CN102098685A - Global system for mobile communication (GSM) network-based spectrum reuse communication system and method - Google Patents

Global system for mobile communication (GSM) network-based spectrum reuse communication system and method Download PDF

Info

Publication number
CN102098685A
CN102098685A CN2011100742188A CN201110074218A CN102098685A CN 102098685 A CN102098685 A CN 102098685A CN 2011100742188 A CN2011100742188 A CN 2011100742188A CN 201110074218 A CN201110074218 A CN 201110074218A CN 102098685 A CN102098685 A CN 102098685A
Authority
CN
China
Prior art keywords
network
message
bits
unauthorized user
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011100742188A
Other languages
Chinese (zh)
Other versions
CN102098685B (en
Inventor
杨家玮
张惠娟
马瑞
曾环宇
张文柱
田琳
李建东
刘勤
李钊
赵林靖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN 201110074218 priority Critical patent/CN102098685B/en
Publication of CN102098685A publication Critical patent/CN102098685A/en
Application granted granted Critical
Publication of CN102098685B publication Critical patent/CN102098685B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a global system for mobile communication (GSM) network-based spectrum reuse communication system. The system mainly overcomes the irrationality of spectrum use in the current GSM network. The implementation mode comprises the following steps of: (1) in the existing GSM network, adding a function entity defined by the standard IEEE1900.4, comprising adding an operator spectrum manager (OSM) and a network reconstruction manager (NRM) in a network sub-system (NSS), adding a radio access network reconstruction controller (RRC) and a radio access network measurement collector (RMC) in a base sub-system (BSS) and adding a terminal reconstruction manager (TRM), a terminal reconstruction controller (TRC) and a terminal measurement collector (TMC) in a mobile terminal system (MS); (2) arranging a new interface connected with the original network on the added entity and arranging a message structure transmitted on the interface; (3) on the basis of the system, planning a specific communication process of an unauthorized user so that the unauthorized user passes message through each interface to assist the unauthorized user in finishing the use of idle frequency range in the GSM network. By utilizing the GSM network-based spectrum reuse communication system, the utilization rate of the network spectrum can be improved. The invention further discloses a GSM network-based spectrum reuse communication method.

