deregistration strategies for pcs networks

9
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 47, NO. 1, FEBRUARY 1998 49 Deregistration Strategies for PCS Networks Yi-Bing Lin, Senior Member, IEEE Abstract— This paper studies three deregistration strategies (explicit, implicit, and timeout (TO) deregistration) for personal communication service (PCS) networks to determine the network conditions under which each strategy gives the best performance. Two performance measures are considered: 1) the probability that a portable cannot register (and receive service) and 2) the number of deregistration messages sent in a strategy. For the same database size, is smaller for explicit deregistration (ED) than it is for TO or implicit deregistration (ID). On the other hand, ID does not create any deregistration message traffic. With an appropriate TO period, the deregistration message traffic for TO deregistration is much smaller than the traffic for ED. Suppose that there are portables in a registration area (RA) on the average. To ensure that , our study indicates that if the database size is larger than 4 , then the implicit scheme should be selected (to eliminate deregistration traffic). If the database size is smaller than 1.5 , then the explicit scheme should be selected. Otherwise, the TO scheme should be selected to achieve the best performance. Index Terms— Deregistration, home-location register, mobil- ity management, personal communications services, registration, visitor-location register. I. INTRODUCTION T HIS PAPER studies three deregistration strategies for personal communication service (PCS) networks. In a PCS network, registration is the process by which portables in- form the network of their current location (registration area or RA). We assume that a location database (i.e., visitor-location register or VLR) is assigned to exact one RA (although a VLR may cover several RA’s in the existing PCS systems). A portable registers its location when it is powered on and when it moves between RA’s. If the database is full when a portable arrives, the portable cannot access the services provided by the PCS network. When a portable leaves an RA or shuts off for a long period of time, the portable should be deregistered from the RA so that any resource previously assigned to the portable can be deallocated. In IS-41 [1], [3], the registration process ensures that a portable registration in a new RA causes deregistration in the previous RA. This approach is referred to as explicit deregistration (ED). This approach to deregistration may create significant traffic in the network [8]. Also, ED does not provide a means of deregistering portables that are shut off, broken, or otherwise disabled for a significant period of time. Bellcore personal access communications systems (PACS’s) Manuscript received July 29, 1996; revised November 21, 1996. This work was supported in part by the National Science Council under Contract NSC 86-2213-E-009-074. The author is with the Department and Institute of Computer Science and Information Engineering, National Chiao-Tung University, Taiwan, R.O.C. (e- mail: [email protected]). Publisher Item Identifier S 0018-9545(98)00715-4. [2] suggest that a portable be deregistered by default after a certain time period elapses without the portable reregistering. This scheme is referred to as timeout (TO) deregistration [11]. Another possibility is to perform deregistration implicitly [2], [7]. Suppose that the database is full when a portable arrives at an RA. The implicit scheme selects a record based on some replacement strategy. This record is deleted and is then reassigned to Note that the record being replaced may be valid, in which case the corresponding portable is forced to deregister. Thus, the size of the registration database (i.e., the amount of resources) must be sufficiently large so as to ensure that the probability of a valid registration record being replaced is extremely low (say 10 ). Lin and Noerpel [7] proposed an analytical model to determine the database size for an implicit scheme that selects the oldest record for replacement. This paper proposes analytical models to study the explicit scheme, implicit scheme with a new replacement strategy, and TO scheme. II. EXPLICIT DEREGISTRATION In the explicit scheme, a registration record is deleted when the corresponding portable moves out of the RA. Thus, the database is full if and only if the number of portables in the RA is larger than the size of the database. To derive the probability that a portable cannot register at a particular RA, we first derive the distribution for the number of portables in an RA. Let be the expected number of portables in an RA. Suppose that the residence time of a portable in an RA has a general distribution with the density function and mean 1 In the steady state, the rate at which portables move into an RA equals the rate at which portables move out of the RA. In other words, the rate at which portables move into an RA is The arrival of portables can be viewed as being generated from input streams, which have the same general distribution with arrival rate If is reasonably large in an RA, the net input stream is approximated as a Poisson process with arrival rate Thus, the distribution for the portable population can be modeled by an queue with arrival rate and mean residence time 1 Let be the steady-state probability that there are portables in the RA. This model was validated against simulation experiments by Lin and Chen [6]. By the standard technique [4] (1) Fig. 1(a) plots the population distribution when , , and , respectively. Skew distributions are observed for small values. We note that the typical number of portables 0018–9545/98$10.00 1998 IEEE

