Sie sind auf Seite 1von 12

4th IEEE-Russia Conference: MEMIA’2003 87

ON THE WAY TO 3G NETWORKS: THE GPRS/EDGE CONCEPT


Vasily P. Pribylov, Member, IEEE, Ivan I. Rezvan
Siberia State University of Telecommunications and Informatics
Tel.: +7-3832-66-14-78, e-mail: v.pribylov@ieee.org

Abstract – This work describes the principles and use of GPRS. The main problems of
transition towards the UMTS are also stated.
Index terms – 3G, ARQ, FEC, GPRS, GSM, QoS, UMTS.

I. INTRODUCTION
The wireless industry is moving to transmission of photographs and
video messages. Videoconferencing application, in which people can have
regular meetings without having to go to a particular place, is another
application for moving images. Mobile terminals such as notebooks,
personal digital assistants (PDAs), mobile phones and pagers can give
access to a wide range of new mobile data services.
Due to the growing interest in mobile data applications, the Global System for Mobile
communications (GSM) has been extended earlier by the General Packet Radio Service (GPRS), a
packet switched technology [1], since the results of several investigations indicated it makes more
efficient use of system resources with fulfillment the specified Quality of Service (QoS)
requirements. QoS can be measured in terms of reliability, response time, and features supported.
GPRS, which is treated in literature as 2.5G system, allows the transmission of packet data at
moderate bit rates using random access channels within the existing GSM (2G) infrastructure.
Many applications use the TCP/IP protocol architecture and mobile Internet browsing is well
suited to GPRS Protocol Stack, which provides new services for the mobile wireless subscriber [2]:
color Internet browsing, e-mail on the move, powerful visual communications, multimedia
messages and location-based services. Because of its synergy with the Internet, GPRS allows
mobile users to participate fully in existing Internet chat groups rather than needing to set up their
own groups that are dedicated to mobile users using SMS services. Third-party applications such as
WAP browser, MMS client, and Java are integrated in GPRS to accelerate its customer base
development. Other new applications for GPRS include file transfer and the ability to remotely
access and control house appliances and machines – so called “Mobile Home” framework, which
can be implemented, e.g., through WAP servers and wireless channels to home sensor endings.
All these mobile applications contain several characteristics that enhance the value to the
customers. First among them is mobility (constant voice and data communications while on the
move). Second is immediacy (obtaining connectivity when needed, regardless of location and
without a lengthy login session). Third is localization (allows subscribers to obtain information on
their current location). The combination of these characteristics provides a wide spectrum of
possible applications that can be offered to mobile subscribers.
GPRS Protocol Stack is important as a migration step toward third-generation (3G) networks.
When GSM operators start to offer GPRS services, they can use their existing networks and
gradually assign part of their resources from circuit-switched voice services to packet-switched data
services. This allows a smooth transition from voice-only to multimedia service networks.
Furthermore, the ratio between voice and data traffic can be changed dynamically according to the
requested service.

II. GPRS BACKGROUND


The primary requirements for GPRS in the beginning (1998) were as follows [3]:
– To enable new and existing applications to be attracted onto GSM.
– To achieve the enhancement of GSM's functional and QoS parameters are vital goals.

Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on August 09,2010 at 12:04:25 UTC from IEEE Xplore. Restrictions apply.
88
– GPRS shall support both connectionless and connection oriented services.
– To offer a flexible service at low cost to the user.
– In order to make the service as cost effective as possible, the impact upon existing
investments in GSM architectural entities, their supporting protocols and deployment costs must be
kept to a minimum.
– To use scarce network resources as efficiently as possible.
– To support early introduction of GPRS services, without compromise to eventual capacity
and performance, through a phased programme of definition and implementation.
It was agreed that GPRS shall be distinguished from existing services in two ways: it is required
to efficiently use network resources for packet mode applications; new mechanisms are required in
order to provide highly standardized, feature-rich services, in which the selection of the QoS
parameters can be made by the service requesters.
Three types of service request were distinguished:
– Broadcast: A point-to-multipoint message sent to "all service subscribers" within an area
defined by the Service Requester. It is envisaged that subscription and authentication for this
service is limited and strictly controlled. There is no requirement for providing end-to-end
acknowledgement for broadcast service requests.
– Multicast: A point-to-multipoint message sent to "an identified subset of all service
subscribers" within an area defined by the Service Requester. There is a requirement to be able to
provide end-to-end acknowledgement for multicast service requests.
– Singlecast: A point-to-point message sent to "a unique subscriber". The communication
characteristics of the various applications to be supported by single cast service request can be
divided into the following groups: Non-dialogue – The transfer of a data packet between the Service
Requester and the Service Receiver in which every data packet is independent of the preceding and
succeeding one; Dialogue – there exists a logical relationship between Service Requester and
Service Receiver that lasts for duration of time ranging from seconds to hours.
There is not one single optimal QoS profile for all applications, only an optimal QoS profile per
application. Therefore, in order that PLMN Operators may offer flexible, customized service
packages that accurately meet the QoS requirements of an application, it is required that GPRS
parameterize central QoS variables where feasible. This Requirements document concentrates upon
the Initial Requirements for GPRS.
The following service delay classes (SD-Class), are introduced:
– SD-Class 1: Predictive service - expedited
– SD-Class 2: Predictive service - regular
– SD-Class 3: Best effort service - expedited
– SD-Class 4: Best effort service - regular
– SD-Class 5: Best effort service - unspecified delay
A predictive service is characterized by "soft" service delay boundaries with only a small
variability in the delay requirements allowed.
A best effort service is characterized by a minimal guarantee on the service delay thus allowing
a large actual variation.
It was stated also that GPRS shall not: prevent the user's operation of existing GSM services; be
used as a basis for packetized speech; be used as a basis for services that duplicate, in terms of
performance and cost requirements, existing GSM services. GPRS will provide packet mode
transfer for applications that exhibit the following data traffic patterns: frequent transmission of
small volumes; infrequent transmissions of small or medium volumes.
The GPRS operator shall be responsible for transferring data between the service access points
at the fixed side and at the mobile side. The flow of data shall be possible in three scenarios.
– Packets sent from a mobile access point to a fixed network access point.
– Packets sent from a fixed network access point to a mobile access point.

Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on August 09,2010 at 12:04:25 UTC from IEEE Xplore. Restrictions apply.
4th IEEE-Russia Conference: MEMIA’2003 89
– Packets sent from a mobile access point to a mobile access point via the GSM operator
infrastructure (this does not exclude an implementation using the previous two modes).
Security mechanisms are required by the operator in order to guard against fraud, and by the
user in order to preserve privacy across the radio path. These mechanisms should provide a
flexibility which reflects the variety of security profiles found in potential applications, some of
which require low or no security, and some of which require very strict security.
For point-to-point packets, the security mechanisms available for existing tele-services and
bearer services should be used if possible.
For point-to-multipoint packets, encryption is not required.
In 1999 and 2000 Network operators placed different trials and commercial contracts for GPRS
infrastructure with the incorporation of GPRS infrastructure into GSM networks.
In the summer of 2000 the first trial of GPRS become available and the typical single user
throughput was likely to be 28 kbps.
During 2001 the basic GPRS capable terminals begin were available in commercial quantities.
Also in 2001 several network operators commercially launched and rolled out GPRS.
In 2001 typical single user throughput was around 56 kbps. New GPRS specific applications
provided higher bit rates and greater network capacity solutions with more capable terminals
become available, fuelling GPRS usage.
In 2002 typical single user throughput was already around 112 kbps. GPRS was routinely
incorporated into GSM mobile phones. GPRS Phase 2 (also called EGPRS , or EDGE – Enhanced
Data rate for GSM Evolution) begins to emerge in practice.
Already in production, see [4], the complete GSM/GPRS Protocol Stack has been tested
extensively worldwide on all types of infrastructure and has successfully completed testing.

III. PRINCIPLES OF GPRS


To use GPRS, users specifically need a mobile phone or terminal supporting GPRS, a
subscription to a mobile telephone network supporting GPRS and the enabled GPRS use.
The radio and network resources of GPRS are only accessed when data actually need to be
transmitted between the GPRS mobile user and the GPRS network. These data are divided into
packets and then transmitted via the radio and core GPRS network. Between alternating
transmissions, no GPRS network resources need to be allocated.
The modulation used in GPRS is the same used in GSM, the Gaussian
Minimum Shift Keying (GSMK, [5] and [6]), where the information is coded in
the increase (positive shift) or decrease (negative shift) of the carrier phase.
GMSK has a modulation index of 0.5. Being Continuous Phase Modulation
(CPM), GPRS allows both coherent and non-coherent demodulation. Reference
carrier and timing clock recovery have always been a problem in coherent
demodulation schemes. For design simplicity and robustness various non-
coherent scheme such as differential detection one bit and two bit, and limited-
discriminator are commonly used in GMSK demodulation.
In GMSK modulation scheme, the signal is passed through a pre-modulation Gaussian filter for
pulse-shaping. The pre-modulation filter makes the output power spectrum compact (the amount of
ISI introduced depends on the bandwidth-time product, B·T, of the Gaussian transmit filter) and
gives it a constant modulation envelope. The output of the filter is then used to modulate an
Intermediate Frequency (IF) carrier.
The constant envelope obtained in GMSK makes it more robust in multipath fading
environments. Constant envelope, low out-of-band power and the ability to use an efficient class C
power amplifier makes GMSK an attractive scheme for satellite and mobile communications.
GPRS provides a bearer service from the data network to a GPRS terminal.
The physical radio interface consists of a flexible number of TDMA time slots (from 1 to 8),
called packet data channels (PDCH), each of them can transfer one Radio Link Control block every

Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on August 09,2010 at 12:04:25 UTC from IEEE Xplore. Restrictions apply.
90
20 ms, see fig. 1. A theoretical raw data rate is approximately equal to 150 kbps with 115 kbps
“netto”. A Media Access Control (MAC) utilizes the resources of the physical radio interface and
provides a service to the GPRS Logical Link Control (LLC) protocol between the MS and the
serving GSN (SGSN). LLC protocol is a modification of a High-Level Data Link Control (HDLC)
based Radio Link Protocol (RLC) with variable frame size. The two most important features offered
by LLC protocol are the support of point-to-multipoint addressing and the control of data frame
retransmission. From the standpoint of the application, GPRS provides a standard interface for the
network layer. All mobiles requiring data services in a particular cell share the available PDCHs.

Fig. 1. Simplified GSM TDMA frame structure with GPRS packet data channels.
Timeslot building requires new functionality on the mobile side. GPRS needs a Serving GPRS
support node (SGSN, [7]-[10]), a Gateway GPRS support node (GGSN) and a charging gateway
function to support packet switched transactions. The packet switched traffic is separated from the
circuit switched traffic at the BSC/PCU and diverted to the GPRS core network. To support point-
to-multipoint features, a point-to-multipoint Service Center (PTM-SC) needs also to be added.
Because GPRS is packet switched traffic, new protocols and channel types are required. In
GPRS the mobile device is permanently attached to the network, providing a virtual connection
without cost and data transfer (GPRS-Attach). GPRS-Attach procedure is executed whenever a
GPRS enabled mobile station is switched on and needs to inform the network about its presence.
The two peers of a GPRS attach procedure are the mobile station (MS) and the SGSN.
Depending on the availability of the packet Common Control Channel (PCCCH), the GPRS-Attach
procedure may be executed on Circuit Common Control Channel (CCCCH).
Fig. 2 shows the GPRS system architecture, indicating new functionality required for phase2+
operation. The GPRS control is done using a dedicated DSP.

Fig. 2. GPRS system architecture.


A model of layering the protocols in GPRS is illustrated in fig. 3.

Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on August 09,2010 at 12:04:25 UTC from IEEE Xplore. Restrictions apply.
4th IEEE-Russia Conference: MEMIA’2003 91

TOM GMM SNDC SMS TOM GMM SNDC SMS

LLC LLC

Relay
RLC BSSGP
RLC BSSGP
Network Network
MAC MAC Service Service

GSM RF GSM RF L1 L1

Um Gb
MS BSS SGSN
Fig. 3. Protocol layering in GPRS.
The LLC layer operates above the RLC and BSSGP layers in the reference architecture to
provide logical links between an MS and its SGSN.
The LLC layer structure is shown in fig. 4. This figure is a model shown for illustrative
purposes only, and does not constrain implementations.
GPRS Mobility Management SNDCP TOM SMS

Layer 3
LLGMM LLGMM LL3 LL5 LL9 LL11 TOM2 TOM8 LLSMS

LLC layer

Logical
Link
Logical
Entity
Link
Logical SAPI=7
Entity
Link
Logical SAPI=8
Logical Link
Entity
Link Logical SAPI=2
Entity
Link
Management Logical
Entity
SAPI=11
Entity Link
Logical SAPI=9
Entity
Link
Logical SAPI=5
Entity
Link
SAPI=3
Entity
SAPI=1

Multiplex Procedure

LLC layer
GRR BSSGP

RLC/MAC layer MS SGSN BSSGP layer

RLC/MAC BSSGP

Signalling
Signalling and data transfer
Fig. 4. Functional model of the LLC layer.
Above the LLC layer is located the SubNetwork Dependent Convergence (SNDC) layer, that
controls the transfer of user data network layer PDUs (N-PDUs) between the MS and SGSN. The
SNDC functionality is described in [12] and specified in [9].
The LLC layer Service Access Points (SAPs) are the points at which the LLC layer provides
services to the layer-3 protocols in figure 1. In addition to the SNDC protocol, LLC provides

Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on August 09,2010 at 12:04:25 UTC from IEEE Xplore. Restrictions apply.
92
service to the GPRS Mobility Management (GMM) protocol, to the SMS protocol, and to the
Tunnelling of Messages (TOM) protocol.
An LLC layer connection is identified by the DLCI consisting of the SAP Identifier (SAPI) and
the MS's Temporary Logical Link Identifier (TLLI).
Each LLC frame consists of the header, trailer, and information field. The header and trailer
fields contain information such as SAPI, frame number and checksum, which are used to identify
the frame and to provide reliable transmission. The information field is variable length. Both
transmission and retransmission of each frame are controlled by the LLC layer.
Many of the formats and procedures are similar to the reference protocols, and differences are
introduced only where needed to reflect the unique aspects of the GPRS architecture and
requirements.
The Logical Link Management Entity (LLME) manages the resources that have an impact on
individual connections. There is one LLME per TLLI. Functions provided by the LLME are:
- parameter initialisation;
- error processing;
- connection flow control invocation.
The RLC/MAC layer functions are described in [13]. BSSGP is specified in [10]. SNDCP is
specified in [9].
GPRS Mobility Management (GMM) uses the services of the LLC layer to transfer messages
between the MS and the SGSN. GMM includes functions such as attach and authentication, and
transport of session management messages for functions such as PDP context activation and
deactivation. GMM procedures are defined in [14] and are beyond the scope of the LLC layer.
Interaction between GMM and LLC is defined in terms of service primitives.
The Short Message Service (SMS) uses the services of the LLC layer to transfer short messages
between the MS and the SGSN. SMS procedures are defined in [16] and [17] and are beyond of the
scope of the LLC layer. Interaction between SMS and LLC is defined in terms of service primitives.

Frame structure. All logical link control layer peer-to-peer exchanges shall be in frames
conforming to the format shown in fig. 5. The frame header shall consist of the address and control
fields, and is a minimum of 2 octets and a maximum of 37 octets long.

8 7 6 5 4 3 2 1
Address Field (1 octet)
Control Field
(variable length, max. 36 octets)

Information Field
(variable length, max. 201 octets)

Frame Check Sequence Field


(3 octets)
Fig. 5. LLC frame format.
The address field consists of a single octet. The address field contains the SAPI and identifies
the DLCI for which a downlink frame is intended and the DLCI transmitting an uplink frame.
The control field typically consists of between one and three octets. The SACK supervisory
frame also includes a variable-length bitmap field of up to 32 octets.
The information field of a frame, when present, follows the control field.
The Frame Check Sequence (FCS) field shall consist of a 24 bit cyclic redundancy check (CRC)
code. The CRC-24 is used to detect bit errors in the frame header and information fields.

Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on August 09,2010 at 12:04:25 UTC from IEEE Xplore. Restrictions apply.
4th IEEE-Russia Conference: MEMIA’2003 93
The FCS field contains the value of a CRC calculation that is performed over the entire contents
of the header and information field, except for UI frames transmitted in unprotected mode, in which
case the FCS field contains the value of a CRC calculation that is performed over the frame header
and the first N202 octets of the information field only. The information over which the CRC is
calculated is referred to as the dividend. Bit (1, 1) of the dividend is the highest-order term in the
calculation. CRC calculation shall be done before ciphering at the transmitting side, and after
deciphering at the receiving side.
The CRC shall be the ones complement of the sum (mod 2) of:
- the remainder of xk (x23 + x22 + x21 +… + x2 + x + 1) divided (modulo 2) by the generator
polynomial, where k is the number of bits of the dividend; and
- the remainder of the division by the generator polynomial of the product of x24 by the
dividend.
The CRC-24 generator polynomial is:
G(x) = x24 + x23 + x21 + x20 + x19 + x17 + x16 + x15 + x13 + x8 + x7 + x5 + x4 + x2 + 1.
As a typical implementation at the receiver, the initial content of the register of the device
computing the remainder of the division is pre-set to all “1's”. The final remainder, after
multiplication by x24 and then division (modulo 2) by the generator polynomial of the received
frame, will be (in the absence of errors):
C(x) = x22 + x21 + x19 + x18 + x16 + x15 + x11 + x8 + x5 + x4.
Because of the frame delimitation technique used in LLC, the frame can include any possible
sequence of bits without the need for e.g., bit stuffing as defined in [18].
The information carried within a UI frame may be considered as either "protected" or
“unprotected”. CRC error detection procedures are only used on the first octets of the information
content within unprotected UI frames, supporting applications that can tolerate bit errors.
LLC provides only an octet-aligned service to layer 3. LLC requires that information exchanged
with layer 3 contains an integral number of octets.
The basic frame numbering convention used in the present document is illustrated in fig. 6. The
bits are grouped into octets. The bits of an octet are shown horizontally and are numbered from 1 to
8. Multiple octets are shown vertically and are numbered from 1 to n.
Bit
8 7 6 5 4 3 2 1 Octet
1
2
:
:
n-1
n

