You are on page 1of 3

Share Report Abuse Next Blog»

Create Blog Sign In

G 2 & G 3
2G, 3G Network Planning and Optimization...

Экономия бензина
http://depositfiles.com/files/zsxl7kqoq

Tak.ru
Оплаченная Реклама: - Icq - НТВ+ по доступной цене. Бесплатный тест! - SurfSitMoney (jetswap) рэфбек от 120% до 200% - SurfSitMoney (jetswap) рэфбек от 120% до 200% - Зобачев Жлобин - Дипломные работы - CARscope.ru: автомобильный журнал - Наш Родной Малый Седяк - группа континент - Plea

Archives
▼ 2009 (56)
► Октябрь (15) ▼ Сентябрь (41) 3.8 Network Capacity Comparison For the comparis... 3.7 Multiple Reuse Pattern T echnology3.7.1 Basic... 3.6 Concentric Cell T echnology 3.6.1 Concept I... 3.5 Aggressive Frequency Reuse T echnology 3.5.1 ... 3.4 Normal Frequency Reuse T echnology 3.4.1 C... 3.3 Frequency Planning Principle Generally, when ... 3.2 Frequency Division and C/I Requirement 3.2.1 ... 3 GSM Frequency Planning 3.1 Overview Frequency ... 2.13 Conclusion Network planning is the foundatio... 2.12 Repeater Planning 2.12.1 Application Backg... 2.11 Tunnel Coverage 2.11.1 Characteristic of T ... 2.10 Design of Indoor Coverage System 2.10.1 Ch... 2.9 Dual-Band Network Design 2.9.1 Necessity for... 2.8 Location Area Design 2.8.1 Definition of Loc... 2.7 Design of Base Station Address 2.7.1 Address d... 2.6 Base Station Number Decision After traffic an... 2.5 Traffic Analysis 2.5.1 Traffic Prediction an... 2.4 Network Structure Analysis When considering t... 2.3 Coverage Analysis 2.3.1 Area Division I. Typ... 2.2 Planning Foundation 2.2.1 Coverage and Capacit... 2 GSM Radio Network Planning 2.1 Overview The de... 1.17 CBS Cell Broadcast Service (CBS) is similar ... 1.16 Call Re-Establishment 1.16.1 Introduction ... 1.15 HOAs a key technology in the cellular mobil... 1.14 MS Originated Call Flow 1.14.1 Enquiry Afte... 1.13 MS Originating Call Flow The MS needs to set ... 1.12 Location Update In GSM, the paging informati... 1.11 Authentication and Encryption GSM takes lots... 1.10 Immediate Assignment Procedure The purpose o... 1.9 Power Control 1.9.1 Power Control Overview P ... 1.8 Discontinuous Reception and Discontinuous Tra... 1.7 Frequency Hopping With the ever growing traff... 1.6 Cell Selection and Re-Selection 1.6.1 Cell S... 1.5 System Information System information is sent ... 1.4 Timing advance Signal transmission has a dela... 1.3 Data Transmission Radio channel has totally d... 1.2 Multiple Access T echnology and Logical Channel... 1 GSM Principles and Call Flow 1.1 GSM Frequency ... Radio Network Planning Optimization The objective ... History of GSM 1 GSM Development Mobile telecommun...

