This Article 
 Bibliographic References 
 Add to: 
Per-User Checkpointing for Mobility Database Failure Restoration
March/April 2005 (vol. 4 no. 2)
pp. 189-194
This paper studies the failure restoration of mobility database for Universal Mobile Telecommunications System (UMTS). We consider a per-user checkpointing approach for the Home Location Register (HLR) database. In this approach, individual HLR records are saved into a backup database from time to time. When a failure occurs, the backup record is restored back to the mobility database. We first describe a commonly used basic checkpoint algorithm. Then, we propose a new checkpoint algorithm. An analytic model is developed to compare these two algorithms in terms of the checkpoint cost and the probability that a HLR backup record is obsolete. This analytic model is validated against simulation experiments. Numerical examples indicate that our new algorithm may significantly outperform the basic algorithm in terms of both performance measures.

[1] 3GPP, 3rd Generation Partnership Project; Technical Specification Group Services and Systems Aspects; General Packet Radio Service (GPRS); Service Descripton; Stage 2, Technical Specification 3G TS 23.060 version 4.1.0 (2001-06), 2001.
[2] P. Agrawal, G. Omidyar, and A. Wolisz, IEEE Wireless Communications Magazine, special issue on mobile and wireless Internet: architectures and protocols, 2002.
[3] G. Cao, “Proactive Power-Aware Cache Management for Mobile Computing Systems,” IEEE Trans. Computers, vol. 51, no. 6, pp. 608-621, 2002.
[4] M.-F. Chang, Y.-B. Lin, and S.-C. Su, “Improving Fault Tolerance of GSM Network,” IEEE Network, vol. 1, no. 12, pp. 58-63, 1998.
[5] ETSI/TC, Restoration Procedures, Version 4.2.0, Technical Report Recommendation GSM 03.07, ETSI, 1993.
[6] Y. Fang and I. Chlamtac, “Teletraffic Analysis and Mobility Modeling for PCS Networks,” IEEE Trans. Comm., vol. 47, no. 7, pp. 1062-1072, July 1999.
[7] Y. Fang, I. Chlamtac, and H. Fei, “Analytical Results for Optimal Choice of Location Update Interval for Mobility Database Failure Restoration in PCS Networks,” IEEE Trans. Parallel and Distributed Systems, 2000.
[8] Z. Haas and Y.-B. Lin, “On Optimizing the Location Update Costs in the Presence of Database Failures,” ACM/Baltzer Wireless Networks J., vol. 4, no. 5, pp. 419-426, 1998.
[9] A. Kahol, S. Khurana, S. Gupta, and P. Srimani, “An Efficient Cache Management Scheme for Mobile Environment,” Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS), 2000.
[10] F.P. Kelly, Reversibility and Stochastic Networks. John Wiley & Sons, 1979.
[11] Y.-B. Lin, “Failure Restoration of Mobility Databases for Personal Communication Networks,” ACM-Baltzer J. Wireless Networks, vol. 1, pp. 365-372, 1995.
[12] Y.-B. Lin, “A Cache Approach for Supporting Life-Time Universal Personal Telecommunication Number,” ACM-Baltzer Wireless Networks, vol. 2, pp. 155-160, 1996.
[13] Y.-B. Lin and I. Chlamtac, Wireless and Mobile Network Architectures. John Wiley & Sons, 2001.
[14] Y.-B. Lin and P. Lin, “Performance Modeling of Location Tracking Systems,” ACM Mobile Computing and Comm. Rev., vol. 2, no. 3, pp. 24-27, 1998.
[15] Y.-B. Lin and V.K. Mak, “Eliminating the Boundary Effect of a Large-Scale Personal Communication Service Network Simulation,” ACM Trans. Modeling and Computer Simulation, vol. 4, no. 2, 1994.
[16] Y.-B. Lin, W.-R. Lai, and J.-J. Chen, “Effects of Cache Mechanism on Wireless Data Access,” IEEE Trans. Wireless Comm., vol. 2, no. 6, 2003.
[17] S.M. Ross, Simulation. Academic Press, 1996.
[18] J. Shim, P. Scheuermann, and R. Vingralek, “Proxy Cache Algorithms: Design, Implementation, and Performance,” IEEE Trans. Knowledge and Data Eng., vol. 11, no. 4, pp. 549-562, July/Aug. 2000.
[19] E.J. Watson, Laplace Transforms and Applications. Birkhauserk, 1981.

Index Terms:
Checkpoint, failure restoration, General Packet Radio Service (GPRS), Home Location Register, Universal Mobile Telecommunications System (UMTS).
Yi-Bing Lin, "Per-User Checkpointing for Mobility Database Failure Restoration," IEEE Transactions on Mobile Computing, vol. 4, no. 2, pp. 189-194, March-April 2005, doi:10.1109/TMC.2005.28
Usage of this product signifies your acceptance of the Terms of Use.