Fig. 6. Format convention.


Frames are transferred between the LLC layer and underlying protocol layers in units of octets,
in ascending numerical octet order (i.e., octet 1, 2, …, n-1, n). The order of bit transmission is
specific to the underlying protocols used across the Um interface (e.g., RLC) and the Gb interface
(BSSGP).
Field mapping convention. When a field is contained within a single octet, the lowest bit
number of the field represents the lowest-order value. When a field spans more than one octet, the
order of bit values within each octet progressively decreases as the octet number increases. In that
part of the field contained in a given octet the lowest bit number represents the lowest-order value.
For example, a bit number can be identified as a couple (o, b) where o is the octet number and b
is the relative bit number within the octet. Fig. 7 illustrates a field that spans from bit (1,3) to bit
(2,7). The high-order bit of the field is mapped on bit (1,3) and the low-order bit is mapped on bit
(2,7).

Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on August 09,2010 at 12:04:25 UTC from IEEE Xplore. Restrictions apply.
94
Bit
8 7 6 5 4 3 2 1
24 23 22 1st octet of field
1 0
2 2 2nd octet of field

Fig. 7. Field mapping convention.


An exception to the preceding field mapping convention is the FCS field. In this case bit 1 of the
first octet is the high-order bit and bit 8 of the last octet is the low-order bit. The field mapping for a
24 bit FCS is shown in fig. 8.
Bit
8 7 6 5 4 3 2 1
216 223 1st octet of field
8 15
2 2 2nd octet of field
20 27 3rd octet of field

Fig. 8. FCS mapping convention.


The trunking gain due to the increased number of channels results in a lower queuing time for
packets at the base station. Employing multiple slots per user decreases the transmission time of a
packet. System resources are hence more efficiently utilized when idle channels are dynamically
reallocated to users with data queued.
However, the system becomes more loaded because of the reassignment of idle slots.
Consequently, the interference level increases, and a stronger coding scheme is needed.
Two different methods are used to reduce transmission errors in the data packets:
– Forward error correction using punctured convolutional codes at different coding rates;
– Retransmission of RLC blocks containing unrecoverable errors usually referred to as
Automatic Repeat reQuest (ARQ).
The Service Requester of a GPRS service in the downlink direction requires,
– The Service Receiver of a point-to-multipoint service request must be able to filter out
packets at a network level, through use of the Packet Identities, which are of no interest either
because they are for a service for which no subscription is held, or the packet belongs to a sub-
group within the offered application service which is of no interest. It is required that the MS-
Application resources shall not be utilized for this function.
– As an option scheduling of point-to-multipoint packets within the GPRS network may be
required. This includes controllable transmission repetition rates, the deactivation of obsolete
packets and the notification of adverse network conditions if necessary.
The Service Requester of a GPRS service in the uplink direction requires,
– Robust radio channel access mechanisms which allow the allocation of resources in a fair
way taking into account possible priorities and which are able to cope with overload situations.
The performance measure of the GPRS network capacity maximization is the average number of
users per cell, normalized by the amount of spectrum used, under the assumption that each user
generates packet traffic at the same rate. Three main parameters determine the link layer
performance of a GPRS network:
– Frequency reuse factor;
– Error coding scheme (CS);
– Data packet delay.
The coding scheme achieving the highest spectral capacity can be determined for different
frequency reuses 1/K and a given QoS requirement.
Depending on the environmental radio conditions (the amount of noise and interference in the
channel, the latter is directly related to the frequency reuse factor of the GSM network and the
Doppler spread in the channel), one of the four coding schemes can be selected [11]-[13]: CS1,
CS2, CS3, CS4, see table 1.
The impact of channel coding and ARQ can be described by the following two scenarios:

Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on August 09,2010 at 12:04:25 UTC from IEEE Xplore. Restrictions apply.
4th IEEE-Russia Conference: MEMIA’2003 95
Strong channel coding – The convolutional code recovers most of the transmission errors.
However, the effective throughput of data packets is small due to the low code rate. Examples are
CS1 and CS2.
Weak channel coding – Each RLC block carries a high payload and little redundancy.
Transmission errors can therefore often not be corrected and the whole RLC block has to be
retransmitted. Examples are CS3 and CS4.
Table 1. GPRS error coding schemes (in case of using one timeslot).
Coding scheme Punct. conv. code rate Payload [bits] Data rate [kbps]
CS1 1/2 181 8.8
CS2 ~ 2/3 268 13.0
CS3 ~ 3/4 312 15.2
CS4 1 428 20.9

Table 2 shows the different data rates that can be achieved with the different coding techniques.
Table 2. Raw Data Rate for GPRS (using one or eight timeslots, correspondingly).
User Data Rate CS1 CS2 CS3 CS4
1 Timeslot 9.05 kbps 13.4 kbps 15.6 kbps 21.4 kbps
8 Timeslot 72.4 kbps 107.2 kbps 124.8 kbps 171.2 kbps

Achieving the theoretical maximum GPRS data transmission speed would require a single user
taking over all eight timeslots without any error protection. Clearly, it is unlikely that a network
operator will allow all timeslots to be used by a single GPRS user. Additionally, the initial GPRS
terminals are severely limited supporting only one, two or three timeslots. The bandwidth available
to a GPRS user is therefore severely limited. As such, the theoretical maximum GPRS speed should
be checked against the reality of constraints in the networks and terminals.

IV. GPRS SECURITY ASPECTS


The use of radio communications for transmission to/from subscribers in mobile networks
makes them particularly sensitive to:
– Misuse of their resources by unauthorised persons using manipulated mobile stations.
– Eavesdropping on the information being exchanged on the radio path.
Therefore, to protect the system in the two cases mentioned above, the following security
features are provided for GPRS, e.g. [15]:
– MS authentication; i.e. the confirmation by the land-based part of the system that the
subscriber identity, transferred by the MS within the identification procedure on the radio path, is
the one claimed. The purpose of this authentication is to protect the network against unauthorised
use. It also enables the protection of GPRS subscribers by denying intruders the ability to
impersonate authorised users.
– Access Control; i.e. the network can support restrictions on access by or to different GPRS
subscribers, such as restrictions by location, screening lists and so on.
– User Identity Confidentiality; i.e. the property that the user identity on the radio link is not
made available or disclosed to unauthorised individuals, entities or processes. The purpose is to
provide privacy of identities of the subscribers who are using GPRS radio resources. It allows for
the improvement of other security features, e.g. User Information Confidentiality, and also provides
for the protection against tracing the location of a mobile subscriber by listening to the signalling
exchanges on the radio path.
– User Information Confidentiality; i.e. the property that the user information is not made
available or disclosed to unauthorised individuals, entities or processes. The purpose is to provide
for confidentiality of user data, i.e. protection of the message part pertaining to layers 3 and above,
that passes over the radio path.

Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on August 09,2010 at 12:04:25 UTC from IEEE Xplore. Restrictions apply.
96

V. AN EXPERIMENT
The authors experimented with the Eriksson R580m mobile phone (using “4+1” time slots –
four slots in “downlink” for receiving and one slot in “uplink” for requesting the information) in
GPRS connection with one of Novosibirsk GPRS operators – Siberia Cellular Systems (SCS-900,
operates within “Mobile Telecommunications Systems” network of Russia, web-site -
www.nsk.mts.ru). The results of an investigation of the downlink speed are presented in fig. 9.

Fig. 9. The experimental results of downlink speed.


The highest speed in this experiment was around 50kbps with the moderate rates about 25kbps.
There were some time intervals during which the connection was refused, thus conforming the
additional nature of GPRS to the GSM system. As it can be seen from fig. 3, GPRS greatly helps to
connect to the Internet during failures of the main connection (through local network in our
example), but speed is still not satisfying the customer demands.
Some additional reading on the subject can be found in [19]-[20].

