Chapter 4: Telecommunication Systems

165
Chapter 4: Telecommunication Systems

description

Chapter 4: Telecommunication Systems. Mobile phone subscribers worldwide. approx. 1.7 bn. 1600. 2009: >4 bn!. 1400. 1200. GSM total. 1000. TDMA total. CDMA total. Subscribers [million]. PDC total. 800. Analogue total. W-CDMA. 600. Total wireless. Prediction (1998). 400. 200. - PowerPoint PPT Presentation

Transcript of Chapter 4: Telecommunication Systems

Page 1: Chapter 4: Telecommunication Systems

Chapter 4:Telecommunication Systems

Page 2: Chapter 4: Telecommunication Systems

Mobile phone subscribers worldwide

year

Su

bsc

rib

ers

[mill

ion

]

0

200

400

600

800

1000

1200

1400

1600

1996 1997 1998 1999 2000 2001 2002 2003 2004

approx. 1.7 bn

GSM total

TDMA total

CDMA total

PDC total

Analogue total

W-CDMA

Total wireless

Prediction (1998)

2009:>4 bn!

Page 3: Chapter 4: Telecommunication Systems

Development of mobile telecommunication systems

1G 2G 3G2.5G

IS-95cdmaOne

IS-136TDMAD-AMPS

GSM

PDC

GPRS

IMT-DSUTRA FDD / W-CDMA

EDGE

IMT-TCUTRA TDD / TD-CDMA

cdma2000 1X

1X EV-DV(3X)

AMPSNMT

IMT-SCIS-136HSUWC-136

IMT-TCTD-SCDMA

CT0/1

CT2IMT-FTDECT

CD

MA

TD

MA

FD

MA

IMT-MCcdma2000 1X EV-DO

HSPA

Page 4: Chapter 4: Telecommunication Systems

What is GSM?

The Global System for Mobile Communications is a digital cellular communications system.It was developed in order to create a common European mobile telephone standard but it has been rapidly accepted worldwide.GSM was designed to compatible with ISDN (integrated services digital network) services.It signifies an extremely successful technology and bearer for mobile communication system.GSM today Covers 71% of all the digital wireless market.

Page 5: Chapter 4: Telecommunication Systems

What is GSM?

People use it not only in business but also in everyday personal life.Its principle use it is for wireless telephony and messaging through SMS.It also supports facsimile and data communication.Due to its innovative technologies and strengths GSM rapidly became truly global.Many of the new standardization initiative came from outside Europe.

Page 6: Chapter 4: Telecommunication Systems

What is GSM?

Depending on locally available frequency bands, different air interfaces were defined.These are 900MHz, 1800MHz, and 1900MHz.However, architecture, protocols, signaling and roaming are identical in all networks independent of the operating frequency bands.GSM uses a combination of FDMA (frequency division multiple access) and TDMA ( Time division multiple access).

Page 7: Chapter 4: Telecommunication Systems

Why GSM?

GSM uses radio frequencies more effectively than the older system.The data transmission services and the quality of the speech are better than in analog system.There are two kinds of advanced security services available on the radio path : user identity and data confidentiality.New services and ISDN compatibility are offered.It makes international roaming possible. The big uniform market hardens the competitions and lowers the prices. Later on it also leads to lower system costs.

Page 8: Chapter 4: Telecommunication Systems

History of GSM

GSM is based on a set of standards, formulated in the early 1980s.In 1982 the conference of European posts and Telegraphs formed a study group called the Groupe Special Mobile (GSM) to study and develop a pan-European mobile system, which was later introduce as Global System for Mobile Communication.

Page 9: Chapter 4: Telecommunication Systems

GSM Services

GSM offers several types of connections

voice connections, data connections, short message service

multi-service options (combination of basic services)

Three service domains Bearer Services Tele Services Supplementary Services

Page 10: Chapter 4: Telecommunication Systems

GSM Services (cont…)

TE=TerminalMT=Mobile TerminationPLMIN=public land mobile networkPSTN=public switched telephone networkISDN=integrated services digital network

GSM-PLMNtransit

network(PSTN, ISDN)

source/destination

networkTE TE

bearer services

tele services

R, S (U, S, R)Um

MT

MS

Fig: Bearer and Tele services referene model

Page 11: Chapter 4: Telecommunication Systems

GSM Services: Tele Services Telecommunication services that enable voice

communication via mobile phones. All these basic services have to obey cellular

functions, security measurements etc.TelephonyFacsimile group 3Emergency callTeletexShort message Services (SMS)Fax mailVoice mailElectronic mail

Page 12: Chapter 4: Telecommunication Systems

GSM Services: Bearer Services

A bearer service is used for transporting user data.Some of the bearer services are listed below:

Asynchronous and Synchronous data, 300-9600 bps.Alternate speech and data, 300-9600 bps.Asynchronous PAD (packet-switched access, 300-9600 bps.Synchronous dedicated packet data access, 2400-9600 bps.

