SlideShare uma empresa Scribd logo
1 de 18
   Whole service area is divided into several coverage areas known as a “cell”. Each
    area has a separate base station(BS).
   Every BS is provided with a frequency of range 450 to 900 MHz.
   The MTSO controls the BSs so that the subscriber can continue his call without
    interruption.
   Tracking the location within the boundary of a cell in a telecommunication network is
    known as “location based services”.
   Mobile Technology includes mainly two functions namely call fixing and hands off
    process.
   Call fixing is process of connecting a call.
   Hands off is changing the BS frequency of the user.
Emergency     service for subscriber safety.  
Location sensitive billing.

Cellular Fraud detection.

Intelligent transport system services.

Efficient and effective network performance

and management.
1. GLOBAL POSITIONING SYSTEM (GPS)


2. DIRECTION BASED GEOLOCATION
2.1 ANGLE OF ARRIVAL METHOD


3. DISTANCE BASED POSITIONING
3.1 TIME OF ARRIVAL(TOA)
3.2 TIME DIFFERENCE OF ARRIVAL(TDOA)


4. LOCATION TRACKING CURVE METHOD
   To locate the mobile telephone by
    itself, the mobile telephone is provided
    with a GPS receiver to calculate its
    location.
   There should be an unobstructed line
    of sight to four or more GPS satellites.
   GPS satellites broadcast signals from
    space, which each GPS receiver uses
    to calculate its three-dimensional
    location (latitude, longitude, and
    altitude) plus the current time
   GPS receivers are used in mobile
    phones, vehicles, marine navigation
    devices and military applications.
   This method calculates the angle of
    arrival of signal receiving at the BS.
   When a mobile user switches the system
    ON it receives the signal from different
    base stations, may be 3 or 4 or more.
    The angle of arrival method requires two
    or more base station for the
    determination.
    It measures the direction of signal falling
    on the base station and measures the
    angle of incidence with respect to a
    normal and determines the position of
    the system.
   Angle of arrival method is not an
    accurate method used for the mobile
    positioning because of its some
    disadvantages such as atmospheric
    particles, scattering etc.
    The TOA method calculates the distance
     of a mobile telephone and a BS based
     on the TOA of a signal transmitted from
     the mobile telephone at the BS.
     It is assumed that the mobile telephone
     is located at the intersection point of
     three circles having the radius of the
     distances between the BSs and the
     mobile telephone.
 The          distance is calculated by the
     following equation,
Ri = C τi = sqrt ( (xi – X ) 2 + (yi – Y) 2 ) where,
C – Propagation speed of electromagnetic
     wave,
τi – propagation of time from the mobile
     telephone to ith base station,
Xi, yi -- location of ith base station,
X, Y – mobile position
    The time-difference-of-arrival (TDOA)
    assumes that the TDOAs of a signal
    transmitted from the mobile telephone
    at the three BSs define a set of points
    on a hyperbola.
   The mobile telephone is located at the
    intersection point of at least three
    hyperbolas.
   Three hyperbolas do not meet at one
    point but overlap each other over an
    area.
   The location data processor draws two circles C1 and C2 with their
    respective centers set at BSs T1 and T2 based on the TOAs of a signal
    transmitted from the corresponding mobile telephone M1 or M2 to the two
    BSs T1 and T2 located near the mobile telephone M1 or M2. The two circles
    C1 and C2 define a common chord L1.
   Therefore, we use location tracking curves TR1 and TR2 connecting the
    same two intersection points P1 and P2 of the two circles C1 and C2, instead
    of the common chord L1.
   The two curves TR1 and TR2 have their middle points intersecting the line
    ST, which connects the positions of the two BSs T1 and T2 and the parts of
    two circles C1 and C2 drawn to connect the two intersection points P1 and
    P2.
   This method prevents the location error caused by the multi-path fading or
    the NLOS path characteristics.
   Assuming that the first and the second BSs
    T1 and T2 selected for use in the location
    tracking are present at positions (x1, y1)
    and (x2, y2), respectively, the location data
    processor draws the two circles C1 and C2
    with the coordinates (x1, y1) and (x2, y2) of
    the two BSs T1 and T2 at their centers
   The curve connects the two points P1 and
    P2 at which the two circles C1 and C2
    intersect each other. The coordinates of the
    intersection points P1 and P2 are (xA, yA)
    and (xB, yB), respectively.
   Reference circles TR1 to TR4 are drawn
    with respect to the second BS T2 with
    smaller variances
   The variances of the TOAs of a signal which arrives at the two BSs T1 and T2 from
    different paths are used to find the curve on which the actual location of the mobile
    telephone is determined.
   The location data processor compares the variances calculated by the first BS T1 with
    the variances calculated by the second BS T2 and considers that the mobile telephone
    is near to that BS with the larger variances and selects the BS with smaller variances as
    a reference point to draw the reference circle.
    The location data processor compares the variances calculated by the two BSs T1 and
    T2 and selects the base station with smaller variances as a reference point to draw the
    refer
   If the selected variances (those of the second BS T2) are σ, the location data processor
    compares the selected variances σ, with the preset reference variances σ 1, σ 2, and σ
    3.
   The location data processor selects the optimal curve (reference circle) for the two BSs
    among the several BSs, and selects another optimal circle for another BS pair, and so
    on.
   When curves are selected for all selected
    BS pairs, the location data processor
    obtains the intersection points among the
    selected curves.
   As the selected curves do not intersect at
    one point due to the multi-path fading or the
    NLOS effects, the midpoint of these
    intersection points is determined as the
    location of the mobile telephone.
   The location data processor represents    the
    intersection points in the latitude and   the
    longitude coordinates and transmits       the
    position coordinates to the network and   the
    mobile telephone.
   Our proposal is advantageous in that the location of a mobile telephone can be
    accurately tracked even in the multi-path fading and the NLOS environment, by
    using more accurate tracking curves connecting the intersection points among
    circles.
   We have described about accurate positioning of mobile telephones, which can
    be used for several applications.
    The important considerations to be undertaken while selecting a location based
    technology are location accuracy, implementation cost, reliability, increasing
    functionality.
1.http://www.seminarprojects.net/t-trackin...tion--5263
2.http://www.seminarprojects.net/t-mobile-...ositioning
3.http://www.seminarprojects.net/t-trackin...n-networks
4.http://www.seminarprojects.net/t-trackin...tion--1863

