1. The document discusses 1xEV-DO hard handoff, which involves handing off a mobile device's connection between base stations or access networks in a 1xEV-DO network.
2. A 1xEV-DO hard handoff can occur between base stations within the same radio node controller (RNC), between RNCs served by the same packet data serving node (PDSN), or between PDSNs.
3. The key aspects of a 1xEV-DO hard handoff are the registration of a new access network session on the target network, and establishment of a new R-P session between the target RNC and PDSN while maintaining the existing PPP connection between
The document discusses Mobile IP, which allows mobile devices to change their point of connection to the internet without changing their IP address. It describes key concepts like the home agent, foreign agent, care-of address, and registration process. Mobile IP addresses issues like triangular routing and proposes optimizations like reverse tunneling to improve efficiency when a mobile node changes locations.
Circuit switching is the oldest networking technology, establishing a dedicated communication path between devices through intermediate nodes. It works by setting up connections between communicating parties before data transfer, dedicating the full path to that connection until it is terminated. While well-suited for analog voice, circuit switching is inefficient for data due to wasted bandwidth on idle connections. Examples of circuit-switched networks include the Public Switched Telephone Network (PSTN) and Private Automatic Branch Exchanges (PABXs).
This document provides an overview of Mobile IP, including its key requirements, terminology, and technical processes. Mobile IP allows devices to change networks without losing connectivity by updating their location through registration with a home agent. It aims to remain compatible with existing IP standards while providing transparency to higher-level applications and efficiency at scale. The document explains concepts such as home and foreign networks, care-of addresses, agents, registration, tunneling, and optimization techniques.
Mobile Network Layer protocols and mechanisms allow nodes to change their point of attachment to different networks while maintaining ongoing communication. Key concepts include:
- Mobile IP adds mobility support to IP, allowing nodes to use the same IP address even when changing networks. It relies on home agents and care-of addresses.
- Registration allows mobile nodes to inform their home agent of their current location when visiting foreign networks. Tunneling and encapsulation techniques are used to forward packets to mobile nodes' current locations.
- Various routing protocols like DSDV have been developed for mobile ad hoc networks which have no fixed infrastructure and dynamic topologies.
1. The document discusses various aspects of GSM including the functions of SDCCH and SACCH channels, reasons for handovers and their shortcomings, types of internal and external handovers, frequency hopping parameters and their importance, and analysis of RX Qual and its relationship to FER.
2. It also covers topics like frequency hopping effects, idle channel measurements, handover types, and analysis of key GSM parameters displayed on mobile devices.
3. The document provides detailed explanations and examples regarding important GSM concepts, channel characteristics, and network optimization techniques.
This document discusses the mobile network layer and Mobile IP. It introduces key concepts like mobile nodes, home agents, foreign agents and care-of addresses. It describes the goals of mobility support in the network layer and discusses protocols and mechanisms like agent discovery, registration, tunneling, encapsulation and optimizations to Mobile IP. The document provides details on various message formats and packet headers used in Mobile IP operations.
The document discusses Mobile IP, which allows mobile devices to change their point of connection to the internet without changing their IP address. It describes key concepts like the home agent, foreign agent, care-of address, and registration process. Mobile IP addresses issues like triangular routing and proposes optimizations like reverse tunneling to improve efficiency when a mobile node changes locations.
Circuit switching is the oldest networking technology, establishing a dedicated communication path between devices through intermediate nodes. It works by setting up connections between communicating parties before data transfer, dedicating the full path to that connection until it is terminated. While well-suited for analog voice, circuit switching is inefficient for data due to wasted bandwidth on idle connections. Examples of circuit-switched networks include the Public Switched Telephone Network (PSTN) and Private Automatic Branch Exchanges (PABXs).
This document provides an overview of Mobile IP, including its key requirements, terminology, and technical processes. Mobile IP allows devices to change networks without losing connectivity by updating their location through registration with a home agent. It aims to remain compatible with existing IP standards while providing transparency to higher-level applications and efficiency at scale. The document explains concepts such as home and foreign networks, care-of addresses, agents, registration, tunneling, and optimization techniques.
Mobile Network Layer protocols and mechanisms allow nodes to change their point of attachment to different networks while maintaining ongoing communication. Key concepts include:
- Mobile IP adds mobility support to IP, allowing nodes to use the same IP address even when changing networks. It relies on home agents and care-of addresses.
- Registration allows mobile nodes to inform their home agent of their current location when visiting foreign networks. Tunneling and encapsulation techniques are used to forward packets to mobile nodes' current locations.
- Various routing protocols like DSDV have been developed for mobile ad hoc networks which have no fixed infrastructure and dynamic topologies.
1. The document discusses various aspects of GSM including the functions of SDCCH and SACCH channels, reasons for handovers and their shortcomings, types of internal and external handovers, frequency hopping parameters and their importance, and analysis of RX Qual and its relationship to FER.
2. It also covers topics like frequency hopping effects, idle channel measurements, handover types, and analysis of key GSM parameters displayed on mobile devices.
3. The document provides detailed explanations and examples regarding important GSM concepts, channel characteristics, and network optimization techniques.
This document discusses the mobile network layer and Mobile IP. It introduces key concepts like mobile nodes, home agents, foreign agents and care-of addresses. It describes the goals of mobility support in the network layer and discusses protocols and mechanisms like agent discovery, registration, tunneling, encapsulation and optimizations to Mobile IP. The document provides details on various message formats and packet headers used in Mobile IP operations.
Inter-frequency and inter-RAT handovers can be coverage, load, or service based. Coverage-based handovers are triggered by certain A3/A4/A5 events for inter-frequency and B1/B2 events for inter-RAT. The document discusses the parameters involved in measuring cells and configuring handovers, including measurement reports, handover commands, and key performance indicators for analyzing handover issues. Common causes of handover problems include poor downlink quality, interference, and abnormal X2 interface signaling.
mobile ip, Mobile COmmunication Internet ProtocolGaurav Dwivedi
Mobile IP adds mobility support to the Internet network layer protocol IP. It allows nodes to continue receiving datagrams no matter where they are attached to the Internet. Mobile IP uses home agents and foreign agents to tunnel packets to a mobile node's current location, represented by its care-of address. When away from its home network, a mobile node registers its care-of address with its home agent. The home agent intercepts packets destined for the mobile node and tunnels them to the care-of address using encapsulation. This allows the mobile node to maintain its home IP address while connecting via foreign networks.
