Working set based location management scheme for mobile computing environments

被引:0
|
作者
Han, MS [1 ]
Im, SB [1 ]
Eom, YI [1 ]
机构
[1] Wonju Natl, Dept Adm & Comp Sci, Wonju, KangWon Do, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, research activities for combining portable computer technology and wireless communication technology are in progress to realize mobile computing environments. Among the various strategies necessary for mobile computing environments the location management strategies are particularly emphasized especially for PCN environments. Location management strategy for PCN environments, which is mostly based on the IS-41 standards, brings an issue that additional network traffics are generated to deliver update messages to the home location server whenever a mobile host changes its location server. In this paper, we propose an innovative update strategy and a search strategy that resolves the problem shown in the IS-41 scheme. Also, this paper compares the performance of the proposed scheme with the IS-41-based scheme.
引用
下载
收藏
页码:278 / 283
页数:6
相关论文
共 50 条
  • [31] Hierarchical location update and routing scheme for mobile computing environment
    Hac, A
    Huang, YJ
    1997 IEEE 6TH INTERNATIONAL CONFERENCE ON UNIVERSAL PERSONAL COMMUNICATIONS RECORD, CONFERENCE RECORD, VOLS 1 AND 2, 1997, : 728 - 732
  • [32] MRM: mobile resource management scheme on mobile cloud computing
    Gangman Yi
    Yoon-A Heo
    Hwirim Byun
    Young-Sik Jeong
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1245 - 1257
  • [33] MRM: mobile resource management scheme on mobile cloud computing
    Yi, Gangman
    Heo, Yoon-A
    Byun, Hwirim
    Jeong, Young-Sik
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1245 - 1257
  • [34] A new scheme for the location information protection in mobile communication environments
    Kim, SS
    Yeo, SS
    Park, HJ
    Kim, SK
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 436 - 441
  • [35] Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments
    Lee, Hakjun
    Ryu, Jihyeon
    Won, Dongho
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 5798 - 5815
  • [36] A mobile agent-based location management scheme for mobile ad-hoc networks
    Jaffery, K
    Denko, MK
    ICWN'04 & PCC'04, VOLS, 1 AND 2, PROCEEDINGS, 2004, : 703 - 706
  • [37] FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain
    Patwary, Abdullah Al-Noman
    Fu, Anmin
    Battula, Sudheer Kumar
    Naha, Ranesh Kumar
    Garg, Saurabh
    Mahanti, Aniket
    COMPUTER COMMUNICATIONS, 2020, 162 : 212 - 224
  • [38] Clustering techniques for dynamic location management in mobile computing
    Taheri, Javid
    Zomaya, Albert Y.
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2007, 67 (04) : 430 - 447
  • [39] A Page Cache Management Scheme in Cloud Computing Environments
    Chang, Hsung-Pin
    Liao, Chien-Neng
    Chang, Da-Wei
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 974 - 979
  • [40] A dynamic approach to location management in mobile computing systems
    Prakash, R
    Singhal, M
    SEKE '96: THE 8TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, PROCEEDINGS, 1996, : 488 - 495