Académique Documents
Professionnel Documents
Culture Documents
System Description
EBBD-014116
Ed. 00
10. 2002.
COPYRIGHT
This manual is proprietary to SAMSUNG Electronics Co., Ltd. and is protected by copyright. No
information contained herein may be copied, translated, transcribed or duplicated for any
commercial purposes or disclosed to third parties in any form without the prior written consent of
SAMSUNG Electronics Co., Ltd.
TRADEMARKS
SDX-MSC II is registered trademark of SAMSUNG.
Product names mentioned in this document may be trademarks and/or registered trademarks of
their respective companies.
This manual should be read before the installation and operation, and the operator should correctly install
and operate the system by using this manual.
This manual may be changed for the system improvement, standardization and other technical reasons without prior
notice.
For further information on the updated manual or have a question the content of manual, contact Document Center at
the address below .
Address : 442-742 Document Center 2th Fl. IT Center. 416 Metan-3dong Paldal-gu, Suwon-si, Gyeonggi-do,
Korea
e-mail : manual@samsung.com
Or contact Call Center at the telephone below if you have any questions or concerns regarding the operation of your
system.
Phone : 81-1588-4141
http://www.samsungnetwork.com
2002 SAMSUNG Electronics Co., Ltd. All rights reserved.
INTRODUCTION
Purpose
This description explains the functions, features and configuration of the switching
function on the CDMA network.
Audience
This description is written for an engineer who requires an understanding of the
SDX-MSC II system operator and SDX-MSC II system.
Page I
Introduction
Page II
Hardware type, function and detailed configuration that perform the control.
Hardware type, function and detailed configuration that perform the switching.
Hardware type, function and detailed configuration for performing the network
synchronization.
Hardware type, function and detailed configuration for performing the trunk and
subscriber interface.
Hardware type and function for performing other systems
Introduction
This chapter describes the call processing and mobile management of the SDX-MSC
II.
Subscriber classification, number system and number decoding procedure.
Routine outline, routine method and routine application.
Authentication and encryption procedure.
Outline of location registration, type and procedure.
Mobile call control and call processing.
Type and procedure of handoff.
Call processing in status of overload.
Chapter 5. Operation and Maintenance
This chapter describes the operation and maintenance of the SDX-MSC II.
Billing/Charging.
Statistics.
Network management and overload control.
Chapter 6. Supplementary Service
This chapter describes the supplementary service provided in the SDX-MSC II.
Supplementary type and outline.
Supplementary service and outline.
Alternative performance among service.
Chapter 7. VLR
VLR.
Data types stored in the VLR.
Performance in the VLR.
Page III
Introduction
Page IV
Introduction
Conventions
The following special paragraphs are used in this document to point out information.
This information may be set-off from the surrounding text.
NOTE
Indicates additional information as a reference
Revision History
EDITION
DATE OF ISSUE
REMARKS
00
10.2002
First Draft
Page V
Introduction
Page VI
TABLE OF CONTENTS
INTRODUCTION
Purpose................................................................................................................................. I
Audience................................................................................................................................ I
Document Content and Organization.....................................................................................I
Conventions......................................................................................................................... III
Revision History................................................................................................................... III
1.2
1.3
1.4
1.5
Page VII
Table of Contents
1.6
1.7
1.8
1.9
2.2
2.3
2.4
2.5
3.2
3.3
LRP Block.................................................................................................................. 26
MP ....................................................................................................................... 2-28
5.2
PP
5.3
....................................................................................................................... 2-29
Others............................................................................................................................. 2-32
6.1
6.2
6.3
Page VIII
Table of Contents
1.2
1.3
2.2
Page IX
Table of Contents
3.2
Authentication......................................................................................................... 4-10
3.3
Encryption............................................................................................................... 4-12
Introduction............................................................................................................. 4-13
4.2
4.3
Location Registrations.............................................................................................4-15
5.2
5.3
Handoff........................................................................................................................... 4-21
6.1
6.2
Handoff Classification.............................................................................................4-23
Billing/Charging............................................................................................................... 5-1
1.1
1.2
1.3
1.4
1.5
1.6
Statistics........................................................................................................................... 5-6
2.1
2.2
Audit............................................................................................................................... 5-13
Page X
Table of Contents
Page XI
Table of Contents
Functions.......................................................................................................................... 7-4
ABBREVIATION
A ~ C................................................................................................................ Abbreviation-1
D ~ E................................................................................................................ Abbreviation-3
G ~ F................................................................................................................ Abbreviation-4
L ~ M................................................................................................................ Abbreviation-5
N
................................................................................................................ Abbreviation-6
O ~ R............................................................................................................... Abbreviation-7
S
................................................................................................................ Abbreviation-8
................................................................................................................ Abbreviation-9
U ~ X.............................................................................................................. Abbreviation-10
Page XII
Table of Contents
LIST OF FIGURES
Figure 1.1 Shape of the SDX-MSC II...............................................................................1-1
Figure 1.2 Mobile communication network configuration.................................................1-4
Figure 1.3 Configuration of the SDX-MSC II....................................................................1-9
Figure 2.1 ASS architecture............................................................................................. 2-3
Figure 2.2 Diagram of DTI Block Mounting......................................................................2-4
Figure 2.3 Diagram of PRI block mounting......................................................................2-5
Figure 2.4 Diagram of SLI block mounting.......................................................................2-6
Figure 2.5 Diagram of TSL block mounting......................................................................2-7
Figure 2.6 Diagram of DSC block mounting.....................................................................2-9
Figure 2.7 Diagram of FPH block mounting...................................................................2-10
Figure 2.8 Diagram of S7H block mounting...................................................................2-11
Figure 2.9 Diagram of MVQT block mounting................................................................2-12
Figure 2.10 ASP/ASPP block mounting..........................................................................2-13
Figure 2.11 INS Structure...............................................................................................2-15
Figure 2.12 Diagram of SSL block mounting..................................................................2-16
Figure 2.13 Diagram of CIN block mounting...................................................................2-18
Figure 2.14 Diagram of NES block mounting..................................................................2-19
Figure 2.15 Diagram of INP block mounting...................................................................2-20
Figure 2.16 Diagram of INPP block mounting.................................................................2-21
Figure 2.17 CCS Architecture......................................................................................... 2-22
Figure 2.18 Diagram of OMP block mounting.................................................................2-23
Figure 2.19 Diagram of APC block mounting..................................................................2-24
Figure 2.20 Diagram of CCPP block mounting...............................................................2-25
Figure 2.21 Diagram of LRS Structure............................................................................2-26
Figure 2.22 Diagram of LRP block mounting..................................................................2-26
Figure 2.23 Structure of the MP and OMP......................................................................2-28
Figure 2.24 PP Structure................................................................................................ 2-29
Figure 2.25 SDX-MSCII Processor Configuration...........................................................2-29
Figure 3.1 Software Functions Structure..........................................................................3-3
Figure 4.1 The numbering system of mobile communication subscribers........................4-1
Figure 4.2 Generation of Identity & Authentication and Encryption Data.......................4-10
Page XIII
Table of Contents
Page XIV
Table of Contents
LIST OF TABLES
Table 1.1 Relation between rack, subsystem and function block mounting...................1-10
Table 2.1 Configurations and functions of the DTI block..................................................2-4
Table 2.2 PRI block configuration and functions..............................................................2-5
Table 2.3 SLI block configuration and functions...............................................................2-6
Table 2.4 TSL block configuration and functions..............................................................2-8
Table 2.5 DSC block configuration and functions.............................................................2-9
Table 2.6 FPH block configuration and functions...........................................................2-10
Table 2.7 S7H block configuration and functions...........................................................2-11
Table 2.8 MVQT block configuration and functions........................................................2-12
Table 2.9 ASP/ASPP block mounting and functions.......................................................2-13
Table 2.10 SSL block configuration and functions...........................................................2-17
Table 2.11 CIN block configuration and functions...........................................................2-18
Table 2.12 NES block configuration and functions..........................................................2-19
Table 2.13 INP block configuration and functions...........................................................2-20
Table 2.14 INPP block configuration and functions.........................................................2-21
Table 2.15 OMP block configuration and functions.........................................................2-23
Table 2.16 APC block configuration and functions..........................................................2-24
Table 2.17 CCPP block configuration and functions.......................................................2-25
Table 2.18 LRP block configuration and functions..........................................................2-27
Table 5.1 Disk Capacities................................................................................................. 5-3
Table 6.1 Interactions between Service Functions...........................................................6-9
Page XV
CHAPTER 1
SDX-MSC II Introduction
Page 1-1
CHAPTER 1
1
The MSC is placed at the center of the mobile communication network and
interworks with other networks (i.e. PSTN, PLMN, PSPDN and Internet, etc).
The MSC interfaces with the Base Station Controller (BSC) to transmit and receive
signals and voice data to and from the mobile communication terminals.
In addition, the MSC exchanges information with Home Location Register (HLR) and
Visitor Location Register (VLR) which store the subscribers information.
Base Station Controller (BSC)
The BSC interfaces with several Base Station Transceiver Systems (BTSs) and
provides a handoff process among the cells, call control and BTS operation and
maintenance, etc. The BSC and the MSC interface through the No. 7 link.
Base Station Transceiver System (BTS)
The BTS communicates with the Mobile Station (MS) in the cell(the area on which
the BTS has influence) over the radio system, and provides subscribers with mobile
communication services. The BTS performs coding and decoding of radio channels
to transmit and receive radio signals to and from the MS. To provide good quality and
economical radio calls to the subscribers, the BTS controls the transmitting and
receiving of signals intensity and measures the up-links quality, controls space
diversity, radio resources and maintains itself.
The VLR temporarily stores and controls all of the MS information, which exists in
the area controlling itself. When the mobile communication subscribers set calls, the
Page 1-2
The HLR is a database control system that stores and controls the subscribers
parameters and location information regarding all the MSs registered in its own area.
The HLR controls important data, such as terminals access capabilities, basic services
and supplementary services etc, and performs routing for the called party.
Page 1-3
The DCN interfaces with either the Internet or Packet Switched Public Data Network
(PSPDN) to provide the mobile communication subscribers with packet data services.
DCN consists of Packet Data Serving Node (PDSN), Packet Data Gateway Node
(PDGN) and Authentication, Authorization, Accounting (AAA) Server, etc.
Page 1-4
SDX-MSC II /Ed.00
1 . SDX-MSC II
PSTN
HLR
BSM
MSC
AIWF
BSC
BTS
PDSN
DCN
BTS
Internet
MS
MS
Page 1-5
The SDX-MSC II interfaces with the BSC to transmit and receive traffic data of the
mobile communication subscribers, and also interfaces with the PSTN, the ISIN and
PLMN, etc to transmit to and receive data from, other networks. In addition, the
SDX-MSC II interworks with the AIWF to process the circuit data calls. Accordingly,
the mobile communication subscribers can use modem based data communication
and fax Tx/Rx services.
