Beruflich Dokumente
Kultur Dokumente
www.utltraining.com
www.utltraining.com
www.utltraining.com
INTRODUCTION
www.utltraining.com
Communication: It is the process of transferring information from one place to another place.
Any Communication System requires the following: Transmitter Channel Receiver
www.utltraining.com
www.utltraining.com
Full Duplex
Mobile Systems
www.utltraining.com
www.utltraining.com
www.utltraining.com
www.utltraining.com
Range
Frequency Band
Application
VLF
LF MF
3 KHz 30 KHz
30KHz to 300 KHz 300KHz to 3MHz
Submarine Application
Navigational Application Cordless Phones, AM radio
HF
VHF UHF SHF EHF
3 MHz to 30 MHz
30 MHz to 300 MHz 300 MHz to 3GHz 3 GHz to 30 GHz 30 GHz to 300 GHz
www.utltraining.com
www.utltraining.com
Access Methods
FDMA (Frequency Division Multiple Access) TDMA (Time Division Multiple Access) CDMA (Code Division Multiple Access)
www.utltraining.com
10
www.utltraining.com
FDMA
c f
11
www.utltraining.com
www.utltraining.com
TDMA
c f
13
www.utltraining.com
2.17.1
TDMA / FDD
c f
14
www.utltraining.com
2.18.1
15
www.utltraining.com
CDMA
16
www.utltraining.com
How CDMA uses codes to the actual data? User Data : 1011 (to be transmitted) PN Code : 110101 Transmitting Data : 001010 110101 001010 001010 Receiving Data : 001010 110101 001010 001010 PN Code : 110101
www.utltraining.com
18
www.utltraining.com
19
www.utltraining.com
20
www.utltraining.com
AMPS
D-AMPS
CDMA 2000
TACS
IS-95
GPRS
2.5G NMT GSM UMTS/ W-CDMA
ANALOG
1G
DIGITAL
2G
IMT-2000
3G
21
www.utltraining.com
ANALOG MOBILE COMMUNICATION Advanced Mobile Phone Service US based, 800 MHz band Total Access Communication System UK based, AMPS in 900 MHz band Nordic Mobile Telephone System Scandinavian, Both in 450 MHz and 900 MHz band
22
AMPS
TACS
NMT
ANALOG SYSTEM
1G
www.utltraining.com
D-AMPS
IS-95
GSM
DIGITAL SYSTEM
2G
www.utltraining.com
Cellular Standards
Generation
1G 2G 2.5G 3G
European Std
ETACS GSM GPRS UMTS/WCDMA
US Std
AMPS CDMA (IS-95) CDMA 2000 1X CDMA 2000 1x EVDO, EVDV etc..
24
www.utltraining.com
www.utltraining.com
ETACS : European Total Access Cellular System. AMPS : Advanced Mobile Phone System
2G Wireless Technologies
www.utltraining.com
www.utltraining.com
3G Wireless Technologies CDMA 2000 1x EVDO, EVDV etc. WCDMA, IMT 2000 (UMTS) 3.5G Wireless Technologies eHSPA : Evolved High-Speed Packet Access LTE : Long Term Evolution 4G Wireless Technologies
26
www.utltraining.com
www.utltraining.com
Standards
AMPS,TACS, CDMA,GSM,
Single standard
Data Rate
1.9kbps
200Mbps
TDMA,CDMA
www.utltraining.com
Why GSM?
GSM gives mobility without any loss in Audio quality Encryption techniques used gives high security Bit Interleaving for high efficiency in Transmission.
28
www.utltraining.com
Variable Power (Power budgetingextend battery life) Minimum Interference (DTX) Support International Roaming SMS (Short Message Services)
29
www.utltraining.com
www.utltraining.com
www.utltraining.com
Frequency Resource
GSM900 : Up link: 890~915MHz Down link: 935~960MHz Duplex interval: 45MHz Total Available Bandwidth: 25MHz Channel Bandwidth: 200KHz Total Number of channels : 125
32
www.utltraining.com
GSM1800 : Up link: 1710-1785MHz Down link: 1805-1880MHz Duplex interval: 95MHz Total Available Bandwidth: 75MHz Channel Bandwidth : 200KHz Total Number of channels : 375
33
www.utltraining.com
GSM1900MHz: Up link :1850~1910MHz Down link:1930~1990MHz Duplex interval: 80MHz Total Available Bandwidth: 60MHz Channel Bandwidth : 200KHz Total Number of Channels : 300
34
www.utltraining.com
Frequency Resource
Single Band Network
Which one?
General Priority
900MHz 1800MHz 1900MHz Low
Reason
High
New Operator
Propagation Characteristic
For Operator
UTL Technologies Ltd
For Subscriber
35
www.utltraining.com
Frequency Resource
Single Band Network Single Band Dual Band 900MHz 1800MHz
Triple Band
1900MHz
The network determines the handsets to be selected. But nowadays, most handsets support dual band.
36
www.utltraining.com
Frequency Resource
Single Band Network Cell coverage radius :
We know
Propagation characteristic
The higher the propagation frequency The higher the propagation loss 900MHz 1800MHz 1900MHz
www.utltraining.com
System
1.Frequencies Uplink Down Link 2.Wavelength 3.Band Width 4.Duplex Distance
GSM 900
890 - 915 MHz
GSM 1800
1710 1785 MHz
GSM 1900
1850 1910 MHz
5.CarrierSeparation
6.Radio Channels
200kHz
125
200kHz
375
200kHz
300
38
www.utltraining.com
Case Study 3:
Why different bands of frequencies are required for operators? What is the difference between different bands of GSM frequencies? Why uplink frequency is less compared to down link frequency?
39
www.utltraining.com
CELLULAR CONCEPT
40
www.utltraining.com
Wireless Communication
www.utltraining.com
Access Techniques
Uplink 890 MHz to 915 MHz Down Link 935 MHz to 960 MHz 25 MHz divided into 125 channels of 200 KHz bandwidth ( 25 / 0.2 = 125) 5 MHz BW allocated to each Cellular Service Provider( Maximum 5 operator )
UP 890.0 890.2 890.4 914.8 915.0
DOWN 935.0
935.2
935.4
959.8
960.0
42
www.utltraining.com
What is ARFCN ?
ARFCN--> Absolute Radio Frequency Channel Number used to express one pair of RF channels ARFCN = (fUP -890) / 0.2 or (fdown -935) / 0.2
ARFCN 1 2 124 125
UP
890.0
890.2
890.4
914.8
915.0
DOWN 935.0
935.2
935.4
959.8
960.0
fup=890+0.2*n;
UTL Technologies Ltd
fdown=935+0.2*n;
43
www.utltraining.com
T1
T2
T3
T4
T5
T6
T7
ARFCN24 ARFCN25
FOR A PARTICULAR MS UTL Technologies Ltd
44
www.utltraining.com
www.utltraining.com
5 ARFCN 4 MHz
.
ARFCN24 ARFCN25
5 MHz / 0.2 MHz = 25 CHANNEL 8 MOBILES CAN SHARE ONE CHANNEL BY TDMA
46
Cellular Structure
47
www.utltraining.com
www.utltraining.com
Urban areas. Low transmission power required. High number of MSs. However, micro cells are cells where the antenna height is under the average roof top level and they are typically used in urban areas.
Pico cells :
The Pico cells are small cells whose diameter is a few dozen meters and are mainly used 49 indoors.
UTL Technologies Ltd www.utltraining.com
Umbrella Cells
Umbrella cells are used to cover shadow regions of smaller cells and fill in gaps of coverage between those cells. These cells are usually built on high ways to cover the uncovered region.
50
www.utltraining.com
Case Study 4 :
How a cell site will be planned in the network?... Reg.Drive Test &Planning.
51
www.utltraining.com
What is a Cluster ?
A Cluster is a group of cells. No channels are reused within a cluster. If a cluster has 3 cells, it is called 3 cell cluster, if a cluster has 4 cells, it is called 4 cell cluster, and if it is 7 cells, it is called 7 cell cluster.
52
www.utltraining.com
2 2 7 3 7 1
Networking technology that breaks geographic area into cells shaped like honey comb
Cell
1
6 5 4
6
5 2 7 2
7
1 6 5
UTL Technologies Ltd
3
6 4
1
5
53
www.utltraining.com
4 Cell Cluster
54
www.utltraining.com
7 cell Cluster
55
www.utltraining.com
12 Cell Cluster
56
www.utltraining.com
10
7 1 3 1 6
15
4
8
6 5
To Overcome Coverage problem, We have to install 57 new BTS inLtd that nearby location UTL Technologies www.utltraining.com
Case Study 5:
How frequency planning will be done generally in cell sites? How sectorization will be done in cell sites?
58
www.utltraining.com
59
www.utltraining.com
GSM Architecture
60
www.utltraining.com
OMC Server 61
www.utltraining.com
62
www.utltraining.com
+ SIM
=>
Hand portable unit Frequency and Time Synchronization Voice encoding and transmission Voice encryption/decryption functions Power measurements of adjacent cells Display of short messages
63
www.utltraining.com
Human Identity to call a MS MSISDN uniquely identifies a mobile subscriber in PSTN Calls will be routed from the PSTN and other networks based on MSISDN number. MSISDN= CC + NDC + SN CC= Country Code (91) NDC= National Destination Code(9848) SN= Subscriber Number (012345)
64
www.utltraining.com
65
www.utltraining.com
International Mobile Equipment Identity [IMEI] The IMEI is used for equipment identification. An IMEI uniquely identifies a mobile station as a piece or assembly of equipment. IMEI = TAC + FAC + SNR + sp TAC= Type Approval Code (6 digits),determined by GSM body FAC= Final Assembly Code (2 digits), identifies the manufacturer SNR= Serial Number (6 digits), uniquely identifying all equipment within each TAC & FAC sp = Spare for future use (1 digit)
67
www.utltraining.com
www.utltraining.com
Static Information on the SIM card: International Mobile Subscriber Identity (IMSI) = (MCC + MNC+MSIN) Personal Identification Number (PIN) Authentication Key (Ki) MSISDN (Mobile Number)
69
www.utltraining.com
70
www.utltraining.com
BTS Hardware : TRX, Combiner, Splitter, OMU, Filters, Multi couplers, Power Supply Modules etc.. BTS Type: Omni-directional, Bi-directional(2 Sector) & Sctorised (3 Sector)
UTL Technologies Ltd UTL Technologies Ltd
71
www.utltraining.com
www.utltraining.com
3 sectored
1 sector
2 sectored
UTL Technologies Ltd UTL Technologies Ltd
72
www.utltraining.com
www.utltraining.com
TRX 1 ARFCN 1
TRX 4 ARFCN 10
SECTOR 1
2+2+2
TRX 2
ARFCN 4
TRX 5 ARFCN 13
SECTOR 2
TRX 3 ARFCN 7
TRX 6 ARFCN 16
SECTOR 3
73
www.utltraining.com
www.utltraining.com
BSS Configurations
The connectivity between BTS and BSC may be through Optical Fiber or Micro Wave Link.
75
www.utltraining.com
www.utltraining.com
How BTS will be configured? How BSC will be configured? How many BTS will be connected to a BSC? How BTS will be connected to a BSC?
76
www.utltraining.com
Interface of the cellular network to PSTN Routes calls between PLMN and PSTN Inter-BSC Handover Performs call switching Billing
77
www.utltraining.com
www.utltraining.com
www.utltraining.com
LAI 01
LAI 02 VLR 1
LAI 03
LAI 04 VLR 2
HLR
80
www.utltraining.com
www.utltraining.com
EIR (Equipment Identity Register) EIR is a database of all valid Subscribers Handset Identity (IMEI). EIR has different databases as follows., White list - For all known,good IMEIs Black list - For all bad or stolen handsets Implementation depends on Service Provider
82
www.utltraining.com
The OMC provides a central point from which to control and monitor the other network entities (i.e. base stations, switches, database, etc)
UTL Technologies Ltd UTL Technologies Ltd
83
www.utltraining.com
www.utltraining.com
www.utltraining.com
www.utltraining.com
The OMC should support the following functions Event/Alarm Management. Fault Management. Performance Management. Configuration Management. Security Management.
85
www.utltraining.com
Case Study 7:
How many elements will be there in network with a network operator (for a state) Elements wise description of a network.