среда, 2 сентября 2009 г. 1.16 Call Re-Establishment 1.16.1 Introduction The re-establishment procedure allows MS to resume a connection in progress after a radio link failure, possibly in a new cell or in a new location area (re-establishment in a new location area initiates no location updating). Whether call re-establishment is allowed depends on the calling status, the cell's allowance of call reestablishment, and activated MM connection (MM is in status 6 "MM connection activated" or status 20 " Waiting for additional MM connection" Call re-establishment can only be initiated by MS. GSM protocol does not specify the implementation mode for the short message service and the independent call supplementary service. In the other end, no voice is heard during the call re-establishment. During the radio transmission, a connection may be broken suddenly because of the great transmission loss due to obstructions such as bridges, buildings, or tunnels. When the call re-establishment is used, the MS can maintain the conversation by using another cell in a short time, thus improving the network quality. Call re-establishment can be regarded as the HO initiated by MS to save the interrupted call in the current cell. Call re-establishment is of two types according to the entity that has the radio link failure first. I. Radio Link Failure Occurs to MS First The MS sends a call re-establishment request in the selected cell (source cell or target cell). The former channel resource is released after the BTS timer times out. II. Radio Link Timeout Occurs to BSS First After the radio link timer in BTS times out, the BTS sends a radio link failure message to the BSC and BSC activates the SACCH. According to the protocol, the network must handle the context for a while after detecting the lower layer faults for the successful call re-establishment. The implementation mode and duration are decided by the equipment provider. After detecting the radio link failure, the MS selects a neighbor cell with the highest RXLEV within five seconds and sends the channel request in the selected cell. This cell should not be barred and the C1 is over 0. In addition, this cell must permit the call re-establishment. If all the neighbor cells are not qualified, the call re-establishment is abandoned. During the call re-establishment, the MS cannot return into the idle mode. If the MS selects a cell in different LA as the target cell for call re-establishment, it cannot perform location updating until the call ends. Under normal circumstances, the call re-establishment procedure lasts about 4 to 20 seconds. Most users have hung up the phone before the procedure is over. Therefore, the call re-establishment cannot achieve its goal but wastes a lot of radio resources. For the areas with limited channel resources, the activation of this function is not recommended. 1.16.2 Call Re-Establishment Procedure 1) After the MM connection failure indication is reported to the CM entity, if the MS receives at least one request for MM connection re-establishment from CM, it will initiate the call re-establishment procedure. If several CM entities request for re-establishment, only one re-establishment procedure will be initiated. 2) After the CM sends the request for the re-establishment of MM connection, MM sublayer sends a request for the establishment of RR connection and enters the WAIT FOR REESTABLISH state. This request includes an establishment cause and a CM re-establishment request. When the RR sublayer indicates a RR connection is established (the CM re-establishment request message has been sent through the Um interface), the MM sublayer starts T3230 and indicates to all the CM entities that the MM connection is under construction. The MM sublayer stays in WAIT FOR REESTABLISH state. The CM Re-establishment Request message contains the MS identity (IMSI or TMSI), Classmark 2, and encrypted sequence number. Whether the CM entity can request for re-establishment depends on protocol discriminator (PD). 3) After receiving the CM re-establishment request, the network analyzes the request type and starts the MM program or RR program. The network can start the classmark enquiry program to obtain more information about the MS encryption ability. The network can also decide to perform the authentication procedure or ciphering mode setting procedure. 4) When the RR sublayer indicates the ciphering mode setting procedure is over or the CM SERVICE ACCEPT message is received, the MM connection is re-established. The T3230 stops and informs all the CM entities related to the re-establishment to enter the MM CONNECTION ACTIVE state. 5) If the network cannot connect the re-establishment request to the current MS call, it sends the CM SERVICE REJECT with the reject cause to the MS. The reject cause (value) includes unidentifiable call (#38), unidentifiable IMSI (# 4), unauthorized ME (# 6), network failure (#17), congestion (#22), unsupported service (#32), and temporary service failure (#34)。 6) After receiving the CM SERVICE REJECT the MS stops T3230 and releases all MM connections and , RR connections. If the reject cause if #4, the MS deletes the TMSI, LAI, and CKSN in SIM card, and changes the status from “updating” into “no updating”, and then enters the “WAIT FOR NETWORK COMMAND” state. The location updating will be initiated after the RR release. If the reject cause is #6, the MS deletes the TMSI, LAI, and CKSN in SIM card, and changes the status from "updating" into “roaming inhibit”. The SIM is regarded invalid until the MS is switched off or the SIM card is pulled out. 1.16.3 Exceptional Situations I. Re-Establishment Prohibition or Failure When MM connection is established, the MM layer may send an indication to the CC layer. If the MM layer is disconnected, the connection may be re-established through CC request. If the re-establishment is not allowed, and the call is initiated within the establishment or clearing

the MS will stop timer T3230.: Отправить комментарий Подпись комментария: Выбрать профиль.8 Short Message Procedure on SACCH when MS is called I. 1. If RR CONNECTION FAILURE is detected by the MSC. When EST CNF is received from MS. the BSC sends EST REQ to MS to establish short message connection. 1. Upon reception of CP ACK from MS. see GSM03. the MSCs of some manufacturers are capable to send ASS REQ to BSC. If re-establishment is unsuccessful. Then. III. and establishes an RR layer connection for SMS. 1. requesting it to assign channel for short message transmission. and CP_ACK is the acknowledgement message of CP_DATA. notifying the network side that this user needs short message service (SMS). MSC sends the short message.telecommun. MM connections shall be released. Signaling Procedure II. Автор: ourdot на 1:31 0 коммент.16. and sends the short message.16. Procedure Description The random access. Signaling Procedure II.. BSC can provide SMS either by allocating other channels or by using the original SDCCH..40 protocol. After encryption. II.16. and release all MM connections. The release procedure after message is sent is the same as general ones.5 Short Message Procedure on SDCCH When MS is calling I. 1. For the short message procedure when MS is called.16. after encryption. In this procedure.7 Short Message Procedure on SACCH When MS is calling I.. The MSC responds with the CM SERV ACC message and establishes CC layer connection. CP_DATA is used to transmit the content of RL and AL message.6 Short Message Procedure on SDCCH When MS is called I.16. the connection is successfully established. BSC transparently transmits the short message till the end of the transmission. and a release indication shall be sent to the CC layer. Procedure Description The MS sends CM SERV REQ through FACCH. The release procedure after message is sent is the same as general ones. abort the call re-establishment procedure. transport layer (TL) and application layer (AL). the CC layer shall release MM connections. RR Connection Failure If random access failure or RR CONNECTION FAILURE is detected by the MS. immediate assignment. 1. Signaling Procedure II. it establishes RR layer connection on SACCH. The time for sending ASS REQ is the same as that for a common call. and encryption procedures of short message procedure on SDCCH when MS is calling are the same as general procedures. Signaling Procedure II. Procedure Description The BSC receives the CP DATA message from MSC. Then. the MS sends SABM again. For details. authentication. Procedure Description The paging response and immediate assignment procedures of short message procedure on SDCCH when MS is called are the same as general procedures. the MSC will abort the call re-establishment procedure and release all MM connections.. Point to Point short messages protocol is divided into connection management layer (CM). the MS will stop call re-establishment and release MM and RR connections. A short message procedure can be classified into short message calling procedure and called procedure.4 SM Procedure Short messages can be transmitted either on SDCCH or SACCH. relay layer (RL). T3230 Time-out If the T3230 times out. Отправить комментарий Просмотр Следующее Главная страница Предыдущее . CP_DATA and CP_ACK are the messages on CM layer. 2G&3G Planning an Optimization Live Hit Постоянные читатели period. BSC provides a transparent-transmission channel for MS to exchange short message information with MSC.

Подписаться на: Комментарии к сообщению (Atom) .