Mobility Management for Wireless Networks: Modeling and Analysis

Total Page:16

File Type:pdf, Size:1020Kb

Mobility Management for Wireless Networks: Modeling and Analysis ¢¡¤£¦¥¨§ © "!# !#$ %&' ( ')!#¢!*+* $!#,( '-.*0/1 324!# . 5$2 5$567*89* :<;>=?;A@CBA=EDF@CB>=G@CB>HJILKMBANPOA@?Q8RS@ T¦UWVYXPZ\[^]_U\`a[FbdcegfhUdij[^Z\klimXPfnXo`qp¨r bP]Vqst[uU\Zvew`YxPky`zUmU\Z{ky`Yx |n`}k~U\Z{k[^bdc Af bPZ\klpPX ew`xPk`qUmU{Z\k`x_ stklf pok`x uw bP MY XPky`zU{~kffhUm PP o aUjfh o¡ ¢XY ¡ Yo{ Yj} Yo{_P£P P ¤¦¥j§\¨©aªm«mª¬ ­®M¬ ªm¯o­ °1±³²´µ¶q·´ ¸º¹P»q¼¾½¾¼¾¿WÀJÁ1ÂoÃzÂPÄPÅÁÅÃt¿Æa½yÂÀ}ÇÈÂÉÇm¼¾ÄÃq¼hÊqËÂPÃt¿1̹½¾Åͼ¾ÃοÏqŨËjÐaÌmÌÅÃt¿ÑÂPÃqÒÓ¿ÏqÅ Ô Ða¿ÐaÌÅÖÕ¼hÌŽ¾ÅÇmǦÁ¹»a¼¾½¦Å<ÃqÅ{¿×Õg¹oÌØMǼ¾Ã6Å{Ù?ÅËj¿¼¾ÚYŽhÀÍÒ}Ž¾¼¦ÚÅj̼¾ÃqÄ1ÇmÅjÌÚM¼¾ËÅÇ9¿¹¿ÏqÅ Á¹P»q¼¾½¾Å_ÐqÇmÅ{ÌǹÃÍ¿ÏqÅÁ¹oÚÅÛ<¸¨ÂPÃtÀ¤ÇmË\ÏqÅjÁÅÇÏzÂÚYÅ<»CÅÅÃ6Æa̹PÆC¹ÇmÅÒ6ÂPÃqÒ6¼¾Ã}Ü Ô ÚYÅjÇd¿¼¦ÄÂo¿ÅÒÝÅjÞM¿ÅÃqÇm¼¾ÚYŽhÀͼ¾ÃÍ¿ÏqÅ ÆqÂPÇd¿Û ßà¹ÕgÅÚYÅ{Ìá Á¹PÇd¿¦ÆCÅjÌ ¹oÌÁ1ÂPÃaËÅÂPÃqÂP½hÀMÜ ÇmÅÇÕwÅjÌÅ_ËÂoÌm̼¾ÅÒ͹Ða¿Å¼h¿ÏqÅjÌ9ÐqÃzÒ}ÅjÌÇm¼¾ÁÆa½¦¼¾Çd¿¼¾Ë ÂoÇmÇmÐqÁÆ}¿¼¦¹PÃqǹPÃÍÇm¹ÁÅ¿¼¾ÁÅ ÚPÂo̼¦ÂP»a½¾ÅÇg¹PÌwÚM¼y¦Çm¼¾Á_Ða½¦Âo¿¼¾¹ÃaÇÛ>âàÅËjÅÃt¿½¾ÀtáPÕgÅàÏzÂÚYÅvÒaÅÚŽ¾¹ÆCÅÒ¦ÃqÅ{Õ+ÂPÃqÂP½hÀM¿mÜ Ô ¼¾ËÂo½ÂPÆqÆ}̹YÂoË{ÏÉ¿¹¤¼¾ÃMÚYÅÇd¿¼¾ÄY¿¼¾ÃqĤ¿ÏqÅ1Á¹MÒaÅj½¦¼¾ÃaÄÍÂPÃzÒÉÆCÅ{Ì ¹PÌÁ1ÂoÃqËÅÈÂoÃzÂP½hÀ}Çm¼¾Ç Ô Ô ¹PÌÖÁ¹»a¼¾½¦¼h¿WÀ¤Á1ÂPÃqÂPÄÅjÁÅÃt¿9ÇmË\ÏqÅÁÅjÇ9ÐqÃqÒaÅjÌ Âo¼¾Ì½hÀÍÄPÅÃqÅjÌ\Âo½AÂPÇmÇmÐqÁÆ}¿¼¾¹ÃnÛã×Ã Ô ¿Ïa¼¦Ç9Ë{ÏqÂPÆa¿Å{ÌázÕgÅÆaÌÅÇmÅÃt¿à¿ÏqŦ¿ÅË\ÏqÃq¼¦ätÐqÅjÇàÕgÅ<ÏzÂÚYÅÒaÅjÚYŽ¾¹ÆCÅÒ ¹PÌ¿Ïa¼¾ÇÂPÆ}Ü Ô Æ}̹YÂPË\Ïν¦Â¿Å½hÀÎÂoÃzÒ8ÇmÐqÁÁ1Â̼¦åjÅÑ¿ÏqÅÑÁ1Âæ×¹PÌÌÅÇmÐa½h¿Ç ÕgŤÏzÂÚYÅѹ»}¿\ÂP¼¾ÃqÅÒ ¹oÌ Ô Â ÅjÕçÁ¹»q¼¾½¾¼h¿×ÀÓÁ1ÂPÃqÂPÄPÅÁÅÃt¿1ÇmË{ÏaÅÁÅÇÇmÐaË{ÏÎÂPǺèÝéPêPë{ìë{íqîðïWñ\òoóëmô8è6éYñjõ^öhï õlî^÷¦èÝòPízòøtë{ì1ë{íaî^áqùvéPõíqîWë{úgû éPú\üwòoúmôPõlítø_ýCþ\ÿqë{ìë¡ lùAûFý£¢á¥¤üFéïuö¦ë{êPëjöCö¾éþòPî^õðéPí ì òPíCòøtë{ìë{íqîgó{þ\ÿqë{ìë{áCÂoÃzÒ¦¤üFé﨧 éþòPî^õðéPí ©àö øYéPú\õlîÿMì ¤ §©¢Û µ²Í¸º¹P»q¼¾½¾¼¾¿WÀ6Á1ÂPÃzÂoÄÅÁÅjÃM¿áz½¦¹tËÂo¿¼¾¹ÃÉÁ1ÂoÃzÂoÄÅÁÅÃt¿ázÌÅjļ¾Çd¿mÌ\Âo¿¼¾¹Ã¢áÆqÂPļ¾ÃaÄaánËŽhÜ ½¾Ðq½¦ÂÌáqÕ¼hÌŽ¾ÅÇmÇ9ÃaÅj¿×Õw¹PÌØMÇ ! #"¥$¥%'& (*)+"¥,-%. /1032547698;:78;<<=?