You are on page 1of 31

1.

GPMS Yr 2009

GPMS is an initiative under Project SHIKHAR

Performance Management System (PMS) is not only a HR tool but it is a


management tool for translating expectations of top management into tangible
results.

The GPMS is an initiative under Project SHIKHAR of BSNL with the intent to have
an
objective and transparent system for assessing performance of employees.

KPI Key Performance Indicators

BBSCBalanced Business Score Card Yr 2006

The GPMS scorecards for all the group types have been designed to consist
of Key
Performance Indicators (KPIs) to measure the groups performance on
financial,
customer / market and operational parameters

Every scorecard has a parameter to measure customer satisfaction

KRA Key Responsibility Area

GPMS is considered suitable for implementation in BSNL as:-

It is based on new organization structure of BSNL.


KRA/KPIs are identified and defined on the basis of new Business Unit structureof
BSNL, in consultation with top executives of the respective Business Units.
Number of KPIs have been kept lessor Minimum to have focused
measurement of KeyPerformance Areas.
It is an optimum combination of quantitative and qualitative measurement.
KPIs are defined as per functional activities of a group.

For implementation of GPMS in BSNL, all executives have been structured


along 19 groups

Groupings in GPMS of BSNL Category of Groups - 4


1.Corporate Office 7 Groups, Group Type - 7
2.Territorial Circle- 26 Groups, Group Type - 1
3.Non- Territorial Circle 21 Groups, Group Type - 10
4.SSA 330 Groups, Group Type - 1
Total Groups 384, Group Type - 19

GPMS nodal designates in 7 groups

The correct approach of creating the GPMS is in a sequence that flows from top.
(Corporate Office)

The total score against a KPIwould be calculated after multiplying the


weightage of all parameter with its performance score

final score will be sum total of scores for all parameters

Awards under FPMS is Swarna, RajatPadak, Kansyapadakin CMQtrly within


Circle

Performance Levels Fair, Good and Excellant - 50, 75, 100, Score 60, 80, 100

Marks achieved for rating below Fair = 0.

Achievement between Fair and Good and between Good and Excellent would
be linearly scaled

linear scaling= Score = Score (Lower) + 20 x { T (Achieved) T (Lower) }


T (Upper) T (Lower)
Where:
T (Achieved) = Achieved target
T (Lower) = Target Lower than the achieved target i.e. Fair or Good
T (Upper) = Target higher than the achieved target i.e. Good or Excellent
Score (lower) = The score for target slab lower than achieved target i.e. 60 or 80

The BBSCbalanced scorecard is a management system (not only a


measurement system)

The BBSCbalanced scorecard suggests that we view the organization from four
perspectives

The Learning and Growth Perspective


The Business Process Perspective
The Customer Perspective
The Financial Perspective

learning and growth constitute the essential foundation for success of any
knowledge-worker organization

KSA Knowledge, Skill, Abilities

1- GSM 2G

GSM

Uplink Freq. 890-915 MHz


Downlink

BW

935-960 MHz

25 MHz

Modulation:

ASK, FSK- also Binary FSK-BFSK, PSK-Used for decode BFSK, CPFSK-Continuous
Phase FSK
MSKMINIMUM SHIFT KEYING is a special form of binary CPFSK.
Two level FSK modulation, where transmission bit rate R is exactly four times
the frequency shift (between 1s and 0s) is called Minimum Shift Keying MSK
In BPSK each of the two phases convey an information equivalent to a single bit
only
In QPSK each of the four phases of carrier representtwo bits of data
offset QPSK OQPSK
Gaussian MSK or GMSK
In GSM a B.T product of 0.3 is used with a channel data rate of 270.8 Kb/s
The most popular digital modulation schemes employed in cellular radio systems
are four level phase shift keying (QPSK) and its variants such as GMSK and / 4
shifted QPSK (OQPSK)

A group of cells is called a cluster.


No frequencies are reused in a cluster
Cells using the same channel set are called co-channel cells.
A PLMN is identified by the Mobile Country Code (MCC) and the Mobile Network
Code (MNC)
PLMN - Public land mobile network
The distance between cells using the same channel set is always the same
valid cluster sizes that allow this are: 1, 3, 4, 7, 9 and 12.
K-Channel Reuse Factor

If K increases, then performance increases

If K increases, then call capacity decreases per cell


VAD - Voice Activity Detection
Base Station Identification code (BSIC)