Routing and Other Providers Roaming
Page 1-6
Page 1-7
Capacity
Max. 12
38,500 Erlang
VLR capacity
Telephony Specification
Classification
Dimensions
T-S-T
4K 6K
80K 80K
Controlling Method
Classification
Page 1-8
Controlling method
Controlling method
Distributed control
Processor
MC 68060, MC 68360
Programming language
CHILL, C
Interface Specifications
Classification
MSC/PSTN interface
MSC/MSC interface
MSC/BSC interface
MSC/HLR interface
MSC/IWF interface
MSC/AMPS interface
MSC/CAMA interface
MSC/OMC interface
MSC/WIN interface
Specifications
Digital interface
T1/E1
Signal specifications
CSS NO.7, R2
Digital interface
T1/E1
Signal specifications
IS-41C,D,E
Digital interface
T1/E1
Signal specifications
Digital interface
T1/E1
Signal specifications
IS-41D,E
Digital interface
E1
Signal specifications
Digital interface
T1/E1
Signal specifications
Digital interface
Dedicated Lines
Signal specifications
Digital interface
T1/E1
Signal specifications
CCS No.7(ISUP)
Digital interface
Dedicated Lines
Signal specifications
TCP/IP, TMN-Q3
Digital interface
T1/E1
Signal specifications
Equipment Specifications
Classification
Equipment dimensions
Rack dimensions
Page 1-9
Page 1-10
The SDX-MSC II control system has a multiplex processor structure with microprocessors
(2-layer hierarchy where the upper layer processor controls the lower layer
processor). The Main Processor (MP) performs the upper layer functions, such as
mobile communication call process, number translation, exchange controls, system
operation and maintenance, etc. The Peripheral Processor (PP) performs the lower
layer functions for real time processes, such as telephony monitoring, analysis and
signal process, etc.
The SDX-MSC II can easily add new functions and expand the capacity owing to the
distributed functions into the main and peripheral processors. Therefore, when some
functions fail, the SDX-MSC II can minimize the influence on other functions.
Parallel Processing Operation System
Page 1-11
Redundancy
Page 1-12
ASCR-T
SDX-MSC II
ASSASCR-
SDX-MSC II
ASCR-P
ASS-C
SDX-MSC II
SLIR
SDX-MSC II
ASCR-C
DTI
2
DTI
DTI
DTI
DTI
PRI
PRI
PRI
PRI
3
DTI
2
DTI
3
DTI
2
PRI
3
PRI
0
DTI
1
DTI
0Air Baffle 1
0Air Baffle1
DSC
DSC
TSL
(4K)
TSL
(4K)
S7H FPH
S7H FPH
ASP/ASPPX3
0Air Baffle 1
DSC
TSL
(4K)
SSWR
SDX-MSC II
DSC
SLI
(ASI:1024
)
ASP/ASPPX3
ASP/ASPPX3
LRS
SSWR
SDX-MSC II
CNIR
SDX-MSC II
CCS
LRIR
SSL 14
SSL 12
SSL 10
LRP
LRP
SSL 04
SSL 02
SSL 00
LRP
LRP
Air Baffle
Air Baffle
Air Baffle
SSL 13
SSL 11
SSL 03
SSL 01
CIN(IPC)
TSL
(4K)
S7H FPH
INS
SDX-MSC II
MV
QT
S7H FPH
ASP/ASPPX3
0Air Baffle1 1
Air Baffle
Air Baffle
SDX-MSC II
CCIR
APC
Air Baffle
LRP
LRP
CC INP
NESD PP P
X2
LRP
LRP
INP
SDUX3
LRP
LRP
OM
DKUX
PO
Page 1-13
Table 1.1 Relation between rack, subsystem and function block mounting
Name of rack
Subsystem a
Function blocks a
ASCR-W/T, T, P, C
ASS
SLIR
ASS
SLI, MVQT
SSWR
INS
SSL
CNIR
INS
SSL, CIN
LRIR
LRS
LRP
CCIR b
CCS
INS
a. For more information on the subsystem and function block, refer to Chapter 2 Hardware Architecture.
b. The DKU and SDU, which are auxiliary memory units, are also mounted on the CCIR.
Page 1-14
CHAPTER 2
Hardware Architecture
The SDX-MSC II consists of subsystems, such as the CCS, INS, LRS and ASS etc,
and each subsystem includes various function blocks.
Access Switching Subsystem (ASS)
The ASS performs the interfacing between the SDX-MSC II and external systems,
time switching, processing of most calls and number translating, etc.
The ASS is classified as follows depending upon the interface functions :
ASS-W/T(Access Switching Subsystem-Wireless Subscriber/Trunk) : BSC
interface and trunk line interface.
ASS-P(Access Switching Subsystem-Primary Rate Interface) : Interworking
Function(IWF) interface.
ASS-C(Access Switching Subsystem-Complex) : Analog system subscriber
interface, trunk line interface and IWF interface, etc.
Interconnection Network Subsystem (INS)
The INS connects each subsystem using space switches and performs centralized call
processing. In addition, the INS controls the Inter Processor Communication (IPC)
that is transmitted to and received from each subsystem, and generates and distributes
the system clock.
Central Control Subsystem (CCS)
The CCS performs operating and maintaining functions of the SDX-MSC II, such as
billing, statistics, configuration controlling, fault handling, storage and database
controlling, etc.
Page 2-1
The LRS stores and manages mobile communication subscriber information within the
MSC area concerned, and interworks with the HLR to authorize mobile
communication subscribers and to register locations.
The SDX-MSC II consists of one INS, one CCS, one LRS and up to 20 ASS.
Page 2-2
SDX-MSC II /Ed.00
2 .
ASS Architecture
The ASS consists of following function blocks :
Digital Trunk Interface (DTI) W T C
Primary Rate Interface (PRI) P C
Subscriber Line Interface (SLI) C
Time Switch & Link (TSL) W T C P
Digital Service Circuit (DSC) W T C P
Frame Relay & Packet Handler (FPH) W T C P
Signaling system No.7 protocol Handler (S7H) W T C P
Mobile Voice Quality Test (MVQT) C
Access Switching Processor/Access Switch Peripheral Processor (ASP/ASPP)
WTCP
Page 2-3
2 .
PSTN, BSC
D
T
I
SDX-MSC II /Ed.00
ASP
ASPP3
CDTIA 0
TDCMA A
P - Bus
MPDMA A
TD - Bus
CDTIA 7
Control TSL
D
S
C
T
S
L
DSVMB 0
IWF
P
R
I
IPCIA 0
IDCPA A
DSVMB 1
SMDXA
0A
Wire
subscriber
CALIA 31
SCCIA A
RSGUA A
DSCMA 1
DSMSA 0
0B
DSMSA 2
DSDTA
OTRMA A
F
P
H
1B
FPHCA 0
FPHCA 4
FPRCA A
S
7
H
SSPHA 0
SSPHA 3
B
SSL Plane 0
0B
OTRMA A
TSCMA A
SMDXA
1A
CALIA 0
DSCMA 0
LTRMA
0A
IPCIA 7
S
L
I
LTRIMA
1A
OTRMA A
1B
M
V
QT
OTRMA A
MVQTA 0
SSL Plane 1
MVQTA 3
Page 2-4
Page 2-5
1.1
DTI Block
The DTI block interfaces with an E1 or T1 trunk line and Tx/Rx data to and from the
TSL. The network synchronization clock is received from the TSL and transmits
signals of the trunk to the TSL.
The DTI block consists of :
Digital Trunk Back Panel Assembly (DTBPA)
CEPT Digital Trunk Interface board Assembly (CDTIA)
T1 Digital Trunk Interface board Assembly (TDTIA)
SDX-MSC II
ASCR-T
SDX-MSC II
ASCR-C
DTI
DTI
CDTIA 6
CDTIA 7
DTI
CDTIA 4
CDTIA 5
DTI
CDTIA 2
CDTIA 3
DTI
CDTIA 0
CDTIA 1
DTBPA
DTI
Number
Functions
of boards
DTBPA
CDTIA
(TDTIA) a
a. The TDTIA is a board to be mounted on the DTI block when interfacing with a T1 mode trunk line.
Page 2-6
Contents in parentheses indicate available functions when the TDTIA board is mounted.
Page 2-7
1.2
PRI Block
The PRI block has interface functions to provide the mobile communication system
subscribers with circuit exchange data communication services. To accommodate
more capacity, two paths connected to the IWF are mounted on one PRI block.
The PRI block consists of :
ISDN Primary Subscriber Back Panel Assembly (IPBPA)
ISDN D-channel Control Processor Advanced (IDCPA)
ISDN Primary Subscriber CEPT Interface type A (IPCIA)
SDX-MSC II
ASCR-P
SDX-MSC II
ASCR-C
IPCIA 4
IPCIA 5
IPCIA 6
IPCIA 7
IPCIA 1
IPCIA 2
IPCIA 3
IPCIA 7
IPCIA 0
IPCIA 6
IPCIA 3
IDCPA B
IPCIA 5
IPCIA 2
IDCPA A
IPCIA 4
IPCIA 1
PRI
PRI
IDCPA B
PRI
PRI
IPCIA 0
PRI
IDCPA A
IPBPA
PRI
Number of
Functions
boards
IPBPA
IDCPA
4(redundancy
IPCIA
16
a. One path connected to the IWF consists of 2 EA of the IDCPA board and 8 EA of the IPCIA board, so the
PRI block has two paths that are connected to the IWF.
Page 2-8
Page 2-9
1.3
SLI Block
The SLI block has an interface function with cable subscribers for testing (up to
1,024) and consists of :
Subscriber Interface Back Panel Assembly (SIBPA)
Subscriber Circuit Control Interface Assembly (SCCIA)
Compact Analog Line Interface Assembly (CALIA)
Ring Signal Generator Unit Assembly (RSGUA)
CALIA13
CALIA14
CALIA15
CALIA29
CALIA30
CALIA31
RSGUA
CALIA11
CALIA12
CALIA27
CALIA28
RSGUB
CALIA10
CALIA7
CALIA23
CALIA26
CALIA6
CALIA22
CALIA9
CALIA5
CALIA21
CALIA8
CALIA4
CALIA25
CALIA3
CALIA20
CALIA24
CALIA2
CALIA0
CALIA1
SCCIA B
SCCIA A
CALIA19
SIBPA
SLIR
CALIA16
CALIA17
CALIA18
SDX-MSC II
SLI
(ASI:1024)
Number of
Functions
boards
SIBPA
SCCIA
2(redundancy
Controls the CALIA and the RSGUA under the control of the ASPP.
)
CALIA
32
RSGUA
2(redundancy
Page 2-10
1.4
TSL Block
The TSL block performs the time switch (4K x 6K) functions and consists of :
Time Switch Back Panel Assembly (TSBPA)
Sub-highway Multiplex & Demultiplex Assembly (SMDXA)
Time Switch Control & Maintenance Assembly (TSCMA)
Local optic Transceiver Interface Assembly (LTRIA)
Optic Transceiver Module Assembly (OTRMA)
TSPBA
ASCR-T
LTRIA 1B
LTRIA 1A
TSBPA
SPA-B
SDX-MSC II
OTRMA
SMDXA 1A
SMDXA 1B
LTRIA 0A
SMDXA 0A
SMDXA 0B
SPA-B
TSL
LTRIA
LTRIA 0B
TSCMA A
TSCMA B
Front view
of rack
Rear view
of rack
Page 2-11
Number of
Functions
boards
TSBPA
SMDXA
4(redundancy)
Tx/Rx traffic data to and from the DTI, PRI and SLI :
Tx/Rx traffic data to and from the TSCMA board :
Each board takes charge of 2K data.
TSCMA
2(redundancy)
LTRIA
4(redundancy)
OTRMA
8(redundancy)
Page 2-12
1.5
DSC Block
The DSC block is mounted on the ASS to provide a signal-processing function and
voice service. The DSC block handles the DTMF/R2-MFC signals and provides a
conference calling service and recording announcement service.
The DSC block consists of :
Digital Service circuit Back Panel Assembly (DSBPA)
Digital Service circuit for Voice Message Assembly (DSVMB)
Digital Service circuit for Call Mixer Assembly (DSCMA)
Digital Service circuit for Multi-frequency Signaling Assembly (DSMSA)
Digital Service circuit for Digital trunk Test Assembly (DSDTA)
SDX-MSC II
ASCR-T
DSVMB 0
DSVMB 1
DSCMA 0
DSCMA 1
DSMSA 0
DSMSA 1
DSMSA 2
DSDTA 0
DSBPA
DSC
Number
Functions
of boards
DABPA
DSVMB
Max. 8
DSCMA
Max. 8
Conference calling
DSMSA
Max. 8
DSDTA
Max. 8
Page 2-13
1.6
FPH Block
The FPH block interworks with the PRI block and provides mobile communication
subscribers with frame relay and packet service.
