You are on page 1of 49

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/271647164

Universal Mobile Telecommunication System

Technical Report · December 2013


DOI: 10.13140/2.1.2961.9523

CITATION READS
1 3,191

3 authors, including:

Utsho A Arefín Md Shariful Islam


Northern University Bangladesh Noakhali Science & Technology University
53 PUBLICATIONS   58 CITATIONS    131 PUBLICATIONS   400 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Electron Transmission in Double Quantum-Well Tunnel FET View project

six phase machine design View project

All content following this page was uploaded by Utsho A Arefín on 02 February 2015.

The user has requested enhancement of the downloaded file.


UNIVERSAL MOBILE
TELECOMMUNICATION SYSTEM

Submitted by

Md. Shariful Islam Khan Nahid Hasan


ID:EECE090100070 ID:EECE090100070

Supervised by

Ashraful Arefin
Sr. Lecturer
Electrical & Electronic Engineering

December 2013

Department of Electronics & Communication Engineering


NORTHERN UNIVERSITY BANGLADESH
APPROVAL

The thesis titled, “Universal Mobile Telecommunication System” submitted by Md. Shariful
Islam (ID: EECE 090100070) & Khan Nahid Hasan (ID: EECE 090100070) Department of
Electronics and Communication Engineering, Northern University Bangladesh, Dhaka,
Bangladesh, has been accepted as satisfactory for the partial fulfillment of the requirement for
the Degree of Bachelor of Science (Engineering) in Electronics and Communication
Engineering under Northern University Bangladesh and approved as to its style and contents.

Board of Examination

______________________________________________
Ashraful Arefin (Supervisor)
Sr. Lecturer
Department of Electrical & Electronic Engineering
Northern University Bangladesh

______________________________________________
Lecturer
Department of Electrical & Electronic Engineering
Northern University Bangladesh

______________________________________________
Lecturer
Department of Electrical & Electronic Engineering
Northern University Bangladesh

_______________________________________________
Professor Dr. Md. Shah Alam
Head
Department of Electronics & Communication Engineering
Northern University Bangladesh

i
DECLARATION
We do hereby cordially declare that the work presented in the project report has been carried out
by us under the supervision of Ashraful Arefin, Sr. Lecturer, Department of Electrical and
Electronic Engineering, Northern University of Bangladesh. We have tried our best to make the
report complete with accurate information and relevant data. We hope, will be able to satisfy all
the people as well as the NUB Authority for whom the report has been prepared. We also declare
that neither this report nor any part thereof has been submitted elsewhere for the award any
degree or diploma from any Institute/Organization/University.

Countersigned Signature

…………………….
_________________________________________
Ashraful Arefin (Supervisor) Md. Shariful Islam
Sr. Lecturer ID: EECE 090100070
Dept. of EECE
Department of Electrical & Electronic Engineering
Northern University Bangladesh

………………………..

Khan Nahid Hasan


ID: EECE 090100070
Dept. of EECE

ii
ACKNOWLEDGEMENT

Firstly we offer millions thanks to the Almighty Allah, who has given us strength to complete of
this thesis successfully. In the world no work has been completed smoothly where there is no
guidance and help. We are greatly indebted to our supervisor, Ashraful Arefin, Sr. Lecturer,
Department of Electrical and Electronic Engineering, Northern University of Bangladesh for his
encouragement, co-operation, continuous guidance and valuable suggestion in all stages of the
study and preparation of this project report. Our respect is also to him for his wisdom, guidance ,
supervision and faithful discussion with us throughout the work. He not only agree to supervise
the project wholeheartedly, but also from the beginning of our study here. He supported us with
incessant generosity. We would also like to extend our warmest thanks to as well as the officers
and stuffs related to our departmental laboratories.

Finally we would also like to thank of our parents, to our family and friends, teachers of the
department for their invaluable encouragement and giving us the opportunity to do this project
work.

Md. Shariful Islam


&
Khan Nahid Hasan

December 2013

iii
ABSTRACT
As the information Society burgeons in the early years of the new millennium, users of data and
multimedia telecommunications services will expect and demand that these same services will
continue to be available to them when they move away from their desks, offices or homes.
Multimedia services allow the delivery of a rich variety of audio, visual and text-based
information in addition to basic voice. Current wireless or mobile systems, despite their
evolution, are still constrained in terms of the data rate they can offer and their flexibility to
manipulate complex, yet user friendly multimedia services. This need presents the opportunity to
the mobile radio, Information Technology and consumer electronics communities to offer to
users something new such as, a mobile system capable of managing and delivering a much wider
range of information services to the mass market. A new mobile system for worldwide use is
now being developed to enhance and supersede current systems.

The thesis based on Third generation mobile telecommunication world wide system.UMTS is a
3G cellular-system technology capable of providing multi-mobile services with multi-operators
supporting a wide range. Universal Mobile Telecommunications System is an umbrella term that
encompasses the third generation (3G) radio technologies. The Universal Mobile
Telecommunications System represents a complete system. That means, it includes cell phones
(and other mobile equipment), the radio infrastructure needed to provide call and data session
services, the core network equipment for transporting user calls and data, the billing systems, and
the security systems, among others. Universal Mobile Telecommunications System (UMTS) is a
third generation mobile cellular technology for networks based on the GSM standard. It was
developed by the 3GPP (3rd Generation Partnership Project).Third-generation systems are
designed to include not only traditional phone tasks such as calls, voice mail, and paging, but
also new technology tasks such as Internet access, video, and SMS,(Short message service) or
text messaging, high-speed access to the World Wide Web - either directly on a handset or
connected to a computer via Wi-Fi, Bluetooth, Infrared or USB(Universal Serial Bus).

It has many advantages but costly, allover it makes a great evolution for wireless communication
at worldwide.

iv
Table of Contents

Page no
Chapter 1
Introduction
1.1 Execution summary 1
1.2 Background 2
1.3 Advantages of UMTS 2
1.4 Fearers of UMTS 3
1.5 Elements of this opportunity include 3
1.6 History 4

Chapter 2
System Architecture
2.1 Universal Telecommunication Radio 8
Access
2.2 UTRAN Architectures 8
2.3 Power control system 10

Chapter 3
Network Planning and Development Process 11
3.1 The Node B 12
3.2 Network provisioning process 12
3.3 Network inventory management process 12
3.4 Radio Access Network 13
3.5 Core network 14
3.6 Network maintenance 14
3.7 Network data management process 15
3.8 Satellite system 15
3.9 Broadband satellite system 15
3.10 Smart antennas 15
15

v
Chapter 4
Call setup 16
4.1 Quality of service 17
4.2 Frequency 17
4.3 Bandwidth 18
4.4 UMTS codes 19
4.5 Channel multiplexing structure 19
4.6 Synchronization 20
4.7 Compressed mode 21
4.8 Virtual Home Environment(VHE) 21
4.9 Interoperability and global roaming 22
4.10 Migrating from GSM/GPRS to UMTS 22

