Você está na página 1de 36

MOBI LE AND PERVASI VE COMPUTI NG - UNI T 2

1 Advantages of 3G networks are:


3G Networks allow a wider radio spectrum that allows faster data transmission
Allows for advanced technology, multimedia services and larger network capacity
Carriers can deliver 3G at a reduced cost compared to 2G
3G networks allow a wider variety of cell phones to operate on the network
Business men with 3G cell phones are able to travel globally without renting or buying new phones due
to the 3G network
Allows location based services like weather reports on the mobile
3G is cheaper for providers; however, plans are more expensive due to the high cost of implementation
of 3G network
3G enables video calls, therefore, business conferencing between cities, states, and even countries
Picture messaging allows products, progress or problems to be shown visually
Applications that are more data intensive can be developed and used
3G networks allow everyday people to access music, pictures, and videos with ease creating a bigger
and open market for those industries in advertising
Extremely faster than previous networks
Increase in handset internet usage lead to businesses using social networking applications to advertise
Overcrowding is relieved in existing systems with radio spectrum
Provides interoperability among service providers
Support to devices with backward compatibility with existing networks

The Disadvantages of 3G networks
3G network implementation may be costly
3G plan prices for cell phones are much higher than 2G
The cost of cellular infrastructure, upgrading base stations is very high
Needs different handsets
Roaming and data/voice work together has not yet been implemented
Power consumption is high
Requires closer base stations and are expensive
Spectrum-license costs, network deployment costs and handset subsidies subscribers are tremendous
The technology is hard to fix and if broken it would be expensive to get fixed
Migration Strategies
The migration to 3G is not just based on evolving core networks and the radio interface to IMT 2000
Compliant systems. Migration towards 3G would also be based on the following steps/technologies:
Network upgrades in the form of EDGE, GPRS, HSCSD, CDPD, IS-136+, HDR etc. Evolution to 2.5G
basically will provide support for high speed packet data. Though these technologies are extensions to 2G
rather than precursors to 3G these will have a major impact either by proving demand for specific services
Service trials to test infrastructure, handsets and applications etc
Introduction of WAP-based services that bring the web to the wireless phone. In short-term WAP and,
in longer term, XML will provide a standard framework for accessing wireless Internet content, enabled
by 2.5G/3G
The development of mobile web portals
Development of micro browsers and operating
Wide acceptance of short-range wireless connectivity technologies like Bluetooth, HomeRF etc
3G Architecture
The 3G network will have a layered architecture, which will enable the efficient delivery of voice and
data services. Layered network architecture, coupled with standardized open interfaces, will make it
possible for the network operators to introduce and roll out new services quickly.
Using IP or ATM or a combination of both, this layer will handle all data and voice info. The layer
consists of the core network equipment like routers, ATM switches and transmission equipment. Other
equipment provides support for the core bit stream of voice or data, providing QOS etc
The application layer on top will provide open application service interfaces enabling flexible service
creation. This user application layer will contain services for which the end user will be willing to pay.
These services will include ecommerce, GPS and other differentiating services. In between the
application layer and the connectivity layer, will run the control layer with MSC servers, support servers,
HLR etc. These servers are needed to provide any service to a subscriber.

2. IMT 2000 and UMTS

Existing second-generation mobile telecommunications Systems (e.g. GSM) were primarily developed for
voice Telephony. However, the air interfaces only permit simple data services involving transfer rates of
up to 9.6 kbit/s. For "Phase 2+" of GSM, higher data transmission rates of up to 115 kbit/s are possible.
With IMT-2000/UMTS, this restriction no longer exists: IMT-2000/UMTS will make it possible to
provide personal, mobile, broadband multi-media services with transmission rates of up to 2 Mb/s. The
range of services possible with IMT-2000/UMTS will also include new broadband multimedia
applications, such as video, as well as the existing voice telephony and data transmission services.
IMT-2000/UMTS satisfies the need of mobile users for access to the various multi-media services that are
currently available and those yet to be developed (Internet/intranet, video telephony, online shopping,
ecommerce, video-on-demand, etc.), irrespective of location and tailored to their individual requirements.
As IMT-2000/UMTS is a further development of existing mobile networks and services and not a
replacement for them, the step from GSM to IMT-2000/UMTS should be regarded as an evolution of the
mobile telecommunications market rather than a revolution. IMT-2000/UMTS offers existing GSM
operators a great business opportunity to expand their range of services. The great innovation potential of
multi-media applications should also encourage new players onto the market, whether they are operators,
service providers or content providers, and not necessarily just from the telecommunications sector, but
from other areas affected by IMT-2000/UMTS such as information technology and the media.

UMTS Architecture



Mobile-services Switching Centre (MSC)
An exchange performing all the switching and signalling functions (CS only) for mobile stations MSC
controls mobile-originated and mobile-terminated CS calls Functions
call management
Mobility management (handling attach and authentication)
Subscriber administration
Maintenance of charging data (for radio network usage)
CS data services (FAX, modem)
Supplementary call services (call forwarding, etc.)
SS7-based signaling
Main difference to an exchange in a fixed network: deal with mobility (e.g. location registration,
handover)
Gateway MSC (GMSC)
Provides interconnection between the UMTS core network and external PSTN/ISDN networks
GPRS Support Node (GSN)
GSNs constitute the interface between the radio access network and the fixed networks for packet
switched services (similar to MSC for CS calls)
Serving GSN (SGSN)
Session management
Mobility management
Subscriber database management (interface with HLR)
Maintenance of charging data (for radio network usage)
IP-based transport of user data between SGSN and the UTRAN
IP- or SS7-based signaling transport
Gateway GSN (GGSN)
Gateway for UMTS packet service to external data networks (e.g. the
Internet)
IP interface towards SGSN
performs user data screening and security
Maintenance of charging data (for external data network usage)

