Sie sind auf Seite 1von 278

UMTS Overview

UM9001
Student Guide

UM9001SG.en.A4
Issue 1
June 2000

Copyright 2000 Lucent Technologies. All Rights Reserved.

This material is protected by the copyright laws of the United States and other countries. It may not be reproduced, distributed, or altered in any
fashion by any entity (either internal or external to Lucent Technologies), except in accordance with applicable agreements, contracts or
licensing, without the express written consent of the Customer Training and Information Products organization and the business management
owner of the material.
For permission to reproduce or distribute, please contact:
Product development manager

18006456759 (United States only) 13173226847 (International)

Notice

Every effort was made to ensure that the information in this Information Product (IP) was complete and accurate at the time of printing.
However, information is subject to change. This IP describes certain hardware, software, features, and capabilities of Lucent Technologies
products. The hardware, software, features, and capabilities described may not be the same as the equipment that you have. The IP is for
information purposes, and you are cautioned that it may not describe your specific equipment.
Mandatory Customer Information
Federal Communications Commission (FCC) Statement

There are no in-country requirements for this IP.


Trademarks

No trademarks are used in this Information Product.

Lucent Technologies

Lucent Technologies USA


Fax Nr. +01 407 767 2760

How are we doing?


UMTS Overview
UM9001
Student Guide
UM9001SG.en.A4

Issue 1

June 2000

Please rate the effectiveness of this information product in the following areas:
Excellent
Good
Fair
Poor

Not Applicable

Ease of Use
Clarity
Completeness
Accuracy
Organization
Appearance
Examples
Illustrations
Overall Satisfaction
2

Please check the ways you feel we could improve this information product:

Improve the overview/introduction


Improve the table of contents
Improve the organization
Include more figures
Add more examples
Add more detail

Make it more concise/brief


Add more step-by-step procedures/tutorials
Add more troubleshooting information
Make it less technical
Add more/better quick reference aids
Improve the index

Please provide the details for the suggested improvement. ....................................................................................


..................................................................................................................................................................................
3

What did you most like about this information product? ..........................................................................................
......................................................................................................................................................................................................
......................................................................................................................................................................................................

Feel free to write any comments below or on an attached sheet. ............................................................................


......................................................................................................................................................................................................
......................................................................................................................................................................................................
......................................................................................................................................................................................................
If we may contact you concerning your comments, please complete the following:

Name ..................................................................................

Telephone Number ................................................

Company/Organization ..............................................................................

Date ................................................

Address......................................................................................................................................................................

Lucent Technologies USA


Fax Nr. +01 407 767 2760

How are we doing?


UMTS Overview
UM9001
Student Guide
UM9001SG.en.A4

Issue 1

June 2000

Please rate the effectiveness of this information product in the following areas:
Excellent
Good
Fair
Poor

Not Applicable

Ease of Use
Clarity
Completeness
Accuracy
Organization
Appearance
Examples
Illustrations
Overall Satisfaction
2

Please check the ways you feel we could improve this information product:

Improve the overview/introduction


Improve the table of contents
Improve the organization
Include more figures
Add more examples
Add more detail

Make it more concise/brief


Add more step-by-step procedures/tutorials
Add more troubleshooting information
Make it less technical
Add more/better quick reference aids
Improve the index

Please provide the details for the suggested improvement. ....................................................................................


..................................................................................................................................................................................
3

What did you most like about this information product? ..........................................................................................
......................................................................................................................................................................................................
......................................................................................................................................................................................................

Feel free to write any comments below or on an attached sheet. ............................................................................


......................................................................................................................................................................................................
......................................................................................................................................................................................................
......................................................................................................................................................................................................
If we may contact you concerning your comments, please complete the following:

Name ..................................................................................

Telephone Number ................................................

Company/Organization ..............................................................................

Date ................................................

Address......................................................................................................................................................................

Contents

About this information product

Reason for reissue

xi

Safety labels

xi

Conventions used

xi

.....................................................................................................................................................................................................................................

UMTS introduction

Overview

1-1

Evolution of wireless networks


Overview

1-2

History of mobile communication

1-3

Mobile communication evolution

1-4

GSM to UMTS evolution

1-6

UMTS evolution

1-8

UMTS objectives

1-9

UMTS background
Overview

1-11

UMTS spectrum

1-12

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

C O N T E N T S
i i i

General cellular concepts

1-13

UMTS characteristics

1-16

UMTS standards
Overview

1-21

Standards bodies

1-22

Standards organization

1-23

.....................................................................................................................................................................................................................................

UMTS architecture

Overview

2-1

UMTS reference model


Overview

2-2

Introduction

2-3

UMTS reference model diagram

2-5

User equipment

2-7

Access network

2-8

Access network entity functions

2-9

Radio interface

2-12

Core network

2-13

Core network entity functions

2-15

GSM and UMTS interworking

2-17

UMTS interfaces
Overview

2-20

UMTS interfaces

2-21

....................................................................................................................................................................................................................................

C O N T E N T S
i v

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

.....................................................................................................................................................................................................................................

UMTS interfaces

Overview

3-1

Transmission methods
Overview

3-2

Multiple access techniques

3-3

Principles of CDMA

3-6

CDMA transmission principles

3-10

PCM 30 and PCM 24 carriers

3-12

Ethernet

3-14

Protocols in the UMTS network


Overview

3-18

Common Channel Signaling No.7

3-19

CSS No. 7 network structure

3-22

Asynchronous Transfer Mode

3-24

ATM in the UMTS network

3-29

TCP/IP

3-31

Uu interface (air interface)


Overview

3-36

UMTS frequency spectrum

3-37

Definitions of channel types

3-39

Physical channel types

3-40

Transport channel types

3-43

Mapping of transport channels to physical channels

3-45

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

C O N T E N T S
v

Physical channel frame structure

3-48

Spreading codes

3-51

Channel coding, multiplexing, and rate matching

3-55

Uplink spreading and modulation

3-56

Downlink spreading and modulation

3-58

Protocols on the Uu interface

3-60

Iu, Iur, Iub interfaces


Overview

3-62

Iu interface

3-63

Iub interface

3-66

Iur interface

3-71

.....................................................................................................................................................................................................................................

Mobility management

Overview

4-1

Location data
Overview

4-2

Packet Mobility Management States

4-3

Mobile Station ISDN number

4-5

Mobile station identification numbers

4-7

Subscriber data
Overview

4-9

Network attachment

4-10

Locating a mobile subscriber

4-13

Location registration

4-17

....................................................................................................................................................................................................................................

C O N T E N T S
v i

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Idle mode procedures


Overview

4-19

Location update procedure

4-20

Request for service

4-22

Authentication

4-24

Ciphering

4-28

Update HLR/VLR

4-29

TMSI re-allocation

4-30

Periodic location update

4-32

Routing area update

4-33

.....................................................................................................................................................................................................................................

Call management

Overview

5-1

Mobile-to-land call scenario


Overview

5-2

Mobile-to-land call

5-3

Request for service

5-6

Authentication and ciphering

5-8

Equipment validation

5-9

Call setup

5-11

Call release phase (UE initiated)

5-14

Land-to-mobile call
Overview

5-16

Land-to-mobile call stages

5-17

Routing analysis

5-20

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

C O N T E N T S
v i i

Paging

5-22

Authentication and ciphering

5-24

Equipment validation

5-25

Call setup

5-26

Call release (network initiated)

5-29

Mobile-to-mobile call scenario


Overview

5-31

Mobile-to-mobile call

5-32

.....................................................................................................................................................................................................................................

Radio resource management

Overview

6-1

Power control
Overview

6-2

Introduction

6-3

Open loop

6-5

Closed loop

6-7

Power control overload

6-9

Handover control
Overview

6-10

Introduction

6-11

Soft handover

6-12

Soft handover flow

6-13

Softer handover

6-15

Hard handover

6-16

Hard handover flow

6-17

....................................................................................................................................................................................................................................

C O N T E N T S
v i i i

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

.....................................................................................................................................................................................................................................

UMTS services

Overview

7-1

UMTS services concept


Overview

7-2

Comparing UMTS to GSM

7-3

Virtual Home Environment

7-5

Open Services Architecture

7-9

Service providers

7-11

Phased UMTS service evolution

7-12

Bearer capabilities
Overview

7-13

Bearer capability function and control

7-14

Circuit-switched and packet-switched bearer capabilities

7-15

Teleservices
Overview

7-17

Circuit and packet-switched teleservices

7-18

Speech

7-19

Emergency call

7-20

Short Message Service

7-21

Fax

7-22

Supplementary and multimedia services


Overview

7-23

Supplementary service concepts

7-24

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

C O N T E N T S
i x

Supplementary services inherited from GSM

7-26

UMTS services

7-31

Multimedia services

7-32

Multicall example

7-33

.....................................................................................................................................................................................................................................

GL

Glossary

GL-1

.....................................................................................................................................................................................................................................

IN

Index

IN-1

....................................................................................................................................................................................................................................

C O N T E N T S
x

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

About this information product

...............................................................................................................................................................................................................................................................

Purpose

Reason for reissue

This information product is designed to provide students with:

An overview of UMTS technology

An understanding of the technology used to build a UMTS


solution.

Not applicable to this document. This is the first issue.

Safety labels

This document does not contain any handling instructions. For this
reason, no notices regarding hazards when using the equipment
described here are necessary.

Conventions used

Abbreviations used in this document are explained in the Glossary.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

xi

UMTS introduction

Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this chapter, you will be able to:

Describe the evolution of wireless networks to the current third


generation systems

Identify the main objectives for developing the Universal Mobile


Telecommunications System (UMTS)

Describe the main characteristics of UMTS

State how the UMTS standards are organized.

This chapter contains the following topics:


Evolution of wireless networks

1-2

UMTS background

1-11

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

1-1

UMTS introduction

Evolution of wireless networks


Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this topic, you will be able to:

Describe the evolution of wireless networks to the present day


third generation systems

Identify the factors that have lead to the development of UMTS.

This topic contains the following:


History of mobile communication

1-3

Mobile communication evolution

1-4

GSM to UMTS evolution

1-6

UMTS evolution

1-8

UMTS objectives

1-9

....................................................................................................................................................................................................................................

1-2

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Evolution of wireless networks

UMTS introduction

History
of mobile communication
....................................................................................................................................................................................................................................
Overview

The goal of wireless communication is to allow users to access the


capabilities of traditional fixed networks, and now the Internet, at any
time regardless of location or mobility.
There are many types of wireless services, with varying degrees of
mobility. For example:

Cellular systems

Cordless systems

Wireless PBX

Paging

Mobile satellite services.

Cellular systems

Cellular systems divide a geographic area into a series of cells (or


base stations). Each cell has its own radio transmitter and receiver.
When a cellular phone moves out of the coverage area of a cell, it is
handed over to a closer cell. Analog cellular systems include AMPS
and TACS. Digital cellular systems include GSM, CDMA IS-95 and
UMTS.

Cordless systems

Cordless phones are the wireless counterpart of standard telephones.


The handsets typically operate within 50 to 100 m of the users base
station, which is connected to the Public Switched Telephone Network
(PSTN).

Wireless private branch


exchanges
Paging

Mobile satellite services

Wireless private branch exchanges (PBX) provide cordless telephony


within the premises of the PBX owner.
Paging is the generic term for messaging services. Radio messaging
services allow short messages to be transmitted in one direction to a
specific user, regardless of the users location. The message may be a
tone signal or text.
Cellular-based terrestrial wireless networks are not economically
viable or physically practical in some areas (remote,
sparsely-populated regions, large expanses of water).
Mobile satellite services can provide coverage to such areas, using
spectrum specifically allocated for satellite operation.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

1-3

Evolution of wireless networks

UMTS introduction

Mobile
communication evolution
....................................................................................................................................................................................................................................
Evolution steps

Diagram

Second generation
systems

Mobile communication has evolved in three stages:


1.

First generation - analog.


Speech only.

2.

Second generation - digital.


Speech and low-speed data.

3.

Third generation - integration of all wireless services (fixed,


cellular, cordless, satellite, etc.) into one universal mobile
telecommunication system (UMTS).
Speech and high-speed data.

Global evolution of wireless systems:

Low-rate digital speech coding techniques and the continuous increase


in the device density of integrated circuits led to digital second
generation systems such as GSM. Digital systems can support more
users per base station per MHz of spectrum than analog systems.

....................................................................................................................................................................................................................................

1-4

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Evolution of wireless networks


Mobile communication evolution

UMTS introduction

The GSM second generation standard has evolved into GSM Phase
2+. This is a midway point between second and third generation
systems. Many GSM Phase 2+ features (in particular GPRS) have
paved the way for UMTS.
UMTS Phase 1 will implement a shared GSM/UMTS core network,
based on enhancements to existing GSM Phase 2+ network elements.
Third generation systems

Third generation (3G) systems come under the umbrella term of


International Mobile Telecommunications 2000 (IMT-2000). They will
provide a globally integrated system for delivering wideband
information and services to mobile users over fixed, wireless and
satellite networks.
3G standards are being developed in Europe, Asia, and the United
States, overseen by the International Telecommunications Union
(ITU). The IMT-2000 specification is an overall guideline for all 3G
systems, and will ensure worldwide compatibility between systems.
UMTS is a successor to GSM and due to GSMs worldwide
penetration, is expected to become the most important 3G standard.
Both terrestrial and satellite standards will be defined. The satellite
standards are not yet as well defined as the terrestrial version.
UMTS will provide wideband radio access with flexible bandwidth on
demand (from just a few hundred bits per second up to 2 Mbits/s).

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

1-5

Evolution of wireless networks

UMTS introduction

GSM
to UMTS evolution
....................................................................................................................................................................................................................................
Why we need UMTS

UMTS is driven by ever increasing worldwide demand for high-speed


mobile data services. For example:

Internet access

Commercial and entertainment applications

Mobile multimedia (audio, video and data)

Integrated office services - fax, messaging, email

File transfer.

Existing second generation GSM systems are based on narrowband


technology and cannot provide the necessary bandwidth to support
these services:
System

Maximum data rate

High Speed Circuit Switched


Data (HSCSD)

115.2 kbits/s

General Packet Radio Services


(GPRS)

171.2 kbits/s

Enhanced Data Rates for GSM


Evolution (EDGE)

384 kbits/s

Users expect seamless and global access to telecommunications


services across fixed and mobile networks. UMTS will combine high
speeds with integrated fixed, wireless and satellite network access. It
will also support the increasing convergence between telecoms and IT
applications.
UMTS data rates

UMTS uses wideband technology, providing variable bandwidth on


demand and data rates of up to 2 Mbits/s.
UMTS supports the following data rates:

GSM Phase 2+ features

Up to 144 kbits/s for fast moving users (cars, planes)

Up to 384 kbits/s for slow moving users (pedestrian)

Up to 2 Mbits/s for indoor / stationary users.

Several recent developments in GSM have paved the way for UMTS:

High Speed Circuit Switched Data (HSCSD)

General Packet Radio Services (GPRS)

Enhanced Data Rates for GSM Evolution (EDGE).

Further GSM evolution is limited by its narrow bandwidth.

....................................................................................................................................................................................................................................

1-6

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Evolution of wireless networks


GSM to UMTS evolution

HSCSD

GPRS

UMTS introduction

HSCSD introduced the first GSM high-speed data capability by


combining up to 8 time slots per call into one higher bandwidth
channel.
GPRS introduced packet switching capability in GSM. Traditional
circuit switched services (including HSCSD) reserve transmission
capacity to a single subscriber for the entire connection time, whether
or not the connection is used for all of that time.
With packet switching, capacity is allocated only while there is data to
be sent and is released when it is not needed. Network resources are
used much more efficiently as a result.
Data is split into small, fixed length packets before being transferred
through the network. Each packet has a header containing the
originating and destination address. When the packets arrive at their
destination they are reassembled.
GPRS provides very fast data transmission and high throughput rates.
Because it uses radio resources only when there is data to be sent, it
is ideally suited for bursty applications (which send large amounts
of information at irregular intervals) such as mobile Internet services
and email.

EDGE

EDGE is an enhancement of GPRS which applies new modulation


techniques to provide even higher data rates (up to 384 kbits/s) and
improved network capacity.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

1-7

Evolution of wireless networks

UMTS introduction

UMTS
evolution
....................................................................................................................................................................................................................................
Shared GSM / UMTS
networks

UMTS Phase 1 (estimated for rollout in 2002) is based on an evolved


GSM standard which provides complete interoperability between
UMTS and GSM, based on intersystem handover and roaming.
UMTS Phase 1 will share common core network elements with GSM.
It is likely to be used to provide coverage for localised areas of
exceptionally high demand in existing GSM Phase 2+ networks.
Although GSM and UMTS can interwork with each other, they have a
different architecture and different air interfaces. GSM uses
narrowband Time Division Multiple Access (TDMA) technology.
UMTS uses broadband Code Division Multiple Access (CDMA).

Global UMTS

UMTS Phase 2 (estimated for rollout in 2005) will provide worldwide


UMTS network harmonisation with mass market access to UMTS and
seamless global roaming.

All IP networking

The UMTS standards provide for eventual all-IP networking in


which both speech and data services will be provided using IP
technology. Speech will be supported by Voice Over Internet Protocol
(VOIP). VOIP will support voice calls over the Internet and other
packet networks.

....................................................................................................................................................................................................................................

1-8

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Evolution of wireless networks

UMTS introduction

UMTS
objectives
....................................................................................................................................................................................................................................
Summary

High-speed data

The following objectives were set for UMTS:

High-speed data

New services

Worldwide roaming

High speech and service quality

Multi-environment support

Circuit switching and packet switching support

Low cost.

The UMTS core network will support:

Packet-switched data services up to 2 Mbits/s peak bit rate per


user

Circuit-switched data services up to 64 kbits/s peak bit rate per


mobile terminal. Mobile terminals will be able to support
multiple 64 kbits/s sessions.

Variable bandwidth (from less than 8 kbits/s up to 2 Mbits/s) will be


available on demand, depending on the requirements of the requesting
service.
New services

Worldwide roaming

UMTS will provide a range of new services (including Internet and


multimedia services). These will be available regardless of the users
location, the network supplying the service, and the users terminal
equipment type.
Users will be able to roam in any other UMTS (and GSM) network
and transparently access UMTS services anywhere in the world.
Tailored services available to users in their home network will be
available to them in exactly the same manner elsewhere. In UMTS
this is known as the Virtual Home Environment (VHE) concept. VHE
includes basic and customised services, speech quality, and account
management facilities.

High speech and service


quality

Multi-environment support

Speech and service quality will at least match that provided by


existing fixed networks. A standard default speech coder has been
defined for use in all UMTS systems.
UMTS will provide access to all applications, regardless of the
network type that operates the application (fixed, cellular, cordless,

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

1-9

Evolution of wireless networks


UMTS objectives

UMTS introduction

satellite). It will also provide seamless handover between different


IMT-2000 environments (terrestrial or satellite).
To achieve this, UMTS will support interworking with the following
networks:

Circuit and packet


switching support

PSTN

ISDN

GSM

IP.

UMTS will support circuit-switched data and voice service


interworking with the PSTN/ISDN. Handover between GSM and
UMTS circuit switching systems will be transparent to users.
UMTS will support packet-switched data interworking with the
Internet and other IP networks.

Low cost

UMTS is expected to achieve mass market coverage and attract strong


competition between suppliers. This will encourage the provision of
relatively low cost equipment and services.

....................................................................................................................................................................................................................................

1-10

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS introduction

UMTS background
Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this topic, you will be able to:

Describe the UMTS spectrum allocation

Describe the main characteristics of cellular networks

Describe the main characteristics of UMTS.

This topic contains the following:


UMTS spectrum

1-12

General cellular concepts

1-13

UMTS characteristics

1-16

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

1-11

UMTS background

UMTS introduction

UMTS
spectrum
....................................................................................................................................................................................................................................
European band allocation

The IMT-2000 bandwidth was allocated by the ITUs World


Administrative Radio Conference.
60 MHz of bandwidth from the 2 GHz spectrum was allocated to
UMTS (FDD systems):

1920 MHz to 1980 MHz uplink

2110 MHz to 2170 MHz downlink.

Frequency allocations for other IMT-2000 systems:

Diagram

Example UMTS allocation

1900 MHz to 1920 MHz for UMTS TDD systems (licensed


operation)

2010 MHz to 2025 MHz for UMTS TDD systems (unlicensed


operation)

1980 MHz to 2010 MHz (uplink) and 2170 MHz to 2200 MHz
(downlink) for mobile satellite systems.

European frequency allocation for UMTS:

The UK allocated its UMTS licences by auction in spring 2000:


Licence

Company

Price paid

Licence A

TIW UMTS (UK)

4.38 billion

Licence B

Vodafone

5.96 billion

Licence C

BT (3G)

4.03 billion

Licence D

One2One Personal
Communications

4.0 billion

Licence E

Orange 3G

4.09 billion

....................................................................................................................................................................................................................................

1-12

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS background

UMTS introduction

General
cellular concepts
....................................................................................................................................................................................................................................
Overview

Cell types

This topic reviews the principal concepts involved in cellular


networks:

Cell types

Frequency reuse

Handover

Roaming.

A cell is the basic unit of a cellular system. A given geographical area


is divided into separate cells, each of which has a transmitter/receiver.
In UMTS, a cell is defined as the geographical area that can be
identified by a mobile station from the cell identification that is
broadcast by the cell.
The size of a cell is determined largely by its transmission power.
There are a number of different cell types:
Cell type

Size

Typical radius

Description

Satellite cell

Very
large

100 km and more

Expensive and
currently only used
for specialised user
groups.

Macrocell

Large

3 km to 20 km

Used to provide
coverage over
large areas and for
medium to fast
moving users.

Microcell

Small

100 m to 200 m

Used to provide
high capacity
coverage in
localised areas
(such as city
centers).
Usually serve slow
moving or static
users.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

1-13

UMTS background
General cellular concepts

UMTS introduction

Cell type

Size

Typical radius

Description

Picocell

Very
small

Less than 50 m

Used for very


small indoor areas
such as a floor of
an office building.
Not widely used in
GSM but expected
to be used by
UMTS and other
third generation
systems to provide
extremely high
data rates to a few
localised areas of
demand.

Frequency reuse

The spectrum allocated for a cellular network is limited. As a result


there is a limit to the number of frequencies (channels) available. A
cellular network can only service large numbers of subscribers if the
frequencies allocated to it can be reused. Frequency reuse allows a
much higher subscriber density per MHz of spectrum.
Frequency reuse is implemented by reusing the same channels in
multiple cells in the network. Cells using the same frequency set are
known as co-channel cells.
In systems like GSM, which are based on frequency/time slot
separation of different user signals, the distance between cells
containing the same frequency must be wide enough to keep
co-channel interference at acceptable levels.
In UMTS, different user signals are identified by locally unique codes
rather than by frequency/time slot. Consequently co-channel
interference is less of an issue and frequencies can be reused by
adjoining cells.

Handover

In cellular systems, continuous coverage is achieved by performing a


handover (seamless transfer of a call from one base station to another)
when a mobile station approaches the edge of the cell it is currently
in. This requires the mobile to retune to another channel, either in the
current cell or in a different cell.
The network decides when handover is necessary. The mobile station
acts on instruction by the network.

....................................................................................................................................................................................................................................

1-14

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS background
General cellular concepts

Roaming

UMTS introduction

Roaming allows users to access mobile services and functions when


they are physically located outside their home network. They may be
in another service providers network or in another country.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

1-15

UMTS background

UMTS introduction

UMTS
characteristics
....................................................................................................................................................................................................................................
Overview

Duplex transmission

This topic summarizes the key characteristics of UMTS systems:

Full duplex transmission

Multiple access techniques

Code Division Multiple Access (CDMA)

Soft handover

Power control

Multi-service access

Virtual Home Environment (VHE).

All cellular systems use duplex operation - simultaneous transmission


and reception of signals in both directions.
There are two duplex transmission modes:
Mode

Description

Frequency Division Duplexing


(FDD)

The transmit and receive signals


use separate frequencies.
Frequencies are allocated in pairs
- one is used for transmit and the
other for receive signals.

Time Division Duplexing (TDD)

The transmit and receive signals


use the same frequency but at
different times (time slots). The
time slot cycle is so fast that the
transmit and receive appears
simultaneous to users.

UMTS supports both FDD mode and TDD mode.


The TDD standards are not yet well defined and TDD has significant
performance limitations except in cases of indoor and stationary
coverage. As a result, FDD is expected to be used for wide area and
medium range coverage (macrocells and microcells). TDD mode is
expected to be used mainly for indoor coverage and low
mobility/stationary users.
Multiple access techniques

All cellular systems use multiple access techniques. These divide the
available radio frequency spectrum into distinct segments so that
multiple users can share the same frequency allocation.

....................................................................................................................................................................................................................................

1-16

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS background
UMTS characteristics

UMTS introduction

There are several different multiple access techniques:


Multiple access type

Description

Frequency Division Multiple


Access (FDMA)

The available spectrum is


divided into equal bandwidth
radio channels (frequencies).
Each user is assigned a specific
radio channel.

Time Division Multiple Access


(TDMA)

Each radio channel is further


divided by time into multiple
time slots (GSM uses eight time
slots). Each user is assigned a
specific frequency/time slot
combination, so each radio
channel carries multiple TDMA
channels and can therefore
suppport multiple users.
GSM uses TDMA together with
FDMA.

Code Division Multiple Access


(CDMA)

Uses spread spectrum


technology, in which the signals
associated with a call are spread
across the entire available radio
channel.
Multiple users share the same
radio channel, but each user is
allocated a unique code before
transmission over a carrier
channel. Only signals which use
that users code are extracted at
the receiver end - signals from
other users are ignored as
background noise.

UMTS uses CDMA. It supports two variants:

Wideband CDMA (W-CDMA)


Used in Frequency Division Duplexing (FDD) systems.

Time-division CDMA (TD-CDMA)


Used in Time Division Duplexing (TDD) systems.

W-CDMA will be the most widely used variant.


W-CDMA and TD-CDMA
compared

W-CDMA air interface


Duplexing method

FDD

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

1-17

UMTS background
UMTS characteristics

UMTS introduction

Multiple access method

W-CDMA

Channel bandwidth

5 MHz

Carrier spacing raster

200 kHz

Chip rate

3.84 Mchip/s

Spreading factor

Variable (4 - 256)

User data rate

8 - 384 kbits/s

TD-CDMA air interface

CDMA concepts

Duplexing method

TDD

Multiple access method

TD-CDMA

Channel bandwidth

5 MHz

Carrier spacing raster

200 kHz

Chip rate

3.84 Mchip/s

Spreading factor

16

User data rate

8 kbits/s to 2 Mbits/s

This topic describes the main features of CDMA:

Before a data signal is transmitted over the air interface it is


mixed with a much higher data rate signal to spread it across the
available frequency channel. The original signal data bits are
mixed with a periodically repeated bit sequence of high rate
spreading bits.
The spread signal covers a wider bandwidth than required by the
original data signal. This makes the signal much more robust
since the overall effect of interference on any one part of the
signal is proportionately less over a wider bandwidth. The greater
the spread of the signal (spreading factor) the greater the
immunity from interference.

The received signal is despread to retrieve the original data


signal.

Each user is allocated a different spreading code. The same code


is used to despread the received signal. Signals with other
spreading codes are ignored by the receiver.

After spreading, each data bit is represented by a number of


chips (data bits plus spreading bits). The spreading factor is the
chip rate divided by the original data bit rate. For example, seven
chips per data bit gives a spreading factor of seven.

Because unique codes are used to separate different user signals,


in CDMA systems all users can share the same frequencies.

....................................................................................................................................................................................................................................

1-18

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS background
UMTS characteristics

Diagram

CDMA advantages

Soft handover

UMTS introduction

CDMA spreading and coding:

CDMA has significant advantages:

Resistance to narrowband interference

High capacity. The fixed capacity limit on the number of


simultaneous users per cell is very high. However, in practice
there is a soft limit when the increased background noise from
additional users exceeds a workable threshold.

Simplified frequency planning. The same frequencies can be


reused by adjacent cells so there is no need to plan frequency
reuse distances as in TDMA and FDMA systems.
This is because multiple signals within a frequency are separated
by their spreading codes.

Soft handover.

In UMTS, the connection between the mobile station, known as User


Equipment (UE), and the UTRAN can use multiple simultaneous
radio links. Depending on the UE specification, it may support two or
three active links - to different cells or to different transmitters within
a cell.
A multi connected UE receives signals from more than one cell or
transmitter. Multiple cells can receive the signal from the UE.
If the UE needs to be handed over from one attached cell/transmitter
to another attached cell/transmitter, the new radio link is added before
the old one is dropped. This is soft handover.
Soft handover provides better coverage in areas that are prone to
fading (such as inside buildings).
In practice, soft handover can only take place between
cells/transmitters which share the same physical radio channel.

Power control

Power control is an important issue in CDMA. Multiple users in a cell


share the same frequencies, so multiple user signals are transmitted on
one channel. This means that any UE which is transmitting at high
power (close to the base station) is likely to drown out other user
signals.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

1-19

UMTS background
UMTS characteristics

UMTS introduction

To avoid this, the power level received at the base station must be
maintained at the same level for all UEs, regardless of their position
in the cell. This is achieved in UMTS by using very fast (1500 cycles
per second) power control adjustment.
Multi service access

UMTS allows users to access multiple services simultaneously (voice,


web surfing, email).
In the downlink (base station to UE) different services are time
multiplexed and transmitted on the same physical data channel.
Exceptionally, if a very high data rate is required for one or more of
the requested services, the transmission is sent over several parallel
physical data channels.
In the uplink (UE to base station) the services are divided before
transmission and sent on separate physical data channels.

Virtual Home Environment

The Virtual Home Environment (VHE) is an important UMTS feature.


A key requirement of a universal coverage system is that users can
access their personalised services anywhere, regardless of individual
network boundaries or the terminal used.
The VHE provides a standard component set for service providers,
network operators and terminal equipment. These standard
components allow subscriber services to be built, deployed and
managed with a standardised application interface. This allows
transparent portability of services across different networks and
between terminals. Roaming users can access their usual services with
exactly the same look-and-feel (tailored services, quality, security
and billing functions) as in their home network.
VHE is an extension of the CAMEL (Customised Applications for
Mobile networks Enhanced Logic) used in GSM GSM Phase 2+
networks. CAMEL and VHE will interwork to provide a smooth
transition path from GSM to UMTS.

....................................................................................................................................................................................................................................

1-20

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS introduction

UMTS standards
Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this topic, you will be able to:

List the standards bodies which are responsible for administering


the UMTS standards

Describe how the UMTS standards are organized.

This topic contains the following:


Standards bodies

1-22

Standards organization

1-23

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

1-21

UMTS standards

UMTS introduction

Standards
bodies
....................................................................................................................................................................................................................................
Structure

3GPP structure

The International Telecommunications Union (ITU) is responsible


for overall control of the standards for third generation
International Mobile Telecommunications 2000 (IMT-2000)
systems.