Chapter 5
UMTS management process 23
5.1 UMTS management reference model 23
5.2 UMTS management infrastructure 24
5.3 TWN 24
5.4 Interfaces of NEs 25
5.5 Customer interface process 25
5.6 Sales process 25
5.7 Customer care and billing system 26
5.8 Problem handling process 26
5.9 Service planning and development 26
process
5.10 Service quality management process 26
5.11 USIM cards/smart cards 26
5.12 API and development toolbox 27
5.13 Mobility and coverage 27
5.14 UMTS location based services 27

Chapter 6
Internet protocol(IP) compatibility 29
6.1 Media formats and codec’s 30
6.2 UMTS security 31

vi
6.3 Radio technology for all environments 33
6.4 Disadvantages of 1st generation 33
nd
6.5 Disadvantages of 2 generation 33

Discussion
Recommendation 34
Conclusion 34
Concluding Remarks 34
References 35
Related Websites 35

vii
CHAPTER 1

Introduction

As the information Society burgeons in the early years of the new millennium, users of data and
multimedia telecommunications services will expect and demand that these same services will
continue to be available to them when they move away from their desks, offices or homes.
Multimedia services allow the delivery of a rich variety of audio, visual and text-based
information in addition to basic voice. Current wireless or mobile systems, despite their
evolution, are still constrained in terms of the data rate they can offer and their flexibility to
manipulate complex, yet user friendly multimedia services. This need presents the opportunity to
the mobile radio, Information Technology and consumer electronics communities to offer to
users something new such as, a mobile system capable of managing and delivering a much wider
range of information services to the mass market. A new mobile system for worldwide use is
now being developed to enhance and supersede current systems. It will be an enhanced digital
system and will provide universal communications to anyone, regardless of their whereabouts. It
will allow for wireless Internet access, videoconferencing, and other wide-bandwidth
applications. Although UMTS will be a major step forward for both customers and technology,
there is little time to develop and implement commercial standards. For example, Japan plans to
launch its UMTS network in the year 2000, and the United Kingdom wants its UMTS radio
interface working alongside and enhancing GSM networks by the year 2002.

1.1 Executive Summary

 UMTS is a 3G cellular-system technology capable of providing multi-mobile services


with multi-operators supporting a wide range. Universal Mobile Telecommunications
System is an umbrella term that encompasses the third generation (3G) radio
technologies.

1
 The technology described in UMTS is sometimes also referred to as Freedom of Mobile
Multimedia Access (FOMA) or 3GSM. opportunity to the mobile radio, Information
Technology and consumer electronics communities to offer to users something new such
as, a mobile system capable of managing and delivering a much wider range of
information services to the mass market.

 The Universal Mobile Telecommunications System represents a complete system. That


means, it includes cell phones (and other mobile equipment), the radio infrastructure
needed to provide call and data session services, the core network equipment for
transporting user calls and data, the billing systems, and the security systems, among
others.

1.3 Background Of UMTS

 Universal Mobile Telecommunications System (UMTS) is a third generation mobile


cellular technology for networks based on the GSM standard. It was developed by the
3GPP (3rd Generation Partnership Project).
 Third-generation systems are designed to include not only traditional phone tasks such as
calls, voice mail, and paging, but also new technology tasks such as Internet access,
video, and SMS,(Short message service) or text messaging, high-speed access to the
World Wide Web - either directly on a handset or connected to a computer via Wi-Fi,
Bluetooth, Infrared or USB(Universal Serial Bus).

1.3 Advantages of UMTS

 UMTS offers a consistent set of services to mobile computer and phone users, no matter
where they are located in the world.
 Each place on the earth can be linked to the internet with the WAN connections just
named.

2
 Bonding creates availability and high bandwidth.
 Users will have access through a combination of terrestrial wireless and satellite
transmissions.
 UMTS are designed to include not only traditional phone but also new technology tasks
such as video calling, multimedia at data rates up to 2mbps, high speed access to the
world wide web-either directly on a handset or connected to a computer via Wi-Fi,
Bluetooth.
 The higher bandwidth of UMTS also enables other new services like video conferencing
or IPTV.
 The downloading and uploading speeds are up to21 mbps and 5.7 mbps respectively.

1.4 Features of UMTS

 UMTS is planned to be the next generation of mobile phone system. There is not very
much to show for it in practical terms just at the moment, but a large investment is being
made to make it a reality.
 UMTS will provide basic services as with GSM, i.e. voice, SMS, roaming and billing.
 The UMTS is capable of providing multi-mobile services with multi-operators supporting
a wide range of global mobile-communication standards.
 It will initially focus on "Services" and "Systems Architecture" and will include the full
IP vision for UMTS.
 Interpersonal communication including audio and video telephony.
 Intelligence services including unified messaging, voice- mail, chat.
 Sharing spectrum resources between network operators, both public and private, in city
areas.
 UMTS supports maximum theoretical data transfer rates of 42 Mbit/s when HSPA+ is
implemented in the network. These speeds are significantly faster than the 9.6 kbit/s of a
single GSM error-corrected circuit switched data channel, multiple 9.6 kbit/s channels in
HSCSD and 14.4 kbit/s for CDMA One channels.
 Distribution of information through internet.

3
 Location-based services including personal navigation.
 Business services.
 Mass services.

1.5 Elements of this opportunity include

 An industry-wide and government commitment across the world.


 A coordinated program including spectrum, standards, and technology.
 Synergy of communications, IT and media working to bring about global Opportunities
for businesses and consumers, while creating new ways of doing Business, entertaining
and informing.
 To support unique mobile services such as navigation, vehicle location, and road traffic
information services, which will become increasingly important in world market.
 To allow the system terminal to be used anywhere, in the home, the office, and in the
public environments, both in rural areas and city centers.

1.6 History

In January1998, the European Telecommunications Standards Institute (ETSI) decided on a


single air interface standard for the proposed Universal Mobile Telecommunications System
(UMTS). The system is one of the major new Third Generation mobile systems being developed
within the framework which has been defined by the International Telecommunications
Union (ITU) and known as IMT-2000. It has been the subject of intense worldwide efforts on
research and development throughout the past decade. The system has the support of many major
telecommunications operators and manufacturers because it represents a unique opportunity to
create a mass market for highly personalized and user friendly mobile access to the Information
Society. The system seeks to build on and extend the capability of today‟s mobile, cordless and
satellite technologies by providing increased capacity, data capability and a far greater range of
services using an innovative radio access scheme and an enhanced, evolving core network
(Struthers, 1998). The key difference between this system and previous mobile (wireless)
systems, such as GSM, is that the earlier systems were conceptually separate from the fixed
(wire line) telephone network. The goal of this system is to integrate wire line and wireless

4
systems to provide a universal communications service, such that a user can move from place to
place maintaining access to the some set of services.
To meet the deadline, the ETSI is following a phased approach allowing its capabilities to
improve over time following its introduction. At launch, terrestrial UMTS will have the
capability for datarates up to 2Mbp/s, but it is designed as an open system which can evolve later
on to incorporate new technologies as they are being standardized.

