Professional Documents
Culture Documents
Plesiochronous - "almost synchronous, because bits are stuffed into the frames as padding and the
calls (signal) location varies slightly - jitters - from frame to frame".
Plesiochronous Transmission :
Disadvantages of PDH:
SDH Advantages:
A frame with a bit rate of 155.52Mbps is defined in ITU-T recommendation G.707.This frame is
called Synchronous Transport Module(STM),since it is the first level in hierarchy it is called STM-1
It is made up from a byte matrix of 9 rows and 270 columns
Transmission is row by row, starting with the byte in the upper left corner and ending with the byte in
the lower right corner
The frame repetition rate is 125s.Each byte in payload represents a 64kbps
channel
SDH Bit Rates and Multiplexing :
Regenerator (Reg.)
Terminal Multiplexer (TM)
Add/Drop Multiplexer (ADM)
Digital Cross Connect (DXC)
Regenerator (Reg.) :
Regenerator, Amplifies the optical signal after converting back to electrical and generates a new
optical signal of the same format Reshaping & timing of data stream
Terminal Multiplexer (TM) :
It combines the Plesionchronous and synchronous input signals into higher bit rate STM-N Signal.
The Add And Drop Multiplexer (ADM) passes the (high rate) STM-n through from his one side to the
other and has the ability to drop or add any (low rate) tributary. The ADM used in all topologies.
A digital cross connect is an equipment which has the capability of interconnecting tributaries.
A digital cross connect is an equipment which has the capability of interconnecting tributaries
An Agg to Agg connection, a trib to aggregate connection and a tributary to tributary connection is
also possible in case of a Digital Cross Connect.
SDH Management :
Alarm/Event Management
Configuration Management
Performance Management
Access and Security Management
A defect is a detection of an alarm such as loss of signals , loss of frames. AIS loss of excessive errors
A failure is a defect that persists beyond a maximum time allocated. It is used to access to integrate
Automatic Protection Switching ( APS ).
This alarm is raised when the STM-N level drops below the threshold at which a BER of 1 in 1000 is
detected
It could be due to cut cable, excessive attenuation of the signal or an equipment fault
The LOS state will clear when 2 consecutive framing patterns are received and no LOS condition is
detected
This situation occurs when 4, or in some implementations, 5 consecutive SDH frames are received
with invalid framing patterns(A1 and A2 bytes)
The maximum time to detect OOF is therefore 625Ms
The OOF clears when consecutive SDH frames are received with valid framing patterns
Loss Of Frame (LOF) :
The LOF occurs when the OOF state exists for a specified time in msecs
If OOFs are intermittent,the timer is not reset to zero an “in frame” state persists continuously for
until specified time in msecs
As the framing bytes are there in Regenerator section overhead(RSOH) this alarm is sometimes
known as RS-LOF
The LOP state occurs when ‘n’ consecutive invalid pointers are received or ‘n’ New Data
Flags(NDF) are received(other than in a concatenation indicator), where n=8,9 or 10
The LOP state is cleared when 3 equal valid pointers or 3 consecutive AIS indications are
received.This alarm is very rare in steady state because the pointer is either valid or is all 1s
An AIS indication is all 1’s pattern in the pointer bytes.Concatenation is indicated when the pointer
bytes are set to “1001XX1111111111” I.e NDF enabled(H1 and H2 bytes for AU LOP; v1 and v2 bytes
for TU LOP)
STM-1 FRAME :
How Is The Frame Composed ?
The ability to use different wavelengths in a single fiber, to split and to combine them.
General Characteristics :
Multiple service interfaces Accessible to a full range of services: 10G/2.5G SDH, GE, IP, ATM
services, 8×GE→10G, 4×2.5G →10G to enhance bandwidth utilization.
Smooth upgrading capability
Multiple transmission distance solutions
Built-in spectrum analysis analyzer
Perfect protection
Unified network management.
Public Switched Telephone Network (PSTN):
The Public Switched Telephone Network (PSTN), also known as Plain Old Telephone
Service (POTS), is the wired phone system over which landline telephone calls are
made.
●It consists of telephone lines, fiber optic cables, and microwave transmission links,
cellular networks, communications satellites, and undersea telephone cables, all
interconnected by switching centers.
●The combination of the interconnected networks and the single numbering plan make
it possible for any phone in the world to dial any other phone.