The Third Generation Partnership Project (3GPP) is responsible


for the UMTS subset.
3GPP is made up of a number of international standards bodies,
including:
-

ETSI (Europe)

ARIB /TTC (Japan)

ANSI T1 (United States)

TTA (Korea).

The following Technical Specification Groups make up the Third


Generation Partnership Project (3GPP):
Group

Identifier

Core Network

TSG-CN

Radio Access Network

TSG-RAN

Terminals

TSG-T

Service and System Aspects

TSG-SA

A number of Working Groups report to each Technical Specification


Group.

....................................................................................................................................................................................................................................

1-22

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS standards

UMTS introduction

Standards
organization
....................................................................................................................................................................................................................................
Structure

3GPP specification series:


21 series

Requirements specifications

22 series

Service aspects

23 series

Technical realization

24 series

Signaling protocols

25 series

UTRA aspects

26 series

Codecs

27 series

Data

28 series

Reserved for future use

29 series

Signaling protocols (NSS)

30 series

Programme management

31 series

UIM (User Identity Module)

32 series

Operation and Maintenance

33 series

Security aspects

34 series

Test specifications

35 series

Algorithms

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

1-23

UMTS architecture

Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this chapter, you will be able to:

Describe the layout of the UMTS network architecture

Describe the function of each UMTS network entity.

This chapter contains the following topics:


UMTS reference model

2-2

UMTS interfaces

2-20

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

2-1

UMTS architecture

UMTS reference model


Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this topic, you will be able to:

Describe the layout of the UMTS network architecture

Describe the function of each UMTS network entity.

This topic contains the following:


Introduction

2-3

UMTS reference model diagram

2-5

User equipment

2-7

Access network

2-8

Access network entity functions

2-9

Radio interface

2-12

Core network

2-13

Core network entity functions

2-15

GSM and UMTS interworking

2-17

....................................................................................................................................................................................................................................

2-2

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS reference model

UMTS architecture

Introduction
....................................................................................................................................................................................................................................
Summary

The UMTS architecture comprises three parts (or domains):

Core network

Access network

User equipment.

User equipment refers to the mobile devices used to access UMTS


services. The user equipment has a radio interface to the access
network. The access network manages access to the core network for
all authorised users within its coverage area. The core network
provides the central switching, transmission and service provisioning
functions required to provide UMTS services.
The access network and core network communicate by the Iu
interface. The access network and the user equipment communicate by
the Uu interface.
A UMTS network may consist of one or more access networks (using
different radio access systems) linked to the same core network.
Together they form a single UMTS network.
Diagram

Integrated packet and


circuit switching

High-level illustration of the UMTS architecture:

The UMTS system provides integrated support for packet-switched


and circuit-switched traffic. In general terms, packet switching is used

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

2-3

UMTS reference model


Introduction

UMTS architecture

for high-rate data transmissions, circuit switching is used for voice


and low-rate data transmissions.

....................................................................................................................................................................................................................................

2-4

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS reference model

UMTS architecture

UMTS
reference model diagram
....................................................................................................................................................................................................................................
Diagram

UMTS reference model illustration:

Legend:

AuC

Authentication Center

EIR

Equipment Identity Register

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

2-5

UMTS reference model


UMTS reference model diagram

UMTS architecture

G-MSC

Gateway Mobile Switching Center

HLR

Home Location Register

ISDN

Integrated Services Digital Network

IP

Internet Protocol

3G-MSC

Mobile Switching Center

PSTN

Public Switched Telecommunications Network

RNC

Radio Network Controller

3G-SGSN

Serving GPRS Support Node

UE

User Equipment

....................................................................................................................................................................................................................................

2-6

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS reference model

UMTS architecture

User
equipment
....................................................................................................................................................................................................................................
Overview

UE functionality

Components

User Equipment (UE) is the UMTS term for the mobile devices that
allow users to access UMTS network services. For example:

Mobile phone

Palmtop PC

PC card

Personal digital assistants (PDA).

UE functionality includes:

Support for data services at varying bit rates of up to 2 Mbit/s.

Support for voice services and for a range of voice quality.

Data rather than voice emphasis. Data retrieval rather than data
creation.

Variety of input mechanisms: voice, pen, hot-keys, menu


selection. Traditional keyboard-style input is too bulky.

Typical applications: surfing the Internet, reading files and email,


accessing schedule information from PC, multimedia (audio,
video).

A UE can support up to three simultaneous active UMTS


connections (one voice and two data).

UMTS Phase 1 supports dual-mode UEs for GSM/UMTS.

The UE and the UTRAN communicate over the Uu interface (the


radio interface).

User equipment has two components:

Mobile Equipment (ME). The ME is the terminal itself. It


performs all radio transmission, reception and processing
functions.

UMTS Subscriber Identity Module (USIM). A removeable card


which uniquely identifies a UMTS user for authentication
purposes, holds subscription-related information and provides
additional security features.
A valid USIM is always required to access any UMTS services
(except emergency calls).

The ME and the USIM are interoperable, regardless of their respective


manufacturer, card issuer or operator.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

2-7

UMTS reference model

UMTS architecture

Access
network
....................................................................................................................................................................................................................................
Overview

The access network is known as the UMTS Terrestrial Radio Access


Network (UTRAN) and performs the following functions:

Radio resource management

Call set up and handover

User access to the core network.

The UTRAN performs a similar role to the Base Station Subsystem


(BSS) in GSM.
Access network entities

A UTRAN contains the following network entities:

Radio Network Subsystem (RNS)

Radio Network Controller (RNC)

Node B.

Most UTRAN functions are performed by the Radio Network


Controller (RNC) entity.

....................................................................................................................................................................................................................................

2-8

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS reference model

UMTS architecture

Access
network entity functions
....................................................................................................................................................................................................................................
Radio Network Subsystem

The UTRAN consists of a series of Radio Network Subsystems


(RNS). The RNS is an abstract term that collectively defines the
entities which manage the resources and transmission/reception for a
particular set of cells. A cell is a geographical area that can be
identified by a UE from a broadcast cell identification.
Each RNS contains:

One Radio Network Controller (RNC).

One or more Node Bs. Each Node B controls multiple UMTS


cells.

When a UE is connected to the UTRAN, one RNS is the Serving


RNS and controls the connection. A different RNS (a Drift RNS)
can support the Serving RNS by providing radio resources if the
connnection between the UTRAN and the UE needs to use cell(s)
controlled by that RNS. The Serving RNS always controls the
connection between the UE and the UTRAN.
The Drift RNS and the Serving RNS are connected by the Iur
interface.
Radio Network Controller

The Radio Network Controller (RNC) controls the allocation and use
of the radio resources in an RNS and performs most of the intelligent
processing for the UTRAN. Each RNC controls one or more Node Bs.
RNC functions include:

Assigning and releasing radio channels. These may be locally


controlled by the RNC or controlled from a neighbouring RNC

Monitoring and maintaining connection quality

Handover control

Operations and maintenance:

Configuration management

Alarm and fault reporting

Performance monitoring.

Macro diversity combining and splitting functions.

Macro diversity refers to the capability of a UMTS UE to receive


signals from more than one cell and vice versa - multiple cells can
receive the signal from a UE. The cells can be controlled by different
Node Bs.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

2-9

UMTS reference model


Access network entity functions

UMTS architecture

Macro diversity:

A UE can be connected simultaneously to two or more cells,


providing a multi-path communication channel. User data is split and
carried over several channels.
Macro diversity has two advantages:

Sending the data across multiple channels reduces the impact of


interference in any one path, providing improved overall
connection quality

It allows seamless handover of the UE between currently


connected cells (soft handover). In soft handover the UE
always keeps at least one active connection to one of the cells, so
the radio path does not have to be dropped and reconnected (as is
required in GSM).

The RNC manages the data splitting/combining and handover function


across the multiple paths.
The RNC performs a similar function to the Base Station Controller
(BSC) in GSM networks, but has more intelligence.
RNC interfaces:

Iub interface to the Node Bs

Iu interface to the core network

....................................................................................................................................................................................................................................

2-10

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS reference model


Access network entity functions

UMTS architecture

Iur interface to other RNCs. An RNC can be interconnected to


multiple other RNCs

Interfaces to the Operations and Maintenenace Center, local


maintenenace terminals, and Short Message Service center.

Circuit switched and packet switched traffic is separated at the RNC


and carried independently to the core network.
Node B

Diagram

Node Bs are logical nodes that are responsible for radio transmission
and reception between the User Equipment (UE) and UMTS cells.

One Node B serves multiple cells

Each Node B is controlled by one RNC

Node Bs can support Frequency Division Duplexing (FDD),


Time Division Duplexing (TDD) or dual-mode operation.

Main components of the core network:

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

2-11

UMTS reference model

UMTS architecture

Radio
interface
....................................................................................................................................................................................................................................
Introduction

Structure

Functions

The UMTS radio interface is the Uu interface between the UE and the
UTRAN.
The radio interface comprises three protocol layers:

Physical layer

Data link layer

Network layer.

The radio interface provides:

Bearer channels (the underlying physical channels) which carry


data over the radio path

Logical channels. The bearer channels are divided into a series of


logical channels which each carry a particular type of data. There
are two categories of logical channels:
-

Signaling and control channels. These carry system data and


signaling information used in functions such as cell
management and call set up.

Traffic channels. These carry user data traffic. Different


traffic channels provide different transmission speeds and
error correction levels.

....................................................................................................................................................................................................................................

2-12

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS reference model

UMTS architecture

Core
network
....................................................................................................................................................................................................................................
Overview

The UMTS core network is responsible for:

Transmission and switching

User management

User services provisioning

Interworking with external networks.

The core network provides integrated support for packet and circuit
switched traffic.
Most UMTS core networks are likely to evolve from an existing
network infrastructure (GSM, PDN, N-ISDN, B-ISDN).
Services

Interworking

Core network entities

Services supported by the UMTS core network include:

Voice

Universal messaging (integrated email, voicemail, SMS)

Video

Wireless internet access

File transfer

Interworking is supported to:

PSTN

GSM

N-ISDN

IP

The core network is logically divided into a circuit switching domain


and a packet switching domain. The network entities are grouped into
functional areas accordingly:

Entities to support packet-switched services

Entities to support circuit-switched services

Entities common to packet and circuit-switched services.

Packet switching entities:

Serving GPRS Support Node (3G-SGSN)

Gateway GPRS Support Node (3G-GGSN)

Domain Name Server (DNS)

Dynamic Host Configuration Protocol (DHCP) server

Firewall

Packet charging gateway.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

2-13

UMTS reference model


Core network

UMTS architecture

Circuit switching entities:

Mobile Switching Center (3G-MSC)

Gateway MSC (GMSC)

Visitor Location Register (VLR).

Shared packet and circuit switching entities:

Home Location Register (HLR)

Authentication Center (AuC)

Equipment Identity Register (EIR).

Separation of the circuit switching and packet switching domains is


also achieved by separate logical interfaces between the core network
and the UTRAN:

In the circuit domain the Iu-cs interface interconnects the UTRAN


and the core network and terminates at the 3G-MSC.

In the packet domain the Iu-ps interface interconnects the UTRAN


and the core network and terminates at the 3G-SGSN.

Other areas that can be considered as part of the core network


include:

Network management systems (such as billing and provisioning,


and service management)

Operations and Maintenance Center (OMC).

....................................................................................................................................................................................................................................

2-14

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS reference model

UMTS architecture

Core
network entity functions
....................................................................................................................................................................................................................................
Serving GPRS Support
Node

The Serving GPRS Support Node (3G-SGSN) is responsible for


providing packet services in the core network. (The 3G-MSC provides
circuit switched services.) Packet data traffic flows from the UTRAN
into the core network and initially terminates at the 3G-SGSN. It is
then forwarded to the 3G-GGSN for onward transmission.
Functions of the 3G-SGSN include:

Session management

Mobility management

Subscriber database management (over an interface to the HLR)

Maintaining charging data (for radio network usage).

The 3G-SGSN provides interfaces to the UTRAN, the HLR and the
3G-GGSN. User data transport between the 3G-SGSN and the
UTRAN is IP based. Signaling transport is IP or SS7-based.
Gateway GPRS Support
Node

The 3G-GGSN is the gateway for UMTS packet services to external


packet data networks such as the Internet. It routes packet data from
the core network to the external network on request by the 3G-SGSN.
The 3G-GGSN connects to the 3G-SGSN by an IP-based interface.
Functions of the 3G-GGSN include:

Domain Name Server


Dynamic Host
Configuration Protocol
Server
Firewall

Packet Charging Gateway

3G-Mobile Switching
Center

Gateway services between UMTS and external packet data


networks

User data screening and security

Maintaining charging data (for external data network usage).

The Domain Name Server (DNS) performs IP address translation.


The Dynamic Host Configuration Protocol (DHCP) server manages
the allocation of IP configuration information, by automatically
assigning IP addresses to systems which are configured to use DHCP.
The firewall protects the core network IP backbone from attack by
external packet data networks. One set of DHCP, DNS, and firewall is
required per GGSN.
The Packet Charging Gateway (PCG) transfers charging information
from the SGSN and GGSN to the network operators billing center.
The 3G-Mobile Switching Center (3G-MSC) is the main entity for
providing circuit switched services in the core network. The 3G-MSC

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

2-15

UMTS reference model


Core network entity functions

UMTS architecture

controls mobile originated and mobile terminated circuit switched


calls and provides the corresponding signaling interfaces to other
networks.
Functions of the 3G-MSC include:

Mobility management. Handling attach and authentication


functions, HLR updates, SRNS (Serving RNS) relocation

Call management. Handles call setup messages to and from the


UE

Subscriber administration

Circuit switched data services (such as fax and modem)

Supplementary call services such as call forwarding

Charging.

The 3G-MSC can be implemented by either of the following methods:

Gateway MSC

Visitor Location Register


(VLR)

Enhanced version of the GSM MSC

UMTS-specific MSC solution such as Lucents Softswitch MSC.

The Gateway MSC (GMSC) provides interconnection between the


UMTS core network and external PSTN/ISDN networks.
The Visitor Location Register (VLR) stores service data for all mobile
subscribers currently located in the geographical area controlled by the
VLR.
In the circuit switching domain the VLR is integrated with the
3G-MSC. In the packet switching domain the VLR is integrated with
the 3G-SGSN.

Home Location Register

Authentication Center

Equipment Identity
Register

The Home Location Register (HLR) stores subscriber data. The


UMTS network uses it to determine which services the subscriber
may access and how they are charged.
The Authentication Center (AuC) is closely related to the HLR. It
generates, stores and manages subscriber data. The network uses this
authentication data to verify that users are genuine subscribers, thus
preventing unauthorised access to the network.
The Equipment Identity Register (EIR) stores UE related data and can
be used to identify faulty or stolen equipment.

....................................................................................................................................................................................................................................

2-16

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS reference model

UMTS architecture

GSM
and UMTS interworking
....................................................................................................................................................................................................................................
Core network

Phase 1 UMTS uses the GSM Phase 2+ (GPRS) network


infrastructure as a shared GSM/UMTS core network. The network
infrastructure includes entities such as the 3G-SGSN, 3G-GGSN and
3G-MSC.

Access network

Most UMTS networks are likely to evolve from existing GSM


systems. As a result, they will initially contain two types of access
network (the GSM BSS and the UMTS UTRAN). UMTS supports
handover between GSM BSS and UTRAN cells in both directions
(BSS to UTRAN and UTRAN to BSS).

User equipment

The UMTS UE supports dual GSM/UMTS functionality.

Interworking Functions

Interworking Functions (IWF) are used to connect the UTRAN and


the GSM network by the Iu interface.
IWFs manage the following functions:

Transfer of speech and circuit switched low rate data services


from the RNC to a GSM MSC over the GSM A interface.

Transfer of packet switched data services from the RNC to a


3G-SGSN over the Gb interface.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

2-17

UMTS reference model


GSM and UMTS interworking

UMTS implementation
example existing GSM
operator

UMTS architecture

The following diagram illustrates how an existing GSM operator


might implement UMTS:

....................................................................................................................................................................................................................................

2-18

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS reference model


GSM and UMTS interworking

UMTS implementation
example - greenfield
operator

UMTS architecture

The following diagram illustrates how an operator who does not have
an existing GSM network might implement UMTS:

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

2-19

UMTS architecture

UMTS interfaces
Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this topic, you will be able to name the interfaces in
a UMTS network.
This topic contains the following:
UMTS interfaces

2-21

....................................................................................................................................................................................................................................

2-20

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS interfaces

UMTS architecture

UMTS
interfaces
....................................................................................................................................................................................................................................
Principal interfaces

Other interfaces

The main UMTS interfaces are:


Interface

Description

Uu

Radio interface between the


UTRAN and the UE. The U u
interface is an open standard
interface.

Iu

Interface between the core


network and the UTRAN. Also
known as a reference point.
Equivalent to the A interface in
GSM systems. The RNC is the
UTRAN access point for the I u.
The I u interface is an open
standard interface.

Iub

Interface between an RNC and a


Node B.

Iur

Logical interface between two


RNCs. Although it logically
represents a point to point link
between RNCs, the physical
connection may not be a point to
point link. Provides radio
interface mobility for UEs
connected to the UTRAN,
including handover between
RNSs. The Uu interface is an
open standard interface.

Other UMTS interfaces include:


Interface

Description

Ga

Interface between the 3G-GGSN


and the charging gateway.

Gn

Interface between the 3G-GGSN


and the 3G-SGSN.

Gs

Interface between the


3G-MSC/VLR and the SGSN.

Gr

Interface between the 3G-SGSN


and the HLR.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

2-21

UMTS interfaces
UMTS interfaces

UMTS architecture

Interface

Description

Gf

Interface between the 3G-SGSN


and the EIR.

Gc

Interface between the 3G-GGSN


and the HLR.

....................................................................................................................................................................................................................................

2-22

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS interfaces

Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this chapter, you will be able to:

Name the different transmission methods on the interfaces

Name the different lower layer protocols

State the main characteristics of the UMTS air interface

State the function(s) and protocols used on the different


interfaces.

This chapter contains the following topics:


Transmission methods

3-2

Protocols in the UMTS network

3-18

Uu interface (air interface)

3-36

Iu, Iur, Iub interfaces

3-62

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-1

UMTS interfaces

Transmission methods
Overview
....................................................................................................................................................................................................................................
Objectives

After completing this topic, you will be able to:

Name and describe different techniques of multiple access

State the advantages of spread spectrum transmission techniques

Describe the principles of CDMA

Name and describe the different transmission methods used on


the different UMTS interfaces.

This topic contains the following:


Multiple access techniques

3-3

Principles of CDMA

3-6

CDMA transmission principles

3-10

PCM 30 and PCM 24 carriers

3-12

Ethernet

3-14

....................................................................................................................................................................................................................................

3-2

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Transmission methods

UMTS interfaces

Multiple
access techniques
....................................................................................................................................................................................................................................
Main types

Optimization techniques must be applied, to maximum the use of


limited radio resources. One of the limited resources in radio based
transmission techniques is bandwidth. Therefore methods have been
developed to ensure that a number of users can access the given
bandwidth simultaneously.
In cellular and cordless terminology the three main types of multiple
access used to optimize use of the radio frequency spectrum are:

Frequency Division
Multiple Access (FDMA)

Frequency Division Multiple Access (FDMA)

Time Division Multiple Access (TDMA)

Code Division Multiple Access (CDMA).

In FDMA, each call is carried on a separate frequency channel.


The following figure illustrates the concept:
Power

Call 3
Call 2
Call 1

Time

Frequency

FDMA for GSM900 involves the division of 25 MHz bandwidth into


124 radio frequency carriers. For GSM1800 the 75 MHz bandwidth is
divided into 374 radio frequency carriers.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-3

Transmission methods
Multiple access techniques

Time Division Multiple


Access (TDMA)

UMTS interfaces

A given radio frequency is divided into a set of time slots. Each call,
may it transport data, speech or signaling is assigned to a specific
time slot.
The following figure illustrates the concept:
Power

Time

Call 1

Call 2

Call 3

Frequency

For a given bandwidth and thus a fixed maximum overall data rate,
the number of time slots is limited by the minimum data rate needed
for the individual calls. In the GSM system, each radio frequency
carrier (200 kHz) is further divided into a set of only eight time slots.
In practice TDMA and FDMA are often combined to enhance the
number of calls that can be handled simultaneously.
Code Division Multiple
Access (CDMA)

A spread spectrum technology is used, in which the radio signals


associated with a call are spread across a broad frequency spectrum.
Each call in the spectrum is differentiated from other calls (in the
same spectrum) by assigning a unique code sequence to each calls
signal.

....................................................................................................................................................................................................................................

3-4

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Transmission methods
Multiple access techniques

UMTS interfaces

The following figure illustrates the concept:


Power

Call 10
Call 9
Call 8
Call 7
Call 6
Call 5
Call 4

Time

Call 3
Call 2
Call 1
Frequency

Radio signals in the same frequency but with a different code appear
as noise to the receiving end.
This technique provides a capacity improvement of 2- to 8-fold over
the FDMA and TDMA access methods. CDMA is often combined
with TDMA or FDMA techniques to enhance the number of calls that
can be handled simultaneously.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-5

Transmission methods

UMTS interfaces

Principles
of CDMA
....................................................................................................................................................................................................................................
Why use spreading?

Spreading a (narrowband) signal widens its spectrum while its power


decreases (signal energy remains constant). The effect is reversible by
applying the spreading procedure once again.
On the transmission path the spread signal may be superimposed by a
(narrowband) interferer. Applying the spreading procedure once again
at the receiving end of the transmission path restores power and the
spectrum of the original signal. At the same time the interferer
signals spectrum is widened and its power decreased. Bandpass
filtering can remove most of the spread interferer signal. This
drastically increases the signals resistance against jamming on the
transmission path.
The following figure illustrates the concept:
Power

Power
Interferer
Spread
Frequency

Frequency

De-spread
Power

Frequency

The quotient bandwidth to data bit rate is called the processing


gain.
Spreading principle

A given data signal is spread by mixing it with a periodically repeated


bit sequence. A sequence consisting of n bits must have n times the
bit rate of the data signal itself. That way every bit of the data signal
can be assigned to a complete bit sequence.
The mixing is achieved by exclusively-oring the signal with the
spread sequence signal. This operation is reversible, that means, when
the resulting signal is exclusively-ored with the spread sequence signal

....................................................................................................................................................................................................................................

3-6

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Transmission methods
Principles of CDMA

UMTS interfaces

once again, the original signal is restored.


A

A XOR B

(A XOR B) XOR B

After spreading, each bit of the original data signal is represented by


n bits. Thus the bandwidth of the resulting signal becomes n times the
bandwidth of the original data signal this is why n is called the
Spreading Factor (SF).
Data Signal
1
0

Spread Sequence
Signal

SF=8

1
0

Resulting Signal (XOR)


1
0

In CDMA terminology the bits of the spread sequence are called


chips. Consequently the spread sequence signal has a chip rate of
n times the bit rate of the original data signal. The spread factor is
defined as the quotient chip rate to bit rate and equals the processing
gain.
Why use coding?

To maximise the given bandwidth, the bandwidth is channelized.


Channelization is achieved by spreading and despreading the multiple
signals with individual code sequences. Thus they can be
superimposed in a common frequency band on the transmission path.
On the receiving end the signal with the matching code sequence can

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-7

Transmission methods
Principles of CDMA

UMTS interfaces

be restored reliably while signals with non matching codes sequences


appear as low level noise.

Power

The following figure shows the channelization process:

Code 1

Code 1

Code 2

Code 2

Code 3

Code 3

Code 4

Code 4

Frequency

Coding principle

Preconditions to the usability of code sequences are:

Auto-correlation as high as possible

Cross-correlation between separate codes as low as possible.

The better these conditions are met, the better signal separation by
applying the codes in question is possible. There are several different
algorithms known to produce codes that meet these conditions in
varying degrees. In ideal cases the code sequences are orthogonal,
which means the autocorrelation equals one and the crosscorrelation
equals zero. In this case mixing a spread signal with its own code will
only restore the signal itself without any noise.
In reality ideal orthogonality cannot be achieved. Therefore all signals
spread with different codes will add a certain noise to the wanted
signal in the despreading process.
Adaptive spreading

The spread factor is defined by chip rate/bit rate. So for a given


bandwidth the maximum chip rate is determined and the maximum
possible bit rate of data signals is limited to the maximum chip rate
(spread factor equals one). When the spread factor equals one no
processing gain can be achieved, and no code can be applied to
enable multiple access this is the trivial case.

....................................................................................................................................................................................................................................

3-8

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Transmission methods
Principles of CDMA

UMTS interfaces

On the other hand when the spread factor increases, the processing
gain increases too. Because a higher spread factor provides more
chips per bit longer code sequences are possible. That means more
different codes can be applied and thus more channels can be
established. However, this results in a lower maximum data bit rate
per channel. Additionally an increasing number of simultaneously
transmitted channels increases the noise for a certain channel on the
receiving end.
These facts lead to the idea of adaptive spreading. For different
services, demanding different bit rates, the spread factor is adoptively
adjusted. For example, in a given bandwidth you can provide a few
high bit rate services or a great number of low bit rate services
simultaneously, or any mixture of that. In addition, if the data signal
allows, you may start with high data bit rates (low spread factor) if
the traffic is low and decrease the data bit rate (increase spreadfactor)
when more channels are required or when signal detection becomes
difficult because of increasing interferences in the transmission band.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-9

Transmission methods

UMTS interfaces

CDMA
transmission principles
....................................................................................................................................................................................................................................
Multipath transmission

Normally a radio transmitted signal is distorted on its transmission


path by multiple reflections on different surfaces (this is known as
multipath problem). Thus a signal arrives more than once at the
receiver which can be interpreted as a superposition of several
identical signals with different phases and amplitudes.
The following figure illustrates the concept:

Phase detection

Detection of the data signal requires phase detection anyway because


the data signal is restored only if the correct code is applied exactly
on the same chip position in both the spreading and the despreading
procedure (correlation). This is achieved by shifting the code applied
to the incoming signal until the resulting signal can be regarded as a
valid data signal.
If the incoming signal is distorted by multipath transmission, the
receiver may detect the original data signal on more than one code
phase displacements.

Rake receivers

If a single receiver can detect the data signal on varying code phase
displacements then several receivers can detect the signal at a certain
code phase displacement for each of them simultaneously. If
afterwards the different phase displacements are restored to a common
phase then the different data signals can be added, providing an
increased signal amplitude.

....................................................................................................................................................................................................................................

3-10

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Transmission methods
CDMA transmission principles

UMTS interfaces

This is achieved by employing so called Rake receivers with K


fingers which can correlate and track K multipath components of the
data signal separately.
Cell interference
cancellation

Once one of n data signals assigned to a certain cell is detected at the


Base Station (Node B) its interfering influence to all other n-1 signals
can be calculated and eliminated.
Starting with detecting the strongest signal and removing the
interference it causes for the rest of the signals, the next signal can be
detected more reliably. In an iterating process the signal to
interference ratio is thus lowered for the weaker data signals. This
may lead to an increased number of channels that can be transmitted
simultaneously or to a better quality of service, depending on the
preferences of the network provider.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-11

Transmission methods

UMTS interfaces

PCM
30 and PCM 24 carriers
....................................................................................................................................................................................................................................
Overview

On the interfaces between the Node B, RNC and core network (IU
interfaces) only the physical layer, the traffic data transmission and
signaling data for call handling are defined. Transmission of data for
operation and maintenance purposes (O&M), however, is proprietary.
There are two different physical layers for the data transmission over
the IU interface:

Physical transmission
PCM 30 (E1)

Time slot structure PCM


30 (E1)

PCM 30 (E1)

PCM 24 (T1).

Physical transmission based on the principles of PCM 30 according to


CCITT Recommendation G732 provides a data transmission rate of
2048 kbit/s. With time-division multiplexing, 31 traffic channels can
be transmitted. The traffic channels are transmitted in individual 8 bit
time slots. Thus, the length of a time slot is 3.9 s, and the
transmission rate on each of the traffic channels is 64 kbit/s. These 31
traffic channel time slots and one time slot used for synchronization
purposes are combined into one frame.
The time slot structure for an Iu interface frame (PCM30) is:

Time slot usage

Time slot 0 of a frame is always used for synchronization purposes.


Time slots 1 to 31 can be used either for exchanging signaling
data between a Node B and an RNC or as traffic channels.
Physical transmission
PCM 24 (T1)

The physical transmission on the Iu interface is based on the


principles of PCM 24 transmission according to CCITT
Recommendation G703, G704, G711, G733 and G834, for a data
transmission rate of 1544 kbit/s. With time-division multiplexing,

....................................................................................................................................................................................................................................

3-12

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Transmission methods
PCM 30 and PCM 24 carriers

UMTS interfaces

24 traffic channels can be transmitted. The traffic channels are


transmitted in individual 8 bit time slots. The 24 traffic channel time
slots and one bit used for carrying framing and supervision
information are combined into one frame. Each PCM24 frame
includes 193 bits. The transmission rate on each of the traffic
channels is 64 kbit/s, and the transmission rate on the framing slot is
8 kbit/s. There is no dedicated channel for transfer of signaling.
Time slot structure PCM
24 (T1)

The time slot structure for an Iu interface frame (PCM24) is:

Time slot usage

Time slot 0 (1 Bit) of a frame is used for carrying of framing and


supervision information.
time slots 1 to 24 can be used either for exchanging signaling
data between a Node B and an RNC or as traffic channels.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-13

Transmission methods

UMTS interfaces

Ethernet
....................................................................................................................................................................................................................................
What is Ethernet?

Ethernet is a digital transmission standard for 10 Mbit/s Local Area


Networks (LANs). It has been developed mainly by the Digital
Corporation, the Intel Corporation and the Xerox Corporation. In
IEEE 802.2 and IEEE 802.3 the bus topology, the access protocol and
the standard medium are defined.

Bus topology

Ethernet establishes a packet oriented transmission for a so called


Broadcast LAN. This means every station can send to every station,
and every station can see all packets. An important restriction is the
limitation to only one packet on the wire at a certain time.

Access protocol

Access is granted via the Carrier Sense Multiple Access/Collision


Detect (CSMA/CD) method. Each station monitors permanently the
net and starts sending only if the net is quiet: Listen before talk. If
two or more stations try to send simultaneously a collision occurs that
is detected by a DC voltage check: Listen while talk. In this case all
senders send a jam signal and stop. Each station starts again after a
pseudo-random backoff period.
This access protocol leads to a deterioration of throughput when
traffic increases. In fact transmission can be called quite good if
average traffic does not exceed 30 percent of the total capacity
(average total deteriorate about 3 Mbit/s). Above this traffic load
transmission quality decreases and at about 80 percent of the
maximum load nearly every second data packet is lost and has to be
transmitted again.

MAC packet structure

The structure of the individual packets is described in IEEE 802.3 and


called Medium Access Control (MAC).
Each packet starts with a preamble, an 8 byte long fixed pattern. The
destination address and then the source address follow, each consisting
of 6 bytes. In the next 2 Bytes the Logical Link Control (LLC) type
and the length of the contained data are determined. Next follows the
data in variable length, from 46 up to 1500 bytes. The packet finishes
with a 4 byte long checksum.

