.2 Fuzzy Logic

Fuzzy logic is an approach to computer science that mimics the way a human brain thinks

and solves problems. The idea of fuzzy logic is to approximate human decision making

using natural language terms instead of quantitative terms. It is formally defined as a form

of knowledge representation suitable for notions that cannot be defined precisely, but

which depend upon their contexts. It enables computerized devices to reason more like

humans (Bih 2006). Fuzzy logic is a superset of conventional (Boolean) logic that has

been extended to handle the concept of partial truth - truth values between "completely

true" and "completely false". Fuzzy logic is a form of many-valued logic; it deals with

reasoning that is fixed or approximate rather than fixed and exact. It was introduced by

Dr. Lotfi Zadeh of UC/Berkeley in the 1960's as a means to model the uncertainty of

natural language (Cirstea 2002). A basic simple fuzzy control system is simply

characterized. It accepts numbers as input, then translates the input numbers into

linguistic terms such as Slow, Medium, and Fast (fuzzification). Fuzzification is the

process of changing a real scalar value into a fuzzy value. Rules then map the input

linguistic terms onto similar linguistic terms describing the output. Finally, the output

linguistic terms are translated into an output number (defuzzification). Defuzzification is

the process of producing a quantifiable result in fuzzy logic, given fuzzy sets and

corresponding membership degrees.

A review of some works that have been done by some authors in using Fuzzy

logic is presented in this section. Astrain and Villadangos (2004) used fuzzy technique to

encode MS movement. MS trajectories are stored in the terminal as a dictionary and then

used to measure the signal power in order to obtain the fuzzy symbol. The calculation will

find the similarity between the string containing the path followed and the possible paths

contained in the hybrid dictionary. This works measured the QoS and a number of

interruption and blocking probabilities were presented. In more comprehensive paper,

Astrain et al. (2004) showed the trajectories using different cell scenarios using fuzzy.

Rea and Pesch (2005) investigated the effect of selecting mobility model on protocol

performance. A Fuzzy distance-based location management scheme proposed by Zhu and

Page 75: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

58

Leung (2006b) to dynamically adjust the distance threshold. A fuzzy approach to change

the update period based on time-based scheme is performed by Ryu et al. (1999). In this

works, twelve if-then rules is accomplised. Wang and Chen (2006) investigated the QoS

performance for 4G heterogeneous networks. The proposed scheme employed to evaluate

the traffic problems. In the following part of this section, fuzzy logic theory is presented.

a. Fuzzy Set Theory

Fuzzy logic is a form of multi-valued logic derived from fuzzy set theory to deal with

reasoning that is approximate rather than precise. Fuzzy sets were for a long time not

accepted by the Artificial Intelligent (AI) community. Now they have become highly

evolved and their techniques are well established. Fuzzy sets are sets whose elements

have degrees of membership that introduced by Lotfi A. Zadeh at the University of

California in 1965 (Somasundaram & Beaula 2009). In classical set theory, the

membership of elements in a set is assessed in binary terms according to a bivalent

condition - an element either belongs or does not belong to the set. By contrast, fuzzy set

theory permits the gradual assessment of the membership of elements in a set; this is

described with the aid of a membership function valued in the real unit interval [0, 1].

Fuzzy sets generalize classical sets, since the indicator functions of classical sets are

special cases of the membership functions of fuzzy sets, if the latter only take values 0 or

1 (Dubois & Prade 1988). Classical bivalent sets are usually called crisp sets.

Aziz and Parthiban (1996) described a comprehensive of fuzzy set theory.

Bivalent set theory can be somewhat limiting if we wish to describe a 'humanistic'

problem mathematically. For example the use of transistors instead of vacuum tubes is a

paradigm shift - likewise the development of fuzzy set theory from conventional bivalent

set theory is a paradigm shift. A paradigm is a set of rules and regulations which defines

boundaries and tells us what to do to be successful in solving problems within these

boundaries. For example, Figure 2.27 illustrates bivalent sets to characterize the

temperature of a room.

Page 76: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

59

Figure 2.27 Fuzzy set to characterize the room temperature

Source: Aziz and Parthiban 1996

b. Fuzzy Set Operations

The basic connective operations in classical set theory are those of intersection, union and

complement. These operations on characteristic functions can be generalized to fuzzy sets

in more than one way. However, one particular generalization, which results in operations

that are usually referred to us as standard fuzzy set operations, has a special significance

in fuzzy set theory. The following operations can be defined:

1. Union

The Union operation in Fuzzy set theory is the equivalent of the OR operation in

Boolean algebra. The fuzzy intersection operator � (fuzzy OR connective) applied

to two fuzzy sets A and B with the membership functions ��� and

�� is

��� � �����

��, ���, � � � (2.4)

The membership function of the Union of two fuzzy sets A and B with

membership functions ��� and

�� respectively is defined as the maximum

of the two individual membership functions as shown in Figure 2.28.

Page 77: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

60

Figure 2.28 Union operation

Source: Aziz and Parthiban 1996

2. Intersection

The Intersection operation in Fuzzy set theory is the equivalent of the AND

operation in Boolean algebra. The fuzzy intersection operator � (fuzzy AND

connective) applied to two fuzzy sets A and B with the membership functions

��� and

�� is

���� � �in����, ���, � � � (2.5) The membership function of the Intersection of two fuzzy sets A and B with

membership functions ��� and �� respectively is defined as the minimum of

the two individual membership functions as shown in Figure 2.29.

Page 78: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

61

Figure 2.29 Intersection operation

Source: Aziz and Parthiban 1996

3. Complement

The Complement operation in Fuzzy set theory is the equivalent of the NOT

operation in Boolean algebra. The membership function of the Complement of a

Fuzzy set A with membership function ���is defined as the negation of the

specified membership function as shown in Figure 2.30. This is called the

negation criterion.

�� �� � � � ���, � � � (2.6)

Figure 2.30 Complement operation

Source: Aziz and Parthiban 1996

Page 79: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

62

Defuzzification is the process of producing a quantifiable result in fuzzy logic,

given fuzzy sets and corresponding membership degrees. It is an important operation in

fuzzy sets theory typically needed in fuzzy control systems. It transforms fuzzy set

information into numeric data information. This will has a number of rules that transform

a number of variables into a fuzzy result, that is, the result is described in terms of

membership in fuzzy sets. For example, rules designed to decide how much pressure to

apply might result in "Decrease Pressure (15%), Maintain Pressure (34%), and Increase

Pressure (72%)". Defuzzification is interpreting the membership degrees of the fuzzy sets

into a specific decision or real value. Jiang and Li (1996) stated that defuzzification is

realized by a decision-making algorithm that selects the best crisp value based on a fuzzy

set. Zadeh first noticed the shortness of systematic defuzzification procedures (Zadeh

1968). There are three defuzzification strategies: center of area or center of gravity, mean

of maximum, and max criterion.

A common and useful defuzzification technique is center of gravity. First, the

results of the rules must be added together in some way. The most typical fuzzy set

membership function has the graph of a triangle. Now, if this triangle were to be cut in a

straight horizontal line somewhere between the top and the bottom, and the top portion

were to be removed, the remaining portion forms a trapezoid. The first step of

defuzzification typically "chops off" parts of the graphs to form trapezoids (or other

shapes if the initial shapes were not triangles). For example, if the output has "Decrease

Pressure (15%)", then this triangle will be cut 15% the way up from the bottom. In the

most common technique, all of these trapezoids are then superimposed one upon another,

forming a single geometric shape. Then, the centroid of this shape, called the fuzzy

centroid, is calculated. The x coordinate of the centroid is the defuzzified value.

c. Fuzzy Expert System

A fuzzy expert system is an expert system that uses fuzzy logic instead of Boolean logic

(Horstkotte 2000). Expert systems are computer programs, designed to make available

some of the skills of an expert to non experts. There are two general types of fuzzy expert

systems: fuzzy control and fuzzy reasoning (Siler & Buckley 2005). Although both make

Page 80: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

63

use of fuzzy sets, they differ qualitatively in methodology. Fuzzy process control was first

successfully achieved by Mamdani with a fuzzy system for controlling a cement plant

(Mamdani 1977).

In other words, a fuzzy expert system is a collection of membership functions and

rules that are used to reason about data. Unlike conventional expert systems, which are

mainly symbolic reasoning engines, fuzzy expert systems are oriented toward numerical

processing. The rules in a fuzzy expert system are usually of a form similar to the

following:

if x is low and y is high then z = medium

where x and y are input variables, z is an output variable, low is a membership function

(fuzzy subset) defined on x, high is a membership function defined on y, and medium is a

membership function defined on z. The part of the rule between the if and then is the

rule's premise or antecedent. This is a fuzzy logic expression that describes to what

degree the rule is applicable. The part of the rule following the then is the rule's

conclusion or consequent. This part of the rule assigns a membership function to each of

one or more output variables. Most tools for working with fuzzy expert systems allow

more than one conclusion per rule. In Matlab, expert system which developed and name

in the fuzzy tool box are Mamdani and Takagi-Sugeno. Mamdani is well suited to human

input (Sivanandam et al. 2007). In this thesis, Mamdani was selected to evaluate the

location management cost of the proposed strategies.

A Fuzzy Inference System (FIS) is a way of mapping an input space to an output

space using fuzzy logic and it’s available in Matlab software. A FIS tries to formalize the

reasoning process of human language by means of fuzzy logic (that is, by building fuzzy

If-Then rules). FIS are used to solve decision problems, i.e. to make a decision and act

accordingly. The Mamdani-style fuzzy inference process is performed in four steps:

fuzzification of the input variables, rule evaluation (inference), aggregation of the rule

outputs (composition), and defuzzification. As shown in Matlab help (Anon 2010e), for

instance:

If the service is good, even if the food is not excellent, the tip will be generous

Page 81: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

64

d. Structure of a fuzzy inference system

Fuzzy model consists of four modules. The first module is the fuzzification that

transforms the crisp value(s) into the fuzzy values. The fuzzy values are inferences based

upon the rule base incorporate in knowledge based. These rules are supplied by the

domain expert(s). All the outputs obtained from the inference engine are integrated and

defuzzied by the defuzzification module that transform the fuzzy output to crisp value(s).

The first two parts of the fuzzy inference process, fuzzily the inputs and applying the

fuzzy operator, are exactly the same. In general as shown in Figure 2.31, a fuzzy

inference system consists of four modules (Ramirez & Mayorga 2008):

1) Fuzzification module: transforms the system inputs, which are crisp numbers, into

fuzzy sets. This is done by applying a fuzzification function.

2) Knowledge base: stores IF-THEN rules provided by experts.

3) Inference engine: simulates the human reasoning process by making fuzzy

inference on the inputs and IF-THEN rules.

4) Defuzzification module: transforms the fuzzy set obtained by the inference engine

into a crisp value.

Figure 2.31 Fuzzy inference system

Page 82: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

65

Fuzzy set of parameters used to determine the domain of a variable used in the

fuzzy set of policy rules, for example as shown in Figure 2.32. Most of the researchers

said that in order to determine the parameters of the fuzzy set should take into account the

opinion of an expert with strong knowledge of the problem to be solved. Questionnaire

and interviews with experts are how to obtain the necessary opinions. However, in some

cases, to get the parameters with high accuracy, the determination of the value of the

parameter can not be used fully expert opinion, but requires a method of optimizing the

function of specific goals. Examples of fuzzy sets with specific parameters are as follows:

Figure 2.32 An example of fuzzy sets

2.8.3 Neuro-Fuzzy

In the field of artificial intelligence, neuro-fuzzy refers to combinations of artificial neural

networks and fuzzy logic. Neural networks rely heavily on an extensive historical

database, and relatively little on a domain expert. Neuro-fuzzy system based on fuzzy

inteference system is trained using a learning algorithm derived from neural network

system. Thus, neuro-fuzzy system has all the advantages possessed by the fuzzy inference

system and neural network systems. From its ability to learn the neuro-fuzzy systems are

often referred to as Adaptive Neuro Fuzzy Inference Systems (ANFIS).

