Escolar Documentos
Profissional Documentos
Cultura Documentos
INTRODUCTION
Communication: It is the process of transferring information from one place to another place.
Any Communication System requires the following:
Transmitter
Channel Receiver
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
Full Duplex
Mobile Systems
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
Range
Frequency Band
Application
VLF
LF MF
3 KHz 30 KHz
30KHz to 300 KHz 300KHz to 3MHz
Submarine Application
Navigational Application Cordless Phones, AM radio
HF
VHF UHF SHF EHF
3 MHz to 30 MHz
30 MHz to 300 MHz 300 MHz to 3GHz 3 GHz to 30 GHz 30 GHz to 300 GHz
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
Access Methods
FDMA (Frequency Division Multiple Access) TDMA (Time Division Multiple Access) CDMA (Code Division Multiple Access)
10
11
FDMA
c f
12
13
TDMA
c f
2.17.1
Copyright UTL Technologies Ltd 2009. All rights reserved
14
TDMA / FDD
c f
2.18.1
Copyright UTL Technologies Ltd 2009. All rights reserved
15
16
CDMA
How CDMA uses codes to the actual data? User Data : 1011 (to be transmitted) PN Code : 110101 Transmitting Data : 001010 110101 001010 001010 Receiving Data : 001010 110101 001010 001010 PN Code : 110101
17
18
19
20
21
AMPS
D-AMPS
CDMA 2000
TACS
IS-95
GPRS
2.5G NMT GSM UMTS/ W-CDMA
ANALOG
1G
DIGITAL
2G
IMT-2000
3G
22
AMPS
Total Access Communication System UK based, AMPS in 900 MHz band Nordic Mobile Telephone System Scandinavian, Both in 450 MHz and 900 MHz band
NMT
ANALOG SYSTEM
1G
23
D-AMPS
IS-95
GSM
DIGITAL SYSTEM
2G
24
Cellular Standards
Generation
1G 2G 2.5G 3G
European Std
ETACS GSM GPRS UMTS/WCDMA
US Std
AMPS CDMA (IS-95) CDMA 2000 1X CDMA 2000 1x EVDO, EVDV etc..
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
25
ETACS : European Total Access Cellular System. AMPS : Advanced Mobile Phone System
2G Wireless Technologies
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
26
3G Wireless Technologies CDMA 2000 1x EVDO, EVDV etc. WCDMA, IMT 2000 (UMTS) 3.5G Wireless Technologies eHSPA : Evolved High-Speed Packet Access LTE : Long Term Evolution 4G Wireless Technologies
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
27
Standards
Why GSM?
GSM gives mobility without any loss in Audio quality Encryption techniques used gives high security Bit Interleaving for high efficiency in Transmission.
28
29
Variable Power (Power budgeting- extend battery life) Minimum Interference (DTX) Support International Roaming
SMS (Short Message Services)
30
31
Frequency Resource
GSM900 :
Up link: 890~915MHz Down link: 935~960MHz Duplex interval: 45MHz Total Available Bandwidth: 25MHz
32
33
GSM1800 : Up link: 1710-1785MHz Down link: 1805-1880MHz Duplex interval: 95MHz Total Available Bandwidth: 75MHz Channel Bandwidth : 200KHz Total Number of channels : 375
34
GSM1900MHz:
Up link :1850~1910MHz
Down link:1930~1990MHz
35
Frequency Resource
Single Band Network
Which one?
General Priority
900MHz 1800MHz 1900MHz Low
Reason
High
New Operator
Propagation Characteristic
For Operator
Copyright UTL Technologies Ltd 2009. All rights reserved
For Subscriber
36
Frequency Resource
Single Band Network Single Band Dual Band 900MHz 1800MHz
Triple Band
1900MHz
The network determines the handsets to be selected. But nowadays, most handsets support dual band.
37
Frequency Resource
Single Band Network Cell coverage radius :
We know
Propagation characteristic
The higher the propagation frequency The higher the propagation loss 900MHz 1800MHz 1900MHz
38
System
1.Frequencies Uplink Down Link 2.Wavelength 3.Band Width 4.Duplex Distance
GSM 900
890 - 915 MHz
GSM 1800
1710 1785 MHz
GSM 1900
1850 1910 MHz
5.CarrierSeparation
6.Radio Channels
200kHz
125
200kHz
375
200kHz
300
39
Case Study 3:
Why different bands of frequencies are required for operators? What is the difference between different bands of GSM frequencies? Why uplink frequency is less compared to down link frequency?
40
CELLULAR CONCEPT
Wireless Communication
41
42
Access Techniques
Uplink 890 MHz to 915 MHz Down Link 935 MHz to 960 MHz 25 MHz divided into 125 channels of 200 KHz bandwidth ( 25 / 0.2 = 125) 5 MHz BW allocated to each Cellular Service Provider( Maximum 5 operator )
UP 890.0 890.2 890.4 914.8 915.0
DOWN 935.0
935.2
935.4
959.8
960.0
43
What is ARFCN ?
ARFCN--> Absolute Radio Frequency Channel Number used to express one pair of RF channels ARFCN = (fUP -890) / 0.2 or (fdown -935) / 0.2
ARFCN 1 2 124 125
UP
890.0
890.2
890.4
914.8
915.0
DOWN 935.0
935.2
935.4
959.8
960.0
fup=890+0.2*n;
Copyright UTL Technologies Ltd 2009. All rights reserved
fdown=935+0.2*n;
44
T1
T2
T3
T4
T5
T6
T7
ARFCN24 ARFCN25
FOR A PARTICULAR MS
Copyright UTL Technologies Ltd 2009. All rights reserved
45
46
5 ARFCN 4 MHz
.