....................................................................................................................................................................................................................................

3-14

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Transmission methods
Ethernet

UMTS interfaces

The packet structure is:


1

DestinationAddress

SourceAddress

Preamble

Addresses

46 - 1500

Data

Type- / LengthDefinition

Checksum

An ethernet station address consists of 48 bits and must be worldwide


unique.
The first 24 bits identify the vendor of the network element. The last
two bits are flags and determine whether the preceding 46 bits address
a group of network elements (Bit G set) and/or locally administered
addresses (bit L set).
The address structure is:

Vendor
Identification

2 Bits L
G

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-15

Transmission methods
Ethernet

Logical Link Control types

UMTS interfaces

The Logical Link Control, LLC, (described in IEEE 802.2) determines


the handling method of the link. Three types of LLC are
distinguished:

LLC type 1 structure

Type 1 establishes a connectionless, unconfirmed link of one out


of three possible subtypes:
-

Point-to-point: One Source Service Access Point (SSAC)


sends data to a single Destination Service Access Point
(DSAC)

Multicast: One Source SSAC sends data to a group of


DSACs

Broadcast: One SSAC sends data to all other (D)SACs.

Type 2 establishes a connection-oriented, confirmed, reliable


point-to-point link with flow control. This type is regarded less
efficient than type 1.

Type 3 establishes a connectionless, confirmed point-to-point


link. In practise this type has low relevance.

In LLC type 1 packets the data block of the MAC packet starts with
two Bytes called Destination Selector (DSEL) and Source
Selector (SSEL). The Selectors may identify certain ISO Network
Layers or global all DSAPs. From the Network Layers point of view
a Subnetwork Point of Attachment (SNAP) is identified by the
MAC address and the LLC Selector.
The structure is:

Destination
Selection

Data (44 - 1498)

Source
Selection

....................................................................................................................................................................................................................................

3-16

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Transmission methods
Ethernet

Ethernet variants

UMTS interfaces

Several variants are established which differ in speed, signaling type,


used equipment and the limitations to number and positions of
connected network elements. Generally, they can be identified by the
following naming convention:
<Speed in Mbit/s> <signaling Type> <Maximum Segment Length>
The data of three most common types are:
10 Base 5

10 Base 2

10 Base T

Signaling type

base band

base band

base band

Cable type

50 Ohm
coaxial
thickwire

50 Ohm
coaxial,
RG58

twisted pair
unshielded
category 3, 4
or 5

Max. length of
mixed segments
(containing NEs)

500 m

185 m

100 m

Max. no. of NE per


segment

100

Distance btw. NEs

fixed
positions: NE
every 2.5 m
allowed

min. 0.5 m

N/A

Max. length of link


segments (not
containing NEs)

500 m

500 m

100 m

Max. dist. btw.


repeater and
adjacent segment

50 m

50 m

50

Max. bridgeable
distance

3000 m

1955 m

N/A

30

10 Base T does not support mixed segments with multiple NEs


connected. Multiport repeaters or hubs are used instead. When a 10
Base T segment is used in mixed configurations it counts as a link
segment.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-17

UMTS interfaces

Protocols in the UMTS network


Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this topic, you will be able to:

Name the different levels of the Common Channel Signaling


System (CCS) No.7 protocol

Name the different network elements in a CCS No.7 network

Explain the principles of Asynchronous Transfer Mode

Explain the usage of Asynchronous Transfer Mode in the UMTS


network

Explain the principles of TCP/IP.

This topic contains the following:


Common Channel Signaling No.7

3-19

CSS No. 7 network structure

3-22

Asynchronous Transfer Mode

3-24

ATM in the UMTS network

3-29

TCP/IP

3-31

....................................................................................................................................................................................................................................

3-18

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Protocols in the UMTS network

UMTS interfaces

Common
Channel Signaling No.7
....................................................................................................................................................................................................................................
Signaling information

Signaling information is the information sent between two entities,


that is needed for processing calls, performing data base queries or to
control the network.

Common channel signaling

A signaling system is called a Common Channel Signaling (CCS)


system if the signaling information related to a group of circuits may
be transported over a separate common signaling link. The signaling
information is sent in labeled messages. The label identifies the
related user information.

Signaling specifications

Depending on the country where the network is implemented two


different types of CCS No.7 signaling may be used for the transfer of
messages. Which signaling type is used depends on which protocol
specification is used in the country. The possible specifications are:

ITU-T specification

ANSI specification.

Because both specifications are based on the same principles and have
the same structure, the following topics are valid for both versions.
OSI-Model

Usage of CCS No.7

CCS No.7 functional


blocks

CCS No.7 is a multi-level protocol that has some similarities to the


layered architecture of the Open Systems Interconnection (OSI)
model.
The CCS No.7 messages are used in the network (except the Iub and
the Uu interface) for:

Setting up, maintaining and disconnecting calls between the


RNC-MSC, MSC-MSC and optional between the MSC-PSTN.
This is done by using circuit related signaling messages.

Performing data base queries between the MSC, VLR, HLR,


AUC and the EIR. This is done by using non circuit related
signaling (for example a location update).

The CCS No.7 protocol is a layered protocol and therefore consists of


several functional blocks. Each block of the model will have its own
task and users. The functional blocks of CCS No. 7 are:

Message Transfer Part (MTP)

Telephone User Part (TUP)

ISDN User Part (ISUP)

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-19

Protocols in the UMTS network


Common Channel Signaling No.7

CCS No.7 structure

UMTS interfaces

Signaling Connection Control Part (SCCP)

Transaction Capabilities (TC), also called Transaction Capabilities


Application Part (TCAP).

A fundamental principle of the CCS No.7 structure is that the


functional blocks can be divided into a common function and separate
User Parts (UP). The common function is represented by the MTP
layer. The User Parts are TUP, ISUP, SCCP and TCAP.
Structure of the CCS No.7 protocol:
Users of CSS No.7
OSI layer

TC User
7

4-6

Transactions
Capabilities

Telephone
User Part
(Level 4)

Signaling
Connection
Control Part
(Level 4)

Message Transfer Part


(Levels 1-3)

Message Transfer Part

ISDN User
Part
(Level 4)

The overall function of the Message Transfer Part (MTP) is to serve


as a transport system for the different User Parts. The transport system
provides reliable transfer of signaling messages between locations of
communicating user functions.
The reliable message transfer includes the following functions:

Framing

Error checking

Acknowledgment of received messages

....................................................................................................................................................................................................................................

3-20

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Protocols in the UMTS network


Common Channel Signaling No.7

Telephone User Part

UMTS interfaces

Address the message to the correct hardware entity

Deliver the message to the correct user at the remote side


(software address).

Telephone User Part (TUP) is the User Part that offers the functions
needed in the Public Subscriber Telephony Network (PSTN). In this
network TUP is used for setting up, maintaining and disconnecting
telephone calls made by analogue subscribers.
Nowadays most operators are using ISDN User Part (ISUP) instead of
Telephone User Part, because it offers more services that can be used
in a modern telecommunication network.

ISDN User Part

ISDN User Part (ISUP) is the User Part that offers the functions
needed in the Integrated Services Digital Network (ISDN). In this
network ISUP is used for setting up, maintaining and disconnecting
telephone calls made by digital subscribers. ISUP can be seen as an
expansion of the TUP protocol, because it offers a large set of extra
services to the calling and called subscriber. Examples of services are
Calling Line Identification Presentation (CLIP) and Connected Line
Identification Presentation (COLP).
Because the PLMN also connects digital subscribers and can also be
compared to the ISDN network, within the PLMN also the ISUP
protocol is used for call control purposes.

Signaling Connection
Control Part

When the administration requires sophisticated services, the use of


intermediate components like Signaling Connection Control Part
(SCCP) may be necessary. These intermediate services are for
example needed in the Intelligent Network or the UMTS network. For
some of these services even the CCS No. 7 block Transaction
Capabilities Application Part (TCAP) is required in addition to SCCP.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-21

Protocols in the UMTS network

UMTS interfaces

CSS
No. 7 network structure
....................................................................................................................................................................................................................................
CSS No. 7 network
structure

CSS No. 7 network structure:

SEP

HLR

STP

SEP

SEP

GMSC

MSC
= Signaling Links
= Voice Circuits

CSS No. 7 network


elements

Point code

Originating Point Code and


Destination Point Code

The CCS No.7 network consists of different network elements:


Part

Function

Signaling Transfer
Point (STP)

The STP acts as a transfer point (tandem) for


the signaling messages. Voice/data trunks
normally will not be connected to this office.

Signaling End Point


(SEP)

The SEP acts as a signaling end point for


signaling messages. In a UMTS network the
MSC and Gateway MSC (GMSC) are
defined as SEPs.

Every entity in the CCS No.7 network will be allocated its own
unique identity known as the Point Code (PC). The point code is
actually the address for the transfer of the signaling information to
that specific point in a network. No two points in the network can
have the same address.
Each signaling message contains always the originator of the message
as well as the destination of the message. Inside the message the
originator is referred to by the Originating Point Code (OPC). The
destination of the message is referred to by the Destination Point
Code (DPC).

....................................................................................................................................................................................................................................

3-22

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Protocols in the UMTS network


CSS No. 7 network structure

Point code example

UMTS interfaces

Usage of the OPC and DPC for routing signaling messages through a
CCS No. 7 network:
Message

Message

PC=300
OPC = 200

OPC = 200
STP
DPC = 400

DPC = 400

SEP

SEP

PC=200

PC=400

= Signaling Links
= Voice Circuits

ITU-T point codes

Point codes have a 14 bit structure in a CCS No. 7 network based on


the ITU-T standard.

ANSI point codes

Point codes have a 24 bit structure in a CCS No. 7 network based on


the ANSI standard.

Signaling data link

Point codes in a CCS No.7 network are connected (level 1) with each
other via a Signaling Data Link (SDL). Normally this is a 64 kbit/s
time slot of a PCM carrier.
According to the ITU-T a maximum of 16 SDLs are allowed between
two point codes.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-23

Protocols in the UMTS network

UMTS interfaces

Asynchronous
Transfer Mode
....................................................................................................................................................................................................................................
Overview

Principle of ATM

In the Asynchronous Transfer Mode (ATM) the user data and


signaling data are transmitted in packets with a fixed size. The packets
are called ATM cells. They do not have a specific position in a time
slot pattern. The packets are generated and transmitted asynchronously
by the terminal devices.
The connection lines transmit the data in 53-byte packets with a
transmission rate of 155 Mbit/s.
The ATM cells are marked with identifiers to assign the ATM cells to
a certain connection.
One 155 Mbit/s connection line can transmit 300225 cells
simultaneously. This number of cells can be assigned to different users
according their respective needs. User data with different cell rates or
changing cell rates can be transmitted efficiently over a 155 Mbit/s
connection line.
The ATM network transmits the cells with the high bit rate
independent of the type of service. The terminal devices adapt the
different types of services to the ATM network.
Established connections do not have specific cell rates. The used cell
rate is scalable. During a connection, a user can change the number of
cells used in a way that only the required number of cells is used.

ATM services

The Asynchronous Transfer Mode offers the following services:

Point-to-point multimedia transmission between two end-users

High data rate broadcast connections

Multimedia conferences

Internet services

Virtual Backbone Network and Virtual Switched Network

Services in a service-independent access network.

....................................................................................................................................................................................................................................

3-24

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Protocols in the UMTS network


Asynchronous Transfer Mode

Structure of an ATM cell

UMTS interfaces

An ATM cell consists of 53 bytes. Five bytes are occupied for control
information and 48 bytes are occupied for user information.
Structure of an ATM cell:

Control information

Generic Flow Control


Virtual Path Identifier
(GFC)
(VPI)
Virtual Path Identifier
Virtual Channel Identifier
(VPI)
(VCI)
Virtual Channel Identifier
(VCI)
Virtual Channel Identifier
Payload Type
CLP
(VCI)
(PT)
Header Error Control
(HEC)

5 Bytes

User information

48 Bytes

The control information consists of the following parts:


Part

Function

Generic Flow
Control

Controls the traffic at the receive side.

Virtual Path
Identifier and Virtual
Channel Identifier

Marks a virtual connection on a connecting


line.

Only used between a terminal device and a


network node.

All ATM cells of the same connection have


identical VPI and VCI values.There are
certain values for the following applications:

Idle cells

Unassigned cells

Point-to-point connections

Broadcast connections

Operation, Administration and


Maintenance information

Resource management cells.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-25

Protocols in the UMTS network


Asynchronous Transfer Mode

UMTS interfaces

Part

Function

Payload Type

Defines the type of an ATM cell:

Cell Loss Priority

Cell contains user information

Cell contains Operation, Administration


and Maintenance information

Cell contains resource management


information.

Marks the priority of an ATM cell.


Cells with the value CLP=1 will be rejected
in case of an overload.

Header Error Control

ATM connection setup

Contains check bits for the other parts of the


control information.

Before two terminal devices communicate to each other a signaling


connection is established. Using this connection, it is checked whether
the required cell rate is available and whether the quality of service is
in the allowed range. A virtual connection is set up, which checks the
conditions at the terminal devices and at the ATM switching devices.
Only if all conditions are met, a connection between two terminal
devices will be established.
Setup of an ATM connection:

User "A"

ATM cell
ATM line
155 Mbit/s

VPI=20, VCI=20

Network node
"A"

ATM line
155 Mbit/s

ATM cell
VPI=30, VCI=30

User "B"

ATM cell
ATM line
155 Mbit/s

VPI=40, VCI=40

Network node
"B"

....................................................................................................................................................................................................................................

3-26

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Protocols in the UMTS network


Asynchronous Transfer Mode

UMTS interfaces

The ATM connection is set up in the following way:


1.

User A requests a connection to user B with the following


requirements:

Destination

Type of service

Quality requirements.
This request is sent to the network node A.

Synchronous Transport
Module

ATM Adaptation Layer

2.

The network node A selects a connection line to the next


network node B. This line is defined by the assignment of the
VPI and VCI values for the incoming cells to certain values for
the outgoing cells. Additionally, a specific cell capacity is
reserved.

3.

The following cells containing user data are marked with the VPI
and VCI values for the outgoing cells.

4.

Network node B detects that the destination is assigned to its


own network node. A signaling connection to user B is
established. It is checked whether the terminal device can
communicate with the device of user A.

5.

Network node B assigns new VPI and VCI values to the


incoming cells.

6.

A communication path between user A and user B is


established that transmits cells containing user data.

The data on a 155 Mbit/s connection are combined in a Synchronous


Transport Module (STM-1). An STM-1 contains the user information
and the overhead with control information.
The ATM Adaptation Layers (AAL) adapt the different types of
services to the ATM network. The AALs adapt the characteristics of
each type of service to the characteristics of the ATM network.
The following ATM Adaptation Layers exist:
AAL Type

Characteristics

Application

AAL 1

Has:

Used for:

Maximum propagation
delay time

Transmission of voice
data

Constant bit rate

Line oriented.

Transmission of data
with N*64 kbit/s

Circuit-switched
applications.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-27

Protocols in the UMTS network


Asynchronous Transfer Mode

UMTS interfaces

AAL Type

Characteristics

Application

AAL 2

Has:

Used for:

Variable bit rate

Line oriented.

Transmission of voice
data

Transmission of data
with N*64 kbit/s

Circuit-switched
applications.

AAL 3

Have:

Used for:

AAL 5

Time independent

Variable bit rate

Connection oriented.

AAL 4

Data transmission.

Has:

Used for:

Time independent

Data transmission

Variable bit rate

Connectionless.

Connection between
LANs and ATM
networks.

....................................................................................................................................................................................................................................

3-28

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Protocols in the UMTS network

UMTS interfaces

ATM
in the UMTS network
....................................................................................................................................................................................................................................
Overview

UMTS network with ATM


components

In the UMTS network, the ATM protocol is used to transport the user
and signaling information between the different network elements.
ATM provides the required quality of service for both the packet data
and the circuit-switched data.
UMTS network with ATM components:
Packet data
network

PSTN/ISDN

MSC/VLR

GGSN

Iu(ps)

Iu(cs)
IP ATM
switch

Iu

Iu

Iu

RNC

RNC
Iur

Iub

Iub

ATM
concentrator
Iub

Iub

Node B

Usage of the ATM protocol

Node B

GSM
BTS

The ATM protocol is used at the following interfaces:


Interface AAL

Services

Iu(cs)

AAL 1

Used for:

AAL 2

Narrowband speech

AAL 5

Digital information services (for example


ISDN)

Low bit rate circuit-switched services (for


example modem services from/to
PSTN/ISDN)

Non-real time packet data.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-29

Protocols in the UMTS network


ATM in the UMTS network

UMTS interfaces

Interface AAL

Services

Iu(ps)

Used for:

AAL 5

Iu

Iur

Iub

ATM concentrator

High bit rate packet-switched services.

AAL 2

Used for:

AAL 5

Narrowband speech

Digital information services (for example


ISDN)

Low bit rate circuit-switched services (for


example modem services from/to
PSTN/ISDN)

High bit rate packet-switched services

Non-real time packet data.

AAL 2

Used for:

AAL 5

Control information for the radio resources


and transport network

User voice and packet data information


.

AAL 2

Used for:

AAL 5

Control information for the Node Bs, radio


resources, and transport network

Signaling messages

User voice and packet data information.

Using the ATM concentrator, it is possible to transport GSM and other


user data over the same link as the UMTS data.

....................................................................................................................................................................................................................................

3-30

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Protocols in the UMTS network

UMTS interfaces

TCP/IP
....................................................................................................................................................................................................................................
Overview

TCP/IP is a layered set of protocols.


The Transmission Control Protocol (TCP) transmits data from one
terminal device to another. It keeps track of what is sent, and
retransmits anything that was not transmitted. If any message is too
large to be transmitted as a whole, TCP will split it up into several
datagrams, and make sure that they all arrive correctly.
The Internet Protocol (IP) finds a route for the data from one terminal
device to another.

Principles of TCP/IP

TCP/IP is built on connectionless technology. Information is


transferred as a sequence of datagrams. A datagram is a collection of
data that is sent as a single message. Each datagram is sent through
the network individually.
At some level, information to be transmitted is broken up into
datagrams. These datagrams are treated by the network as completely
separate. In some networks the length of the datagrams is limited. So
the protocols will break these datagrams up into smaller datagrams.
Each of these datagrams will be sent to the other end. At that point,
they will be put back together into the datagram with the original
length.
While those datagrams are in transit, the network does not know that
there is any connection between them. It is possible that a datagram
with a higher number will arrive before a datagram with a lower
number. If an error occurs in the network and a datagram is not
transmitted, the datagram must be sent again.

TCP/IP services

The list of services offered by TCP/IPincludes:


Service

Description

File transfer

The file transfer protocol (FTP) allows a user


on any computer to get files from another
computer, or to send files to another computer.

Remote login

The network terminal protocol allows a user to


log in on any other computer on the network.
All data which are entered are sent directly to
the other system.

Computer mail

This allows a user to send messages to users


on other computers.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-31

Protocols in the UMTS network


TCP/IP

Internet address

UMTS interfaces

Service

Description

Network file
systems

This allows a system to access files on another


system. A network file system provides the
illusion that disks or other devices from one
system are directly connected to other systems.

Remote execution

This allows to run a particular program on a


different computer.

Name servers

In large networks, there are a number of


different collections of names that have to be
managed. This includes users and their
passwords, names and network addresses for
computers, and accounts. Databases for these
names are kept on a small number of systems.
Other systems access the data over the
network.

The internet address is used to address datagrams in a network. The


address consists of 32 bits.
Example for an internet address: 128.6.4.7
An internet address consists of 3 parts:

TCP/IP layers

Network number (8, 16 or 24 bits)

Subnetwork number (0 - 22 bits)

Host number (2 - 24 bits).

TCP/IP applications use the following layers:

Ethernet as a protocol to manage a specific physical medium

Internet Protocol which provides the basic service of transmitting


datagrams to their destination

Transmission Control Protocol

Application protocol.

....................................................................................................................................................................................................................................

3-32

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Protocols in the UMTS network


TCP/IP

UMTS interfaces

The layers of a TCP/IP application are:


Application Protocol
(DNS, FTP, HTTP ...)
Transmission Control Protocol
(TCP, UDP)
Internet Protocol
(IP, ICMP)
Network Interface Protocol
(Ethernet, Frame Relay, ATM ...)

Application layer

The application protocols run on top of TCP/IP. If data has to be


transmitted by a certain application, the application gives the data to
the TCP. TCP makes sure they are delivered to the other end. Since
TCP and IP take care of all the networking details, the applications
protocols can treat a network connection as if it was a simple byte
stream.
At the source terminal device, the application layer converts the input
data in such a format that it can be transmitted by the TCP/IP layers.
At the destination, the transmitted data are re-converted from the
TCP/IP format into the application format.

Transmission Control
Protocol layer

The TCP layer is responsible for the following tasks:

Breaking up the information into datagrams

Reassembling the datagrams at the other end

Re-sending anything that gets lost

Putting datagrams back in the right order.

TCP has to know how large a datagram the network can handle.
Actually, the TCPs at each end communicate how big a datagram they
can handle, and use the smallest size.
TCP defines the route on which the datagrams are sent through
several networks, keeps track of the routes to all of the destinations
and handles incompatibilities among different transport media.
The TCP layer hands over a datagram with a destination to the IP
layer. IP does not know how this datagram relates to any datagram
before it or after it.
After the TCP has broken the data into datagrams it puts a header at
the front of each datagram.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-33

Protocols in the UMTS network


TCP/IP

UMTS interfaces

The header includes the following information:

Internet Protocol layer

Source Port and Destination Port numbers

Sequence Number
This is used to assemble the datagrams in the right order at the
other end, and to check if all datagrams have been transmitted.

Acknowledgment Number
To make sure the datagram has arrived at its destination, the
recipient has to send back an acknowledgment.
If the sender does not get an acknowledgment within a
reasonable amount of time, the data will be sent again. The
Acknowledgment Number is used to control how much data can
be transmitted.

The TCP layer sends datagram to the IP layer. TCP has to tell IP the
Internet address of the terminal device at the other end. IP routes the
datagram and sends it to the other end. To allow gateways or other
intermediate systems to forward the datagram, IP adds its own header.
The header includes the following information:

Data routing

Source Address and Destination Address


Internet addresses of the source and destination

Protocol number
The protocol number is used by the IP at the other terminal
device to send the datagram to the TCP.

Checksum
The checksum allows the IP at the other end to verify that the
header was not damaged during transmission.

Time to Live
The Time to Live is a number that is decremented whenever the
datagram passes through a system. When it goes to zero, the
datagram is discarded. This is done in case a loop develops in the
system.

IP assumes that a system is attached to a local network. This system


can send datagrams to any other system within its own network.
If the system wants to send a datagram to a system of a different
network, gateways are necessary. The gateway connects a network
with one or more other networks. Gateways have more than one
network interface. The software on that gateway forwards datagrams
from one network to the other.
Routing in IP is based entirely upon the network number of the
destination address. Each gateway has a table of network numbers.
For each network number, a gateway is listed. This is the gateway

....................................................................................................................................................................................................................................

3-34

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Protocols in the UMTS network


TCP/IP

UMTS interfaces

gives access to that network. The gateway does not have to be


connected directly to the network.
When a terminal device sends a datagram, it first checks to see if the
destination address is on the systems own local network. If so, the
datagram can be sent directly. Otherwise, the system expects to find
an entry for the network that the destination address is on. The
datagram is sent to the gateway listed in that entry.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-35

UMTS interfaces

U u interface (air interface)


Overview
....................................................................................................................................................................................................................................
Objectives

Introduction

Contents

After completing this topic, you will be able to:

Specify the difference between physical channels and transport


channels

Identify the different channels defined on the air interface (Uu


interface)

Define the coding principles

Define the overall protocol structure of the air interface.

The Uu interface or air interface is one of the most important


interfaces. This interface is thoroughly specified to achieve a full
compatibility between mobile stations of various manufacturers and
networks of different operators.
This topic contains the following:
UMTS frequency spectrum

3-37

Definitions of channel types

3-39

Physical channel types

3-40

Transport channel types

3-43

Mapping of transport channels to physical channels

3-45

Physical channel frame structure

3-48

Spreading codes

3-51

Channel coding, multiplexing, and rate matching

3-55

Uplink spreading and modulation

3-56

Downlink spreading and modulation

3-58

Protocols on the U u interface

3-60

....................................................................................................................................................................................................................................

3-36

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Uu interface (air interface)

UMTS interfaces

UMTS
frequency spectrum
....................................................................................................................................................................................................................................

Down-link

2200 MHz

Up-link

2100 MHz

Frequency bands for UMTS/IMT-2000 designated by WARC1992:

1900 MHz

Recommended frequency
allocation

In 1992 the World Administrative Radio Conference (WARC)


designated the frequency bands for UMTS/IMT-2000.

2000 MHz

Recommendation

Unpaired Band: 20 + 15 MHz (1885-1920 MHz and 2010-2025 MHz) for TDD
Paired Band:

2 x 60 MHz (1920-1980 MHz and 2110-2170 MHz) for FDD

Satellite Band: 2 x 30 MHz (1980-2010 MHz and 2170-2200 MHz)

Reality

Neighboring and rival


frequency allocations

In many areas part of the recommended IMT-2000 band is already


used by other Public Land Mobile Networks (PLMN).
Neighboring and rival frequency allocations in some regions:

Land
TDD
18851920

UMTS (WARC 92)

EU

GSM 1800
Uplink

GSM 1800
Downlink

1710-1785

1805-1880

Land Satellite
FDD
FDD Land
Uplink Uplink TDD
1920-1980

19802010

Land
FDD
Uplink

20102025

2110-2170

Satellite
FDD
Downlink
21702200

DECT
TDD

EU

1880-1900

PHS
TDD

Asia, Australia, NZ

1893.5-1919.6

PCS 1900
Uplink

America

1700

Europe

1750

1850-1910

1800

1850

1900

PCS 1900
Satellite
Downlink FDD Uplink
1930-1990

1950

Reserved

19902025

2000

2110-2165

2050

2100

2150

Satellite
FDD Downlink
21652200

2200 MHz

In CEPT countries the WARC-1992 spectrum is designated for UMTS


except the band from 1885 MHz to 1900 MHz which is already
allocated for DECT (Digital Enhanced Cordless Telephone). In the
UK, licenses for bands of 2 * 10 MHz and 2 * 15 MHz were

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-37

Uu interface (air interface)


UMTS frequency spectrum

UMTS interfaces

auctioned in April 2000. In Europe licences are being awarded or


auctioned during 2000.
African and Arabian states

North America

At the time of writing, African and Arabian states were following the
discussions in other countries and actively participating in conferences
dealing with spectrum.
In North America the frequency band from 1850 MHz to 1990 MHz
is already used by the Personal Communication System (PCS). This
frequency band is also used for GSM 1900.
The PCS frequency band is split into licences of 2 * 5 MHz (one for
uplink and one for downlink) and 2 * 15 MHz. This split into
5 MHz blocks had to be regarded during development of the UMTS
standards: The bandwidth for an UMTS carrier is 5 MHz, including
the necessary guard bands.
Most of the upper part of the UMTS/IMT-2000 spectrum is not yet
allocated and can therefore possibly be used for UMTS.

South America

Asia and Pacific

Example for one UMTS


operator

The South American spectrum situation is presently fragmented. The


future plans for UMTS/IMT-2000 are not yet known.
Asian and Pacific countries are likely to follow the WARC-1992
spectrum allocations. In some countries parts of the spectrum are
already in use by other services. For example in Japan where the band
from 1893.5 MHz to 1919.6 MHz is allocated for the Personal Handy
System (PHS).
Example of a frequency allocation in the uplink band for one UMTS
operator:
GSM Operator

UMTS Operator 1
Micro Layer

3 MHz

4.4 MHz

UMTS Operator 2

Macro Layer

5 MHz

5 MHz

2.7 + 4.4 + 5.0 + 2.5 = 14.6 MHz

Note: The minimum gaps to the neighboring GSM 1800 operator


(3 MHz) and to the neighboring UMTS operator (5 MHz) are fixed.

....................................................................................................................................................................................................................................

3-38

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Uu interface (air interface)

UMTS interfaces

Definitions
of channel types
....................................................................................................................................................................................................................................
Overview

On the air interface there are three types of channels:


1.

Physical channel

2.

Transport channel

3.

Logical channel.

This topic lists the definitions of these channel types as defined in


3G TR 25.990 version 3.0.0.
Physical channel (FDD)

In Frequency Division Duplex (FDD) mode, a physical channel is


defined by code, frequency, and in the uplink, relative phase.

Physical channel (TDD)

In Time Division Duplex (TDD) mode, a physical channel is defined


by code, frequency, and time slot.

Transport channel

Logical channel

The channels offered by the physical layer to layer 2 for data


transport between peer Layer 1 entities are denoted as transport
channels. Different types of transport channels are defined by how
and with which characteristics data is transferred on the physical
layer, for example whether using dedicated or common physical
channels.
A logical channel is an information stream dedicated to the transfer of
a specific type of information over the radio interface. Logical
channels are provided on top of the Medium Access Control (MAC)
layer.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-39

Uu interface (air interface)

UMTS interfaces

Physical
channel types
....................................................................................................................................................................................................................................
Downlink physical
channels

Functions of downlink
physical channels

Arrangement of downlink physical channels:

Explanation of downlink physical channels:


Channel

Full name and Function

SCH

Synchronization Channel.
This is used by the mobile to synchronize to a
base station, and comprises of a primary and a
secondary channel, which are transmitted
simultaneously.

....................................................................................................................................................................................................................................

3-40

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Uu interface (air interface)


Physical channel types

UMTS interfaces

Channel

Full name and Function

CPICH

Common Pilot Channel.


This is a fixed rate (30 kbit/s, SF = 256)
downlink physical channel that carries a
pre-defined bit/symbol sequence. The CPICH is
used as a phase reference for the other downlink
physical channels.
A Primary Common Pilot Channel must always be
present.
One or several Secondary Common Pilot Channels
may be present. They may be the reference for the
Secondary CCPCH and the downlink DPCH. If this
is the case, then the UE is informed about this by
higher layer signaling.

CCPCH

Common Control Physical Channel.


This is the carrier for either the Broadcast Control
Channel (BCCH), the Paging Channel (PCH), or
the Forward Access Channel (FACH).
If the CCPCH carries the BCCH, then it is the
Primary CCPCH, if it carries either the PCH or
FACH, it is called the secondary CCPCH.

DPCH

Dedicated Physical Channel.


This carries the downlink Dedicated Channel
(DCH) transport channel, together with Layer 1
data comprising the Channel Associated Pilot,
Transmit Power Control (TPC) bits, and Transport
Format Combination Indicator (TFCI) bits.
Thus the DPCH can be considered to be formed
from the Dedicated Physical Data Channel
(DPDCH) carrying the Dedicated Channel (DCH),
and the Dedicated Physical Control Channel
(DPCCH) carrying the Layer 1 data, and time
multiplexed together.

