2008
DOI: 10.2298/csis0801001f
|View full text |Cite
|
Sign up to set email alerts
|

Elimination of generalized ping-pong effects using triple-layers of location areas in cellular networks

Abstract: Location-areas is a popular location management scheme in cellular networks In the location areas scheme, a service area is partitioned into location areas, each consisting of contiguous cells. A mobile terminal updates its location whenever it moves into a cell that belongs to a new location area. However, no matter how the location areas are designed, the ping-pong location update effect exists when a mobile terminal moves back and forth between two location areas. The paper defines a new kind of ping-pong e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…These phenomena, shown in Figure 5.1, are referred to as the ping-pong and the generalized ping-pong effects, respectively [46]. Apart from the mobility of the UEs, fading of the radio channel can also cause the ping-pong effect.…”
Section: Ping-pong Effectmentioning
confidence: 99%
See 1 more Smart Citation
“…These phenomena, shown in Figure 5.1, are referred to as the ping-pong and the generalized ping-pong effects, respectively [46]. Apart from the mobility of the UEs, fading of the radio channel can also cause the ping-pong effect.…”
Section: Ping-pong Effectmentioning
confidence: 99%
“…In general, reducing the ping-pong effect can significantly improve the performance of a network and has therefore received considerable attention in the literature [36,46,70]. However, most of the proposed schemes for reducing this effect introduce a large paging overhead.…”
Section: Ping-pong Effectmentioning
confidence: 99%
“…Key Derivation is handled by the RSA-based authorization produces the EAP-based MSK [10]. All PKMv2 key derivations are based on the Dot16 Key Derivation Function (Dot16KDF) which is an AES counter (CTR) mode construction used to derive an arbitrary amount of keying material from source keying material [11].…”
Section: Security Negotiation and Key Derivation In Pkm V2 -Eap mentioning
confidence: 99%
“…Additionally [10] proposes a triple-layer location management strategy to eliminate the generalized pingpong effect with location areas in three different layers. Three layers are placed in such a way that any boundary or corner in one layer could be covered by a location area of another layer.…”
Section: Introductionmentioning
confidence: 99%