throbber

`
`Abstract
`This tutorial presents an overview of the Global System for Mobile Communications Short Message Service from the viewpoint of implementing
`new tclematic services. SMSoffers the users of GSM networksthe ability to exchange alphanumeric messages up to the limit of 160 characters.
`The tutorial is motivated by an acute absence of research publications in this field. The information gathered in the tutorial was required
`considering the increasing potential SMS offers for integration with existing messaging services andits ability to offer a successful replacement
`for the Transmission Control and Internet Protocols as far as low-bandwidth-demanding applications are concerned. Lnitially, the tutorial gives a
`brie! overview of the building blocks of GSM networks — the mobile station, base station, and network subsystem -
`- and then emphasizes the
`SMSnetwork and protocol architecture, The most widely used protocols for message submission are then introduced (text-based, SMS2000,
`ETSI 0705, TAP) and compared in terms of features provided and flexibility to handle extended alphabets or two-way messaging. Finally the
`tutorial outlines a summary of current and future issues for further development and researchin the light of novel features for submission
`protocols and telematic services.
`
`The Global System for
`Mobile Communications
`Short Message Service
`
`
`
`GUILLAUME PEERSMAN AND SRBA CVETKOVIC,
`THE UNIVERSITY OF SHEFFIELD
`
`PAUL GRIFFITHS AND HUGH SPEAR, DIALOGUE COMMUNICATIONS LTD.
`
`to send and/or reccive alphanumeric messages. The short
`since the first Global System
`messages can be up to 140 bytes in length, and are delivered
`for Mobile Communications (GSM) network started opera-
`within a few seconds where GSM coverageis available, More
`tion ‘in 1991, more than 100 countries have adopted the stan-
`dard. Over20 million subscribers of GSM networks are now
`than a commonpaging service, the delivery of the messageis
`guaranteed even when the cellular terminal is unavailable
`offered worldwide coverage, outstanding voice quality over a
`whole range of operating conditions, and a variety of value-
`(e.g., whenit is switched off or outside the coverage area).
`added services, These services include voice mail, call han-
`The network will hold the message and deliver it shortly after
`the cellular terminal announcesits presence on the network,
`dling facilities, call line identification, and Short Message
`The fact that SMS (through GSM)supports international
`Service (SMS).
`roaming with very low latency makes it particularly suitable
`With SMS, users are able to exchange alphanumeric mes-
`sages (up to 160 characters) with other users ofdigital cellular
`for applications such as paging, e-mail, and voice mail notifi-
`cation, and messaging services for multiple users. However,
`networks, almost anywhere in the world, within seconds of
`the facilities offered to users and the charges for these facili-
`submission, Even if the service was originally conceived as a
`ties still mainly depend on the level of service provided by the
`paging mechanism for notifying the users of voicemail mes-
`network operator.
`sages, SMS is now increasingly used as a messaging service,
`There are two types of SMS available: cell broadcast [1]
`The messages are typically created on mobile phone keypads,
`and point-to-point [2]. In cell broadcast, a message is trans-
`which is somewhat awkward, Fortunately, there are other
`mitted toall the active handsets or mobile stations (MSs) pre-
`ways to access the message centers, as discussedin this article,
`Numerous applications are already available and make short
`sent in a cell that have the capability of receiving short
`messages and have subseribed to this particular information
`message reception and submission possible using a computer.
`service. This service is only one-way, and no confirmation of
`Gateway architectures are also being widely implemented and
`conhect company’s c-mail or yoiccmail systems to the SMS,
`receipt will be sent. It can send up to 93 7-bit character or 82
`The practical implementation of SMS and the different
`8-bit characters, typically used to transmit messages about
`traffic conditions, weather forecast, stock market, and so on.
`protocols for message submission are addressedinthis article.
`In point-to-point service, messages can be sent from one
`The future of SMS anda brief review of the fields currently
`mobile to another or from a PC to a mobile andvice versa.
`being studicd will conclude this article.
`These messages are maintained and transmitted by an SMS
`The Short Message Service
`Center (SMSC). The SMSC is an electronic form of ordinary
`mail postal service that stores and then forwards the messages
`when they can be delivered, Each GSM network must support
`Developedas part of the GSM Phase 2 specification, the
`Short Message Service, or SMS as it is more commonly
`one or more SMSCsto sort and route the messages. Each
`SMSCchecks, organizes, and sends the message to the opera-
`known, is based on the capability of a digital cellular terminal
`
`
`TEEE Personal Communications * June 2000
`
`1070-991 6/00/$10,00 @ 2000 IEEE
`
`15
`
`Facebook Ex. 1012
`Facebook Ex. 1012
`U.S. Pat. 8,243,723
`USS. Pat. 8,243,723
`
`