Global System for Mobile Communication (GSM) :
Block Diagram of GSM Network :
Important points :
For a telephone number in the PSTN/ISDN network, ITU-T's numbering plan E.164 is used.
Mobile Station ISDN number (MSISDN)
› it is the only network identity that subscribers are aware of. All other network identities discussed in
this chapter are for internal network use and subscribers do not need to be aware of them. An NDC is
allocated to each PLMN.
International Mobile Subscriber Identity (IMSI) :
› The IMSI is stored in the SIM, the HLR and in the serving VLR.
It is used to protect the subscriber's identity on the air interface. The TMSI has local significance only
(that is, within the MSC/VLR area) and is changed at time intervals or when certain events occur such
as location updating.
The IMEI is used for security procedures such as identifying stolen equipment and preventing
unauthorized access to the network.
The Mobile Station Roaming Number (MSRN) is a temporary network identity which is assigned
during the establishment. In this case, SN is the address to servicing MSC/VLR. SN= Servicing Node.
Physical Channels
1. Associated with frequency bands, time slots, codes
2. Physical channels transfer bits from one network element to another
Logical Channels
- Distinguished by the nature of carried information and the way to assemble bits into data units
- Three types
1. one-to-one: traffic channels between a BTS and a MS
2. one-to-many: synchronization signals from BTS to MSs in a cell
3. many-to-one: from MSs to the same BTS
Control Channels
1. Broadcast Channels (BCH)
2. Common Control Channels (CCCH)
3. Dedicated Control Channels (DCCH)
Traffic Channels (TCH)
1. Full Rate (TCH/F)
2. Half Rate (TCH/H)
Mobile registration:
› Before a mobile can do anything, it needs a dedicated control channel which is obtained via the
Random Access Channel (RACH). When this succeeds the BSC tells the BTS to allocate such a
channel to the mobile.
› The mobile then performs a Location Update Request which causes the VLR and HLR to be updated.
However, before any such update is made, the mobile’s HLR and AuC are contacted and the mobile is
authenticated by a challenge/response sequence which we shall look at later.
› The mobile is then assigned an alias, the Temporary Mobile Subscriber Identity (TMSI) which the
mobile acknowledges before the HLR/VLR are updated and the dedicated control channel released.
Paging a Mobile Station :
› Mobile stations, when powered on and idle, periodically scan a list of paging/control channels and
lock onto the strongest signal.
› As a mobile station moves from one base station cell area to another, it will determine that a new base
station has a stronger signal than the current base station and retune its receiver to the new base station.
› Base stations are unaware of the mobile station cell selection process.
› In order to deliver a call to a mobile station, a page message must be broadcast on the paging channel
from the base station for which the mobile is currently monitoring.
› Multiple base stations must be used to page a mobile station for situations where base stations are
unaware of mobile station movement.
› If the mobile station hears its identification code broadcast on the paging
channel, it will respond with a page response message.
GSM Architecture :
Handset
BTS: Base Transceiver Station
MSC: Mobile Switching Center
BSC: Base Station Controller
HLR/VLR: Home Location Register/Visiting Location Register
• SIM Card: Subscriber Identity Module Card
• Service Centers: USSD, SMS, …
• Used by the subscriber to access the GSM network via the air interface
• Contains the hardware and software specific to the radio interface
• Need a Subscriber Identity Module (SIM) which contains the subscriber-specific data to access GSM
network, except emergency call
Base Transceiver Station (BTS) / Base Station :
• Contains the relevant data of all Mhs currently located in a serving MSC
– The permanent data is the same as data in he HLR
– The temporary data includes
• Temporary Subscriber Identity (TMSI)
• Location Area Identity (LAI) of an MH
– VLR allocates mobile subscriber roaming numbers (MSRNs) for the incoming call setup
Subscriber Identity Module (SIM) :
Location Registry :
One or more Node B’s are controlled and addressed by an RNC. A Node B is a
physical unit for implementation of the UMTS radio interface. It is converting the
physical transmission of the data from fixed network transmission (ATM based) to
WCDMA transmission.
As a central transmission and reception site, it serves on or more UMTS cells. It is
serving one UMTS cell in case of an omni cell with 360o service or, for example, 2, 3,
or 6 sector cells with 180o 120o and 60o service respectively.
The Node B is connected: via Iub interface to its controlling RNC via Uu interface to
the Ues
Radio Network Controller (RNC) :
The UMTS Terrestrial Radio Access Network (UTRAN) is sub-divided into Radio
Network Subsystems RNS. The Radio Network Controller (RNC) is the central
controlling unit of a RNS. It is controlling itself and all the Node Bs of the RNS.
The RNC is connected via the following ATM based interfaces:
• Iub interface: to connected the Node Bs
• Iur interface: to neighbouring RNCs
• Iu interface: to the Core Network CN
Due to different protocol stacks, the Iu interface can be sub-divided into an Iu –ps
interface and an Iu-cs interface.
The Iu-ps interface is used for data and signalling transmission to the PS domain of
the CN, the Iu-cs interface is used for data exchange with the CS domain.
The main task of the RNC is to perform Radio Resource Management RRM for all
UEs in its service area. Therefore, it can be compared to the GSM BSC.
Different to the GSM BSC, it is 100% autonomously responsible for all RRM
decisions. RRM means to be that the RNC is responsible for signalling with the UEs
via Radio Resource Control (RRC) protocol, it is deciding about the allocation of
resources, Handover to other cells and release of resources.
The RNC is holding the RRC connection to the UEs as long as data have to be
transmitted. It is storing the UEs location information to transmit the data to the right
location. The location information can be requested by the CN for Location Based
Services. It is responsible for reliable transmission over the radio interface,
performing Backward Error Correction in acknowledged mode.
It is responsible for Ciphering/De- Ciphering and Integrity Check.
General Architecture for UMTS R.99 :
The UMTS networks are based on GSM Phase 2+ Core Networks. This approach
safeguards the investments made by today's GSM network operators and reduces
the 3G implementation risks. The UMTS Terrestrial Radio Access
Network (UTRAN) is connected to the enhanced Phase 2+ Core Network (CN) via Iu
interface. The GERAN and UTRAN can be connected to the same CN. The GSM
Mobile Station (MS) is connected to the GERAN via GSM radio interface Um, the
UMTS User Equipment (UE) to UTRAN via UMTS radio interface Uu. Important note:
In order to allow a smooth evolution, some network elements are used in the 2G and
3G context, such as the MSC. In this material, it will be normally called MSC. If a
specific reference to the second or third generation is required, it will be called 2G-
MSC and 3G-MSC, respectively. The same is true for the SGSN.
CS Domain
The CS Domain of the UMTS CN consists of the following functions:
MSC : Mobile Services switching Center
GMSC : Gateway MSC
SMS-GMSC : Short Message Service Gateway MSC
SMS-IWMSC : Short Message Service Interworking MSC
VLR : Visitor Location Register
TC/IWF : Transcoding & Interworking Function
PS Domain
The PS Domain of the UMTS CN consists of the following functions:
GGSN : Gateway GPRS Support Node
SGSN : Serving GPRS Support Node
CGF : Charging Gateway Function
BG : Border Gateway Function
Entities common to the CS & PS Domain
HLR : Home Location Register
AUC : Authentication Center
EIR : Equipment Identity Register
Common Elements :
IN Service :
The term Intelligent Network (IN) stands for IN solutions with INAP protocol (only in
home PLMN) as well as for the CAMEL solution for international roaming.
The IN platform provides the operators the tools for creating completely new services
as well as full access to modify existing one, even on a subscriber basis.
The highly scalable intelligent network platform offers the possibility to efficiently
introduce and operate value adding intelligent services. The best example for this is
the prepaid service in Mobile Network. Not only prepaid services can be built based
on Mobile Network, but also are Virtual Private Network (VPN), Freephone, premium
rate, split charging, and many more.
• Home Location Register :
The Home Location Register (HLR) is a database in charge of the management of
the mobile subscribers. There may be one or more HLRs in GSM PLMN
The HLR is always associated with an Authentication Center (AC). It participates in
different procedures, for e.g.:
Authentication Center :
The Authentication Center (AuC) is responsible to store the secret Keys of the
subscribers and the security algorithm, which are necessary for the generation of the
GSM and UMTS security parameters. On request of the VLR respectively the SGSN
the AuC generates the security parameters. They are delivered via HLR to
VLR/SGSN to enable Authentication, Ciphering and Integrity Check.