Home Location Register (HLR)
Home (primary) data base in charge of the management of mobile subscribers
Basic information:
International Mobile Subscriber Identity (IMSI)
CS subscription information
One or more Mobile Subscriber International ISDN number(s) (MSISDN)
PS subscription information
Zero or more Packet Data Protocol (PDP) address (es)
Permission for GGSN to dynamically allocate PDP addresses for a subscriber
Location information enabling the charging and routing of calls towards the MSC or SGSN where the
MS is registered (e.g. VLR Number)
Other information:
teleservices and bearer services subscription information
Service restrictions (e.g. roaming limitation)
Parameters attached to supplementary services

Visitor Location Register (VLR)
(Secondary) data base supporting the management of mobile subscribers currently located within its VLR
area
Motivation: minimize load for HLR (i.e. of the primary data base)
Tasks:
Control MSs roaming in an MSC assigned to it
exchange information with HLR to allow the proper handling of calls
Information maintained by VLR (for call handling):
International Mobile Subscriber Identity (IMSI)
Mobile Station International ISDN number (MSISDN)
Mobile Station Roaming Number (MSRN)
Temporary Mobile Station Identity (TMSI), if applicable
Location area where the mobile station has been registered
The last known location and the initial location of the MS
Supplementary service parameters attached to the mobile subscriber (received from the HLR)
Authentication Centre (AuC)
Stores data for each mobile subscriber
To authenticate the International Mobile Subscriber Identity (IMSI)
To support ciphering of the communication over the radio path
The AuC transmits the data needed for authentication and ciphering via the HLR to the VLR, MSC and
SGSN which need to authenticate a mobile station
AuC is associated with an HLR, and stores an identity key for each mobile subscriber
The AuC communicates solely with its associated HLR (H-interface)

Equipment Identity Register (EIR)
Logical entity storing the International Mobile Equipment Identities (IMEIs)
Equipment is classified as
White listed: serial number of equipment
Grey listed: equipment tracked by network
Black listed: barred equipment
Unknown to EIR
Other CN entities
SMS Gateway MSC (SMS-GMSC)
Gateway between Short Message Service Center and PLMN
deliver SMSs from service center to MS
SMS Interworking MSC (SMS-IWMSC)
Gateway between PLMN and Short Message Service Center
deliver SMSs from MS to service center
Interworking Function (IWF)
associated with MSC
supports interworking of PLMN with fixed networks, e.g. ISDN, PSTN,
PDN (protocol conversion)
Border Gateway (BG)
PS gateway to other PLMNs
Firewall functionality
Charging Gateway Functionality (CGF)
collects charging records from SGSNs and GGSNs

3. User Equipments
In the Universal Mobile Telecommunication System (UMTS) and 3GPP Long Term Evolution
(LTE), user equipment (UE) is any device used directly by an end-user to communicate.
It can be a hand-held telephone, laptop computer equipped with a mobile broadband adapter, or
any other device.
It connects to the base station, Node-B/ eNodeB as specified in the ETSI125/136-series and 3GPP
25/36-series of specifications.
It corresponds to the mobile station (MS) in GSM systems.
The radio interface between the UE and the Node B is called UU.
The radio interface between the UE and the eNodeB-B is called LTE-UU.
The protocols are transmitted transparently via a Node B, that is, Node B does not change, use or
understand the information. These protocols are also referred to as Non Access Stratum protocols.
The UE is a device which initiates all the calls and its the terminal device in a network.
Functionality
UE handles the following tasks towards the core network:
Mobility management
Call control
Session management
Identity management
Tasks of UE
UE as Node B
a) Encoding, Interleaving
b) Spreading, Modulation
c) Power control
UE as RNC
a) Acknowledged transmission
b) Hand over, Cell Selection
UE as CN
a) Location Registration, Authentication
b) Bearer Negotiation, Service Request

4. Radio Network Subsystem


Radio Network Controller
The Radio Network Controller ( RNC) is a governing element in the UMTS radio access
network (UTRAN).
It is responsible for controlling the Node Bs that are connected to it.
RNC carries out radio resource management, mobility management functions.
It connects to the Circuit Switched Core Network through Media Gateway and to the Serving
GPRS Support Node in the packet Switched Core Network.

Node B
Node B is equivalent to the BTS (base transceiver station) description used in GSM.
It is the hardware that is connected to the mobile phone network that communicates directly with
mobile handsets.
Node B uses the air interface technology.
The Node Bs has minimum functionality, and is controlled by the RNC.
Node B consists of a radio signal transmitter and a Radio signal receiver.
The UTRAN consists of one or more RNS.
It controls the allocation and release specific radio resources to establish a connection between
UE &UTRAN.
It is responsible for resources and transmission reception in a group of cells.