Page 13: Chapter 4: Telecommunication Systems

GSM Services:Supplementary Services

Call Forwarding- the subscriber can forward incoming calls to another number if the called mobile is busy, unreachable or if there is no reply.Call Barring-There are different types of call barring services:

Barring of all outgoing callsBarring of outgoing international callsBarring of all incoming callsBarring of incoming calls when roaming.

Call hold-puts an active call on hold.

Page 14: Chapter 4: Telecommunication Systems

GSM Services:Supplementary Services

Call WaitingClosed user group, CUG-it corresponds to a group of users with limited possibilities of calling,locking of the mobile terminal (Incoming and outgoing calls)

Page 15: Chapter 4: Telecommunication Systems

GSM Architecture

The coverage area of a cellular system is partitioned into a number of smaller area or cells with each cell served by a Base Station (BS) for radio coverage.The base station are connected through fixed links to a mobile switching center (MSC), which is a local switching exchange with additional features to handle mobility management requirements of a cellular system.

Page 16: Chapter 4: Telecommunication Systems

GSM Architecture

MSCs also interconnect with the public switched telephone network (PSTN) because the majority of calls in a cellular mobile system either originate form or terminate at fixed network terminals.In the next slide figure a typical cellular system architecture/ GSM network architecture.

Page 17: Chapter 4: Telecommunication Systems

GSM: elements and interfaces

NSS

MS MS

BTS

BSC

GMSC

IWF

OMC

BTS

BSC

MSC MSC

Abis

Um

EIR

HLR

VLR VLR

A

BSS

PDN

ISDN, PSTN

RSS

radio cell

radio cell

MS

AUCOSS

signaling

O

Page 18: Chapter 4: Telecommunication Systems

GSM Architecture

GSM system consist of three subsystems:Radio Subsystem (RSS)Network and Switching Subsystem (NSS)Operation Subsystem (OSS)

Page 19: Chapter 4: Telecommunication Systems

GSM Architecture:Radio Subsystem (RSS)

Mobile Station:Mobile station consist of two units:

Mobile hand set is one of the most complicated GSM device. It provides user the access to the network.Subscribe identity module (SIM) is a removable module goes into the mobile handset. Each SIM has unique number called international mobile subscriber identity (IMSI). It has built in micro-computer & memory into it.

Page 20: Chapter 4: Telecommunication Systems

GSM Architecture:Radio Subsystem (RSS)Base station subsystem (BSS):A GSM network comprises many BSS, each controlled by a base station controller (BSC).The BSS performs all function necessary to maintain radio connections to an MS, coding/decoding of voice, and rate adaptation to/from the wireless network part.Besides a BSC, the BSS contains several BTS.

Page 21: Chapter 4: Telecommunication Systems

GSM Architecture:Radio Subsystem (RSS)

Base transceiver station (BTS):BTS has set of transceiver to talk to MS.One BTS covers one or more than one cell.Capacity of BTS depends on no of transceivers.BTS is connected to BSC via A’bis interface.Transmission rate on A’bis is 2 Mbps.Interface between MS and BTS is called Um.Transmission rate on Um interface is 13 Kbps.Each transmission has 8 TDMA channels to carry voice & signaling.

Page 22: Chapter 4: Telecommunication Systems

GSM Architecture:Radio Subsystem (RSS)Base station controller (BSC):BSC controls several BTSs.BSC manages channel allocation & handover of called from one BTS to another BTS.BSC is connected to MSC via A’ interface.Transmission rate on A I/F is 2 Mbps.Interface between BSC & BTS is called A’bis I/F.BSC has database for all of its BTS’s parameters.BSC provides path from MS to MSC.

Page 23: Chapter 4: Telecommunication Systems

GSM Architecture:Network and Switching Subsystem (NSS)

Mobile services switching center (MSC):MSC is hear of the entire network connecting fixed line network to mobile network.MSC manages all call related functions and billing information. MSC is connected to HLR & VLR for subscriber identification & routing incoming calls.MSC capacity is in terms of no of subscribers.MSC is connected to BSC at one end and fixed line network on other end.Call Detail Record (CDR) is generated for each & every call in the MSC.

