1
Mobility Management Schemes for Support of UPT in Mobile Networks
Dept. of EE & CS, Korea Advanced Institute of Science and Technology, Korea Switching & Transmission Technology Laboratory, ETRI, Korea
[email protected],
[email protected], and
[email protected]
Abstract— When a universal personal telecommunications (UPT) user visits a mobile network, both terminal mobility and personal mobility are involved and it may take a long time for UPT call delivery to the UPT user because it is required to retrieve both the terminal mobility related data in mobile network and the UPT user related data in UPT database. If the UPT database also manages location and status information of the MT on which the UPT user has registered, incoming call delivery to the UPT user can be improved in a situation. Mobility management schemes for UPT users roaming in a mobile network are analyzed. The performance is evaluated in terms of signaling cost and the number of node accesses during an InCall registration. Keywords— personal mobility, universal personal telecommunications (UPT), intelligent network (IN), incoming UPT call, terminal mobility, mobile network, attachment/detachment of mobile terminal, location update, InCall registration.
I. I NTRODUCTION Terminal mobility (TM) allows users to move their wireless terminals from one location to another while accessing telecommunications services. Location management for support of the TM in mobile networks is based on a two-level hierarchy of databases, the home location register (HLR) and the visitor location register (VLR). Recently, concept of intelligent network (IN) in existing mobile networks has been introduced in order to increase service creation capability of the networks and reduce the time-to-market of new service features [1][2]. Personal mobility (PM) allows users to access their personal services independent of their attachment points or terminals. Universal personal telecommunication (UPT) provides personal mobility on wireless as well as wireline networks and is implemented utilizing IN capabilities [3]-[4]. Since UPT can be a very important value added telecommunication service in the future, mobile networks should be enhanced to support UPT based on IN. IMT-2000 network requirements include the support of UPT. When a UPT user has access to UPT services via a mobile network, both PM and TM are involved. During a UPT InCall registration the association between the universal personal telecommunication number (UPTN) and the mobile subscriber/terminal number (MSISDN) is stored in home UPT database. Call delivery of an incoming call to the UPT user requires queries of the UPT database, HLR, and VLR, which may result in a long setup delay, especially when the mobile terminal (MT) is roaming. Furthermore, the UPT user can switch the MT off or on in order to be unreachable or reachable from the
Sun Jong Kwon , Min Young Chung , and Dan Keun Sung
This study is supported in part by the BK21 program of the Ministry of Education.
network. When the MT is unreachable and the UPT user has a subscription on a call forwarding on terminal not reachable (CFNRc) supplementary service, incoming UPT calls should be forwarded to another terminal. It may be efficient to store some of TM related data in UPT database, and some of the UPT user related data in mobile network database. If the UPT service control point (SCP) knows current location of the MT on which a UPT user has registered, i.e., MSC/VLR identity, the UPT call can be directly routed to the visited network without passing through the home network of the MT when the MT is visiting a network. Moreover, if UPT SCP retains status information of the MT, incoming UPT calls can be forwarded without querying location register when the MT is in the unreachable state. In this paper, two mobility management schemes for UPT users roaming in a mobile network are introduced and the performance of the schemes is evaluated in terms of signaling cost and the number of node accesses. II. R ELATED WORK Studies on support of UPT in mobile networks have been carried out [5]-[8]. Yabusaki and Nakajima[6] provided the concept of universal mobility (UM) that integrates TM and PM, and presented a network technique for UM. Morris and Nelson[7] dealt with interworking and integration aspects of UPT and UMTS at a service control level. Chen[8] described the concept of TM and PM, and analyzed the relationship in a qualitative way. For support of UPT service to UPT users roaming in a mobile network, interworking between the mobile network and home UPT network is required, and there can exist several possible interworking scenarios. We consider an inter-networking architecture shown in Fig. 1. There is a link for interworking between in the mobile network and in the home UPT network. It is assumed that the mobile network is a UPT capable network and an SCP consists of service control function (SCF) and service data function (SDF). IN capability set2 (CS-2) for interworking between two networks is assumed to be supported. It is also assumed that each mobile switching center (MSC) has its own VLR and the VLR is deployed internal to the MSC. VLRs and MSCs are enhanced with IN functional entities in order to interact with IN nodes. The first phase UPT environment supports four essential features: UPT user identity authentication, InCall registration, outgoing UPT call, and InCall delivery. There is no correlation
0-7803-6286-1/00/$10.00 (c) 2000 IEEE
2
Home UPT network SCP h
well as in HLR/VLR.
