3G Networks allow a wider radio spectrum that allows faster data transmission Allows for advanced technology, multimedia services and larger network capacity Carriers can deliver 3G at a reduced cost compared to 2G 3G networks allow a wider variety of cell phones to operate on the network Business men with 3G cell phones are able to travel globally without renting or buying new phones due to the 3G network Allows location based services like weather reports on the mobile 3G is cheaper for providers; however, plans are more expensive due to the high cost of implementation of 3G network 3G enables video calls, therefore, business conferencing between cities, states, and even countries Picture messaging allows products, progress or problems to be shown visually Applications that are more data intensive can be developed and used 3G networks allow everyday people to access music, pictures, and videos with ease creating a bigger and open market for those industries in advertising Extremely faster than previous networks Increase in handset internet usage lead to businesses using social networking applications to advertise Overcrowding is relieved in existing systems with radio spectrum Provides interoperability among service providers Support to devices with backward compatibility with existing networks
The Disadvantages of 3G networks 3G network implementation may be costly 3G plan prices for cell phones are much higher than 2G The cost of cellular infrastructure, upgrading base stations is very high Needs different handsets Roaming and data/voice work together has not yet been implemented Power consumption is high Requires closer base stations and are expensive Spectrum-license costs, network deployment costs and handset subsidies subscribers are tremendous The technology is hard to fix and if broken it would be expensive to get fixed Migration Strategies The migration to 3G is not just based on evolving core networks and the radio interface to IMT 2000 Compliant systems. Migration towards 3G would also be based on the following steps/technologies: Network upgrades in the form of EDGE, GPRS, HSCSD, CDPD, IS-136+, HDR etc. Evolution to 2.5G basically will provide support for high speed packet data. Though these technologies are extensions to 2G rather than precursors to 3G these will have a major impact either by proving demand for specific services Service trials to test infrastructure, handsets and applications etc Introduction of WAP-based services that bring the web to the wireless phone. In short-term WAP and, in longer term, XML will provide a standard framework for accessing wireless Internet content, enabled by 2.5G/3G The development of mobile web portals Development of micro browsers and operating Wide acceptance of short-range wireless connectivity technologies like Bluetooth, HomeRF etc 3G Architecture The 3G network will have a layered architecture, which will enable the efficient delivery of voice and data services. Layered network architecture, coupled with standardized open interfaces, will make it possible for the network operators to introduce and roll out new services quickly. Using IP or ATM or a combination of both, this layer will handle all data and voice info. The layer consists of the core network equipment like routers, ATM switches and transmission equipment. Other equipment provides support for the core bit stream of voice or data, providing QOS etc The application layer on top will provide open application service interfaces enabling flexible service creation. This user application layer will contain services for which the end user will be willing to pay. These services will include ecommerce, GPS and other differentiating services. In between the application layer and the connectivity layer, will run the control layer with MSC servers, support servers, HLR etc. These servers are needed to provide any service to a subscriber.
2. IMT 2000 and UMTS
Existing second-generation mobile telecommunications Systems (e.g. GSM) were primarily developed for voice Telephony. However, the air interfaces only permit simple data services involving transfer rates of up to 9.6 kbit/s. For "Phase 2+" of GSM, higher data transmission rates of up to 115 kbit/s are possible. With IMT-2000/UMTS, this restriction no longer exists: IMT-2000/UMTS will make it possible to provide personal, mobile, broadband multi-media services with transmission rates of up to 2 Mb/s. The range of services possible with IMT-2000/UMTS will also include new broadband multimedia applications, such as video, as well as the existing voice telephony and data transmission services. IMT-2000/UMTS satisfies the need of mobile users for access to the various multi-media services that are currently available and those yet to be developed (Internet/intranet, video telephony, online shopping, ecommerce, video-on-demand, etc.), irrespective of location and tailored to their individual requirements. As IMT-2000/UMTS is a further development of existing mobile networks and services and not a replacement for them, the step from GSM to IMT-2000/UMTS should be regarded as an evolution of the mobile telecommunications market rather than a revolution. IMT-2000/UMTS offers existing GSM operators a great business opportunity to expand their range of services. The great innovation potential of multi-media applications should also encourage new players onto the market, whether they are operators, service providers or content providers, and not necessarily just from the telecommunications sector, but from other areas affected by IMT-2000/UMTS such as information technology and the media.