86
www.utltraining.com
2004-2005 1 2 4 7 400 2
2007-2008 1 4 7 42 4000 6
87
www.utltraining.com
Network Elements
MSC Nokia DX 200 (sub rack and i-series) HLR Nokia DX 200 (sub rack and i-series) BSC Nokia DX 200 (2E, 2i, 3i) OMC Nokia DX 200 BTS Nokia (Talk Family, Ultra family, metro etc) IN Telcordia SMSC - Nokia
88
www.utltraining.com
MSC 120 K subscribers, 150 K subscribers, 300 K subscribers, 100 K subscribers. BSC 512 TRx, 256 TRx, 660 TRx
89
www.utltraining.com
Transmission Elements
Nokia DMR 15/18 GHz DMC Radio 15 GHz Nokia Flexi Hopper 7/15/18 GHz ERICSON mini link 15 GHz AT&T COMBIMUX Optical Equipment NOKIA SYNFONET Optical Equipment Micro wave Back bone Network : SIEMENS SRT 1C 7 GHz SIEMENS SRT 1S 7 GHz
90
www.utltraining.com
91
www.utltraining.com
92
www.utltraining.com
93
www.utltraining.com
94
www.utltraining.com
95
www.utltraining.com
96
www.utltraining.com
Communication Total mobility Worldwide connectivity High capacity High transmission quality Security functions
97
www.utltraining.com
98
www.utltraining.com
www.utltraining.com
99
www.utltraining.com
Internal Handover (Intra-BSS) 1. Within same base station - intra cell Hand over 2. Between different base stations - inter cell or intra BSC Hand over External Handover (Inter-BSS) 1. Within same MSC -intra MSC or Inter BSC Hand over 2. Between different MSCs - inter-MSC Hand over.
UTL Technologies Ltd UTL Technologies Ltd
100
www.utltraining.com
www.utltraining.com
1 Cell Site
2 Cell Site
3 Cell Site
4 Cell Site
BTS
BTS
BTS
BTS
BSC
BSC
BSC
2.Inter cell/Intra BSC Hand over 3.Inter BSC/Intra MSC Hand over 4.Inter MSC Hand over UTL Technologies Ltd
UTL Technologies Ltd
MSC
MSC
101
www.utltraining.com
www.utltraining.com
102
www.utltraining.com
www.utltraining.com
Case study 8:
Why call drops will happen in a network even when handovers are present in a network?
103
www.utltraining.com
ROAMING CONCEPT
104
www.utltraining.com
www.utltraining.com
Roaming:
Roaming is defined as the ability for a cellular customer to automatically make & receive voice calls, send & receive data, or access other services when traveling outside the geographical coverage area of the home network, by means of using a visited network.
UTL Technologies Ltd UTL Technologies Ltd
105
www.utltraining.com
www.utltraining.com
1.National Roaming: If the visited network is in the same country as the home network, this is known as National Roaming. 2. International Roaming: If the visited network is outside the home country, this is known as International Roaming (the term Global Roaming has also been used).
UTL Technologies Ltd UTL Technologies Ltd
106
www.utltraining.com
www.utltraining.com
3.Inter-Standard Roaming: If the visited network operates on a different technical standard than the home network, this is known as Interstandard roaming.
107
www.utltraining.com
AUTHENTICATION
108
www.utltraining.com
109
www.utltraining.com
Authentication Process
To discuss the authentication process, assume that the VLR has all the information required to perform that authentication process (Kc, SRES and RAND). If this information is unavailable, then the VLR would request it from the HLR/AUC. 1. Triples (Kc, SRES and RAND) are stored at the VLR. 2. The VLR sends RAND via the MSC and BSS, to the MS (unencrypted). 110
UTL Technologies Ltd www.utltraining.com
3. The MS sends SRES unencrypted to the VLR. 4. Within the VLR the value of SRES is compared with the SRES received from the mobile. If the two values match, then the authentication is successful.
www.utltraining.com
6. The mobile calculates Kc from the RAND and A8 and Ki on the SIM. 7. Using Kc, A5 and the GSM hyper frame number, encryption between the MS and the BSS can now occur over the air interface .
112
www.utltraining.com
113
www.utltraining.com
Channel concept
Physical channel: One timeslot of a TDMA-frame on one ARFCN is referred to as a physical channel. There are 8 physical channels per carrier in GSM, channel 0-7(timeslot 0-7) Logical channel: Depending on the kind of information transmitted, we refer to different logical channels. These logical channels are mapped on physical channel.
114
www.utltraining.com
Logical channels
Logical channels
Control channels
Traffic channels
BCH
CCCH
DCCH
Half rate
Full rate
www.utltraining.com
www.utltraining.com
Control channels
I. Broadcast channels BCH
2)Frequency correction channel-FCCH This is transmitted frequently on the BCCH timeslot and allows the mobile to synchronize its own frequency to that of the transmitting base site.
118
www.utltraining.com
3) Synchronization Channel-SCH This is used by the MS to synchronize to the TDMA frame structure within the particular cell. Listening to the SCH the MS receives 1. TDMA frame number 2. BSIC (Base Station Identity code).
119
www.utltraining.com
1) Paging Channel-PCH
The information on this channel is a paging message including the MSs identity(IMSI).This is transmitted on Downlink.
120
www.utltraining.com
When the mobile realizes it is paged, it answers by requesting a signaling channel on RACH. RACH is also used by the MS if it wants to originate a call. It is transmitted in Uplink point to point.
121
www.utltraining.com
122
www.utltraining.com
www.utltraining.com
Control channels
Dedicated Control Channels-DCCH
124
www.utltraining.com
125
www.utltraining.com
Traffic Channels-TCH
Full rate traffic channel occupies one physical Channel (one TS on a carrier)
Two half rate TCHs can share one physical channel.
126
www.utltraining.com
TDMA FRAME
127
www.utltraining.com
128
www.utltraining.com
BURSTS
129
www.utltraining.com
Burst
The information format transmitted during one timeslot in the TDMA frame is called a burst.
A Burst consists of several different elements.
Information : This is the area in which the speech, data or control information is held. Tail Bits : These are used to indicate the beginning and end of the burst.