Description

Spectrum reuse communication system and method based on the GSM network
Technical field
The invention belongs to wireless communication technology field, relate to the system of reusing, be used for non-Home Network registered user and insert use, to improve the availability of frequency spectrum based on the tiling of GSM network.
Background technology
What China's radiotechnics adopted always is static frequency spectrum distributing method, communication can only worked on the proprietary frequency range of its assignment, soon entire spectrum is divided into some frequency ranges and distributes to different departments or operator respectively, and this frequency range can only be used by the authorized user under this group, and other unauthorized users can not insert or use this frequency range.In fact, prove that through each mechanism's monitoring both at home and abroad the frequency range of these fixed allocation does not have or seldom has authorized user to use in the quite a while, even under unmanned situation about using, unauthorized user does not allow to insert these idle frequency ranges of use yet.In the frequency range of these fixed allocation, only there is band segment frequently to be used.This situation has constituted the waste that frequency spectrum resource uses to a certain extent.At present China was in by the transition period of second generation communication to the third generation even the communication of the 4th generation, the developing rapidly of telecommunications, and the overlapping covering of each communication network, all kinds of radio subscriber sharp increases make radio spectrum resources very deficient.This wherein, second generation radio communication GSM lasts the long comparatively mature communication network of using in China development.But the GSM cellular communications network is equally facing to frequency spectrum resource situation in short supply.As preceding described, many have the frequency spectrum resource of the value utilized not have authorized user to use and the frequent free time within a certain period of time, and because these frequency spectrums have been assigned with, make many unauthorized users but can not use these frequency spectrums in suddenly waiting to communicate by letter.The irrationality of this use makes nervous increasingly with regard to rare frequency spectrum resource originally.Obviously, this mode and the current non-renewable frequency spectrum resource of utilizing is in short supply conflicting, and Radio Resource is in short supply to be the bottleneck of restriction radio communication and professional sustainable development.Therefore, non-renewable frequency spectrum resource is realized that the technology of utilizing again has been subjected to people's extensive concern.
In order to improve the availability of frequency spectrum, solving this short resource does not have the effectively problem of utilization, and existing method mainly contains two aspects: be the more advanced technology that adopts on the basis of existing communication network on the one hand, or make suitable modification; Be the network of the new shared frequency spectrum of research on the other hand.Cognitive radio technology then is a kind of new functional frequency spectrum share technology, it proposed in 1999, use uneven situation at radio band, effectively raise the availability of frequency spectrum, it can rely on the support of artificial intelligence, and wireless communications environments such as perception time domain, frequency domain and space are according to decision-making and the algorithm of self, real-time judge detects and effectively utilizes idle frequency spectrum, allows in time domain, frequency domain and space enterprising line frequency spectrum multiplexing in theory.This technology is considered to the most promising wireless technology, yet new frequency spectrum share technology is subject to the short haul connection of transmitted power usually, has limited capability of communication system and flexibility.And, the cognitive techniques theory is conceived to the brand-new cognition network of framework at present, though this scheme can solve the problem of frequency spectrum resource anxiety to a certain extent, but in the practical application, this measure need significantly be revised existing communication network, no matter on hardware or software, the loss expense is huge, and operability is subject to certain restrictions.
Summary of the invention
The objective of the invention is to overcome the deficiency of above-mentioned prior art, a kind of spectrum reuse communication system and communication means based on the GSM network proposed, so that existing network is changed minimum is prerequisite, satisfy unauthorized user to distributing the reasonable use of frequency spectrum under idle condition, reduce the loss expense, improve the availability of frequency spectrum.
For achieving the above object, system of the present invention comprises mobile terminal MS, base station sub-system BSS and network subsystem NSS, it is characterized in that:
In mobile terminal MS, increase the functional entity of IEEE1900.4 standard definition, it comprises terminal measurement collector TMC, terminal reconstruction manager TRM and terminal reconstruction controller TRC, and these functional entitys are by air interface Um and base station sub-system BSS message transfer in the GSM net;
In base station sub-system BSS, increase the functional entity of IEEE1900.4 standard definition, it comprises wireless access network measurement collector RMC and wireless access network reconfigurable controller RRC, wireless access network measure collector RMC on physical entity with wireless access network reconfigurable controller RRC one, this wireless access network reconfigurable controller RRC is provided with new Acon interface, and wireless access network reconfigurable controller RRC links to each other with base station controller BSC in the GSM network by the Acon interface;
In network subsystem NSS, increase the functional entity of IEEE1900.4 standard definition, it comprises spectrum manager OSM of operator and network reconfiguration manager NRM, the spectrum manager OSM of operator on physical entity with network reconfiguration manager NRM one, this network reconfiguration manager NRM is provided with new H interface, and network reconfiguration manager NRM links to each other with moving exchanging center MSC in the former GSM net by H interface.
For achieving the above object, communication means of the present invention had both kept the communication of authorized user in the GSM network, had increased the communication of unauthorized user again;
Described unauthorized user communication comprises:
(1) access of unauthorized user and Traffic Channel TCH assigning process:
1a) do not having under the situation of communication requirement, under the broadcast channel of certain appointment, monitoring the frequency spectrum operating position of this sub-district by unauthorized user;
When 1b) unauthorized user produces spectrum requirement, send channel request to network, in the channel service request that is its distribution, unauthorized user is not registered in network, authentication process failure afterwards;
1c) user of failed authentication files an application to network reconfiguration manager NRM by cognitive request message, and network reconfiguration manager NRM judges whether to allow this user to insert according to internal algorithm, if refusal, calling procedure finishes; If allow, the cognitive acknowledge message of network reconfiguration manager NRM loopback, moving exchanging center MSC distributes a temporary identity for this unauthorized user by temporary identity request message order VLR Visitor Location Register VLR, and this temporary identity is registered in network reconfiguration manager NRM by the temporary number registration message by moving exchanging center MSC;
