Você está na página 1de 274

1

Copyright UTL Technologies Ltd 2009. All rights reserved

Copyright UTL Technologies Ltd 2009. All rights reserved

Copyright UTL Technologies Ltd 2009. All rights reserved

INTRODUCTION

Copyright UTL Technologies Ltd 2009. All rights reserved

Communication: It is the process of transferring information from one place to another place.
Any Communication System requires the following:

Transmitter
Channel Receiver

UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

Types of communication Systems :


Type Simplex Half Duplex Description One way only Two way, only one at a time Example FM radio, Television etc.. Walkie Talkie

Full Duplex

Two way, both at the same time

Mobile Systems

UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

Frequency Spectrum and its Applications

UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

Range

Frequency Band

Application

VLF
LF MF

3 KHz 30 KHz
30KHz to 300 KHz 300KHz to 3MHz

Submarine Application
Navigational Application Cordless Phones, AM radio

HF
VHF UHF SHF EHF

3 MHz to 30 MHz
30 MHz to 300 MHz 300 MHz to 3GHz 3 GHz to 30 GHz 30 GHz to 300 GHz

Aeronautical, Amateur radio


FM Broadcast, TV Applications TV, Mobile Communication Point to Point, Satellite Comm. Point to Point microwave

UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

Multiple Access Method :


It determines how several users can share a medium with minimum or no interference.

Access Methods
FDMA (Frequency Division Multiple Access) TDMA (Time Division Multiple Access) CDMA (Code Division Multiple Access)

Copyright UTL Technologies Ltd 2009. All rights reserved

10

Frequency Division Multiple Access (FDMA) :


An approach to sharing a channel by separating the simultaneous users in frequency

Copyright UTL Technologies Ltd 2009. All rights reserved

11

FDMA
c f

Copyright UTL Technologies Ltd 2009. All rights reserved

12

Time division multiple access (TDMA)


Approach for allotting single-channel usage amongst many users, by dividing the channel into slots of time during which each user has access to the medium.

Copyright UTL Technologies Ltd 2009. All rights reserved

13

TDMA

c f

2.17.1
Copyright UTL Technologies Ltd 2009. All rights reserved

14

TDMA / FDD

c f

2.18.1
Copyright UTL Technologies Ltd 2009. All rights reserved

15

Code Division Multiple Access (CDMA) :


Approach for allotting the channel usage amongst many users, by converting the speech signals of all users in to different codes.

Copyright UTL Technologies Ltd 2009. All rights reserved

16

CDMA

Copyright UTL Technologies Ltd 2009. All rights reserved

How CDMA uses codes to the actual data? User Data : 1011 (to be transmitted) PN Code : 110101 Transmitting Data : 001010 110101 001010 001010 Receiving Data : 001010 110101 001010 001010 PN Code : 110101

17

Final Data : 111111 000000 111111 111111 Received Data : 1011

Copyright UTL Technologies Ltd 2009. All rights reserved

18

How CDMA uses codes to the actual data?

Copyright UTL Technologies Ltd 2009. All rights reserved

19

What we do, we can undo

Copyright UTL Technologies Ltd 2009. All rights reserved

20

Copyright UTL Technologies Ltd 2009. All rights reserved

21

EVOLUTION MOBILE COMMUNICATION

AMPS

D-AMPS
CDMA 2000

TACS

IS-95

GPRS
2.5G NMT GSM UMTS/ W-CDMA

ANALOG
1G

DIGITAL
2G

IMT-2000
3G

Copyright UTL Technologies Ltd 2009. All rights reserved

22

ANALOG MOBILE COMMUNICATION Advanced Mobile Phone Service


US based, 800 MHz band
TACS

AMPS

Total Access Communication System UK based, AMPS in 900 MHz band Nordic Mobile Telephone System Scandinavian, Both in 450 MHz and 900 MHz band

NMT

ANALOG SYSTEM
1G

Copyright UTL Technologies Ltd 2009. All rights reserved

23

DIGITAL MOBILE COMMUNICATION


Dual mode AMPS US, Analog signaling and Digital voice coding IS-95 US, CDMA based GLOBAL SYSTEMS FOR MOBILE COMMUNICATIONS European standard, Both in 900 MHz & 1800 MHz band

D-AMPS

IS-95

GSM

DIGITAL SYSTEM
2G

Copyright UTL Technologies Ltd 2009. All rights reserved

24

Cellular Standards
Generation
1G 2G 2.5G 3G

European Std
ETACS GSM GPRS UMTS/WCDMA

US Std
AMPS CDMA (IS-95) CDMA 2000 1X CDMA 2000 1x EVDO, EVDV etc..

UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

25

First Generation Wireless Technologies

ETACS : European Total Access Cellular System. AMPS : Advanced Mobile Phone System
2G Wireless Technologies

GSM : Global System for Mobile Communication IS 95 : Interim Standard 95 (CDMA-One)


2.5G Wireless Technologies

GPRS : General Packet Radio Service CDMA 2000 1x RTT


UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

26

3G Wireless Technologies CDMA 2000 1x EVDO, EVDV etc. WCDMA, IMT 2000 (UMTS) 3.5G Wireless Technologies eHSPA : Evolved High-Speed Packet Access LTE : Long Term Evolution 4G Wireless Technologies

UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

27

Comparison of 4G with Other Mobile Technologies


Technology
Design began 1G 2G 1970 1980 Implementation Service 1984 1991 Analog voice and data AMPS,TACS, CDMA,GSM, Data Rate 1.9kbps 14.4kbps Multiplexing FDMA TDMA,CDMA TDMA,CDMA CDMA CDMA? Highercapacity data Transfer (internet) GPRS,EDGE, Cdma 20001XRTT 384kbps Highercapacity data Transfer with more data rates UMTS/WCDMA, CDMA2000 1xEVDO etc 2Mbps Higher capacity multimedia Single standard 200Mbps 1999 2002 2010? 1985 1990 2000 2.5G 3G 4G

Digital voice and data (SMS)

Standards

Copyright UTL Technologies Ltd 2009. All rights reserved

Why GSM?
GSM gives mobility without any loss in Audio quality Encryption techniques used gives high security Bit Interleaving for high efficiency in Transmission.

28

Copyright UTL Technologies Ltd 2009. All rights reserved

29

Variable Power (Power budgeting- extend battery life) Minimum Interference (DTX) Support International Roaming
SMS (Short Message Services)

Copyright UTL Technologies Ltd 2009. All rights reserved

30

GSM System specifications


Frequency band Uplink : 890 MHz-915 MHz 25 MHz Downlink : 935 MHz-960MHz Duplex distance : 45MHz Carrier separation : 200KHz Modulation : GMSK Access method : FDMA/TDMA Speech Coder : RPE-LTP-LPC (Regular Pulse Excitation - Long Term Predictive - Linear Predictive Coder)

Copyright UTL Technologies Ltd 2009. All rights reserved

31

What are the types in GSM Network?


GSM-900 (Channels 125, spacing 45Mhz) GSM -1800 (Channels 374, spacing 95Mhz) Due to frequency, a BTS transmitting information at 1800MHz with an output power of 10 Watts will cover only half the area of a similar BTS transmitting at 900MHz. To counteract this, BTSs using 1800MHz may use a higher output power.
Copyright UTL Technologies Ltd 2009. All rights reserved

Frequency Resource
GSM900 :
Up link: 890~915MHz Down link: 935~960MHz Duplex interval: 45MHz Total Available Bandwidth: 25MHz

32

Channel Bandwidth: 200KHz


Total Number of channels : 125
Copyright UTL Technologies Ltd 2009. All rights reserved

33

GSM1800 : Up link: 1710-1785MHz Down link: 1805-1880MHz Duplex interval: 95MHz Total Available Bandwidth: 75MHz Channel Bandwidth : 200KHz Total Number of channels : 375

Copyright UTL Technologies Ltd 2009. All rights reserved

34

GSM1900MHz:

Up link :1850~1910MHz
Down link:1930~1990MHz

Duplex interval: 80MHz


Total Available Bandwidth: 60MHz

Channel Bandwidth : 200KHz


Total Number of Channels : 300
Copyright UTL Technologies Ltd 2009. All rights reserved

35

Frequency Resource
Single Band Network
Which one?

General Priority
900MHz 1800MHz 1900MHz Low
Reason

High

New Operator

Propagation Characteristic
For Operator
Copyright UTL Technologies Ltd 2009. All rights reserved

For Subscriber

36

Frequency Resource
Single Band Network Single Band Dual Band 900MHz 1800MHz

Triple Band

1900MHz

The network determines the handsets to be selected. But nowadays, most handsets support dual band.

Copyright UTL Technologies Ltd 2009. All rights reserved

37

Frequency Resource
Single Band Network Cell coverage radius :

We know

Propagation characteristic
The higher the propagation frequency The higher the propagation loss 900MHz 1800MHz 1900MHz

The smaller the cell coverage radius.

Copyright UTL Technologies Ltd 2009. All rights reserved

38

System
1.Frequencies Uplink Down Link 2.Wavelength 3.Band Width 4.Duplex Distance

GSM 900
890 - 915 MHz

GSM 1800
1710 1785 MHz

GSM 1900
1850 1910 MHz

935 960 MHz 33cm 25MHz 45MHz

1805 1880 MHz 17cm 75MHz 95MHz

1930 1990 MHz 16cm 60MHz 80MHz

5.CarrierSeparation
6.Radio Channels

200kHz
125

200kHz
375

200kHz
300

Copyright UTL Technologies Ltd 2009. All rights reserved

39

Case Study 3:
Why different bands of frequencies are required for operators? What is the difference between different bands of GSM frequencies? Why uplink frequency is less compared to down link frequency?

