P. 1
Dheeraj Roaming Basics Org

Dheeraj Roaming Basics Org

|Views: 15|Likes:
Publicado porDheeraj Kumar

More info:

Published by: Dheeraj Kumar on Sep 05, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPTX, PDF, TXT or read online from Scribd
See more
See less

09/05/2010

pdf

text

original

Roaming: Basics

Dheeraj Kumar
12/03/2009

Information Security Level 2 ± Sensitive © 2008 ± Proprietary and Confidential Information of Amdocs

by means of using visited network. 2 Information Security Level 2 ± Sensitive © 2008 ± Proprietary and Confidential Information of Amdocs .What is Roaming? > Roaming is a general term in wireless telecommunications that refers to the extending of connectivity service in a location that is different from the home location where the service was registered. > Roaming is defined as the ability for a cellular customer to automatically make and receive voice calls. or access other services when traveling outside the geographical coverage area of the home network. send and receive data.

Types of Roaming > National Roaming: If the visited network is in the same country as the home network. this is known as National Roaming. this is International Roaming (the term Global Roaming has also been used). > International Roaming: If the visited network is outside the home country. 3 Information Security Level 2 ± Sensitive © 2008 ± Proprietary and Confidential Information of Amdocs .

> The legal roaming business aspects negotiated between the roaming partners for billing of the services obtained are usually stipulated in so called Roaming Agreements.Roaming Agreements > Roaming is technically supported by mobility management. 4 Information Security Level 2 ± Sensitive © 2008 ± Proprietary and Confidential Information of Amdocs . authentication and billing procedures. > An agreement between two or more wireless telephone companies outlines the terms and conditions under which the participating companies will provide wireless service to each others subscribers.

and service is denied by the visited network.Roaming process > When the mobile device is turned on or is transferred via a handover to the network. and attempts to identify its home network. > If there is no roaming agreement between the two networks. maintenance of service is impossible. this new "visited" network sees the device. 5 Information Security Level 2 ± Sensitive © 2008 ± Proprietary and Confidential Information of Amdocs . notices that it is not registered with its own system.

> If successful. the visited network begins to maintain a temporary subscriber record for the device. > The visited network contacts the home network and requests service information (including whether or not the mobile should be allowed to roam) about the roaming device using the IMSI number. 6 Information Security Level 2 ± Sensitive © 2008 ± Proprietary and Confidential Information of Amdocs .Roaming process contd. the home network updates its information to indicate that the mobile is on the host network so that any information sent to that device can be correctly routed. Likewise.

HLR > A Home Location Register (HLR) is a database of user (subscriber) information. 7 Information Security Level 2 ± Sensitive © 2008 ± Proprietary and Confidential Information of Amdocs . i. and CDMA networks. user preferences. used in mobile (cellular) networks. > It is a key component of mobile networks such as GSM. > HLRs are used by the Mobile Switching Centers (MSCs) to originate and deliver arriving mobile calls. user¶s current location.e.. TDMA. A HLR contains user information such as account information. features subscribed to by the user. account status. etc. customer profiles.

VLR > A Visiting Location Register (VLR) is a database. which is used by the mobile network to temporarily hold profiles of roaming users (users outside their home area). 8 Information Security Level 2 ± Sensitive © 2008 ± Proprietary and Confidential Information of Amdocs . similar to a HLR. > MSCs use a VLR to handle roaming users. > This VLR data is based on the user information retrieved from a HLR.

9 Information Security Level 2 ± Sensitive © 2008 ± Proprietary and Confidential Information of Amdocs . it is also recorded in the VLR. it first checks a database to determine if the user is in his/her home area or is roaming. > User is Roaming: VLR contacts the user¶s HLR to get the necessary information to set up a temporary user profile. > The user¶s location is recorded in the HLR. i. terminating.How are the HLR and VLR used? > Each mobile network has its own HLRs and VLRs. the user is a visitor. When a MSC detects a mobile user¶s presence in the area covered by its network. > User in Home Area: HLR has the necessary information for initiating. and in case the user roaming.e. or receiving a call..

Making and Receiving a call > The user wants to make a call: > User in Home Area: MSC contacts the HLR prior to setting up the call. > User is Roaming: MSC contacts the VLR prior to setting up the call. 10 Information Security Level 2 ± Sensitive © 2008 ± Proprietary and Confidential Information of Amdocs . > There is a call for the user (call goes to the home MSC): > User in Home Area: Home MSC delivers the call immediately. > User is Roaming: Home MSC contacts the VLR to determine the appropriate switch in the roaming area to handle the arriving call and then transfers the call to the roaming area MSC.

. called party. etc. AMPS etc.Billing > The usage by a subscriber in a visited network is captured in a file called the TAP (Transferred Account Procedure) for GSM / CIBER (Cellular Intercarrier Billing Exchange Roamer) for CDMA. calling party. location. file and is transferred to the home network. time of call and duration. 11 Information Security Level 2 ± Sensitive © 2008 ± Proprietary and Confidential Information of Amdocs .. > A TAP/CIBER file contains details of the calls made by the subscriber viz.

Billing contd. > The TAP/CIBER files are rated as per the tariffs charged by the visited operator. 12 Information Security Level 2 ± Sensitive © 2008 ± Proprietary and Confidential Information of Amdocs . > The home operator then bills these calls to its subscribers and may charge a mark-up/tax applicable locally.

Thank you Information Security Level 2 ± Sensitive © 2008 ± Proprietary and Confidential Information of Amdocs .

You're Reading a Free Preview

Descarga
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->