Location Management. The trends in telecom are proceeding with a strong tendency towards increasing need of mobility in access links within the network.

Slides:



Advertisements
Similar presentations
GSM infrastructure MSC, BSC, BTS, VLR, HLR, GSGN, GSSN
Advertisements

Mobile Cellular Networks Evolution –1st generation, 1980s analogue voice –2nd generation 1990s digital Voice, fax data 95% coverage of UK by 1991 –3rd.
1/10/20151 Mobile Computing COE 446 Network Operation Tarek Sheltami KFUPM CCSE COE Principles of Wireless.
An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
GSM Security and Encryption
IN Intelligent Network Basic IN concept & technology
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
GSM Protocol Stack Shrish Mammattva Bajpai. What is Protocol Stack ? A protocol stack (sometimes communications stack) is a particular software implementation.
1 Channel Assignment Strategies Handoff (Handover) Process Handoff: Changing physical radio channels of network connections involved in a call,
1 Channel Overview 3 Types 1.Broadcast Control Channel: Point to Multipoint, Downlink (BTS) to MS) (A)BCCH (Board cast Control Channel) It inform the Mobile.
GSM Adapted from Acoe 422. History of GSM  During the 80s, analog cellular systems experienced rapid growth in Europe, yet they were incompatible.
GSM standard (continued)
Location and Handoff Management Lecture 10. Location and Handoff Management The current point of attachment or location of a subscriber (mobile unit)
Modes Mobile Station ( MS )
EE 548 Mobility Management in Cellular Networks. Location management Location updates: mobile to network Paging: network to mobile Location information.
GSM Security Overview (Part 1)
 The missing parts in the picture are the interactions between the PCS network and the PSTN.  This section briefly describes how mobile roaming is managed.
Cellular Mobile Communication Systems Lecture 7
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Evolution from GMS to UMTS
CELLULAR COMMUNICATIONS Cellular Basics. Spectrum Reuse  Earlier systems: single central transmitter  Cover wide area  Single channel per user  25kHz.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
OPERATION OF CELLULAR SYSTEMS
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
CDMA Network Structure and Components Lance Westberg.
GSM TOWARDS LTE NETWORKS Lecture # 6. CELL PLANNING.
Network: Location Management Y. Richard Yang 3/21/2011.
CELLULAR DATA NETWORKS Mr. Husnain Sherazi Lecture 5.
GSM Signaling Protocol Architecture. Protocols above the link layer of the GSM signaling protocol architecture provide specific functions: Radio Resource.
Network components of the Switching Subsystem The switching Subsystem comprises the following subsystems. MSC (Mobile Switching Centre) HLR (Home location.
Cellular Mobile Communication Systems Lecture 8
Mobile Computing Cellular Concepts. Cellular Networks Wireless Transmission Cellular Concept Frequency Reuse Channel Allocation Call Setup Cell Handoffs.
#1EETS 8316/NTU TC 745, Fall 2003 ENGINEERINGSMU Southern Methodist University Fall 2003 EETS 8316/NTU CC745-N Wireless Networks Lecture 2: Switching Network.
Speech decoding Channel decoding De-interleaving Burst Formatting
Location Management in PCS Networks Report of Dissertation By Manikanta Velaga (Adm. No ) Sanjoy Mondal (Adm. No ) M.Tech (CA)
Yschen, CSIE, CCU1 Chapter 9: Existing Wireless Systems: 2G, GSM System Associate Prof. Yuh-Shyan Chen Dept. of Computer Science and Information Engineering.
GSM NETWORK ARCHITECTURE CH 2. In this chapter we will see : In this chapter we will see : 1.GSM NETWORK ARCHITECTURE 2.The Radio Subsystem 3.The Network.
GSM TOWARDS LTE NETWORKS
PLMN Network Intelligence 2 © Manzur Ashraf. Switching.
Introduction to the GSM– -Wireless communication system Definition -handoff -Call setup -Cell shape -GSM Applications.
Location Management Methods for Third-Generation Mobile Systems Sami Tabbane, IEEE Communications Magazine, August, 1997.
MOBILITY Beyond Third Generation Cellular Feb
 Set of procedures to:  track a mobile user  find the mobile user to deliver it calls  Current location of MS maintained by 2-level hierarchical strategy.
Overview of cellular system
IEEE j Relay-Based Wireless Access Networks VASKEN GENC, SEAN MURPHY, YANG YU, AND JOHN MURPHY, UNIVERSITY COLLEGE DUBLIN SCHOOL OF COMPUTER SCIENCE.
Kwangwoon Univ. Wireless and Mobile Network Architectures Intersystem Handoff and Authentication IS-41 오재준Nclab
Mobile Cellular Networks Cellular principle –Taking this one step further tessellate network coverage area with cell reuse pattern (cluster) Each cell.
Accommodating mobility with direct routing
Kelvin Hilton 2nd Generation Mobile Telecommunications Part 2.
Handover -The Process of Changing cells during a call is called handover -MS & BTS perform measurements -MS measures signal strength and quality on its.
Communication Protocol Engineering Lab. Taek-su Shin 1 GSM Mobility Management April, 15, 2003 Taek-su Shin Communication Protocol Engineering.
(Global System for Mobile Communication)
Cellular Networks 1. Overview 1G Analog Cellular 2G TDMA - GSM 2G CDMA - IS G 3G 4G and Beyond Cellular Engineering Issues 2.
DWAN ALSTON SMS TECHNOLOGY WHAT IS SMS????? SMS stands for Short Message Service. It is a technology that enables the sending and receiving of messages.
1 Lecture 19 EEE 441 Wireless And Mobile Communications.
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
The Cellular Concept and Its Implementations. The Cellular Concept The cellular concept was developed and introduced by the Bell Laboratories in the early.
Wireless Network PMIT- By-
Cellular Networks Wireless Transmission Cellular Concept
Global System for Mobile Communications
GPRS.
Chapter 3: Wireless WANs and MANs
GSM location updating procedure
Name:Shivalila A H,Shima
Wireless Communications: System Design
GSM location updating procedure
Dept. of Business Administration
Security in Wide Area Networks
Presentation transcript:

Location Management

The trends in telecom are proceeding with a strong tendency towards increasing need of mobility in access links within the network. The Traffic generated by each wireless user is constantly growing, on one hand – cellular users use their mobiles more often than they used to and due to the arrival of capacity-greedy services This all pushes the need for higher capacity per call.

For all these considerations, it is easy to predict that the generalized mobility features will have serious impacts on future telecom networks. Mobility can be categorized into two areas: Radio Mobility Network Mobility We will focus on “Location Management”

Location management schemes are essentially based on users mobility and incoming call rate characteristics. The network mobility process has to face strong hostility between its two basic procedures: Location and Paging. The Location procedure allows the system to keep track of the users location knowledge more or less accurately in order to find him, in case of incoming call. The Paging process achieved by the system consists of sending paging messages in all cells where the mobile terminal could be located.

Presently the location method most widely implemented in First-and-Second generation cellular systems makes use of Location Areas In these Wide-Area radio networks, location management is done automatically.

Several location updating methods can be implemented based on LA structuring. Periodic Location Updating- This method is simplest because it just requires the mobile to periodically transmit its identity to the network. Its drawbacks is its resource consumption, which is user-dependent and can be unnecessary if the user does not move from an LA for several hours. Generally, this method is combined with the next one.

Several location updating methods can be implemented based on LA structuring. Location Updating on LA Crossing This method first requires each BS to periodically broadcast the identity of its LA. Second, the mobile is required to permanently listen to network broadcast information and to store the current LA identity. If the received LA number differs from the stored one, a Location Update procedure is automatically triggered by the mobile………….

Several location updating methods can be implemented based on LA structuring. Location Updating on LA Crossing …………. Advantage of this method is that it only requires LU’s when the mobile actually moves. A highly mobile user will generate a lot of LUs and a low will trigger a few. A hybrid method which combines the two previous ones can be implemented. In this a mobile generates its LU each time it detects an LA crossing. Nevertheless, if no communication has occurred between mobile and network for a fixed period. The mobile generates a LU, this allows LU in case of database failure

The GSM defines a database structure based on: An HLR Several VLRs Each VLR stores part of the data regarding the users located in its related LAs. The location management method defined in GSM combines the periodic LU method and the LU on LA border crossing. The VLR stores the LA identifier, and the HLR stores the VLR identifier.

The GSM defines a database structure based on: An HLR Several VLRs …….This consists of THREE types of LU procedures. Intra-VLR LU Inter-VLR LU using TMSI Inter-VLR LU using IMSI

The most complete LU, which is the Inter-VLR LU using IMSI, this procedure mainly consists of the following steps: A signally channel is allocated to MS, and an LU is requested The MS provides the network with its IMSI, which allows new VLR to load the authentication data from the HLR/AUC. The VLR is then able to authenticate the MS; if this step succeeds, its updates the location at HLR. The HLR informs the old VLR1 to remove data stored. Ciphering may be required if available A new TMSI is allocated to the MS, and after acknowledgement of its LU request the channel is released

Limits of present Location Management Methods The LA-based location management methods are most adapted and widely used in current cellular GSM, in truck systems such as trans-European truck radio, in cordless systems like DECT, Personal Access Communication Systems. Nevertheless, the traffic and processing generated may lead to congestion problems in high-density system. One of the main concern for system designers is therefore to define methods allowing the system to reduce the overhead traffic as much as possible.