Upload: yi-bing-lin

Post on 22-Sep-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Deregistration strategies for PCS networks

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 47, NO. 1, FEBRUARY 1998 49

Deregistration Strategies for PCS NetworksYi-Bing Lin, Senior Member, IEEE

Abstract—This paper studies three deregistration strategies(explicit, implicit, and timeout (TO) deregistration) for personalcommunication service (PCS) networks to determine the networkconditions under which each strategy gives the best performance.Two performance measures are considered: 1) the probability� that a portable cannot register (and receive service) and 2)the number of deregistration messages sent in a strategy. Forthe same database size,� is smaller for explicit deregistration(ED) than it is for TO or implicit deregistration (ID). On theother hand, ID does not create any deregistration message traffic.With an appropriate TO period, the deregistration message trafficfor TO deregistration is much smaller than the traffic for ED.Suppose that there areN portables in a registration area (RA)on the average. To ensure that�< 10

�3, our study indicatesthat if the database size is larger than 4N , then the implicitscheme should be selected (to eliminate deregistration traffic). Ifthe database size is smaller than 1.5N , then the explicit schemeshould be selected. Otherwise, the TO scheme should be selectedto achieve the best performance.

Index Terms—Deregistration, home-location register, mobil-ity management, personal communications services, registration,visitor-location register.

I. INTRODUCTION

T HIS PAPER studies three deregistration strategies forpersonal communication service (PCS) networks. In a

PCS network, registration is the process by which portables in-form the network of their current location (registration area orRA). We assume that a location database (i.e., visitor-locationregister or VLR) is assigned to exact one RA (although aVLR may cover several RA’s in the existing PCS systems). Aportable registers its location when it is powered on and whenit moves between RA’s. If the database is full when a portablearrives, the portable cannot access the services provided bythe PCS network. When a portable leaves an RA or shuts offfor a long period of time, the portable should be deregisteredfrom the RA so that any resource previously assigned to theportable can be deallocated.

In IS-41 [1], [3], the registration process ensures that aportable registration in a new RA causes deregistration inthe previous RA. This approach is referred to as explicitderegistration (ED). This approach to deregistration may createsignificant traffic in the network [8]. Also, ED does notprovide a means of deregistering portables that are shut off,broken, or otherwise disabled for a significant period of time.Bellcore personal access communications systems (PACS’s)

Manuscript received July 29, 1996; revised November 21, 1996. This workwas supported in part by the National Science Council under Contract NSC86-2213-E-009-074.

The author is with the Department and Institute of Computer Science andInformation Engineering, National Chiao-Tung University, Taiwan, R.O.C. (e-mail: [email protected]).

Publisher Item Identifier S 0018-9545(98)00715-4.

[2] suggest that a portable be deregistered by default after acertain time period elapses without the portable reregistering.This scheme is referred to as timeout (TO) deregistration [11].Another possibility is to perform deregistrationimplicitly [2],[7]. Suppose that the database is full when a portablearrivesat an RA. The implicit scheme selects a record based onsome replacement strategy. This record is deleted and is thenreassigned to Note that the record being replaced may bevalid, in which case the corresponding portable is forced toderegister. Thus, the size of the registration database (i.e., theamount of resources) must be sufficiently large so as to ensurethat the probability of a valid registration record being replacedis extremely low (say 10 ). Lin and Noerpel [7] proposed ananalytical model to determine the database size for an implicitscheme that selects the oldest record for replacement. Thispaper proposes analytical models to study the explicit scheme,implicit scheme with a new replacement strategy, and TOscheme.

II. EXPLICIT DEREGISTRATION

In the explicit scheme, a registration record is deleted whenthe corresponding portable moves out of the RA. Thus, thedatabase is full if and only if the number of portables in the RAis larger than the size of the database. To derive the probabilitythat a portable cannot register at a particular RA, we first derivethe distribution for the number of portables in an RA. Letbethe expected number of portables in an RA. Suppose that theresidence time of a portable in an RA has a general distributionwith the density function and mean 1 In the steadystate, the rate at which portables move into an RA equals therate at which portables move out of the RA. In other words,the rate at which portables move into an RA is Thearrival of portables can be viewed as being generated frominput streams, which have the same general distribution witharrival rate If is reasonably large in an RA, the net inputstream is approximated as a Poisson process with arrival rate