`

`
`
`
`
`
`
`
`
`
`
`1'!'''''''''1'''
`+''"''1''1'
`_PSTNISDN :
`Base transceiver station
`BTS:
`ithentication ecintre
`o
`Base station controller —
`BSC:
`tain
`uipmentidentity register
`
`——
`Subscriberidentity module
`SIM:
`Home
`location. register: os:
`ME:—Mobile equipment
`.- Visitorlocation register
`:
`
`a ‘Operation ‘an
`: “maintenance center :
`
`Datacommu
`'
`“network
`
`B figure 1, The basic GSM network architecture.
`
`GSM Network Architecture
`
`tor. [t also receives and passes on any confirmation messages to
`any GSM mobile on any network, However, in practice, there
`are no agreements to allow SMSto travel between networks.
`There are several ways in which a short message can be
`submitted, depending onthe interfaces supported by the GSM
`network SMSC. Users can call a central paging bureay(i.c.,
`an operator), or directly create the message on the keypad of
`their handset. ‘Typing the messages is made casicr whenusing
`a personal digital assistant (PDA) or a laptop connectedLo
`the handsct. A few SMSCequipment manufacturers and com-
`panies have also developed their own protocols for short mes-
`sage submission, Consequently, more and moce GSM
`networks now olfer access to their SMSC using these proto-
`cols over a variety of hardwareinterfaces: modem dialup,
`X25, and even the Internet.
`
`SIM. Because the [MEI and IMST are independent, personal
`mobility is possible. The SIM canbe protected against unau-
`thorized use by a personal identity number(PIN).
`The Base Station Subsystem
`The base station subsystem is composedof two parts, the
`pase transceiver station (BTS) and base station controller
`(BSC). They communicate across the specified Abis inter-
`face, thus allowing network operators to use components
`made by different suppliers. The BTS houses the radio
`transceivers that define a cell and handle the radio link pro-
`tocols with the MS. Depending on the density of the area,
`more or fewer BTSs are needed to provide the appropriate
`capacity to the cell. Digital communications system (DCS)
`networks working at 1800 MHz need twice the number of
`BTSsto cover the same arca as GSM networks, but provide
`twice the capacity.
`The BSC managesthe radio resources for one or more
`BTSsvia the standardized Abis interface, It handles radio
`The layout of a generic GSM networkwith its severa) func-
`channel setup, frequency hopping, and handovers. The BSC is
`tional entities is shown in Fig.
`1 [3]. The architecture can be
`the connection between the MS and the mobile switching cen-
`divided in three main components;
`ter (MSC). The BSC also takes care of converting the 13 kb/s
`* The subscriber holds the MS, namely the GSM terminal
`yoice channel used over the radio link (Um interface) to the
`» The base station subsystem controls the radio link with the
`MS
`standardized 64 kb/s channel used by the public switched tele-
`phone network (PSTN).
`* The network subsystem performs the switching of calls and
`other management tasks such as authentication.
`The Network Subsystem
`The Mohile Station
`The MSCis the main component of the network subsystem.
`Its provides the same functionality as a switching node ina
`The MS and base station subsystem communicate across the
`PSTN or integrated services digital network (ISDN), but also
`Unminterface, also known as the air interface or radio link,
`takes care of all the functionality needed to bandle a mobile
`‘The base station subsystem communicates with the network
`subscribersuch as registration, authentication, location updat-
`subsystem across the A interface. The MS consists of the
`ing, handovers, and routing to a roaming subscriber. The
`physical terminal and contains the radio transceiver, the dis-
`MSC also acts as a gateway to the PSTN or ISDN, and pro-
`play and digital signal processors, and the Subscriber Identity
`videsthe interface to the SMSC.
`Madule (SIM), The 51M provides the user with the ability to
`The international roaming andcall routing capabilities of
`aceess their subscribed services regardless of the location and
`GSM networks are provided by the home location register
`the termina! used, The insertion of the SIM in any GSM cel-
`(HLR)and visitor lacation register (VLR) together with the
`lular phone allows the user to access a network, make and
`MSC. The HLR database contains all the administrative infor-
`receive phone calls, and useall the subseribed services,
`mation about ¢ach registered user of a GSM network along
`The International Mobile Equipment Identity (IMFI)
`with the current location of the MS. The current location of
`uniquely identifies the mobile terminal according to the Inter-
`an MSis in the form of a Mobile Station Roaming Number
`national Mobile Subscriber Identity (MSI) contained in the
`
`
`16
`
`IEEE Personal Communications * June 2000
`
`