UMTS Architecture
Mobile-services Switching Centre (MSC) An exchange performing all the switching and signalling functions (CS only) for mobile stations MSC controls mobile-originated and mobile-terminated CS calls Functions call management Mobility management (handling attach and authentication) Subscriber administration Maintenance of charging data (for radio network usage) CS data services (FAX, modem) Supplementary call services (call forwarding, etc.) SS7-based signaling Main difference to an exchange in a fixed network: deal with mobility (e.g. location registration, handover) Gateway MSC (GMSC) Provides interconnection between the UMTS core network and external PSTN/ISDN networks GPRS Support Node (GSN) GSNs constitute the interface between the radio access network and the fixed networks for packet switched services (similar to MSC for CS calls) Serving GSN (SGSN) Session management Mobility management Subscriber database management (interface with HLR) Maintenance of charging data (for radio network usage) IP-based transport of user data between SGSN and the UTRAN IP- or SS7-based signaling transport Gateway GSN (GGSN) Gateway for UMTS packet service to external data networks (e.g. the Internet) IP interface towards SGSN performs user data screening and security Maintenance of charging data (for external data network usage)
Home Location Register (HLR) Home (primary) data base in charge of the management of mobile subscribers Basic information: International Mobile Subscriber Identity (IMSI) CS subscription information One or more Mobile Subscriber International ISDN number(s) (MSISDN) PS subscription information Zero or more Packet Data Protocol (PDP) address (es) Permission for GGSN to dynamically allocate PDP addresses for a subscriber Location information enabling the charging and routing of calls towards the MSC or SGSN where the MS is registered (e.g. VLR Number) Other information: teleservices and bearer services subscription information Service restrictions (e.g. roaming limitation) Parameters attached to supplementary services
Visitor Location Register (VLR) (Secondary) data base supporting the management of mobile subscribers currently located within its VLR area Motivation: minimize load for HLR (i.e. of the primary data base) Tasks: Control MSs roaming in an MSC assigned to it exchange information with HLR to allow the proper handling of calls Information maintained by VLR (for call handling): International Mobile Subscriber Identity (IMSI) Mobile Station International ISDN number (MSISDN) Mobile Station Roaming Number (MSRN) Temporary Mobile Station Identity (TMSI), if applicable Location area where the mobile station has been registered The last known location and the initial location of the MS Supplementary service parameters attached to the mobile subscriber (received from the HLR) Authentication Centre (AuC) Stores data for each mobile subscriber To authenticate the International Mobile Subscriber Identity (IMSI) To support ciphering of the communication over the radio path The AuC transmits the data needed for authentication and ciphering via the HLR to the VLR, MSC and SGSN which need to authenticate a mobile station AuC is associated with an HLR, and stores an identity key for each mobile subscriber The AuC communicates solely with its associated HLR (H-interface)
Equipment Identity Register (EIR) Logical entity storing the International Mobile Equipment Identities (IMEIs) Equipment is classified as White listed: serial number of equipment Grey listed: equipment tracked by network Black listed: barred equipment Unknown to EIR Other CN entities SMS Gateway MSC (SMS-GMSC) Gateway between Short Message Service Center and PLMN deliver SMSs from service center to MS SMS Interworking MSC (SMS-IWMSC) Gateway between PLMN and Short Message Service Center deliver SMSs from MS to service center Interworking Function (IWF) associated with MSC supports interworking of PLMN with fixed networks, e.g. ISDN, PSTN, PDN (protocol conversion) Border Gateway (BG) PS gateway to other PLMNs Firewall functionality Charging Gateway Functionality (CGF) collects charging records from SGSNs and GGSNs
3. User Equipments In the Universal Mobile Telecommunication System (UMTS) and 3GPP Long Term Evolution (LTE), user equipment (UE) is any device used directly by an end-user to communicate. It can be a hand-held telephone, laptop computer equipped with a mobile broadband adapter, or any other device. It connects to the base station, Node-B/ eNodeB as specified in the ETSI125/136-series and 3GPP 25/36-series of specifications. It corresponds to the mobile station (MS) in GSM systems. The radio interface between the UE and the Node B is called UU. The radio interface between the UE and the eNodeB-B is called LTE-UU. The protocols are transmitted transparently via a Node B, that is, Node B does not change, use or understand the information. These protocols are also referred to as Non Access Stratum protocols. The UE is a device which initiates all the calls and its the terminal device in a network. Functionality UE handles the following tasks towards the core network: Mobility management Call control Session management Identity management Tasks of UE UE as Node B a) Encoding, Interleaving b) Spreading, Modulation c) Power control UE as RNC a) Acknowledged transmission b) Hand over, Cell Selection UE as CN a) Location Registration, Authentication b) Bearer Negotiation, Service Request
4. Radio Network Subsystem
Radio Network Controller The Radio Network Controller ( RNC) is a governing element in the UMTS radio access network (UTRAN). It is responsible for controlling the Node Bs that are connected to it. RNC carries out radio resource management, mobility management functions. It connects to the Circuit Switched Core Network through Media Gateway and to the Serving GPRS Support Node in the packet Switched Core Network.
Node B Node B is equivalent to the BTS (base transceiver station) description used in GSM. It is the hardware that is connected to the mobile phone network that communicates directly with mobile handsets. Node B uses the air interface technology. The Node Bs has minimum functionality, and is controlled by the RNC. Node B consists of a radio signal transmitter and a Radio signal receiver. The UTRAN consists of one or more RNS. It controls the allocation and release specific radio resources to establish a connection between UE &UTRAN. It is responsible for resources and transmission reception in a group of cells.
