共查询到20条相似文献,搜索用时 125 毫秒
1.
项目简介:项目所属科学技术领域、主要内容、特点及应用推广情况:技术领域:G&C移动通信系统的应用领域是在移动通信运营行业。其主要目的是综合利用GSM和CDMA两网的资源,做到两网的优势互补,满足移动运营商向用户提供不同制式网络漫游的需求。主要内容:G&C双模移动通信系统是一个能够支持CD-MA、GSM两种制式移动网络之间用户互相漫游的一个全新的技术和系统。系统满足以下几方面的市场需求:GSM用户可以根据需要选择CDMA网或GSM网的服务,即GSM用户可以使用CDMA网络的数据业务和语音业务;CDMA用户可以根据需要选择GSM网或CD… 相似文献
2.
3.
4.
中国移动作为传统GSM网络运营商拥有广覆盖的GSM/GPRS网络和庞大的用户群,这对于其建设3G来讲,既是优势,也是限制.庞大的GSM用户资源是中国移动最宝贵的财富,3G网络的建设应该将对用户的影响降到最低,因此中国移动明确提出GSM/TD核心网融合组网,2G/3G核心网一张网的理念,提出"三不原则",即不改号、不换卡、不登记. 相似文献
5.
GSM 1X是一种将GSM的核心网同CDMA 1X的无线接入部分结合起来的技术,它支持移动通信用户在GSM和CDMA两网之间漫游,并使用被访网络业务.介绍了中兴通讯推出的世界首款GSM 1X技术的GGG网关解决方案产品ZXC10-FLR/AUC,其已在某运营商的GSM和CDMA网关商用局建设中正式商用. 相似文献
6.
GSM 1X是一种将GSM的核心网同CDMA 1X的无线接入部分结合起来的技术,它支持移动通信用户在GSM和CDMA两网之间漫游,并使用被访网络业务。介绍了中兴通讯推出的世界首款GSM 1X技术的GGG网关解决方案产品ZXC10-FLR/AUC,其已在某运营商的GSM和CDMA网关商用局建设中正式商用。 相似文献
7.
8.
9.
冯晓芳 《通信业与经济市场》2005,(12):63-63
从19日起,无数经常进行全球漫游和优先选网的用户不仅可以免去怀揣两部手机之苦,更重要的是能在一部手机上无须呼叫转接,实现GSM、CDMA网络同时在线接听电话和收发短信。 相似文献
10.
11.
文章探讨并提供了一种简单高效的国际漫游网络优选解决方案。在该解决方案中,归属网络运营商用户可以在漫游地自动注册到拥有高优先级的网络,归属网络运营商可以控制这一过程,从而实现其对国际漫游用户的可管可控。该方案基于现网的HLR网元来实现,无需部署新网元,投资少,见效快,对现有网络基本上没有影响,值得运营商实验、部署。 相似文献
12.
在我国,中国移动已成为全球为数不多的几个同时拥有固定网络与移动网络的大运营商之一,如何充分利用固定网络资源与移动网络资源成为了全球通信业界研究的热点之一。本平台的目标是利用UMA技术有效的将Wi-Fi网络与TD-SCDMA网络和GSM网络结合在一起,实现三网融合,将话音业务和数据业务进行分流;由一个具有自主开发产权的UMA控制器(UNC)和双模手机构成。在不影响现有移动网络的基础上,通过增加UMA控制器,双模手机能够通过Wi-Fi网络无缝接入移动通信网络,实现WLAN、TD-SCDMA网络和GSM网络相互切换、漫游、无线上网等功能,移动用户不需改变号码即可享受该功能。 相似文献
13.
分析了GSM双频手机的入网流程,探讨了国际漫游情况下网络选择的有关问题,指出小区参数CBQ对手机入网速度的影响。 相似文献
14.
Clustering is an important method in the mobile Ad-hoc network (MANET). As a result of their mobility, the cluster selection is inevitable for the mobile nodes during their roaming between the different clusters. In this study, based on the analysis of the cluster-selecting problem in the environment containing multiple clusters, which are overlaying and intercrossing, a novel dynamic selecting mechanism is proposed to resolve the dynamic selection optimization of roaming between the different clusters in MANET. This selecting mechanism is also based on the consideration of the stability of communication system, the communicating bandwidth, and the effect of cluster selecting on the communication and also in accordance with the Markov decision-making model. 相似文献
15.
16.
本文对基于七号信令集中监测平台的GSM移动用户漫游分析系统的实现原理和设计方案进行了分析,并对其应用做出介绍. 相似文献
17.
分析对比了基于软交换技术的移动通信网与传统移动通信网的信令路由变化情况,探讨了漫游短信服务系统在软交换通信网条件下进行漫游信令监测的方案。 相似文献
18.
Mehrotra A. Golding L.S. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1998,86(7):1480-1497
Important aspects of mobility and security in the Global System for Mobile communications (GSM) system are discussed in this paper. Mobility management functions are broadly categorized into three groups: a) mobile turned on, b) mobile turned off, and c) mobile in conversation. The paper first outlines the mobile synchronization sequence followed by its mobility functions: mobile identification, authentication, international mobile station identity attach/detach, and its location update. The important role of security in the GSM system is fully explored, including authentication, encryption, and positive identification of mobile equipment before the user is provided with the service. The future of mobility management with respect to subscriber identification module roaming, intersystem roaming, advancement in mobile service, and its impact on data base requirements, is covered 相似文献
19.
A self-encryption mechanism for authentication of roaming and teleconference services 总被引:2,自引:0,他引:2
A simple authentication technique for use in the global mobility network (GLOMONET) is proposed. This technique is based on the concept of distributed security management, i.e., the original security manager administrates the original authentication key (long-term secret key) acquired when a user makes a contract with his home network, while a temporary security manager is generated for a roaming user in the visited network that provides roaming services. The temporary security manager will take the place of the original security manager when the roaming user stays in the service area of the visited network. In the proposed authentication protocol for the regular communication phase, the procedures of the original security manager and the temporary security manager are the same except for introducing different parameters. Furthermore, the proposed technique not only reduces the number of transmissions during the authentication phase, but it also can decrease the complexity of mobile equipment. The idea behind the proposed technique is to introduce a simple mechanism which is called "self-encryption". We also suggest that this mechanism can be easily adopted as the authentication function for the secure teleconference service. 相似文献