PDSCH

Physical Downlink Shared Channel.


This downlink channel is shared by several users
based on code multiplexing.
Additional downlink physical channels for special
purposes are defined in 3G TS 25.211.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-41

Uu interface (air interface)


Physical channel types

Uplink physical channels

Functions of uplink
physical channels

UMTS interfaces

Arrangement of uplink physical channels:

Functions of uplink physical channels:


Channel

Full name and function

PRACH

Physical Random Access Channel.


This carries the Random Access Channel (RACH).

DPCH

Dedicated Physical Channel.


This carries the uplink Dedicated Channel (DCH)
transport channel, together with Layer 1 data
comprising the Channel Associated Pilot, Transmit
Power Control (TPC) bits, and Transport Format
Combination Indicator (TFCI) bits.
Thus the DPCH can be considered to be formed
from the Dedicated Physical Data Channel
(DPDCH) carrying the Dedicated Channel (DCH),
and the Dedicated Physical Control Channel
(DPCCH) carrying the Layer 1 data for link
maintenance, which are fed separately to the I port
and the Q port of the mobiles modulator.

PCPCH

Physical Common Packet Channel.


This channel carries the Common Packet Channel
(CPCH).

....................................................................................................................................................................................................................................

3-42

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Uu interface (air interface)

UMTS interfaces

Transport
channel types
....................................................................................................................................................................................................................................
Transport channel types

Overview of transport channels:


Broadcast Channel (BCH)
Paging Channel (PCH)
Common Transport
Channels

Forward Access Channel (FACH)


Random Access Channel (RACH)

Channels

Common Packet Channel (CPCH)

Dedicated Transport
Channels

Functions of transport
channels

Dedicated Channel (DCH)

Explanation of the transport channels:


Channel

Full name and function

BCH

Broadcast Channel.
Downlink only.
The BCH broadcasts system and cell-specific
information. The BCH is always transmitted from
the Node B over the entire cell with a low fixed
bit rate.

PCH

Paging Channel.
Downlink only.
The PCH pages a User Equipment (UE) when the
system only knows the Location Area, but not the
specific cell location of this UE. The PCH is
always transmitted from the Node B over the
entire cell.

FACH

Forward Access Channel.


Downlink only.
The FACH carries control information to a User
Equipment (UE) when the system knows the
location cell of the UE. It may also carry very
short packets of user data. The FACH is always
transmitted from the Node B over the entire cell.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-43

Uu interface (air interface)


Transport channel types

UMTS interfaces

Channel

Full name and function

DSCH

Downlink Shared Channel.


Downlink only.
The DSCH is a downlink transport channel which
is shared by several UEs. It is used to carry
low-to-intermediate volume traffic data or
dedicated control data.

RACH

Random Access Channel.


Uplink only.
The RACH carries control information from a User
Equipment (UE) to a Node B. It may also carry
very short packets of user data.

CPCH

Common Packet Channel.


Uplink only.
The CPCH carries small and medium sized
packets. It is a contention based random access
channel used for transmission of bursty data
traffic. CPCH is associated with a dedicated
channel on the downlink which provides power
control for the uplink CPCH.

DCH

Dedicated Channel.
The Dedicated Channel (DCH) is a downlink or
uplink transport channel. It carries different types
of data, or comtrol information.

....................................................................................................................................................................................................................................

3-44

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Uu interface (air interface)

UMTS interfaces

Mapping
of transport channels to physical channels
....................................................................................................................................................................................................................................
Overview

Downlink channel mapping

Explanation of downlink
channel mapping

The transport channels are mapped to the physical channels that are
transmitted over the air interface. Different transport and physical
channels are used in the uplink and downlink directions. According to
the type and data rate of the transport channel, coding and
multiplexing/demultiplexing may be applied prior to the data being
carried by the physical channel.
Mapping of transport channels to physical channels in the downlink
direction:

The three common control channels, BCH, PCH, and FACH, each
have individual coding schemes and physical channel mappings:

The BCH is always mapped to a unique Primary Common


Control Physical Channel (Primary CCPCH)

The PCH and the FACH are multiplexed onto the Secondary
Common Control Physical Channel (Secondary CCPCH).

The DCH channels (DCCH and DTCH) are coded and multiplexed to
form a Coded Composite Transport Channel (CCTrCH). This CCTrCH

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-45

Uu interface (air interface)


Mapping of transport channels to physical
channels

UMTS interfaces

is then mapped onto one physical channel or demultiplexed onto


several physical channels, according to its data rate. The Dedicated
Physical Channel (DPCH) that is used for the CCTrCH only carries
data from the DCH transport channel, and this DCH data is not
multiplexed with data from other transport channels.
If a mobile is in soft handover, the same data may be received by the
mobile from multiple base stations, each using different physical
channels.
Transmit Power Control (TPC) bits and Transport Format
Combination Indicator (TFCI) bits are added (as Layer 1 information)
to the DCH before it is transmitted over the physical channel. During
soft handover, the TPC bits received from the neighbour base stations
will be different from those received from the serving base station.
The TFCI bits are identical.
Uplink channel mapping

Explanation of uplink
channel mapping

Mapping of transport channels to physical channels in the uplink


direction:

The Random Access Channel (RACH) is the only uplink common


control channel. It uses unique coding, and is mapped to a Physical
Random Access Channel (PRACH) that is only used for the RACH
transport channel.
The DCH channels (DCCH and DTCH) are coded and multiplexed to
form a Coded Composite Transport Channel (CCTrCH). This CCTrCH
is then mapped onto one physical channel or demultiplexed onto
several physical channels, according to its data rate. The Dedicated
Physical Channel (DPCH) that is used for the CCTrCH only carries
data from the DCH transport channel, and this DCH data is not
multiplexed with data from other transport channels.

....................................................................................................................................................................................................................................

3-46

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Uu interface (air interface)


Mapping of transport channels to physical
channels

UMTS interfaces

If a mobile is in soft handover, the same data may be received by the


mobile from multiple base stations, each using different physical
channels.
Transmit Power Control (TPC) bits and Transport Format
Combination Indicator (TFCI) bits are added (as Layer 1 information)
to the DCH before it is transmitted over the physical channel.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-47

Uu interface (air interface)

UMTS interfaces

Physical
channel frame structure
....................................................................................................................................................................................................................................
Overview

A frame and time slot structure is used for all information transmitted
on both the uplink and the downlink physical channels.
Time multiplexing is used for:

Interleaving

Transmission of multiple services (voice, email, web access. and


so on) and control data on a Dedicated Physical Channel
(DPCH). In most cases, one (DPCH) is used. For very high data
rates of the composite data stream, multicode transmission on
several (DPCH) is possible.

Important! Time multiplexing is not used to separate different users


like the time slot structure in GSM.
Frame structure

Frame structure of a physical channel:


One Super Frame
(720 ms)

One Radio Frame


(10 ms)

Frame 0

Slot 0

Frame 1

Slot 1

One Slot

Frame 71

Slot i

Slot 14

Data

(0.666 ms)

Description of the frame


structure

Frame i

Description of the frame structure:


Structure
element

Description

Superframe

A superframe has a duration of 720 ms and


consists of 72 radio frames.

Radio frame

A radio frame is a processing unit which has a


duration of 10 ms and consists of 15 time slots.

....................................................................................................................................................................................................................................

3-48

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Uu interface (air interface)


Physical channel frame structure

Structure of a time slot

UMTS interfaces

Structure
element

Description

Time slot

A time slot is a unit which consists of a set of


information symbols.
The number of symbols depends on the spreading
factor:

Number of chips per time slot = 2560 (fixed)

Number of symbols per time slot = 2560 /


(spreading factor)
Upper limit: 2560/4 = 640 symbols per time
slot for spreading factor 4
Lower limit: 2560/256 = 10 symbols per time
slot for spreading factor 256

In the downlink one symbol represents two


data bits because Quaternary Phase Shift
Keying (QPSK) is used.

Structure of a time slot for the Dedicated Physical Channel (DPCH):

Uplink DPDCH / DPCCH


Data
Nx data bits

DPDCH
(variable rate)

DPCCH
(fixed rate)

Pilot
Npilot bits

TFCI
NTFCI bits

FBI
NFBI bits

TPC
NTPC bits

TSlot = 2560 chips, 10 * 2 bits (k = 0 6)

Downlink DPCH
DPDCH
DPCH
(fixed rate)

Data1
N1 data bits

DPCCH
TPC
NTPC bits

TFCI
NTFCI bits

DPDCH

DPCCH

Data2
N2 data bits

Pilot
Npilot bits

TSlot = 2560 chips, 10 * 2 bits (k = 0 7)

Uplink DPCH

In the uplink, the Dedicated Physical Data Channel (DPDCH) and the
Dedicated Physical Control Channel (DPCCH) are I/Q multiplexed.
The uplink Dedicated Physical Channel DPCH is transmitted
continuously.
The DPDCH is modulated on the I branch. The spreading factor and
thus the user data rate may vary from frame to frame to match the
data rate requirements of the different services.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-49

Uu interface (air interface)


Physical channel frame structure

UMTS interfaces

The DPCCH is modulated on the Q branch. The spreading factor and


thus the data rate are fixed.
Downlink DPCH

DPCH control fields

In the downlink, the Dedicated Physical Data Channel (DPDCH) and


the Dedicated Physical Control Channel (DPCCH) are time
multiplexed. Discontinuous Transmission (DTX) can be used for the
downlink DPCH. The spreading factor and thus the data rate are
fixed.
Description of the Dedicated Physical Control Channel (DPCCH)
control fields:
Control field

Description

Pilot

A predetermined bit pattern used by the rake


receiver to estimate channel conditions.
This bit pattern is also used for coherent
demodulation of the remaining DCH data.

TFCI

The Transport Format Combination Indicator


(TFCI) is optional. It is only used when formats
(multiplexing or spreading factor) vary from frame
to frame.

TPC

The Transmit Power Control (TPC) bits indicate an


increase or decrease of transmit power.

FBI

The Feedback Indicator (FBI) bits are used for


transmit diversity working.

....................................................................................................................................................................................................................................

3-50

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Uu interface (air interface)

UMTS interfaces

Spreading
codes
....................................................................................................................................................................................................................................
Spreading code layers

Channelization codes

Channelization Code Layer and Scrambling Code Layer:

The channelization codes ensure the separation between different


physical channels. For this purpose Orthogonal Variable Spreading
Factor (OVSF) codes are used. These OVSF codes ensure that a
number of mobiles can share the same RF channel (frequency)
without causing unacceptable interference.
OVSF codes are arranged as a tree:
C4, 1 = (1,1,1,1)
C2, 1 = (1,1)
C4, 2 = (1,1,-1,-1)
C1, 1 = (1)
C4, 3 = (1,-1,1,-1)
C2, 2 = (1,-1)
C4, 3 = (1,-1,-1,1)

SF = 1

SF = 2

SF = 4

SF = 8

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-51

Uu interface (air interface)


Spreading codes

UMTS interfaces

The code tree defines the code length that provides the specified
spreading factor. The higher user data rate services use shorter codes,
and hence lower spreading factors (and associated despreading gain).
Uplink usage of
channelization codes

For each call, the mobile is allocated at least one uplink


channelization code, for the uplink Dedicated Physical Control
Channel (DPCCH). Usually, at least one further uplink channelization
code is allocated for an uplink Dedicated Physical Data Channel
(DPDCH). Additional uplink channelization codes may be allocated if
the mobile needs more than one DPDCH. All the channelization codes
used for the DPDCH must be orthogonal to the channelization code
used for the DPCCH.
Because the different mobiles using the same RF channel (frequency)
use unique uplink scrambling codes, no coordination between the
allocation of uplink channelisation codes to different mobiles is
needed. They are allocated in a predefined order that takes advantage
of the design of the scrambling codes used by the mobile transmitter.
The mobile and the network may negotiate the number and length
(spreading factor) of the channelization codes needed for the call, and
the network allocates the necessary codes.
Restrictions in the uplink

A single mobile cannot use all the channelization codes


simultaneously. A channelization code can only be used by a mobile if
no other code on the path from the specific code, to the root of the
code tree, or in the sub tree below the specific code, is used by the
same mobile. Thus the number of available channelization codes is
not fixed, but depends on the data rate and associated spreading factor
of each physical channel used.
Downlink usage of
channelization codes

The channelization code for the Primary Common Control Physical


Channel (CCPCH) is predefined for all cells within the network. The
BCH broadcasts the channelization code used for the Secondary
Common Control Physical Channel.
The channelization codes for the downlink Dedicated Physical
Channels are allocated by the network. The mobile is informed which
channelization codes to receive in the downlink Access Grant
message. The set of channelization codes may change during a call,
for instance, after a handover or change of service type. This change
of channelization code set is negotiated over the Dedicated Control
Channel (DCCH).

....................................................................................................................................................................................................................................

3-52

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Uu interface (air interface)


Spreading codes

UMTS interfaces

Restrictions in the downlink

The same restrictions regarding the code assignment that apply to the
uplink on a per mobile basis, apply on the downlink on a per cell
basis.
Uplink usage of
scrambling codes

Each subscribers mobile is assigned a unique code, not repeated at


other cells, in order to allow for successful identification during
intercell handover.
The uplink uses either short or long scrambling codes, according to
the capabilities of the base station receiver used. In both cases
complex scrambling is used, in which each code allocation consists of
a pair of I & Q codes.
Short scrambling codes are used in cells that have a sophisticated
receiver, with a multiple user detector and interference canceller.
Using a short code the cross correlation between different physical
channels and users does not vary with time, as it does when a long
code is used. Consequently the cross correlation matrices in the
advanced receiver do not have to be updated as frequently, thus
reducing the complexity of receiver design.
The base station informs the mobile of its code allocation using the
Access Grant message (although it is possible to change the code
allocation during a call).
Where multiple user detection is not performed at the base station,
long codes are used, owing to their better interference averaging
properties. Each long code maps to an indicated short code, and the
Access Grant message informs the mobile if it has to use the indicated
short code, or the corresponding long code.

Downlink usage of
scrambling codes

A total of 512 scrambling codes are available, divided into 32


subgroups of 16 codes each, as an aid to rapid cell searching. A
scrambling code is assigned to a cell at initial deployment, and the
mobile is advised of the code during its cell search process.
As a solution to cell congestion, the facility to assign more than one
scrambling code to a cell may be adopted in the future.

Random access codes


(uplink)

The base station broadcasts a cell specific spreading code for the
preamble part of the Random Access Message. Additional codes may
be broadcast if the traffic loading is high. These preamble spreading
codes have to be coordinated between cells to avoid interference. A
real valued 256 chip orthogonal Gold code is used, and all 256 codes
may be used by the system.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-53

Uu interface (air interface)


Spreading codes

UMTS interfaces

A preamble signature code is used that carries one of 16 different


orthogonal complex signatures of length 16, based on a set of
orthogonal Gold codes of length 16. The base station broadcasts the
signatures that may be used in a cell.
The preamble signature specifies one of the 16 nodes in the code tree
that correspond to channelization codes of length 16. The sub tree
below the specified node spreads the message part of the Random
Access Message.
In addition to spreading, the message part is also scrambled with a
106 ms complex code. This code is cell specific, and is associated
with the spreading code used for the preamble part. Although the
scrambling code is the same for each access slot, the scrambling
codes do not collide in different access slots, as the slots are time
shifted by 1.256 ms.
Synchronisation codes

Synchronisation is required for the mobile to decode the downlink


data when first receiving a base station, and in the uplink direction for
the base station to decode the mobiles random access requests.
Primary and secondary codes are orthogonal Gold codes of
length 256, formed by combining pairs of m-sequence codes. They
are transmitted at the system chip rate.

....................................................................................................................................................................................................................................

3-54

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Uu interface (air interface)

UMTS interfaces

Channel
coding, multiplexing, and rate matching
....................................................................................................................................................................................................................................
Overview

Diagram of coding,
multiplexing, and rate
matching

Multiple services (for example, voice, data, email) with, in general,


different Quality of Service requirements, are time multiplexed and
form a Coded Composite Transport Channel (CCTrCH). The CCTrCH
is mapped to one or several physical data channels.
Channel coding, rate matching and channel multiplexing:

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-55

Uu interface (air interface)

UMTS interfaces

Uplink
spreading and modulation
....................................................................................................................................................................................................................................
Spreading and modulation

Uplink spreading and modulation for Dedicated Physical Data


Channel (DPDCH) and Dedicated Physical Control Channel
(DPCCH):
cos (t)

D
I

Cscramb

DPDCH

Real

p(t)

I+jQ
OVSF Code
Q

DPCCH

Imag

Spreading of DPDCH and


DPCCH

p(t)

sin (t)

Dual channel Binary Phase Shift Keying (BPSK) modulation is used,


with the uplink Dedicated Physical Data Channel (DPDCH) and
Dedicated Physical Data Channel (DPDCH) are mapped to the I and
Q branches of the modulator, respectively.
The I and Q branches are spread to the chip rate with two Orthogonal
Variable Spreading Factor (OVSF) codes and then multplied by the
power offsets D and C. Afterwards they are scrambled using a
mobile specific scrambling code cscramb.
When more than one code is used for transmission, additional uplink
DPDCHs may be transmitted on either the I or Q branches. For each
branch, each additional DPDCH is assigned its own channelization
code. Uplink DPDCH channels on different branches may share a
common channelization code.

Spreading of PRACH

Modulation

The message component of the Physical Random Access Channel


(PRACH) is spread and modulated in a similar manner as the uplink
dedicated physical channels, as described above. The uplink DPDCH
is replaced with the data part, and the DPCCH is replaced with the
control part. The scrambling code that is used for the message
component is chosen based on the base station specific preamble code
in use.
Quaternary Phase Shift Keying (QPSK) is used with a chip rate of
3.84 Mchips/s. To reduce the linearity requirements on the power
amplifier, and improve its efficiency, the scrambling codes are
designed such that N-1 out of N consecutive chips produce 90
rotations of the I and Q multiplexed data channels and control

....................................................................................................................................................................................................................................

3-56

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Uu interface (air interface)


Uplink spreading and modulation

UMTS interfaces

channels. The remaining 1 out of N chips produce 0, 90, or 180


rotation.
In addition to the design of the scrambling codes, compatible uplink
channelization codes have to be chosen.
This limits the phase transitions of the baseband signal, prior to input
to a pulse-shaping filter. This filter ensures that the resulting
modulated signal is constrained within the RF spectrum channel mask
(the adjacent channel interference is limited).

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-57

Uu interface (air interface)

UMTS interfaces

Downlink
spreading and modulation
....................................................................................................................................................................................................................................
Spreading and modulation

Downlink Spreading and Modulation for Dedicated Physical Data


Channel (DPDCH) and Dedicated Physical Control Channel
(DPCCH):
cos (t)

OVSF Code
I

DPCH
and
CCPCH

Serial to
Parallel
Conversion

Multiplexing of SCH

Real

p(t)

I+jQ

OVSF
Code
Q

Spreading of DPDCH and


DPCCH

Cscramb

sin (t)

p(t)
Imag

Quaternary Phase Shift Keying (QPSK) modulation is used. Pairs of


baseband data bits are taken in serial form and applied in parallel to
the I and Q branches of the spreading and modulation chain. The I
and Q branches are then spread to the chip rate with the same
Orthogonal Variable Spreading Factor (OVSF) code and scrambled
using the same cell specific scrambling code cscramb.
Downlink Multiplexing of Synchronization Channel (SCH):

Each physical channel uses a different channel code, but the same
scrambling code.

....................................................................................................................................................................................................................................

3-58

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Uu interface (air interface)


Downlink spreading and modulation

UMTS interfaces

In addition to the Dedicated Physical Channels (DPCH) and the


Common Control Physical Channels (CCPCH), the Synchronization
Channel (SCH) is also multiplexed onto the downlink transmission.
The Synchronization Channel is transmitted intermittently, one code
word per slot, and is multiplexed onto the downlink after the DPCH
and CCPCH have been scrambled. Thus the SCH is not orthogonal to
the other downlink channels.
Modulation

As on the uplink, Quaternary Phase Shift Keying (QPSK) with a chip


rate of 3.84 Mchips/s is used on the downlink, with similar pulse
shaping and filtering.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-59

Uu interface (air interface)

UMTS interfaces

Protocols
on the U u interface
....................................................................................................................................................................................................................................
Protocol layers

The Uu interface is layered into three protocol layers:


1.

The physical layer (L1)

2.

The data link layer (L2)


Layer 2 is split into the following sublayers:

3.

Medium Access Control (MAC)

Radio Link Control (RLC)

Packet Data Convergence Protocol (PDCP)

Broadcast/Multicast Control (BMC).

Network layer (L3).

Layer 3 and RLC are divided into Control (C) and User (U) planes.
PDCP and BMC exist in the U plane only.
In the C plane, Layer 3 is partitioned into sublayers where the lowest
sublayer, denoted as Radio Resource Control (RRC), interfaces with
Layer 2 and terminates in the UTRAN. The higher layer signaling
such as Mobility Management (MM) and Call Control (CC) are not
given in this topic.
Overall protocol structure

Radio interface protocol architecture (Service Access Points are given


as ovals):

....................................................................................................................................................................................................................................

3-60

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Uu interface (air interface)


Protocols on the U u interface
Explanation of overall
protocol structure

UMTS interfaces

Each block in the previous figure represents an instance of the


respective protocol. Service Access Points (SAP) for peer-to-peer
communication are marked with ovals at the interface between
sublayers. The SAP between MAC and the physical layer provides the
transport channels. The SAPs between RLC and the MAC sublayer
provide the logical channels. In the C-plane, the interface to higher L3
sublayers (CC, MM) is defined by the General Control (GC),
Notification (Nt) and Dedicated Control (DC) SAPs.
The connections between RRC and MAC as well as RRC and L1
provide local interlayer control services.
Equivalent control interfaces exist between:

RRC and the RLC sublayer

RRC and the PDCP sublayer

RRC and BMC sublayer.

These interfaces allow the RRC to control the configuration of the


lower layers. For this purpose separate Control SAPs are defined
between RRC and each lower layer (PDCP, RLC, MAC, and L1).

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-61

UMTS interfaces

Iu, I ur, I ub interfaces


Overview
....................................................................................................................................................................................................................................
Objectives

Introduction

After completing this topic, you will be able to:

Identify the interfaces within the UTRAN

State the functionality of the different interfaces.

This topic describes the interfaces of a Radio Network Controller


(RNC).
The principal interfaces are:

Contents

The Core Network (or Iu ) interface through which the RNC


communicates with the Mobile Switching Centers (MSC) for
circuit switched, and the Serving General-packet-radio-service
Support Node (SGSN) for packet data.

Neighboring RNC (or Iur ) interface through which the RNC


communicates with surrounding RNCs when the serving RNC
requires radio resources that are available from cells controlled
by a neighboring RNC, in order to maintain a connection on the
air interface.

The Node B (or Iub) interface through which the RNC


communicates with the BTSs or Node Bs that it controls.

This topic contains the following:


Iu interface

3-63

Iub interface

3-66

Iur interface

3-71

....................................................................................................................................................................................................................................

3-62

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Iu, Iur, Iub interfaces

UMTS interfaces

I....................................................................................................................................................................................................................................
u interface
Overview

The Iu interface can support:

The interconnection of RNCs with Core Network Access Points


within a single PLMN

The interconnection of RNCs with Core Network Access Points


irrespective of the manufacturer of any of the elements

All UMTS services.

The Iu interface facilitates the use of the same RNC, MSC or SGSN
in all PLMNs. Independence between the protocol layers and between
control and user planes are maintained on the Iu interface. The Iu
interface allows independent evolution of technologies within the
Core, Radio Access and Transport Networks. The Iu interface is an
open and multi-vendor interface.
Iu interface location

The Iu interface is specified at the boundary between the Core


Network (CN) and UTRAN. From the Iu perspective, the Core
Network access point is either an MSC or an SGSN and the UTRAN
access point is an RNC.
Location of the Iu interface in the UMTS network:
UTRAN

Core Network (CN)

Node B
RNC

MSC

Node B
Iu(cs) Interface
Iu(ps) Interface
Node B
RNC

SGSN

Node B

Iu Interface

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-63

Iu, Iur, Iub interfaces


Iu interface
Iu interface types

UMTS interfaces

There are two types of the Iu interface:

Iu(cs) interface
The Iu interface towards the packet-switched domain of the core
network is called Iu(ps) interface.

Iu(ps) interface
The Iu interface towards the circuit-switched domain is called
Iu(cs) interface.

There may be at most two distinct Iu interface instances for any RNC
- one towards the circuit-switched domain and one towards the
packet-switched domain.
In the separated core network architecture, this means that there are
separate signaling and user data connections towards the two domains.
This applies in both transport and radio network layers.
In the combined architecture, there are separate connections in the
user plane (in both transport and radio network layers). In the control
plane, there are separate SCCP connections to the two logical
domains.
In either architecture, there can be several RNCs within UTRAN and
so UTRAN may have several Iu access points towards the Core
Network. As a minimum, each Iu access point (in UTRAN or CN)
shall independently fulfil the requirements of the Iu specifications.
Iu interface connection
principles

The Iu interface has a hierarchical architecture where one higher layer


entity controls several lower layer entities.
The CN - UTRAN signaling connection end points have the following
hierarchy:

Iu interface characteristics

Each MSC may be connected to one or more RNCs

Each RNC shall be connected to no more than one SGSN

Each SGSN may be connected to one or more RNCs

Each RNC shall be connected to no more than one MSC.

The protocol stack used on the Iu interface follows a layered structure,


although the naming of the layers is not consistent with the OSI
7-layer model.
In the radio network layer control plane, the functional split and the
common procedures are identical for the two domains, but parameters
in the procedures may differ. The UE - CN signaling transferred
transparently through UTRAN may also be different.
The Iu interface supports a common set of services to the two Core
Network domains, and therefore the radio network layer user data
protocol is defined commonly for both Iu(ps) and Iu(cs) interfaces. The

....................................................................................................................................................................................................................................

3-64

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Iu, Iur, Iub interfaces


Iu interface

UMTS interfaces

protocol has a number of modes of operation to allow features to be


activated on a per RAB basis.
For the transport network layer, different protocol stacks are used
towards each Core Network domain.
Coordination between Iu
instances

It is the responsibility of the UTRAN to coordinate the two Iu


interface instances for one user equipment (UE).
The following coordination functionality is required due to the
existence of two CN domains:

Handling of two Iu connections


The SRNS shall be able to handle two Iu connections, one for
each CN domain, for one UE. This implies:
-

Functionality to set up and associate a second Iu connection


to an already established RRC connection

Transferals of control signaling between UE and respective


CN node, by using one RRC connection between UE and
SRNC and the two Iu connections

Release of one Iu connection, while keeping the other Iu


connection and the RRC connection.

When receiving a page request from a CN node for a UE that


already has an established RRC connection (and associated UE
identity at the RNC receiving the request), no CN page shall
be performed. Instead a corresponding notification shall be sent
by the SRNC to the UE via the established RRC connection

A special relocation coordination is needed when two Iu


interfaces, towards the two CN nodes for a specific UE, shall be
moved from one RNC to another RNC

When receiving a cipher request, from a CN node, for a UE, a


special coordination is also needed. This coordination is FFS.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-65

Iu, Iur, Iub interfaces

UMTS interfaces

I....................................................................................................................................................................................................................................
ub interface
Overview

Iub interface location

The logical interface between an RNC and a Node B is the Iub


interface.
The Iub interface is specified at the boundary between the Radio
Network Controller (RNC) and the Node B.
Location of the Iub interface in the UMTS network:

UMTS Core Network

Iu

Iu

RNS

RNS
RNC
Iub

Iub

Node B

Uu

General principles and


specifications

RNC

Iur
Iub

Node B

Iub

Node B

Uu

Node B

Uu

Uu

The general principles for the specification of the Iub interface are:

Transmission sharing between the GSM/GPRS Abis interface and


the Iub interface shall not be precluded

The functional division between RNC and Node B shall have as


few options as possible

The Iub interface should be based on a logical model of Node B

Node B controls a number of cells and can be ordered to


add/remove radio links in those cells

Neither the physical structure nor any internal protocols of the


Node B shall be visible over the Iub interface and are thus not
limiting factors. For example, when introducing future technology

Operation and Maintenance of Node B hardware and software


resources is not a part of the Iub interface standardization

....................................................................................................................................................................................................................................

3-66

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Iu, Iur, Iub interfaces


Iub interface

Iub interface capabilities

Radio application related


signaling

UMTS interfaces

Complex functionality shall as far as possible be avoided over


the Iub interface

The Iub functional split shall take into account the probability of
frequent switching between different channel types.

The Iub interface has the following capabilities:

Radio application related signaling

Iub/Iur Dedicated Channel (DCH) data stream

Iub Random Access Channel (RACH) data stream

Iub Forward Access Channel (FACH) data stream

Iub Downlink Shared Channel (DSCH) data stream.

The Iub interface allows the RNC and the Node B to negotiate about
radio resources, for example to add and delete cells controlled by the
Node B to support communication of the dedicated connection
between UE and SRNC. Information to control the broadcast and
paging channels, and information to be transported on the broadcast
and paging channels, also belong to this category .

Iub/Iur DCH data stream

The Iub interface provides means for transport of uplink and downlink
DCH Iub frames between RNC and Node B. The DCH Iub frame
header includes uplink quality estimates and synchronization
information. The DCH Iub frame body comprises of data to be
transferred over the radio interface. The DCH Iub frames can be
carried on pre-defined transmission links or switched connections.
One Iub/Iur DCH data stream is carried on one transport bearer.

Iub RACH data stream

The Iub interface provides means for transport of uplink RACH


transport frames between RNC and Node B. The RACH transport
frame header includes synchronization information. The RACH
transport frame body includes the data received over radio interface.
The transport frames can be carried on pre-defined transmission links
or switched connections. One Iub RACH data stream is carried on one
transport bearer. For each RACH in a cell, an Iub RACH data stream
must be established over the Iub interface.

Iub FACH data stream

The Iub interface provides means for transport of downlink FACH


transport frames between RNC and Node B. The FACH transport
frame header includes synchronization information. The FACH
transport frame body includes the data to be sent over radio interface.
The transport frames can be carried on pre-defined transmission links
or switched connections. One Iub FACH data stream is carried on one

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-67

Iu, Iur, Iub interfaces


Iub interface

UMTS interfaces

transport bearer. For each FACH in a cell, a Iub FACH data stream
must be established over the Iub interface.
Iub DSCH data stream

The Iub interface provides the means for transport of Downlink Shared
Channel (DSCH) data frames between RNC and Node B. The DSCH
Iub frame body comprises of data to be transferred over the radio
interface. The DSCH Iub frames can be carried on pre-defined
transmission links or switched connections. One Iub DSCH data
stream is carried on one transport bearer.

