Professional Documents
Culture Documents
GSM, Edge, 3G
GSM, Edge, 3G
GPMS Yr 2009
The GPMS is an initiative under Project SHIKHAR of BSNL with the intent to have
an
objective and transparent system for assessing performance of employees.
The GPMS scorecards for all the group types have been designed to consist
of Key
Performance Indicators (KPIs) to measure the groups performance on
financial,
customer / market and operational parameters
The correct approach of creating the GPMS is in a sequence that flows from top.
(Corporate Office)
Performance Levels Fair, Good and Excellant - 50, 75, 100, Score 60, 80, 100
Achievement between Fair and Good and between Good and Excellent would
be linearly scaled
The BBSCbalanced scorecard suggests that we view the organization from four
perspectives
learning and growth constitute the essential foundation for success of any
knowledge-worker organization
1- GSM 2G
GSM
BW
935-960 MHz
25 MHz
Modulation:
ASK, FSK- also Binary FSK-BFSK, PSK-Used for decode BFSK, CPFSK-Continuous
Phase FSK
MSKMINIMUM SHIFT KEYING is a special form of binary CPFSK.
Two level FSK modulation, where transmission bit rate R is exactly four times
the frequency shift (between 1s and 0s) is called Minimum Shift Keying MSK
In BPSK each of the two phases convey an information equivalent to a single bit
only
In QPSK each of the four phases of carrier representtwo bits of data
offset QPSK OQPSK
Gaussian MSK or GMSK
In GSM a B.T product of 0.3 is used with a channel data rate of 270.8 Kb/s
The most popular digital modulation schemes employed in cellular radio systems
are four level phase shift keying (QPSK) and its variants such as GMSK and / 4
shifted QPSK (OQPSK)
a ciphering key is computed using the algorithm A8 stored on the SIM card, the
subscriber key and a random number delivered by the network
DISCONTINUOUS TRANSMISSION (DTX)
The Voice Activity Detection (VAD
An equalizer is in charge of extracting the right signal from the received signal
SMS 160 Chars, SMS ( up-to 140 bytes)
SMS-CB(Cell Broadcast) 93 Chars
called mobile is busy (CFB)- Call Forw on Busy
CF on unreachable (CFNRc)
CF on no reply (CFNRy)
Call forwarding unconditionally (CFU)
Barring of All Outgoing Calls, BAOC (E1).
Barring of Outgoing International Calls, BOIC (E1).
Barring of Outgoing International Calls except those directed toward the Home
PLMN Country, BOIC-exHC (E1).
Barring of All Incoming Calls, BAIC (E1)
Barring of incoming calls when roaming (A).
Call Waiting, CW (E2)
Advice of Charge, AoC (E2)
Multiparty service (E2) Possibility of establishing a multiparty conversation.
Closed User Group, CUG (A).
Calling Line Identification Presentation, CLIP (A).
Calling Line Identification Restriction, CLIR (A)
Connected Line identification Presentation, CoLP (A).
Connected Line identification Restriction, CoLR (A).
USSD:Unstructured service supplementary data
GSM Protocols
interface control information (ICI)
Service Access Points (SAP
In GSM, three types of layer 2 protocol are used LAPDM (link access protocol for
signaling channel) on the air interface, LAPD on A-bis interface, and the MTP-2
(message transfer part-CCITT recommended
among those eight bits, five are randomly allocated by the MS and serve as
discrimination between potentially colliding random accesses.
The three remaining bits define the kind of channel required
BSSAP is divided into two functions Direct Transfer Application Part (DTAP) and
BSSMAP.
A DTAP message also contains a data Link Connection Identification (DLIC).
in the OSI model MAP resides above the TCAP protocol.
MAP only uses the connectionless class of SCCP protocol.
The protocol is designed to interact with MSC, VLR / HLR, AUC, and GMSC so that
they can communicate with each other.
MAP contains a number of functional blocks known an Application System Element
(ASE),
In 26 frame traffic multi-frame 13th frame (frame no .12) is used for SACCH.SACCH
is used only for non-urgent procedures.
