期刊文献+

GSM和LTE互操作浅析 被引量:2

Inter-Operation between GSM and LTE
下载PDF
导出
摘要 从网络的发展过程看,GSM网络在中国经过多年的发展,基本达到了全国城乡地区的无缝覆盖,拥有大量用户。GSM网络以其成熟的技术、稳定的设备性能和高性价比等特点,成为最适合为多数人提供无线通信服务的网络。可以预计,在像中国这样人口多、分布广的国家,GSM网络在较长一段时间内仍有充足的发展空间。与此同时,国内LTE网络正在规模建设中。在进行LTE网络建设的过程中,网络不仅要支持传统的语音业务,同时也需要满足各类数据业务的发展。GSM,LTE网络将在未来很长一段时间内共存,这种组网策略对于GSM和LTE系统之间的互操作提成了强烈的需求。着重从GSM到LTE的小区重选以及CSFB这两个方面分析了GSM和LTE之间的互操作。 With large-scale construction of LTE( Long Term Evolution), the network should not only sup- port the traditional voice services, but also meet the requirement of data services. And in the same time, GSM (Global System for Mobile Communications) is the main solution to voice services, for its technical maturity, reliable equipment, and high ratio of performance cost, and would still have adequate develop- ment space in a fairly long time. And thus GSM and LTE network would coexist for a long time in future. This networking strategy proposes an urgent demand for the inter-operation of between LTE and GSM. This paper analyzes the inter-operation of between LTE and GSM from two aspects of cell reselection and CSFB (Circuit Switched Fallback).
作者 周玲芳
出处 《广东通信技术》 2015年第2期9-11,25,共4页 Guangdong Communication Technology
关键词 小区重选 无线网络 互操作 语音回退 小区选择 cell reselection radio network inter-operation CSFB cell selection
  • 相关文献

同被引文献50

  • 1刘晓宇,姜怡.语音连续性技术SRVCC性能分析与优化[J].电信科学,2009,25(S2):125-131. 被引量:4
  • 23GPP, 3GPP TS 23. 002 V12.2.0 : Network Architecture [EB/OL]. (2008-05-20) [2015-06-10]. http:// www. 3gpp. org/ftp/Spees/html-info/23002, htm.
  • 3Miller B, Fredriksen L, and So B. An Empirical Study of the Reliability of UNIX Utilities [ J ]. Communications of the ACM 33(12) : pp. 32-44, 1990.
  • 4Roning J, et al. PROTOS: Systematic Approach to Elimi- nate Software Vulnerabilities, Presented at Microsoft Re- search. [EB/OL]. (2013-05-20) [2015-06-10]. http :// www. ee. onlu. fi/research/ouspg/PROTO- SMSR2002-protos.
  • 5Aitel D. An Introduction to SPIKE, The Fuzzer Creation Kit, Presented at the BlackHat USA Conference. [ EB/ OL]. (2011 -05 -20) [2015 -06-10].http://www. blackhat, com/presentations/bh-usa-02/bh- us-02-ait el -spike. ppt.
  • 6Sehieferdeeker I, Gromann J, Schneider M. Model- based Fuzzing for Security Testing, 2010. [ EB/OL 1. (2010-05-20) [ 2015-06-10 ]. http://www, spaeios, eu/ sectest2012/ pdfs/ SecTestl CSTSchieferdeck er. pdf.
  • 7Grugq, Base Jumping: Attacking the GSM Baseband and Base Station, 2010. [EB/OL]. (2011-05-20) ~2015- 05-10]. http://www, coseinc, com/en/index, php? rt = download&act = publication&file = Base% 20J umping, pdf.
  • 8Mulliner C, Golde N, and Seifert J P. SMS of Death: From Analyzing to Attacking Mobile Phones on a Iarge Scale [ C I- USENIX Security Symposium, pp. 213-216, 2011.
  • 9Rieciato F, Co]uceia A, and D' Alconzo A. A Review of DoS Attack Models for 3G Cellular Networks fi'om a Sys- tem-Design Perspective[ J ]. Computer Comnmnications, vol. 33, no. 5, pp. 551-558, 2010.
  • 10PENG X, W Ying-you, Z Da-zhe, Z ttong. GTP Security in 3G Core Network [C]. In: 2010 Second International Conference on Networks Security, Wireless Communications mad Trusted Computing, pp. 15-19. IEEE,2010.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部