Iub interface protocols

A clear separation exists between the radio network layer and the
transport layer. Therefore, the radio network signaling and Iub data
streams are separated from the data transport resource and traffic
handling . This resource and traffic handling is controlled by the
Transport Signaling. The Transport Signaling is carried by a Signaling
Bearer over the Iub interface.

Transport network logical


resources

Node B Control Port

The following transport network logical resources exist on the Iub


interface:

Node B Control Port

Communication Control Port

Traffic Termination Point

Iub Dedicated Channel (DCH) Data Port

Iub Random Access Channel (RACH) Data Port

Iub Forward Access Channel (FACH) Data Port

Iub Downlink Shared Channel (DSCH) Data Port

Iub Time Division Duplex Uplink Shared Channel (TDD USCH)


Data Port

Iub Paging Channel (PCH) Data Port.

The Node B Control Port:

Exchanges the signaling information for the logical O&M of


Node B

Creates Node B Communication Contexts

Configures the common transport channels that Node B provides


in a given cell

Creates PCH and BCH control information between the RNC and
the Node B.

The Node B Control Port corresponds to one signaling bearer


between the controlling RNC and the Node B. There is one Node B
Control Port per Node B.
....................................................................................................................................................................................................................................

3-68

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Iu, Iur, Iub interfaces


Iub interface

UMTS interfaces

Communication Control
Port

A Communication Control Port corresponds to one signaling bearer


between the RNC and Node B for the control of Node B
Communication Contexts. One signaling bearer between RNC and
Node B can at most correspond to one Communication Control Port.
Node B may have multiple Communication Control Ports (one per
Traffic Termination Point). The Communication Control Port is
selected at creation of the Node B Communication Context.

Traffic Termination Point

Traffic Termination Point represents DCH, DSCH and TDD USCH


data streams belonging to one or more Node B Communication
Contexts (UE contexts), which are controlled via one Communication
Control Port. The Traffic Termination Point is thus a descriptive entity
which is neither controlled over Iub nor by O&M.

Iub DCH Data Port

One Iub DCH Data port represents one user plane transport bearer.
One user plane transport bearer will carry only one DCH data stream
except in the case of coordinated DCHs, in which case the data
streams of all combined DCHs shall be multiplexed on one and the
same user plane transport bearer.

Iub RACH Data Port

An Iub RACH Data Port represents a user plane bearer carrying one
Iub RACH Data Stream between the Node B and the RNC. There is
one RACH Data Port for each RACH channel of Node B.

Iub FACH Data Port

An Iub FACH Data Port represents a user plane bearer carrying one
Iub FACH Data Stream between the Node B and the RNC. There is
one CCH Data Port for each FACH channel of Node B.

Iub DSCH Data Port

An Iub DSCH Data Port represents a user plane bearer carrying one
Iub DSCH Data Stream between the Node B and the RNC. For each
DSCH, that is used by an individual UE, there is one Iub DSCH Data
Port per Node B exclusively assigned to the communication context
of that UE. In FDD each DSCH is associated with a downlink
DPCCH.

Iub TDD USCH Data Port

An Iub TDD USCH Data Port represents a user plane bearer carrying
one Iub TDD USCH Data Stream between the Node B and the RNC.
For each USCH, that is used by an individual UE, there is one Iub
TDD USCH Data Port with data exclusively assigned to the Node B
communication context of that UE.

Iub PCH Data Port

An Iub PCH Data Port represents an Iub PCH Data Stream between the
Node B and the RNC.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-69

Iu, Iur, Iub interfaces


Iub interface
Iub interface functions

UMTS interfaces

The Iub interface has the following functions:

Management of Iub Transport Resources

Logical OA&M of Node B


-

Iub Link Management

Cell Configuration Management

Radio Network Performance Measurements

Resource Event Management

Common Transport Channels Management

Radio Resource Management

Radio Network Configuration Alignment.

System Information Management

OA&M Transport

Traffic Management of Common Channels

Admission Control

Power Management

Data Transfer.

Traffic Management of Dedicated Channels


-

Radio Link Management/Supervision

Channel Allocation / De-allocation

Power Management

Measurement Reporting

Dedicated Transport Channel Management

Data Transfer.

Traffic Management of Downlink Shared Channels (FFS)


-

Channel Allocation / De-allocation

Power Management

Transport Channel Management

Radio Link Management

Data Transfer.

Timing and Synchronization Management


-

Transport Channel (Frame) Synchronization

Node B-RNC Synchronization

Inter Node B Synchronization.

....................................................................................................................................................................................................................................

3-70

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Iu, Iur, Iub interfaces

UMTS interfaces

I....................................................................................................................................................................................................................................
ur interface
Overview

The logical interface between two RNCs is called the Iur interface.
The Iur interface facilitates:

Iur interface location

Inter-connection of RNSs from different manufacturers

Support of continuation between RNSs of the UTRAN services


offered via the Iu interface

Separation of Iur interface Radio Network functionality and


Transport Network functionality to facilitate introduction of
future technology.

The Iur interface is specified at the boundary between two Radio


Network Controllers (RNC).
Location of the Iur interface in the UMTS network:

UMTS Core Network

Iu

Iu

RNS

RNS
RNC
Iub

Iub

Node B

Uu

Iur interface capabilities

RNC

Iur
Iub

Node B

Iub

Node B

Uu

Uu

Node B

Uu

The Iur interface has the following capabilities:

Radio application related signaling

Iur/Iur Dedicated Channel (DCH) data stream

Iur Downlink Shared Channel (DSCH) data stream

Iur Time Division Duplex Uplink Shared Channel (TDD USCH)


data stream

Iur Random Access Channel (RACH) / Common Packet Channel


(CPCH) data stream

Iur Forward Access Channel (FACH) data stream.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-71

Iu, Iur, Iub interfaces


Iur interface

UMTS interfaces

Radio application related


signaling

The Iur interface supports radio interface mobility between RNSs, of


UEs having a connection with UTRAN. This capability includes the
support of handover, radio resource handling and synchronization
between RNSs.

Iur/Iur DCH data stream

The Iur interface transports uplink and downlink Iub/Iur DCH frames
carrying user data and control information between SRNC and
Node B (DRNS), via the DRNC.

Iur DSCH data stream

Iur TDD USCH data stream

Iur interface protocols

An Iur DSCH data stream corresponds to the data carried on one


DSCH transport channel for one UE. A UE may have multiple Iur
DSCH data streams. The Iur interface provides the transport of uplink
and downlink MAC-common and shared channel SDUs. In addition,
the interface provides the SRNC for queue reporting and a means for
the DRNC to allocate capacity to the SRNC.
An Iur USCH data stream corresponds to the data carried on one
USCH transport channel for one UE. A UE may have multiple Iur
USCH data streams.
A clear separation shall exist between the Radio Network Layer and
the Transport Layer. Therefore, the radio network signaling and Iur
data streams are separated from the data transport resource and traffic
handling. Data transport resource and traffic handling is controlled by
Transport Signaling. The Transport Signaling is carried by a Signaling
Bearer over the Iur interface.
Iur interface protocol structure:

....................................................................................................................................................................................................................................

3-72

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Iu, Iur, Iub interfaces


Iur interface
Iur interface functions

UMTS interfaces

The Iur interface has the following functions:

Transport Network Management

Traffic management of Common Transport Channels

Preparation of Common Transport Channel resources

Paging

Traffic Management of Dedicated Transport Channels


-

Radio Link Setup / Addition / Deletion

Measurement Reporting

Traffic Management of Downlink Shared Transport Channels and


TDD Uplink Shared Transport Channels
-

Radio Link Setup / Addition / Deletion

Capacity Allocation

Measurement reporting for common and dedicated measurement


objects.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

3-73

Mobility management

Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this chapter, you will be able to:

Identify the numbering structures used within UMTS

Name the idle mode tasks

State the differences between a location area and a routing area


update.

This chapter contains the following topics:


Location data

4-2

Subscriber data

4-9

Idle mode procedures

4-9

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-1

Mobility management

Location data
Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this topic, you will be able to:

Describe the three MM states for a UMTS mobile

Name the numbers used for UE identification.

This topic contains the following:


Packet Mobility Management States

4-3

Mobile Station ISDN number

4-5

Mobile station identification numbers

4-7

....................................................................................................................................................................................................................................

4-2

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Location data

Mobility management

Packet
Mobility Management States
....................................................................................................................................................................................................................................
PMM states for UMTS

The Packet Mobility Management (PMM) activities related to a


subscriber are characterized by one of three different PMM states.
The MM states for a UMTS subscriber (PMM) are:

PMM-DETACHED

PMM-IDLE

PMM-CONNECTED.

Each state describes a certain level of functionality and information


allocated. The information sets held at the UE and the 3G-SGSN are
denoted MM context.
PMM-DETACHED state

In the PMM-DETACHED state there is no communication between


the UE and the 3G-SGSN. The UE and 3G-SGSN hold no valid
location or routing information for the UE, so the UE is not reachable
by a 3G-SGSN.
In order to establish MM contexts in the UE and the 3G-SGSN, the
UE shall perform the PS attach procedure. When the PS signaling
connection is established between the UE and the 3G-SGSN for
performing the PS attach, the state changes to PMM-CONNECTED in
the 3G-SGSN and in the UE.

PMM-IDLE state

The UE location is known in the 3G-SGSN with an accuracy of a


routing area. Paging is needed in order to reach the UE. The UE and
3G-SGSN have established MM contexts.
The UE shall perform a routing area update if the RA changes.
Signaling towards the HLR is needed if the 3G-SGSN does not have
an MM context for this UE.
The UE and 3G-SGSN shall enter the PMM-CONNECTED state
when the PS signaling connection is established between the UE and
the 3G-SGSN.
PS detach changes the state to PMM-DETACHED.

PMM-CONNECTED state

The UE location is known in the 3G-SGSN with an accuracy of a


serving RNC. In the PMM-CONNECTED state, the location of the
UE is tracked by the serving RNC. The UE performs the routing area
update procedure when RAI in the MM system information changes.
When an UE and a 3G-SGSN are in the PMM-CONNECTED state, a
PS signaling connection is established between the UE and the
3G-SGSN.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-3

Location data
Packet Mobility Management States

Mobility management

The UE shall enter the PMM-IDLE state when its PS signaling


connection to the 3G-SGSN has been released or broken. This release
or failure is explicitly indicated by the RNC to the UE or detected by
the UE.
After a signaling procedure (for example routing area update), the
3G-SGSN may decide to release the PS signaling connection, after
which the state is changed to PMM-IDLE.
PS detach changes the state to PMM-DETACHED.
PMM state model

The MM states for a UMTS subscriber (PMM) are:

....................................................................................................................................................................................................................................

4-4

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Location data

Mobility management

Mobile
Station ISDN number
....................................................................................................................................................................................................................................
Mobile Station ISDN
number

The Mobile Station ISDN number (MSISDN) is the directory number


allocated to the mobile subscriber. It is dialed to make a telephone
call to the mobile subscriber.
The MSISDN consists of:
Field

Description

CC

The Country Code (CC) indicates the country in which the


UE is registered.

NDC

The Network Destination Code (NDC) is part of the


national number and is allocated to each PLMN.

SN

The Subscriber Number (SN) identifies each subscriber


within a PLMN.

The maximum number of digits of the Digit Subscriber Number is a


standard of 12 in accordance with ITU Recommendation. Previously
the maximum number of digits allowed was limited to 10.
MSISDN representation

The MSISDN can be graphically represented as:

The composition of the MSISDN is such that it can be used as a


global title address in the Signaling Connection Control Part (SCCP)
for routing messages to the HLR of the mobile subscriber.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-5

Location data
Mobile Station ISDN number

Mobile Station Roaming


Number

Mobility management

The Mobile Station Roaming Number (MSRN) is the number required


by the gateway 3G-MSC to route an incoming call to a UE that is not
currently under the gateways control.
Using the MSISDN a mobile-terminated call is routed to the gateway
3G-MSC. Based on this MSISDN the gateway 3G-MSC requests for a
MSRN to route the call to the current visited 3G-MSC.

....................................................................................................................................................................................................................................

4-6

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Location data

Mobility management

Mobile
station identification numbers
....................................................................................................................................................................................................................................
International Mobile
Subscriber Identity

A UE is identified by its International Mobile Subscriber Identity


(IMSI). The IMSI is embodied in the SIM of the mobile equipment. It
is provided by the UE anytime it accesses the network.
An IMSI code has three components:

IMSI representation

Field

Description

MCC

The Mobile Country Code (MCC) component of the IMSI


is a 3digit code that uniquely identifies the country of the
domicile of the subscriber. It is assigned by the ITU-T.

MNC

The Mobile Network Code (MNC) component is a 2digit


code that identifies the home PLMN of the mobile
subscriber. It is assigned by the government of each
country.

MSIN

The Mobile Subscriber Identification Number (MSIN) is a


code that identifies the mobile subscriber within a PLMN.
It is assigned by an operator.

The IMSI can be represented graphically as:

The overall number of digits in an IMSI code does not exceed 15.
Temporary Mobile
Subscriber Identity

The Temporary Mobile Subscriber Identity (TMSI) is an identity alias


which is used instead of the IMSI when possible. The use of a TMSI
ensures that the true identity of the mobile subscriber remains
confidential by eliminating the need to transfer an IMSI code
unciphered over a radio link.
A unique TMSI is allocated within a VLR and the area controlled by
a VLR, or within an 3G-SGSN and the area controlled by an
3G-SGSN. This TMSI, which is only valid within the area supervised
by the VLR or 3G-SGSN, is used to identify the subscriber in

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-7

Location data
Mobile station identification numbers

Mobility management

messages to and from the UE. When a change of location area also
involves a change of VLR area or 3G-SGSN area, a new TMSI code
is allocated and communicated to the UE. The UE stores the TMSI on
its SIM.
The TMSI allocated within an 3G-SGSN is called Packet TMSI
(P-TMSI)
The TMSI consists of four octets coded using a full hexadecimal
representation.
Local Mobile Station
Identity

The Local Mobile Station Identity (LMSI) is temporary subscriber


data. Note that the use of the LMSI is optional.
In order to speed up the search for subscriber data in the VLR a
supplementary LMSI can be defined. The LMSI is allocated by the
VLR at location updating and is sent to the HLR together with the
IMSI. The HLR makes no use of it but includes it together with the
IMSI in all messages sent to the VLR concerning that UE.

....................................................................................................................................................................................................................................

4-8

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Mobility management

Subscriber data
Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this topic, you will be able to:

Describe how the network attachment procedure is performed

Explain the concept of a location area and a routing area

Describe the functions of the HLR, VLR and 3G-SGSN in


relation to mobility management.

This topic contains the following:


Network attachment

4-10

Locating a mobile subscriber

4-13

Location registration

4-17

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-9

Subscriber data

Mobility management

Network
attachment
....................................................................................................................................................................................................................................
Definition

Network attachment is the process of selecting an appropriate cell by


the UE to provide the available services, and making its location
known to the network.
The process starts when the UE is switched on, and ends when the
UE enters the idle mode. In idle mode the UE does not have a traffic
channel allocated to make or receive a call, but the PLMN is aware of
the existence of the UE within the chosen cell.

Network attachment
process

The network attachment process consists of the following stages:


Stage

Description

PLMN selection

When a UE is switched on it attempts to make


contact with a PLMN by reading the received
system information from the available PLMNs.
Then a suitable PLMN is chosen.

Cell selection

Cell selection is the process of selecting an


appropriate cell by the UE to provide the
available services.

Location
registration

In order to initiate a call or to receive a call,


the UE tunes to the control channel of the
chosen cell. Then, it registers its presence in
this cell (registration process) by means of a
location updating procedure.

....................................................................................................................................................................................................................................

4-10

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Subscriber data
Network attachment

Graphical representation

PLMN selection
mechanism

Mobility management

The network attachment process is:

The UE normally operates on its home PLMN. However a visited


PLMN may be selected.
The particular PLMN to be contacted can be selected either in one of
the following modes:

Cell selection process

Mode

Description

Automatic

This mode utilizes a list of PLMNs in priority order.


The highest priority PLMN which is available and
allowed is selected.

Manual

In manual mode, the UE indicates to the user which


PLMNs are available. The user chooses one of the
PLMNs from the list and the UE tries to obtain
normal service on this PLMN.

Whenever a PLMN is selected, the UE shall attempt to find a suitable


cell of that PLMN to camp on according to the following steps:
1.

Create a candidate list of potential cells to camp on.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-11

Subscriber data
Network attachment

Mobility management

Two searching procedures are possible:

Suitable cell criteria

No suitable cell found

a.

Initial Cell Selection


This procedure requires no prior knowledge of which RF
channels are UTRA carriers. The UE shall scan all RF
channels in the UTRA band to find a suitable cell. On each
carrier, the UE searches first for the scrambling code of the
strongest cell, in order to find out which PLMNs are
available. If the selected PLMN is found, the search of the
rest of carriers may be stopped. After the UE has found one
suitable cell for the selected PLMN, the UE shall create a
candidate list consisting of this cell and its neighboring
cells, as received in measurement control information via the
selected cell.

b.

Stored Information Cell Selection


This procedure requires stored information of carrier
frequencies and optionally also scrambling codes
information from previously received measurement control
information elements. After the UE has found one suitable
cell for a selected PLMN the UE shall create the candidate
list consisting of this cell and its neighboring cells, as
received in measurement control information via the selected
cell.

2.

For each cell on the candidate list fulfilling all criteria for a
suitable cell, calculate a cell selection value and a quality value.

3.

Among the cells with a good cell selection value choose the cell
with the highest quality value to camp on.

The requirements that a suitable cell must satisfy (before a UE can


provide service from it) are:

The cell should be a cell of the selected PLMN

The cell should not be barred

The cell is not part of a forbidden registration area

The cell selection criteria are fulfilled

The cell is not an operator-only cell.

If the UE is unable to find a suitable cell to access, it attempts to


access an acceptable cell irrespective of the PLMN identity, and enters
a limited service state in which it can only attempt to make
emergency calls.

....................................................................................................................................................................................................................................

4-12

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Subscriber data

Mobility management

Locating
a mobile subscriber
....................................................................................................................................................................................................................................
Call to an active mobile
subscriber

As an active UE moves around in the coverage area of a PLMN, it


reports its movements so that it can be located when required using
the location update procedure.
When a Mobile-services Switching Center (MSC) in the network
needs to establish a call to an UE operating in its area the following
happens:

Network configuration

A page message is broadcast which contains the identification


code of the UE.
Not every RNC in the network is requested to transmit the page
message. The broadcast is limited to a cluster of radio cells that
together form a location area. The last reported position of the
UE identifies the location area to be used for the broadcast.

The UE monitors the page messages transmitted by the radio cell


in which it is located and, on detecting its own identification
code, responds by transmitting a page response message to the
Node B.

Communication is then established between the MSC and the UE


via the Node B that received the page response message.

The configuration of a PLMN is designed so that an active UE


moving in the networks area is always able to report its position.
A network consists of different areas:

PLMN area

PLMN area

Location area

Routing area

MSC area

VLR area.

A PLMN area is the geographical area in which land mobile


communication services are provided to the public by a particular
PLMN operator. From any position within a PLMN area, the mobile
user can set up calls to another user of the same network, or to a user
of another network. The other network may be a fixed network, a
GSM PLMN, or another type of PLMN. Other network users, and
users of other networks, can also call a mobile user who is active in
the PLMN area.
When there are several PLMN operators, the geographical areas
covered by their networks may overlap. The extent of a PLMN area is
normally limited by national borders.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-13

Subscriber data
Locating a mobile subscriber

Location areas

Mobility management

To eliminate the need for network-wide paging broadcasts, the PLMN


needs to know the approximate positions of the UEs that are active
within its coverage area. To enable the approximate position of any
UE to be represented by a single parameter, the total area covered by
the network is divided into location areas.
A Location Area (LA) is a cluster of one or more radio cells. The cell
cluster fulfills the following requirement:

Location area example

Location area identity

The Node Bs in a location area are controlled by one or more


RNCs

RNCs that serve the same location area are always connected to
the same MSC

Radio cells with Node Bs controlled by a common RNC can lie


in different location areas.

The location and MSC areas can be shown as:

Every radio transmitter in the PLMN broadcasts, via a control


channel, a Location Area Identity (LAI) code to identify the location
area that it serves.
When an UE is not engaged in a call, it automatically scans the
control channel broadcasts transmitted by the base stations in the
locality and selects the channel that is delivering the strongest signal.
The LAI code broadcast by the selected channel identifies the location
area in which the UE is currently situated. This LAI code is stored in
the Subscriber Identity Module (SIM) of the mobile equipment.

....................................................................................................................................................................................................................................

4-14

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Subscriber data
Locating a mobile subscriber

Mobility management

As the UE moves through the network area the signal received from
the selected control channel gradually diminishes in strength until it is
no longer the strongest. At this point the UE re-tunes to the channel
that has become dominant and examines the LAI code that it is
broadcasting. If the received LAI code differs from that stored on the
SIM, then the UE has entered another location area and initiates a
location update procedure to report the change to the 3G-MSC. At the
end of the procedure the LAI code in the SIM is also updated.
Location area identity
format

Graphical representation

Routing area

A location area identity (LAI) code identifies the location area in a


PLMN. The LAI code has three components:
Field

Description

MCC

The Mobile Country Code (MCC) is a 3-digit code that


uniquely identifies the country of domicile of the mobile
subscriber (for example, Germany is 262, and Brunei is
528). It is assigned by the ITU-T.

MNC

The Mobile Network Code (MNC) is a 2-digit or 3digit


code that identifies the home PLMN of the mobile
subscriber. If more than one PLMN exist in a country, a
unique MNC is assigned to each of them. It is assigned by
the government of each country.

LAC

The Location Area Code (LAC) component identifies a


location area within a PLMN. It has a fixed length of 2
octets and can be coded using hexadecimal representation.
It is assigned by an operator.

LAI can be represented as:

A Routing Area (RA) can consist of one or more cells and is always
served by only one 3G-SGSN. However, one 3G-SGSN could serve
more than one routing area.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-15

Subscriber data
Locating a mobile subscriber

Routing area identity

Graphical representation

MSC areas

Mobility management

The Routing Area Identity (RAI) is composed of the following


elements:
Field

Description

LAI

The Location Area Identity (LAI) code identifies the


location area in a PLMN.

RAC

The Routing Area Code (RAC) identifies a routing area


within a location area and has a fixed length of 1 octet.

RAI can be represented as:

An MSC area is a region of the network in which UMTS operations


are controlled by a single MSC.
An MSC area consists of one or more location areas. The boundary of
an MSC area follows the external boundaries of the location areas on
its periphery. Consequently, a location area never spans the boundary
of an MSC area.

VLR areas

A VLR area is a region of the network that is supervised by a single


Visitor Location Register (VLR). In theory, a VLR area may consist
of one or more MSC areas. In practice, however, the functions of the
VLR are always integrated with those of the MSC so that the terms
VLR area and MSC area have become synonymous.

....................................................................................................................................................................................................................................

4-16

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Subscriber data

Mobility management

Location
registration
....................................................................................................................................................................................................................................
Location data storage

HLR

The location information of the subscriber is stored on four different


locations:

HLR

3G-SGSN

3G-MSC/VLR

SIM card.

The HLR contains information relevant to mobile subscribers who are


fee-paying customers of the organization that operates the PLMN.
The HLR stores two types of information:

Subscription information
The subscription information includes the identity code and
directory number allocated to the subscriber, the type of
service(s) provided, and any related restrictions

Location information
The location information includes the address of the VLR in the
area where the subscribers UE is currently located, and the
address of the associated 3G-MSC.

The location information enables incoming calls to be routed to the


UE. The absence this information indicates that the UE is inactive and
cannot be reached.
When an UE moves from one VLR area to another, the location
information in the HLR is updated with the new VLR and 3G-MSC
addresses. The VLR then creates a new entry for the UE, using
subscription data copied from the HLR.
Provided that an interworking agreement exists between the network
operators concerned, data transactions can cross both network and
national boundaries.
3G-SGSN

A 3G-SGSN contains a RAI and a P-TMSI. This information is used


by the 3G-SGSN when handling calls to or from an UE in the area.
When an UE moves from one routing area (RA) to another, then the
3G-SGSN detects that it is an intra SGSN routing area update by
noticing that it also handles the old RA. In this case, the 3G-SGSN
has the necessary information about the UE and there is no need to
inform the GGSNs or the HLR about the new UE location. Otherwise
it is an inter SGSN routing area update.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-17

Subscriber data
Location registration

Mobility management

VLR

A VLR contains a data record for each of the UE that are currently
operating in its area. Each record contains a set of subscriber identity
codes, related subscription information, and a LAI. This information is
used by the 3G-MSC when handling calls to or from an UE in the
area.
When an UE moves from one area to another, the responsibility for its
supervision passes from one VLR to another. A new data record is
created by the VLR that has adopted the UE, and the old record is
deleted.
Provided that an interworking agreement exists between the network
operators concerned, data transactions can cross both network and
national boundaries.

SIM

The SIM contains the LAI, RAI, TMSI and the P-TMSI. The TMSI is
a temporary subscriber identification. The TMSI is allocated by the
VLR during location update. The P-TMSI is allocated by the
3G-SGSN during routing area update.

....................................................................................................................................................................................................................................

4-18

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Mobility management

Idle mode procedures


Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this topic you will be able to:

Describe how the location update procedure is performed

Explain the need for authentication and describe the process

Describe how the routing area update procedure is performed.

This topic contains the following:


Location update procedure

4-20

Request for service

4-22

Authentication

4-24

Ciphering

4-28

Update HLR/VLR

4-29

TMSI re-allocation

4-30

Periodic location update

4-32

Routing area update

4-33

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-19

Idle mode procedures

Mobility management

Location
update procedure
....................................................................................................................................................................................................................................
Introduction

The location update process and its different stages are explained in
more detail using call scenarios shown in the following figures:

....................................................................................................................................................................................................................................

4-20

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Idle mode procedures


Location update procedure

Mobility management

Location update stages

The following gives the different stages in the location update


procedure:
............................................................................................................................................................

Request for
service:

The UE detects that it has entered a new location


area and requests to update its location. The new
3G-MSC/VLR identifies the UE.

............................................................................................................................................................

Authentication:

The new 3G-MSC/VLR requests to the AUC for


authentication parameters. Using these parameters
the UE is authenticated.

............................................................................................................................................................

Ciphering:

Using the parameters which were made available


earlier during the authentication the uplink and the
downlink are ciphered.

............................................................................................................................................................

Update
HLR/VLR:

The new 3G-MSC/VLR requests to update the UE


location in the HLR. The UE is de-registered in
the old VLR.

............................................................................................................................................................

TMSI
The UE is assigned a new TMSI.
re-allocation:
Important! The authentication and ciphering stages are optional.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-21

Idle mode procedures

Mobility management

Request
for service
....................................................................................................................................................................................................................................
Introduction

Message flow

Message flow description

In the following location update scenario, it is assumed that a UE


enters a new location area that is under control of a different VLR
(referred to as the new VLR) than the one where the UE is currently
registered (referred to as the old VLR).
The following figure shows the steps of the mobile location update
scenario:

The UE enters a new cell area, listens to the location area identity
(LAI) being transmitted on the broadcast channel (BCCH), and
compares this LAI with the last LAI (stored in the SIM) representing
the last area where the mobile was registered:
............................................................................................................................................................

The UE detects that it has entered a new location area and transmits a
Channel Request message over the Random Access Channel (RACH).
............................................................................................................................................................

Once the RNC receives the Channel Request message, it allocates a


Dedicated Channel (DCH) and forwards this channel assignment
information to the UE over the Forward Access Channel (FACH). It is
over the DCH that the UE will communicate with the RNC and
3G-MSC.

....................................................................................................................................................................................................................................

4-22

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Idle mode procedures


Request for service

Mobility management

............................................................................................................................................................

The UE transmits a Location Update Request message to the RNC


over the DCH. Included in this message are the UE Temporary
Mobile Subscriber Identity (TMSI) and the old Location Area
Identification (old LAI). The UE can identify itself either with its
IMSI or TMSI. In this example well assume that the mobile provided
a TMSI.
The RNC forwards the location update request message to the
3G-MSC.
............................................................................................................................................................

The VLR analyzes the LAI supplied in the message and determines
that the TMSI received is associated with a different VLR (old VLR).
In order to proceed with the registration, the IMSI of the UE must be
determined. The new VLR derives the identity of the old VLR by
using the received LAI, supplied in the Location Update Request
message. It also requests the old VLR to supply the IMSI for a
particular TMSI.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-23

Idle mode procedures

Mobility management

Authentication
....................................................................................................................................................................................................................................
Introduction

Since the air interface is vulnerable to fraudulent access, it is


necessary to determine if the IMSI received from the UE is from the
SIM that was assigned this IMSI. To prevent access of unregistered
users authentication of subscribers is used.
Authentication is built around the notion an Authentication Key (Ki)
that resides in only two places:

In an Authentication Center (AUC)

In the users SIM card.

Since the authentication key, Ki, is (or should) never be transmitted, it


is virtually impossible for unauthorized individuals to obtain this key
to impersonate a give mobile subscriber.
Authentication parameters

The UE is authenticated by the VLR with a process that uses three


parameters:

RAND, which is completely random number

SRES, which is an authentication signed response. It is generated


by applying an authentication algorithm (A3) to RAND and Ki

Kc, which is a cipher key. The Kc parameter is generated by


applying the cipher key generation algorithm (A8) to RAND and
Ki.

These parameters (named an authentication triplet) are generated by


the AUC at the request of the HLR to which the subscriber belongs.
The algorithms, A3 and A8, are defined by the PLMN operator and
are executed by the SIM.

....................................................................................................................................................................................................................................

4-24

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Idle mode procedures


Authentication

Mobility management

Authentication process

The following figure gives a graphical representation of the


authentication process:

Authentication process
steps

During the authentication process the following steps are performed:


1.

An authentication triplet (SRES, RAND and Kc) is generated by


the AUC and sent to the VLR to which the subscriber belongs.

2.

To authenticate a subscriber, the VLR sends an authentication


request message to the UE. The message contains the RAND
parameter from an authentication triplet.

3.

The UE applies the A3 algorithm to the received RAND and the


Ki key taken from the SIM. The result is the value of SRES.
The UE also applies the A8 algorithm to the received RAND and
the Ki. The result is the value of Kc to be used later when the
radio link is switched to ciphered mode.

4.

The resulting SRES is returned to the VLR for verification.

5.

The VLR authenticates the subscriber if the SRES value returned


by the UE is equal to that in the triplet involved.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-25

Idle mode procedures


Authentication

Mobility management

Message flow

Message flow description

The following figure shows the step in the authentication phase:

The steps in the authentication phase are as follows:


............................................................................................................................................................

The new VLR sends a request to the HLR/AUC (Authentication


Center) requesting the authentication triplets (RAND, SRES, and
Kc) available for the specified IMSI.
............................................................................................................................................................