Page 24: Chapter 4: Telecommunication Systems

GSM Architecture:Network and Switching Subsystem (NSS)

Home location register (HLR):All subscribers data is stored in HLR.It has permanent data base of all the registered subscribers.

Page 25: Chapter 4: Telecommunication Systems

GSM Architecture:Network and Switching Subsystem (NSS)

Visitor location register (VLR):Active subscriber is registered in VLR.It is a temporary data base of all the active subscribers.HLR validates subscriber before registration.MSC ask VLR before routing incoming call.

Page 26: Chapter 4: Telecommunication Systems

GSM Architecture:Operation Subsystem (OSS)

Operation and maintenance center (OMC):All the network elements are connected to OMC.OMC monitors health of all network elements & carries out maintenance operation, if required.OMC is linked to BTSs via parent BSC.OMC keeps records of all the faults occurred.OMC can also generate Traffic analysis reports.

Page 27: Chapter 4: Telecommunication Systems

GSM Architecture:Operation Subsystem (OSS)

Authentication center (AuC):Authentication is a process to verify the subscriber SIM.Secret data & verification algorithm are stored in to the AUC.AUC & HLR combined to authenticate the subscribers.Subscriber authentication can be done on every call if required.

Page 28: Chapter 4: Telecommunication Systems

GSM Architecture:Operation Subsystem (OSS)

Equipment identity register (EIR):The equipment identity register stores the international mobile equipment identity (IMEI) numbers for the entire network.IMEI enables the MSC in denitrifying the type of terminal, mobile equipment manufacturer, and model and helps the network in locating the device in case it is stolen or misplaced.The EIR contains three different types of lists:

A Black list: includes mobile stations which have been reported stolen or are currently locked due to some reason.

Page 29: Chapter 4: Telecommunication Systems

GSM Architecture:Operation Subsystem (OSS)

Equipment identity register (EIR):A White list: which records all MSs that are valid and operating.A Grey list: including all those MSs that may not be functioning properly.

According to category the MS can make calls or can be stopped from making calls.

Page 30: Chapter 4: Telecommunication Systems

Radio Interface

The radio interface is the interface between the mobile stations and the fixed infrastructure.It is one of the most important interfaces of the GSM system.One of the main objectives of GSM is roaming.Therefore, in order to obtain a complete compatibility between mobile stations and networks of different manufactures and operators, the radio interface must be completely defined.

Page 31: Chapter 4: Telecommunication Systems

Radio Interface

The spectrum efficiency depends on the radio interface and the transmission, more particularly in aspects as the capacity of the system and the techniques used in order to decrease the interface and to improve the frequency reuse scheme.

The specification of the radio interface has then an important influence on the spectrum efficiency.

Page 32: Chapter 4: Telecommunication Systems

Radio Interface

Frequency allocation:Two frequency band of 25 MHz each one, have been allocated for the GSM system:

The band 890-915 MHz has been allocated for the uplink direction (transmitting from the mobile station to the base station)The band 935-960 MHz has been allocated for the down link direction (transmitting from the base station to the mobile station)

But not all the countries can use the whole GSM frequency band.

Page 33: Chapter 4: Telecommunication Systems

Radio Interface

Multiple Access Scheme:The multiple access scheme defines how different simultaneous communications, between different mobile stations situated in different cells, share the GSM radio spectrum.A mix of Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA) combined with frequency hopping, has been adopted as the multiple access scheme for GSM.

Page 34: Chapter 4: Telecommunication Systems

Radio Interface

FDMA:Using FDMA, a frequency is assigned to a user.So the larger the number of users in a FDMA system the larger the number of available frequencies must be.The limited available radio spectrum and the fact that a user will not free its assigned frequency until he does not need it anymore, explain why the number of users in a FDMA system can be ‘quickly” limited.

Page 35: Chapter 4: Telecommunication Systems

Radio Interface

TDMA:On the other hand, TDMA allows several users to share the same channel.Each of the users, sharing the common channel, is assigned their own burst within a group of bursts called a frame.Usually TDMA is used with a FDMA structure.