The AuC is connected only with the HLR via the non-standardised interface H. The
HLR requests data for authentication and cipher setting from the AuC. The HLR can
store this data, and makes it available to the VLR and SGSN on demand. The data
delivered from the AuC is used for:
o Mutual authentication of the SIM-card (via IMSI) and the serving PLMN
o Delivering a key to check the communication integrity over the radio path
between the user equipment and the VPLMN
o Ciphering over the radio path between the user equipment and the RNC.
The AuC is responsible to store the secret Keys of the subscribers and the security
algorithm, which are necessary for the generation of the GSM and UMTS security
parameters. On request of the VLR respectively the SGSN the AuC generates themsecurity parameters.
They are delivered via HLR to VLR/SGSN to enable Authentication, Ciphering and Integrity Check.
The black list holds IMEIs, which are forbidden in the PLMN. The grey list holds
IMEIs under supervision by law enforcement agencies, and the white list holds IMEIs,
which are allowed to access the PLMN.
A mobile phone can be also classified as to be unknown in the EIR. The interface F
connects the EIR with the VLR, while the Gf interface links it with the SGSN.
The EIR is connected to:
o The SGSN via Gf interface
o The VLR via F interface
• Mobility Management
Similar to the MSC, the SGSN is responsible for the mobility management, which
includes procedures like routing area update and paging.
Packet Routing and Transfer
Its tasks include the classical packet switching aspects, such as relaying, routing,
address translation, encapsulation, and tunnelling. In contrast to the 2G-SGSN, a 3G-
SGSN is not responsible for ciphering and user data compression.
• Gateway GPRS Support Node(GGSN)
The Gateway GPRS Support Node (GGSN) constitutes the interface between the
PLNM and external packet data networks (PDN). Similar to the SGSN, it is
responsible for the PS service provisioning. GGSN performs following task:
• Network Access Control
Two main network access control tasks are performed with a GGSN: It is responsible
for screening, i.e. the operator can determine, which type of packets is allowed to be
transmitted via a GGSN. Some manufacturers have outsourced this function into a
separate firewall. The GGSN is also responsible for charging data generation.
• Mobility Management
The mobility management tasks include HLR inquiries in case of a mobile terminated
call.
• Packet Routing and Transfer
Packets have to be routed. The GGSN is responsible to relay them from one link to
another, determine the next route with the help of routing tables. The GTP protocol is
used between the GGSN and SGSN/RNC. The user data is encapsulated to be
transparently transmitted between the GGSN and RNC. This is called tunnelling.
• Border Gateway Function
Roaming is possible for packet switched services. Hereby, user data and signalling
information is transmitted between the two PLMN via the interface Gp.
The data has to pass Border Gateways (BG) in each PLMN. The BG interfaces the
PLMN and external, inter-PLMN backbone networks. Based on the roaming
agreement between two operators, border gateways can perform mutual
authentication of each other before a secure connection is established between them
and data flows pass via them.
• Charging gateway Function
Both SGSN and GGSN generate Charging Data Records (CDR). The CDRs routed
via the CGF to the billing system. The interface Ga is used between SGSN/GGSN
and Charging Gateway Function (CGF). CGF is responsible to:
• Manage reliable CDRs
• Act as intermediate storage for CDRs
• Pre-processing of CDRs before forwarding them to the billing centre.
4G (LTE):
ADVANTAGES OF LTE
● Uses OFDMA
● Uses multi-Antennas (MIMO),Spatial Mutliplexing
● Spectral efficiency
● Flexible BW (1.4,3,5,10,15,20 Mhz)
● Simplicity due to IP transport
● Faster scheduling
● Uses FDD and TDD both
NETWORK ARCHITECTURE :
● LTE network is a combination of E-UTRAN & EPC.
● Combination of BSC and BTS in RAN have been replaced by enodeB.
● SGSN is replaced by MME (Mobility management entity) and GGSN gives way
to S/P-GW (Serving & PDN Gateway).
● HLR is replaced by HSS (Home Subscriber Server).
● A new node is introduced called PCRF (Policy Control and Charging Rule
Function).
INTERFACES :
EnodeB
● Radio resource management
● Cell control & MME pooling
● Mobility control in active state
● Header compression/Segmentationof payload on UL/DL
● Ciphering/Deciphering of user data in User plane
● Mapping logical channel to transport channel
● Maintains a UE context for each user locally
● Function of physical layer like Link adaptation ,power control ,modulation etc
● Enforces UL QoS
● HARQ