5. UTRAN: Universal Terrestrial Radio Access Network
Architecture

UTRAN (short for "Universal Terrestrial Radio Access Network") is a collective term for the Node
Bs and Radio Network Controller (RNCs) which make up the UMTS radio access network.
This communications network, commonly referred to as 3G
UTRAN allows connectivity between the UE (user equipment) and the core network.
RNC provides control functionalities for one or more Node Bs. A Node B and an RNC can be the
same device, RNC located in a central office serving multiple Node Bs. there is a logical interface
between them known as the IUB.
The RNC and its corresponding Node Bs are called the Radio Network Subsystem (RNS). There can
be more than one RNS present in a UTRAN.
There are four interfaces connecting the UTRAN internally or externally to other functional entities:
IU, UU, IUB and IUR.
The IU interface is an external interface that connects the RNC to the Core Network (CN).
The UU is also external, connecting the Node B with the User Equipment (UE).
IUB is an internal interface connecting the RNC with the Node B.
The IUR interface which is an internal interface most of the time, but can, exceptionally be an
external interface too for some network architectures. The IUR connects two RNCs with each other.
Functions of RNC
Functions of Radio Network controller is classified into two
1. in Relationship with End User Devices.
a) SRNC Serving Radio Network Controller.
b) DRNC Drift Radio Network Controller.
2. in Relationship with Node-Bs.
a) CRNC Controlling Radio Network Controller
Serving RNC
Serving RNC has the responsibility to terminate the Link layer communications.
It exerts control for new mobiles and services attempting to access the core network.
It also ensures that the mobile devices are using allocated bandwidth, noise ratio and frequency
Drift RNC
It is the place where the physical layer communication terminates.
If there is no active or progressive hand over, Drift RNC will act as Serving RNC.
The DRNC does not perform any processing of user data (beyond what is required for correct
operation of the physical layer).
Controlling RNC
It is responsible for controlling the resources of Node-B
If new radio links (RLs) are to be established CRNC does the job.
Also it is responsible for Load and congestion control.
6. USIM: Universal Subscriber Identity module
With the introduction of UMTS or 3G, it's highly recommended to use a USIM card to access UMTS
network.
It has great efficiency & band width
It stores user subscriber information, authentication information for text messages.
For authentication purposes, the USIM stores a long-term pre shared secret key, which is shared
with the Authentication Center (AuC) in the network.
A 3G (UMTS) handset equipped with a USIM card can be used to make video calls, assuming the calling
area is covered by a 3G network.
Contacts in the USIM are stored much more securely on the USIM as compared to using the phone
memory.
Difference between usim & sim
A USIM is a tiny computer which is able to handle several mini applications, for instance a contactless
e-purse for the subway, a local service portal giving you access to your phone bill, etc;
A 3G (UMTS) handset equipped with a USIM card can be used to make video calls, assuming the
calling area is covered by a 3G network;
Regarding security, a new algorithm is integrated (it's derived from recent researches in cryptology). It
allows to protect you from unauthorized access to your phone line, and therefore to be charged with
fraudulent calls on your bill;
Your calls and data exchanges are encrypted using keys computed by the USIM, and these keys are
stronger than those provided by SIMs.
The phonebook is much bigger on the USIM, allowing thousands of contacts (instead of a maximum of
255 in a SIM). Each USIM contact is also richer, for instance it can contain email addresses, a second or
third phone number, etc;
Contacts in the USIM are stored much more securely on the USIM as compared to using the phone
memory.
7. Protocol Stack
The protocol stack is an implementation of a computer networking protocol suite. The terms are
often used interchangeably. Strictly speaking, the suite is the definition of the protocols, and the
stack is the software implementation of them.
In practical implementation, protocol stacks are often divided into three major sections.
Media, transport, and applications. The media-to-transport interface defines how transport
protocol software makes use of particular media and hardware types ("card drivers"). For
example, this interface level would define how TCP/IP transport software would talk to Ethernet
hardware.
The application-to-transport interface defines how application programs make use of the transport
layers. For example, this interface level would define how a web browser program would talk to
TCP/IP transport software. Examples of these interfaces include Berkeley sockets and System V
STREAMS in the Unix world, and Winsock in the Microsoft world.
Characteristics
Support
Interoperability
Flexibility
Performance
Support
Support is definitely the most important aspect of a protocol stack. Without strong support for the
protocol stack selected you should expect delays and complications.
Support to me can be split into 3 aspects:
Documentation you must have good, detailed documentation for the protocol stack.
Customer support when you have questions, you should have a point of contact to ask, with a
structured support contract in place to meet your needs.
Patches and upgrades as standards evolve, and requirements change, you should be able to grow
your product and for that you need a protocol stack that is being maintained and enhanced
accordingly.
Interoperability
Protocols is for a very specific purpose & to make products from different vendors work together
(interoperate).
Interoperability is not easy to achieve and requires a lot of effort from the protocol stack .
The protocol stack vendor in question does interoperability testing in the relevant interoperability
events.
See that the vendor has track record in providing interoperable solutions.
An advantage would be a vendor that sits in the standardization organizations this way, you will
get the latest interoperable solutions.
Flexibility
Make sure its flexible enough not only to meet your current needs but also for other purposes
you might have in the future.
If youre developing a videophone today, and you might need to build a small gateway later or a
home PBX
Make sure the solution you get is flexible enough to meet your needs. Otherwise, youll need to
get another protocol stack or product and then learn, design and implement your next product
from scratch.
Performance
Performance is important but it comes last in my list. You will need it. It will make a difference.
But first make sure the other 3 characteristics are met first.
Performance is needed for all kinds of products terminals and servers alike.
For terminals, memory and footprint will be the main issue.
For servers, memory and calls per second will be the main issue.
Applications
The Protocol Stack Design pattern can be used to implement any type of layered protocol. It can
be also used when different operations on an entity need to be performed in a pipeline fashion.
Each stage of the pipeline could be modeled as a layer. This pattern is particularly useful in
applications involving dynamic layer manipulation. Dynamically adding layers to handle
demands from the user session (e.g. enabling encryption)
Debugging inter-layer interactions by adding a pass-through debug only layer.
Testing higher layers of a protocol by adding a special loop-back layer to connect the lower layer
transmit and receive.
Emulating a node by configuring a echo-back layer to connect the higher layer transmit and
receive.