FACCH (Fast Associated Control Channel).-is required during conversation phase
operator determined barring (ODB)
while waiting for paging response, a defensive timer called, Early ACM timer is run
at MSC to avoid network timeouts
The SMS could be either in broadcast mode (via CBCH channel) or in a point-to-point
mode (via either SDCCH channel if mobile is in idle state, or SACCH if the mobile is
in dedicated mode).
Authentication Triplets.
At network side, authentication procedure requires authentication triplets.
Authentication triplet consists of:
Gp interface
Gb interface
Iu-U interface
Iu-C interface
Gr interface
Gs interface
Gd interface
Ge interface
Gf interface
Lg interface
MS to BTS
Abis
BTS to BSC
BSC to MSC/SSP
MSC/SSP to VLR
MSC/SSP to HLR
VLR to HLR
MSC/SSP to MSC
Ai
MSC/SSP to PSTN
HLR to AUC or
MC to MC
MSC/SSP to MC
A3
Authentication Algorithm
A5
Ciphering Algorithm
A8
Kc Generation Algorithm
LAI
HLR to MC
+2 + 16
=
1 TDMA Frame
1 Burst
Bits
0.577 ms
=
8 * 0.577 = 4.616
FCCH Burst =
Normal Burst
(1+1) Flag
System Capacity =
C=k.MN
C = Ms
f = 1/N
ARFCN Absolute RF carrier Number (1 and 124 th are not used in GSM)
Practicall only 122 chls available
ARFCN(n) =
= 890.2+0.2*(n-1) MHz
= 935.2+0.2*(n-1) MHz
C
I
Will be greater than some given amount for smallas well as large cell sizes when all
signals are transmitted at the same power level.
The frequency reuse distance is also known as separation distance. is also known as
the signal-to-noise ratio.
The ratio D/R needs to be large enough in order for the base station to be able to
cope with the interference
For normal service, the mobile station has to camp on a suitable call, tune to that
cells control channel. The choice of such a suitable cell for the purpose of normal
service is referred to as normal camping
The CCCH is a channel that carries both the PCH and the AGCH on the downlink, and
the RACH on the uplink.
Speech 8 Kz sampling rate and 13 bits per sample hence 104 kb/s bit rate or
2080 bits per block of 20 ms is sent to voice coder.
kb/s
Voice coder RPE-LTP compresses the 2080 bits to 260 bits per 20 ms or 13
After chl coding 260b becomes 456 bits
The IMEI
consists of 15 digits (60 bits). There is a 6 digit type approval code TAC, a 2
digit Final
Assembly Code FAC, 6 digit serial number SNR and a 4 bit space SP
The Personal Identification Number PIN
- The Pin Unblocking Key PUK
- The SIM-Service Table
The Abis interface between BTS and BSC is typical ISDN. It is built by a PCM
30-interface,
i.e. there are 30 channels with a speed of 64 kbit/sec. A full rate GSM data
channel is
compressed to16 kbit/sec. Thus 4 GSM channels fit into a 64 kbit/sec ISDNchannel. Layer 1and Layer 2 are the same as in ISDN-channels.
MTP1 is known as the Signalling Data Link (Bit Layer).
MTP2 defines the principle frame structure known from the Link Access
Protocol used in the
Channel Bandwidth
200 kHz
Modulation type
GMSK
Data handling
Packet data
172 kbps
The main new network architecture entities that are needed are:
SGSN: GPRS Support Node - this forms a gateway to the services within the
network.
GGSN: Gateway GPRS Support Node which forms the gateway to the
outside world.
CODING SCHEME
CS-1
CS-2
CS-3
CS-4
9.05
13.4
15.6
21.4
72.4
107.2
124.8
171.2
Three layers,
Layer 1 (Physical Layer) - Radio Link Control (RLC) and the Medium Access Control
(MAC) layers
There is also the Logical Link Layer (LLC) that formats the data frames and is used
to link the elements of the core network to the mobile
Channels
GPRS uses only one physical channel (PDCH) for the sending of data
There are three MAC modes that are used to control the transmissions. These are
named fixed allocation, dynamic allocation, and extended dynamic allocation.
The fixed allocation mode is required when a mobile requires a data to be sent at a
consistent data rate. To achieve this, a set of PDCHs are allocated for a given
amount of time. When this mode is used there is no requirement to monitor for
availability, and the mobile can send and receive data freely. This mode is used for
applications such as video conferencing.
