WO1999012376A2 - Procedure for setting up a call in a wireless local loop - Google Patents

Procedure for setting up a call in a wireless local loop Download PDF

Info

Publication number
WO1999012376A2
WO1999012376A2 PCT/FI1998/000654 FI9800654W WO9912376A2 WO 1999012376 A2 WO1999012376 A2 WO 1999012376A2 FI 9800654 W FI9800654 W FI 9800654W WO 9912376 A2 WO9912376 A2 WO 9912376A2
Authority
WO
WIPO (PCT)
Prior art keywords
procedure
subscriber
consistent
access node
call
Prior art date
Application number
PCT/FI1998/000654
Other languages
French (fr)
Other versions
WO1999012376A3 (en
Inventor
Jaakko Rautiainen
Original Assignee
Nokia Networks Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Networks Oy filed Critical Nokia Networks Oy
Priority to EP98941432A priority Critical patent/EP1010335A2/en
Priority to AU89802/98A priority patent/AU8980298A/en
Priority to JP2000509243A priority patent/JP2001515327A/en
Publication of WO1999012376A2 publication Critical patent/WO1999012376A2/en
Publication of WO1999012376A3 publication Critical patent/WO1999012376A3/en
Priority to US09/516,973 priority patent/US6892079B1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/04Selecting arrangements for multiplex systems for time-division multiplexing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/1307Call setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13098Mobile subscriber
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13204Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13292Time division multiplexing, TDM
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13298Local loop systems, access network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13339Ciphering, encryption, security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13405Dual frequency signaling, DTMF
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/75Temporary identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/14WLL [Wireless Local Loop]; RLL [Radio Local Loop]

