Traffic cases in GSM
December 15, 2016 | Author: kamal | Category: N/A
Short Description
GSM system operation and traffic cases...
Description
Wireless Networks
Unit 7
Unit 7
GSM System Operation and Traffic Cases
Structure: 7.1 Introduction 7.2 GSM System Operations Mobile Telephone Initialization 7.3 Traffic Cases in GSM Network The Mobile Station is in idle mode Roaming in the Network The mobile station is in active mode 7.4 Handover in GSM Network 7.5 Summary 7.6 Answers
7.1 Introduction In unit 6 you have learnt the process of data transmission in GSM network in TDMA format. The discussion of time division multiple access (TDMA) frame hierarchy used in GSM network is discussed. You have also learnt the use of channels in GSM network for transmitting managerial information and data traffic. It is seen how various identifiers in the GSM network facilitate the roaming of subscribers without any difficulty to locate and identify them. In this unit you will learn system operations of GSM network in order to provide services to GSM subscribers. The issues and challenges faced by any mobile network to support mobility are discussed with respect to GSM network. The methods adopted by the GSM network to maintain continuous conversations on movement are also discussed in this unit. The process of handover is also discussed at the end of the unit. Objectives: After studying this unit, you will be able to: explain operations supported by GSM network describe the process of handover describe various traffic cases explain security enhancement during conversation between two subscribers
Sikkim Manipal University
Page No. 101
Wireless Networks
Unit 7
7.2 GSM System Operations To provide services to the GSM subscribers there are various operations carried out by the system components. It has to identify authorize subscribers to use the GSM services, identify them when they request services, initiate a call to another subscribers and many more. The operations of GSM are discussed under few headings like initialization of a call or a mobile device, management of the connection during conversation, and ending the connection. For each case the system has to perform a set of tasks. In this section GSM system operations are discussed. 7.2.1 Mobile Telephone Initialization – is the process of obtaining information that is broad cased from the mobile system that identifies how the mobile device should access the system. There are three main goals of the mobile initialization procedure: 1. Frequency synchronization 2. Timing synchronization 3. Overhead information acquisition Frequency Synchronization: As the terminal is switched on, it scans over the available GSM RF channels and takes several readings of their RF levels to obtain an accurate estimate of the signal strengths. Starting with the channel with the highest level, the terminal searches for the frequency correction burst on the (Broadcast Control Channel) BCCH. If no frequency correction burst is detected, it then moves to the next highest level signal and repeats the process until it is successful. In this event, the terminal will then synchronize its local oscillator with the frequency reference of the base station transceiver. Timing Synchronization: After frequency synchronization has been achieved, the terminal will search for the synchronization burst for the timing information present on the SCH. If it is not successful, it then moves to the next highest level signal and repeats the process starting from the frequency synchronization procedure until it is successful. In this event, it moves to the BCCH (Broadcast Control Channel) to acquire overhead system information. Overhead Information Acquisition: After timing synchronization has been achieved, the terminal will search for overhead information on the BCCH. If the BCCH information does not include the current BCCH number, it will Sikkim Manipal University
Page No. 102
Wireless Networks
Unit 7
restart the mobile initialization procedure. In a successful event, the terminal will have acquired, from the BCCH and through the system information message present on the BCCH, the following main information: Country code Network code Location area code Cell identity Adjacent cell list BCCH (Broadcast Control Channel) location Minimum received signal strength The terminal checks if the acquired identification codes coincide with those in the SIM card. In a successful event, it will maintain the link and monitor the PCH. Otherwise, it will start a location update procedure. Details about PCH are available in unit 6 (section 6.3). Updating Location – is the process of sending a registration message to the system. A location update procedure is carried out in one of the following events: The terminal is switched on and verifies that the identification codes present on the current BCCH do not coincide with those in the SIM card. The terminal moves into a location area different from that within which it is currently registered. There has been no activity for a reestablished amount of time. As part of the process used to speed the paging procedure, location reports are used. These location reports are periodic reports used to update the location of the terminal so that, in the event of a page, the latest reported location is used as an initial guess to locate the terminal. The time span between location reports constitutes a system parameter whose value is indicated on the BCCH, varying in accordance with the network loading. The location update procedure starts with the uplink channel request message on the random access channel (RACH). The network answers with an immediate assignment message on the AGCH (Access Grant Channel) indicating the SDCCH (Standalone Dedicated Control Channel) number to be used throughout the location update procedure. The terminal moves to this SDCCH and sends a location updating request message with its identification (IMSI or, preferably, TMSI). An authentication procedure is Sikkim Manipal University