Visited mobile network SCP v
A. Signaling Message Procedures
HLR IP VLR SSP
Gateway MSC
MSC
Fig. 1. Inter-networking architecture for support of UPT in mobile network.
between InCall registration and outgoing UPT call. Outgoing UPT call feature enables that UPT users make calls from any terminal and is not considered in performance analysis. We first consider a basic scheme for mobility management for UPT users roaming in a mobile network: When an InCall registration request occurs, the request is transferred to the via the . Following the UPT InCall registration procedure, the MSISDN of the MT is stored in the . Location registers in the mobile network manage location and status information of the MT on which the UPT user has registered and the information is not informed to any service control point. Service profile of the UPT user is not copied to the mobile network. When an incoming call to the UPT user is detected by an MSC in mobile networks or a service switching point (SSP) in wireline networks, the MSC or the SSP asks about the directory number of the terminal on which the UPT user has registered, then the call is processed as a normal mobile terminated call. As PM and TM are separately managed, PM management is relieved of any terminal tracking function and can be overlaid on mobile networks already providing TM management. It can be implemented with few changes in existing networks, but incoming calls may not optimally routed. If UPT database also manages location and status information of the MT, routing of the incoming UPT call can be improved. III. M OBILITY MANAGEMENT SCHEMES FOR SUPPORT OF UPT IN MOBILE NETWORKS Two mobility management schemes are considered as follows: Scheme 1: When an InCall registration request occurs, the request is transferred to via . The UPT user’s identity is stored in VLR. During the InCall registration, the VLR triggers the based on MSC/VLR change, attachment, and detachment of the MT, and the forwards the information to the . The manages the location (identity of the MSC/VLR) and status information of the MT. Scheme 2: When an InCall registration request occurs, the request is transferred to the via the . The address of the visited network is stored in the , and then the service profile of the UPT user is downloaded to the , and the UPT user’s identity is stored in VLR. During the InCall registration, the VLR triggers the based on MSC/VLR area change, attachment, and detachment of the MT, and the location and status information of the MT is stored in as
It is assumed that a UPT user roaming in a mobile network requests an InCall registration using call unrelated signaling. Personal identification number (PIN) is locally used to authenticate the UPT user to the UPT device, and challenge-response type authentication is assumed to be used to authenticate the UPT user to UPT service provider. Fig. 2(a) shows signaling message flow for the InCall registration request in Scheme 2 when the UPT user has not registered for incoming calls on an MT: receives an InCall registration request via MSC/VLR and (Steps 1 through 3), and sends an authentication request to personal identity module (PIM) in the MT through and MSC/VLR (Steps 4 through 6). The authentication algorithm in PIM calculates a variable authentication code, and then sends it to through MSC/VLR and (Steps 7 through 9). The UPT user is authenticated and the stores the visited network identity. The service profile of the UPT user is replicated from the to (Steps 10 and 11). Additionally, the stores the identity of the MSC/VLR and the MT number, and then forwards a registration acknowledgment to the MSC/VLR (Step 13). When the MSC/VLR