SlideShare a Scribd company logo
   Whole service area is divided into several coverage areas known as a “cell”. Each
    area has a separate base station(BS).
   Every BS is provided with a frequency of range 450 to 900 MHz.
   The MTSO controls the BSs so that the subscriber can continue his call without
    interruption.
   Tracking the location within the boundary of a cell in a telecommunication network is
    known as “location based services”.
   Mobile Technology includes mainly two functions namely call fixing and hands off
    process.
   Call fixing is process of connecting a call.
   Hands off is changing the BS frequency of the user.
Emergency     service for subscriber safety.  
Location sensitive billing.

Cellular Fraud detection.

Intelligent transport system services.

Efficient and effective network performance

and management.
1. GLOBAL POSITIONING SYSTEM (GPS)


2. DIRECTION BASED GEOLOCATION
2.1 ANGLE OF ARRIVAL METHOD


3. DISTANCE BASED POSITIONING
3.1 TIME OF ARRIVAL(TOA)
3.2 TIME DIFFERENCE OF ARRIVAL(TDOA)


4. LOCATION TRACKING CURVE METHOD
   To locate the mobile telephone by
    itself, the mobile telephone is provided
    with a GPS receiver to calculate its
    location.
   There should be an unobstructed line
    of sight to four or more GPS satellites.
   GPS satellites broadcast signals from
    space, which each GPS receiver uses
    to calculate its three-dimensional
    location (latitude, longitude, and
    altitude) plus the current time
   GPS receivers are used in mobile
    phones, vehicles, marine navigation
    devices and military applications.
   This method calculates the angle of
    arrival of signal receiving at the BS.
   When a mobile user switches the system
    ON it receives the signal from different
    base stations, may be 3 or 4 or more.
    The angle of arrival method requires two
    or more base station for the
    determination.
    It measures the direction of signal falling
    on the base station and measures the
    angle of incidence with respect to a
    normal and determines the position of
    the system.
   Angle of arrival method is not an
    accurate method used for the mobile
    positioning because of its some
    disadvantages such as atmospheric
    particles, scattering etc.
    The TOA method calculates the distance
     of a mobile telephone and a BS based
     on the TOA of a signal transmitted from
     the mobile telephone at the BS.
     It is assumed that the mobile telephone
     is located at the intersection point of
     three circles having the radius of the
     distances between the BSs and the
     mobile telephone.
 The          distance is calculated by the
     following equation,
Ri = C τi = sqrt ( (xi – X ) 2 + (yi – Y) 2 ) where,
C – Propagation speed of electromagnetic
     wave,
τi – propagation of time from the mobile
     telephone to ith base station,
Xi, yi -- location of ith base station,
X, Y – mobile position
    The time-difference-of-arrival (TDOA)
    assumes that the TDOAs of a signal
    transmitted from the mobile telephone
    at the three BSs define a set of points
    on a hyperbola.
   The mobile telephone is located at the
    intersection point of at least three
    hyperbolas.
   Three hyperbolas do not meet at one
    point but overlap each other over an
    area.
   The location data processor draws two circles C1 and C2 with their
    respective centers set at BSs T1 and T2 based on the TOAs of a signal
    transmitted from the corresponding mobile telephone M1 or M2 to the two
    BSs T1 and T2 located near the mobile telephone M1 or M2. The two circles
    C1 and C2 define a common chord L1.
   Therefore, we use location tracking curves TR1 and TR2 connecting the
    same two intersection points P1 and P2 of the two circles C1 and C2, instead
    of the common chord L1.
   The two curves TR1 and TR2 have their middle points intersecting the line
    ST, which connects the positions of the two BSs T1 and T2 and the parts of
    two circles C1 and C2 drawn to connect the two intersection points P1 and
    P2.
   This method prevents the location error caused by the multi-path fading or
    the NLOS path characteristics.
   Assuming that the first and the second BSs
    T1 and T2 selected for use in the location
    tracking are present at positions (x1, y1)
    and (x2, y2), respectively, the location data
    processor draws the two circles C1 and C2
    with the coordinates (x1, y1) and (x2, y2) of
    the two BSs T1 and T2 at their centers
   The curve connects the two points P1 and
    P2 at which the two circles C1 and C2
    intersect each other. The coordinates of the
    intersection points P1 and P2 are (xA, yA)
    and (xB, yB), respectively.
   Reference circles TR1 to TR4 are drawn
    with respect to the second BS T2 with
    smaller variances
   The variances of the TOAs of a signal which arrives at the two BSs T1 and T2 from
    different paths are used to find the curve on which the actual location of the mobile
    telephone is determined.
   The location data processor compares the variances calculated by the first BS T1 with
    the variances calculated by the second BS T2 and considers that the mobile telephone
    is near to that BS with the larger variances and selects the BS with smaller variances as
    a reference point to draw the reference circle.
    The location data processor compares the variances calculated by the two BSs T1 and
    T2 and selects the base station with smaller variances as a reference point to draw the
    refer
   If the selected variances (those of the second BS T2) are σ, the location data processor
    compares the selected variances σ, with the preset reference variances σ 1, σ 2, and σ
    3.
   The location data processor selects the optimal curve (reference circle) for the two BSs
    among the several BSs, and selects another optimal circle for another BS pair, and so
    on.
   When curves are selected for all selected
    BS pairs, the location data processor
    obtains the intersection points among the
    selected curves.
   As the selected curves do not intersect at
    one point due to the multi-path fading or the
    NLOS effects, the midpoint of these
    intersection points is determined as the
    location of the mobile telephone.
   The location data processor represents    the
    intersection points in the latitude and   the
    longitude coordinates and transmits       the
    position coordinates to the network and   the
    mobile telephone.
   Our proposal is advantageous in that the location of a mobile telephone can be
    accurately tracked even in the multi-path fading and the NLOS environment, by
    using more accurate tracking curves connecting the intersection points among
    circles.
   We have described about accurate positioning of mobile telephones, which can
    be used for several applications.
    The important considerations to be undertaken while selecting a location based
    technology are location accuracy, implementation cost, reliability, increasing
    functionality.
1.http://www.seminarprojects.net/t-trackin...tion--5263
2.http://www.seminarprojects.net/t-mobile-...ositioning
3.http://www.seminarprojects.net/t-trackin...n-networks
4.http://www.seminarprojects.net/t-trackin...tion--1863

