This document provides an overview of call routing in GSM networks. It discusses key components like the Home Location Register (HLR) and Visitor Location Register (VLR) that store subscriber data. It then describes different call routing scenarios like mobile originated calls, mobile terminated calls, and roaming calls. It explains the signaling process and interactions between network elements like the mobile station, base station, MSC, HLR, and other switches. Finally, it briefly discusses the handover process to transfer calls between base stations when a mobile changes location.
The document discusses different types of location updating procedures in mobile networks:
1. Location updating type normal occurs when a mobile subscriber (MS) moves to a new location area and needs to update the network of its new location.
2. IMSI attach is used when the MS powers back on in the same location area it was in when it entered detached mode.
3. Periodic registration is used to avoid unnecessary paging and prevent database failures. The MS registers at periodic intervals set by the network operator, from every 6 minutes to every hour.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
Mobile Originated Call Process in Simple WordsAssim Mubder
Call Setup
Different procedures are necessary depending on the initiating and terminating party:
Mobile Originating Call MOC: Call setup, which are initiated by an MS
Mobile Terminating Call MTC: Call setup, where an MS is the called party
Mobile Mobile Call MMC: Call: setup between two mobile subscribers; MMC thus consists of the execution of a MOC and a MTC one after the other.
Mobile Internal Call MIC: a special case of MMC; both MSs are in the same MSC area, possibly even in the same cell.
The document summarizes the call flow process in GSM networks. It describes the sequence of events that occur when a mobile subscriber makes a call to a landline, when a landline subscriber calls a mobile, and between two mobile subscribers. It also provides an overview of the user services, data services, supplementary services, and security features supported in GSM networks, such as encryption, authentication, and temporary identification numbers to protect subscriber privacy.
The GSM system architecture is divided into three major systems: the Switching System (SS), the Base Station System (BSS), and the Operation and Support System (OSS). The SS handles call processing and subscriber functions and includes the MSC, HLR, VLR, and other registers. The BSS handles radio functions and includes the BSC and BTS. The OSS manages errors, configuration, faults, and performance across the network. Key interfaces include the A interface between MSC and BSS, the B interface between MSC and VLR, and the Um interface between MS and BTS.
This document discusses paging and location update procedures in cellular networks. It defines key terms like MSC, VLR, HLR, TMSI, LA, LAI, and describes how location areas are configured and how location updates and paging work. When a mobile moves to a new location area or PLMN, it performs a location update by sending a message to the new MSC/VLR, which updates the subscriber's HLR. Periodic and random location updates also allow the network to track mobile locations. Paging is used to find mobiles and deliver incoming calls based on location registration information.
The document describes the call flow procedures for mobile originating and mobile terminating calls in a GSM network.
For a mobile originating call, the MS requests a dedicated channel and indicates it wants to set up a call. The MSC receives the call setup message and checks for call barring before establishing a link with the BSC. The BSC assigns a traffic channel for the call.
For a mobile terminating call, the call is routed to the GMSC serving the called subscriber's home network. The GMSC queries the HLR for routing information. The HLR provides a roaming number to route the call to the subscriber's current MSC. The MSC pages the subscriber through the BSCs in their
The document discusses GPRS network architecture and processes. It describes how a mobile station (MS) attaches to and detaches from the GPRS network by communicating with the SGSN and HLR. It also describes how a temporary block flow (TBF) is established to enable data transfer between the MS and network. Additionally, it outlines how a packet data protocol (PDP) context is activated and deactivated to manage the subscriber's data session.
The document discusses different types of location updating procedures in mobile networks:
1. Location updating type normal occurs when a mobile subscriber (MS) moves to a new location area and needs to update the network of its new location.
2. IMSI attach is used when the MS powers back on in the same location area it was in when it entered detached mode.
3. Periodic registration is used to avoid unnecessary paging and prevent database failures. The MS registers at periodic intervals set by the network operator, from every 6 minutes to every hour.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
Mobile Originated Call Process in Simple WordsAssim Mubder
Call Setup
Different procedures are necessary depending on the initiating and terminating party:
Mobile Originating Call MOC: Call setup, which are initiated by an MS
Mobile Terminating Call MTC: Call setup, where an MS is the called party
Mobile Mobile Call MMC: Call: setup between two mobile subscribers; MMC thus consists of the execution of a MOC and a MTC one after the other.
Mobile Internal Call MIC: a special case of MMC; both MSs are in the same MSC area, possibly even in the same cell.
The document summarizes the call flow process in GSM networks. It describes the sequence of events that occur when a mobile subscriber makes a call to a landline, when a landline subscriber calls a mobile, and between two mobile subscribers. It also provides an overview of the user services, data services, supplementary services, and security features supported in GSM networks, such as encryption, authentication, and temporary identification numbers to protect subscriber privacy.
The GSM system architecture is divided into three major systems: the Switching System (SS), the Base Station System (BSS), and the Operation and Support System (OSS). The SS handles call processing and subscriber functions and includes the MSC, HLR, VLR, and other registers. The BSS handles radio functions and includes the BSC and BTS. The OSS manages errors, configuration, faults, and performance across the network. Key interfaces include the A interface between MSC and BSS, the B interface between MSC and VLR, and the Um interface between MS and BTS.
This document discusses paging and location update procedures in cellular networks. It defines key terms like MSC, VLR, HLR, TMSI, LA, LAI, and describes how location areas are configured and how location updates and paging work. When a mobile moves to a new location area or PLMN, it performs a location update by sending a message to the new MSC/VLR, which updates the subscriber's HLR. Periodic and random location updates also allow the network to track mobile locations. Paging is used to find mobiles and deliver incoming calls based on location registration information.
The document describes the call flow procedures for mobile originating and mobile terminating calls in a GSM network.
For a mobile originating call, the MS requests a dedicated channel and indicates it wants to set up a call. The MSC receives the call setup message and checks for call barring before establishing a link with the BSC. The BSC assigns a traffic channel for the call.
For a mobile terminating call, the call is routed to the GMSC serving the called subscriber's home network. The GMSC queries the HLR for routing information. The HLR provides a roaming number to route the call to the subscriber's current MSC. The MSC pages the subscriber through the BSCs in their
The document discusses GPRS network architecture and processes. It describes how a mobile station (MS) attaches to and detaches from the GPRS network by communicating with the SGSN and HLR. It also describes how a temporary block flow (TBF) is established to enable data transfer between the MS and network. Additionally, it outlines how a packet data protocol (PDP) context is activated and deactivated to manage the subscriber's data session.
The document describes the key components and architecture of the GSM system. It discusses the objectives of GSM including supporting international roaming and good speech quality. It then describes the hierarchy of the GSM system including the mobile station, radio subsystem with base stations and base station controllers, and the network and switching subsystem with mobile switching centers and databases. It also discusses the air interface including frequency allocation and channel structure.
Handovers, also called handoffs, allow mobile users to maintain connectivity as they move between different cells. They involve transferring control of a call or data session from one cell to another. There are different types of handovers in GSM including intra-BTS, inter-BTS intra-BSC, inter-BSC, and inter-MSC handovers. Factors like transmitted power, received power, area and shape of cells, and user mobility affect the handover process.
The document provides an overview of GSM architecture including:
1. GSM uses a cellular network architecture with base stations, base station controllers, mobile switching centers, and databases to manage subscriber identity and location.
2. The network allows for voice calls and data services including SMS, and provides security through subscriber authentication and encryption.
3. GSM is a global standard that enabled international roaming and continues to evolve to support higher data rates through technologies like GPRS, EDGE, and WCDMA.
General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly improves and simplifies wireless access to packet data networks.General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly improves and simplifies wireless access to packet data networks
GPRS applies packet radio principal to transfer user data packets in an efficient way b/w MS & external packet data network
GPRS applies packet radio principal to transfer user data packets in an efficient way b/w MS & external packet data network
The document is a seminar report on Wideband Code Division Multiple Access (WCDMA) technology. It discusses the basics of WCDMA, including that it uses code division multiple access to separate users and spread signals over a wide 5MHz bandwidth. It also covers WCDMA specifications, generation, spreading principles, power control, handovers, and advantages such as service flexibility and spectrum efficiency.
- GPRS is an upgrade to GSM that allows packet-based data services and efficient use of network bandwidth. It provides higher data rates than GSM and constant connectivity.
- The GPRS network architecture introduces new network elements like the SGSN and GGSN to route data packets. The SGSN manages packet data in its service area while the GGSN connects the GPRS network to external packet networks.
- Session management in GPRS includes establishing PDP contexts for data transfer sessions and location management tracks the routing area of mobile devices through routing area updates.
This document provides an overview of cellular networks. It discusses key concepts like cells, base stations, frequency reuse, and multiple access methods. It describes how location of mobile devices is managed through location updating and paging. It also covers handoff which allows active calls to continue seamlessly as users move between different cells.
The document discusses different types of handovers in wireless networks. It defines handover as changing the point of connection between a mobile station and base stations. There are three types of handover decisions: network-controlled, mobile-assisted, and mobile-controlled. The document also describes hard handover, soft handover, horizontal handover, and vertical handover. It explains the mechanisms and characteristics of each type of handover.
GPRS is a packet-based mobile data service on GSM networks. It provides higher speed data transmission than previous GSM data services. The GPRS architecture introduces two new network nodes - SGSN and GGSN. SGSN handles mobility management and packet transmission between MS and GGSN, while GGSN connects the GPRS network to external packet networks like the Internet. GPRS enhances the GSM network by allowing dynamic allocation of bandwidth and intermittent data transmission, making it suitable for bursty, low-volume data applications.
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
LTE Basic Parameters, Data Rates, Duplexing & Accessing, Modulation, Coding & MIMO, Explanation of different nodes and Advantage & Disadvantages of different nodes.
GSM uses frequency division duplexing with carriers separated by 200 kHz. Each carrier is divided into 8 time slots using TDMA. Logical channels like traffic channels and signaling channels are mapped onto these physical time slots. Traffic channels carry user data at either full rate or half rate, while signaling channels include broadcast, common, and dedicated control channels used for functions like synchronization, paging, call setup, and handover.
The GSM radio interface uses FDMA to divide the frequency band into channels and TDMA to divide each frequency channel into time slots to allow multiple users, with each user assigned a single time slot. The normal GSM burst carries digitized voice data or other information in a 57-bit data field, and includes guard periods and training sequences to help with timing synchronization and equalization between the mobile station and base transceiver station. GSM networks operate at different frequencies around the world, with GSM-900 being most common in Europe and other parts of the world.
Physical channels carry information over the air interface between the mobile station and base transceiver station. Logical channels map user data and signaling information onto physical channels. There are two main types of logical channels - traffic channels which carry call data, and control channels which communicate service information. Control channels include broadcast channels which transmit cell-wide information, common channels used for paging and access procedures, and dedicated channels for signaling during calls or when not on a call. Logical channels are mapped onto physical channels to effectively transmit information wirelessly between network components in a GSM system.
This document provides an overview of cellular networks. It begins with an introduction that defines a cellular network as a radio network composed of radio cells served by base stations. It then discusses how cellular networks work by allowing mobile devices to connect to the nearest base station and hand off connections between stations as the device moves between cells. Finally, it covers benefits like increased network capacity and coverage area as well as examples of cellular technologies used in modern mobile phone networks.
The document provides an overview of GSM, GPRS, UMTS, HSDPA and HSUPA protocols and call flows. It describes the architecture, interfaces and protocols of each generation at the physical, data link and network layers. Key protocols discussed include LAPD, RR, MM, CM, SNDCP, GTP, RLC, MAC, RRC. Call flows for basic call origination, authentication, data transfer and detach procedures are illustrated for each network. The document also introduces HSDPA and HSUPA enhancements to UMTS such as new channels, scheduling functionality and H-ARQ protocol.
GSM is a digital cellular network standard that allows users to roam internationally. It has a modular architecture consisting of mobile stations, base station subsystems, and network switching subsystems. The mobile station includes a mobile equipment and SIM card. The base station subsystem comprises base transceiver stations and base station controllers. The network switching subsystem contains mobile switching centers, home and visitor location registers, and authentication centers that manage subscriber data and authentication. GSM uses cellular networks of hexagonal cells connected to base station controllers and switching centers to provide coverage over wide geographic areas.
What is GSM?
The Global System for Mobile communications is a digital cellular communications system. It was developed in order to create a common European mobile telephone standard but it has been rapidly accepted worldwide.
Formerly it was “Groupe Spéciale Mobile” (founded in 1982)
now: Global System for Mobile Communication.
Services:
Tele-services
Bearer or Data Services
Supplementary services
Applications:
Mobile telephony
GSM-R
Telemetry System
- Fleet management
- Automatic meter reading
- Toll Collection
- Remote control and fault reporting of DG sets
Value Added Services
Advantages:
Better Quality of speech
Data transmission is supported
New services offered due to ISDN compatibility
International Roaming possible
Large market
Crisper, cleaner quieter calls
disadvantages:
Dropped and missed calls
Less Efficiency
Security Issues
conclusion
The mobile telephony industry rapidly growing and that has become backbone for business success and efficiency and a part of modern lifestyles all over the world.
In this session I have tried to give and over view of the GSM system. I hope that I gave the general flavor of GSM and the philosophy behind its design.
The GSM is standard that insures interoperability without stifling competition and innovation among the suppliers to the benefit of the public both in terms of cost and service quality.
IS-95 CDMA is an air interface standard that uses code division multiple access (CDMA). It employs various techniques to improve system capacity and performance, including bandwidth recycling, power control, soft handoffs, diversity combining, and variable rate vocoding. Key aspects of IS-95 include the use of quadrature phase shift keying modulation at a 1.2288 Mcps chip rate, forward error correction coding, and multiple logical channels (pilot, sync, paging, traffic) defined using orthogonal Walsh codes.
Signaling System #7 (SS7) is a telecommunications protocol that defines high-speed circuit switching for telephone calls and uses out-of-band signaling between service switching points, signal transfer points, and service control points. It has advantages like separation of control information onto logically separate paths, message-oriented call information exchange, and ability of a single signaling channel to carry information about multiple trunks. The SS7 architecture includes service switching points, service control points, and signal transfer points that communicate using protocols like ISUP, TCAP, and SCCP.
1. The document describes different scenarios for GSM call routing including: when the called mobile subscriber is powered off, has call forwarding enabled to a PSTN number, has all incoming calls barred, or is unknown at the HLR.
2. It also provides an overview of the signaling process for a mobile originated call from requesting a channel to call setup, as well as the process for a mobile terminated call including paging the destination mobile and connecting the call upon answer.
3. Key network elements involved in call routing include the MS, BSS, MSC, VLR, HLR, GMSC and PSTN, and different messages are exchanged like address, routing info, and assignment messages to setup the
Call flow oma000003 gsm communication flowEricsson Saudi
The document summarizes several key GSM procedures including authentication and ciphering sequence, location update sequence, basic call sequences, and equipment identification. It provides detailed signaling diagrams to illustrate the message flows between different nodes in the network for these procedures.
The document describes the key components and architecture of the GSM system. It discusses the objectives of GSM including supporting international roaming and good speech quality. It then describes the hierarchy of the GSM system including the mobile station, radio subsystem with base stations and base station controllers, and the network and switching subsystem with mobile switching centers and databases. It also discusses the air interface including frequency allocation and channel structure.
Handovers, also called handoffs, allow mobile users to maintain connectivity as they move between different cells. They involve transferring control of a call or data session from one cell to another. There are different types of handovers in GSM including intra-BTS, inter-BTS intra-BSC, inter-BSC, and inter-MSC handovers. Factors like transmitted power, received power, area and shape of cells, and user mobility affect the handover process.
The document provides an overview of GSM architecture including:
1. GSM uses a cellular network architecture with base stations, base station controllers, mobile switching centers, and databases to manage subscriber identity and location.
2. The network allows for voice calls and data services including SMS, and provides security through subscriber authentication and encryption.
3. GSM is a global standard that enabled international roaming and continues to evolve to support higher data rates through technologies like GPRS, EDGE, and WCDMA.
General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly improves and simplifies wireless access to packet data networks.General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly improves and simplifies wireless access to packet data networks
GPRS applies packet radio principal to transfer user data packets in an efficient way b/w MS & external packet data network
GPRS applies packet radio principal to transfer user data packets in an efficient way b/w MS & external packet data network
The document is a seminar report on Wideband Code Division Multiple Access (WCDMA) technology. It discusses the basics of WCDMA, including that it uses code division multiple access to separate users and spread signals over a wide 5MHz bandwidth. It also covers WCDMA specifications, generation, spreading principles, power control, handovers, and advantages such as service flexibility and spectrum efficiency.
- GPRS is an upgrade to GSM that allows packet-based data services and efficient use of network bandwidth. It provides higher data rates than GSM and constant connectivity.
- The GPRS network architecture introduces new network elements like the SGSN and GGSN to route data packets. The SGSN manages packet data in its service area while the GGSN connects the GPRS network to external packet networks.
- Session management in GPRS includes establishing PDP contexts for data transfer sessions and location management tracks the routing area of mobile devices through routing area updates.
This document provides an overview of cellular networks. It discusses key concepts like cells, base stations, frequency reuse, and multiple access methods. It describes how location of mobile devices is managed through location updating and paging. It also covers handoff which allows active calls to continue seamlessly as users move between different cells.
The document discusses different types of handovers in wireless networks. It defines handover as changing the point of connection between a mobile station and base stations. There are three types of handover decisions: network-controlled, mobile-assisted, and mobile-controlled. The document also describes hard handover, soft handover, horizontal handover, and vertical handover. It explains the mechanisms and characteristics of each type of handover.
GPRS is a packet-based mobile data service on GSM networks. It provides higher speed data transmission than previous GSM data services. The GPRS architecture introduces two new network nodes - SGSN and GGSN. SGSN handles mobility management and packet transmission between MS and GGSN, while GGSN connects the GPRS network to external packet networks like the Internet. GPRS enhances the GSM network by allowing dynamic allocation of bandwidth and intermittent data transmission, making it suitable for bursty, low-volume data applications.
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
LTE Basic Parameters, Data Rates, Duplexing & Accessing, Modulation, Coding & MIMO, Explanation of different nodes and Advantage & Disadvantages of different nodes.
GSM uses frequency division duplexing with carriers separated by 200 kHz. Each carrier is divided into 8 time slots using TDMA. Logical channels like traffic channels and signaling channels are mapped onto these physical time slots. Traffic channels carry user data at either full rate or half rate, while signaling channels include broadcast, common, and dedicated control channels used for functions like synchronization, paging, call setup, and handover.
The GSM radio interface uses FDMA to divide the frequency band into channels and TDMA to divide each frequency channel into time slots to allow multiple users, with each user assigned a single time slot. The normal GSM burst carries digitized voice data or other information in a 57-bit data field, and includes guard periods and training sequences to help with timing synchronization and equalization between the mobile station and base transceiver station. GSM networks operate at different frequencies around the world, with GSM-900 being most common in Europe and other parts of the world.
Physical channels carry information over the air interface between the mobile station and base transceiver station. Logical channels map user data and signaling information onto physical channels. There are two main types of logical channels - traffic channels which carry call data, and control channels which communicate service information. Control channels include broadcast channels which transmit cell-wide information, common channels used for paging and access procedures, and dedicated channels for signaling during calls or when not on a call. Logical channels are mapped onto physical channels to effectively transmit information wirelessly between network components in a GSM system.
This document provides an overview of cellular networks. It begins with an introduction that defines a cellular network as a radio network composed of radio cells served by base stations. It then discusses how cellular networks work by allowing mobile devices to connect to the nearest base station and hand off connections between stations as the device moves between cells. Finally, it covers benefits like increased network capacity and coverage area as well as examples of cellular technologies used in modern mobile phone networks.
The document provides an overview of GSM, GPRS, UMTS, HSDPA and HSUPA protocols and call flows. It describes the architecture, interfaces and protocols of each generation at the physical, data link and network layers. Key protocols discussed include LAPD, RR, MM, CM, SNDCP, GTP, RLC, MAC, RRC. Call flows for basic call origination, authentication, data transfer and detach procedures are illustrated for each network. The document also introduces HSDPA and HSUPA enhancements to UMTS such as new channels, scheduling functionality and H-ARQ protocol.
GSM is a digital cellular network standard that allows users to roam internationally. It has a modular architecture consisting of mobile stations, base station subsystems, and network switching subsystems. The mobile station includes a mobile equipment and SIM card. The base station subsystem comprises base transceiver stations and base station controllers. The network switching subsystem contains mobile switching centers, home and visitor location registers, and authentication centers that manage subscriber data and authentication. GSM uses cellular networks of hexagonal cells connected to base station controllers and switching centers to provide coverage over wide geographic areas.
What is GSM?
The Global System for Mobile communications is a digital cellular communications system. It was developed in order to create a common European mobile telephone standard but it has been rapidly accepted worldwide.
Formerly it was “Groupe Spéciale Mobile” (founded in 1982)
now: Global System for Mobile Communication.
Services:
Tele-services
Bearer or Data Services
Supplementary services
Applications:
Mobile telephony
GSM-R
Telemetry System
- Fleet management
- Automatic meter reading
- Toll Collection
- Remote control and fault reporting of DG sets
Value Added Services
Advantages:
Better Quality of speech
Data transmission is supported
New services offered due to ISDN compatibility
International Roaming possible
Large market
Crisper, cleaner quieter calls
disadvantages:
Dropped and missed calls
Less Efficiency
Security Issues
conclusion
The mobile telephony industry rapidly growing and that has become backbone for business success and efficiency and a part of modern lifestyles all over the world.
In this session I have tried to give and over view of the GSM system. I hope that I gave the general flavor of GSM and the philosophy behind its design.
The GSM is standard that insures interoperability without stifling competition and innovation among the suppliers to the benefit of the public both in terms of cost and service quality.
IS-95 CDMA is an air interface standard that uses code division multiple access (CDMA). It employs various techniques to improve system capacity and performance, including bandwidth recycling, power control, soft handoffs, diversity combining, and variable rate vocoding. Key aspects of IS-95 include the use of quadrature phase shift keying modulation at a 1.2288 Mcps chip rate, forward error correction coding, and multiple logical channels (pilot, sync, paging, traffic) defined using orthogonal Walsh codes.
Signaling System #7 (SS7) is a telecommunications protocol that defines high-speed circuit switching for telephone calls and uses out-of-band signaling between service switching points, signal transfer points, and service control points. It has advantages like separation of control information onto logically separate paths, message-oriented call information exchange, and ability of a single signaling channel to carry information about multiple trunks. The SS7 architecture includes service switching points, service control points, and signal transfer points that communicate using protocols like ISUP, TCAP, and SCCP.
1. The document describes different scenarios for GSM call routing including: when the called mobile subscriber is powered off, has call forwarding enabled to a PSTN number, has all incoming calls barred, or is unknown at the HLR.
2. It also provides an overview of the signaling process for a mobile originated call from requesting a channel to call setup, as well as the process for a mobile terminated call including paging the destination mobile and connecting the call upon answer.
3. Key network elements involved in call routing include the MS, BSS, MSC, VLR, HLR, GMSC and PSTN, and different messages are exchanged like address, routing info, and assignment messages to setup the
Call flow oma000003 gsm communication flowEricsson Saudi
The document summarizes several key GSM procedures including authentication and ciphering sequence, location update sequence, basic call sequences, and equipment identification. It provides detailed signaling diagrams to illustrate the message flows between different nodes in the network for these procedures.
1. Call routing in GSM involves routing calls from the mobile station (MS) through the base station subsystem (BSS) and mobile switching center (MSC) when originating a call or routing an incoming call to the MS.
2. For outgoing calls, the MS sends the dialed number to the BSS which sends it to the MSC. The MSC checks if the MS is allowed the service and asks the BSS to allocate resources before routing the call through the gateway MSC and local exchange.
3. For incoming calls, the call is first sent to the gateway MSC which signals the home location register (HLR). The HLR provides the visiting location register (VLR) which informs the
The document describes the process of setting up a call to or from a mobile station (MS). For a mobile terminated call, the network locates the MS and pages it to set up a signalling connection. Authentication and security procedures are then performed before a traffic channel is assigned for the call. For a mobile originated call, the MS sets up a signalling connection and informs the network of the number to call before being assigned a traffic channel to place the call. Both processes involve setting up signalling and traffic channels between the MS and network for the call connection.
The document describes the process of setting up a call in a GSM network. It discusses mobile terminated (MT) calls, where a call is made to a mobile subscriber, and mobile originated (MO) calls, where a call originates from a mobile subscriber. For MT calls, the network locates the subscriber's location through the HLR and allocates resources to establish a connection. For MO calls, the mobile subscriber establishes a connection and provides the number of the called party to the network to route the call. Common procedures like authentication and ciphering are also performed before the call is connected on an assigned traffic channel.
The document discusses the topics covered in modules about Global System for Mobile Communications (GSM). It provides an overview of GSM architecture and components like the mobile station, base station subsystem, network switching subsystem and their interfaces. It describes the different generations of cellular networks and GSM channels. It also covers concepts like cell planning, hardware for different network nodes, call paths for various call types, data services, mobile packet backbone network and the evolution of GSM.
Mobile networks have evolved over several generations from 1G analog cellular to 4G LTE networks. This document provides an overview of the fundamental concepts and evolution of mobile networks including discussions of 2G, 3G, 4G networks and the Evolved Packet Core. It describes the core network functions and interfaces as well as basic network scenarios.
The document provides an overview of GSM architecture and call flows. It describes the key components of the GSM network including the mobile station, base station subsystem, network switching subsystem, home location register, visitor location register and authentication center. It then details various location update call flows like IMSI attach, normal and periodic updates. It also summarizes the mobile to mobile and mobile to ISUP call flows and an intra-MSC handover call flow.
This document outlines the topics that will be covered in a GSM training course for professionals. The course covers 10 modules on topics related to GSM architecture, channel concepts, cell planning, hardware, call paths, data services, evolution to LTE, and more. Each module will provide an in-depth look at key aspects of GSM networks to help professionals gain expertise in this area.
Gsm architecture, gsm network identities, network cases, cell planning, and c...Zorays Solar Pakistan
This document discusses GSM network architecture and components. It describes the key elements like the MSC, HLR, VLR and their functions. It explains cell planning and frequency reuse. It also covers network identities, attaching and roaming processes, call setup, and charging systems like triggered charging for calls and SMS. Compound charging processes for originating calls, voucher refills through IVR are summarized.
Mobile Networks Architecture and Security (2G to 5G)
+ Mobile Networks History 2G/3G/4G/LTE/5G
+ CS/PS/EPC/5GC Core Network Elements Overview
+ Mobile Networks Basic Scenarios
+ Mobile Network Security
+ Authentication / Ciphering
GSM is a second generation cellular standard developed to provide voice services and data delivery using digital modulation. It was developed by Groupe Spécial Mobile in 1982 to replace incompatible analog cellular systems. GSM specifications were released in 1990 and it is now used in over 135 countries worldwide with over 1.3 billion subscribers. GSM services include teleservices like voice calls, data services like SMS and supplementary services like call waiting. The GSM network architecture consists of mobile stations, base station subsystems including BTS and BSC, and network switching subsystems including MSC, HLR, VLR and others. Future enhancements to GSM include HSCSD, GPRS and EDGE to provide higher data rates before
Kumar gunjan 20160213 mobile communication securitynullowaspmumbai
The document discusses mobile communication technologies and security issues in GSM. It provides an overview of the evolution of mobile communication from 1G to 2G technologies such as GSM. It describes the GSM architecture including components like the SIM card, authentication and encryption schemes, and GSM channels. It also outlines the basic call sequences for mobile-to-land and land-to-mobile calls. Finally, it discusses some security issues in the GSM network like vulnerabilities to sniffing and man-in-the-middle attacks.
A mobile station in GSM comprises several functional groups including the mobile terminal, terminal adapter, terminal equipment, and subscriber identity module. The network and switching subsystem is the main component of the public mobile network and controls switching, mobility management, and interconnection. It includes components like the mobile switching center, home location register, and visitor location register. The mobile switching center plays a central role in switching functions and mobility support.
This document provides an overview of GSM (Global System for Mobile Communications) including its key properties, structure, protocols, databases, security aspects, and extensions like HSCSD and GPRS. GSM is a digital cellular network that allows for roaming between networks and integration with fixed telephone networks. It uses TDMA and FDMA to allow multiple users to access the network simultaneously. Security features include subscriber identity modules (SIM cards), authentication of users, and encryption of communications. Extensions like HSCSD provide higher data rates and GPRS introduces packet switching to GSM networks.
GSM networks divide coverage areas into a hierarchy of locations to efficiently manage subscriber location and enable call delivery. The largest division is the Public Land Mobile Network (PLMN). Within a PLMN are Mobile Switching Center/Visitor Location Register (MSC/VLR) service areas, which are further divided into Location Areas (LA) containing groups of cells. As subscribers move between areas, they perform location updates to inform the network of their position. This allows more efficient paging for call delivery. [END SUMMARY]
The GSM network architecture consists of three major subsystems: the network and switching subsystem (NSS), the base station subsystem (BSS), and the operation and support subsystem (OSS). The BSS is composed of the base transceiver station (BTS), base station controller (BSC), and transcoder (TCU/TRAU). The BTS handles radio transmission/reception, the BSC manages radio resources and handles radio call processing, and the TCU converts between GSM and PSTN/ISDN formats. The NSS contains the mobile switching center (MSC), home location register (HLR), visitor location register (VLR), and equipment identity register (EIR), which manage subscriber
The document summarizes the GSM inter-BSC intra-MSC handover call flow where a mobile phone moves from the Rockville cell to the Bethesda cell while on a call. The Rockville BSC detects the mobile will have better signal in the Bethesda cell and sends a handover required message to the MSC. The MSC sends a handover request to the Bethesda BSC which allocates a channel. The Bethesda BSC sends a handover command to the mobile via the Rockville BSC. The mobile then tunes to the new channel and completes the handover while the call path is switched to maintain the call.
The document summarizes the GSM inter-BSC intra-MSC handover call flow where a mobile phone moves from the Rockville cell to the Bethesda cell while on a call. The Rockville BSC detects the mobile will have better signal in the Bethesda cell and sends a handover required message to the MSC. The MSC sends a handover request to the Bethesda BSC which allocates a channel. The Bethesda BSC sends a handover command to the mobile via the Rockville BSC. The mobile then tunes to the new channel and completes the handover while the call path is switched to maintain the call.
The document summarizes the GSM inter-BSC intra-MSC handover call flow where a mobile phone moves from the Rockville cell to the Bethesda cell while on a call. The Rockville BSC detects the mobile will have better signal in the Bethesda cell and sends a handover required message to the MSC. The MSC sends a handover request to the Bethesda BSC which allocates a channel. The Bethesda BSC sends a handover command to the mobile via the Rockville BSC. The mobile then tunes to the new channel and completes the handover process while maintaining the active call.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
2. Agenda
GSM-Introduction
Mobile Station (ME+SIM)
HLR, VLR
Location Update
Call Routing Scenarios
Mobile Originated Sequence
Mobile Terminated Sequence
Mobile-to-Mobile Long distance
Mobile in Roaming (Domestic, International)
Call Handover
Questions
4. HLR / VLR
Home Location Registers (HLR)
o permanent database about mobile subscribers in a large
service area(generally one per GSM network operator)
o database contains IMSI, MSISDN, prepaid/postpaid,
roaming restrictions, MSC/VLR, supplementary services.
Visitor Location Registers (VLR)
o Temporary database which updates whenever new MS
enters its area, by HLR database
o Controls those mobiles roaming in its area
o Reduces number of queries to HLR
o Database contains IMSI, TMSI, MSISDN, MSRN, Location
Area, authentication key
6. Brief Introdution to Location Update
Three types of Location Update :
IMSI Attach/
Detach
Normal Location Update
Periodic Location Update
7. Questions
Please give the sequence:
1.The called MS is powered off.
2.The called MS activates the CFU to a
PSTN No.
3.The called MS has been barred all
incoming call.
4.The Called MS are not known at HLR
8. 1. The called MS is powered off
AP Vodafone AP Airtel
MS BSS MSC VLR HLR GMSC GMSC
Initial and Final
MSISDN
1 Address Message
( +91 9885 xxxxxx
MSISDN
2 Send Routing Info ( +91 9885 xxxxxx
3 Routing Info Ack
Subscriber Absent The Calling Mobile
hears the
announcement of
mobile is powered
off
9. 2. The called MS activates the CFU to a PSTN No.
MS BSS MSC VLR HLR GMSC PSTN
MSISDN
Initial and Final +91 9885 xxxxxx
1 Address Message
MSISDN
2 Send Routing Info +91 9885 xxxxxx
3 Routing Info Ack
CFN
+91 40 66235307
4 IFAM
10. 3. The called MS has been barred all incoming call.
MS BSS MSC VLR HLR GMSC GMSC
Initial and Final MSISDN
1 Address Message +91 9885 xxxxxx
MSISDN
2 Send Routing Info
+91 9885 xxxxxx
3 Routing Info Ack
Call Barred
11. 4. The Called MS are not known at HLR
MS BSS MSC VLR HLR GMSC GMSC
Initial and Final MSISDN
1 Address Message +91 9885 xxxxxx
MSISDN
2 Send Routing Info
+91 9885 xxxxxx
3 Routing Info Ack
Unknown Subscriber
14. Mobile Originated Sequence
MS BSS MSC VLR HLR PSTN
1 CHANNEL REQUEST Signaling Link request
DCCH ASSIGN Signaling Link Granted
SIGNALING LINK
ESTABLISHED
Channel request
2 REQ. FOR SERVICE
3 AUTHENTICATION
SET Cipher MODE
Setup Voice Call
4 SET-UP
Dailed digits …+91 40 66235307
5 EQUIP. ID REQ.
6 COMPLETE CALL
CALL PROCEEDING Call setup is in Process
15. Mobile Originated Sequence
MS BSS MSC VLR HLR PSTN
7 ASSIG. COMMAND
Switch from Signaling
ASSIG. COMPLETE Mode to Voice
+91 40 66235307
8.Initial and Final Address Switch routes the call to PSTN
Message (IFAM)
PSTN indicates to Switch
Address Complete(ACM)
< Called Subscriber Informed Via Ring
Alerting Ring Alert
MS hears ring
tone from land Passed to Mobile
phone Called Subscriber Answered
9 Answer (ANS)Connect
Switch Informs
Ring tone Call Answered
stops
10 Connect Acknowldge Acknowledge Call
Hi RK
Answered received
Speech Started
BILLING STARTS
16. Mobile Terminated Sequence
AP Vodafone AP Airtel
MS BSS MSC VLR HLR GMSC GMSC
Initial and Final MSISDN
1 Address Message +91 9885 xxxxxx
MSISDN
IMSI +91 9885 xxxxxx
2 Send Routing Info
404 13 xxxxxxxxxx
3 Routing Info Ack
Initial and Final MSRN MSRN
Address Message 091 9885 xxxxxx (roaming number)
MSRN
091 9885 xxxxxx (roaming number)
4 Send Info For I/C
Call Setup
MSRN
5 Page
<PCH>
Paging Request
TMSI) TMSI) LAI & TMSI)
LAI – 404 13 location Area Code
17. Mobile Terminated Sequence
AP Vodafone AP Airtel
MS BSS MSC VLR HLR GMSC GMSC
6 Assignment Call Setup Request
Command
Assignment Call Setup Confirmed
Complete Ring Tone at
Ringtone Alert Acknowledge the Other
Alert Mobile
Address Complete
7 Connect Mobile Subscriber Answered
Ringing stops
Subscriber at Other
picks up Mobile
Connect ACK ANS Billing
starts
Speech Started Hello...
18. Mobile-to-Mobile Long Distance
2. Towers are serviced by
1. Cell phone transmits to a local base station
local towers
Radio tower
3. Basestations are
services by Mobil
Switching Station
Radio tower Base Station
Mobile Switching Station
5. Destination switch office
4. Regional Switch Office
receives call, and forwards
forwards calls
to Mobil Switching Station
Trunk
Regional Switch Office Regional Switch Office
Radio tower
Mobile Switching Station
Base Station
5. Mobile Switching
Station forwards to Base 6. Base Station forwards
Station to local towers.
Radio tower
7. Local towers complete
the loop
19. Mobile is in Roaming
2.Receiving Mobile on Roaming
3. Both Mobiles are on Roaming
The following is intended to help illustrate the four types (levels) of handover. Illustrated is a system consisting of two Mobile Switching Centres (MSCs) with three Base Station Systems (BSSs). Also depicted are cell coverage areas with example global cell identification codes for each base transceiver station. From the mobile station's reference point, it is unaware of the four levels of handover. The mobile station has two handover-related responsibilities: to provide signal measurements to its serving base station and to retune to a new radio channel when ordered to do so. Assume that the mobile and land stations are active in a call, the call is being controlled by MSC A, and the mobile is currently in cell area 234-01-100-54 . Intra-BSS/Intra Base Transceiver Station For this type of handover, the mobile station is handed off to a different radio channel within the same cell area: 234-01-100-54 . This is actually an unusual type of handover, since it is not triggered by poor signal strength – if it was, the candidate base station would be different from the serving BTS. A probable cause of this type of handover would be poor signal quality (not strength), possibly due to co-channel interference. For this type of handover, BSC 3 would allocate a new radio channel and instruct the mobile station to retune.