Free Essay

Call Processing

In: Business and Management

Submitted By sandeep123
Words 2942
Pages 12
Call Processing , SMS and VMS

In this we discuss the call processing aspect and look into specifics case of a mobile originated (MO) call and a mobile terminated (MT) call. We also look into short message (SMS) and voice mail service (VMS) as implemented IMPCS pilot project.

RF channel overview: - RF channel play important role in call processing case. These are basically three types of RF control channel.

1. Broadcast control channel : The broadcast channels are points to multi-point channel, which are defined only for down-link direction (BTS to mobile station). They are divided into:

BCCH (Broad cast control channel:- BCCH acts as a beacon. It informs the mobile about system configuration parameters (e.g. LAI, CELLIDENTY, NEIGHBOURING all identify). Using this information MS choose the best cell to attach to.

BCCH is always transmitted on full power and it is never frequency hopped.

FCCHC frequency correction channel. MS must tune to FCCH to listen to BCCH. FCCH transmits a constant frequency shift of the radio carrier that is used by the MS for frequency correction.

SCH (synchronization channel). . SCH is used to synchronize the MS in time .SCH carries TDMA frame number and BSIC (Base Station Identity Code)

2. Common control channels : Common control channels are specified as point to multi-point, which operate only in one direction either in up-link or down-link direction.

PCH (Paging Channel): - PCH is used in down-link direction for sending paging message to MS whenever there is incoming call.

RACH (Random Access Channel ) :-RACH is used by the MS to request allocation of a specific dedicated control channel (SDCCH) either in response to a paging message or for call origination /registration from the MS. this is an up-link channel and operate in point to point mode.

AGCH (Access Grant Channel ):- AGCH is a logical control channel which is used to allocated a specific dedicated control channel (SDCCH) to MS when MS request for a channel over RACH. AGCH is used in downlink direction.

3.Dedicated Control Channel : dedicated control channel are full duplex, point to point channel. They are used for signalling between the BTS and certain MS. They are divided into: -

(I). SACCH (Slow Associated Control Channel): the SACCH is a duplex channel, which is always allocated to TCH or SDCCH. The SACCH is used for

- Radio link supervision measurements. - Power control. - Timing advance information.

In 26 frame traffic multi-frame 13th frame (frame no .12) is used for SACCH.SACCH is used only for non-urgent procedures.

(II). FACCH (Fast Associated Control Channel). FACCH is requested in case the requirement of signaling is urgent and signaling requirement can not be met by SACCH. This is the case when hand-over is required during conversation phase. During the call FACCH data is transmitted over allocated TCH instead of traffic data. This is marked by a flag known as stealing flag.

(III). SDCCH (Stand Alone Dedicated Control Channel)- The SDCCH is a duplex, point to point channel which is used for signaling in higher layer. It carries all the signaling between BTS & MS when no TCH is allocated to MS. The SDCCH is used for service request, location updates, subscriber authentication, ciphering. equipment validation and assignment of a TCH.

Mobile originated (MO) call: - There are four distinct phase of a mobile originated call-

-Setup phase. -Ringing phase. -Conversation phase. -Release phase.

Out of these phases the setup phase is the most important phase and includes authentication of the subscriber, Ciphering of data over radio interface, validation of mobile equipment, validation of subscriber data at VLR for requests service and assignment of a voice channel on A-interface by MSC. Whenever MS wants to initiate on outgoing call or want to send an SMS it requested for a channel to BSS over RACH. On receiving request from MS, BSS assigns a stand-alone dedicated control channel (SDCCH) to MS over access grant channel (AGCH). Once a SDCCH has been allocated to MS all the call set up information flow takes place over SDCCH.