>A@B4C:C850¥8ED 2#>A69F<EG¥4C0H>A6JI¥8E6¡DK>L8£M8;N£D947OA8;:7PQI¥8;:R47OA8E6¡ST<K8E69O4CN£85DK> S3=?>A@U4C:78TVB<K8E6;G+D9W¥8?:7>!NESXD94C>Y0Z>A[#S3NESA:C:C8;I\=H>A@B4C:78]VB<K8E6 =TV^<9D@8TI^8EDK8E6=H4C0¥8;I 2547D9W^4C0_S N£8E69D9SA4R0HD94C=?8':R4C=H47Da`b@8E[c>A698aD9W^85<K8E69O4CN£8'4C<d@U:7>!NFA8;IUeJfhgiW^8;0?D9W¥85NESA:C: N£>Y0^0¥8;N£D947>Y0¦4C<#4C0Hj^6>AkA698;<9<¡25W^4C:78aD9W^8*=?>A@U4C:7854C<¡=?>O4C0¥k¥G!D9W¥8l0¥8ED 2#>A69FQWBSA<DK> [c>Y:C:C>2mD9W¥83=?>A@B4C:78HVB<K8E6<nSA0^IoSA:C:7>NESXDK8Q8;0¥>YV¥kYWp698;<K>YV¥6N£83DK>qj^69>rO!4RI¥8H<K8;SA=_s :78;<9<*N£>Y0 D94C0!V^4C0^k3<K8E69O4CN£8L2547D9W¥>YV^DV^<K8E6lS;2.SX698;0¥8;<<lD9W^SXD*4R0Z[ SAN£DD9W^8L0¥8ED 2¡>A6F [bSANE4C:R47D P ` <V^NW SA<.@BSA<K8 <KD9SXD94C>Y0Ue¡4C<¡NJW^SA0¥kY4C0^k¥f¢¡¤£¦¥¨§ © § ¨¨ 4C<.V^<K8;I DK>HDK6SAN9F D9W¥8n=H>A@B4C:78 V^<K8E6J<.D9W^SXD5=?>rOA8][b69>Y= jB:CSAN£8 DK>HjU:CSAN£8n4C0 D9W¥8nN£>rOA8E6SXkA8 >A[hSQ2547698;:C8;<9<a=?>A@B4C:C8n0¥8ED 2#>A69F >A64R0 D9W¥8TN£>rOA8E6SXkA8_>A[d=TV^:CD947jB:78 N£>Y=H=LV^0^4CNES s D947>Y0^<a0¥8ED 2¡>A69F<a2#>A69F4C0¥k_DK>AkA8ED9W¥8E6'DK>H[ V^:U:C:¥D9W¥8 kA6SA0BI O!4C<47>Y0¦>A[ V¥@B4 V^4CDK>YV^< N£>Y=H=TVB0^4CNESXD947>Y0^<;f! 'W!V^<EG"£¦¥#§ ©$§ ¤%&#'¨ '4C<?S FA8EP N£>Y=?j>Y0¥8;0 D?[c>A6 D9W¥8]8£M8;N£D947OA8L>Aj+8E6JSXD947>Y0^<'>A[d247698;:78;<9<50¥8ED 2#>A69F<5DK> I¥8;:C47OA8E652547698;:78;<<a/-0 DK8E60¥8ED <K8E69O4CN£8;<]` <K8E8)(+*-,hSA0^I 698E[b8E698;0^N£8;<5D9W¥8E698;4C0UeJf gi4768;:78;<9<h0¥8ED 2#>A69F<hj^69>rO!4CI^8.<98E69O!4RN£8;< DK> D9W^8;476d<9V¥@B<9N£6J47@8E6< 4C0LD9W¥8aN£>rOA8E6SXkA8 SX698;Sf¢.V^NJWHSX698;Sn4C<j+>AjUV^:CSXDK8;I_2547D9W_@USA<K85<KD9SXD947>Y0B<EG 8;SANJWH>A[25W^4CNJWH4C<h698;<9j+>Y0¥s <947@B:785[c>A6a698;:RS;P4C0¥kTN£>Y=Q=TV^0B4CNESXD947>Y0 <K8E69O4CN£8;<#[c>A6.D9W¥8 =?