The FPH block consists of :
Frame relay & Packet protocol Back Panel Assembly (FPBPA)
Frame relay & Packet protocol Routing Controller Assembly (FPRCA)
Frame relay & Packet protocol Handling Controller Assembly (FPHCA)
FPHCA 2
FPHCA 4
FPHCA 0
FPBPA
FPRCA A
FPRCA B
ASCR-T
FPHCA 1
FPHCA 3
SDX-MSC II
FPH
Number of
Functions
boards
FPBPA
FPRCA
2(redundancy
Handles the frame relay and Tx/Rx packet data using the TSL.
FPHCA
Page 2-14
1.7
S7H Block
The S7H block handles No.7 type of interoffice signaling.
The S7H block consists of :
Signaling System No.7 Protocol Handler Back Panel Assembly (SPBPA)
Signaling System No.7 Handler Assembly (SSPHA)
SDX-MSC II
ASCR-T
SSPHA 0
SSPHA 1
SSPHA 2
SSPHA 3
SPBPA
S7H
Number
Functions
of boards
SPBPA
SSPHA
Page 2-15
1.8
MVQT Block
The Mobile Voice Quality Test(MVQT) block measures the quality of the voice path
of the mobile communication system. The MVQTA transmits specific data to the
BSS to measure the voice quality. The BSS receives data from the MVQTA and
transmits it back to the MVQTA via the Vocoder, Channel Element Block and
Transceiver Block, etc. The MVQTA measures voice quality between the MSC and
BSS using data received from the BSS.
The MVQT block consists of :
Digital Service circuit Back Panel (DSBPA)
Mobile Voice Quality Test Assembly (MVQTA)
SLIR
DPBPB
MVQTA 0
MVQTA 1
MVQTA 2
MVQTA 3
SDX-MSC II
MV
QT
Number
Functions
of boards
DSBPA
MVQTA
Page 2-16
1.9
ASP/ASPP Block
The ASP/ASPP block functions as the ASS processor (ASP : MP function and ASPP :
PP function) and consists of :
Main Processor Back Panel (MPBPB)
Main Processor Duplication Manager Assembly (MPDMA)
Telephony Device Control Master Assembly (TDCMA)
SDX-MSC II
ASCR-T
TDCMA B
TDCMA A
TDCMA B
TDCMA A
TDCMA B
TDCMA A
SPA-B
MPDMA B
MPDMA A
SPA-B
MPBPB
ASP/ASPPX3
Number of
Functions
boards
MPBPB
MPDMA
2(redundancy
)
TDCMA
6(redundancy
SDX-MSC II Processor
For more information on the processor board, refer to section 5. Processor
Structure of Chapter 2. Hardware Architecture.
Page 2-17
INS System
The INS consists of :
Space Switch & Link (SSL)
Communication Interworking Network (CIN)
Network Synchronization (NES) CCS
Interconnection Network Processor (INP) CCS
Inter Network Peripheral Processor (INPP) CCS
Page 2-18
2
INPP2
TDCMA A
P - Bus
CIN
INP
MPDMA A
NES
CINMA A
NSCMA 0A
0B
NSCGA A
CINIA 0
TD - Bus
NSCMA 1A
CINIA 27
DOTS
Trunk
1B
U - Link
SSL 00
OTRMA A
ASS 0
OTRMA A
OTRMA A
ASS 1
OTRMA A
OTRMA A
ASS 2
B
CDPIA A
CTRIA 0A
0
B
SSMXA 0A
B
CTRIA 1A
0B
1
B
B
B
CTRIA 2A
OTRMA A
OTRMA A
ASS 3
OTRMA A
2
B
B
B
CTRIA 3A
B
1B
SSL 02
SSL 01
CTRIA 0~3
ASS 4
SSMXA 2A
SSMXA 1A
3
B
ASS 7
SSL 03
CTRIA 0~3
ASS 8
2B
ASS 11
SSL 04
CTRIA 0~3
ASS 12
Page 2-19
ASS 15
CTRIA 0~3
ASS 16
ASS 19
Page 2-20
2.1
SSL Block
The SSL Block is a Space Switch(80K x 80K) module and performs space switching
of the data received from several TSLs under the INPP control.
The SSL block consists of :
Space Switch Back Panel Assembly (SSBPA)
Central Optic Transfer & Receiver Interface Assembly (CTRIA)
Clock Distribution & Processor Interface Assembly (CDPIA)
Space Switch Matrix Assembly (SSMXA)
Optic Transceiver Module Assembly (OTRMA)
SSMXA 2B
SSMXA 2A
SSMXA 1B
CDPIA B
CDPIA A
CTRIA 3B
CTRIA 3A
CTRIA 2B
CTRIA 2A
CTRIA 1B
CTRIA 1A
SSL
CTRIA 0B
CTRIA 0A
SSL
SSMXA 1A
SSBPA
SSMXA 0B
SSWR
SSMXA 0A
SDX-MSC II
SSL
SSL
SDX-MSC II
CNIR
SSBPA
SSL
OTRMA
Rack
CTRIA
SSL
Rack rear
front
Page 2-21
Number of
Functions
boards
SSBPA
CTRIA
8(redundancy)
CDPIA
2(redundancy)
Receives clocks from the NSCGA of NES block and provides them to the
SSMAX and CTRIA.
SSMXA
6(redundancy)
OTRMA
16(redundancy
Page 2-22
2.2
CIN Block
The CIN block transmits IPC data between the subsystems.
The CIN block consists of :
Communication Interworking Back Panel Assembly (CIBPA)
Communication Interworking Node Interface Assembly (CINIA)
Communication Interworking Node Maintenance Assembly (CINMA)
SDX-MSC II
SDX-MSC II
CNIR
CIBPA
CNIR
CINIA 11
CINIA 11
CINIA 12
CINIA 12
CINIA 13
CINIA 13
CINIA 25
CINIA 25
CINIA 26
CINIA 26
CINIA 27
CINIA 27
SPA-CSPA-C
CINIACINIA
9
9
CINIACINIA
8
8
CINIA 22
CINIA 22
CINIA 10
CINIA 10
CINIACINIA
7
7
CINIA 21
CINIA 21
CINIA 24
CINIA 24
CINIACINIA
6
6
CINIA 23
CINIA 23
CINIACINIA
5
5
CINIA 20
CINIA 20
CINIACINIA
3
3
CINIA 17
CINIA 17
CINIACINIA
4
4
CINIACINIA
2
2
CINIA 16
CINIA 16
CINIA 19
CINIA 19
CINIACINIA
1
1
CINIA 18
CINIA 18
CINIACINIA
0
0
CINIA 15
CINIA 15
CINMA
CINMA
B B
CIN(IPC)
CINIA 14
CINIA 14
CINMA
CINMA
A A
SPA-CSPA-C
CIBPA
CIN(IPC)
Number of
Functions
boards
CIBPA
CINIA
28
CINMA
2(redundancy
Page 2-23
2.3
NES Block
The NES block generates and distributes clocks required for each system. Generation
and distribution of the clocks used in the SDX-MSC II are as follows :
1) The NES block receives a reference clock from the external system
(the DOTS and Trunk) and generates a base clock and provides it to the SSL.
2) The SSL receives clocks from the NES and generates clocks for the TSL and the
optical interface, and provides them to the TSL.
3) The TSL generates clocks required for each subsystem by itself based on the
clocks received from the SSL, and provides them to each block.
The TSL extracts clocks from the data received from trunk (the DTI and PRI) and
transmits them to the NES via the SSL. The NES uses the clocks that came from the
TSL, as reference clocks.
The NES block consists of :
Network Synchronization Back Panel Assembly (NSBPA)
Network Synchronization Clock Generation Assembly (NSCGA)
Network Synchronization Clock Maintenance Assembly (NSCMA)
SDX-MSC II
CCIR
NSCMA
1A
NSCMA
1B
NSCGA A
NSCGA B
NSCMA
0A
NSCMA
0B
NSBPA
NESD
Number of
Functions
boards
Page 2-24
NSBPA
NSCGA
2(redundancy
them into 4 KHz and provides them to the NSCMA. Provides basic clocks
(32.768 MHz) that came from the NSCMA, to the SSL block.
NSCMA
2.4
4(redundancy
Generates basic clocks using reference clocks received from the NSCGA,
INP Block
The INP Block performs the functions of the Main Processor(MP) of the INS and
consists of :
Main Processor Back Panel (MPBPA)
Main Processor Duplication Manager (MPDMA)
SDX-MSC II
CCIR
SPA-B
MPDMA B
MPDMA A
SPA-B
MPBPA
INP
Number of
Functions
boards
MPBPA
MPDMA
2(redundancy)
SDX-MSC II Processor :
For more information on the processor board, refer to section 5. Processor
Page 2-25
Page 2-26
2.5
INPP Block
The INP Block performs the functions of the Peripheral Processor (PP) of the INS,
and consists of :
Telephony Device Control Master Back Panel (TMBPA)
Telephony Device Control Master (TDCMA)
TMBPA
TDCMA A
TDCMA B
CCIR
TDCMA A
TDCMA B
SDX-MSC II
INPP
X2
EA/block
Functions
TMBPA
TDCMA
4(redundancy)
SDX-MSC II Processor
For more information on the processor board, refer to section 5. Processor
Structure of Chapter 2. Hardware Architecture.
Page 2-27
CCS Architecture
The CCS consists of the following blocks :
Operation & Maintenance Processor (OMP)
Alarm Panel Control (APC)
Central Control Peripheral Processor (CCPP)
OMP
RS 232C
MPDMA A
MSBIA A
SCSI
PC
CRT
DKU4
SDU3
U - Link
CIN
P - Bus
TD - Bus
CCPP
APC
TDCMA A
TD - Bus
APCIA A
External Alarm
Source
Page 2-28
3.1
OMP Block
The OMP block performs operation and maintenance and consists of the following
boards :
Operation & Maintenance processor Back Panel (OMBPA)
Main Processor SCSI-bus Interface (MSBIA)
Main Processor Duplication Manager (MPDMA)
SDX-MSC II
CCIR
SPA-B
MPDMA A
MSBIA
B
MSBIA
A MPDMA B
SPA-B
OMBPA
OMP
O
Number of
Functions
boards
OMBPA
MSBIA
2(redundancy
Provides the RS-232C port to interface with the PC, CRT and printer :
Provides the SCSI bus to interface with the DKU and SDU.
2(redundancy
MPDMA
SDX-MSC II Processor
For more information on the processor board, refer to section 5. Processor
Structure of Chapter 2. Hardware Architecture.
Page 2-29
3.2
APC Block
The APC Block collects alarms generated in the SDX-MSC II.
The APC Block consists of the following blocks :
Remote Control Back Panel Assembly (RCBPA)
Alarm Panel Control Interface Assembly (APCIA)
SDX-MSC II
CCIR
RCBPA
APCIA A
APCIA B
APC
Number of
Functions
boards
RCBPA
APCIA
2(redundancy
SDX-MSC II Processor
For more information on the processor board, refer to section 5. Processor
Structure of Chapter 2. Hardware Architecture.
Page 2-30
3.3
CCPP Block
The CCPP block collects information on faults and the environment, and consists of
following boards :
Telephony Device Control Master Back Panel (TMBPA)
Telephony Device Control Master (TDCMA)
SDX-MSC II
CCIR
TDCMA A
TDCMA B
TMBPA
CC
PP
Number of
Functions
boards
TMBPA
TDCMA
2(redundancy
SDX-MSC II Processor
For more information on the processor board, refer to section 5. Processor
Structure of Chapter 2. Hardware Architecture.