receives the acknowledgment from the , the VLR stores the identity of the UPT user and forwards the acknowledgment to the MT (Step 14). In case of Scheme 1, signaling message flow for the InCall registration request is the same as for Scheme 2 except for Steps 10 and 11 shown in Fig. 2(a). Fig. 2(b) shows the InCall registration procedure in Scheme 2 when the UPT user has been already registered for incoming calls on another MT in the mobile network. Since the retains the replicated service profile for the UPT user, the InCall registration request is processed within the network. The authenticates the UPT user, orders old VLR to delete the identity of the user, stores new MSC/VLR identity and the MT number, and sends a registration acknowledgment to the MT. When the terminal is switched off, a detach message is sent to the network. When it is switched on again, an attach message is sent to the network, provided that the MT is still in the same location area (LA). If the LA is changed, a normal location update occurs[9]. If the new LA belongs to the coverage area of a new VLR, the new VLR informs of its identity after location update in the mobile network is performed. Information on the registered UPT user is assumed to be obtained by the new VLR from either the old VLR or the location update message from the MT. Fig. 3 shows the procedure for Scheme 1 when the MT sends an attach message. The mobile network performs an attach operation, and then the state change is reported to by the VLR that receives the attach message from the MT. The in Scheme 1 forwards the message to the and the updates the state the MT. In Scheme 2, the updates the state of the MT without forwarding the message to . Message flow for each scheme in case of location update or detach request by the MT is the same as
0-7803-6286-1/00/$10.00 (c) 2000 IEEE
3
Visited mobile network MSC/VLR SCP v
MT
(1) InCall Reg. Req.
(2) InCall Reg. Req.
(6) Auth. Req.
(5) Auth. Req.
(7) Auth. Resp.
(8) Auth. Resp.
(14) InCall Reg. Resp.
Home UPT network SCP h
(3) InCall Reg. Req. (4) Auth. Req.
IP
(5) Auth. Resp.
old MSC/VLR
SCP v
(2) InCall Reg. Req.
(9) InCall Reg. Resp.
(7) Delete Req. (8) Delete Resp.
(b) Fig. 2. InCall registration procedures for Scheme 2. (a) new InCall registration, (b) overridden InCall Registration.
MSC/VLR
MT
HLR
SCP v
SCP h
Attach Req. MT state update InitialMMDP Attach Resp.
VLR MSC
Fig. 4. Incoming call delivery procedure for Scheme 2 when the MT is in the attached state and the call is originated from home UPT network.
(6) Auth. Resp.
(10) InCall Reg. Resp.
Gateway MSC
(8)
(12) InCallReg. Resp.
(3) Auth. Req.
(4) Auth. Req.
(6)
(4) (3)
SSP o
HLR
(7)
(1)
Visited mobile network (1) InCall Reg. Req.
(2)
(9) Auth. Resp. (10) ProfileCopy (11) ProfileCopyResp.
(13) InCall Reg. Resp.
MSC/VLR
SCP v (5)
(a) MT
Visited mobile network
SCP h
ContinueMM
Modify Entry Modify Entry Resp.
Fig. 3. Attach procedure for Scheme 1.
the attach message flow of the corresponding scheme. Fig. 4 shows the incoming call delivery procedure for Scheme 2 when an incoming call is originated from the called UPT user’s home network and the MT is in the attached state. The which receives a call setup request from a calling user triggers the . The returns an address of the network visited by the UPT user to the (Steps 1 and 2). The call is then routed to the visited network (Step 3). The gateway MSC interrogates and obtains a roaming number assigned by the serving MSC/VLR of the called UPT user by Steps 4 through 7. Finally, the call is routed to the serving MSC/VLR (Step 8). When the call is originated from the visited mobile network and the MT is in the attached state, the incoming call to the UPT user in Scheme 2 can be handled in the network without querying the . When the MT is in the detached state, a detachment cause is delivered to the SSP or MSC where the service was triggered, and the SSP or MSC forwards the incoming UPT call by CFNRc service after obtaining a forwarding address from SCP. IV. P ERFORMANCE A NALYSIS In order to evaluate the performance of mobility management schemes, the following assumptions are made: A UPT user switches an MT on at time and immediately
