Mobility Management
Mobility Management
Mobility Management
Mobility Management
Outline
Overview of the PCS system architecture
Mobility management
PCS system architecture
The mobile service area is covered by a set of base stations (BSs),
which are responsible for relaying the calls to and from the mobile
stations (MSs) located in their coverage areas (or cells).
The BSs are connected to mobile switching centers (MSCs) by lan
d links.
MSC
a telephone exchange configured specifically for mobile applica
tions.
interfaces the MSs (via BSs) with the PSTN.
Databases are used for roaming management:
Home location register (HLR)
Visitor location register (VLR)
There are two aspects of mobility in a PCS network:
Handoff
Roaming
Handoff
When a mobile user is engaged in conversation, the
MS is connected to a BS via a radio link.
Subrating scheme
Reserved channel scheme
Similar to the non-prioritized scheme, except
that some channels in each BS are reserved for
handoff calls.
Queuing priority scheme
Adjacent coverage areas of BSs may overlapped.
Thus, there is a considerable area where a call can be
handled by either BS. This area is called the handoff
area.
If no channel is available in the new BS during hando
ff, the new BS buffers the handoff request in a waitin
g queue.
The MS continues to use the channel with the old BS
until either a channel in the new BS becomes availabl
e (and the handoff call is connected) or the MS moves
out of the handoff area (and the call is forced to termi
nate).
Subrating scheme
Creates a new channel for a handoff call by sharing r
esources with an existing call if no channel is avail
able in the new BS.
Subrating means an occupied full‑rate channel is tem
porarily divided into two channels at half the original
rate:
one to serve the existing call
and the other to serve the handoff request.
When occupied channels are released, the subrated ch
annels are immediately switched back to full‑rate cha
nnels.
Inter‑BS Handoff
These handoff schemes can significantly
reduce the probability of forced termination as
well as the probability of call incompletion
(new call blocking plus handoff call forced
termination).
Intersystem Handoff
In intersystem handoff, the new and old BSs ar
e connected to two different MSCs.
We trace the intersystem handoff procedure of
IS‑41, where network‑controlled handoff (NC
HO) is assumed.
In this figure, a communicating mobile user m
oves out of the BS served by MSC A and enter
s the area covered by MSC B.
MSC MSC MSC MSC
Intersystem Handoff
Intersystem handoff requires the following
steps:
Step 1. MSC A requests MSC B to perform
handoff measurements on the call in progress.
MSC B then selects a candidate BS2, BS2, and
interrogates it for signal quality parameters on
the call in progress. MSC B returns the signal
quality parameter values, along with other
relevant information, to MSC A.
Intersystem Handoff
Step 2. MSC A checks if the MS has made too
many handoffs recently (this is to avoid, for
example, numerous handoffs between BS1 and
BS2 a where the MS is moving within the
overlapped area) or if intersystem trunks are
not available. If so, MSC A exits the
procedure. Otherwise, MSC A asks MSC B to
set up a voice channel. Assuming that a voice
channel is available in BS2, MSC B instructs
MSC A to start the radio link transfer.
Intersystem Handoff
Step 3. MSC A sends the MS a handoff order.
The MS synchronizes to BS2. After the MS is
connected to BS2, MSC B informs MSC A
that the handoff is successful. MSC A then
connects the call path (trunk) to MSC B and
completes the handoff procedure.
Intersystem Handoff
In this intersystem handoff process, MSC A is
referred to as the anchor MSC, and is always in the
call path before and after the handoff, as illustrated in
the four cases in Figure 2.4.
This anchor approach is used in all existing mobile
phone networks because the re‑establishment of a
new call path (without involving MSC A) between
MS and the new MSC would require extra trunk
release/setup operations in PSTN, which is not
available or is not cost‑effective.
Intersystem Handoff
If the MS moves back to MSC A again, the
connection between MSC A and MSC B is removed
(handoff backward).
If the MS moves to the third MSC C, then MSC B
will be in the call path (handoff to third).
That is, the link between MSC B and MSC A is
disconnected, and MSC C connects to MSC A
directly.
This process is called path minimization.
Roaming Management
Two basic operations in roaming management
are
registration (or location update), the process
whereby an MS informs the system of its current
location, and
location tracking, the process during which the
system locates the MS. Location tracking is required
when the network attempts to deliver a call to the
mobile user.
Roaming Management
The roaming management strategies proposed in the
IS‑41 and GSM MAP standards are two‑level
strategies in that they use a two‑tier system of home
and visited databases.
Home Location Register (HLR)
When a user subscribes to the services of a PCS
network, a record is created in the system's database,
called the home location register (HLR).
MSC
Roaming Management under SS7
The missing parts in the picture are the
interactions between the PCS network and the
PSTN.
This section briefly describes how mobile
roaming is managed by the PSTN signaling.
Common channel signaling (CCS)
Common channel signaling (CCS) is a
signaling method that provides control and
management functions in the telephone
network.
CCS consists of
supervisory functions
addressing
periodic re-registration
MSC1 MSC2
Implicit deregistration
Obsolete VLR records are not deleted until the
database is full.
If the database is full when an MS arrives, a record is
deleted, freeing storage space to accommodate the
newly arrived MS.
A replacement policy is required to select a record for
replacement (it is possible that a valid record is
replaced, and the information is lost).
Advantage: no deregistration messages are sent
among the SS7 network elements.
Periodic re-registration
The MS periodically reregisters to the VLR.
If the VLR does not receive the re-registration
message within a timeout period, the record is
deleted.
This approach only creates local message traffi
c between the MSC and the VLR. Furthermore
, no SS7 signaling messages are generated if th
e VLR is co-located with the MSC.
Pointer Forwarding Scheme
To reduce the registration traffic at steps 2 and
3 in Figure 2.8, a pointer forwarding scheme
was proposed, which consists of two
operations:
Move operation (registration).
Find operation (call delivery).
Move operation (registration)
When an MS moves from one VLR to another,
a pointer is created from the old VLR to the
new VLR. No registration to the HLR is
required (see Figure 2.9(a)).
Find operation (call delivery)
When the HLR attempts to locate the MS for
call delivery, the pointer chain is traced. After
the find operation, the HLR points directly to
the destination VLR (see Figure 2.9(b)).
Call Delivery
Depending on the memory capacities of the VLRs, the pointer
s in the obsolete chain may or may not be deleted.
To limit the pointer traversal time in the find operation, the reg
istration procedure in Figure 2.8 may be performed for every k
move operations.
In other words, the number of pointers visited in the find opera
tion will be limited by k. The pointer forwarding scheme shoul
d not be considered when the new cost of pointer creation and
pointer traversal is higher than the cost of accessing the HLR.
As performance studies indicate, the pointer forwarding schem
e significantly reduces the network traffic in many cases.
Call Delivery
Similar to the registration process, visits to several STPs and a
GTT may be required to access the HLR in call delivery.
Several STPs may be visited to obtain the routable address fro
m the VLR.
To reduce the call delivery traffic, a cache scheme was propos
ed to maintain a cache in the originating SSPs.
Another possibility is to maintain the cache in the STP that pe
rforms GTTs, that is, STP3 in Figure 2.11.
A cache entry consists of two fields: the MIN of an MS and t
he address of the current visited VLR of the MS. The cache
contains entries for MSs recently accessed from the SSP
Cache Scheme
When the calling party originates a call to an MS, the SSP first
checks if the cache entry for the MS exists. There are three pos
sibilities:
Case 1: The cache entry does not exist. The call delivery proce
dure illustrated in Figure 2.10 is performed.
Case 2: The cache entry exists and is current. The VLR is dire
ctly accessed as shown in Figure 2.11.
Case 3: The cache entry exists but is obsolete. The procedure d
etects that the cache entry is obsolete if the queried VLR's resp
onse is negative. The call delivery procedure illustrated in Fig
ure 2.10 is performed.