Mobile IP allows mobile nodes to change their point of attachment between IP networks while maintaining ongoing connections. It defines entities like mobile nodes, home agents, and foreign agents to facilitate IP packet delivery to the mobile node's current location. The key operations in Mobile IP are agent discovery, registration of the mobile node's new location with its home agent, and tunneling of packets from the home agent to the foreign agent or mobile node's care-of address.
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
The document discusses Inter-Radio Access Technology (IRAT) handover and cell change, which allows the transition of 3G voice and data services between WCDMA and GSM networks to maintain connections and prevent dropped calls. It describes the IRAT handover evaluation process based on UE measurement reports and covers topics like coverage monitoring, event reporting, parameters, handover sequences, cell change procedures, and directed retry to offload traffic between networks.
Mobile IP uses encapsulation and tunneling to forward data to mobile nodes. When a mobile node registers with its home agent while connected to a foreign network, the home agent intercepts datagrams for the mobile node and encapsulates them by adding a new IP header. This creates a tunnel to the mobile node's care-of address. Common encapsulation methods include IP-in-IP, minimal encapsulation, and GRE. Tunneling allows datagrams to be forwarded across networks while hiding the details of the encapsulated datagram. Loops can occur if the source IP matches the tunnel endpoint, so routers discard these datagrams.
The document summarizes the key components and protocol architecture of a UMTS network. It describes the domains and reference points that divide a UMTS system. The radio access network (UTRAN) consists of Radio Network Subsystems (RNSs) with Node Bs and Radio Network Controllers (RNCs). The interfaces between these components, such as Iu, Iur, Iub and Uu, have user, control and transport planes with various protocols to support communication and control functions. Key responsibilities are distributed between the RNC for radio resource control and the Node B for lower-level radio access functions.
WIRELESS NETWORKS _ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORKS PPT
POWER POINT PRESENTAION ON WIRELESS NETWORKS
BABU M
ASST PROFESSOR/ ELECTRONICS AND COMMUNICATION ENGINEERING,
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI, THIRUVALLUR DISTRICT
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPTbabuece
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
BABU M
ASST PROFESSOR
DEPARTMENT OD ELECTRONICS AND COMMUNICATION ENGINEERING
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI
THIRUVALLUR DISTRICT
The document discusses Mobile IP, which allows mobile devices to change networks while maintaining the same IP address. It describes key concepts like mobile nodes, home networks, foreign agents, and care-of addresses. The mobile IP process involves agent discovery, registration of the mobile node's location, and tunneling of data packets through foreign agents. Dynamic Host Configuration Protocol (DHCP) is also discussed, which dynamically assigns IP addresses to devices on a network.
Drive tests are performed to continuously monitor and optimize network performance. Key parameters measured include RxLevel, RxQuality, Frame Erasure Rate, Bit Error Rate, Carrier to Interferer ratio, and Speech Quality Index for GSM networks. For CDMA networks, parameters like RxLevel, TxPower, Carrier Energy to Interference, Carrier to Interferer ratio, and Signal to Noise Ratio are measured. Maintaining these parameters within normal ranges helps ensure quality of service and identify issues needing attention.
The document provides an overview of GSM rating and call charging. It discusses the structure of call detail records (CDRs) generated in the GSM network, which contain call information used for rating calls and calculating charges. Different types of CDRs are generated for various call scenarios, such as mobile originating calls, roaming calls, call forwarding, SMS, and supplementary services. The rating module processes the CDRs by matching call records, calculating appropriate charges, and storing results in billing tables to generate customer invoices.
The document discusses the Public Switched Telephone Network (PSTN) in Bharat Sanchar Nigam Limited (BSNL), India's state-owned telecom company. It describes the evolution of the network from analog to digital exchanges and the types of exchanges currently used, including NT switches from vendors like Siemens, Alcatel, Lucent and Ericsson. It also discusses the network organization, interconnection with private operators, numbering scheme, and basic and supplementary services offered on the landline network like ISDN, call waiting, call forwarding etc.
The document discusses various protocols and approaches for improving the performance of TCP over wireless networks. It notes that wireless networks have higher bit error rates, lower bandwidth, and mobility issues compared to wired networks. Several protocols are described that aim to distinguish wireless losses from congestion losses to avoid unnecessary TCP reactions:
- Indirect TCP splits the connection and handles losses locally at the base station. Snoop caches packets at the base station for retransmission.
- Mobile TCP further splits the connection and has the base station defer acknowledgments. It can also inform the sender about handoffs versus interface switches.
- Multiple acknowledgments uses two types of ACKs to isolate the wireless and wired portions of the network.
-
The document provides information about the IEEE 802.11 WLAN standard and its various layers:
- The PHY layer includes the physical layer convergence protocol and physical medium dependent sublayers. The PHY layer supports FHSS, DSSS and infrared spread spectrum techniques.
- The MAC layer supports distributed coordination function based on CSMA/CA and RTS/CTS, as well as point coordination function controlled by an access point. It defines frame formats and medium access mechanisms.
The document discusses mobility and handover in 4G and 5G networks. It defines handover as the process of transferring an ongoing call or data session from one channel to another in a cellular network. It then describes the different types of handovers, including horizontal, vertical, intra-frequency, inter-frequency, hard, soft, and softer handovers. The document also explains the handover process in LTE, including the initiation, preparation, and execution phases, and discusses S1-based and X2-based handovers.
This document discusses Mobile Internet Protocol (Mobile IP) and how it allows mobile devices to stay connected to the internet without changing their IP address as they move between different networks. It covers key topics such as:
- The basics of Mobile IP including definitions of terms like home agent, foreign agent, and care-of-address.
- How Mobile IP works including the process of discovering the care-of-address, registering with foreign agents, and tunneling packets to the mobile node's current location.
- Adaptations made to transport protocols like TCP to improve performance over wireless networks.
The document provides an overview of Signaling System 7 (SS7), which is an international standard for exchanging call setup, routing, and control information between telecommunications network elements in the public switched telephone network (PSTN). Key points discussed include:
- SS7 enables enhanced services like caller ID, call forwarding, toll-free numbers, and wireless roaming.