requests an InCall registration. The InCall registration is deregistered by an explicit request by the UPT user, by a timer/counter expiry, or by a new InCall registration, and the fractions of the three InCall deregistration types are denoted by , , and , respectively. The InCall registration duration follows an exponential dis tribution with mean . Incoming calls to the UPT user follow a Poisson process with rate !" . The state of an MT can be modeled as an alternating renewal process. The expected value $#&%(' of sum of detachment durations during an InCall registration, mean numbers of transitions from the attached to the detached state and from the detached to the attached state during the InCall registration, )+* ','.-/#&%(' and )+#&%('.- * ',' are derived from the alternating renewal process. Fig. 5 represents a timing diagram of the state change of an MT, InCall registration time, and LA residence time. Exponential time distributions with parameters 0 and 0 for 12 and 32 , respectively, are assumed. A VLR control area is assumed to consist of an LA. Let LA residence time 45/687:9= be an independent and identically distributed random variable with mean ?>@ , a density function A BC6D4 5 = , and the Laplace transform A$B E 6GFH= . The Erlang type distribution with a shape parameter of I and a scale parameter of JLKMIN! B is assumed for 4 5 . The probability that there are O LA boundary crossings during an InCall registration duration is expressed as [10]:
P
R 6.OQ=K
@[Z D\^] ?>@ ;T?>@ SVh l F b
(2)
The probability that an MT is in the attached state at time { is expressed as
6D{=|K
0-7803-6286-1/00/$10.00 (c) 2000 IEEE
0 s 0 VX~r _ {:9jml 0 s 0 0 s 0 y}
(3)
4
Z1
Y1
Z2
Y2
Z3 MT state time
0 t enters L0
T1
0
enters L1
T2 enters L2
T k-1
T3 enters L3
t
i
LA residence time
enters enters enters L4 L k-1 L k
incall registration request
incall deregistration request
attachment request
detachment request
location update
Fig. 5. Timing diagram for state change of the MT, InCall registration time, and LA residence time.
The probability n that the MT is in the attached state at the time when the MT enters O n is expressed as follows:
n K
q 6.{=mA n 6D{X={ _
(4)
p
where Anm6 = represents the inverse Laplace transform of A$n E 6GFH= . Let #&%(' , t* ',' , and h8 be the expected numbers of detach messages, attach messages and location updates transmitted during the InCall registration, respectively. Then, t#&%(' , * ',' , and are given as follows:
t#&%('K) * ','.-/#&%(' P 2 K D6 t= 6 Xn s 6 ;oSXn == 2 n P 2 t* ',' K) #&%r'.- * ',' S 6.t= 6;oS n = _ 2 n
(5) (6) (7)
where is the probability that an MT, which was in the detached state when the MT entered an LA, will transfer to the attached state before leaving out of the LA, and it is given by
I !yB K;TScA B E 6.0 =K;TSj6 s =B l 0 I ! B
(8)
