Cart (Loading....) | Create Account
Close category search window
 

Two user location strategies for personal communications services

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Mohan, S. ; Network Archit. & Anal. Res. Lab., Bellcore, Morristown, NJ, USA ; Jain, R.

The vision of nomadic personal communications is the ubiquitous availability of services to facilitate the exchange of information between nomadic end users independent of time, location, on access arrangements. To realize this, it is necessary to locate users who move from place to place. The strategies commonly proposed are two-level hierarchical strategies, which maintain a system of home and visited databases/spl mdash/home location register (HLR) and visitor location register (VLR)/spl mdash/to keep track of user locations. Two standards exist for carrying out two-level hierarchical strategies using HLRs and VLRs. The standard commonly used in North America is the Electronics Industry Association/Telecommunications Industry Association (EIA/TIA) Interim Standard 41 (IS-41), and in Europe the Global System for Mobile Communications (GSM). The authors introduce these two strategies for locating users and provide a tutorial on their usage. Different forms of mobility in the context of PCS and a reference model for a PCS architecture are discussed. The user location strategies specified in the IS-41 and GSM standards are described, and then, using a simple example, a simplified analysis of the database loads generated by each strategy is presented. Also briefly discussed are possible modifications to these protocols that are likely to result in significant benefits by reducing query and update rate to databases and/or reducing the signaling traffic.<>

Published in:

Personal Communications, IEEE  (Volume:1 ,  Issue: 1 )

Date of Publication:

1st Qtr. 1994

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.