130
www.utltraining.com
Stealing Flags : These two bits are set when a traffic channel burst has been stolen by a FACCH (the Fast Associated Control Channel). One bit set indicates that half of the block has been stolen.
www.utltraining.com
Guard
Period :
The BTS and MS can only receive the burst and decode it, if it is received within the timeslot designated for it.
To be precise, the timeslot is 0.577 ms long, whereas the burst is only 0.546 ms long; therefore there is a time difference of 0.031 ms to enable the burst to hit the timeslot.
132
www.utltraining.com
133
www.utltraining.com
134
www.utltraining.com
Normal Burst
Normal Burst : The normal burst carries traffic channels and all types of control channels apart from those mentioned specifically below. (Bi-directional).
156.25 bits OR 576.92 us
T Coded Data 3 57
S T. Seq. 1 26
Tail Bit(T) :Used as Guard Time Coded Data :It is the Data part associated with the burst Stealing Flag :This indicates whether the burst is carrying Signaling data. Training Seq. :This is a fixed bit sequence known both to the BTS & the MS.This takes care of the 135 UTL Technologies Ltd signal deterioration. www.utltraining.com
136
www.utltraining.com
Synchronization Burst
It is so called because its function is to carry SCH downlink, synchronizing the timing of the MS to that of the BTS
137
www.utltraining.com
Dummy Burst
Used when there is no information to be carried on the unused timeslots of the BCCH Carrier (downlink only).
138
www.utltraining.com
Access Burst
This burst is of much shorter duration than the other types. Whenever the MS tries to access the BTS, the information that is sent is called Access Burst. (The Access Burst is uplink only.)
139
www.utltraining.com
140
www.utltraining.com
141
www.utltraining.com t
142
www.utltraining.com
Transeiver
Speaker
Battery
LCD Display
ARM Processor
Micro phone
Keypad
143
www.utltraining.com
MOBILE STATION
TX PART TX MODULATOR BURST FORMATING CIPHERING INTERLEAVING CHANNEL CODING RX PART RX DEMODULATOR VITERBI EQULISER DE-CIPHERING DE-INTERLEAVING DECODING
SPPECH CODING
SEGMENTATION A/D CONVERSION Microphone UTL Technologies Ltd
SPPECH DECODING
D/A CONVERSION
144
Receiver
www.utltraining.com
ANALAG TO DIGITAL (A/D) CONVERSION One of the primary functions of an MS is to convert the analog speech information into digital form for transmission using a digital signal. The analog to digital conversion (A/D) conversion process outputs a collection of bits; binary ones and zeroes which represent the speech input
145
www.utltraining.com
The A/D Conversion is performed by using a process called Pulse Code Modulation (PCM). PCM involves three main steps. Sampling Quantization Coding.
146
www.utltraining.com
Sampling:
Sampling involves measuring the analog signal at specific time intervals. The accuracy of describing the analog signal in digital terms depends on how often the analog signal is sampled. This is expressed as the sampling frequency
147
www.utltraining.com
The sampling theory states that : To reproduce an analog signal without distortion, the signal, must be sampled with at least twice the frequency of the highest frequency component in the analog signal.
148
www.utltraining.com
Normal speech mainly contains frequency components lower than 3400 Hz. Applying the sampling theory to analog speech signals, the sampling frequency should be at least 2X3.4 kHz=6.8 kHz. Telecommunication systems use a sampling frequency of 8 kHz, which is acceptable based on the sampling theory.
149
www.utltraining.com
Quantization:
The amplitude of the signal at the time of sampling is measured and approximated to one of a finite set of values The degree of accuracy depends on the number of quantization levels used. Within common telephony, 256 levels are used while in GSM 8,192 levels are used.
150
www.utltraining.com
Coding
Coding involves converting the quantized values into binary. Every value is represented by a binary code of 13 bits (213=8192).
For example, a quantized value of 2,157 would have a bit pattern of 0100001101101:
151
www.utltraining.com
Bit
12
11
10
Total
Set to Value
0 0
1 2048
0 0
0 0
0 0
0 0
1 64
1 32
0 0
1 8
1 4
0 0
1 1
2157
152
www.utltraining.com
STAGE 2: SEGMENTATION AND STAGE 3: SPEECH CODING The speech coding process analyzes speech samples and outputs parameters of what the speech consists of. Segmentation: Given that speech organs are relatively slow in adapting to changes, the filter parameters representing the speech organs are approximately constant during 20 ms..
154
www.utltraining.com
For this reason, when coding speech in GSM, a block of 20 ms is coded into one set of bits. In effect, it is similar to sampling speech at a rate of 50 times per second instead of the 8,000 used by A/D conversion
155
www.utltraining.com
Summary of segmentation and speech coding The GSM speech coder produces a bit rate of 13 kbits/s per subscriber. When it is considered that 8 subscribers use one radio channel, the overall bit rate would be 8X13kbits/s =104kbits/s. This compares favorably with the 832 kbits/s from A/D conversion. However, speech coding does not consider the problems which may be encountered on the radio transmission path. The next stages in the transmission process, channel coding and interleaving, help to overcome these problems.
156
www.utltraining.com
SEGMENTATION
20 ms block SPEECH CODER
= 2080 bits/20ms
CONVOLUTION CODER
157
www.utltraining.com
www.utltraining.com
The first block of 50 bits is sent through a block coder, which adds three parity bits that will result in 53 bits. These three bits are used to detect errors in a received message. The 53 bits from first block, the 132 bits from the second block and 4 tail bits (total: 189) are sent to a 1:2 convolutional coder which outputs 378 bits. Bits are added by the convolutional coder enable the correction of errors when the message is received. The bits of block 3 are not protected. 159
UTL Technologies Ltd www.utltraining.com
160
www.utltraining.com
STAGE 5 : INTERLEAVING
First level of interleaving: The channel coder provides 456 bits for every 20 ms of speech. These are interleaved, forming eight blocks of 57 bits each, as shown in the figure below. In a normal burst, there is space for two of these speech blocks or 57 bits, as can be seen in figure. The remaining bits are like tail bits, stealing flags, training sequence and guard period. Thus, if one burst of transmission is lost, there is a 25% BER for the entire 20 ms of 161 speech (2/8=25%).
UTL Technologies Ltd www.utltraining.com
162
www.utltraining.com
If only one level of interleaving is used, a loss of this burst results in a total loss of 25%. This is too much for the channel decoder to correct. A second level of interleaving can be introduced to further reduce the possible BER to 12.5%.
163
www.utltraining.com
Instead of sending two blocks of 57 bits from the same 20 ms of speech within one burst, a block from one 20 ms and a block from next sample of 20 ms are sent together. A delay is introduced in the system when the MS must wait for the next 20 ms of speech. However, the system can now afford to loose a whole burst, out of eight, as the loss is only 12.5% of the total bits from each 20 ms speech frame. 12.5% is the maximum loss level that channel decoder can correct
164
www.utltraining.com
Diagonal interleaving
165
www.utltraining.com
STAGE 6: CIPHERING/ENCRYPTION
The purpose of ciphering is to encode the burst so that it cannot be interpreted by any other device than the intended receiver. The ciphering algorithm in GSM is called A5 algorithm.
166
www.utltraining.com
In GSM, the input to burst formatting is the 456 bits received from ciphering, Burst formatting adds a total of 136 bits per block of 20 ms, bringing the overall total to 592.
168
www.utltraining.com
169
www.utltraining.com
STAGE 8: MODULATION & TRANSMISSON The bits must then be sent over the air using a carrier frequency. GSM uses the GMSK modulation technique. The bits are modulated onto a carrier frequency and transmitted (e.g. 912.2MHz).
170
www.utltraining.com
Open Nokia BTS Manager Go to Tools Launch BTS Hardware Configurator Go to File Open and create the configuration according to the requirement Save it after giving a file name Close it Select BTS in the Menu of BTS Manager Send the file to BTS
171
www.utltraining.com
Select commissioning in BTS Manager Go to Wizard Select Manual commissioning Give BCF ID, BSC ID, site Name etc Click Next Abis will be in LAPD State, continue, click OK (Do You want to commission without Abis, click Yes) Give EAC inputs, click Next Give EAC outputs, click Next Finish (This will show the summary of commissioning) 172
UTL Technologies Ltd www.utltraining.com
Launch Ultra BTS Hub Manager in tools menu Double Click on E1/T1 card or FXC/RRI Give LIF settings Enable Used interfaces Apply Go to configuration Go to Traffic Manager Give TCH, TRx signalling, OMU signalling Select Topology (chain or loop) OK Go to synchronisation Go to Loop bits, if site is in Loop 173 Close UTL Technologies Ltd www.utltraining.com
2Mbps =32 X 64KbpsT00 T01 T02 T03 TRX TRAFFIC T04 8X16Kbps/TRX .. TRX T25 SIGNALLING T26 16Kbps/TRX T27 OMU T28 SIGNALLING T29 16Kbps/BTS T30 T31 UTL Technologies Ltd
Synchronization TRX_1 TRX_1 TRX_2 TRX_2 TRX1_S TRX2_S TRX_1 TRX_1 TRX_2 TRX_2 OMU1_S OMU2_S TRX_1 TRX_1 TRX_2 TRX_2 TRX_1 TRX_1 TRX_2 TRX_2
Signaling
174
www.utltraining.com
TRX_1 TRX_2
TRX_2
Signaling
175
www.utltraining.com
2Mbps =32 X 64KbpsT00 T01 T02 T03 TRX TRAFFIC T04 8X16Kbps/TRX .. TRX T25 SIGNALLING T26 16Kbps/TRX T27 OMU T28 SIGNALLING T29 16Kbps/BTS T30 T31 UTL Technologies Ltd
Signaling
176
www.utltraining.com
TRX_1
TRX_12 TRX_12
TRX1_S TRX2_S
TRX3_S TRX4_S TRX5_S TRX6_S
OMU1_S
TRX11_S TRX12_S
Signaling
177
www.utltraining.com
179
www.utltraining.com
www.utltraining.com
The MSISDN consists of the following: CC: Country code NDC: National Destination Code SN: Subscriber Number
International Mobile Station ISDN number
CC
NDC
SN
www.utltraining.com
International Mobile Subscriber Identity (IMSI): The International Mobile Subscriber Identity (IMSI) is a unique identity allocated to each subscriber that facilitates correct subscriber information over the radio path and through the network. It is used for all signaling in the PLMN. All Network related subscriber information is connected to an IMSI. The IMSI is stored in the SIM, the HLR and in 182 the serving VLR.
UTL Technologies Ltd www.utltraining.com
MCC
MSIN
National MSI
IMSI
The IMSI consists of three different parts. MCC: Mobile Country Code MNC: Mobile Network Code MSIN: Mobile Station Identification Number
UTL Technologies Ltd
183
www.utltraining.com
www.utltraining.com
International Mobile Equipment Identity (IMEI): The International Mobile Equipment Identity (IMEI) is used to uniquely identify MS equipment to the network. The IMEI is used for security procedures such as identifying stolen equipment and preventing unauthorized access to the network. According to the GSM specifications, IMEI has a total length of 15 digits, and consists of the following.
185
www.utltraining.com
TAC (6 digits)
FAC (2 digits)
SNR (6 digits)
SPARE (1 digit)
IMEI
TAC: Type Approval code, determined by a central GSM FAC: Final Assembly code, identifies the manufacturer SNR: Serial Number, an individual serial number of six digits uniquely identifies all equipment within each TAC and FAC. Spare: A spare Digit for future use. When transmitted by the MS, this digit should always be zero. 186
UTL Technologies Ltd www.utltraining.com
International mobile Equipment Identity and Software Version Number (IMEISV): The International Mobile Equipment Identity and Software Version Number (IMEISV) provide a unique identity for every MS and also refers to the version of software, which is installed in the MS. The version of software is important as it may affect the services offered by the MS or its speech coding capabilities.
187
www.utltraining.com
TAC (6 digits)
FAC (2 digits)
SNR ( 6 digits)
SVN (2 digits)
IMEISV
TAC : Type Approval Code FAC : Final Assembly code SNR : Serial Number SVN : Software Version Number allows the mobile equipment manufacturer to identify different Software versions of a given type approved mobile. SVN value 99 is reserved for future use.
