throbber
7
`
`3
`
`is dno
`
`n
`
`MAIN Ser ZISTI/ICIST NRO/CNRCE
`TKHES7!
`MAIN Ser
`M6
`spree
`I
`Tee
`Received on: M@6-26-2a0a
`vy.
`IEEE personal communications
`no.
`» a publication of the IEEE
`Com
`a ee eha elDD _
`
`\r
`June 2000
`ttELS MCQUIONS
`
`THE MAGAZINE OF WIRELESS COMMUNICATIONS AND NETWORKING IBM EX. 1016
`
`|
`
`Vol. 7 No. 3
`
`aaa
`
`IBM EX. 1016
`
`1 of 11
`1 of 11
`
`

`

`
`
`aiv issue ofJEEE Personal Com-
`
`EDITOR’S NOTE
`
`MAHMOUD
`
`NAGHSHINEH
`
`Our secondarticle isa tutorialon GSM short
`munications contains several articles in the
`message services (SMS). This article is
`areas of mobile and wireless services, wire-
`authored by G. Peersman, 8. Cvetkovic,P. Grif-
`fiths, and H.Spaer, and presents a discussion
`less systems and standards, and issuesrelat-
`ed to wireless links and channel models.
`on SMS integration with existing messaging
`services and its relation to TCP/IP. This
`Thefirst article, by Y. Lin, H. Rao, and
`tutorial starts with a brief overview of GSM net-
`M. Chang,offers an overview of mobile pre-
`workbuilding blocks, and then puts empha-
`paidservices and how suchservices can be pro-
`vided in a wireless network. It covers a
`sis on the SMS network and protocol
`architecture within the GSM framework. Next,
`number of example scenarios as well as
`an overview of the most widely used messag-
`issues such as billing and subscriber call
`ing protocols is provided, andfinally, a sum-
`management with respect to prepaid ser-
`vices. Moreover, this article discusses the
`mary of current and future issues in this
`area Is presented.
`network elements and architectural compo-
`Our nextarticle is authored by D. Koulaki-
`nents for prepaid services. Finally, the
`otis and A. Aghvami, and reviews data detection tech-
`authors provide a comparison between different prepaid
`ystem manage-
`niques for direct sequence code-division multiple access
`solutions based on scalability, fraud risk, s
`mentissues, and service features.
`(DS-CDMA) mobile systems. The authors start by provid-
`
`
`Director of Magazines
`MarkJ. Karol, Lucent Technologies, USA
`Editor-in-Chief
`Mahmoud Naghshineh, JBM Research, USA
`Senior Advisors
`Hamid Ahmadi, AT&T Labs, USA
`ThomasF, La Porta, Lucent Technologies, USA
`Advisory Board
`Donald Cox, Stanford University, USA
`David Goodman, Rutgers University, USA
`Jorma Lilleberg, Nokia, Finland
`Kaveh Pahlavan, Worcester Polytechnic
`Institute, USA
`Mahadev Satyanarayanan, CMU, USA
`(EEE Vehicular Technology Liaison
`Theodore Rappaport, Virginia Tech, USA
`IEEE Computer Society Liaison
`Mike Liu, Ohio State University, USA
`Technical Editors
`Umesh Amin, AT&T Wireless Services, USA
`B. R. Badrinath, Rutgers University, USA
`Pravin Bhagwat, IBM Research, USA
`Kwang-Cheng Chen, Tsing Hua Univ,, Taiwan
`Si Tak Stanley Chia, AirTouch International, UK
`Andrea Goldsmith, Stanford University, USA
`Paul Gough, Philips Research, UK
`Davide Grillo, Fondazione Ugo Bordoni,Italy
`Jaap Haartsen, Ericsson, Sweden
`Takeshi Hattori,NTT, Japan
`Ravi Jain, Bellcore, USA
`Joseph Kabn, UC Berkeley, USA
`Parviz Kermani, IBM Research, USA
`Richard LaMaire, IBM Research, USA
`Yi-Bing Lin, Nationa! Chiao Tung Univ., Tafwan
`Murray Mazer, Open Group ResearchInst., USA
`Sergio Palazzo, University of Catania, Italy
`Ramachandran Ramjee, Lucent Technologies,
`Bell Labs, USA
`Bill Schilit, FX Palo Alto Lab,Inc., USA
`Thomas Y. C. Woo, Lucent Technologies, USA
`Yacov Yacobi, Microsoft Corp., USA
`Michele Zorzi, Di Ferrara University,Italy
`Department Editors
`0
`eviews
`Seshadri Mohan, Bellcore, USA
`Conference Review
`.