The AUC, using the IMSI, extracts the subscribers authentication key
(Ki). The AUC then generates a random number (RAND), applies the
Ki and RAND to both the authentication algorithm (A3) and the
cipher key generation algorithm (A8) to produce an authentication
Signed Response (SRES) and a Cipher Key (Kc). The AUC then
returns to the new VLR an authentication triplet: RAND, SRES, and
Kc.
............................................................................................................................................................

The 3G-MSC/VLR keeps the two parameters Kc and SRES for later
use and then sends a message to the UE. The UE reads its
authentication key (Ki) from the SIM, applies the received random
number (RAND) and Ki to both its authentication algorithm (A3) and
cipher key generation algorithm (A8) to produce an authentication
signed response (SRES) and cipher key (Kc). The UE saves Kc for
later, and will use Kc when it receives command to cipher the
channel.

....................................................................................................................................................................................................................................

4-26

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Idle mode procedures


Authentication

Mobility management

............................................................................................................................................................

The UE returns the generated SRES to the 3G-MSC/VLR. The VLR


compares the SRES returned from the UE with the expected SRES
received earlier from the AUC. If equal, the mobile passes
authentication. If unequal, all signaling activities will be aborted. In
this scenario, well assume that authentication passes.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-27

Idle mode procedures

Mobility management

Ciphering
....................................................................................................................................................................................................................................
Message flow

Message flow description

The following figure shows the steps in the ciphering phase:

The steps in the ciphering phase are as follows:


............................................................................................................................................................

The new 3G-MSC/VLR requests the RNC to cipher the radio channel.
Included in this message is the Cipher Key (Kc), which was made
available earlier during the authentication.
............................................................................................................................................................

The RNC retrieves the cipher key, Kc, from the message and then
transmits a request to the UE requesting it to begin ciphering the
uplink channel.
............................................................................................................................................................

The UE uses the cipher key generated previously when it was


authenticated to cipher the uplink channel, and transmits a
confirmation over the ciphered channel to the RNC.
............................................................................................................................................................

The RNC upon ciphering the downlink channel sends a cipher


complete message to the 3G-MSC.

....................................................................................................................................................................................................................................

4-28

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Idle mode procedures

Mobility management

Update
HLR/VLR
....................................................................................................................................................................................................................................
Introduction

Message flow

Message flow description

At this point, we are ready to inform the HLR that the UE is under
control of a new VLR and that the UE can be de-registered from the
old VLR.
The following figure shows the steps in the update location phase:

The steps in the update HLR/VLR phase are:


............................................................................................................................................................

The new VLR sends a message to the HLR informing it that the given
IMSI has changed locations and can be reached by routing all
incoming calls to the VLR address included in the message.
............................................................................................................................................................

The HLR requests the old VLR to remove the subscriber record
associated with the given IMSI. The request is acknowledged.
............................................................................................................................................................

The HLR updates the new VLR with subscriber data (mobile
subscribers customer profile).

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-29

Idle mode procedures

Mobility management

TMSI
re-allocation
....................................................................................................................................................................................................................................
Introduction

At this point in time, the HLR and old VLR have been informed
that the UE has registered with an 3G-MSC under the control of the
new VLR.
The remaining task for the new VLR is to allocate and transmit a new
TMSI to the UE. For security reasons, the radio channel is encrypted
before sending the new TMSI to the UE.

Message flow

Message flow description

The following figure shows the steps of the TMSI Re-allocation


phase:

The steps in the TMSI re-allocation phase are:


............................................................................................................................................................

The 3G-MSC forwards the location update accept message to the UE.
This message includes the new TMSI.
............................................................................................................................................................

The UE retrieves the new TMSI value from the message and updates
its SIM with this new value. The mobile sends then an Update
Complete message back to the 3G-MSC.
............................................................................................................................................................

The 3G-MSC requests from the RNC that the signaling connection be
released between the 3G-MSC and the UE.

....................................................................................................................................................................................................................................

4-30

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Idle mode procedures


TMSI re-allocation

Mobility management

............................................................................................................................................................

The 3G-MSC releases its portion of the signaling connection when it


receives the Clear Complete message from the RNC.
............................................................................................................................................................

The RNC sends a radio resource Channel Release message to the


UE and then frees up the Dedicated Channel (DCH) that was
allocated previously. The RNC then informs the 3G-MSC that the
signaling connections has been cleared.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-31

Idle mode procedures

Mobility management

Periodic
location update
....................................................................................................................................................................................................................................
Definition

At the discretion of the network operator, every UE may be required


to initiate a location update procedure at regular intervals, regardless
of its movements. The length of the interval is broadcast via the
control channel and may vary from 6 minutes to 25.5 hours. The
timing function is performed by the UE itself.
The periodic location update supplements the normal procedure. Its
purpose is to refresh location information that may have been lost or
become unreliable.

....................................................................................................................................................................................................................................

4-32

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Idle mode procedures

Mobility management

Routing
area update
....................................................................................................................................................................................................................................
Introduction

Routing area update


procedure

Periodic routing area


update
Message flow

The PLMN shall provide information for the UE to be able to:

Detect when it has entered a new cell or a new RA

Determine when to perform periodic RA updates.

A Routing Area (RA) update takes place when an attached UE detects


that it has entered a new RA or when the periodic RA update timer
has expired. If the network operates in mode I, then an UE that is
both PS attached and CS attached shall perform the Combined RA/LA
Update procedures.
A periodic RA update is always an intra 3G-SGSN routing area
update.
In UMTS, an RA update is either intra SGSN or inter SGSN RA
update, either combined RA/LA update or only RA update, either
initiated by an UE in PMM-CONNECTED or in PMM-IDLE state.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-33

Idle mode procedures


Routing area update

Mobility management

The intra and inter SGSN RA update cases are contained in the
procedure illustrated the figure below:

Message flow description


............................................................................................................................................................

The RRC connection is established, if not already done. The UE sends


a routing area update request message to the new 3G-SGSN.
Update type shall indicate:

RA update

Combined RA/LA update

Combined RA/LA update with IMSI attach

Periodic RA update.

Sending the routing area update request message to the 3G-SGSN


triggers the establishment of a signaling connection between UTRAN
and 3G-SGSN for the concerned UE

....................................................................................................................................................................................................................................

4-34

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Idle mode procedures


Routing area update

Mobility management

............................................................................................................................................................

If the RA update is an inter SGSN routing area update and if the UE


was in PMM-IDLE state, the new 3G-SGSN sends 3G-SGSN Context
Request message to the old 3G-SGSN to get the MM and PDP
contexts for the UE.
............................................................................................................................................................

Security functions may be executed. If the security functions do not


authenticate the UE correctly, then the routing area update shall be
rejected, and the new 3G-SGSN shall send a reject indication to the
old 3G-SGSN. The old 3G-SGSN shall continue as if the 3G-SGSN
Context Request was never received.
............................................................................................................................................................

If the RA update is an inter SGSN routing area update, the new


3G-SGSN sends an 3G-SGSN Context Acknowledge message to the
old 3G-SGSN.
The old 3G-SGSN marks in its context that the 3G-MSC/VLR
association and the information in the GGSNs and the HLR are
invalid. This triggers the 3G-MSC/VLR, the GGSNs, and the HLR to
be updated if the UE initiates a routing area update procedure back to
the old 3G-SGSN before completing the ongoing routing area update
procedure.
............................................................................................................................................................

If the RA update is an inter SGSN RA update and if the UE was in


PMM-IDLE state, the new 3G-SGSN sends update PDP Context
Request (new 3G-SGSN address, QoS negotiated, 3G-SGSN Tunnel
Endpoint Identifier, GGSN Tunnel Endpoint Identifier) to the GGSNs
concerned. The GGSNs update their PDP context fields and return an
update PDP Context Response (GGSN Tunnel Endpoint Identifier).
............................................................................................................................................................

If the RA update is an inter SGSN RA update, the new 3G-SGSN


informs the HLR of the change of 3G-SGSN by sending update
Location (SGSN number, 3G-SGSN address, IMSI) to the HLR.
............................................................................................................................................................

If the RA update is an inter SGSN RA update, the HLR sends Cancel


Location (IMSI, Cancellation Type) to the old 3G-SGSN with
cancellation type set to update procedure. The old 3G-SGSN
acknowledges with Cancel Location Ack (IMSI).
............................................................................................................................................................

If the RA update is an inter SGSN RA update, the HLR sends Insert


Subscriber Data (IMSI, subscription data) to the new 3G-SGSN. The

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

4-35

Idle mode procedures


Routing area update

Mobility management

new 3G-SGSN validates the UEs presence in the (new) RA. If due to
regional subscription restrictions the UE is not allowed to be attached
in the RA, the 3G-SGSN rejects the routing area update request with
an appropriate cause, and may return an Insert Subscriber Data Ack
(IMSI, 3G-SGSN area restricted) message to the HLR. If all checks
are successful then the 3G-SGSN constructs an MM context for the
UE and returns an Insert Subscriber Data Ack (IMSI) message to the
HLR.
............................................................................................................................................................

If the RA update is an inter SGSN RA update, the HLR acknowledges


the update Location by sending update Location Ack (IMSI) to the
new 3G-SGSN.
............................................................................................................................................................

10

The new 3G-SGSN validates the UEs presence in the new RA. If due
to roaming restrictions the UE is not allowed to be attached in the
3G-SGSN, or if subscription checking fails, then the 3G-SGSN rejects
the routing area update with an appropriate cause. If all checks are
successful the new 3G-SGSN responds to the UE with Routing Area
Update Accept (P-TMSI, TMSI, P-TMSI signature).
............................................................................................................................................................

11

The UE confirms the reallocation of the TMSIs by returning a


Routing Area Update Complete message to the 3G-SGSN.

....................................................................................................................................................................................................................................

4-36

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Call management

Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this chapter, you will be able to:

List the stages that are encountered in a mobile-to-land call

State which messages are sent in each mobile-to-land call stage

List the stages that are encountered in a land-to-mobile call

State which messages are sent in each land-to-mobile call stage

List the stages that are encountered in a mobile-to-mobile call

State which messages are sent in each mobile-to-mobile call


stage.

This chapter contains the following topics:


Mobile-to-land call scenario

5-2

Land-to-mobile call

5-16

Mobile-to-mobile call scenario

5-31

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-1

Call management

Mobile-to-land call scenario


Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After competing this topic, you will be able to:

List the stages that are encountered in a mobile-to-land call

State which messages are sent in each call stage.

This topic contains the following:


Mobile-to-land call

5-3

Request for service

5-6

Authentication and ciphering

5-8

Equipment validation

5-9

Call setup

5-11

Call release phase (UE initiated)

5-14

....................................................................................................................................................................................................................................

5-2

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Mobile-to-land call scenario

Call management

Mobile-to-land
call
....................................................................................................................................................................................................................................
Introduction

Due to the amount of messages sent to setup and disconnect a


mobile-to-land call, the call flow in this topic is explained by dividing
the call into a number of stages.
The following figure shows the different stages of an mobile-to-land
call:

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-3

Mobile-to-land call scenario


Mobile-to-land call

Call management

Call Stages

The following gives the different stages that are encountered during a
mobile-to-land call:
............................................................................................................................................................

Request for
service:

The UE request the RNC for a connection


to setup a call.

............................................................................................................................................................

Authentication:

The 3G-MSC/VLR requests the AUC for


authentication parameters. Using these
parameters the UE is authenticated.

............................................................................................................................................................

Ciphering:

Using the parameters which were made


available earlier during the authentication
the uplink and the downlink are ciphered.

............................................................................................................................................................

Equipment
validation:

The 3G-MSC/VLR requests the EIR to


check the IMEI for validity.

............................................................................................................................................................

Call setup:

Using the RNC, the 3G-MSC, 3G-GMSC


and the PSTN the speech path is setup.

....................................................................................................................................................................................................................................

5-4

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Mobile-to-land call scenario


Mobile-to-land call

Call management

............................................................................................................................................................

Call release:

The speech path is released.

Important! The authentication, ciphering and equipment validation


phases are optional. The service provider may decide that some of
these phases might not take place.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-5

Mobile-to-land call scenario

Call management

Request
for service
....................................................................................................................................................................................................................................
Introduction

In the following scenario it is assumed that the UE is already


registered with the system and has been allocated a Temporary Mobile
Subscriber Identity (TMSI).
A mobile originated call starts by the user entering the directory
number digits, associated with the person to be called, on the UE
handset. The user presses the send key after all digits have been
entered.

Message flow

The following figure shows the different messages sent during the
request for service phase:

Message flow description

The following provides a description for each message sent in the


request for service phase:
............................................................................................................................................................

UE transmits a connection request message over the Random Access


Channel (RACH) to the RNC to acquire a signaling connection.
............................................................................................................................................................

Once the RNC receives the connection request message, it allocates a


Dedicated Channel (DCH) and forwards this channel assignment
information to the UE over the Forward Access Channel (FACH). It is
over this DCH that the UE will communicate with the RNC and
3G-MSC until a traffic channel is assigned.
............................................................................................................................................................

The UE transmits a service request message to the RNC over the


DCH. Included in this message is the UE TMSI (if available) and

....................................................................................................................................................................................................................................

5-6

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Mobile-to-land call scenario


Request for service

Call management

Location Area Identification (LAI). The RNC forwards the service


request message to the 3G-MSC/VLR.
Important! In the messages flow some of the displayed messages are
not named by their correct name. This is deliberately done to make
the flow less complex and therefore better understandable.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-7

Mobile-to-land call scenario

Call management

Authentication
and ciphering
....................................................................................................................................................................................................................................
Introduction

The Authentication and ciphering phases that might be performed here


to setup a mobile-to-land call are exactly the same as seen before in
the location update scenarios.

....................................................................................................................................................................................................................................

5-8

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Mobile-to-land call scenario

Call management

Equipment
validation
....................................................................................................................................................................................................................................
Introduction

IMEI

The mobile-equipment validation process is the means by which a


specific piece of mobile equipment can be identified regardless of the
user. It is needed to prevent the use of stolen, unauthorized, or
malfunctioning equipment in the network.
Each piece of mobile equipment is uniquely identified by an
International Mobile Equipment Identity (IMEI) code.
The IMEI code, which is incorporated into the equipment by the
manufacturer, has three components:

Type Approval Code (TAC)

Final Assembly Code (FAC)

Serial Number (SNR)

Software Version (SV).

The IMEI code is secure and physically protected against


unauthorized change.
EIR

The Equipment Identity Register (EIR) is responsible for storing the


IMEI codes that identify the mobile equipment deployed in the UMTS
system.

Steps in equipment
validation phase

After the authenticating and ciphering the radio channel, the 3G-MSC
has the possibility to interrogate the UE for its equipment number.
Using the number, the 3G-MSC checks the equipment validity against
information in the Equipment Identity Register (EIR).

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-9

Mobile-to-land call scenario


Equipment validation

Call management

Message flow

The following figure shows the different messages sent during the
equipment validation phase:

Message flow description

The following provides a description for each message sent in the


equipment validation phase:
............................................................................................................................................................

The 3G-MSC transmits a request to the UE requesting it to respond


with its International Mobile Equipment Identity (IMEI).
............................................................................................................................................................

The UE upon receiving this request, reads its equipment serial number
and returns this value to the 3G-MSC.
............................................................................................................................................................

The 3G-MSC then requests the EIR to check the IMEI for validity.
The EIR will first check if the IMEI value is within a valid range, if
it is, it checks if the IMEI is on a suspect or invalid equipment list.
............................................................................................................................................................

The EIR returns to the 3G-MSC the results of the IMEI validation. If
the results are negative, the 3G-MSC might abort the call or possibly
let the call continue but inform the network service provider of the
event.
In this scenario, well assume that the IMEI is valid.

....................................................................................................................................................................................................................................

5-10

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Mobile-to-land call scenario

Call management

Call
setup
....................................................................................................................................................................................................................................
Introduction

After the UE is authenticated, ciphered and the terminal identity is


checked, the call setup is performed.

Message flow

The following figure shows the different messages sent during the call
setup phase:

Message flow description

The following provides a description for each message sent in the call
setup phase:
............................................................................................................................................................

After the UE has ciphered the radio channel, it transmits a call setup
request message to the 3G-MSC/VLR . Included in this request
message are the dialed digits. Upon receiving the call setup request
message, the 3G-MSC requests the VLR to supply the subscriber
parameters necessary for handling the call.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-11

Mobile-to-land call scenario


Call setup

Call management

The VLR will check for call barring conditions, such as the UE being
barred from making specific outgoing calls (for example international
calls), or possibly if some supplementary services are active which
prevent the call from being granted. If the VLR determines that the
call cannot be processed, the VLR will provide the reason to the
3G-MSC. In this scenario, well assume that this procedure is
successful. The VLR returns a message to the 3G-MSC containing the
service parameters for the particular subscriber.
............................................................................................................................................................

After analyzing and determining the validity of the dialed digits, the
3G-MSC informs the UE that the call is proceeding.
............................................................................................................................................................

For allocating the necessary air-interface capacity, the 3G-MSC


requests the RNC to setup the Radio Access Bearer (RAB) for the
UE.
............................................................................................................................................................

To allocate the necessary Iu-interface capacity, the 3G-MSC and the


RNC will setup a ATM bearer for the UE.
............................................................................................................................................................

The RNC activates the downlink DCH bearer and sends a RAB setup
message to inform the UE that a new bearer channel is available.
............................................................................................................................................................

The UE tunes to the new assigned bearer and acknowledges this to


the RNC.
............................................................................................................................................................

The RNC informs the 3G-MSC that the RAB has been setup.
............................................................................................................................................................

The 3G-MSC sends a network setup message to the PSTN requesting


that a call should be setup. Included in the message are the UE dialed
digits (DD) and details specifying which trunk should be used for the
call.
............................................................................................................................................................

The PSTN may involve several switching exchanges before finally


reaching the final local exchange. The final exchange will generate the
ringing tone over the trunk, or series of trunks (if several intermediate
switching exchanges are involved), to the UE. The PSTN notifies the
3G-MSC with a network alerting message when this event occurs.

....................................................................................................................................................................................................................................

5-12

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Mobile-to-land call scenario


Call setup

Call management

............................................................................................................................................................

10

The 3G-MSC informs the UE that the destination number is being


alerted. Note, this is primarily a status message to the UE. The UE
will hear a ringing tone from the destination local exchange through
the established voice path.
............................................................................................................................................................

11

When the destination party goes off-hook, the PSTN informs the
3G-MSC of this event. This event usually triggers the beginning of
billing. At this point, the UE will be connected to the destination
party.
............................................................................................................................................................

12

The 3G-MSC informs the UE that the connection has been


established.
............................................................................................................................................................

13

The UE acknowledges the receipt of the connect message.


Important! In the messages flow some of the displayed messages are
not named by their correct name. This is deliberately done to make
the flow less complex and therefore better understandable.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-13

Mobile-to-land call scenario

Call management

Call
release phase (UE initiated)
....................................................................................................................................................................................................................................
Introduction

Under normal conditions, the termination of a call is performed either


by the UE or by the called party (in this case: network initiated). In
this scenario, well assume that the UE initiates the release of the call.

Message flow

The following figure shows the different messages sent during the call
release phase:

Message flow description

The following provides a description for each message sent in the call
release phase:
............................................................................................................................................................

The mobile user initiates the release of the call by pressing the end
button (the button might be labeled with a different term) on the UE.
As a result of this, the UE sends a Disconnect message to the
3G-MSC.

....................................................................................................................................................................................................................................

5-14

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Mobile-to-land call scenario


Call release phase (UE initiated)

Call management

............................................................................................................................................................

The B-party (in this case the PSTN party) is notified of the
termination of the call by a Release message from the 3G-MSC. The
end-to-end connection is terminated.
............................................................................................................................................................

When the 3G-MSC determines that the call has no more reason to
exist (no side tasks to complete, for example: charging indication) a
Release message is sent to the UE.
............................................................................................................................................................

The UE acknowledges the call release by replying with a release


complete message.
............................................................................................................................................................

The 3G-MSC requests the RNC to release the RAB by sending a


RAB assignment request message, with the instruction to release the
connection.
............................................................................................................................................................

The ATM connection between the 3G-MSC and the RNC is released.
............................................................................................................................................................

The RNC informs the UE that the RAB on the air-interface will be
released.
............................................................................................................................................................

This is acknowledged by the UE by sending the RAB release


complete message
............................................................................................................................................................

Finally the RNC informs the 3G-MSC that the RAB on the
air-interface is released by sending the RAB assignment complete
message.
Important! In the messages flow some of the displayed messages are
not named by their correct name. This is deliberately done to make
the flow less complex and therefore better understandable.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-15

Call management

Land-to-mobile call
Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After competing this topic, you will be able to:

List the stages that are encountered in a land-to-mobile call

State which messages are sent in each call stage.

This topic contains the following:


Land-to-mobile call stages

5-17

Routing analysis

5-20

Paging

5-22

Authentication and ciphering

5-24

Equipment validation

5-25

Call setup

5-26

Call release (network initiated)

5-29

....................................................................................................................................................................................................................................

5-16

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Land-to-mobile call

Call management

Land-to-mobile
call stages
....................................................................................................................................................................................................................................
Introduction

Due to the amount of messages sent to setup and disconnect a


land-to-mobile call, the call flow in this topic is explained by dividing
the call into a number of stages.
The following figure shows the different land-to-mobile call stages:

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-17

Land-to-mobile call
Land-to-mobile call stages

Call management

Stages

The following gives the different stages that are encountered during a
land-to-mobile call:
............................................................................................................................................................

Routing analysis:

The UE terminated call is routed to the


visited 3G-MSC using information from the
HLR and VLR.

............................................................................................................................................................

Paging:

The 3G-MSC initiates a communication


with the UE.

............................................................................................................................................................

Authentication:

The 3G-MSC/VLR requests the AUC for


authentication parameters. Using these
parameters the UE is authenticated.

............................................................................................................................................................

Ciphering:

Using the parameters which were made


available earlier during the authentication
the uplink and the downlink are ciphered.

............................................................................................................................................................

Equipment
validation:

The 3G-MSC/VLR requests the EIR to


check the IMEI for validity.

....................................................................................................................................................................................................................................

5-18

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Land-to-mobile call
Land-to-mobile call stages

Call management

............................................................................................................................................................

Call setup:

Using the RNC, and the 3G-MSC the


speech path is setup (during the routing
analysis phase the speech path between the
PSTN, the 3G-GMSC and the 3G-MSC
already has been created).

............................................................................................................................................................

Call release:

The speech path is released.

Important! The authentication, ciphering and equipment validation


phases are optional. The service provider may decide that some of
these phases might not take place.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-19

Land-to-mobile call

Call management

Routing
analysis
....................................................................................................................................................................................................................................
Introduction

In the following scenario it is assumed that the UE is already


registered with the system and has been allocated a Temporary Mobile
Identity Number (TMSI).
In this scenario, the land subscriber dials the directory number of a
mobile subscriber and with the result that the call enters the UMTS
network via a Gateway 3G-MSC (3G-GMSC).

Message flow

The following figure shows the different messages sent during the
routing analysis phase:

Message flow description

The following provides a description for each message sent in the


routing analysis phase:
............................................................................................................................................................

The PSTN routes the call to the 3G-GMSC that is serving this
directory number. The number is routed to the 3G-MSC based on the
Mobile Subscriber ISDN number (MSISDN).
............................................................................................................................................................

The 3G-GMSC, not knowing the location of the UE, sends a message
(including the MSISDN) to the HLR, requesting location information
of this subscriber.

....................................................................................................................................................................................................................................

5-20

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Land-to-mobile call
Routing analysis

Call management

............................................................................................................................................................

The HLR knows the location of the UE and the address of the serving
VLR. The HLR will request the VLR to provide routing information
for this UE.
............................................................................................................................................................

The VLR returns a directory number where the UE can be reached to


the HLR (the MS Roaming Number (MSRN)).
............................................................................................................................................................

The HLR forwards the roaming number to the 3G-GMSC.


............................................................................................................................................................

Using the MSRN, the call is routed from the 3G-GMSC to the visited
3G-MSC.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-21

Land-to-mobile call

Call management

Paging
....................................................................................................................................................................................................................................
Introduction

At the moment that the 3G-MSC receives a call with a dialed number
equal to a MSRN, the 3G-MSC will request the VLR to provide
information about the UE.
In the UMTS network it is possible that one UE has multiple
connections active at the same time, and therefore it can occur that a
UE can be paged when a connection is already available. In this
scenario, it is assumed that the UE did not have a connection active
and therefore should be paged using the Paging Channel (PCH).

Message flow

The following figure shows the different messages sent during the
paging phase:

Message flow description

The following provides a description for each message sent in the


paging phase:
............................................................................................................................................................

The 3G-MSC uses the location area identity, provided by the VLR, to
determine which RNCs should page the UE. The 3G-MSC transmits a
message to each of these RNCs requesting that a page be performed.
Included in the message is the TMSI (preferred), or the IMSI of the
UE.

....................................................................................................................................................................................................................................

5-22

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Land-to-mobile call
Paging

Call management

............................................................................................................................................................

Each of the RNCs broadcasts the TMSI/IMSI of the mobile in a page


message on the PCH.
............................................................................................................................................................

After detecting its TMSI/IMSI in a paging message, the UE responds


with a connection request message. The message is sent to the serving
RNC using the Random Access Channel (RACH).
............................................................................................................................................................

The RNC that receives the connection request message, allocates a


DCH and forwards this channel assignment information to the UE
over the Forward Access Channel (FACH).
............................................................................................................................................................

The UE transmits a page response message to the RNC over the


DCH. Included in this message is the UE TMSI/IMSI and the
Location Area Identification (LAI).
............................................................................................................................................................

The RNC forwards the page response message to the 3G-MSC.


Important! In the messages flow some of the displayed messages are
not named by their correct name. This is deliberately done to make
the flow less complex and therefore better understandable.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-23

Land-to-mobile call

Call management

Authentication
and ciphering
....................................................................................................................................................................................................................................
Introduction

The Authentication and ciphering phases that might be performed are


the same as seen before in the location update scenarios and therefore
not further discussed.

....................................................................................................................................................................................................................................

5-24

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Land-to-mobile call

Call management

Equipment
validation
....................................................................................................................................................................................................................................
Introduction

The Equipment validation phase is done in the same way as in the


mobile-to-land scenario and therefore not further discussed.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-25

Land-to-mobile call

Call management

Call
setup
....................................................................................................................................................................................................................................
Introduction

After the UE is authenticated, ciphered and the terminal identity is


checked, the call setup is performed.

Message flow

The following figure shows the different messages sent during the call
setup phase:

Message flow description

The following provides a description for each message sent in the call
setup phase:
............................................................................................................................................................

After the 3G-MSC has checked the UE identity, the 3G-MSC sends a
call setup message to the UE informing that a call should be setup.
............................................................................................................................................................

The UE, upon receiving a setup message, performs compatibility


checking before responding to the message (it is possible that the UE

....................................................................................................................................................................................................................................

5-26

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Land-to-mobile call
Call setup

Call management

might be incompatible for certain types of call setups). Assuming that


the UE passes compatibility checking, it acknowledges the call setup
with a call setup acknowledge message.
............................................................................................................................................................

For allocating the necessary air-interface capacity, the 3G-MSC


requests the RNC to setup the Radio Access Bearer (RAB) for the
UE.
............................................................................................................................................................

To allocate the necessary Iu-interface capacity, the 3G-MSC and the


RNC will setup a ATM bearer for the UE.
............................................................................................................................................................

The RNC activates the downlink DCH bearer and sends a RAB setup
message to inform the UE that a new bearer is available.
............................................................................................................................................................

The UE tunes to the new assigned bearer and acknowledges this to


the RNC.
............................................................................................................................................................

The RNC informs the 3G-MSC that the RAB has been setup.
............................................................................................................................................................

The UE will begin alerting the user after it receives the RAB. Once
audible alerting has started, the UE confirms this by sending an
alerting message to the 3G-MSC.
............................................................................................................................................................

The 3G-MSC, upon receiving an alerting message from the UE, starts
generating audible ringing to the calling party and sends a network
alerting via the 3G-GMSC to the PSTN. Prior to this point, the calling
party heard silence.
At this point in the call, the UE is alerting the called party by
generating an audible tone to the calling party. One of three events
can occur: calling party hangs-up, mobile subscriber answers the
phone, or the 3G-MSC times-out waiting for the mobile subscriber to
answer. Since a RAB is a valuable resource, UMTS does not allow a
UE to ring forever.
............................................................................................................................................................

10

In this scenario, it is assumed that the mobile subscriber answers the


phone. The UE, in response to this action stops alerting and sends a
connect message to the 3G-MSC.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-27

Land-to-mobile call
Call setup

Call management

............................................................................................................................................................

11

The 3G-MSC removes audible ringing to the PSTN and connects the
PSTN trunk to the RNC ATM channel. To indicate this to the remote
side, the 3G-MSC sends a connect message to the originating
exchange in the PSTN. The caller and called party now have a active
speech path.
In the originating PSTN exchange the reception of connect message
typically denotes the beginning of the billing process.
............................................................................................................................................................

12

The 3G-MSC sends the UE a connect acknowledgment message.


Important! In the messages flow some of the displayed messages are
not named by their correct name. This is deliberately done to make
the flow less complex and therefore better understandable.

....................................................................................................................................................................................................................................

5-28

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Land-to-mobile call

Call management

Call
release (network initiated)
....................................................................................................................................................................................................................................
Introduction

Message flow

Message flow description

Under normal conditions, the termination of a call is performed either


by the UE or by the called party (in this case: network initiated). In
this scenario, well assume that the called party (the network) initiates
the release of the call.
The following figure shows the different messages sent during the
network originated call release phase:

The following provides a description for each message sent in the call
release phase:
............................................................................................................................................................

The 3G-MSC receives a release message from the network to


terminate the end-to-end connection.
............................................................................................................................................................

This causes the sending of a disconnect message towards the UE.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-29

Land-to-mobile call
Call release (network initiated)

Call management

............................................................................................................................................................

The UE answers by a release message, which results that the 3G-MSC


releases the connection to the PSTN.
............................................................................................................................................................

The 3G-MSC acknowledges the call release to the UE by sending a


release complete message.
............................................................................................................................................................

The 3G-MSC requests the RNC to release the RAB by sending a


RAB assignment request message, with the instruction to release the
connection.
............................................................................................................................................................

The ATM connection between the 3G-MSC and the RNC is released.
............................................................................................................................................................

The RNC informs the UE that the RAB on the air-interface will be
released.
............................................................................................................................................................

This is acknowledged by the UE by sending the RAB release


complete message.
Important! In the messages flow some of the displayed messages are
not named by their correct name. This is deliberately done to make
the flow less complex and therefore better understandable.

....................................................................................................................................................................................................................................

5-30

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Call management

Mobile-to-mobile call scenario


Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After competing this topic you will be able to:

List the stages that are encountered in a mobile-to-mobile call

State which messages are sent in each call stage.