Page 36: Chapter 4: Telecommunication Systems

1 2 3 4 5 6 7 8

higher GSM frame structures

935-960 MHz124 channels (200 kHz)downlink

890-915 MHz124 channels (200 kHz)uplink

frequ

ency

time

GSM TDMA frame

GSM time-slot (normal burst)

4.615 ms

546.5 µs577 µs

tail user data TrainingSguardspace S user data tail

guardspace

3 bits 57 bits 26 bits 57 bits1 1 3

GSM - TDMA/FDMA

Page 37: Chapter 4: Telecommunication Systems

Radio Interface

Data is transmitted in small portion is called bursts.Each carrier frequency is then divided in time using a TDMA scheme.This scheme splits the radio channel, with a width of 200KHz, into 8 burst.A burst is the unit of time in TDMA system, and its lasts approximately 0.577 ms.A TDMA frame is form with 8 bursts and lasts consequently, 4.615 ms.Each of the eight burst, that form a TDMA frame, are then assigned to a single user.

Page 38: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

A channel corresponds to the recurrence of one burst every frame.It is defined by its frequency and the position of its corresponding burst within a TDMA frame.GSM in TDMA: Each carrier consists of eight time slots.In GSM there are Two types of Channels:

Physical Channel:Logical Channel:

Page 39: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

Physical Channel:A physical channel is a single slot on a single frequency.Thus there are eight physical channels per frequency pair of TDMA frame.The information within the physical channel is termed a burst.

Page 40: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

Logical Channel:A logical channel is the content within a burst, e.g. Speech.Signalling or measurement, the way in which we organize these channels is partly dependent upon the application.But is dependent on whether the information is sent uplink or downlink or bi-direction.

Page 41: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

Logical Channel:There are two type of logical channel:

1. The Traffic Channels used to transport speech and data information.

2. The Control Channels used for network management message and some channel maintenance tasks.

Page 42: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

1. Traffic Channels (TCH):Full-rate traffic channels (TCH/F) are defined using a group of 26 TDMA frame called a 26-multiframe.The 26-multiframe lasts consequently 120 ms.In this 26-multiframe structure the traffic channels for the downlink and uplink are separated by 2 bursts.As a consequence, the mobiles will not need to transmit and receive at the same time which simplifies considerably the electronics of the system.

Page 43: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

1. Traffic Channels (TCH):The frame that form the 26-multiframe structure have different functions:

24 frames are reserved to traffic.1 frame is used for the slow associated control channel (SACCH).The last frame is unused. This idle frame allows the mobile station to perform other functions, such as measuring the signal strength of neighboring cells.

Page 44: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

1. Traffic Channels (TCH):Half-rate traffic channels (TCH/H) which double the capacity of the system, are also grouped in a 26-multifram but the internal structure is different.

Page 45: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

2. Control Channels:according to their functions, four different classes of control channels are defined:

2.1 Broadcast channels (BCH).2.2 Common control channels (CCCH).2.3 Dedicated control channels (DCCH).2.4 Associated control channels (ACCH).

Page 46: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

2.1 Broadcast channels (BCH):the broadcast channels are used, by the base station to provide the mobile station with the sufficient information.It needs to synchronize with the network.There are different types of BCH can be distinguished:FCCH (Frequency Correction Channel):

it carries no real information.All bits are set to zero, which generates a pure sine wave in the modulator.

Page 47: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

2.1 Broadcast channels (BCH):FCCH (Frequency Correction Channel):

It allows the mobile to tune its synthesizer roughly and indicates that on this frequency broadcast information is transmitted.

SCH (Synchronization Channel):The SCH transmits the used for handover and the TDMA frame number which is used for ciphering.

BCCH (Broadcast Control Channel):The BCCH contains cell specific information like cell ID, used frequency hopping sequences, adjacent cells etc.

Page 48: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

2.2 Common control channels (CCCH):

The CCCH channels help to establish the calls from the mobile station or the network.

There different types of CCCH can be defined:

PCH (Paging Channel (Downlink)):

This channel transmits the paging request for a mobile in case of an incoming call.

Page 49: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

2.2 Common control channels (CCCH):AGCH (Access Grant Channel (Downlink)):

On this channel the mobile gets initial time advance and the information which signaling channel should be used.

RACH (Random Access Channel (Uplink)):

Only on this the mobile can access a cell.

It contains an identifier of the mobile.

Page 50: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

2.3 Dedicated control channels (DCCH):

The DCCH channels are used for message exchange between several mobiles or a mobile and the network.

Two different types of DCCH can be defined:

SDCCH (Stand alone dedicated control channel):

This channel is bi-directional and is used for cell set up procedures such as authentication and it assigns a particular traffic channel to the mobile.