Page 2-31
LRS Structure
The LRS performs the VLR functions and consists of following function block :
Location Register Processor (LRP)
U - Link
CIN
LRP9
LRP0
MPDMA A
MPDMA A
4.1
LRP Block
LRP block consists of following boards :
Main Processor Back Panel (MPBPA)
Main Processor Duplication Manager (MPDMA)
SDX-MSC II
LRIR
LRP
Air Baffle
LRP
LRP
LRP
LRP
LRP
LRP
SPA-B
LRP
MPDMA B
LRP
MPDMA A
LRP
SPA-B
MPBPA
Page 2-32
Number of
Functions
boards
MPBPB
MPDMA
2(redundancy
SDX-MSC II Processor
For more information on the processor board, refer to section 5. Processor
Structure of Chapter 2. Hardware Architecture.
Page 2-33
5.1
MP
P-BUS
PC
PRT
OMP
MPDMA
MSBIA
redundancy
redundancy
SCSI BUS
MSBIA
SDU
DKU
MPDMA
U-LINK
CIN
MP
MPDMA
redundancy
U-LINK
MPDMA
P-BUS
Page 2-34
Page 2-35
5.2
PP
P-BUS
MP
P
PP
TDCMA
MPDMA
Redundancy
TD-BUS
H/W
Device
TDCMA
Page 2-36
5.3
LRS
LRP 0
LRP 9
ENIP
CCPP
OMP
CIP
INS
CIN
INPP 0
INPP 1
INP
SSL
SSL
ASS 0
ASPP 0
ASPP 1
ASPP 2
ASP
TSL
ASS 19
: P-BUS
: U-LINK
Page 2-37
The ASP is to be mounted on the ASS and performs the following functions :
Call flow control : Processes local calls, outgoing calls and incoming calls.
Operations : Measures, collects and reports statistics for calls, and measures and
reports billing.
Maintenance : Monitors the status of the exchange station and detects, reports
and recovers faults.
ASPP
The ASPP is to be mounted on the ASS and controls the hardware blocks mounted on
the ASS, and manages the statuses of blocks.
LRP
The LRP is to be mounted on the LRS and performs the VLR to temporarily store
and manage information of the terminals within the area concerned. The LRP has a
variety of functions : Number controlling, call processing, authorizing and
encrypting, location registering and deleting, terminal activating/deactivating,
terminal searching and subscriber tracking, etc.
ENIP
The ENIP is to be mounted on the CCS and handles the X25 or TCP/IP to let the
system interface with the network control center or CAMA center.
CCPP
The CCPP is to be mounted on the CCS and collects information on all of the faults
and environments within the CCS and runs an alarm device.
Page 2-38
INP
The INP is to be mounted on the INS and performs call-processing functions such as
searching for telephony, and state managing functions such as detecting and
recovering of faults in the switch network.
Page 2-39
INPP
The INPP is to be mounted on the INS and performs SSL controlling and state
managing functions.
Page 2-40
6
6.1
Others
Remote Alarm Panel Unit (RAPU)
Alarm device of the SDX-MSC II is the RAPU.
The RAPU collects and reports alarms generated inside and outside the system under
the control of the CCPP, and displays the alarms generated at the system to let
operators recognize them easily.
The RAPU has two functions as follows :
Alarm collecting : Collects alarms via 128 EA of alarm cable connected with the
environment alarm detection system outside the system, and then informs the
CCPP of collected alarms via the TD-bus.
Alarm displaying : Displays three kinds of the alarms received from the CCPP
visually and audibly : critical alarms, major alarms and minor alarms.
The major parts are all redundant to improve the reliability of the RAPU, and up to 3
EA of the alarm display part are available. The RAPU can be installed on the OMC,
when necessary. In this case, the alarm status of the system can be checked also in the
OMC.
6.2
The DKU, a random access storage device, stores the system level generic program,
database and input/output messages, etc.
The DKU interfaces with the OMP via a single-ended type of SCSI-II BUS. Each
redundant SCSI line is connected with two DKUs, and these two DKUs are
redundant. When writing data, the DKU simultaneously writes data at both the active
and standby sides, and when reading data, it reads data from the active side.
Storage Device Unit (SDU)
The SDU uses commercial Digital Audio Tape (DAT) as a storage medium. The DAT
stores information on billing, statistics, maintenance and operation control, etc.
Page 2-41
The SDU interfaces with the OMP via a single-ended type of the SCSI-II Bus.
6.3
Input/Output Device
The SDX-MSC II interfaces with commercial CRTs, PCs and printers, etc in the same
way as the RS-232 or the RS-422.
Page 2-42
CHAPTER 3
Software Architecture
The SDX-MSC II has a redundant processor, disk and other important parts to
improve stability, and uses a reliable protocol with high speed and low overheads for
communication between the processors.
Virtual Switching Machine (VSM) Mode
Page 3-1
The SDX-MSC II has been designed in the VSM mode. The VSM mode constitutes
an independent unit including hardware and hardware controlling software, and
combines those units to produce a new unit.
The VSM mode system can easily expand, improve and add hardware and software
without modifying application software.
Page 3-2
The Peripheral Processor (PP) of the SDX-MSC II requires real time processing and
has been designed with MC68060/MC68360 assembly and C languages. The Main
Processor (MP) performs functional processes and uses the CHILL language to ensure
programming readability, software maintainability and portability of the software.
International Standardization
The SDX-MSC II is based on the CCITT recommendations and has adopted the most
advanced software designing concepts.
The SDX-MSC II has used the SDL, which is a function statement language, to
produce design documents, and the Man-Machine Language (MML), an input/output
language, which is based on the CCITT recommendations. All of the system
application functions use CHILL, which is the CCITT standard and advanced
language.
Page 3-3
Software Architecture
The SDX-MSC II software consists of one or more execution modules and each of
these modules consists of one or more blocks.
The execution modules are as follows :
Application software
DBMS
Call Handling
&
Mobility
Management
SW
Telephony
Interface SW
Maintenance
SW
File System
CROS
RMOS
SDX-MSC II Hardware
Figure 3.1 Software Functions Structure
The call processing and mobility management software monitors and controls all of
the statuses, from generation to completion of calls to process calls successfully.
The call processing and mobility management software performs a variety of
Page 3-4
Page 3-5
The Database Management System (DBMS) stores and manages various data
coherently(at one place) to enable all of the application programs of the SDX-MSC II
to share the data. The DBMS manages data residing in main memory, and retrieves
and modifies the data depending upon the requests of the application programs.
Operating System (OS)
Page 3-6
and file manager, etc.) to exchange programs effectively. The OS consists of the
upper level CROS and lower level RMOS.
Page 3-7
CHAPTER 4
Call Processing and Mobility Management
1
1.1
14
13
MCC
12
11
10
MNC
MIN
NMSI
IMSI
The MCC is the last 3-digits of the IMSI and is a national code regulated by the ITUT(International Telecommunications Union - Telecommunication Standardization
Sector). The ITU-T E.163 has regulated each national code.
Mobile Network Code (MNC)
The MNC, is the last 2-digits of the NMSI and is a network identification number
given to the mobile communication providers.
Mobile Identity Number (MIN)
Page 4-1
The MIN, is the first 10-digits of the NMSI and includes the identification number of
the mobile communication terminals within the network. The MIN consists of the
MIN1(first 7-digits of MIN) and the MIN2(last 3-digits of MIN). MIN1 is used for
authorization processes and MIN2 is used for unique challenge process.
Page 4-2
The NMSI, is the first 12-digits of the IMSI and includes the MNC (network
identification number) and MIN (mobile communication identification number).
International Mobile Subscriber Identity (IMSI)
1.2
The TMSI is temporary data assigned and stored by the MSC and identifies the
mobile communication subscribers within the area controlled by the MSC. The
purpose of the TMSI is to prevent the IMSI from being exposed on a radio path and
to enable the MSC to search the subscribers data quickly.
Page 4-3
The TLDN is assigned by the terminating side of the MSC and is used to route
incoming calls. However, the originating side of the MSC receives the TLDN from
the terminating MSC via the HLR, and uses the TLDN to route the calls to the system
where the mobile communication terminals are located.
Page 4-4
The CELL ID identifies the cells and consists of a BSC ID and BTS ID. Each MSC is
able to connect up to 12 BSCs and each one of the BSCs is able to connect up to 64
BTSs. 12 X 64 = 768 BTS / MSC
A-KEY
Secret key only stored in terminals and authorization center, and is used for
encryption. This is neither exposed to radio interface nor used by the PCS.
Voice Privacy (VP) and Signaling Message Encription (SME)
The VP is identical to the Private Long Code Mask and is used for encryption of
voice. However, the SME is used for encryption of signaling messages.
IMSI Detach Flag
Page 4-5
Page 4-6
1.3
numbers, etc.
Translation of special service numbers.
Identification and translation of mobile communication subscriber numbers
The TLDN identification and translation to send and receive signals of the
mobile communication subscribers.
Translation of numbers enabling the supply of intelligent network services.
Location registration and call control by estimating the mobile telephone number
of a 3-digit mobile prefix and 4-digit mobile prefix, based on a total digit length.
Prefix Extension
Translates mobile telephone number having a different prefix, based on the
total length. Therefore, 01X-123-4567 and 01X-1234-5678 can be used
together.
The SDX-MSC II can analyze the following information by the trunk EN and route
numbers :
State of the trunk line registration (including the function of handoff only trunk
line).
(Alternative) route number and trunk line EN.
Type of trunk line (one way, both ways, incoming, outgoing and E1).
Available signal types (PS, IMP, DEC, CCS NO.7).
Other required information.
The SDX-MSC II can analyze the following information with the IMSI or the TMSI
Page 4-7
Page 4-8
The SDX-MSC II has the following sending functions when interfacing with other
exchanges :
Transit the numbers : LINK-BY-LINK mode and END-TO-END mode.
Sending of the numbers : ENBLOC mode and OVERLAP mode.
Screen : Limits incoming calls from specific subscribers and sends a recording
announcement regarding limited calls to the relevant subscribers.
Call screen per incoming route : Limits incoming calls from specific routes and
sends a recorded announcement regarding incoming calls from limited routes.
Page 4-9
2.1
Routing System
The SDX-MSC II shall satisfy the following requirements regarding routing :
Maximum of eight times of alternative routing is permitted.
Priority subscribers can perform routing earlier than other subscribers.
Handoff calls can perform routing earlier than other service routing.
Handoff calls can perform routing using a leased trunk line.
Fixed Routing System
Routes between the originating station and destination station are fixed. Operators
can change the routes manually.
Dynamic Routing System
2.2
Time-dependent routing : Changes routs at the fixed time of one day or one
week. The dynamic routing system considers traffic variations depending upon
the time and can use idle circuits effectively if the busy time is different between
the MSCs.
State-dependent(Adaptive) routing : Decides routes automatically, based on
network status information(outgoing trunks occupancy and call processing
status, etc) that has been sent to the MSC from the MSC or central management
center.
Routing Applications
Page 4-10
The Automatic Alternative Routing applies forward directed sequential call control
and is used for two or more of the other MSCs and routing paths.
Page 4-11
Automatic Rerouting
If the information impossible for routing is received from the MSC that has
generated blocking on the routing path (faulty or occupied outgoing circuits), this
method reroutes the information to another MSC. In automatic rerouting, circular
routing that resets the route to the location were the blocking is generated, is
prevented.
Load sharing
The Load Sharing distributes calls depending upon the specified ratio to share the
load of the MSC or the trunk line related to the routes.