This topic contains the following:


Mobile-to-mobile call

5-32

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-31

Mobile-to-mobile call scenario

Call management

Mobile-to-mobile
call
....................................................................................................................................................................................................................................
Phases of a
mobile-to-mobile call

The mobile-to-mobile call is established using the same phases as


explained for the mobile-to-land and the land-to-mobile calls.
The mobile-to-mobile call phases can be subdivided in two parts:

Originating mobile part

The originating mobile part where the phases are the same as
those of a mobile-to-land call, except that the call setup phase is
partially performed. Which means that only the call setup with
mobile is done

The terminating mobile part consist of the same phases as the


land-to-mobile call scenario except again that the call setup phase
performs only the call setup with mobile.

The phases of an originating mobile are:


............................................................................................................................................................

Request for service.


............................................................................................................................................................

Authentication (optional).
............................................................................................................................................................

Ciphering (optional).
............................................................................................................................................................

Equipment validation (optional).


............................................................................................................................................................

Call setup.
............................................................................................................................................................

6
Terminating mobile part

Release.
The phases of a terminating mobile are:
............................................................................................................................................................

Routing analysis.
............................................................................................................................................................

Paging.
............................................................................................................................................................

Authentication (optional).
............................................................................................................................................................

Ciphering (optional).

....................................................................................................................................................................................................................................

5-32

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Mobile-to-mobile call scenario


Mobile-to-mobile call

Call management

............................................................................................................................................................

Equipment validation (optional).


............................................................................................................................................................

Call setup.
............................................................................................................................................................

Release.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

5-33

Radio resource management

Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this chapter, you will be able to:

Name the differences between open loop and closed loop power
control

List the two closed loop power control types and list their
differences

Name the three different handover types

State the differences between the three different handover types.

This chapter contains the following topics:


Power control

6-2

Handover control

6-10

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

6-1

Radio resource management

Power control
Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this topic, you will be able to:

Name the parameters used by the UE to perform open loop


power control

State how the quality of the air-interface interacts with closed


loop power control

State how the signal to noise ratio of the air-interface interacts


with closed loop power control

Name the solutions that can be taken if the power can not be
increased anymore, by the closed loop power control process.

This topic contains the following:


Introduction

6-3

Open loop

6-5

Closed loop

6-7

Power control overload

6-9

....................................................................................................................................................................................................................................

6-2

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Power control

Radio resource management

Introduction
....................................................................................................................................................................................................................................
Description

Power Control enables the UE and/or the BTS to increase or decrease


the transmission power for the up and downlink air-interface
connection.
Power control is mainly performed for the following reasons:

UTRAN signals

Keep the QoS (data rate, delay, BER) within the required limits

Generated as little interference as possible for the other users

Save battery power for the UE.

In the UMTS Terrestrial Radio Access Network (UTRAN) a big


number of mobile stations use the same frequency band at the same
time for their data transfer. At the receiving side a mixture of all the
transmitted signals is received and the information of each UE must
be decoded.

Interference

Due to the characteristics of the W-CDMA air-interface the signals


transmitted for and by each mobile station will be seen as background
noise/interference for the signal of each other mobile station.

Noise level

If in a cell the signal of one mobile station is very powerful compared


to the signal of an other mobile, it could occur that the signal of
weaker mobiles disappears in the noise generated by the powerful
mobile.

Power overload

By increasing the transmit power of the weaker mobile, the signal will
be made recognizable again generated noise. The difficult part of
power control in W-CDMA is that due to the increasing power of the
weaker mobile, it is possible that the power of other mobiles also
need to be increased. This will result that the total noise level in the
cell will increase, and probably the power level of the most powerful
mobile needs to be increased again.
This will finally result that (if no extra precautions are taken) each
mobile will transmit at it maximum power, and almost none of these
signals are decodable (power overload).

Bit error rate

After a message is received and the contents has been decoded, the
UE and the RNC estimate the Bit Error Rate (BER) for the message.
If the BER is to high, the transmit power of the sending side should
be increased. If the BER is less than necessary, the transmit power at
the sending side may be decreased.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

6-3

Power control
Introduction

Radio resource management

Power control

The power control process in the UTRAN is a very difficult and


precise task. If the process is not performed correct, this could cause
that the data of a number of mobiles is lost and that for other mobiles
the BER would be to good.
Because of the complexity, the power used by the UE and the Node B
is controlled using the following processes:

Open loop power control

Closed loop power control:


-

Inner loop

Outer loop.

In the following topics the power control processes are discussed in


more detail.

....................................................................................................................................................................................................................................

6-4

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Power control

Radio resource management

Open
loop
....................................................................................................................................................................................................................................
Introduction

Loop parameters

Connection setup

Preamble messages

Open loop power control is performed by the UE when a message


needs to be sent over the Physical Random Access Channel (PRACH)
for one of the following reasons:

Requesting a RCC connection

Sending small packets of data (when no periodic measurements


for a closed loop operation are available).

The following open loop parameters are provided by the network to


the UE:

The initial preamble power used by the UE (for example:


interference and path loss)

The preamble power ramp step

The maximum number of preamble retransmissions.

At the moment that an UE wants to setup a connection, it uses the


random access procedure to indicate this to the Node B with the
strongest signal. To determine the amount of power that should be
used for the transmission of the initial message, the UE will use the
loop data provided by the network.
Before sending the actual data over the PRACH the UE will send a
number of preamble messages with an increasing power, to determine
if the Node B can be reached.
Important! To reduce the interference/noise in the network, the
preamble message is not sent directly at the maximum allowed power
in the cell, but will slowly be ramped to this level.

Power increment

After sending a preamble message the UE will listen for a specified


time to the Acquisition Indication Channel (AICH) if the Node B has
received the message. After sending the first preamble message, the
following can occur:
1.

The Node B did receive the message and returned a AICH


message. The UE will use the transmission power indicated in
the AICH for the transmission of the actual data block.

2.

The Node B did not receive the preamble message and therefore
the UE will not receive an AICH message. After a predifined
time, the preamble message is retransmitted using more power.

These two steps are repeated until the maximum number of preamble
transmissions is reached.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

6-5

Power control
Open loop

Preamble example

Radio resource management

The following figure shows how the open loop power control process
is used on the PRACH to determine and adjust the amount of transmit
power.

....................................................................................................................................................................................................................................

6-6

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Power control

Radio resource management

Closed
loop
....................................................................................................................................................................................................................................
Introduction

Closed loop power control is performed by the UE and the Node B


under control of the RNC. The closed loop process is used whenever
the RNC has a connection with the UE.
Note that per UE only one closed loop process is performed and is
independent of the number of radio access bearers used by the UE.

Closed loop

Signal to noise ratio

Bit error rate

For this type of power control the word closed loop is used, because:

The Node B will report the quality of the air interface to the
RNC (loop)

From the reported data the RNC determines the power control
characteristics that must be used by the Node B (closed).

Due to fading effects (for example: Rayleigh fading, shadowing) and


the interference of the other UEs in the frequency band, the signal to
noise ratio of a UE connection will vary very quickly in time.
Because of these rapid changes, the UE and the Node B must also
adjust their transmit power as often as possible.
Due to changing environment (multipath, UE speed) the BER of the
UE may be affected even while the signal to noise ratio has a constant
value.
Due to the slower characteristics of the BER changes, the transmit
power does not have to be adjusted for BER corrections as often as
for the signal to noise ratio power corrections.

Interactions

Closed loop types

Logically the power changes that are made to increase the signal to
noise ratio, will also influence the BER and visa versa. But due to the
importance of the quality of the signal, the BER is the leading factor
in the power control process.
In the closed loop power control process, the changes made to the
transmit power to adjust the signal to noise ratio is called Inner Loop
Power Control (ILPC). Changes made due to the BER are called
Outer Loop Power Control (OLPC).

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

6-7

Power control
Closed loop

ILPC and OLPC

Radio resource management

The following figure shows how the ILPC and OLPC power
management processes are related to each other:

In the closed loop power control process the following steps occur:

Maximum transmit power

1.

Up to 100 times a second, the Node B measurements are


forwarded to the RNC. From these measurements the RNC
determines the quality (BER, delay) of the air-interface.

2.

Using the outer loop power control the RNC determines if the
signal to noise ratio of this connection must be adjusted, or
should remain unchanged.

3.

1500 Times a second, the Node B estimates the signal to noise


ratio for this connection. Every time inner loop power control
compares the estimated signal to noise ratio to the target signal to
noise ratio that has been determined by the outer loop process.

4.

If the signal to noise ratio is lower than the target value the
power is decreased. If it is higher than the target value, the
power is decreased.

To assure that the UE will not increment its transmit power until the
maximum power of the UE is reached, the RNC can dynamically
adjust the maximum power that may be used by the UE for this
connection.

....................................................................................................................................................................................................................................

6-8

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Power control

Radio resource management

Power
control overload
....................................................................................................................................................................................................................................
Power control overload
functions

Call admission control

Congestion control

Solutions

In UMTS there are two main functions, which handle the power
control overload problem:

Call Admission Control

Congestion Control.

Call admission control is used to admit or deny new users, new radio
access bearers or new radio links. It must avoid overload situations
and decrease decisions on interference and resource measurements.
Congestion control is used to monitor, detect and handle situations
when the system is becoming overloaded or getting close to an
overload situation with the connected users. The congestion control
should then bring the system back to a stable state as seamless as
possible.
If the RNC determines that the power control process cannot solve the
quality problems of the connection, it can use the following solutions:

Decrease the data rate of the connection that generates the most
interference

Allow longer delays

Perform a intra-frequency handover for the UE that has a bad


quality

Perform a inter-frequency handover for the UE that generates the


most interference

Interrupt an existing call.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

6-9

Radio resource management

Handover control
Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this topic, you will be able to:

Name the three different handover types

State how the RNC determines that a handover should be


performed

Name the messages that are sent to perform a hard handover

Name the message that are used to perform a soft-handover.

This topic contains the following:


Introduction

6-11

Soft handover

6-12

Soft handover flow

6-13

Hard handover

6-16

Hard handover flow

6-17

Softer handover

6-15

....................................................................................................................................................................................................................................

6-10

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Handover control

Radio resource management

Introduction
....................................................................................................................................................................................................................................
Handover

Measurements

Downlink measurements

Uplink measurements

Handover process

Handover types

In the UTRAN handovers can be performed due to following reasons:

If nothing is done, the connection with the UE will be lost

The UE generates to much interference in the current cell(s)

The distance between the UE and the Node B

The speed of the UE.

Using the measurements that are provided by the UE and the Node Bs
to which the UE is connected, the SRNC determines if a handover
should be performed.
The UE will report the following data about the downlink signal:

The received pilot signal strengths (current and neighboring cells)

Estimated bit error rate on the transport channel

Timing measurements

The signal to noise ratio

Total downlink received power.

Each Node B will report the following data about the uplink signal to
the RNC:

The bit error rate

The signal to noise ratio

Received signal strength

Timing characteristics.

Using the reported measurements the handover process in the RNC


determines if, and to which of the reported neighboring cells the
handover needs to be performed.
Depending on the reported measurements the following handover
types are possible:

A soft handover

A softer handover.

A hard handover.

In the following topics, these three handover types are discussed in


more detail.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

6-11

Handover control

Radio resource management

Soft
handover
....................................................................................................................................................................................................................................
Frequency reuse

Because the UMTS network uses the W-CDMA air-interface, it is


possible for one mobile station to have an active connection with
more than one Node B at the same time. (Note that this is only
possible if in the neighboring cell the same frequency is used as in the
serving cell.)
If an UE signal is received by more than one radio, the RNC will
combine the available signals and forwards it to the core network. If
the UE receives more than one signal, it also combines the signals
available.

Soft handover description

A soft handover is performed when the signal level of a neighboring


Node B (using the same frequency as the serving cell), rises above a
predefined threshold. The Serving RNC (SRNC) will then add an
extra radio connection between the UE and the SRNC using the new
Node B.
If the signal level of one of the serving cells drops below a predefined
threshold the SRNC can also decide to delete the radio link. Note that
the deletion of a link is also a part of the soft handover process.

Advantage

The soft handover has the following advantages:

The data transmission from and to the UE will not be interrupted


at the moment of the handover. After a notification, the UE will
suddenly receive its information from more than one Node B,
and more than one Node B will be decoding the data transmitted
by the UE.

The RNC and the UE will receive their information via multiple
connections. Of these signals the best signal can be selected.

Connection maximum

Although it is possible that the UE has a connection with more than


four Node Bs at the same time, the number of Node B connections is
preferably limited to four.

Drift RNC

If the UE reports a strong signal from a Node B that is connected to


another RNC, the SRNC can request the remote RNC to setup a
connection to the UE. The remote RNC and Node B are used for
forwarding the information between the UE and the SRNC by means
of the Iur-interface. In the UMTS documentation the remote RNC is
referred to as the Drift RNC (DRNC).

....................................................................................................................................................................................................................................

6-12

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Handover control

Radio resource management

Soft
handover flow
....................................................................................................................................................................................................................................
Message flow

Message flow description

The following figure shows the deletion of a radio link belonging to a


Node B controlled by another RNC than the SRNC:

The following provides a description for each message sent:


............................................................................................................................................................

The SRNC decides to remove a radio link connected to a DRNC. The


SRNC sends a message Active Set Update (Radio Link Deletion) to
the UE on the DCCH.
............................................................................................................................................................

The UE deactivates downlink reception via an old branch, and


acknowledges with a message Active Set Update Complete.
............................................................................................................................................................

The SRNC requests the DRNC to deallocate radio resources by


sending a message Radio Link Deletion.
............................................................................................................................................................

The DRNC sends a message Radio Link Deletion to Node B.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

6-13

Handover control
Soft handover flow

Radio resource management

............................................................................................................................................................

Node B de-allocates radio resources. Successful outcome is reported


in a message Radio Link Deletion Response.
............................................................................................................................................................

The DRNC sends a message Radio Link Deletion Response to the


SRNC.
............................................................................................................................................................

The SRNC initiates release of an Iur/Iub Data Transport Bearer using


the ALCAP protocol.

....................................................................................................................................................................................................................................

6-14

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Handover control

Radio resource management

Softer
handover
....................................................................................................................................................................................................................................
Description

Difference with soft


handover

In the UMTS network it is also possible to handover an UE to a Node


B which is covering the same cell as the serving Node B. This
situation occurs, when in a cell a number of radios are used, each
serving a dedicated part of the cell (sectorized cell).
The softer handover is almost similar to the soft handover. The
difference between these handover types is that power management
and timing values of the UE will remain unchanged, because the new
Node B is mounted at the same location as the serving Node B.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

6-15

Handover control

Radio resource management

Hard
handover
....................................................................................................................................................................................................................................
Description

A hard handover allows the SRNC to handover the UE connection to


the same or a different UMTS carrier frequency, or even to a carrier
of the GSM network.
A hard handover is performed when one of the following conditions
occur:

Transmission interruption

The present quality of the radio link has gone below a certain
threshold and that the perceived quality of another frequency is
such that it is better to continue the connection on the new
frequency

The signal to noise ratio of the cell is so poor that UE(s) which
causes the most interference must be handed over to another
frequency to increase the air interface quality.

For packet switched services with high data rate it is possible to


use a hard handover in order to save air capacity.

Note that at the moment that the hard handover is performed, the
transmission of the data is shortly interrupted.

....................................................................................................................................................................................................................................

6-16

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Handover control

Radio resource management

Hard
handover flow
....................................................................................................................................................................................................................................
Message flow

Message flow description

The following figure shows an example of a hard handover via the


Iurinterface, when the mobile is in DCH state:

The following provides a description for each message sent:


............................................................................................................................................................

The SRNC sends a Radio Link Setup Request message to the target
RNC.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

6-17

Handover control
Hard handover flow

Radio resource management

Note: This message is not necessary when the target RNC is the
SRNC.
............................................................................................................................................................

The target RNC allocates a Radio Network Temporary Identity


(RNTI) and radio resources for the RRC connection (if possible), and
sends a message Radio Link Setup to the target Node B.
............................................................................................................................................................

Node B allocates resources, starts physical layer reception, and


responses with a message Radio Link Setup Response.
............................................................................................................................................................

The target RNC initiates setup of an Iub Data Transport Bearer using
the ALCAP protocol. This request binds the Iub Data Transport Bearer
to a DCH. The request for setup of Iub Data Transport bearer is
acknowledged by Node B.
............................................................................................................................................................

When the Target RNC has completed the preparation phase, a Radio
Link Setup Response is sent to the SRNC.
Note: This message is not necessary when the target RNC is the
SRNC.
............................................................................................................................................................

The SRNC initiates setup of an Iur Data Transport Bearer using the
ALCAP protocol. The request for setup of Iur Data Transport Bearer
is acknowledged by the target RNC.
Note: This message is not necessary when the target RNC is the
SRNC.
............................................................................................................................................................

The SRNC sends a message Handover Command to the UE.


............................................................................................................................................................

When the RRC connection is established with the target RNC and
necessary radio resources have been allocated the UE sends a message
Handover Complete to the SRNC.
............................................................................................................................................................

The SRNC sends a message Radio Link Deletion to the source RNC.
Note: This message is not necessary when the source RNC is the
SRNC.
............................................................................................................................................................

10

The source RNC sends a message Radio Link Deletion to the source
Node B.

....................................................................................................................................................................................................................................

6-18

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Handover control
Hard handover flow

Radio resource management

............................................................................................................................................................

11

The source Node B de-allocates radio resources. Successful outcome


is reported in a message Radio Link Deletion Response.
............................................................................................................................................................

12

The source RNC initiates the release of Iub Data Transport Bearer
using the ALCAP protocol.
............................................................................................................................................................

13

When the source RNC has completed the release a message Radio
Link Deletion Response is sent to the SRNC.
Note: This message is not necessary when the source RNC is the
SRNC.
............................................................................................................................................................

14

The SRNC initiates release of the Iur Data Transport Bearer using
ALCAP protocol. The request for release of Iur Data Transport Bearer
is acknowledged by the source RNC.
Note: This message is not necessary when the source RNC is the
SRNC.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

6-19

UMTS services

Overview
....................................................................................................................................................................................................................................
Objectives

Contents

After completing this chapter, you will be able to:

List the three key differences between the GSM and UMTS
service concept

List the components of the Virtual Home Environment

Draw a diagram showing the components of the Open Services


Architecture

List the bearer capabilities of UMTS

List the teleservice capabilities of UMTS

Identify the supplementary services inherited from GSM

Name an example of a multimedia service.

This chapter contains the following topics:


UMTS services concept

7-2

Bearer capabilities

7-13

Teleservices

7-17

Supplementary and multimedia services

7-23

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-1

UMTS services

UMTS services concept


Overview
....................................................................................................................................................................................................................................
Objectives

After completing this topic, you will be able to:

List three important differences between the GSM and UMTS


service concept

Explain what is meant by the Virtual Home Environment

List the tools/platforms which enable the Virtual Home


Environment to be provided

Draw a model of the components of the Open Services


Architecture.

This topic contains the following:


Comparing UMTS to GSM

7-3

Virtual Home Environment

7-5

Open Services Architecture

7-9

Service providers

7-11

Phased UMTS service evolution

7-12

....................................................................................................................................................................................................................................

7-2

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS services concept

UMTS services

Comparing
UMTS to GSM
....................................................................................................................................................................................................................................
Service objectives

GSM comparison

Global service availability

UMTS is driven by the following objectives:

User bandwidth on demand (8 kbits/s to 2 Mbits/s) to support


interactive and customized mobile multimedia services

Rapid and low-cost service creation and service deployment

Seamless service availability across service provider networks

Integration of fixed and mobile network services

Service differentiation by service providers.

The key differences are:

Global service availability outside the users home environment

Separation of services from the network

International telecommunications standards specify the


capabilities of bearers and services not the services themselves.

The aim of UMTS is to harmonize global standards within the


IMT-2000 framework so that services are available globally (subject to
terminal and network restrictions and commercial agreements).
It should be possible for a UMTS user to access the same services
when roaming in another network or when using a different terminal.
However, different radio access environments may give rise to
differences in quality of service.
By providing every user with a Virtual Home Environment (VHE),
which can be accessed when the user is roaming, services can be
provided seamlessly across UMTS networks.

Separation of services
from the network

UMTS uses an Open Services Architecture (OSA) built on using


standardized Application Programming Interfaces (APIs) and
standardized protocols.
OSA, through the API, provides an abstracted view of the underlying
network technology. It is this abstraction that enables seamless
services to be provided.
The OSA concept was introduced in GSM.

Specifications

In UMTS the capabilities of a service using the OSA are defined.


3GPP specifications, unlike ETSI GSM specifications, do not specify
the exact way a service should operate or the functionality it should
offer. The capability definition includes how UMTS elements

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-3

UMTS services concept


Comparing UMTS to GSM

UMTS services

communicate, how data is stored and what quality of service levels


are required. This applies particularly to the second phase of UMTS
deployment, in which a marked trend towards all-IP networks is
forseen.
For supplementary services using circuit and packet-switched
domains, the UMTS specifications follow the same structure as in
GSM and define how a service functions, interacts and how the user
interfaces with the service.
The 3GPP standards relating to services are:
Specification series

Specifies ...

21

Requirements towards other specifications.

22

Services, service features and building


blocks or platforms.

23

Technical implementation.

24

Signaling protocols between user equipment


and core network.

29

Signaling protocols

For example, the following specifications define the Multicall


supplementary service:

Service differentiation

Technical specification

Specifies ...

3G TS 21.135

Multicall, Service Description, Stage


1

3G TS 23.135

Multicall Supplementary Service,


Stage 2

3G TS 24.135

Multicall Supplementary Service,


Stage 3

Based on the 3GPP specifications, service providers can offer


value-added services to users which can be quite different from each
other or from those offered by another service provider.

....................................................................................................................................................................................................................................

7-4

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS services concept

UMTS services

Virtual
Home Environment
....................................................................................................................................................................................................................................
Concept

The Virtual Home Environment (VHE) is a new telecommunications


concept. The vision is that a user can access personalized services
with the same look and feel from any location and from any
terminal (provided the network and terminal are able to offer the
service).
When the user is connected to their home network, the user has
access to the home environment. When the user is connected to
another UMTS network (serving network), the user has access to the
Virtual Home Environment:

Home environment

The home environment is responsible for:

User profile and VHE management

User authentication

Billing

UMTS SIM management.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-5

UMTS services concept


Virtual Home Environment

UMTS services

The home environment provides information about the user and the
VHE to the serving network.
The home environment does not have to be provided by a network
in the physical sense. For example, the user of a car-mounted
information system using UMTS technology may have a home
environment which is a company offering only this kind of
information service.
Each user is identified by a unique MSISDN, which is portable across
networks. Each subscriber has a unique and intelligent UMTS IC
card containing application information. The USIM is an application
on this card.
User profile

Each user has one or more user profiles containing information about
their services and preferences. A user can have more than one profile
active at a time. For example, the user may have one business profile
and one personal profile.
The user can select the profile to be used for incoming and outgoing
calls. For example, all incoming calls during office hours are directed
to a business number, all incoming calls outside office hours are
directed to a personal number.
Profiles are stored in the home environment of the user and are
communicated to the serving network.

Serving network

Service toolkits/enablers

The network in which the user is roaming controls the services


available to the user in that network. The serving network provides
the core service capability to the user. For example, the user with a
car-mounted information system driving across national boundaries
may access services provided by several serving networks.
The standardized tools and enabling technologies used to offer the
VHE are:

Customized Applications for Mobile Enhanced Logic (CAMEL)

Mobile station Execution Environment (MExE) (including


Wireless Application Protocol)

SIM Application Toolkit (SAT).

These toolkits and platform enablers are already available in 2G


GSM.
CAMEL

CAMEL provides Intelligent Network (IN) capabilities for mobile


networks. CAMEL is already widely deployed in GSM networks to
offer enhanced services.

....................................................................................................................................................................................................................................

7-6

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS services concept


Virtual Home Environment

UMTS services

The role of CAMEL is to provide services to mobile users in their


home network and when roaming in another GSM/UMTS network.
CAMEL provides standardized non-propriatory service environments.
For example, CAMEL plays a key role in offering Virtual Private
Network and PrePaid services.
The functionality supported by CAMEL is being introduced in phases:

Mobile station Execution


Environment (MExE)

Phase

Functionality

CAMEL phase 1

Basic capabilities introduced for GSM,


including any time interrogation and
support of originating and terminating
calls.

CAMEL phase 2

With the introduction of more detection


points, a fuller IN service for GSM is
available. Support for operator-specific
services.

CAMEL phase 3

Support for UMTS Virtual Home


Environment (mobility management, Short
Message Service charging and mid-call
triggering).

The purpose of MExE is to provide an open environment for the


downloading of information to the user terminal. The information
includes applications, applets and content.
MExE enables the following to be provided to the UE user:

Feature-rich user environment, such as menus, browser


capabilities, softkeys and icons

Personalization of services and interfaces

Interface for accessing internet and intranet provided applications


and applets

Ability to manage applications in terms of versioning, saving,


deleting and so forth.

MExE provides the service provider with the following:

Support for services available to UEs of a particular class across


networks

Ability to offer application update on user request.

The operating system or execution environment used is chosen by the


service provider.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-7

UMTS services concept


Virtual Home Environment

UMTS services

Two technologies can be used to provide the open environment:


Enabling technology

Provides

WAP

Standardized technology for providing


internet access to mobile devices. The
technology uses a standardized markup
language WML (a subset of HTML), which
enables information from the internet to be
displayed on small terminal screens.

Java

Java offers content-rich and platformindependent programming suited to user


equipment applications.

WAP is supported in phase 1 of MExE. Java is offered in phase 2.


SIM toolkit

The toolkit includes software programs for enhancing the intelligence


of the UMTS equipment SIM card.
Applications might enable users to interact with their terminals,
control supplementary services and control charging information. For
example, the user might download a pull-down menu or a ringing
tone from a SIM application server.

....................................................................................................................................................................................................................................

7-8

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS services concept

UMTS services

Open
Services Architecture
....................................................................................................................................................................................................................................
Purpose

The underlying protocols used in telecommunications networks have


been network-specific. The aim of the Open Services Architecture
(OSA) is to enable operators and third parties to provide applications
that make use of network capabilities via Application Programming
Interfaces (APIs) which are standardized and open.
The API provides application developers with an abstracted view of
the capabilities of the core network.

Model

The key architectural components are:

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-9

UMTS services concept


Open Services Architecture

UMTS services

Components
Component

Description

Applications/
clients

Applications and clients can run within or


outside the network. The applications may be
developed in any programming language, but
must meet the open interface requirements
defined by 3GPP.

Service Capability
Feature (SCF)

An SCF provides a standardized building block


for building service applications. One service
may be built from one or more SCFs.
SCFs are accessible to applications/clients via
standard application interfaces. The
applications include basic services such as
telephony and call routing and value-added
services such as multimedia.
SCFs make use of Service Capabilities (SCs)
offered by the UMTS network.
3GPP is currently defining the following SCFs:

Service
Capabilities (SC)

Authentication

Authorization

Registration

Discovery (identifying SCFs available to


the user)

Notification

Call control

Security/privacy

Address translation

User location

User status

Terminal capabilities

Information transfer

User profile

Charging.

A service capability is a bearer defined by


parameters, and/or mechanisms needed to
realize services. An SC is within the network
and under network control.
SCs include CAMEL, MExE and SAT. They
can be provided on one or more separate
servers or be incorporated into existing entities,
for example the SCP or HLR. A combination of
both can also be used.

....................................................................................................................................................................................................................................

7-10

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS services concept

UMTS services

Service
providers
....................................................................................................................................................................................................................................
Differences between UMTS
and GSM

UMTS has been standardized to facilitate more competition between


service providers. For example, in GSM, most users have a single
service provider. With the introduction of number portability and
carrier selection services, for example, this picture is changing.
A UMTS user may use many Value Added Service Providers
(VASPs). For example, one or more service providers for news and
information, one or more for videoconferencing services, one or more
for call completion services.

One-stop billing

The home network of the user can generate a single bill for all the
UMTS services used, regardless of the VASP providing the service
and regardless of the MSISDN being used for the call.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-11

UMTS services concept

UMTS services

Phased
UMTS service evolution
....................................................................................................................................................................................................................................
UMTS Phase 1 (UMTS
Release 99)

At launch (expected rollout is 2002), UMTS Phase 1 services will be


available.
These include:

UMTS Phase 2 (UMTS


Release 2000)

Circuit-switched data to 384 kbits/s

Packet-switched data to 2 Mbits/s.

GSM supplementary services inherited from GSM Release 2+


(Release 99)

New supplementary services using the circuit and


packet-switched domains, such as Multicall (circuit-switched) and
videotext (circuit or packet-switched)

Videoconferencing and multimedia services.

The second phase is due for deployment around 2005.


UMTS evolution is being standardized towards:

Virtual Home Environment

Voice over IP

CAMEL support for Voice over IP

IP multimedia services.

....................................................................................................................................................................................................................................

7-12

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS services

Bearer capabilities
Overview
....................................................................................................................................................................................................................................
Objectives

After completing this topic, you will be able to:

List the UMTS bearer capabilities in the circuit-switched domain

List the UMTS bearer capabilities in the packet-switched domain.

This topic contains the following:


Bearer capability function and control

7-14

Circuit-switched and packet-switched bearer


capabilities

7-15

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-13

Bearer capabilities

UMTS services

Bearer
capability function and control
....................................................................................................................................................................................................................................
Function

The function of the bearer is to transport information in the most


appropriate way for the user application and the subnetwork (fixed or
wireless).
A bearer capability is a transmission function of a defined capacity,
delay, bit error rate and so forth requested by the user terminal from
the network.
The Quality of Service (QoS) of a bearer capability in terms of
maximum transfer delay, delay variation, bit error ratios and data rates
is specified by the 3GPP specifications.

Bearer control

The bearer control function ensures that the appropriate bearers are
made available and released as required for a call.
Support is provided for:

Signaling only

Simultaneous signaling and voice

Simultaneous signaling and data

Simultaneous signaling, voice and data.

A UMTS application may demand connection-oriented


circuit-switched and connectionless packet-switched bearer capabilities
in the same call.
Cumulative bit rates

A UMTS application can use the following cumulative bit rates at any
point in time:

Up to 144 kbit/s in a satellite radio environment or rural outdoor


radio environment

Up to 384 kbit/s in an urban/suburban outdoor radio environment

Up to 2048 kbits/s in an indoor/low range outdoor environment.

Cumulative bit rates are available in GSM. For example, HSCSD


technology offers cumulative bit rates up to 115.2 kbits/s.

....................................................................................................................................................................................................................................

7-14

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Bearer capabilities

UMTS services

Circuit-switched
and packet-switched bearer capabilities
....................................................................................................................................................................................................................................
Circuit-switched bearers

Inherited GSM
circuit-switched bearers

The bearers defined are:

Transparent data for support of multimedia

Transparent data

Non-transparent fax

Non-transparent data.