8. CS And PS Domains

Packet-switched describes the type of network in which relatively small units of data called packets are
routed through a network based on the destination address contained within each packet. Breaking
communication down into packets allows the same data path to be shared among many users in the
network. This type of communication between sender and receiver is known as connectionless (rather
than dedicated). Most traffic over the Internet uses packet switching and the Internet is basically a
connectionless network.
Contrasted with packet-switched is circuit-switched, a type of network such as the regular voice telephone
network in which the communication circuit (path) for the call is set up and dedicated to the participants
in that call. For the duration of the connection, all resources on that circuit are unavailable for other users.
Voice calls using the Internet's packet-switched system are possible. Each end of the conversation is
broken down into packets that are reassembled at the other end.
Circuit Switching
uses a dedicated path between two stations
has three phases
establish
transfer
disconnect
inefficient
channel capacity dedicated for duration of connection
if no data, capacity wasted
set up (connection) takes time
once connected, transfer is transparent

Packet Switching
circuit switching was designed for voice
packet switching was designed for data
transmitted in small packets
packets contains user data and control info
user data may be part of a larger message
control info includes routing (addressing) info
packets are received, stored briefly (buffered) and past on to the next node


9. IMS Architecture
The third-generation partnership project (3GPP) has proposed IMS in Release 5 on Internet
Protocol version 6 (IPv6), but it is negotiated for IPv4 because the industry is not ready to migrate
to IPv6 now.
IMS is a person-to-person service that enriches the way people communicate with each other by
Combining voice, image, and video into a single session. IMS uses SIP and session description protocol
(SDP) underneath architecture to communicate between various IMS components.

IMS Overview

IMS is defined by 3GPP as a new subsystem, i.e., a new mobile network infrastructure that enables the
convergence of data, speech, and mobile network technology over an IPbased infrastructure.

IMS was designed to fill the gap between the existing traditional telecommunications technology and
Internet technology, which increased bandwidth alone cannot do. This will allow operators to offer new,
innovative services that shareholders and end users are expecting.

The architecture of IMS specifically helps enable and enhance real-time multimedia mobile services such
as rich voice services, video telephony, messaging, conferencing, and push services.

IMS enables these user-to-user communication services via a number of key mechanisms such as session
negotiation and management, quality of service (QoS) and mobility management. However, IMS enables
much more than just real-time user-to-user services.







Proxy Call Session Control Function (PCSCF)


This is the first point of contact in the IMS for a user element (UE). The PCSCF may be in the home or
visited network. SIP register/invite methods are initially terminated to PCSCF, and it ensures that
registration/session requests are passed to the correct home network or that SIP messages are passed to
the correct serving CSCF (SCSCF).

The major role of PCSCF is to route information to the correct SCSCF so it can support the path and
service-route headers. PCSCF will maintain two route header lists. The first header list is created during
the registration procedure. It is used only to validate the routing information in the initial request. This list
is valid during the entire registration. The second header list is created from the record-route headers in
the initial invite and associated responses. This list is valid during the call. Once the call is terminated, the
second route list is discarded.

Interrogating Call Session Control Function (ICSCF)
ICSCF is the entity of the home network that is able to determine the SCSCF from which users should
register. ICSCF queries a home subscriber server (HSS) to get the name and capability of the SCSCF.
Once SCSCF begins identifying, ICSCF could be removed from the signaling.

The exception to this is as follows: if the topology hiding internetwork gateway (THIG) of I CSCF is
being used, ICSCF shall apply topology hiding to all headers, which reveal topology information (e.g.,
via, route, record-route, service-route, P-charging-function-addresses headers).

Serving Call Session Control Function (SCSCF)

The SCSCF is the function that registers the users and provides service to them. The SCSCF is acting
as the SIP registrar for all UEs of IMS. It performs routing and translation, provides billing information to
mediation systems, maintains session timers, and interrogates the HSS to retrieve authorization.

Media Gateway Control Function (MGCF)

IMS is designed to integrate with PSTNs and traditional telephony services such as 800 numbers, caller
ID, and local number portability. MGCF is used to transfer nonSIP packetized voice to SIP user agent
(UA) and vice versa.

If the calls are originating or terminating on the PSTN, the MGCF converts the PSTN time division
multiplex (TDM) voice bit stream to an IP real-time transport protocol (RTP) stream and direct it to the IP
address of the corresponding IP phone.

Media Resource Function (MRF)

MRF is divided into two parts: multimedia resource function controller (MRFC) and multimedia resource
function processor (MRFP).

Tasks of MRFC are as follows:

Control the media stream resources in the MRFP
Interpret information coming from an application server (AS) and S-CSCF (e.g., session identifier) and
control MRFP accordingly
Generate charging data records (CDR)

Tasks of MRFP are as follows:

Control the bearer on the Mb reference point
Provide resources to be controlled by the MRFC
Mix incoming media streams (e.g., for multiple parties)
Determine media stream source (e.g., for multimedia announcements)
Handle media stream processing (e.g., audio transcoding, media analysis)
Floor control (i.e., manage access rights to shared resources in a conferencing environment)

Interconnect Border Control Function (IBCF)

IBCF functionality includes the provision of network address port translation (NAPT) and firewalls. It
also provides conversion between IPv4 and IPv6. IBCF controls media exchange, signaling, and policies
across the operator boundary.

Home Subscriber Server

HSS is a master database for users subscription-related information. It supports the IMS entity to
establish the registration/call control. HSS is the superset of the home location register (HLR) and
provides users physical location. HSS is operated in IP core networks and can be contacted through
diameter protocol.