Page No. 103
Wireless Networks
Unit 7
then carried out. In case the authentication is unsuccessful, the procedure is aborted. In a successful event, the ciphering procedure is performed. The network then uses the location updating accept message to assign a new TMSI to the terminal. The terminal stores its TMSI and responds with a TMSI allocation complete message. The location update is concluded with a channel release message from the network to the terminal. The terminal then resumes its PCH monitoring procedure. Waiting for Calls (Idle) – is the process of waiting for call alerts or other messages. Cell Reselection – is the process of determining when a different cell site should be monitored. A MS listens for beacons, and if it detect one, it adds it to the active beacon kernel table. If the device determines that it needs to communicate via a new BS, kernel modulation initiates the handoff process. The MS locates the nearest BS via user-level processing. System Access – is the process of coordinating how to get the attention of the system and receive channel assignments. When a new mobile station tries to access the service of a BS, the BS performs the identity verification of the new user as a first step of the process. Then the BS searches the MSC with which the mobile user is registered. It also checks the billing information of the user and kind of access permission granted to the user by its home MSC. The home MSC sends an appropriate authentication response to BS currently serving the user and stored in corresponding VLR of serving MSC (two way pointers between HLR-VLR pairs). The BS at the visited location approves or disapproves user access. Mobile Call Origination – is the process of requesting access to the GSM system after a user has initiated a call. The terminal detects a useroriginated call. It then accesses the Random Access Channel (RACH) to send a channel request message. An immediate assignment with the number is sent by the network on the Access Grant Channel (AGCH). The terminal moves to this channel and the following occurs. The terminal transmits a paging response message indicating the reason for the specific message (call setup). The base station responds with an unnumbered acknowledgment message. An authentication procedure is carried out, as already described. In a successful event, a ciphering procedure is performed, as already described. Sikkim Manipal University
Page No. 104
Wireless Networks
Unit 7
The terminal then sends a setup message. The base station responds with a call confirmed message followed by an alerting message in which case the terminal applies the ring-b k .A p y’s p , the network sends an assignment command message informing the traffic channel number to be used for the conversation. The subscriber, still on the SDCCH, responds with an assignment acknowledgment message and moves to the traffic channel that has been assigned. The network confirms the acceptance of the call by the other party by means of a connect acknowledgment message on the FACCH of the assigned TCH. And the conversation proceeds on the TCH. Transferring Calls Between Call Sites – is the process of identifying when a connection should be transferred to another cell site and coordinating the handover process. Mobile Assisted Handoff – is the process of transferring information (such as RF signal quality) from the mobile device to the system which can be used to assist in the transfer process. Receiving a Call on a Mobile Telephone – is the process of alerting a mobile device that an incoming call is waiting to be answered and connecting the audio path if the mobile user answers the call. The call is also switched from signaling to voice. Conversation Mode – is the process of maintaining an audio connection with a user during a call. MSC informs the BSS about the allocated voice circuit. Connected Mode – is the process of maintaining the availability of a device that is transferring bursts of data (packet data) on the network. Authentication – is the validation of the identity of the device through the use of security processes and secret information. An authentication procedure may be required at the location update procedure or at the request of a new service. The GSM encryption is shown in the figure 7.2, authentication procedure starts with the network sending an authentication request message to the terminal; the message conveys a 128-bit random number (RAND). The terminal uses the RAND, the secret key, Ki, stored at SIM, and the encryption algorithm, referred to as A3 (specifies the confidentiality algorithm), to compute a 32-bit number, referred to as a Sikkim Manipal University
Page No. 105
Wireless Networks
Unit 7
signed response (SRES). Another 64-bit key, the ciphering key, Kc, is computed using another encryption algorithm, referred to as A8 (specifies the confidentiality algorithm). The Kc parameter is later used in the ciphering procedure. After these computations, the terminal responds with an authentication response message, which contains the SRES. The network uses the same parameters and the same algorithm to compute another SRES. The terminal SRES and the network SRES are then compared with each other. If a match occurs, the network accepts the user as an authorized subscriber. Otherwise, the authentication is rejected.