188
www.utltraining.com
3. LOCATION RELATED IDENTITIES Mobile Station Roaming Number (MSRN) The Mobile Station Roaming Number (MSRN) is a temporary network identity, which is assigned during the establishment of a call to a roaming subscriber. The MSRN consists of three parts.
189
www.utltraining.com
CC
NDC
SN
CC : Country Code NDC: National Destination Code SN : Serving Node (in this case, SN is the address to serving MSC/VLR.
190
www.utltraining.com
www.utltraining.com
The LAI contains the following: LAC: Location Area code, the maximum length of LAC is 16 bits, enabling 65,536 different location areas to be defined in one PLMN
192
www.utltraining.com
The Base Station Identity Code (BSIC) enables MSs to distinguish between different base stations sending on the same frequency. The BSIC consists of
NCC BCC
BSIC
193
www.utltraining.com
NCC: Network Color Code (3 bits) identifies the PLMN. Note that it does not uniquely identify the operator. NCC is primarily used to distinguish between operators on each side of the border. BCC: Base Station color Code (3 bits), identifies the Base Station to help distinguish between BTS using the same control frequencies
194
www.utltraining.com
Different States of an MS
An MS can have one of the following states: Idle: The MS is ON, but a call is not in progress. Active: the MS is On and a call is in Progress. Detached: The MS is OFF.
195
www.utltraining.com
Description This is the process, which an MS informs a network that it is attached. When am MS moves around a network in idle mode, it is referred to as roaming. When an MS moves into a network, which is not, its home network, it is referred to as international roaming. MSs can only roam into networks with which the home network has a roaming agreement. An MS roaming around the network must inform the network when it enters a new LA. This is called location Updating. This is the process whereby a network attempts to contact a particular MS. This is achieved by broadcasting a paging message containing the identity of that MS. This is the process in which control of a call is passed from one cell to another while the MS moves between cells.
Location Updating
Paging
Active Mode
Handover
Detached Mode
In this mode no traffic cases are present. MS is switched OFF in this case. 196
www.utltraining.com
BSC/TRC
MSC/VLRR
2 4
198
www.utltraining.com
www.utltraining.com
IMSI DETACH
IMSI detach enables the MS to indicate to the network that it is switched ff. At power off, the MS sends an IMSI detach message to the network. On reception, the VLR marks the corresponding IMSI detached. The HLR is not informed. No acknowledgement is sent to the MS.
200
www.utltraining.com
TRAFFIC ENGINEERING
201
www.utltraining.com
202
www.utltraining.com
Traffic Intensity : The instantaneous traffic in a pool of resources is the number of busy resources at a given instant of time. Traffic intensity is a measure of the average occupancy of a facility during a specified period of time, normally a busy hour, measured in traffic units (erlangs) and defined as the ratio of the time during which a facility is occupied (continuously or cumulatively) to the time. This facility is available for occupancy. Traffic Intensity = Call Request Rate X Holding Time. Au = H, Where = Average Number of Call requests per unit time for each user. 203 H = Average Duration of a call.
UTL Technologies Ltd www.utltraining.com
Calling Rate : The number of times a route or traffic path is used per unit time, more properly defined, the call intensity per traffic path during busy hour. Holding time : The average duration of occupancy of a traffic path by a call. Traffic intensity : It is the average number of calls simultaneously in progress during a particular period of time. It is measured either in units of Erlangs or CCS.
204
www.utltraining.com
An average of one call in progress during an hour represents a traffic intensity of 1 Erlang or 1 Erlang=1X3600 call seconds=36 CCS. Traffic intensity can be obtained as: Traffic intensity = (The sum of circuit holding time)/(the duration of the monitoring period)
205
www.utltraining.com
1. If the carried load for a component is 2900 CCS at 5% blocking, what is the offered load? Sol: Offered load = 2900/(1-0.05)=3050 CCS.
2. In a voice network, each subscriber generates two calls/hour on average and a typical call holding time is 120 seconds. What is the traffic intensity? Sol : Intensity = 2X120/3600 = 0.0667 Erlangs = 2.4 CCS.
206
www.utltraining.com
Call Number
3. To determine voice traffic on a line, the following data was collected during a period of 90 minutes (refer the table below). Calculate the traffic intensity in Erlangs and CCS
1 2 3 4 5 6 7 8 9 10
207
www.utltraining.com
Sol: Call arrival Rate : 10 calls/1.5 hours =6.667 calls/Hour Average holding time : (60+74+80+90+92+70+96+48+64+126) / 10 = 80 seconds Intensity = 6.667X80/3600=0.148 Erlangs = 5.53 CCS.
208
www.utltraining.com
4. The data in the table below was recorded by observing the activity of a single customer line during the eight hour period from 9.00 A.M. to 5.00 P.M. Determine the traffic intensity during the eight hour period, during the Busy Hour (which is assumed to be between 4:00 PM. And 5:00 P.M).
209
www.utltraining.com
Call Number 1 2
3
4 5 6
10:17
10:24 10:37 10:55
10:24
10:34 10:42 11:00
7
8 9 10
12:01
2:09 3:15 4:01
12:02
2:14 3:30 4:35
11
4:38
4:43
210
www.utltraining.com
Calls/Hour Total call minutes = 3+10+7+10+5+5+1+5+15+34+5 = 100 minutes Call holding time = (100 minutes/11 calls)X 1Hr/60 mnts = 0.515 hour/call The traffic intensity I = 1.375 X 0.1515 = 0.208 Erlangs = 7.5 CCS.
211
www.utltraining.com
The busy hour is 4:00 P.M to 5:00 P.M. Since there are only two calls between this period, the call arrival rate = 2 calls/Hr The average call holding time during busy hour : (34+5) min/2 calls = 19.5 minutes/call =0.325 hour/call The traffic load in the BH is I= 2X0.325 = 0.65 Erlang =23.4 CCS.
212
www.utltraining.com
GSM SERVICES
213
www.utltraining.com
www.utltraining.com
Basic Services
Basic Services can be divided into 2 types:
Tele services:
A tele service allows the subscriber to communicate (usually via voice, fax, data or SMS) with another subscriber. It is a complete system including necessary terminal equipment.
