Professional Documents
Culture Documents
HUAWEI Confidential
Upon completion of this course, you will be able to: Learn basic concepts in telecom protocols Learn general knowledge of GSM protocols
HUAWEI Confidential
Page 2
HUAWEI Confidential
Page 3
HUAWEI Confidential
Page 4
HUAWEI Confidential
Page 5
Entity of N layer
N layer
N layer
Primitives are categorized into the following types: REQUEST primitive: used when a higher layer is requesting a service from the next lower layer INDICATION primitive: used by a layer providing a service to notify the next higher layer of activities related to the primitive type REQUEST RESPONSE primitive: used by a layer to acknowledge receipt, from a lower layer, of the primitive type INDICATION CONFIRM primitive: used by the layer providing the requested service to confirm that the activity has been completed
HUAWEI Confidential
Page 6
Protocol Stack
HUAWEI Confidential
Page 7
Protocol Structure
In general, a protocol consists of the following sections: Introduction (scope, references and abbreviations) Background knowledge (protocol significance and relation with other protocols) Detailed description (related processes, such as the objective, operation, and result) Related messages Information element codes in messages Appendix (supplementary description of key points in the protocol)
HUAWEI Confidential
Page 8
HUAWEI Confidential
Page 9
Questions
Can you recall any international organization for standardization?
HUAWEI Confidential
Page 10
HUAWEI Confidential
Page 11
Development of GSM
Mobile communication has gone through the development from analog communication to digital communication. The digital mobile communication mechanism at present consists of GSM (Pan-Europe), ADC (the US) and JDC (PDC now, Japan). Following are the milestones in the GSM development. In 1982, Conference of European Postal and Telecommunications Administrations (CEPT) set up the GSM, targeting at developing the second generation of mobile communication system. In 1986, the eight systems proposed after numerous researches and experiments were tested on site in Paris. In 1987, the GSM member states achieved an agreement on adopting the technologies such as the TDMA, RPE-LTP, and GMSK after the on-site tests and demonstrations. In 1988, 18 European countries signed the GSM memorandum of understanding. In 1989, the GSM recommendations took effect. In 1991, the GSM technology and network were formally adopted in Europe. The second generation of mobile communication came into being. The GSM experienced the updating from V5, V6 to V7. The GPRS was introduced at the V6 stage. The 3GPP was established. In 1999 and 2000, the 3G 1999 and 3G 2000 were put forward respectively.
HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential
Page 12
HUAWEI Confidential
Page 15
GSM supports the following interfaces in the CS domain of the core network: A: BSC<->MSC B: MSC<->VLR C: MSC<-HLR D: VLR<->HLR E: MSC<->MSC F: MSC<->EIR G: VLR<->VLR H: HLR<->AuC
HUAWEI Confidential
Page 16
Radio resource management (RR) Mobility management (MM) Call control (CC) Message transfer part (MTP) Signalling connection control part (SCCP) BSS operation and maintenance application part (BSSOMAP) Base station subsystem application part (BSSAP)
HUAWEI Confidential
Page 17
Questions
Can you recall any main recommendation of GSM?
HUAWEI Confidential
Page 18
HUAWEI Confidential
Page 19
HUAWEI Confidential
Page 20
HUAWEI Confidential
Page 21
22.004
23.011
24.010
Mobile radio interface layer 3-supplementary services specificationgeneral aspects Mobile radio layer 3 supplementary service specification; Formats and coding Signaling interworking for supplementary services
24.080 29.011
HUAWEI Confidential
Page 22
Location management procedures Mobile radio interface layer 3 specification Mobile application part (MAP) specification Non-Access-Stratum functions related to mobile station (MS) in idle mode UE procedures in idle mode and procedures for cell reselection in connected mode
HUAWEI Confidential
Page 23
Source
Q.761
Description
This recommendation describes the ISDN user part function.
Q.762
This recommendation describes the messages, parameters and the signaling information contained within parameters used by the ISDN user part protocol, and their functions. This recommendation specifies the formats and codes of the ISDN user part messages and parameters required to support basic bearer services and supplementary services. This recommendation describes the ISDN user part signaling procedures of the set-up and clear down of national and international ISDN connections used for "ISUP'97". Actions common for all types of exchanges are described only once. Different or additional actions required in an exchange are specified in a separate sub clause applicable to that type of exchange. The procedures specified in clause 2 relate to basic calls (for example, calls not involving supplementary services and IN). Signaling availability
Q.763
Q.764
performance objectives
Q.766
Signaling dependability
Signaling delay Signaling system limitations
HUAWEI Confidential
Page 24
Q.730
Numbering plan
Test specification
Q.784Q.785
HUAWEI Confidential
Page 25
Source
Q.721
Description
This recommendation describes the TUP function.
Q.722
This recommendation describes the general function of telephone signaling messages and the telephone signals and other information components contained in those messages.
Basic format characteristics Formats and codes Q.723 Label Telephone signal message formats and codes
HUAWEI Confidential
Page 26
Source
Q.724 Normal call set-up
Description
Dual seizure with both-way operation
HUAWEI Confidential
Page 27
Source
Q.725
Description
Signaling performance in the telephone application
Test specification
Q.783
This recommendation contains a set of detailed tests for the Signaling system No. 7 telephony user part (TUP).