Figure 7.1: Encryption for GSM
7.3 Traffic Cases in GSM Network The traffic cases specify the action taken either by the GSM network elements or by the mobile station to use the services provided by the network. Based on the position and status of the mobile user or the movement area of the mobile user there are various traffic cases available to address in GSM network. A description of each of these cases is given below. 7.3.1 The Mobile Station is in idle mode In this traffic case the mobile device is not in use. It may be either in the switch off mode or in a standby mode. In standby model the device consumes no or little power and performs no operation. If the mobile device is switch off mode then it has to perform some operation automatically when Sikkim Manipal University
Page No. 106
Wireless Networks
Unit 7
it is switched on. A mobile device on getting switched on performs the following operations: When a mobile station is about to go to the idle state then it executes an IMSI attach procedure which involves the following steps. 1. The mobile station sends an IMSI attach message to the network indicating that it has changed state to idle. 2. The VLR determines whether there is a record for the subscriber already present. If not, the VLR contacts the subs b ’s LR f py f subscription information. 3. The VLR updates the mobile stations status to idle. 4. Acknowledgement is sent to mobile station. When the mobile station is in switched off mode, it can change its location into a different location area. But when it powered on in the new area it has to update its location information with the VLR of the visiting network. The mobile station executes the IMSI attach procedure in order to update the location information with the VLR During IMSI attach, the VLR may determine that the current Location Area Identifier (LAI) of the station is ff f m LAI s M ’s subscription information. If so, the VLR updates the LAI of the MS. 7.3.2 Roaming in the Network Mobile stations move continuously in the cellular network. The HLR keeps track of all the mobile stations under its coverage and the VLR store the information of all visitor nodes in a location area. The ability to move around, changing cells and connections over the air interface for quality reasons is called roaming. The movement of the mobile station may lead to a location change either within the same LA or among different LAs. In both the cases different procedures are executed. Below each of such cases are discussed. Changing Cells within an LA: If a mobile station change its location from one cell to another within the same LA, the network need not update. Because all cells under the same LA share the same HLR/VLR. The mobile station can detect the LA of a particular cell by listening to the BCCH in the new cell. The BCCH broadcasts ’s LAI. T s compares the last LAI received with the new LAI. If they are the same, it means that the mobile
Sikkim Manipal University
Page No. 107
Wireless Networks
Unit 7
station has changed his location within the same LA and does not need to inform the network. Changing Location to different LA under same MSC/VLR: If an MS detects a change in LAI on the BCCH, it has to update the information stored in different network elements. On detecting a change in the LA, the mobile station sends location update information to the concerned VLR. On receipt of the location update request from the mobile station, the MSC/VLR s s b s f xs f m b s ’s f m . If the entry if found in the data base then it updates the existing information with new information received through the location update message, otherwise a new entry is made in the data base. The following steps are performed by the MSC/VLR to update the location information of the visitor mobile station. 1. On entering into a new cell, the mobile station listens to BCCH in the new cell and determines the LAI. The received LAI information is compared to the old one. If they differ, the mobile station initiates a location update procedure. 2. The mobile station uses the SDCCH to establish a connection with the network. Once the connection is established, it performs authentication procedure. 3. On successful completion of the authentication, the mobile station sends a Location Updating Request to the concerned MSC/VLR. 4. The MSC/VLR on receipt of the location update request send an acknowledgement to mobile station and release the signaling channel. Changing Location to different LA under different MSC/VLR: When a mobile station moves to a new LA under different MSC/VLR the location updating is performed. When the Location Update Request is received by the new VLR, it executes the procedure as given below. 1. The VLR verify the authenticity of the location update request as a first step of the location update process. If authentication is successful, the VLR checks its database to determine whether or not it has a record for this mobile station. 2. If the VLR do not find any record for the new mobile station, it sends a qu s subs b ’s LR f py f mobile stations subscription information. Sikkim Manipal University
Page No. 108
Wireless Networks
Unit 7