- SS7 uses a separate packet-switched network for signaling data rather than in-band signaling over voice channels.
- The SS7 network consists of switching points like service switching points (SSPs), signal transfer points (STPs), and service control points (SCPs).
- SS7 signaling links connect these
This document provides an introduction to mobile computing. It defines mobile computing as using a computer while on the move, involving mobility, computing, and network connectivity. The key aspects of mobile computing are discussed, including mobile communication infrastructure, software, hardware, and devices. Common network types that enable mobile computing like WLAN, MAN, WAN, and wireless networks are also summarized. The relationship between mobile computing and wireless networking is described, with wireless networking providing the basic communication capabilities. Examples of mobile computing applications are given for various fields.
Carrier aggregation allows combining multiple component carriers to increase bandwidth and throughput. The primary serving cell handles radio resource control and provides system information, while secondary serving cells provide additional bandwidth. Carrier aggregation can be intra-band contiguous, intra-band non-contiguous, or inter-band depending on whether the component carriers are within one band and contiguous or not. A maximum of 5 component carriers can be aggregated for a total bandwidth of 100MHz in LTE-Advanced.
- The document discusses troubleshooting an issue where an EVDO site is experiencing close to 100% access failures.
- It is determined that the reverse traffic channel acknowledgement (RTC Ack) message is missing, indicating a failure to acquire the reverse traffic channel.
- Suggestions are made to check parameters at the digital optical module (DOM) such as timing advance and reverse distribution delay to help identify the root cause.
Cutc izp deployment guide for nss(draft)Phuoc Phuoc
This document provides an overview and deployment guide for Intelligent Paging on CDMA networks. It describes how the network is divided into paging zones to improve paging channel capacity. When mobiles move between zones or are paged, only the base stations in that zone process the page instead of the entire network. It outlines the call processing and configuration changes needed to implement this feature.
Inter-frequency and inter-RAT handovers can be coverage, load, or service based. Coverage-based handovers are triggered by certain A3/A4/A5 events for inter-frequency and B1/B2 events for inter-RAT. The document discusses the parameters involved in measuring cells and configuring handovers, including measurement reports, handover commands, and key performance indicators for analyzing handover issues. Common causes of handover problems include poor downlink quality, interference, and abnormal X2 interface signaling.
mobile ip, Mobile COmmunication Internet ProtocolGaurav Dwivedi
Mobile IP adds mobility support to the Internet network layer protocol IP. It allows nodes to continue receiving datagrams no matter where they are attached to the Internet. Mobile IP uses home agents and foreign agents to tunnel packets to a mobile node's current location, represented by its care-of address. When away from its home network, a mobile node registers its care-of address with its home agent. The home agent intercepts packets destined for the mobile node and tunnels them to the care-of address using encapsulation. This allows the mobile node to maintain its home IP address while connecting via foreign networks.
Mobile IP allows mobile nodes to change their point of attachment between IP networks while maintaining ongoing connections. It defines entities like mobile nodes, home agents, and foreign agents to facilitate IP packet delivery to the mobile node's current location. The key operations in Mobile IP are agent discovery, registration of the mobile node's new location with its home agent, and tunneling of packets from the home agent to the foreign agent or mobile node's care-of address.
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
The document discusses Inter-Radio Access Technology (IRAT) handover and cell change, which allows the transition of 3G voice and data services between WCDMA and GSM networks to maintain connections and prevent dropped calls. It describes the IRAT handover evaluation process based on UE measurement reports and covers topics like coverage monitoring, event reporting, parameters, handover sequences, cell change procedures, and directed retry to offload traffic between networks.
Mobile IP uses encapsulation and tunneling to forward data to mobile nodes. When a mobile node registers with its home agent while connected to a foreign network, the home agent intercepts datagrams for the mobile node and encapsulates them by adding a new IP header. This creates a tunnel to the mobile node's care-of address. Common encapsulation methods include IP-in-IP, minimal encapsulation, and GRE. Tunneling allows datagrams to be forwarded across networks while hiding the details of the encapsulated datagram. Loops can occur if the source IP matches the tunnel endpoint, so routers discard these datagrams.
The document summarizes the key components and protocol architecture of a UMTS network. It describes the domains and reference points that divide a UMTS system. The radio access network (UTRAN) consists of Radio Network Subsystems (RNSs) with Node Bs and Radio Network Controllers (RNCs). The interfaces between these components, such as Iu, Iur, Iub and Uu, have user, control and transport planes with various protocols to support communication and control functions. Key responsibilities are distributed between the RNC for radio resource control and the Node B for lower-level radio access functions.
WIRELESS NETWORKS _ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORKS PPT
POWER POINT PRESENTAION ON WIRELESS NETWORKS
BABU M
ASST PROFESSOR/ ELECTRONICS AND COMMUNICATION ENGINEERING,
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI, THIRUVALLUR DISTRICT
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPTbabuece
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
BABU M
ASST PROFESSOR
DEPARTMENT OD ELECTRONICS AND COMMUNICATION ENGINEERING
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI
THIRUVALLUR DISTRICT
The document discusses Mobile IP, which allows mobile devices to change networks while maintaining the same IP address. It describes key concepts like mobile nodes, home networks, foreign agents, and care-of addresses. The mobile IP process involves agent discovery, registration of the mobile node's location, and tunneling of data packets through foreign agents. Dynamic Host Configuration Protocol (DHCP) is also discussed, which dynamically assigns IP addresses to devices on a network.
Drive tests are performed to continuously monitor and optimize network performance. Key parameters measured include RxLevel, RxQuality, Frame Erasure Rate, Bit Error Rate, Carrier to Interferer ratio, and Speech Quality Index for GSM networks. For CDMA networks, parameters like RxLevel, TxPower, Carrier Energy to Interference, Carrier to Interferer ratio, and Signal to Noise Ratio are measured. Maintaining these parameters within normal ranges helps ensure quality of service and identify issues needing attention.
The document provides an overview of GSM rating and call charging. It discusses the structure of call detail records (CDRs) generated in the GSM network, which contain call information used for rating calls and calculating charges. Different types of CDRs are generated for various call scenarios, such as mobile originating calls, roaming calls, call forwarding, SMS, and supplementary services. The rating module processes the CDRs by matching call records, calculating appropriate charges, and storing results in billing tables to generate customer invoices.
The document discusses the Public Switched Telephone Network (PSTN) in Bharat Sanchar Nigam Limited (BSNL), India's state-owned telecom company. It describes the evolution of the network from analog to digital exchanges and the types of exchanges currently used, including NT switches from vendors like Siemens, Alcatel, Lucent and Ericsson. It also discusses the network organization, interconnection with private operators, numbering scheme, and basic and supplementary services offered on the landline network like ISDN, call waiting, call forwarding etc.
The document discusses various protocols and approaches for improving the performance of TCP over wireless networks. It notes that wireless networks have higher bit error rates, lower bandwidth, and mobility issues compared to wired networks. Several protocols are described that aim to distinguish wireless losses from congestion losses to avoid unnecessary TCP reactions:
- Indirect TCP splits the connection and handles losses locally at the base station. Snoop caches packets at the base station for retransmission.
- Mobile TCP further splits the connection and has the base station defer acknowledgments. It can also inform the sender about handoffs versus interface switches.
- Multiple acknowledgments uses two types of ACKs to isolate the wireless and wired portions of the network.
-
The document provides information about the IEEE 802.11 WLAN standard and its various layers:
- The PHY layer includes the physical layer convergence protocol and physical medium dependent sublayers. The PHY layer supports FHSS, DSSS and infrared spread spectrum techniques.
- The MAC layer supports distributed coordination function based on CSMA/CA and RTS/CTS, as well as point coordination function controlled by an access point. It defines frame formats and medium access mechanisms.
The document discusses mobility and handover in 4G and 5G networks. It defines handover as the process of transferring an ongoing call or data session from one channel to another in a cellular network. It then describes the different types of handovers, including horizontal, vertical, intra-frequency, inter-frequency, hard, soft, and softer handovers. The document also explains the handover process in LTE, including the initiation, preparation, and execution phases, and discusses S1-based and X2-based handovers.
This document discusses Mobile Internet Protocol (Mobile IP) and how it allows mobile devices to stay connected to the internet without changing their IP address as they move between different networks. It covers key topics such as:
- The basics of Mobile IP including definitions of terms like home agent, foreign agent, and care-of-address.
- How Mobile IP works including the process of discovering the care-of-address, registering with foreign agents, and tunneling packets to the mobile node's current location.
- Adaptations made to transport protocols like TCP to improve performance over wireless networks.
The document provides an overview of Signaling System 7 (SS7), which is an international standard for exchanging call setup, routing, and control information between telecommunications network elements in the public switched telephone network (PSTN). Key points discussed include:
- SS7 enables enhanced services like caller ID, call forwarding, toll-free numbers, and wireless roaming.
- SS7 uses a separate packet-switched network for signaling data rather than in-band signaling over voice channels.
- The SS7 network consists of switching points like service switching points (SSPs), signal transfer points (STPs), and service control points (SCPs).
- SS7 signaling links connect these
This document provides an introduction to mobile computing. It defines mobile computing as using a computer while on the move, involving mobility, computing, and network connectivity. The key aspects of mobile computing are discussed, including mobile communication infrastructure, software, hardware, and devices. Common network types that enable mobile computing like WLAN, MAN, WAN, and wireless networks are also summarized. The relationship between mobile computing and wireless networking is described, with wireless networking providing the basic communication capabilities. Examples of mobile computing applications are given for various fields.
Carrier aggregation allows combining multiple component carriers to increase bandwidth and throughput. The primary serving cell handles radio resource control and provides system information, while secondary serving cells provide additional bandwidth. Carrier aggregation can be intra-band contiguous, intra-band non-contiguous, or inter-band depending on whether the component carriers are within one band and contiguous or not. A maximum of 5 component carriers can be aggregated for a total bandwidth of 100MHz in LTE-Advanced.
- The document discusses troubleshooting an issue where an EVDO site is experiencing close to 100% access failures.
- It is determined that the reverse traffic channel acknowledgement (RTC Ack) message is missing, indicating a failure to acquire the reverse traffic channel.
- Suggestions are made to check parameters at the digital optical module (DOM) such as timing advance and reverse distribution delay to help identify the root cause.
Cutc izp deployment guide for nss(draft)Phuoc Phuoc
This document provides an overview and deployment guide for Intelligent Paging on CDMA networks. It describes how the network is divided into paging zones to improve paging channel capacity. When mobiles move between zones or are paged, only the base stations in that zone process the page instead of the entire network. It outlines the call processing and configuration changes needed to implement this feature.
This document provides an overview of diagnostic logging for Nortel's HTM ATP SBS & CPDS systems. It describes how to configure diagnostic logging via the GUI and command line for the SBS and CPDS subsystems. Logging can be unconditional or conditional on specific attributes. Logs are started, suspended, and uploaded. Considerations are given for log buffer behavior, conditional logging across MTX boundaries, and attribute granularity.
The document discusses Nortel's Mobile Equipment Identifier (MEID) solution. Key points include:
- MEID replaces Electronic Serial Number to uniquely identify mobile devices as ESNs are exhausted.
- Nortel's solution supports MEID in their CDMA and EVDO networks through software upgrades and allows configuration of MEID querying and Public Long Code Mask assignment.
- Validation of MEIDs is added in MTX15 through provisioning in the HLR and MSC to check MEIDs against records during registration and calls.
The document discusses 1xRTT traffic management techniques in CDMA networks. It describes:
1) Using the Sync Channel Message during system acquisition to direct 2G and 3G mobiles to their respective carriers.
2) Using the Channel List Message and Extended Channel List Message in idle mode, in conjunction with a hashing function, to distribute mobiles across carriers.
3) Using the Global Services Redirection Message and Extended Global Services Redirection Message in idle mode to redirect mobiles between carriers for load balancing.
The document provides details on the hardware, software, and datafill requirements to implement each traffic management technique and how to verify their functionality.