Definitions

  • the present invention relates to a procedure as defined in the preamble of claim 1.
  • WLL wireless local loop
  • a terminal unit is connected via a wireless link to an access node (AN) .
  • the access node may consist of multiplexers, crossbar switches and various transmitting systems.
  • the WLL system may be based e.g. on technology used in mobile telephone systems, such as the GSM/DCS1800 technology (GSM, Global System for Mobile Communications; DCS, Digital Cellular System) .
  • GSM Global System for Mobile Communications
  • DCS Digital Cellular System
  • GSM Global System for Mobile Communications
  • DCS- 1800 is a mobile communication system standardised by ETSI, which is based on the GSM specification and aims at a more effective use of microcells and which works in the frequency range of 1800 MHz.
  • the access node can be connected to the telephone exchange using e.g. a V5.2 protocol consistent with the ETS 300 347-1 standard or a V5.1 protocol consistent with the ETS 300 324-1 standard.
  • the access node functions as a converter between GSM signalling and V5 signalling.
  • the checking functions are designed to prevent illicit access to the network for users who have no right to use it, and to prevent the use of e.g. a mobile station reported stolen.
  • the checking operations defined by the GSM specifications, carried out during call setup retard the call setup process so that the V5 signalling time-outs are tripped and the call must be disconnected even though it is most likely to be successful.
  • fast setup of an outgoing call is particu- larly important .
  • An operation retarding call setup is e.g. change of the subscriber identity code (TMSI realloca- tion) , which means changing the temporary subscriber identity code assigned for the subscriber by the visi- tor location register and allowing confidential subscriber identification e.g. during the call.
  • Another check retarding call setup is the verification of the subscriber's access right, i.e. subscriber authentication, which means checking the subscriber data of a mobile station and preventing illicit access to the network.
  • a third check retarding call setup is the verification of the subscriber's equipment identity code (IMEI check) . To check the equipment identity code, it is compared with a register of equipment identity codes of mobile stations reported stolen and/or defective.
  • IMEI is an international mobile station equipment identity code, by means of which a mobile station can be unambiguously identified.
  • time-outs in the PSTN protocol in the V5 interface cause problems in call setup in a wireless local loop system.
  • the time-out according to the V5 PSTN protocol between the start message and the acknowledgement mes- sage (the telephone rings) is max. 4 seconds (standard ETS 300 324-1 13.6) .
  • the object of the present invention is to eliminate the drawbacks described above.
  • a specific object of the invention is to pre- sent a procedure that can be used to accelerate call setup so that unnecessary tripping of time-outs and needless disconnection of calls are avoided and the time available for the signalling needed for the call setup itself is increased.
  • the procedure of the invention is characterised by what is presented in claim 1.
  • checking functions are performed during voice mode connection of the call instead of being performed during call setup.
  • the invention provides the advantage that more time is made available for the signalling needed for call setup while possible tripping of time-outs and unnecessary disconnection of the call are avoided.
  • subscriber's terminal units are connected to an access node via a radio link consistent with the GSM specification and checking functions are carried out, said functions comprising change of the subscriber identity code (TMSI reallocation) , verification of subscriber authenticity (authentication) and/or verification of the subscriber's equipment identity code (IMEI check).
  • TMSI reallocation change of the subscriber identity code
  • IMEI check verification of the subscriber's equipment identity code
  • the change of the subscriber identity code is TMSI reallocation consistent with the GSM 04.08 4.3.1. standard.
  • the veri- fication of subscriber authenticity is an authentication consistent with the GSM 04.08. 4.3.2 standard.
  • the verification of the subscriber's equipment identity code is an IMEI check consistent with the GSM 04.08. 4.3.3 standard.
  • the V5 interface is a V5.2 interface consistent with the ETS 300 347-1 standard.
  • the V5 in- terface is a V5.1 interface consistent with the ETS 300 324-1 standard.
  • the figure presents a signalling diagram representing a call originated by a terminal unit TU in a wireless local loop and substantially corresponding to a mobile-originated call MOC consistent with the GSM specifications.
  • the system components in the diagram are a base transceiver station BTS, an access node AN, i.e. a node of an access network, and a local exchange LE.
  • the access node AN has three program segments called registers. These are an equipment identity register, an authentication register and, hierarchically above these, a visitor location register.
  • the equipment identity register contains the international mobile station equipment identity numbers (IMEI) .
  • IMEI international mobile station equipment identity numbers
  • An equipment identity number may be placed on a white, grey or black list, and in response to an IMEI check the equipment identity register returns the list colour of the IMEI concerned.
  • the authentication register produces the triplets needed in authentication and contains the data required for authentication.
  • the functions of the visitor location register include making the decision about carrying out the checks.
  • the following register terms are used: authentication centre AUC; AC, equip- ment identity register EIR and visitor location register VLR.
  • the visitor location register is designated WFR (wireless fixed register) .
  • Call setup in a wireless local loop in the so-called non-transparent mode as presented in the figure is substantially identical with call setup in a conventional GSM system.
  • the access node AN also comprises functions that are included in the mobile switching centre/visitor location register MSC/VLR and home location register/authentication centre/equipment identity register (HLR/AC/EIR) of an ordinary GSM system.
  • HLR/AC/EIR home location register/authentication centre/equipment identity register
  • the subscriber terminal units communicate with the access node AN by radio.
  • the signalling between the terminal unit and the access node AN is message based signalling consistent with the GSM specifi- cations (GSM/DCS) .
  • the access node AN is connected to a wired network local exchange LE via a V5.2 interface consistent with the ETS 300 347-1 standard.
  • the terminal unit When the subscriber picks up the receiver, the terminal unit generates a local dial tone.
  • the subscriber has a predetermined period of time to dial the first digit .
  • the dial tone goes out as soon as the first digit has been dialled.
  • Call setup is started upon the lapse of a predetermined period of time after the last digit has been dialled.
  • the terminal unit TU requests a call by sending a CHANNEL REQUEST message to the base transceiver station BTS .
  • the base transceiver station BTS transmits a CHANNEL_REQUIRED message to the access node AN, which starts a search to find a communication channel.
  • the access node AN activates the channel by sending a CHANNEL ACTIVATION message to the base transceiver station BTS.
  • the base transceiver station acknowledges activation by returning a CHANNEL ACTIVATION ACK message.
  • the base transceiver station BTS starts transmission and reception on this channel using the power and timing data received in this message.
  • the access node AN After the communication channel has been successfully activated, the access node AN sends an IMMEDIATE ASSIGNMENT COMMAND message to ⁇ the base transceiver station BTS. 6. This message contains an IMMEDIATE
  • the terminal unit TU is tuned to the specified communication channel and starts setting up a signalling link over the network.
  • the terminal unit TU sends a layer-2 SABM message to the base transceiver station BTS via the communication channel.
  • the SABM contains a layer-3 service request message.
  • the base transceiver station sends the service request of the terminal unit further to the access node AM in an ESTABLISH INDICATION message, which includes the subscriber's temporary mobile subscriber identity (TMSI) code.
  • TMSI temporary mobile subscriber identity
  • the base transceiver station BTS acknowledges the SABM message by sending a UA frame to the terminal unit TU.
  • the access node finds the subscriber's L3 address (using the TMSI and IMSI) and checks the state of the corresponding V5 interface. If call setup is allowed, the access node AN sends an ESTABLISH message to the local exchange LE.
  • the access node AN starts encryption by sending an ENCRYPTION COMMAND message to the base transceiver station BTS.
  • the base transceiver station BTS analyses the command. If en- cryption is needed, the base transceiver station BTS activates a demodulator for the deciphering of the encryption.
  • the base transceiver station BTS sends a CIPHERING MODE COMMAND mes- sage to the terminal unit TU.
  • the local exchange LE sends to the access node AM an ALLOCATION message, which contains the time slot used in the V5.2 interface.
  • the access node AN acknowledges this by sending an ALLOCATION COPMLETE message to the local exchange LE .
  • the terminal unit TU After receiving the CIPHERING MODE COMMAND message, the terminal unit TU starts encryp- tion deciphering and ciphering using an available ciphering key and returns to the base transceiver station BTS, in ciphered form, a CIPHERING MODE COMPLETE message or the next message it is to send.
  • the base transceiver station BTS Upon re- ceiving the CIPHERING MODE MOMPLETE message (or any layer-2 frame correctly ciphered) , the base transceiver station BTS starts encryption and transfers the message transparently to the access node AN.
  • the local exchange LE When the local exchange LE is ready to receive a dialled number, it sends an ESTABLISH ACK message to the access node AN. A connection between the access node AN and the local exchange LE is set up and the speech path is connected through.
  • the terminal unit TU starts call setup by a SETUP message, which contains e.g. the number of the called subscriber and the call type (voice/data) .
  • the access node AN checks in the VLR/HLR database whether call setup is allowed for the subscriber. If the right conditions are fulfilled, then the access node AN sends the DTMF (dual tone multi- frequency) numbers
  • the access node Having sent the numbers, the access node sends a CALL PROCEEDING message to the terminal unit TU, indicating that the call is under processing.
  • the channel mode is changed from signalling to voice via a "mode modify" procedure.
  • the access node AN sends a MODE MODIFY message to the base transceiver station BTS to change the channel mode. Synchronisation by a transcoder begins. After receiving a MODE MODIFY ACK message, the access node starts the channel mode change process and sends a CHANNEL MODE MODIFY message to the terminal unit TU. This command is transparent to the base transceiver station BTS. Having received the CHANNEL MODE MODIFY message, the terminal unit TU changes the channel mode from signalling to voice and sends an acknowledgement to the access node AN with a CHANNEL MODE MODIFY ACK message. This message, too, is transparent to the base transceiver station BTS.
  • the terminal unit TU is set to voice mode by sending a CONNECT message to it .
  • the terminal unit TU acknowledges this by sending a CONNECT ACK message.
  • the subscriber now hears the ring-back tone from the local exchange LE.
  • the visitor location register VLR of the access node does not recognise the temporary TMSI code, then the international mobile subscriber identity IMSI is requested by an IDENTIFICATION REQUEST message. In response, and IDENTIFICATION RESPONSE message is sent to the terminal unit TU. 27.
  • the access node AN starts authentication by sending an AUTHENTICATION REQUEST message to the terminal unit TU.
  • the terminal unit TU sends a calculated response in an AUTHENTICATION RESPONSE message to the access node AN.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Procedure for setting up a call in a wireless local loop, which is based on mobile communication technology and in which terminal units (TU) are connected via a radio link to an access node (AN) and from the access node to a wired network local exchange (LE) via a standard V5 interface and in which checking functions consistent with a mobile communication specification are carried out. To accelerate call setup, checking functions are carried out during voice mode connection of the call.