More Related Content

What's hot

Circuit switched fallback
Circuit switched fallbackCircuit switched fallback
Circuit switched fallback
Subhash Kumar
 
Gsm channels concept
Gsm channels conceptGsm channels concept
Gsm channels concept
Telebeansolutions
 
Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces Telebeans
Telebeansolutions
 
Mobile satellite communication
Mobile satellite communicationMobile satellite communication
Mobile satellite communication
Himanshu Singh
 
HANDOFF
HANDOFFHANDOFF
HANDOFF
AJAL A J
 
Mobile Satellite Communication
Mobile Satellite CommunicationMobile Satellite Communication
Mobile Satellite Communication
Taslima Yasmin Tarin
 
Wireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu GebeyeawWireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu Gebeyeaw
Mulatu Gebeyaw
 
Call flow in gsm
Call flow in gsmCall flow in gsm
Call flow in gsm
vish0110
 
Mobile ip presentation
Mobile ip presentationMobile ip presentation
Mobile ip presentation
Sifat Hossain
 
GSM Traffic Cases
GSM Traffic CasesGSM Traffic Cases
GSM Traffic Cases
Er. Ashish Pandey
 
GSM Air Interface
GSM Air Interface GSM Air Interface
GSM Air Interface
Naveen Jakhar, I.T.S
 
2 g training optimization
2 g training optimization2 g training optimization
2 g training optimization
Ahmed Gad
 
Call flow comparison gsm umts
Call flow comparison gsm umtsCall flow comparison gsm umts
Call flow comparison gsm umts
sivakumar D
 
Ch6
Ch6Ch6
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Zorays Solar Pakistan
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowEricsson Saudi
 
Gsm rf interview questions
Gsm rf interview questionsGsm rf interview questions
Gsm rf interview questionsradira03
 

What's hot (20)

Handover
HandoverHandover
Handover
 
3 g call flow
3 g call flow3 g call flow
3 g call flow
 
Circuit switched fallback
Circuit switched fallbackCircuit switched fallback
Circuit switched fallback
 
Gsm channels concept
Gsm channels conceptGsm channels concept
Gsm channels concept
 
Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces Telebeans
 
Mobile satellite communication
Mobile satellite communicationMobile satellite communication
Mobile satellite communication
 
HANDOFF
HANDOFFHANDOFF
HANDOFF
 
Mobile Satellite Communication
Mobile Satellite CommunicationMobile Satellite Communication
Mobile Satellite Communication
 
Wireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu GebeyeawWireless communication , by Mulatu Gebeyeaw
Wireless communication , by Mulatu Gebeyeaw
 
Call flow in gsm
Call flow in gsmCall flow in gsm
Call flow in gsm
 
Mobile ip presentation
Mobile ip presentationMobile ip presentation
Mobile ip presentation
 
GSM Traffic Cases
GSM Traffic CasesGSM Traffic Cases
GSM Traffic Cases
 
Gsm architecture
Gsm architecture Gsm architecture
Gsm architecture
 
GSM Air Interface
GSM Air Interface GSM Air Interface
GSM Air Interface
 
2 g training optimization
2 g training optimization2 g training optimization
2 g training optimization
 
Call flow comparison gsm umts
Call flow comparison gsm umtsCall flow comparison gsm umts
Call flow comparison gsm umts
 
Ch6
Ch6Ch6
Ch6
 
Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...Gsm architecture, gsm network identities, network cases, cell planning, and c...
Gsm architecture, gsm network identities, network cases, cell planning, and c...
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flow
 
Gsm rf interview questions
Gsm rf interview questionsGsm rf interview questions
Gsm rf interview questions
 

Viewers also liked

Tracking and-positioning-of-mobile-systems-in-telecommunication-networks
Tracking and-positioning-of-mobile-systems-in-telecommunication-networksTracking and-positioning-of-mobile-systems-in-telecommunication-networks
Tracking and-positioning-of-mobile-systems-in-telecommunication-networks
Amal Mohan
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksrahul_2013
 
Mobiilne positsioneerimine (Mobile Positioning)
Mobiilne positsioneerimine (Mobile Positioning)Mobiilne positsioneerimine (Mobile Positioning)
Mobiilne positsioneerimine (Mobile Positioning)
Aare Puussaar
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksgo2project
 
Presentation1
Presentation1Presentation1
Presentation1yopirates
 
Ppt local tracking and gps
Ppt local tracking and gpsPpt local tracking and gps
Ppt local tracking and gps
massab
 
Gps tracking system
Gps tracking system Gps tracking system
Gps tracking system Sumit Kumar
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
Shubhrat Mishra
 
Retail Voice Portal
Retail Voice PortalRetail Voice Portal
Retail Voice PortalSeanHart1766
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
Alexandru Dorobantu
 
Tracking positioning-of-mobiles
Tracking positioning-of-mobilesTracking positioning-of-mobiles
Tracking positioning-of-mobiles
Ankur Kumar
 
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
ijsrd.com
 
Cell Phone Operated Land Rover
Cell Phone Operated Land RoverCell Phone Operated Land Rover
Cell Phone Operated Land RoverSayanton Vhaduri
 
INTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSOR
INTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSORINTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSOR
INTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSOR
Nikhil Musham
 
Voice Browser
Voice BrowserVoice Browser
Voice Browser
Saila Sri
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
Ritik Nagar
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Jashir Chakkayil
 
Vehicle Theft control system
Vehicle Theft control systemVehicle Theft control system
Vehicle Theft control systemAnkush Jamthikar
 
Cell phone operated robot
Cell phone operated robotCell phone operated robot
Cell phone operated robot
Abhishek Rawat
 

Viewers also liked (20)

Tracking and-positioning-of-mobile-systems-in-telecommunication-networks
Tracking and-positioning-of-mobile-systems-in-telecommunication-networksTracking and-positioning-of-mobile-systems-in-telecommunication-networks
Tracking and-positioning-of-mobile-systems-in-telecommunication-networks
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networks
 
Mobiilne positsioneerimine (Mobile Positioning)
Mobiilne positsioneerimine (Mobile Positioning)Mobiilne positsioneerimine (Mobile Positioning)
Mobiilne positsioneerimine (Mobile Positioning)
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networks
 
Presentation1
Presentation1Presentation1
Presentation1
 
Ppt local tracking and gps
Ppt local tracking and gpsPpt local tracking and gps
Ppt local tracking and gps
 
Gps tracking system
Gps tracking system Gps tracking system
Gps tracking system
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Retail Voice Portal
Retail Voice PortalRetail Voice Portal
Retail Voice Portal
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Tracking positioning-of-mobiles
Tracking positioning-of-mobilesTracking positioning-of-mobiles
Tracking positioning-of-mobiles
 
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
 
Cell Phone Operated Land Rover
Cell Phone Operated Land RoverCell Phone Operated Land Rover
Cell Phone Operated Land Rover
 
INTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSOR
INTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSORINTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSOR
INTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSOR
 
Voice Browser
Voice BrowserVoice Browser
Voice Browser
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Vehicle Theft control system
Vehicle Theft control systemVehicle Theft control system
Vehicle Theft control system
 
Cell phone operated robot
Cell phone operated robotCell phone operated robot
Cell phone operated robot
 

Similar to Tracking and positioning of mobile systems in telecommunication networks

Tracking and positioning_of_mobile_systems_in_telecom_network
Tracking and positioning_of_mobile_systems_in_telecom_networkTracking and positioning_of_mobile_systems_in_telecom_network
Tracking and positioning_of_mobile_systems_in_telecom_network
Ankur Kumar
 
Tracking and positioning_of_mobile_systems_in_telecom_network_2
Tracking and positioning_of_mobile_systems_in_telecom_network_2Tracking and positioning_of_mobile_systems_in_telecom_network_2
Tracking and positioning_of_mobile_systems_in_telecom_network_2HITESH Kumawat
 
Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01
Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01
Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01prasanna naik
 
Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...
Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...
Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...prasanna naik
 
Coordinate Location Fingerprint Based On WiFi Service
Coordinate Location Fingerprint Based On  WiFi ServiceCoordinate Location Fingerprint Based On  WiFi Service
Coordinate Location Fingerprint Based On WiFi Service
Universitas Pembangunan Panca Budi
 
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMSHYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
ijasuc
 
Mobile positioning for location dependent services in GSM networks
Mobile positioning for location dependent services in GSM networks Mobile positioning for location dependent services in GSM networks
Mobile positioning for location dependent services in GSM networks
marwaeng
 
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMSHYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
ijasuc
 
Indoor geolocation
Indoor geolocationIndoor geolocation
Indoor geolocationharisri269
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2
gamalsallam1989
 
Hybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_ServicesHybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_ServicesNavid Solhjoo
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...
Dr. Amarjeet Singh
 
5G positioning technology
5G positioning technology5G positioning technology
5G positioning technology
Antenna Manufacturer Coco
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health
Vakhtang Mosidze
 
[IJET-V1I3P14] Authors :Kruthika R.
[IJET-V1I3P14] Authors :Kruthika R.[IJET-V1I3P14] Authors :Kruthika R.
IRJET- Positioning of Underwater Vehicle using Acoustic Signal
IRJET- Positioning of Underwater Vehicle using Acoustic SignalIRJET- Positioning of Underwater Vehicle using Acoustic Signal
IRJET- Positioning of Underwater Vehicle using Acoustic Signal
IRJET Journal
 
Lps
LpsLps
Bistatic radar equation
Bistatic radar equationBistatic radar equation
Bistatic radar equation
Rima Assaf
 
Tracking and positioning of mobile in telecommunications.
Tracking and positioning of mobile in telecommunications.Tracking and positioning of mobile in telecommunications.
Tracking and positioning of mobile in telecommunications.
Sanket Pawar
 
Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...
slinpublishers
 

Similar to Tracking and positioning of mobile systems in telecommunication networks (20)

Tracking and positioning_of_mobile_systems_in_telecom_network
Tracking and positioning_of_mobile_systems_in_telecom_networkTracking and positioning_of_mobile_systems_in_telecom_network
Tracking and positioning_of_mobile_systems_in_telecom_network
 
Tracking and positioning_of_mobile_systems_in_telecom_network_2
Tracking and positioning_of_mobile_systems_in_telecom_network_2Tracking and positioning_of_mobile_systems_in_telecom_network_2
Tracking and positioning_of_mobile_systems_in_telecom_network_2
 
Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01
Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01
Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01
 
Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...
Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...
Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...
 
Coordinate Location Fingerprint Based On WiFi Service
Coordinate Location Fingerprint Based On  WiFi ServiceCoordinate Location Fingerprint Based On  WiFi Service
Coordinate Location Fingerprint Based On WiFi Service
 
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMSHYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
 
Mobile positioning for location dependent services in GSM networks
Mobile positioning for location dependent services in GSM networks Mobile positioning for location dependent services in GSM networks
Mobile positioning for location dependent services in GSM networks
 
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMSHYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
 
Indoor geolocation
Indoor geolocationIndoor geolocation
Indoor geolocation
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2
 
Hybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_ServicesHybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_Services
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...
 