When using the dynamic allocation mode, the network allocates time slots as they
are required. A mobile is allowed to transmit in the uplink when it sees an identifier
flag known as the Uplink Status Flag (USF) that matches its own. The mobile then
transmits its data in the allocated slot. This is required because up to eight mobiles
can have potential access to a slot, but obviously only one can transmit at any
given time.
A further form of allocation known as extended dynamic allocation is also available.
Use of this mode allows much higher data rates to be achieved because it enables
mobiles to transmit in more than one slot. When the USF indicates that a mobile can
use this mode, it can transmit in the number allowed, thereby increasing the rate at
which it can send data.
Logical channels
Broadcast channels:
Packet Data Traffic Channel (PDTCH): This channel is used to send the
traffic and it is present in both the uplink and downlink directions. Up to eight
PDTCHs can be allocated to a mobile to provide high speed data.
EDGE:
overall EDGE modulation scheme is a mixture of GMSK and 8PSK
Most of the data being sent over an EDGE link will consist of TCP/IP packets.
These packets are longer than a single EDGE packet payload and therefore it
is necessary to split the TCP/IP packets into smaller section and these are known as
"chunks".
These chunks have defined sizes and may consist of one of 22, 28, 34, or
37 bytes or "octets". The 37 octet chunk may be made directly of data to be
transmitted, or it may be a 34 octet chunk which is then padded by adding three
dummy octets.
There are nine different Modulation and Coding Schemes (MCS) that can be used
with EDGE. Each one is designated a number in the region MCS1 to MCS9
The different coding schemes are grouped into three classes or families which are
referred to by letters, as classes A, B and C
MCS 1 to 4 uses GMSK hence compatible with GPRS, MCS 5 to 9 uses 8PSK
WCDMA
PDP stands for Packet Data Protocol. The PDP addresses are network layer addresses (Open
Standards Interconnect [OSI] model Layer 3). GPRS systems support both X.25 and IP network
layer protocols. Therefore, PDP addresses can be X.25, IP, or both.
Each PDP address is anchored at a Gateway GPRS Support Node (GGSN), as shown in figure
below. All packet data traffic sent from the public packet data network for the PDP address goes
through the gateway (GGSN).
The public packet data network is only concerned that the address belongs to a specific GGSN.
The GGSN hides the mobility of the station from the rest of the packet data network and from
computers connected to the public packet data network.
Statically assigned PDP addresses are usually anchored at a GGSN in the subscriber's home
network. Conversely, dynamically assigned PDP addresses can be anchored either in the
subscriber's home network or the network that the user is visiting.
When a MS is already attached to a SGSN and it is about to transfer data, it must activate a PDP
address. Activating a PDP address establishes an association between the current SGSN of mobile
device and the GGSN that anchors the PDP address.
The record kept by the SGSN and the GGSN regarding this association is called the PDP
context.
It is important to understand the difference between a MS attaching to a SGSN and a MS activating
a PDP address. A single MS attaches to only one SGSN, however, it may have multiple PDP
addresses that are all active at the same time.
Each of the addresses may be anchored to a different GGSN. If packets arrive from the public
packet data network at a GGSN for a specific PDP address and the GGSN does not have an active
PDP context corresponding to that address, it may simply discard the packets. Conversely, the
GGSN may attempt to activate a PDP context with a MS if the address is statically assigned to a
particular mobile device.
The GPRS access modes specify whether or not the GGSN requests user authentication at
the access point to a Public Data Network (PDN). The available options are:
TRANSPATENT MODE
Transparent access pertains to a GPRS PLMN that is not involved in subscriber access
authorization and authentication. Access to PDN-related security procedures are transparent to
GSNs.
In transparent access mode, the MS is given an address belonging to the operator or any
other addressing space of domain. The address is given either at subscription as a static address
or at PDP context activation, as a dynamic address. The dynamic address is allocated from a
Dynamic Host Configuration Protocol (DHCP) server in the GPRS network. Any user authentication
is done within the GPRS network. No RADIUS authentication is performed; only IMSI-based
authentication (from the subscriber identity module in the handset) is done.
Access point - Defines an APN and its associated access characteristics, including security
(RADIUS), dynamic address allocation (DHCP), and DNS services.
Access point list - Defines a logical interface that is associated with the virtual template.
Access group - Defines whether access is permitted between the PDN and the MS
This chapter gives a brief description of the basic processes used in GPRS networks:
Attach process - Process by which the MS attaches (i.e., connects) to the SGSN in a GPRS network.
Authentication process - Process by which the SGSN authenticates the mobile subscriber.
PDP activation process - Process by which a user session is established between the MS and the
destination network.
Detach process - Process by which the MS detaches (i.e., disconnects) from the SGSN in the GPRS
network.
Network-initiated PDP request for static IP address - Process by which a call from the packet data
network reaches the MS using a static IP address.
Network-initiated PDP request for dynamic IP address - Process by which a call from the packet data
network reaches the MS using a dynamic IP address.
P-TMSI i.e Packet TMSI is used to derive the Temp. Logical Link Identity
(TLLI)
3G UMTS:
UTRAN UMTS Terrestrial Radio Access N/W.
CN Core N/W
Macro diversity (FDD only) is fully handled in the UTRAN.
For each connection between User Equipment and the UTRAN, One RNS is the
Serving
RNS. When required, Drift RNSs support the Serving RNS by providing radio
resources
The role of an RNS (Serving or Drift) is on a per connection basis betweena UE
and the UTRAN.
To support UE mobility between UTRAN and GERAN Iu mode, the Serving RNS
may be
connected to the DBSS and vice versa
The role of an RNSor BSS (Serving or Drift) is on a per connection basis between
an UE and theUTRAN/GERAN Iu mode.
The UTRAN is layered into a Radio Network Layer and a Transport Network Layer
The UTRAN logical nodes and interfaces between them, are defined as part of the Radio
Network Layer
The transport network layer provides services for user plane transport, signalling transport
and transport of implementation specific O&M
The Service Area Identifier (SAI)
The Cell identifier (C-Id) is used to uniquely identify a cell within an RNS/BSS.
The Cell-Id together with the identifier of the controlling RNC/BSS (CRNC-Id) constitutes the
UTRAN/GERAN Cell Identity (UC-Id) and is used to identify the cell uniquely within
UTRAN/GERAN Iu mode.
UC-Id or C-Id is used to identify a cell in UTRAN Iub and Iur interfaces or Iur-g interface
UC-Id = CRNC-Id + C-Id
The C-Id is defined by the operator, and set in theRNC/BSS via O&M.
The C-Id is set in a Node B by its C-RNC or in the GERAN Iu mode cell.
Local Cell Identifier : The Local Cell identifier is used to uniquely identify the set of
resources within a Node B required to support a cell (as identified by a C-Id)
(c-RNTI);
(HS-DSCH RNTI);
(E-RNTI);]
Each RNC has a unique identifier within the UTRAN part of the PLMN, denoted by RNC
identifier (RNC-ID).
This identifier is used to route UTRAN interface messages to correct RNC.
RNC-ID of the serving RNC together with the s-RNTI is a unique identifier of the UE
in the UTRAN part of the PLMN
u-RNTI is used as a UE identifier for the first cell access (at cell change) when a
RRC connection exists for this UE and for UTRAN originated paging including
associated response messages.
RNC-ID is used by Controlling RNC/BSS to route the received uplink messages towards the
Serving RNC/BSS.
For the initial access a unique core network UE identifier is used.
c-RNTI is used as a UE identifier in all other DCCH/DTCH common channel messages on air
interface
Each RNC has a unique identifier within the UTRAN part of the PLMN, denoted by
RNCidentifier (RNC-ID).
This identifier is used to route UTRAN interface messages to correct RNC.
RNC-ID of the serving RNC together with the s-RNTI is a unique identifier of the UE in the
UTRAN part of the PLMN.
Basic AP level identifiers in each reference point Object Identifier Abbreviation Valid for
Radio Access Bearer Radio Access Bearer ID- RAB-ID- Valid for - Iu
Dedicated Transport channel - DCH-ID - Valid for - Iur, Iub
[TDD Downlink Shared Channel] - DSCH-ID - Valid for - Iur, Iub
[TDD Uplink Shared Channel] USCH-ID - Valid for - Iur, Iub