Copyright UTL Technologies Ltd 2009. All rights reserved

40

CELLULAR CONCEPT

Copyright UTL Technologies Ltd 2009. All rights reserved

Wireless Communication

41

A pair of RF channels require per active call

Up link & down link frequency difference 45 MHz


Copyright UTL Technologies Ltd 2009. All rights reserved

42

Access Techniques
Uplink 890 MHz to 915 MHz Down Link 935 MHz to 960 MHz 25 MHz divided into 125 channels of 200 KHz bandwidth ( 25 / 0.2 = 125) 5 MHz BW allocated to each Cellular Service Provider( Maximum 5 operator )
UP 890.0 890.2 890.4 914.8 915.0

DOWN 935.0

935.2

935.4

959.8

960.0

Copyright UTL Technologies Ltd 2009. All rights reserved

43

What is ARFCN ?
ARFCN--> Absolute Radio Frequency Channel Number used to express one pair of RF channels ARFCN = (fUP -890) / 0.2 or (fdown -935) / 0.2
ARFCN 1 2 124 125

UP

890.0

890.2

890.4

914.8

915.0

DOWN 935.0

935.2

935.4

959.8

960.0

fup=890+0.2*n;
Copyright UTL Technologies Ltd 2009. All rights reserved

fdown=935+0.2*n;

44

TDMA FRAME AT AIR INTERFACE


ARFCN 1 ARFCN 2 ARFCN 3

TDMA FRAME PER ARFCN 890.2 T0 T1 T2 T3 T4 T5 T6 T7

5 ARFCN 4 935.2 T0 MHz

T1

T2

T3

T4

T5

T6

T7

ARFCN24 ARFCN25
FOR A PARTICULAR MS
Copyright UTL Technologies Ltd 2009. All rights reserved

45

What is the problem with one cell?


One BTS is covering whole city
All 25 ARFCN are used

Problem with High power Transmission


----Talk time supported by battery will be less ----Human body Hazards

Limited Capacity of the Network due to limited spectrum


High Transmission Power Required
Copyright UTL Technologies Ltd 2009. All rights reserved

46

Maximum Capacity with one cell


ARFCN 1 ARFCN 2 ARFCN 3

TDMA FRAME PER ARFCN T0 T1 T1 T3 T4 T5 T6 T7

5 ARFCN 4 MHz

.
ARFCN24 ARFCN25
5 MHz / 0.2 MHz = 25 CHANNEL 8 MOBILES CAN SHARE ONE CHANNEL BY TDMA MAXIMUM ACTIVE CALL AT A TIME = 25 * 8=200

Copyright UTL Technologies Ltd 2009. All rights reserved

47

Cellular Structure

Copyright UTL Technologies Ltd 2009. All rights reserved

48

GSM Concepts - Cellular Structure


Cell: A cell is the basic geographic unit of a cellular system and
is defined as the area of radio coverage given by one BS antenna system.

Classification of cells in GSM Network:


1. Large Cells:
large cells are employed in 1. Remote areas. 2. Coastal regions.

3. Areas with few subscribers.


4. Large areas which need to be covered with the minimum number of cell sites

Copyright UTL Technologies Ltd 2009. All rights reserved

49

Small Cells or Micro Cells:


Urban areas. Low transmission power required. High number of MSs. However, micro cells are cells where the antenna height is under the average roof top level and they are typically used in urban areas.

Pico cells :

The Pico cells are small cells whose diameter is a few dozen meters and are mainly used indoors
Copyright UTL Technologies Ltd 2009. All rights reserved

Umbrella Cells

50

Umbrella cells are used to cover shadow regions of smaller cells and fill in gaps of coverage between those cells. These cells are usually built on high ways to cover the uncovered region.

Copyright UTL Technologies Ltd 2009. All rights reserved

51

Case Study 4 :

How a cell site will be planned in the network?... Reg.Drive Test &Planning.

Copyright UTL Technologies Ltd 2009. All rights reserved

What is a Cluster ?
A Cluster is a group of cells. No channels are reused within a cluster. If a cluster has 3 cells, it is called 3 cell cluster, if a cluster has 4 cells, it is called 4 cell cluster, and if it is 7 cells, it is called 7 cell cluster.

52

Copyright UTL Technologies Ltd 2009. All rights reserved

53

Frequency reuse : The concept of using the same


frequencies again and again is called frequency reuse.
Cellular

2 2 7 3 7 1

Networking technology that breaks geographic area into cells shaped like honey comb
Cell

1
6 5 4

6
5 2 7 2

Area of coverage provided by one or more Radio terminals(TRX) TRX => TX + RX

7
1 6 5
Copyright UTL Technologies Ltd 2009. All rights reserved

3
6 4

1
5

4 Cell Cluster

54

Copyright UTL Technologies Ltd 2009. All rights reserved

7 cell Cluster

55

Copyright UTL Technologies Ltd 2009. All rights reserved

12 Cell Cluster

56

Copyright UTL Technologies Ltd 2009. All rights reserved

GSM Concepts - Cellular Structure


To Overcome Network Congestion problem, We can add more channel in that particular cell
2
2 7

57

10
7 1 3 1 6

15
4

8
6 5

To Overcome Coverage problem, We have to install new BTS in that nearby location
Copyright UTL Technologies Ltd 2009. All rights reserved

Case Study 5:
How frequency planning will be done generally in cell sites? How sectorization will be done in cell sites?

58

Copyright UTL Technologies Ltd 2009. All rights reserved

59

GSM NETWORK ARCHITECTURE

Copyright UTL Technologies Ltd 2009. All rights reserved

60

GSM Architecture

Copyright UTL Technologies Ltd 2009. All rights reserved

61

GSM - Network Structure


MS Um BTS BSC Abis A MS BTS Abis A EIR MSC PSTN GMSC MSC AuC VLR HLR

BSC Um BTS VLR

OMC Server

Copyright UTL Technologies Ltd 2009. All rights reserved

62

Copyright UTL Technologies Ltd 2009. All rights reserved

63

Mobile Station (MS)


Mobile Handset Mobile Station

+ SIM

=>

Hand portable unit Frequency and Time Synchronization Voice encoding and transmission Voice encryption/decryption functions Power measurements of adjacent cells Display of short messages
Copyright UTL Technologies Ltd 2009. All rights reserved

64

GSM Identifiers Subscriber Identities - MSISDN

Human Identity to call a MS MSISDN uniquely identifies a mobile subscriber in PSTN Calls will be routed from the PSTN and other networks based on MSISDN number. MSISDN= CC + NDC + SN CC= Country Code (91) NDC= National Destination Code(9848) SN= Subscriber Number (012345)
Copyright UTL Technologies Ltd 2009. All rights reserved

65

International Mobile Subscriber Identity [IMSI]


A subscriber is always identified within the GSM network by the IMSI - Used for all signaling in the PLMN. - Stored in the SIM, HLR & VLR. - The IMSI consists of three different parts. IMSI= MCC + MNC + MSIN (Maximum of 15 digits) = (3 digits)+(1-2digits)+ (maximum 11 digits)

MCC = Mobile Country Code


MNC = Mobile Network Code MSIN = Mobile Station Identification Number
Copyright UTL Technologies Ltd 2009. All rights reserved

67

International Mobile Equipment Identity [IMEI]


The IMEI is used for equipment identification. An IMEI uniquely identifies a mobile station as a piece or assembly of equipment. IMEI = TAC + FAC + SNR + sp TAC= Type Approval Code (6 digits),determined by GSM body FAC= Final Assembly Code (2 digits), identifies the manufacturer

SNR= Serial Number (6 digits), uniquely identifying all equipment within each TAC & FAC
sp = Spare for future use (1 digit)

Copyright UTL Technologies Ltd 2009. All rights reserved

68

Subscriber Identity Module (SIM)


Portable Smart Card with memory (ROM- 6 to 16KB, RAM- 128 to 256KB, EEPROM- 3 to8KB A3/A8 algorithm) Dynamic Information SIM Temporary Mobile Subscriber identity (TMSI) Cell Identity (CID) Location Area Identity (LAI) Phone memories, billing information Ability to store Short Messages received

Copyright UTL Technologies Ltd 2009. All rights reserved

69

Static Information on the SIM card:

International Mobile Subscriber Identity (IMSI) = (MCC + MNC+MSIN) Personal Identification Number (PIN) Authentication Key (Ki) MSISDN (Mobile Number)

Copyright UTL Technologies Ltd 2009. All rights reserved

Base Transceiver Station (BTS)


Consists of one or more radio terminals (TRX) for transmission and reception Each TRX represents an RF Channel(ARFCN) TRX and MS communicates over Um interface BTS Hardware : TRX, Combiner, Splitter, OMU etc.. BTS Type: Omnidirectional, Bi-directional(2 Sector) & Sctorised (3 Sector)

70

Copyright UTL Technologies Ltd 2009. All rights reserved

71

BTS Hardware : TRX, Combiner, Splitter, OMU, Filters, Multi couplers, Power Supply Modules etc.. BTS Type: Omni-directional, Bi-directional(2 Sector) & Sctorised (3 Sector)

UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

72

3 sectored

1 sector

2 sectored
UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

Sectorised BTS Configuration


BTS CONFIGURATION 1+1+1 BTS CONFIGURATION

73

TRX 1 ARFCN 1

TRX 4 ARFCN 10

SECTOR 1

2+2+2

TRX 2
ARFCN 4

TRX 5 ARFCN 13

SECTOR 2

Maximum 12 TRX (4+4+4)

TRX 3 ARFCN 7

TRX 6 ARFCN 16

SECTOR 3

Copyright UTL Technologies Ltd 2009. All rights reserved

Base Station Controller (BSC)

74

External Interfaces Abis interface towards the BTS A interface towards the MSC Monitors and controls several BTSs Management of channels on the radio interface Performs inter-cell Handover Interface to OMC for BSS Management

Copyright UTL Technologies Ltd 2009. All rights reserved

BSS Configurations

75

The connectivity between BTS and BSC may be through Optical Fiber or Micro Wave Link.

UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

Case Study 6: BTS and BSC configurations

76

How BTS will be configured? How BSC will be configured? How many BTS will be connected to a BSC? How BTS will be connected to a BSC?
Copyright UTL Technologies Ltd 2009. All rights reserved

Gateway Mobile Switching Center (GMSC)

77

Interface of the cellular network to PSTN Routes calls between PLMN and PSTN Inter-BSC Handover Performs call switching Billing

Copyright UTL Technologies Ltd 2009. All rights reserved

Home Location Register (HLR)


Stores user data of all Subscribers related to the GMSC International Mobile Subscriber Identity(IMSI) Users telephone number (MS ISDN) Current Subscriber VLR (current Location). Subscription information and services. Authentication Key and Authentication functionality Subscriber Status (Registered / deregistered). Referred when call comes from public land network

78

Copyright UTL Technologies Ltd 2009. All rights reserved

Visitor Location Register (VLR)

79

Copy of subscriber data from HLR Generates and allocates TMSI for Subscriber confidentiality Location Area Identity (LAI) Mobile Status Mobile Station Roaming Number (MSRN) Provides necessary data when mobile originates call

Copyright UTL Technologies Ltd 2009. All rights reserved

LAI 01

80

LAI 02 VLR 1

LAI 03

LAI 04 VLR 2

HLR
Copyright UTL Technologies Ltd 2009. All rights reserved

Authentication Center (AuC)

81

Stores Subscriber authentication data called Ki, a copy of which is also stored in in the SIM card Generates security related parameters to authorize a subscriber (SRES) Generates unique data pattern called Cipher key (Kc) for user data encryption Provides triplets - RAND, SRES & Kc, to the HLR on request.

Copyright UTL Technologies Ltd 2009. All rights reserved

EIR (Equipment Identity Register)


EIR is a database of all valid Subscribers Handset Identity (IMEI). EIR has different databases as follows., White list - For all known,good IMEIs Black list - For all bad or stolen handsets Implementation depends on Service Provider

82

Copyright UTL Technologies Ltd 2009. All rights reserved

Operations & Maintenance Center

83

The OMC provides a central point from which to control and monitor the other network entities (i.e. base stations, switches, database, etc)
UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

84

There are two types of OMCs. These are:


OMC (R)
OMC controls specifically the Base Station System. OMC (S)

OMC controls specifically the Network Switching System.


UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

85

The OMC should support the following

functions
Event/Alarm Management.

Fault Management.
Performance Management. Configuration Management. Security Management.
Copyright UTL Technologies Ltd 2009. All rights reserved

86

Case Study 7:

How many elements will be there in network with a network operator (for a state)

Elements wise description of a network.

Copyright UTL Technologies Ltd 2009. All rights reserved

An operators Network Elements


Element OMC HLR MSC BSC BTS IN 2004-2005 1 2 4 7 400 2 2007-2008 1 4 7 42 4000 6

87

Copyright UTL Technologies Ltd 2009. All rights reserved

Network Elements
MSC Nokia DX 200 (sub rack and i-series)

88

HLR Nokia DX 200 (sub rack and i-series)


BSC Nokia DX 200 (2E, 2i, 3i) OMC Nokia DX 200 BTS Nokia (Talk Family, Ultra family, metro etc)

IN Telcordia
SMSC - Nokia
Copyright UTL Technologies Ltd 2009. All rights reserved

89

MSC 120 K subscribers, 150 K subscribers, 300 K subscribers, 100 K subscribers.

BSC 512 TRx, 256 TRx,


660 TRx

Copyright UTL Technologies Ltd 2009. All rights reserved

Transmission Elements
Nokia DMR 15/18 GHz DMC Radio 15 GHz

90

Nokia Flexi Hopper 7/15/18 GHz


ERICSON mini link 15 GHz AT&T COMBIMUX Optical Equipment NOKIA SYNFONET Optical Equipment Micro wave Back bone Network :

SIEMENS SRT 1C 7 GHz


SIEMENS SRT 1S 7 GHz
Copyright UTL Technologies Ltd 2009. All rights reserved

91

Interfaces between different blocks of GSM Architecture.

Copyright UTL Technologies Ltd 2009. All rights reserved

92

GSM Network Parts

Copyright UTL Technologies Ltd 2009. All rights reserved

93

Copyright UTL Technologies Ltd 2009. All rights reserved

94

Copyright UTL Technologies Ltd 2009. All rights reserved

95

Copyright UTL Technologies Ltd 2009. All rights reserved

96

Copyright UTL Technologies Ltd 2009. All rights reserved

Performance characteristics of GSM

97

Communication

Total mobility
Worldwide connectivity

High capacity
High transmission quality Security functions
Copyright UTL Technologies Ltd 2009. All rights reserved

98

HAND OVERS IN GSM

UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

99

HAND OVER IN GSM

Copyright UTL Technologies Ltd 2009. All rights reserved

TYPES OF HAND OVERS

100

Internal Handover (Intra-BSS) 1. Within same base station - intra cell Hand over 2. Between different base stations - inter cell or intra BSC Hand over External Handover (Inter-BSS) 1. Within same MSC -intra MSC or Inter BSC Hand over 2. Between different MSCs - inter-MSC Hand over.
UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

1 Cell Site

2 Cell Site

3 Cell Site

101

Cell Site

BTS

BTS

BTS

BTS

1.Intra Cell Hand over

BSC

BSC

BSC

2.Inter cell/Intra BSC Hand over 3.Inter BSC/Intra MSC Hand over 4.Inter MSC Hand over UTL Technologies Ltd
www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

MSC

MSC

102

UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

103

Case study 8:
Why call drops will happen in a network even when handovers are present in a network?

Copyright UTL Technologies Ltd 2009. All rights reserved

104

ROAMING CONCEPT

UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

105

Roaming:
Roaming is defined as the ability for a cellular customer to automatically make & receive voice calls, send & receive data, or access other services when traveling outside the geographical coverage area of the home network, by means of using a visited network.
UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

106

1.National Roaming: If the visited network is in the same country as the home network, this is known as National Roaming. 2. International Roaming: If the visited network is outside the home country, this is known as International Roaming (the term Global Roaming has also been used).
UTL Technologies Ltd

www.utltraining.com
Copyright UTL Technologies Ltd 2009. All rights reserved

107

3.Inter-Standard Roaming: If the visited network operates on a different technical standard than the home network, this is known as Interstandard roaming.

Copyright UTL Technologies Ltd 2009. All rights reserved

108

AUTHENTICATION

Copyright UTL Technologies Ltd 2009. All rights reserved

109

Copyright UTL Technologies Ltd 2009. All rights reserved

Authentication Process
To discuss the authentication process, assume that the VLR has all the information required to perform that authentication process (Kc, SRES and RAND). If this information is unavailable, then the VLR would request it from the HLR/AUC. 1. Triples (Kc, SRES and RAND) are stored at the VLR. 2. The VLR sends RAND via the MSC and BSS, to the MS (unencrypted).
Copyright UTL Technologies Ltd 2009. All rights reserved

110

111

3. The MS sends SRES unencrypted to the VLR.

4. Within the VLR the value of SRES is compared with the SRES received from the mobile. If the two values match, then the authentication is successful.

5. If ciphering is to be used, Kc from the assigned triple is passed to the BTS.

Copyright UTL Technologies Ltd 2009. All rights reserved

112

6. The mobile calculates Kc from the RAND and A8 and Ki on the SIM. 7. Using Kc, A5 and the GSM hyper frame number, encryption between the MS and the BSS can now occur over the air interface .

Copyright UTL Technologies Ltd 2009. All rights reserved

113

GSM Channels on Air Interface

Copyright UTL Technologies Ltd 2009. All rights reserved

Channel concept
Physical channel: One timeslot of a TDMA-frame on one ARFCN is referred to as a physical channel. There are 8 physical channels per carrier in GSM, channel 0-7(timeslot 0-7) Logical channel: Depending on the kind of information transmitted, we refer to different logical channels. These logical channels are mapped on physical channel.

114

Copyright UTL Technologies Ltd 2009. All rights reserved

115

Logical channels
Logical channels

Control channels

Traffic channels

BCH

CCCH

DCCH

Half rate

Full rate

FCCH SCH BCCH

PCH AGCH RACH SDCCH SACCH FACCH

Copyright UTL Technologies Ltd 2009. All rights reserved

Control channels I. Broadcast channels BCH

116

1)Broadcast Control Channel-BCCH


The last information the MS must receive in order to receive calls or make calls is some information concerning the cell. This is BCCH.

This is transmitted Downlink point to multipoint.

Copyright UTL Technologies Ltd 2009. All rights reserved

117

Broadcast Control Channel (BCCH)


Carries the following information (this is only a partial list): Location Area Identity (LAI). List of neighboring cells, which should be monitored by the MS. List of frequencies used in the cell.

Cell identity.

Copyright UTL Technologies Ltd 2009. All rights reserved

118

Control channels
I. Broadcast channels BCH

2)Frequency correction channel-FCCH This is transmitted frequently on the BCCH timeslot and allows the mobile to synchronize its own frequency to that of the transmitting base site.

Copyright UTL Technologies Ltd 2009. All rights reserved

119

3) Synchronization Channel-SCH This is used by the MS to synchronize to the TDMA frame structure within the particular cell.

Listening to the SCH the MS receives


1. TDMA frame number

2. BSIC (Base Station Identity code).

Copyright UTL Technologies Ltd 2009. All rights reserved

120

Control channels II. Common Control Channels,CCCH

1) Paging Channel-PCH
The information on this channel is a paging message including the MSs identity(IMSI).This is transmitted on Downlink.

Copyright UTL Technologies Ltd 2009. All rights reserved

2) Random access channel-RACH:


When the mobile realizes it is paged, it answers by requesting a signaling channel on RACH. RACH is also used by the MS if it wants to originate a call. It is transmitted in Uplink point to point.

121

Copyright UTL Technologies Ltd 2009. All rights reserved

Control channels Common Control Channels,CCCH


3) Access Grant Channel-AGCH On request for a signaling channel by MS the network assigns a signaling channel(SDCCH) on AGCH. AGCH is transmitted on the downlink point to point.

122

Copyright UTL Technologies Ltd 2009. All rights reserved

Control channels III. Dedicated Control ChannelsDCCH

123

1) Stand alone dedicated control channel (SDCCH)


AGCH assigns SDCCH on request by MS. Used during Call setup Steppingstone between BCH & TCH MS is informed about frequency & timeslot to use Up and Downlink, point-point.
Copyright UTL Technologies Ltd 2009. All rights reserved

Control channels

124

Dedicated Control Channels-DCCH

2) Slow associated control channel-SACCH Timing Advance

Copyright UTL Technologies Ltd 2009. All rights reserved

125

3) Fast associated control channel-FACCH


Used for handover.

Copyright UTL Technologies Ltd 2009. All rights reserved

Traffic Channels-TCH

126

Full rate traffic channel occupies one physical Channel (one TS on a carrier)
Two half rate TCHs can share one physical channel.

Copyright UTL Technologies Ltd 2009. All rights reserved

127

TDMA FRAME

Copyright UTL Technologies Ltd 2009. All rights reserved

128

Copyright UTL Technologies Ltd 2009. All rights reserved

129

BURSTS

Copyright UTL Technologies Ltd 2009. All rights reserved

Burst

130

The information format transmitted during one timeslot in the TDMA frame is called a burst.
A Burst consists of several different elements.

Information : This is the area in which the speech, data or control information is held. Tail Bits : These are used to indicate the beginning and end of the burst.

Copyright UTL Technologies Ltd 2009. All rights reserved

131

Stealing Flags : These two bits are set when a traffic channel burst has been stolen by a FACCH (the Fast Associated Control Channel). One bit set indicates that half of the block has been stolen.

Training Sequence : This is used by the


receivers equalizer as it estimates the transfer characteristic of the physical path between the BTS and the MS. The training sequence is 26 bits long.

Copyright UTL Technologies Ltd 2009. All rights reserved

132

Guard

Period :

The BTS and MS can only receive the burst and decode it, if it is received within the timeslot designated for it.

To be precise, the timeslot is 0.577 ms long, whereas the burst is only 0.546 ms long; therefore there is a time difference of 0.031 ms to enable the burst to hit the timeslot.

Copyright UTL Technologies Ltd 2009. All rights reserved

133

Copyright UTL Technologies Ltd 2009. All rights reserved

Different Types of Bursts


Normal Burst

134

Random Access Burst


Frequency Correction Burst

Synchronization Burst
Dummy Burst

Copyright UTL Technologies Ltd 2009. All rights reserved

Normal Burst

135

Normal Burst : The normal burst carries traffic channels and all types of control channels apart from those mentioned specifically below. (Bi-directional).
156.25 bits OR 576.92 us

T Coded Data 3 57

S T. Seq. 1 26

S Coded Data T GP 1 57 3 8.25

Tail Bit(T) :Used as Guard Time Coded Data :It is the Data part associated with the burst Stealing Flag :This indicates whether the burst is carrying Signaling data. Training Seq. :This is a fixed bit sequence known both to the BTS & the MS.This takes care of the signal deterioration.
Copyright UTL Technologies Ltd 2009. All rights reserved

136

Frequency Correction Burst


This burst carries FCCH downlink to correct the frequency of the MSs local oscillator, effectively locking it to that of the BTS.

Copyright UTL Technologies Ltd 2009. All rights reserved

Synchronization Burst

137

It is so called because its function is to carry SCH downlink, synchronizing the timing of the MS to that of the BTS

Copyright UTL Technologies Ltd 2009. All rights reserved

138

Dummy Burst
Used when there is no information to be carried on the unused timeslots of the BCCH Carrier (downlink only).

Copyright UTL Technologies Ltd 2009. All rights reserved

139

Access Burst
This burst is of much shorter duration than the other types. Whenever the MS tries to access the BTS, the information that is sent is called Access Burst. (The Access Burst is uplink only.)

Copyright UTL Technologies Ltd 2009. All rights reserved

140

Copyright UTL Technologies Ltd 2009. All rights reserved

141

Mobile Station in IDLE mode


What does a Mobile do in idle mode?
Reads BCCH (System Information Messages) Listen To Paging Monitors Neighbor for cell selection

Copyright UTL Technologies Ltd 2009. All rights reserved

142

GSM TRANSMISSION PROCESS

Copyright UTL Technologies Ltd 2009. All rights reserved

143

Inside A GSM Cellphone

Transeiver

Speaker

Battery
LCD Display

ARM Processor

Signal Processing Chipset

SIM card/ Controller


Copyright UTL Technologies Ltd 2009. All rights reserved

Micro phone

Keypad

144

MOBILE STATION
TX PART TX MODULATOR BURST FORMATING CIPHERING INTERLEAVING CHANNEL CODING RX PART RX DEMODULATOR VITERBI EQULISER DE-CIPHERING DE-INTERLEAVING DECODING

SPPECH CODING
SEGMENTATION A/D CONVERSION Microphone
Copyright UTL Technologies Ltd 2009. All rights reserved

SPPECH DECODING

D/A CONVERSION Receiver

ANALAG TO DIGITAL (A/D) CONVERSION

145

One of the primary functions of an MS is to convert the analog speech information into digital form for transmission using a digital signal.

The analog to digital conversion (A/D) conversion process outputs a collection of bits; binary ones and zeroes which represent the speech input

Copyright UTL Technologies Ltd 2009. All rights reserved

146

The A/D Conversion is performed by using a process called Pulse Code Modulation (PCM). PCM involves three main steps. Sampling Quantization Coding.

Copyright UTL Technologies Ltd 2009. All rights reserved

147

Sampling:
Sampling involves measuring the analog signal at specific time intervals. The accuracy of describing the analog signal in digital terms depends on how often the analog signal is sampled. This is expressed as the sampling frequency

Copyright UTL Technologies Ltd 2009. All rights reserved

148

The sampling theory states that :

To reproduce an analog signal without distortion, the signal, must be sampled with at least twice the frequency of the highest frequency component in the analog signal.

Copyright UTL Technologies Ltd 2009. All rights reserved

149

Normal speech mainly contains frequency components lower than 3400 Hz.

Applying the sampling theory to analog speech signals, the sampling frequency should be at least 2X3.4 kHz=6.8 kHz.
Telecommunication systems use a sampling frequency of 8 kHz, which is acceptable based on the sampling theory.

Copyright UTL Technologies Ltd 2009. All rights reserved

150

Quantization:
The amplitude of the signal at the time of sampling is measured and approximated to one of a finite set of values The degree of accuracy depends on the number of quantization levels used. Within common telephony, 256 levels are used while in GSM 8,192 levels are used.

Copyright UTL Technologies Ltd 2009. All rights reserved

Coding

151

Coding involves converting the quantized values into binary. Every value is represented by a binary code of 13 bits (213=8192).

For example, a quantized value of 2,157 would have a bit pattern of 0100001101101:
Copyright UTL Technologies Ltd 2009. All rights reserved

152

Bit

12

11

10

Total

Set to Value

0 0

1 2048

0 0

0 0

0 0

0 0

1 64

1 32

0 0

1 8

1 4

0 0

1 1

2157

Coding of Quantized value 2157.

Copyright UTL Technologies Ltd 2009. All rights reserved

Summary of A/D Conversion

153

The result from the process of A/D Conversion is 8,000 samples per second of 13 bits each. This is a bit rate of 104 kbits/s. When it is considered that 8 subscribers use one radio channel, the overall bit rate would not fit into the 200 kHz available for all 8 subscribers. The bit rate must be reduced somehow. This is achieved using segmentation and speech coding

Copyright UTL Technologies Ltd 2009. All rights reserved

STAGE 2: SEGMENTATION AND STAGE 3: SPEECH CODING

154

The speech coding process analyzes speech samples and outputs parameters of what the speech consists of. Segmentation: Given that speech organs are relatively slow in adapting to changes, the filter parameters representing the speech organs are approximately constant during 20 ms..
Copyright UTL Technologies Ltd 2009. All rights reserved

155

For this reason, when coding speech in GSM, a block of 20 ms is coded into one set of bits. In effect, it is similar to sampling speech at a rate of 50 times per second instead of the 8,000 used by A/D conversion

Copyright UTL Technologies Ltd 2009. All rights reserved

156

Summary of segmentation and speech coding


The GSM speech coder produces a bit rate of 13 kbits/s per subscriber. When it is considered that 8 subscribers use one radio channel, the overall bit rate would be 8X13kbits/s =104kbits/s. This compares favorably with the 832 kbits/s from A/D conversion. However, speech coding does not consider the problems which may be encountered on the radio transmission path. The next stages in the transmission process, channel coding and interleaving, help to overcome these problems.

Copyright UTL Technologies Ltd 2009. All rights reserved

Speech & Channel Coding


Microphone A/D CONVERSION

157

Sampling at 8 KHz & Coding using 13bits =104 Kbps 2080 bits / 20ms 260 bits / 20ms

SEGMENTATION
20 ms block SPEECH CODER BITS ORDERED Important Very Important 132 bits 50 bits BLOCK CODER Other 78 bits

= 2080 bits/20ms

CONVOLUTION CODER

456 bits => 8 Block of 57 bits


Copyright UTL Technologies Ltd 2009. All rights reserved

STAGE 4: CHANNEL CODING


Channel coding in GSM uses the 260 bits from speech coding as input to channel coding and outputs 456 encoded bits. The 260 bits are split according to their relative importance: Block 1 : 50 very important Bits. Block 2 : 132 important Bits and Block 3 : 78 not so important bits.

158

Copyright UTL Technologies Ltd 2009. All rights reserved

159

The first block of 50 bits is sent through a block coder, which adds three parity bits that will result in 53 bits. These three bits are used to detect errors in a received message. The 53 bits from first block, the 132 bits from the second block and 4 tail bits (total: 189) are sent to a 1:2 convolutional coder which outputs 378 bits. Bits are added by the convolutional coder enable the correction of errors when the message is received. The bits of block 3 are not protected.
Copyright UTL Technologies Ltd 2009. All rights reserved

160

Copyright UTL Technologies Ltd 2009. All rights reserved

STAGE 5 : INTERLEAVING
First level of interleaving:

161

The channel coder provides 456 bits for every 20 ms of speech. These are interleaved, forming eight blocks of 57 bits each, as shown in the figure below.

In a normal burst, there is space for two of these speech blocks or 57 bits, as can be seen in figure. The remaining bits are like tail bits, stealing flags, training sequence and guard period. Thus, if one burst of transmission is lost, there is a 25% BER for the entire 20 ms of speech (2/8=25%).
Copyright UTL Technologies Ltd 2009. All rights reserved

162

First Stage of Interleaving

Copyright UTL Technologies Ltd 2009. All rights reserved

Second level of interleaving or Diagonal interleaving:

163

If only one level of interleaving is used, a loss of this burst results in a total loss of 25%. This is too much for the channel decoder to correct. A second level of interleaving can be introduced to further reduce the possible BER to 12.5%.

Copyright UTL Technologies Ltd 2009. All rights reserved

164

Instead of sending two blocks of 57 bits from the same 20 ms of speech within one burst, a block from one 20 ms and a block from next sample of 20 ms are sent together. A delay is introduced in the system when the MS must wait for the next 20 ms of speech. However, the system can now afford to loose a whole burst, out of eight, as the loss is only 12.5% of the total bits from each 20 ms speech frame. 12.5% is the maximum loss level that channel decoder can correct

Copyright UTL Technologies Ltd 2009. All rights reserved

Diagonal interleaving

165

Copyright UTL Technologies Ltd 2009. All rights reserved

STAGE 6: CIPHERING/ENCRYPTION

166

The purpose of ciphering is to encode the burst so that it cannot be interpreted by any other device than the intended receiver. The ciphering algorithm in GSM is called A5 algorithm.

Copyright UTL Technologies Ltd 2009. All rights reserved

STAGE 7 : BURST FORMATTING

167

As previously explained, every transmission from an MS/BTS must include some extra information such as training sequence. The process of burst formatting is to add these bits (along with some others such as tail bits) to the basic speech/data being sent. This increases the overall bit-rate, but is necessary to counteract problems encountered on the radio path.
Copyright UTL Technologies Ltd 2009. All rights reserved

168

In GSM, the input to burst formatting is the 456 bits received from ciphering, Burst formatting adds a total of 136 bits per block of 20 ms, bringing the overall total to 592.

Copyright UTL Technologies Ltd 2009. All rights reserved

169

Copyright UTL Technologies Ltd 2009. All rights reserved

STAGE 8: MODULATION & TRANSMISSON


The bits must then be sent over the air using a carrier frequency. GSM uses the GMSK modulation technique. The bits are modulated onto a carrier frequency and transmitted (e.g. 912.2MHz).

170

Copyright UTL Technologies Ltd 2009. All rights reserved

Commissioning Flow of a BTS


Open Nokia BTS Manager Go to Tools

171

Launch BTS Hardware Configurator


Go to File Open and create the configuration according to the requirement Save it after giving a file name

Close it
Select BTS in the Menu of BTS Manager Send the file to BTS
Copyright UTL Technologies Ltd 2009. All rights reserved

Select commissioning in BTS Manager

172

Go to Wizard
Select Manual commissioning Give BCF ID, BSC ID, site Name etc Click Next Abis will be in LAPD State, continue, click OK (Do You want to commission without Abis, click Yes) Give EAC inputs, click Next Give EAC outputs, click Next
Copyright UTL Technologies Ltd 2009. All rights reserved

Finish (This will show the summary of commissioning)

173

Launch Ultra BTS Hub Manager in tools menu Double Click on E1/T1 card or FXC/RRI Give LIF settings

Enable Used interfaces


Apply Go to configuration Go to Traffic Manager Give TCH, TRx signalling, OMU signalling Select Topology (chain or loop) OK Go to synchronisation
Copyright UTL Technologies Ltd 2009. All rights reserved

Go to Loop bits, if site is in Loop

174

2 Mbps PCM Sharing by 1 BTS (Total 1 TRX)


2Mbps =32 X 64KbpsT00 T01 T02 T03 TRX TRAFFIC T04 8X16Kbps/TRX .. TRX T25 SIGNALLING T26 16Kbps/TRX T27 OMU T28 SIGNALLING T29 16Kbps/BTS T30 T31
Copyright UTL Technologies Ltd 2009. All rights reserved

Synchronization TRX_1 TRX_1 TRX_2 TRX_2 TRX1_S TRX2_S TRX_1 TRX_1 TRX_2 TRX_2 OMU1_S OMU2_S TRX_1 TRX_1 TRX_2 TRX_2 TRX_1 TRX_1 TRX_2 TRX_2

Signaling

175

2 Mbps PCM Sharing by 1 BTS (Total 2 TRX)


T00 2Mbps =32 X 64Kbps T01 T02 T03 TRX T04 TRAFFIC 8X16Kbps/TRX .. Synchronization TRX_1 TRX_1 TRX_2 TRX_2 TRX1_S TRX2_S TRX_1 TRX_1 TRX_2 TRX_2 OMU1_S TRX_1 TRX_1 TRX_1 TRX_2 TRX_2

TRX_1 TRX_2
TRX_2

TRX SIGNALLING 16Kbps/TRX OMU SIGNALLING 16Kbps/BTS

T25 T26 T27 T28 T29 T30 T31

Signaling

Copyright UTL Technologies Ltd 2009. All rights reserved

176

2 Mbps PCM Sharing by 2 BTS (Total 2 TRX)


2Mbps =32 X 64KbpsT00 T01 T02 T03 TRX TRAFFIC T04 8X16Kbps/TRX .. TRX T25 SIGNALLING T26 16Kbps/TRX T27 OMU T28 SIGNALLING T29 16Kbps/BTS T30 T31
Copyright UTL Technologies Ltd 2009. All rights reserved

Synchronization TRX_1 TRX_1 TRX_2 TRX_2 TRX1_S TRX2_S TRX_1 TRX_1 TRX_2 TRX_2 OMU1_S OMU2_S TRX_1 TRX_1 TRX_2 TRX_2 TRX_1 TRX_1 TRX_2 TRX_2

Signaling

177

2 Mbps PCM Sharing by 1 BTS (Total 12 TRX)


T00 2Mbps =32 X 64Kbps T01 T02 ... TRX T23 TRAFFIC 8X16Kbps/TRX T24 T25 TRX T26 SIGNALLING 16Kbps/TRX T27 Synchronization TRX_1 TRX_1 TRX_12 TRX_12 TRX_1 TRX_1 TRX_12 TRX_12 TRX_1 TRX_1 TRX_12 TRX_12 TRX7_S TRX8_S TRX9_S TRX10_S TRX_1

TRX_1
TRX_12 TRX_12

TRX1_S TRX2_S
TRX3_S TRX4_S TRX5_S TRX6_S

OMU1_S

OMU SIGNALLING 16Kbps/BTS

T28 T29 T30 T31

TRX11_S TRX12_S
Signaling

Copyright UTL Technologies Ltd 2009. All rights reserved

178

2 Mbps PCM Sharing by 12 BTS (Total 12 TRX)


T00 2Mbps =32 X 64Kbps T01 T02 ... TRX TRAFFIC T23 8X16Kbps/TRX T24 TRX T25 SIGNALLING T26 16Kbps/TRX T27 OMU T28 SIGNALLING T29 16Kbps/BTS T30 T31
Copyright UTL Technologies Ltd 2009. All rights reserved

Synchronization TRX_1 TRX_1 TRX_12 TRX_12 TRX1_S TRX2_S TRX3_S TRX4_S TRX5_S TRX6_S TRX_1 TRX_1 TRX_12 TRX_12 OMU1_S OMU2_S OMU3_S OMU4_S OMU5_S OMU6_S TRX_1 TRX_1 TRX_12 TRX_12 TRX7_S TRX_1 TRX_1 TRX_12 TRX_12 OMU7_S

TRX8_S OMU8_S TRX9_S OMU9_S TRX10_S OMU10_S

TRX11_S OMU11_S TRX12_S OMU12_S Signaling

179

GSM TRAFFIC CASES

Copyright UTL Technologies Ltd 2009. All rights reserved

180

GSM TRAFFIC CASES


1. SUBSCRIBER RELATED IDENTITIES Mobile Station ISDN Number (MSISDN) : The Mobile station ISDN Number (MSISDN) uniquely identifies a mobile telephone subscription in the PSTN Numbering plan. This is the number dialed when calling a mobile subscriber. As the MSISDN is the actual telephone number of the mobile subscriber, it is the only network identity that subscribers are aware of.

Copyright UTL Technologies Ltd 2009. All rights reserved

181

The MSISDN consists of the following: CC: Country code NDC: National Destination Code SN: Subscriber Number
International Mobile Station ISDN number

CC

NDC

SN

National Mobile Number

Copyright UTL Technologies Ltd 2009. All rights reserved

182

International Mobile Subscriber Identity (IMSI): The International Mobile Subscriber Identity (IMSI) is a unique identity allocated to each subscriber that facilitates correct subscriber information over the radio path and through the network. It is used for all signaling in the PLMN. All Network related subscriber information is connected to an IMSI. The IMSI is stored in the SIM, the HLR and in the serving VLR.
Copyright UTL Technologies Ltd 2009. All rights reserved

183

MNC (3 digits) (2-3 digits)

MCC

MSIN

National MSI

IMSI

The IMSI consists of three different parts. MCC: Mobile Country Code MNC: Mobile Network Code MSIN: Mobile Station Identification Number
Copyright UTL Technologies Ltd 2009. All rights reserved

Temporary Mobile Subscriber Identity (TMSI):

184

The Temporary Mobile Subscriber Identity (TMSI) is a temporary IMSI number made known to an MS at registration. It is used to protect the subscribers identity on the air interface. The TMSI has local significance only (that is, within the MSC/VLR area) and is changed when certain events occur. Every operator can chose TMSI structure, but should not consist of more than 8 digits.

Copyright UTL Technologies Ltd 2009. All rights reserved

2. EQUIPMENT RELATED IDENTITIES

185

International Mobile Equipment Identity (IMEI):

The International Mobile Equipment Identity (IMEI) is used to uniquely identify MS equipment to the network. The IMEI is used for security procedures such as identifying stolen equipment and preventing unauthorized access to the network. According to the GSM specifications, IMEI has a total length of 15 digits, and consists of the following.

Copyright UTL Technologies Ltd 2009. All rights reserved

186
TAC (6 digits) FAC (2 digits) SNR (6 digits) SPARE (1 digit)

IMEI

TAC: Type Approval code, determined by a central GSM FAC: Final Assembly code, identifies the manufacturer SNR: Serial Number, an individual serial number of six digits uniquely identifies all equipment within each TAC and FAC. Spare: A spare Digit for future use. When transmitted by the MS, this digit should always be zero.
Copyright UTL Technologies Ltd 2009. All rights reserved

187 International mobile Equipment Identity and Software Version Number (IMEISV):

The International Mobile Equipment Identity and Software Version Number (IMEISV) provide a unique identity for every MS and also refers to the version of software, which is installed in the MS. The version of software is important as it may affect the services offered by the MS or its speech coding capabilities.

Copyright UTL Technologies Ltd 2009. All rights reserved

188

TAC (6 digits)

FAC (2 digits)

SNR ( 6 digits)

SVN (2 digits)

IMEISV

TAC : Type Approval Code FAC : Final Assembly code SNR : Serial Number SVN : Software Version Number allows the mobile equipment manufacturer to identify different Software versions of a given type approved mobile. SVN value 99 is reserved for future use.
Copyright UTL Technologies Ltd 2009. All rights reserved

3. LOCATION RELATED IDENTITIES


Mobile Station Roaming Number (MSRN) The Mobile Station Roaming Number (MSRN) is a temporary network identity, which is assigned during the establishment of a call to a roaming subscriber. The MSRN consists of three parts.

189

Copyright UTL Technologies Ltd 2009. All rights reserved

190

CC

NDC

SN

CC : Country Code NDC: National Destination Code SN : Serving Node (in this case, SN is the address to serving MSC/VLR.

Copyright UTL Technologies Ltd 2009. All rights reserved

Location Area Identity:

191

The Location Area Identity (LAI) is a temporary network identity, which is also required for routing.

The two main purposes of the LAI are: 1.Paging, which is used to inform the MSC of the LA in which the MS is currently situated.

2.Location updating of mobile Subscribers.

Copyright UTL Technologies Ltd 2009. All rights reserved

192

The LAI contains the following:

LAC: Location Area code, the maximum length of LAC is 16 bits, enabling 65,536 different location areas to be defined in one PLMN

Copyright UTL Technologies Ltd 2009. All rights reserved

BASE STATION IDENTITY CODE (BSIC)

193

The Base Station Identity Code (BSIC) enables MSs to distinguish between different base stations sending on the same frequency.

The BSIC consists of


NCC BCC

BSIC

Copyright UTL Technologies Ltd 2009. All rights reserved

194

NCC: Network Color Code (3 bits) identifies the PLMN. Note that it does not uniquely identify the operator. NCC is primarily used to distinguish between operators on each side of the border.

BCC: Base Station color Code (3 bits), identifies the Base Station to help distinguish between BTS using the same control frequencies

Copyright UTL Technologies Ltd 2009. All rights reserved

Different States of an MS
An MS can have one of the following states: Idle: The MS is ON, but a call is not in progress. Active: the MS is On and a call is in Progress.

195

Detached: The MS is OFF.

Copyright UTL Technologies Ltd 2009. All rights reserved

196
Mode Idle Mode Term Registration Roaming International Roaming Description This is the process, which an MS informs a network that it is attached. When am MS moves around a network in idle mode, it is referred to as roaming. When an MS moves into a network, which is not, its home network, it is referred to as international roaming. MSs can only roam into networks with which the home network has a roaming agreement. An MS roaming around the network must inform the network when it enters a new LA. This is called location Updating. This is the process whereby a network attempts to contact a particular MS. This is achieved by broadcasting a paging message containing the identity of that MS. This is the process in which control of a call is passed from one cell to another while the MS moves between cells.

Location Updating

Paging

Active Mode

Handover

Detached Mode

In this mode no traffic cases are present. MS is switched OFF in this case.

Copyright UTL Technologies Ltd 2009. All rights reserved

Attaching to the Network


IMSI Attach:

197

When an MS is switched ON, the IMSI attach procedure is executed. This involves the following steps:

The MS sends an IMSI attach message to the network, indicating that it has changed state to idle.

The VLR determines whether there is a record for the subscriber already present. If not, the VLR contacts the subscribers HLR for a copy of the subscription information.
The VLR updates the MS status to idle. Acknowledgement is sent to the MS.
Copyright UTL Technologies Ltd 2009. All rights reserved

198

BSC/TRC

MSC/VLRR

2 4

Copyright UTL Technologies Ltd 2009. All rights reserved

Location Updating type IMSI Attach:

199

If the MS has changed LA while powered off, the IMSI attach procedure may lead to an update to the location of the MS. During IMSI attach, the VLR may determine that the current LAI of the MS is different from the LAI stored in the MSs subscription information. If so, the VLR updates the LAI of the MS.

Copyright UTL Technologies Ltd 2009. All rights reserved

IMSI DETACH
IMSI detach enables the MS to indicate to the network that it is switched ff. At power off, the MS sends an IMSI detach message to the network. On reception, the VLR marks the corresponding IMSI detached. The HLR is not informed. No acknowledgement is sent to the MS.

200

Copyright UTL Technologies Ltd 2009. All rights reserved

201

TRAFFIC ENGINEERING

Copyright UTL Technologies Ltd 2009. All rights reserved

202

Telecommunications Traffic, Tele Traffic:


A Process of events related to demands for the utilization of resources in a telecommunication network.

Copyright UTL Technologies Ltd 2009. All rights reserved

203

Traffic Intensity :
The instantaneous traffic in a pool of resources is the number of busy resources at a given instant of time. Traffic intensity is a measure of the average occupancy of a facility during a specified period of time, normally a busy hour, measured in traffic units (erlangs) and defined as the ratio of the time during which a facility is occupied (continuously or cumulatively) to the time. This facility is available for occupancy. Traffic Intensity = Call Request Rate X Holding Time. Au = H, Where = Average Number of Call requests per unit time for each user. H = Average Duration of a call.
Copyright UTL Technologies Ltd 2009. All rights reserved

204

Calling Rate : The number of times a route or traffic path is used per unit time, more properly defined, the call intensity per traffic path during busy hour. Holding time : The average duration of occupancy of a traffic path by a call. Traffic intensity : It is the average number of calls simultaneously in progress during a particular period of time. It is measured either in units of Erlangs or CCS.
Copyright UTL Technologies Ltd 2009. All rights reserved

205

An average of one call in progress during an hour represents a traffic intensity of 1 Erlang or 1 Erlang=1X3600 call seconds=36 CCS. Traffic intensity can be obtained as:

Traffic intensity = (The sum of circuit holding time)/(the duration of the monitoring period)

Copyright UTL Technologies Ltd 2009. All rights reserved

206

1. If the carried load for a component is 2900 CCS at 5% blocking, what is the offered load? Sol: Offered load = 2900/(1-0.05)=3050 CCS.

2. In a voice network, each subscriber generates two calls/hour on average and a typical call holding time is 120 seconds. What is the traffic intensity?
Sol : Intensity = 2X120/3600 = 0.0667 Erlangs = 2.4 CCS.

Copyright UTL Technologies Ltd 2009. All rights reserved

207

Call Number

Duration of call 60 74 80 90 92 70 96 48 64 126

3. To determine voice traffic on a line, the following data was collected during a period of 90 minutes (refer the table below). Calculate the traffic intensity in Erlangs and CCS

1 2 3 4 5 6 7 8 9 10

Copyright UTL Technologies Ltd 2009. All rights reserved

208

Sol: Call arrival Rate : 10 calls/1.5 hours =6.667 calls/Hour Average holding time : (60+74+80+90+92+70+96+48+64+126) / 10 = 80 seconds Intensity = 6.667X80/3600=0.148 Erlangs = 5.53 CCS.

Copyright UTL Technologies Ltd 2009. All rights reserved

209

4. The data in the table below was recorded by observing the activity of a single customer line during the eight hour period from 9.00 A.M. to 5.00 P.M. Determine the traffic intensity during the eight hour period, during the Busy Hour (which is assumed to be between 4:00 PM. And 5:00 P.M).

Copyright UTL Technologies Ltd 2009. All rights reserved

210

Call Number 1 2

Call started 9:15 9:31

Call ended 9:18 9:41

3
4 5 6

10:17
10:24 10:37 10:55

10:24
10:34 10:42 11:00

7
8 9 10

12:01
2:09 3:15 4:01

12:02
2:14 3:30 4:35

11

4:38

4:43

Copyright UTL Technologies Ltd 2009. All rights reserved

211

Sol: Call arrival Rate : 11 calls/ 8Hrs = 1.375

Calls/Hour
Total call minutes = 3+10+7+10+5+5+1+5+15+34+5 = 100 minutes

Call holding time = (100 minutes/11 calls)X 1Hr/60 mnts = 0.515 hour/call
The traffic intensity I = 1.375 X 0.1515 = 0.208 Erlangs = 7.5 CCS.

Copyright UTL Technologies Ltd 2009. All rights reserved

212

The busy hour is 4:00 P.M to 5:00 P.M. Since there are only two calls between this period, the call arrival rate = 2 calls/Hr The average call holding time during busy hour : (34+5) min/2 calls = 19.5 minutes/call =0.325 hour/call The traffic load in the BH is I= 2X0.325 = 0.65 Erlang =23.4 CCS.

Copyright UTL Technologies Ltd 2009. All rights reserved

213

GSM SERVICES

Copyright UTL Technologies Ltd 2009. All rights reserved

Types of GSM services


Basic Services: These are available to all subscribers to a mobile network. For example, the ability to make voice telephone calls is a basic service. Supplementary Services: These are additional services that are available by subscription only. Call forwarding is an example of a supplementary service
Copyright UTL Technologies Ltd 2009. All rights reserved

214

Basic Services
Basic Services can be divided into 2 types:

215

Tele services:
A tele service allows the subscriber to communicate (usually via voice, fax, data or SMS) with another subscriber. It is a complete system including necessary terminal equipment.
Copyright UTL Technologies Ltd 2009. All rights reserved

Bearer Services:

216

A bearer service transports speech and data as digital information within the network between user interfaces. A bearer service is the capability to transfer information and does not include the end user equipment. Every tele service is associated with a bearer service. For example, a bearer service associated with the speech telephony tele service is the timeslot assigned to a call on a TDMA

Copyright UTL Technologies Ltd 2009. All rights reserved

TELE SERVICES:

217

The following are the major tele services supported by GSM System. 1. Speech 2. Emergency Calls 3. Dual Tone Multi Frequency (DTMF) 4. Alternate Speech/Fax

5. Short Message Service


6. SMS Cell Broadcast (SMSCB)
Copyright UTL Technologies Ltd 2009. All rights reserved

BEARER SERVICES:
1. Traffic to PSTN

218

2. Traffic to ISDN
3. Traffic to Packet Switched Public Data Networks (PSPDN) 4. Traffic to Circuit Switched Public Data Networks (CSPDN) 5. Traffic to Internet
Copyright UTL Technologies Ltd 2009. All rights reserved

SUPPLEMENTARY SERVICES
1. Call Forwarding 2. Barring of outgoing calls 3. Bar all outgoing calls 4. Bar all outgoing international calls 5. Bar all outgoing international calls except those directed to the home PLMN 6. Call waiting 7. Multi party service 8. Closed User Group (CUG)
Copyright UTL Technologies Ltd 2009. All rights reserved

219

220

BATTERY LIFE

Copyright UTL Technologies Ltd 2009. All rights reserved

Battery Life
One of the main factors, which restrict reducing the size of a MS, is the battery. A battery must be large enough to maintain a telephone call for an acceptable amount of time without needing to be recharged. Since there is demand for MSs to become smaller and lighter the battery must also become smaller and lighter.
Copyright UTL Technologies Ltd 2009. All rights reserved

221

222

The features which enable the life of a GSM MS battery to be extended are : 1.Power Control

2.Voice Activity Detection (VAD)


3.Discontinuous Transmission (DTX) 4.Discontinuous Reception (DRX)

Copyright UTL Technologies Ltd 2009. All rights reserved

1. Power Control:

223

This is a feature of the GSM air interface which allows the network provider to not only compensate for the distance from MS to BTS as regards timing, but can also cause the BTS and MS to adjust their power output to take account of that distance also.

Copyright UTL Technologies Ltd 2009. All rights reserved

224

The closer the MS is to the BTS, the less the power it and the BTS will be required to transmit. This feature saves radio battery power at the MS, and helps to reduce co-channel and adjacent channel interference

Copyright UTL Technologies Ltd 2009. All rights reserved

Power Control

225

Copyright UTL Technologies Ltd 2009. All rights reserved

2. Voice Activity Detection (VAD):


VAD is a mechanism whereby the source transmitter equipment identifies the presence or absence of speech. VAD implementation is effected in speech mode by encoding the speech pattern silences at a rate of 500 bit/s rather than the full 13 kbit/s. This results in a data transmission rate for background noise, known as comfort noise, which is regenerated in the receiver. Without comfort noise the total silence between the speeches would be considered to be disturbing by the listener.

226

Copyright UTL Technologies Ltd 2009. All rights reserved

3. Discontinuous Transmission (DTX) :

227

DTX increases the efficiency of the system through a decrease in the possible radio transmission interference level. It does this by ensuring that the MS does not transmit unnecessary message data.

DTX can be implemented, as necessary, on a call-by-call basis. The effects will be most noticeable in communications between two MS.

Copyright UTL Technologies Ltd 2009. All rights reserved

4. Discontinuous Reception (DRX):

228

DRX allows the MS to effectively switch off during times when reception is deemed unnecessary. This allows the MS to go to sleep and listen-in only when necessary, with the effective saving in power usage. DRX may only be used when a MS is not in a call.

Copyright UTL Technologies Ltd 2009. All rights reserved

229

GSM Basic Call Sequence

Copyright UTL Technologies Ltd 2009. All rights reserved

230

Call from Land Line to a GSM network

Copyright UTL Technologies Ltd 2009. All rights reserved

Call flow :

231

1. The incoming call is passed from the fixed network to the gateway MSC (GMSC).

2. Then, based on the IMSI numbers of the called party, its HLR is determined. 3. The HLR checks for the existence of the called number. Then the relevant VLR is requested to provide a mobile station roaming number (MSRN).

Copyright UTL Technologies Ltd 2009. All rights reserved

232

4. This is transmitted back to the GMSC. 5. Then the connection is through from GMSC to the responsible MSC. 6. Now the MSC queries the VLR for the location range and reachability status of the mobile subscriber. 7. If the MS is marked reachable, VLR asks the MSC to go ahead with necessary paging message.

8. MSC asks the BSC for the same, then the BSC asks the BTS to send a paging message.

Copyright UTL Technologies Ltd 2009. All rights reserved

233

9. Then the particular mobile subscriber telephone responds to the page request through RACH. This will be forwarded to the BSC and MSC. 10.SDCCH will be provided through AGCH by the BSC with the instructions from MSC. SDCCH handles all necessary security procedures like authentication, IMEI check etc. 11.If this is successful, the VLR indicates to the MSC to go ahead with the call. 12. The traffic channel will be provided and the call can be completed.
Copyright UTL Technologies Ltd 2009. All rights reserved

Call from Mobile Station to land line

234

Copyright UTL Technologies Ltd 2009. All rights reserved

Call Flow from MS to PSTN

235

1. MS after dialing a number and press send key uses RACH to ask for a signaling channel. 2. The BSC allocates a signaling channel, using AGCH. 3. The MS sends a call setup request through SDCCH, to the MSC/VLR. Over SDCCH, all signaling takes place. This includes:
Copyright UTL Technologies Ltd 2009. All rights reserved

236

Marking the MS status as active in the VLR (if the MS status is not updated earlier). The Authentication Procedure

Ciphering
Equipment Identification

Sending the called Subscriber number to the network


Checking if the subscriber has service
Copyright UTL Technologies Ltd 2009. All rights reserved

237

4. The MSC/VLR instructs the BSC to allocate an idle TCH. The BTS and MS are told to tune to the TCH. 5. The MSC/VLR forwards the called number to an exchange in the PSTN, which establishes a connection to the subscriber. 6. If the called subscriber answers, the connection is established.
Copyright UTL Technologies Ltd 2009. All rights reserved

238

Case Study 9:

How Call flow happens in reality from the cell site? (PSTN Demo and BTS Video)

Copyright UTL Technologies Ltd 2009. All rights reserved

239

Handover between Cells Controlled by the Same BSC

Copyright UTL Technologies Ltd 2009. All rights reserved

240

1. The BSC orders the new BTS to activate a TCH.

2. The BSC sends a message to the MS, via the old BTS, containing information about the frequency and time slot to change to and also the output power to use. This information is sent to the MS using FACCH. 3. The MS tunes to the new frequency, and transmits handover access burst in the correct time slot. Since the MS had no
Copyright UTL Technologies Ltd 2009. All rights reserved

241

4. When the new BTS detects the hand over bursts, it sends the information about TA. This is also sent through FACCH.

5. The MS sends a handover complete message to the BSC through the new BTS.
6. The BSC tells the old BTS to release the old TCH

Copyright UTL Technologies Ltd 2009. All rights reserved

242 .Hand over between cells controlled by different BSCs but the same MSC/VLR :

Copyright UTL Technologies Ltd 2009. All rights reserved

243

1. The serving BSC sends a Hand over Required Message to the MSC containing the identity of the target cell 2. The MSC knows which BSC controls this cell and sends a Hand over Request to this BSC. 3. The new BSC orders the target BTS to activate a TCH. 4. The new BSC sends a message to the MS through the MSC and the old BTS.
Copyright UTL Technologies Ltd 2009. All rights reserved

244

5. MS tunes to the new frequency and transmits handover access bursts in the correct time slot.

6. When the new BTS sends information about TA.


7. MS sends a handover complete message to MSC through the new BSC. 8. MSC sends the old BSC an order to release the old TCH. 9. The old BSC tells the old BTS to release the TCH.