Page 51: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

2.3 Dedicated control channels (DCCH):SACCH (Slow associated control channel):A SACCH is associated with every SDCCH and every TCH too.During the call setup and a call in progress.The system has to know, if a handover is required the information pertaining to this are transmitted on this particular channel.It is also used to control the power of the MS and to maintain the correct timing alignment of a mobile moving within the cell.

Page 52: Chapter 4: Telecommunication Systems

Radio Interface:Channel Structure

2.4 Associated control channels (ACCH):

The Fast Associated control channels (FACCH) replace all or part of a traffic cannel when urgent signaling information must be transmitted.

The FACCH channels carry the same information as the SDCCH channels.

Page 53: Chapter 4: Telecommunication Systems

Radio Interface:Frame hierarchy

In next slide figure, the pattern of 26 slots occurs in all TDMA frames with traffic channel (TCH).The combination of these frames is called traffic multiframe.the logical combination of 26 frames to a multiframe with a duration of 120 ms. This type of multiframe is used for traffic channel (TCH), slow associated dedicated control channel (SACCH), Fast Associated control channels (FACCH).

Page 54: Chapter 4: Telecommunication Systems

Radio Interface:GSM hierarchy of frames

0 1 2 2045 2046 2047...

hyperframe

0 1 2 48 49 50...

0 1 24 25...

superframe

0 1 24 25...

0 1 2 48 49 50...

0 1 6 7...

multiframe

frame

burst

slot

577 µs

4.615 ms

120 ms

235.4 ms

6.12 s

3 h 28 min 53.76 s

Page 55: Chapter 4: Telecommunication Systems

Radio Interface:Frame hierarchy

TDMA frames containing data for the other logical channels are combined to a control multiframe.

Control multiframe consist of 51 TDMA frames and have a duration of 235.4 ms.

This logical frame hierarchy continues, combining 26 multiframe with 51 frames or 51 multiframe with 26 frames to form a superframe.

Page 56: Chapter 4: Telecommunication Systems

Radio Interface:Frame hierarchy

2,048 super frames build a hyperframe with a duration of almost 3.5 hours.

Altogether, 2,715,648 TDMA frames form hyperframe.

Page 57: Chapter 4: Telecommunication Systems

GSM Protocols & Interfaces

Next slide figure shows the signaling protocols between the MS and BTS, between the BTS and BSC, between the BSC and the MSC.

These protocols between some interfaces presented.

MS and BTS between Um interface used:

The air interface is used for exchanges between a MS and a BSS.

It is used for transmitting signaling further.

Page 58: Chapter 4: Telecommunication Systems

GSM protocol layers for signaling

CM

MM

RR

MM

LAPDm

radio

LAPDm

radio

LAPD

PCM

RR’ BTSM

CM

LAPD

PCM

RR’BTSM

16/64 kbit/s

Um Abis A

SS7

PCM

SS7

PCM

64 kbit/s /2.048 Mbit/s

MS BTS BSC MSC

BSSAP BSSAPLayer 3

Layer 2

Layer 1

Page 59: Chapter 4: Telecommunication Systems

GSM Protocols & Interfaces

BTS and BSC between Abis interface used:

This is a BSS internal interface linking the BSC and a BTS, and it has not been standardized.

The Abis interface allows control of the radio equipment and radio frequency allocation in the BTS.

Page 60: Chapter 4: Telecommunication Systems

GSM Protocols & Interfaces

BSC and MSC between A interface used:

The A interface linking the BSC and MSC.

The A interface manages the allocation of suitable radio resources to the MSs and mobile management.

Page 61: Chapter 4: Telecommunication Systems

GSM ProtocolsIn GSM, there are different types of protocols used in different layers.

These layers protocols function are describe bellow:

Mobility Management (MM):

The MM layer is in charge of maintain the location data, in addition to the authentication and ciphering procedures.

Page 62: Chapter 4: Telecommunication Systems

GSM ProtocolsCommunication Management (CM):

The CM layer consists of setting up call at the users request.

Its functions are : call control, which manages the supplementary services configuration, short message services which provides point-to-point short message services.

Page 63: Chapter 4: Telecommunication Systems

GSM ProtocolsRadio Resource (RR):

The RR management layer is in charge of establishing and maintaining a stable uninterrupted communication path between the MSC and MS over which signaling and user data can be covered.

Handovers are part of the RR layer responsibility.

Most of the functions are controlled by the BSC, BTS and MS though some are performed by the MSC.

Page 64: Chapter 4: Telecommunication Systems

GSM ProtocolsRadio Resource’ (RR’):

The RR’ layer is the part of the RR functionality which is managed by the BTS.