>A@U4C:78;<DK6JS;OA8;:C4C0^k_4R0347D9< N£>OA8E6SXkA8 NESA:C:78;I0/1#© ©32f54 kA69>YV¥j >A[ N£8;:C:C<_[b>A6= S7689:§ 21 68: §£:068;=< >@?BArG 25W^4CNJWH4C<=QSA0^SXkA8;IQ@!PC£¦¥#§ ©D2FEG§ H/#I¦§ /1# 9¨65`KJL.M'edN£>Y0^0^8;N£D94C0¥kTIB47698;N£D9:7P DK> D9W¥8¤NPO¥¨©$§K/LQREG§ H/#IS;TVU#©WYXIZ£:\[]¨ E^£6F_&2!< NPQ`Ua[PA f¡/10 D9WB4C<QNJW^SXj^DK8E6;G 2¡8¦254C:C:dVB<K8Lb£¦¥¨§ ©W1cdL£¦¥¨§ ©WCOZ2¨¨6;ceb£¦¥¨§ ©W)2FO¥#2#/¨61§H¥;#6TSA0^Ifb£¦¥¨§ ©W 9#61]§ %©¨G 4C0 DK8E6NW^SA0^kA8;SX@B:7PAfg 'W^8T0¥8ED9<9W^8;:C: N£>Y=H=LV^0^4CNESXD94C>Y0^<5SX6NJW^47DK8;N£D9V¥68L4C< <9W¥>20q4C0ihh47kYV¥698j*!fWjXf giW¥8;0¦S]=H>A@B4C:785N£>Y=Q=TV^0B4CNESXDK8;<#2547D9WQSA0^>AD9W¥8E6#VB<K8E6l`b8;4CD9W¥8E6¡247698;IQVB<K8E6>A6 2547698;:78;<<TV^<98E6eJGdD9W¥8 =?>A@B4C:C8Q254C:R:N£>Y0^0¥8;N£D?DK> D9W¥8 0¥8;SX68;<KD_@BSA<K8 <KD9SXD947>Y0 `b>A6 D9W¥8@USA<K8 <KD9SXD947>Y0¦25W^4CNJWQjB69>O4CI¥8;<#D9W¥8l<KDK69>Y0¥kA8;<9D#68;N£8;47O!4R0¥kL<47kY0^SA:+<KDK698;0¥kAD9WUeJG 25W^4CNJWqD9W¥8;0Z8;<KD9SX@B:C4C<W¥8;<'D9W¥8LN£>Y=H=LV^0^4CNESXD947>Y0Z2547D9WZD9W¥8]>AD9W¥8E6lV^<K8E6*>OA8E6lD9W¥8 8#k4C<9D94C0¥kHN£>Y=H=LV^0^4CNESXD94C>Y0q4C0¥[b6SA<KDK6VBN£D9V¥698?` <9V^NW SA<glP.S @m eJf¥giW¥8;0 SH=?>A@B4R:78 V^<K8E6_8;0¥kYSXkY4C0¥k S\N£>Y=H=LV^0^4CNESXD947>Y0 SA0^I =?>rO!4R0¥k [b69>Y= >Y0¥8 N£8;:C:#DK> SA0¥>AD9W¥8E6;G D9W¥83@USA<K8¦<9D9SXD947>Y0 4C0pD9W¥8 0¥8E2 N£8;:C:¡254C:C:SA:R:7>!NESXDK8 S\NW^SA0B0¥8;:DK> N£>Y0 D94C0 V^83DK> j^69>O4CI¥8D9W¥8<98E69O!4RN£8DK>LD9W¥8l=?>A@B4C:78V^<K8E6#2547D9W¥>YV¥D#4C0 DK8E696V¥j^D94C>Y0Z` 47[ j>Y<9<947@U:78reJf 'W¥8'<K254CD9NWH[b69>Y= >Y0^8NWBSA0^0¥8;:¥DK>LSA0¥>AD9W¥8E6*`b>A6¡[c6>Y=m>Y0¥8'@USA<K8'DK>TSA0^>AD9W¥8E6eh4C< NESA:C:78;IbIZ:%Tn£po'fgql0^8 >A[h4R=?j>A69D9SA0 D'SA<9j+8;N£D5>A[ D9W^8]=?>A@B4C:R47D P¦=HSA0^SXkA8;=?8;0 D4C< D9W¥8 W^SA0^I¥>XM =HSA0^SXkA8;=?8;0 D¨r¡W¥>r2 DK>HSANW^4C8EOA8]S?<9=?>!>AD9W W^SA0^I¥>XM\2547D9W¥>YV^D#I¥8£s kA6SAI^4C0¥klD9W¥8a<K8E6O!4CN£8'NEV^69698;0 D9:7P]4C0Lj^69>AkA68;<9<h>OA8E6¡D9W¥8'SA476;f giW^8;0?V^<K8E6<dI¥> 0¥>AD 8;0¥kYSXkA8?SA0 PZN£>Y=Q=TV^0B4CNESXD947>Y0^<*SA0^IZ=H>OA8?SX69>YV^0^I GBD9W¥8_<KP<KDK8;= W^SA<5DK>¦DK6SANF D9W¥8;= 4C0H>A6I¥8E6DK>LI¥8;:C47OA8E6j+>Y<<947@B:78a<K8E6O!4CN£8;<DK>]D9W¥8;=qf` 5W^4C<d698!V^4768;<=?