This document provides guidance for optimizing a 1xEV-DO Release 3.0 network. It outlines objectives and procedures for pre-optimization, including RF parameter verification, system health checks, and TCP/IP configuration. Optimization events are described, such as shakedowns, stationary testing, and cluster drive testing. Tools for data collection, analysis, and troubleshooting are also configured. The document aims to improve coverage, capacity, and performance of the 1xEV-DO network through a series of tests and optimizations.
This document summarizes research on vertical handoff performance in wireless local area networks (WLANs). It examines the data traffic received by different access points as mobile stations move between them. Graphs show how throughput and delay are impacted during handoffs. It also evaluates the performance of file transfer between wireless clients and servers connected by a WLAN backbone network comprising two routers. The document analyzes the effects of station mobility on metrics like traffic, delay, and throughput. In conclusion, it demonstrates vertical handoff triggering between a WiMAX and WLAN network as mobile nodes roam between the base stations.
This presentation summarizes the Cisco Certified Network Associate (CCNA) certification and covers networking concepts relevant to the CCNA including networking devices, the OSI model, IP addressing, routing, access lists, network address translation, switches, virtual LANs, WAN connection types, wireless technology, and comparisons of 802.11 wireless standards.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
A WAN (Wide Area Network) is a network that covers a broad area (i.e., any telecommunications
network that links across metropolitan, regional, national or international boundaries) using leased
telecommunication lines. Business and government entities utilize WANs to relay data among
employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of
telecommunication allows a business to effectively carry out its daily function regardless of location. The
Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and
individuals for almost any purpose imaginable.
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
Today, Voice over Wireless Local Area Network (VOWLAN) is the most accepted Internet application.
There are a large number of literatures regarding the performance of various WLAN networks. Most of
them focus on simulations and modeling, but there are also some experiments with real networks. This
paper explains the comparison of performance of two different VOIP (Voice over Internet Protocol)
applications over the same IEEE 802.11a wireless network. Radio link standard 802.11a have maximum
transmission rate of 54Mbps. First protocol is session initiation protocol (SIP) and second is H.323
protocol. First one has an agent called SIP proxy. Second have a gateway reflects the characteristics of a
Switched Circuit Network (SCN). With this comparison we have required to obtain a better understanding
of wireless network suitability for voice communication in IP network.
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET Journal
This document compares the ATTEMPT and SIMPLE protocols for wireless body area networks (WBANs). ATTEMPT is an opportunistic protocol that relies on relay nodes when the sink node moves out of range, increasing power consumption and packet loss. SIMPLE aims to balance energy usage and improve throughput by selecting low-cost forwarder nodes to route data to the sink in a multi-hop fashion using TDMA scheduling. The document provides detailed descriptions of the initialization, routing, scheduling and data transmission phases of the ATTEMPT and SIMPLE protocols and discusses their advantages and disadvantages for energy efficiency in WBAN applications.
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETijsrd.com
MANETS are working in distributed environment and dynamically changing the network topology. MANET protocols can be table driven or on demand as per requirement. DSDV (Destination Sequenced Distance Vector) and OLSR (Optimized Link State Routing protocol) both are table driven (proactive) protocol. Performances of both proactive protocols are evaluated using NS-2 simulator under various metrics and no. of mobile nodes is 10 in the network.
The document discusses 5G radio access network (RAN) fundamentals and architectures. It describes how the RAN has evolved from previous generations with more distributed and virtualized architectures in 5G. Key aspects of 5G RAN covered include centralized/virtualized RAN, Open RAN specifications, functional splits, and new concepts like network slicing and multi-access edge computing. Example use cases are also mentioned.
The document describes a DVB-RCS satellite network for educational content delivery. It includes:
- A hub station that manages bandwidth allocation and network control for satellite interactive terminals (SITs).
- SITs that receive educational programs from a teaching end via satellite and allow two-way interaction through return links.
- A system using MF-TDMA to divide satellite bandwidth into time slots allocated to SITs to carry return traffic.
- Components of the SIT including the outdoor unit with antenna and indoor unit with an Ethernet interface.
The document is a technical report from the Center for Satellite and Hybrid Communication Networks (CSHCN) at the University of Maryland that proposes a new single channel TDMA-based broadcast scheduling protocol called the Five-Phase Reservation Protocol (FPRP) for mobile ad hoc networks. The FPRP allows nodes to efficiently make nearly conflict-free reservations for TDMA broadcast slots in a distributed manner without relying on centralized coordination or prior network information. It employs a five-phase contention process localized to each node's two-hop neighborhood to minimize collision probability during reservation.
The document provides an overview of local area networks (LANs), including common network topologies, components, and wireless LAN standards. It discusses LAN, WAN, CAN, and MAN network types and topologies like star, ring, and bus structures. Components like hubs, switches, routers, and access points are defined. Introduction to TCP/IP protocols includes definitions of IP and TCP. Finally, it covers IEEE 802.11 wireless LAN standards including 802.11, 802.11a, 802.11b, and 802.11g.
Radio resource management and mobiltiy mngmntabidsyed4u
Radio resource management deals with managing interference, resources, and transmission characteristics in wireless networks. It involves issues around multi-user and multi-cell capacity. Connectivity is provided through bearer services architecture. Static radio resource management involves fixed cell planning including frequency allocation, base station placement, and parameters. Dynamic RRM adapts to traffic load, user positions, mobility, and quality of service using techniques like power control, channel allocation, and handover criteria. Mobility management is handled by the mobility management entity which tracks user location as users move between tracking areas.
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...IJERA Editor
The Mobility in wireless cellular communication systems is its backbone so as to enhance the quality of service and maintain the continuous service. Handoff is an important task in maintaining the continuity of call in cellular systems and its failure can result in ongoing call termination. In cellular mobile networks, the coverage region is divided into smaller cells in order to achieve high system capacity. Each cell has a Base-Station (BS), which provides the service to the Mobile Terminals (MTs), i.e. users equipped with phones, within its region. Before a mobile user can communicate with other user(s) in the network, a group of the frequency bands or channels should usually be assigned. The MTs is free to move across cells. When the mobile user crossing a cell boundary or by deterioration in quality of the signal in the current channel, handoff process is initiated. The scope of this project is to design 802.11 handoff schemes to solve the handoff problems in closely-spaced WLANs.The major problem in multiple WLANs are so many users trying to use same access point(AP), and interferences from nearby WLAN. The better hand off scheme based on signal strength and velocity of the nodes is proposed. The simulation results show that the proposed handoff scheme significantly reduces packet losses compared with existing handoff schemes.
