By Topic

Restoration scheme of mobility databases by mobility learning and prediction in PCS networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Joon-Min Gil ; Dept. of Comput. Sci. & Eng., Korea Univ., Seoul, South Korea ; Chan Yeol Park ; Chong-Sun Hwang ; Doo-Soon Park
more authors

This paper proposes a restoration scheme based on mobility learning and prediction in the presence of the failure of mobility databases in personal communication systems (PCSs). In PCSs, mobility databases must maintain the current location information of users to provide a fast connection for them. However, the malfunction of mobility databases may cause some location information to be lost. As a result, without an explicit restoration procedure, incoming calls to users may be rejected. Therefore, an explicit restoration scheme against the malfunction of mobility databases is needed to guarantee continuous service availability to users. Introducing mobility learning and prediction into the restoration process allows systems to locate users after a failure of mobility databases. In failure-free operations, the movement patterns of users are learned by a neuro-fuzzy inference system (NFIS). After a failure, an inference process of the NFIS is initiated and the users' future location is predicted. This is used to locate lost users after a failure. This proposal differs from previous approaches using a checkpoint because it does not need a backup process nor additional storage space to store checkpoint information. In addition, simulations show that our proposal can reduce the cost needed to restore the location records of lost users after a failure when compared to the checkpointing scheme

Published in:

Selected Areas in Communications, IEEE Journal on  (Volume:19 ,  Issue: 10 )