1d) unauthorized user carries out secondary channel request again with temporary identity, access procedure is identical with the access and the Traffic Channel TCH assigning process of authorized user for the second time, and Traffic Channel TCH has assigned back notifications wireless access network reconfigurable controller RRC the channel that unauthorized user uses is made marks;
1e) in communication process, when if the frequency range application that has authorized user that unauthorized user is being used inserts, unauthorized user will effectively be dodged, network reconfiguration manager NRM is to the periodicity monitoring of channel simultaneously, when taking place under the high situation of use conflict or channel seizure ratio the unauthorized user that inserts to be alarmed or the forced interruption communication service;
(2) disconnect process of unauthorized user:
2a) mobile station MS sends clear message, and clear message reaches in the moving exchanging center MSC;
After 2b) moving exchanging center MSC is received this message, have two actions, the one, BSC issues release command to base station manager, and the 2nd, moving exchanging center MSC sends clear forward TUP message request to the moving exchanging center MSC at called place;
2c) release command is issued to mobile station MS by moving exchanging center MSC, mobile station MS deactivates all channels that this calling takies, moving exchanging center MSC sends the request of removing this cognition platform registration to network reconfiguration manager NRM after receiving the affirmation message of mobile station MS;
After 2d) VLR Visitor Location Register VLR receives the release command of network reconfiguration manager NRM, dispose and be temporary number that unauthorized user distributes and supporting authentication three parameters;
After 2e) removing successfully, network reconfiguration manager NRM cancels the registration of this cognitive user, and base station sub-system BSS discharges Radio Resource, and will distribute to the ground resource of this time calling out and all be denoted as the free time;
2f) the channel registration of cancellation unauthorized user in wireless access network reconfigurable controller RRC, moving exchanging center MSC discharges ground resource, and disconnect process finishes.
The present invention has following advantage:
(1) the present invention is because in GSM Cellular Networks structure, newly-increased some functional entitys, management unauthorized user communication and mandate monitoring of frequency bands and judgement, these functional entitys are coordination mutually in communication process, can guarantee that unauthorized user carries out access and use to the GSM network spectrum not influencing under the authorized user signal intelligence by the message of redetermination.
(2) the present invention is owing to revised the upper layer communication agreement, and formulated the communication process that is applicable to the unauthorized user access network, make unauthorized user can insert use under the situation of Home Network frequency range free time, the Home Network frequency range just can obtain utilizing more fully, has improved the availability of frequency spectrum effectively.
(3) the present invention is owing to be to add new functional entity on existing GSM network configuration, so the network coverage that relates to is identical with former net, communication distance is unrestricted flexibly, and avoided the complexity of the brand-new cognition network of framework, in actual applications, the easier realization of the method, operability is stronger.
Description of drawings
Fig. 1 is existing gsm system entity structure block diagram;
Fig. 2 is a gsm system entity structure block diagram of the present invention;
Fig. 3 is that the present invention formulates the spectrum reuse communication flow diagram based on the GSM network;
Fig. 4 is cognitive request message format figure among the present invention;
Fig. 5 is the cognitive message format figure that receives among the present invention;
Fig. 6 is a temporary number registration message format chart among the present invention;
Fig. 7 is temporary identity request message format figure among the present invention;
Fig. 8 is the sub-district coverage diagram that emulation of the present invention is adopted;
Fig. 9 be the present invention under the situation of unauthorized user and the common access network of authorized user total user to the operating position analogous diagram of each channel;
To be the present invention do not exist under the unauthorized user situation authorized user to the analogous diagram of each channel operating position to Figure 10;
Embodiment
With reference to above-mentioned accompanying drawing, the specific embodiment of the present invention is described in further detail.
Referring to Fig. 1, be existing gsm system entity structure block diagram, existing GSM network system mainly is made up of mobile station MS, base station sub-system BSS, network subsystem NSS, operation and maintenance sub system OSS: mobile station MS is represented portable terminal and corresponding client's identification card thereof; Base station sub-system BSS is controlled by the moving exchanging center MSC in the network subsystem in certain radio coverage, by the system equipment that air interface Um and MS communicate, the functional entity that it comprises can be divided into base station controller BSC and base transceiver station BTS; Network subsystem NSS mainly finishes function of exchange and customer data and mobile management, the required database function of security management, and the functional entity that it comprises has moving exchanging center MSC, VLR Visitor Location Register VLR, attaching position register HLR, the AUC of AUC and equipment identity register EIR; Operation and maintenance sub system OMC mainly is that whole GSM networking is managed and monitors, and its side links to each other with network subsystem NSS, and opposite side is the computer workstation as man-machine interface.
Referring to Fig. 2, the present invention is based on the spectrum reuse communication system of GSM network, adds new functional entity respectively in network subsystem NSS, base station sub-system BSS in existing GSM network and the travelling carriage, wherein:
1. newly-increased functional entity comprises in GSM network subsystem NSS: spectrum manager OSM of operator and network reconfiguration manager NRM.This network reconfiguration manager NRM is provided with H interface, and this entity links to each other with moving exchanging center MSC in the former network by this interface, and the frequency spectrum optimization that it is used for supervising the network and terminal distributes; The spectrum manager OSM of this operator, it links to each other with network reconfiguration manager NRM, be used for Control Network reconstruction manager NRM dynamic frequency spectrum deployment policy, because of it transmits the primary network selection strategy to network reconfiguration manager NRM when the system initialization, so it and network reconfiguration manager NRM can be designed as one on physical entity.
The H interface that on network reconfiguration manager NRM, is provided with, it is defined as the internal interface between the moving exchanging center MSC and network reconfiguration manager NRM in the network subsystem, be used for mobile services switching centre MSC and propose cognitive application, transmit the channel behaviour in service of each sub-district and the registration of unauthorized user to network reconfiguration manager NRM.