5. UTRAN: Universal Terrestrial Radio Access Network Architecture
UTRAN (short for "Universal Terrestrial Radio Access Network") is a collective term for the Node Bs and Radio Network Controller (RNCs) which make up the UMTS radio access network. This communications network, commonly referred to as 3G UTRAN allows connectivity between the UE (user equipment) and the core network. RNC provides control functionalities for one or more Node Bs. A Node B and an RNC can be the same device, RNC located in a central office serving multiple Node Bs. there is a logical interface between them known as the IUB. The RNC and its corresponding Node Bs are called the Radio Network Subsystem (RNS). There can be more than one RNS present in a UTRAN. There are four interfaces connecting the UTRAN internally or externally to other functional entities: IU, UU, IUB and IUR. The IU interface is an external interface that connects the RNC to the Core Network (CN). The UU is also external, connecting the Node B with the User Equipment (UE). IUB is an internal interface connecting the RNC with the Node B. The IUR interface which is an internal interface most of the time, but can, exceptionally be an external interface too for some network architectures. The IUR connects two RNCs with each other. Functions of RNC Functions of Radio Network controller is classified into two 1. in Relationship with End User Devices. a) SRNC Serving Radio Network Controller. b) DRNC Drift Radio Network Controller. 2. in Relationship with Node-Bs. a) CRNC Controlling Radio Network Controller Serving RNC Serving RNC has the responsibility to terminate the Link layer communications. It exerts control for new mobiles and services attempting to access the core network. It also ensures that the mobile devices are using allocated bandwidth, noise ratio and frequency Drift RNC It is the place where the physical layer communication terminates. If there is no active or progressive hand over, Drift RNC will act as Serving RNC. The DRNC does not perform any processing of user data (beyond what is required for correct operation of the physical layer). Controlling RNC It is responsible for controlling the resources of Node-B If new radio links (RLs) are to be established CRNC does the job. Also it is responsible for Load and congestion control. 6. USIM: Universal Subscriber Identity module With the introduction of UMTS or 3G, it's highly recommended to use a USIM card to access UMTS network. It has great efficiency & band width It stores user subscriber information, authentication information for text messages. For authentication purposes, the USIM stores a long-term pre shared secret key, which is shared with the Authentication Center (AuC) in the network. A 3G (UMTS) handset equipped with a USIM card can be used to make video calls, assuming the calling area is covered by a 3G network. Contacts in the USIM are stored much more securely on the USIM as compared to using the phone memory. Difference between usim & sim A USIM is a tiny computer which is able to handle several mini applications, for instance a contactless e-purse for the subway, a local service portal giving you access to your phone bill, etc; A 3G (UMTS) handset equipped with a USIM card can be used to make video calls, assuming the calling area is covered by a 3G network; Regarding security, a new algorithm is integrated (it's derived from recent researches in cryptology). It allows to protect you from unauthorized access to your phone line, and therefore to be charged with fraudulent calls on your bill; Your calls and data exchanges are encrypted using keys computed by the USIM, and these keys are stronger than those provided by SIMs. The phonebook is much bigger on the USIM, allowing thousands of contacts (instead of a maximum of 255 in a SIM). Each USIM contact is also richer, for instance it can contain email addresses, a second or third phone number, etc; Contacts in the USIM are stored much more securely on the USIM as compared to using the phone memory. 7. Protocol Stack The protocol stack is an implementation of a computer networking protocol suite. The terms are often used interchangeably. Strictly speaking, the suite is the definition of the protocols, and the stack is the software implementation of them. In practical implementation, protocol stacks are often divided into three major sections. Media, transport, and applications. The media-to-transport interface defines how transport protocol software makes use of particular media and hardware types ("card drivers"). For example, this interface level would define how TCP/IP transport software would talk to Ethernet hardware. The application-to-transport interface defines how application programs make use of the transport layers. For example, this interface level would define how a web browser program would talk to TCP/IP transport software. Examples of these interfaces include Berkeley sockets and System V STREAMS in the Unix world, and Winsock in the Microsoft world. Characteristics Support Interoperability Flexibility Performance Support Support is definitely the most important aspect of a protocol stack. Without strong support for the protocol stack selected you should expect delays and complications. Support to me can be split into 3 aspects: Documentation you must have good, detailed documentation for the protocol stack. Customer support when you have questions, you should have a point of contact to ask, with a structured support contract in place to meet your needs. Patches and upgrades as standards evolve, and requirements change, you should be able to grow your product and for that you need a protocol stack that is being maintained and enhanced accordingly. Interoperability Protocols is for a very specific purpose & to make products from different vendors work together (interoperate). Interoperability is not easy to achieve and requires a lot of effort from the protocol stack . The protocol stack vendor in question does interoperability testing in the relevant interoperability events. See that the vendor has track record in providing interoperable solutions. An advantage would be a vendor that sits in the standardization organizations this way, you will get the latest interoperable solutions. Flexibility Make sure its flexible enough not only to meet your current needs but also for other purposes you might have in the future. If youre developing a videophone today, and you might need to build a small gateway later or a home PBX Make sure the solution you get is flexible enough to meet your needs. Otherwise, youll need to get another protocol stack or product and then learn, design and implement your next product from scratch. Performance Performance is important but it comes last in my list. You will need it. It will make a difference. But first make sure the other 3 characteristics are met first. Performance is needed for all kinds of products terminals and servers alike. For terminals, memory and footprint will be the main issue. For servers, memory and calls per second will be the main issue. Applications The Protocol Stack Design pattern can be used to implement any type of layered protocol. It can be also used when different operations on an entity need to be performed in a pipeline fashion. Each stage of the pipeline could be modeled as a layer. This pattern is particularly useful in applications involving dynamic layer manipulation. Dynamically adding layers to handle demands from the user session (e.g. enabling encryption) Debugging inter-layer interactions by adding a pass-through debug only layer. Testing higher layers of a protocol by adding a special loop-back layer to connect the lower layer transmit and receive. Emulating a node by configuring a echo-back layer to connect the higher layer transmit and receive.
8. CS And PS Domains
Packet-switched describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet. Breaking communication down into packets allows the same data path to be shared among many users in the network. This type of communication between sender and receiver is known as connectionless (rather than dedicated). Most traffic over the Internet uses packet switching and the Internet is basically a connectionless network. Contrasted with packet-switched is circuit-switched, a type of network such as the regular voice telephone network in which the communication circuit (path) for the call is set up and dedicated to the participants in that call. For the duration of the connection, all resources on that circuit are unavailable for other users. Voice calls using the Internet's packet-switched system are possible. Each end of the conversation is broken down into packets that are reassembled at the other end. Circuit Switching uses a dedicated path between two stations has three phases establish transfer disconnect inefficient channel capacity dedicated for duration of connection if no data, capacity wasted set up (connection) takes time once connected, transfer is transparent
Packet Switching circuit switching was designed for voice packet switching was designed for data transmitted in small packets packets contains user data and control info user data may be part of a larger message control info includes routing (addressing) info packets are received, stored briefly (buffered) and past on to the next node
9. IMS Architecture The third-generation partnership project (3GPP) has proposed IMS in Release 5 on Internet Protocol version 6 (IPv6), but it is negotiated for IPv4 because the industry is not ready to migrate to IPv6 now. IMS is a person-to-person service that enriches the way people communicate with each other by Combining voice, image, and video into a single session. IMS uses SIP and session description protocol (SDP) underneath architecture to communicate between various IMS components.
IMS Overview
IMS is defined by 3GPP as a new subsystem, i.e., a new mobile network infrastructure that enables the convergence of data, speech, and mobile network technology over an IPbased infrastructure.
IMS was designed to fill the gap between the existing traditional telecommunications technology and Internet technology, which increased bandwidth alone cannot do. This will allow operators to offer new, innovative services that shareholders and end users are expecting.
The architecture of IMS specifically helps enable and enhance real-time multimedia mobile services such as rich voice services, video telephony, messaging, conferencing, and push services.
IMS enables these user-to-user communication services via a number of key mechanisms such as session negotiation and management, quality of service (QoS) and mobility management. However, IMS enables much more than just real-time user-to-user services.
Proxy Call Session Control Function (PCSCF)
This is the first point of contact in the IMS for a user element (UE). The PCSCF may be in the home or visited network. SIP register/invite methods are initially terminated to PCSCF, and it ensures that registration/session requests are passed to the correct home network or that SIP messages are passed to the correct serving CSCF (SCSCF).
The major role of PCSCF is to route information to the correct SCSCF so it can support the path and service-route headers. PCSCF will maintain two route header lists. The first header list is created during the registration procedure. It is used only to validate the routing information in the initial request. This list is valid during the entire registration. The second header list is created from the record-route headers in the initial invite and associated responses. This list is valid during the call. Once the call is terminated, the second route list is discarded.
Interrogating Call Session Control Function (ICSCF) ICSCF is the entity of the home network that is able to determine the SCSCF from which users should register. ICSCF queries a home subscriber server (HSS) to get the name and capability of the SCSCF. Once SCSCF begins identifying, ICSCF could be removed from the signaling.
The exception to this is as follows: if the topology hiding internetwork gateway (THIG) of I CSCF is being used, ICSCF shall apply topology hiding to all headers, which reveal topology information (e.g., via, route, record-route, service-route, P-charging-function-addresses headers).
Serving Call Session Control Function (SCSCF)
The SCSCF is the function that registers the users and provides service to them. The SCSCF is acting as the SIP registrar for all UEs of IMS. It performs routing and translation, provides billing information to mediation systems, maintains session timers, and interrogates the HSS to retrieve authorization.
Media Gateway Control Function (MGCF)
IMS is designed to integrate with PSTNs and traditional telephony services such as 800 numbers, caller ID, and local number portability. MGCF is used to transfer nonSIP packetized voice to SIP user agent (UA) and vice versa.
If the calls are originating or terminating on the PSTN, the MGCF converts the PSTN time division multiplex (TDM) voice bit stream to an IP real-time transport protocol (RTP) stream and direct it to the IP address of the corresponding IP phone.
Media Resource Function (MRF)
MRF is divided into two parts: multimedia resource function controller (MRFC) and multimedia resource function processor (MRFP).
Tasks of MRFC are as follows:
Control the media stream resources in the MRFP Interpret information coming from an application server (AS) and S-CSCF (e.g., session identifier) and control MRFP accordingly Generate charging data records (CDR)
Tasks of MRFP are as follows:
Control the bearer on the Mb reference point Provide resources to be controlled by the MRFC Mix incoming media streams (e.g., for multiple parties) Determine media stream source (e.g., for multimedia announcements) Handle media stream processing (e.g., audio transcoding, media analysis) Floor control (i.e., manage access rights to shared resources in a conferencing environment)
Interconnect Border Control Function (IBCF)
IBCF functionality includes the provision of network address port translation (NAPT) and firewalls. It also provides conversion between IPv4 and IPv6. IBCF controls media exchange, signaling, and policies across the operator boundary.
Home Subscriber Server
HSS is a master database for users subscription-related information. It supports the IMS entity to establish the registration/call control. HSS is the superset of the home location register (HLR) and provides users physical location. HSS is operated in IP core networks and can be contacted through diameter protocol.
It is connected to IMS network via Sh (AS) and Cx (SCSCF) interfaces.
SIP AS
When processing SIP requests, SIP AS acts as follows:
AS acts as a terminating UA or redirect server for SIP requests AS acts as an originating UA for SIP requests AS acts as a SIP proxy for SIP requests AS acts as a call control/back-to-back UA (B2BUA) AS does not act at all for particular SIP requests
As such, a SIP AS is connected to SCSCF through an IMS service control (ISC) interface. The ISC interface is also connected to IP multimedia service switching function (IMSSF) and open service access service capability server (OSASCS). IMSSF provides interworking for SIP messages to a corresponding customized application of mobile enhanced logic (CAMEL), American National Standards Institute (ANSI)41, intelligent network application part (INAP) and transactional capabilities application part (TCAP). OSASCS acts as a secure gateway between an underlying network and an application with OSA architecture.
10. Handover The continuation of an active call is one of the most important quality measurements in cellular systems. Handoff process enables a cellular system to provide such a facility by transferring an active call from one cell to another. Handoffs are broadly classified into two categorieshard and soft handoffs. Usually, the hard handoff can be further divided into two different typesintra- and intercell handoffs. The soft handoff can also be divided into two different typesmulti way soft handoffs and softer handoffs.
(Figure Hard handoff between the MS and BSs.) A hard handoff is essentially a break before make connection. Under the control of the MSC, the BS hands off the MSs call to another cell and then drop the call. In a hard handoff, the link to the prior BS is terminated before or as the user is transferred to the new cells BS; the MS is linked to no more than one BS at any given time. Hard handoff is primarily used in FDMA (frequency division multiple access) and TDMA (time division multiple access), where different frequency ranges are used in adjacent channels in order to minimize channel interference. So when the MS moves from one BS to another BS, it becomes impossible for it to communicate with both BSs (since different frequencies are used). A soft handover is one in which the channel in the source cell is retained and used for a while in parallel with the channel in the target cell. In this case the connection to the target is established before the connection to the source is broken, hence this handover is called make-before-break. The interval, during which the two connections are used in parallel, may be brief or substantial. For this reason the soft handover is perceived by network engineers as a state of the call, rather than a brief event. Soft handovers may involve using connections to more than two cells: connections to three, four or more cells can be maintained by one phone at the same time. When a call is in a state of soft handover, the signal of the best of all used channels can be used for the call at a given moment or all the signals can be combined to produce a clearer copy of the signal. The latter is more advantageous, and when such combining is performed both in the downlink (forward link) and the uplink (reverse link) the handover is termed as softer. Softer handovers are possible when the cells involved in the handovers have a single cell site.
11. 3.5G and 3.9G a brief discussion 3.5G is faster than 3G. It is actually means HSDPA-High Speed Downlink Packet Access networks which is based on Universal Mobile Telecommunications System (UMTS) to have higher data transfer speeds and capacity. Currently it is now supporting 1.8 mbps or 3.5 mbps in downlink speed. Its data bearing achieved the speed of 384 kbps while the previous was 128 kbps.
3.9G With High Speed Internet (3.9G) from touch you can enjoy a richer, much faster, and more reliable internet connection on the go, using your compatible mobile phone, tablet or The high speed means you can now benefit from new services such as TV/Video Streaming and Video Calling. Why 3.9G ? Higher internet speed up to 21.6 Mbps* Higher upload/download speeds Seamless TV and video streaming experience: high speed internet means videos can be directly streamed with no more buffering. Watching TV or Online videos, via handset or computer, is really fast! Video Calling: you can now hear and see the person you are calling, provided they have a proper 3.9G coverage and a compatible device. Online gaming: real-time online gaming is possible with multiple players around the globe. 12. 4G LAN and Cellular Networks 4G is not one defined technology or standard, but rather a collection of technologies at creating fully packet-switched networks optimized for data. 4G Networks are projected to provide speed of 100Mbps while moving and 1Gbps while stationary. 0G (Zero Generation Mobile System) At the end of the 1940s, the first radio telephone service was introduced, and was designed to users in cars to the public land-line based telephone network. In the 1960s, a system launched by Bell Systems, called, Improved Mobile Telephone Service (IMTS), brought quite a few improvements such as direct dialing and more bandwidth. The very first analog systems were based upon IMTS and were created in the late 60s and early 70s. 1G Technology 1G refers to the first-generation of wireless telephone technology was developed in 1970s. 1G had two major improvements: the invention of the microprocessor The digital transform of the control link between the phone and the cell site. Analog signal 2G Technology Around 1980s Better quality & capacity - More people could use there phones at the same time Digital Signals consist of 0s & 1s Digital consist of 0s and 1s Digital signal: 1. Low level, 2.High level, 3.Rising edge and 4.Falling edge