Page 4-12
3.1
General Matters
Shared Secret Data (SSD)
Page 4-13
In addition, the MSC shares the SSD that generates the authentication results or
encryption key, with the VLR upon request of the operators and performs
authentication at the AC as well as at the VLR. When the SSD is shared with the
VLR, the VLR performs the following functions :
Performs and compares a Common Encryption Algorithm to generate
authentication result values, such as the AUTHR, AUTHBS and AUTHU.
Updates the call history count.
Selects RANDU, a random value, at the time of a sole attempt and response
procedure.
Generates a voice security key(private long code mask) and signal message
encryption key (SMEKey).
The RAND is a 32-bit value stored at the terminal. The RAND, if it is received from
call channel, is the same as the value received from recent access parameter
messages.
Call History Count
The call history count is a modular-64 counter value stored at the terminal and
network. It can be updated at the terminal : 1) whenever the traffic channel with
forward direction receives commands for parameter update, 2) by the parameter
update command after channels are assigned during incoming and outgoing call. This
value is used for identity and authentication by being compared with the count value
that is maintained at the network.
Generation of Identity/Authentication and Encryption Data
Figure 4.2 shows correlation of the data that is used for authentication and
encryption. A Key in the figure indicates a secret key stored only at the terminal and
authentication center, and generates the SSD used for authentication and encryption
using a random variable selected at the Authentication Center.
The authentication procedure generates authentication result values using the SSDA(specific part of the SSD), random variable and other parameters, etc.
On the other hand, the encryption procedure generates the SMEKey (encryption key
of each terminal) or Private Long Code Mask using the SSD-B(specific part of
Page 4-14
Page 4-15
SSD_Generation
procedure
Auth_Signature
SSD-A
Procedure
SMEKEY_Generation
SSD-B
Procedure
Authentication Input
SMEKey Generation
Parameter
Parameter
Authentication Result
SMEKEY
3.2
Authentication
The SDX-MSC II verifies the terminal validity and rejects the services for illegal
terminals, and verifies the validity of the following :
Validity of subscribers (using the IMSI) :
Validity of terminals (using the ESN)
Page 4-16
The Broadcasting Type Authentication broadcasts the RAND values for performing
authentication using forward direction channel/paging channel (access parameter
message). Then, all of the terminals accessed from the cell concerned perform this
procedure at the time of system access (location registration, calling and paging
response). The terminals calculate the AUTHR value using the RAND values received
from the terminals and send it to the MSC. Then, the MSC compares the RAND values
received from the terminals with the pre-calculated AUTHR values to perform the
authentication procedure.
Individual Authentication (Unique Attempt/Response Procedure)
This performs authentication using messages other than the messages used at call setup and location registrations of the MSC. The MSC tries to get authentication by
transmitting authentication parameters including the RANDU values to the terminals.
The terminals use the received RANDU values and calculate the AUTHU and then
transmit the values to the MSC.
The MSC performs authentication by comparing the AUTHU values received from
the terminals with the AUTHU values calculated in advance.
The network including the exchanges always opens or controls the Individual
Authentication Procedure. The Individual Authentication can be performed on the
paging/access channel or traffic channel of forward and backward direction.
3.2.2 Authentication Parameters Update
The MSC updates the following authentication parameters when the Authentication
Center requests to modify the SSD related to terminal authentication and call history
count data.
SSD Update
Page 4-17
3.3
Encryption
The MSC encrypts radio data and signaling messages between the terminals and BTS
to provide the subscribers with the same security as the cable link.
Page 4-18
Page 4-19
4
4.1
Location Registration
Introduction
The Location Registration is used to register information on location, status, party
identification and slot frequency, etc for each terminal on the CDMA network to let
the mobile communication terminal handle incoming calls effectively. The MSC
registers locations by itself and the BSS interworks with both the MSC and mobile
communication terminals to support the registration of terminal locations on the
CDMA network.
Registers location for the following cases :
When the mobile communication terminal is activated or deactivated.
Depending upon the periodic time terminal.
When the mobile communication terminal changes the location area.
When the operator demands it.
4.2
When the mobile communication terminal turns ON, the Power Up Registration
informs the MSC of the terminals current activated status. When the mobile
communication terminal repeatedly turns ON and OFF for a short time, the Power
Up Registration turns ON and then registers the locations after an elapse of specific
time to avoid consecutive registration.
Power Down Registration
When the terminal turns OFF after registration, the Power Down Registration turns
ON. At power service interruption, the location information is to be deleted.
Page 4-20
The Timer Based Registration turns ON when the built-in call channel slot counter
value (80 ms) reaches the BTS maximum value. The registration is to be used to let
the BSC automatically release the location of the terminal, which has failed at the
power service interruption registration.
Page 4-21
Zone means the mobile communication service supply area and consists of several
cells. The terminal stores lists of the zone movement. Zone Based Registration is to
be made when the terminal moves to a new area (the area which has no zone list
stored inside the terminal).
Parameter Change Registration
The Parameter Change Registration turns ON regardless of the roaming state, when
parameters of the mobile communication terminal change, for instance, slot
frequency index, slot mode indicator, incoming call set-up indicator, band class,
power grade, transmission speed and operation mode, etc.
Distance Based Registration
The Distance Based Registration turns ON when the distance between the latest
registration system and current system exceeds the threshold. The mobile
communication terminal estimates the distance between the latest location
registration and current system (estimation of the distance between the latitude and
longitude).
Ordered Registration
The Ordered Registration turns ON when the terminal is given a location registration
command from the BSC.
Implicit Registration
The Implicit Registration turns ON when the BSC detects the terminal location at a
successful sending of the call out and calling response messages of the mobile
communication terminals.
User Zone Registration
The User Zone Registration turns ON when the mobile communication terminal
moves to the designated area (users service area).
Page 4-22
4.3
Location Registrations
Initial Location Registrations
When subscribers register terminal location for the first time after subscribing to
mobile communication services (the TMSI has not been assigned to the terminal
during the initial registration), the IMSI is to be used to register the locations. When
the VLR fails to perceive terminals during normal location registrations, the IMSI is
to be used to register the locations.
Normal Location Registrations
Normal Location Registrations shall be made when subscribers move to either the
same MSC area or a different MSC area after completing the location registration at a
specific area. In the case that the serving MSC (supplying services by terminal) reports
the newly registered terminal location to the VLR, and the VLR notifies the HLR of
associated information (ESN, MIN, MSCID and qualification information code, etc)
and takes action against their responses.
Registers locations at the VLR only, not transmitting information to the HLR.
Location has been registered at the VLR in advance.
Terminal is under an active state.
Location can be registered after exchanging information with the HLR.
The terminal of the VLR is under an active status :
The VTR has no information on the terminal.
The information from the terminal cannot be interpreted.
Inactive and Deregistered of the Terminal
When the MSC decides that a terminal registered at the area has become inactive for
more than a specific time, the terminal sets inactivation at the internal data structure
or deletes all of its records and transmits the MSINACT message to the VLR.
The VLR can display an inactive state of the terminal or deregister all of the records
regarding the terminal. When the MSC decides an active state of the terminal after
the VLR deregisters the terminal related information, the VLR launches to notify the
HLR of the registrations and updates the internal data structure.
Page 4-23
The Bulk Deregistration is used to notify the HLR of all of the roaming terminal data
by the VLR.
Location Registration Controls
Location registration controls do not ask for the location registration by the HLR
regarding all of the location registrations(which have occurred at terminals and the
Base Station (BS)) but for only specific location registrations registered by the
operators, while the MSC demands location registrations by the HLR.
Operators can register the locations using location registration controls : timer-based
location registrations and zone-based location registrations. In addition, the zonebased location registration can control the location registration requests of the HLR
depending upon the specific base station.
Page 4-24
5.1
Anchor MSC
The Anchor MSC assigns traffic channels for the first time at call incoming and
outgoing. It becomes a fixed point when the terminal makes handoff by another
MSC.
Candidate MSC
When the MSC demands the best cell identifier and signal quality value to let the
terminal make handoff, the Candidate MSC gives the necessary information.
Visitor MSC
The Visitor MSC registers the moving terminal as a visitor subscriber.
Originating MSC
The Originating MSC performs the MSC-H and the MSC-G to launch the call
transfer.
Serving MSC
The Servicing MSC supplies services to the terminals within current service
area.
Page 4-25
5.2
Outgoing call
terminal
BSS
MSC
HLR
MSC
BSS
Incoming call
terminal
Call set-up
Page 4-26
1) Calling party MSC receives the call set-up demand from call originating terminal.
2) Calling party MSC demands authentication of the call originating terminal by the
VLR inside the calling party MSC.
3) Calling party MSC demands location information on the terminating terminal by
the HLR.
4) The HLR demands the TLDN by the destination party MSC.
5) Destination party MSC demands the TDLN by the VLR(the one that the
terminating terminal has registered location) inside the destination party MSC.
6) The HLR transmits the TLDN, which has been given by the destination party
MSC, to the calling party MSC.
7) Calling party MSC analyzes the TLDN and then makes a routing by call
terminating MSC.
8) Destination party MSC analyzes the TLDN, which has been given by the calling
party MSC and demands the location information of the call terminating
terminal by the VLR inside the destination party.
9) When the destination party MSC tries to do paging using the location information
(call terminating terminal location information received from the VLR), the call
terminating terminal responds to the paging received.
10) Destination party MSC sends ring signals to the call terminating terminal. When
the terminating terminal responds, a call path set-up between the terminal and
originating terminal is to be completed.
Page 4-27
5.3
Call Release
The call release starts when demand from the mobile communication terminal is
received or the MSC transmits disconnection messages.
The Call Release procedures are :
Terminal
BSS
MSC
MSC
Terminal
BSS
Call Release
1) The MSC receives the call release demand from the terminal.
2) The MSC releases various types of resources in use(for instance, ASP, ASPP, DTI,
Time Switch, Space Switch, etc) at the set-up of calls of each terminal.
3) Transmits the call disconnection notice to the counterpart MSC.
4) Releases various types of resources in use, when the MSC sets up calls after being
informed of the call disconnection.
5) Transmits the Clear Command to the BSS.
6) When the BSS transmits a release order to the terminal, the terminal transmits the
Release Complete to the BSS.
7) As soon as the BSS transmits the Clear Complete to the MSC, the Call Release is
to be completed.
Page 4-28
Handoff
The handoff means changes of the speech path to newly entered cell to maintain a
continuous call, when the mobile communication terminal moves to another cell free
from the cell areas(or sector) in service.
The mobile communication terminal compares the pilot channel intensity, which is
given by the BTS in service, with another pilot channel intensity received from an
adjacent BTS. When a pilot channel measurement at an optional place reaches a
value for handoff, the terminal notifies the BSC of the pilot channel information of
the cell to do handoff, and the BSC makes lists of the cells based on the information
and asks the MSC to do the handoff processing.
The MSC gets a radio channel, which can maintain busy calls against the terminal
requiring handoff, and assigns it to the new call. The MSC does not disconnect busy
calls using a new speech path and instead switches the call to the BTS of the new
area(the area where the terminal moves to).
When handoff is performed within the area of the MSC, the MSC verifies the
possibility of the handoff by interworking with the BSC controlling the target cell
and then makes a switching of the existing speech path to the new path to perform
handoff. If a different MSC performs handoff, the MAP protocol performs the
handoff procedures.
6.1
Page 4-29
When the serving MSC changes at handoff, the anchor MSC controls and maintains
the billing, supplementary services and call processing, etc.
The MSC performs handoff functions as follows :
Page 4-30
Serving MSC
Target MSC
Accommodates handoff and increases the segment counter and handles the new
billing ID.
Accommodates new handoff.