`Thomas Y. C, Woo, Lucent Technologies, USA
`Scanning the Literature
`|
`Michael Fang, NJ Institute of Technology, USA
`IEEE Production Staff
`Joseph Milizzo, Manager,Print &
`Electronic Publishing
`Catherine Kemelmacher, Associate Editor
`Eric Levine, Advertising Sales Manager
`Susan Lange, Digital Production Manager
`Jennifer Porcello, Digital Production Associate
`_
`Janet Swaim, Production Editor
`Joanne O'Rourke,Staff Assistant
`e
`
`
`IEEEPersonal
`Communications
` Eiaunttees eeeeeeeeeeee
`
`2000 Communications Society
`Board of Governors
`
`Officers
`J. Roberto De Marca, President
`ThomasJ. Plevyak, Past President
`Curtis A. Siller, VP-Technical Activities
`Horst Bessai, VP-Membership Services
`Douglas N. Zuckerman, VP-
`Membership Development
`Federico Tosco, VP-Saciety Relations
`Harvey Freeman, Treasurer
`John M. Howell, Secretary
`
`Members-at-Large
`Class of 2000
`Gerhard Fettweis
`Paul Hartmann
`Michael Kincaid
`William R. Robinson
`Class of 2001
`Laura Cerchio
`Leonard Cimini
`Roberta Cohen
`William Tranter
`Class of 2002
`Tomonori Aoyama
`Alex Gelman
`Roch Guerin
`Byeong Lee
`2000 IEEE Officers
`Bruce A. Eisenstein, President
`Joel B. Snyder, President-Elect
`David J. Kemp, Secretary
`David A. Conner, Treasurer
`Kenneth R. Laker, Past President
`Daniel J. Senese, Exectttive Director
`Tom Rowbotham,Director, Division HI
`
`©°
`
`mh
`
`
`
`|L
`
`TEEE Personal Communications * June 2000
`
`2 of 11
`2 of 11
`
`
`
`IEEE Personal Communications — The Maga-
`zine of Wireless Communications and
`Networking (ISSN 1070-9916) is published
`bimonthly by The Institute of Electrical and
`Electronics Engineers, Inc. Headquarters address:
`IEEE,3 Park Avenue, 17th Floor, New York,
`NY 10016-5997; tel: 212-705-8900; fax: 212-705-
`8999; e-mail: c.kemelmacher@comsoc.org.
`Responsibility for the contents rests upon authors
`ofsigned articles and not the IEEE orits members.
`Unless otherwise specified, the IEEE neither
`endorses nor sanctionsany positions or actions
`espoused in /EEE Personal Communications.
`Annual subscription: Membersubscription: $25
`peryear; Non-membersubscriptionpricesavailable
`on request. Single copy: $10 for members and $20
`for nonmembers.
`
`Editorial correspondence: Manuscripts for
`consideration may be submitted to the Editor-in-
`Chief: Mahmoud Nagshineh, IBM Watson Research
`Center, 30 Saw Mill River Road, Hawthorne,
`NY 10532. Electronic submissions may be sent
`in postscript to: mahmoud@watson.ibm.com.
`Copyright and reprint permissions: Abstract-
`ing is permitted with credit to the source. Libraries
`are permitted to photocopy beyond thelimits
`of U.S. Copyrightlaw for private use of patrons:
`those post-1977 articles that carry a code on the
`bottom of thefirst page provided the per copy fee
`indicated in the codeis paid through the Copyright
`Clearance Center, 222 Rosewood Drive, Dan-
`vers, MA 01923. For other copying, reprint, or
`republication permission, write to Director,
`Publishing Services, at IEEE Headquarters.All
`rights reserved. Copyright © 2000 by The Insti-
`tute of Electrical and Electronics Engineers, Inc.
`Postmaster: Send address changes to JEEE
`Personal Communications, IEEE, 445 Hoes
`Lane, Piscataway, NJ 08855-1331; or email to
`address.change @iece.org. Printed in USA.Peri-
`odicals postage paid at New York, NY and ataddi-
`tional mailing offices, Canadian GST #125634188.
`Subscriptions: Send orders, address changesto:
`IEEEService Center, 445 Hoes Lane, Piscat-
`away, NJ 08855-1331; tel.: 908-981-0060.
`Advertising: Advertising is accepted at the dis-
`cretion of the publisher. Address correspondence
`to: Advertising Manager, [EEE Personal Com-
`munications, 305 East 47th Street, New York,
`NY 10017-2394.
`
`

`

`Abstract
`This tutorial presents an overview of the Global System for Mobile Communications Short Message Service from the viewpoint of implementing
`new telematic services. SMS offers the users of GSM networksthe ability to exchange alphanumeric messages up to the limit of 160 characters.
`Thetutorial is motivated by an acute absence of research publications in this field. The information gathered in the tutorial was required
`considering the increasing potential SMSoffers for integration with existing messaging services andits ability to offer a successful replacement
`for the Transmission Control and Internet Protocols as far as low-bandwidth-demanding applications are concerned.Initially, the tutorial gives a
`brief overview of the building blocks of GSM networks — the mobile station, base station, and network subsystem — and then emphasizes the
`SMSnetwork and protocol architecture. The most widely used protocols for message submission are then introduced (text-based, SMS2000,
`ETSI 0705, TAP) and compared in termsof features provided andflexibility to handle extended alphabets or two-way messaging. Finally the
`tutorial outlines a summary of current and future issues for further development and researchin the light of novel features for submission
`protocols and telematic services.
`
`The Global System for
`Mobile Communications
`Short Message Service
`
`
`
`GUILLAUME PEERSMAN AND SRBA CVETKOVIC,
`
`THE UNIVERSITY OF SHEFFIELD
`
`PAUL GRIFFITHS AND HUGH SPEAR, DIALOGUE COMMUNICATIONS LTD.
`
`to send and/or receive alphanumeric messages. The short
`since the first Global System
`messages can be up to 140 bytes in length, and are delivered
`for Mobile Communications (GSM) network started opera-
`within a few seconds where GSM coverageis available. More
`tion in 1991, more than 100 countries have adopted the stan-
`dard. Over 20 million subscribers of GSM networks are now
`than a commonpagingservice, the delivery of the message is
`guaranteed even whenthe cellular terminal is unavailable
`offered worldwide coverage, outstanding voice quality over a
`whole range of operating conditions, and a variety of value-
`(e.g., when it is switched off or outside. the coverage area).
`added services. These services include voice mail, call han-
`The network will hold the message and deliver it shortly after
`the cellular terminal announces its presence on the network.
`dling facilities, call line identification, and Short Message
`The fact that SMS (through GSM) supports international
`Service (SMS).
`roaming with very low latency makesit particularly suitable
`With SMS,users are able to exchange alphanumeric mes-
`for applications such as paging, e-mail, and voice mail notifi-
`sages (up to 160 characters) with other users of digital cellular
`cation, and messaging services for multiple users. However,
`networks, almost anywhere in the world, within seconds of
`the facilities offered to users and the charges for these facili-
`submission. Even if the service was originally conceived as a
`ties still mainly depend onthelevel of service provided by the
`paging mechanism for notifying the users of voicemail mes-
`sages, SMS is now increasingly used as a messaging service.
`network operator.
`There are two types of SMS available: cell broadcast [1]
`The messagesare typically created on mobile phone keypads,
`and point-to-point [2]. In cell broadcast, a message is trans-
`which is somewhat awkward. Fortunately, there are other
`mitted to all the active handsets or mobile stations (MSs) pre-
`ways to access the message centers, as discussed in this article.
`sent in a cell that have the capability of receiving short
`Numerousapplications are already available and make short
`message reception and submission possible using a computer.
`messages and have subscribed to this particular information
`service. This service is only one-way, and no confirmation of
`Gatewayarchitectures are also being widely implemented and
`receipt will be sent. It can send up to 93 7-bit character or 82
`connect company’s e-mail or voicemail systems to the SMS.
`8-bit characters, typically used to transmit messages about
`The practical implementation of SMS and the different
`traffic conditions, weather forecast, stock market, and so on.
`protocols for message submission ate addressedin thisarticle.
`In point-to-point service, messages can be sent from one
`The future of SMS anda brief review of the fields currently
`mobile to another or from a PC to a mobile and vice versa.
`being studied will concludethis article.
`These messages are maintained and transmitted by an SMS
`The Short Message Service
`Center (SMSC). The SMSC is an electronic form of ordinary
`mail postal service that stores and then forwards the messages
`whenthey can be delivered. Each GSM network must support
`Developed as part of the GSM Phase 2 specification, the
`one or more SMSCsto sort and route the messages. Each
`Short Message Service, or SMS as it is more commonly
`SMSCchecks, organizes, and sends the message to the opera-
`known,is based on the capability of a digital cellular terminal
`
`
`
`IEEE Personal Communications * June 2000
`
`1070-9916/00/$10.00 © 2000 IEEE
`3 of 11
`3 of 11
`
`—
`
`15
`
`
`

`

`‘'‘t''''''’'1’1’',’'t1
`
`
` Operation and
`maintenance center
`
`
`?
`
`Network subsystem
`
`Auc: Authentication centre
`EIR:
`Equipmentidentity register
`HLR:
`Homelocation register
`VLR:
`Visitor location register
`
`
`
`
`
`
`
`Basestation subsystem
`
`U
`
`Other base station subsystem1
`v
`'
`'
`'
`‘
`
`\
`
`i'
`
`'
`'
`1
`'
`1
`1
`1
`
`
`SIM
`
`Mobile ©
`Station
`
`
`
`'1'''
`
`
`Data communication
`
`
`network
`
`
`
`
`
`BTS:
`Base transceiver station
`BSC:
`Base station controller
`SIM:
`Subscriber identity module
`ME:
`Mobile equipment
`Figure 1. The basic GSM networkarchitecture.
`
`tor. It also receives and passes on any confirmation messages to
`any GSM mobile on any network. However, in practice, there
`are no agreements to allow SMSto travel between networks.
`There are several ways in which a short message can be
`submitted, depending on the interfaces supported by the GSM
`network SMSC. Users can call a central paging bureau (i.e.,
`an operator), or directly create the message on the keypad of
`their handset. Typing the messages is made easier when using
`a personal digital assistant (PDA) or a laptop connected to
`the handset. A few SMSC equipment manufacturers and com-
`panies have also developed their own protocols for short mes-
`sage submission. Consequently, more and more GSM
`networks now offer access to their SMSC using these proto-
`cols over a variety of hardware interfaces: modem dialup,
`X25, and even the Internet.
`
`GSM Network Architecture
`
`SIM. Because the IMEI and IMSI are independent, personal
`mobility is possible. The SIM can be protected against unau-
`thorized use by a personal identity number (PIN).
`The Base Station Subsystem
`The base station subsystem is composed of two parts, the
`base transceiver station (BTS) and base station controller
`(BSC). They communicate across the specified Abis inter-
`face, thus allowing network operators to use components
`made by different suppliers. The BTS houses the radio
`transceivers that define a cell and handle the radio link pro-
`tocols with the MS. Depending on the density of the area,
`more or fewer BTSs are needed to provide the appropriate
`capacity to the cell. Digital communications system (DCS)
`networks working at 1800 MHz need twice the number of
`BTSs to cover the same area as GSM networks, but provide
`twice the capacity.
`The BSC manages the radio resources for one or more
`BTSs via the standardized Abis interface. It handles radio
`channel setup, frequency hopping, and handovers. The BSCis
`the connection between the MS and the mobile switching cen-
`ter (MSC). The BSC also takes care of converting the 13 kb/s
`voice channel used over the radio link (Um interface) to the
`standardized 64 kb/s channel used by the public switched tele-
`phone network (PSTN).
`The Network Subsystem
`The Mobile Station
`The MSC is the main component of the network subsystem.
`Its provides the same functionality as a switching node in a
`The MS and base station subsystem communicate across the
`Um interface, also known as the air interface or radio link.
`PSTNor integrated services digital network (ISDN), but also
`takes care of all the functionality needed to handle a mobile
`The base station subsystem communicates with the network
`subscriber such as registration, authentication, location updat-
`subsystem across the A interface. The MS consists of the
`ing, handovers, and routing to a roaming subscriber. The
`physical terminal and contains the radio transceiver, the dis-
`MSC also acts as a gateway to the PSTN or ISDN, and pro-
`play and digital signal processors, and the Subscriber Identity
`vides the interface to the SMSC.
`Module (SIM). The SIM provides the user with the ability to
`access their subscribed services regardless of the location and
`The international roaming and call routing capabilities of
`the terminal used. The insertion of the SIM in any GSM cel-
`GSM networks are provided by the home location register
`(HLR)andvisitor location register (VLR) together with the
`lular phone allows the user to access a network, make and
`MSC. The HLR database contains all the administrative infor-
`receive phone calls, and use all the subscribed services.
`mation about each registered user of a GSM network along
`The International Mobile Equipment Identity (IMEI)
`with the current location of the MS. The current location of
`uniquely identifies the mobile terminal according to the Inter-
`an MSis in the form of a Mobile Station Roaming Number
`national Mobile Subscriber Identity (IMSI) contained in the
`
`The layout of a generic GSM network with its several func-
`tional entities is shown in Fig. 1 [3]. The architecture can be
`divided in three main components:
`* The subscriber holds the MS, namely the GSM terminal
`* The base station subsystem controls the radio link with the
`MS
`* The network subsystem performs the switching of calls and
`other management tasks such as authentication.
`
`4 of 11
`4 of 11
`
`IEEEPersonal Communications * June 2000
`
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`Um air interface
`A interface
`Msc
`
`
`|
`
`Ms
`
`cM
`
`MM
`
`td
`RM
`Laem
`
`!
`
`|
`
`BSS
`:
`MM
`
`BSSAP
`BSSAP
`|
`
`sccP
`ScCP
`|
`SccP
`MTP
`MTPlevel 3
`at
`eee=
`
`cM
`
`MAP
`
`ISDN
`TUP
`
`MTP
`
`:
`
`rom
`
`=
`
`Datalink layer
`
`;
`
`:
`TDMA/FDMA
`TDMA/FDMA
`
`[| Messagelayer
`[ie]
`M@ Figure 2. The GSMprotocolarchitecture.
`
`TUP
`
`ISUP
`
`MAP
`
`TCAP
`
`
`sccp
`
`MTP level 3
`
`
`(MSRN), typically the $S7 number of
`the visited MSC, and used to route a
`call to the MSC where the mobile is
`actually located.
`The VLR is usually located within
`the MSC to speed up access to the
`information required during a call and
`simplify the signaling. The content of
`the VLRis a selection of the informa-
`tion from the HLR,basically all neces-
`sary information for call control and
`provision of the subscribed services,
`for each single mobile currently locat-
`ed in the geographical area controlled
`by the VLR.
`The network subsystem uses two
`other databases for authentication and
`security purposes, The Equipment
`Identity Register (EIR) containsa list
`of each MS IMEIallowed on the network. The authentication
`center (AuC) database contains each single PIN stored in the
`MSSIM.
`
`tion over the radio link to transmit
`call-related signaling information such
`as the establishment of the signaling
`and traffic channel between the MS
`and the BSS.
`On the MSCside, the message layer
`is divided into four sublayers. The
`Base System Substation Application
`Part (BSSAP) of the MSC provides
`the channel switching functions, radio
`resources management, and internet-
`working functions. The Message
`Transfer Part (MTP) and Signaling
`Connection Control Part (SCCP) pro-
`tocols are used to implement the data
`link layer and layer 3 transport func-
`tions.for carrying the call control and
`mobility management signaling mes-
`sages across the A interface. SCCP
`packets are also used to carry the messages for SMS.
`Signaling between the different entity uses the Internation-
`al Telecommunication Union (ITU) SS7, widely used in ISDN
`and current public networks. SS7 is currently the only element
`The GSM Signaling Protocol
`of the GSM infrastructure capable of packet switching as well
`as circuit switching. It is used to transport control signals and
`The exchange of signaling messages regarding mobility, radio
`resources, and connection management between the different
`short message packets for SMS. The protocol consists of the
`Mobile Application Part (MAP), Transaction Capability
`entities of a GSM networkis handled through the protocol
`Application Part (TCAP), SCCP, MTP, and ISDN-User Part
`architecture, as shown on Fig.2.
`(ISUP) or Telephone User Part (TUP). Figure 3 depicts the
`The architecture consists of three layers: physical, data
`link, and message. The physical layer and channel structure
`SS7 protocolstack.
`The ISUP provides the signaling functions needed to sup-
`are described in detail by M. Mouly and M. Pautet [4]. Layer
`port switched voice and data applications in the ISDN envi-
`2 implements the data link layer using a modified flavor of the
`ronment. The TUP provides the basic functionality for call
`Link Access Protocol (LAPD) to operate within the con-
`control functions for ordinary national and internationaltele-
`straints set by the radio path. On the MS side, the message
`phone calls. The TCAPis an application layer protocol. It
`layer consists of three sublayers: connection management
`(CM), mobility management (MM), and resource manage-
`allows an application at one node to invoke an execution of a
`procedure at another node and exchange the results of such
`ment (RR). The CM sublayer managescall-related supple-
`invocation. It isolates the user application from the complexity
`mentary services, SMS, and call-independent supplementary _
`of the transaction layer by automatically handling transaction
`services support. The MM sublayer provides functions to
`establish, maintain, and release a connection between the MS
`and invocation state changes, and generating the abort or
`reject messages in full accordance with ITU and American
`and the MSC,over which an instance of the CM sublayer can
`National Standards Institute (ANSI) standards. The MAP
`exchange information with its peer. It also performs location
`uses the TCAPservices to provide the signaling capabilities
`updating, IMSI management, and Temporary Mobile Sub-
`scriber Identity (TMSI) identification, authentication, and
`required to support the mobile capabilities.
`The MTP and SCCP(Fig. 4) correspond to the lower three
`reallocation. The RR sublayer establishes the physical connec-
`
`
`
`
`MTPlevel 2
`
`MTPlevel 1
`
`
`
`a Figure 3. ‘The SS7protocolstack,
`
`TEEE Personal Communications * June 2000
`
`5 of 11
`5 of 11
`
`7
`
`
`

`

`
`
`
`
`
`TCAP/ISUP/TUP
`
`Tt
`===
`
`
`SCCP
`management
`
`|
`:
`
`
`
`Signaling message
`handling
`
`Signaling network
`handling
`Soa) See eae tae ae ghee Sl
`
`mation will always be returned to the SMSC
`indicating whether the MS has received the short
`message or not. A confirmation will also be
`SCCP connection-
`SCCP connectionless||;
`}
`returned to the MS from an SMSC indicating
`.!
`oriented control
`ee ee ey
`control
`iy!
`'
`whether the TPDU has been received successful-
`ly. The software within the MS must be able to
`decode and store the messages.
`SMS Mobile Terminated (SMS-MT) is the
`ability to receive an SMS message from an
`SMSC and is more ubiquitous, while SMS
`Mobile Originated (SMS-MO) is the ability to
`send short messages to an SMSC. Messages can
`also be stored on the SIM, which can be
`retrieved at a later time. Whenthe phone is not
`within coverage or the SIM is full, the SMSC
`will hold the message and deliver it shortly after
`the phone comes back into range or there is
`space in memory.
`
`'
`:
`:
`
`agneing fink
`unctions
`
`}
`
`MTP
`
`| Signaling data link
`functions
`
`
`
`
`Ms
`
`The SMS Basic Network Architecture
`The main components of the SMS network archi-
`tecture are shownin Fig.5.
`When routing a mobile originated short mes-
`sage, the SMSC forwards the short message to
`the SMS-GMSC. The SMS-GMSC interrogates
`the HLR for routing information and sends the
`short message to the appropriate MSC. The
`MSC delivers the short message to the MS. On
`the other hand, when routing a mobile terminat-
`ed short message, the MS addresses the required
`SMSC according to its global title. If roaming
`abroad the visited public limited mobile network
`(PLMN) will route the short message to the
`appropriate SMS-IWMSC.
`The SMSCidentifies each short message unique-
`ly by adding a time stamp in the SMS-DELIVER
`TP-SCTSfield. The short message arrival at the
`SMSCis accurate to the second. It is the SMSC’s
`responsibility to assure that if two or more short
`message arrive within the same secondtheir time-stampswill be
`different.
`The MS has to be able to receive/submit a short message
`TPDU, and then return a delivery report upon successful
`reception. It is also responsible for notifying the network
`when it has memory capacity available to receive one or more
`messages, if it had previously rejected a short message because
`its memory capacity was exceeded.
`
`SMSC
`
`
`
`SMS-GMSC/
`SMS-IWMSC
`
`ge}
`
`MSC
`
`
`
`
`
`
`HLR
`
`VLR
`
`
`
`@ Figure 5. The SMS network architecture.
`
`layers of the open system interconnection (OSI) model(Fig. 4).
`The SCCP sublayer supports connectionless and connection-
`oriented services to transfer data and Global Title Translation
`(GTT) above MTPlevel 3 for voice, data, ISDN, and GSM ser-
`vices. The data transfer is reliable, independent of the underly-
`ing hardware, and transparent to users. The protocol employs
`logical signaling connections within the SS7 network to ensure
`reliability and integrity of the ongoing data transfer. The MTP
`is divided into three levels:
`* MTPlevel 1 defines the characteristics of the digital signal-
`ing link and is equivalent to the OSI physicallayer.
`* MTPlevel 2 is equivalent to the OSI data link layer and
`provides a reliable sequenced delivery of data packets
`across MTPlevel1.
`* MTPlevel 3 provides congestion control, signaling manage-
`ment, and message discrimination, distribution,
`and routing in a similar way as the OSI network
`Conveyinga short messagefrom the SMSCto the MS
` SMS-Deliver
`|
`layer.
`
`
`
`SMS-Deliver-Report
`Practical Implementation
`
`Conveying a short messagefrom theMS to the SMSC
`SMS-Submit
`SMSuses the SS7 signaling channel to transmit the
` SMS-Submit-Report
`Conveying a failure cause
`
`data packet [5], thus allowing a text message to be
`received when the user is making a voice or data
`
`SMS-Status-Report
`| Conveying a status reportfromthe SMSC to the MS.
`call. An active MS should be able to send and
`SMS-Command
`receive a short message Transport Protocol Data
`
`Conveying a command from the MS to the SMSC
`Unit (TPDU) at any time regardless of whether
`Table 1. TPDU pypes.
`there is a speech or data call in progress. A confir-
`
`
`Protocol Architecture
`The protocol layer for SMSis shown in Fig. 6. The short mes-
`sage transfer layer (SM-TL) services the short message appli-
`cation layer (SM-AL) and enables it to exchange short
`messages with a peer as well as receive confirmation of recep-
`tion reports from earlier requests.
`
`
`Conveying a failure cause
`
`18
`
`IEEE Personal Communications * June 2000
`
`6 of 11
`6 of 11
`
`

`

`
`
`
`SMS-GMSC/
`SMSC
`SMS-IWMSC
`
`
`
`
`
`
`
`
`
`MSC > MS
`
`
`
`
`
`
`
`
`
`y
`
`SM-TL
`
`
`SM-TL
`
`
`
`
`
`
`SM-LL
`
`SM-LL
`
`SM-RL +
`
`
`
`
`
`<«—>| SM
`
`SM-LL
`
`
`
`
`
`element data (IED) that follows. Each of
`these fields is 1 octet long.
`
`pt
`SM-AL
`SM-AL
`In the user data, the message can be7bits,
`
`8 bits, or 16 bits. If 7-bit data is used and the
`header does not end on a 7-bit boundary,
`padding bits are used. This is to ensure that
`older mobiles which do not support the TP-UD
`SM-RL
`headercanstill display the message properly.
`SM-RL SM-RL-ss[ngp———»|_— jg¢————|_
`
`Using the IE] allows sending and receiving
`of concatenated short messages. The IED field
`contains all the necessary information for the
`receiving entity to reassemble the messages in
`the correct order, and is coded as follows:
`¢ First octet: short message reference num-
`ber identifying the message within the same
`transaction
`* Second octet: specifies the maximum numberof short mes-
`sages in the concatenated short message, which will not
`exceed 255
`¢ Third octet: identifies the sequence number of the short
`message within the concatenated message
`The minimum header length for concatenated messageis 7
`octets for 8-bit and 16-bit data and 8 for 7-bit data; leaving 133
`(140 - 7), 152 (160 — 8), and 66 ((140 - 7)/2) characters for the
`short message. The maximum length of the message is then
`increased to 38,760 (255*152), 33,915 (255*133), or 16,830
`(255*66) depending on the character coding scheme used.
`
`
`Mf Figure 6. The protocollayerfor SMS point-to-point.
`
`The SM-TL exchanges PDUs with its peer entity. The
`short message relay layer (SM-RL) conveys the PDUsvia the
`short message link layer (SM-LL). Refer to GSM 03.40 [2] for
`further details.
`
`SMSProtocol Data Unit Types
`There are six types of TPDU at the SM-TL,as listed in Table
`1. The elements of the SMS-Deliver and SMS-Submit TPDU
`are shown in Fig. 7 [2]. The main fields of the TPDU are
`described in this document however for a complete descrip-
`tion of the TPDU please refer to GSM 03.40[2].
`TP-Data-Coding-Scheme
`The data coding schemefield (TP-DCS) is used to iden-
`tify the coding scheme used by the user data, which can
`be 7- or 8-bit or even Unicode [6], as defined in GSM
`03.38[7].
`
`TP-Validity-Period
`The TP-VP field contains an information element
`enabling an MS to specify a validity period for the short
`messageit is submitting. The value specifies how long an
`SMSC will guarantee the existence of a short message
`before delivery to the recipient has been carried out.
`TP-More-Message-lo-Send
`_ The SMSC uses the TP-MMSfield to inform the MS that
`one or more short messages are waiting to be delivered.
`
`TP-User-Data-Header-Indicator
`The 1-bit TP-UDHIfield indicates whether the TP-UD
`includes an additional header as well as the short message.
`
`
`
`|
`
`
`
`
`
`
`
`TP-message-type-indicator
`
`TP-message-type-indicator
`
`TP-more-message-to-send
`
`TP-reject-duplicate
`
`TP-validity-period format
`
`
`
`TP-reply-path TP-reply-path
`
`
`
`TP-user-data-header-indicator
`
`P-status-report
`
`TP-originating-address
`
`TP-protocol-ID
`
` TP-data-coding-scheme TP-service-center-time-stamp
`
`
` TP-user-data-length
`
` TP-user-data
`
`
`
`TP-user-data-header-indicator
`
`P-message reference
`Lt
`
`TP-destination-address
`
`TP-protocol-ID
`
`TP-data-coding-scheme
`
`TP-validity-period
`
`TP-user-data-length
`
`TP-user-data
`
`$ T
`a T
`
`TP-Protocol Identifier
`The TP-PID is used by the MS or SMSC to identify the
`higher-layer protocol being used for internetworking
`with a certain type of telematic device (Telefax group 3
`or 4, Ermes,etc.)
`TP-User-Data (TP-UD)
`The TP-UDfield is used to carry the short message. It
`can store up to 140 octets of data for point-to-point SMS,
`together with a header depending on the setting of the
`TP-UDHIfield. The amountof space taken by the header
`reduces the amount of data the PDU cancarry. Figure 8
`shows a representation of the layout of the TP-UDfor7-
`and 8-bit data schemes.
`The header hasat least three fields. The first field,
`SMS-submit
`SMS-deliver
`the information element identifier, is used to identify
`
`concatenated short messages. Information data length
`(IDL) is used to indicate the length of the information
`@ Figure 7. An SMS TL-PDU.
`
`IEEEPersonal Communications * June 2000
`
`19
`
`7 of 11
`7 of 11
`
`

`

`
`
`
`Octets
`Octets
`
`|
`fey
`en
`
`
`| Total number of octets
`
`
`
`
`
`[tet | [tin|Padding |tea | pa |] eb | SM (7-bit data)
`Septet boundary i
`Length indicator
`
`
`Total numberof septets
`
`Length indicator
`UDL: User data length — 1 octet
`UDHL: User data header length — 1 octet
`IElx: information elementidentifier x — 1 octet
`IELx: Information element length x — 1 octet
`IEDx: Information element data x — 1 ton
`
` Total numberof octets
`
`
`
`
`Faas
`tela
`|
`eda | tb |...
`|
`1EIn
`SM (8-bit data).
`Octet boundary
`
`
`Total numberof octets
` Length indicator
`
`Length indicator
`Mi Figure 8. SMS-TPDUformass for 7-bit and 8-bitdata content.
`
`
`
`
`
`also lead to the short message not being understood and
`being rejected. All the above-mentioned problemscan lead to
`packets getting lost along the way with different conse-
`quences:
`° A negative acknowledgment received by the sender (phone
`displaying “message failed” or a similar message) although
`the short message reachesits destination (loss of packet ‘1)
`* Reception of duplicate short messages by user B (loss of
`packet ‘s or
`‘9)); could also be due to the timeout value
`being set too low in the SMSC
`* Or, in the worst case the message might not be delivered at
`all (loss of packet
`1,
`93), 4, >)
`Evenif Fig. 9 shows the most complicated routing scenario
`there is still much that can go wrong with short message rout-
`ing, and a lot of research is currently underway to overcome
`these.
`
`Short Message Routing Considerations
`In Fig. 9, user A in network @ is sending 2a short message to
`user B in network @ roaming in network (1). User A is using
`the SMSC in network \) to submithis shortmessage [8].
`The local cellular exchange routes the short message in an
`SCCPpacket according to the SMSCglobaltitle as defined by
`the E.164 numbering plan [9]. The SCCP packet is forwarded
`from exchange to exchange until it reaches the destination
`SMSC(1). The routing has to be set up in all the SCCP switches
`along the route for the message to successfully reach the SMSC
`in network ().
`Once the SCCP packet carrying the message arrives at the
`destination SMSC, a confirmation message is sent back to the
`handset using another SCCP packet (2).
`To deliver the short message to user B,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket