Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for realizing boundary service of cross base station controller

A technology of a base station controller and an implementation method, applied in the field of communication, can solve the problems of users in the border area being unable to make calls, and achieve the effect of reducing the capacity load

Inactive Publication Date: 2009-10-07
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention is made in consideration of the above-mentioned problems. For this reason, the main purpose of the present invention is to provide a method and system for realizing cross-base station controller boundary services, so as to solve the problem that users in the boundary areas cannot perform call access and other services in the related art. The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing boundary service of cross base station controller
  • Method and system for realizing boundary service of cross base station controller
  • Method and system for realizing boundary service of cross base station controller

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0035] Example 1: Calls made across BSC borders

[0036] In this example, the process of initiating a call across the boundary of a BSC will be described, and the process of initiating a service call is implemented in conjunction with the process of soft handover between A3\A7 BSCs.

[0037] figure 2 Shows the cross-BSC calling process, which specifically includes the following steps:

[0038] Step 201, the MS terminal initiates a call at the target T_BTS, and the target BTS sends a confirmation message of the base station after receiving the call initiation message, and simultaneously constructs an abisc access message to the target T_BSC;

[0039] Step 202, after the target T_BSC receives the Abisc access message, it judges that it is not a user managed by the BSC, that is, the BSC does not maintain the information for this use, and then sends an A7 access message to all interconnected BSCs;

[0040] Step 203, after the source side S_BSC receives the A7 access message, it...

example 2

[0049] Example 2: Inter-BSC paging call flow

[0050] For the process of inter-BSC paging call processing, please refer to image 3 , the specific steps are as follows:

[0051] Step 301, after the V5 called signaling from the PSTN arrives at the source side S_BSC, the BSC sends the paging signal to the S_BSC according to the latest registration information of the user in the VLR module or the cell location information of the calling record (information that can identify which BSC it belongs to). The request is sealed in A7fPagingCHMessageTransfer and sent to the target T_BSC;

[0052] Step 302, after receiving the A7fPagingCHMessageTransfer, the target T_BSC converts it into an AbiscfPagingCHMsgTransfer message and sends it to T_BTS, and then T_BTS constructs a real air interface paging message and sends it to the terminal MS;

[0053] Step 303, the terminal responds after receiving the paging request message, sends a paging response message to the target T_BTS, the base st...

example 3

[0055] Example 3: Cross-BSC registration process

[0056] For the process of cross-BSC registration, please refer to Figure 4 , which specifically includes the following steps:

[0057] Step 401, when the target T_BTS receives the air interface registration message sent by the terminal MS, it sends the abisc access message AbiscrAccessCHMsgTransfer to the T_BSC;

[0058] Step 402, after receiving the abisc access message, the target T_BSC judges that it is not a user of this BSC according to the VLR module of the IMSI in the BSC, that is, the BSC does not maintain the information for this use, and then sends an A7 access message to all interconnected BSCs A7rAccessCHMessageTransfer;

[0059] Step 403, after receiving the A7 access message, the S_BSC on the source side records the information carried in the registration message in the VLR module of the BSC, and updates the cell location information; at the same time, the registration acceptance message is encapsulated in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing the boundary service of a cross base station controller, including the steps: step S102, a terminal initiates a service to a target base station transmitting and receiving table under a target base station controller, and the target base station controller judges whether the terminal is managed by the target base station controller; step S104, when the terminal is judged to be not managed by the target base station controller, the target base station transmitting and receiving table is informed to send a service request message of the service to a base station controller connected with the target base station controller; and step S106, after receiving the service request message, a resource base station controller of a management terminal in the base station controller connected with the target base station controller carries out the service according to the service request message. In addition, the invention also discloses a system for realizing the boundary service of a cross base station controller. The invention can realize services such as call access of a boundary user between BSCs, call of cross BSC of a roamer, and the like, provides a support for the call of the BSC boundary user and lowers the capability load of a system user.

Description

technical field [0001] The present invention relates to the communication field, and in particular, relates to a method and system for realizing cross-base station controller boundary services. Background technique [0002] The emergence of the access network concept enables telecom operators to comprehensively consider the equipment configuration of user loops, focusing on both current needs and network development. [0003] Among various access networks, the access network technology using the V5 standard interface is conducive to the future development of the construction of communication information networks and the construction of dynamic and relatively independent access network systems of various manufacturers. However, there is still a big difference between the system using the V5 interface to wirelessly access the PSTN and the real cellular mobile communication system. There is no such function for the management of user mobility in the PSTN. Therefore, these funct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W36/10H04W36/18H04W60/00H04W68/00
Inventor 陈延雄
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products