A connection management (CM) entity initiates a CM Service Request message to the network. Network tries to establish an MM connections between the MS and the network and upon successful establishment of MM connection a CM Service Accept message is received by MS from the network. MS now sends a Call Set up Request to the network which contains the dialed digits (DD) of the called party. As the call setup message is received at the MSC/VLR certain check are performed at MSC/VLR like- whether the requested service is provisioned for the subscriber or not, whether the dialed digits are sufficient or not, any operator determined barring (ODB) does not allow call to proceed further etc. As these checks are performed at MSC/VLR a Call Proceeding Message is sent from the network towards the MS. After all the checks are successfully passed MSC sends Assignment command to the BSS which contains a free voice channel on A-interface On getting this message BSS allocates a free TCH to the MS and informs the MS to attach to it. MS on attaching to this TCH informs the BSS about it. On receiving a response from the BSS, MSC switches the speech path toward the calling MS. Thus at the end of Assignment the speech path is through from MS to MSC. It is important to note that at this stage mobile has not connected user connection as yet. MS at this stage does not listen anything.

After assignment MSC sends a network set-up message to the PSTN requesting that a call be set up. Included in the message are the MS dialed digits (DD) and details specifying which trunk should be used for the call. The PSTN may involve several switching exchanges before finally reaching the final local exchange responsible for applying the ringing tone to the destination phone. The local exchange will generate the ringing tone over the trunk, or series of trunk (if several intermediate switching exchange are involved), to the MSC. At this point in time MS will hear ringing tone. The PSTN notifies the MSC with a network-alerting message when this event occurs. MSC informs the MS that the destination number is being alerted. It is important to note that this is primarily a status message to the MS. The MS hears the ringing tone from the destination local exchange through the established voice path.

When the destination party goes off hook, PSTN informs the MSC of this event. At this point, MS is connected to the destination party and billing is started. MSC informs the MS that connection has been established and MS acknowledges the receipts of the connect message.

Under normal condition, the termination of a call is MS initiated or network initiated. In this scenario, we have assumed that MS initiates the release of the call by pressing “end” button and MS send a disconnect message to the MSC. The PSTN party is notified of the termination of the call by a release message from the MSC. The end- to- end connection is terminated. When MSC is left with no side task (e.g. charging indication etc.) to complete a release message is sent to the MS. MS acknowledges with a release complete message. All the resources between MSC and the MS are released completely.

Mobile Terminated (MT) call- The different phases of a mobile terminated call are

- Routing analysis - Paging. - Call setup. - Call release.

The phases of mobile terminated (MT) call are similar to a mobile originated (MO) call except routing analysis and paging phase. Call to a mobile subscriber in a PLMN first comes to gateway MSC (GMSC). GMSC is the MSC, which is the capable of querying HLR for subscriber routing information. GMSC need not to be part of home PLMN, though it is normal practice to have GMSC as part of PLMN in commercially deployed networks.

GMSC opens a MAP (Mobile Application Part) dialogue towards HLR and Send / Routing / Info-Request (SRI request) specific service message is sent to HLR. SRI request contains MSISDN of the subscriber. HLR based on location information of this subscriber in its database, opens a MAP dialogue towards VLR and sends Provide / Roaming / Number-request (PRN request)to the VLR. VLR responds to PRN request with PRN response message, which carries an MSRN (mobile subscriber roaming number), which can be used for routing toward visiting MSC in the network. HLR returns MSRN to GMSC (MSC that queried HLR) in SRI response message. On getting MSRN the GMSC routes the call towards VMSC The purpose of this entire exercise is to locate where the terminating mobile subscriber is.

The MSRN received at GMSC is in international format (Country Code + Area Code + subscriber number). Normally, based on the routing info at GMSC, the call may be routed out of the GMSC towards VMSC of the terminating subscriber, in which case appropriate signaling protocol (MF or ISUP) depending on the nature of connecting of GMSC with subsequent exchange along the route will apply. If at VMSC the terminating mobile subscriber is found to be free (idle), paging is initiated for terminating mobile subscriber. MSC uses the LAI provided by the VLR to determine which BSS’s should page the MS. MSC transmit a message to each of these BSS requesting that a page be performed. Included in the message is the TMSI of the MS. Each of the BSS’s broadcasts the TMSI of the mobile in a page message on paging channel (PCH).