Description

PROCEDURE FOR SETTING UP A CALL IN A WIRELESS LOCAL LOOP
The present invention relates to a procedure as defined in the preamble of claim 1. In a wireless local loop (WLL, Wireless Local
Loop or RLL, Radio in Local Loop) , a terminal unit is connected via a wireless link to an access node (AN) . The access node may consist of multiplexers, crossbar switches and various transmitting systems. The WLL system may be based e.g. on technology used in mobile telephone systems, such as the GSM/DCS1800 technology (GSM, Global System for Mobile Communications; DCS, Digital Cellular System) . GSM is a European digital mobile communication system standardised by ETSI . DCS- 1800 is a mobile communication system standardised by ETSI, which is based on the GSM specification and aims at a more effective use of microcells and which works in the frequency range of 1800 MHz. Between the terminal unit and the access node there is a base trans- ceiver station, through which call signals received from the terminal unit over a radio channel are transmitted via the access node to a public telephone network and vice versa. The access node can be connected to the telephone exchange using e.g. a V5.2 protocol consistent with the ETS 300 347-1 standard or a V5.1 protocol consistent with the ETS 300 324-1 standard. The access node functions as a converter between GSM signalling and V5 signalling.
During call setup in a local loop, various checking functions related to network security management are carried out. The checking functions are designed to prevent illicit access to the network for users who have no right to use it, and to prevent the use of e.g. a mobile station reported stolen. The checking operations defined by the GSM specifications, carried out during call setup, retard the call setup process so that the V5 signalling time-outs are tripped and the call must be disconnected even though it is most likely to be successful. In a wireless local loop, fast setup of an outgoing call is particu- larly important .
An operation retarding call setup is e.g. change of the subscriber identity code (TMSI realloca- tion) , which means changing the temporary subscriber identity code assigned for the subscriber by the visi- tor location register and allowing confidential subscriber identification e.g. during the call. Another check retarding call setup is the verification of the subscriber's access right, i.e. subscriber authentication, which means checking the subscriber data of a mobile station and preventing illicit access to the network. A third check retarding call setup is the verification of the subscriber's equipment identity code (IMEI check) . To check the equipment identity code, it is compared with a register of equipment identity codes of mobile stations reported stolen and/or defective. IMEI is an international mobile station equipment identity code, by means of which a mobile station can be unambiguously identified.
Especially the time-outs in the PSTN protocol in the V5 interface (standard ETS 300 324-1 1 13) cause problems in call setup in a wireless local loop system. For instance, in the case of a terminating call, the time-out according to the V5 PSTN protocol between the start message and the acknowledgement mes- sage (the telephone rings) is max. 4 seconds (standard ETS 300 324-1 13.6) .
The object of the present invention is to eliminate the drawbacks described above.
A specific object of the invention is to pre- sent a procedure that can be used to accelerate call setup so that unnecessary tripping of time-outs and needless disconnection of calls are avoided and the time available for the signalling needed for the call setup itself is increased.
The procedure of the invention is characterised by what is presented in claim 1. According to the invention, to accelerate call setup, checking functions are performed during voice mode connection of the call instead of being performed during call setup. The invention provides the advantage that more time is made available for the signalling needed for call setup while possible tripping of time-outs and unnecessary disconnection of the call are avoided.
In an embodiment of the procedure, subscriber's terminal units are connected to an access node via a radio link consistent with the GSM specification and checking functions are carried out, said functions comprising change of the subscriber identity code (TMSI reallocation) , verification of subscriber authenticity (authentication) and/or verification of the subscriber's equipment identity code (IMEI check). In an embodiment of the procedure, the change of the subscriber identity code is TMSI reallocation consistent with the GSM 04.08 4.3.1. standard.
In an embodiment of the procedure, the veri- fication of subscriber authenticity is an authentication consistent with the GSM 04.08. 4.3.2 standard.
In an embodiment of the procedure, the verification of the subscriber's equipment identity code is an IMEI check consistent with the GSM 04.08. 4.3.3 standard.
In an embodiment of the procedure, the V5 interface is a V5.2 interface consistent with the ETS 300 347-1 standard.
In an embodiment of the procedure, the V5 in- terface is a V5.1 interface consistent with the ETS 300 324-1 standard. The figure presents a signalling diagram representing a call originated by a terminal unit TU in a wireless local loop and substantially corresponding to a mobile-originated call MOC consistent with the GSM specifications. The system components in the diagram are a base transceiver station BTS, an access node AN, i.e. a node of an access network, and a local exchange LE.
The access node AN has three program segments called registers. These are an equipment identity register, an authentication register and, hierarchically above these, a visitor location register. The equipment identity register contains the international mobile station equipment identity numbers (IMEI) . An equipment identity number may be placed on a white, grey or black list, and in response to an IMEI check the equipment identity register returns the list colour of the IMEI concerned. The authentication register produces the triplets needed in authentication and contains the data required for authentication. The functions of the visitor location register include making the decision about carrying out the checks.
In the GSM/DCS world, the following register terms are used: authentication centre AUC; AC, equip- ment identity register EIR and visitor location register VLR. In conjunction with a wireless local loop, the visitor location register is designated WFR (wireless fixed register) .
Call setup in a wireless local loop in the so-called non-transparent mode as presented in the figure is substantially identical with call setup in a conventional GSM system. In a wireless local loop system, the access node AN also comprises functions that are included in the mobile switching centre/visitor location register MSC/VLR and home location register/authentication centre/equipment identity register (HLR/AC/EIR) of an ordinary GSM system. In a wireless local loop, the subscriber terminal units communicate with the access node AN by radio. The signalling between the terminal unit and the access node AN is message based signalling consistent with the GSM specifi- cations (GSM/DCS) . The access node AN is connected to a wired network local exchange LE via a V5.2 interface consistent with the ETS 300 347-1 standard.
When the subscriber picks up the receiver, the terminal unit generates a local dial tone. The subscriber has a predetermined period of time to dial the first digit . The dial tone goes out as soon as the first digit has been dialled. The item numbers below correspond to the numbering in the figure.
1. Call setup is started upon the lapse of a predetermined period of time after the last digit has been dialled. The terminal unit TU requests a call by sending a CHANNEL REQUEST message to the base transceiver station BTS .
2. The base transceiver station BTS transmits a CHANNEL_REQUIRED message to the access node AN, which starts a search to find a communication channel.
3. After a communication channel has been successfully allocated, the access node AN activates the channel by sending a CHANNEL ACTIVATION message to the base transceiver station BTS.
4. The base transceiver station acknowledges activation by returning a CHANNEL ACTIVATION ACK message. The base transceiver station BTS starts transmission and reception on this channel using the power and timing data received in this message.
5. After the communication channel has been successfully activated, the access node AN sends an IMMEDIATE ASSIGNMENT COMMAND message to ■ the base transceiver station BTS. 6. This message contains an IMMEDIATE
ASSIGNMENT message, which the base transceiver station BTS sends to the terminal unit TU. 7. Having received the IMMEDIATE ASSIGNMENT message, the terminal unit TU is tuned to the specified communication channel and starts setting up a signalling link over the network. The terminal unit TU sends a layer-2 SABM message to the base transceiver station BTS via the communication channel. The SABM contains a layer-3 service request message.
8. The base transceiver station sends the service request of the terminal unit further to the access node AM in an ESTABLISH INDICATION message, which includes the subscriber's temporary mobile subscriber identity (TMSI) code.
9. The base transceiver station BTS acknowledges the SABM message by sending a UA frame to the terminal unit TU.
10. The access node finds the subscriber's L3 address (using the TMSI and IMSI) and checks the state of the corresponding V5 interface. If call setup is allowed, the access node AN sends an ESTABLISH message to the local exchange LE.
11. At the same time, the access node AN starts encryption by sending an ENCRYPTION COMMAND message to the base transceiver station BTS. The base transceiver station BTS analyses the command. If en- cryption is needed, the base transceiver station BTS activates a demodulator for the deciphering of the encryption.
12. If encryption is used, the base transceiver station BTS sends a CIPHERING MODE COMMAND mes- sage to the terminal unit TU.
13.-14. The local exchange LE sends to the access node AM an ALLOCATION message, which contains the time slot used in the V5.2 interface. The access node AN acknowledges this by sending an ALLOCATION COPMLETE message to the local exchange LE .
15. After receiving the CIPHERING MODE COMMAND message, the terminal unit TU starts encryp- tion deciphering and ciphering using an available ciphering key and returns to the base transceiver station BTS, in ciphered form, a CIPHERING MODE COMPLETE message or the next message it is to send. Upon re- ceiving the CIPHERING MODE MOMPLETE message (or any layer-2 frame correctly ciphered) , the base transceiver station BTS starts encryption and transfers the message transparently to the access node AN.
16. When the local exchange LE is ready to receive a dialled number, it sends an ESTABLISH ACK message to the access node AN. A connection between the access node AN and the local exchange LE is set up and the speech path is connected through.
17. The terminal unit TU starts call setup by a SETUP message, which contains e.g. the number of the called subscriber and the call type (voice/data) . The access node AN checks in the VLR/HLR database whether call setup is allowed for the subscriber. If the right conditions are fulfilled, then the access node AN sends the DTMF (dual tone multi- frequency) numbers
(together with the V5 messages) to the local exchange LE.
18. Having sent the numbers, the access node sends a CALL PROCEEDING message to the terminal unit TU, indicating that the call is under processing.
19.-22. The channel mode is changed from signalling to voice via a "mode modify" procedure. First, the access node AN sends a MODE MODIFY message to the base transceiver station BTS to change the channel mode. Synchronisation by a transcoder begins. After receiving a MODE MODIFY ACK message, the access node starts the channel mode change process and sends a CHANNEL MODE MODIFY message to the terminal unit TU. This command is transparent to the base transceiver station BTS. Having received the CHANNEL MODE MODIFY message, the terminal unit TU changes the channel mode from signalling to voice and sends an acknowledgement to the access node AN with a CHANNEL MODE MODIFY ACK message. This message, too, is transparent to the base transceiver station BTS.
23.-24. The terminal unit TU is set to voice mode by sending a CONNECT message to it . The terminal unit TU acknowledges this by sending a CONNECT ACK message. The subscriber now hears the ring-back tone from the local exchange LE.
25.-26. If the visitor location register VLR of the access node does not recognise the temporary TMSI code, then the international mobile subscriber identity IMSI is requested by an IDENTIFICATION REQUEST message. In response, and IDENTIFICATION RESPONSE message is sent to the terminal unit TU. 27. The access node AN starts authentication by sending an AUTHENTICATION REQUEST message to the terminal unit TU.
28. The terminal unit TU sends a calculated response in an AUTHENTICATION RESPONSE message to the access node AN.
The invention is not restricted to the examples of its embodiments described above, but many variations are possible within the scope of the inventive idea defined by the claims.

Claims

1. Procedure for setting up a call in a wireless local loop, which is based on mobile communication technology and in which terminal units (TU) are connected via a radio link to an access node (AN) and from the access node to a wired network local exchange (LE) via a standard V5 interface and in which checking functions consistent with a mobile communication specification are carried out, charac t e ri sed in that, to accelerate call setup, checking functions are carried out during voice mode connection of the call .
2. Procedure as defined in claim 1, char a c t e ri s ed in that subscriber terminal units (TU) are connected to the access node via a radio link consistent with the GSM specification; and that checking functions are carried out, said functions comprising change of the subscriber identity code (TMSI reallocation) , verification of the authenticity of the sub- scriber (authentication) and/or verification of the subscriber's equipment identity code (IMEI check).
3. Procedure as defined in claim 2, char act eri s ed in that the change of the subscriber identity code is a TMSI reallocation consistent with the GSM 04.08 4.3.1. standard.
4. Procedure as defined in claim 2 or 3 , characteri sed in that the verification of subscriber authenticity is an authentication consistent with the GSM 04.08. 4.3.2 standard.
5. Procedure as defined in any one of claims 2 - 4, charact eri sed in that the verification of the subscriber's equipment identity code is an IMEI check consistent with the GSM 04.08. 4.3.3 standard.
6. Procedure as defined in any one of claims
1 - 5, charac t eri sed in that the V5 inter- face is a V5.2 interface consistent with the ETS 300 347-1 standard.
7. Procedure as defined in any one of claims 1 - 5, charact e ri s ed in that the V5 inter- face is a V5.1 interface consistent with the ETS 300 324-1 standard.
PCT/FI1998/000654 1997-09-01 1998-08-25 Procedure for setting up a call in a wireless local loop WO1999012376A2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP98941432A EP1010335A2 (en) 1997-09-01 1998-08-25 Procedure for setting up a call in a wireless local loop
AU89802/98A AU8980298A (en) 1997-09-01 1998-08-25 Procedure for setting up a call in a wireless local loop
JP2000509243A JP2001515327A (en) 1997-09-01 1998-08-25 How to set up a call in a wireless local loop
US09/516,973 US6892079B1 (en) 1997-09-01 2000-02-29 Procedure for setting up a call in a wireless local loop

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FI973579A FI105310B (en) 1997-09-01 1997-09-01 A method for establishing a call in a wireless access network
FI973579 1997-09-01

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US09/516,973 Continuation US6892079B1 (en) 1997-09-01 2000-02-29 Procedure for setting up a call in a wireless local loop

Publications (2)

Publication Number Publication Date
WO1999012376A2 true WO1999012376A2 (en) 1999-03-11
WO1999012376A3 WO1999012376A3 (en) 1999-06-10

Family

ID=8549465

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FI1998/000654 WO1999012376A2 (en) 1997-09-01 1998-08-25 Procedure for setting up a call in a wireless local loop

Country Status (6)

Country Link
EP (1) EP1010335A2 (en)
JP (1) JP2001515327A (en)
CN (1) CN1272291A (en)
AU (1) AU8980298A (en)
FI (1) FI105310B (en)
WO (1) WO1999012376A2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19946662A1 (en) * 1999-09-29 2001-04-05 Siemens Ag Control information exchanging method in interface of telecommunications network
WO2001093605A1 (en) * 2000-05-31 2001-12-06 Telefonaktiebolaget Lm Ericsson (Publ) A method and system for managing communication traffic
US6556827B1 (en) * 1999-03-12 2003-04-29 Samsung Electronics Co., Ltd Method of managing a plurality of radio links in wireless local loop
US6892079B1 (en) 1997-09-01 2005-05-10 Nokia Networks Oy Procedure for setting up a call in a wireless local loop

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7072652B2 (en) * 2003-12-15 2006-07-04 Intel Corporation Handoff apparatus, systems, and methods

