首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 281 毫秒
1.
TETRA移动性管理功能实体概述   总被引:2,自引:0,他引:2  
用户的移动性和对移动性的自动管理是移动通信网络的基础,因此移动性管理(MM)是移动通信网络中必不可少的逻辑功能。本文主要介绍了TETRA集群通信系统空中接口第三层移动性管理功能实体的主要功能和进程,并给出了部分重要进程的简要流程图。  相似文献   

2.
移动性管理功能的作用是为了持续追踪UE的当前位置并提供持续的接入服务。该功能分为两大类:空闲状态的移动性管理和连接状态的移动性管理,在移动通信系统中有非常重要的作用。本课题的主要内容为LTE系统内连接状态下的移动性管理功能,重点为E-UTRAN内切换。  相似文献   

3.
郭洋  田永春  郭伟 《信息技术》2004,28(10):96-100
介绍了个人移动通信系统(PCS)中移动性管理的基本概念,从移动性管理的总体框架、位置管理和切换管理两个主要功能流程方面阐述了PCS中移动性管理的体系结构及移动性管理的实现。详细描述了常见的位置管理方法和切换管理方法及这两方面的改进措施,并对几种PCS中的移动性管理机制进行了分析比较,最后给出了结论。  相似文献   

4.
黄贵微 《通信世界》2007,(11):39-40
一、引言 在GSM网络中,移动性管理的功能由MS和NSS来处理;在UMTS网络中,移动性管理的大部分功能由UE的非接入层和CN来执行,同时还有一部分功能是由UTRAN中的RRC子层来执行,因此对应的UE接入层的RRC子层也必须具备相关的移动性管理功能.  相似文献   

5.
随着智能手机及其应用的快速发展,以用户为中心的移动性管理成为未来移动互联网络面临的挑战。文章从过程、功能和不同实现方式的角度分析移动性管理技术的机理;在此基础上,研究未来移动互联网络对分布式新型移动性管理架构的需求及移动性管理架构的特点,介绍一种基于SDN的移动性管理架构,并探讨未来移动性管理的一些研究方向。  相似文献   

6.
文章首先介绍了LTE网络下的移动性管理功能,然后对用户的移动性管理状态进行了描述,并用图形法描述了LTE移动状态之间的转移,最后分别对空闲状态、连接状态和3GPP无线接入系统之间的移动性管理进行研究与分析,分析表明,提出的移动性管理机制能够解决移动通信网络的安全性、可靠性和端到端的QoS保证。  相似文献   

7.
移动性管理是移动通信领域的热点研究内容。在未来的通信中,对于多种接入网并存、大量终端要求接入的情况下,移动性管理本身面临巨大的挑战。首先对移动性的概念从基础和功能两方面进行了介绍,然后针对LTE系统内部的移动性管理作了整体描述,接着以切换流程为重点进行了研究,最后介绍了数据转发、无损切换等几个关键处理过程。  相似文献   

8.
廖明  胡灵光 《中国新通信》2008,10(21):17-21
SIP协议的一个重要功能是支持移动性管理,包括终端、会话、个人和服务移动性功能。GSM网络的终端移动性存在与SIP协议描述的功能具有相似处,结合GSM的网络元素,本文最后提出在GSM网络中融进SIP网络元素。并在最后描述了简单的终端发送请求消息的流程。  相似文献   

9.
柳蕾 《电信快报》2003,(3):9-11
1GPRS网络中移动性管理的内容和功能用户的移动性和对移动性的自动管理是移动通信网络的基础,因此移动性管理(MM)是移动通信网络中必不可少的逻辑功能。在GSM网络中,MM主要体现在对用户状态和位置数据的管理。GPRS是GSM网络的升级,GPRS的MM在内容上继承了GSM的基本特征,即通过对用户状态和位置数据的管理来支持用户的移动性。同时,GPRS引入新的功能实体(SGSN和GGSN),具有支持随时在线等业务特征,GPRS的MM具有下述特点:(1)MM的相关信息主要存储在SGSN和MS终端中,同时HLR和GGSN中也有相关内容。(2)空闲/就绪/守候三种…  相似文献   

10.
RAN的全IP化是UMTS实现全IP架构过程的一部分。在RAN中,最重要的功能之一就是移动性管理。原有的基于ATM的移动性管理技术在全IP的RAN架构中并不适用。在分析全IP的RAN架构中对移动性管理的新的要求基础上,提出了结合MPLS技术和移动IP技术来解决移动性管理的新的开放的应用架构,并且描述了在这种应用架构下移动IP的协议过程;简要分析了这种应用架构带来的好处,提出还需要改进的地方和实现的技术难点。  相似文献   

11.
The characteristics of first, second and third generation mobile communication systems are first described. The state of standardisation of the universal mobile telecommunication system (UMTS) is then outlined and the system concept is introduced. A mobility management platform which will provide uniform access to mobility functions for every user or network entity independent of the actual location of the requested function in the network is described. The mobility management platform is based on the intelligent network concept. Mobility management aims to share the processing load in the distributed UMTS environment  相似文献   

12.
Yabusaki  M. Okagawa  T. Imai  K. 《Communications Magazine, IEEE》2005,43(12):supl.16-supl.24
The mobile telecommunication network is morphing into an All-IP mobile network with diversified radio access systems. The All-IP mobile network should be established by converging the mobile telecommunication network and the fixed Internet. This article opens a debate on whether mobility management should be implemented as end-to-end intelligence or network intelligence.  相似文献   

13.
The development of radio networks has brought the problem of security specifically related to mobility of terminals sharply into focus, and has created the need for radio network operators to implement new security functionalities. The security level of the analog radio mobile systems (the so-called “first generation ” systems was very low, and these systems were often exposed to massive fraud. The development of digital radio mobile systems (the so-called “second generation” systems: GSM, DECT,. allowed the systematic introduction of cryptology based protection mechanisms. Hence, for gsm networks for instance, the main fraud and confidentiality problems were taken into account at the design stage and a security architecture was implemented to provide security services to users and network operators. The third generation mobile telecommunication systems belonging to the imt- 2000 family (which are still under specification within standardisation bodies in particular within the 3gpp worldwide third generation partnership project) will, in the forthcoming years, provide a wide variety of services on a single terminal in a multi-environment (domestic, public, business), multi-operator, and multi-service provider context. Security will be based on second generation systems security functions that have proved to be needed and reliable, and shall be adapted and improved to resolve security threats underlying to new services supplied by third generation radio systems. This document presents examples of security solutions currently implemented for protecting second generation radio mobile systems against frauds and attacks and gives an overview of potential solutions for protecting future third generation radio mobile telecommunication systems.  相似文献   

14.
TD-SCDMA/GSM双模系统两模式间小区选择的研究   总被引:1,自引:1,他引:0  
TD-SCDMA技术是中国具有自主知识产权的第三代移动通信技术.从中国移动通信的发展现状看,在中国,未来TD-SCDMA网络将和GSM网络长期并存,而小区选择是移动终端能够成功驻留在合适的小区并保证呼叫成功率的重要功能,同样也是不同无线通信系统间的主要互操作行为之一.文中根据协议给出TD-SCDMA/GSM双模终端软件结构图,对TD-SCDMA/GSM双模系统两模式间小区选择问题进行了深入的探讨,并对两模式间小区选择建立过程模型.  相似文献   

15.
The universal mobile telecommunication system (UMTS) will implement terminal mobility and a form of personal mobility limited to UMTS. The most essential procedures to provide this are related to user registration, location management, handover and security. These mobility procedures are specified using specific functional models. In these models, the required functions are identified and the distribution of the functions in the network is anticipated. In a next step, the specific models are mapped onto a generic functional model. This generic model can be considered as the integration and unification of the specific models. Its structure reflects two important implementation aspects. First, the integration of UMTS into future networks for fixed telecommunications is anticipated. Secondly, the application of the intelligent network architecture for the implementation of the UMTS mobility procedures and service provision is assumed  相似文献   

16.
3G系统网络接入的安全构架   总被引:1,自引:0,他引:1  
王弈  谷大武等 《通信技术》2001,(7):68-70,86
在介绍第三代移动通信系统网络接入的安全构架的基础上,分析了3G系统的优势,并讨论了3G系统中有待进一步研究的问题。  相似文献   

17.
1 Introduction Wirelesstelecommunicationsstartedasanoffshootofwiredtelephony .Recently ,theglobalwirelessindustryhascreatedtwopartnershipprojects,oneisthe 3rdGenerationPartnershipProject ( 3GPP) [1 ] ,whichisdeveloping 3GstandardsforGSMbasedsystems[2 ] ;theotheristhe 3rdGenerationPartner shipProject 2 ( 3GPP2 ) [3] ,whichisdeveloping 3GstandardsforIS 95basedCDMAsystems.Inordertoimprovedatacapabilities,3GPPand 3GPP2workon 3Gwidebandradiotechnologiesthatcanprovidehigherdatarates.No…  相似文献   

18.
描述了第三代移动通信中的无线网络控制器的一种设计方法。从建立系统概念构架和业务模型开始,通过将业务模型应用到具体构架中而得到单板的设计边界条件,然后进行测试和评估,最后确定具体的软、硬件方案。该方法对于设计一个高性能、高质量、高效率的产品系统具有很好的借鉴意义。  相似文献   

19.
Session-based Internet protocol (IP) applications, such as Internet telephony, are an important component of the emerging mobile Internet. The ubiquitous availability of these services is critical to the success of the mobile Internet. Because all-IP networks will be deployed in phases and current mobile telecommunication systems will be in operation for decades to come, the interworking and migration between current network services and all-IP services is a key problem. In this paper, we address seamless roaming for session initiation protocol-based services across current cellular telecommunication networks and emerging all-IP wireless networks, such as those using third-generation and WiFi networks. We present an abstract mobility model, and map this model to three basic approaches for supporting seamless mobility: a master-slave approach, a federated system, and a unified approach. We discuss the challenges and implementation of an instance of the unified mobility management approach, called the Unified Mobility Manager, and then compare the tradeoffs of the three systems using a comparative performance analysis. We conclude that unified mobility management is most efficient if a great deal of interworking is required, and as more users invoke IP-based services; the federated approach is efficient when a single network technology is dominant and data access is limited, but requires sharing of data across networks; the master-slave approach is the least efficient, but is easy to introduce if the number of network types is small.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号