Digital data can be compressed and multiplexed much more effectively than analog voice encodings Multiplexing -multiple analog message signals or digital data streams are combined into one signal For 1 and 2G standards, bandwidth maximum is 9.6 Kbit/sec, (I.E) approximately 6 times slower than an ISDN Allows for lower powered radio signals that require less battery PowerCODEC introduction -program that encodes and decodes digital data stream or signal 1. Translates data from digital to analog and vice versa Advantages in Previous Technology - 2G The digital voice encoding allows digital error checking increase sound quality lowers the noise level Going all-digital allowed for the introduction of digital data transfer SMS short message service E-mail Disadvantages in Previous Technology - 2G Cell towers had a limited coverage area Jagged Decay curve Abrupt dropped calls Analog gradual sound reduction Spotty coverage
3G Technology Large capacity and broadband capabilities Allows the transmission of 384kbps for mobile systems and up to 2Mbps Increased spectrum efficiency 5Mhz A greater number of users that can be simultaneously supported by a radio frequency bandwidth High data rates at lower incremental cost than 2GGlobal roaming CDMA Code Division Multiple Access Form of multiplexing Does not divide up the channel by time or frequency Encodes data with a special code associated with each channel What is 4G? Fourth Generation Technology Faster and more reliable 100 Mb/s Lower cost than previous generations Multi-standard wireless system Bluetooth, Wired, Wireless Ad Hoc Networking IPv6 Core OFDM used instead of CDMA Potentially IEEE standard 802.11n Most information is proprietary Communications Architecture Broadcast layer: fix access points, (i.e.) cell tower connected by fiber, microwave, or satellite (ISP)
Ad-hoc/hot-spot layer: wireless LANs (i.e. internet at Starbucks) Communications Architecture Personal Layer Gateway: devices that connect to upper layers; cell phone, fax, voice, data modem, MP3 players, PDAs Info-Sensor layer: environmental sensors Fiber-optic wire layer: high speed subterranean labyrinth of fiber optic cables and repeaters Ad Hoc Networks
Spontaneous self organization of networks of devices Not necessarily connected to internet 4G will create hybrid wireless networks using Ad Hoc networks Form of mesh networkingVery reliable Enhance Mobile Gaming Experience enhance wireless capabilities that deliver mobile gaming interaction with less than five seconds Play online multi player games while traveling at high speeds or sitting outside
Broadband access in Remote location 4G will provide a wireless alternative for broadband access I will provide first opportunity for broadband access in remote locations without an infrastructure to support cable or DSL access. 13. Long Term Evolution (LTE) It was started as a project in 2004 by telecommunication body known as the Third Generation Partnership Project (3GPP). LTE evolved from an earlier 3GPP system known as the Universal Mobile Telecommunication System (UMTS), which in turn evolved from the Global System for Mobile Communications (GSM). The main goal of LTE is to provide a high data rate, low latency and packet optimized radio access technology supporting flexible bandwidth deployments. Advantages of LTE High throughput. Low latency. FDD and TDD in the same platform. Superior end-user experience. Seamless Connection. Plug and play. Simple architecture. LTE-Network Architecture The high-level network architecture of LTE is comprised of following three main components: The User Equipment (UE). The Evolved UMTS Terrestrial Radio Access Network (E-UTRAN). The Evolved Packet Core (EPC). The evolved packet core communicates with packet data networks in the outside world such as the internet, private corporate networks or the IP multimedia subsystem. The interfaces between the different parts of the system are denoted Uu, S1 and SGi as shown below:
The E-UTRAN (The access network) The architecture of evolved UMTS Terrestrial Radio Access Network (E-UTRAN) has been illustrated below.
The E-UTRAN handles the radio communications between the mobile and the evolved packet core and just has one component, the evolved base stations, called eNodeB or eNB. Each eNB is a base station that controls the mobiles in one or more cells. LTE Mobile communicates with just one base station and one cell at a time and there are following two main functions supported by eNB: *** The eNB sends and receives radio transmissions to all the mobiles using the analogue and digital signal processing functions of the LTE air interface. *** The eNB controls the low-level operation of all its mobiles, by sending them signaling messages such as handover commands. The Evolved Packet Core (EPC) (The core network) The architecture of Evolved Packet Core (EPC) has been illustrated below:
Components of EPC Architecture The Home Subscriber Server (HSS) component has been carried forward from UMTS and GSM and is a central database that contains information about all the network operator's subscribers. The Packet Data Network (PDN) Gateway (P-GW) communicates with the outside world i.e., packet data networks PDN, using SGi interface. Each packet data network is identified by an access point name (APN). The PDN gateway has the same role as the GPRS support node (GGSN) and the serving GPRS support node (SGSN) with UMTS and GSM. The serving gateway (S-GW) acts as a router, and forwards data between the base station and the PDN gateway. The mobility management entity (MME) controls the high-level operation of the mobile by means of signaling messages and Home Subscriber Server (HSS). The Policy Control and Charging Rules Function (PCRF) is a component which is not shown in the above diagram but it is responsible for policy control decision-making, as well as for controlling the flow-based charging functionalities in the Policy Control Enforcement Function (PCEF), which resides in the P-GW. The interface between the serving and PDN gateways is known as S5/S8. This has two slightly different implementations, namely S5 if the two devices are in the same network, and S8 if they are in different networks. LTE-Radio Protocol Architecture The radio protocol architecture for LTE can be separated into control plane architecture and user plane architecture as shown below:
User Plane: The user plane protocol stack between the e-Node B and UE consists of the following sub-layers: PDCP (Packet Data Convergence Protocol) RLC (radio Link Control) Medium Access Control (MAC).