2. newly-increased functional entity comprises in GSM base station sub-system BSS: wireless access network reconfigurable controller RRC and wireless access network are measured collector RMC.This wireless access network reconfigurable controller RRC is provided with the Acon interface, and this entity links to each other with base station manager BSC in the base station sub-system by this interface, and it is used for the demand according to network reconfiguration manager NRM, and each wireless access network is reconstructed; This wireless access network is measured collector RMC, and it links to each other with wireless access network reconfigurable controller RRC, is used to gather the wireless access network background information, and it is passed to network reconfiguration manager NRM, can be designed to one with RRC in the reality on physical entity.
The Acon interface that on wireless access network reconfigurable controller RRC, is provided with, it is defined in the base station sub-system, interface between base station controller BSC and the wireless access network reconfigurable controller RRC, on physical entity, both can adopt the two to link to each other by interface, also can take base station controller BSC and wireless access network reconfigurable controller RRC to be designed to the scheme of one, decide according to the concrete condition of each base station sub-system BSS.After this interface was mainly used in the unauthorized user access network, frequency spectrum used the registration management that distributes.For fear of structure complicated, there is not direct interface between network reconfiguration manager NRM and the wireless access network reconfigurable controller RRC, the transmission of messages between them will be passed through the A interface in H interface, Acon interface and the former GSM net, finishes jointly.
3. newly-increased functional entity comprises in mobile terminal MS: terminal is measured collector TMC, terminal reconstruction manager TRM and terminal reconstruction controller TRC.This terminal is measured collector TMC, is used for the background information of acquisition terminal and sends it to terminal reconstruction manager TRM; This terminal reconstruction manager TRM is used for the terminal part that the distributed optimization of management of frequency spectrum is used, and it is the management of carrying out under the policy framework that network reconfiguration manager NRM provides, and will be with reference to user given parameter and the background information that offers it at different levels; This terminal reconstruction controller TRC is used for the reconstruct that requires control terminal according to terminal reconstruction manager TRM.Message intercommunication still will be by the A interface in the former GSM net, the transmission of Abis interface and aerial Um Interface between terminal reconstruction manager TRM and network reconfiguration manager NRM and the wireless access network reconfigurable controller RRC.
The present invention is by increasing the functional entity of IEEE 1900.4 standard definitions in original GSM network, formed communication system with spectrum reuse function had both kept the communication of authorized user in the GSM network, had increased the communication of unauthorized user again;
With reference to Fig. 3, utilize said system, the present invention is as follows to the communication process of unauthorized user:
Process 1, after unauthorized user sends calling, mobile station MS sends random pulses at Random Access Channel RACH and sends dedicated channel SDCCH request message to base station sub-system BSS, base station controller BSC is for after it becomes distribution of work, in access grant channel AGCH by assignment messages notice mobile station MS immediately.
Process 2, mobile station MS will send layer three message---CM business request information on the dedicated channel SDCCH that distributes for it, this message by base station sub-system BSS transparent be sent to moving exchanging center MSC, then moving exchanging center MSC is by handling the access service request that request message notice VLR handles this mobile station MS that inserts, moving exchanging center MSC also will send to base station controller BSC and connect acknowledge message simultaneously, in order to the SCCP that sets up between base station controller BSC and the moving exchanging center MSC Connection Service be arranged.
Process 3, receive the service access request after, VLR Visitor Location Register VLR carries out authentication:
At first, check whether this mobile station MS has authentication three ginseng groups in database, if having, will directly issue the authentication order to moving exchanging center MSC, otherwise, to corresponding attaching position register and the HLR/AUC of AUC request authentication parameter;
Then, issue the authentication order to moving exchanging center MSC, because unauthorized user does not have authorized permission in the GSM net, thus mobile station MS also not registration in attaching position register HLR, so authentication can't be passed through.
After process 4, moving exchanging center MSC are received the signal of failed authentication, judge according to the parameter that this unauthorized user that makes a call sends whether this user is cognitive travelling carriage, if not then this time service so far finishes; If then this user profile is given network reconfiguration manager NRM to carry out next step action.
Process 5, moving exchanging center MSC just sends a cognitive request message to network reconfiguration manager NRM on H interface after judging that this user is cognitive user.
This cognition request message sends according to message format shown in Figure 4, and this message format is according to the message format of signalling system No.7, and main field is as follows:
F: the demarcation sign of signal element, 8 bits, its yard type are 01111110; CK: error detection code, 16 bits, issuable error code in the check transmission course; LI: signal element Length Indicator, 6 bits, eight hyte numbers after the expression LI field to the CK field; SIO: eight hytes of business information indication, 8 bits are in order to the classification of Indication message; FSN: forward sequence number, 7 bits are represented sending sequence number of this unit.BSN: the back is 7 bits to serial number, and the sequence number of last signal element that the other side sends is received in expression, indicates all message all correct receive of sequence number until BSN to the other side; FIB: forward indication bit, 1 bit identifies the sign of current transmission signal element, and its value is 0 or 1; BIB: backward indicator bit, 1 bit, the expression the signal element whether accurate the other side of receiving sends; SIF: signaling information field, this field are exactly the actual message that will send of user, and field length is 2-272 eight hytes.Difference according to the different SIF fields of each message.Wherein the SIF field parameter frame of cognitive request message mainly comprises: Route Selection mark 24bit, by Destination Point Code DPC, Signaling Link Code SLS, three parameters of OPC Origination Point Code OPC are formed, it is the indispensable parameter of this message, also is the indispensable form of SIF field; Type of message is 0,010 0000,8bit, is used for indicating the type of this message, is used for which kind of operation; Class of subscriber is 0,000 0001,8bit, represents untreated unauthorized user; MS random code 8bit, this random code should be corresponding one by one with travelling carriage, and when being used for a plurality of users and proposing cognitive application simultaneously, the travelling carriage in the compartment system prevents that function from distributing disorderly; Calling/called address 8n bit, adjustable length parameter, length are 8 integral multiple bit.
