Skip to main content

CALL DELIVERY PROCESS

CALL DELIVERY
Call Delivery occurs when someone calls to a cellular phone. This example assumes that the person is roaming in a system away from their home system. The general steps for this process are:
1. Someone dials the phone number of the cellular phone.
2. The call is routed to the subscriber's home switch. The home switch sends a query to the Home Location Register (HLR) to determine the location of the phone. The HLR recorded the location of the phone when the phone registered in the visited system.
3. The HLR sends a data message across the signaling network to the visited system requesting a temporary local directory number (TLDN) for routing the call.
4. The visited switch returns a data message with a TLDN to the HLR. The HLR sends the TLDN to the home switch for routing across the public telephony network.
5. When the visited switch receives a call to that TLDN, it associates it to the phone, sends out a regular cellular page and delivers the call to the phone.
The TLDN is a regular telephone number that is routable through the public network. The visited switch usually assigns TLDNs on a per-call basis, when it receives the routing request from the home system. The visited switch uses a timer to determine how long it keeps the TLDN associated with that subscriber. The timer lasts long enough for the home switch to route a call to that number across the public network. 

Popular posts from this blog

Hide Drives for security & Privacy

Hide Drives for security & Privacy   My dear friends....!!! I am YASH  , and I again back for improving your computer skill. Today i am going to telling one more interesting tip that is "HIDE DRIVES FOR SECURITY AND PRIVACY", This is a great trick you can play on your friends to disable the display of local or networked drives when you click My Computer. 1.Go to start->run.Type regedit. Now go to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Now in the right pane Create a new DWORD item and name it NoDrives (it is case sensitive). Now modify it's value and set it to 3FFFFFF (Hexadecimal) . Now restart your computer. So, now when you click on My Computer, no drives will be shown (all gone...). To enable display of drives in My Computer, simply delete this DWORD item that you created. Again restart your computer. You can now see all the drives again. If you have any oth...

TOP 100 Useful Android Apps of 2013

TOP 100 Useful Android Apps of 2013 POWERED BY DRACULA04 (YASH)   With your new Android device in hand, you're ready to take on the mobile world. But with over 700,000 apps to choose from, finding which will work best for you can be a daunting task. That's why we've selected what we think are the best 100 and presented them here, for your perusal. Careful readers will notice that this all looks quite familiar. That's because we've been pruning and updating this list for over a year, trying to make sure it has a little something for everyone. While our tastes and yours may be different, we think our list is a good starting point. We do our best to keep it fresh and interesting enough that even the most experienced Android user will be able to find something worthwhile. POWERED BY DRACULA04 (YASH) Utilities       AppGarden Lite Free The interface looks dated, but AppGarden Lite is a lightweight, backwards-compatible container with doz...

How To check | Stop | Secure that Your Computer Hacked or Not

How To check | Stop | Secure that Your Computer Hacked or Not   The Computer hackers can the cause serious damage to most of computer and may be your personal information.  Hacking can mean the number of things but the computer hacking is a basically when someone accesses into your computer or may be its resources. Without your permission and then initially may be without your knowledge. Computers can be the hacked without leaving any evidence behind that. As the home user and you can always find out that if you have been hacked by the black hat hackers because the black hat hacker either wants keep using your personal computer resources or may be want to harm the computer. As the black hat can try to access your computer. So as I am security Researcher it’s my duty to stop the black hat hacker from the unethical work and also inform to the people about the all activity of those person. So here is simple trick that how you can check your computer that may hacked...