1

0

a b c d

Page 83: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

66

Neuro-fuzzy hybridization results in a hybrid intelligent system that synergizes

these two techniques by combining the human-like reasoning style of fuzzy systems with

the learning and connectionist structure of neural networks. Neuro-fuzzy hybridization is

widely termed as Fuzzy Neural Network (FNN) or Neuro-Fuzzy System (NFS) in the

literature. Neuro-fuzzy system incorporates the human-like reasoning style of fuzzy

systems through the use of fuzzy sets and a linguistic model consisting of a set of If-Then

fuzzy rules. The main strength of neuro-fuzzy systems is that they are universal

approximators with the ability to solicit interpretable If-Then rules.

2.9 SUMMARY

In this chapter, a brief market and technology of cellular of communication system is

described. Mobile phones or cellular handsets are changing with the changing trends in

mobile phone technology. Today mobile phones have everything ranging from the

smallest size, largest phone memory, speed dialing, video player, audio player, and

camera and so on. On the network side, operators have to upgrade their existing network

to the latest technology to maintain their operation and business. Although GSM

operational is still exist, to compete with the cellular technology and market

attractiveness, operators are competing to install and offer 3G services. The growth of

cellular users is another reason for network providers to deploy new cellular technology.

To optimize the quality of services in terms of mobility management, cellular network

providers have to maintain the two important operations in relation to mobility, location

update and paging process. These processes are part of location management. A survey of

location update scheme, paging scheme and also mobility model are described. At the end

of this chapter, graph theory and fuzzy logic are reviewed and the selected technique will

use later in the analysis. Also, a brief description of neuro-fuzzy is presented. In the next

chapter, the research methodology will be described.

Page 84: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

CHAPTER III

METHODOLOGY

3.1 INTRODUCTION

In this chapter, simulation environment for the proposed mobility models to evaluate the

location management performance will be covered. MATLAB is used to generate the

MSs for the proposed mobility models: random walk mobility model and street lane

mobility model. Chiang and Shenoy (2004) investigated the number of location update

and derive dwell time. This model describes individual movements relative to cells (Bar-

Noy et al. 1994, Rubin & Choi 1997, Zonoozi & Dassanayake 1997). In literature,

random walk mobility model is used as a model and has been described in Chapter 2.

Street lane mobility model is proposed as the real street condition. Of the proposed

mobility model, the behaviors of mobility and location management aspect are the two

main evaluations conducted in this thesis. To obtain the data and to perform the results,

MATLAB is used as the simulation tools. An additional macro functions is developed in

Microsoft Excel to facilitate the process of calculation for location management

optimization.

3.2 SIMULATION ENVIRONMENT

The hexagon shape model is used in wireless communication network to describe the

coverage while in practical the shape of the coverage might be irregular. In this context,

the hexagon shape called as cell. The cell size is one of the essential parameter in

designing cell layout and the whole service area for the simulation environment. It can

Page 85: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

68

affect the number of uses that can be served and indirectly reflected the cell residence

time value. The hexagonal cell geometry is shown in Figure 3.1. The total area of each

hexagonal cell, Ahex is depended on the scale of cell radius, r and can be calculated using

(Rappaport 2002):

Ahex ≈ 2.598 r2 (3.1)

Figure 3.1 Hexagonal cell geometry

In terms of mobility, MS can be classified into mobile and stationary users.

Mobile user means that MS has capabilities to move freely in the service area while no

mobility activity has been done by stationary in the service area. If MS reaches the border

of the simulation area, MS will be reflected back to service area. MS will always move

from one point to another point and its duration is limited by simulation time. The

simulation area consists of 49 hexagonal cells as illustrated in Figure 3.2. The simulation

environment is developed to study the active mobile user.

For this simulation, MSs were generated randomly at different initial position

within service area. These values were proposed to reduce the simulation processing time.

Page 86: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

69

Each cell is designed with a radius of 10 km. The vehicles speed in this simulator are

ranging in [0, 90] km/h. With these cell radius and speed limit, it was predicted that MS

can travel to border of a cell in 1/9 hour or equal to 6.67 minutes or 0.4 millisecond. By

using all this initial parameter to the proposed mobility model, a hundred of MSs will be

generated and simulated in 180 unit time. For each mobility model, the matrix size will be

a 100 x 180. The simulation is run with personal computers using the Pentium 4 processor

with 256 MB of RAM.

Figure 3.2 Simulation service area

3.3 CELL CLUSTERING MODEL

A cellular network is a radio network made up of a number of cells, each served by at

least one fixed-location transceiver known as base station. When joined together these

Page 87: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

70

cells provide radio coverage over a wide geographic area. Cellular networks are

inherently asymmetric with a set of fixed main transceivers each serving a cell and a set

of distributed transceivers which provide services to the network's users.

In this thesis, the service area is constructed using cluster of hexagonal cells

concept and then the whole coverage area is divided into LAs. All these LAs are

connected to base station and controlled by network system. The communication

transaction in the service area will be registered in database system, HLR and VLR. To

simulate the user mobility model in the service area, two types of cell clustering models:

symmetrical clustering and asymmetrical clustering are designed. Both of these models

have seven clusters. In symmetrical clustering, in each cluster has uniform number of cell

which consists of seven cells. This model called as balanced-cell model. It assumed that

the entire clusters have moderate density and the channel availability is enough to handle

the entire request signaling transaction. The number of cells in each cluster in

asymmetrical has different quantities and in this thesis called as unbalance-cell model. It

is assumed that for each cluster has different cell capacity and the number size of each

cluster is varied, 5 to 9 cells. The bigger cluster size has more channel capacity. This

example can be found in a cluster of unbalanced-cell model. Both of these models are

shown in Table 3.1 and Table 3.2.

Table 3.1 Symmetrical cell clustering

Cell Cluster Cell Number LA 1 1, 2, 3, 4, 5, 6, 7 LA 2 8, 9, 10, 11, 12, 13, 14 LA 3 15, 16, 17, 18, 19, 20, 21 LA 4 22, 23, 24, 25, 26, 27, 28 LA 5 29, 30, 31, 32, 33, 34, 35 LA 6 36, 37, 38, 39, 40, 41, 42 LA 7 43, 44, 45, 46, 47, 48, 49

Page 88: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

71

Table 3.2 Asymmetrical cell clustering

Cell Cluster Cell Number LA 1 1, 2, 3, 4, 5, 6, 7 LA 2 8, 9, 10, 11, 12, 14, 16, 21 LA 3 15, 17, 18, 19, 20 LA 4 22, 23, 24, 25, 26 LA 5 27, 28, 29, 30, 33, 34, 35, 39, 40 LA 6 36, 37, 38, 41, 42 LA 7 13, 43, 44, 45, 46, 47, 48, 49

A proposed balanced-cell model as described in Table 3.1 is shown in Figure 3.3

and an alternative unbalanced-cell in Table 3.2 is illustrated in Figure 3.4.

Figure 3.3 Balanced-cell model

Page 89: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

72

Figure 3.4 Unbalanced-cell model

3.4 MOBILITY MODEL

Two types of mobility model, Random Walk Mobility Model and Street Lane mobility

Model, are described in this section. In literature, three-direction mobility model is used

by Abutaleb (1993) to study the mobility management with grid cellular architectures in

which there are four direction possibilities of MS to move. For random walk model, it is

assumed MSs are in the city and can access many streets. In these models, directions are

dynamic and the direction is depended on the implemented strategy. To evaluate the

mobility behavior, direction possibilities are extended. In street lane model, the direction

is limited. The details of these two proposed models are described in the following

section.

Page 90: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

73

3.3.1 Random Walk Mobility Model

In this random walk model is varies in terms of the number of direction. The first

proposed model, each MS will choose direction randomly (North, South, West or East)

with equal probability of ¼. In terms of angle, the selection has 0, π⁄2, π and 3π/2. In

degree can be writes as 0, 90, 180, and 270. The direction selection is controlled by

threshold value, α, and angle are shown in Table 3.3. Three direction schemes based on

this threshold value is designed. Weight of the threshold value selected based on criteria:

integers (scheme A) and the probability values (scheme B and C). Selection probability

value in scheme B and C are different in which to scheme B based on uniform

distribution, while scheme C is based on the velocity distribution.

Table 3.3 Threshold value of movement direction

Direction

(Angle in

degree)

Angle

(in degree) Threshold Value, α

Scheme A Scheme B Scheme C

East 0 1 0.75 ≤ α < 1 76.5 ≤ α < 90

North 90 2 0.50 ≤ α < 0.75 45 ≤ α < 76.5

West 180 3 0.25 ≤ α < 0.50 22.5 ≤ α < 45

South 270 4 0 ≤ α < 0.25 0 ≤ α < 22.5

In the second model, each MS has 1/8 probabilities. The directions are North,

South, East, West, Northeast, Southeast, Northwest, and Southwest. This model provides

an opportunity to move more freely with MS compared with the model of four directions.

Both of these random walk models are shown in Figure 3.5. Both of those models are

used to evaluate mobility behavior.

Page 91: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

74

(a) (b)

Figure 3.5 Random walk with certain direction:

(a). 4-directions, (b). 8-directions models

3.3.2 Street Lane Model

In lane street mobility model, all the MS is assumed to be using the highway. To reduce

the computational complexity problem, the number of lanes on the simulator that was

developed is limited to three lanes as shown in Figure 3.6. Tables of the street lane and

density lane database are generated. The direction in the simulation is only allowed MS to

move forward or not moving. Highway not always has a straight path; sometimes the road

will be curved at certain point. In the highway, MS was only allowed to move in one

direction, so that the user is not possible to reverse. MS is not allowed to jump directly

from lane 1 to lane 3 and vice versa. MS only allowed shifting from lane 1 to lane 2, from

lane 2 to lane 3 and vice versa. The process to turn left or right so that it can turn 90

degrees is not possible. To switch lanes, then the MS can move forward with changing

the orientation direction of a few degrees.

Page 92: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

75

Figure 3.6 Street lane layout

Under conditions of normal density, a user can drive is allowed to reach up to

maximum speed. Although rare, occasionally the condition of highway becomes

congested when there are accidents or other incidents that could hamper its speed

vehicles. In this thesis, the density weighting value, ρ, is designed and assumed in

accordance with highway crowded conditions which are divided into three categories: not

crowded (ρ < 0.35), moderate (0.35 ≤ ρ ≥ 0.7), dense (ρ ≥ 1). Moderate condition is a

situation where the density of vehicles still allows the user to drive vehicles with an

average speed conditions influenced by the density weighting value.

Page 93: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

76

3.5 MOBILITY MANAGEMENT EVALUATION

In this thesis, the effect of mobility will be studied. One of the interesting aspects of

mobility to be studied is the behavior of mobility. Evaluation of behavioral analysis

conducted based on distribution of data generated by the mobility that occurred in the

area of simulation. Of the two models adopted in the simulation model, the MS

distribution generated by random walk model is more varied. In this model, the

possibility of inter-cell movement becomes more open and especially for pedestrian, MS

can be located anywhere, including in the building. On the other hand, the distribution

model of MS in the street lane which requires MS remains in the highway.

Location management cost can be derived from the total cost of location update

and paging activities. In this thesis, all dynamic location update schemes are evaluated.

The location update costs depend on the pre-defined threshold to each tested schemes. In

general, the cost will be calculated if the MS update its existence according to the latest

location where the specified threshold limit has been exceeded. The paging scheme will

process any incoming signal by identifying the cell id. The system will count as a cost if

the current cell id is different to the previous one.

To establish the analytical model for the location management with HLR/VLR

network architectures, based on location data updating in HLRs and in VLRs, the

signaling transaction can be calculated using (3.2). Denote that i is the number of MS and

k is the amount of simulation time. Based on (3.2) and (3.3), the total cost for evaluating

LU and Paging in both registration system, VLR and HLR can be analyzed using (3.4).

Location Update:

,1 1

( )jl

LU HLR VLR i kk i

C C C= =

= +∑∑ (3.2)

Page 94: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

77

Paging:

,1 1

( )jl

p VLR Cell i kk i

C C C= =

= +∑∑ (3.3)

Total Cost:

������ � ��� � �� (3.5)

where, CLU is the cost of location update, Cp is the cost of paging, CHLR is the cost of

HLR, CVLR is the cost of VLR, and CTotal is the summation of location update and paging

cost.