It is connected to IMS network via Sh (AS) and Cx (SCSCF) interfaces.

SIP AS


When processing SIP requests, SIP AS acts as follows:

AS acts as a terminating UA or redirect server for SIP requests
AS acts as an originating UA for SIP requests
AS acts as a SIP proxy for SIP requests
AS acts as a call control/back-to-back UA (B2BUA)
AS does not act at all for particular SIP requests

As such, a SIP AS is connected to SCSCF through an IMS service control (ISC) interface. The ISC
interface is also connected to IP multimedia service switching function (IMSSF) and open service access
service capability server (OSASCS). IMSSF provides interworking for SIP messages to a
corresponding customized application of mobile enhanced logic (CAMEL), American National Standards
Institute (ANSI)41, intelligent network application part (INAP) and transactional capabilities application
part (TCAP). OSASCS acts as a secure gateway between an underlying network and an application with
OSA architecture.

10. Handover
The continuation of an active call is one of the most important quality measurements in cellular systems.
Handoff process enables a cellular system to provide such a facility by transferring an active call from
one cell to another.
Handoffs are broadly classified into two categorieshard and soft handoffs. Usually, the hard handoff
can be further divided into two different typesintra- and intercell handoffs. The soft handoff can also be
divided into two different typesmulti way soft handoffs and softer handoffs.

(Figure Hard handoff between the MS and BSs.)
A hard handoff is essentially a break before make connection. Under the control of the MSC, the BS
hands off the MSs call to another cell and then drop the call. In a hard handoff, the link to the prior BS is
terminated before or as the user is transferred to the new cells BS; the MS is linked to no more than one
BS at any given time. Hard handoff is primarily used in FDMA (frequency division multiple access) and
TDMA (time division multiple access), where different frequency ranges are used in adjacent channels in
order to minimize channel interference. So when the MS moves from one BS to another BS, it becomes
impossible for it to communicate with both BSs (since different frequencies are used).
A soft handover is one in which the channel in the source cell is retained and used for a while in parallel
with the channel in the target cell. In this case the connection to the target is established before the
connection to the source is broken, hence this handover is called make-before-break. The interval, during
which the two connections are used in parallel, may be brief or substantial. For this reason the soft
handover is perceived by network engineers as a state of the call, rather than a brief event. Soft handovers
may involve using connections to more than two cells: connections to three, four or more cells can be
maintained by one phone at the same time. When a call is in a state of soft handover, the signal of the best
of all used channels can be used for the call at a given moment or all the signals can be combined to
produce a clearer copy of the signal. The latter is more advantageous, and when such combining is
performed both in the downlink (forward link) and the uplink (reverse link) the handover is termed as
softer. Softer handovers are possible when the cells involved in the handovers have a single cell site.


11. 3.5G and 3.9G a brief discussion
3.5G is faster than 3G.
It is actually means HSDPA-High Speed Downlink Packet Access networks which is based on
Universal Mobile Telecommunications System (UMTS) to have higher data transfer speeds and capacity.
Currently it is now supporting 1.8 mbps or 3.5 mbps in downlink speed. Its data bearing achieved the
speed of 384 kbps while the previous was 128 kbps.

3.9G
With High Speed Internet (3.9G) from touch you can enjoy a richer, much faster, and more reliable
internet connection on the go, using your compatible mobile phone, tablet or
The high speed means you can now benefit from new services such as TV/Video Streaming and Video
Calling.
Why 3.9G ?
Higher internet speed up to 21.6 Mbps*
Higher upload/download speeds
Seamless TV and video streaming experience: high speed internet means videos can be directly
streamed with no more buffering. Watching TV or Online videos, via handset or computer, is really fast!
Video Calling: you can now hear and see the person you are calling, provided they have a proper 3.9G
coverage and a compatible device.
Online gaming: real-time online gaming is possible with multiple players around the globe.
12. 4G LAN and Cellular Networks
4G is not one defined technology or standard, but rather a collection of technologies at creating
fully packet-switched networks optimized for data.
4G Networks are projected to provide speed of 100Mbps while moving and 1Gbps while
stationary.
0G (Zero Generation Mobile System)
At the end of the 1940s, the first radio telephone service was introduced, and was designed to
users in cars to the public land-line based telephone network.
In the 1960s, a system launched by Bell Systems, called, Improved Mobile Telephone Service
(IMTS), brought quite a few improvements such as direct dialing and more bandwidth. The very
first analog systems were based upon IMTS and were created in the late 60s and early 70s.
1G Technology
1G refers to the first-generation of wireless telephone technology was developed in 1970s.
1G had two major improvements:
the invention of the microprocessor
The digital transform of the control link between the phone and the cell site.
Analog signal
2G Technology
Around 1980s
Better quality & capacity - More people could use there phones at the same time
Digital Signals consist of 0s & 1s
Digital consist of 0s and 1s
Digital signal:
1. Low level, 2.High level, 3.Rising edge and 4.Falling edge

Digital data can be compressed and multiplexed much more effectively than analog voice
encodings
Multiplexing -multiple analog message signals or digital data streams are combined into one
signal
For 1 and 2G standards, bandwidth maximum is 9.6 Kbit/sec, (I.E) approximately 6 times slower
than an ISDN
Allows for lower powered radio signals that require less battery
PowerCODEC introduction -program that encodes and decodes digital data stream or signal
1. Translates data from digital to analog and vice versa
Advantages in Previous Technology - 2G
The digital voice encoding allows digital error checking
increase sound quality
lowers the noise level
Going all-digital allowed for the introduction of digital data transfer
SMS short message service
E-mail
Disadvantages in Previous Technology - 2G
Cell towers had a limited coverage area
Jagged Decay curve
Abrupt dropped calls
Analog gradual sound reduction
Spotty coverage

3G Technology
Large capacity and broadband capabilities
Allows the transmission of 384kbps for mobile systems and up to 2Mbps
Increased spectrum efficiency 5Mhz
A greater number of users that can be simultaneously supported by a radio frequency
bandwidth
High data rates at lower incremental cost than 2GGlobal roaming
CDMA Code Division Multiple Access
Form of multiplexing
Does not divide up the channel by time or frequency
Encodes data with a special code associated with each channel
What is 4G?
Fourth Generation Technology
Faster and more reliable
100 Mb/s
Lower cost than previous generations
Multi-standard wireless system
Bluetooth, Wired, Wireless
Ad Hoc Networking
IPv6 Core
OFDM used instead of CDMA
Potentially IEEE standard 802.11n
Most information is proprietary
Communications Architecture
Broadcast layer:
fix access points, (i.e.) cell tower connected by fiber, microwave, or satellite (ISP)

Ad-hoc/hot-spot layer:
wireless LANs (i.e. internet at Starbucks)
Communications Architecture
Personal Layer Gateway:
devices that connect to upper layers; cell phone, fax, voice, data modem, MP3 players,
PDAs
Info-Sensor layer:
environmental sensors
Fiber-optic wire layer:
high speed subterranean labyrinth of fiber optic cables and repeaters
Ad Hoc Networks


Spontaneous self organization of networks of devices
Not necessarily connected to internet
4G will create hybrid wireless networks using Ad Hoc networks
Form of mesh networkingVery reliable
Enhance Mobile Gaming
Experience enhance wireless capabilities that deliver mobile gaming interaction with less than
five seconds
Play online multi player games while traveling at high speeds or sitting outside


Broadband access in Remote location
4G will provide a wireless alternative for broadband access
I will provide first opportunity for broadband access in remote locations without an infrastructure
to support cable or DSL access.
13. Long Term Evolution (LTE)
It was started as a project in 2004 by telecommunication body known as the Third Generation
Partnership Project (3GPP).
LTE evolved from an earlier 3GPP system known as the Universal Mobile Telecommunication System
(UMTS), which in turn evolved from the Global System for Mobile Communications (GSM).
The main goal of LTE is to provide a high data rate, low latency and packet optimized radio access
technology supporting flexible bandwidth deployments.
Advantages of LTE
High throughput.
Low latency.
FDD and TDD in the same platform.
Superior end-user experience.
Seamless Connection.
Plug and play.
Simple architecture.
LTE-Network Architecture
The high-level network architecture of LTE is comprised of following three main components:
The User Equipment (UE).
The Evolved UMTS Terrestrial Radio Access Network (E-UTRAN).
The Evolved Packet Core (EPC).
The evolved packet core communicates with packet data networks in the outside world such as the
internet, private corporate networks or the IP multimedia subsystem.
The interfaces between the different parts of the system are denoted Uu, S1 and SGi as shown below:

The E-UTRAN (The access network)
The architecture of evolved UMTS Terrestrial Radio Access Network (E-UTRAN) has been
illustrated below.

The E-UTRAN handles the radio communications between the mobile and the evolved packet
core and just has one component, the evolved base stations, called eNodeB or eNB.
Each eNB is a base station that controls the mobiles in one or more cells.
LTE Mobile communicates with just one base station and one cell at a time and there are
following two main functions supported by eNB:
*** The eNB sends and receives radio transmissions to all the mobiles using the analogue and
digital signal processing functions of the LTE air interface.
*** The eNB controls the low-level operation of all its mobiles, by sending them signaling
messages such as handover commands.
The Evolved Packet Core (EPC) (The core network)
The architecture of Evolved Packet Core (EPC) has been illustrated below:

Components of EPC Architecture
The Home Subscriber Server (HSS) component has been carried forward from UMTS
and GSM and is a central database that contains information about all the network
operator's subscribers.
The Packet Data Network (PDN) Gateway (P-GW) communicates with the outside
world i.e., packet data networks PDN, using SGi interface. Each packet data network is
identified by an access point name (APN). The PDN gateway has the same role as the
GPRS support node (GGSN) and the serving GPRS support node (SGSN) with UMTS
and GSM.
The serving gateway (S-GW) acts as a router, and forwards data between the base
station and the PDN gateway.
The mobility management entity (MME) controls the high-level operation of the
mobile by means of signaling messages and Home Subscriber Server (HSS).
The Policy Control and Charging Rules Function (PCRF) is a component which is
not shown in the above diagram but it is responsible for policy control decision-making,
as well as for controlling the flow-based charging functionalities in the Policy Control
Enforcement Function (PCEF), which resides in the P-GW.
The interface between the serving and PDN gateways is known as S5/S8. This has two slightly
different implementations, namely S5 if the two devices are in the same network, and S8 if they
are in different networks.
LTE-Radio Protocol Architecture
The radio protocol architecture for LTE can be separated into control plane architecture and user
plane architecture as shown below:

User Plane:
The user plane protocol stack between the e-Node B and UE consists of the following sub-layers:
PDCP (Packet Data Convergence Protocol)
RLC (radio Link Control)
Medium Access Control (MAC).