`

`
`
`Um air interface
`
`MS
`
`Ainterface ©).
`
`000°.) MSC_
`
`
`
`Aigeees gue)
`
`..
`
`
`
`@ Figure 2.TheGSM protocol architecture.
`
`TUP
`
`MAP
`
`TCAP
`
`SUP
`
`:
`
`
`
`SCCP
`
`
`
`
`a ESaees ae 3a
`
`
`
`The GSM Signaling Protocol
`The exchange of signaling messages regarding mobility, radio
`resources, and connection management between the different
`entities of a GSM network is handled through the protocol
`architecture, as shown on Fig. 2.
`The architecture consists of three layers: physical, dala
`link, and message. The physical layer and channel structure
`arc described in detail by M. Mouly and M. Pautet [4]. Layer
`2 implements the data link layer using a modified tlavor of the
`Link Aceess Protocol (-APID) to operate within the con-
`straints set by the radio path. On the MS side, the message
`laycr consists of three sublayers: connection management
`(CM), mobility management (MM), and resource manage-
`ment (RR). The CM sublayer manages call-rclated supple-
`mentary services, SMS, and call-independent supplementary
`services support. The MM sublayerprovides functions to
`establish, maintain, and release a connection between the MS
`and the MSC, over which an instance of the CM sublayer can
`oxchange information with its peer. It also performs location
`updating, IMSI management, and Temporary Mobile Sub-
`scriber [dentity (TMSI) identification, authentication, and
`reallocation. The RR sublayerestablishes the physical connec-
`
`TEER. Personal Communications ¢ June 2000
`
`7
`
`(MSRN), typically the $87 number of
`the visited MSC, and used to route a
`eall to the MSC where the mobile is
`actually located.
`The VLR is usually located within
`the MSC to speed up acecss to the
`information required during a call and
`simplify the signaling. The cantent of
`the VLRis a selection of the informa- .
`tion from the HLR,basically all neces-
`sary information for call control and
`provision of the subscribed services,
`for cach single mobile currently locat-
`ed in the geographical area controlled
`by the VLR.
`The network subsystem uscs two
`other databases for authentication and
`sccurity purposes. The Equipment
`Identity Register (ERTR) contains alist
`of cach MS IMEI allowed on the network. The authentication
`center (AuC) database contains cach single PIN stored in the
`MS SIM.
`
`MTPlevel 1
`
`MIP level
`
`
`
`Figure 3. ‘fhe SS7protocol stack.
`
`tion over the radio link to transmit
`call-related signaling information such
`as the establishment of the signaling
`and traffic channel between the MS
`and the BSS.
`On the MSCside, the message layer
`is divided into four sublayers, The
`Base System Substation Application
`Part (BSSAP) of the MSC provides
`the channel switching functions, radio
`resources management, and internet-
`working functions. The Message
`Transfer Part (MTP) and Signaling
`Connection Control Part (SCCP) pro-
`tocols are used te implement the data
`link layer and layer 3 transport func-
`tions for carrying the call control and
`mobility management signaling mes-
`sages across the A interface. SCCP
`packets are also used to carry the messages for SMS.
`Signaling between the different entity uses the Internation-
`al Tclecommunication Union (ITU) 857, widely used in ISDN
`and current public networks. $87 is currently the only element
`of the GSM infrastructure capable of packet switching as well
`as circuit switching. It is used to transport control signals and
`short message packets for SMS. The protocol consists of the
`Mobile Application Part (MAP), Transaction Capability
`Application Part (TCAP}, SCCP, MTP, and ISDN-User Part
`(ISUP) or Telephone User Part (TUP). Figure 3 depicts the
`SS7 protocolstack.
`The ISUPprovides the signaling functions needed to sup-
`port switched voice and data applications in the ISDN cnvi-
`ronment, The TUP provides the basic functionality for call
`control functions for ordinary national and international tele-
`phonecalls. The TCAPis an application layer protocol. It
`allows an application at one node to invoke an execution of a
`procedure at another node and exchange the results of such
`invocation. It isolates the user application from the complexity
`of the transaction layer by automatically handling transaction
`and invocation state changes, and generating the abort or
`reject messages in full accordance with ITU and American
`National Standards Institute (ANSI) standards, The MAP
`uses the TCAP services to provide the signaling capabilitics
`required to support the mobile capabilities.
`The MTP and SCCP(Fig. 4) correspond to the lower three
`
`
`