Process 6, after network reconfiguration manager NRM receives cognitive request message, begin existing channel operating position is analyzed, network reconfiguration manager NRM should be a real-time listening to the operating position of channel, periodicity and wireless access network reconfigurable controller RRC interactive channel use information, if the channel utilization rate thresholding that the spectrum manager OSM of operator formulated when the channel utilization rate had surpassed system initialization is then refused the access application of this unauthorized user; Otherwise, accept the access application of this unauthorized user.
Process 7, if the channel utilization rate does not surpass threshold value, network reconfiguration manager NRM sends cognitive acknowledge message to moving exchanging center MSC.
This cognition acknowledge message, send according to message format shown in Figure 5, this message format is according to the message format of signalling system No.7, main field is identical with cognitive request message, cognitive acknowledge message is the feedback of network reconfiguration manager NRM to moving exchanging center MSC, so do not need to carry complicated parameter, wherein SIF field parameter frame mainly comprises: Route Selection mark 24bit; Type of message 0,010 0001,8bit; MS random code 8bit.
After process 8, moving exchanging center MSC were received the cognitive message of confirming, the VLR Visitor Location Register VLR in network sent the message of temporary identity request, and this message mails to VLR Visitor Location Register VLR by moving exchanging center MSC.Promptly give unauthorized user interim distribute a temporary identity be authentication three parameters and need that loopback gives mobile station MS with the supporting IMSI of authentication parameter.
The message of this temporary identity request, it is the temporary identity request message that the moving exchanging center MSC end is sent to VLR Visitor Location Register VLR, send according to message format shown in Figure 6, this message format is according to the message format of signalling system No.7, main field is identical with cognitive request message, and the SIF field parameter frame of this message mainly comprises: Route Selection mark 24bit; Type of message 0,010 0100,8bit; Class of subscriber 0,001 0001,8bit, expression allows the unauthorized user of access network; MS random code 8bit; Calling address 8nbit.
Process 9, VLR Visitor Location Register VLR will temporarily store authentication three parameters of distributing and pass supporting number back moving exchanging center MSC, and moving exchanging center MSC passes through temporary number registration message informing network reconstruction manager NRM, and does registration therein.
This temporary number registration message, be that the moving exchanging center MSC end is sent to network reconfiguration manager NRM, send according to message format shown in Figure 7, this message format is according to the message format of signalling system No.7, main field is identical with cognitive request message, and wherein SIF field parameter frame mainly comprises: Route Selection mark 24bit; Type of message 0,010 0010,8bit; Class of subscriber 0,001 1001,8bit, expression distributed the unauthorized user of temporary identity; MS random code 8bit; Temporary number 8bit; Calling and called address 8nbit.
Process 10 is done registration with the temporary number notice wireless access network reconfigurable controller RRC of distributing, and RRC is notified to mobile station MS by the wireless access network reconfigurable controller, and so far, the process of interim registration finishes.
Process 11, mobile station MS is after receiving temporary number, in time adjust the parameter of self as required, behind the change number, proceed the transmission of the CM business request information of access network for the second time, at this moment, this user has been interim authorized user, institute's authority of enjoying and authorized user are equal to, and promptly follow-up process 12-process 17 is identical with authorized user.
Process 12, mobile station MS sends business request information on the dedicated channel SDCCH of its distribution with temporary number once more in process 1, this message by base station sub-system BSS transparent be sent to moving exchanging center MSC, after moving exchanging center MSC is received the CM business request information, by handling the access service request that request message notice VLR Visitor Location Register VLR handles this MS that inserts.
Process 13, after receiving the service access request, VLR Visitor Location Register VLR will check at first whether this MS has authentication three ginseng groups in database, because this mobile station MS has been finished interim registration before, therefore, authentication three parameters that this mobile station MS is arranged among the VLR Visitor Location Register VLR, and then issue the authentication order to moving exchanging center MSC.
Process 14, after moving exchanging center MSC is received the authentication order of VLR Visitor Location Register VLR transmission, BSS issues authentication request to mobile station MS by base station sub-system, in this order, contain authentication parameter, after mobile station MS is received authentication request, utilize authentication arithmetic to obtain a result, send to moving exchanging center MSC by authentication response message, moving exchanging center MSC is with authenticating result loopback VLR Visitor Location Register VLR, check authenticating result that mobile station MS reports and the result in the VLR Visitor Location Register VLR authentication parameter by VLR Visitor Location Register VLR, because distribute among the VLR Visitor Location Register VLR before authentication parameter and the loopback temporary number of giving travelling carriage be supporting, so the two unanimity, then authentication is passed through.
Process 15, after authentication is passed through, VLR Visitor Location Register VLR will at first issue encrypted command to moving exchanging center MSC, notify then the moving exchanging center MSC mobile station MS this time insert request obtained by, moving exchanging center MSC passes by base station sub-system BSS notice mobile station MS service request, and moving exchanging center MSC issues encrypted command to mobile station MS then, and this order includes encryption mode, after mobile station MS was received this order and finished encryption, loopback was encrypted and is finished message.So far, unauthorized user access network.
Process 16, the interim legal identity of unauthorized user obtain confirming the back access network, and mobile station MS sends a set up message, in this message, carries more detailed information such as called number and calling identification.
Process 17, after moving exchanging center MSC is received this message, at first inquire about the user's that this time makes a call related service information to VLR Visitor Location Register VLR by S.I.F.O message, VLR Visitor Location Register VLR is according to this class of service and mobile station MS has been applied for when opening an account business information, whether decision this time calling can continue, if can continue, by finishing message related to calls to this user data of moving exchanging center MSC loopback, after moving exchanging center MSC is received this information, by calling out continuation message, call out among continuation is handled through base station sub-system BSS notice mobile station MS, then, according to A interface circuit situation, send assignment request message to base station controller BSC, selected certain bar A interface circuit in this message, after base station controller BSC is received this instruction, to base station transceiver BTS, mobile station MS specific radio resource is after mobile station MS is received this instruction, take successfully loopback and assigned message, finish to this Traffic Channel TCH assignment stage.