ARFCN24 ARFCN25
5 MHz / 0.2 MHz = 25 CHANNEL 8 MOBILES CAN SHARE ONE CHANNEL BY TDMA MAXIMUM ACTIVE CALL AT A TIME = 25 * 8=200
47
Cellular Structure
48
49
Pico cells :
The Pico cells are small cells whose diameter is a few dozen meters and are mainly used indoors
Copyright UTL Technologies Ltd 2009. All rights reserved
Umbrella Cells
50
Umbrella cells are used to cover shadow regions of smaller cells and fill in gaps of coverage between those cells. These cells are usually built on high ways to cover the uncovered region.
51
Case Study 4 :
How a cell site will be planned in the network?... Reg.Drive Test &Planning.
What is a Cluster ?
A Cluster is a group of cells. No channels are reused within a cluster. If a cluster has 3 cells, it is called 3 cell cluster, if a cluster has 4 cells, it is called 4 cell cluster, and if it is 7 cells, it is called 7 cell cluster.
52
53
2 2 7 3 7 1
Networking technology that breaks geographic area into cells shaped like honey comb
Cell
1
6 5 4
6
5 2 7 2
7
1 6 5
Copyright UTL Technologies Ltd 2009. All rights reserved
3
6 4
1
5
4 Cell Cluster
54
7 cell Cluster
55
12 Cell Cluster
56
57
10
7 1 3 1 6
15
4
8
6 5
To Overcome Coverage problem, We have to install new BTS in that nearby location
Copyright UTL Technologies Ltd 2009. All rights reserved
Case Study 5:
How frequency planning will be done generally in cell sites? How sectorization will be done in cell sites?
58
59
60
GSM Architecture
61
OMC Server
62
63
+ SIM
=>
Hand portable unit Frequency and Time Synchronization Voice encoding and transmission Voice encryption/decryption functions Power measurements of adjacent cells Display of short messages
Copyright UTL Technologies Ltd 2009. All rights reserved
64
Human Identity to call a MS MSISDN uniquely identifies a mobile subscriber in PSTN Calls will be routed from the PSTN and other networks based on MSISDN number. MSISDN= CC + NDC + SN CC= Country Code (91) NDC= National Destination Code(9848) SN= Subscriber Number (012345)
Copyright UTL Technologies Ltd 2009. All rights reserved
65
67
SNR= Serial Number (6 digits), uniquely identifying all equipment within each TAC & FAC
sp = Spare for future use (1 digit)
68
69
International Mobile Subscriber Identity (IMSI) = (MCC + MNC+MSIN) Personal Identification Number (PIN) Authentication Key (Ki) MSISDN (Mobile Number)
70
71
BTS Hardware : TRX, Combiner, Splitter, OMU, Filters, Multi couplers, Power Supply Modules etc.. BTS Type: Omni-directional, Bi-directional(2 Sector) & Sctorised (3 Sector)
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
72
3 sectored
1 sector
2 sectored
UTL Technologies Ltd
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
73
TRX 1 ARFCN 1
TRX 4 ARFCN 10
SECTOR 1
2+2+2
TRX 2
ARFCN 4
TRX 5 ARFCN 13
SECTOR 2
TRX 3 ARFCN 7
TRX 6 ARFCN 16
SECTOR 3
74
External Interfaces Abis interface towards the BTS A interface towards the MSC Monitors and controls several BTSs Management of channels on the radio interface Performs inter-cell Handover Interface to OMC for BSS Management
BSS Configurations
75
The connectivity between BTS and BSC may be through Optical Fiber or Micro Wave Link.
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
76
How BTS will be configured? How BSC will be configured? How many BTS will be connected to a BSC? How BTS will be connected to a BSC?
Copyright UTL Technologies Ltd 2009. All rights reserved
77
Interface of the cellular network to PSTN Routes calls between PLMN and PSTN Inter-BSC Handover Performs call switching Billing
78
79
Copy of subscriber data from HLR Generates and allocates TMSI for Subscriber confidentiality Location Area Identity (LAI) Mobile Status Mobile Station Roaming Number (MSRN) Provides necessary data when mobile originates call
LAI 01
80
LAI 02 VLR 1
LAI 03
LAI 04 VLR 2
HLR
Copyright UTL Technologies Ltd 2009. All rights reserved
81
Stores Subscriber authentication data called Ki, a copy of which is also stored in in the SIM card Generates security related parameters to authorize a subscriber (SRES) Generates unique data pattern called Cipher key (Kc) for user data encryption Provides triplets - RAND, SRES & Kc, to the HLR on request.
82
83
The OMC provides a central point from which to control and monitor the other network entities (i.e. base stations, switches, database, etc)
UTL Technologies Ltd
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
84
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
85
functions
Event/Alarm Management.
Fault Management.
Performance Management. Configuration Management. Security Management.
Copyright UTL Technologies Ltd 2009. All rights reserved
86
Case Study 7:
How many elements will be there in network with a network operator (for a state)
87
Network Elements
MSC Nokia DX 200 (sub rack and i-series)
88
IN Telcordia
SMSC - Nokia
Copyright UTL Technologies Ltd 2009. All rights reserved
89
Transmission Elements
Nokia DMR 15/18 GHz DMC Radio 15 GHz
90
91
92
93
94
95
96
97
Communication
Total mobility
Worldwide connectivity
High capacity
High transmission quality Security functions
Copyright UTL Technologies Ltd 2009. All rights reserved
98
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
99
100
Internal Handover (Intra-BSS) 1. Within same base station - intra cell Hand over 2. Between different base stations - inter cell or intra BSC Hand over External Handover (Inter-BSS) 1. Within same MSC -intra MSC or Inter BSC Hand over 2. Between different MSCs - inter-MSC Hand over.
UTL Technologies Ltd
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
1 Cell Site
2 Cell Site
3 Cell Site
101
Cell Site
BTS
BTS
BTS
BTS
BSC
BSC
BSC
2.Inter cell/Intra BSC Hand over 3.Inter BSC/Intra MSC Hand over 4.Inter MSC Hand over UTL Technologies Ltd
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
MSC
MSC
102
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
103
Case study 8:
Why call drops will happen in a network even when handovers are present in a network?
104
ROAMING CONCEPT
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
105
Roaming:
Roaming is defined as the ability for a cellular customer to automatically make & receive voice calls, send & receive data, or access other services when traveling outside the geographical coverage area of the home network, by means of using a visited network.
UTL Technologies Ltd
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
106
1.National Roaming: If the visited network is in the same country as the home network, this is known as National Roaming. 2. International Roaming: If the visited network is outside the home country, this is known as International Roaming (the term Global Roaming has also been used).
UTL Technologies Ltd
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved
107
3.Inter-Standard Roaming: If the visited network operates on a different technical standard than the home network, this is known as Interstandard roaming.
108
AUTHENTICATION
109
Authentication Process
To discuss the authentication process, assume that the VLR has all the information required to perform that authentication process (Kc, SRES and RAND). If this information is unavailable, then the VLR would request it from the HLR/AUC. 1. Triples (Kc, SRES and RAND) are stored at the VLR. 2. The VLR sends RAND via the MSC and BSS, to the MS (unencrypted).
Copyright UTL Technologies Ltd 2009. All rights reserved
110
111
4. Within the VLR the value of SRES is compared with the SRES received from the mobile. If the two values match, then the authentication is successful.
112
6. The mobile calculates Kc from the RAND and A8 and Ki on the SIM. 7. Using Kc, A5 and the GSM hyper frame number, encryption between the MS and the BSS can now occur over the air interface .
113
Channel concept
Physical channel: One timeslot of a TDMA-frame on one ARFCN is referred to as a physical channel. There are 8 physical channels per carrier in GSM, channel 0-7(timeslot 0-7) Logical channel: Depending on the kind of information transmitted, we refer to different logical channels. These logical channels are mapped on physical channel.
114
115
Logical channels
Logical channels
Control channels
Traffic channels
BCH
CCCH
DCCH
Half rate
Full rate
116
117
Cell identity.
118
Control channels
I. Broadcast channels BCH
2)Frequency correction channel-FCCH This is transmitted frequently on the BCCH timeslot and allows the mobile to synchronize its own frequency to that of the transmitting base site.
119
3) Synchronization Channel-SCH This is used by the MS to synchronize to the TDMA frame structure within the particular cell.
120
1) Paging Channel-PCH
The information on this channel is a paging message including the MSs identity(IMSI).This is transmitted on Downlink.
121
122
123
Control channels
124
125
Traffic Channels-TCH
126
Full rate traffic channel occupies one physical Channel (one TS on a carrier)
Two half rate TCHs can share one physical channel.
127
TDMA FRAME
128
129
BURSTS
Burst
130
The information format transmitted during one timeslot in the TDMA frame is called a burst.
A Burst consists of several different elements.
Information : This is the area in which the speech, data or control information is held. Tail Bits : These are used to indicate the beginning and end of the burst.
131
Stealing Flags : These two bits are set when a traffic channel burst has been stolen by a FACCH (the Fast Associated Control Channel). One bit set indicates that half of the block has been stolen.
132
Guard
Period :
The BTS and MS can only receive the burst and decode it, if it is received within the timeslot designated for it.
To be precise, the timeslot is 0.577 ms long, whereas the burst is only 0.546 ms long; therefore there is a time difference of 0.031 ms to enable the burst to hit the timeslot.
133
134
Synchronization Burst
Dummy Burst
Normal Burst
135
Normal Burst : The normal burst carries traffic channels and all types of control channels apart from those mentioned specifically below. (Bi-directional).
156.25 bits OR 576.92 us
T Coded Data 3 57
S T. Seq. 1 26
Tail Bit(T) :Used as Guard Time Coded Data :It is the Data part associated with the burst Stealing Flag :This indicates whether the burst is carrying Signaling data. Training Seq. :This is a fixed bit sequence known both to the BTS & the MS.This takes care of the signal deterioration.
Copyright UTL Technologies Ltd 2009. All rights reserved
136
Synchronization Burst
137
It is so called because its function is to carry SCH downlink, synchronizing the timing of the MS to that of the BTS
138
Dummy Burst
Used when there is no information to be carried on the unused timeslots of the BCCH Carrier (downlink only).
139
Access Burst
This burst is of much shorter duration than the other types. Whenever the MS tries to access the BTS, the information that is sent is called Access Burst. (The Access Burst is uplink only.)
140
141
142
143
Transeiver
Speaker
Battery
LCD Display
ARM Processor
Micro phone
Keypad
144
MOBILE STATION
TX PART TX MODULATOR BURST FORMATING CIPHERING INTERLEAVING CHANNEL CODING RX PART RX DEMODULATOR VITERBI EQULISER DE-CIPHERING DE-INTERLEAVING DECODING
SPPECH CODING
SEGMENTATION A/D CONVERSION Microphone
Copyright UTL Technologies Ltd 2009. All rights reserved
SPPECH DECODING
145
One of the primary functions of an MS is to convert the analog speech information into digital form for transmission using a digital signal.
The analog to digital conversion (A/D) conversion process outputs a collection of bits; binary ones and zeroes which represent the speech input
146
The A/D Conversion is performed by using a process called Pulse Code Modulation (PCM). PCM involves three main steps. Sampling Quantization Coding.
147
Sampling:
Sampling involves measuring the analog signal at specific time intervals. The accuracy of describing the analog signal in digital terms depends on how often the analog signal is sampled. This is expressed as the sampling frequency
148
To reproduce an analog signal without distortion, the signal, must be sampled with at least twice the frequency of the highest frequency component in the analog signal.
149
Normal speech mainly contains frequency components lower than 3400 Hz.
Applying the sampling theory to analog speech signals, the sampling frequency should be at least 2X3.4 kHz=6.8 kHz.
Telecommunication systems use a sampling frequency of 8 kHz, which is acceptable based on the sampling theory.
150
Quantization:
The amplitude of the signal at the time of sampling is measured and approximated to one of a finite set of values The degree of accuracy depends on the number of quantization levels used. Within common telephony, 256 levels are used while in GSM 8,192 levels are used.
Coding
151
Coding involves converting the quantized values into binary. Every value is represented by a binary code of 13 bits (213=8192).
For example, a quantized value of 2,157 would have a bit pattern of 0100001101101:
Copyright UTL Technologies Ltd 2009. All rights reserved
152
Bit
12
11
10
Total
Set to Value
0 0
1 2048
0 0
0 0
0 0
0 0
1 64
1 32
0 0
1 8
1 4
0 0
1 1
2157
153
The result from the process of A/D Conversion is 8,000 samples per second of 13 bits each. This is a bit rate of 104 kbits/s. When it is considered that 8 subscribers use one radio channel, the overall bit rate would not fit into the 200 kHz available for all 8 subscribers. The bit rate must be reduced somehow. This is achieved using segmentation and speech coding
154
The speech coding process analyzes speech samples and outputs parameters of what the speech consists of. Segmentation: Given that speech organs are relatively slow in adapting to changes, the filter parameters representing the speech organs are approximately constant during 20 ms..
Copyright UTL Technologies Ltd 2009. All rights reserved
155
For this reason, when coding speech in GSM, a block of 20 ms is coded into one set of bits. In effect, it is similar to sampling speech at a rate of 50 times per second instead of the 8,000 used by A/D conversion
156
157
Sampling at 8 KHz & Coding using 13bits =104 Kbps 2080 bits / 20ms 260 bits / 20ms
SEGMENTATION
20 ms block SPEECH CODER BITS ORDERED Important Very Important 132 bits 50 bits BLOCK CODER Other 78 bits
= 2080 bits/20ms
CONVOLUTION CODER
158
159
The first block of 50 bits is sent through a block coder, which adds three parity bits that will result in 53 bits. These three bits are used to detect errors in a received message. The 53 bits from first block, the 132 bits from the second block and 4 tail bits (total: 189) are sent to a 1:2 convolutional coder which outputs 378 bits. Bits are added by the convolutional coder enable the correction of errors when the message is received. The bits of block 3 are not protected.
Copyright UTL Technologies Ltd 2009. All rights reserved
160
STAGE 5 : INTERLEAVING
First level of interleaving:
161
The channel coder provides 456 bits for every 20 ms of speech. These are interleaved, forming eight blocks of 57 bits each, as shown in the figure below.
In a normal burst, there is space for two of these speech blocks or 57 bits, as can be seen in figure. The remaining bits are like tail bits, stealing flags, training sequence and guard period. Thus, if one burst of transmission is lost, there is a 25% BER for the entire 20 ms of speech (2/8=25%).
Copyright UTL Technologies Ltd 2009. All rights reserved
162
163
If only one level of interleaving is used, a loss of this burst results in a total loss of 25%. This is too much for the channel decoder to correct. A second level of interleaving can be introduced to further reduce the possible BER to 12.5%.
164
Instead of sending two blocks of 57 bits from the same 20 ms of speech within one burst, a block from one 20 ms and a block from next sample of 20 ms are sent together. A delay is introduced in the system when the MS must wait for the next 20 ms of speech. However, the system can now afford to loose a whole burst, out of eight, as the loss is only 12.5% of the total bits from each 20 ms speech frame. 12.5% is the maximum loss level that channel decoder can correct
Diagonal interleaving
165
STAGE 6: CIPHERING/ENCRYPTION
166
The purpose of ciphering is to encode the burst so that it cannot be interpreted by any other device than the intended receiver. The ciphering algorithm in GSM is called A5 algorithm.
167
As previously explained, every transmission from an MS/BTS must include some extra information such as training sequence. The process of burst formatting is to add these bits (along with some others such as tail bits) to the basic speech/data being sent. This increases the overall bit-rate, but is necessary to counteract problems encountered on the radio path.
Copyright UTL Technologies Ltd 2009. All rights reserved
168
In GSM, the input to burst formatting is the 456 bits received from ciphering, Burst formatting adds a total of 136 bits per block of 20 ms, bringing the overall total to 592.
169
170
171
Close it
Select BTS in the Menu of BTS Manager Send the file to BTS
Copyright UTL Technologies Ltd 2009. All rights reserved
172
Go to Wizard
Select Manual commissioning Give BCF ID, BSC ID, site Name etc Click Next Abis will be in LAPD State, continue, click OK (Do You want to commission without Abis, click Yes) Give EAC inputs, click Next Give EAC outputs, click Next
Copyright UTL Technologies Ltd 2009. All rights reserved
173
Launch Ultra BTS Hub Manager in tools menu Double Click on E1/T1 card or FXC/RRI Give LIF settings
174
Synchronization TRX_1 TRX_1 TRX_2 TRX_2 TRX1_S TRX2_S TRX_1 TRX_1 TRX_2 TRX_2 OMU1_S OMU2_S TRX_1 TRX_1 TRX_2 TRX_2 TRX_1 TRX_1 TRX_2 TRX_2
Signaling
175
TRX_1 TRX_2
TRX_2
Signaling
176
Synchronization TRX_1 TRX_1 TRX_2 TRX_2 TRX1_S TRX2_S TRX_1 TRX_1 TRX_2 TRX_2 OMU1_S OMU2_S TRX_1 TRX_1 TRX_2 TRX_2 TRX_1 TRX_1 TRX_2 TRX_2
Signaling
177
TRX_1
TRX_12 TRX_12
TRX1_S TRX2_S
TRX3_S TRX4_S TRX5_S TRX6_S
OMU1_S
TRX11_S TRX12_S
Signaling
178
Synchronization TRX_1 TRX_1 TRX_12 TRX_12 TRX1_S TRX2_S TRX3_S TRX4_S TRX5_S TRX6_S TRX_1 TRX_1 TRX_12 TRX_12 OMU1_S OMU2_S OMU3_S OMU4_S OMU5_S OMU6_S TRX_1 TRX_1 TRX_12 TRX_12 TRX7_S TRX_1 TRX_1 TRX_12 TRX_12 OMU7_S
179
180
181
The MSISDN consists of the following: CC: Country code NDC: National Destination Code SN: Subscriber Number
International Mobile Station ISDN number
CC
NDC
SN
182
International Mobile Subscriber Identity (IMSI): The International Mobile Subscriber Identity (IMSI) is a unique identity allocated to each subscriber that facilitates correct subscriber information over the radio path and through the network. It is used for all signaling in the PLMN. All Network related subscriber information is connected to an IMSI. The IMSI is stored in the SIM, the HLR and in the serving VLR.
Copyright UTL Technologies Ltd 2009. All rights reserved
183
MCC
MSIN
National MSI
IMSI
The IMSI consists of three different parts. MCC: Mobile Country Code MNC: Mobile Network Code MSIN: Mobile Station Identification Number
Copyright UTL Technologies Ltd 2009. All rights reserved
184
The Temporary Mobile Subscriber Identity (TMSI) is a temporary IMSI number made known to an MS at registration. It is used to protect the subscribers identity on the air interface. The TMSI has local significance only (that is, within the MSC/VLR area) and is changed when certain events occur. Every operator can chose TMSI structure, but should not consist of more than 8 digits.
185
The International Mobile Equipment Identity (IMEI) is used to uniquely identify MS equipment to the network. The IMEI is used for security procedures such as identifying stolen equipment and preventing unauthorized access to the network. According to the GSM specifications, IMEI has a total length of 15 digits, and consists of the following.
186
TAC (6 digits) FAC (2 digits) SNR (6 digits) SPARE (1 digit)
IMEI
TAC: Type Approval code, determined by a central GSM FAC: Final Assembly code, identifies the manufacturer SNR: Serial Number, an individual serial number of six digits uniquely identifies all equipment within each TAC and FAC. Spare: A spare Digit for future use. When transmitted by the MS, this digit should always be zero.
Copyright UTL Technologies Ltd 2009. All rights reserved
187 International mobile Equipment Identity and Software Version Number (IMEISV):
The International Mobile Equipment Identity and Software Version Number (IMEISV) provide a unique identity for every MS and also refers to the version of software, which is installed in the MS. The version of software is important as it may affect the services offered by the MS or its speech coding capabilities.
188
TAC (6 digits)
FAC (2 digits)
SNR ( 6 digits)
SVN (2 digits)
IMEISV
TAC : Type Approval Code FAC : Final Assembly code SNR : Serial Number SVN : Software Version Number allows the mobile equipment manufacturer to identify different Software versions of a given type approved mobile. SVN value 99 is reserved for future use.
Copyright UTL Technologies Ltd 2009. All rights reserved
189
190
CC
NDC
SN
CC : Country Code NDC: National Destination Code SN : Serving Node (in this case, SN is the address to serving MSC/VLR.
191
The Location Area Identity (LAI) is a temporary network identity, which is also required for routing.
The two main purposes of the LAI are: 1.Paging, which is used to inform the MSC of the LA in which the MS is currently situated.
192
LAC: Location Area code, the maximum length of LAC is 16 bits, enabling 65,536 different location areas to be defined in one PLMN
193
The Base Station Identity Code (BSIC) enables MSs to distinguish between different base stations sending on the same frequency.
BSIC
194
NCC: Network Color Code (3 bits) identifies the PLMN. Note that it does not uniquely identify the operator. NCC is primarily used to distinguish between operators on each side of the border.
BCC: Base Station color Code (3 bits), identifies the Base Station to help distinguish between BTS using the same control frequencies
Different States of an MS
An MS can have one of the following states: Idle: The MS is ON, but a call is not in progress. Active: the MS is On and a call is in Progress.
195
196
Mode Idle Mode Term Registration Roaming International Roaming Description This is the process, which an MS informs a network that it is attached. When am MS moves around a network in idle mode, it is referred to as roaming. When an MS moves into a network, which is not, its home network, it is referred to as international roaming. MSs can only roam into networks with which the home network has a roaming agreement. An MS roaming around the network must inform the network when it enters a new LA. This is called location Updating. This is the process whereby a network attempts to contact a particular MS. This is achieved by broadcasting a paging message containing the identity of that MS. This is the process in which control of a call is passed from one cell to another while the MS moves between cells.
Location Updating
Paging
Active Mode
Handover
Detached Mode
In this mode no traffic cases are present. MS is switched OFF in this case.
197
When an MS is switched ON, the IMSI attach procedure is executed. This involves the following steps:
The MS sends an IMSI attach message to the network, indicating that it has changed state to idle.
The VLR determines whether there is a record for the subscriber already present. If not, the VLR contacts the subscribers HLR for a copy of the subscription information.
The VLR updates the MS status to idle. Acknowledgement is sent to the MS.
Copyright UTL Technologies Ltd 2009. All rights reserved
198
BSC/TRC
MSC/VLRR
2 4
199
If the MS has changed LA while powered off, the IMSI attach procedure may lead to an update to the location of the MS. During IMSI attach, the VLR may determine that the current LAI of the MS is different from the LAI stored in the MSs subscription information. If so, the VLR updates the LAI of the MS.
IMSI DETACH
IMSI detach enables the MS to indicate to the network that it is switched ff. At power off, the MS sends an IMSI detach message to the network. On reception, the VLR marks the corresponding IMSI detached. The HLR is not informed. No acknowledgement is sent to the MS.
200
201
TRAFFIC ENGINEERING
202
203
Traffic Intensity :
The instantaneous traffic in a pool of resources is the number of busy resources at a given instant of time. Traffic intensity is a measure of the average occupancy of a facility during a specified period of time, normally a busy hour, measured in traffic units (erlangs) and defined as the ratio of the time during which a facility is occupied (continuously or cumulatively) to the time. This facility is available for occupancy. Traffic Intensity = Call Request Rate X Holding Time. Au = H, Where = Average Number of Call requests per unit time for each user. H = Average Duration of a call.
Copyright UTL Technologies Ltd 2009. All rights reserved
204
Calling Rate : The number of times a route or traffic path is used per unit time, more properly defined, the call intensity per traffic path during busy hour. Holding time : The average duration of occupancy of a traffic path by a call. Traffic intensity : It is the average number of calls simultaneously in progress during a particular period of time. It is measured either in units of Erlangs or CCS.
Copyright UTL Technologies Ltd 2009. All rights reserved
205
An average of one call in progress during an hour represents a traffic intensity of 1 Erlang or 1 Erlang=1X3600 call seconds=36 CCS. Traffic intensity can be obtained as:
Traffic intensity = (The sum of circuit holding time)/(the duration of the monitoring period)
206
1. If the carried load for a component is 2900 CCS at 5% blocking, what is the offered load? Sol: Offered load = 2900/(1-0.05)=3050 CCS.
2. In a voice network, each subscriber generates two calls/hour on average and a typical call holding time is 120 seconds. What is the traffic intensity?
Sol : Intensity = 2X120/3600 = 0.0667 Erlangs = 2.4 CCS.
207
Call Number
3. To determine voice traffic on a line, the following data was collected during a period of 90 minutes (refer the table below). Calculate the traffic intensity in Erlangs and CCS
1 2 3 4 5 6 7 8 9 10
208
Sol: Call arrival Rate : 10 calls/1.5 hours =6.667 calls/Hour Average holding time : (60+74+80+90+92+70+96+48+64+126) / 10 = 80 seconds Intensity = 6.667X80/3600=0.148 Erlangs = 5.53 CCS.
209
4. The data in the table below was recorded by observing the activity of a single customer line during the eight hour period from 9.00 A.M. to 5.00 P.M. Determine the traffic intensity during the eight hour period, during the Busy Hour (which is assumed to be between 4:00 PM. And 5:00 P.M).
210
Call Number 1 2
3
4 5 6
10:17
10:24 10:37 10:55
10:24
10:34 10:42 11:00
7
8 9 10
12:01
2:09 3:15 4:01
12:02
2:14 3:30 4:35
11
4:38
4:43
211
Calls/Hour
Total call minutes = 3+10+7+10+5+5+1+5+15+34+5 = 100 minutes
Call holding time = (100 minutes/11 calls)X 1Hr/60 mnts = 0.515 hour/call
The traffic intensity I = 1.375 X 0.1515 = 0.208 Erlangs = 7.5 CCS.
212
The busy hour is 4:00 P.M to 5:00 P.M. Since there are only two calls between this period, the call arrival rate = 2 calls/Hr The average call holding time during busy hour : (34+5) min/2 calls = 19.5 minutes/call =0.325 hour/call The traffic load in the BH is I= 2X0.325 = 0.65 Erlang =23.4 CCS.
213
GSM SERVICES
214
Basic Services
Basic Services can be divided into 2 types:
215
Tele services:
A tele service allows the subscriber to communicate (usually via voice, fax, data or SMS) with another subscriber. It is a complete system including necessary terminal equipment.
Copyright UTL Technologies Ltd 2009. All rights reserved
Bearer Services:
216
A bearer service transports speech and data as digital information within the network between user interfaces. A bearer service is the capability to transfer information and does not include the end user equipment. Every tele service is associated with a bearer service. For example, a bearer service associated with the speech telephony tele service is the timeslot assigned to a call on a TDMA
TELE SERVICES:
217
The following are the major tele services supported by GSM System. 1. Speech 2. Emergency Calls 3. Dual Tone Multi Frequency (DTMF) 4. Alternate Speech/Fax
BEARER SERVICES:
1. Traffic to PSTN
218
2. Traffic to ISDN
3. Traffic to Packet Switched Public Data Networks (PSPDN) 4. Traffic to Circuit Switched Public Data Networks (CSPDN) 5. Traffic to Internet
Copyright UTL Technologies Ltd 2009. All rights reserved
SUPPLEMENTARY SERVICES
1. Call Forwarding 2. Barring of outgoing calls 3. Bar all outgoing calls 4. Bar all outgoing international calls 5. Bar all outgoing international calls except those directed to the home PLMN 6. Call waiting 7. Multi party service 8. Closed User Group (CUG)
Copyright UTL Technologies Ltd 2009. All rights reserved
219
220
BATTERY LIFE
Battery Life
One of the main factors, which restrict reducing the size of a MS, is the battery. A battery must be large enough to maintain a telephone call for an acceptable amount of time without needing to be recharged. Since there is demand for MSs to become smaller and lighter the battery must also become smaller and lighter.
Copyright UTL Technologies Ltd 2009. All rights reserved
221
222
The features which enable the life of a GSM MS battery to be extended are : 1.Power Control
1. Power Control:
223
This is a feature of the GSM air interface which allows the network provider to not only compensate for the distance from MS to BTS as regards timing, but can also cause the BTS and MS to adjust their power output to take account of that distance also.
224
The closer the MS is to the BTS, the less the power it and the BTS will be required to transmit. This feature saves radio battery power at the MS, and helps to reduce co-channel and adjacent channel interference
Power Control
225
226
227
DTX increases the efficiency of the system through a decrease in the possible radio transmission interference level. It does this by ensuring that the MS does not transmit unnecessary message data.
DTX can be implemented, as necessary, on a call-by-call basis. The effects will be most noticeable in communications between two MS.
228
DRX allows the MS to effectively switch off during times when reception is deemed unnecessary. This allows the MS to go to sleep and listen-in only when necessary, with the effective saving in power usage. DRX may only be used when a MS is not in a call.
229
230
Call flow :
231
1. The incoming call is passed from the fixed network to the gateway MSC (GMSC).
2. Then, based on the IMSI numbers of the called party, its HLR is determined. 3. The HLR checks for the existence of the called number. Then the relevant VLR is requested to provide a mobile station roaming number (MSRN).
232
4. This is transmitted back to the GMSC. 5. Then the connection is through from GMSC to the responsible MSC. 6. Now the MSC queries the VLR for the location range and reachability status of the mobile subscriber. 7. If the MS is marked reachable, VLR asks the MSC to go ahead with necessary paging message.
8. MSC asks the BSC for the same, then the BSC asks the BTS to send a paging message.
233
9. Then the particular mobile subscriber telephone responds to the page request through RACH. This will be forwarded to the BSC and MSC. 10.SDCCH will be provided through AGCH by the BSC with the instructions from MSC. SDCCH handles all necessary security procedures like authentication, IMEI check etc. 11.If this is successful, the VLR indicates to the MSC to go ahead with the call. 12. The traffic channel will be provided and the call can be completed.
Copyright UTL Technologies Ltd 2009. All rights reserved
234
235
1. MS after dialing a number and press send key uses RACH to ask for a signaling channel. 2. The BSC allocates a signaling channel, using AGCH. 3. The MS sends a call setup request through SDCCH, to the MSC/VLR. Over SDCCH, all signaling takes place. This includes:
Copyright UTL Technologies Ltd 2009. All rights reserved
236
Marking the MS status as active in the VLR (if the MS status is not updated earlier). The Authentication Procedure
Ciphering
Equipment Identification
237
4. The MSC/VLR instructs the BSC to allocate an idle TCH. The BTS and MS are told to tune to the TCH. 5. The MSC/VLR forwards the called number to an exchange in the PSTN, which establishes a connection to the subscriber. 6. If the called subscriber answers, the connection is established.
Copyright UTL Technologies Ltd 2009. All rights reserved
238
Case Study 9:
How Call flow happens in reality from the cell site? (PSTN Demo and BTS Video)
239
240
2. The BSC sends a message to the MS, via the old BTS, containing information about the frequency and time slot to change to and also the output power to use. This information is sent to the MS using FACCH. 3. The MS tunes to the new frequency, and transmits handover access burst in the correct time slot. Since the MS had no
Copyright UTL Technologies Ltd 2009. All rights reserved
241
4. When the new BTS detects the hand over bursts, it sends the information about TA. This is also sent through FACCH.
5. The MS sends a handover complete message to the BSC through the new BTS.
6. The BSC tells the old BTS to release the old TCH
242 .Hand over between cells controlled by different BSCs but the same MSC/VLR :
243
1. The serving BSC sends a Hand over Required Message to the MSC containing the identity of the target cell 2. The MSC knows which BSC controls this cell and sends a Hand over Request to this BSC. 3. The new BSC orders the target BTS to activate a TCH. 4. The new BSC sends a message to the MS through the MSC and the old BTS.
Copyright UTL Technologies Ltd 2009. All rights reserved
244
5. MS tunes to the new frequency and transmits handover access bursts in the correct time slot.
245
246
1. The serving (old) BSC sends a Hand over required message to the serving MSC (MSC-A), with the identity of the target cell. 2. MSC-A identifies that this cell belongs to another MSC (MSC-B), and requests help. 3. MSC-B allocates a hand over number to reroute the call. A Hand over Request is then sent to the new BSC.
Copyright UTL Technologies Ltd 2009. All rights reserved
247
4. The new BSC orders the target BTS to activate a TCH. 5. MSC-B receives the information, and passes it on to MSC-A together with the handover number.
8. The MS tunes to the new frequency and transmits hand over access burst in the correct time slot.
Copyright UTL Technologies Ltd 2009. All rights reserved
248
9. When the new BTS detects the hand over burst it sends information about TA.
10. The MS sends hand over complete message to the old MSC, through the new BSC and the new MSC/VLR.
11. A new path in the group switches in MSC-A is established, and the call is switched through. 12. The old TCH is deactivated by the old BSC.
Copyright UTL Technologies Ltd 2009. All rights reserved
249
250
The point-to-point SMS provides a mechanism for transmitting "short" messages to and from wireless handsets. The service makes use of a short message service center (SMSC), which acts as a store and forward system for short messages. The wireless network provides for the transport of short messages between the SMSCs and wireless handsets.
Copyright UTL Technologies Ltd 2009. All rights reserved
251
A distinguishing characteristic of the service is that an active mobile handset is able to receive or submit a short message at any time, independent of whether or not a voice or data call is in progress. SMS also guarantees delivery of the short message by the network. Temporary failures are identified, and the short message is stored in the network until the destination becomes available.
252
SME Short Message Entity SMS Short Message Service SMSC Short Message Service Center
Copyright UTL Technologies Ltd 2009. All rights reserved
253
SMS-GMSC Gateway Mobile Switching Center SMS-IWMSC SMS Inter working Mobile Switching Center
254
Short Messaging Entities Short messaging entity (SME) is an entity which may receive or send short messages. The SME may be located in the fixed network, a mobile station, or another service center. Short Message Service Center Short message service center (SMSC) is responsible for the relaying and store-and forwarding of a short message between an SME and mobile station.
255
The SMS gateway MSC (SMS-GMSC) is an MSC capable of receiving a short message from an SMSC, interrogating a home location register (HLR) for routing information, and delivering the short message to the "visited" MSC of the recipient mobile station. The SMS inter working MSC (SMS-IWMSC) is an MSC capable of receiving a short message from the mobile network and submitting it to the appropriate SMSC. The SMSGMSC/ SMSIWMSC are typically integrated with the SMSC.
Copyright UTL Technologies Ltd 2009. All rights reserved
256
The mobile switching center (MSC) performs the switching functions of the system and controls calls to and from other telephone and data systems.
257
All radio-related functions are performed in the base station system (BSS). The BSS consists of base station controllers (BSCs) and the base transceiver stations (BTSs), and its primary responsibility is to transmit voice and data traffic between the mobile stations.
Service Elements
258
SMS comprises several service elements relevant to the reception and submission of short messages: Validity period: The validity period indicates how long the SMSC shall guarantee the storage of the short message before delivery to the intended recipient. Priority: Priority is the information element provided by an SME to indicate the priority message.
Copyright UTL Technologies Ltd 2009. All rights reserved
259
Figure 3 depicts the successful MT-SM scenario. For convenience, the GSM method is illustrated.
260
261
1. The short message is submitted from the SME to the SMSC. 2. After completing its internal processing, the SMSC interrogates the HLR and receives the routing information for the mobile subscriber. 3. The SMSC sends the short message to the MSC using the forward Short Message operation.
Copyright UTL Technologies Ltd 2009. All rights reserved
262
4. The MSC retrieves the subscriber information from the VLR. This operation may include an authentication procedure. 5. The MSC transfers the short message to the MS. 6. The MSC returns to the SMSC the outcome of the forward Short Message operation. 7. If requested by the SME, the SMSC returns a status report indicating delivery of the short message.
263
Figure 4 depicts the successful MO-SM scenario. For convenience, the GSM method is shown.
264
265
2. The MSC interrogates the VLR to verify that the message transfer does not violate the supplementary services invoked or the restrictions imposed.
3. The MSC sends the short message to the SMSC using the forward Short Message operation.
Copyright UTL Technologies Ltd 2009. All rights reserved
266
4. The SMSC delivers the short message to the SME. 5. The SMSC acknowledges to the MSC the successful outcome of the forward Short Message operation. 6. The MSC returns to the MS the outcome of the MO-SM operation.
267
The Short Message Service (SMS) provides a means of sending text messages containing up to 160 alphanumerical characters to and from MSs. SMS makes use of a SMS Center (SMS-C), which acts as a store and forward center for short messages. SMS consists of two basic services Mobile Originated SMS : From an SMS-C to an MS.
268
In the two cases described below, the MS is in idle mode. If the MS is in active mode, short message is transmitted on the SACCH. No paging, Call set up, authentication, etc needs to be performed in that case.
269
270
1. An MS establishes a connection to the network, as in the case of a normal call set-up. This step is not performed if the MS is in active mode, since the connection already exists. 2. If authentication is successful, the MS sends the short message using SDCCH to the SMS-C via the MSC/VLR. The SMS-C in turn forwards the short message to its destination. This could be an MS or a terminal in the fixed network such as a PC.
Copyright UTL Technologies Ltd 2009. All rights reserved
271
Mobile Terminated SMS has the capability to transfer a short message from the SMS-C to an MS.
272
273
6. The MS is paged and a connection is set up between the MS and the network, as in the normal call set up case. 7. If authentication is successful, the MSC/VLR delivers the message to the MS. Short Messages are transmitted on the allocated signalling channel, SDCCH. 8. If the delivery was successful, a report is sent from the MSC/VLR to the SMS-C, if not, the HLR is informed by the MSC/VLR, and a failure report is sent to SMS-C.
Copyright UTL Technologies Ltd 2009. All rights reserved
274
In the case of an unsuccessful delivery, the SMS-C informs the HLR and VLR that there is a message waiting to be delivered to the MS. The HLR then informs the SMS-C when the MS becomes available.
275