The UMTS revised vision and ETSI‟s basic standard studies were started in 1996. The operative
research was conducted from 1996 to early 1998. The basic UMTS parameters were freeze in
late 1997. The national license was granted in March of 1998. The phase one standard has been
developed since early 1998 and according to the schedule, this standard will be developed by
year 2000. The pre-operational trial is anticipated in 2001. According to the article, the system
will be available for commercial uses in 2002

Figure 1.1 UMTS vs GSM market share projection

5
We live in technological age where innovative techniques in telecommunications continue to
allow us to move forward into a mobile world, allowing effortless portability of information.
Since the early 1990's market leaders such as Siemens have been developing and improving 3rd
generation (3G) telecommunications standards in order to provide bandwidths that would allow
high quality video transmissions. One of their aims was to define a world wide accepted standard
to give users international wireless coverage area of service. The result of this gave rise to
UMTS (Universal Mobile Telecommunications System), as defined by the International
Telecommunications Union (ITU).

UMTS technology is a further development of the second generation GSM (Global System for
Mobile) communication standard. It uses a new transfer procedure for wireless data transfer
between a mobile phone and a base station. UMTS aims to provide a broadband, packet-based
service for transmitting video, text, digitized voice, and multimedia at data rates of up to 2
megabits per second while remaining cost effective.

UMTS is built on top of the existing GSM infrastructure and integrates both packet and circuit
data transmission. The design allows UMTS to be used in parallel with GSM therefore allowing
reception in areas where UMTS has not yet been fully implemented. Integration of these two
components leads to a smooth transition into UMTS, so GSM is still very important and will
continue to run in parallel for some years to come (as shown in the graph below). UMTS
separates itself from GSM by using different frequency bands. With its fast transmission rates
UMTS offers a wide array of multimedia services and parallel applications such as surfing the
web while still talking on the phone.

The world wide roaming access provided by UMTS is implemented using a combination of cell
sizes, giving service to the isolated regions of the world. The cells are "In building" Pico cells,
"Urban" Micro cells, "Suburban" Macro cells and "Global" World cells. FDD (Frequency
Division Duplex) and TDD (Time Division Duplex) are the two operating modes that allow users
to avail from this wide spectrum of usage. The FDD mode is appropriate for general urban and
rural areas and uses W-CDMA to provide data rates of up to 384 Kbit/s with high mobility. TDD
is suited for hot spots and general urban areas. It uses TD-CDMA, and operates in Pico and
Micro cell environments. Mobility is low but data rates are high (2 Mbit/s). As TDD allows for

6
asymmetric access mobile operators can offer mobile broadband data service in areas of high
density such as office complexes.

CDMA (Code Division Multiple Access) is an access procedure that enables multiple
participants to telephone simultaneously via a single base station, while their conversations are
kept separate. UMTS utilizes CDMA as it is far better suited for fast data stream transfer.

7
CHAPTER 2

System Architecture

Functionally these elements are grouped into the Radio Access Network (RAN, UMTS
Terrestrial RAN - UTRAN) and the Core Network (CN). The UTRAN handles all radio-related
functionality. Whereas, the CN is responsible for switching and routing calls and data
connections to external networks. The system is completed by the User Equipment (UE) or 3G
terminal, which interfaces with the user and the radio interface. The high-level architecture is
shown in Figure 1.1

Figure 2.1 UMTS System Architecture

From a specification and standardization point of view, both UE and UTRAN consist of
completely new protocols, the designs of which are based on the needs of the new WCDMA
radio technology. On the contrary, the definition of CN is adopted from GSM.

This gives the system with new radio technology a global base of known and rugged CN
technology that accelerates and facilities its introduction, and enables such competitive

8
advantages as global roaming. The UMTS is modular in the sense that it is possible to have
several network elements of the same type.

In principle, the minimum requirement for a fully featured and operational network is to have at
least one logical network element of each type. The possibility of having several entities of the
same type allows the division of the UMTS into sub-networks that are operational either on their
own or together with other sub-networks, and that are distinguished from each other with unique
identities. Such a sub-network is called a UMTS Public Land Mobile Network (PLMN).
Typically, one PLMN is operated by a single operator, and is connected to other PLMNs as well
as to other types of network, such as ISDN, PSTN, the internet, and so on. Figure 1.1 shows
elements in a PLMN and, in order to illustrate the connections, also external networks.

2.1 Universal Telecommunication Radio Access (UTRA)

The ETSI decision in January 1998 on the radio access technique for UMTS combined two
technologies. The W-CDMA for paired spectrum bands and TD-CDMA for unpaired band². The
idea was that to develop a common standard. This approach ensures an optimum solution for all
the different operating environments and service needs.

The transmission rate capability of UTRA will provide at least 144 Kbit/s for full mobility
applications in all environments, 384 Kbit/s for limited mobility applications in the macro and
micro cellular environments, and 2.048 Mbit/s for low mobility applications particularly in the
micro environments. The 2.048 Mbits/s rate may also be available for short range or packet
applications in the macro cellular environment, depending on deployment strategies, radio
network planning and spectrum availability.

9
2.2 UTRAN Architecture

Figure 2.2 UTRAN architecture

UTRAN consists of one or more Radio Network Sub-systems (RNSs). An RNS is a sub-network
within UTRAN and consists of one RNC and one or more Node Bs. RNCs may be connected to
each other via an Iur interface. RNCs and Node Bs are connected with an Iub Interface. During
Release 7, work study on the support of small RNSs was done, meaning use of co-located RNC
and Node B functionalities in a flat architecture, and that was found feasible without mandatory
specification changes.