To analyze the mobility behavior, a concept of graph theory and mathematics are

used. Behavior patterns can be investigated by using graph theory to obtain the identity of

the resulting matrix. The result can be classified in isomorphism pattern if it produces the

same pattern. Another way is by using the concept of permutations. A permutation is a

rearrangement of the elements of an ordered list Ѕ into a one-to-one correspondence with

Ѕ itself. The number of permutations on a set of n elements is given by n! (Uspensky

1937). A permutation of objects is an arrangement of those objects in some order; that is,

some object is placed in the first position, another in the second position, and so on, until

all objects have been placed. There are two ways that can be described by using this

concept, a recurring patterns and permutations without repetition.

To figure out the result and ease the computational aspect, the 100 x 180 data,

then divide into four-pattern range. By using this technique, the matrix will reduce to 100

x 45. The number of permutations of n distinct objects taken r at a time, denoted by �, is

given by

a. Permutation with repetition: nr (3.6)

b. Permutation without repetition : �!

�����! (3.7)

To characterize the mobility pattern of this model, a set of matrix of 100 x 180 is

generated. For 4-directions of random walk mobility model, n = 4 and r = 4, using

Page 95: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

78

equation (3.6), a 4 x 256 matrix is developed. The matrix size will be reduced to 4 x 24 if

the concept of permutations without repetition is applied. There are four direction

indexes, 1 for East direction (turn right), 2 for North direction (forward), 3 for West

direction (turn left) and 4 for South direction (reverse). A 4 x 4096 matrix with repetition

number will be developed for 8-directions of random walk mobility model. It can be

achieved with n = 8 and r = 4. In this matrix, the number sequence is 1, 2, 3, 4, 5, 6, 7,

and 8 to represent East, Northeast, North, Northwest, West, Southwest, South, and

Southeast. In permutation without repetition as shown in equation (3.7), the size will be

shrinking to 4 x 1680. A brief of 4-directions of random walk mobility model matrix is

shown in Table 3.4. For the complete table of the entire random walk mobility model

matrix will be shown in Appendix B.

Table 3.4 Pattern index

Pattern Index Direction Index

1 1 1 1 1

2 1 1 1 2

3 1 1 1 3

… … … … …

254 4 4 4 2

255 4 4 4 3

256 4 4 4 4

3.6 COMPUTER SIMULATION DEVELOPMENT

In this simulation, a dynamic location management scheme is used. The simulation flow

chart is shown in Figure 3.7. After initializing the parameters, MSs are generated in the

service area of 49 hexagonal cells. All the MSs is assumed in the active mode. In the real

situation, for the inactive status, the alert will be sent to the caller. Then those generated

MSs move according to the implemented mobility model. MS sends a BCH to hear the

feedback from the network for the available channel. Presumably, at least there is one

Page 96: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

79

channel available. System will locate the MS by giving the best signal. To locate the

nearest and best BS, in this work used cell coordinate system to measure the distance

between BS to the last reported cells of MS, with the assumption that every BS is located

in the cell centre. The location of MS position to the nearest BS in two dimensional plane

can be calculated using equation (3.8). In graph theory the distance between two vertices

is the length of the shortest path between those vertices. To calculate the MS-BS distance,

analytic geometry can be used and the distance between two points of the xy-plane can be

found using the distance formula. The distance between (x1, y1) and (x2, y2) is given by

(Gray et al. 2006):

� � ��� ��� � ��� ���� (3.8)

where, x1 is origin point, x2 is end point, and d is distance between points.

For the complete procedure of the simulation is described in Figure 3.7. It starts

from a defined initial parameters, draw the service area, generate MS, run the proposed

both mobility models and then make an analysis. Location management cost calculations

will be performed if the MS exceeds a specified threshold value. To support the

simulation process of street lane mobility model, a switching-lane database and traffic

density with a weighing factor is generated. Also, a pattern database is built to be used to

recognize the pattern in graph analysis. The psedo-code of the simulation steps are

attached (Appendix C).

Page 97: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

80

Figure 3.7 Simulation flow chart

Page 98: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

81

3.7 DEVELOPMENT DESIGN USING FUZZY LOGIC TECHNIQUE

Fuzzy logic is a form of multi-valued logic derived from fuzzy set theory to deal with

reasoning that is approximate rather than precise. Fuzzy logic starts with and builds on a

set of user-supplied human language rules. The fuzzy systems convert these rules to their

mathematical equivalents. Fuzzy logic models, called fuzzy inference systems, consist of

a number of conditional "if-then" rules. A fuzzy expert system is an expert system that

uses a collection of fuzzy membership functions and rules, instead of Boolean logic, to

reason about data. The rules in a fuzzy expert system are usually of a form similar to the

following:

if x is low and y is high then z = action

where x and y are input variables, z is an output variable, low is a membership function

(fuzzy subset) defined on x, high is a membership function defined on y, and action is a

membership function defined on z. The antecedent (the rule's premise) describes to what

degree the rule applies, while the conclusion (the rule's consequent) assigns a membership

function to each of one or more output variables. The set of rules in a fuzzy expert

system is known as the rule base or knowledge base.

In this thesis, an expert system was developed in MATLAB using fuzzy logic. In

the development fuzzy logic expert system in location management, three parameters

related in user’s mobility are defined. These three parameters are are Speed, Density, and

Residence Time.

a. Membership Functions

A fuzzy logic is fully defined by its membership function. The membership function

selection process is done with trial and error and it runs step by step which is too long

in completing the problem. In this design, each fuzzy variable is assigned to three

input membership functions and one output membership function in triangular shape:

1. Speed variable, the membership functions are low, average, and fast.

Page 99: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

2. Density variable, the membership functions are low, average, and high.

3. Residence Time (ResTime) variable, the membership functions are short, aver

and long.

Triangular function

where a < m < b

function and x and

The membership functions give a degree or grade of membership within the range:

speed: [0, 90], density: [0, 1], and residence time: [0 150].

membership functions for input: speed, density and residence time (Restime

defined as shown in Figure 3.

Density variable, the membership functions are low, average, and high.

Residence Time (ResTime) variable, the membership functions are short, aver

Triangular function is defined by a lower limit a, an upper limit

as shown in Figure 3.8. The figure is only to model a triangular

and y axis is not defined yet.

Figure 3.8 Triangular function

The membership functions give a degree or grade of membership within the range:

0], density: [0, 1], and residence time: [0 150].

membership functions for input: speed, density and residence time (Restime

defined as shown in Figure 3.9, Figure 3.10 and Figure 3.11.

82

Density variable, the membership functions are low, average, and high.

Residence Time (ResTime) variable, the membership functions are short, average,

, an upper limit b, and a value m,

. The figure is only to model a triangular

The membership functions give a degree or grade of membership within the range:

0], density: [0, 1], and residence time: [0 150]. The shapes of the

membership functions for input: speed, density and residence time (Restime) are

Page 100: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

83

Figure 3.9 Membership function of input variable “Speed”

Figure 3.10 Membership function of input variable “Density”

Page 101: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

84

Figure 3.11 Membership function of input variable “ResTime”

To express the result, the linguistic expression of Location Update (LU) and No Location

Update (NLU) is defined in fuzzy using triangular membership function. The results are

known as LU in the range [5 10] and NLU activities if the result lower than 5 is shown in

Figure 3.12.

Figure 3.12 Membership function of output variable “Results”

Page 102: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

85

b. Rules:

Fuzzy sets and fuzzy operators are the subjects and verbs of fuzzy logic. These if-then

rule statements are used to formulate the conditional statements that comprise fuzzy

logic. In general, the input to an if-then rule is the current value for the input variable

and the output is the entire fuzzy set. The output fuzzy sets for each rule are then

aggregated into a single output fuzzy set. Finally the resulting set is defuzzified, or

resolved to a single number. In this thesis, 10-set of rules are defined to evaluate the

cost of location management. For maximum rules, there are 81 rules. The reduction of

the total available rules, the proposed 10-set of rules is designed to minimize the high

computational process and this design is met the research objective.

3.8 SUMMARY

To investigate the MS mobility is a challenging problem in cellular network. Therefore,

we need to figure out more practical mobility problems in network environments. In this

section, the simulation environment with initial parameters are defined and will use in the

simulation. Two mobility models will be developed for the evaluation, Random Walk

Mobility Model and Street Lane Mobility Model. Random Walk Mobility Model is built

in two direction variations. The first model has four directions and the other model has

eight directions. In these models, MS can freely move in the service area. In the street

lane model, MS will stay only on the street and has to follow some restriction like no

return and always go forward. To figure out the result, a simulation flow chart and fuzzy

logic technique are discussed. In the next section, the performance of the simulation will

be presented.

Page 103: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

CHAPTER IV

LOCATION UPDATE AND PAGING RESULTS

4.1 INTRODUCTION

In this thesis, the mobility of a mobile station is measured by tracking its speed and

movement. Tracking of movement is accomplished by identifying the change of mobile

station direction which depends on the mobility model. Data concerning the base station

visited and duration of stay of the mobile station are recorded by the network while the

mobile station status is active.

In this chapter, the performance of location management cost using two types of

mobility model will be evaluated. One of the most important goals of location

management studies ist obtained the efficient utilization of the radio bandwidth. This

requirement can be achieved by minimizing the number of location management cost:

location update cost and paging cost. To measure the cost, a simulation environment build

and then run using Matlab is defined. Random walk mobility model is chosen in this

analysis which is the most model used in many literatures. This model is very suitable for

low mobility users such as pedestrians. For users who currently drive with high speed, so

street lane mobility model used to represent users who drive on the highway. At the end

of this chapter, an analysis using graph theory and fuzzy logic are evaluated. Graph

theory as described in Chapter 2 is used to assess the patterns of user behavior in

simulation and the application of fuzzy logic technique is intended to obtain optimal

results from the evaluation of the performance location management cost. An in-depth

study for the dynamic location management scheme and the development of the

Page 104: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

87

simulation model has been carried out in Chapter 3. The results from the simulation for

the evaluation of the schemes are presented in this chapter.

4.2 MOBILITY MODELS ANALYSIS

The initial MSs position are generated in this simulation as shown in Figure 4.1. A

population of a hundred of MS are used in this thesis to examine the proposed mobility

models and their behavior and effect to location management operation. A total of 49

cells are designed as service areas in the area of simulation and then will be partitioned

according to the proposed strategy. All the MSs will be in the simulation area and has

been programed that no MS will out of the service area.

Figure 4.1 Initial MSs location in the simulation area

Page 105: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

88

4.2.1 Random Walk Mobility Model Analysis

In this thesis, Random Walk Mobility Model, there are two direction models proposed.

Four- and eight-directions are used to evaluate the location update and paging and pattern

analysis. An example of MS trajectory using random walk model is shown in Figure 4.2.

For all the proposed models, MS travels to certain degree as defined in the model. In four-

direction each MS will choose direction randomly with equal probability of ¼. In terms

of angle, the selection has 0, π⁄2, π and 3π/2. For random walk mobility model, the speed

of MS is varied. Pedestrian can travel with low speed. User who drives can move faster

and has to follow the speed limit rules and traffic regulations.

Figure 4.2 An example of MS trajectory using random walk mobility model

4.2.2 Street Lane Mobility Model Analysis

In contrast to random walk mobility model, in highway MSs have to follow the flow of

traffic. In Figure 4.3, an example of six highways model are presented. MSs movement

are generated and indicated as different market plot on the highways. Normally, highway

Page 106: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

89

has many lanes. In this thesis, only three lanes are proposed. In the figure, no lane is

shown. Lanes are constructed in algorithm and run in the simulation environment.

Figure 4.3 An example of highway model for the proposed model

4.3 LOCATION MANAGEMENT COST

The study of location management is one of the fundamental issues in cellular networks.

It deals with how to track subscribers on the move. This study aims to reduce the

overhead required in locating mobile devices in a cellular network. In location

management perspective, network cost is affected by signaling activities of LU and

paging transactions. In a static scheme, there is a predetermined set of cells at which, MS

regardless of its mobility must generate a LU. In a dynamic scheme, MS in any cell

depending on its mobility can generate a LU based on threshold value. Among dynamic

LU schemes: movement-based (Bar-Noy 1995), time-based (Rose 1996) and distance-

based (Ho & Akyildiz 1995 and Madhow 1995), distance-based was selected to evaluate

the performance of location management cost in this work.