3. The HLR passes the information to the VLR and updates its location information for the subscriber. The HLR sends a request to the old VLR to delete the information about the mobile station. 4. The VLR stores its subscription information for the MS including the latest location and status. The VLR sends acknowledgement to the mobile station. Periodic Location Update or Periodic Registration: Apart from the location update cases discussed above, the mobile station also has to update its location information with the concerned location registers. If a mobile station does not perform such periodic location update with the system, the network marks the mobile station as detached. This may occur if a station is out of the coverage for long time. Sometimes the network elements also initiates periodic registration through the BCCH and also specifies how often periodic registration must be performed. Periodic registration has an acknowledgment message. The mobile station tries to register until it receives this message. Detaching the mobile station from the Network: IMSI detach enables the mobile station to indicate to the network that it is switched off. At power off, the mobile station sends an IMSI detach message to the network. On reception of the detach message, the VLR marks the corresponding IMSI as detached. The HLR is not informed. No acknowledgement is sent to the mobile station. Implicit Detach: Sometimes the mobile station cannot respond to the explicit IMSI detach process due to poor quality of the radio link. In that case the system might not be able to be detached from the network. The VLR then performs an implicit detach procedure to mark the mobile station as detached from the network. MS Purging: The VLR stores information regarding the visitor mobile stations. It is very obvious as due to movement of the mobile station it changes its VLR from one to another. When a VLR notices that a particular mobile station is not under its coverage area then it decides to purge the information from its data base regarding the station. Before purging the information regarding any mobile station the VLR informs the HLR of the station that the VLR is about to remove a subscriber record from its own Sikkim Manipal University
Page No. 109
Wireless Networks
Unit 7
database. The HLR then sets the mobile station purged flag and treats the subscriber as unreachable. 7.3.3 The mobile station is in active mode If a mobile station is not in idle mode then it may have any ongoing conversation. In this case the mobile station is said to be in active state. When it is in active state, it may be engaged in a call, or may be in a state of call setup process. Based on these scenarios the following traffic cases are described for active mode of a mobile station. Call from a mobile station: The first traffic case in the active mode of the mobile station is considered where the mobile station is making a phone call to a PSTN subscriber. In order to initiate a call the mobile station performs the following procedure stepwise: 1. It (the mobile station) uses the RACH to request a signaling channel for the base station. 2. The BSC on request and availability allocates a signaling channel to the mobile station using AGCH. 3. The station then sends a call setup request using SDCCH to the MSC or VLR. 4. The MSC/VLR instructs the BSC to allocate an idle TCH. The mobile station is informed to tune to the TCH allocated by the BSC. 5. The MSC/VLR forwards the dialed number to the concerned exchange in the PSTN, which establishes a connection to the subscriber. 6. If the PSTN subscriber answers, the connection is established. Call to a mobile station: The second traffic case in active mode of the mobile station is calling a mobile station by a PSTN subscriber. The major difference between the first and the second case is that, in a call to a mobile station the exact location of the mobile subscriber is not known at the time of requesting the call setup. So, the mobile station needs to be searched using paging before a connection can be established. Below is the procedure that is been followed by different components of the network to complete a call from the PSTN subscriber to a mobile station. 1. The PSTN subscriber dials the mobile telephone number using Mobile Station ISDN number (MSISDN). A connection request is made to the mobile stations home GMSC (Gateway Mobile Switching Centre). Sikkim Manipal University
Page No. 110
Wireless Networks
Unit 7
2. The home GMSC finds the respective HLR of the called mobile station and sends a query to the HLR for information about the serving MSC/VLR of the called mobile station. 3. The HLR translates MSISDN into IMSI, and determines which MSC/VLR is currently serving the MS. 4. The HLR requests a Mobile Subscriber Roaming Number (MSRN) from the serving MSC/VLR of the called mobile station. 5. The MSC/VLR returns an MSRN via HLR to the GMSC. 6. The GMSC routes the call to the concerned MSC/VLR. 7. The MSC/VLR searches its record to find the current LA of the mobile station and a paging message is sent to the BSC of the controlling the LA. 8. The B
’s uses PCH to page the mobile station.
9. When the mobile station detects the paging message, it sends a request on RACH for a SDCCH. 10. The BSC provides a SDCCH via AGCH. 11. The MSC/VLR instructs the BSC to allocate an idle TCH to the mobile station and the mobile station is informed to tune to the TCH. If the mobile subscriber answers, the connection is established. Self Assessment Questions 1. When a mobile station is about to go to the idle state then it executes an IMSI attach procedure. (True/False) 2. The ____________ store the information of all visitor nodes in a location area. 3. The mobile station listens to ______________ in the new cell and determines the LAI. 4. The mobile station uses ____________ to establish a connection with the network. 5. Network elements may initiates periodic registration through the BCCH. (True/False) 6. The mobile station uses ____________ to request a signaling channel for the base station.
Sikkim Manipal University
Page No. 111
Wireless Networks
Unit 7
7. The mobile station sends a call setup request using __________ to the MSC or VLR. 8. The PSTN subscriber dials the mobile telephone number using MSISDN. (True/False)
7.4 Handover in GSM Network During the movement of the mobile station it changes its cell and Location Area (LA). For each of the cell change the station may need to update its location information in the network. In the discussion made above we have seen few scenarios of changing cell and LA by the mobile station and the actions taken by the network or by the station as a reaction to cell changing process. However, we have not discussed anything about the cell change process during a conversation between any two subscribers on the move. In this section the cell changing process of a mobile station during ongoing conversation is discussed briefly. The process of changing cells during an ongoing conversation is called handover or handoff in GSM terminology. The mobile station always measures the strength of the received signal while it is on move. Because based on the signal strength the station can discover a cell change and appropriate action against handover. This type of handover where the mobile station takes the initiative to perform a handover is called Mobile Assisted Handover (MAHO). A mobile station continuously measures the signal strength and quality of its current cell and neighboring cell on the BCCH carriers. The measurements are carried out on the downlink while the station is in active mode. The measured results are sent to the radio base station (RBS) on SACCH at regular intervals. The concerned RBS measures signal strength and quality on the uplink channel. In the measurements are sent to the BSC in the form of measurement reports. Based on these received report the BSC takes the decision to perform handover or not to perform handover. If handover is required then the BSC also decides the cell to which the mobile station to be handed over. This process of deciding the handover and the required cell is called locating. As soon as a neighboring cell is considered to be better than the serving cell, a handover is attempted. Handover can also happen when the Timing Advance (TA) used by mobile station exceeds a threshold value set by the operator. Sometimes handover is initiated for balancing load between two neighboring cells. If a mobile station resides in a congested Sikkim Manipal University
Page No. 112
Wireless Networks
Unit 7
cell and initiates a call setup, it can be transferred to a nearby cell with less traffic. Provided an acceptable connection quality is likely to be obtained in the new cell. Such forced handover is also noticed in during the maintenance process of the network. In such situation all channels are released from traffic if required. There are several types of handover found in GSM network. These handovers are classified as handover takes place between two cells controlled by the same BSC or handover between two cells con by ff B ’s, bu the under same MSC/VLR or Handover between cells controlled by different MSC/VLRs. There exist a special handover called intra-Cell Handover exists in GSM network. It occurs when the BSC detects that the quality of the channel currently connecting the mobile station is too low, but there is no indication of any existing nearby cell with sufficiently strong signal. In that case the BSC selects another channel in the same cell with better signal quality, and the mobile station is ordered to retune to the new channel. A brief description of various handover processes are discussed below. In each case it is assumed that the decision to perform a handover has already been made and a target cell has been identified. Handover between two cells of the same BSC: To perform a handover between two cells of the same BSC, the MSC/VLR is not involved in the process. However, they are informed that the handover has taken place. If v v v s ff LA’s, up e is performed after completion of the ongoing call. To complete the handover process the following steps are carried out. 1. The BSC instructs the new RBS to activate a TCH. 2. The BSC sends a message to the mobile station to the old RBS using FACCH. The message contains information about the frequency and time slot to be used by the mobile station. 3. On receipt of the message the mobile station tunes to the new frequency, and transmits handover access bursts in the allotted time slot. 4. When the new RBS detects the handover bursts, it sends information about TA via FACCH. 5. The mobile station sends a Handover Complete message to the BSC through the new RBS. 6. The BSC informs the old RBS to release the old TCH. Sikkim Manipal University
Page No. 113
Wireless Networks
Unit 7
Handover between two diffe B ’s bu u s m M /VLR: I this case the following procedure is executed, and shown in the figure 7.3. 1. The current BSC of the mobile station sends a Handover required message to the MSC containing the identity of the target cell to which the handover will take place. 2. The MSC detects the BSC of the target cell and sends a Handover Request to it. 3. The new BSC instructs the target RBS to activate a TCH. 4. The new BSC sends a message to the mobile station via the MSC and the old RBS. 5. The mobile station then tunes to the new frequency and transmits handover access bursts in the allotted time slot. 6. When the new RBS sends information about TA the mobile station sends a Handover Complete message to MSC via the new BSC. 8. MSC sends the old BSC an instruction to release the old TCH. 9. The old BSC tells the old RBS to release the TCH.