A full setup used to contains: a cabinet, an antenna mast and actual antenna. An equipment
cabinet contain, for instance, power amplifiers, digital signal processors, back-up batteries and
air conditioner equipments. A Node B can serve several cells, also called sectors, depending on
the configuration and also on the type of antenna. The most common configuration includes
Omni cell (360°), 3 sectors (3x120°) or 6 sectors

(3 sectors 120° wide overlapping with 3 sectors of different frequency). The Radio Network
Controller (RNC) The RNC is the network element responsible for the control of the radio
resources of UTRAN. It interfaces the CN (normally to one MSC and one SGSN) and also
terminates the Radio Resource Control (RRC) protocol that defines the messages and procedures
between the mobile and UTRAN. It logically corresponds to the GSM BSC. The RNC
controlling one Node B (i.e. terminating the Iub interface towards the Node B) is indicated as the
Controlling RNC (CRNC) of the Node B. The CRNC is responsible for the load and congestion
control of its own cells, and also executes the admission control and code allocation for new

10
radio links to be established in those cells. In case one mobile-UTRAN connection uses
resources from more than one RNS, the RNCs involved have two separate logical roles:

 Serving RNC (SRNC). The SRNC for one mobile is the RNC that terminates both the Iu link
for the transport of user data and the corresponding RAN application part
(RANAP)signaling to/from the CN (this connection is referred to as the RANAP
connection). The SRNC also terminates the R RC1 Signaling, i.e. the signaling protocol
between the UE and UTRAN. It performs the L2 processing of the data to/from the radio
interface. Basic Radio Resource Management operations, such as the mapping of Radio
Access Bearer (RAB) parameters into air interface transport channel parameters, the
handover decision, and outer loop power control, are executed in the SRNC. The SRNC may
also be the CRNC of some Node B used by the mobile for connection with UTRAN. One UE
connected to UTRAN has one and only one SRNC.

2.3 Power control system

Figure 2.3 Power control system

It command the mobile station to lower or increase its lower (in which the mobile causes
increased interference to other cells)

 The command-react cycle is 1500 times per second for each mobile station (faster than
any fading mechanism)
 Also used in DL (no near-far problem however);all signals originate from the same BS
 Desirable to provide additional to mobiles closed to the cell edge.

11
 Open loop power control: is the ability of the UE transmitter to sets its output power to
a specific value. It is used for setting initial uplink and downlink transmission powers
when a UE is accessing the network. The open loop power control tolerance is ± 9 dB
(normal conditions) or ± 12 dB (extreme conditions) .
 Inner loop power control (also called fast closed loop power control) in the uplink is the
ability of the UE transmitter to adjust its output power in accordance with one or more
Transmit Power Control (TPC) commands received in the downlink, in order to keep the
received uplink Signal-to-Interference Ratio (SIR) at a given SIR target. The UE
transmitter is capable of changing the output power with a step size of 1, 2 and 3 dB, in
the slot immediately after the TPC_cmd can be derived. Inner loop power control
frequency is 1500Hz.

12
CHAPTER 3

Network Planning and Development Process

The Network Planning and Development Process basically deals with translating service and
capacity requests into implementation plans. Typically it covers the following functions: validate
and implement new service descriptions against network capabilities (if current network can not
meet the request but upgrade and/or additional equipment can make it feasible, it might be
possible to initiate the ordering process to the suppliers); allocate more capacity based on
service planning/configuration and/or network information (performance etc.).It ensures that the
requests can be properly installed, monitored, controlled and billed in the network. It also
ensures that the capacity is enough to meet the estimations. In implementing the requests, this
process might sub-contract capacity and/or capability of other network operators.

Figure 3.1 UMTS network architecture

13
3.1 The Node B

The Node B converts the data flow between the Iub and Uu interfaces. It also participates in
radio resource management. It logically corresponds to GSM Base Station but the term “Node
B” was initially adopted as a temporary term during the standardization process and then never
changed. Traditionally, the Node Bs have minimum functionality, and are controlled by an RNC.
However, this is changing with the emergence of High Speed Downlink Packet Access
(HSDPA), where some logic (e.g. retransmission) is handled on the Node B for lower response
times. The utilization of WCDMA technology allows cells belonging to the same or different
Node Bs and even controlled by different RNC to overlap and still use the same frequency (the
effect is utilized in soft handovers). Since WCDMA often operates at higher frequencies than
GSM, the cell range is considerably smaller compared to GSM cells, and, unlike in GSM, the
cells' size is not constant (a phenomenon known as "cell breathing"). This requires a larger
number of Node Bs and careful planning in 3G networks. Power requirements on Node Bs and
UE are much lower.

3.2 Network Provisioning Process

The Network Provisioning Process basically deals with the network configuration, ensuring that
the capacity and functionality is ready for provisioning planned services. Typically it covers the
following functions:
(re-)configuration of the network, including the topology and connectivity based on service and
network planning requests; re-configuration of the network based on network maintenance plans
and/or network events (faults, performance etc.); (re-)configuration of network terminations to
satisfy service instances of specific customers; start the testing and monitoring
(usage/performance) processes in the network that are needed and relevant to its function.

14
3.3 Network Inventory Management Process

The Network Inventory Management Process is responsible of all administrative and operational
information of all network elements in the network, including spare parts and software versions.
Typically it covers the following functions: installation and validation of all NEs and associated
equipment of the physical network; administration of all NEs and associated equipment of the
physical network; repairing and upgrading of all the NEs and associated equipment of the
physical network; guarantee the alignment of the inventory repository with the actual NEs and
associated equipment of the physical network.

3.4 Radio access network

Figure 3.2 Radio Access Network

UMTS also specifies the Universal Terrestrial Radio Access Network (UTRAN), which is
composed of multiple base stations, possibly using different terrestrial air interface standards and
frequency bands.

The UE (User Equipment) interface of the RAN (Radio Access Network) primarily consists of
RRC (Radio Resource Control), RLC (Radio Link Control) and MAC (Media Access Control)
protocols. RRC protocol handles connection establishment, measurements, radio bearer services,

15
security and handover decisions. RLC protocol primarily divides into three Modes—Transparent
Mode (TM), Unacknowledged Mode (UM), Acknowledge Mode (AM). The functionality of AM
entity resembles TCP operation whereas UM operation resembles UDP operation. MAC handles
the scheduling of data on air interface depending on higher layer (RRC) configured parameters.

The set of properties related to data transmission is called Radio Bearer (RB). This set of
properties decides the maximum allowed data in a TTI (Transmission Time Interval). Signaling
messages are sent on Signaling Radio Bearers (SRBs) and data packets (either CS or PS) are sent
on data RBs. RRC and NAS messages go on SRBs.

Security includes two procedures: integrity and ciphering. Integrity validates the resource of
messages and also makes sure that no one (third/unknown party) on the radio interface has
modified the messages.

3.5 Core network

Figure 3.3 Core Network

With Mobile Application Part, UMTS uses the same core network standard as GSM/EDGE. This
allows a simple migration for existing GSM operators.

16
The CN can be connected to various backbone networks, such as the Internet or an Integrated
Services Digital Network (ISDN) telephone network. UMTS (and GERAN) include the three
lowest layers of OSI model. The network layer (OSI 3) includes the Radio Resource
Management protocol (RRM) that manages the bearer channels between the mobile terminals
and the fixed network, including the handovers.

The 1900 MHz range is used for 2G (PCS) services, and 2100 MHz range is used for satellite
communications. Regulators have, however, freed up some of the 2100 MHz range for 3G
services, together with a different range around 1700 MHz for the uplink.

UMTS phones (and data cards) are highly portable—they have been designed to roam easily
onto other UMTS networks (if the providers have roaming agreements in place). In addition,
almost all UMTS phones are UMTS/GSM dual-mode devices, so if a UMTS phone travels
outside of UMTS coverage during a call the call may be transparently handed off to available
GSM coverage. Roaming charges are usually significantly higher than regular usage charges.

3.6 Network Maintenance and Restoration Process


The Network Maintenance and Restoration Process its responsible for maintaining the
operational quality of the network, in accordance with required network performance goals.
Typically it covers the following functions: planning and triggering of preventive actions (e.g.
scheduled routine tests); responding to fault/performance degradation conditions by taking the
appropriate corrective actions; determine the cause and impact of the problems found.

3.7 Network Data Management Process

The Network Data Management Process basically deals with collecting, registration and pre-
processing of data and events of the network. This information might be used for performance
evaluation, traffic analysis and billing.

17
3.8 Satellite Systems

At initial service launch in 2002, the satellite component of UMTS will be able to provide a
global coverage capability. These dateline systems are planned to be implemented using the S-
band Mobile Satellite Service (MSS) frequency allocations identified for satellite IMT2000 and
will provide services compatible with the terrestrial UMTS systems .

3.9 Broadband Satellite Systems

Several broadband satellite systems are also planned for deployment in the post 2002 timeframe,
to offer data rates beyond 2Mb/s and into the Gigabits domain. Some of these systems may offer
compatibility with UMTS service concepts using satellite frequency allocations in the 20.30 GHz
range. The requirements of the terminal equipment and higher power consumption will
necessitate larger size transportable or fixed terminals.

3.10 Smart Antennas

Smart antennas react intelligently to the received radio signal, continually modifying their
parameters to optimize the transmitted and received signal. This allows them to:

 Increase coverage and capacity by reducing interference between adjacent


mobiles
 Offer space division multiple access, where frequencies are assigned on a per-
mobile rather than a per-cell basis allowing vastly increased capacity
 Enable user location in space, allowing the introduction of advanced location
based services.

18
Figure 3.6 UMTS - Maps-Web architecture

19
CHAPTER 4

Call setup

Call setup figure given below

Figure 4.1 Call Setup:

20
4.1 Quality of Service

Network Services are considered end-to-end, this means from a Terminal Equipment (TE) to
another TE. An End-to-End Service may have a certain Quality of Service (QoS) which is
provided for the user of a network service. It is the user that decides whether he is satisfied with
the provided QoS or not. To realize a certain network QoS a Bearer Service with clearly defined
characteristics and functionality is to be set up from the source to the destination of a service. A
bearer service includes all aspects to enable the provision of a contracted QoS. These aspects are
among others the control signaling, user plane transport and QoS management functionality. A
UMTS bearer service layered architecture is depicted below, each bearer service on a specific
layer offers it's individual services using services provided by the layers below.

Figure 4.2 QoS Architecture

4.2 Frequencies

Here is the summary of UMTS frequencies:


1920-1980 and 2110-2170 MHz Frequency Division Duplex (FDD, W-CDMA) Paired
uplink and downlink, channel spacing is 5 MHz and raster is 200 kHz. An Operator needs 3 -
4 channels (2x15 MHz or 2x20 MHz) to be able to build a high-speed, high-capacity
network.
1900-1920 and 2010-2025 MHz Time Division Duplex (TDD, TD/CDMA) Unpaired,
channel spacing is 5 MHz and raster is 200 kHz. Tx and Rx are not separated in
frequency.1980-2010 and 2170-2200 MHz Satellite uplink and downlink.

21
Figure 4.3 UMTS frequencies

4.3 Bandwidth

22
Figure 4.3 Bandwidth
4.4 Main UMTS Codes

Here us a summary of the main UMTS FDD codes:


Synchronisation Channelisation Scrambling Scrambling
Codes Codes Codes, UL Codes, DL
Complex-
Gold Codes Valued Gold
Orthogonal Complex-
Code Segments
Variable Valued Gold
Primary (long) or
Spreading Factor Code
Synchronization Complex-
Type (OVSF) codes Segments
Codes (PSC) and Valued S(2)
Secondary Codes (short)
sometimes called Pseudo Noise
Synchronization
Walsh Codes (PN) codes
Codes (SSC) Pseudo Noise
(PN) codes
38400 chips /
Length 256 chips 4-512 chips 38400 chips
256 chips
1.04 µs -
133.34 µs 10 ms / 66.67
Duration 66.67 µs 10 ms
µs

512 primary /
= spreading factor
Number 1 primary code / 16 15 secondary
4 ... 256 UL, 16,777,216
of codes secondary codes for each
4 ... 512 DL
primary code
No, does not No, does not
No, does not change Yes, increases
Spreading change change
bandwidth bandwidth
bandwidth bandwidth
UL: to separate
physical data and
To enable terminals
control data from
to locate and
same terminal Separation of Separation of
Usage synchronise to the
DL: to separate terminal sectors
cells' main control
connection to
channels
different terminals
in a same cell

4.5 Channel Multiplexing Structure

This is a short overview how data stream is modified during processing in layer 2 and 1 in
downlink direction. Uplink coding is done in a similar way.
Ciphering happens in RCL or MAC-d part of the layer 2. f8 algorithm gets five inputs to

23
generate a key stream block that is ciphered by binary addition to a data stream. Channel
coding
separates different down link connection to users within a cell. In the uplink direction
Channel coding is used for separation of physical data and control channels. Half-rate and
1/3-rate convolution coding is used for low data rates, turbo coding is used for higher bit
rates. Channel coding includes the spreading. Rate matching is dynamic frame-by-frame
operation and done either by puncturing or by repetition of the data stream. Interleaving is
done in two stages. It is first done by inter-frame and then by intra-frame.

Figure 4.4 Channel Multiplexing Structure

4.6 Synchronization

Different UTRAN synchronization required in a 3G network:

 Network synchronization
 Node synchronization
 Transport channel synchronization
 Radio interface synchronization

24
 Time alignment handling

Figure 4.5 Synchronization Issues Model

4.7 Compressed Mode

During inter-frequency handover the UE‟s must be given time to make the necessary
measurements on the different WCDMA carrier frequency. 1 to 7 slots per frame can be
allocated for the UE to perform this intra frequency (hard handover). These slots can either be in
the middle of the single frame or spread over two frames.

This compressed mode operation can be achieved in three different methods:


 Decreasing the spreading factor by 2:1. This will increase the data rate so bits will get
sent twice as fast.
 Puncturing bits. This will remove various bits from the original data and hence reduce the
amount of information that needs to be transmitted.
 The higher layer scheduling could also be changed to use less timeslots for user traffic.

4.8 Virtual Home Environment (VHE)

Virtual Home Environment (VHE) is a concept for Personal Service Environment (PSE)
portability across network boundaries and between terminals. The concept of VHE is such that
users are consistently presented with the same personalized features, User Interface
customization and services in whatever network and whatever terminal (within the capabilities of
the terminal and the network), wherever the user may be located.

A user's VHE is enabled by user profiles as logically depicted in a picture below. The home
environment shall:
 enable the user to manage one or more user profiles (e.g. activate, modify, deactivate
etc.)

25
 enable the home environment and HE-VASP to manage one or more user profiles (e.g.
activate, modify, deactivate etc.)
 enable the identification of a user's personalised data and services information directly or
indirectly from the user's profile(s)
 enable authorised HE-VASPs to access the user's profile(s)
 enable VASPs controlled and limited access to the user's profile(s) (e.g. for general user
preferences and subscribed services information).

Figure 4.6 The set of service from the users point of view

4.9 Interoperability and global roaming

UMTS phones can use a Universal Subscriber Identity Module, USIM (based on GSM's SIM)
and also work (including UMTS services) with GSM SIM cards. This is a global standard of
identification, and enables a network to identify and authenticate the (U)SIM in the phone.
Roaming agreements between networks allow for calls to a customer to be redirected to them
while roaming and determine the services (and prices) available to the user

4.10 Migrating from GSM/GPRS to UMTS

From a GSM/GPRS network, the following network elements can be reused:

 Home Location Register (HLR)


 Visitor Location Register (VLR)
 Equipment Identity Register (EIR)
 Mobile Switching Center (MSC) (vendor dependent)
 Authentication Center (AUC)
 Serving GPRS Support Node (SGSN) (vendor dependent)
 Gateway GPRS Support Node (GGSN)
 From a GSM/GPRS communication radio network, the following elements cannot be
reused:

26
 Base station controller (BSC)
 Base transceiver station (BTS)

CHAPTER 5

UMTS Management Processes


5.1 UMTS Management

UMTS Management will be approached from the point of view of the management processes
involved in the running of the UMTS telecommunication systems. This clause identifies and
describes those major processes, following and considering a telecommunication enterprise
model that expands from the relationship to the customers to the operation of the network
elements, both inclusive (see figure 2).
NOTE 1: Processes such as Roaming Agreement Management or Fraud Management are
covered by and included within these major processes.
NOTE 2: Q-Adapter needs to be interpreted here in a wider sense than in [1], since UMTS will
consider other application protocols different to CMIP.
This clause is based on NMF GB910 (see Bibliography).

27
Figure 5.1 UMTS Management Processes

5.2 UMTS Management Reference Model

Figure 5.2 illustrates the UMTS Management Reference Model.

It shows the UMTS Management System interfacing other systems. The present document (and
the rest of the ETSI UMTS Management detailed specifications) addresses the UMTS
Management System (function and architecture wise) and the interfaces to the other systems. The
present document does not address the definition of any of the systems the UMTS Management
System interfaces to. The rest of the ETSI specifications regarding UMTS Management will not
cover them either. It is not the approach to re-define the complete management of all the
technologies that might be used in the provision of UMTS. However, it is the intention to
identify and define what will be needed from the perspective.

5.3 UMTS Management Infrastructure

Every UMTS Organization has it's own Management Infrastructure. Each Management
Infrastructure will contain different functionality depending on the role played and the equipment
used by that UMTS Entity. However the core management architecture of the UMTS
Organization is very similar. Every UMTS Organization: provides services to it's customers;
needs an infrastructure to fulfill them (advertise, ordering, creation, provisioning,); assures them
(Operation, Quality of Service, Trouble Reporting and Fixing). Not every UMTS Organization
will implement the complete Management Architecture and related Processes. Processes not
implemented by a particular UMTS Organization are accessed via interconnections to other

28
UMTS organizations which have implemented these processes. The Management architecture
itself does not distinguish between external and internal interfaces.

5.4 TMN

TMN (Telecommunications Management Network), as defined in [1], provides: an architecture,


made of OS (Operations Systems) and NEs (Network Elements), and the interfaces
between them (Q3, within one Operator Domain and X, between different Operators); the
methodology to define those interfaces; other architectural tools such as LLA (Logical Layered
Architecture) that help to further refine and define the Management Architecture of a given
management area; a number of generic and/or common management functions to be
specialized/applied to various and specific TMN interfaces. The UMTS Management
Architecture is based on TMN, and will reuse those functions, methods and interfaces already
defined (or being defined) that are suitable to the management needs of UMTS. However, the
UMTS Management needs to explore the incorporation of other concepts (other management
paradigms widely accepted and deployed).

5.5 Interfaces to NEs

In some cases, the management interfaces to NEs have been defined bottom-up, trying to
standardize the complete O&M functionality of the various NEs. For UMTS management, a top-
down approach will be followed to streamline the requirements from the perspective of top
priority management processes within a UMTS operator. It is assumed that this will not fully
cover the OAM functionality of all NE types in UMTS at once., and some proprietary solutions
(local and/or remote) will be needed in the interim. The rational of that approach is not only lack
of resources, but also to follow a pragmatic step-wise approach that takes into account the market
forces (manufacturers and operators capabilities). The rational is: the life-cycle of information
flows is 10 to 20 years, while the protocols is 5 to 10 years; the developments on automatic
conversion allows for a more pragmatic and open approach.

5.6 Customer Interface Processes

It basically consist in translating customer requests or interactions into requests to other


processes (provisioning, billing etc.). All effective interactions with the customers will be logged
and tagged for further tracking and/or post-processing. Taking into account current trends, it is
very likely that the interaction with the customer is not through an operator but computer based.
The process definition, functionally speaking, is transparent to this fact. It is assumed that it is
only a presentation and access rights issue. An operator is to be seen as a mediator between the

29
customer and the management system, the operator will have access (maybe depending on the
operator type) to more data than the customer. Therefore, security and flexible access rights is a
key factor to this process group.

5.7 Sales Process

The Sales Process deals basically with sales inquiries from the customers. The Sales Process aim
is two fold: to learn about the customer expectations; to find the current offering that better
matches those expectations. This process needs information on current/planned offering (from
Service Planning/Development Process and Quos Management). Information obtained during
this process might be used for market surveys, forecasting service demand (volume and/or new
services), advertising etc.

5.8 Customer Care and Billing Systems

UMTS will operate in a very different environment to today‟s mobile systems. The new roles
and many new players must inter-operate in fully integrated manner. Customer care and billing
systems are critical to commercial success. Customer care and billing are inextricably linked and
must be able to effectively operate across all the players and roles in a customer friendly manner.
For UMTS the bill will no longer be just a piece of paper but a key part of a highly sophisticated
approach to customer care across all services a provider could offer.

5.9 Problem Handling Process

The Problem Handling Process takes responsibility of the reception and resolution of customer
complaints. Additionally, operator's problems affecting the service shall be communicated to
Problem Handling and they might be notified to the customer (depending on the problem type
and instance). Therefore it involves some of the following functionalities:
determine cause of the problem; forward complaint to relevant processes;
track the progress of resolution (if resolution is delegated to other internal processes and/or other
UMTS Organizations.

5.10 Service Planning and Development Process

The Service Planning and Development Process basically consists in designing the technical
capabilities to meet the service needs of a specified market at the desired cost. It ensures that the
new services being planned can be properly installed, monitored, controlled and billed. It also
ensures that the capacity/dimensioning would be appropriate in relationship with the expected
sales. The output of this process triggers the actions to implement the services: modifications to
the underlying network and information systems; agreements with other providers; service
documentation; pre-operational testing.

5.11 Service Quality Management Process

30
The Service Quality Management Process is responsible of determining whether or not the
service levels are being met consistently, in terms of performance, problems and penetration
forecasts/goals. It is also responsible of initiating the appropriate actions to correct deviations
(excess as we as defect) from those forecasts/goals.

5.12 USIM Cards/Smart cards

A major step forward that GSM introduced was the Subscriber Identity Module (SIM) or Smart
Card. It introduced the possibility of high security and a degree of user customization to the
mobile terminal. SIM requirements, security algorithms, card and silicon IC technology will
continue to evolve up to and during the period of UMTS deployment.

By 2002, the smart card industry will be able to offer cards with greater memory capacity, faster
CPU performance, contact less operation and greater capability for encryption. These advances
will allow the UMTS Subscriber Identity Module (USIM) to add to the UMTS service package
by providing portable high security data storage and transmission for users. New memory
technologies can be expected to increase card memory sizes making larger programs and more
data storage feasible. In theory, the users could decide which applications/services he wants on
the card, much as they do for their computers‟ hard disks. This is the challenge and opportunities
for service industries which evolving smart card technology presents.

5.13 API and Development toolbox

The rapid development and deployment of new and innovative services will drive the UMTS
market. The key enabler in this area will be the standardization of the UMTS Application
Programming Interface (API). The API will support security, billing, subscriber information,
service management, call management, SIM management user interaction and content
translation. It will build upon and extend today‟s technologies such as Java, Wireless Application
Protocol (WAP), GSM SIM Toolkit and Internet technologies which are also exploiting
convergence with other emerging technologies for consumer Information Society products such
as digital TV set boxes.

5.14 Mobility and Coverage

UMTS has been designed from the outset to be a global system, comprising both national
terrestrial and global satellite components consistent delivery of the services via VHE.

31
Figure 5.3 UMTS coverage is universal
Through multi-mode, multi-band terminals it can use 2nd generation systems to extend its
coverage for basic services. The first goal is to achieve truly personal communications, with
terminals able to roam from a private cordless or fixed network. Start with a Pico cellular, micro
cellular public network, then into a wide area macro cellular network, which may actually be a
2nd generation network, and then to a satellite mobile network, in each case with a minimal break
in communication.

5.15 UMTS Location Based Services

UMTS networks will support location service features, to allow new and innovative location
based services to be developed. It will be possible to identify and report in a standard format (e.g.
geographical co-ordinates) the current location of the user's terminal and to make the information
available to the user, ME, network operator, service provider, value added service providers and
for PLMN internal operations. The location is provided to identify the likely location of specific
MEs. This is meant to be used for charging, location-based services, lawful interception,
emergency calls, etc., as well as the positioning services.

Location-
Most existing cellular services, stock prices, sports reports
independent
PLMN or
Services that are restricted to one country or one PLMN
country
Regional Weather reports, localized weather warnings, traffic information (pre-
(up to 200km) trip)
District
Local news, traffic reports
(up to 20km)
Up to 1 km Vehicle asset management, targeted congestion avoidance advice
Rural and suburban emergency services, manpower planning,
500m to 1km
information services (where are?)
32
100m (67%) U.S. FCC mandate (99-245) for wireless emergency calls using
300m (95%) network based positioning methods
Urban SOS, localized advertising, home zone pricing, network
75m-125m maintenance, network demand monitoring, asset tracking, information
services (where is the nearest?)
50m (67%) U.S. FCC mandate (99-245) for wireless emergency calls using
150m (95%) handset based positioning methods
10m-50m Asset Location, route guidance, navigation

Example of location services

CHAPTER 6

Internet Protocol (IP) Compatibility

UMTS is a modular concept that takes full regard of the trend towards convergence of fixed and
mobile networks and services, enabling a huge number of applications to be developed. As an
example a laptop with an integrated UMTS communications module becomes a general-purpose
communications and computing device for broadband Internet access, voice, video telephony
and conferencing for either mobile or residential use. The number of IP networks and
applications are growing fast. Most obvious is that Internet, but private IP networks (Intranets)
show similar or even higher rates of growth and usage. UMTS will become the most flexible
broadband access technology, as it allows for mobile, office and residential use in a wide range
of public and non-public networks. The system can support both IP and non-IP traffic in a
variety of modes including packet circuit switched and virtual circuit². UMTS will be able to
benefit from parallel work by the Internet Engineering Task Force (IETF) who are further
extending their basic set of IP standards for mobile communication (Daniels, 1998).
Developments on new domain name structures are also taking place. These new structures will
increase the usability and flexibility of the system, providing unique addressing for each user,
independent of terminal application or location.

33
Figure 6.1 mobile IP in UMTS Step 1

6.1 Multimedia Messaging Service (MMS); Media formats and codec’s

Text

Plain text. Any character encoding (charset) that contains a subset of the logical characters in
Unicode shall be used (e.g. US-ASCII, ISO-8859-1, UTF-8, Shift_JIS, etc.). Unrecognized
subtypes of "text" shall be treated as subtype "plain" as long as the MIME implementation knows
how to handle the charset. Any other unrecognized subtype and unrecognized char set shall be
treated as "application/octet - stream".

34
Speech

The AMR codec shall be supported for narrow-band speech. The AMR wideband speech codec
shall be supported when wideband speech working at 16 kHz sampling frequency is supported.

Source codec bit-rates for the AMR codec

Audio

MPEG-4 AAC Low Complexity object type should be supported. The maximum sampling rate
to be supported by the decoder is 48 kHz. The channel configurations to be supported are mono
(1/0) and stereo (2/0). In addition, the MPEG-4 AAC Long Term Prediction object type may be
supported.

Still Image

ISO/IEC JPEG together with JFIF shall be supported. The support for ISO/IEC JPEG only apply
to the following two modes:
 mandatory: baseline DCT, non-differential, Huffman coding
 optional: progressive DCT, non-differential, Huffman coding

Bitmap graphics

The following bitmap graphics formats should be supported:


 GIF87a
 GIF89a
 PNG

35
Video

For terminals supporting media type video, ITU-T Recommendation H.263 profile 0 level 10
shall be supported. This is the mandatory video codec for the MMS. In addition, MMS should
support:
 H.263 Profile 3 Level 10
 MPEG-4 Visual Simple Profile Level 0

These two video codec‟s are optional to implement.

6.2 UMTS Security

UMTS security builds on the security of GSM, inheriting the proven GSM security features. This
maximizes the compatibility between GSM and UMTS i.e. GSM subscribers roaming in a
UMTS network are supported by GSM security features. UMTS also provides a solution to the
weaknesses of GSM security and adds security features for new 3G radio access networks and
services.

UMTS consists of five security feature groups:

1) Network Access Security (A in diagram below) provides users with


secure access to UMTS services and protect against attacks on the radio
access link.
2) Network Domain Security (B in diagram below) protects against
attacks on the wire line network and allows nodes in the provider domain
to exchange signaling data securely.
3) User Domain Security (C in diagram below) provides secure access to
mobile stations.
4) Application Domain Security (D in diagram below) allows the secure
exchange of messages between applications in the user and in the provider
domain.
5) Visibility and configurability of security allows the user to observe
whether a security feature is currently in operation and if certain services
depend on this security feature

36
TE: Terminal Equipment
USIM: User Service Identity Module
SN: Serving Network
HN: Home Network
MT: Mobile Termination
AN: Access Network

Unlike GSM, which has authentication of the user to the network only, UMTS uses mutual
authentication which means the mobile user and the serving network authenticate each other,
providing security against false base stations. This mutual authentication uses an authentication
quintet which helps to ensure that a bill is issued to the correct person. The authentication quintet
consists of the user challenge (RAND), expected user response (X(RES)), the encryption key
(CK), the integrity key (IK) and the authentication token for network authentication (AUTN).
Also UMTS provides a new data integrity mechanism which protects the messages being
signaled between the mobile station and the radio network controller (RNC). The user and
network negotiate and agree on cipher and integrity algorithms. Both the integrity mechanism
and enhanced authentication combine to provide protection against active attacks on the radio
interface.

UMTS also provides different security features for maintaining identity confidentiality.

1) User identity confidentiality is maintained by ensuring the permanent user identity (IMSI) of
a user using the service cannot be eavesdropped on the radio link.
2) User location confidentiality means that one cannot determine whether the presence of a user
by eavesdropping on the radio access link.
3) User intractability ensures that it cannot be determined if different services are available to
the same user by eavesdropping on the radio access link.

It is clear to see UMTS boasts many security advantages over GSM including a data integrity
mechanism, enhanced authentication and encryption, identity confidentiality, a potential for
secure roaming and greater facilities for upgrading. However UMTS also has security problems.
For example everything that could happen to a fixed host attached to the internet could also
happen to a UMTS terminal. Also if encryption is disabled hijacking calls is possible. And if the
user is drawn to a false base station, he/she is beyond reach of the paging signals of the serving
network. Finally when the user is registering for the first time in the serving network the
permanent user identity (IMSI) is sent in clear text.

6.3 Technology for all environments Radio

The UMTS radio access system UTRA will support operation with high spectral efficiency and
service quality in all the physical environments in which wireless and mobile communication

37
take place. Today‟s user‟s live in a multi-dimensional world, moving between indoor, outdoor
urban and outdoor rural environments with a degree of mobility ranging from essentially
stationary through pedestrian up to very high vehicular speeds.
The Universal Mobile Telecommunications System (UMTS) is one of the new „third generation‟
3G mobile cellular communication systems. UMTS builds on the success of the „second
generation‟ GSM system. One of the factors in the success of GSM has been its security features.
New services introduced in UMTS require new security features to protect them. In addition,
certain real and perceived shortcomings of GSM security need to be addressed in UMTS.

6.4 Disadvantages of 1st generation


 1G mobile phones were based on the analog system.
 First-generation (1G) mobile phones had only voice facility.
 Download speeds only 2.9kbytes/s to 5.6kbytes/s.
 Radio signals on 1G networks are analog.

6.5 Disadvantages of 2nd generation


 In less populous areas the weaker digital signal transmitted by a cellular phone may not
be sufficient to reach a cell tower.
 Slow data transmission.
 It provides voice and limited data services.
 The downloading and uploading speeds available 2G technologies are up to 236 kbps.
CHAPTER-7

Discussion and Conclusion

Discussion:

 The Universal Mobile Telecommunications System (UMTS) is one of the new „third
generation‟ 3G mobile cellular communication systems. In addition, certain real and
perceived shortcomings of GSM security need to be addressed in UMTS.
 The UMTS radio access system UTRA(UMTS Terrestrial Radio Access) will support
operation with high spectral efficiency and service quality in all the physical
environments in which wireless and mobile communication take place.
 Today‟s users live in a multi-dimensional world, moving between indoor, outdoor urban
and outdoor rural environments with a degree of mobility ranging from essentially
stationary through pedestrian up to very high vehicular speeds.

Recommendation:

38
Teletalk Bangladesh Ltd.already started providing 3G(UMTS) services. All others mobile
companies in Bangladesh such as Gp, Banglalink, Robi, Airtel may also upgrade their system
use UMTS(3G Technology) instead of GSM(2G Technology) The knowledge on the helpful to
the engineers in their professional as well as personal life.

Conclusion:

 UMTS is a significant opportunity for manufactures, operators, regulators and content


providers, both as a communications system in itself and as part of the greater
information Society.
 The vision of UMTS is as a customer-focused system, where customers include both
network operators and end users.
 The challenge to the communications industry is to integrate the technologies needed for
UMTS in a way, which supports this goal and thereby transforms the vision into reality.

Concluding Remarks:

In this paper we presented integration architecture for UMTS. The architecture allows a mobile
node to maintain date connection and telephony voice connection through UMTS in parallel. It
isolates UMTS specific protocol stack in the device driver block and gives full IP protocol
capability to connection. We also presented inter-system handover sufficient detail, which work
with a verify micro-mobility solutions used in UMTS network. In future, we would like to
review the resource reservation and it radio resource management.

References:

 D. Katz Macros and Frank H. P. Fitzek. January 2009, Wimax Evolution : Energing
Technologies and Applications, Wiley.
 Holman‟s Dr.Silke, Niemi Valtteri, Ginzboorg Philp, Laitinen Rekka and N. Prof
Asokan, October 2oo8.
 P.Waltz Dr, Steffen. Toward Leduc Arehitecture, March 2010 ETC Press.
 Mobile Cellular Telecommunication, By William E. Y. Lee. Publishee: Mcgraw_Hill
Professional, Year of Publication: Second Edition.

Related Websites:

39
 www.umtsworld.com
 www.infoworld.com
 www.satellite_telephone.com
 www.networkcomputing.com
 www.nokia.com
 www.frequence.com/product_mobile_info_arch.php.com
 www.sei.emu.edu/reports.com
 www.sybase.com

40

View publication stats

You might also like