Process 18, after being allocated successfully, base station controller BSC should be registered in wireless access network reconfigurable controller RRC by the employed channel of interim authorized user, so that wireless access network reconfigurable controller RRC uses intercepting at any time and reporting of frequency spectrum situation to the network unauthorized user.
Process 19, the operating position of frequency spectrum is constantly changing, therefore, the use of network reconfiguration manager NRM real-time sense system spectrum, when the utilization rate of frequency spectrum is higher than the thresholding of system's initial setting up, network reconfiguration manager NRM meeting early warning, refuse the request of the access of all unauthorized users this moment, network reconfiguration manager NRM will give this interim registered user's alarm by the assist control channel that distributes with Traffic Channel simultaneously, this moment, this user should finish conversation, if this user still adheres to conversation after the alarm, then network reconfiguration manager NRM will notify mobile switching centre to interrupt this time connecting, and promptly system forces to stop the communication service of unauthorized user is promptly taken out stitches by force.
Process 20, the unauthorized user disconnect process:
Disconnect process is divided into takes out stitches and pressure is taken out stitches voluntarily, wherein clear message is sent by mobile station MS voluntarily, and system forces the wireless access network reconfigurable controller RRC of clear message by a network reconfiguration manager NRM notice sub-district, network reconfiguration manager RRC registers channel situation according to casual user wherein, the frequency spectrum that the casual user takies is forced to discharge, and unauthorized user disconnect process voluntarily is as follows:
(20a) on-hook of mobile phone action will be translated into a clear message and send, and clear message reaches in the moving exchanging center MSC;
After (20b) moving exchanging center MSC is received this message, have two actions, the first issues release command to base station controller BSC, it two is that calling mobile exchanging center MSC need send clear forward TUP message request to the moving exchanging center MSC at called place, after this, calling party and callee's disconnect process will carry out respectively;
(20c) base station controller BSC issues release command to mobile station MS, mobile station MS deactivates all channels that this calling takies, and send Release complete to confirm, moving exchanging center MSC sends the request of removing the unauthorized user registration of this time calling out to network reconfiguration manager NRM after receiving the mobile station MS Release complete;
After (20d) network reconfiguration manager NRM receives this request, send an order that discharges temporary identity to VLR Visitor Location Register VLR, this order is sent to VLR Visitor Location Register VLR by moving exchanging center MSC, the temporary identity of disposing can be composed subsequently to other cognitive user, disposes the temporary number of distribution and supporting authentication three parameters after VLR Visitor Location Register VLR receives orders;
After (20e) removing successfully, finish message through moving exchanging center MSC informing network reconstruction manager NRM, cancel the registration of this cognitive user, moving exchanging center MSC sends BSSMAP message erasing order CLEAR COMMAND to base station sub-system BSS afterwards, indication should discharge Radio Resource, after base station sub-system BSS receives clear command message, begin to remove wave point, will distribute to the ground resource of this time calling out simultaneously and all be denoted as the free time;
(20f) base station sub-system BSS issues the removing channel command to wireless access network reconfigurable controller RRC, cancel the channel registration of this unauthorized user in wireless access network reconfigurable controller RRC, send to remove to moving exchanging center MSC then and finish message CLEAR COMPLETE, after moving exchanging center MSC receives that message is finished in removing, discharge ground resource, so far disconnect process finishes.
Effect of the present invention can further specify by following emulation:
One simulated conditions
The propagation model of emulation is that ideal space is propagated; 4 sub-districts are a district group; 1200 numbers of users; Speech business; The authorized user telephone traffic is 0.4Erl; The unauthorized user telephone traffic is 0.2Erl; Do not consider actual mobility model.Its concrete channel parameter is provided with as follows:
1) channel division
Emulation employing Traffic Channel frequency range is 905~915 10MHz frequency range, and adjacent two channel spacings are 200kHz, are divided into 50 channels altogether, channel inserts in time division multiple access TDMA mode, every channel is divided into 8 time slots, i.e. 8 full speed channels, each channel occupancy bandwidth 25kHz.
Channel model is set to two-dimensional structure body array in emulation, the variable parameter of array member's structure comprises respectively: the power of Channel Transmission, noise jamming in the channel, the class of subscriber of busy channel etc., these parameters are used for characterizing the feature and the operating position of current channel.
2) network model
Adopting the sub-district overlay model is " 4 * 3 " multiplexing structure, as shown in Figure 8.Should " 4 * 3 " model be meant that a district mines massively with 4 base stations, i.e. A, B, C, D, 3 sectors, i.e. A are in charge of in each base station 1,2,3, B 1,2,3, C 1,2,3And D 1,2,3, 50 total channels being divided into 12 groups, and being assigned to 12 websites in turn, each website can be with 4 channels, and is as shown in the table:
Figure BDA0000052253400000121
Its mid band 37 and 38 is standby broadcast channel, and the 1st and the 2nd time slot of channel 39-50 is as broadcast channel.
Two emulation content and results
Emulation is divided into two kinds of situations: a kind of situation for having only authorized user to insert, another kind is the situation that authorized user and unauthorized user all insert.
Under the situation that authorized user and unauthorized user all insert, hour authorized user of emulation and unauthorized user are to the use of native system, use is carried out according to the communication process that the present invention formulated, add up each multiplexing of channel number of times in this section period, simulation result as shown in Figure 9, the average access times that simulation calculation goes out each channel are about 2.997 times.
Under the situation of having only authorized user to insert, hour authorized user of emulation is added up each multiplexing of channel number of times in this section period to the use of native system, simulation result as shown in figure 10, simulation calculation goes out the average multiplexing number of channel and is about 2.691 times.
By Fig. 9 and Figure 10 contrast, can see, in the spectrum reuse system that the present invention proposes based on the GSM network, the channel multiplexing number of times obviously improves, and has improved approximately 11.4%, and the utilization of channel is more reasonable, result by Fig. 9 and Figure 10 also can find out simultaneously, system of the present invention can improve channel seizure ratio, and this is for frequency spectrum resource present situation in short supply, and is of far-reaching significance.
The term explanation
Figure BDA0000052253400000131
Figure BDA0000052253400000141

Claims (8)

1. the spectrum reuse communication system based on the GSM network comprises mobile terminal MS, base station sub-system BSS and network subsystem NSS, it is characterized in that:
In mobile terminal MS, increase the functional entity of IEEE1900.4 standard definition, it comprises terminal measurement collector TMC, terminal reconstruction manager TRM and terminal reconstruction controller TRC, and these functional entitys are by air interface Um and base station sub-system BSS message transfer in the GSM net;
In base station sub-system BSS, increase the functional entity of IEEE1900.4 standard definition, it comprises wireless access network measurement collector RMC and wireless access network reconfigurable controller RRC, wireless access network measure collector RMC on physical entity with wireless access network reconfigurable controller RRC one, this wireless access network reconfigurable controller RRC is provided with new Acon interface, and wireless access network reconfigurable controller RRC links to each other with base station controller BSC in the GSM network by the Acon interface;
In network subsystem NSS, increase the functional entity of IEEE1900.4 standard definition, it comprises spectrum manager OSM of operator and network reconfiguration manager NRM, the spectrum manager OSM of operator on physical entity with network reconfiguration manager NRM one, this network reconfiguration manager NRM is provided with new H interface, and network reconfiguration manager NRM links to each other with moving exchanging center MSC in the former GSM net by H interface.
2. a kind of spectrum reuse communication system according to claim 1 based on the GSM network, it is newly adding two interface H interface and the Acon interface that is provided with on the entity, and it is defined as follows:
H interface: be defined as the internal interface between the moving exchanging center MSC and network reconfiguration manager NRM in the network subsystem, be used for mobile services switching centre MSC and propose cognitive application, transmit the channel behaviour in service of each sub-district and the registration of unauthorized user to network reconfiguration manager NRM;
The Acon interface: be defined as in the base station sub-system, the interface between base station controller BSC and the wireless access network reconfigurable controller RRC, after this interface was mainly used in the unauthorized user access network, frequency spectrum used the registration management that distributes.
3. the spectrum reuse communication means based on the GSM network is characterized in that: both kept the communication of authorized user in the GSM network, increased the communication of unauthorized user again;
Described unauthorized user communication comprises:
(1) access of unauthorized user and Traffic Channel TCH assigning process:
1a) do not having under the situation of communication requirement, under the broadcast channel of certain appointment, monitoring the frequency spectrum operating position of this sub-district by unauthorized user;
When 1b) unauthorized user produces spectrum requirement, send channel request to network, in the channel service request that is its distribution, unauthorized user is not registered in network, authentication process failure afterwards;
1c) user of failed authentication files an application to network reconfiguration manager NRM by cognitive request message, and network reconfiguration manager NRM judges whether to allow this user to insert according to internal algorithm, if refusal, calling procedure finishes; If allow, the cognitive acknowledge message of network reconfiguration manager NRM loopback, moving exchanging center MSC distributes a temporary identity for this unauthorized user by temporary identity request message order VLR Visitor Location Register VLR, and this temporary identity is registered in network reconfiguration manager NRM by the temporary number registration message by moving exchanging center MSC;
1d) unauthorized user carries out secondary channel request again with temporary identity, access procedure is identical with the access and the Traffic Channel TCH assigning process of authorized user for the second time, and Traffic Channel TCH has assigned back notifications wireless access network reconfigurable controller RRC the channel that unauthorized user uses is made marks;
1e) in communication process, when if the frequency range application that has authorized user that unauthorized user is being used inserts, unauthorized user will effectively be dodged, network reconfiguration manager NRM is to the periodicity monitoring of channel simultaneously, when taking place under the high situation of use conflict or channel seizure ratio the unauthorized user that inserts to be alarmed or the forced interruption communication service;
(2) disconnect process of unauthorized user:
2a) mobile station MS sends clear message, and clear message reaches in the moving exchanging center MSC;
After 2b) moving exchanging center MSC is received this message, have two actions, the one, BSC issues release command to base station manager, and the 2nd, moving exchanging center MSC sends clear forward TUP message request to the moving exchanging center MSC at called place;
2c) release command is issued to mobile station MS by moving exchanging center MSC, mobile station MS deactivates all channels that this calling takies, moving exchanging center MSC sends the request of removing this cognition platform registration to network reconfiguration manager NRM after receiving the affirmation message of mobile station MS;
After 2d) VLR Visitor Location Register VLR receives the release command of network reconfiguration manager NRM, dispose and be temporary number that unauthorized user distributes and supporting authentication three parameters;
After 2e) removing successfully, network reconfiguration manager NRM cancels the registration of this cognitive user, and base station sub-system BSS discharges Radio Resource, and will distribute to the ground resource of this time calling out and all be denoted as the free time;
2f) the channel registration of cancellation unauthorized user in wireless access network reconfigurable controller RRC, moving exchanging center MSC discharges ground resource, and disconnect process finishes.
4. spectrum reuse communication means according to claim 3, wherein step 1c) form of described cognitive request message, according to the structure of signalling system No.7 message, comprise as follows:
F: the demarcation sign of signal element, 8 bits;
CK: error detection code, 16 bits;
LI: signal element Length Indicator, 6 bits;
SIO: eight hytes of business information indication, 8 bits;
FSN: forward sequence number, 7 bits;
BSN: the back is 7 bits to serial number;
FIB: forward direction is retransmitted indicating bit, 1 bit;
BIB: the back is to retransmitting indicating bit, 1 bit;
SIF: signaling information field, 2-272 eight hytes, the parameter frame of this field comprises: Route Selection mark 24bit; Type of message 8bit; Class of subscriber 8bit; MS random code 8bit; Calling/called address 8n bit.
5. according to the described spectrum reuse communication means of claim 3, wherein step 1c) form of described cognitive acknowledge message, according to the structure of signalling system No.7 message, comprise as follows:
F: the demarcation sign of signal element, 8 bits;
CK: error detection code, 16 bits;
LI: signal element Length Indicator, 6 bits;
SIO: eight hytes of business information indication, 8 bits;
FSN: forward sequence number, 7 bits;
BSN: the back is 7 bits to serial number;
FIB: forward direction is retransmitted indicating bit, 1 bit;
BIB: the back is to retransmitting indicating bit, 1 bit;
SIF: signaling information field, 2-272 eight hytes, the parameter frame of this field comprises: Route Selection mark 24bit; Type of message 8bit; MS random code 8bit.
6. according to the described spectrum reuse communication means of claim 3, wherein step 1c) form of described temporary identity request message, according to the structure of signalling system No.7 message, comprise as follows:
F: the demarcation sign of signal element, 8 bits;
CK: error detection code, 16 bits;
LI: signal element Length Indicator, 6 bits;
SIO: eight hytes of business information indication, 8 bits;
FSN: forward sequence number, 7 bits;
BSN: the back is 7 bits to serial number;
FIB: forward direction is retransmitted indicating bit, 1 bit;
BIB: the back is to retransmitting indicating bit, 1 bit;
SIF: signaling information field 2-272 eight hytes, the parameter frame of this field comprises: Route Selection mark 24bit; Type of message 8bit; Class of subscriber 8bit; MS random code 8bit; Calling address 8nbit.
7. according to the described spectrum reuse communication means of claim 3, wherein step 1c) form of described temporary number registration message, according to the structure of signalling system No.7 message, comprise as follows:
F: the demarcation sign of signal element, 8 bits;
CK: error detection code, 16 bits;
LI: signal element Length Indicator, 6 bits;
SIO: eight hytes of business information indication, 8 bits;
FSN: forward sequence number, 7 bits;
BSN: the back is 7 bits to serial number;
FIB: forward direction is retransmitted indicating bit, 1 bit;
BIB: the back is to retransmitting indicating bit, 1 bit;
SIF: signaling information field, 2-272 eight hytes, the parameter frame of this field comprises: Route Selection mark 24bit; Type of message 8bit; Class of subscriber 8bit; MS random code 8bit; Temporary number 8bit; Calling and called address 8nbit.
8. spectrum reuse communication means according to claim 3, wherein step 1d) access and the Traffic Channel TCH assigning process of described authorized user, comprise as follows:
1d1) when authorized user produced spectrum requirement, authorized user sent the dedicated channel application to network, sent service requesting information on for the dedicated channel of its distribution;
After 1d2) network is accepted the service request of this authorized user, carry out authentication process, authorized user has registration in Home Network, and authentication process passes through smoothly, and system encrypts this communication, authorized user access network this moment;
1d3) information that activates the service registered in network according to authorized user of system judges whether this business accepts, if system accepts, then is that this authorized user distributes the A interface circuit, the specific radio resource, and traffic channel assignments is finished;
1d4) system is addressed to called present position according to called number, authorized user and called establishing a communications link.
CN 201110074218 2011-03-25 2011-03-25 Global system for mobile communication (GSM) network-based spectrum reuse communication system and method Active CN102098685B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110074218 CN102098685B (en) 2011-03-25 2011-03-25 Global system for mobile communication (GSM) network-based spectrum reuse communication system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110074218 CN102098685B (en) 2011-03-25 2011-03-25 Global system for mobile communication (GSM) network-based spectrum reuse communication system and method