>A@B4C:C8;< DK>_4R0¥[c>A6J= D9W¥8 0¥8ED 2¡>A6FQD9W¥8;476.25W^8E698;SX@>YV¥D9<2W¥8;0¦D9W¥8EP3=?>rOA8AG¥D9W VB<.D9W¥8*<9P!<1s DK8;=mNESA0Q:7>NESXDK8'D9W¥8;=m@BSA<K8;I_>Y0?D9W¥85j^698EO47>YV^<9:7P 68Ej+>A6DK8;IH4C0¥[b>A6=HSXD947>Y0 fs 'W^4R< j^69>N£8;<9<.4C<.NESA:C:78;It©u£/F: §K£v%Z#'# ` <9>Y=?8ED94C=?8;<.4C<.SA:C<K>?NESA:C:C8;I\£¦¥¨§ © § :%¨'# ReJf¡/-0 D9WB4C<aNW^SXjBDK8E6;GB2#8 [c>NEV^<a>Y0ZD9W¥8n:7>NESXD947>Y0q=HSA0BSXkA8;=?8;0 DEf w >NESXD947>Y0?=HSA0^SXkA8;=?8;0 D4C<dSlV^0B4W V^8¡[b8;SXD9V¥698a[b>A6d2547698;:C8;<9<h0¥8ED 2#>A69F4C0¥k¥G SA0^I 0¥8E8;I^<DK>¦@8LSAI^I¥698;<9<98;I NESX698E[ V^:C:CPAf'/-0\<K8;N£>Y0^I\kA8;0¥8E6JSXD947>Y0\2547698;:78;<<5<KP<KDK8;=H<EG D9W¥8?2547698;:C8;<9< 0¥8ED 2#>A69F<]<KD9SA0BI^SX6I^<l/x. sHyRjZ`8(ujz-,benSA0^I|{e.}J~Jt4"l `8(uj*-,benV^<98 D 2#>Xs :78EOA8;:<KDK6JSXDK8EkY478;< [b>A6n=?>A@B4C:C4CD PZ=HSA0BSXkA8;=?8;0 DT4C0\D9W^SXDnS¦D 2#>Xs D9478E6T<KP<KDK8;= N£>Y0^<94C<KD94R0¥kT>A[`>Y=?8ew >NESXD947>Y0i'8EkY4R<KDK8E6T`w*e#SA0BI)l4C<94CDK>A6@w >NESXD947>Y0i'8EkXs 4C<KDK8E6\` Dwle?I^SXD9SX@USA<K8;< 4C<QI¥8EjU:7>PA8;I ` <K8E8Lhh47kYV^698|j*!f3YeJfV4*:7D9W¥>YV^kYW D9W¥8E698 SX698?<K>Y=?8H=?>I^4BNESXD94C>Y0^<5>Y0 D9W^8_=H>A@B4C:C47D PZ=HSA0^SXkA8;=H8;0 D [b>A6 D9W¥8_D9W^476I\kA8;0s ¢¡¤£¦¥¨§©¥¨ ¢¤ ¦¡¥¨ §!¦"#"%$&¦ (')¡ *"+, ¢¡.-/§0¥¨12-34§0 5"6¥7" 8 BS MS MSC PSTN BS: Base Station MS: Mobile Station MSC: Mobile Switching Center PSTN: Public Switched Telephone Network Ô ÏqŦËj¹ÁÁ_ÐaÃq¼¾Ë¿¼¦¹PúÂÌË{Ïa¼h¿ÅËj¿ÐaÌÅ ¹PÌvÕ¼hÌŽ¾ÅÇmÇàËjŽ¾½¦Ða½¦ÂoÌàÇdÀaÇd¿ÅjÁÇ >khxPstZdU<Py:9 8E6SXD947>Y0 254768;:78;<9<L<KP!<9DK8;=H<Z` <9V^NJW SA<_D9W¥8 4C0 DK69>!IBV^N£D947>Y0 >A[: 9#E^|©u£/F: §K£ 689:§ 21 9#6*>A6¢¡¤£s>'eJG D9W¥8?[ V^0^I^SA=H8;0 D9SA: >Aj8E6SXD947>Y0^< 4R0\=H>A@B4C:C47D PZ=HSA0^SXkA8;=H8;0 D 698;=HSA4C0^<¡=?>A698*>A6#:C8;<9<D9W^8<9SA=?8Af 8;0^N£8AG2#8254R:C:^V^<K8D9W¥8*/8.