Page 107: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

90

4.3.1 Location Update Cost

The basic idea of this distance-based LU algorithm used in this thesis is as follows. Each

cell having a base station and having its own id (identifier), with MS resides in each cell

for some time interval before moving on the next cell. In random walk mobility model, it

assumed that MS has equal probability that any one of the immediate neighboring cells is

selected as the destination. Destination cell may not be in the same LA. By setting a

threshold limit value equal to one is the most easy and simple. But this approach causes

the value of LU will increase drastically.

To reduce the increase of LU drastically, a study has been conducted indicate that

the threshold limit, d=3 is optimal for less directive travelling pattern and d=4 is optimal

for more directive travelling pattern (Tung 2004). The distance-based LU (Ho & Akyildiz

1995 and Madhow 1995) was selected among the schemes in this work. In this thesis, the

threshold limit is d=4. Four different LU strategies are implemented in this work.

Denoting the base station in every cell as BS1 until BS49 and suppose that the initial

location of the MS is in cell 47, the system will register the MS as BS1 data. Every time

MS moves to a different cell, the system will count as a cost. Figure 4.4 shows a sketch of

a sample path, showing MS travels from cell 47→ 38→ 6→ 5→ 4→ 1. The → symbol

means a path from the beginning point to end point.

Page 108: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

91

Figure 4.4 An example of MS travels path

The strategies are as follows.

1. If the current cell ID (n) is different to (n-1) the cost is LUA. This strategy is

similar to Lin (1997) and Abutaleb (1997).

2. If the current cell ID (n) is different to (n-1) and (n+1), the cost is LUB.

3. If the current cell ID (n) is different to (n-1) and (n-2), the cost is LUC.

4. If the system can record larger data set for each user state (ni), where i = 1 to m

and m is the maximum of length of the data set. The difference in cell ID in the

data set gives the cost, LUD.

The distance-based scheme is determined by measuring the cell-to-cell distance. The

updating cost will be processed only if the MS location is changed and the specified

threshold limit has been exceeded. In the same way also applied to calculate the updating

cost for movement-based and time-based.

Page 109: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

92

4.3.2 Paging Cost

For paging scheme, a simple analysis using single PA and zone-based strategy are

employed in this work. In zone-based, the system is divided into equal size (weight) area,

among MSCs to keep the network overhead minimal. For this purpose, seven

symmetrically LA of equal size, in which each cluster consists of seven cells is defined

and shown in chapter 3. The paging scheme will process any incoming signal by

identifying the cell ID. The system will count a cost if the current cell ID is different to

the previous one. The algorithms are as follow:

a. Based on zone area, the system will check if MS belong to a certain LA, if it is

different, the system will count as a paging cost, Pg A.

b. The system will detect individually to the paged MS in a single cell, the paging

cost Pg B.

c. Based on the zone concept, but assuming the system can store previous

information and detect if MS stays in different PA, the paging cost is Pg C.

4.3.3 Location Update and Paging Cost Analysis

The proposed LU and paging strategies are used to evaluate the running mobility model

and location management cost. A lot of data transactions are recorded and to ease the

analysis process, a statistical approach named Cumulative Distribution Function (CDF) is

used. This function describes a statistical distribution. This technique describes the

probability that a real-valued random variable X with a given probability distribution will

be found at a value less than or equal to x.

Figure 4.5 shows the Cumulative Distribution Function (CDF) for the four

location update strategies. In strategy LUA, the total LU activities are the highest and in

the Figure 4.5 can be read that its value is almost 2.5 x105 activities. With LUA as the

benchmark, the investigation show LUD is superior with respect to LUB and to LUC in this

Page 110: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

93

order, with each cdf values of 76%, 52%, and 30% respectively. Even though, LUD gives

the best result, however, it requires larger memory size, and this will obviously incur an

additional cost to the system. For this reason, LUB algorithm can be considered as an

optimum choice if the cost of memory is a taken into consideration.

Figure 4.5 Location update performance

In strategy Pg B, the total paging activities are the highest and in the Figure 4.6

shows that its value is almost 2.5 x105 activities. Figure 4.6 shows CDF of the average

number of paging for the three paging strategies described. With Pg B as the benchmark,

the cdf for Pg C is 93% and the CDF for Pg A is 65%. Pg C is shown to be superior than Pg

A and Pg B respectively. The result shows that, using paging strategy only for one cell will

waste the network resources and increase the paging cost.

Page 111: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

94

Figure 4.6 Paging performance

In Chapter 3, two strategies namely balanced-cell and unbalanced-cell are already

defined. In the balanced-cell, the service area is partition into an equal size area in terms

number of cell. In the unbalanced-cell, the number of cell for each service area is

different. For this strategy, it is assumed that each service area has different subscriber

densities (which depend on the density of the housing estate, offices, shopping mall and

open area). To evaluate those strategies performance, a single-cell strategy is developed.

In this strategy, the service area is a single cell, which corresponds to 49 service areas.

For each strategy, each LA is weighted with a particular value called the cell cost (CCell).

CLU and CPaging are the cost for LU and Paging respectively. To evaluate the performance

of the total cost, the proposed formula as follows:

CTotal = CLU + CPaging + CCell (4.1)

Since, each signal transmission is recorded in a registration system, LU activities

will have to consider the HLR and VLR cost for registering and deregistering MS status

in the network. However, for paging procedure, only the VLR cost is considered. As

Page 112: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

95

stated in the previous paragraph, an evaluation of the number of signal transactions in

HLR and VLR in terms of network resources is studied and presented.

Figure 4.7 and Figure 4.8 show the signaling transactions in the VLR and HLR for

the three strategies. The letters A, B, and C following the underscore after the HLR and

VLR represents the single-cell, balanced-cell, and unbalanced-cell strategies respectively.

As shown in Figure 4.7, the unbalanced-cell strategy has higher registration signaling

compared to single-cell and balanced-cell strategies for VLR registration. However, for

the HLR registration as shown in Figure 4.8, the single-cell strategy has higher

registration signaling compared to unbalanced-cell and balanced-cell strategies. The

balanced-cell strategy has been shown to have the least registration signaling in both VLR

and HLR registration compared to the other two strategies. The number of MS’s signaling

transaction in the network for single-cell, balanced-cell and unbalanced-cell strategies are

44.22%, 24.39%, and 31.39% respectively for HLR registration and 34.92%, 22.23%, and

42.85% respectively for VLR registration.

Figure 4.7 Signaling in VLR system

0

5000

10000

15000

20000

25000

30000

VLR_A VLR_B VLR_C

Sig

nal

ing

VLR Registration

Page 113: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

96

Figure 4.8 Signaling in HLR system

Figure 4.9 shows the combination of the HLR and VLR cost for each strategy as

the total cost. It is clear from the figure that the balanced-cell outperforms in terms of

registration signaling compared to the other two strategies. The percentage of registration

signaling for these strategies are 35.16% for Total A, 22.28% for Total B, and 42.56% for

Total C.

Fig. 4.9 Total of signaling transaction

0

100

200

300

400

500

600

700

800

HLR_ A HLR_B HLR_C

Sign

alin

g

HLR Registration

0

5000

10000

15000

20000

25000

30000

A B C

Sign

alin

g j

Total of Location Management Strategies

Page 114: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

97

Figure 4.10 shows the network efficiency performances for the proposed

strategies. The network performance is determined by obtaining the service area density

in each implemented strategy. Based on the network perspective, the results show that the

single-cell strategy has the least average load resources usage and hence is more efficient

compared to the other two strategies. Single-cell has an average result of 2.04% while the

balanced-cell and unbalanced-cell have the average results of 14.29% and 12.89%

respectively in using network more signaling.

Figure 4.10 Network efficiency performances of proposed strategies

From the proposed strategies, LU and paging that have been already investigated

in this section; twelve possible combinations can be employed for the mixed LU-paging

strategies. Figure 4.11 shows performance of the mixed strategies where each LU and

Paging combination is mixed as pair in term of signaling activities. As shown in this

figure, the PG_B and LU_A combination is the worst pair and the PG_C and LU_D is the

best pair in terms of paging and updating cost reductions.

0%

2%

4%

6%

8%

10%

12%

14%

16%

A B C

Net

wor

k U

sage

Location Management Strategies

Page 115: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

98

Figure 4.11 A mixed LU and Paging signaling activities

Based on paging results which give the lowest activities, four best mixed LU-Paging pair

is selected to analyze as shown in Table 4.1. Figure 4.12 shows the CDF plot of the four

strategies. With strategy D as the benchmark, the result show that the CDF of strategy A,

B, and C are 61%, 30%, and 22% respectively. This result shows that the mixed strategy

A is superior to others that will give the lower signaling activities and the best choice to

implement.

Table 4.1 Strategy for mixed LU-Paging Pair Strategy Mixed LU-paging pair

A LU_D and PG_C

B LU_B and PG_C

C LU_D and PG_A

D LU_C and PG_C.

0,00

0,10

0,20

0,30

0,40

0,50

0,60

0,70

0,80

0,90

1,00

PG_A PG_B PG_C

Nor

mal

ized

Val

ue

The number of Signaling Activities

Combined LU:

LU_A

LU_B

LU_C

LU_D

Page 116: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

99

Figure 4.12 Comparison of mixed LU-Paging strategies performance

4.4 SUMMARY

In this chapter, location update and paging scheme and strategy using two hierarchical

registration systems have been evaluated. Result shows that the performance of the

network is affected by the signaling registration; in general the cost is higher in VLR

compared to HLR system. This results, as using random walk mobility in which the MS

frequently across the cell or LA border that degrades the network performance.

Simulation results show that the number of MS activities is higher in the LA border

especially in single-cell in HLR compared to others strategies. In contrasts, the balanced-

cell strategy has the least VLR and HLR updating. This strategy outperforms the other

two strategies in terms of percentage of registration signaling of 22.28% while for single-

cell and unbalanced-cell strategies, the percentage of registration signaling are 35.16% in

and 42.56% respectively. Also, a practical mixed strategy of LU and Paging has been

studied and evaluated. The cost function of the analysis is counted as a number of

signaling activities in LU and paging strategies in cumulative distribution function.

Page 117: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

100

Simulation results showed the performance of LU case: Strategy LU_D gives superior

performance (76%) with respect to the other three (LU_B, LU_C and LU_A)

respectively. In the Paging case: the result of Strategy PG_C gives the best performance

(93%) with respect to others, Paging strategy PG_A and PG_B. Both of these LU and

Paging strategy employed larger data set. The strength of these strategies is that it

minimizes the cost of calculating the redundant data. Simulation results show that

strategy A, a combination of LU_D and PG_C, give the lower signaling activities with

cumulative distribution function (cdf) value of 61% with respect to the worst case

combination of strategy D. The results show that less than 10% signaling activities in

position analysis and on the other hand location analysis shows more than 50% signaling

activities in the system. The greater value in location analysis is growing as the effect of

subscribers’ mobility behavior within the logical structure of the network. The result of

street lane mobility model shows that 36% of subscribers are distributed in cluster-1 of

balanced location area and 42% of subscribers are stayed in cluster-1 of unbalanced

location area. Furthermore, the results of mobile subscribers using eight direction random

walk mobility is 46% distributed in cluster-3 of unbalanced location area while mobile

subscribers using four direction random walk mobility is 39% distributed in cluster-1 of

balanced location area. These outcome means that the role of mobility model has

influenced to the number of signaling activities in service area which using in the

network.

Page 118: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

CHAPTER V

FUZZY LOGIC-BASED MOBILITY MANAGEMENT SCHEME

5.1 INTRODUCTION

In this chapter, the graph analysis and fuzzy logic approach to solve mobility

management problem will be described. The direction schemes and the cell clustering

strategies that designed in the Chapter 3 are used to evaluate the behavior of the generated

MS in the simulation area. Then, graph theory is used to characterize the patterns of the

direction of MS in accordance with the proposed mobility. In the last section, the

application of fuzzy logic technique is used to optimize the location management

operation. To obtain the result, three parameters: density, residence time and speed are

used to evalute the performance of fuzzy logic technique.