Control plane
The control plane includes additionally the Radio Resource Control layer (RRC) which is
responsible for configuring the lower layers.
The Control Plane handles radio-specific functionality which depends on the state of the
user equipment which includes two states: idle or connected.
In idle mode, the user equipment camps on a cell after a cell selection or
reselection process where factors like radio link quality, cell status and radio
access technology are considered. The UE also monitors a paging channel to
detect incoming calls and acquire system information. In this mode, control plane
protocols include cell selection and reselection procedures.
In connection mode, the UE supplies the E-UTRAN with downlink channel
quality and neighbor cell information to enable the E-UTRAN to select the most
suitable cell for the UE. In this case, control plane protocol includes the Radio
Link Control (RRC) protocol.
The protocol stack for the control plane between the UE and MME is shown below:

The grey region of the stack indicates the access stratum (AS) protocols.
The lower layers perform the same functions as for the user plane with the exception that there is
no header compression function for the control plane.

Protocol Stack Layers



Physical Layer (Layer 1)
Physical Layer carries all information from the MAC transport channels over the air
interface.
Takes care of the link adaptation (AMC), power control, cell search (for initial
synchronization and handover purposes) and other measurements (inside the LTE system
and between systems) for the RRC layer.
Medium Access Layer (MAC)
MAC layer is responsible for Mapping between logical channels and transport channels.
Multiplexing of MAC SDUs from one or different logical channels onto transport blocks
(TB) to be delivered to the physical layer on transport channels.
de multiplexing of MAC SDUs from one or different logical channels from transport
blocks (TB) delivered from the physical layer on transport channels.
Scheduling information reporting, Error correction through HARQ, Priority handling
between UEs by means of dynamic scheduling, Priority handling between logical
channels of one UE, Logical Channel prioritization.
Radio Link Control (RLC)
RLC operates in 3 modes of operation: Transparent Mode (TM), Unacknowledged Mode (UM),
and Acknowledged Mode (AM).
RLC Layer is responsible for transfer of upper layer PDUs, error correction through ARQ (Only
for AM data transfer), Concatenation, segmentation and reassembly of RLC SDUs (Only for UM
and AM data transfer).
RLC is also responsible for re-segmentation of RLC data PDUs (Only for AM data transfer),
reordering of RLC data PDUs (Only for UM and AM data transfer), duplicate detection (Only for
UM and AM data transfer), RLC SDU discard (Only for UM and AM data transfer), RLC re-
establishment, and protocol error detection (Only for AM data transfer).
Radio Resource Control (RRC)
The main services and functions of the RRC sub layer include broadcast of System
Information related to the non-access stratum (NAS).
Broadcast of System Information related to the access stratum (AS), Paging.
Establishment, maintenance and release of an RRC connection between the UE and E-
UTRAN.
Security functions including key management, establishment, configuration, maintenance
and release of point to point Radio Bearers.
Packet Data Convergence Control (PDCP)
PDCP Layer is responsible for Header compression and decompression of IP data,
Transfer of data (user plane or control plane).
Maintenance of PDCP Sequence Numbers (SNs), In-sequence delivery of upper layer
PDUs at re-establishment of lower layers.
Duplicate elimination of lower layer SDUs at re-establishment of lower layers for radio
bearers mapped on RLC AM.
Ciphering and deciphering of user plane data and control plane data.
Integrity protection and integrity verification of control plane data
Timer based discards, duplicate discarding.
PDCP is used for SRBs and DRBs mapped on DCCH and DTCH type of logical
channels.
Non Access Stratum (NAS) Protocols
The non-access stratum (NAS) protocols form the highest stratum of the control plane
between the user equipment (UE) and MME.
NAS protocols support the mobility of the UE and the session management procedures to
establish and maintain IP connectivity between the UE and a PDN GW.
14. WiMax Internetworking with 3GPP
WiMAX Forum members are working with other industry groups, including the Wi-Fi Alliance,
to enable seamless handoffs between multiple wireless standards, furthering the development of
a cohesive wireless ecosystem. WiMAX Forum is also collaborating with groups like 3GPP on
implementing IMS with WiMAX networks.
The 3GPP specifies the IP multimedia subsystem (IMS) to provide several kinds of multimedia
services in UMTS Release 5 and later releases. Interworking at the service layer between 3GPP
and WiMAX networks requires interworking between IMS functionality. By studying several
interconnection scenarios and the main functionality of IMS, WiMAX can support different
levels of services. Special attention is paid at the session negotiation level, using SIP, COPS/Go
and Diameter protocols/interface to provide session negotiation with QoS and AAA
(authentication authorization accounting) support.

Future mobile communication networks are evolving from traditional circuit-switched
architectures to an all-IP based structure. It is suggested that the mobile networks should be
integrated by a high-bandwidth IP-based core network and a variety of wireless access
technologies such as UMTS or WiMAX. Mobile terminals will be able to access different
multimedia applications and advanced services while roaming across zones covered by different
access technologies. Currently, 3GPP is developing a feasibility study on providing seamless
service continuity between UMTS and WLAN.

Interworking between different networks can be viewed from different aspects. The most
important aspect is the session negotiation level, which provides service continuity from the user
perspective. At this level, the protocol used by 3GPP is Session Initiation Protocol (SIP), which
is the foundation of the IMS architecture defined to support real-time multimedia services in
future mobile networks.
The levels of convergence may be classified into convergence of service, network and technique.
The goal is to share a service system based on interworking. Providing a uniform service
experience for users, through a uniform service system, would enable customers to use different
terminal devices to access heterogeneous networks, to access the same service, and to achieve
common billing and session management. Service convergence is the first step of the
convergence. Seamless roaming and handoff between different networks is the main problem.
There are significant differences between the PHY technique of 3GPP and WiMAX.
IMS Architecture

Within the UMTS core network, IMS is defined by the 3GPP as the component that provides
support for multimedia services (e.g. voice and video) based on packet switching with QoS and
the provision of AAA. The above figure shows a general view of IMS architecture. From this we
can appreciate how the core network is organized in two networks: a signaling or control
network and a data or transport network. The signaling network is composed of a set of call
session control function nodes (CSCFs). They are signaling proxies whose task is to establish,
modify and release media sessions with guaranteed QoS and AAA and charging support.
Note that user equipment (UE) gains access to the IMS via UMTS terrestrial radio access
network (UTRAN), which is responsible for providing access for mobile stations and managing
terminal mobility. SIP, COPS, and Diameter are the major protocols involved in this
architecture.
1. Interworking architecture and interworking level
Two interworking modes


There are two methods for WiMAX networks to interwork with other wireless networks: loose
couple and tight couple. There is little difference between loose couple and existing networks;
WiMAX utilizes the AAA server of 3GPP network, and data streams are not passed through the
core network of 3GPP. This methods guarantees the independence of WiMAX network, however
it results in high handover latency between two networks. Therefore, it is not suitable for real-
time services.

In tight couple mode, the data streams of WiMAX must pass through the RNC and the core
network of 3GPP, so each of the existing networks must modify their protocols, interfaces and
services to meet the requirements of interworking. The BS of WiMAX connects with RNC of
WCDMA or SGSN directly. The advantage of this mode is that it reduces the handoff latency
and guarantees seamless handoff. If different operators own both 3G and WiMAX networks, the
integration would be troublesome for the open of network interface.

2. Interworking levels

WiMAX is commonly used to transport IP packets. Thus 3GPP-WiMAX interworking should be
built on the top of the IP protocol and not be limited to a specific WiMAX technology.
Different interconnection levels must be defined to represent different operational capabilities.
These levels are suitable for either interworking mode.

Six interconnection levels between WLAN and 3GPP were taken into consideration. As well as
the operational capabilities of each of them, based on the interconnection levels. The
interworking is not limited to 3GPP and WLAN, but also includes the internetworking between
3GPP and other wireless access technologies based on IP. To maintain consistency, interworking
with WiMAX networks must be based on the same model as shown in the following table.

3GPP has included the first three level s in Release 6, and the last two will be developed in future
releases. The first level is the simplest and includes common billing (the customer receives just
one bill for usage of both 3GPP and WiMAX services) and common customer care. It does not
have any impact on either 3GPP or WiMAX architecture. The subscriber is charged on the same
bill for usage of both 3GPP and WiMAX services. Customer care will be ensured independently
of the connecting platform.
The second level (3GPP system-based access control and charging) includes the usage of the
3GPP access procedures (including authentication and authorization) for WiMAX users within
the 3GPP domain. In addition, Wimax nodes use UMTS charging systems for charging data
records generation. A subscriber may use the WiMAX Access network to access the Internet, for
example, but AAA operations are handled by the 3GPP platform.
The third level extends the IMS services to the WiMAX. However, it is a matter of
implementation as to whether all services are provided or just a subset of the services. This
scenario lacks service continuity, so the user must re-establish the session in the new access
network. Continuity is considered in this context as the ability to maintain an active service
session when moving from one access network to another (e.g. between WiMAX and UTRAN)
at the signaling level, without considering a transport level-related continuity issue like
bandwidth or packet loss. Level 3 allows the operator to extend 3GPP system PS based services
to the WiMAX network. In this scenario, an authenticated 3GPP subscriber can access 3GPP PS
services through a WiMAX access network by interworking with its 3GPP PLMN (non roaming
case) or with a visited 3GPP PLMN (roaming case).
The last three levels are not considered by the 3GPP in Release 6 and may be developed in future
releases. The fourth level introduces service continuity, although the handover process may be
perceptibel to the user (due to data losses or delays). The fifth scenario provides seamless
continuity, with no noticeable service interruption greater than that perceived in intra-3GPP
handovers.
3. QoS guarantee
Due to the differences in the network bandwidth, providing users with a constant level of service
is not feasible. The goal of QoS guarantee is to offer suitabel quality of service in the given
network, in accordance with user's QoS profiles and application require,ents. The QoS guarantee
involves the task of mapping the QoS parameters from P-CSCF, GGSN, PDF, QoS negotiation,
and the resource reservation methanism.
UMTS defines four classes of QoS services based on different application requirements:
conversational, streaming, interactive, and background. WiMAX also defines four classes of
QoS: UGS (unsolicited grant service), real-time polling service, non-real-time polling service
and BE (best effort). According to the application scenario, QoS class mapping can be
implemented according to the mapping relation mentioned according to the mapping relation.
The conversational and streaming services of UMTS correspond to the UGS and rt-PS services
in WiMAX. The interactive service can be mapped to nrt-PS and BE services in WiMAX in
different application scenarios. However, the background service in UMTS has the same
requirement and application scenario as the BE service in WiMAX.
QoS negotiation between session peers is performed using the SIP offer/answer model, in which
each session peer offers its QoS capabilities using Session Description Protocol (SDP)
descriptions in the message body.
The following figure shows the architecture of QoS-enabled interworking based on COPs.
In summary, SIP is the key signaling protocol of IMS. Interworking between SIP elements of the
WiMAX and CSCFs of the IMS is a key issue in reaching a high level of interworking between
WiMAX and 3GPP networks. Here the overall architecture of the interworking based on IMS is
represented, as well as special issues such as QoS guarantees are discussed.

Você também pode gostar