Mais conteúdo relacionado

Mais procurados

Location Based services
Location Based servicesLocation Based services
Location Based servicesFraj Alshahibi
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Hamidreza Bolhasani
 
Node localization
Node localizationNode localization
Node localizationad-hocnet
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Traking And positioning of mobile in telecomunication network
Traking And positioning of mobile in telecomunication networkTraking And positioning of mobile in telecomunication network
Traking And positioning of mobile in telecomunication networkKrishna Ghanva
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksHabibur Rahman
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIRamesh Babu
 
Simplified Call Flow Signaling: 2G/3G Voice Call
Simplified Call Flow Signaling: 2G/3G Voice CallSimplified Call Flow Signaling: 2G/3G Voice Call
Simplified Call Flow Signaling: 2G/3G Voice Call3G4G
 
Introduction to Location-Based Service (LBS)
Introduction to Location-Based Service (LBS)Introduction to Location-Based Service (LBS)
Introduction to Location-Based Service (LBS)Yi-Hsueh Tsai
 
Overview Of Gsm Cellular Network & Operations
Overview Of Gsm Cellular Network & OperationsOverview Of Gsm Cellular Network & Operations
Overview Of Gsm Cellular Network & OperationsDeepak Sharma
 

Mais procurados (20)

Location Based services
Location Based servicesLocation Based services
Location Based services
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)
 
Node localization
Node localizationNode localization
Node localization
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Paging and Location Update
Paging and Location UpdatePaging and Location Update
Paging and Location Update
 
Traking And positioning of mobile in telecomunication network
Traking And positioning of mobile in telecomunication networkTraking And positioning of mobile in telecomunication network
Traking And positioning of mobile in telecomunication network
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networks
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO III
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Simplified Call Flow Signaling: 2G/3G Voice Call
Simplified Call Flow Signaling: 2G/3G Voice CallSimplified Call Flow Signaling: 2G/3G Voice Call
Simplified Call Flow Signaling: 2G/3G Voice Call
 
Introduction to Location-Based Service (LBS)
Introduction to Location-Based Service (LBS)Introduction to Location-Based Service (LBS)
Introduction to Location-Based Service (LBS)
 
Location based services
Location based servicesLocation based services
Location based services
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
CELLULAR MOBILE RADIO SYSTEMS
CELLULAR MOBILE RADIO SYSTEMSCELLULAR MOBILE RADIO SYSTEMS
CELLULAR MOBILE RADIO SYSTEMS
 
Call flow
Call flowCall flow
Call flow
 
Wireless Wide Area Network-Cellular Telephone and Satellite Networks
Wireless Wide Area Network-Cellular Telephone and Satellite NetworksWireless Wide Area Network-Cellular Telephone and Satellite Networks
Wireless Wide Area Network-Cellular Telephone and Satellite Networks
 
Overview Of Gsm Cellular Network & Operations
Overview Of Gsm Cellular Network & OperationsOverview Of Gsm Cellular Network & Operations
Overview Of Gsm Cellular Network & Operations
 
Unit 3
Unit 3Unit 3
Unit 3
 

Destaque

Tracking and-positioning-of-mobile-systems-in-telecommunication-networks
Tracking and-positioning-of-mobile-systems-in-telecommunication-networksTracking and-positioning-of-mobile-systems-in-telecommunication-networks
Tracking and-positioning-of-mobile-systems-in-telecommunication-networksAmal Mohan
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksrahul_2013
 
Mobiilne positsioneerimine (Mobile Positioning)
Mobiilne positsioneerimine (Mobile Positioning)Mobiilne positsioneerimine (Mobile Positioning)
Mobiilne positsioneerimine (Mobile Positioning)Aare Puussaar
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksgo2project
 
Presentation1
Presentation1Presentation1
Presentation1yopirates
 
Ppt local tracking and gps
Ppt local tracking and gpsPpt local tracking and gps
Ppt local tracking and gpsmassab
 
Gps tracking system
Gps tracking system Gps tracking system
Gps tracking system Sumit Kumar
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Retail Voice Portal
Retail Voice PortalRetail Voice Portal
Retail Voice PortalSeanHart1766
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentationAlexandru Dorobantu
 
Tracking positioning-of-mobiles
Tracking positioning-of-mobilesTracking positioning-of-mobiles
Tracking positioning-of-mobilesAnkur Kumar
 
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...ijsrd.com
 
Cell Phone Operated Land Rover
Cell Phone Operated Land RoverCell Phone Operated Land Rover
Cell Phone Operated Land RoverSayanton Vhaduri
 
INTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSOR
INTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSORINTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSOR
INTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSORNikhil Musham
 
Voice Browser
Voice BrowserVoice Browser
Voice BrowserSaila Sri
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarRitik Nagar
 
Vehicle Theft control system
Vehicle Theft control systemVehicle Theft control system
Vehicle Theft control systemAnkush Jamthikar
 
Cell phone operated robot
Cell phone operated robotCell phone operated robot
Cell phone operated robotAbhishek Rawat
 

Destaque (20)

Tracking and-positioning-of-mobile-systems-in-telecommunication-networks
Tracking and-positioning-of-mobile-systems-in-telecommunication-networksTracking and-positioning-of-mobile-systems-in-telecommunication-networks
Tracking and-positioning-of-mobile-systems-in-telecommunication-networks
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networks
 
Mobiilne positsioneerimine (Mobile Positioning)
Mobiilne positsioneerimine (Mobile Positioning)Mobiilne positsioneerimine (Mobile Positioning)
Mobiilne positsioneerimine (Mobile Positioning)
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networks
 
Presentation1
Presentation1Presentation1
Presentation1
 
Ppt local tracking and gps
Ppt local tracking and gpsPpt local tracking and gps
Ppt local tracking and gps
 
Gps tracking system
Gps tracking system Gps tracking system
Gps tracking system
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Retail Voice Portal
Retail Voice PortalRetail Voice Portal
Retail Voice Portal
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Tracking positioning-of-mobiles
Tracking positioning-of-mobilesTracking positioning-of-mobiles
Tracking positioning-of-mobiles
 
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
 
Cell Phone Operated Land Rover
Cell Phone Operated Land RoverCell Phone Operated Land Rover
Cell Phone Operated Land Rover
 
INTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSOR
INTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSORINTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSOR
INTEL’S MMX TECHNOLOGY FOR ENHANCED PROCESSOR
 
Voice Browser
Voice BrowserVoice Browser
Voice Browser
 
Mobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik NagarMobile Phone Cloning By: Ritik Nagar
Mobile Phone Cloning By: Ritik Nagar
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Vehicle Theft control system
Vehicle Theft control systemVehicle Theft control system
Vehicle Theft control system
 
Cell phone operated robot
Cell phone operated robotCell phone operated robot
Cell phone operated robot
 

Semelhante a Tracking and positioning of mobile systems in telecommunication networks

Tracking and positioning_of_mobile_systems_in_telecom_network
Tracking and positioning_of_mobile_systems_in_telecom_networkTracking and positioning_of_mobile_systems_in_telecom_network
Tracking and positioning_of_mobile_systems_in_telecom_networkAnkur Kumar
 
Tracking and positioning_of_mobile_systems_in_telecom_network_2
Tracking and positioning_of_mobile_systems_in_telecom_network_2Tracking and positioning_of_mobile_systems_in_telecom_network_2
Tracking and positioning_of_mobile_systems_in_telecom_network_2HITESH Kumawat
 
Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01
Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01
Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01prasanna naik
 
Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...
Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...
Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...prasanna naik
 
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMSHYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMSijasuc
 
Mobile positioning for location dependent services in GSM networks
Mobile positioning for location dependent services in GSM networks Mobile positioning for location dependent services in GSM networks
Mobile positioning for location dependent services in GSM networks marwaeng
 
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMSHYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMSijasuc
 
Indoor geolocation
Indoor geolocationIndoor geolocation
Indoor geolocationharisri269
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2gamalsallam1989
 
Hybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_ServicesHybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_ServicesNavid Solhjoo
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Dr. Amarjeet Singh
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-healthVakhtang Mosidze
 
IRJET- Positioning of Underwater Vehicle using Acoustic Signal
IRJET- Positioning of Underwater Vehicle using Acoustic SignalIRJET- Positioning of Underwater Vehicle using Acoustic Signal
IRJET- Positioning of Underwater Vehicle using Acoustic SignalIRJET Journal
 
Bistatic radar equation
Bistatic radar equationBistatic radar equation
Bistatic radar equationRima Assaf
 
Tracking and positioning of mobile in telecommunications.
Tracking and positioning of mobile in telecommunications.Tracking and positioning of mobile in telecommunications.
Tracking and positioning of mobile in telecommunications.Sanket Pawar
 
Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...slinpublishers
 

Semelhante a Tracking and positioning of mobile systems in telecommunication networks (20)

Tracking and positioning_of_mobile_systems_in_telecom_network
Tracking and positioning_of_mobile_systems_in_telecom_networkTracking and positioning_of_mobile_systems_in_telecom_network
Tracking and positioning_of_mobile_systems_in_telecom_network
 
Tracking and positioning_of_mobile_systems_in_telecom_network_2
Tracking and positioning_of_mobile_systems_in_telecom_network_2Tracking and positioning_of_mobile_systems_in_telecom_network_2
Tracking and positioning_of_mobile_systems_in_telecom_network_2
 
Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01
Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01
Trackingandpositioningofmobilesystemsintelecomnetwork2 120827235434-phpapp01
 
Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...
Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...
Final reportTracking And Positioning Of Mobile System In Telecommunication Ne...
 
Coordinate Location Fingerprint Based On WiFi Service
Coordinate Location Fingerprint Based On  WiFi ServiceCoordinate Location Fingerprint Based On  WiFi Service
Coordinate Location Fingerprint Based On WiFi Service
 
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMSHYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
 
Mobile positioning for location dependent services in GSM networks
Mobile positioning for location dependent services in GSM networks Mobile positioning for location dependent services in GSM networks
Mobile positioning for location dependent services in GSM networks
 
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMSHYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
HYBRID TOA/AOA SCHEMES FOR MOBILE LOCATION IN CELLULAR COMMUNICATION SYSTEMS
 
Indoor geolocation
Indoor geolocationIndoor geolocation
Indoor geolocation
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2
 
Hybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_ServicesHybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_Services
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...
 
5G positioning technology
5G positioning technology5G positioning technology
5G positioning technology
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health
 
[IJET-V1I3P14] Authors :Kruthika R.
[IJET-V1I3P14] Authors :Kruthika R.[IJET-V1I3P14] Authors :Kruthika R.
[IJET-V1I3P14] Authors :Kruthika R.
 
IRJET- Positioning of Underwater Vehicle using Acoustic Signal
IRJET- Positioning of Underwater Vehicle using Acoustic SignalIRJET- Positioning of Underwater Vehicle using Acoustic Signal
IRJET- Positioning of Underwater Vehicle using Acoustic Signal
 
Lps
LpsLps
Lps
 
Bistatic radar equation
Bistatic radar equationBistatic radar equation
Bistatic radar equation
 
Tracking and positioning of mobile in telecommunications.
Tracking and positioning of mobile in telecommunications.Tracking and positioning of mobile in telecommunications.
Tracking and positioning of mobile in telecommunications.
 
Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...Comparitive analysis of bit error rates of multiple input multiple output tra...
Comparitive analysis of bit error rates of multiple input multiple output tra...
 

Mais de PRADEEP Cheekatla (20)

Sachin...sachin
Sachin...sachinSachin...sachin
Sachin...sachin
 
White led
White ledWhite led
White led
 
The bio chips
The bio chipsThe bio chips
The bio chips
 
Tablet pc
Tablet pcTablet pc
Tablet pc
 
Super speed usb3.0
Super speed usb3.0Super speed usb3.0
Super speed usb3.0
 
Spect technology
Spect technologySpect technology
Spect technology
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Skinput
SkinputSkinput
Skinput
 
Rf controlled fire fighting robot
Rf controlled fire fighting robotRf controlled fire fighting robot
Rf controlled fire fighting robot
 
Remote accident report system for highways using rf
Remote accident report system for highways using rfRemote accident report system for highways using rf
Remote accident report system for highways using rf
 
Paper battery
Paper batteryPaper battery
Paper battery
 
Night vision technology
Night vision technologyNight vision technology
Night vision technology
 
Magnetic levitation trai ns
Magnetic  levitation  trai nsMagnetic  levitation  trai ns
Magnetic levitation trai ns
 
Image compression using singular value decomposition
Image compression using singular value decompositionImage compression using singular value decomposition
Image compression using singular value decomposition
 
Haptics touch the virtual
Haptics touch the virtualHaptics touch the virtual
Haptics touch the virtual
 
Crusoe processor
Crusoe    processorCrusoe    processor
Crusoe processor
 
Audio spotlighting
Audio spotlightingAudio spotlighting
Audio spotlighting
 
3 d integrated circuits
3 d integrated circuits3 d integrated circuits
3 d integrated circuits
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
E newspaper
E newspaperE newspaper
E newspaper
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Tracking and positioning of mobile systems in telecommunication networks

  • 1.
  • 2. Whole service area is divided into several coverage areas known as a “cell”. Each area has a separate base station(BS).  Every BS is provided with a frequency of range 450 to 900 MHz.  The MTSO controls the BSs so that the subscriber can continue his call without interruption.  Tracking the location within the boundary of a cell in a telecommunication network is known as “location based services”.  Mobile Technology includes mainly two functions namely call fixing and hands off process.  Call fixing is process of connecting a call.  Hands off is changing the BS frequency of the user.
  • 3. Emergency service for subscriber safety.   Location sensitive billing. Cellular Fraud detection. Intelligent transport system services. Efficient and effective network performance and management.
  • 4. 1. GLOBAL POSITIONING SYSTEM (GPS) 2. DIRECTION BASED GEOLOCATION 2.1 ANGLE OF ARRIVAL METHOD 3. DISTANCE BASED POSITIONING 3.1 TIME OF ARRIVAL(TOA) 3.2 TIME DIFFERENCE OF ARRIVAL(TDOA) 4. LOCATION TRACKING CURVE METHOD
  • 5. To locate the mobile telephone by itself, the mobile telephone is provided with a GPS receiver to calculate its location.  There should be an unobstructed line of sight to four or more GPS satellites.  GPS satellites broadcast signals from space, which each GPS receiver uses to calculate its three-dimensional location (latitude, longitude, and altitude) plus the current time  GPS receivers are used in mobile phones, vehicles, marine navigation devices and military applications.
  • 6.
  • 7. This method calculates the angle of arrival of signal receiving at the BS.  When a mobile user switches the system ON it receives the signal from different base stations, may be 3 or 4 or more. The angle of arrival method requires two or more base station for the determination.  It measures the direction of signal falling on the base station and measures the angle of incidence with respect to a normal and determines the position of the system.  Angle of arrival method is not an accurate method used for the mobile positioning because of its some disadvantages such as atmospheric particles, scattering etc.
  • 8. The TOA method calculates the distance of a mobile telephone and a BS based on the TOA of a signal transmitted from the mobile telephone at the BS.  It is assumed that the mobile telephone is located at the intersection point of three circles having the radius of the distances between the BSs and the mobile telephone.  The distance is calculated by the following equation, Ri = C τi = sqrt ( (xi – X ) 2 + (yi – Y) 2 ) where, C – Propagation speed of electromagnetic wave, τi – propagation of time from the mobile telephone to ith base station, Xi, yi -- location of ith base station, X, Y – mobile position
  • 9. The time-difference-of-arrival (TDOA) assumes that the TDOAs of a signal transmitted from the mobile telephone at the three BSs define a set of points on a hyperbola.  The mobile telephone is located at the intersection point of at least three hyperbolas.  Three hyperbolas do not meet at one point but overlap each other over an area.
  • 10.
  • 11. The location data processor draws two circles C1 and C2 with their respective centers set at BSs T1 and T2 based on the TOAs of a signal transmitted from the corresponding mobile telephone M1 or M2 to the two BSs T1 and T2 located near the mobile telephone M1 or M2. The two circles C1 and C2 define a common chord L1.  Therefore, we use location tracking curves TR1 and TR2 connecting the same two intersection points P1 and P2 of the two circles C1 and C2, instead of the common chord L1.  The two curves TR1 and TR2 have their middle points intersecting the line ST, which connects the positions of the two BSs T1 and T2 and the parts of two circles C1 and C2 drawn to connect the two intersection points P1 and P2.  This method prevents the location error caused by the multi-path fading or the NLOS path characteristics.
  • 12. Assuming that the first and the second BSs T1 and T2 selected for use in the location tracking are present at positions (x1, y1) and (x2, y2), respectively, the location data processor draws the two circles C1 and C2 with the coordinates (x1, y1) and (x2, y2) of the two BSs T1 and T2 at their centers  The curve connects the two points P1 and P2 at which the two circles C1 and C2 intersect each other. The coordinates of the intersection points P1 and P2 are (xA, yA) and (xB, yB), respectively.  Reference circles TR1 to TR4 are drawn with respect to the second BS T2 with smaller variances
  • 13. The variances of the TOAs of a signal which arrives at the two BSs T1 and T2 from different paths are used to find the curve on which the actual location of the mobile telephone is determined.  The location data processor compares the variances calculated by the first BS T1 with the variances calculated by the second BS T2 and considers that the mobile telephone is near to that BS with the larger variances and selects the BS with smaller variances as a reference point to draw the reference circle.  The location data processor compares the variances calculated by the two BSs T1 and T2 and selects the base station with smaller variances as a reference point to draw the refer  If the selected variances (those of the second BS T2) are σ, the location data processor compares the selected variances σ, with the preset reference variances σ 1, σ 2, and σ 3.  The location data processor selects the optimal curve (reference circle) for the two BSs among the several BSs, and selects another optimal circle for another BS pair, and so on.
  • 14. When curves are selected for all selected BS pairs, the location data processor obtains the intersection points among the selected curves.  As the selected curves do not intersect at one point due to the multi-path fading or the NLOS effects, the midpoint of these intersection points is determined as the location of the mobile telephone.  The location data processor represents the intersection points in the latitude and the longitude coordinates and transmits the position coordinates to the network and the mobile telephone.
  • 15. Our proposal is advantageous in that the location of a mobile telephone can be accurately tracked even in the multi-path fading and the NLOS environment, by using more accurate tracking curves connecting the intersection points among circles.  We have described about accurate positioning of mobile telephones, which can be used for several applications.  The important considerations to be undertaken while selecting a location based technology are location accuracy, implementation cost, reliability, increasing functionality.
  • 16.
  • 17.