Mobile Subscriber ISDN Number (MSISDN)


international mobile subscribe identity (IMSI)is the primary function of the
subscriber within the mobile network and is permanently assigned to him
The GSM system can also assign a Temporary Mobile Subscriber Identity (TMSI) to
identity a mobile
Transcoder/Rate Adapter Unit (TRAU)
The interface between BSC and BTS is designed as an A-bis interface
interface between the MSC and the BSS is a standardized SS7 interface (A-interface)
In the authentication procedure, the key Ki is never transmitted to the mobile over
the air path, only a random number is sent. In order to gain access to the system,
the mobile must provide the correct Signed Response (SRES) in answer to a
random number (RAND) generated by AUC.
EIR- EQUIPMENT IDENTIFY REGISTER
THE STANDARD EC ECHO CANCELER CANCELS ABOUT 70 MS OF DELAY
Slow Associated Control Channel (SACCH)

Traffic channels (TCH)


Broadcast channels (BCH)
The Broadcast Control Channel (BCCH), The Synchronization Channel (SCH), The
Frequency-Correction Channel (FCCH),
Common Control Channels (CCCH)

The Paging Channel (PCH). It is used to alert the mobile station of an


incoming cal
The Random Access Channel (RACH), which is used by the mobile station to
request access to the network
The Access Grant Channel (AGCH). It is used, by the base station, to inform
the mobile station about which channel it should use. This channel is the
answer of a base station to a RACH from the mobile station

Dedicated Control Channels (DCCH)


The Standalone Dedicated Control Channel (SDCCH), which is used in order to
exchange signaling information in the downlink and uplink directions
The Slow Associated Control Channel (SACCH). It is used for channel maintenance
and channel control
Associated Control Channels
The Fast Associated Control Channels (FACCH) - urgent signaling information
The FACCH channels carry the same information as the SDCCH channels.
The interleaver for control channels is called a block rectangular interleaver
the interleaving depth of the GSM interleaving for control channels is four and a new
data block starts every four bursts.
The interleaving depth of the GSM interleaving for speech channels is then eight.
A new data block also starts every four bursts.
The interleaver for speech channels is called a block diagonal interleaver.
Interleaving for the GSM data TCH channels
A particular interleaving scheme, with an interleaving depth equal to 22

a ciphering key is computed using the algorithm A8 stored on the SIM card, the
subscriber key and a random number delivered by the network
DISCONTINUOUS TRANSMISSION (DTX)
The Voice Activity Detection (VAD
An equalizer is in charge of extracting the right signal from the received signal
SMS 160 Chars, SMS ( up-to 140 bytes)
SMS-CB(Cell Broadcast) 93 Chars
called mobile is busy (CFB)- Call Forw on Busy
CF on unreachable (CFNRc)
CF on no reply (CFNRy)
Call forwarding unconditionally (CFU)
Barring of All Outgoing Calls, BAOC (E1).
Barring of Outgoing International Calls, BOIC (E1).
Barring of Outgoing International Calls except those directed toward the Home
PLMN Country, BOIC-exHC (E1).
Barring of All Incoming Calls, BAIC (E1)
Barring of incoming calls when roaming (A).
Call Waiting, CW (E2)
Advice of Charge, AoC (E2)
Multiparty service (E2) Possibility of establishing a multiparty conversation.
Closed User Group, CUG (A).
Calling Line Identification Presentation, CLIP (A).
Calling Line Identification Restriction, CLIR (A)
Connected Line identification Presentation, CoLP (A).
Connected Line identification Restriction, CoLR (A).
USSD:Unstructured service supplementary data

7 times faster than conventional SMS !


A message of a maximum of 182 characters
USSD has a dialogue concept but no store & forward
Benefits of USSD:No clogging inbox since there is no storing mechanism
Activation Code *456*xx#

GSM Protocols
interface control information (ICI)
Service Access Points (SAP
In GSM, three types of layer 2 protocol are used LAPDM (link access protocol for
signaling channel) on the air interface, LAPD on A-bis interface, and the MTP-2
(message transfer part-CCITT recommended

On the DCCH both unacknowledged and acknowledged operations are used


whereas on the CCCHs only unacknowledged operation is applied
DCCHs (SDCCH, SACCH and FACCH)
CCCHs (BCCH, PCH and AGCH)
The main distinction between LAPD and LAPDm is the absence of address and
control fields. Thus, the protocol is only used for the unacknowledged mode of
operation, which applies to BCCHs and CCCHs only.
Both FCCH and SCH under BCCH do not require unacknowledged.
No acknowledgement is needed for PCH and AGCH.
The LAPD frame is used internal to BSS, namely, between BTS and BSC.
MTP 1 & MTP 2 are used for msg transfer
MTP 3 is used for msg transfer and O & M
SCCP messages can be either be connection oriented or connectionless.
This is contrary to MTP, which only use the connections service.
The channel request message on RACH consists of eight bits

among those eight bits, five are randomly allocated by the MS and serve as
discrimination between potentially colliding random accesses.
The three remaining bits define the kind of channel required
BSSAP is divided into two functions Direct Transfer Application Part (DTAP) and
BSSMAP.
A DTAP message also contains a data Link Connection Identification (DLIC).
in the OSI model MAP resides above the TCAP protocol.
MAP only uses the connectionless class of SCCP protocol.
The protocol is designed to interact with MSC, VLR / HLR, AUC, and GMSC so that
they can communicate with each other.
MAP contains a number of functional blocks known an Application System Element
(ASE),
In 26 frame traffic multi-frame 13th frame (frame no .12) is used for SACCH.SACCH
is used only for non-urgent procedures.
FACCH (Fast Associated Control Channel).-is required during conversation phase
operator determined barring (ODB)
while waiting for paging response, a defensive timer called, Early ACM timer is run
at MSC to avoid network timeouts
The SMS could be either in broadcast mode (via CBCH channel) or in a point-to-point
mode (via either SDCCH channel if mobile is in idle state, or SACCH if the mobile is
in dedicated mode).
Authentication Triplets.
At network side, authentication procedure requires authentication triplets.
Authentication triplet consists of:

Random number RAND (128 bits)

Signed response SRES (32 bits)

Ciphering key Kc (64 bits).

Fn 22 bit + Kc 64 bit = Encryption code 114 bit o/p of A5

While initiating authentication procedure, if network has no authentication triplet or


all triplets have been used, it requests AuC for the same.
The index of currently used triplet is known as CKSN. (Ciphering key sequence
number).
IMSI Detach procedure.purpose of this procedure is to indicate the network that
MS has switched off.
Different MM connections are identified by different protocol discriminator (PD) and
transaction identifier (TI) value
MIN
Customised Applications for Mobile networks Enhanced Logic,-- CAMEL
IN service switching functionality (SSF)
CAMEL Service Switching Functionality (gsmSSF)
all communication between SSF and SCF will be done through Intelligent Network
Application Protocol (INAP).
All communication between gsmSSF and gsmSCF is done through CAMEL
Application Part (CAP) protocol
The SGSN supports both dynamic routing and static routing
SGSN supports IPsec in tunnel or transport mode or GRE tunnels
The SGSN supports Dual Access, that is, simultaneous GSM and WCDMA Systems
radio access within one SGSN. CS and PS services can be used either
simultaneously or one at the time
Gn interface

Connects GPRS Support Nodes (GSNs) within the same Public


Land Mobile Network (PLMN) over a GPRS backbone network.

Gp interface

Connects the SGSN to GGSNs and SGSNs located in other PLMNs.

Gom interface Connects Operation & Maintenance (O&M) equipment to the


SGSN, making it possible for an operator to communicate with the
SGSN. In addition, it can be used to connect the SGSN with billing
systems and service nodes residing within its own PLMN. The Gom

interface is an Ericsson product. It is not defined in the Third


Generation Partnership Project (3GPP) standards, but is based on
standard Internet Engineering Task Force (IETF) protocols.

Gb interface

Connects the SGSN to Base Station Controllers (BSCs) in the GSM


for payload transport and signaling. Traffic over the Gb interface
can also be transported over Frame Relay, .

Iu-U interface

Designates the Iu user plane, connects the SGSN to Radio Network


Controllers (RNCs) in the WCDMA Radio Access Network (RAN) for
payload transport.

Iu-C interface

Designates the Iu control plane, connects the SGSN to RNCs in the


WCDMA RAN for signaling. Signaling over the Iu-C interface can
also be transported over broadband SS7, .

Gr interface

Connects the SGSN to the Home Location Registers (HLRs).


Signaling over the Gr interface can also be transported over
broadband and narrowband SS7,

Gs interface

Connects the SGSN to the Mobile Services Switching Center,


Visitor Location Register (MSC/VLR). Signaling over the Gs
interface can also be transported over broadband and narrowband
SS7,

Gd interface

Connects the SGSN to both the Short Message Service Gateway


Mobile services Switching Center (SMS-GMSC) and the Short
Message Service Interworking Mobile services Switching Center
(SMS-IWMSC). Signaling over the Gd interface can also be
transported over broadband and narrowband SS7, .

Ge interface

Connects the SGSN to the Service Control Point (SCP) with


Customized Applications for Mobile Network Enhanced Logic

(CAMEL). Signaling over the Ge interface can also be transported


over broadband and narrowband SS7, .

Gf interface

Connects the SGSN to the Equipment Identity Register (EIR).


Signaling over the Gf interface can also be transported over
broadband and narrowband SS7, .

Lg interface

Connects the SGSN to the Gateway Mobile Location Centre


(GMLC), providing MS location information from the PLMN.
Signaling over the Lg interface can also be transported over
broadband and narrowband SS7, .

Access Dial-In UserService (RADIUS) servers


The GGSN R5 product is based on the Juniper M20 Router
GGSN provides an interface between the SGSN (towards the MSs) and Packet Data
Networks(PDNs),
ServiceAwareChargingandControl(SACC)
MSC gets all data required for call request processing from three databases, VLR,
HLR and AUC.
Visitor Location Register (VLR) is a dynamic user database
Home Location Register (HLR) is a static database
OMC-S is responsible for the maintenance on the MSS side (swg)
while OMC-R is responsible for the maintenance on the BSS side.(Radio)
wireless intelligent network (WIN)
transfer bills to the billing center through the FTAM protocol
ZXC10-MSC/VLR provides a variety of configuration methods, and can meet the
requirements of up to 600, 000 subscribers.
Um

MS to BTS

Abis

BTS to BSC

BSC to MSC/SSP

MSC/SSP to VLR

MSC/SSP to HLR

VLR to HLR

MSC/SSP to MSC

Ai

MSC/SSP to PSTN

HLR to AUC or

MC to MC

MSC/SSP to MC

A3

Authentication Algorithm

A5

Ciphering Algorithm

A8

Kc Generation Algorithm

LAI

Location Area Identity

HLR to MC

LAI = MCC+MNC+LAC (LAC < FFFF)


21 = 3
1 Burst

+2 + 16
=

1 TDMA Frame
1 Burst

Bits

0.577 ms
=

8 * 0.577 = 4.616

(No. Of Bits) = 156.25 Bits

FCCH Burst =

142 Fixed bits + (3+3) Tail bits + 8.25 GP

Normal Burst
(1+1) Flag

57+57 Infn Bits + 26 Training Seq + (3+3) Tail Bits +

Maximum of 65536 LA can be defined in one GSM PLMN


FCCH prsent in time slot T0 and fixed pattern of 142 bits of 0s
After tuning to FCCH the MS synchronises in time with SCH

The occurrence of SCH is 8 Burst period later than FCCH


After Sync the MS will read TDMA Frame No. and BSIC (Base Station Identity Code)
BSIC (6 Bits) = PLMN Color Code (3 Bits) + BS Color Code (3 Bits)
MS measures the signal strength of BCCH Signal atleast once every 6Sec (Super
Frame Duration)
MS stores atleast 6 strogest BCCH and their cell identification in SIM
What is an Erlang
One Erlang is defined as the amount of traffic intensity carrier by a channel that is
completely occupied
Therefore,
1 Erlang = 1 call with a duration of 1 hour over a channel every hour
= 2 calls with a duration of 0.5 hours over the channel every hour
= 30 calls with a duration of 4 minutes over the channel every 2 hours (120
minutes)
A channel that carries 2 calls of duration 5 minutes each per hour carries (2*5
min/60 min = 1/6 Erlangs)
Grade of Service (GOS)
The grade of service (GOS) is related to the ability of a mobile phone to access the
trunked mobile
phone system during the busiest hour.
To meet a specific GOS, the maximum required capacity of the system must be
estimated and
the proper number of channels must be allocated for the system
GOS is a measure of the congestion of the system which is specified as the
probability of a call
being blocked (Erlang B system) or the probability of a call being delayed beyond a
certain
amount of time (Erlang C system).

System Capacity =

C=k.MN

K Group of channels allotted for each cell and k<s


M Cluster N is replicated M times
N Cluster Size
s - No. Of Duplex Channels available
s = kN
hence Cellular Capacity

Freq. Reuse Factor,

C = Ms

f = 1/N

The time period for which a particular call is maintained/sustained in a


cellular region is known as Dwell Time.
In umbrella pattern , cells having low traffic is called micro cell and cells
having more traffic is called macro cell
CCI Co Channel Interferrance
ACI Adjacent Channel Interferrance
Directional Antennas Cell sectoring
120 Degree 3 sectors ,

60 Degree 6 sectors in hexagonal cells

ARFCN Absolute RF carrier Number (1 and 124 th are not used in GSM)
Practicall only 122 chls available
ARFCN(n) =

Freq. Uplink (n)

Freq. Downlink (n)

= 890.2+0.2*(n-1) MHz
= 935.2+0.2*(n-1) MHz

Speech sampled every 20 ms at a bit rate of 260 bits/sec


Channel coding converts the 260 bits/s to 456 b/s coded signal
Interleaving sends the 456 bits int 8 blocks of 57 bit each in every burst

As long as the ratio

Frequency reuse distance =D


Cell radius

Is greater than some specified value, the ratio

Received radio carrier power

Received interferer radio carrier power

C
I

Will be greater than some given amount for smallas well as large cell sizes when all
signals are transmitted at the same power level.

The frequency reuse distance is also known as separation distance. is also known as
the signal-to-noise ratio.
The ratio D/R needs to be large enough in order for the base station to be able to
cope with the interference

RACH (Random Access CHannel)


The RACH is used in the uplink direction by the mobile stations for requesting a
channel for a connection. It is an access channel that uses theslotted Aloha
access scheme.

FACCH (Fast Associated Control CHannel)


The FACCH is used as a main signaling link for the transmission of signaling
data (for example handover commands). It is also required for every call set-up
and release. During the call the FACCH data is transmitted over the allocated
TCH instead of traffic data; this is marked by a flag called a stealing flag. The
process of stealing a TCH for FACCH data is called pre-emption.
The net SDCCH bit rate is about 0.8 kbit/s.

For normal service, the mobile station has to camp on a suitable call, tune to that
cells control channel. The choice of such a suitable cell for the purpose of normal
service is referred to as normal camping
The CCCH is a channel that carries both the PCH and the AGCH on the downlink, and
the RACH on the uplink.

The interleaver for control channels is called a block rectangular interleaver.


The interleaving depth of the GSM interleaving for control channels is four.
The interleaver for speech channels is called a block diagonal interleaver. The
interleaving depth of the GSM interleaving for speech channels is then eight.
Interleaving for the GSM data TCH channels, The data blocks are said to be
interleaved diagonally , with an interleaving depth equal to 22.
DISCONTINUOUS RECEPTIONis a method used to conserve the mobile
station's power

Speech 8 Kz sampling rate and 13 bits per sample hence 104 kb/s bit rate or
2080 bits per block of 20 ms is sent to voice coder.
kb/s

Voice coder RPE-LTP compresses the 2080 bits to 260 bits per 20 ms or 13
After chl coding 260b becomes 456 bits

The IMEI
consists of 15 digits (60 bits). There is a 6 digit type approval code TAC, a 2
digit Final
Assembly Code FAC, 6 digit serial number SNR and a 4 bit space SP
The Personal Identification Number PIN
- The Pin Unblocking Key PUK
- The SIM-Service Table
The Abis interface between BTS and BSC is typical ISDN. It is built by a PCM
30-interface,
i.e. there are 30 channels with a speed of 64 kbit/sec. A full rate GSM data
channel is
compressed to16 kbit/sec. Thus 4 GSM channels fit into a 64 kbit/sec ISDNchannel. Layer 1and Layer 2 are the same as in ISDN-channels.
MTP1 is known as the Signalling Data Link (Bit Layer).
MTP2 defines the principle frame structure known from the Link Access
Protocol used in the

ISDN D-Channel (LAPD).


We will deal only with MTP3 which describes the signalling message handling
dependent onthe served user (e.g. ISDN =>ISDN Served User Part ISUP).

A field strength of less than around -102 dB is unusable for aGSM-connection

GPRS & EDGE

Channel Bandwidth

200 kHz

Modulation type

GMSK

Data handling

Packet data

Max data rate

172 kbps

The main new network architecture entities that are needed are:

SGSN: GPRS Support Node - this forms a gateway to the services within the
network.

GGSN: Gateway GPRS Support Node which forms the gateway to the
outside world.

PCU: Packet Control Unit which differentiates whether data is to be routed


to the packet switched or circuit switched networks.

There are a total of 29 speed classes.


Class one mobiles are able to send and receive in one slot in either direction,
i.e. uplink and downlink, and
class 29 mobiles are able to send and receive in all eight slots. The classes
within these two limits are able to support sending and receiving in different
combinations of uplink and downlink slots.
The GPRS slot may also be used by the base station to judge the time delay
using a logical channel known as the Packet Timing Advance Control Channel
(PTCCT).
Coding Scheme (4 Nos)

CODING SCHEME

CS-1

CS-2

CS-3

CS-4

Date rate per slot


(kbps)

9.05

13.4

15.6

21.4

Max data rate with 8


slots
(kbps)

72.4

107.2

124.8

171.2

Three layers,
Layer 1 (Physical Layer) - Radio Link Control (RLC) and the Medium Access Control
(MAC) layers
There is also the Logical Link Layer (LLC) that formats the data frames and is used
to link the elements of the core network to the mobile

Channels

GPRS uses only one physical channel (PDCH) for the sending of data
There are three MAC modes that are used to control the transmissions. These are
named fixed allocation, dynamic allocation, and extended dynamic allocation.
The fixed allocation mode is required when a mobile requires a data to be sent at a
consistent data rate. To achieve this, a set of PDCHs are allocated for a given
amount of time. When this mode is used there is no requirement to monitor for
availability, and the mobile can send and receive data freely. This mode is used for
applications such as video conferencing.
When using the dynamic allocation mode, the network allocates time slots as they
are required. A mobile is allowed to transmit in the uplink when it sees an identifier

flag known as the Uplink Status Flag (USF) that matches its own. The mobile then
transmits its data in the allocated slot. This is required because up to eight mobiles
can have potential access to a slot, but obviously only one can transmit at any
given time.
A further form of allocation known as extended dynamic allocation is also available.
Use of this mode allows much higher data rates to be achieved because it enables
mobiles to transmit in more than one slot. When the USF indicates that a mobile can
use this mode, it can transmit in the number allowed, thereby increasing the rate at
which it can send data.

Logical channels
Broadcast channels:

Packet Broadcast Central Channel (PBCCH): This is a downlink only


channel that is used to broadcast information to mobiles and informs them of
incoming calls etc. It is very similar in operation to the BCCH used for GSM. In
fact the BCCH is still required in the initial to provide a time slot number for
the PBCCH. In operation the PBCCH broadcasts general information such as
power control parameters, access methods and operational modes, network
parameters, etc, required to set up calls.

Common control channels:

Packet Paging Channel (PPCH): This is a downlink only channel and is


used to alert the mobile to an incoming call and to alert it to be ready to
receive data. It is used for control signalling prior to the call set up. Once the
call is in progress a dedicated channel referred to as the PACCH takes over.

Packet Access Grant Channel (PAGCH): This is also a downlink channel


and it sends information telling the mobile which traffic channel has been
assigned to it. It occurs after the PPCH has informed the mobile that there is
an incoming call.

Packet Notification Channel (PNCH): This is another downlink only


channel that is used to alert mobiles that there is broadcast traffic intended
for a large number of mobiles. It is typically used in what is termed point-topoint multicasting.

Packet Random Access Channel (PRACH): This is an uplink channel that


enables the mobile to initiate a burst of data in the uplink. There are two
types of PRACH burst, one is an 8 bit standard burst, and a second one using
an 11 bit burst has added data to allow for priority setting. Both types of
burst allow for timing advance setting.

Dedicated control channels:

Packet Associated Control Channel (PACCH): : This channel is present


in both uplink and downlink directions and it is used for control signalling
while a call is in progress. It takes over from the PPCH once the call is set up
and it carries information such as channel assignments, power control
messages and acknowledgements of received data.

Packet Timing Advance Common Control Channel (PTCCH): This


channel, which is present in both the uplink and downlink directions is used to
adjust the timing advance. This is required to ensure that messages arrive at
the correct time at the base station regardless of the distance of the mobile
from the base station. As timing is critical in a TDMA system and signals take
a small but finite time to travel this aspect is very important if long guard
bands are not to be left.

Dedicated traffic channel:

Packet Data Traffic Channel (PDTCH): This channel is used to send the
traffic and it is present in both the uplink and downlink directions. Up to eight
PDTCHs can be allocated to a mobile to provide high speed data.

EDGE:
overall EDGE modulation scheme is a mixture of GMSK and 8PSK
Most of the data being sent over an EDGE link will consist of TCP/IP packets.
These packets are longer than a single EDGE packet payload and therefore it
is necessary to split the TCP/IP packets into smaller section and these are known as
"chunks".
These chunks have defined sizes and may consist of one of 22, 28, 34, or
37 bytes or "octets". The 37 octet chunk may be made directly of data to be
transmitted, or it may be a 34 octet chunk which is then padded by adding three
dummy octets.

There are nine different Modulation and Coding Schemes (MCS) that can be used
with EDGE. Each one is designated a number in the region MCS1 to MCS9
The different coding schemes are grouped into three classes or families which are
referred to by letters, as classes A, B and C
MCS 1 to 4 uses GMSK hence compatible with GPRS, MCS 5 to 9 uses 8PSK

WCDMA

Uplink 1920-1980 MHz


Downlink 2110-2170 MHz

Spreading diff varies between 4 and 512


Chip rate = 3.84 Mcps
BW = 5 MHz

SNDCP SubNetworkDependent Convergence Protocol

PDP stands for Packet Data Protocol. The PDP addresses are network layer addresses (Open
Standards Interconnect [OSI] model Layer 3). GPRS systems support both X.25 and IP network
layer protocols. Therefore, PDP addresses can be X.25, IP, or both.
Each PDP address is anchored at a Gateway GPRS Support Node (GGSN), as shown in figure
below. All packet data traffic sent from the public packet data network for the PDP address goes
through the gateway (GGSN).

The public packet data network is only concerned that the address belongs to a specific GGSN.
The GGSN hides the mobility of the station from the rest of the packet data network and from
computers connected to the public packet data network.

Statically assigned PDP addresses are usually anchored at a GGSN in the subscriber's home
network. Conversely, dynamically assigned PDP addresses can be anchored either in the
subscriber's home network or the network that the user is visiting.
When a MS is already attached to a SGSN and it is about to transfer data, it must activate a PDP
address. Activating a PDP address establishes an association between the current SGSN of mobile
device and the GGSN that anchors the PDP address.
The record kept by the SGSN and the GGSN regarding this association is called the PDP
context.
It is important to understand the difference between a MS attaching to a SGSN and a MS activating
a PDP address. A single MS attaches to only one SGSN, however, it may have multiple PDP
addresses that are all active at the same time.
Each of the addresses may be anchored to a different GGSN. If packets arrive from the public
packet data network at a GGSN for a specific PDP address and the GGSN does not have an active
PDP context corresponding to that address, it may simply discard the packets. Conversely, the
GGSN may attempt to activate a PDP context with a MS if the address is statically assigned to a
particular mobile device.

The GPRS access modes specify whether or not the GGSN requests user authentication at
the access point to a Public Data Network (PDN). The available options are:

Transparent - No security authorization/authentication is requested by the GGSN.

Non-transparent - In this case, GGSN acts as a proxy for authenticating.


The GPRS transparent and non-transparent modes relate only to PDP type IPv4.

TRANSPATENT MODE
Transparent access pertains to a GPRS PLMN that is not involved in subscriber access
authorization and authentication. Access to PDN-related security procedures are transparent to
GSNs.

In transparent access mode, the MS is given an address belonging to the operator or any
other addressing space of domain. The address is given either at subscription as a static address
or at PDP context activation, as a dynamic address. The dynamic address is allocated from a
Dynamic Host Configuration Protocol (DHCP) server in the GPRS network. Any user authentication
is done within the GPRS network. No RADIUS authentication is performed; only IMSI-based
authentication (from the subscriber identity module in the handset) is done.

NON TRANSPATENT MODE


Non-transparent access to an intranet/ISP means that the PLMN plays a role in the
intranet/ISP authentication of the MS. Non-transparent access uses the Password Authentication
Protocol (PAP) or Challenge Handshake Authentication Protocol (CHAP) message issued by the
mobile terminal and piggybacked in the GTP PDP context activation message. This message is
used to build a RADIUS request toward the RADIUS server associated with the access point name
(APN).

GPRS ACCESS POINT NAME


The GPRS standards define a network identity called an Access Point Name (APN). An
APN identifies a PDN that is accessible from a GGSN node in a GPRS network. In GPRS, only the
APN is used to select the target network. To configure an APN, the operator configures three
elements on the GSN node:

Access point - Defines an APN and its associated access characteristics, including security
(RADIUS), dynamic address allocation (DHCP), and DNS services.

Access point list - Defines a logical interface that is associated with the virtual template.

Access group - Defines whether access is permitted between the PDN and the MS

GPRS - Network Processes

This chapter gives a brief description of the basic processes used in GPRS networks:

Attach process - Process by which the MS attaches (i.e., connects) to the SGSN in a GPRS network.

Authentication process - Process by which the SGSN authenticates the mobile subscriber.

PDP activation process - Process by which a user session is established between the MS and the
destination network.

Detach process - Process by which the MS detaches (i.e., disconnects) from the SGSN in the GPRS
network.

Network-initiated PDP request for static IP address - Process by which a call from the packet data
network reaches the MS using a static IP address.

Network-initiated PDP request for dynamic IP address - Process by which a call from the packet data
network reaches the MS using a dynamic IP address.

P-TMSI i.e Packet TMSI is used to derive the Temp. Logical Link Identity
(TLLI)

Idle Downlink chls are used for timing advance signals


Idle Uplink chls are used for PACH signals
GPRAS Datagram size 8060 bits
GSM - Channel Equalisation Selective freq. Distortion
To avoid co-ChlInterfer min pwr level 12 db for bts

3G UMTS:
UTRAN UMTS Terrestrial Radio Access N/W.
CN Core N/W
Macro diversity (FDD only) is fully handled in the UTRAN.

Mobility for RRC connection is fully controlled by the UTRAN.


NAS Non Access Stratum -Contrl Protocol bw UE and CN

A Node B is connected to the RNC through the Iub interface


A Node B can support FDD mode, TDD mode or dual-mode operation.
There are two chip-rate options in the TDD mode: 3.84 Mcps TDD and 1.28 Mcps
TDD.
Each TDD cell supports either of these options.
A Node B which supports TDD cells can support one chip-rate option only, or
both options.
A RNC which supports TDD cells can support one chip-rate option only, or both
options.
The RNC is responsible for the Handover decisions that require signalling to the
UE.
A RNC may include a combining/splitting function to support
combination/splitting of
information streams .
Inside the UTRAN, the RNCs of the Radio Network Subsystems can be
interconnected
together through the Iur.
Iu(s) and Iur are logical interfaces.
Iur can be conveyed over directphysical connection between RNCs or virtual
networks using any suitable transport network.
The RNC may be connected to BSS supporting GERAN(GPRS Enabled RAN)Iu
mode via the Iur-g interface
Regarding the UE positioning method, the RNC may have full internal
support for this function and/or may be connected to one SAS via theIupc
interface.
Each RNS is responsible for the resources of its set of cells.

For each connection between User Equipment and the UTRAN, One RNS is the
Serving
RNS. When required, Drift RNSs support the Serving RNS by providing radio
resources
The role of an RNS (Serving or Drift) is on a per connection basis betweena UE
and the UTRAN.
To support UE mobility between UTRAN and GERAN Iu mode, the Serving RNS
may be
connected to the DBSS and vice versa
The role of an RNSor BSS (Serving or Drift) is on a per connection basis between
an UE and theUTRAN/GERAN Iu mode.
The UTRAN is layered into a Radio Network Layer and a Transport Network Layer
The UTRAN logical nodes and interfaces between them, are defined as part of the Radio
Network Layer
The transport network layer provides services for user plane transport, signalling transport
and transport of implementation specific O&M
The Service Area Identifier (SAI)

The Cell identifier (C-Id) is used to uniquely identify a cell within an RNS/BSS.
The Cell-Id together with the identifier of the controlling RNC/BSS (CRNC-Id) constitutes the
UTRAN/GERAN Cell Identity (UC-Id) and is used to identify the cell uniquely within
UTRAN/GERAN Iu mode.
UC-Id or C-Id is used to identify a cell in UTRAN Iub and Iur interfaces or Iur-g interface
UC-Id = CRNC-Id + C-Id
The C-Id is defined by the operator, and set in theRNC/BSS via O&M.
The C-Id is set in a Node B by its C-RNC or in the GERAN Iu mode cell.
Local Cell Identifier : The Local Cell identifier is used to uniquely identify the set of
resources within a Node B required to support a cell (as identified by a C-Id)

UE Identifiers: Radio Network Temporary Identities(RNTI) are used as UE identifiers within


UTRAN/GERAN Iu mode and in signalling messages between UE and UTRAN/GERAN Iu
mode.
Six types of RNTI exist:
1) Serving RNC/BSS RNTI (s-RNTI);
2) Drift RNC/BSS RNTI (d-RNTI);
3) Cell RNTI

(c-RNTI);

4) UTRAN/GERAN RNTI (u-RNTI);


5) [TDD - DSCH RNTI (DSCH-RNTI)];
- HS-DSCH RNTI
6) [FDD - E-DCH RNTI

(HS-DSCH RNTI);
(E-RNTI);]

Each RNC has a unique identifier within the UTRAN part of the PLMN, denoted by RNC
identifier (RNC-ID).
This identifier is used to route UTRAN interface messages to correct RNC.
RNC-ID of the serving RNC together with the s-RNTI is a unique identifier of the UE
in the UTRAN part of the PLMN

u-RNTI is used as a UE identifier for the first cell access (at cell change) when a
RRC connection exists for this UE and for UTRAN originated paging including
associated response messages.
RNC-ID is used by Controlling RNC/BSS to route the received uplink messages towards the
Serving RNC/BSS.
For the initial access a unique core network UE identifier is used.
c-RNTI is used as a UE identifier in all other DCCH/DTCH common channel messages on air
interface
Each RNC has a unique identifier within the UTRAN part of the PLMN, denoted by
RNCidentifier (RNC-ID).
This identifier is used to route UTRAN interface messages to correct RNC.

RNC-ID of the serving RNC together with the s-RNTI is a unique identifier of the UE in the
UTRAN part of the PLMN.

Basic AP level identifiers in each reference point Object Identifier Abbreviation Valid for
Radio Access Bearer Radio Access Bearer ID- RAB-ID- Valid for - Iu
Dedicated Transport channel - DCH-ID - Valid for - Iur, Iub
[TDD Downlink Shared Channel] - DSCH-ID - Valid for - Iur, Iub
[TDD Uplink Shared Channel] USCH-ID - Valid for - Iur, Iub

You might also like