Anchor MSC
Handles handoff from the tandem MSC and the serving MSC.
Handles Path Minimization Handoff.
Tandem MSC
Handles handoff between the tandem MSC and the target MSC.
Relays handoff to either the anchor MSC or the tandem MSC.
Page 4-31
6.2
Handoff Classification
From the point of view of the MSC, the handoff can be classified into : 1) handoff
requiring MSC involvement, 2) handoff that the BSC handles by itself.
Handoff requiring MSC involvement : Handoff between the BSC under the
same MSC and handoff between other MSCs.
Handoff that the BSC handles by itself : In the case where the speech path
assigned by the BTS has bad features, the handoff between handled channels and
handoff between the BTS under control of the BSC.
When the BSC handles handoff by itself, it transmits the handoff information to the
MSC and collects the handoff related data.
Handoff Between BSCs Within the Same MSC
The soft handoff is to be performed when the frame offset, which is in use at the
target cell, has the same channel. If not, the hard handoff is to be performed.
Hard Handoff : After performing handoff, makes use of other frequency than the
one which has been used before the handoff, or same frequency. However, with
the channel with a changed frame offset, disconnects calls and switches to the
speech path.
Soft Handoff : When the frequency and frame offset make use of same channel
even after performing handoff, switch the speech path without disconnection of
the calls.
When both the Target MSC and Serving MSC exist on the call path and the Serving
MSC does not coincide with the Anchor MSC, apply the backward handoff
procedures. When the Serving MSC does not coincide with the Anchor MSC and the
path minimization function can be applied, apply the path minimization function to
apply continuous handoff procedures. If both cases are not applied, apply forward
handoff procedures.
The MSC functions are included depending upon the handoff type :
Forward handoff : The Target MSC does not include the speech path, and does
not make use of the path minimization.
Page 4-32
Page 4-33
Page 4-34
CHAPTER 5
Operations and Maintenance
Billing/Charging
The billing/charging generates information on the call services supplied to the
subscribers, and records it on a secondary recording media(the SD) or transmits it to
the CAMA Center to settle the account of charges.
Generates the billing related information in the following cases :
Mobile communication subscribers sends calls
Calls arrive to the mobile communication subscribers
Mobile communication subscribers send emergency calls
Mobile communication subscribers send diverted calls
Mobile communication subscribers are given supplementary services
Sends a query to the HLR.
1.1
Page 5-1
generation block within the ASP to prevent the data from being lost.
In addition to the case of a fault occurrence at the OMP, the ASP can prevent the
transmitting of billing data to the OMP from the ASP, in order to prevent data from
being lost that can be generated when the load of the CPU or I/O within the OMP is
decreased, or when the processor or software is rebooted.
Page 5-2
When one hour has elapsed after the operator prohibits the transmission of the billing
data(the data transmitted from the ASP to the OMP), the command(prohibition of
billing data transmission) is cancelled automatically. Also, if the billing related
memory of the ASP is full, the command is cancelled even though one hour has not
elapsed and billing data is transmitted to the OMP.
1.2
The billing data is recorded to the disk in the unit of a file in the OMP. The billing file
can be generated at a minimum of a 30-second interval. The maximum number of
files that can be generated a day is 2,880 files.
To control the mass of data effectively, the SDX-MSC II uses a virtual file system,
that generates the billing file which is based on the time (minimum 30 seconds) or
size(minimum. 1 Kbyte).
The operator can check the billing file information that is stored to the disk, using the
MMC. The billing file information is output in units of 10 files, and includes the
following :
File name
The total number of files, blocks and CDRs.
File open time and close time
Whether or not transmitted to the SD or the CAMA.
The billing file has its unique ID and is controlled in the directory structure of the
index mode. Therefore, the index can get access to it immediately without an
independent search, upon the operators requests for billing file information.
Confirmation of the Billing Storing State
The billing block of the OMP generates the billing files using billing data received
from the ASP and then stores it to the disk.
If the billing disk is abnormal, the billing block stores the billing data in its memory
queue of the OMP, and transmits the billing data to the billing center to prevent the
data from being lost. In addition, it reports abnormal status of the billing storage to
Page 5-3
the operator by outputting alarm messages or fault messages. The operator can check
not only the number of billing blocks stored at the billing storage media, but also
details of the billing data of the billing block.
Page 5-4
1.3
The billing disk controls the billing data based on virtual files, which cannot be
deleted optionally. However, when the virtual files are overwritten, the previous data
is deleted.
Basically, the hard disk(HD) having approximately 2 Gbytes is used for the billing
information disk. The billing data storage capacity is influenced not only by the billing
disk capacity, but also by size of the Charging Data Record(CDR).
Four hard disks mounted on the SDX-MSC II consist of two redundancy pairs for
concurrent writing systems(HD0 x 2, HD1 x 2). HD0 stores the software program,
Program Load Data(PLD) and statistics data, etc, while the HD1 stores the billing
data.
Each disk has the following capacities :
Table 5.1 Disk Capacities
Device
Storage capacity
Billing area a
Number of
[bytes]
[bytes]
stored calls b
Remarks
[call]
HD(2 Gbytes)
2.0 G
1.8 G
12,600,000
25 Hour
(standard shape)
HD(4 Gbytes)
4.0 G
3.6 G
25,200,000
50 Hour
a. The size of the billing block is 1 Kbytes, 7 calls per block(for instance, 12,600,000 calls = 7 calls/1K
1.8 G)
b. The number of stored calls is based on 144 bytes of the CDR size.
The Digital Audio Tape(DAT) is used for the auxiliary memory unit for the billing
data storage. The Storage Device Unit(SDU) is the unit that mounts the auxiliary
Page 5-5
memory unit.
Page 5-6
1.4
The billing operation mode includes the CAMA, LAMA and BOTH.
CAMA Mode : Permits only the transmission of billing data to the CAMA
Center.
LAMA Mode : Permits storage of the billing data to only the DAT.
BOTH Mode : Transmits billing data to the CAMA and stores it in the DAT at
the same time.
The files created at the LAMA mode can be collected in the CAMA mode, and vice
versa.
The billing operation mode can be changed to the MMC. The mode can control the
transmission of the billing data to the CAMA Center or storage of the data to the
DAT by file unit and it can be checked by the MMC. When the MMC is added with
search conditions it gives : lists of files not transmitted to the CAMA and not stored
at the DAT, the number of the files recently transmitted, the number of recently
dumped files, and a list of recently created files. In addition, a file search at the
specified time for file creating is also available.
Automatic Switching of Billing Operation Modes
The billing data that has not been processed by the LAMA or CAMA cannot be
deleted. However, if the billing disk is full, newly generated data has priority over not
processed data. Therefore, not processed data is stored in the memory of the ASP and
OMP.
If the billing disk capacity is full, the billing data can be lost. Therefore, an alarm is
generated when the disk capacity is used over a specific ratio. The alarm has three
levels : minor, major and critical. The alarm level rises or falls down depending upon
the disk occupancy.
When disk occupancy(the ratio of the files that cannot be deleted out of total disk
capacity) exceeds the threshold while operating the billing collection mode in the
LAMA mode or the CAMA mode, the mode is switched to the BOTH mode to
prevent billing data loss.
The threshold that automatically switches the billing operation mode can be inquired
Page 5-7
Page 5-8
1.5
Billing Backup
The billing data is stored at the disk primarily and then stored at the DAT or transmitted
to the CAMA Center. Therefore, billing data of the DAT can be regenerated using the
disk data. To generate the billing data of the DAT again, each billing data has to be
checked where it is stored. Therefore, storage of the data at the DAT is to be controlled
by the address of data storage disk.
Backup of the billing data from the DAT can be used when the IT Center fails to
analyze the billing data of the DAT.
The billing backup information can be stored up to the latest 100 of the DAT data.
Backup files can be selected in the way that the operator designates the backup start
files and the number of files for backup. In addition, the way, which the number
controlled by history is designated, may be used.
1.6
The route billing assigns the billing function for itself against the specific incoming
route or outgoing route, and generates details of the calls relating to calls occupying
each incoming or outgoing route. Only a detailed billing way is permitted to route
billing data. The route billing is used when providers make an account settlement of
the billing or calling party at other provider networks that calculates the bills.
Immediate Billing
Immediate billing generates calls for the purpose of tests inside the telephone
exchange or others, and reports the details of the billing immediately.
Supplementary Service Billing
Page 5-9
generated.
Page 5-10
Statistics
The statistics control the system functions to collect, store, analyze and handle data
and sends the statistics outcome. The statistics outcome is to be used for the
operation, maintenance and network management, etc.
The statistics data is transmitted regularly : hourly, daily and monthly. It also can be
transmitted irregularly, depending upon the operators requests.
Statistics measurement target is :
Route and trunk
Signal system
Service circuits
Control system
Special services
Overall exchange
Common channel signals
Network controls
System functions
2.1
Measurement and statistics of the signaling system can measure the use ratio of the
signaling system mounted on the SDX-MSC II.
MFR circuit
Page 5-11
Page 5-12
R2 circuit
Ring circuit
Continuous check tone circuit
Tone circuit.
The statistics of the service circuit can measure the use ratio of the service circuit
mounted on the SDX-MSC II. The service circuits to be measured are :
Recording announcement system
Call mixer
Statistics of the Control System
Measurement and statistics of the control system can measure the load of the MP,
such as IPC related information, and transmit it to the operator. It processes data
concerning statistics measurement :
Output time of the daily measurement outcome
Output date and time of the daily measurement outcome.
This function can output or modify the information upon requests of the operators.
Statistics of Special Services
Page 5-13
Page 5-14
information for the exchange is available to the time when ringingbackbone or Alerting message is sent to outgoing subscriber circuit.
Page 5-15
2.2
Signaling time
Time from trunk occupation to completion of sending the information
between the exchanges
Time from occupation of the trunk to receiving of the response signals
Time from trunk occupation to completion of receiving the information
between the exchanges
Time from completion of the information between the exchanges to
sending of response signals
Page 5-16
Network Management
The Network Management maintains a proper traffic level and operates the
communication network. The management is performed by the SDX-MSC II itself as
well as the OMC (Operation & Maintenance Center) connected with the data link.
Network Management Information
The SDX-MSC II transmits the information to the OMC to manage the network :
State of current load
Functions and availability depending upon the traffic
Shape information.
Transmits the information in real time, periodically or upon request of the OMC.
Automatic Control
The automatic control takes actions automatically against various kinds of situations
detected during the system inspection. The automatic control includes : Hard-toReach(HTR) control and trunk reservation control.
HTR control : Traffic rush within the network can detect terminating code(HTR
code) having much less call completion, and register it on a list of the HTR to
control it.
The operator can inquire on a list of the HTR and register or remove the specific
terminating code to the list of the HTR artificially.
Trunk reservation control : Trunk group designates the number of backup trunk.
When the number of backup trunk is less than the threshold, the trunk
reservation control manages the traffic. The calls, to which the trunk group
rejects access, are to be skipped or cancelled.
Manual Control
The Manual Control can control the overload state by use of the MMC command by
the operators. Traffic is controlled based on either percentage (0~100%, 12.5%
interval, 9-stages) or gap interval(0, 0.1, 0.25, 0.5, 1, 2, 5, 10, 30, 60, 120, 300, 600
seconds).
Page 5-17
Page 5-18
Overload Control
Overload means that traffic has occurred due to an excess of the capacity of the
system. Improper control of the overload state has a high negative effect on functions
and stability of the call processing performance.
When the traffic inflow exceeds 150 percent of the system processing performance,
the ITU-T Q.543 recommends a capability of more than 90 percent call processing of
the inflow traffic. The SDX-MSC II can control overload automatically or manually
to satisfy the recommendations of the ITU-T Q.543.