Incoming calls are assumed to be originated from either the home UPT network or the visited network, and the fractions of the calls are denoted by 6w;Sj= and , respectively. Let be the probability that the MT visits a network other than the home mobile network. Let [". , [G , B " , and [ be the costs for handling a message at the SCP, SSP, MSC/VLR, and HLR, respectively. Qe 2 'D * and |e 2 '.%r represent the costs for transferring a signaling message between two nodes in a network, and between a node in a network and another node in the other network, respectively. Cost parameters for the attach( ), detach( ), location update( ), InCall registration( ¡ ), InCall Deregistration( ), new InCall registration( ):¢ ), and locating( £ ) costs of the} two schemes are given as follows:
¡ Ka KM¤¥QB " s ¤¥ e 2 'D * s
¦ ". s ¤ e 2 '.%r } ) ¢ KM§QB " s`¦ e 2 'D * s`¨ w". s ¤¥ e 2 '.%r ©ªKM«TK¬ |TKa® B " s ®Qe 2 'D * s`¯ [ ". s Qe 2 '.%r
£ #&%r' D° K¬ B " s Qe 2 'D * s
¯ [". s ®|e 2 '.%r £ * ',' .± Ka®QwG s B " s ¤¥Qe 2 'D * s ¤¥[". s`¯ Qe 2 '.% £ * ',' D° KM¤¥QB " s § e 2 'D * s
¦ ". s ¤ e 2 '.%r £ #&%r' .± K¤QwG s Qe 2 'D * s ;>[". ¡©Kk¤¥ B " s ¤Qe 2 'D * s`² [". s
¦ Qe 2 '.%r (9) )¢©Ka§® B " s`¦ Qe 2 'D * s`¯ [". s s s K¤QB w" ¤¥ e 2 'D * ¤¥ ". e 2 '.%r } oKaLoKa oKM£#&%('.³ ° Ka B " s ®|e 2 'D * s [". £ * ','.³ ± Ka®QwG s
¯ B " s §Qe 2 'D * s [". s Qe 2 '.%r £ * ',' ³ °K ¯ B " s
¯ Qe 2 'D * s [". £ #&%r' ³ ± Ka® wG s QB " s ¤¥ e 2 'D * s ". s e 2 '.%r _ where subscripts 1 and 2 represent Schemes 1 and 2, respectively. Consequently, the total cost for Scheme 7 (7kK´; _ ) during InCall registration for a UPT user, who visits a mobile network and subscribes a CFNRc service, is given by
5 K 6;oS µ =w¡ 5 s )¢ 5 s & 5 s #&%(' 5 s } 5 s * ','rT5 s !"t#&%('¶¥6;TScX=£#&%('.· ± s £#&%(' · °¸ s !"6 ; Sc$#&%('w=¶6;TScX=£ * ',' · ± s £ * ',' · ° ¸ l (10) d$e A. Numerical Examples We choose the basic scheme as a reference for performance comparison, and define the relative cost of each scheme as the ratio of cost of each scheme to that of the basic scheme. It is here assumed that the probabilities , , and are set at 0.2, 0.5, and 0.3, respectively. We consider an extreme situation that the signaling cost or node access cost is dominant in the total cost. When 0cK 0oK [1/hour], ! B K ¹ [1/hour], d$etK w [1/hour], [1/hour], ¯ I´K ,
Kºml» , and ¼Kºyl8; , Fig. 6 shows the relative signaling and node access costs for different values of e 2 '.%r as the value of call-to-mobility ratio !"&½! B varies from 0.5 to 30. The signaling cost of each scheme is calculated by setting the node access costs B " , [G , [". , and Q at 0’s in the total cost. As the inter-network signaling cost increases, the relative signaling cost in Scheme 1 increases, whereas the cost in Scheme 2 decreases. When !"&½! B is low, the signaling costs of Schemes 1 and 2 are high, compared to the cost of the basic scheme because the cost for delivering the location and status information of MT is given much weight in the signaling cost. As !"&½! B increases the signaling costs of Schemes 1 and 2 decrease below the cost of the basic scheme because the call delivery cost is given much weight in the signaling cost as ! " ½!yB increases, and Schemes 1 and 2 have the improved routing of incoming calls compared with the basic scheme. Fig. 6(b) shows the relative number of node accesses. The relative number of node accesses decreases as !"¾½! B increases. It is observed from Fig. 6 that in order to reduce the network costs of Schemes 1 and 2, the call-to-mobility ratio of the UPT user should be high. In addition, Scheme 2 is
0-7803-6286-1/00/$10.00 (c) 2000 IEEE
5
2.5
1.2 Cinter = C intra
2
Scheme 2 Relative signaling cost i 1
Relative signaling cost
C inter = 2C intra
Scheme 1
1.5
1
α 2 = 1/2
1
Scheme 1
α 2 = 1/3
0.8
Scheme 2 Cinter = C intra
0.5
0.6
0.5
1
10 Call to mobility ratio
0
30
λc / λm
0.1
0.2
0.3
0.4
0.5
Fraction of incoming calls originated from a visited mobile network φ
(a) Fig. 7. Relative signaling cost for different values of 2.5
ÃmÄ .