5G positioning technology
5G positioning technology5G positioning technology
5G positioning technology
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health
 
[IJET-V1I3P14] Authors :Kruthika R.
[IJET-V1I3P14] Authors :Kruthika R.[IJET-V1I3P14] Authors :Kruthika R.
[IJET-V1I3P14] Authors :Kruthika R.
 
IRJET- Positioning of Underwater Vehicle using Acoustic Signal
IRJET- Positioning of Underwater Vehicle using Acoustic SignalIRJET- Positioning of Underwater Vehicle using Acoustic Signal
IRJET- Positioning of Underwater Vehicle using Acoustic Signal
 
Lps
LpsLps
Lps
 
Bistatic radar equation
Bistatic radar equationBistatic radar equation
Bistatic radar equation
 
Tracking and positioning of mobile in telecommunications.
Tracking and positioning of mobile in telecommunications.Tracking and positioning of mobile in telecommunications.
Tracking and positioning of mobile in telecommunications.
 
Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...
 

More from PRADEEP Cheekatla

Sachin...sachin
Sachin...sachinSachin...sachin
Sachin...sachin
PRADEEP Cheekatla
 
Rf controlled fire fighting robot
Rf controlled fire fighting robotRf controlled fire fighting robot
Rf controlled fire fighting robotPRADEEP Cheekatla
 
Remote accident report system for highways using rf
Remote accident report system for highways using rfRemote accident report system for highways using rf
Remote accident report system for highways using rfPRADEEP Cheekatla
 
Image compression using singular value decomposition
Image compression using singular value decompositionImage compression using singular value decomposition
Image compression using singular value decompositionPRADEEP Cheekatla
 

More from PRADEEP Cheekatla (20)

Sachin...sachin
Sachin...sachinSachin...sachin
Sachin...sachin
 
White led
White ledWhite led
White led
 
The bio chips
The bio chipsThe bio chips
The bio chips
 
Tablet pc
Tablet pcTablet pc
Tablet pc
 
Super speed usb3.0
Super speed usb3.0Super speed usb3.0
Super speed usb3.0
 
Spect technology
Spect technologySpect technology
Spect technology
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Skinput
SkinputSkinput
Skinput
 
Rf controlled fire fighting robot
Rf controlled fire fighting robotRf controlled fire fighting robot
Rf controlled fire fighting robot
 
Remote accident report system for highways using rf
Remote accident report system for highways using rfRemote accident report system for highways using rf
Remote accident report system for highways using rf
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Night vision technology
Night vision technologyNight vision technology
Night vision technology
 
Magnetic levitation trai ns
Magnetic  levitation  trai nsMagnetic  levitation  trai ns
Magnetic levitation trai ns
 
Image compression using singular value decomposition
Image compression using singular value decompositionImage compression using singular value decomposition
Image compression using singular value decomposition
 
Haptics touch the virtual
Haptics touch the virtualHaptics touch the virtual
Haptics touch the virtual
 
Crusoe processor
Crusoe    processorCrusoe    processor
Crusoe processor
 
Audio spotlighting
Audio spotlightingAudio spotlighting
Audio spotlighting
 
3 d integrated circuits
3 d integrated circuits3 d integrated circuits
3 d integrated circuits
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
E newspaper
E newspaperE newspaper
E newspaper
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Tracking and positioning of mobile systems in telecommunication networks