When MS detects its TMSI broadcast on the paging channel , it responds with a channel request message over Random Access Channel (RACH). Once BSS receives a channel request message , it allocates a stand –alone Dedicated Control Channel(SDCCH) and forwards this channel assignment information to the MS over Access Grant Channel (AGCH). It is over this SDCCH that the MS communicates with the BSS and MSC until a traffic channel assigned to the MS. MS transmits paging response message to the BSS over the SDCCH. Included in this message is MS TMSI and LAI. BSS forwards this paging response message to the MSC. Now Authentication and Ciphering phases are performed to check the authenticity of MS and encrypt data over radio interface.

On the network side after paging is initiated, while waiting for paging response, a defensive timer called, ”Early ACM” timer is run at MSC to avoid network timeouts. On successfully getting paging response, a setup message is constructed to be sent towards terminating MS. In case paging fails due to authentication failure or when the subscriber is out of radio-coverage, the call is cleared.

In case CLIP is not subscribed by the terminating mobile subscriber, calling number is not included in set-up message. In case CLIP is subscribed and PI value in calling number parameter indicates “presentation allowed” the number is included in the set-up message. In case CLIP is subscribed but PI received in calling number parameter indicates “presentation restricted” then number is included only if CLIRO is also subscribed to.

MS on receiving the set-up message performs compatibility Checking before responding to the set-up message – it is possible that MS might be incompatible for certain types of call set-ups. Assuming that MS passes compatibility checking, it acknowledges the call setup with set-up confirm message. After getting set-up confirm message from the MS, MSC performs assignment phase (similar to one discussed in MO call) and a voice path is established from MSC to the MS. MS begins altering the user after it receives the traffic channel assignment. MS send alerting message to the MSC .MSC upon receiving the alerting indication from the MS, begins generating an audible ringing tone to the calling party and sends a network alerting via GMSC to the PSTN. Prior to this the calling party heard silence.

At this point in the call, MS is alerting the called party by generating on audible tone. One of the three events can occur-calling party hangs-up, mobile subscriber answers the phone, or the MSC times out waiting for the mobile subscriber to the answer the call. Since radio traffic channel is a valuable resource, GSM does not allow a MS to ring forever.

In the present scenario we have assumed that the mobile subscriber answers the phone. The MS in response to this action stops alerting and sends a connect message to the MSC. MSC removes the audible tone to the PSTN and connects the PSTN trunk to BSS trunk (terrestrial channel) and sends a connect message via GMSC to the PSTN. The caller and the called party now have a complete talk path. This event typically marks the beginning of the call for billing purposes. MSC sends a connect acknowledge message to the MS.

The release triggered by the land user is done in similar way as the release triggered by mobile user. MSC receives a release message from the network to terminate end-to-end connection. PSTN stops billing the calling landline subscriber. MSC sends a disconnect message towards the MS and MS responds by a Release message. MSC release the connection to the PSTN and acknowledges by sending a Release Complete message to PSTN. Now the voice trunk between MSC and BSS is cleared, traffic channel (TCH) is released and the resources are completely released.

The mobile-to-mobile call scenario is a combination of phases encountered in mobile originated (MO) and mobile terminated (MT) call.

Short Message Service (SMS)

SMS is a simple bearer service and acts as a bi-directional alphanumeric paging service, which allows value added service provision as well as management services provision such as advice of charge. A short message can carry at most 160 characters (it can be less depending upon the type of characters and their coding scheme). The SMS could be either in broadcast mode (via CBCH channel) or in a point-to-point mode (via either SDCCH channel if mobile is in idle state, or SACCH if the mobile is in dedicated mode).

SMS allows to provide many values added service to individual/ corporate clients. Individuals may be interested in messaging (transmitting messages in compact way) or leisure services (weather forecast, road traffic, restaurant booking, movies, TV programs etc.). Business users may be interested in corporate information (company performance, stock value), e-commerce etc.

SMS involves specific entities in the GSM network: first is the SMS Service Centre (SMS-SC simply SMSC) which can be connected to several networks and many MSC’s (SMS- GMSC’s or SMS-IWMSC’s) within the same PLMN and which is addressed by a mobile using a E.164 number of the numbering plan of the PLMN. SMSC is capable of following functionality’s:

- Transmission of short message towards a mobile, retaining the responsibility of the message until reception of acknowledgement or expiration of the validity period.