Figure 7.2 : Inter-BSC handover Sikkim Manipal University
Page No. 114
Wireless Networks
Unit 7
Handover between s by ff M ’s: The procedure to perform handover is given below, and shown in the figure 7.4. 1. The current BSC of the mobile station sends a Handover required message to the serving MSC along with the identity of the target cell to which the mobile station to be handed over. 2. MSC identifies the MSC of target cell communicated through the Handover required sends a handover initiation request. 3. The new MSC allocates a handover number to reroute the call and send a Handover Request new BSC of the new MSC. 4. The new BSC instructs the target RBS to activate a TCH. 5. The old MSC on receipt of the information passes it on to old MSC together with the handover number. 6. A link is established to new MSC. 7. The old MSC sends a handover command to the mobile station via the old BSC. 8. The mobile station tunes to the new frequency and transmits handover access bursts in the allotted time slot.
Figure 7.3: Inter-MSC handover
Sikkim Manipal University
Page No. 115
Wireless Networks
Unit 7
Self Assessment Questions 9. The BSC provides a SDCCH via AGCH. (True/False) 10.
The process of changing cells during an ongoing conversation is called handover or handoff in GSM terminology. (True/False)
11. This type of handover where the mobile station takes the initiative to perform a handover is called _________ ____________. 12.
A mobile station continuously measures the signal strength and quality of its current cell and neighbouring cell on the BCCH carriers. (True/False)
13. When the new RBS detects the handover bursts, it sends information about TA via FACCH. (True/False) 14. When a mobile station is about to go to the idle state then it executes an IMSI attach procedure. (True/False) 15. The _____________ store the information of all visitor nodes in a location area.
7.5 Terminal Questions 1. Explain system operations of GSM in details? 2. Briefly explain various traffic cases in GSM network? 3. What do you understand by the term handover in GSM network? Briefly explain the handovers in GSM network?
7.6 Summary We have discussed the GSM system operations and different traffic cases in this unit. To support users in GSM network the system components has to perform various tasks. The device and call initialization, connection management, and ending a call are main operations performed by a GSM network. Due to the movement of user in the network, the subscriber changes their locations vary frequently. This change of location during an ongoing call is called handover. Maintaining a uninterrupted call during handover is a challenging task in mobile network. To accomplish this task the network maintains the location information of the entire subscriber in the network. Various traffic cases leads to update different levels of registers maintained by the GSM system. Describe various traffic cases. Authenticating a subscriber before providing a GSM service to it is another essential task carried out by the network. Along with the identity verification, Sikkim Manipal University
Page No. 116
Wireless Networks
Unit 7
the system also checks the authorized services for the subscriber before serving any mobile user.
7.7 Answers Self Assessment Questions 1. True 2. The VLR 3. BCCH. 4. the SDCCH 5. True 6. the RACH 7. SDCCH 8. True. 9. True 10. True 11. Mobile Assisted Handover (MAHO). 12. True 13. True 14. True 15. VLR Terminal Questions 1. Answer to provide services to the GSM subscribers there are various operations carried out by the system components. It has to identify authorize subscribers to use the GSM services, identify them when they request services, initiate a call to another subscribers and many more. Refer to section 7.2. 2. Answer. The traffic cases describe the action taken either by the GSM network elements or by the mobile station to use the services of the network. Based on the movement pattern and status of the mobile user or the movement area of the mobile user there are various traffic cases available in GSM network Refer to section 7.2. 3. Answer. The process of changing cells during an ongoing conversation is called handover or handoff in GSM terminology. The mobile station always measures the strength of the received signal while it is on move. Sikkim Manipal University
Page No. 117
Wireless Networks
Unit 7
Because based on the signal strength the station can discover a cell change and appropriate action against handover. For rest of the answer refer to section 7.4. References Second Edition, Tata McGraw Hills, 1995. Michel Daoud Yacoub, Wireless Technology, CRC Press, 2002. Dharma Prakash Agarwal, Introduction to Wireless Communication, Second Edition, Thomson Learning 2007. E-References http://www.scribd.com/doc/6606382/Traffic-Cases http://www.ericsson.com/hr/services/competence/course_gsm/LZU_108 _852_en.pdf
Sikkim Manipal University
Page No. 118
View more...
Comments