`

`
`
`
` wee,
`
` mation will always be returned to the SMSC
`
`
`
`: TCAPASUP/TUP
`ttt
`
`“SCCP
`
`MrP
`level 3
`
`MTP
`level 2
`
`MTP
`level 1
`
`:Figure 5. TheSMS network architecture.
`
`indicating whether the MS has received the short
`message or not. A confirmation will also-be
`returned to the MS from an SMSC indicating
`whether the TPDU has been received successful-
`ly. The software within the MS must be able to
`decode and store the messages.
`SMS Mobile Terminated (SMS-MT)is the
`ability fo receive an SMS message from an
`SMSC and is more ubiquitous, while SMS
`Mobile Originated (SMS-MO) is the ability to
`send short messages to an SMSC, Messages can
`also be stored on the SIM, which can be
`retrieved at a later time. When the phone is not
`within coverage or the SIM is full, the SMSC
`will hold the message and deliverit shortly after
`the phone comes back inte range orthere is
`space in memory.
`The SMS Basic Network Architecture
`The main components of the SMS network archi-
`tecture are shownin Fig. 5.
`When routing a mobile originated short mes-
`sage, the SMSC forwards the short message to
`the SMS-GMSC. The SMS-GMSC interrogates
`the HLRfor routing information and sends the
`short message to the appropriate MSC, The
`MSC delivers the short message to the MS. On
`the other hand, when, routing a mobile terminat-
`ed short message, the MS addresses the required
`SMSC according to its globaltitle. If roaming
`abroadthe visited public limited mobile nctwork
`(PLMN) will route the short message to the
`appropriate SMS-IWMSC.,
`The SMSCidentifies cach short message unique-
`ty by adding a time stamp in the SMS-DELIVER
`TP-SCTSfield. The short message arrival at the
`SMSC is accurate to the second. It is the SMSC’s
`responsibility to assure that if wo or more short
`message arrive within the same secondtheir time-stamps will be
`different.
`The MS hasto be able to reccive/submit a short message
`TPDU, and then return a delivery report upon successful
`reception. It is also responsible for notifying the nctwork
`when it has memory capacity available to reccive one or more
`messages,if it had previously rejected a short message because
`its memory capacity was exceeded.
`
`—
`
`~
`
`Protocol Architecture
`The protocol layer for SMSis shown in Fig. 6. The short mes-
`sage transfer layer (SM-TL,) services the short message appli-
`cation layer (SM-AL) and enables it to exchange short
`messages with a peer as well as reccive confirmation of recep-
`tion reports from earlier requests.
`
`layers of the open system interconnection (OST) model (Fig. 4).
`The SCCPsublaycr supports connectionless and connection-
`oriented services to transfer data and Global Title Translation
`(GTT) above MTPlevel 3 for voice, data, ISDN, and GSM ser-
`vices. The data transfer is reliable, independent of the underly-
`ing hardware, and transparent to users. The protocol employs
`logical signaling connections within the $87 network to ensure
`reliability and integrity of the ongoing data transfer, The MTP
`is divided into three levels:
`* MTPlevel 7 defines the characteristics of the digital signal-
`ing link and is equivalent to the OSI physical layer.
`* MTP level 2 is equivalent to the OSI data link layer and
`provides a reliable sequenced delivery of data packets
`across MTP Icvel1.
`* MTPlevel 3 provides congestion control, signaling manage-
`ment, and message discrimination, distribution,
`and routing in a similar way as the OSI network
`layer,
`Practical Implementation
`SMSuses the $87 signaling channel to transmit the
`data packet [5], thus allowing a text message to be
`reecived when the useris making a voice or data
`call. An active MS should be able to send and
`receive a short message Transport Protocol Data
`Unit (TPDU) at any time regardless of whether
`MTable 1. 7PDU types.
`there is a speech or data call in progress. A contir-
`
`sheetpeeggee
`
`GaiamGoreng aSE
`
`
`
`
`
`
`18
`
`IEEE Personal Cammunications * June 2000
`
`