Scheme 1
Relative number of node accesses
Scheme 2 2
1.5
1
0.5
0.5
1
10 Call to mobility ratio
30
λc / λm
(b) Fig. 6. Relative costs for varying the call to mobility ratio. (a) Signaling cost, (b) Number of node accesses.
preferable in the situation that the inter-network signaling cost is higher than the intra-network signaling cost. Fig. 7 shows the relative signaling cost versus the fraction of incoming calls originated from a visited mobile network for varying values of 0 when 0 K [1/hour], d e K [1/hour], ¯ ! " K¿; [1/hour], !BÀK ¹ [1/hour], I´K , and ¼KÁmlÂ; . The relative signaling cost in Scheme 2 decreases as increases and is below 1 for high values of because the visited network can handle the incoming UPT calls originated from the visited network without any query to the home UPT network. The relative signaling costs of Schemes 1 and 2 decrease as the average detach time ~ ³ increases because an increase in the average detach time for a given InCall registration duration reduces the number of state transitions of the MT. V. C ONCLUSIONS When a UPT user has access to UPT services via a mobile network, both PM and TM are involved and an incoming call delivery to the UPT user may take a long time. The location of mobile users can be changed at any time within the visited network as well as the home network. Mobile networks have distinctive features including attachment and detachment of terminals, compared to fixed network. In addition, CFNRc service, which is a supplementary service for UPT users having registered on mobile terminals, is defined in an ITU-T recommendation. The mobility management for UPT users roaming
in the mobile network should reflect these features. Two mobility management schemes for UPT users roaming in mobile networks are considered. Performance of the schemes is compared in terms of the signaling cost and the number of node accesses during an InCall registration duration. The results show that the incoming call delivery cost can be reduced at the expense of management of location and attach/detach status information of MTs in UPT SCP. Performance of two schemes depends on the attach/detach characteristic of MTs, the roaming probability of MTs, the fraction of incoming calls generated in the visited network, and the traffic and various mobility parameters including LA residence time and incoming call arrival rate. Scheme 2 outperforms both Scheme 1 and the basic scheme when the call-to-mobility ratio is high, the fraction of incoming calls originated from a mobile network is high, and the inter-network signaling cost is higher than the intra-network signaling cost. R EFERENCES [1]
I, Faynberg, L. R. Gabuzda, T. Jacobson, and H.-L. Lu, “The development of the wireless intelligent network (WIN) and its relation to the international intelligent network standards,” Bell Labs Technical Journal, Summer 1997, pp. 57-80. [2] ETSI TS101 285 v6.1.0, “Digital cellular telecommunications system (phase 2+); customized applications for mobile network enhanced logic (CAMEL); service definition - stage 1 (GSM 02.78 version 6.1.0 Release 1997),” 1998. [3] ITU-T Recommendation F.851, Universal personal telecommunication(UPT) - service description (service set 1), February 1995. [4] ITU-T Recommendation F.853, Supplementary services in the universal personal telecommunication (UPT) environment, November 1998. [5] M. Zaid, “Personal mobility in PCS,” IEEE Personal Communications, vol. 1, no. 4, pp. 12-16, Fourth Quarter 1994. [6] M. Yabusaki and A. Nakajima, “Network issues for universal mobility,” IEICE Trans. Fundamentals, vol. E78-A, no. 7, pp. 764-771, July 1995. [7] C. Morris and J. Nelson, “Architectures and control issues for the support of UPT in UMTS,” in Proc. IEEE Globecom ’96, pp. 2063-2067. [8] L.-S. Chen, “Apply personal mobility in PCS environment for universal personal communications,” in Proc. ICUPC ’96, pp. 503-507. [9] ITU-T Recommendation Q.1003, Location registration procedures, 1988. [10] Y. B. Lin, “Reducing location update cost in a PCS network,” IEEE/ACM Transactions on Networking, vol. 5, no. 1, pp. 25-33, 1997.
0-7803-6286-1/00/$10.00 (c) 2000 IEEE