HUAWEI Confidential
Page 28
CSMGW
Mc
GMSC server
C
Nc Mh
GGSN
The UMTS system structure is defined in the 23.002 recommendation. UMTS supports the following interfaces in the CS domain of the core network: A: BSC<->MSC B: MSC<->VLR C: MSC<-HLR D: VLR<->HLR E: MSC<->MSC F: MSC<->EIR G: VLR<->VLR H: HLR<->AuC IuCS: MSC<->RNC Mc: MSC<->MGW Nc: MSC<->MSC Nb: MGW<->MGW Gs: VLR<-SGSN
Page 29
Gc
HLR
D
PSTN Nb
AuC
Gr
Gn
EIR
F Gf Gs
VLR
B
E Nc
VLR
B
MSC server
Mc
MSC server
Mc
SGSN CN
CS-MGW
Nb
CS-MGW
A Gb IuCS IuPS
BSS BSC
Abis
RNS RNC
Iub
Iur
RNC Node B
BTS Um
BTS
Node B
cell
Uu ME
SIM-ME i/f or Cu
SIM
USIM
MS
HUAWEI Confidential
HUAWEI Confidential
Page 30
SAAL
AAL5
ATM
PL
MAC
(a) ATM-based
(b) IP-based
The structure of RANAP protocol stack is based on the following signaling bearer systems: ATM-based broadband SS7 (SAAL-NNI, MTP3b and SCCP) IP-based signaling transmission system (IP, SCTP and M3UA) The RANAP protocol stack consists of the following parts:
Radio access network application part (RANAP) (TS25.413) on radio network layer
Signaling bearer part on transport network layer HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential
Page 32
The mobile application part (MAP) protocol defines how messages are exchanged between CDMA network entities for the purpose of realizing the MS roaming function. The involved network entities include the MSC Server, VLR, SGSN, HLR, SMC and GMLC. In the UMTS network, the C, D, E, G, Lg and L interfaces can all transfer MAP messages. The MAP protocol at the C and D interfaces implements signaling interaction of the following services: Location registration Authentication Subscriber management Fault recovery (user data recovery during PRN) Call handling (routing information and roaming number retrieval) Supplementary service PSI (provide subscriber information)
HUAWEI Confidential
Page 33
MTP3 ITU-T Q704 MTP2 ITU-T Q703 MTP1 ITU-T Q702 ITU-T G711
When traffic data is transferred on the E interface, the TUP/ISUP protocol stack is adopted.
When related mobile signaling is transferred on the E interface, the MAP protocol stack is adopted. The MAP protocol implements signaling interaction of the following services: Inter-office handover SMS transfer
HUAWEI Confidential
Page 34
A-CLR-CMD/COM
End of call
HUAWEI Confidential
Page 35
The F interface protocol stack also belongs to the MAP protocol stack. The F interface protocol stack implements the signaling interaction of the CheckImei service to check the international mobile station equipment identity (IMEI).
HUAWEI Confidential
Page 36
H.248
H.248
(a)
IP-based
(b) ATM-based
HUAWEI Confidential
Page 37
BICC MTP3
MTP2 MTP1
SCTP IP MAC L1
TDM-based Nc MSC Server BICC SCTP IP MAC L1 (G)MSC Server BICC MTP3B STC SAAL AAL5
(b)
ATM
PL
ATM
PL
(c)
SCTP/IP-based
(d)
ATM-based
HUAWEI Confidential
Page 38
BICC Protocol
The bearer independent call control protocol (BICC) is a bearer-unspecific call control protocol used in the backbone network. It is used in data networks including the ATM network and IP network to bear the PSTN/ISDN service comprehensively. Therefore, BICC is considered as an important tool to facilitate the change from the traditional telecommunication network to the multi-service integration platform. The control part and bearer part are separated in BICC. That is, BICC does not directly control the media resources (ATM and IP), but controls them through standard bearer control protocol (H.248 protocol). BICC is developed based on the narrowband ISUP protocol. It can be considered as a version that comes out of narrowband ISUP protocol with the detailed circuit control part deleted. However, it can never be compatible with the ISUP protocol. Theoretically, BICC can be used in all types of signal transport protocol stack to provide bearer-unspecific call control. The BICC protocol includes the ITU-T recommendations Q.1902, Q.2150 and Q.765.
HUAWEI Confidential
Page 39
BICC Protocols
The bearer-unspecific BICC protocol proposed by the ITU-T has three different versions. They are CS1, CS2 and CS3. Protocol model, coding and decoding, and call flow Q.1902.1: BICC CS2 Function description (functionality and protocol model) Q.1902.2: BICC CS2 Common functions of messages and parameters Q.1902.3: BICC CS2 Format and coding/decoding of messages and parameters Q.1902.4: BICC CS2 Call flow and supplementary abnormity processing flow APM Q.1950: Call bearer control protocol Q.1970: IP bearer control protocol Q.1990: BICC bear Control Tunnel Protocol Q.765: Application transport mechanism Q.765.5: APM coding type Signaling bearer Q.2150.0: Common signaling transport service Q.2150.1: STC on MTP3 and MTP3b Q.2150.2: STC on SSCOP and SSCOPMCE Q.2150.3: STC on SCTP
HUAWEI Confidential
Page 40
Iu UP
Radio Protocols
Iu UP
Nb UP
Nb UP
Transport Layer
SRNC Iu
MGW Nb
MGW
HUAWEI Confidential
Page 41
The CAMEL application part (CAP) is developed based on the INAP protocol used in the wired intelligent network. CAP supports the CAMEL service by enabling the signaling interaction between functional entities (GSM SSF, GSM SRF and GSM SCF) of the wireless intelligent network (WIN). CAP is part of the SS7, belonging to the user part of the transaction capability application part (TCAP). It uses the structured/unstructured conversation capability provided by the TCAP to realize the signaling interaction between different entities. Recommendations: ETSI /3GPP CAMEL Phase1, Phase2, Phase 3 and Phase 4 TS 23.078 (SSF/SCF) TS 23.018(Call flow) TS 29.078 (CAP)
HUAWEI TECHNOLOGIES CO., LTD. HUAWEI Confidential
Page 42
Questions
Can you recall any main interface in WCDMA?
HUAWEI Confidential
Page 43
www.huawei.com