`

`
`
`
`
`
`
`
`
`SMS-GMSC /
`SMS-IWMSC
`
`
`‘igure 6. Theprotocol layerfor SMSpoint-to-point.
`
`
`
`
`
`
`
`clement data (IED) that follows. Each of
`these fields is t octet long.
`Tn the user data, the message can be7bits,
`8 bits, or 16 bits. If 7-bit data is used and the
`header does not end on a 7-bit boundary,
`padding bits are used. This is to ensure that
`older mobiles which do not support the TP-UD
`header canstill display the message properly.
`Using the TEI allows sending and receiving
`of concatenated short messages. The IED field
`contains all the necessary information for the
`recciving cntity to reassemble the messages it
`the correct order, and is coded as follows:
`* First octet: short message references num-
`ber identifying the message within the same
`transaction
`* Second octet: specifics the maximum number of short mes-
`sages in the concatenated short message, which will not
`execed 255
`* Third octet: identifies the sequence numberof the short
`message within the concatenated message
`The minimum header length for concatenated message is 7
`octets for 8-bit and 16-bit data and 8 for 7-bit data; leaving 133
`(140 - 7), 152 (160 — 8), and 66 ((140 — 7)/2) characters for the
`short message. The maximum length of the message is then
`increased to 38,760 (255*152), 33,915 (255*133), or 16,830
`(255*66) depending on the character coding scheme used,
`
`TP-Validity-Period
`The TP-VP field contains an information element
`cnabling an MSto specify a validity period for the short
`message it is submitting. The value specifies how long an
`SMSC will guarantee the existence of a short message
`before delivery to the recipient has been carried out.
`TP-More-Message-To-Send
`
`’|TP-user-data-header-indicator TP-user-data-header-indicator
`
`‘The SMSC uses the TP-MMSfield to inform the MS that
`
`one or more shorl messages are waiting to be delivered.
`
`
`TP-message reference
`TP-User-Data-Header-Indtcator
`
`“he 1-bit TP-UDHIfield indicates whether the ‘(P-UD
`
`cludes an additional header as well as the short message.
`
`TP-message-type-indicator
`
`m
`
`TP-reject-duplicate
` TP-reply-path
`
`
`
`The SM-TL cxchanges PDUs withits peer entity. The
`«art message relay layer (SM-RL) conveys the PDUsvia the
`ort message link layer (SM-LL), Refer to GSM 03.40[2] for
`turther details.
`
`SMS Protocol Data Unit Types
`There are six types of TPDU at the SM-TL,as listed in Table
`1, The elements of the SMS-Deliver and SMS-Submit TPDU
`are shown in Fig. 7 [2]. The mainficlds of the TPDU are
`describedin this document however for a complete descrip-
`tion of the TPDU please refer ta GSM 03.40 J2].
`TP-Data-Coding-Scheme
`The data coding scheme field (TP-DCS) is usedto iden-
`tify the coding scheme used by the user data, which can
`be 7- or 8-bit or even Unicode [6], as defined in GSM
`03,38 [7].
`
`
`
`.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`:
`
`TP-message-type-indicator
`
`TP-more-message-to-send
`
`TP-reply-path
`
`TP-status-report
`
`TP-originating-address
`
`TP-protocol-|D
`
`TP-data-coding-scheme
`
`TP-service-center-time-stamp
`
`TP-user-data-length
`
`
`
`
`
`
`
`
`
`
`
`
`
`.
`
`TP-user-data
`
`" SMS<deliver
`
`
`
`TP-Protocol Identifier
`She TP-PID is used by the MS or SMSC to identify the
`higher-layer protocol being used for internetworking
`with a certain type of telematic device (Telefax group 3
`or 4, Ermes,ete.)
`TP-User-Data (TP-UD)
`The TP-UDficld is uscd to carry the short message. It
`can store up to 140 octets of data for point-to-point SMS,
`together with a header depending on the setting of the
`‘TP-UDHIfield, The amount of space taken by the header
`icduces the amountof data the PDU can carry. Figure &
`:fows a representation of the layout of the TP-UD for 7-
`ind 8-bit data schemes,
`The header has at least three ficlds. The first field,
`the information clement identifier, is used to identify
`‘oncatenated short messages. Information data length
`(IDL) is used to indicate the length of the information
`
`
`“EE Personal Communications * June 2000
`
`TP-destination-addressoeTP-data-coding-scheme
`
`TP-validity-period format
`
`
`
`
`
`
`
`|
`
`:
`
`
`
`
`
`SMS-submit =
`
`
`
`@Figure 7.An SMS TL-PDU.
`
`
`19
`
`

`

`
`
`
` Octets
`Octets
`
`Paypayeeeg ae
`
`
`Pre oee
`Poee tae
`‘ea caERD:
`
`
`
`Padding.” PEERSESM)yebit dataic:
`
`
`Septet boundary
`
`
`Total number of octets
`
`
`
` Total numberof septets
`
`
`
`Octet boundary
`
` : Total numberof octets
`
`
`2 Length Indicator ;
`
`
`:“lengthindicator
`
`
`
`a Figure 8, SMS-TPDUformatsfor 7.bit and 8-bit data content,
`
`also lead to the short message not being understood and
`being rejected. All the above-mentioned problems can lead to
`packets getting lost along the way with different conse-
`quences:
`* A negative acknowledgment received by the sender (phone
`displaying “message failed” or a similar message) although
`the short message reachesits destination (loss of packet (13)
`* Reception of duplicate short messages by user B (loss of
`packet (3) or2); could also be due to the timeout valuc
`being set too low in the SMSC
`* Or, in the worst case the message might not be delivered at
`all (loss of packet (12,3, 03, {93}
`Evenif Fig. 9 shows the most complicated routing scenario
`there is still much that can go wrong with short message rout-
`ing, and a lot of research is currently underway to overcome
`these.
`
`Short Message Routing Considerattons
`Tn Fig, 9, user A in network ©) is sending a short messageto
`user B in network () roaming in network “). User A is using
`the SMSC in network @)
`to submit his short message [8].
`The local cellular exchange routes the short message in an
`SCCP packet according to the SMSC global title as defined by
`the £.164 numbering plan [9]. The SCCP packet is forwarded
`from exchange to exchange until it reaches the destination
`SMSC(1). The routing has to be set up in all the SCCP switches
`along the route for the message to successfully reach the SMSC
`in network ©),
`Once the SCCPpacket carrying the message arrives at the
`destination SMSC, a confirmation message is sent back to the
`handset using another SCCP packet(2).
`To deliver the short message to user B, the SMSC hasto
`access the HLR database of his home network. A location
`request SCCP packet, based on user B’s mobile number, is
`Protocols for
`sent by the SMSC (3).
`Short Message Submission
`This international SCCP network then routes the location
`request SCCP packet to the appropriate HLR. Whenthe
`The European Telecommunications Standards Institute
`HLRreceives the request, it will return the location informa-
`(ETSI) specified a protocol for short message submission as
`tion in another SCCP packet to the SMSC (4).
`part of the overall GSM standard [10]. This specification
`The SMSC then sends the message to the VMSC of user
`defines three interface protocols for the transfer of SMS short
`B, based on the information reccived from the HLR (5).
`messages between an MS and terminal equipment (TE) via an -
`Finally, this VMSC interrogates the VLR (6, 7), and delivers
`asynchronous interface. The protocols clearly overlap in func-
`the message to user B (8), Upon successful delivery a confir-
`tions, and it is not clear why three have been defined.
`mation SCCP packet is sent back to the SMSC (9).
`Throughoutthese routing procedures, the SCCP packets
`Block Mode
`can get lost if one of the cellular exchanges along the route
`The block mode is a binary protocol which encapsulates the
`does not know where to forward the SCCP packet. SCCP
`SMS PDU used for short message transfer between an MS
`routing is based on the globaltitle used for switches and the
`and the SMSC defined in GSM 03.40 [2]. This protocol
`SMSC. The routing information has to be in place in the
`includes error detection and is suitable for use where the
`international SCCP transit switches for the messages to suc-
`link between the application and the phone is subject to
`cessfully reach their destination. Some international switches
`errors. It will be of particular use where control of remote
`only check the country code prefix (e.g., 44 for the United
`devices is required. The application has to construct a bina-
`Kingdom) and forward the packet to the next exchange, while
`ry string including a header and the short message PDU
`others also check for the network prefix (c.g., 447976 for
`(SMS-TPDU).
`Orange). If the exchange routing table does not include all
`the prefixes allocated to the subscribers, some messages will
`Once the application has requested the phone to cnter
`block mode a group of functionsis available:
`be rejected. Incompatible implementation of the SMSC can
`
`20
`
`IEEE Personal Communications * June 2000
`
`

`

`Recipient
`visited network.
`
`a
`
`
`
`
`
`Ss 3¢
`
`ate = User B
`Local
`vege BSC/BSC
`
`SCCP switch
`
`
`
`
`
`
`
`SCCP switch
`
`
`
`
`
`
`
`
`-
`
`A.
`
`Originator
`network -
`
`1
`
`
`
`seGd]ds
`
`Bsc/psc
`cea Nt
`a

`
`
`val
`
`_
`
`
`
`
`Foreign siasc
`
`
`
`network
`Recipient
`:
`,
`
`home network
`
`
`
`
`rae
`Fl INIee IN
`
`
`
`
`
`
`
` Lacal
`
` International
`"SMSC
`International
`‘Local
`SCCP switch
`SMS-IWMSC
`SCCP switch-
`SCCP switch
`
`
`a Figure «9. Internationalshort message routing.
`
`
`
`* Submit a short message
`* Delete messages from the phone
`* List messages in the phone
`* Transferall messages or one from the phone to the application
`* Set the phone so that the application is notified cvery time
`a new short message is received
`Each of these commands contains a number of predefined
`‘elements as described in the specification. For example, the
`Insert Message command format used to submit a short mes-
`sage is depicted in Table 2.
`
`Text Mode
`Text mode is a character-based protocol based on the AT
`command set modified for GSM. This mode is suitable for
`unintelligent terminals or terminal emulators, and for applica-
`tion software built on command structures like those defined
`in ITU V25ter. The application passes the message in plain
`text to the phone that constructs the TPDU (Table 3), This
`meansthat text mode offers a lot less functionality than block
`
`SCEesti
`
`eeee
`
`ot PDU mode. The text mode docs not support or automati-
`cally pass incoming messages to the application (only notily it).
`
`PDU Mode
`PDU mode is very similar to text mode, except that it leaves to
`the application the responsibility to build the short message
`TPDU. This mode adds to the convenience of the AT command
`set the possibility to construct more sophisticated PDUs (i.e.,
`allowing binary data to be transmitted, not just characters).
`
`SEMA SMS2000
`Sema Group Telecoms developed SMS2000 as an implemen-
`tation of a GSM SMSC [11]. The specification mainly
`describes the delivery of short messages to MSs, but also spec-
`ifies the protocols for short message submission, The protocol
`has been designedto oneaateovera variety of interfaces such
`as X25, DECnet, and S87, The SMS2000 SMSC is usually
`accessed via the gencral X25 access gateway -cither using a
`radio Packet Assembler Disassembler (PAD) or a dedicated
`link to the message center.
`Once connected to the SMSC, an SME can
`request any of the operations listed in Table 4. The
`§MS$2000 SMSC canalso send the commandslisted
`in Table 5 to an SME.
`
`
`
`
`
`
`
`
`
`
`SME
`|
`" SMSC
`
`Submit SM
`
`
`
`SM submission status
`
`
`SM delivery status report
`
`<-$_—————
`"Invoke {submit SM)
`
`
`
`
`
`B Figure10. Shortmessage submission using
`SMS2000.
`B Table 3. Short message submission using text mode,
`
`
`TEEE Personal Communications * June 2000
`
`21
`
`

`

`
`
`A transaction between the SME and the SMSC involves
`one party sending a request with a status report sent back on
`completion or failure of the request. Figure 10 depicts the
`submission of a short message from an SME to the SMS2000
`SMSC.
`The transaction is initiated by the SME when a Submit SM
`invoke is sent to the SMSC. The SMSC responds with a result
`message indicating that the short message has been accepted
`andis being processed. Upondelivery the SMSC notifies the
`SME (if a status report has been requested). The SME then
`acknowledges the SR, thus completing the transaction.
`Since the SMEs connected to the SMS2000 SMSC are
`assumed to be trusted systems, a basic transaction will not
`include any exchange of login and password between the SME
`and the SMSC. Howevera login facility is still provided in
`order to access the SMSC from a different location (i.c., PAD).
`
`Text-Based Protocals
`
`Usually these protocols are proprictary and developed as an
`interface to the SMSC ofa digital ccllular network operator.
`The advantage of a text-based protocol is that the user does
`not need any special clicnt software to submit a short mes-
`sage; they can dial the appropriate message center using any
`terminal emulation software and submit short messages
`using the different options offered. Figure 11 describes the
`submission of a short message using the Telenote-text based
`protocol.
`There are, however, kcy disadvantages with text-based pro-
`tocols: they offerlimited support for extended charactersets,
`and only work one way, to name a few. The user is only able
`to send messages andreceive confirmation of submission. The
`SMSC is unable to notify the end user of successful delivery.
`
`
`
`
`
`
`
`
`
`MW Figure 11. Short message submission using Telenote.
`
`Telocator Alphanumeric Protocol
`
`Developed by Telecom Securicor Cellular Radio Limited, the
`Telocator Alphanumeric Protocol [12] provides greater flexi-
`bility ind more features than text-based protocols. The overall
`performance is also significantly more efficient.
`In its fully featured implementation, the protocol allows
`the user to perform the following operations:
`1. Submit a short message and receive confirmation of accep-
`tance,
`2. Submit a short message and receive status of the first deliv-
`ery attempt.
`3, Query the current status of a message submitted by 1 or 2.
`4, Delete a message submitted by 1 or 2.
`5, Replace a message submitted by 1 or 2, unless the message
`has already been delivered to the mobile.
`6, Update a message submitted by 1 or 2. If the message is
`still in the SMSC.it is replaced; otherwise, a new message
`is sent to the mobile,
`TAP is a session-based protocol, as opposed
`to a permanently connected one, Each session
`comprises a logon, a numberof transactions, and
`a logoff, as shown on Fig, 12,
`Other Submission Protocols
`Many others protocols have been designed and
`operate over a wide range of hardware interfaces
`(UCP, CIMD, SMPP,etc.). Most of the protocols
`ean be classified as dumb or smart based on
`whether they provide notification of delivery
`and/or advanced functionality (message deletion,
`replacement, ctc.}, We chase to discuss the pro-
`
`
`in the United Kingdom. As growing numbers of

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket