Handoff in Cellular Telecommunications - GeeksforGeeks (2024)

Skip to content

Handoff in Cellular Telecommunications - GeeksforGeeks (1)

Last Updated : 29 Jul, 2024

Summarize

Comments

Improve

Suggest changes

Like Article

Like

Save

Report

In cellular telecommunications, the terms handover or handoff refers to the process of transferring an ongoing call or data connectivity from one Base Station to another Base Station. When a mobile moves into a different cell while the conversation is in progress then the MSC (Mobile Switching Centre) transfers the call to a new channel belonging to the new Base Station.

Handoff in Cellular Telecommunications - GeeksforGeeks (3)

When a mobile user A moves from one cell to another cell then BSC 1 signal strength loses for the mobile User A and the signal strength of BSC 2 increases and thus ongoing calls or data connectivity for mobile users goes on without interrupting.

Types of Handoff

  • Hard Handoff
  • Soft Handoff
  • Delayed Handoff
  • Mobile-Assisted Handoff

Hard Handoff

When there is an actual break in the connectivity while switching from one Base Station to another Base Station. There is no burden on the Base Station and MSC because the switching takes place so quickly that it can hardly be noticed by the users. The connection quality is not that good. Hard Handoff adopted the ‘break before make’ policy.

It is generally implemented in Time Division Multiplexing and Frequency Division Multiplexing when a user connects to the base station with a fluctuating radio frequency.

  • Hard Handoff is cheaper in cost as compared to soft Handoff because only one channel needs to be active at a time.
  • It ismore efficient than soft handoff, that’s why hard handoffs are widely implemented.
  • Sometimes, a delay can be experienced while switching base stations.

Handoff in Cellular Telecommunications - GeeksforGeeks (4)

Soft Handoff

Soft Handoff is a mechanism in which the device gets connected with two or more base stations at the same time. At least one of the links is kept when radio signals are added or removed to the Base Station. Soft Handoff adopted the ‘make before break’ policy. If a channel is in power loss then another channel will always be on standby mode so this makes it best in terms of quality as compared to Hard handoff. Soft handoffs are used in devices supporting CDMA/WDMA networks

  • High Transmission speed as more than one repeater can transmit signals.
  • It has a very low delay in signals.
  • It can’t be implemented on devices supporting GSM or LTE networks.

Handoff in Cellular Telecommunications - GeeksforGeeks (5)

Delayed Handoff

Delayed handoff occurs when no base station is available for accepting the transfer. The call continues until the signal strength reaches a threshold, and after that, the call is dropped. Generally, it happens when the user is out of the network coverage area, or at some dead spots where network reach is very low.

Mobile-Assisted Handoff

Mobile-Assisted handoff is generally used when a mobile phone helps a base station to transfer the call to another base station with better-improvised connectivity and more signal strength. This handoff is used in TDMA technique-based GSM devices.



Please Login to comment...

Similar Reads

What is Digital Enhanced Cordless Telecommunications (DECT)?

Digital Enhanced Cordless Telecommunications(DECT) is one of the applications of computer networks that comes under wireless networks widely used for both domestic and business purposes. It is designed for short-range which acts as an access method to major networks. Due to the flexible nature of DECT, it becomes a widely used application around th

6 min read

Importance of CDMA in Today’s Cellular World

CDMA stands for Code Division Multiple Access. CDMA was developed by QUALCOMM. This technology is used in UHF (ultra-high-frequency) cellular phone systems in the 800 megahertz (MHz) and 1.9 gigahertz (GHz) bands. It is basically a form of complexing, which allows numerous signals to copy a single transmission channel, without exceeding the availab

2 min read

Cellular Networks

A Cellular Network is formed of some cells. The cell covers a geographical region and has a base station analogous to 802.11 AP which helps mobile users attach to the network and there is an air interface of physical and data link layer protocol between mobile and base station. All these base stations are connected to the Mobile Switching Center wh

5 min read

Difference between 2G and 3G Cellular Network

The current most developed versions of the cellular networks include 2G and 3G mobile communication networks which mark different generations of new technology in society. 2G, also known as second-generation networks employed digital signalling and offered simple data facilities like Short Messaging Service and restricted Internet connectivity boos

4 min read

Difference between Cellular and Ad hoc network

The Cellular type of wireless communication network and the Ad hoc type of wireless communication network are two different categories that are used for number of different functions. Although both facilitate wireless communications, they are structurally, functionally, and application-wise vastly distinct. It is also important to have knowledge on

5 min read

Difference between Cellular and Wi-Fi Networks

Cellular Networks and Wifi networks both access the internet. But they are different. A cellular network where we access the internet and voice calls on mobile devices but it uses mobile towers to enable communication between mobile devices while a Wi-Fi network provides a high internet speed but the thing is that internet access is only available

4 min read

Computer Network Tutorial

A computer network is a collection of computers or devices connected to share resources. Any device which can share or receive the data is called a Node. Through which the information or data propagate is known as channels, It can be guided or unguided. In this Computer network tutorial, you’ll learn basic to advanced concepts like the Basics of co

10 min read

Difference Between OSI Model and TCP/IP Model

Data communication is a process or act in which we can send or receive data. Understanding the fundamental structures of networking is crucial for anyone working with computer systems and communication. For data communication two models are available, the OSI (Open Systems Interconnection) Model, and the TCP/IP (Transmission Control Protocol/Intern

5 min read

Data Link Layer

The data link layer is the second layer from the bottom in the OSI (Open System Interconnection) network architecture model. It is responsible for the node-to-node delivery of data. Its major role is to ensure error-free transmission of information. DLL is also responsible for encoding, decoding, and organizing the outgoing and incoming data. This

4 min read

Data Communication - Definition, Components, Types, Channels

Transferring data over a transmission medium between two or more devices, systems, or places is known as data communication. Nowadays, computing and telecommunications depend heavily on this data transmission, which makes a variety of applications conceivable, including email, video chatting, the Internet, and many more things. In this article, we

7 min read

8 min read

Top 50 Plus Networking Interview Questions and Answers for 2024

Networking is defined as connected devices that may exchange data or information and share resources. A computer network connects computers to exchange data via a communication media. Computer networking is the most often asked question at leading organizations such Cisco, Accenture, Uber, Airbnb, Google, Nvidia, Amazon, and many others. To get int

15+ min read

Types of Computer Networks

A computer network is a cluster of computers over a shared communication path that works to share resources from one computer to another, provided by or located on the network nodes. In this article, we will discuss computer networks and their types. What is a Computer Network?A computer network is a system that connects many independent computers

11 min read

Cryptography and its Types

Cryptographyis a technique of securing communication by converting plain text into ciphertext. It involves various algorithms and protocols to ensure data confidentiality, integrity, authentication, and non-repudiation. In this article, we will discuss cryptography and its types. What is Cryptography?Cryptography is a technique of securing informa

7 min read

Difference Between IPv4 and IPv6

The address through which any computer communicates with our computer is simply called an Internet Protocol Address or IP address. For example, if we want to load a web page or download something, we require the address to deliver that particular file or webpage. That address is called an IP Address. There are two versions of IP: IPv4 and IPv6. IPv

7 min read

Differences between TCP and UDP

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) both are protocols of the Transport Layer Protocols. TCP is a connection-oriented protocol whereas UDP is a part of the Internet Protocol suite, referred to as the UDP/IP suite. Unlike TCP, it is an unreliable and connectionless protocol. In this article, we will discuss the diffe

9 min read

Types of Transmission Media

Transmission media refer to the physical pathways through which data is transmitted from one device to another within a network. These pathways can be wired or wireless. The choice of medium depends on factors like distance, speed, and interference. In this article, we will discuss the transmission media. What is Transmission Media? A transmission

8 min read

Hamming Code in Computer Network

Hamming code is an error-correcting code used to ensure data accuracy during transmission or storage. Hamming code detects and corrects the errors that can occur when the data is moved or stored from the sender to the receiver. This simple and effective method helps improve the reliability of communication systems and digital storage. It adds extra

11 min read

TCP 3-Way Handshake Process

The TCP 3-Way Handshake is a fundamental process that establishes a reliable connection between two devices over a TCP/IP network. It involves three steps: SYN (Synchronize), SYN-ACK (Synchronize-Acknowledge), and ACK (Acknowledge). During the handshake, the client and server exchange initial sequence numbers and confirm the connection establishmen

7 min read

TCP/IP Model

The TCP/IP model is a fundamental framework for computer networking. It stands for Transmission Control Protocol/Internet Protocol, which are the core protocols of the Internet. This model defines how data is transmitted over networks, ensuring reliable communication between devices. It consists of four layers: the Link Layer, the Internet Layer, t

13 min read

What is OSI Model? - Layers of OSI Model

OSI stands for Open Systems Interconnection , where open stands to say non-proprietary. It is a 7-layer architecture with each layer having specific functionality to perform. All these 7 layers work collaboratively to transmit the data from one person to another across the globe. The OSI reference model was developed by ISO - 'International Organiz

15+ min read

Basics of Computer Networking

Computer networking is a cornerstone of modern technology, enabling the interconnected systems that power the Internet, business communications, and everyday digital interactions. Understanding the fundamentals of computer networking is essential for anyone involved in technology, from enthusiasts to professionals. This article will explore the bas

12 min read

Transmission Modes in Computer Networks (Simplex, Half-Duplex and Full-Duplex)

Transmission modes also known as communication modes, are methods of transferring data between devices on buses and networks designed to facilitate communication. They are classified into three types: Simplex Mode, Half-Duplex Mode, and Full-Duplex Mode. In this article, we will discuss we will discuss Transmission Modes. What is Transmission Modes

6 min read

RSA Algorithm in Cryptography

RSA algorithm is an asymmetric cryptography algorithm. Asymmetric means that it works on two different keys i.e. Public Key and Private Key. As the name describes the Public Key is given to everyone and the Private key is kept private. An example of asymmetric cryptography: A client (for example browser) sends its public key to the server and reque

15+ min read

Types of Network Topology

Network topology refers to the arrangement of different elements like nodes, links, or devices in a computer network. It defines how these components are connected and interact with each other. Understanding various types of network topologies helps in designing efficient and robust networks. Common types include bus, star, ring, mesh, and tree top

12 min read

Domain Name System (DNS) in Application Layer

The Domain Name System (DNS) is like the internet's phone book. It helps you find websites by translating easy-to-remember names (like www.example.com) into the numerical IP addresses (like 192.0.2.1) that computers use to locate each other on the internet. Without DNS, you would have to remember long strings of numbers to visit your favorite websi

9 min read

Caesar Cipher in Cryptography

The Caesar Cipher is one of the simplest and oldest methods of encrypting messages, named after Julius Caesar, who reportedly used it to protect his military communications. This technique involves shifting the letters of the alphabet by a fixed number of places. For example, with a shift of three, the letter 'A' becomes 'D', 'B' becomes 'E', and s

12 min read

Error Detection in Computer Networks

Error is a condition when the receiver's information does not match the sender's. Digital signals suffer from noise during transmission that can introduce errors in the binary bits traveling from sender to receiver. That means a 0 bit may change to 1 or a 1 bit may change to 0. Data (Implemented either at the Data link layer or Transport Layer of

7 min read

Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)

Network Devices: Network devices, also known as networking hardware, are physical devices that allow hardware on a computer network to communicate and interact with one another. For example Repeater, Hub, Bridge, Switch, Routers, Gateway, Brouter, and NIC, etc. 1. Repeater - A repeater operates at the physical layer. Its job is to amplifies (i.e.,

6 min read

Introduction of Classful IP Addressing

An IP address is an address that has information about how to reach a specific host, especially outside the LAN. An IP address is a 32-bit unique address having an address space of 232. Classful IP addressing is a way of organizing and managing IP addresses, which are used to identify devices on a network. Think of IP addresses like street addresse

10 min read

Article Tags :

We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy

Handoff in Cellular Telecommunications - GeeksforGeeks (7)

'); $('.spinner-loading-overlay').show(); jQuery.ajax({ url: writeApiUrl + 'create-improvement-post/?v=1', type: "POST", contentType: 'application/json; charset=utf-8', dataType: 'json', xhrFields: { withCredentials: true }, data: JSON.stringify({ gfg_id: post_id, check: true }), success:function(result) { jQuery.ajax({ url: writeApiUrl + 'suggestions/auth/' + `${post_id}/`, type: "GET", dataType: 'json', xhrFields: { withCredentials: true }, success: function (result) { $('.spinner-loading-overlay:eq(0)').remove(); var commentArray = result; if(commentArray === null || commentArray.length === 0) { // when no reason is availaible then user will redirected directly make the improvment. // call to api create-improvement-post $('body').append('

'); $('.spinner-loading-overlay').show(); jQuery.ajax({ url: writeApiUrl + 'create-improvement-post/?v=1', type: "POST", contentType: 'application/json; charset=utf-8', dataType: 'json', xhrFields: { withCredentials: true }, data: JSON.stringify({ gfg_id: post_id, }), success:function(result) { $('.spinner-loading-overlay:eq(0)').remove(); $('.improve-modal--overlay').hide(); $('.unlocked-status--improve-modal-content').css("display","none"); $('.create-improvement-redirection-to-write').attr('href',writeUrl + 'improve-post/' + `${result.id}` + '/', '_blank'); $('.create-improvement-redirection-to-write')[0].click(); }, error:function(e) { $('.spinner-loading-overlay:eq(0)').remove(); var result = e.responseJSON; if(result.detail.non_field_errors.length){ $('.improve-modal--improve-content .improve-modal--improve-content-modified').text(`${result.detail.non_field_errors}.`); jQuery('.improve-modal--overlay').show(); jQuery('.improve-modal--improvement').show(); $('.locked-status--impove-modal').css("display","block"); $('.unlocked-status--improve-modal-content').css("display","none"); $('.improve-modal--improvement').attr("status","locked"); $('.improvement-reason-modal').hide(); } }, }); return; } var improvement_reason_html = ""; for(var comment of commentArray) { // loop creating improvement reason list markup var comment_id = comment['id']; var comment_text = comment['suggestion']; improvement_reason_html += `

${comment_text}

`; } $('.improvement-reasons_wrapper').html(improvement_reason_html); $('.improvement-bottom-btn').html("Create Improvement"); $('.improve-modal--improvement').hide(); $('.improvement-reason-modal').show(); }, error: function(e){ $('.spinner-loading-overlay:eq(0)').remove(); // stop loader when ajax failed; }, }); }, error:function(e) { $('.spinner-loading-overlay:eq(0)').remove(); var result = e.responseJSON; if(result.detail.non_field_errors.length){ $('.improve-modal--improve-content .improve-modal--improve-content-modified').text(`${result.detail.non_field_errors}.`); jQuery('.improve-modal--overlay').show(); jQuery('.improve-modal--improvement').show(); $('.locked-status--impove-modal').css("display","block"); $('.unlocked-status--improve-modal-content').css("display","none"); $('.improve-modal--improvement').attr("status","locked"); $('.improvement-reason-modal').hide(); } }, }); } else { if(loginData && !loginData.isLoggedIn) { $('.improve-modal--overlay').hide(); if ($('.header-main__wrapper').find('.header-main__signup.login-modal-btn').length) { $('.header-main__wrapper').find('.header-main__signup.login-modal-btn').click(); } return; } } }); $('.left-arrow-icon_wrapper').on('click',function(){ if($('.improve-modal--suggestion').is(":visible")) $('.improve-modal--suggestion').hide(); else{ $('.improvement-reason-modal').hide(); } $('.improve-modal--improvement').show(); }); function loadScript(src, callback) { var script = document.createElement('script'); script.src = src; script.onload = callback; document.head.appendChild(script); } function suggestionCall() { var suggest_val = $.trim($("#suggestion-section-textarea").val()); var array_String= suggest_val.split(" ") var gCaptchaToken = $("#g-recaptcha-response-suggestion-form").val(); var error_msg = false; if(suggest_val != "" && array_String.length >=4){ if(suggest_val.length <= 2000){ var payload = { "gfg_post_id" : `${post_id}`, "suggestion" : `

${suggest_val}

`, } if(!loginData || !loginData.isLoggedIn) // User is not logged in payload["g-recaptcha-token"] = gCaptchaToken jQuery.ajax({ type:'post', url: "https://apiwrite.geeksforgeeks.org/suggestions/auth/create/", xhrFields: { withCredentials: true }, crossDomain: true, contentType:'application/json', data: JSON.stringify(payload), success:function(data) { jQuery('.spinner-loading-overlay:eq(0)').remove(); jQuery('#suggestion-section-textarea').val(""); jQuery('.suggest-bottom-btn').css("display","none"); // Update the modal content const modalSection = document.querySelector('.suggestion-modal-section'); modalSection.innerHTML = `

Thank You!

Your suggestions are valuable to us.

You can now also contribute to the GeeksforGeeks community by creating improvement and help your fellow geeks.

`; }, error:function(data) { jQuery('.spinner-loading-overlay:eq(0)').remove(); jQuery('#suggestion-modal-alert').html("Something went wrong."); jQuery('#suggestion-modal-alert').show(); error_msg = true; } }); } else{ jQuery('.spinner-loading-overlay:eq(0)').remove(); jQuery('#suggestion-modal-alert').html("Minimum 5 Words and Maximum Character limit is 2000."); jQuery('#suggestion-modal-alert').show(); jQuery('#suggestion-section-textarea').focus(); error_msg = true; } } else{ jQuery('.spinner-loading-overlay:eq(0)').remove(); jQuery('#suggestion-modal-alert').html("Enter atleast four words !"); jQuery('#suggestion-modal-alert').show(); jQuery('#suggestion-section-textarea').focus(); error_msg = true; } if(error_msg){ setTimeout(() => { jQuery('#suggestion-section-textarea').focus(); jQuery('#suggestion-modal-alert').hide(); }, 3000); } } document.querySelector('.suggest-bottom-btn').addEventListener('click', function(){ jQuery('body').append('

'); jQuery('.spinner-loading-overlay').show(); if(loginData && loginData.isLoggedIn) { suggestionCall(); return; } // load the captcha script and set the token loadScript('https://www.google.com/recaptcha/api.js?render=6LdMFNUZAAAAAIuRtzg0piOT-qXCbDF-iQiUi9KY',[], function() { setGoogleRecaptcha(); }); }); $('.improvement-bottom-btn.create-improvement-btn').click(function() { //create improvement button is clicked $('body').append('

'); $('.spinner-loading-overlay').show(); // send this option via create-improvement-post api jQuery.ajax({ url: writeApiUrl + 'create-improvement-post/?v=1', type: "POST", contentType: 'application/json; charset=utf-8', dataType: 'json', xhrFields: { withCredentials: true }, data: JSON.stringify({ gfg_id: post_id }), success:function(result) { $('.spinner-loading-overlay:eq(0)').remove(); $('.improve-modal--overlay').hide(); $('.improvement-reason-modal').hide(); $('.create-improvement-redirection-to-write').attr('href',writeUrl + 'improve-post/' + `${result.id}` + '/', '_blank'); $('.create-improvement-redirection-to-write')[0].click(); }, error:function(e) { $('.spinner-loading-overlay:eq(0)').remove(); var result = e.responseJSON; if(result.detail.non_field_errors.length){ $('.improve-modal--improve-content .improve-modal--improve-content-modified').text(`${result.detail.non_field_errors}.`); jQuery('.improve-modal--overlay').show(); jQuery('.improve-modal--improvement').show(); $('.locked-status--impove-modal').css("display","block"); $('.unlocked-status--improve-modal-content').css("display","none"); $('.improve-modal--improvement').attr("status","locked"); $('.improvement-reason-modal').hide(); } }, }); });

Continue without supporting 😢

`; $('body').append(adBlockerModal); $('body').addClass('body-for-ad-blocker'); const modal = document.getElementById("adBlockerModal"); modal.style.display = "block"; } function handleAdBlockerClick(type){ if(type == 'disabled'){ window.location.reload(); } else if(type == 'info'){ document.getElementById("ad-blocker-div").style.display = "none"; document.getElementById("ad-blocker-info-div").style.display = "flex"; handleAdBlockerIconClick(0); } } var lastSelected= null; //Mapping of name and video URL with the index. const adBlockerVideoMap = [ ['Ad Block Plus','https://media.geeksforgeeks.org/auth-dashboard-uploads/abp-blocker-min.mp4'], ['Ad Block','https://media.geeksforgeeks.org/auth-dashboard-uploads/Ad-block-min.mp4'], ['uBlock Origin','https://media.geeksforgeeks.org/auth-dashboard-uploads/ub-blocke-min.mp4'], ['uBlock','https://media.geeksforgeeks.org/auth-dashboard-uploads/U-blocker-min.mp4'], ] function handleAdBlockerIconClick(currSelected){ const videocontainer = document.getElementById('ad-blocker-info-div-gif'); const videosource = document.getElementById('ad-blocker-info-div-gif-src'); if(lastSelected != null){ document.getElementById("ad-blocker-info-div-icons-"+lastSelected).style.backgroundColor = "white"; document.getElementById("ad-blocker-info-div-icons-"+lastSelected).style.borderColor = "#D6D6D6"; } document.getElementById("ad-blocker-info-div-icons-"+currSelected).style.backgroundColor = "#D9D9D9"; document.getElementById("ad-blocker-info-div-icons-"+currSelected).style.borderColor = "#848484"; document.getElementById('ad-blocker-info-div-name-span').innerHTML = adBlockerVideoMap[currSelected][0] videocontainer.pause(); videosource.setAttribute('src', adBlockerVideoMap[currSelected][1]); videocontainer.load(); videocontainer.play(); lastSelected = currSelected; }
Handoff in Cellular Telecommunications - GeeksforGeeks (2024)
Top Articles
Binance Powered DeFi Project Raised Record Funds with High Returns! - Bithubi
Can You Live On Dividends From Your Portfolio? - A Wealth of Common Sense
This website is unavailable in your location. – WSB-TV Channel 2 - Atlanta
neither of the twins was arrested,传说中的800句记7000词
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Splunk Stats Count By Hour
Insidious 5 Showtimes Near Cinemark Tinseltown 290 And Xd
Apnetv.con
Kostenlose Games: Die besten Free to play Spiele 2024 - Update mit einem legendären Shooter
Mlifeinsider Okta
Gt Transfer Equivalency
Directions To O'reilly's Near Me
Buff Cookie Only Fans
Crossword Nexus Solver
Highland Park, Los Angeles, Neighborhood Guide
Bend Pets Craigslist
Epro Warrant Search
Soccer Zone Discount Code
Grandview Outlet Westwood Ky
Saatva Memory Foam Hybrid mattress review 2024
Officialmilarosee
Gia_Divine
Welcome to GradeBook
Satisfactory: How to Make Efficient Factories (Tips, Tricks, & Strategies)
Crawlers List Chicago
Uta Kinesiology Advising
Shopmonsterus Reviews
Dcf Training Number
Who is Jenny Popach? Everything to Know About The Girl Who Allegedly Broke Into the Hype House With Her Mom
Bennington County Criminal Court Calendar
Gotcha Rva 2022
Walgreens 8 Mile Dequindre
Turbo Tenant Renter Login
4 Times Rihanna Showed Solidarity for Social Movements Around the World
Safeway Aciu
Annapolis Md Craigslist
Pay Stub Portal
Stouffville Tribune (Stouffville, ON), March 27, 1947, p. 1
Mia Malkova Bio, Net Worth, Age & More - Magzica
Watchdocumentaries Gun Mayhem 2
2016 Honda Accord Belt Diagram
Why The Boogeyman Is Rated PG-13
In Polen und Tschechien droht Hochwasser - Brandenburg beobachtet Lage
Lake Andes Buy Sell Trade
Jetblue 1919
Yakini Q Sj Photos
Craigslist Cars For Sale By Owner Memphis Tn
Peugeot-dealer Hedin Automotive: alles onder één dak | Hedin
Ubg98.Github.io Unblocked
Pulpo Yonke Houston Tx
Escape From Tarkov Supply Plans Therapist Quest Guide
The Ultimate Guide To 5 Movierulz. Com: Exploring The World Of Online Movies
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 5758

Rating: 4.9 / 5 (49 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.