  • 1.
  • 2. Whole service area is divided into several coverage areas known as a “cell”. Each area has a separate base station(BS).  Every BS is provided with a frequency of range 450 to 900 MHz.  The MTSO controls the BSs so that the subscriber can continue his call without interruption.  Tracking the location within the boundary of a cell in a telecommunication network is known as “location based services”.  Mobile Technology includes mainly two functions namely call fixing and hands off process.  Call fixing is process of connecting a call.  Hands off is changing the BS frequency of the user.
  • 3. Emergency service for subscriber safety.   Location sensitive billing. Cellular Fraud detection. Intelligent transport system services. Efficient and effective network performance and management.
  • 4. 1. GLOBAL POSITIONING SYSTEM (GPS) 2. DIRECTION BASED GEOLOCATION 2.1 ANGLE OF ARRIVAL METHOD 3. DISTANCE BASED POSITIONING 3.1 TIME OF ARRIVAL(TOA) 3.2 TIME DIFFERENCE OF ARRIVAL(TDOA) 4. LOCATION TRACKING CURVE METHOD
  • 5. To locate the mobile telephone by itself, the mobile telephone is provided with a GPS receiver to calculate its location.  There should be an unobstructed line of sight to four or more GPS satellites.  GPS satellites broadcast signals from space, which each GPS receiver uses to calculate its three-dimensional location (latitude, longitude, and altitude) plus the current time  GPS receivers are used in mobile phones, vehicles, marine navigation devices and military applications.
  • 6.
  • 7. This method calculates the angle of arrival of signal receiving at the BS.  When a mobile user switches the system ON it receives the signal from different base stations, may be 3 or 4 or more. The angle of arrival method requires two or more base station for the determination.  It measures the direction of signal falling on the base station and measures the angle of incidence with respect to a normal and determines the position of the system.  Angle of arrival method is not an accurate method used for the mobile positioning because of its some disadvantages such as atmospheric particles, scattering etc.
  • 8. The TOA method calculates the distance of a mobile telephone and a BS based on the TOA of a signal transmitted from the mobile telephone at the BS.  It is assumed that the mobile telephone is located at the intersection point of three circles having the radius of the distances between the BSs and the mobile telephone.  The distance is calculated by the following equation, Ri = C τi = sqrt ( (xi – X ) 2 + (yi – Y) 2 ) where, C – Propagation speed of electromagnetic wave, τi – propagation of time from the mobile telephone to ith base station, Xi, yi -- location of ith base station, X, Y – mobile position
  • 9. The time-difference-of-arrival (TDOA) assumes that the TDOAs of a signal transmitted from the mobile telephone at the three BSs define a set of points on a hyperbola.  The mobile telephone is located at the intersection point of at least three hyperbolas.  Three hyperbolas do not meet at one point but overlap each other over an area.
  • 10.
  • 11. The location data processor draws two circles C1 and C2 with their respective centers set at BSs T1 and T2 based on the TOAs of a signal transmitted from the corresponding mobile telephone M1 or M2 to the two BSs T1 and T2 located near the mobile telephone M1 or M2. The two circles C1 and C2 define a common chord L1.  Therefore, we use location tracking curves TR1 and TR2 connecting the same two intersection points P1 and P2 of the two circles C1 and C2, instead of the common chord L1.  The two curves TR1 and TR2 have their middle points intersecting the line ST, which connects the positions of the two BSs T1 and T2 and the parts of two circles C1 and C2 drawn to connect the two intersection points P1 and P2.  This method prevents the location error caused by the multi-path fading or the NLOS path characteristics.
  • 12. Assuming that the first and the second BSs T1 and T2 selected for use in the location tracking are present at positions (x1, y1) and (x2, y2), respectively, the location data processor draws the two circles C1 and C2 with the coordinates (x1, y1) and (x2, y2) of the two BSs T1 and T2 at their centers  The curve connects the two points P1 and P2 at which the two circles C1 and C2 intersect each other. The coordinates of the intersection points P1 and P2 are (xA, yA) and (xB, yB), respectively.  Reference circles TR1 to TR4 are drawn with respect to the second BS T2 with smaller variances
  • 13. The variances of the TOAs of a signal which arrives at the two BSs T1 and T2 from different paths are used to find the curve on which the actual location of the mobile telephone is determined.  The location data processor compares the variances calculated by the first BS T1 with the variances calculated by the second BS T2 and considers that the mobile telephone is near to that BS with the larger variances and selects the BS with smaller variances as a reference point to draw the reference circle.  The location data processor compares the variances calculated by the two BSs T1 and T2 and selects the base station with smaller variances as a reference point to draw the refer  If the selected variances (those of the second BS T2) are σ, the location data processor compares the selected variances σ, with the preset reference variances σ 1, σ 2, and σ 3.  The location data processor selects the optimal curve (reference circle) for the two BSs among the several BSs, and selects another optimal circle for another BS pair, and so on.
  • 14. When curves are selected for all selected BS pairs, the location data processor obtains the intersection points among the selected curves.  As the selected curves do not intersect at one point due to the multi-path fading or the NLOS effects, the midpoint of these intersection points is determined as the location of the mobile telephone.  The location data processor represents the intersection points in the latitude and the longitude coordinates and transmits the position coordinates to the network and the mobile telephone.
  • 15. Our proposal is advantageous in that the location of a mobile telephone can be accurately tracked even in the multi-path fading and the NLOS environment, by using more accurate tracking curves connecting the intersection points among circles.  We have described about accurate positioning of mobile telephones, which can be used for several applications.  The important considerations to be undertaken while selecting a location based technology are location accuracy, implementation cost, reliability, increasing functionality.
  • 16.
  • 17.