Publications (2)

Publication Number Publication Date
CN102098685A true CN102098685A (en) 2011-06-15
CN102098685B CN102098685B (en) 2013-06-26

Family

ID=44131506

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110074218 Active CN102098685B (en) 2011-03-25 2011-03-25 Global system for mobile communication (GSM) network-based spectrum reuse communication system and method

Country Status (1)

Country Link
CN (1) CN102098685B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833816A (en) * 2011-06-17 2012-12-19 中兴通讯股份有限公司 Access method and system for cognitive radio user
CN102843696A (en) * 2011-06-21 2012-12-26 ***通信集团设计院有限公司 Method, device and system for sharing spectrum resource among wireless systems
WO2013185486A1 (en) * 2012-06-14 2013-12-19 华为技术有限公司 Method for registering to database, terminal, access point, database, and communication system
CN103702432B (en) * 2013-12-03 2016-09-28 上海无线通信研究中心 A kind of uplink enhancement method based on geographic position data storehouse
CN111510928A (en) * 2014-07-11 2020-08-07 株式会社Ntt都科摩 Radio base station, user terminal, and radio communication method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1901398A (en) * 2006-06-30 2007-01-24 西安电子科技大学 Dynamic frequency spectrum managing method based on frequency spectrum multiple use
EP2092696A1 (en) * 2006-11-15 2009-08-26 Telefonaktiebolaget LM Ericsson (publ) Reservation and admission of access resources for access selection in multi-access networks
CN101610517A (en) * 2009-07-10 2009-12-23 西安电子科技大学 Cognitive network resource management system and management method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1901398A (en) * 2006-06-30 2007-01-24 西安电子科技大学 Dynamic frequency spectrum managing method based on frequency spectrum multiple use
EP2092696A1 (en) * 2006-11-15 2009-08-26 Telefonaktiebolaget LM Ericsson (publ) Reservation and admission of access resources for access selection in multi-access networks
CN101610517A (en) * 2009-07-10 2009-12-23 西安电子科技大学 Cognitive network resource management system and management method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
> 20090227 IEEE standards coordinating committee 41 IEEE standard for architectural building blocks enabling network-device distributed decision making for optimized radio resource usage in heterogeneous wireless access networks , *
IEEE STANDARDS COORDINATING COMMITTEE 41: "IEEE standard for architectural building blocks enabling network-device distributed decision making for optimized radio resource usage in heterogeneous wireless access networks", <<IEEE STD 1900.4TM-2009>> *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833816A (en) * 2011-06-17 2012-12-19 中兴通讯股份有限公司 Access method and system for cognitive radio user
CN102843696A (en) * 2011-06-21 2012-12-26 ***通信集团设计院有限公司 Method, device and system for sharing spectrum resource among wireless systems
CN102843696B (en) * 2011-06-21 2016-06-22 ***通信集团设计院有限公司 The method of common spectrum resource, Apparatus and system between a kind of wireless system
WO2013185486A1 (en) * 2012-06-14 2013-12-19 华为技术有限公司 Method for registering to database, terminal, access point, database, and communication system
CN103491604A (en) * 2012-06-14 2014-01-01 华为技术有限公司 Database registration method, terminal, access point, database and communication system
CN103491604B (en) * 2012-06-14 2017-09-26 华为技术有限公司 In the method for database registration, terminal, access point, database and communication system
CN103702432B (en) * 2013-12-03 2016-09-28 上海无线通信研究中心 A kind of uplink enhancement method based on geographic position data storehouse
CN111510928A (en) * 2014-07-11 2020-08-07 株式会社Ntt都科摩 Radio base station, user terminal, and radio communication method

Also Published As

Publication number Publication date
CN102098685B (en) 2013-06-26

Similar Documents

Publication Publication Date Title
CN107027105B (en) Transmission method, device and system for vehicle networking communication V2X message
CN102098685B (en) Global system for mobile communication (GSM) network-based spectrum reuse communication system and method
CN102165804B (en) Promote the method and apparatus of the interference prevented between the base station of shared carrier resource
CN102137331A (en) Method for determining and regulating group calling region information
CN102792734B (en) Wireless communication system, communication control method base station and mobile terminal
CN101137120B (en) Resource allocation method and apparatus
CN102843655B (en) A kind of method realizing organizing interior wideband multimedia cluster service and transmit in real time
CN102802277A (en) Broadband digital trunked communication system
EP0740871A1 (en) A method for automatically assigning encryption information to a group of radios
CN103167618B (en) A kind of centralized base band resource pool management system based on RAN framework and method
CN102172090B (en) Method and device for communication between terminals
CN101123758B (en) An implementation method based on location routing in digital cluster call
EP0776589B1 (en) Allocating channels in a mobile radio system
US7330710B1 (en) Private emergency or service-specific call approach in GSM systems
CN101651944B (en) Cluster system and encrypted communication method
CN102307333A (en) Centerless trans European trunked radio (TETRA) system consisting of radio link TETRA base station
CN100459794C (en) Method for carrying out real-time positioning on group-calling/multicast mobile station
CN100387091C (en) Method of carrying out fast calling setup
CN104521261A (en) Method for enabling lawful interception in a telecommunications network, user equipment, base transceiver station, program and computer program product
CN100463575C (en) Method for combining traditional call with enhanced call in CDMA digital packet
CN106162895A (en) A kind of distributed coordination method and apparatus of multi-link communication
CN102421107A (en) LICENSE management system and method of telecommunication network management
CN101754302A (en) Method, system and device for planning wireless network equipment resources
CN106331038B (en) Control method, equipment and the system of base station and car networking application server communication
CN112689278A (en) Terminal identification method in moving process

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant