Sei sulla pagina 1di 2

 TRAFIC IN INTERFACING

From the subscriber’s point of view, there are two different call setup procedures
requiring a different approach:
Mobile Originated Call (MOC) & Mobile Terminated Call (MTC)
These can be explained as:
Mobile Originated Call (MOC)
If the mobile subscriber initiates the call, we talk about a mobile originated call
(MOC).Then, the mobile subscriber is the calling party.
Basically, the necessary functions are carried out by the servicing Mobile-services
Switching center/Visitor Location Register (MSC/VLR). They are:
 security control
 subscription checking
 Call routing towards the destination.

Basic Principles of the MOC


The MSC/VLR procedures for MOC initiation and completion contain all functions to
complete the setting up of call attempts from mobile stations.

MOC initiation:The MOC initiation procedure is triggered by a service request which is


sent from the mobile station to the MSC/VLR via the base station system (BSS).
Depending on the contents of this service request, the MOC initiation procedure handles:
 Speech and data calls
 Emergency calls
 Subscriber controlled inputs
 Short messages (mobile originated).
Upon receiving the service request, the MOC initiation procedure will start the
confidentiality (security) functions. This means that the MSC/VLR will carry out
authentication, equipment control, ciphering/deciphering and/or TMSI reallocation
should that be required.
Authentication
The authentication function determines a mobile subscriber’s authorization to access the
PLMN and protects the latter from unauthorized use. For this purpose, triples generated
by the AuC and containing a random number (RAND), a signed response (SRES) and a
cipher key (Kc) are used.
Equipment control
The equipment control function checks the equipment status as to whether the mobile
equipment is allowed, is to be observed or is not allowed within the PLMN. The
equipment control is carried out using the international mobile equipment identity (IMEI)
which is hard-coded at the mobile equipment.
Ciphering/deciphering
Ciphering/deciphering secures the information exchange via the radio interface.
Therefore, both the mobile station and the BSS are loaded with the same cipher key (Kc).
TMSI reallocation
The TMSI (temporary mobile subscriber identity) reallocation function periodically
assigns a new TMSI to a mobile subscriber. The purpose of this function is to prevent an
intruder from identifying a mobile subscriber by listening to the signaling on the radio
path. To increase confidentiality, the TMSI is reallocated at particular moments in time.
For certain projects, however, emergency call setup must be possible without the
subscriber identity module (SIM) being inserted. Then, the IMEI is used for identification
purposes instead of the usual TMSI or IMSI (international mobile subscriber
identity).This also means that authentication, ciphering/deciphering and TMSI
reallocation are
not carried out.
MOC completion
Having received the setup message from the mobile station, the MSC/VLR starts the
MOC completion procedure. The MSC/VLR performs subscription and service
compatibility checks. When these checks are positive, meaning that the mobile
subscriber’s connection request is accepted, the latter is informed. Afterwards, the
MSC/VLR allocates a traffic channel, seizes a terrestrial circuit and continues the
analysis of the dialed digits. The result enables the MSC/VLR to select a free trunk line
towards the destination.
Connection establishment continues and if the called party answers the call, the
MSC/VLR receives an indication from the remote exchange. The MSC/VLR now
completes the call, i.e. connects the mobile subscriber and starts the data collection for
charging purposes.

Potrebbero piacerti anche