215
www.utltraining.com
Bearer Services:
A bearer service transports speech and data as digital information within the network between user interfaces. A bearer service is the capability to transfer information and does not include the end user equipment. Every tele service is associated with a bearer service. For example, a bearer service associated with the speech telephony tele service is the timeslot assigned to a call on a TDMA frame over the air interface. 216
UTL Technologies Ltd www.utltraining.com
TELE SERVICES:
The following are the major tele services supported by GSM System.
1. Speech 2. Emergency Calls 3. Dual Tone Multi Frequency (DTMF) 4. Alternate Speech/Fax 5. Short Message Service 6. SMS Cell Broadcast (SMSCB) 7. Voice Mail 8. Fax Mail
217
www.utltraining.com
BEARER SERVICES:
1. Traffic to PSTN 2. Traffic to ISDN 3. Traffic to Packet Switched Public Data Networks (PSPDN) 4. Traffic to Circuit Switched Public Data Networks (CSPDN) 5. Traffic to Internet
218
www.utltraining.com
SUPPLEMENTARY SERVICES
1. 2. 3. 4. 5. Call Forwarding Barring of outgoing calls Bar all outgoing calls Bar all outgoing international calls Bar all outgoing international calls except those directed to the home PLMN 6. Call waiting 7. Multi party service 8. Closed User Group (CUG)
219
www.utltraining.com
BATTERY LIFE
220
www.utltraining.com
Battery Life
One of the main factors, which restrict reducing the size of a MS, is the battery. A battery must be large enough to maintain a telephone call for an acceptable amount of time without needing to be recharged. Since there is demand for MSs to become smaller and lighter the battery must also become smaller and lighter.
221
www.utltraining.com
The features which enable the life of a GSM MS battery to be extended are : 1.Power Control 2.Voice Activity Detection (VAD) 3.Discontinuous Transmission (DTX) 4.Discontinuous Reception (DRX)
222
www.utltraining.com
1. Power Control:
This is a feature of the GSM air interface which allows the network provider to not only compensate for the distance from MS to BTS as regards timing, but can also cause the BTS and MS to adjust their power output to take account of that distance also.
223
www.utltraining.com
The closer the MS is to the BTS, the less the power it and the BTS will be required to transmit. This feature saves radio battery power at the MS, and helps to reduce co-channel and adjacent channel interference
224
www.utltraining.com
Power Control
225
www.utltraining.com
3. Discontinuous Transmission (DTX) : DTX increases the efficiency of the system through a decrease in the possible radio transmission interference level. It does this by ensuring that the MS does not transmit unnecessary message data. DTX can be implemented, as necessary, on a call-by-call basis. The effects will be most noticeable in communications between two MS.
227
www.utltraining.com
www.utltraining.com
229
www.utltraining.com
230
www.utltraining.com
Call flow :
1. The incoming call is passed from the fixed network to the gateway MSC (GMSC). 2. Then, based on the IMSI numbers of the called party, its HLR is determined. 3. The HLR checks for the existence of the called number. Then the relevant VLR is requested to provide a mobile station roaming number (MSRN).
231
www.utltraining.com
4. This is transmitted back to the GMSC. 5. Then the connection is through from GMSC to the responsible MSC. 6. Now the MSC queries the VLR for the location range and reachability status of the mobile subscriber. 7. If the MS is marked reachable, VLR asks the MSC to go ahead with necessary paging message. 8. MSC asks the BSC for the same, then the BSC asks the BTS to send a paging message.
232
www.utltraining.com
9. Then the particular mobile subscriber telephone responds to the page request through RACH. This will be forwarded to the BSC and MSC. 10.SDCCH will be provided through AGCH by the BSC with the instructions from MSC. SDCCH handles all necessary security procedures like authentication, IMEI check etc. 11.If this is successful, the VLR indicates to the MSC to go ahead with the call. 12. The traffic channel will be provided and the call can be completed. 233
UTL Technologies Ltd www.utltraining.com
234
www.utltraining.com
Call Flow from MS to PSTN 1. MS after dialing a number and press send key uses RACH to ask for a signaling channel. 2. The BSC allocates a signaling channel, using AGCH. 3. The MS sends a call setup request through SDCCH, to the MSC/VLR. Over SDCCH, all signaling takes place. This includes:
235
www.utltraining.com
Marking the MS status as active in the VLR (if the MS status is not updated earlier). The Authentication Procedure Ciphering Equipment Identification Sending the called Subscriber number to the network Checking if the subscriber has service barring of outgoing calls activated.
236
www.utltraining.com
4. The MSC/VLR instructs the BSC to allocate an idle TCH. The BTS and MS are told to tune to the TCH. 5. The MSC/VLR forwards the called number to an exchange in the PSTN, which establishes a connection to the subscriber. 6. If the called subscriber answers, the connection is established.
237
www.utltraining.com
Case Study 9:
How Call flow happens in reality from the cell site? (PSTN Demo and BTS Video)
238
www.utltraining.com
239
www.utltraining.com
1. The BSC orders the new BTS to activate a TCH. 2. The BSC sends a message to the MS, via the old BTS, containing information about the frequency and time slot to change to and also the output power to use. This information is sent to the MS using FACCH. 3. The MS tunes to the new frequency, and transmits handover access burst in the correct time slot. Since the MS had no information yet on TA, the handover burst are very short (only 240 8 bits of information).
UTL Technologies Ltd www.utltraining.com
4. When the new BTS detects the hand over bursts, it sends the information about TA. This is also sent through FACCH. 5. The MS sends a handover complete message to the BSC through the new BTS. 6. The BSC tells the old BTS to release the old TCH
241
www.utltraining.com
.Hand over between cells controlled by different BSCs but the same MSC/VLR :
242
www.utltraining.com
1. The serving BSC sends a Hand over Required Message to the MSC containing the identity of the target cell 2. The MSC knows which BSC controls this cell and sends a Hand over Request to this BSC. 3. The new BSC orders the target BTS to activate a TCH. 4. The new BSC sends a message to the MS 243 through the MSC and the old BTS.
UTL Technologies Ltd www.utltraining.com
5. MS tunes to the new frequency and transmits handover access bursts in the correct time slot. 6. When the new BTS sends information about TA. 7. MS sends a handover complete message to MSC through the new BSC. 8. MSC sends the old BSC an order to release the old TCH. 9. The old BSC tells the old BTS to release the TCH.
