Mobility Management in Wireless Networks: Data Replication Strategies and Applications
In wireless communication systems, the network keeps track of a user’s location through an up-to-date user profile stored in various databases. A user profile contains not only a user’s current location information, but also service information, such as billing and authentication. The cov- age area...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston, MA
Springer US
2004
|
Schlagworte: | |
Online-Zugang: | FHI01 BTU01 Volltext |
Zusammenfassung: | In wireless communication systems, the network keeps track of a user’s location through an up-to-date user profile stored in various databases. A user profile contains not only a user’s current location information, but also service information, such as billing and authentication. The cov- age area of an access network is divided into registration areas (RAs), and each RA is associated with a location database. The two basic op- ations in mobility management are location update and location lookup. When a user moves across the boundaries of these RAs, the network updates his location information in the pertinent databases. When a caller places a call using the callee’s identification, the network queries the relevant database(s) to obtain the current location and other service information of the callee. The performance of mobility management can be further enhanced by using replicas of user profiles which may be kept at various locations. Replication techniques make profile information more readily available, thus reducing lookup cost and latency, but to keep these replicas c- sistent and fresh, they must be updated whenever the user profile is updated. The principle of replication is to replicate if the benefit of replication is greater than its overhead. The difficulty, however, lies in accurately measuring the benefit and overhead |
Beschreibung: | 1 Online-Ressource (X, 166 p) |
ISBN: | 9781402078972 |
DOI: | 10.1007/b117511 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045148658 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 180827s2004 |||| o||u| ||||||eng d | ||
020 | |a 9781402078972 |9 978-1-4020-7897-2 | ||
024 | 7 | |a 10.1007/b117511 |2 doi | |
035 | |a (ZDB-2-ENG)978-1-4020-7897-2 | ||
035 | |a (OCoLC)1050940092 | ||
035 | |a (DE-599)BVBBV045148658 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-634 | ||
082 | 0 | |a 621.3 |2 23 | |
100 | 1 | |a Tian, Karen Q. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mobility Management in Wireless Networks |b Data Replication Strategies and Applications |c by Karen Q. Tian, Donald C. Cox |
264 | 1 | |a Boston, MA |b Springer US |c 2004 | |
300 | |a 1 Online-Ressource (X, 166 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a In wireless communication systems, the network keeps track of a user’s location through an up-to-date user profile stored in various databases. A user profile contains not only a user’s current location information, but also service information, such as billing and authentication. The cov- age area of an access network is divided into registration areas (RAs), and each RA is associated with a location database. The two basic op- ations in mobility management are location update and location lookup. When a user moves across the boundaries of these RAs, the network updates his location information in the pertinent databases. When a caller places a call using the callee’s identification, the network queries the relevant database(s) to obtain the current location and other service information of the callee. The performance of mobility management can be further enhanced by using replicas of user profiles which may be kept at various locations. Replication techniques make profile information more readily available, thus reducing lookup cost and latency, but to keep these replicas c- sistent and fresh, they must be updated whenever the user profile is updated. The principle of replication is to replicate if the benefit of replication is greater than its overhead. The difficulty, however, lies in accurately measuring the benefit and overhead | ||
650 | 4 | |a Engineering | |
650 | 4 | |a Electrical Engineering | |
650 | 4 | |a Data Structures, Cryptology and Information Theory | |
650 | 4 | |a Operation Research/Decision Theory | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a The Computing Profession | |
650 | 4 | |a Engineering | |
650 | 4 | |a Operations research | |
650 | 4 | |a Decision making | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Computers | |
650 | 4 | |a Electrical engineering | |
700 | 1 | |a Cox, Donald C. |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781402078965 |
856 | 4 | 0 | |u https://doi.org/10.1007/b117511 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030538357 | ||
966 | e | |u https://doi.org/10.1007/b117511 |l FHI01 |p ZDB-2-ENG |q ZDB-2-ENG_2000/2004 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/b117511 |l BTU01 |p ZDB-2-ENG |q ZDB-2-ENG_Archiv |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804178819017342976 |
---|---|
any_adam_object | |
author | Tian, Karen Q. Cox, Donald C. |
author_facet | Tian, Karen Q. Cox, Donald C. |
author_role | aut aut |
author_sort | Tian, Karen Q. |
author_variant | k q t kq kqt d c c dc dcc |
building | Verbundindex |
bvnumber | BV045148658 |
collection | ZDB-2-ENG |
ctrlnum | (ZDB-2-ENG)978-1-4020-7897-2 (OCoLC)1050940092 (DE-599)BVBBV045148658 |
dewey-full | 621.3 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.3 |
dewey-search | 621.3 |
dewey-sort | 3621.3 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/b117511 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03290nmm a2200541zc 4500</leader><controlfield tag="001">BV045148658</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180827s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781402078972</subfield><subfield code="9">978-1-4020-7897-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/b117511</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)978-1-4020-7897-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1050940092</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045148658</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tian, Karen Q.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobility Management in Wireless Networks</subfield><subfield code="b">Data Replication Strategies and Applications</subfield><subfield code="c">by Karen Q. Tian, Donald C. Cox</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Springer US</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 166 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In wireless communication systems, the network keeps track of a user’s location through an up-to-date user profile stored in various databases. A user profile contains not only a user’s current location information, but also service information, such as billing and authentication. The cov- age area of an access network is divided into registration areas (RAs), and each RA is associated with a location database. The two basic op- ations in mobility management are location update and location lookup. When a user moves across the boundaries of these RAs, the network updates his location information in the pertinent databases. When a caller places a call using the callee’s identification, the network queries the relevant database(s) to obtain the current location and other service information of the callee. The performance of mobility management can be further enhanced by using replicas of user profiles which may be kept at various locations. Replication techniques make profile information more readily available, thus reducing lookup cost and latency, but to keep these replicas c- sistent and fresh, they must be updated whenever the user profile is updated. The principle of replication is to replicate if the benefit of replication is greater than its overhead. The difficulty, however, lies in accurately measuring the benefit and overhead</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures, Cryptology and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operation Research/Decision Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">The Computing Profession</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operations research</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Decision making</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cox, Donald C.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781402078965</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/b117511</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030538357</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b117511</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="q">ZDB-2-ENG_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b117511</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="q">ZDB-2-ENG_Archiv</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045148658 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:10:01Z |
institution | BVB |
isbn | 9781402078972 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030538357 |
oclc_num | 1050940092 |
open_access_boolean | |
owner | DE-573 DE-634 |
owner_facet | DE-573 DE-634 |
physical | 1 Online-Ressource (X, 166 p) |
psigel | ZDB-2-ENG ZDB-2-ENG_2000/2004 ZDB-2-ENG ZDB-2-ENG_2000/2004 ZDB-2-ENG ZDB-2-ENG_Archiv |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Springer US |
record_format | marc |
spelling | Tian, Karen Q. Verfasser aut Mobility Management in Wireless Networks Data Replication Strategies and Applications by Karen Q. Tian, Donald C. Cox Boston, MA Springer US 2004 1 Online-Ressource (X, 166 p) txt rdacontent c rdamedia cr rdacarrier In wireless communication systems, the network keeps track of a user’s location through an up-to-date user profile stored in various databases. A user profile contains not only a user’s current location information, but also service information, such as billing and authentication. The cov- age area of an access network is divided into registration areas (RAs), and each RA is associated with a location database. The two basic op- ations in mobility management are location update and location lookup. When a user moves across the boundaries of these RAs, the network updates his location information in the pertinent databases. When a caller places a call using the callee’s identification, the network queries the relevant database(s) to obtain the current location and other service information of the callee. The performance of mobility management can be further enhanced by using replicas of user profiles which may be kept at various locations. Replication techniques make profile information more readily available, thus reducing lookup cost and latency, but to keep these replicas c- sistent and fresh, they must be updated whenever the user profile is updated. The principle of replication is to replicate if the benefit of replication is greater than its overhead. The difficulty, however, lies in accurately measuring the benefit and overhead Engineering Electrical Engineering Data Structures, Cryptology and Information Theory Operation Research/Decision Theory Computer Communication Networks The Computing Profession Operations research Decision making Computer communication systems Data structures (Computer science) Computers Electrical engineering Cox, Donald C. aut Erscheint auch als Druck-Ausgabe 9781402078965 https://doi.org/10.1007/b117511 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Tian, Karen Q. Cox, Donald C. Mobility Management in Wireless Networks Data Replication Strategies and Applications Engineering Electrical Engineering Data Structures, Cryptology and Information Theory Operation Research/Decision Theory Computer Communication Networks The Computing Profession Operations research Decision making Computer communication systems Data structures (Computer science) Computers Electrical engineering |
title | Mobility Management in Wireless Networks Data Replication Strategies and Applications |
title_auth | Mobility Management in Wireless Networks Data Replication Strategies and Applications |
title_exact_search | Mobility Management in Wireless Networks Data Replication Strategies and Applications |
title_full | Mobility Management in Wireless Networks Data Replication Strategies and Applications by Karen Q. Tian, Donald C. Cox |
title_fullStr | Mobility Management in Wireless Networks Data Replication Strategies and Applications by Karen Q. Tian, Donald C. Cox |
title_full_unstemmed | Mobility Management in Wireless Networks Data Replication Strategies and Applications by Karen Q. Tian, Donald C. Cox |
title_short | Mobility Management in Wireless Networks |
title_sort | mobility management in wireless networks data replication strategies and applications |
title_sub | Data Replication Strategies and Applications |
topic | Engineering Electrical Engineering Data Structures, Cryptology and Information Theory Operation Research/Decision Theory Computer Communication Networks The Computing Profession Operations research Decision making Computer communication systems Data structures (Computer science) Computers Electrical engineering |
topic_facet | Engineering Electrical Engineering Data Structures, Cryptology and Information Theory Operation Research/Decision Theory Computer Communication Networks The Computing Profession Operations research Decision making Computer communication systems Data structures (Computer science) Computers Electrical engineering |
url | https://doi.org/10.1007/b117511 |
work_keys_str_mv | AT tiankarenq mobilitymanagementinwirelessnetworksdatareplicationstrategiesandapplications AT coxdonaldc mobilitymanagementinwirelessnetworksdatareplicationstrategiesandapplications |