Recommended publications
  • Handover Parameters Optimisation Techniques in 5G Networks
    sensors Article Handover Parameters Optimisation Techniques in 5G Networks Wasan Kadhim Saad 1,2,*, Ibraheem Shayea 2, Bashar J. Hamza 1, Hafizal Mohamad 3, Yousef Ibrahim Daradkeh 4 and Waheb A. Jabbar 5,6 1 Engineering Technical College-Najaf, Al-Furat Al-Awsat Technical University (ATU), Najaf 31001, Iraq; [email protected] 2 Electronics and Communication Engineering Department, Faculty of Electrical and Electronics Engineering, Istanbul Technical University (ITU), Istanbul 34467, Turkey; [email protected] 3 Faculty of Engineering and Built Environment, Universiti Sains Islam Malaysia, Bandar Baru Nilai, Nilai 71800, Malaysia; hafi[email protected] 4 Department of Computer Engineering and Networks, College of Engineering at Wadi Addawasir, Prince Sattam Bin Abdulaziz University, Al Kharj 11991, Saudi Arabia; [email protected] 5 Faculty of Electrical & Electronics Engineering Technology, Universiti Malaysia Pahang, Pekan 26600, Malaysia; [email protected] 6 Center for Software Development & Integrated Computing, Universiti Malaysia Pahang, Gambang 26300, Malaysia * Correspondence: [email protected] Abstract: The massive growth of mobile users will spread to significant numbers of small cells for the Fifth Generation (5G) mobile network, which will overlap the fourth generation (4G) network. A tremendous increase in handover (HO) scenarios and HO rates will occur. Ensuring stable and reliable connection through the mobility of user equipment (UE) will become a major problem in future mobile networks. This problem will be magnified with the use of suboptimal handover control parameter (HCP) settings, which can be configured manually or automatically. Therefore, Citation: Saad, W.K.; Shayea, I.; the aim of this study is to investigate the impact of different HCP settings on the performance Hamza, B.J.; Mohamad, H.; of 5G network.
    [Show full text]
  • Enhanced Mobility Management Mechanisms for 5G Networks
    Enhanced mobility management mechanisms for 5G Networks Akshay Jain ADVERTIMENT La consulta d’aquesta tesi queda condicionada a l’acceptació de les següents condicions d'ús: La difusió d’aquesta tesi per mitjà del r e p o s i t o r i i n s t i t u c i o n a l UPCommons (http://upcommons.upc.edu/tesis) i el repositori cooperatiu TDX ( h t t p : / / w w w . t d x . c a t / ) ha estat autoritzada pels titulars dels drets de propietat intel·lectual únicament per a usos privats emmarcats en activitats d’investigació i docència. No s’autoritza la seva reproducció amb finalitats de lucre ni la seva difusió i posada a disposició des d’un lloc aliè al servei UPCommons o TDX. No s’autoritza la presentació del seu contingut en una finestra o marc aliè a UPCommons (framing). Aquesta reserva de drets afecta tant al resum de presentació de la tesi com als seus continguts. En la utilització o cita de parts de la tesi és obligat indicar el nom de la persona autora. ADVERTENCIA La consulta de esta tesis queda condicionada a la aceptación de las siguientes condiciones de uso: La difusión de esta tesis por medio del repositorio institucional UPCommons (http://upcommons.upc.edu/tesis) y el repositorio cooperativo TDR (http://www.tdx.cat/?locale- attribute=es) ha sido autorizada por los titulares de los derechos de propiedad intelectual únicamente para usos privados enmarcados en actividades de investigación y docencia. No se autoriza su reproducción con finalidades de lucro ni su difusión y puesta a disposición desde un sitio ajeno al servicio UPCommons No se autoriza la presentación de su contenido en una ventana o marco ajeno a UPCommons (framing).
    [Show full text]
  • LTE-M Deployment Guide to Basic Feature Set Requirements
    LTE-M DEPLOYMENT GUIDE TO BASIC FEATURE SET REQUIREMENTS JUNE 2019 LTE-M DEPLOYMENT GUIDE TO BASIC FEATURE SET REQUIREMENTS Table of Contents 1 EXECUTIVE SUMMARY 4 2 INTRODUCTION 5 2.1 Overview 5 2.2 Scope 5 2.3 Definitions 6 2.4 Abbreviations 6 2.5 References 9 3 GSMA MINIMUM BAseLINE FOR LTE-M INTEROPERABILITY - PROBLEM STATEMENT 10 3.1 Problem Statement 10 3.2 Minimum Baseline for LTE-M Interoperability: Risks and Benefits 10 4 LTE-M DATA ARCHITECTURE 11 5 LTE-M DePLOYMENT BANDS 13 6 LTE-M FeATURE DePLOYMENT GUIDE 14 7 LTE-M ReLEAse 13 FeATURes 15 7.1 PSM Standalone Timers 15 7.2 eDRX Standalone 18 7.3 PSM and eDRX Combined Implementation 19 7.4 High Latency Communication 19 7.5 GTP-IDLE Timer on IPX Firewall 20 7.6 Long Periodic TAU 20 7.7 Support of category M1 20 7.7.1 Support of Half Duplex Mode in LTE-M 21 7.7.2 Extension of coverage features (CE Mode A / B) 21 7.8 SCEF 22 7.9 VoLTE 22 7.10 Connected Mode Mobility 23 7.11 SMS Support 23 7.12 Non-IP Data Delivery (NIDD) 24 7.13 Connected-Mode (Extended) DRX Support 24 7.14 Control Plane CIoT Optimisations 25 7.15 User Plane CIoT Optimisations 25 7.16 UICC Deactivation During eDRX 25 7.17 Power Class 26 LTE-M DEPLOYMENT GUIDE TO BASIC FEATURE SET REQUIREMENTS 8 LTE-M ReLEAse 14 FeATURes 27 8.1 Positioning: E-CID and OTDOA 27 8.2 Higher data rate support 28 8.3 Improvements of VoLTE and other real-time services 29 8.4 Mobility enhancement in Connected Mode 29 8.5 Multicast transmission/Group messaging 29 8.6 Relaxed monitoring for cell reselection 30 8.7 Release Assistance Indication
    [Show full text]
  • Network 2020: Mission Critical Communications NETWORK 2020 MISSION CRITICAL COMMUNICATIONS
    Network 2020: Mission Critical Communications NETWORK 2020 MISSION CRITICAL COMMUNICATIONS About the GSMA Network 2020 The GSMA represents the interests of mobile operators The GSMA’s Network 2020 Programme is designed to help worldwide, uniting nearly 800 operators with almost 300 operators and the wider mobile industry to deliver all-IP companies in the broader mobile ecosystem, including handset networks so that everyone benefits regardless of where their and device makers, software companies, equipment providers starting point might be on the journey. and internet companies, as well as organisations in adjacent industry sectors. The GSMA also produces industry-leading The programme has three key work-streams focused on: The events such as Mobile World Congress, Mobile World Congress development and deployment of IP services, The evolution of the Shanghai, Mobile World Congress Americas and the Mobile 360 4G networks in widespread use today The 5G Journey, developing Series of conferences. the next generation of mobile technologies and service. For more information, please visit the GSMA corporate website For more information, please visit the Network 2020 website at www.gsma.com. Follow the GSMA on Twitter: @GSMA. at: www.gsma.com/network2020 Follow the Network 2020 on Twitter: #Network2020. With thanks to contributors: DISH Network Corporation EE Limited Ericsson Gemalto NV Huawei Technologies Co Ltd KDDI Corporation KT Corporation NEC Corporation Nokia Orange Qualcomm Incorporated SK Telecom Co., Ltd. Telecom Italia SpA TeliaSonera
    [Show full text]
  • Mobility Management for All-IP Core Network
    Mobility Management for All-IP Core Network Mobility Management All-IP Core Network Standardization Special Articles on SAE Standardization Technology Mobility Management for All-IP Core Network †1 PMIPv6 is a network-based IP mobility management proto- DOCOMO Communications Laboratories Europe Julien Laganier GmbH col which is adopted in the 3GPP Release 8 SAE standard- Takeshi Higuchi†0 †0 ization. It allows mobile-terminal mobility management that Core Network Development Department Katsutoshi Nishida is independent of the type of access system or terminal capa- †0 bilities. NTT DOCOMO completed the standardization of †0 PMIPv6 with the IETF and contributed proactively to its adoption in the standardization of SAE. transmission path for packets addressed With the 3GPP [3], it secured prospects 1. Introduction to the IP address assigned to mobile ter- for finalizing the EPC architecture and Proxy Mobile IPv6 (PMIPv6), minals, PMIPv6 is able to achieve the standardizing PMIPv6 with the IETF, which is an IP-based mobility manage- efficient packet transfer required by an and it also completed 3GPP standard- ment*1 protocol actively promoted by All-IP Network (AIPN)*3, and flexible ization work for PMIPv6 in the 3GPP NTT DOCOMO, was adopted in the QoS*4 and policy management*5 Core Network & Terminals (CT) WG4. Evolved Packet Core (EPC) specifica- through Policy and Charging Control In this article, we describe the IP tion, a provision in the 3GPP Release 8 (PCC) [1]. PMIPv6 also improves on mobility management requirements for System Architecture Evolution (SAE) utilization of wireless resources, hand- the AIPN. We also review standardiza- standardization. PMIPv6 is a common over performance, user privacy and net- tion activities with the IETF and 3GPP, mobility management approach that work security compared to the previous describe the features of the PMIPv6 supports mobility of terminals not only IP mobility management protocol, protocol and give an overview of its within Long Term Evolution (LTE) Mobile IPv6 (MIPv6) [2].
    [Show full text]
  • Mobility Management in Wireless Systems - Jiang Xie, Shantidev Mohanty
    TELECOMMUNICATION SYSTEMS AND TECHNOLOGIES – Vol. II - Mobility Management in Wireless Systems - Jiang Xie, Shantidev Mohanty MOBILITY MANAGEMENT IN WIRELESS SYSTEMS Jiang Xie University of North Carolina at Charlotte, USA Shantidev Mohanty Intel Corporation, USA Keywords: Mobility management, location management, paging, handoff management, inter-system roaming, intra-system roaming. Contents 1. Introduction 2. Importance of Mobility Management 3. Location Management 3.1. Location Management in Stand-Alone Cellular Networks 3.2. Location Management in Non-IP-Based Heterogeneous Cellular Networks 3.3. Location Management in IP-Based Wireless Networks 4. Handoff Management 4.1. Handoff Process in Stand-Alone Cellular Networks 4.2. Handoff Process in IP-Based Wireless Networks 4.2.1. Network-Layer Handoff Management 4.2.2. Transport-Layer Handoff Management 4.2.3. Application-Layer Handoff Management 4.2.4. Different Steps for Handoff Process of the Existing Mobility Management Protocols 5. Research in Mobility Management 5.1. Research in Location Management 5.1.1. Research in Location Registration 5.1.2. Research in Paging 5.2. Research in Handoff Management 5.2.1. Single-Layer Handoff Management 5.2.2. Cross-Layer Handoff Management 5.2.3. ApplicationUNESCO Adaptive Handoff Management – EOLSS 6. Conclusion Glossary Bibliography Biographical SketchesSAMPLE CHAPTERS Summary First and second generation of wireless networks are based on non-IP based infrastructure. On the other hand, next-generation wireless systems are envisioned to have an IP-based infrastructure with the support of heterogeneous access technologies. Efficient mobility management techniques are critical to the success of both current (i.e., first and second generation wireless networks) and next-generation wireless systems.
    [Show full text]
  • Seamless Handover Between CDMA2000 and 802.11 WLAN Using Msctp Ashish Kumar Tripathi Raashid Ali Dr
    Seamless Handover between CDMA2000 and 802.11 WLAN using msctp Ashish Kumar Tripathi Raashid Ali Dr. C.V. Raman University Dr. C.V. Raman University Bilaspur,Chhattisgarh,India Bilaspur,Chhattisgarh,India [email protected] [email protected] M.No 88172 - 53002 M.No. 99071-78623 Neelam Sahu Dr. C.V. Raman University Bilaspur,Chhattisgarh,India [email protected] M.No 97550 - 25925 Abstract:- The invention of mobile devices such as addressing scheme of the Internet has been designed laptops, hand-held computers, and cellular phones has based on the assumption that any node only has one changed the whole Internet world. The main feature of fixed and permanent IP address in the Internet. mobile devices is that they can access the Internet Consequently, any node could be easily identified by wirelessly by different air interfaces using different this unique IP address and its location is directly technologies while roaming. This makes mobile devices recognized in the Internet become increasingly popular. However, the traditional When a mobile device comes to the Internet, it Internet does not support any needed features and will move from one sub-network to another sub- architectural structures for mobility management. network. However, the IP address of the mobile device When a mobile device comes to the Internet, it will keep unchanged and the IP address can not reflect will move from one sub-network to another sub- the new location due to the traditional addressing network. However, the IP address of the mobile device scheme of the Internet. As a result, the packets from will keep unchanged and the IP address can not reflect the new location will not be routed to the destination the new location due to the traditional addressing and the packets to the new location of the mobile scheme of the Internet.
    [Show full text]
  • Lex L11 Key Features
    LEX L11 KEY FEATURES CATALOG | LEX L11 KEY FEATURES This document provides an overview of key LEX L11 hardware and software features. The software features described in this document include the R2.4 software release. This document does not cover standard Android features supported by Google. CATALOG | LEX L11 KEY FEATURES PAGE 2 TABLE OF CONTENTS AUDIO PERFORMANCE & FEATURES RADIO COLLABORATION Noise Cancellation 5 Supported Models 19 Loudness 5 Radio Remote Control 19 PTT Audio Profile 5 Audio Mix Mode 20 PTT Enhanced Noise Suppression 5 Howling Suppression 6 DEVICE MANAGEMENT Carry Holster 7 Android Enterprise Recommended 23 Zero-Touch Enrollment 23 INTUITIVE CONTROLS Other Enrollment Methods 23 Dedicated PTT Button 9 LEX OEMConfig Application 24 Dedicated Emergency Button 9 Radio Management (RM) 25 Dedicated Talkgroup Rocker Switch 10 Programmable Buttons 11 SECURE MOBILE PLATFORM NIAP Certified 13 CfSC Certified 13 DISA STIG Certified 13 Trusted Boot Process 14 Real-Time Integrity Monitoring 14 Device User Authentication 14 Operating System & Applications Hardening 14 Real-Time Protection of Operating System 14 and Applications Auditing / Logging 14 Data-at-Rest & Data-in-Transit Security 15 Secure Device Management and Configuration 15 Policy Based Controls and Resource Management 15 Restricted Recovery Mode 15 Enhanced VPN Restrictions 15 Multi -Modes 16 Covert Mode 17 CATALOG | LEX L11 KEY FEATURES PAGE 3 AUDIO PERFORMANCE & FEATURES CATALOG | LEX L11 KEY FEATURES PAGE 4 AUDIO PERFORMANCE & FEATURES Noise Cancellation & Echo Cancellation PTT Audio Profile Mode Noise cancellation uses three microphones to pick up 360 PTT audio profile mode offers unique audio profiles, degrees of audio and advanced algorithms to monitor the optimized for use with the Motorola Solutions Broadband sounds, adjusting the integrated noise cancellation level to PTT application: best match your environment.
    [Show full text]
  • TC21/TC26 Touch Computer Specification Sheet
    PRODUCT SPEC SHEET TC21/TC26 TOUCH COMPUTER TC21/TC26 Touch Computer The ultimate cost-effective touch computer built for small and big business If you’re considering purchasing low-cost mobile phones for your workers, step up to the TC21/TC26 Touch Computers — without stepping up in price. All the right business features help your workers capture and access the data they need to act faster and more efficiently. The right rugged design delivers reliable operation, day in and day out. The right business class accessories makes the TC21/TC26 easier to use and easier to manage. With multiple configurations at different price points, you pay only for the features your workers need, including connectivity — the WiFi-only TC21 for workers inside the four walls or the WiFi/cellular TC26 for workers out in the field. Powerful complimentary Mobility DNA tools are pre-loaded and ready to use, making it easier to stage, secure and troubleshoot devices; capture and send data to your applications right out of the box; restrict access to features and applications; and more. And the Mobility DNA Enterprise License unlocks powerful tools that take workforce productivity and device management simplicity to a new level. Built for business Waterproof, dustproof, drops to concrete, snow, rain, heat, freezing cold — the TC21/TC26 can handle it all. And two of the most vulnerable device components are fortified with the Gorilla Glass — the display and the scanner exit window. All the wireless connections you could ever need When it comes to wireless, the class-leading TC21/TC26 offers it all — WiFi, cellular, Bluetooth, GPS and NFC.
    [Show full text]
  • EC30 Datasheet
    PRODUCT SPEC SHEET EC30 ENTERPRISE COMPANION EC30 Enterprise Companion The ultimate device for all of your unconnected workers For associates without mobile voice and data, the simple act of locating a supervisor to answer a question or looking up item availability can take minutes. Service quality is reduced. And you could lose sales when impatient customers walk away. Introducing the EC30, the right-priced mobile device with the right mobile connections for today’s unconnected associates. The EC30 is specially designed for portability — it’s small, lightweight and durable. Over 18 Zebra-only innovative Mobility DNA tools take ease of use, integration, deployment and everyday management to a new level, providing unmatched functionality and value. The EC30 delivers comprehensive voice capabilities — it’s a walkie-talkie and a cordless PBX handset (optional). Data capabilities include secure text messaging and 1D/2D barcode scanning. And you can leverage your current line-of business applications by selecting and extending features to improve task and inventory management, and more. The result? A fully connected and highly productive workforce. Maximum store operational efficiency. Superior customer service. And more sales. The EC30 — the perfect companion for your unconnected workforce. availability to replenishing inventory on the retail floor. Android provides instant familiarity. And with the EC30’s capacitive touch technology, workers can interact with applications using a finger — even with light gloves. No-cost instant push-to-talk (PTT) Get PTT services right out of the box with Mobility DNA’s PTT Express. With the press of a button, associates can instantly reach team members to answer customer questions, notify stockroom workers to bring an item to the sales floor or contact a manager for assistance.
    [Show full text]
  • A First Look at Unstable Mobility Management in Cellular Networks
    A First Look at Unstable Mobility Management in Cellular Networks Yuanjie Li Jiaqi Xu Dept. Computer Science Dept. Computer Science Engineering University of California, Los Angeles The Ohio State University Los Angeles, CA, USA Columbus, OH 43210 [email protected] [email protected] Chunyi Peng Songwu Lu Dept. Computer Science Engineering Dept. Computer Science The Ohio State University University of California, Los Angeles Columbus, OH 43210 Los Angeles, CA, USA [email protected] [email protected] ABSTRACT the 4G/3G/2G cellular network plays a pivotal role. To date, it is Mobility management is a prominent feature in cellular networks. the only deployed large-scale system that successfully offers wide- In this paper, we examine the (in)stability of mobility management. area, ubiquitous Internet access and mobility support. We disclose that handoff may never converge in some real-world A key MM function to 4G/3G/2G network is handoff, which mi- cases. We focus on persistent handoff oscillations, rather than grates the device from one serving cell (also known as base station) those transient ones caused by dynamic networking environment to another new one when necessary. The necessity is defined to sat- and user mobility (e.g., moving back and force between two base isfy versatile (sometimes conflicting) demands such as sustaining stations). Our study reveals that persistent handoff loops indeed pervasive network availability, offering seamless voice/data sup- exist in operational cellular networks. They not only violate their port, providing high-speed data service, balancing the traffic load design goals, but also incur excessive signaling overhead and data between cells, to name few.
    [Show full text]
  • ETSI TS 123 060 V3.6.0 (2001-01) Technical Specification
    ETSI TS 123 060 V3.6.0 (2001-01) Technical Specification Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); General Packet Radio Service (GPRS); Service description; Stage 2 (3GPP TS 23.060 version 3.6.0 Release 1999) R GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS 3GPP TS 23.060 version 3.6.0 Release 1999 1 ETSI TS 123 060 V3.6.0 (2001-01) Reference RTS/TSGS-0223060UR4 Keywords GSM, UMTS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.:+33492944200 Fax:+33493654716 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://www.etsi.org/tb/status/ If you find errors in the present document, send your comment to: [email protected] Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]