5.2 GRAPH ANALYSIS

In Chapter 3, direction schemes have been described as shown in Table 3.3. For all of the

schemes designed, MS has ¼ probability to select the direction in random walk mobility

model depended on direction threshold, α. In terms of graph analysis as shown in Table

3.4, all the graph direction of the simulation can be reduced to 24 unique pattern as shown

in Figure 5.1. MS can start and go to its destination or end point and can go back to its

previous starting point. The reduction can be done by using the isomorphism as described

in section 2.8.1 of Chapter 2. Using this technique, the user behavior can be described

easily. Repeated and non repeated pattern are to analyze the behavior of MS of the

proposed mobility models. Repeated pattern is a description of MS behavior and its

Page 119: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

102

direction, for example always direction 1 is repeated and for non repeated pattern, MS

will travel with different direction for every observed pattern slot.

Figure 5.1 Unique pattern of 4-directions

From the result of mobility for each the proposed direction schemes, most of the

evaluation schemes show that repeated pattern more than 75% as shown in Table 5.1.

From the table, the simulation results show that scheme C has the highest pattern

distribution for repeated pattern. This behavior describes that MS has a limited travel

distance and has more signaling on the same network compared to non-repeated pattern.

For all the users, the average result shows that about 8.78%, 8.09%, 5.24% respectively to

scheme A, scheme B and scheme C, users repeated the path.

Page 120: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

103

Table 5.1 Pattern distributions

Pattern Distribution

Scheme A Scheme B Scheme C

Repeated Pattern 77.78% 80.00% 86.67%

Non-repeated Pattern 22.22% 20.00% 13.33%

Also, in this section, these schemes are analyzed based on clustering approach of

cell strategy: single-cell, balanced-cell and unbalanced-cell. The results show that MS has

the highest mobility in the service area with distributions for each strategy 39%, 51% and

47% respectively (The figures of these data are shown in Appendix B). These results

indicate that MS is not taking all the existing cells within the service area. Based on

balanced-cell strategy that used seven location areas as service area, the result shows that

only six location area are occupied. The highest occupation of MS is 36% in Scheme A,

35% in Scheme B and 27% in Scheme C. All of these schemes are implemented for

balanced approach as shown in Figure 5.2 to Figure 5.4.

Figure 5.2 MS distribution for scheme A using balanced-cell strategy

14%

27%

36%

12%9%

2%0%

0%

10%

20%

30%

40%

1 2 3 4 5 6 7

Location Area (Balanced)

MS Distributions - Scheme A

Page 121: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

104

Fig. 5.3 MS distribution for scheme B using balanced-cell strategy

Figure 5.4 MS distribution for scheme C using balanced-cell strategy

In unbalanced-cell analysis, the result quite similar to balanced-cell analysis that a

location area is not utilize to all the service area. In unbalanced-cell, the highest

occupation of MS is 32% in Scheme A, 32% in Scheme B and 28% in Scheme C. All of

these schemes are implemented for unbalanced approach as shown in Figure 5.5 to Figure

5.7. From the figures, the results show that the highest occupation for unbalanced are in

16%

35%

19% 19%

7%4%

0%

0%

10%

20%

30%

40%

1 2 3 4 5 6 7

Location Area (Balanced)

MS Distributions - Scheme B

23% 22%

27%

14%10%

4%

0%

0%

10%

20%

30%

1 2 3 4 5 6 7

Location Area (Balanced)

MS Distributions - Scheme C

Page 122: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

105

cluster 2 in scheme A, cluster 3 in scheme B and cluster 3 in scheme C. In term of

mobility characteristic, the results show that 90% of service areas are occupied by MS for

both balanced and unbalanced strategies while in cell strategy approach the distribution

for all the schemes the result is less that the above strategies in terms of service.

Figure 5.5 MS distribution for scheme A using unbalanced-cell strategy

Figure 5.6 MS distribution for scheme B using unbalanced-cell strategy

8%

29%32%

17%

10%

4%0%

0%

10%

20%

30%

40%

1 2 3 4 5 6 7

Location Area (Unbalanced)

MS Distributions - Scheme A

11%

32%28%

16%

8%5%

0%

0%

10%

20%

30%

40%

1 2 3 4 5 6 7

Location Area (Unbalanced)

MS Distributions - Scheme B

Page 123: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

106

Figure 5.7 MS distribution for scheme C using unbalanced-cell strategy

To characterize the mobility pattern of these schemes, the evaluation will be done

by pairing the pattern to the Table 3.3. The movement direction pattern for each

implemented schemes for a portion of overall plot is shown in Figure 5.8. The sequences

of each movement direction show that MS moves depend on threshold value and compare

the all the schemes, the pattern is unique. In the figure, the movement direction index: 1,

2, 3 and 4 are representing to East, North, West and South respectively.

Figure 5.8 Movement pattern of the tested schemes

19%

28%

19%21%

11%

2%0%

0%

10%

20%

30%

1 2 3 4 5 6 7

Location Area (Unbalanced)

MS Distributions - Scheme C

Page 124: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

107

In Figure 5.9 shows the comparison of the three schemes. Each scheme has its

own pattern sequences and compare to each other, we found that no a single scheme

repeat the same pattern.

Figure 5.9 Direction scheme pattern distributions

5.3 FUZZY LOGIC ANALYSIS

Fuzzy logic is used to optimize the previous result that shown in Chapter 4 using location

management approach. Three parameters: Speed, Density and Residence time are used

for fuzzy evaluation. As described in Chapter 3, three input of membership functions are

defined within the range: speed interval [0, 90], density interval [0, 1], and residence time

interval [0 150]. In Malaysia, the speed limit regulation on the highway is adopted in this

simulation. The value of density will be 1 if the street condition is congested. The MS is

assumed to be in a cell with the maximum time is 150. These parameters will be the input

of fuzzy environment and process with 10-set of fuzzy rules to perform the location

update result as shown in Table 5.2.

00,050,1

0,150,2

0,250,3

0,350,4

A B C

Dir

ecti

on

dist

ribu

tion

(%)

Direction Schemes

East North West South

Page 125: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

108

Table 5.2 The proposed 10-set of fuzzy rules

No. Speed Density ResTime Results

1 Low Low Short No Update

2 Low Low Average No Update

3 Low Average Short No Update

4 Low High Average No Update

5 Average Low Average LU

6 Average Average Average LU

7 High Short No Update

8 High Average LU

9 Fast LU

10 Long LU

The rules that shown in Table 5.2 then constructed in if-then formulation to be

used in fuzzy environment is shown in Figure 5.10.

Figure 5.10 If-then structures in fuzzy environment

Page 126: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

109

By optimizing the FIS Membership Functions (MFs) with respect to a

performance criterion, the resulting FIS can lead to an optimal solution with respect to

that criterion. Once all the MFs have been properly defined and the FIS reasoning and

defuzzification method are selected, the process to optimize the FIS parameters can begin.

The proposed FIS parameter optimization methodology consists of a set of simple steps,

which includes:

a. Selection of the appropriate fuzzy reasoning and defuzzification method

b. Implementation of the selected fuzzy reasoning and defuzzification method

c. Optimization of the FIS

d. Evaluation of results from the optimization process

In the previous chapter, LU and paging have been calculated. In this chapter, the

all data which record in the previous result then feed to this fuzzy. To obtain the result,

the fuzzy mechanism will work with the threshold limit. Figure 5.11 to Figure 5.13 show

the surface of the combination of input threshold.

Figure 5.11 Surface of residence time and density

Page 127: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

110

Figure 5.12 Surface of speed and residence time

Figure 5.13 Surface of speed and density

Page 128: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

111

Location update cost is the concern of this simulation result. As stated in the rules,

only five conditions will perform location update and calculate as a cost if:

a. Speed is fast

b. Residence time is long

c. Density is High, Residence time is Average

d. Speed is Average, Density is Average, Residence time is Average

e. Speed is Average, Density is Low, Residence time is Average

The example of the result is presented as shown in Figure 5.14. In this figure, the

result is 1.72 which mean no update activity has been done. The threshold for calculating

a update cost if it value is greater or equal to 5. The overall calculation are presented in

the following section in this chapter

Figure 5.14 An example of result using fuzzy logic

5.4 PERFORMANCE EVALUATION

Two techniques have been done in this thesis to evaluate the performance of mobility

management schemes, numerical results which carry out using simulation and the result

Page 129: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

112

using fuzzy technique. In Chapter 4, many findings are presented and here the previous

results are analyzed and compared to fuzzy results. As shown in Table 5.3, three

strategies: cell, balanced-cell and unbalanced-cell using two types mobility models,

random walk and street lane model are presented. For random walk, there are two models

with ¼ and 1/8 directions as shown in Figure 3.5.

Table 5.3 Conventional and fuzzy results comparison

Strategy Mobility Models Conventional Fuzzy-based

Cell Random walk 4-directions 67.5% 44.7%

8-directions 67.6% 44.3%

Street Lanes 66.9% 45.1%

Balanced-cell 4-directions 23.2% 22.6%

8-directions 23.3% 22.1%

Street Lanes 21.5% 20.9%

Unbalanced-cell 4-directions 20.3% 20.0%

8-directions 22.0% 21.1%

Street Lanes 21.0% 20.6%

As shown in Table 5.3, in cell strategy, fuzzy-based has achieved about 20% lower in

signaling cost compared to conventional approach. Otherwise, in balanced-cell and

unbalanced-cell, also all fuzzy-based results outperform the conventional mechanism with

a significant reduction.

5.5 SUMMARY

In this chapter, graph theory is used to evaluate the behavior of user mobility. The

analysis has shown that repeated pattern more activities than non-repeated pattern. Also,

user distribution as the result simulation is evaluated. For both of balanced-cell and

unbalanced-cell, result shows that only one location area is not utilized at location area 7

which is 0%. Later, Fuzzy logic is proposed to evaluate location management operation

using mobility modeling this thesis. All the results were used in the Chapter 4 then

evaluated and compared to fuzzy logic technique. The results of using fuzzy logic

Page 130: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

113

technique show that location update cost using fuzzy logic is decreased. The reductions

are varied depended on the strategies implementation. This result validates the optimality

of the implemented fuzzy logic technique and show that this technique outperforms the

conventional mechanisms for the entire tested mobility model.

Page 131: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

CHAPTER VI

CONCLUSION

6.1 INTRODUCTION

This chapter concludes the entire research on mobility and location management in

cellular radio network. Geographical user distribution and mobility have an important

effect on cellular network capacity. The mobility of users offer a great flexibility to make

and receive calls anywhere and anytime while in mobile activity as long as the service is

available. To handle and maintain all the mobile communication transaction, mobility

management has played an important task. Mobility management has two tasks: handoff

management and location management.

Location management schemes are essentially based on users' mobility and

incoming call rate characteristics. There are two important tasks in location management:

location update and paging. The location update procedure allows the system to keep

location knowledge more or less accurately in order to find the MS in case of an incoming

call, for example. Location registration also is used to bring the user's service profile near

its location and allows the network to rapidly provide the MS with services. The paging

process achieved by the system consists of sending paging messages in all cells where the

MS could be located.

To evaluate the performance of location management operation, two mobility

models have been developed, Random Walk Mobility Model with a direction threshold

and Street Lane Mobility Model. Random Walk Mobility Model is constructed in two

Page 132: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

115

direction variations. The first model has four directions and the other model has eight

directions. In these models, MS can freely move in the service area. In the street lane

model, MS will stay only on the street and has to follow some restriction like no return

and always go forward.

6.2 CONCLUSION

The main goal of the research is to achieve the minimum cost of location management

using mobility management concept in cellular communication system. Result shows that

the performance of the network is affected by the signaling registration; in general the

cost is higher in VLR compared to HLR system. For example, using random walk

mobility in which the MS frequently across the cell or LA border has degraded the

network performance. Simulation results show that the number of MS activities is higher

in the LA border especially in single-cell in HLR compared to others strategies, balanced-

cell and unbalanced-cell. In contrasts among the strategies, the balanced-cell has the least

VLR and HLR updating. This strategy outperforms the other two strategies 22.28% of

registration signaling while for single-cell and unbalanced-cell strategies, the percentage

of registration signaling are 35.16% in and 42.56% respectively. Also, a practical mixed

strategy of LU and Paging has been studied and evaluated. The cost function of the

analysis is counted as a number of signaling activities in LU and paging strategies in

cumulative distribution function. Simulation results showed the performance of LU case:

strategy LU_D gives superior performance (76%) with respect to the other three (LU_B,

LU_C and LU_A) respectively. In the paging case: the result of strategy PG_C gives the

best performance (93%) with respect to paging strategy PG_A and PG_B. Both of these

LU and paging strategy employed larger data set. The strength of these strategies is it

minimizes the cost of calculating the redundant data. Simulation results show that

strategy A, a combination of LU_D and PG_C, give the lower signaling activities with

cumulative distribution function value of 61% with respect to the worst case combination

of strategy D.

Page 133: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

116

The results show that LU signaling activities have been reduced in the system.

Mobility models and the proposed service area strategies have also impact the result. The

result of street lane mobility model shows that subscribers are distributed in the center

cluster of simulated balanced and unbalanced location area. Furthermore, the results of

MSs using eight direction random walk mobility is concentrated at certain edge-cluster of

simulated service area of both balanced and unbalanced location area models. These

outcome means that the role of mobility model has influenced to the number of signaling

activities in service area which using in the network. Random walk has shown greater

signaling activities compared to street lane model. This can be influenced as the effect of

subscribers’ mobility behavior within the logical structure of the network. The results of

using fuzzy logic technique show that location update costs are decreased. These results

validate the optimality of the implemented fuzzy logic technique and show that this fuzzy

logic technique outperforms the conventional approach for the entire tested mobility

model.

6.3 FUTURE WORK

For future work and based on the limitation of the simulation, the following are possible

subjects:

a. Applying method that can reduce the signaling overhead on the radio link

produced by location management operation using optimization technique such as

the neural network. The method should consider the current network and obtain

the real subscriber data for the evaluation. In this approach mobility modeling can

be omitted.

b. Study and quantify the effect of the hot spots on the total cost of location

management for and on the overall utilitiztion of cellular network. A detailed

understanding of hotspot can help in conducting more realistic simulations and

enable improved network design.

Page 134: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

REFERENCES

Abutaleb, A. & Li, V. 1997. Location update optimization in personal communication

systems. Wireless Networks 3: 205-216. Akyildiz, I. F, McNair, J., Ho, J.S.M. & Uzunalioglu, H., and Wang W. 1999. Mobility

management in next generation wireless systems. IEEE Proc. Journal 87(8): 1347-1385.

Akyildiz, I.F., Ho, J.S.M & Lin, Y.B. 1996. Movement-based location update and

selective paging for PCS networks. IEEE/ACM Trans. on Networking 4(4): 629-639.

Akyildiz, I.F., McNair J., Ho, J.S.M., Uzunalioglu H. & Wang, W., 1998. Mobility

Management in Current and Future Communication Networks. IEEE Network Magazine 12(4): 39-50.

Ali, S., Ismail, M. & Mat, K. 2007. Development of a mobility management simulator for

3G cellular network. Proc. of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, pp. 741-746.

Alonso, S. K. eMathTeacher: Mamdani's Fuzzy Inference Method.

http://www.dma.fi.upm.es/java/fuzzy/fuzzyinf/introfis_en.htm [11 February 2008] Ames, P. & Gabor, J. 2000. The Evolution of Third-Generation Cellular Standards. Intel

Technology Journal 4(2): 1-6. Anon. 1993. Mobility Model for UMTS (final). MONET Project report. Deliverable No.

R2066/SESA/GA2/DS/P/015/b2. Anon. 2005. UMTS/3G History and Future Milestones.

http://www.umtsworld.com/umts/history.htm [12 Mei 2010]. Anon. 2006. Call Routing.

http://www.privateline.com/mt_gsmhistory/07_network_aspects/vii_call_routing/ [12 October 2009]

Anon. 2009. Indonesia Overtakes Japan to Take Third Place in Asia Subscriber Rankings

http://www.cellular-news.com/story/37104.php [21 April 2010] Anon. 2010a. 2.5 Billion GSM Subscribers Worldwide.

http://www.3gamericas.org/index.cfm?fuseaction=pressreleasedisplay&pressreleaseid=133 [30 January 2011]

Page 135: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

118

Anon. 2010b. Global Mobile Growth. World Cellular Information Service, Informa Telecoms & Media. http://www.3gamericas.org/index.cfm?fuseaction=page&pageid=322 [10 May 2010]

Anon. 2011a. Global Mobile Market Share. World Cellular Information Service, Informa

Telecoms & Media. http://www.4gamericas.org/index.cfm?fuseaction=page&pageid=565 [10 April 2011]

Anon. 2011b. Global Mobile Subscription Distribution. World Cellular Information Service,

Informa Telecoms & Media. http://www.4gamericas.org/index.cfm?fuseaction=page&pageid=566 [10 April 2011]

Anon. 2010b. Introduction to GSM. http://www.pt.com/page/tutorials/gsm-tutorial [5

August 2008] Assouma, A.D., Beaubrun, R., & Pierre, S. 2006. Mobility management in heterogenous

wireless system. IEEE Journal on Selected Areas in Communications 24(3): 638-648.

Astrain, J. J. & Villdangos, J. 2004. Fuzzy mobility management in cellular

communication systems. In Freire, M.M., Chemouil, P., Lorenz, P. & Gravey, A. (ed.). Universal multiservice networks, pp. 145-154. Springer Berlin/Heidelberg.

Astrain, J. J. & Villdangos, J., Castillo, M., Garitagoita, J. R. & Farina, F. 2004. Mobility

management in cellular communication systems using fuzzy systems. In Niemegeers, I. & de Groot, S.H. (ed.). Personal wireless communications, pp. 79-91. Springer Berlin/Heidelberg.

Aziz, S. A. & Parthiban, J. 1996. Fuzzy Logic.

http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/sbaa/report.fuzzysets.html [12 April 2009]

Bae, I-H. & Kim, Y-J. 2007. An adaptive location service on the basis of fuzzy logic for

MANETs. In Melin, P., Castillo, O., Ramírez, E.G., Kacprzyk, J. & Pedrycz, W. (ed.). Analysis and design of intelligent systems using soft computing techniques. pp. 558-565. Springer Berlin/Heidelberg.

Bar-Noy, A., Kessler, I. & Sidi, M. 1995. Mobile users: to update or not to update?

Wireless Networks 2(1): 175-185. Bar-Noy, A. & Mansour, Y. 2004. Competitive on-line paging strategies for mobile users

under delay constraints. Proc. of the twenty-third annual ACM symposium on Principles of distributed computing, pp. 256-265.

Page 136: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

119

Bejerano, Y. 2000. Efficient mobility management schemes for personal communication systems. Ph.D thesis. Faculty of Electrical Engineering. The Technion-Israel Institute of Technology, Israel.

Bettstetter, C. 2001. Smooth is better than sharp: a random mobility model for simulation

of wireless networks. Proc. of the 4th ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems, pp. 19-27.

Bhattacharya, A. & Das, S. K. 1999. LeZi-update: an information-theoretic approach to

track mobile users in PCS networks. Proc. of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 1-12.

Bih, J. 2006. Paradigm shift - an introduction to fuzzy logic. IEEE Potential,

January/February: 6-10; 21. Brown, T. X & Mohan, S. 1997. Mobility management for personal communications

systems. IEEE Trans. on Vehicular Technology 46(2): 269-278.

Chang, J-M., Chang, C-Y. & Lin, T-H. 2008. Using a novel efficient location management approach in cellular networks. The first IEEE International Conference on Ubi-Media Computing, pp. 149-154.

Chiang, K-H. & Shenoy, N. 2004. A 2-D random-walk mobility model for location-

management studies in wireless networks. IEEE Trans. on Vehicular Technology 53(2): 413-424.

Chuon, C., Guha, S., & Hossain, A.K.M.M. 2005. Individual profile graphs for location

management in PCS networks. International Conference on Wireless Networks, Communications and Mobile Computing 1: 187-192.

Cirstea, M.N. 2002. Neural and fuzzy logic control of drives and power systems. Oxford:

Newnes. Das, S.K. & Sen, S.K. 1997. A new location update strategy for cellular networks and

its implementation using a genetic algorithm. Proc.of the 3rd annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 185-194.

Davies, V. A. 2000. Evaluating mobility models within an ad hoc network. Master thesis.

Colorado School of Mines, USA. Dechaux, C. & Scheller, R. 1993. What are GSM and DCS. Electrical Communication,

2nd Quarter.

Page 137: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

120

Demirkol, I., Ersoy, C., Caglayan, M.U., & Delic, H. 2004. Location area planning and cell-to-switch assignment in cellular networks. IEEE Transactions on Wireless Communications 3(3): 880 - 890

Dubois, D. & Prade, H. 1988. Fuzzy sets and systems. New York: Academic Press. Escalle, P. G., Giner, V. C. & Oltra, J. M. 2002. Reducing location update and paging

costs in a personal communications services network. IEEE Trans. on Wireless Communications 1(1): 200-209.

Fang, Y & Ma, W. 2004. Mobility management for wireless networks: modeling and

analysis. In M. Guizani (ed.). Wireless Communications Systems and Networking, pp. 473-512. New York: Plenum Press.

Frullone, M., Grazioso, P., & Serra, A. M. 1992. Performance evaluation of a personal

communication system in a urban environment. Proc. 42th IEEE Vehicular Technology Conference, pp. 498-501.

Gelabert, X., Pérez-Romero, J., Sallent, O., Agustí, R. & Casadevall, F. 2005. Radio

resource management in heterogeneous networks. Third International Working Conference on Performance Modelling And Evaluation of Heterogeneous Networks. Ilkley, West Yorkshire, U.K. pp. T02/1-T02/12.

Gray, A. Abbena, E. & Salamon, S, 2006. Modern differential geometry of curves and

surfaces with mathematica. Third Edition. Boca Raton: Chapman and Hall/CRC. Hać, A. & Sheng, C. 1996. User mobility management in pcs network: hierarchical

databases and their placement. 5th IEEE International Conference on Universal Personal Communications 2: 847-851.

Ho, J.S.M. & Akyildiz, I.F. 1995. Mobile user location update and paging under delay

constraints. ACM/Baltzer Wireless Networks 1(4): 413-425. Hong, D. & Rappaport, S.S. 1986. Traffic Model and Performance Analysis for Cellular

Mobile Radio Telephone Systems with Prioritized and Non-Prioritized Hand-Off Procedures. IEEE Trans. on Vehicular Technology 35(3): 77-92.

Horstkotte, E. 2000. Fuzzy Expert System. http://www.austinlinks.com/Fuzzy/expert-

systems.html [23 August 2008] ITU. 2005. Structure of the land mobile global title for the Signalling Connection Control

Part (SCCP). Geneva: ITU-T Recommendation E.214 (02/2005). ITU. 2008. The international identification plan for public networks and subscriptions.

Geneva: ITU-T Recommendation E.212 (05/2008).

Page 138: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

121

ITU. 2010. The international public telecommunication numbering plan. Geneva: ITU-T Recommendation E.164 (11/2010).

Jabbari, B., Colombo, G., Nakajima, A. & Kulkarni, J. 1995. Network issues for wireless

communication. IEEE Communication Magazine 33(1): 88-98. Jiang, T & Li, Y. 1996. Generalized defuzzification strategies and their parameter

learning. IEEE Trans. on Fuzzy Systems 4(1): 64-71. Kaaranen, H., Ahtiainen, A., Laitinen, L., Naghian, S. & Niemi, V. 2005. UMTS

networks: architecture, mobility, and services. 2nd ed. Chichester: John Wiley & Sons, Ltd.

Kaul, S., Ali, F. Janakiram, S. & Wattenstrom, B. 2008. Business models for sustainable

telecoms growth in developing economies. Chichester: John Wiley & Sons. Kreher, R. & Rüdenbusch, T. 2005. UMTS signaling: UMTS interfaces, protocols,

message flows and procedures analyzed and explained. Chichester: John Wiley & Sons.

Lam, D., Cox, D.C. & Widom, J. 1997. Teletraffic modeling for personal communications services. Communication Magazine 35(2): 79 – 87.

Le, J., Liu, L., Guo, Y. & Ying, M. 2008. Supported high-update method on road

network. 4th International Conference Wireless Communications, Networking and Mobile Computing, pp. 1-4.

Lee, W.C.Y. 1995. Mobile cellular telecommunications - analog and digital systems.

New York: McGraw-Hill, Inc. Lee, D-J., Lee, H-J., & Cho, D-H. 2004. Intelligent paging strategy based on location

probability of mobile station and paging load distribution in mobile communication networks. IEEE International Conference on Communication 1: 128-132.

Lei, Z. Sarayday, C.U. & Mandayam, N.B. 2000. Paging area optimization based on

interval estimation in wireless personal communication networks. Mobile Networks and Application 5(1): 85-99.

Leski, J.M. 2004. An ε-margin nonlinear classifier based on fuzzy if–then rules. IEEE

Trans. on Systems, Man, and Cybernetics—part B: Cybernetics 34(1): 68-76. Liang, B. & Haas, Z. J. 1999. Predictive distance-based mobility management for

multidimensional PCS networks. IEEE INFOCOM’99. 1-8. Lin, Y.-B. 1997. Reducing location update cost in a PCS network. IEEE/ACM Trans. on

Networking 5(1): 25-33.

Page 139: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

122

Lin, Y-B. 2001. Eliminating overflow for large-scale mobility databases in cellular telephone networks. IEEE Trans. on Computers 50(4): 356–370.

Lo, C.N., Mohan, S. & Wolff, R.S. 1994a. Performance modeling and simulation of data

management for personal communications applications. Proc. IEEE PIMRC’92, pp. 1210-1241.

Lo, C.N., Wolff, R.S., & Bernhart, R.C. 1994b. An estimate of network database

transaction volume to support personal communication services. Proc. International Conference on Universal Personal Communication, pp. 236-241.

Madany, L.J., Madkour, M.A., & Al-Talhi, A.H. 2009. Characteristics of mobility models

for mobile ad hoc networks. IEEE International Conference on Signal and Image Processing Applications, pp. 554 - 558.

Madhavapeddy, S. 1994. Optimal paging in cellular mobile telephone system. 14th Proc.

International Teletraffic Congress, pp. 493-502. Madhow, U., Honig, M.L. & Steiglitz, K. 1995. Optimization of wireless resources for

personal communications mobility tracking. IEEE/ACM Trans. on Networking 3(6): 698-707.

Maloberti, A. 1989. Radio transmission interface of the digital Pan European mobile

system. IEEE Vehicular Technology Conference, pp. 712-717. Mamdani, E.H. 1977. Application of fuzzy logic to approximate reasoning using

linguistic synthesis. IEEE Trans. Computers C-26(12): 1182-1191. Markoulidakis, J. G. & Sykas, E. D. 1995. Performance bounds of a multiple step paging

strategy. International Journal Wireless Information Networks 2(3): 133-147. Markoulidakis, J.G., Lyberopoulos, G.L., Tsirkas, D.F. & Sykas, E.D. 1997. Mobility

modelling in third generation mobile telecommunication systems. IEEE Personal Communications magazine, pp. 41-55.

MCMC. 2007. Trends and Markets in Malaysia Mobile Service. Industry report 5. Nack, F. 2003. Migrating from mobile telephony to multipurpose gadgets. IEEE

Multimedia 10(2): 8-11. Okasaka, S., Onoe, S., Yasuda, S. & Maebara, A. 1991. A new location updating method

for digital cellular systems. IEEE 41st Vehicular Technology Conference, pp. 345-350.

Ojanperä, T. & Prasad, R. 2001. WCDMA: Towards IP mobility and mobile internet.

Boston: Artech House.

Page 140: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

123

Ou, D-X., Lam, K-Y. & Dong, D-C. 2002. An adaptive direction-based location update scheme for next generation PCS networks. Proc. of the 13th International Conference on Database and Expert Systems Applications, pp. 413-422.

Osmani, A., Haghighat, A.T. & Kargahi, M. 2009. FLS: a fuzzy-based location-service in

mobile ad-hoc wireless networks. International Conference on Ultra Modern Telecommunications & Workshops (ICUMT '09), pp. 1-5.

Pollini, G.P. & Chih-Li, I. 1997. Profile based location strategy and its performance.

IEEE Journal on Selected Areas in Communications 15(8): 1415-1424. Prasad, R. & Ruggeiri, M. 2003. Technology trends in wireless communications. Boston:

Artech House. Puterman, M. L. 1994. Markov decision processes: discrete stochastic dynamic

programing. 4th ed. New York: John Wiley & Sons. Rea, S. & Pesch, D. 2004. Multi-metric routing decisions for ad hoc networks using fuzzy

logic, 1st International Symposium on Wireless Communication Systems, pp. 403-407.

Rose, C. & Yates, R. 1995. Minimizing the average cost of paging under delay

constraints. ACM/Baltzer Wireless Networks 1(2): 211-219. Rose, C. 1996. Minimizing the average cost of paging and registration: a time-based

method. ACM Wireless Networks 2(2): 109-116. Roy, A., Misra, A. & Das, S.K. 2007. Location update versus paging trade-off in cellular

networks: an approach based on vector quantization. IEEE Trans. on Mobile Computing 6(12): 1426-1440.

Royer, E. M., Melliar-Smith, P. M. & Moser, L. E. 2001. An analysis of the optimum

node density for ad hoc mobile networks. Proc. of the IEEE International Conference on Communications (ICC), pp. 857-861.

Rubin, I. & Choi, C. W. 1997. Impact of the location area structure on the performance of

signaling channels of cellular wireless networks. IEEE Communications Magazine 35(2): 108-115.

Ryu, S.H., Lee, K.H., Oh, Y.Y., Lee, J.Y. & Lee, S.B. 1999. Adaptive time-based

location update scheme using fuzzy logic. International Conference on Consumer Electronics, pp. 322-323.

Saraydar, C.U., Kelly, O.E. & Rose, C. 2000. One dimension location area design. IEEE

Trans. on Vehicular Technology 49(5): 1626-1632.

Page 141: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

124

Scourias, J. & Kuhn, T. 1999. An activity-based mobility model and location management simulation framework. Proc. of the 2nd ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems, pp. 61-68.

Senzaki, D. & Chakraborty, G. 2008. Mobility management using movement feature for

next generation cellular networks. 8th IEEE International Conference on Computer and Information Technology, pp. 682-687.

Seskar, I., Maric, S., Holtzman, J. & Wasserman, J. 1992. Rate of location area updates in

cellular systems. Proc. of IEEE Vehicular Technology Conference, pp. 694-697. Siler, W. & Buckley, J.J. 2005. Fuzzy expert system and fuzzy reasoning. New Jersey:

John Wiley & Sons, Inc. Singh, J. & Karnan, M. 2010. Using a novel intelligent location management strategy in

cellular networks. International Conference on Signal Acquisition and Processing (ICSAP ’10), pp. 238-242

Sivanandam, S.N., Sumathi, S. & Deepa, S.N. 2007. Introduction to fuzzy logic using

MATLAB. Heidelberg: Springer-Verlag. Somasundaram, R.M. & Beaula, T. 2009. Fuzzy categories and fuzzy power set functors.

International Journal of Algorithms, Computing and Mathematics 2(3): 117-121. Steele, R., Whitehead, J. & Wong, W. C. 1995. System aspects of cellular radio. IEEE

Communication Magazine 33(1): 80-87. Smith, C. & Collins, D. 2002. 3G wireless networks. New York: McGraw-Hill

Professional. Sun, J. & Sauvola, J. 2002. Mobility and mobility management: a conceptual framework.

Proceedings of the 10th IEEE International Conference on Networks, pp. 205-210.

Tabbane, S. 1997. Location management methods for third-generation mobile systems.

IEEE Communication Magazine 35(8): 72-78; 83-84. Tolety, V. 1999. Load reduction in ad hoc networks using mobile servers. Master thesis.

Colorado School of Mines. Tung, T. & Jamalipour, A. 2004. Adaptive location management strategy to the distance-

based location update technique for cellular networks. IEEE Wireless Communications and Networking Conference (WCNC) 1: 172-176.

Page 142: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

125

Uspensky, J. V. 1937. Introduction to mathematical probability. New York: Mc Graw-Hill.

Dimitrios D. Vergados, D.D., Panoutsakopoulos, A. & Douligeris, C. Location

management in 3G networks using a 2-level distributed database architecture. The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'07), pp. 1-5.

Wan, G. & E. Lin, E. 1998. Cost reduction in location using semi-realtime movement

information. ACM-Baltzer Journals of Wireless Network (WINET) 5(4): 245-256. Wang, S-N., Lin, P., Gan, C-H & Fu, H-L. 2010. A study for location update cost in a

femtocell network. IEEE 72nd Vehicular Technology Conference Fall (VTC 2010-Fall), pp. 1-4.

Weisstein, E. 2009. Polya’s Random Walk Constants. Wolfram Research.

http://mathworld.wolfram.com/PolyasRandomWalkConstants.html [20 May 2009].

Willassen, S.Y. 1998. The GSM system. http://www.willassen.no/msl/node4.html [12

February 2009]. Wong, V.W.S. & Leung, V.C.M. 2000. Location management for next-generation

personal communications networks. IEEE Network 14(5):18–24. Wong, V.W.S. & Leung, V.C.M. 2001. An adaptive distance-based location update

algorithm for next-generation PCS networks. IEEE Journal on Selected Areas in Communications 19(10): 1942-1952.

Xie, H. & Goodman, D. J., 1993. Mobility models and biased sampling problem.

Proceeding of 2nd IEEE International Conference Universal Personal Communication (ICUPC’93), pp. 804-807.

Xie, H., Tabbane, S., & Goodman, D.J. 1993. Dynamic location area management and

performance analysis. IEEE 43rd Vehicular Technology Conference, pp. 536-539. Ye, Z. & Abouzeid, A.A. 2008. Optimal location updates in mobile ad hoc networks: a

separable cost case. IEEE Global Telecommunications Conference, pp. 1-6. Yi, M-K., Choi, J-Y., Choi, J-W., Park, S-C. & Yang, Y-K. 2010. A pointer forwarding

scheme for minimizing signaling costs in proxy mobile IPv6 networks. 7th IEEE Consumer Communications and Networking Conference (CCNC), pp. 1-5.

Zadeh, L. A. 1968. Fuzzy algorithm. Information Control 12(2): 94-102.

Page 143: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

126

Zhao, Q. Liew, S.C. & Yu, Y. 2009. Location update cost of distance-based scheme for PCS networks with CTRW model. IEEE Communication Letters 13(6): 408-410.

Zhu, Y-H. & Leung, V.C.M. 2006a. Derivation of Moving Distance Distribution to

Enhance Sequential Paging in Distance-Based Mobility Management for PCS Networks. IEEE Trans. on Wireless Communications 5(11): 3029-3033.

Zhu, Y-H. & Leung, V.C.M. 2006b. A fuzzy distance-based location management

scheme for PCS networks. VTC 2006-Spring. IEEE 63rd Vehicular Technology Conference 3: 1063 - 1067.

Zonoozi, M. M. & Dassanayake, P. 1997. User mobility modeling and characterization of

mobility patterns. IEEE Journal on Sel. Areas in Communications 15(7): 1239-1252.

Page 144: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

127

APPENDIX A

LIST OF PUBLICATIONS

Journal Rizal Munadi, Mahamod Ismail, Mardina Abdullah & Norbahiah Misran. 2011. Cost

Reduction Strategy in Location Management in Cellular Networks. International Journal on Electronic and Electrical Engineering (IJEEE). In press.

Rizal Munadi, Mahamod Ismail, Mardina Abdullah & Norbahiah Misran. 2011. Location

Management Cost Strategies in Cellular Networks. International Journal Computer Technology Application 2(1): 188-192.

Proceeding Paper

Rizal Munadi, Zainol Abidin Abdul Rashid, & Mahamod Ismail. 2003. An Optimized

Location Management Technique for 3G Wireless Networks: A Brief Review of Literature and Proposed Work. Prosiding Seminar Pelajar Siswazah (SPS 2003), Fakulti Kejuruteraan, Universiti Kebangsaan Malaysia.

Rizal Munadi, Zainol Abidin Abdul Rashid, & Mahamod Ismail. 2004. A Mixed Strategy

of Cost Reduction in Location Management in Cellular Networks. The Sixth Industrial Electronics Seminar (IES 2004).

Rizal Munadi, Zainol Abidin Abdul Rashid, & Mahamod Ismail. 2005. A Signaling Cost

Analysis in Location Management in Cellular Networks. Konferensi Nasional Sistem Informasi (KSNI 2005). Institut Teknologi Bandung.

Rizal Munadi, Zainol Abidin Abdul Rashid, & Mahamod Ismail. 2005. Network

Performance Analysis in Location management Scheme for PCS. International Conference on Instrumentation Communication and Information Technology (ICICI 2005).

Rizal Munadi, Zainol Abidin Abdul Rashid, & Mahamod Ismail. A 2005. Evaluation of

Distance-based Location Update and Sequential Paging in PCS Registration System. Proc. the 7th IEEE Malaysia International Conference on Communications (MICC 2005).

Page 145: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

128

Rizal Munadi, Mahamod Ismail & Mardina Abdullah. 2007. Characterization of User Mobility Behavior in Personal Communication Services Network. International Conference on Instrumentation Communication and Information Technology (ICICI 2007), Institut Teknologi Bandung (Indonesia).

Rizal Munadi, Mahamod Ismail & Mardina Abdullah. 2007. The Evaluation of User

Mobility Behavior in Personal Communication Service Network. Proc. of the 5th Student Conference on Research and Development (SCOReD 2007), Bangi (Malaysia). pp. 1-5.

Rizal Munadi, Mahamod Ismail, Mardina Abdullah & Norbahiah Misran. 2007. The

Impact of User Mobility in Personal Communication Service Network. Proc. of the 3rd IMT-GT Regional Conference on Mathematics, Statistics and Applications (RCMSA 2007), Penang. pp. 714-720.

Rizal Munadi, Mahamod Ismail, Mardina Abdullah & Norbahiah Misran. 2011. Location

Management Cost Reduction using Fuzzy Logic in Cellular Radio Network. Accepted in IconSpace2011, Penang, 12-13 July 2011.

Page 146: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

129

APPENDIX B

PATTERN INDEX

No. No. No. No. No.1 1 1 1 1 52 1 4 1 4 103 2 3 2 3 154 3 2 3 2 205 4 1 4 12 1 1 1 2 53 1 4 2 1 104 2 3 2 4 155 3 2 3 3 206 4 1 4 23 1 1 1 3 54 1 4 2 2 105 2 3 3 1 156 3 2 3 4 207 4 1 4 34 1 1 1 4 55 1 4 2 3 106 2 3 3 2 157 3 2 4 1 208 4 1 4 45 1 1 2 1 56 1 4 2 4 107 2 3 3 3 158 3 2 4 2 209 4 2 1 16 1 1 2 2 57 1 4 3 1 108 2 3 3 4 159 3 2 4 3 210 4 2 1 27 1 1 2 3 58 1 4 3 2 109 2 3 4 1 160 3 2 4 4 211 4 2 1 38 1 1 2 4 59 1 4 3 3 110 2 3 4 2 161 3 3 1 1 212 4 2 1 49 1 1 3 1 60 1 4 3 4 111 2 3 4 3 162 3 3 1 2 213 4 2 2 1

10 1 1 3 2 61 1 4 4 1 112 2 3 4 4 163 3 3 1 3 214 4 2 2 211 1 1 3 3 62 1 4 4 2 113 2 4 1 1 164 3 3 1 4 215 4 2 2 312 1 1 3 4 63 1 4 4 3 114 2 4 1 2 165 3 3 2 1 216 4 2 2 413 1 1 4 1 64 1 4 4 4 115 2 4 1 3 166 3 3 2 2 217 4 2 3 114 1 1 4 2 65 2 1 1 1 116 2 4 1 4 167 3 3 2 3 218 4 2 3 215 1 1 4 3 66 2 1 1 2 117 2 4 2 1 168 3 3 2 4 219 4 2 3 316 1 1 4 4 67 2 1 1 3 118 2 4 2 2 169 3 3 3 1 220 4 2 3 417 1 2 1 1 68 2 1 1 4 119 2 4 2 3 170 3 3 3 2 221 4 2 4 118 1 2 1 2 69 2 1 2 1 120 2 4 2 4 171 3 3 3 3 222 4 2 4 219 1 2 1 3 70 2 1 2 2 121 2 4 3 1 172 3 3 3 4 223 4 2 4 320 1 2 1 4 71 2 1 2 3 122 2 4 3 2 173 3 3 4 1 224 4 2 4 421 1 2 2 1 72 2 1 2 4 123 2 4 3 3 174 3 3 4 2 225 4 3 1 122 1 2 2 2 73 2 1 3 1 124 2 4 3 4 175 3 3 4 3 226 4 3 1 223 1 2 2 3 74 2 1 3 2 125 2 4 4 1 176 3 3 4 4 227 4 3 1 324 1 2 2 4 75 2 1 3 3 126 2 4 4 2 177 3 4 1 1 228 4 3 1 425 1 2 3 1 76 2 1 3 4 127 2 4 4 3 178 3 4 1 2 229 4 3 2 126 1 2 3 2 77 2 1 4 1 128 2 4 4 4 179 3 4 1 3 230 4 3 2 227 1 2 3 3 78 2 1 4 2 129 3 1 1 1 180 3 4 1 4 231 4 3 2 328 1 2 3 4 79 2 1 4 3 130 3 1 1 2 181 3 4 2 1 232 4 3 2 429 1 2 4 1 80 2 1 4 4 131 3 1 1 3 182 3 4 2 2 233 4 3 3 130 1 2 4 2 81 2 2 1 1 132 3 1 1 4 183 3 4 2 3 234 4 3 3 231 1 2 4 3 82 2 2 1 2 133 3 1 2 1 184 3 4 2 4 235 4 3 3 332 1 2 4 4 83 2 2 1 3 134 3 1 2 2 185 3 4 3 1 236 4 3 3 433 1 3 1 1 84 2 2 1 4 135 3 1 2 3 186 3 4 3 2 237 4 3 4 134 1 3 1 2 85 2 2 2 1 136 3 1 2 4 187 3 4 3 3 238 4 3 4 235 1 3 1 3 86 2 2 2 2 137 3 1 3 1 188 3 4 3 4 239 4 3 4 336 1 3 1 4 87 2 2 2 3 138 3 1 3 2 189 3 4 4 1 240 4 3 4 437 1 3 2 1 88 2 2 2 4 139 3 1 3 3 190 3 4 4 2 241 4 4 1 138 1 3 2 2 89 2 2 3 1 140 3 1 3 4 191 3 4 4 3 242 4 4 1 239 1 3 2 3 90 2 2 3 2 141 3 1 4 1 192 3 4 4 4 243 4 4 1 340 1 3 2 4 91 2 2 3 3 142 3 1 4 2 193 4 1 1 1 244 4 4 1 441 1 3 3 1 92 2 2 3 4 143 3 1 4 3 194 4 1 1 2 245 4 4 2 142 1 3 3 2 93 2 2 4 1 144 3 1 4 4 195 4 1 1 3 246 4 4 2 243 1 3 3 3 94 2 2 4 2 145 3 2 1 1 196 4 1 1 4 247 4 4 2 344 1 3 3 4 95 2 2 4 3 146 3 2 1 2 197 4 1 2 1 248 4 4 2 445 1 3 4 1 96 2 2 4 4 147 3 2 1 3 198 4 1 2 2 249 4 4 3 146 1 3 4 2 97 2 3 1 1 148 3 2 1 4 199 4 1 2 3 250 4 4 3 247 1 3 4 3 98 2 3 1 2 149 3 2 2 1 200 4 1 2 4 251 4 4 3 348 1 3 4 4 99 2 3 1 3 150 3 2 2 2 201 4 1 3 1 252 4 4 3 449 1 4 1 1 100 2 3 1 4 151 3 2 2 3 202 4 1 3 2 253 4 4 4 150 1 4 1 2 101 2 3 2 1 152 3 2 2 4 203 4 1 3 3 254 4 4 4 251 1 4 1 3 102 2 3 2 2 153 3 2 3 1 204 4 1 3 4 255 4 4 4 3

256 4 4 4 4

DirectionsDirections Directions Directions Directions

Page 147: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

130

APPENDIX C

PSEDO CODE

Procedure Generate Mobile Station in simulation area (Random Walk, 4 direction)

for MS=1, max(MS) for sim_time=1, max(time) generate MS at random position (x,y) Select direction Case 1 xpos=ms_pos+speed*sim_time*cos(0 degree) ypos=ms_pos+speed*sim_time*sin( 0 degree) Case 2 xpos=ms_pos+speed*sim_time*cos( 90 degree) ypos=ms_pos+speed*sim_time*sin( 90 degree) Case 3 xpos=ms_pos+speed*sim_time*cos( 180 degree) ypos=ms_pos+speed*sim_time*sin( 180 degree) Case 4 xpos=ms_pos+speed*sim_time*cos(270 degree) ypos=ms_pos+speed*sim_time*sin( 270 degree) If xpos, ypos are outside the simulation border the xpos=xpos-1 ypos=ypos-1 Else Store to MS table

Procedure Generate Mobile Station in simulation area (Random Walk, 8 direction)

for MS=1, max(MS) for sim_time=1, max(time) generate MS at random position (x,y) Select direction Case 1 xpos=ms_pos+speed*sim_time*cos(0 degree) ypos=ms_pos+speed*sim_time*sin( 0 degree) Case 2 xpos=ms_pos+speed*sim_time*cos( 45 degree) ypos=ms_pos+speed*sim_time*sin( 45 degree) Case 3 xpos=ms_pos+speed*sim_time*cos(90 degree) ypos=ms_pos+speed*sim_time*sin( 90 degree)

Page 148: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

131

Case 4 xpos=ms_pos+speed*sim_time*cos(135 degree) ypos=ms_pos+speed*sim_time*sin( 135 degree) Case 5 xpos=ms_pos+speed*sim_time*cos(180 degree) ypos=ms_pos+speed*sim_time*sin(180 degree) Case 6 xpos=ms_pos+speed*sim_time*cos(225 degree) ypos=ms_pos+speed*sim_time*sin(225 degree) Case7 xpos=ms_pos+speed*sim_time*cos(270 degree) ypos=ms_pos+speed*sim_time*sin( 270 degree) Case 8 xpos=ms_pos+speed*sim_time*cos(315 degree) ypos=ms_pos+speed*sim_time*sin( 315 degree) if xpos, ypos are outside the simulation border the xpos=xpos-1 ypos=ypos-1 else Store to MS table

Procedure Data Street lane

for MS=1, max(MS) generate initial random lane_data of 1,2,3 for sim_time=1, max(time) if lane_data=1 then generate lane_data of 1,2 elseif lane_data=2 then generate lane_data of 1,2,3 else generate lane_data of 2,3

Procedure Data Density lane

for MS=1, max(MS) for sim_time=1, max(time) if data_streetlane=3 then density is low elseif data_streetlane=2 then density is average else density is high

Page 149: FUZZY LOGIC-BASED MOBILITY MANAGEMENT  · PDF fileCHAPTER II LITERATURE REVIEW ... 2.2.3 3G network architecture 18 ... 2.6 International mobile subscriber identity 20

132

Procedure combination of pattern set Begin combn End combn Procedure MS distance to BS

for MS=1, max(MS) for sim_time=1, max(time) for cells=1, max(cell) locate x, y position measure the distance (x,y) find the minimum distance to BS find RSSI find channel availability select the best channel by optimizing: distance, RSSI and channel

Procedure Pattern table

for MS=1, max(MS) for sim_time=1, max(time) for cells=1, max(cell) select MS pattern

Procedure Fuzzy construct fuzzy environment with 10 rules for sim_time=1, max(time) evaluate fuzzy input(speed, restime, density)