244
www.utltraining.com
245
www.utltraining.com
1. The serving (old) BSC sends a Hand over required message to the serving MSC (MSC-A), with the identity of the target cell. 2. MSC-A identifies that this cell belongs to another MSC (MSC-B), and requests help. 3. MSC-B allocates a hand over number to reroute the call. A Hand over Request is then sent to the new BSC.
246
www.utltraining.com
4. The new BSC orders the target BTS to activate a TCH. 5. MSC-B receives the information, and passes it on to MSC-A together with the handover number. 6. A link is set up to MSC-B, possibly, though PSTN. 7. MSC-A sends a handover command to the MS, through the old BSC. 8. The MS tunes to the new frequency and transmits hand over access burst in the correct time slot.
247
www.utltraining.com
9. When the new BTS detects the hand over burst it sends information about TA. 10. The MS sends hand over complete message to the old MSC, through the new BSC and the new MSC/VLR. 11. A new path in the group switches in MSC-A is established, and the call is switched through. 12. The old TCH is deactivated by the old BSC.
248
www.utltraining.com
249
www.utltraining.com
The point-to-point SMS provides a mechanism for transmitting "short" messages to and from wireless handsets. The service makes use of a short message service center (SMSC), which acts as a store and forward system for short messages. The wireless network provides for the transport of short messages between the SMSCs and wireless handsets. 250
UTL Technologies Ltd www.utltraining.com
A distinguishing characteristic of the service is that an active mobile handset is able to receive or submit a short message at any time, independent of whether or not a voice or data call is in progress. SMS also guarantees delivery of the short message by the network. Temporary failures are identified, and the short message is stored in the network until the destination becomes available.
251
www.utltraining.com
SME Short Message Entity SMS Short Message Service SMSC Short Message Service Center
UTL Technologies Ltd
252
www.utltraining.com
SMS-GMSC Gateway Mobile Switching Center SMS-IWMSC SMS Inter working Mobile Switching Center
253
www.utltraining.com
Short Messaging Entities Short messaging entity (SME) is an entity which may receive or send short messages. The SME may be located in the fixed network, a mobile station, or another service center. Short Message Service Center Short message service center (SMSC) is responsible for the relaying and store-and forwarding of a short message between an SME and mobile station.
254
www.utltraining.com
The SMS gateway MSC (SMS-GMSC) is an MSC capable of receiving a short message from an SMSC, interrogating a home location register (HLR) for routing information, and delivering the short message to the "visited" MSC of the recipient mobile station. The SMS inter working MSC (SMS-IWMSC) is an MSC capable of receiving a short message from the mobile network and submitting it to the appropriate SMSC. The SMSGMSC/ SMSIWMSC are typically integrated with the SMSC.
255
www.utltraining.com
www.utltraining.com
www.utltraining.com
Service Elements
SMS comprises several service elements relevant to the reception and submission of short messages: Validity period: The validity period indicates how long the SMSC shall guarantee the storage of the short message before delivery to the intended recipient. Priority: Priority is the information element provided by an SME to indicate the priority message.
258
www.utltraining.com
Figure 3 depicts the successful MT-SM scenario. For convenience, the GSM method is illustrated.
259
www.utltraining.com
260
www.utltraining.com
1. The short message is submitted from the SME to the SMSC. 2. After completing its internal processing, the SMSC interrogates the HLR and receives the routing information for the mobile subscriber. 3. The SMSC sends the short message to the MSC using the forward Short Message operation.
261
www.utltraining.com
4. The MSC retrieves the subscriber information from the VLR. This operation may include an authentication procedure. 5. The MSC transfers the short message to the MS. 6. The MSC returns to the SMSC the outcome of the forward Short Message operation. 7. If requested by the SME, the SMSC returns a status report indicating delivery of the short message.
262
www.utltraining.com
Figure 4 depicts the successful MO-SM scenario. For convenience, the GSM method is shown.
263
www.utltraining.com
264
www.utltraining.com
1. The MS transfers the SM to the MSC. 2. The MSC interrogates the VLR to verify that the message transfer does not violate the supplementary services invoked or the restrictions imposed. 3. The MSC sends the short message to the SMSC using the forward Short Message operation.
265
www.utltraining.com
4. The SMSC delivers the short message to the SME. 5. The SMSC acknowledges to the MSC the successful outcome of the forward Short Message operation. 6. The MSC returns to the MS the outcome of the MO-SM operation.
266
www.utltraining.com
In the two cases described below, the MS is in idle mode. If the MS is in active mode, short message is transmitted on the SACCH. No paging, Call set up, authentication, etc needs to be performed in that case.
268
www.utltraining.com
269
www.utltraining.com
1. An MS establishes a connection to the network, as in the case of a normal call set-up. This step is not performed if the MS is in active mode, since the connection already exists. 2. If authentication is successful, the MS sends the short message using SDCCH to the SMSC via the MSC/VLR. The SMS-C in turn forwards the short message to its destination. This could be an MS or a terminal in the fixed network such as a PC.
270
www.utltraining.com
Mobile Terminated SMS has the capability to transfer a short message from the SMS-C to an MS.
271
www.utltraining.com
1. A User sends a message to a SMS-C. 2. The SMS-C sends the message to the SMSGMSC. 3. The SMS-GMSC queries the HLR for routing information 4. The HLR returns routing information to the SMS-GMSC. 5. The SMS-GMSC reroutes the message to the MSC/VLR.
272
www.utltraining.com
6. The MS is paged and a connection is set up between the MS and the network, as in the normal call set up case. 7. If authentication is successful, the MSC/VLR delivers the message to the MS. Short Messages are transmitted on the allocated signalling channel, SDCCH. 8. If the delivery was successful, a report is sent from the MSC/VLR to the SMS-C, if not, the HLR is informed by the MSC/VLR, and a failure report is sent to SMS-C. 273
UTL Technologies Ltd www.utltraining.com
In the case of an unsuccessful delivery, the SMS-C informs the HLR and VLR that there is a message waiting to be delivered to the MS. The HLR then informs the SMS-C when the MS becomes available.
274
www.utltraining.com
275
www.utltraining.com