Specifications
Mobility Management
Handover
D-2 68P81095E55-E August 08, 2000
Mobility Management Procedures
To control and manage the movement and communication there are five basic
principles. The principles are:
• MS Tracking
• MS Trolling
• MS Authentication
• Location Request Control
• Home Neighbor Network Search
MS Tracking To contact a mobile (MS) the system must know the general location of the mobile.
MS tracking relates to the location and following of a mobile (MS) within the
system. The iDEN system MSs report any significant change in their location to the
FNE. As the mobile moves within the system the FNE broadcasts:
• Location Area information from each site
• The identifying number of the iDEN System
• The identifying number of the service provider
• The neighbor cell site list
The Location Areas define the geographical area that is considered a significant
change in location. By monitoring the broadcast information, the MS can determine:
• When it needs to report its location
• The frequencies (radio channels) used in the neighboring sites
• If the mobile is in the Home system or roaming
• The service provider
MS Trolling Trolling refers to the ability of the MS to determine the correct control channel to
monitor and maintain contact with the system. When the mobile is powered-ON, it
scans a pre-programmed list of potential control frequencies. The best signal is
determined, then the mobile registers on the system using that control channel of the
hosting cell. Once registered, the mobile receives the neighbor cell list and neighbor
cell control channel frequencies on the hosting cell’s broadcast control channel.
When operating on its Home system, the mobile monitors only the control channels
assigned by the current neighbor cell list.
MS Authentication At any time while active, the MS may be authenticated (challenged to provide proof
of identity). This is done in association with other activities for convenience and the
process is designed so that monitoring the transaction over the air does not allow
another mobile to subsequently mimic the authenticated MS. This is discussed in
greater detail in call processing.