The bearer services inherited from GSM Release 99 are:


Bearer services

Partner
networks

Offered
rates

Data Circuit Duplex Asynchronous


(BS21 - BS26)

PSTN, ISDN

300, 1200,
1200/75,
2400,
4800,
9600
bits/s

Data Circuit Duplex Synchronous


(BS31 - BS34)

PSTN, ISDN,
CSPDN

1200,
2400,
4800,
9600
bits/s

PAD Access Circuit Asynchronous


(BS41 - BS46)

PSPDN

300, 1200,
1200/75,
2400,
4800,
9600
bits/s

Data Packet Duplex Synchronous


(BS51 - BS53)

PSTN, ISDN

2400,
4800,
9600
bits/s

Alternate Speech Data

PSTN, ISDN

data (*):
3.1 kHz

PSTN, ISDN

data (*):
3.1 kHz

Speech followed by Data

(BS61)
(BS81)

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-15

Bearer capabilities
Circuit-switched and packet-switched bearer
capabilities
UMTS circuit-switched
bearers

Packet-switched bearer
capabilities

UMTS services

The bearer capabilities are:


Bearer

Rates

3.1 kHz Audio

9.6 - 33.6 kbit/s asynchronous and


synchronous.

V.110 Unrestricted Digital


Information (UDI)

14.4 - 38.4 kbit/s asynchronous/


synchronous and 48 -56 kbit/s
synchronous.

X.31 Flag Stuffing UDI

14.4 - 56 kbit/s synchronous.

V.120

2.4 - 56 kbit/s synchronous and


asynchronous.

Bit transparent mode

56 and 64 kbit/s synchronous.

PIAF

32 and 64 kbit/s asynchronous.

Frame tunnelling mode

56 and 64 kbit/s asynchronous.

Multimedia call

28.8, 32, 33.6, 56, 64 kbit/s


synchronous.

UMTS inherits the packet-switched capabilities available using GPRS


technology (GSM Release 99).
Based on GPRS packet switching, the following bearer types are
available:

Point-To-Point (PTP)

Point-To-Multipoint (PTM).

The bearer typess offer:


Bearer type

Offers

Point-To-Point

Packet transmission between two users


which is connectionless or
connection-oriented.

Point-To-Multipoint

Transmission between a user and a


group of users.

Each bearer can have its own performance and traffic characteristics.
Data can be switched from mobile to mobile or mobile to IP-Packet
Data Network.
Bit rates up to 2 Mbits/s are offered.

....................................................................................................................................................................................................................................

7-16

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS services

Teleservices
Overview
....................................................................................................................................................................................................................................
Objectives

After completing this topic, you will be able to:

State how UMTS teleservices differ from GSM teleservices

List the teleservices offered by UMTS.

This topic contains the following:


Circuit and packet-switched teleservices

7-18

Speech

7-19

Emergency call

7-20

Short Message Service

7-21

Fax

7-22

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-17

Teleservices

UMTS services

Circuit
and packet-switched teleservices
....................................................................................................................................................................................................................................
Function

Circuit-switched services

Packet-switched services

Teleservices are telecommunication services which provide complete


service capability for communication between users according to
standardized protocols and transmission capabilities. Some teleservices
are standardized by 3GPP. In UMTS, there is a separation between the
service lower layers (refers to the OSI model) and upper layers.
UMTS supports the following teleservices in the circuit-switched
domain (supported by the 3G-MSC):

Speech/data

Emergency call

Short Message Service (SMS)

Automatic facsimile (fax) group 3.

UMTS supports the following teleservices in the packet-switched


domain (supported by the 3G-SGSN):

Internet Access

Short Message Service.

....................................................................................................................................................................................................................................

7-18

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Teleservices

UMTS services

Speech
....................................................................................................................................................................................................................................
Inheritance

Evolution towards Voice


over IP

UMTS inherits the same speech quality and speech services as offered
in GSM.
In the future, speech communication is expected to migrate towards
Voice Over Internet Protocol (VOIP).
VOIP protocols are being developed so that the protocols are not only
suitable for data communication, but also delay-sensitive speech. For
example, six bits in the VOIP packet header are being assigned to
carry Quality of Service (QoS) information.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-19

Teleservices

UMTS services

Emergency
call
....................................................................................................................................................................................................................................
Inheritance

Invocation

The GSM user in a UMTS area can use the GSM service which is
supported by UMTS. For UMTS terminal or dual terminal users,
UMTS has its own Emergency call service.
A UMTS user should be able to dial an emergency number by
pressing a specified button. The number to be dialed is stored on the
USIM or the SIM card of the terminal.
If supported by the terminal, a call can be triggered in other ways. For
example, when the airbag in a car is inflated.
If the user is using a data service only provided by a data-only service
provider and needs to make an emergency call, the call is routed to
the nearest network supporting the service.

Availability

National requirements determine when a user should be able to make


an emergency call.
The user should generally be able to make the call at any time. The
user may be able to make the call even if the user does not have a
valid USIM or SIM.

....................................................................................................................................................................................................................................

7-20

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Teleservices

UMTS services

Short
Message Service
....................................................................................................................................................................................................................................
Service types

Short Message Service (SMS) provides a means of sending messages


of limited size to and from UEs without the use of a circuit-switched
voice channel. The provision of SMS makes use of a Service Center
(SC) which acts as a store and forward center for short messages. The
SC is considered to be outside of the PLMN.
There are two types of Short Message Service (SMS):

Point to point

Cell broadcast.

Point to point messages (originating or terminating) are messages sent


between two UEs.
Cell broadcast enables a number of messages to be broadcast to all
UEs within an area.
Media types

In UMTS, short messages are not limited to text. The enhanced,


packet-switched, service enables formatted messages, pictures, sounds
or animations to be included in a message within the size limitations.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-21

Teleservices

UMTS services

Fax
....................................................................................................................................................................................................................................
Store-and-forward

End-to-end

UMTS standardizes the way fax messages are sent from the mobile
terminal to a fax storage and subsequently to a PSTN or ISDN
terminal.
UMTS standardizes the way fax messages are sent directly between a
mobile terminal and a PSTN or ISDN terminal. This in practice means
that a desktop fax machine or portable machine can be plugged into a
mobile terminal using an adapter and a modem.

....................................................................................................................................................................................................................................

7-22

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

UMTS services

Supplementary and multimedia services


Overview
....................................................................................................................................................................................................................................
Objectives

After completing this topic, you will be able to:

List the supplementary services inherited from GSM

List UMTS services available in Phase 1 (Release 99)

List UMTS services available in Phase 2 (Release 2000).

This topic contains the following:


Supplementary service concepts

7-24

Supplementary services inherited from GSM

7-26

UMTS services

7-31

Multimedia services

7-32

Multicall example

7-33

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-23

Supplementary and multimedia services

UMTS services

Supplementary
service concepts
....................................................................................................................................................................................................................................
Function

Supplementary service
categories

Basic bearer and


teleservices

A supplementary services offers additional functionality or modifies a


telecommunication service (bearer service and teleservice) and can
consequently only be offered in conjunction with a bearer/teleservice.
The following figure shows how supplementary services relate to
bearer and teleservices:

Basic bearer and teleservices are:


Basic service group

Basic service

Speech teleservice

Telephony
Emergency call

Short message service (SMS)


teleservice

SMS mobile originating point to


point
SMS mobile terminating point to
point
SMS cell broadcast

Facsimile teleservice

Alternate speech and fax group 3


Automatic fax group 3

Voice group call teleservices

Voice group call


Voice broadcast

All data circuit asynchronous


bearer service

General asynchronous bearer


service

All data circuit synchronous


bearer service

General synchronous bearer


service

All GPRS access

GPRS bearer service

....................................................................................................................................................................................................................................

7-24

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Supplementary and multimedia services


Supplementary service concepts

Packet and
circuit-switched domains

UMTS services

Services can be built on bearer and teleservices using the resources of


both the circuit-switched and packet-switched domains:

In Release 2000, some services may only used the packet-switched


domain, for example multimedia IP services.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-25

Supplementary and multimedia services

UMTS services

Supplementary
services inherited from GSM
....................................................................................................................................................................................................................................
Circuit-switched services

Call forwarding

GSM services defined in GSM Release 2+ (Release 99) specifications


are supported in UMTS. These services are circuit-switched and are
offered from the 3G-MSC.
Call forwarding enables incoming calls to be forwarded to another
number.
The flavors offered are:
Flavor

Description

Call Forwarding
Unconditional (CFU)

All incoming calls are immediately


forwarded

Call Forwarding on
mobile subscriber Busy
(CFB)

Incoming calls are forwarded if the


mobile user is busy.

Call Forwarding on Not


Reachable (CFNRc)

Incoming calls are forwarded if the


mobile can not be reached.

Call forwarding on No
Reply (CFNR)

Incoming calls are forwarded if the


mobile user does not answer.

Call Deflection (CD)

Incoming calls are directed to another


number before answer.

Call forwarding announcements are associated with each forwarding


flavor.
Call barring

Call barring services enable incoming or outgoing calls to be


restricted.
The call barring services available are:

Incoming or outgoing call barring, administration or subscriber


controlled

Operator determined call barring.

The incoming or outgoing call barring flavors supported are:


Flavor

Description

Barring of All Outgoing


Calls (BAOC)

The user cannot make calls from the UE


(apart from emergency calls).

Barring of Outgoing
International Calls
(BOIC)

The user cannot make calls to


destinations outside the country code
area.

....................................................................................................................................................................................................................................

7-26

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Supplementary and multimedia services


Supplementary services inherited from GSM

Operator determined call


barring

UMTS services

Flavor

Description

Barring of All Outgoing


Calls except calls to
home PLMN country
(BOIC-exHC)

The user can only make calls to numbers


in their own network in their home
country.

Barring of All Incoming


Calls (BAIC)

The user cannot receive any incoming


calls.

Barring of All Incoming


Calls when roaming
outside home PLMN
country (BAIC-Roam)

The user cannot receive calls when


roaming outside the home PLMN
country.

Barring of supplementary
service management

The user cannot carry out subscriber


actions.

Operator determined call barring programs offer the operator control


over the calls (including SMS messages) which can be made by users,
for example to control fraudulent use.
The programs available are:
Program

Description

Operator determined
outgoing call barring

Prevents users from making outgoing


calls (applies to BAOC, BOIC,
BOIC-exHC and BAOC-Roam).

Operator determined
barring of premium rate
calls

Prevents users from calling premium rate


numbers.

Operator determined
home PLMN barring

Provides operator-specific barring types


applicable in the home PLMN.

Operator determined
barring of
operator-specific
programs

Control over operator programs.

Operator determined
barring of supplementary
service management

Prevents user control of supplementary


procedures (such as activation,
deactivation, erasure).

Operator determined
inter-zonal call barring

Provides barring control on a


geographical zone basis.

Operator determined
barring of call forwarding
registration

Prevents users from registering a call


forwarding destination.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-27

Supplementary and multimedia services


Supplementary services inherited from GSM

Number identification
services

UMTS services

Program

Description

Operator determined
barring of more than one
explicit call transfer
invocation

Prevents users from invoking explicit


call transfer more than once.

Operator determined
barring of double-charged
explicit call transfer
invocation

Prevents users from invoking explicit


call transfer if more than one call is
charged to the user.

Number identification services enable the user to see the number of


the calling party or the number to which a call is connected.
The flavors supported are:

Call waiting and call hold

Flavor

Description

Calling Line
Identification
Presentation (CLIP)

Displays the identity of the calling party.

Calling Line
Identification Restriction
(CLIR)

Restricts the identity of the calling party


displayed using CLIP.

Connected Line
Identification
Presentation (COLP)

Displays to the calling party the identity


of the connected party.

Connected Line
Identification Restriction
(COLR)

Restricts the identity displayed using


COLP.

These services are used in conjunction with each other to enable users
to complete incoming calls when already involved in a call.
The services supported are:

Call Completion to Busy


Subscriber

Service

Description

Call waiting (CW)

Notifies the called party involved in a


call that there is another incoming call.

Call Hold

Enables the user involved in a call to


interrupt the connection with a party and
re-establish the connection later.

The service enables a user to complete a call to a busy party. The user
requests the service and the user is notified by a callback when the
called party is free.

....................................................................................................................................................................................................................................

7-28

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Supplementary and multimedia services


Supplementary services inherited from GSM

UMTS services

Call Hold, Call Waiting and Call Completion to Busy Subscriber


Service are also known as Call Completion Services.
Multi-party

The service enables a user to set up a call with more than one other
party and to communicate with the remote parties.

Closed User Groups

A Closed User Group provides a group with restricted access rights.


Access can be restricted to and from group members.

Explicit Call Transfer

The service enables the served mobile user who has two calls, each of
which can be an incoming or outgoing call, to connect the other
parties in the two calls and release the served mobile users own
connection.

User to User Signaling

The User to User Signaling (UUS) supplementary service allows the


transfer of information to a remote user over the signaling channel in
association with a call to this user.
The UUS supplementary service is divided in Service 1, Service 2 and
Service 3.
The UUS Service 1 allows the transfer of user-to-user information
embedded within call control messages. The UUS Service 2 allows
the transfer of information with a specific user-to-user message after
the served user has received an address complete indication and prior
to the answer indication from the B side. The UUS Service 3 allows
the transfer of information with a specific user-to-user message during
an active call.

Advice of Charge

Advice of charge provides the user with information on the charge of


a call. The service provides the UE with information which can be
converted by the UE to a call charge. The information is not the
actual cost billed to the user, but a cost indicator based on the number
of units and duration.
There are two types of service:

Number portability

AOC information service

AOC charging service.

The service enables a user to retain their directory number when


moving to another service operator. Number translation is carried out
in the HLR.

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-29

Supplementary and multimedia services


Supplementary services inherited from GSM

Other services inherited


from GSM

UMTS services

The following were introduced in GSM:


Service

Description

Location services

When a UMTS user is for example


accessing information about the nearest
restaurant or shop, location information is
required by the service. In UMTS, location
information is being enhanced so that a
user can be pinpointed anywhere from 100
meters to 50 meters from a reference point.

Multiple subscriber
profile

Enables mobile subscribers to have several


profiles associated with a single IMSI, with
each profile being a subscription option.
Each profile may be used for mobile
originated and mobile terminated calls. Up
to four different profiles can be provisioned
against a subscriber.

....................................................................................................................................................................................................................................

7-30

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Supplementary and multimedia services

UMTS services

UMTS
services
....................................................................................................................................................................................................................................
UMTS Phase 1

UMTS Phase 2

The following are available in UMTS Phase 1 (Release 99):

Multicall service

Interactive multimedia

Video conferencing.

Internet protocol (IP) multimedia services are being specified for


UMTS Phase 2 (Release 2000).

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-31

Supplementary and multimedia services

UMTS services

Multimedia
services
....................................................................................................................................................................................................................................
Many media, many
connections

A multimedia service is characterized by more than one media type


(voice, audio, data, video, graphics) in one call and involving more
than one connection and more than two parties.
In UMTS, a single media call can become a multimedia call and vice
versa without any need for the resources required to be requested
before the call is set up.

Concept

A multimedia call can use resources provided by the circuit-switched


or packet-switched domain.
In UMTS Release 2000, real-time multimedia services over IP will be
available. These include IP telephony. Supplementary services for IP
multimedia services are not standardized but implemented using the
toolkits or at the call control level. IP multimedia services use GPRS
as a bearer.

Service examples

The following table provides examples of the types of multimedia


services which UMTS will support:
Service

Example

Description

Conversation

Videotelephony,
videoconferencing

Bi-directional,
synchronized media
components

Messaging

Video messaging or
voice and image
messaging.

Unidirectional store
and forward.

Information retrieval

News information,
image banks,
information services,
mobile e-commerce

Retrieval initated and


controlled by the
user

Information
broadcast services

Music and other


audio broadcast,
television, news
broadcast services

With or without user


control

....................................................................................................................................................................................................................................

7-32

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Supplementary and multimedia services

UMTS services

Multicall
example
....................................................................................................................................................................................................................................
Overview

The Multicall supplementary service enables a user to have several


simultaneous circuit-switched calls, each call using a dedicated bearer.
One of the calls (Release 99) can be a speech call (telephony,
emergency call or alternate speech/fax).
The service enables a number of data bearers to be bound together to
offer more than 64 kbit/s data rates in a single call.
A user can have a maximum of one call on hold and one call waiting
in conjunction with the service.

Diagram

The following scenario illustrates a multicall using multiple


circuit-switched bearers. The user is involved in a speech call and
wants to send data, for example a picture drawn on the terminal
screen, to the other party:

Process
............................................................................................................................................................

The user is connected to a serving network and is engaged in an


active call. In this example, the bearer capability being used is speech
and the home network allows up to seven calls in a multicall of which
only one can be speech (Release 99 specification):
............................................................................................................................................................

The user carries out the procedure at the terminal to send an image to
the other user. The UE requests the bearer capability from the MSC
requesting a data bearer capability. In the message to the MSC, the

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

7-33

Supplementary and multimedia services


Multicall example

UMTS services

UE indicates the number of bearers it supports and the number of


speech bearers it supports.
............................................................................................................................................................

The MSC contacts the VLR to check what bearer capabilities are
available to the user.
............................................................................................................................................................

The VLR informs the MSC that the request is valid.


............................................................................................................................................................

The bearer capability is connected.

....................................................................................................................................................................................................................................

7-34

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Glossary

3G

Third Generation Partnership Project


3GPP

Third Generation
....................................................................................................................................................................................................................................

A3

Authentication algorithm
A5

Encryption algorithm
A8

Cipher key generating algorithm


AAL

ATM Adaptation Layer


ACCH

Associated Control Channel


AICH

Acquisition Indication Channel


ALCAP

Access Link Control Application Protocol


AMPS

Advanced Mobile Phone System


ANSI

American National Standards Institute


....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

G L O S S A R Y
G L - 1

AOC

Advice of Charge
API

Application Programming Interface


ATM

Asynchronous Transfer Mode


AUC

Authentication Center
....................................................................................................................................................................................................................................

BAIC

Barring of All Incoming Calls


BAIC-Roam

Barring of All Incoming Calls when roaming outside home PLMN country
BAOC

Barring of All Outgoing Calls


BCCH

Broadcast Control Channel


BCH

Broadcast Channel
BER

Bit Error Rate


B-ISDN

Broadband Integrated Services Digital Network


BMC

Broadcast/Multicast Control
BOIC

Barring of Outgoing International Calls


BOIC-exHC

Barring of all Outgoing International Calls except to Home PLMN country


BPSK

Binary Phase Shift Keying


BSS

Base Station Subsystem


....................................................................................................................................................................................................................................

G L O S S A R Y
G L - 2

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

BTS

Base Transceiver Station


....................................................................................................................................................................................................................................

CAMEL

Customized Applications for Mobile Enhanced Logic


CAP

CAMEL Application Part


CC

Call Control
CCH

Control Channel
CCITT

Comit Consultatif International Tlgraphique et Tlphonique


CCPCH

Common Control Physical Channel


CCS

Common Channel Signaling


CCTrCH

Coded Composite Transport Channel


CCS No.7

Common Channel Signaling System No. 7


CD

Collision Detect
CDMA

Code Division Multiple Access


CFB

Call Forwarding on Busy


CFNR

Call Forwarding No Reply


CFU

Call Forwarding Unconditional


CLIP

Calling Line Identitification Presentation


....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

G L O S S A R Y
G L - 3

CLIR

Calling Line Identitification Restriction


CLP

Cell Loss Priority


CN

Core Network
COLP

Connected Line Identification Presentation


COLR

Connected Line Identification Restriction


CPCH

Common Packet Channel


CPICH

Common Pilot Channel


CS

Circuit Switched
CSMA

Carrier Sense Multiple Access


CSPDN

Circuit Switched Public Data Network


CW

Call Waiting
....................................................................................................................................................................................................................................

DC

Direct Current
DCH

Dedicated Channel
DCCH

Dedicated Control Channel


DECT

Digital Enhanced Cordless Telephone


DHCP

Dynamic Host Configuration Protocol


....................................................................................................................................................................................................................................

G L O S S A R Y
G L - 4

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

DNS

Domain Name Server


DPC

Destination Point Code


DPCCH

Dedicated Physical Control Channel


DPCH

Dedicated Physical Channel


DPDCH

Dedicated Physical Data Channel


DRNC

Drift RNC
DRNS

Drift RNS
DSAC

Destination Service Access Point


DSCH

Downlink Shared Channnel


DSEL

Destination Selector
DTCH

Dedicated Traffic Channel


DTX

Discontinuous Transmission
....................................................................................................................................................................................................................................

EDGE

Enhanced Data Rates for GSM Evolution


EIR

Equipment Identity Register


ETSI

European Telecommunications Standards Institute


....................................................................................................................................................................................................................................

FAC

Final Assembly Code


....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

G L O S S A R Y
G L - 5

Fax

Facsimile
FACH

Forward Access Channel


FBI

Feedback Indicator
FDD

Frequency Division Duplexing


FDMA

Frequency Division Multiple Access


FTP

File Transfer Protocol


....................................................................................................................................................................................................................................

GGSN

Gateway GPRS Support Node


GMSC

Gateway Mobile Switching Center


GPRS

General Packet Radio System


GSM

Global System for Mobile Communications


GTP

GPRS Tunneling Protocols


....................................................................................................................................................................................................................................

HLR

Home Location Register


HSCSD

High Speed Circuit Switched Data


....................................................................................................................................................................................................................................

IEEE

Institute of Electrical and Electronics Engineers


ILPC

Inner Loop Power Control

....................................................................................................................................................................................................................................

G L O S S A R Y
G L - 6

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

IMEI

International Mobile Equipment Identity


IMSI

International Mobile Subscriber Identity


IMT-2000

International Mobile Telecommunications 2000


IN

Intelligent Network
IP

Internet Protocol
ISDN

Integrated Services Digital Network


ISUP

ISDN User Part


ITU-T

International Telecommunication Union Telecommunication Standardization Sector


Iu

Interface between the core network and the UTRAN


Iub

Interface between an RNC and a Node B


Iur

Logical interface between two RNCs


IWF

Interworking Function
....................................................................................................................................................................................................................................

Kc

Cipher key
Ki

Authentication key
....................................................................................................................................................................................................................................

LA

Location Area
LAC

Location Area Code


....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

G L O S S A R Y
G L - 7

LAI

Location Area Identity


LAN

Local Area Network


LLC

Logical Link Control


LMSI

Local Mobile Subscriber Identity


....................................................................................................................................................................................................................................

MAC

Medium Access Control


MAP

Mobile Application Part


ME

Mobile Equipment
MExE

Mobile station Execution Environment


MCC

Mobile Country Code


MM

Mobility Management
MNC

Mobile Network Code


MSC

Mobile Switching Center


MSIN

Mobile Subscriber Identification Number


MSISDN

Mobile Station ISDN Number


MTP

Message Transfer Part


....................................................................................................................................................................................................................................

NDC

Network Destination Code


....................................................................................................................................................................................................................................

G L O S S A R Y
G L - 8

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

N-ISDN

Narrowband Integrated Services Digital Network


....................................................................................................................................................................................................................................

O&M

Operation and Maintenance


OA&M

Operations, Administration and Maintenance


OLPC

Outer Loop Power Control


OPC

Originating Point Code


OSA

Open Services Architecture


OSI

Open Systems Interconnection


OVSF

Orthogonal Variable Spreading Factor


....................................................................................................................................................................................................................................

PAD

Packet Assembler/Disassembler
PBX

Private Branch Exchange


PC

Point Code
PCH

Paging Channel
PCG

Packet Charging Gateway


PCM

Pulse Code Modulation


PCPCH

Physical Common Packet Channel


PCS

Personal Communication System


....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

G L O S S A R Y
G L - 9

PDA

Personal Digital Assistant


PDCP

Packet Data Convergence Protocol


PDN

Packet Data Network


PDP

Packet Data Protocol


PDSCH

Physical Downlink Shared Channel


PHS

Personal Handyphone System


PIAF

PHS Internet Access Forum


PLMN

Public Land Mobile Network


PMM

Packet Mobility Management


PRACH

Physical Random Access Channel


PS

Packet Switched
PSPDN

Packet Switched Public Data Network


PSTN

Public Switched Telephone Network


PTM

Point-to-multipoint
P-TMSI

Packet Temporary Mobile Subscriber Identity


PTP

Point-to-point

....................................................................................................................................................................................................................................

G L O S S A R Y
G L - 1 0

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

....................................................................................................................................................................................................................................

QoS

Quality of Service
QPSK

Quaternary Phase Shift Keying


....................................................................................................................................................................................................................................

RA

Routing Area
RAB

Rack Access Board


RAC

Routing Area Code


RACH

Random Access Channel


RAI

Routing Area Identity


RAND

Random Number
RCC

Radio Control and Code


RF

Radio Frequency
RLC

Radio Link Control


RNC

Radio Network Controller


RNS

Radio Network Subsystem


RNTI

Radio Network Temporary Identity


RRA

Radio Resource Allocation


RRC

Radio Resource Control


....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

G L O S S A R Y
G L - 1 1

....................................................................................................................................................................................................................................

SAP

Service Access Point


SAT

SIM Application Toolkit


SC

Service Capability
SCF

Service Capability Feature


SCCP

Signaling Connection Control Part


SCH

Synchronisation Channel
SCP

Service Control Point


SDCCH

Stand-alone Dedicated Control CHannel


SDL

Signaling Data Link


SEP

Signaling End Point


SGSN

Serving GPRS Support Node


SIM

Subscriber Identification Module


SMS

Short Message Service


SN

Subscriber Number
SNMP

Simple Network Management Protocol


SNR

Serial Number
....................................................................................................................................................................................................................................

G L O S S A R Y
G L - 1 2

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

SRES

Signed Response
SRNC

Serving RNC
SRNS

Serving RNS
SS7

Signaling System No. 7


SSAC

Source Service Access Point


SSEL

Source Selector
STP

Signaling Transfer Point


SV

Software Version
....................................................................................................................................................................................................................................

TAC

Type Approval Code


TACS

Total Access Communication Service


TC

Transaction Capabilities
TCAP

Transaction Capabilities Application Part


TCP/IP

Transmission Control Protocol / Internet Protocol


TCP

Transmission Control Protocol


TDD

Time Division Duplexing


TDMA

Time Division Multiple Access


....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

G L O S S A R Y
G L - 1 3

TFCI

Transport Format Combination Indicator


TMSI

Temporary Mobile Subscriber Identity


TPC

Transmit Power Control


TUP

Telephone User Part


....................................................................................................................................................................................................................................

Uu

Radio interface between the UTRAN and the User Equipment


UDI

Unstructured Data Information


UE

User Equipment
UMTS

Universal Mobile Telecommunications System


USCH

Uplink Shared Channel


USIM

User Service Identity Module


UTRA

UMTS Terrestrial Radio Access


UTRAN

UMTS Terrestrial Radio Access Network


Uu

Radio interface between the UTRAN and the User Equipment


UUS

User to User Signalling


....................................................................................................................................................................................................................................

VASP

Value Added Service Provider


VCI

Virtual Channel Identifier


....................................................................................................................................................................................................................................

G L O S S A R Y
G L - 1 4

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

VHE

Virtual Home Environment


VLR

Visitor Location Register


VOIP

Voice Over Internet Protocol


VPI

Virtual Path Identifier


VPN

Virtual Private Network


....................................................................................................................................................................................................................................

WAP

Wireless Application Protocol


WARC

World Administrative Radio Conference


W-CDMA

Wideband Code Division Multiple Access

....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

G L O S S A R Y
G L - 1 5

Index

........................................................
A

Principle, 3-4

AAL, 3-27

Cell Interference

Access protocol

Cancellation, 3-11

Ethernet, 3-14

Ethernet, 3-15
Asynchronous Transfer
Mode
See: ATM

Cell, 3-25

Addresses, 3-15
Bus topology, 3-14

Downlink, 3-58

LLC types, 3-16

Uplink, 3-56

MAC Packet Structure,


3-14
Variants, 3-17
........................................................
F

Principle, 3-3

Codes

Frequency Spectrum

Channel, 3-51
Layers, 3-51

Faxsimile service, 7-17


FDMA

Types, 3-39

Bearer capabilities, 7-13

WARC-1992, 3-37
........................................................

Scrambling, 3-51

Bearers, 7-13
........................................................

Coding
Principle, 3-8

Cancellation

GSM services, 7-2

I, 3-60
........................................................

Reason for , 3-7

Cell Interference, 3-11

Structure, 3-20

Multiplexing, 3-55

Channels

ATM Adaptation Layer,


3-27
........................................................

Network structure, 3-22

Access protocol, 3-14

Uplink, 3-56

Principle, 3-24

Network elements, 3-22

Coding, 3-55

Downlink, 3-58

Connection setup, 3-26

Functional blocks, 3-19

Emergency call, 7-17


Ethernet

Channel spreading

Components in UMTS,
3-29

CCS7

Channel Modulation

ATM

Transport channel, 3-39


........................................................

Channel

Addresses

Physical channel, 3-39

CDMA

Common Channel
Signaling No. 7
See: CCS7
........................................................

Interference
Cell cancellation, 3-11
Iu interface
Characteristics, 3-64

Definition
Logical channel, 3-39

Connection principles,
3-64

Usage, 3-19
....................................................................................................................................................................................................................................
UM9001SG.en.A4
Issue 1, June 2000

Lucent Technologies

I N D E X
I N - 1

I ub interface
Capabilities, 3-67

Phase detection, 3-10

Definition, 3-39

Physical channel

Mapping, 3-45

Functions, 3-70

Definition, 3-39

Location, 3-66

Frame structure, 3-48

Logical resources, 3-68

Time slot structure,


3-48

Principles, 3-66

Types, 3-40

I ur interface

physical transmission

Capabilities, 3-71

Types, 3-43
........................................................
V

Value Added Service


Providers (VASPs), 7-11
Virtual Home Environment,
7-2

PCM 24, 3-12

Functions, 3-73

Physical transmission

Location, 3-71

PCM 30, 3-12


........................................................
R

Rake receiver, 3-10


Rate Matching, 3-55

Ethernet, 3-16
Location services, 7-31

Transport channel

time slot structure, 3-13

Protocol structure, 3-60

LLC types

Teleservices, 7-17

PCM24

Location, 3-63

Principle, 3-4

time slot structure, 3-12

Interface types, 3-64

Protocols, 3-72
........................................................

TDMA

PCM 30, 3-12

Instances, 3-65

Release phases, 7-12


........................................................

Logical channel
Definition, 3-39
........................................................
M

Services, 7-1
Short Message Service
(SMS), 7-17

Multipath transmission,
3-10

Speech, 7-17

Multiple access techniques

Spreading

CDMA, 3-4

Adaptive , 3-8

FDMA, 3-3

Principle, 3-6

Main types, 3-3


TDMA, 3-4
........................................................
O

Open Services Architecture,


7-2
........................................................
P

Packet structure
Ethernet MAP , 3-14

Service billing, 7-11

Reason for , 3-6


........................................................
T

TCP/IP
Data routing, 3-34
Layer, 3-32
Principles, 3-31
Services, 3-31

PCM 24, 3-12

....................................................................................................................................................................................................................................

I N D E X
I N - 2

Lucent Technologies

UM9001SG.en.A4
Issue 1, June 2000

Das könnte Ihnen auch gefallen