- Reception of the short messages from MS and transmission of acknowledgement to the PLMN.

- Transferring messages received from Internet to mobile.

The second entity involved by the SMS is the SME (short message entity), which is responsible for producing or receiving a short message. The SME can be connected to the SMSC via a data network such as X.25 or IP.

A short message is characterized by its parameters the most significant are the validity period, the service center time stamp which indicates the SM arrival time at the SC, etc.

In IMPCS (pilot project), the SMS architecture has been implemented by C-DoT. The hardware architecture of SMSC is similar to HLR and is located on same physical platform. It services as an inter-working and relaying function of the message transfer between two MS. The service provided are- (i) Mobile Originated short message- Enables MS to send an SMS ( up-to 140 bytes) to another MS via SMSC.

(ii)Mobile terminated short message- Enables delivery of an SMS to a particular MS.

(iii)Operator initiated SMS- This facility enables fixed network subscriber to send an SMS to a mobile subscriber through an operator at SMSC.

(iv)SMS Newsletter Service- A group of mobile subscriber can subscribe to SMSC for receiving periodic news regarding sports, weather, traffic etc. The subscription is done through on operator at SMSC. The operator feeds the news segments, which are transferred, to the subscriber periodically.

Voice Mail System (VMS)

VMS offers function of call answering device in the system. It provides personal voice mailbox to the subscribers. VMS redirects/forwards voice calls of a temporarily in accessible subscriber (busy or no reply) to a personal mailbox of the subscriber connected to the MSC. Whenever a call is redirected to VMS, it first greets the caller with a personalised greeting message and prompts the caller to leave the message in the mailbox. Later on the called party (mobile subscriber) can access the VMS from PLMN/PSTN phone by means of access code. VMS interfaces with MSC on E1 lines using R2 MF/CCS#7 signaling protocol. In IMPCS network the VMS consists of Pentium PC equipped with Dialogic card loaded with Windows NT 4.0. Dialogic card provides telephony network interface, voice recording, compression and play. The disk capacity requirement of the PC is totally application dependent. For 10,000 subscribers, if each subscriber stores 10 minutes of voice data then disk storage for subscriber voice information is around 20 GB.

References: 1. The GSM system for mobile communication-Michel Mouly & Marie- Bernadette Pautet. 2. GSM system Engineering-Asha Mehrotra (Artech House Publisher). 3. ETSI standard ETS 300303 July 1994 on ISDN, ISDN-GSM, PLMN signalling interface.

Similar Documents

Premium Essay


...The Call Triangle: student, teacher and institution Learning register variation. A web-based platform for developing diaphasic skills∗ Adriano Allora, Elisa Corino and Cristina Onesti Dipartimento di Scienze Letterarie e Filologiche - Università di Torino Via Sant’Ottavio 20, Torino 10124, Italy Abstract The present paper shows the first results of a linguistic project devoted to the construction of web learning tools for reinforcing sensitivity to diaphasic varieties and for learning style variation in L2/LS learning. Keywords: L2/LS learning; style variation; web based platform 1. Introduction This paper aims at presenting a project analysing formal varieties of European online languages, working on a suite of Net Mediated Communication (NMC) corpora and studying lexical, discourse and macro-syntactic phenomena. The practical implications of the studies aim at developing freely available resources devoted to L2/LS learning and the development of a web-based delivery platform. 2. The VALERE project The project (‘Varietà Alte di Lingue Europee in REte’: Formal Varieties in Newsgroups of European Languages: Structural Features, Interlinguistic Comparison and Teaching Applications) aims at investigating the wide range of formal language in some main European languages with particular attention to NMC. The research is based on the NUNC (i.e. Newsgroup UseNet Corpus1), a collection of corpora created from newsgroup messages implemented at the......