Thus, the distribution for the portable population can bemodeled by an queue with arrival rate and meanresidence time 1 Let be the steady-state probability thatthere are portables in the RA. This model was validatedagainst simulation experiments by Lin and Chen [6]. By thestandard technique [4]

(1)

Fig. 1(a) plots the population distribution when , ,and , respectively. Skew distributions are observed forsmall values. We note that the typical number of portables

0018–9545/98$10.00 1998 IEEE

Page 2: Deregistration strategies for PCS networks

50 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 47, NO. 1, FEBRUARY 1998

(a) (b)

Fig. 1. The performance of the explicit scheme. (a) The population distribution. (b) The probability that a portable cannot register in the explicit scheme.

in a RA is much larger than 150. The numbers 50, 100, and150 are selected only for the demonstration purpose.

Suppose that the size of the registration database isLetbe the probability that the registration database is full

when a portable arrives (and thus the portable cannot register).Then

Fig. 1(b) plots for different values. The figureindicates that for (where ), the explicitscheme can accommodate almost all arriving portables (i.e.,

). Note that the rate of the deregistration messagessent in the network is per RA. The deregistration messagesmay significantly contribute to the PCS network traffic.

III. I MPLICIT DEREGISTRATION

In the implicit scheme, no deregistration message is sentupon the movement of a portable. The obsolete record is keptin the database. When the database is full, the scheme reclaimsa record (for the incoming portable) based on some strategy.A possible replacement strategy is described below.

A. Strategy ID

At time , a portable is said to beinactivefor a time periodif has not interacted (sending or receiving messages) with

the RA since Define a threshold If is inactivefor a time period , we may expect that has alreadyleft the RA. On the other hand, if there is a phone call foror registers (i.e., moves into the RA) within the period,then the implicit scheme assumes thatis still in the RA.The implicit deregistration (ID) strategy works as follows.When arrives at an RA, let and be the oldestand the second oldest portables in the RA (i.e., for all theportables in the RA, we have ). Whenarrives, the inactive time periods for and are and

, respectively. If , ID assumes that is not inthe RA, and is selected for replacement. Otherwise, if

then ID assumes that is not in the RA and isselected for replacement. If (or ) and (or

), then is selected for replacement. In ID, morethan two portables may be considered for replacement. For

demonstration purposes, here we consider only the oldest twoportables. The following notation is introduced.

1) the time period between ’s arrival and ’s arrival[c.f. Fig. 2(a)].

2) the time period between ’s arrival and ’sarrival [c.f. Fig. 3(a)].

3) the time period between ’s arrival and ’sarrival [c.f. Fig. 3(a)]. Note that

4) the residence time of [c.f. Fig. 2(a)].5) the residence time of [c.f. Fig. 3(a)].6) the number of portables that arrive in the period

(excluding ). Note that7) the number of portables that arrive in the period

(excluding ). Note that8) the number of portables that arrive in the period

(excluding ). Note that9) the time interval between the last phone call to

before ’s arrival and the time when arrives [c.f.Fig. 2(b)]. Note that there is no phone call to in thetime period

10) the time interval between the last phone call tobefore ’s arrival and the time when arrives [c.f.Fig. 3(b)].

11) the time interval between the last phone call toand the time when moves out [c.f. Fig. 2(b)].

12) the time interval between the last phone call toand the time when moves out [c.f. Fig. 3(b)].

Since the portable arrivals to an RA form a Poisson process,has an Erlang distribution with the density function

Similarly, and have the Erlang density functionsand , respectively. If we assume exponential

portable residence times, then and have an identicaldensity function

Let the intercall arrival times to a portable be exponentiallydistributed with the density function

Page 3: Deregistration strategies for PCS networks

LIN: DEREGISTRATION STRATEGIES FOR PCS NETWORKS 51

(a) (b)

Fig. 2. The timing diagram for ID Case 1. (a)t>X; �1<t � X: (b) t >X; t � X< �1<t; t � (�1 � x1)>X:

Since the movements of a portable are a Poisson process, aportable is a random observer of the call interarrival timeswhen it moves out of the RA. From the random observerproperty of the Poisson process and the memoryless propertyof the exponential distribution, both and have the samedensity function Similarly, the arrival of is a randomobserver of the call arrivals to and , and andalso have the same density function

Let be the probability that and is notin the RA. Let be the probability that (or

), , and is not in the RA. Letbe the probability that (or ), (or ),and is not in the RA. Then

is the probability that the portable (either or ) selectedby ID is not in the RA.

The probability is derived in the following three cases.1) Case 1: ID assumes that is not in the RA, and

is not in the RA.That is, ID assumes that has moved out of the RA

when moves in, which implies that the inactive periodis longer than the threshold when arrives, and

Since is not in the RA whenarrives, either [c.f. Fig. 2(a)] or ,and [c.f. Fig. 2(b)]. The probabilityfor Fig. 2(a) is

(2)

(3)

(3) is derived from (2) based on the fact that

Since implies , the probability forFig. 2(b) is

(4)

Thus,2) Case 2: ID assumes that is in the RA, is not

in the RA, and is not in the RA. Since ID assumes thatis not in the RA when moves in, it implies that the

inactive period is longer than the threshold , and

(5)

As in the situations described in Case 1, either[c.f. Fig. 3(a) and (c)] or , and

[c.f. Fig. 3(b) and (d)]. Since ID assumes thatis in the RA and , it implies that and

There are two cases.3) Case 2a: and [c.f. Fig. 3(a) and (b)].4) Case 2b: and

[c.f. Fig. 3(c) and (d)].From (5) and Cases 2a and 2b, there are four combinations

for Case 2, as illustrated in Fig. 3. The probability for Fig. 3(a)is

Page 4: Deregistration strategies for PCS networks

52 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 47, NO. 1, FEBRUARY 1998

(a) (b)

(c) (d)

Fig. 3. The timing diagram for ID Case 2. (a)t1> 0; t2>X;�1>t1 + t2; �1<X;0<�2<t2 � X: (b) t1> 0;t2>X;�1>t1 + t2;

�1<X;t2 � X<�2<t2;x2 >X + �2 � t2: (c) t1> 0;t2>X; t1 + t2 � X<�1<t1 + t2;x1 <�1 + X � t1 � t2; �2<t2 � X: (d)t1> 0;t2>X; t1 + t2 � X<�1<t1 + t2;x1 <�1 + X � t1 � t2; t2 � X <�2<t2x2 >X + �2 � t2:

(6)

The probability for Fig. 3(b) is

(7)

The probability for Fig. 3(c) is

(8)

The probability for Fig. 3(d) is

Page 5: Deregistration strategies for PCS networks

LIN: DEREGISTRATION STRATEGIES FOR PCS NETWORKS 53

(a) (b)

(c) (d)

Fig. 4. The timing diagram for ID Case 3.

(9)

Thus,5) Case 3: ID assumes that both and are in the

RA, but is not in the RA.Note that ID assumesthat is in the RA, which implies that orThere are three possibilities.

[c.f. Fig. 4(a) and (b)]. Since ID assumes thatis in the RA, we have or There are two cases.

6) Case 3a: , as shown in Fig. 4(a).The probability is

(10)

7) Case 3b: Since , we haveand , as shown in Fig. 4(b).

The probability is

(11)

and [c.f. Fig. 4(c)]. Sinceand ID assumes that is in the RA, the

situation is the same as in Case 3b (i.e., and), and

Page 6: Deregistration strategies for PCS networks

54 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 47, NO. 1, FEBRUARY 1998

(a) (b)

Fig. 5. Performance of ID. (a) The effect ofX on ID (� = 2�): (b) The effect of� on ID (X = 1:5=�):

(12)

and asshown in Fig. 4(d). Since and ID assumesthat is in the RA, the situation is the same as Case 3b(i.e., and ), and

(13)

Thus,Suppose that the size of the database isFor the oldest

portable , it is apparent that Similarly, forthe second oldest portable 1 Since

1

1

a lower bound for is

1

1

Fig. 5(a) illustrates the effect of on The figureindicates that the maximum value for occurs when

(for The figure indicates that erring on the sideof an value that is too large will degrade performance lessthan erring on the side of an value that is too small. It isapparent that the performance of ID improves asincreases.Fig. 5(b) illustrates that is an increasing function of

Let be the probability that a portable (either or) cannot register (i.e., is forced to deregister) when

arrives. An upper bound for is

Fig. 9(a) indicates that for

IV. TIMEOUT DEREGISTRATION

In the TO scheme, a portable sends a reregistration messageto the RA for every time period The TO scheme is betterthan the explicit scheme if the reregistration traffic (in TO) isless than the deregistration traffic [in ED]. This section derivesthe number of reregistration messages sent in the TO scheme.Let be the expected number of reregistration messagessent before a portable leaves an RA. Let be the portableresidence time distribution (with mean 1 Then

(14)

For the exponential residence time distribution, (14) isrewritten as

For the uniform residence time distribution in0 2

Fig. 6(a) plots against The figure indicates thatif for the exponential residence times

and for the uniform residence times. In the explicitscheme, a deregistration message is sent when a portablemoves out of the RA. On the other hand, in the TO scheme,the number of reregistration messages sent by a portable is

Thus, the deregistration traffic in the explicit schemeis times the reregistration traffic in the TO scheme. For

Page 7: Deregistration strategies for PCS networks

LIN: DEREGISTRATION STRATEGIES FOR PCS NETWORKS 55

(a) (b)

Fig. 6. The expected number of reregistration messages. (a) The registration message overhead in the TO scheme. (b) Comparison of the de(re)registrationmessage overhead for the explicit scheme and the TO scheme.

(a) (b)

Fig. 7. The portable distribution seen by the TO scheme. (a) The impact ofT: (b) The impact of the residual time distributions.

example, if the deregistration traffic generatedby the explicit scheme is about four–five times the trafficgenerated by the TO scheme assuming exponential residencetimes [c.f. Fig. 6 (b)]. In other words, if is sufficiently large,then the TO scheme significantly reduces the network trafficdue to deregistration (compared with the explicit scheme).

The portable residence time seen by the TO schemeis different from the true portable residence time(the TOscheme only differentiates on multiples of). Since

, the expected residence time seen by the TOscheme is

For the exponential residence time distribution

(15)

From (15) and the model described in Section II,the steady-state probability that the TO scheme seesportables in the RA is

The distribution is plotted in Fig. 7 for differentvalues. Fig. 7(a) indicates that the portable seen by the TOscheme increases as increases. Fig. 7(b) indicates that thenumber of portables seen by the TO registration scheme iscloser to the true number for the uniform residence times thanfor the exponential residence times. Let be the probabilitythat the TO scheme sees a full registration database in an RAwhen a portable arrives. Then

Suppose that is not allowed to register if the TO schemesees a full database at’s arrival. Then is the probabilitythat a portable (i.e., ) cannot register (and receive services).Fig. 8 plots against It is clear that is a de-creasing function of the database sizeand is an increasingfunction of [c.f. Fig. 8(a)]. It is interesting to note thatfor the same ratio, the value for a small issmaller than the for a large when Theopposite is true when [c.f. Fig. 8(b)]. Fig. 9(a)compares with For (where ,

Note that for 2.5 However,when 2 , is much larger than

Other replacement strategies can be used if the TO schemesees a full database when a portablearrives. Let us consider

Page 8: Deregistration strategies for PCS networks

56 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 47, NO. 1, FEBRUARY 1998

(a) (b)

Fig. 8. The probability that the TO scheme sees a full registration database when a portable arrives. (a) The impact ofT (N = 100): (b) Theimpact of N (T = 1:8):

(a) (b)

Fig. 9. Performance for different deregistration schemes(N = 100): (a) The� values for different schemes. (b) The performance for the TO schemewith different replacement strategies(T = 1:8=�):

the replacement strategies used in ID in the previous section.Let be the probability that cannot register in theTO scheme with the ID replacement strategy. Then

Fig. 9(b) plots The figure indicates that with theID replacement strategy, the performance of the TO schemeis significantly improved.

V. CONCLUSIONS

This paper has studied three deregistration strategies forPCS networks. Two output measures were considered: thenumber of messages sent in the deregistration strategies andthe probability that a portable cannot register (and receiveservice). Assume 100 portables in an RA on the average. Tosatisfy the constraint that , the size of the databaserequired in the explicit scheme is , which is smallerthan the database size for the implicit scheme andthe TO scheme On the other hand, the numberof deregistration messages sent in the explicit scheme isfour–five times the number of messages sent in the TO scheme(with the registration period In the implicit

scheme, neither deregistration nor reregistration messages aresent. Our study indicates that if the database size is expected tobe large, then the implicit scheme should be used to eliminatethe deregistration message traffic. If the database size has tobe small, on the other hand, then the explicit scheme should beused to achieve a low value. If the database size is between2.5–4N, then the TO scheme with the ID replacement strategyshould be used to ensure a reasonably smallvalue and alow level of reregistration message traffic.

In summary, ID and ED are mutually exclusive. TO dereg-istration is a useful tool to clean up registration databases andcan be combined with either one of the ID or ED approaches.In PACS [5], [10], polling reregistration was introduced sothat the system can poll the portables to see if the portablesare still in the RA [9]. A combination of TO deregistration, ID,and polling reregistration might be best in all circumstances.Performance modeling of such a combination will be one ofour future research directions.

ACKNOWLEDGMENT

The author would like to thank J. R. Cruz, S. Y. Hwang,A. R. Noerpel, and the reviewers for their valuable commentsand assistance in improving the quality of this paper.

Page 9: Deregistration strategies for PCS networks

LIN: DEREGISTRATION STRATEGIES FOR PCS NETWORKS 57

REFERENCES

[1] “Cellular radio-telecommunications intersystem operations,” EIA/TIATech. Rep. IS-41 Revision B, 1991.

[2] “Network and operations plan for access services to personal communi-cations services systems, issue 2,” Bellcore Tech. Rep. SR-TSV-002459,1992.

[3] C. N. Lo et al., “An estimate of network database transaction volumeto support universal personal communication services,” in8th ITCSpecialist Seminar on Universal Personal Telecommunications, 1992.

[4] “Generic criteria for version 0.1 wireless access communications sys-tems (WACS) and supplement,” Bellcore Tech. Rep. TR-INS-001313,1994.

[5] P. Porter, D. Harasty, M. Beller, A. R. Noerpel, and V. Varma, “Theterminal registration/deregistration protocol for personal communicationsystems,” inWireless 93 Conf. Wireless Commun., July 1993.

[6] Y.-B. Lin and A. Noerpel, “Implicit deregistration in a PCS network,”IEEE Trans. Veh. Technol., vol. 43, no. 4, pp. 1006–1010, 1994.

[7] Y.-B. Lin and W. Chen, “Impact of busy lines and mobility on callblocking in a PCS network,”Int. J. Commun. Syst., vol. 9, pp. 35–45,1996.

[8] L. Kleinrock, Queueing Systems: Volume I—Theory. New York: Wiley,1976.

[9] A. R. Noerpel, Y.-B. Lin, and H. Sherry, “PACS: Personal accesscommunications system—A tutorial,”IEEE Personal Commun. Mag.,pp. 32–43, June 1996.

[10] Y.-B. Lin, “PACS network signaling using AIN/ISDN,”IEEE PersonalCommun. Mag.,vol. 4, no. 3, pp. 33–39, 1997.

[11] A. R. Noerpel, L. F. Chang, and Y.-B. Lin, “Performance modelingof polling de-registration for unlicensed PCS,”IEEE J. Select. AreasCommun., vol. 14, no. 4, pp. 728–734, 1996.

Yi-Bing Lin (S’80–M’96–SM’96) received theB.S.E.E. degree from National Cheng KungUniversity, Taiwan, R.O.C., in 1983 and the Ph.D.degree in computer science from the University ofWashington, Seattle, in 1990.

From 1990 to 1995, he was with the AppliedResearch Area at Bell Communications Research(Bellcore), Morristown, NJ. He is currentlywith the Department of Computer Science andInformation Engineering, National Chiao TungUniversity, Taiwan, R.O.C., where he was appointed

Full Professor in 1995. In 1996, he was appointed Deputy Director ofthe Microelectronics and Information Systems Research Center, NCTU.His current research interests include design and analysis of personalcommunications services network, mobile computing, distributed simulation,and performance modeling.

Dr. Lin is an Associate Editor of theACM Transactions on Modeling andComputer Simulation, a Subject Area Editor of theJournal of Parallel andDistributed Computing, an Associate Editor of theInternational Journal inComputer Simulation, an Associate Editor ofIEEE Networks, an AssociateEditor of SIMULATION, an Area Editor ofACM Mobile Computing andCommunication Review, a Columnist ofACM Simulation Digest, a Memberof the editorial boards ofInternational Journal of CommunicationsandComputer Simulation Modeling and Analysis, and Guest Editor for theACM/Baltzer WINETSpecial Issue on Personal Communications and theIEEE TRANSACTIONS ON COMPUTERS Special Issue on Mobile Computing.He was Program Chair for the 8th Workshop on Distributed and ParallelSimulation, General Chair for the 9th Workshop on Distributed and ParallelSimulation, Program Chair for the 2nd International Mobile ComputingConference, and Publicity Chair of ACM Sigmobile.