VI. INTRODUCING EDGE


Future improvements to GPRS are already specified in the 3G standards. One of the more
challenging improvements for the GPRS systems will be the new advance coding techniques
specified in the 3G. This is the case of Turbo codes that are already includes in the 3G standard.
Enhanced GPRS (EGPRS or EDGE) is the GSM evolution, which has been already specified
by 3GPP2. It uses the existing bands of 850, 900, 1800 and 1900 MHz.
EDGE is an enhanced version of GPRS, using a different modulation
technique, eight-level Phase Shift Keying (8PSK), that has a spectral
efficiency of 3bits/s/Hz in comparison of GMSK’s 1bit/s/Hz.
Since 8PSK will also be used for 3G, network operators will need to
incorporate it at some stage to make the transition to third generation mobile
phone systems. For this reason EDGE requires a hardware upgrade of the
RF part in the base stations. EDGE is rapidly being deployed by carriers
globally because of its relatively low cost and time to deploy.
The first commercial products (like the Nokia 6200 and 6220) enable voice and data traffic at a
speed of up to 118 kbits/s. The maximum data speed of EDGE technology is 473 kbits/s.
According to [21], US: Seven.Five™ for EDGE, from Comarco,
Inc. (NASDAQ: CMRO) Wireless Test Solutions, is the first
comprehensive drive-test and in-building test system for the EDGE
cellular environment, offering global voice and data quality testing
using the Nokia 6200 and 6220 EDGE handsets. Seven.Five for
EDGE combines an integrated multi-band RF scanning receiver with
complete voice, data and video Quality of Service (QoS) tests. These
fully-integrated features make Seven.Five for EDGE the only tool that can measure QoS from the
perspective of the wireless subscriber while providing the root cause for any QoS problems.

Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on August 09,2010 at 12:04:25 UTC from IEEE Xplore. Restrictions apply.
4th IEEE-Russia Conference: MEMIA’2003 97
Launched by Comarco through its Wireless Test Solutions (WTS) group, in partnership with
SwissQual AG of Zuchwil, Switzerland, Seven.Five for EDGE will be used by infrastructure
providers and cellular carriers worldwide, speeding network deployment and optimization, as well
as benchmarking of the EDGE wireless infrastructure.

VII. CONCLUSION
GPRS allows network operators to implement an IP-based core architecture for data
applications, which continues to be used and expanded upon in 3G services for integrated voice and
data applications. In addition, GPRS proves a testing and development area for new services and
applications, which are used in the development of 3G services.
According to [22] 7 operators have launched EDGE by 24 November 2003 in 6 countries:
Cingular Wireless and AT&T Wireless in the USA, AT&T Wireless in Bermuda, AT&T Wireless
in Puerto Rico, Telefonica Moviles in Chile, CSL in Hong Kong and AIS in Thailand and the
orange areas above show where EDGE services are in deployment or are being trialed.
GPRS/EDGE was meant as a transition technique towards UMTS, e.g. see [23], but the UMTS
operators can not start planning from zero. So it should be noted that there is a great need in the
creation of UMTS/GSM dual-mode networks, see, e.g., [24], since the best solution is that the
existing GSM base station sites are to be the primary sites for UMTS base stations.

APPENDIX. GLOSSARY – GPRS TERMS [25]


2G (3G): – Second (Third) Generation
8PSK: – Eight-level Phase Shift Keying
AFC: – Automatic Frequency Control
AFE: – Analog Front End
AGC: – Automatic Gain Control
AGCH: – Access Grant CHannel
ASIC: – Application Specific Integrated Circuit
BCCH: – Broadcast Control CHannel
Bm: – User channel carrying 13 kbps data
BSS: – Base Station
CCCH: – Common Control Channel
CIR: – Complex Impulse Response
DCH: – Dedicated CHannel
DSP: – Digital Signal Processing
DTE: – Data Terminal Equipment
EDGE: – Enhanced Data rate for GSM Evolution, also called EGPSR
EGPSR: – Enhanced GPSR also called EDGE
ETSI: – European Telecommunication Standard Institute
FACCH: – Fast Associated Control CHannel
FCCH: – Frequency Correction burst Channel
GGSN: – Gateway GPRS Support Node
GPRS: – General Packet Radio Service
GSM: – Global systems for Mobile Communications
GSMK: – Gaussian Minimum Shift Keying
GSN: – GPRS Support Node
IP: – Internet Protocol
Lm: – User channel carrying less than 13 kbps data
MAC: – Medium Access Control
MLSE: – Maximum Likelihood Sequence Estimator
MPH: – Designation for primitives for communication between Layers 1 and 3
MS: – Mobile Station
NCH: – Notification CHannel
PACCH/F: – Packet Associated Control Channel/Full rate
PAGCH: – Packet Access Grant CHannel
PBCCH: – Packet Broadcast CHannel

Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on August 09,2010 at 12:04:25 UTC from IEEE Xplore. Restrictions apply.
98
PCH: – Paging CHannel
PDTCH: – Packet Data Traffic CHannel
PH: – Physical Layer
PPCH: – Packet Paging CHannel
PRACH: – Packet Random Access Channel
PSPDN: – Packet Switched Public Data Network
PTCH: – Packet Traffic CHannel
RACCH: – Random Access burst Channel
RACH: – Random Access CHannel
RISC: – Reduced Instruction Set Processor
RR: – Radio Resource
SACCH: – Slow Associated Control CHannel
SB: – Synchronization Burst
SDCCH: – Standalone Dedicated Control Channel
SGSN: – Serving GSN
SMS: – Short Message Service
TCH: – Traffic CHannel
TDMA: – Time Division Multiple Access

REFERENCES
[1] GPRS Overview, http://www.vocal.com/data_sheets/gprs1.html.
[2] GSM World: GPRS Platform, http://www.gsmworld.com/technology/gprs/index.shtml.
[3] ETSI TR 101.186 V6.0.0 (1998-04): “General Packet Radio Service (GPRS)”, 19 p.
[4] Cellular System Solutions for GSM/GPRS Wireless Terminals, 21 March 2003,
http://www.3g.co.uk/PR/March2003/5070.htm.
[5] Kazuaki Murota and Kenkichi Hirade, “GMSK Modulation for Digital Mobile Radio Telephony,”
IEEE Transactions on Communications, vol. 29, pp. 1044-1050, July 1981.
[6] Marvin K. Simon and Charles C.Wang, “Differential Detection of Gaussian MSK in a Mobile Radio
Environment,” IEEE Transactions on Vehicular Technology, vol. 33, pp. 307-320, November 1984.
[7] 3GPP TS 29.018: "General Packet Radio Service (GPRS); Serving GPRS Support Node (SGSN) –
Visitors Location Register (VLR); Gs interface layer 3 specification".
[8] 3GPP TS 44.064 V.5.1.0 (2002-3): “Mobile Station – Serving GPRS Support Node (MS-SGSN);
Logical Link Control (LLC) layer specification.”
[9] 3GPP TS 44.065: “General Packet Radio Service (GPRS); Mobile Station (MS) – Serving GPRS
Support Node (SGSN); Subnetwork Dependent Convergence Protocol (SNDCP).”
[10] 3GPP TS 48.018: “General Packet Radio Service (GPRS); Base Station System (BSS) - Serving
GPRS Support Node (SGSN); BSS GPRS Protocol (BSSGP).”
[11] 3GPP TS 22.060: “General Packet Radio Service (GPRS); Service description; Stage 1.”
[12] 3GPP TS 23.060: “General Packet Radio Service (GPRS); Service description; Stage 2.”
[13] 3GPP TS 43.064: “General Packet Radio Service (GPRS); Overall description of the GPRS radio
interface; Stage 2.”
[14] 3GPP TS 24.008: “Mobile radio interface Layer 3 specification; Core network protocols; Stage 3.”
[15] 3GPP TS 41.061: “General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements.”
[16] 3GPP TS 23.040: “Technical realization of the Short Message Service (SMS); Point-to-Point (PP).”
[17] 3GPP TS 24.011 “Point-to-Point (PP) Short Message Service (SMS) support on Mobile Radio
Interface.”
[18] ITU-T Recommendation Q.921 (1988): “ISDN user-network interface - Data link layer specification.”
[19] 3GPP TS 43.059: “Functional Stage 2 Description of Location Services (LCS) in GERAN.”
[20] 3GPP TS 44.060: “General Packet Radio Service (GPRS); Mobile Station (MS) - Base Station System
(BSS) interface; Radio Link Control/Medium Access Control (RLC/MAC) protocol”.
[21] New Edge Wireless Test Kit, http://www.3g.co.uk/PR/Nov2003/6113.htm, 19 November, 2003.
[22] 7 EDGE Wireless Launches in 6 Countries, http://www.3g.co.uk/PR/Nov2003/6137.htm,
24 November, 2003.
[23] Paul Reid, 3GPP Release 5 Update, ETSI Presentation.
[24] Vesa Karppi, “UMTS network status in Finland,” Sonera presentation, Finland, 23 April 2002.
[25] 3GPP TR 21.905: “Vocabulary for 3GPP Specifications.”

Authorized licensed use limited to: SARDAR VALLABHBHAI NATIONAL INSTITUTE OF TECH. Downloaded on August 09,2010 at 12:04:25 UTC from IEEE Xplore. Restrictions apply.

Das könnte Ihnen auch gefallen