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1995024103A2 (en) * 1994-02-23 1995-09-08 Nokia Telecommunications Oy Accomplishing a register recall in a radio system
EP0769883A2 (en) * 1995-10-20 1997-04-23 Lucent Technologies Inc. Apparatus for radio local loop system
WO1997020445A1 (en) * 1995-11-24 1997-06-05 Nokia Telecommunications Oy A method for establishing a wireless telecommunication connection

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1995024103A2 (en) * 1994-02-23 1995-09-08 Nokia Telecommunications Oy Accomplishing a register recall in a radio system
EP0769883A2 (en) * 1995-10-20 1997-04-23 Lucent Technologies Inc. Apparatus for radio local loop system
WO1997020445A1 (en) * 1995-11-24 1997-06-05 Nokia Telecommunications Oy A method for establishing a wireless telecommunication connection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PRIVATE SWITCHING SYSTEMS AND NETWORKS, SECOND INTERNATIONAL CONF., 1992, (Birmingham, United Kingdom), J.C. COOK, R.L. BREWSTER, "Cryptographic Security Techniques for Digital Mobile Telephones", pages 123-130. *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6892079B1 (en) 1997-09-01 2005-05-10 Nokia Networks Oy Procedure for setting up a call in a wireless local loop
US6556827B1 (en) * 1999-03-12 2003-04-29 Samsung Electronics Co., Ltd Method of managing a plurality of radio links in wireless local loop
DE19946662A1 (en) * 1999-09-29 2001-04-05 Siemens Ag Control information exchanging method in interface of telecommunications network
WO2001093605A1 (en) * 2000-05-31 2001-12-06 Telefonaktiebolaget Lm Ericsson (Publ) A method and system for managing communication traffic

Also Published As

Publication number Publication date
AU8980298A (en) 1999-03-22
FI973579A (en) 1999-03-02
JP2001515327A (en) 2001-09-18
CN1272291A (en) 2000-11-01
WO1999012376A3 (en) 1999-06-10
FI973579A0 (en) 1997-09-01
FI105310B (en) 2000-07-14
EP1010335A2 (en) 2000-06-21

Similar Documents

Publication Publication Date Title
US6324402B1 (en) Integration scheme for a mobile telephone
US6434378B1 (en) Pre-paid cellular telephone system
US5913165A (en) Method for changing subscriber service features in a radio telecommunications network
EP0862839B1 (en) A method for establishing a wireless telecommunication connection
EP1013123A1 (en) Procedure and system for ensuring emergency calls in a wireless local loop
WO1996032824A1 (en) A radio unit and a method for connecting a fixed subscriber station to a wll system
AU766311B2 (en) System and method for providing access to a wireless communication service to a group of subscribers who share a set of modems
US6275943B1 (en) Procedure for carrying out checking functions relating to safety management in a mobile communication network and/or in a wireless local network
JP3853846B2 (en) Apparatus and method for deriving a reference random number from paging and originating signals
WO1999012376A2 (en) Procedure for setting up a call in a wireless local loop
US6892079B1 (en) Procedure for setting up a call in a wireless local loop
US6678533B1 (en) Method for connecting an incoming call in a wireless telecommunications installation to a dual mode terminal
GB2365687A (en) Authentication process using sequence numbers
WO2001022757A1 (en) Method of processing charging information
US6720823B1 (en) Register recall in a will system
WO1998012892A1 (en) Radio system forming a wireless subscriber interface
GB2308529A (en) Accessing mobile telephone services
MXPA98000524A (en) Method of switching in adaptable way between authentication schemes of personal communication systems

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 98809679.X

Country of ref document: CN

AK Designated states

Kind code of ref document: A2

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: A3

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

WWE Wipo information: entry into national phase

Ref document number: 09516973

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: KR

WWE Wipo information: entry into national phase

Ref document number: 1998941432

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1998941432

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase

Ref country code: CA

WWW Wipo information: withdrawn in national office

Ref document number: 1998941432

Country of ref document: EP