Copyright UTL Technologies Ltd 2009. All rights reserved

Hand over between cells controlled by different MSC/VLRs:

245

Copyright UTL Technologies Ltd 2009. All rights reserved

246

1. The serving (old) BSC sends a Hand over required message to the serving MSC (MSC-A), with the identity of the target cell. 2. MSC-A identifies that this cell belongs to another MSC (MSC-B), and requests help. 3. MSC-B allocates a hand over number to reroute the call. A Hand over Request is then sent to the new BSC.
Copyright UTL Technologies Ltd 2009. All rights reserved

247

4. The new BSC orders the target BTS to activate a TCH. 5. MSC-B receives the information, and passes it on to MSC-A together with the handover number.

6. A link is set up to MSC-B, possibly, though PSTN.


7. MSC-A sends a handover command to the MS, through the old BSC.

8. The MS tunes to the new frequency and transmits hand over access burst in the correct time slot.
Copyright UTL Technologies Ltd 2009. All rights reserved

248

9. When the new BTS detects the hand over burst it sends information about TA.

10. The MS sends hand over complete message to the old MSC, through the new BSC and the new MSC/VLR.
11. A new path in the group switches in MSC-A is established, and the call is switched through. 12. The old TCH is deactivated by the old BSC.
Copyright UTL Technologies Ltd 2009. All rights reserved

249

SHORT MESSAGE SERVICE

Copyright UTL Technologies Ltd 2009. All rights reserved

250

The point-to-point SMS provides a mechanism for transmitting "short" messages to and from wireless handsets. The service makes use of a short message service center (SMSC), which acts as a store and forward system for short messages. The wireless network provides for the transport of short messages between the SMSCs and wireless handsets.
Copyright UTL Technologies Ltd 2009. All rights reserved

251

A distinguishing characteristic of the service is that an active mobile handset is able to receive or submit a short message at any time, independent of whether or not a voice or data call is in progress. SMS also guarantees delivery of the short message by the network. Temporary failures are identified, and the short message is stored in the network until the destination becomes available.

Copyright UTL Technologies Ltd 2009. All rights reserved

Network Elements and Architecture

252

SME Short Message Entity SMS Short Message Service SMSC Short Message Service Center
Copyright UTL Technologies Ltd 2009. All rights reserved

253

SMS-GMSC Gateway Mobile Switching Center SMS-IWMSC SMS Inter working Mobile Switching Center

Copyright UTL Technologies Ltd 2009. All rights reserved

254

Short Messaging Entities Short messaging entity (SME) is an entity which may receive or send short messages. The SME may be located in the fixed network, a mobile station, or another service center. Short Message Service Center Short message service center (SMSC) is responsible for the relaying and store-and forwarding of a short message between an SME and mobile station.

Copyright UTL Technologies Ltd 2009. All rights reserved

255

SMS-Gateway/Inter working Mobile Switching Center

The SMS gateway MSC (SMS-GMSC) is an MSC capable of receiving a short message from an SMSC, interrogating a home location register (HLR) for routing information, and delivering the short message to the "visited" MSC of the recipient mobile station. The SMS inter working MSC (SMS-IWMSC) is an MSC capable of receiving a short message from the mobile network and submitting it to the appropriate SMSC. The SMSGMSC/ SMSIWMSC are typically integrated with the SMSC.
Copyright UTL Technologies Ltd 2009. All rights reserved

Mobile Switching Center

256

The mobile switching center (MSC) performs the switching functions of the system and controls calls to and from other telephone and data systems.

Visitor Location Register


The visitor location register (VLR) is a database that contains temporary information about subscribers. This information is needed by the MSC in order to service visiting subscribers.

Copyright UTL Technologies Ltd 2009. All rights reserved

The Base Station System

257

All radio-related functions are performed in the base station system (BSS). The BSS consists of base station controllers (BSCs) and the base transceiver stations (BTSs), and its primary responsibility is to transmit voice and data traffic between the mobile stations.

Copyright UTL Technologies Ltd 2009. All rights reserved

Service Elements

258

SMS comprises several service elements relevant to the reception and submission of short messages: Validity period: The validity period indicates how long the SMSC shall guarantee the storage of the short message before delivery to the intended recipient. Priority: Priority is the information element provided by an SME to indicate the priority message.
Copyright UTL Technologies Ltd 2009. All rights reserved

Mobile-Terminated Short Message Example

259

Figure 3 depicts the successful MT-SM scenario. For convenience, the GSM method is illustrated.

Copyright UTL Technologies Ltd 2009. All rights reserved

260

Copyright UTL Technologies Ltd 2009. All rights reserved

261

1. The short message is submitted from the SME to the SMSC. 2. After completing its internal processing, the SMSC interrogates the HLR and receives the routing information for the mobile subscriber. 3. The SMSC sends the short message to the MSC using the forward Short Message operation.
Copyright UTL Technologies Ltd 2009. All rights reserved

262

4. The MSC retrieves the subscriber information from the VLR. This operation may include an authentication procedure. 5. The MSC transfers the short message to the MS. 6. The MSC returns to the SMSC the outcome of the forward Short Message operation. 7. If requested by the SME, the SMSC returns a status report indicating delivery of the short message.

Copyright UTL Technologies Ltd 2009. All rights reserved

Mobile-Originated Short Message Example

263

Figure 4 depicts the successful MO-SM scenario. For convenience, the GSM method is shown.

Copyright UTL Technologies Ltd 2009. All rights reserved

264

Copyright UTL Technologies Ltd 2009. All rights reserved

265

1. The MS transfers the SM to the MSC.

2. The MSC interrogates the VLR to verify that the message transfer does not violate the supplementary services invoked or the restrictions imposed.
3. The MSC sends the short message to the SMSC using the forward Short Message operation.
Copyright UTL Technologies Ltd 2009. All rights reserved

266

4. The SMSC delivers the short message to the SME. 5. The SMSC acknowledges to the MSC the successful outcome of the forward Short Message operation. 6. The MSC returns to the MS the outcome of the MO-SM operation.

Copyright UTL Technologies Ltd 2009. All rights reserved

SHORT MESSAGE SERVICE

267

The Short Message Service (SMS) provides a means of sending text messages containing up to 160 alphanumerical characters to and from MSs. SMS makes use of a SMS Center (SMS-C), which acts as a store and forward center for short messages. SMS consists of two basic services Mobile Originated SMS : From an SMS-C to an MS.

Mobile Terminated SMS: From an MS to an SMSC.


Copyright UTL Technologies Ltd 2009. All rights reserved

268

In the two cases described below, the MS is in idle mode. If the MS is in active mode, short message is transmitted on the SACCH. No paging, Call set up, authentication, etc needs to be performed in that case.

Copyright UTL Technologies Ltd 2009. All rights reserved

Mobile Originated SMS


Mobile Originated SMS transfers a short message submitted by the MS to an SMS-C. It also provides information about the delivery of the short message, either by a delivery report or failure report.

269

Copyright UTL Technologies Ltd 2009. All rights reserved

270

1. An MS establishes a connection to the network, as in the case of a normal call set-up. This step is not performed if the MS is in active mode, since the connection already exists. 2. If authentication is successful, the MS sends the short message using SDCCH to the SMS-C via the MSC/VLR. The SMS-C in turn forwards the short message to its destination. This could be an MS or a terminal in the fixed network such as a PC.
Copyright UTL Technologies Ltd 2009. All rights reserved

Mobile Terminated SMS

271

Mobile Terminated SMS has the capability to transfer a short message from the SMS-C to an MS.

Copyright UTL Technologies Ltd 2009. All rights reserved

272

1. A User sends a message to a SMS-C.

2. The SMS-C sends the message to the SMSGMSC.


3. The SMS-GMSC queries the HLR for routing information 4. The HLR returns routing information to the SMS-GMSC. 5. The SMS-GMSC reroutes the message to the MSC/VLR.
Copyright UTL Technologies Ltd 2009. All rights reserved

273

6. The MS is paged and a connection is set up between the MS and the network, as in the normal call set up case. 7. If authentication is successful, the MSC/VLR delivers the message to the MS. Short Messages are transmitted on the allocated signalling channel, SDCCH. 8. If the delivery was successful, a report is sent from the MSC/VLR to the SMS-C, if not, the HLR is informed by the MSC/VLR, and a failure report is sent to SMS-C.
Copyright UTL Technologies Ltd 2009. All rights reserved

274

In the case of an unsuccessful delivery, the SMS-C informs the HLR and VLR that there is a message waiting to be delivered to the MS. The HLR then informs the SMS-C when the MS becomes available.

Copyright UTL Technologies Ltd 2009. All rights reserved

275

ALL THE BEST..

Copyright UTL Technologies Ltd 2009. All rights reserved

Você também pode gostar