Words: 1730 - Pages: 7

Free Essay

Payroll Processing

...Date: Tue, 12 FEB 2008 07:01:02 +0000 From: "Karina Ramirez" Subject: Payroll Info Here is the information you requested on our payroll processing: 1. All hourly employees (clerical and warehouse personnel) are paid biweekly (every 10 workdays) based on hours recorded on time cards maintained by a time clock machine. The time cards are approved by the supervisors. The supervisors take the approved time cards to the payroll department. Salaried employees also are paid biweekly based on a salary schedule approved by the finance committee of the board of directors. 2. The personnel department must approve all new hires, terminations, and hourly rate changes. Forms for each of these actions also are approved by appropriate supervisors and are kept in the personnel office. The personnel clerks notify payroll of the changes by a “payroll change” document. 3. The payroll department maintains the individual employees’ payroll records and the forms signed by employees for all pay deductions. 4. Every two weeks, Martha, a clerk in the payroll department, prepares the payroll register (multicopy) from the time cards and the information of the individual payroll records. Martha uses a “write-it-once” system that also prepares a form indicating gross pay, each deduction, net pay, and year-to-date totals. Martha calls this form the “take-home sheet.” Willie, a second clerk, checks Martha’s work and recalculates the gross pay and all deductions. 5. Two copies of the payroll......

Words: 486 - Pages: 2

Free Essay


...share your feedback on your experience with our services, please call our toll-free number, 1-800-227-2345 and tell the Cancer Information Specialist that you would like to share your thoughts. Please know that we are always here to help. We invite you to also contact us at 1-800-227-2345 24 hours a day, 7 days a week, to access to cancer information, American Cancer Society programs and services, and other community resources that may be of assistance to you. You may also access our website at Our Cancer Survivors Network that can be reached through our website provides a way for patients, survivors, and caregivers to connect with others who have been touched by cancer and to gain support and knowledge through the sharing of similar experiences. Also through, you can find our newest online support Circle of Sharing™, which helps cancer patients and their caregivers get personalized information about their diagnosis, and share that information with family and friends. In addition, the California Division offers monthly I Can Cope program, free educational/support classes for cancer patients/survivors and their caregivers via teleconference calls on topics such as fatigue, pain, nutrition, finances, etc. These calls can be taken from home, office, or any other place convenient for patients, survivors, and caregivers only. For more information or to register for these classes, call 1-800-227-2345. We look forward to hearing from......

Words: 330 - Pages: 2

Free Essay

Image Processing

...INTRODUCTION The term image refer to two dimensional light intensity function f(x, y), where x and y denote spatial coordinates and the value of at any point (x, y) is proportional to the brightness (or gray level) of the image at that point. A digital image is an image f(x, y) that has been discretized both in spatial coordinate and brightness. A digital image can be considered a matrix whose row and column indices identify a point in the image and the corresponding matrix element value identifies the gray level at that point. The elements of such a digital array are called image elements, picture elements. The term digital image processing refers to processing of a two dimensional picture by a digital computer. An image given in the form of a transparency, slide, photograph or chart is first digitized and stored as matrix of binary digits in computer memory. This digitized image can be processed and/or displayed on a high resolution monitor. Segmentation subdivides an image into its constituent regions or objects .The level to which the segmentation is carried depends on the problem being solved. Segmentation is carried until we are able to distinguish the object from its backgrounds. Image segmentation is based on one of the two basic properties of intensity values: discontinuity and similarity. Thresholding is a similarity approach of segmenting an image. The simplest thresholding technique is to partition the......

Words: 560 - Pages: 3

Premium Essay

Language Processing

...Language processing 1.Explain what is lexical access. Lexical access (word recognition) The process by which the basic sound-meaning connections of language, i.e., lexical entries, areactivated. 2.How many techniques are used in studies of lexical access and explain them briefly? Experimental techniques used: lexical decision task (word vs. non-word, word frequency); semantic priming (doctor-nurse); naming task (regular-irregular-invented words). Listeners retrieve all meanings of a word, even in biased contexts. 3.Explain the syntactic processing. Syntactic processes (parsing)=the listener must figure out the syntactic and semantic relations among words and phrases in a sentence. 4.Explain briefly the techniques used in syntactic processing. Experimental techniques used: syntactic category ambiguity (The warehouse fires...1. were set by an arsonist., 2. employees over sixty; garden path sentences (The horse raced past the barn fell); shadowing task (i.e. quick repetitions, listeners correct speech and grammatical errors unconsciously). 5. What is a voiceprint? And how do we call it otherwise? Spectogram (voiceprints)= a pattern-like image produced of the sound signal in a computer program that decomposes the speech signal into its frequency components, a great deal can be learnt about the basic acoustic components that reflect the articulatory features of speech sounds. Spoken words rarely have boundaries, yet words are units of perception. 6.......