Control plane The control plane includes additionally the Radio Resource Control layer (RRC) which is responsible for configuring the lower layers. The Control Plane handles radio-specific functionality which depends on the state of the user equipment which includes two states: idle or connected. In idle mode, the user equipment camps on a cell after a cell selection or reselection process where factors like radio link quality, cell status and radio access technology are considered. The UE also monitors a paging channel to detect incoming calls and acquire system information. In this mode, control plane protocols include cell selection and reselection procedures. In connection mode, the UE supplies the E-UTRAN with downlink channel quality and neighbor cell information to enable the E-UTRAN to select the most suitable cell for the UE. In this case, control plane protocol includes the Radio Link Control (RRC) protocol. The protocol stack for the control plane between the UE and MME is shown below:
The grey region of the stack indicates the access stratum (AS) protocols. The lower layers perform the same functions as for the user plane with the exception that there is no header compression function for the control plane.
Protocol Stack Layers
Physical Layer (Layer 1) Physical Layer carries all information from the MAC transport channels over the air interface. Takes care of the link adaptation (AMC), power control, cell search (for initial synchronization and handover purposes) and other measurements (inside the LTE system and between systems) for the RRC layer. Medium Access Layer (MAC) MAC layer is responsible for Mapping between logical channels and transport channels. Multiplexing of MAC SDUs from one or different logical channels onto transport blocks (TB) to be delivered to the physical layer on transport channels. de multiplexing of MAC SDUs from one or different logical channels from transport blocks (TB) delivered from the physical layer on transport channels. Scheduling information reporting, Error correction through HARQ, Priority handling between UEs by means of dynamic scheduling, Priority handling between logical channels of one UE, Logical Channel prioritization. Radio Link Control (RLC) RLC operates in 3 modes of operation: Transparent Mode (TM), Unacknowledged Mode (UM), and Acknowledged Mode (AM). RLC Layer is responsible for transfer of upper layer PDUs, error correction through ARQ (Only for AM data transfer), Concatenation, segmentation and reassembly of RLC SDUs (Only for UM and AM data transfer). RLC is also responsible for re-segmentation of RLC data PDUs (Only for AM data transfer), reordering of RLC data PDUs (Only for UM and AM data transfer), duplicate detection (Only for UM and AM data transfer), RLC SDU discard (Only for UM and AM data transfer), RLC re- establishment, and protocol error detection (Only for AM data transfer). Radio Resource Control (RRC) The main services and functions of the RRC sub layer include broadcast of System Information related to the non-access stratum (NAS). Broadcast of System Information related to the access stratum (AS), Paging. Establishment, maintenance and release of an RRC connection between the UE and E- UTRAN. Security functions including key management, establishment, configuration, maintenance and release of point to point Radio Bearers. Packet Data Convergence Control (PDCP) PDCP Layer is responsible for Header compression and decompression of IP data, Transfer of data (user plane or control plane). Maintenance of PDCP Sequence Numbers (SNs), In-sequence delivery of upper layer PDUs at re-establishment of lower layers. Duplicate elimination of lower layer SDUs at re-establishment of lower layers for radio bearers mapped on RLC AM. Ciphering and deciphering of user plane data and control plane data. Integrity protection and integrity verification of control plane data Timer based discards, duplicate discarding. PDCP is used for SRBs and DRBs mapped on DCCH and DTCH type of logical channels. Non Access Stratum (NAS) Protocols The non-access stratum (NAS) protocols form the highest stratum of the control plane between the user equipment (UE) and MME. NAS protocols support the mobility of the UE and the session management procedures to establish and maintain IP connectivity between the UE and a PDN GW. 14. WiMax Internetworking with 3GPP WiMAX Forum members are working with other industry groups, including the Wi-Fi Alliance, to enable seamless handoffs between multiple wireless standards, furthering the development of a cohesive wireless ecosystem. WiMAX Forum is also collaborating with groups like 3GPP on implementing IMS with WiMAX networks. The 3GPP specifies the IP multimedia subsystem (IMS) to provide several kinds of multimedia services in UMTS Release 5 and later releases. Interworking at the service layer between 3GPP and WiMAX networks requires interworking between IMS functionality. By studying several interconnection scenarios and the main functionality of IMS, WiMAX can support different levels of services. Special attention is paid at the session negotiation level, using SIP, COPS/Go and Diameter protocols/interface to provide session negotiation with QoS and AAA (authentication authorization accounting) support.
Future mobile communication networks are evolving from traditional circuit-switched architectures to an all-IP based structure. It is suggested that the mobile networks should be integrated by a high-bandwidth IP-based core network and a variety of wireless access technologies such as UMTS or WiMAX. Mobile terminals will be able to access different multimedia applications and advanced services while roaming across zones covered by different access technologies. Currently, 3GPP is developing a feasibility study on providing seamless service continuity between UMTS and WLAN.
Interworking between different networks can be viewed from different aspects. The most important aspect is the session negotiation level, which provides service continuity from the user perspective. At this level, the protocol used by 3GPP is Session Initiation Protocol (SIP), which is the foundation of the IMS architecture defined to support real-time multimedia services in future mobile networks. The levels of convergence may be classified into convergence of service, network and technique. The goal is to share a service system based on interworking. Providing a uniform service experience for users, through a uniform service system, would enable customers to use different terminal devices to access heterogeneous networks, to access the same service, and to achieve common billing and session management. Service convergence is the first step of the convergence. Seamless roaming and handoff between different networks is the main problem. There are significant differences between the PHY technique of 3GPP and WiMAX. IMS Architecture
Within the UMTS core network, IMS is defined by the 3GPP as the component that provides support for multimedia services (e.g. voice and video) based on packet switching with QoS and the provision of AAA. The above figure shows a general view of IMS architecture. From this we can appreciate how the core network is organized in two networks: a signaling or control network and a data or transport network. The signaling network is composed of a set of call session control function nodes (CSCFs). They are signaling proxies whose task is to establish, modify and release media sessions with guaranteed QoS and AAA and charging support. Note that user equipment (UE) gains access to the IMS via UMTS terrestrial radio access network (UTRAN), which is responsible for providing access for mobile stations and managing terminal mobility. SIP, COPS, and Diameter are the major protocols involved in this architecture. 1. Interworking architecture and interworking level Two interworking modes
There are two methods for WiMAX networks to interwork with other wireless networks: loose couple and tight couple. There is little difference between loose couple and existing networks; WiMAX utilizes the AAA server of 3GPP network, and data streams are not passed through the core network of 3GPP. This methods guarantees the independence of WiMAX network, however it results in high handover latency between two networks. Therefore, it is not suitable for real- time services.
In tight couple mode, the data streams of WiMAX must pass through the RNC and the core network of 3GPP, so each of the existing networks must modify their protocols, interfaces and services to meet the requirements of interworking. The BS of WiMAX connects with RNC of WCDMA or SGSN directly. The advantage of this mode is that it reduces the handoff latency and guarantees seamless handoff. If different operators own both 3G and WiMAX networks, the integration would be troublesome for the open of network interface.
2. Interworking levels
WiMAX is commonly used to transport IP packets. Thus 3GPP-WiMAX interworking should be built on the top of the IP protocol and not be limited to a specific WiMAX technology. Different interconnection levels must be defined to represent different operational capabilities. These levels are suitable for either interworking mode.
Six interconnection levels between WLAN and 3GPP were taken into consideration. As well as the operational capabilities of each of them, based on the interconnection levels. The interworking is not limited to 3GPP and WLAN, but also includes the internetworking between 3GPP and other wireless access technologies based on IP. To maintain consistency, interworking with WiMAX networks must be based on the same model as shown in the following table.
3GPP has included the first three level s in Release 6, and the last two will be developed in future releases. The first level is the simplest and includes common billing (the customer receives just one bill for usage of both 3GPP and WiMAX services) and common customer care. It does not have any impact on either 3GPP or WiMAX architecture. The subscriber is charged on the same bill for usage of both 3GPP and WiMAX services. Customer care will be ensured independently of the connecting platform. The second level (3GPP system-based access control and charging) includes the usage of the 3GPP access procedures (including authentication and authorization) for WiMAX users within the 3GPP domain. In addition, Wimax nodes use UMTS charging systems for charging data records generation. A subscriber may use the WiMAX Access network to access the Internet, for example, but AAA operations are handled by the 3GPP platform. The third level extends the IMS services to the WiMAX. However, it is a matter of implementation as to whether all services are provided or just a subset of the services. This scenario lacks service continuity, so the user must re-establish the session in the new access network. Continuity is considered in this context as the ability to maintain an active service session when moving from one access network to another (e.g. between WiMAX and UTRAN) at the signaling level, without considering a transport level-related continuity issue like bandwidth or packet loss. Level 3 allows the operator to extend 3GPP system PS based services to the WiMAX network. In this scenario, an authenticated 3GPP subscriber can access 3GPP PS services through a WiMAX access network by interworking with its 3GPP PLMN (non roaming case) or with a visited 3GPP PLMN (roaming case). The last three levels are not considered by the 3GPP in Release 6 and may be developed in future releases. The fourth level introduces service continuity, although the handover process may be perceptibel to the user (due to data losses or delays). The fifth scenario provides seamless continuity, with no noticeable service interruption greater than that perceived in intra-3GPP handovers. 3. QoS guarantee Due to the differences in the network bandwidth, providing users with a constant level of service is not feasible. The goal of QoS guarantee is to offer suitabel quality of service in the given network, in accordance with user's QoS profiles and application require,ents. The QoS guarantee involves the task of mapping the QoS parameters from P-CSCF, GGSN, PDF, QoS negotiation, and the resource reservation methanism. UMTS defines four classes of QoS services based on different application requirements: conversational, streaming, interactive, and background. WiMAX also defines four classes of QoS: UGS (unsolicited grant service), real-time polling service, non-real-time polling service and BE (best effort). According to the application scenario, QoS class mapping can be implemented according to the mapping relation mentioned according to the mapping relation. The conversational and streaming services of UMTS correspond to the UGS and rt-PS services in WiMAX. The interactive service can be mapped to nrt-PS and BE services in WiMAX in different application scenarios. However, the background service in UMTS has the same requirement and application scenario as the BE service in WiMAX. QoS negotiation between session peers is performed using the SIP offer/answer model, in which each session peer offers its QoS capabilities using Session Description Protocol (SDP) descriptions in the message body. The following figure shows the architecture of QoS-enabled interworking based on COPs. In summary, SIP is the key signaling protocol of IMS. Interworking between SIP elements of the WiMAX and CSCFs of the IMS is a key issue in reaching a high level of interworking between WiMAX and 3GPP networks. Here the overall architecture of the interworking based on IMS is represented, as well as special issues such as QoS guarantees are discussed.