Software Overload Detection
The processor overload detection is very important for overload controls, and the
item that can supremely reflect the event degree of a call event shall be selected.
Currently, ITU-T recommends the overload of the CPU occupancy(%), the number
of non-processed IPC(%) and memory availability(%). The processor overload can
be detected in real time by combining the CPU occupancy and non-processed IPC.
Operators can decide the reference values of the overload detection items. In
addition, it can detect the overload by regularly monitoring the amount of call
processing events, which has been introduced to the actual system together with
processor overload detection.
Page 5-19
Audit
The Audit regularly inspects the occurrence of an error for important data within the
programs and systems to maintain software integrity.
When the various types of data do not coincide with each other, a resource loss is
made or system failure may occur. Data inconsistency occurs for the following
cases :
Data has been destroyed because of the memory mutilation caused by operation
failures of the hardware and software.
The processes, in which the OS is under progress due to redundancy switching
or error handling, etc, are compulsorily destroyed.
The IPC abnormally operates.
Program error produces the wrong data.
When an audit function has been found to be faulty after the performance, selfrecoverable failures shall be recovered and irrecoverable failures are reported to the
operator.
Page 5-20
Page 5-21
CHAPTER 6
Supplementary Service Functions
Supplementary Functions
Originating Call Barring
The original call barring can prohibit the originating calls sent by a specific
subscriber. When a subscriber(having no permission of call originating) sends a call,
the call cannot be connected and released. However, terminating the call can be
normally processed.
Despite the registrations of special services to the subscribers, the originating
call barring has priority.
Terminating Call Barring
The terminating call barring prevents the terminating calls for specific subscribers.
When calls arrive for a subscriber who cannot use terminating calls, a recorded
announcement and tone notifies the originating subscriber of the prohibition of the
originating calls for a specific time. However, originating calls are normally
processed.
Normal processing for billing on originating calls
Priority processing for terminating call barring even at the registration of special
services to the subscribers.
Page 6-1
The call restriction by operator can restrict a specific type of originating call and
terminating call depending upon the subscribers grade level.
When a registered subscriber of the call restriction function tries to make a call
or the subscriber concerned is given a terminating call demand, recorded
announcement is sent to the calling party.
Page 6-2
Even if other special services than the originating and terminating call
prohibition function are registered for a subscriber, the call restriction by
operators can be processed with priority.
Each of originating calls restriction and terminating call restriction are processed
independently.
Priority Access
The priority access provides services to special subscribers over other general
subscribers by giving priority when an overload or emergency occurs at the system.
At the occurrence of system overload, the priority access is automatically
handled. At the occurrence of an emergency, however, the operators manually
run the priority access.
The priority access grade may vary depending upon the system overload state
and emergency situation.
Subscriber Observation
The DTMF protocol control provides subscribers with an intelligent network service.
In other words, when a mobile communication terminal sends a DTMF signal to the
service system to use the intelligence network services(for instance, 700 Information
Service), it can convert the subscribers key information to the DTMF messages to
inform the MSC of the information. Then the MSC sends it to the service system
concerned by regenerating it into the DTMF signals.
Message Waiting Notification
Page 6-3
The message waiting notification informs subscribers of message storage at either the
voice post office box or Short Message Service Center (SMC). The subscribers can
find out message storage through a specific pip tone and mobile communication
terminals LED.
Page 6-4
The voice message retrieval can make subscribers reproduce the messages stored at
the Voice Mail System (VMS). The subscribers, who have an active post office box
switching function, can store voice messages at the VMS and connect the VMS by
post office box connection code to regenerate the voice messages.
Remote Feature Control
The remote feature control can make a subscriber modify his or her services using
another terminal. The subscriber can call a specific RFC DN using a mobile
communication terminal or cable terminal, and can modify the services by entering
the Personal ID Number (PIN) and then feature code.
The remote feature control includes : terminating call switching, terminating call
The malicious call trace can detect a specific telephone number and associated
information, when calling a telephone number of the terminating call of the
subscriber(a subscriber who has registered a malicious call trace) is required.
The MSC stores the originating call number of the call concerned. If the originating
call number cannot be identified, the malicious call trace stores the incoming route
and trunk number of the originating call.
SIM Inbound Roaming
The SIM Inbound Roaming can handle a normal call after the Global System for
Mobile Communication(GSM) subscriber performs roaming at the Code Division
Multiple Access(CDMA) network.
The GSM network uses the International Mobile Subscriber Identity (IMSI).
However, the current CDMA network does not support the IMSI and therefore the
GSM SIM card user cannot use the registration of the IMSI and associated services at
the CDMA network roaming. Therefore, the IMSI-MIN (Mobile Identity Number)
conversion is needed at the Global Location Register (GLR) prior to the use of the
Page 6-5
services.
When a GSM subscriber lends the terminal, the SIM Inbound Roaming assigns a
specific bands MIN number(using the MIN number assigned to the GSM subscriber
to identify the CDMA subscriber and the GSM subscriber) and registers the IMSIMIN conversion information at the GLR.
After the IMSI-MIN information is registered at the GLR, put the SIM card into the
terminal and perform normal call processing after the initial location registrations.
User Identification Module (UIM) Data Controls
The UIM terminal enables downloading UIM related data under a radio state, using
the OTASP of the IS-725-A.
In other words, the UIM subscriber can dial a specific Feature Code (OTASP Service
Feature Code) to download the UIM related data on the UIM terminal, and run the
SCP and Call Setup, then downloads the UIM related data over the SMS messages
among the SCP, MSC and terminals.
Local Wireless Telephone Call Busy Processing
The local wireless telephone call busy processing can control the calling state of
subscribers within the LAN at the MSC/VLR to prevent unnecessary paging
procedures and reduce the lowering of the call completion ratio caused by no
response to the paging.
Call Forwarding
The call forwarding transfers the call to be received to another subscribers terminal
or called party subscribers Voice Message System (VMS).
Call forwarding does not provide conflicting functions at the same time : absent
subscriber message service and the Do Not Disturb (DND).
Telephone service number of the no reply time(waiting time until calling is
switched to either another subscribers terminal or called party subscribers
VMS : basic value is 15 seconds) and the call forwarding can be changed.
The originating call barring and terminating call barring has priority over the call
forwarding.
The call forwarding may be classified as follows depending upon the subscribers
setup :
Page 6-6
Page 6-7
The Call Transfer (CT) connects holding calls with called calls by calling the new
subscriber after a subscriber holds the busy call(terminating call).
The CT is applied to only the terminating call.
Call transfer times has no limitation.
Billing continues even when the holding subscriber receives the holding voice.
Call Waiting (CW)
The CW replies to a new call when a subscriber is busy. When a new call arrives
during the calling, the CW informs a subscriber over a waiting tone. When a
subscriber presses the SEND button, they can hold the busy call and reply to a
waiting call. When they press the button again, they can reply to a holding subscriber
again and communicate with holding subscriber and new subscriber alternately.
When a subscriber having the CW is busy, they supply call waiting is supplied to
only one of the terminating calls at the same time.
The CW can perform the Cancel Call Waiting (CCW) and the call under the
CCW is effective for only a busy call.
Cancel Call Waiting (CCW)
The CCW cancels the call waiting when a subscriber does not wish to be interrupted
for a specific period of time, due to data communication or an important call, etc.
The CCW is to set up by a subscriber before call setup or during calling.
The CCW is permitted for only the one who has registered the CW.
Control party, who is using Three-Way Calling, Conference Calling, Call Hold
and Call Transfer, is to cancel the call waiting automatically.
The CNIP sends information to the called party terminal : calling number of the call
arriving at the subscriber and other information.
When the one, who has registered the Calling Number Identification Restriction,
sends calls to the one who has registered the Calling Number Identification
Presentation, the terminal of terminating call subscriber does not display the calling
partys calling number and associated information(the Calling Number Identification
Page 6-8
The CNIR restricts the display of a subscribers telephone number and associated
information on the called party terminal.
When the one, who has registered the CNIR, sends messages to the one who has
registered the CNIP, the called party terminal does not display the calling party
number and associated information(the CNIR has priority over the CNIP).
Conference Calling (CC)
The CC allows the busy subscriber to call others in turn to let several subscribers talk
at the same time. Maximum number of calling parties is six. When the master
completes the call, the CC is to be terminated. However, when other people other
than the master cancels call, the CC function continues.
When the operator additionally gives the originating call barring and terminating
call barring to the one who has registered the CC, the originating call barring and
terminating call barring have priority over the Conference Calling (CC).
Under conference calling, special services(call transfer and call hold, etc) using
special codes are not permitted.
Do Not Disturb (DND)
The DND restricts the terminating call of a subscribers terminal. The MSC sends the
recording announcement or messages to inform the calling party(the one who has
sent the call to the one who has registered the DND) of No answer.
The Do Not Disturb, the Guide during Absence and the Call Forwarding, etc
cannot be used at the same time.
Originating call of the subscriber having active DND can be normally processed.
Mobile Access Hunting (MAH)
After making a group of specific subscribers, the MAH is the function that attempts
the call, which arrives in a pilot directory number (MAH pilot DN), in a specific
order to the subscribers within the group. The MAH calls one subscriber within the
group each time.
Flexible Alerting (FA)
Page 6-9
The FA is the function that makes a group of subscribers and simultaneously calls
the subscribers receiving terminating calls at the pilot directory number (FA pilot
DN) using different types of ringing tones. When the call is connected to the one who
replies first, the remaining call set up is cancelled.
Password Call Acceptance (PCA)
The PCA can make the calling party(the one who has sent messages to the one who
has set up the PCA) enter a password, and sends the calls only coinciding with the
password. When the password does not coincide, the PCA transmits the calling party
recorded announcement or messages of call barring.
Page 6-10
The SCA permits the terminating call for only the calling number, which exists at the
restriction list(list of calling numbers which allows the one, who uses the SCA, to
send the call to themselves). When a calling party, who has not been listed, sends
calls to the called party set by the SCA, the MSC sends paging broadcasting or
messages of the call barring to the calling party.
Up to ten of calling number can be put into control list.
Calling number of the control list can include the PSTN subscriber number.
Call Restriction and Do Not Disturb have priority over the SCA.
Subscriber PIN Access (SPINA)
The SPINI demands entry of the Personal Identification Number (PIN) when a
subscriber(SPINI service subscriber) sends special types of calls(local call, local call
& international call), and sends calls only at the correct entry of the PIN. The special
types of the call include local call and local call & international call, and the
emergency call does not demand the PIN. The SPINI is used to prevent the terminal
from being illegally used or copied, it restricts subscribers network use.
Three-Way Calling (TWC)
The TWC makes a busy subscriber hold the current call and then calls another
subscriber to let three persons talk at the same time.
Under busy three-way calling, the TWC cannot supply special services(Call
Transfer and Call Hold, etc) using special codes.
Conference Calling has priority over the Three-Way Calling (TWC) when both
calls have been registered at the same time.
Call Hold (CH)
Page 6-11
The CH is the function that makes a busy subscriber enter a Call Hold code to hold
the current call and to call another subscriber and talk. When the line is busy, the
subscriber on hold can talk with another subscriber alternately, but three subscribers
cannot talk at the same time.
Page 6-12
When the line is busy, only one subscriber is permitted to hold calling.
When the operator additionally gives call barring to a subscriber having the Call
Hold (CH), the barring has priority over the CH.
Billing continues even when the subscriber on hold is receiving a hold tone.
The SMS sends and receives short messages(about 140 characters) by mobile
communication terminal. The subscriber can transmit character messages using the
terminal keypad, and can also transmit the messages on the computer using a PC
communication program or the Information Provider (IP) service. The message
transmission way supports one-to-one system(one terminal sends messages) and
broadcasting system(several terminals send messages.).
Supports protocols of the IS-637 : SMS link layer, SMS relay layer and SMS
transport layer.
Provides a direct interface between the SMC and the MSC/HLR.
Voice Message Service (VMS)
The VMS is the function that records voice messages of the calling party when a
subscriber cannot receive a phone call, and then regenerates it upon the request of the
subscriber. When a voice message is generated, the VMS informs a subscriber of the
existence of the message at the Voice Mail Service to let them listen to the
message(s).
FAX Mail Service (FMS)
The FMS sends fax messages to multiple numbers of counterparts at the same time,
including a variety of functions which are inspection and receiving of the messages
registered on the bulletin board, checking of the messages received on the persons
own message service and transmitting of the messages to the facsimile of another
mail service subscriber.
Location Based Service (LBS)
The LBS checks the geographical place of the mobile communication subscriber and
provides them with geographical location information. The MSC has an interface
with the PDE, a location inquiry server, to carry out the LBS.
Page 6-13
The CRBT Service replaces the single type of ring back tone(a tone produced until a
called party replies to the calling party against terminating call) with various kinds of
ring back tones(melody, advertisement, etc).
Page 6-14
CW
CW
CC
>
CCW
CH
CT
>
>
DND
CFW
MAL
OCB
OCR
TCB
TWC
VMS
FMS
>
>
CNIP
CNIR
>
CC
>
CCW
CH
CT
DND
>
CFW
>
MAL
>
OCB
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
OCR
SCA
TCB
SCA
>
>
>
>
>
>
>
>
TWC
VMS
FMS
CNIP
CNIR
>
Page 6-15
Page 6-16
CHAPTER 7
VLR Functions
Interactive Operation
Interworking relations between the VLR and network elements are :
Interworking Relations Between the VLR and the HLR
When location registrations between the VLR occur at the use of the TMSI, the
IMSI of subscriber concerned is to be brought by Interworking with the previous
VLR to process the location registration procedures.
Page 7-1
Types of Subscriber
Roaming
Page 7-2
Additional Services
For more information on the supplementary services provided, refer to
Chapter 6. Supplementary Service Functions.
Page 7-3
Billing
Billing category
Stores billing category data of the subscribers.
Call processing
Origination triggers
Defines origination trigger place, which is currently active by the subscriber.
Termination triggers
Defines terminating trigger place, which is currently active by the subscriber.
Origination Indicator
Displays call type permitted by the terminal upon the call origination
Supply of bearer service
Supply of teleservice
Bearer capability allocation
Others
Page 7-4
Carrier digits
Indicates carriers between the MSC, which have been designated in advance for
outgoing calls.
Functions
The VLR carries out the following functions :
Number/Identity Management
The VLR stores the IMSI, subscriber identification number of the terminal.
The VLR assigns the TMSI corresponding to the IMSI regarding the terminal,
which the VLR controls to prevent the IMSI from being disclosed on radio
channel(the MSC may assign it).
Call processing
The VLR carries out authentication between the terminal and CDMA system to
assure of data security of the subscriber and to prevent the terminal from being
illegally used.
The Authentication Center (AC) carries out authentication through the SSD.
When the SSD is shared, the VLR can also carry out authentication.
COUNT is used to identify a forged terminal. The COUNT records call history
and is stored in the VLR at sharing of the SSD.
The Authentication Center processes authentication failures and associated
recovery.
Registration notification/cancellation
When the terminal is registered at the VLR, location registration procedures are
used :
Normal location registrations due to location area changes of the terminal :
Upon requests of the location registration due to area changes of the terminal, the
VLR registers the location depending upon some factors which are normal
location registrations, periodical location registrations and recovery of the VLR,
Page 7-5
etc.
Registrations by changes of location areas :
The VLR receives location registration request message concerning visited
subscribers, and modifies the location information of each subscriber, and sends
the location change request messages to the HLR to get information on the
subscribers, and collects subscriber information. However, when the location
area with the VLR area changes, interworking with the HLR is not required.
Periodical Location Registrations
When the VLR receives periodical location registration request messages from
the MSC, it inspects the subscribers concerned. When the inspection is
completed, the VLR sends the location registration completion messages and
then completes location registration.
Registrations at recovery state of the VLR
When the VLR receives location registration requests at recovery state, it resets the
recovery confirmed flag and non-confirmed flag of the subscriber and carries out
the registration in the same way as the periodical location registrations.
Cancellation of location registrations
When the VLR receives registration cancellation messages from the HLR, it
cancels the subscriber information from the database.
MS Activation/Inactivation
The Inactivation means the actions, which the terminal takes to inform the mobile
communication network that the terminal is under a suspension state(for example,
terminal OFF). On the other hand, activation means the actions having an opposite
concept of the inactivation(for example, terminal power on).
When the VLR is given the inactivation signal from the terminal, the VLR database
sets the flag of the terminal and informs the HLR of the situation. Recovery of the
activation is informed to the VLR through location registration procedures.
Search
When the VLR is given terminating call requests during recovery, it does not send
terminating call subscribers call requests but terminal search requests to the MSC,
which calls the terminating call subscriber using all of the terminals.
When completing the call, the VLR receives answers on the terminal search
Page 7-6
messages from the MSC, including the LAI (Location Area Identity).
Subscriber tracing
The Subscriber Tracing is to be used to trace the location and calls. When the
subscriber tracing is registered upon requests of the HLR/OMC operator, the HLR
asks the VLR to trace the calls. At this time, the VLR sets flags and informs either the
HLR or the OMC of the associated information.
HLR fault recovery
After recovering failures of the HLR, the VLR is informed of the recovery state and
resets the recovery flag of all of the HLR related terminals. Recovery flag reset
procedure of the VLR is the same as that of the VLR.
Page 7-7
VLR Restoration
When a failure occurs at the VLR database, all of the subscriber related information
is to be removed. The HLR is to be informed of the failure.
Page 7-8
ABBREVIATION
A
AAA
ADPCM
AIS
APC
APC
APCIA
AR
Alternate Route
ASIP
ASMI
ASMP
ASMS
ASP
ASS-C
ASS-P
Authentication Center
BER
BHCA
BLIP
Abbreviation-1
Abbreviation
BSC
BSM
BTS
CALIA
CAMA
CC
Conference Calling
CCBS
CCITT
CCM
CCMS
CCMX
CCP
CCPP
CCS
CCW
CDG
CDL
CDMA
CDPIA
CDR
CDTIA
CFB
Call Forwarding-Busy
CFD
Call Forwarding-Default
CFNA
CFU
Call Forwarding-Unconditional
CH
Call Hold
CHILL
CI
CIBPA
CIM
CIN
CIN
CINI
Abbreviation-2
CINIA
CINMA
CIP
CIS
CLIP
CNIP
CNIR
CPS
CPSE
CRBT
CROS
CSS
CT
Configuration Table
CT
Call Transfer
CTPS
CTRIA
CW
Call Waiting
Abbreviation
Abbreviation-3
Abbreviation
D
DAT
DBMS
DCI
DCIP
DCN
DG
Data Generator
DKU
Disk Unit
DLI
DLL
DND
Do Not Disturb
DPRAM
DR
Direct Route
DRC
DSBPA
DSBPA
DSC
DSCMA
DSDTA
DSM
DSMSA
DSVMA
DTBPA
DTI
DTI
DTMF
EC
Echo Canceller
ESN
ESS
EXIP
Abbreviation-4
Abbreviation
F
FA
Flexible Alerting
FI
FL
FLM
FMS
FMS
FMSC
FOL
FPBPA
FPH
FPHCA
FPRCA
FR
Fault Report
FS
Frame Synchronization
GLR
GSI
GSM
GSP
HDD
HLR
HOC
HRC
HTR
Hard-To-Reach
HW
Highway
IBG
Abbreviation-5
Abbreviation
Abbreviation-6
IDCPA
IMSI
IN
Intelligent Network
INP
INP
INPP
INS
INST
IOHU
IOM
I/O Management
IP
Intelligent Peripheral
IPBPA
IPC
Interprocessor Communication
IPCIA
ISDN
ISUP
IWF
Interworking Function
Abbreviation
L
LAI
LAMA
LBS
LRP
LRP
LRS
LSC
LSCS
LSPS
LTRIA
MAH
MANM
MBI
MC
MCAW
MCC
MCFW
MCHD
MCS
MCTR
MDSS
MFP
Multi-Function Peripheral
MGCP
MHP
MIN
MIT
ML
Modeling Language
MLSI
MMC
MMDST
MMP
Abbreviation-7
Abbreviation
MMS
MMUL
MNC
MP
Main Processor
MPBPA
MPBPB
MPC
MPDM
MPDMA
MPDMA
MPDMA
MPH
MPSH
MR
Modification Request
MRP
MSBIA
MSC
MSC
MSDP
MSL
MSS
MT
MTCS
MTU
MVQT
MVQT
MVQTA
NCA
No Circuit Available
NCD
NDH
NES
NES
Network Synchronization
NEW
Abbreviation-8
NMC
NMI
NMS
NMSI
NPS
NPSV
NSBPA
NSCG
NSCGA
NSCMA
NSM
NSP
NTP
NTR
NWC
Abbreviation
Abbreviation-9
Abbreviation
O
O&M
OMBPA
OMC
OMP
OMP
OPP
OTRMA
OTRMA
PB
Push Button
PBA
PBUS
Packet Bus
PCA
PCM
PCN
PCS
PDGN
PDSN
PLCM
PLCP
PLM
PLMN
PMS
POVLD
Processor Overload
PP
Peripheral Processor
PP
Peripheral Processor
PPH
PPM
PPOS
PRI
PRN
PSI
Abbreviation-10
PSPDN
PSTN
R2MFC
R2 Multi-Frequency Compelled
RA
Rate Adapter
RAPU
RCBPA
RCO
RDH
RG
RIC
Abbreviation
Rerouting
RSGUA
S7DH
S7DIR
S7H
S7INM
S7LS
S7SDH
S7SL
S7SMG
S7SRC
SACL
SAPI
SC
Sequence Chart
SCA
SCCI
SCCIA
SCCP
SCCS
Abbreviation-11
Abbreviation
Abbreviation-12
SCE
SCM
SCM
SCP
SCS
SDU
SHW
Subhighway
SIBPA
SIOH
SL
Signaling Link
SLCS
SLI
SLME
SMDX
SMDXA
SME
SMHP
SMHS
SMS
SMS
SMS
SMSC
SMTS
SPBPA
SPC
SPINA
SPINI
SPM
SS No.7
SSBPA
SSC
SSCA
SSCM
SSCO
SSD
SSD
SSIO
SSL
SSMX
SSMXA
SSP
SSP
SSPHA
SSS
SSW
ST
STG
STM
STN
STNI
STP
STRPT
TBSEL
TD-Bus Selection
TC7
TCAP
TCAS
TD-Bus
TDCMA
TDCMA
TDCS
TDMA
TDN
TDSH
TDSL
TDTIA
TI
TLDN
TLT
TMBPA
Abbreviation
Abbreviation-13
Abbreviation
TMS
TMSI
TSBPA
TSCMA
TSL
TSL
TSP
TSW
TWC
Three-Way Calling
UIM
UPI
VDC
VLR
VLR
VMH
VMHP
VMHS
VMS
VMS
VP
Voice Privacy
VSM
X.25CM
Abbreviation-14
SDX-MSC II
System Description
2002 Samsung Electronics Co., Ltd.
All rights reserved.
Information in this document is proprietary to SAMSUNG
Electronics Co., Ltd
No information contained here may be copied, translated,
transcribed or duplicated by any form without the prior written
consent of SAMSUNG.
Information in this document is subject to change without notice.
Visit us at
http://www.samsungnetwork.com