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...IJERA Editor
The Mobility in wireless cellular communication systems is its backbone so as to enhance the quality of service and maintain the continuous service. Handoff is an important task in maintaining the continuity of call in cellular systems and its failure can result in ongoing call termination. In cellular mobile networks, the coverage region is divided into smaller cells in order to achieve high system capacity. Each cell has a Base-Station (BS), which provides the service to the Mobile Terminals (MTs), i.e. users equipped with phones, within its region. Before a mobile user can communicate with other user(s) in the network, a group of the frequency bands or channels should usually be assigned. The MTs is free to move across cells. When the mobile user crossing a cell boundary or by deterioration in quality of the signal in the current channel, handoff process is initiated. The scope of this project is to design 802.11 handoff schemes to solve the handoff problems in closely-spaced WLANs.The major problem in multiple WLANs are so many users trying to use same access point(AP), and interferences from nearby WLAN. The better hand off scheme based on signal strength and velocity of the nodes is proposed. The simulation results show that the proposed handoff scheme significantly reduces packet losses compared with existing handoff schemes.
A Mobility Scheme For Personal And Terminal MobilityMonica Waters
This document proposes a mobility protocol called the Terminal Mobility Support Protocol (TMSP) that enables both personal and terminal mobility for IP-based applications. TMSP uses an IP-to-IP address mapping module at the network layer and a user agent to manage changes in a mobile node's IP address without requiring a permanent IP address, home server, or network support. The protocol was implemented on Linux and experimental results show it can support UDP and TCP connections for applications like VoIP and video conferencing as a mobile node roams across wireless networks without packet loss or affecting throughput.
Migrating from dynamic multipoint vpn phase 2 to phase 3vijayd2015
This document discusses migrating from Dynamic Multipoint VPN (DMVPN) Phase 2 to Phase 3. Phase 3 provides benefits like reduced latency during spoke-to-spoke tunnel setup, improved resilience to hub failures, and allows for hierarchical hub designs. It also provides more flexibility in network topology and routing protocols. The document recommends migrating Phase 2 networks to take advantage of these Phase 3 enhancements.
After installing the TEMS software and opening the data collection window, the document discusses setting up a workspace to save drive test windows and make future tests less tedious. It then covers opening various windows needed for a 3G drive test like the serving cell information, neighbors, radio parameters, layer 3 messages, and throughput charts. Key aspects of each window are defined, such as what the active set, cell ID, scrambling code, and other parameters represent. Finally, it briefly touches on hard and soft handovers between frequencies and nodes.
After installing the TEMS software and opening the data collection window, the document discusses setting up a workspace to save drive test windows and make future tests less tedious. It then covers opening various windows needed for a 3G drive test like the serving cell information, neighbors, radio parameters, layer 3 messages, and throughput charts. Key aspects of each window are defined, such as what the active set, cell ID, scrambling code, and other parameters represent. Finally, it briefly touches on hard and soft handovers between frequencies and nodes.
Mobile IP is a protocol that allows mobile devices to change location while maintaining the same IP address. It works by assigning mobile devices a permanent home address and registering a care-of address with their home agent when visiting foreign networks. The home agent intercepts packets destined for the mobile device's home address and tunnels them to its current care-of address. This allows the mobile device to stay connected to the internet as it moves between networks while keeping the same home address.
LTE network planning involves coverage and capacity planning. Key aspects of LTE network planning include link budget and capacity estimation. Radio network planning solutions help with interference avoidance, co-antenna analysis, and other performance enhancement features. LTE has a flat network architecture with OFDM technology and MIMO. Network elements include eNodeBs and elements in the EPC such as MME, S-GW, and P-GW.
1. 1xEV-DO Hard Handoff
Author Name Department Contact Information
Scott Tran Core RF Engineering (972) 684-2796
0. Introduction
The intent of this section is to provide an overview of 1xEV-DO Hard Handoff. In order
to absorb the flow of the 1xEV-DO Hard Handoff, the concept of 1xEV-DO Access
Networks interface, the 1xEV-DO Networks Architecture, and 1xEV-DO call flows
should be understood. Therefore this section is organized as follows.
• 1xEV-DO (High Rate Packet Data) IOS (Inter-Operability Specification) Access
Networks Interfaces
• Nortel 1xEV-DO Network Architecture
• 1xEV-DO Call Flow
• 1xEV-DO Hard Handoff
1. 1xEV-DO HRPD IOS Access Networks Interfaces Reference Model
The HRPD IOS messaging and call flows are based on the Architecture Reference Model
shown in Figure nn1 below as per A.S0007-0 version 2.0 (TIA-878).
Figure 1: HRPD IOS Phase 1 Architecture Reference Model
Table 1 below provides the references for the definitions of A8, A9, A10, A11, A12 and
A13. Table 2 provides the CDMA2000 terms that are equivalent to the terms that are
used on the HRPD IOS Phase 1 Architecture Reference model.
1
Source Access
Network (AN)
Target Access
Network (AN)
Access
Terminal (AT)
PCF PDSN
AN AAA
Air Interface
A13
A8
A9
A10
A11
A12
Access Network Authentication
Authorization and Accounting
Source Access
Network (AN)
Target Access
Network (AN)
Access
Terminal (AT)
Access
Terminal (AT)
