[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now


Mobile Phone "Handshake" information

Posted on 2010-09-07
Medium Priority
Last Modified: 2013-12-09

I'm looking for information on the mobile phone handshake. I.e, when a phone is near a radio or other speaker / amplifier setup, you occasionally hear a series of pulses as the devices "checks in" with local masts.

Does anyone have any more detailed information on this? What data is being transmitted, how often is it?, details of the protocol, or anything where I can find out more information about it would be great.

Question by:i-CONICA
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2

Expert Comment

ID: 33651224
The question is very general, and there is no concise answer to it.
There are various mobile phone communication technologies out there.
GSM, UMTS, LTE,CDMA and so on...

For the GSM and UMTS etc you can find specifications here --> http://3gpp.org/specification-numbering 
Sorry, couldn't be of much help. If you have specific questions, please follow up.

Author Comment

ID: 33657355
Thanks for the response. The sound seems to be the same  and quite universal. A dash then two beeps repeated fast. Regardless of the protocol I'm wanting information about this handshake its doing with the masts.

LVL 20

Accepted Solution

Michel Sakr earned 2000 total points
ID: 33682276
Usually it is standard..A wireless/mobile device does location updates on a permanent basis in the background:
- A Cell handover, which is migrating from a cell to another cell within the network;  the Cell towers/mast you see are Base transmitting stations (BTS), where each 2 or more such towers cover an area called a cell (usually 3 BTSs).. whenever you start moving out of a cell coverage area and the signal attenuates, your device tries to detect the strongest signal of a BTS, if it is from another Cell Area (CellID) then it requests to attach to that cell and a handover occures with a location update. what we hear near a micro is usually those frequent signal checks..
- A location update every while, the device does a location update everywhile also to confirm to the core network that it is alive, otherwise it will be purged from the VLR and won't be able to receive mobile terminating traffic.

The above are simple examples... in General it is more complex.. you can check further wikipedia that has lots of links and pointers, the 3gpp link above and the GSM assosiation materials.


LVL 20

Expert Comment

by:Michel Sakr
ID: 33682289
As for the protocols used, those are vendor specific, however the mostly the CellID is passed, the device IMEI and the sim card IMSI in a GSM standard... as much as the device timestamp

Author Closing Comment

ID: 33683244
That's exactly the information I wanted. Thank you.

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Once again I push the limits of my phone.  An introduction to the Android Google Now Launcher.
Adults who share images on social media aren’t the only ones who need to worry about their privacy. Our culture’s tendency to share every move and celebration affects the privacy of our children, too.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question