Words: 322 - Pages: 2

Free Essay


...something that is right for once… I can’t do it by myself… I promise I’ll let go… So, please give me a chance… Just one more chance… Ryo opened his eyes. He was lying down, where he couldn’t tell. He wasn’t able to move. His left foot was stucked on something. He felt so much pain. He runs his hand through his head which covered with fresh blood. Before he could remembered what had happened, something caught his eyes. It was his cellphone, lying beside his head. His chance… He force himself to move and took the cellphone. He turned it on with all the strength that he had left, and pressed the button. He was half conscious while doing that. But something in his heart give him the power to do it. he was making a call. The one important call. “Hello..” the voice that Ryo loved the most. It warmed him and healed all of his pain that he felt before. “…” Ryo wasn’t in a position to talk, but he had to. He need to. “Ryo? What’s wrong? You sounded weird” Shige began to worried. Despite the fact that they just had a fight, Shige still love Ryo. And Ryo’s voice right now make his heart beats faster. There’s something wrong about Ryo. He could tell. “I’m sorry..” Ryo’s voice was so weak, Shige could barely heard him. “what? Ryo? What happened?? Are you hurt? Where are you? I’ll be there right away!” that makes Ryo let go a small and weak chuckle. He’ll be missing him. “no need for you to come here..i..don’t..have much…time..” Ryo began......

Words: 755 - Pages: 4

Free Essay

Transaction Processing

...of transactions taking place, and advancements in computer hardware and software, transaction-processing systems have evolved as well. Frist let’s examine what a transaction processing system does. “Transaction processing systems capture and process the detailed data necessary to update records about the fundamental business operations of the organization.” (Stair & Reynolds 2013, pg. 257). The system is responsible for processing various types of transactions including but not limited to sales orders, inventory updates, payroll, accounts payables and receivables. “The result of processing business transactions is that the organization’s records are update to reflect the status of the operation at the time the last processed transaction.” (Stair & Reynolds 2013, pg. 257) The results of the updated records for the organization are so that management is able to understand where the company stands at a specific point of time. Transaction processing systems works with a large amount of data and many times is integrated into an organizations other systems and share common databases. It is able to provide detailed sales reports, payroll reports and inventory status updates. So how far have transaction processing systems evolved? Well let’s first take a look at transactions in the early 90s and take a typical bank transaction as an example. A business we’ll call Company X sells its many products and received a bunch of checks in the mail for the payment......

Words: 1216 - Pages: 5

Free Essay

Processing Thoery

...Information Processing Theory Jennifer Hall November 12, 2013 AED/202 Jacobs 1 Information Processing Theory The information processing theory is a group of ideas put together describing how human beings transfer information, remember information, and modify information. The information processing theory also looks at how these processes change over the course of a persons life. This theory came out in the nineteen fifties and nineteen sixties, and has continually changed and been modified over the years. The information processing theory is a combination of three components; sensory register (memory), working memory, and long-term memory. The combination of these three components enables us as human beings to receive, think about, and process information. There is also one more component that is essential in the learning and memory process, this is called the central executive component. The central executive component is what you could refer to as the cognitive “supervisor”. Without this component a person's decision making skills and planning skills could be interfered with. Sensory register and working memory help in the beginning stages of memory, while long-term memory is just that. Long-term memory is used when storing......

Words: 1486 - Pages: 6

Premium Essay

Database Processing

...four statements have been run the table structure is exactly the same as it was before you ran them. 7.17 Write INSERT statements to add the data shown in Figure 2-32 to the ASSIGNMENT table. Run these statements to populate the ASSIGNMENT table. (Hint: Write and test an SQL script, and then run the script. Save the script as DBP-e12-WPC-Insert-ASSIGNMENTData. sql for future use.) 7.26 Write one DELETE statement that will delete all data for project ‘2011 Q3 Product Plan’ and all of its rows in ASSIGNMENT. Do not run this statement. 7.30 What is an SQL view? What purposes do views serve? Why is this useful? 7.39 Explain how views can be used to improve data security. Chapter 7 SQL for Database Construction and Application Processing 303 7.40 Explain how views can be used to provide additional trigger functionality. 7.48 What is a trigger? 7.53 Assume that the View Ridge Gallery will allow a row to be deleted from WORK if the work has never been sold. Explain, in general terms, how to use a trigger to accomplish such a deletion. 7.55 What is a stored procedure? How do they differ from triggers? 7.57 Summarize the key advantages of stored procedures. These Project Questions extend the Wedgewood Pacific Corporation database you created and used in the Review Questions with two new tables named COMPUTER and COMPUTER_ASSIGNMENT....

Words: 462 - Pages: 2

Free Essay


...for Sykes are. Click this link to review our basic requirements; your specific job may have additional requirements needed Question #2 In your own words please describe Project Blue Sky? (please use Google to find this answer) Question #3 Please describe a time when you had a call from an unhappy customer, what steps did you take to turn that call around? Step 3: 5-10 minutes PRIOR to your scheduled interview, please click on the link below using Internet Explorer or Mozilla Firefox: Step 4: You MUST choose “Login as a Guest” and enter your First and Last name that appears on your profile. If you do not follow these directions, you will not be admitted into the room to complete the interview. If you attempt to login with a user name and password, you will not be allowed access, and will receive several error messages. If you are unable to attend your interview, please ensure you cancel your interview 30 minutes prior to the start time, to ensure we do not mark you as a “No Call No Show”. Thank you for scheduling an interview for SYKES! If you have any questions or concerns, please reach out to us via your support page by clicking on the help envelope located at the top of the page. We look forward to meeting you!...

Words: 618 - Pages: 3

Premium Essay

Food Processing

...Food Processing and Preservation Homework Institution Affiliation History of pulsed electric field Pulsed electric field is process that is non-thermal that uses short and high voltage pulses to process and preserve foods. The history of this process dates back to the culmination of the 19th century. It was during this time that the technique of treating and processing foods through the use of electrical current was first applied. Since that time of the century, in the 1960’s in specific, first cases of pulsed electric fields have been in use. German engineer Heinz Doevenspeck was behind the pioneering of the process. His pioneer ship was followed by Sale’s and Hamilton’s research work to determine what was required to create an effective process. Later, in 1980’s the first two processes were developed by Krupp Maschinentechnik. The processes were referred to as Elcrack and Elsteril and were based on the work on Doevenspeck. However, this processes did not work as expected and this led to their failure and the processes were dismantled at that time. As years progressed, the technique was researched on again by universities and research labs. The research was mainly based on the main requirements that were essential in creating process that would last. The research was promising and was seen to be effective in liquid foods microbial decontamination, pre-treatment of vegetables and fruit tissues before extraction and waste water processing treatment. Several trials to......

Words: 628 - Pages: 3

Free Essay

Call Money

...Lesson 4 Call Money After reading this lesson, you will be conversant with: Participants and Purpose of Call Market Developments in Indian Call Market Role of Reserve Bank of India Call Markets in Other Countries Treasury Management: Theory and Practice Introduction The call money market is a part of the money market and refers to the overweight funds lent and borrowed, mostly by banks for daily liquidity management. Call/Notice money is an amount borrowed or lent for a very short period. If the period is more than one day and up to 14 days it is called „Notice Money‟, otherwise the amount is called „Call Money‟. Under call money market, funds are transacted on overnight basis and under notice money market, funds are transacted for the period between 2 days and 14 days. The call money market is most liquid of all short-term money market segments and it is also the most sensitive barometer measuring the liquidity conditions prevailing in financial markets. The call money is the money repayable on demand. The maturity period of call loans varies between 1 to 14 days. The money that is lent for one day in call money market is also known as „overnight money‟. The number of days is specified and the call money has to be repaid on the due date. The intimation for repayment enables the borrower to arrange the money on the due date and the duration of notice money is similar to that of call money i.e., up to 14 days. Therefore, the notice money is not seen in the market.......

Words: 12806 - Pages: 52

Premium Essay

Payment Processing

...Plc + Optimal Payments Transaction closed 1 February 2011 NEOVIA renamed O ti d Optimal P l Payments Pl on 1 March 2011 t Plc M h Focused on providing payment solutions to online merchants and consumers through our “twin pillars” Straight Through Processing Stored Value Processing of transactions, either gateway or bureau (assumes some credit risk) for online merchants Products that allow the consumer to hold monetary value via an eWallet and/or card (e.g. prepaid card) which can be used to pay for transactions at merchants A truly international scale player in online payments - proven, trusted, innovative Listed on London’s AIM market (OPAY.L) – market cap US$120m (£75m) 5 © Optimal Payments Plc. 2010 achievements 6 6 © Optimal Payments Plc. © Optimal Payments Plc. Operational achievements Progress on simplification (Business Transformation programme) Headcount reduced to 309 from 447 Regulatory simplification of member b i R l t i lifi ti f b business - N t ll UK Ltd (FSA regulated) Neteller l t d) Asia restructuring completed Continued development of business li C ti dd l t fb i lines Stored Value Straight Through Processing i 460,000 new members and 200 new merchants signed for eWallet 2 significant new countries and 5 deposit options introduced Growing gateway volume (+165%) from landmark clients (SDG, MoreThan) Bureau service launched with AIBMS Traction for......

Words: 3108 - Pages: 13

Premium Essay

Processing a Defendant

...Unit 4 Corrections and Prisons August 12, 2012 Abstract Today we will be discussing how a defendant is processed through a federal case. This is exceptionally important because your actions or absence of actions as law enforcement during the detaining of these suspects can result in the difference between their prosecution or release under federal statue. This presentation will also act as a checklist as well as provide additional information that you may need while in the field or throughout the proceedings of this case. Understand that your participation in this case may not be limited to just arresting or the processing of evidence; you may be utilized as a witness, under oath, in front of a federal court of law. Federal Investigation Outline Format for Presentation Process 1.0 Investigation 1.1 Evidence: - It is evidence that leads the prosecutor to believe he has a "Strong case", meaning there is strong evidence that the person or persons have committed the crime. Direct evidence would include a witness who saw the crime happen, video/audio tape of the crime, and statements done by witnesses, of the crime. Circumstantial evidence may come from someone who did not see the crime first-hand; it includes someone's feelings on multiple indicators in the theory of the crime, even though that person did not see the crime take place. 1.2 Decision to Charge: Prosecutors study all information provided by the investigators, and......

Words: 4401 - Pages: 18

Premium Essay

Food Processing

...Galore Industry Overview Global Processed Food Industry Indian Processed Food Industry Processed Food Industry - A Sunrise sector Where the opportunity lies- areas for investment Industry Analysis Driving Forces Major Challenges Indian Food Processing Industry by sectors Diary Fruits and Vegetable Grains Meat and Poultry Fish Packaged/Convenience Food Aerated Soft Drinks, Packaged drinking water Exports FDI in Food Processing Government Regulation and support Regulatory framework Outlook Initiating Coverage Lakshmi Energy & Foods Ruchi Soya Analyst - Nisha Harchekar Sectors - FMCG, Pharma, Entertainment WAY2WEALTH Securities Pvt. Ltd., 15/A Chander Mukhi, Nariman Point, Mumbai - 400 021. Tel: +91 22 4019 2900 email: website: Indian Processed Food Industry Sector Coverage Opportunities Galore Executive Summary The size of global processed food industry is estimated to be valued around US $3.6 trillion and accounts for three-fourth of the global food sales. Despite its large size, only 6% of processed foods are traded across borders compared to 16% of major bulk agricultural commodities. Indian food-processing industry is miniscule in comparison and is estimated to be US $40 billion and is likely to grow at over 10%, on the basis of an expected GDP growth rate of 8-8.5% p.a. R uchi Soya FY09(E) CMP (Rs) Marketcap (Rs crores) PE......

Words: 12382 - Pages: 50