PCFPCF PDSNPDSN
AN AAAAN AAA
Air Interface
A13
A8
A9
A10
A11
A12
Access Network Authentication
Authorization and Accounting
2. Table 1: Definitions for the HRPF IOS interface.
Interface Description
A8 – A9 (AN – PCF) Interface TIA/EIA-2001-A delta text (Annex B)
A10 – A11 (PCF – PDSN) Interface TIA/EIA-2001-A delta text (Annex C)
A12 (AN – AN AAA) Interface New HRDP IOS defined text (Section 2.3)
A13 (AN – AN) Interface New HRDP IOS defined text (Section 2.4)
Table 2: CDMA2000 Term equivalent to HRPD Term
CDMA2000 Term HRPD Term
BS AN
Base Station Access Network
BSC AN
Base Station Controller Access Network
MS Access Network
Mobile Station Access Network
2. Nortel 1xEV-DO Network Architecture
A 1xEV-DO carrier provides only data service. The network required for 1xE-DO
technology is an end-to-end IP data network. An access terminal talks to a basestation or
an access point (AP) over the air. The basestation is connected to a radio node controller
(RNC) or an access network controller (ANC). A RNC is responsible for radio resource
management as well as mobility management. A RNC/ANC in a 1xEV-DO network has
similar functionality as a basestation controller (BSC) in a 1xRTT network. However, a
RNC does not interact with a Mobile Switch Center (MSC) as a BSC does in a 1xRTT
network. A PDSN is a gateway to public data networks in a 1xEV-DO network. A
network reference diagram for 1xEV-DO network is shown in Figure 2
2
3. BSC
PDSN
MSC
PDN
PSTN
Carrier IP
Internet
1xRTT Backhaul
Metrocell BTS &
1xEV-DO AP
1xEV-DO
Module (DOM)
DO-EMSDO-RNC
AN-AAA
PDSN -
AAA
BSC
PDSN
MSC
PDNPDN
PSTNPSTN
Carrier IP
Internet
Carrier IP
Internet
1xRTT Backhaul
Metrocell BTS &
1xEV-DO AP
1xEV-DO
Module (DOM)
DO-EMSDO-RNC
AN-AAA
PDSN -
AAA
Figure 2: Nortel Network 1xEV-DO Network Architecture
3. 1xEV-DO Call Flow
When a 1xEV-DO access terminal is turned on for the first time, it requests a Unicast
Access Terminal Identifier (UATI) from the access network. A RNC assigns a unique
UATI to each mobile in its serving area. Every RNC/ANC assign it owns UATI to
mobiles in its serving.
After UATI assignment, a 1xEV-DO session is established between the mobile and the
RNC. The session parameters are negotiated during the session establishment process. If
A12 interface is deployed, the access terminal authentication is performed. A 1xEV-DO
session establishment between a mobile and a RNC/ANC is equivalent to a registration in
cellular networks.
The RNC/ANC sends a R-P session registration request to the PDSN for the mobile.
Once R-P session is established, the next step is a PPP session establishment between the
mobile and the PDSN. The mobile is authenticated at the PDSN, and is assigned an IP
address during this process. Once PPP session is established, the mobile is ready to
transmit and receive IP data packets. Figure 3 shows the message flow for 1xEV-DO
session establishment.
3
4. Figure 3: 1xEV-DO Call Flow
4. Handoffs in 1xEV-DO networks
There are three levels of hierarchic in a 1xEV-DO network for mobility management.
The first level of mobility is between basestations of same RNCs/ANCs. The second
level of mobility is across the boundary of RNCs/ANCs served by the same PDSN. The
third level of mobility is across PDSNs as shown in Figure 4.
BTS BTS BTS BTS BTS BTS
RNC RNCRNC
PDSN PDSN
Home Agent
Mobility between
PDSNs (Mobile IP)
Mobility between RNCs
(R-P Session Handoff)
Mobility between
BTS’
BTS BTS BTS BTS BTS BTSBTS BTS BTS BTS BTS BTS
RNC RNCRNCRNC RNCRNC
PDSN PDSNPDSN PDSN
Home Agent
Mobility between
PDSNs (Mobile IP)
Mobility between RNCs
(R-P Session Handoff)
Mobility between
BTS’
Figure 4 Reference Mobility Model
4
PDSNAT AN ANAAA
UATI-Request
UATI- Assignment
UATI-Complete
Session Establishment
PPP&LCPNegotiation
CHAPChallenge- Response
A12Access - Request
A12Access- Accept
CHAP–
AuthenticationSuccess
A11– RegistrationRequest
A11- Registration Reply
Establish PPPconnection
TransmittingPacket Data
PDSNAT AN ANAAA
UATI-Request
UATI- Assignment
UATI-Complete
Session Establishment
PPP&LCPNegotiation
CHAPChallenge- Response
A12Access - Request
A12Access- Accept
CHAP–
AuthenticationSuccess
A11– RegistrationRequest
A11- Registration Reply
Establish PPPconnection
TransmittingPacket Data
5. There are following different types of handoff in a 1xEV-DO network and a 1xEV-DO –
1xRTT hybrid network.
• Intra RNC/ANC Inter AN/AP Handoff (this type of handoff is already explained
in the above section)
• Inter RNC/ANC and Intra PDSN Handoff
• Inter RNC/ANC and Inter PDSN Handoff
• 1xEV-DO to 1xRTT Handoff
• 1xRTT to 1xEV-DO Handoff
5. Inter RNC/ANC and Intra PDSN Handoff
As the signal strength of a target cell exceeds a handoff trigger threshold, an active
mobile may request a handoff. If the target cell is not in the area of the serving RNC, the
request is ignored. There is no inter RNC soft handoff in a 1xEV-DO network. As the
mobile continues to move towards the target cell, the RF connection may be dropped.
The mobile camps on the target cell, and it starts a new 1xEV-DO session on the target
RNC. The target RNC can request the session information from the source RNC if A13
interface is deployed between the source and the target RNCs. If A13 is not deployed, the
target RNC goes through 1xEV-DO session establishment process with the access
terminal.
The target RNC requests a new R-P session for the mobile from the PDSN. The R-P
sessions are anchored on IMSI. When the PDSN receives the request for a new R-P
session, it realizes that a R-P session exists for the mobile. It clears the old R-P session,
and establishes a new R-P session.
The PPP session between the PDSN and the mobile is not changed during this R-P
session handoff. The mobile continues to use the same IP address.
6. Inter RNC and Inter PDSN handoff
If the target RNC is not hosted by the source PDSN, a new PPP session has to be
established between the mobile and the new PDSN. If mobile IP is deployed and the
PDSN acts a foreign agent, the mobile will get register a new care-of-address of its new
foreign agent/PDSN. With mobile IP, the mobile can continue to use the same IP address
as it moves across the PDSNs. The change in PDSNs is transparent to the end
application. However, the process of mobile IP handoff is much longer than the process
of R-P session handoff in an intra PDSN handoff. If mobile IP is not deployed, the
mobile will get a new IP address during inter PDSN handoffs. The mobile will have to
restart it active IP applications.
7. 1xEV-DO to 1xRTT Handoff
As long as a 1xEV-DO carrier is available, a hybrid terminal will continue to camp on the
1xEV-DO carrier for the data service. 1xEV-DO to 1xRTT handoff takes place when a
mobile moves out of 1xEV-DO coverage. This handoff takes placed in only dormant
mode. There is no active or soft handoff between 1xEV-DO and 1xRTT carriers.
5
6. When a hybrid terminal moves out of 1xEV-DO coverage area and 1xRTT is available, it
registers with the 1xRTT network for data service. The BSC sends a request to a PDSN
to establish a new R-P session for the mobile.
If the R-P session request is sent to the same PDSN where the mobile had its PPP session
for 1xEV-DO, and its IMSI is the same as its IMSI in 1xEV-DO network, the PDSN will
continue to use the same PPP session with the hybrid terminal. Otherwise, a new PPP
session is established between the PDSN and the mobile. The mobile will get a new IP
address if mobile IP is not deployed. If mobile IP is deployed, it will perform mobile IP
registration and continue to use the same IP address.
Hybrid terminal monitor 1xRTT forward link paging/control channel for voice pages
both in dormant and active states. They are able to monitor two control channels in the
dormant mode because the control channels are in slotted mode operation for both 1xEV-
DO and 1xRTT networks. In 1xEV-DO active state hybrid terminal can monitor 1xRTT
paging channel because the forward link in the active mode is time division multiplexed.
If there is a page for voice call on 1xRTT paging channel for a hybrid terminal, the
hybrid terminal will clear 1xEV-DO connection and establish a voice call connection on
1xRTT. A hybrid terminal can not monitor 1xEV-DO control channel during a 1xRTT
call. It searches for 1xEV-DO control channel after it terminates 1xRTT call.
8. 1xRTT to 1xEV-DO Handoff
A hybrid terminal can monitor 1xEV-DO control channel while it is not in 1xRTT active
call. A hybrid terminal searches for the 1xEV-DO carrier every 3 minutes in a deep sleep
mode. If the access terminal finds a 1xEV-DO carrier, it will camp on 1xEV-DO carrier
for data services. The access terminal will establish a new 1xEV-DO session with 1xEV-
DO network. If the access terminal already has a 1xEV-DO session, it will send an
unsolicited location update notification to 1xEV-DO network. This notification has a
message tells 1xEV-DO network that the access terminal has moved into its coverage
area. If the source BSC and the target RNC are served by the same PDSN, there can be a
R-P session handoff and the mobile can continue to use the same PPP session. Otherwise,
the access terminal either will have to rely on mobile IP to continue to use the same IP
address or establish a new PPP session with the target PDSN.
9. HHO Trigger Method
For the phase I commercial 1xEV-DO, all the hard handoff scenarios mentioned above is
performed by dormant trigger method with “Packet Zone ID” changed. Therefore there is
a case that if the AT is moving from source cell to target cell and the data transferring
still active, then the RF connection is dropped due to “out of coverage” from source. The
data transferring session is delay for duration until the AT detects the target cell signal.
Then the AT will be on traffic channel and the data transferring session will continue.
For the connection drop case, the end user may experience some delay at application
level just like in the case of network congestion. Therefore, the end user does not notice
RF connection drops directly.
6
7. When a hybrid terminal moves out of 1xEV-DO coverage area and 1xRTT is available, it
registers with the 1xRTT network for data service. The BSC sends a request to a PDSN
to establish a new R-P session for the mobile.
If the R-P session request is sent to the same PDSN where the mobile had its PPP session
for 1xEV-DO, and its IMSI is the same as its IMSI in 1xEV-DO network, the PDSN will
continue to use the same PPP session with the hybrid terminal. Otherwise, a new PPP
session is established between the PDSN and the mobile. The mobile will get a new IP
address if mobile IP is not deployed. If mobile IP is deployed, it will perform mobile IP
registration and continue to use the same IP address.
Hybrid terminal monitor 1xRTT forward link paging/control channel for voice pages
both in dormant and active states. They are able to monitor two control channels in the
dormant mode because the control channels are in slotted mode operation for both 1xEV-
DO and 1xRTT networks. In 1xEV-DO active state hybrid terminal can monitor 1xRTT
paging channel because the forward link in the active mode is time division multiplexed.
If there is a page for voice call on 1xRTT paging channel for a hybrid terminal, the
hybrid terminal will clear 1xEV-DO connection and establish a voice call connection on
1xRTT. A hybrid terminal can not monitor 1xEV-DO control channel during a 1xRTT
call. It searches for 1xEV-DO control channel after it terminates 1xRTT call.
8. 1xRTT to 1xEV-DO Handoff
A hybrid terminal can monitor 1xEV-DO control channel while it is not in 1xRTT active
call. A hybrid terminal searches for the 1xEV-DO carrier every 3 minutes in a deep sleep
mode. If the access terminal finds a 1xEV-DO carrier, it will camp on 1xEV-DO carrier
for data services. The access terminal will establish a new 1xEV-DO session with 1xEV-
DO network. If the access terminal already has a 1xEV-DO session, it will send an
unsolicited location update notification to 1xEV-DO network. This notification has a
message tells 1xEV-DO network that the access terminal has moved into its coverage
area. If the source BSC and the target RNC are served by the same PDSN, there can be a
R-P session handoff and the mobile can continue to use the same PPP session. Otherwise,
the access terminal either will have to rely on mobile IP to continue to use the same IP
address or establish a new PPP session with the target PDSN.
9. HHO Trigger Method
For the phase I commercial 1xEV-DO, all the hard handoff scenarios mentioned above is
performed by dormant trigger method with “Packet Zone ID” changed. Therefore there is
a case that if the AT is moving from source cell to target cell and the data transferring
still active, then the RF connection is dropped due to “out of coverage” from source. The
data transferring session is delay for duration until the AT detects the target cell signal.
Then the AT will be on traffic channel and the data transferring session will continue.
For the connection drop case, the end user may experience some delay at application
level just like in the case of network congestion. Therefore, the end user does not notice
RF connection drops directly.
6