Base Transceiver Station Management (BTSM) :

The BTSM is responsible for transferring the RR information to the BSC.

Page 65: Chapter 4: Telecommunication Systems

GSM ProtocolsLink access protocol for the ISDN D-channel (LAPD) :

This is the ISDN LAPD protocol providing error-free transmission between the BSC and MSC.

LAPDm:

The layer two protocols are provided for by LAPDm over the air-interface.

This protocol is a modified version of the LAPD protocol.

Page 66: Chapter 4: Telecommunication Systems

GSM ProtocolsLAPDm:

The main modification are due to the tight synchronization required in TDMA and bit error protection mechanism required over the air-interface.

Page 67: Chapter 4: Telecommunication Systems

GSM ProtocolsBase Station System Application Part (BSSAP) :

The BSSAP is split into two parts the Base station system management application part (BSSMAP) and the Direct transfer application part (DTAP).The message exchanges are handled by SS7.Messages which are not transparent to the BSC are carried by the BSSMAP, which supports all of the procedures between the MSC and the BSS that require interpretation and processing of information related to single calls and resource management.

Page 68: Chapter 4: Telecommunication Systems

GSM ProtocolsSignaling Connection Control Part (SCCP):

The SCCP from SS7.

Message Transport Part (MTP):

The MTP of SS7.

Page 69: Chapter 4: Telecommunication Systems

What is SS7?Signaling system No. 7 (SS7) is used for signaling between an MSC and a BSC.

This protocol also transfer all management information between MSCs, HLR, VLRs, AuC, EIR and MOC.

Page 70: Chapter 4: Telecommunication Systems

LocalizationThe localization is a process by which a mobile station is identified, authenticated and provided service by a mobile switching center through the base station controller and base Tran receiver either at the home location of the MS or at a visiting location.

Mobile service providers, on the other hand will provide services to the user only after identifying the mobile station (MS) of the user and verifying the services subscribed to by the user or the services presently allowed to that MS.

Page 71: Chapter 4: Telecommunication Systems

LocalizationLocalization mechanism of the GSM system fulfils both the requirement.

GSM distinguishes explicitly between the user and the equipment.

It also distinguishes between the subscriber identity and the telephone number.

GSM deals with many addresses and identifiers.

Page 72: Chapter 4: Telecommunication Systems

LocalizationMobile Subscriber ISDN Number (MSISDN):The MSISDN number is the real telephone number as is known to the external world.MSISDN number is public information.This is a number published and known to everybody.In GSM a mobile station can have multiple MSISDN number.When a subscriber send a Fax and Data.He/she is assigned a total of 3 numbers: one for voice call, one for fax call and another for data call.

Page 73: Chapter 4: Telecommunication Systems

LocalizationThe MSISDN categories follow the international ISDN (integrated system data network) numbering plan as following:

Country code (CC): 1 to 3 decimal digits of country codeNational destination code (NDC): typically 2 to 3 decimal digit,Subscriber number (SN): maximum 10 decimal digit.

In India a MSISDN number looks like 919845062050.In this number 91 is CC and 98 is NDC and 45062050 is the SN.

Page 74: Chapter 4: Telecommunication Systems

LocalizationInternational Mobile Subscriber Identity (IMSI):When registered with a GSM operator each subscriber is assigned a unique identifier.The IMSIO is stored in the SIM card and secured by the operator.A mobile station can only be operated when it has a valid IMSI.The IMSI consists of several parts.

Page 75: Chapter 4: Telecommunication Systems

LocalizationInternational Mobile Subscriber Identity (IMSI):These are:

3 decimal digits of mobile country code (MCC). For Indian MCC is 404.2 decimal digit of mobile network code (MNC). This uniquely identifies a mobile operator within a country. For Airtel in Delhi this code is 10.Maximum 10 decimal digits of mobile subscriber identification number (MSIN). This is a unique number of the subscriber within the home network.

Page 76: Chapter 4: Telecommunication Systems

LocalizationTemporary Mobile Subscriber Identity (TMSI):

This a temporary identifier assigned by a serving VLR.

It is used in place of the IMSI for identification and addressing of the mobile station.

TMSI is assigned during the presence of the mobile station in a VLR.

Thus, it is difficult to determine the identity of the subscriber by listening to the radio channel.

Page 77: Chapter 4: Telecommunication Systems

LocalizationTemporary Mobile Subscriber Identity (TMSI):

The TMSI is never stored in the HLR.

However, it is stored in the SIM card.

Together with the current location are, a TMSI allows a subscriber to be identify uniquely.

Page 78: Chapter 4: Telecommunication Systems

LocalizationMobile Station Roaming Number (MSRN):

When a subscriber is roaming in another network a temporary ISDN number is assigned to the subscriber.

This ISDN number is assigned by the local VLR in charge of the mobile station.

The MSRN has the same structure as the MSISDN.

Page 79: Chapter 4: Telecommunication Systems

CallingThere are different methods and protocols are used for establishing connection and maintaining communication in calling to and from mobile devices in a GSM network.

The various types of calls handled by a GSM network are:

Mobile originated call (MOC)

Mobile Terminated call (MTC)

Page 80: Chapter 4: Telecommunication Systems

Calling : Mobile originated call (MOC)

Initially when the user enters the called number and presses the send key.

The MS establishes a signaling connection to the BSS on a radio channel.

This may involve authentication and ciphering.

Once this has been established the call setup procedures will take place according to the sequence show in the next slide figure.

Page 81: Chapter 4: Telecommunication Systems

Calling: Mobile originated call (MOC)

PSTN GMSC

VLR

BSS

MSC

MS1

2

6 5

3 4

9

10

7 8

Page 82: Chapter 4: Telecommunication Systems

Calling : Mobile originated call (MOC)

The MS sends the dialed number indicating service requested to the MSC (via BSS).

The MSC checks from the VLR if the MS is allowed the requested service. If so, MSC asks the BSS to allocate necessary resource for the call.

If the call is allowed, the MSC routes the call to the GMSC (Gateway MSC).

The GMSC routes the call to the local exchange of called user via public switched telephone network (PSTN).

Page 83: Chapter 4: Telecommunication Systems

Calling : Mobile originated call (MOC)

The PSTN alert (applies ringing) the called terminal.

Answer back (ring back tone) from the called terminal to PSTN.

Answer back signal is routed back to the MS through the serving MSC which also completes the speech path to the MS.

Page 84: Chapter 4: Telecommunication Systems

Calling:Mobile Terminated call (MTC)

The sequence shown in next slide figure relates to a call originating in the PSTN and terminating at an MS in a GSM network.

The PSTN user dials the MSISDN of the called user in GSM.

Local route of PSTN the call to the GMSC of the called GSM user.

The GMSC uses the dialed MSISDN to determine the serving HLR for the GSM user and interrogates it to attain the required routing number.

Page 85: Chapter 4: Telecommunication Systems

Calling : Mobile Terminated call (MTC)

PSTNcallingstation

GMSC

HLR VLR

BSSBSSBSS

MSC

MS

1 2

3

4

5

6

7

8 9

10

11 12

1316

10 10

11 11 11

14 15

17

Page 86: Chapter 4: Telecommunication Systems

Calling:Mobile Terminated call (MTC)

The HLR requests the current serving VLR for the called MS for a MSRN (MS roaming number) so that the call can be routed to the correct MSC.The VLR passes the MSRN to the HLR.The HLR passes the MSRN to the GMSC.Using the MSRN the GMSC routes the call to the serving MSC.The MSC interrogates the VLR for the current location area identity (LAI) for the MS.The VLR provides the current location (LAI) for the MS.

Page 87: Chapter 4: Telecommunication Systems

Calling:Mobile Terminated call (MTC)

The MSC pages the MS via the appropriate BSS. The MS responds to the page and set up the necessary signaling links.

When the BSS has established the necessary radio links, the MSC is in formed and the call is delivered to the MS.

When the MS answers the call, the connection is completed to the calling PSTN user.

Page 88: Chapter 4: Telecommunication Systems

MTC/MOCBTSMS

paging request

channel request

immediate assignment

paging response

authentication request

authentication response

ciphering command

ciphering complete

setup

call confirmed

assignment command

assignment complete

alerting

connect

connect acknowledge

data/speech exchange

BTSMS

channel request

immediate assignment

service request

authentication request

authentication response

ciphering command

ciphering complete

setup

call confirmed

assignment command

assignment complete

alerting

connect

connect acknowledge

data/speech exchange

MTC MOC

Page 89: Chapter 4: Telecommunication Systems

HandoverCellular systems require handover procedures, as single cells do not cover the whole service area, but, e.g. only up to 35 km around each antenna.

The smaller the cell size and the faster the movement of a mobile station through the cells, the more handovers of ongoing calls are required.

However a handover should not cause a cut-off also called call drop.

Page 90: Chapter 4: Telecommunication Systems

HandoverThere are two basic reasons for a handover :

The mobile station moves out of the range of a BTS or a certain antenna of a BTS respectively. Thus, the received signal level becomes lower continuously until it falls underneath the minimal requirement for communication.

The wired infrastructure (MSC,BSC) may decide that the traffic in one cell is too high and shift some MS to other cells with a lower load. Thus handover may be due to load balancing.

Page 91: Chapter 4: Telecommunication Systems

HandoverIn the next slide figure shows four possible handover scenarios in GSM.

Intra-cell handover:

Within a cell, narrow-band interference could make transmission at a certain frequency impossible.

The BSC could then decide a change the carrier frequency (Scenario 1).

In short, handover of channels in the same cell.

Page 92: Chapter 4: Telecommunication Systems

4 types of handover

MSC MSC

BSC BSCBSC

BTS BTS BTSBTS

MS MS MS MS

12 3 4

Page 93: Chapter 4: Telecommunication Systems

HandoverInter-cell, intra-BSC handover:

This is a typical handover scenario.

This mobile station moves from one cell to another, but stays within the control of the same BSC.

The BSC then performs a handover, assigns a new radio channel in the new radio channel in the new cell and releases the old one (Scenario 2).

In short, handover of cells controlled by the same BSC.

Page 94: Chapter 4: Telecommunication Systems

HandoverInter-BSC, intra-MSC handover:

As a BSC only controls a limited number of cells, GSM also has to perform handovers between cells controlled by different BSCs.

This handover then has to be controlled by the MSC (scenario 3).

In short, handover of cells belonging to the same MSC but controlled by different BSCs.

Page 95: Chapter 4: Telecommunication Systems

HandoverInter MSC handover:

Finally, a handover could be required between two cells belonging to different MSCs.

Now both MSCs perform the handover together (Scenario 4).

In short, handover of cells controlled by different MSCs.

Page 96: Chapter 4: Telecommunication Systems

HandoverIn order to provide all information necessary for a handover due to a weak link, MS and BTS both perform periodic measurements of the downlink and uplink quality respectively.

The measurement reports are sent by the MS about every half-second and contain the quality of the current link used for transmission as well as the quality of certain channels in neighboring cells.

Page 97: Chapter 4: Telecommunication Systems

HandoverNext slide figure show the typical behavior of the received signal level while an MS moves away from one BTS (BTSold) closer to another one (BTSnew).

In this case the handover decision does not depend on the actual value of the received signal level, but on the average value.

Therefore, the BSC collects all values bit error rate and signal levels from uplink and downlink from BTS and MS and calculates average values.

Page 98: Chapter 4: Telecommunication Systems

Handover decision

receive levelBTSold

receive levelBTSold

MS MS

HO_MARGIN

BTSold BTSnew

Page 99: Chapter 4: Telecommunication Systems

HandoverThese values are then compared to thresholds, i.e.., the handover margin (HO_MARGIN), which includes some hysterics to avoid a ping-pong effect.

Still even with the HO_MARGIN, the ping-pong effect may occur in GSM- a value which is too high could cause a cut-off.

Page 100: Chapter 4: Telecommunication Systems

HandoverNext slide figure shows the typical signal flow during an inter-BSC, intra-MSC handover.

The MS sends its periodic measurements reports, the BTSold forwards these reports to the BSCold together with its own measurements.

based on these values and e.g., on current traffic conditions, the BSCold may decide to perform a handover and sends the message HO_required to the MSC.

Page 101: Chapter 4: Telecommunication Systems

Handover procedure

HO access

BTSold BSCnew

measurementresult

BSCold

Link establishment

MSCMSmeasurementreport

HO decision

HO required

BTSnew

HO request

resource allocation

ch. activation

ch. activation ackHO request ackHO commandHO commandHO command

HO completeHO completeclear commandclear command

clear complete clear complete

Page 102: Chapter 4: Telecommunication Systems

HandoverThe task of the MSC then comprises the request of the resources needed for the handover from the new BSC, BSCnew.

This BSCnew checks if enough resources are available and activates a physical channel at the BTSnew to prepare for the arrival of the MS.

The BTSnew acknowledges the successful channel activation, BSCnew acknowledges the handover request.

The MS now breaks its old radio link and accesses the new BTS.

Page 103: Chapter 4: Telecommunication Systems

HandoverThe next steps include the establishment of the link.

Basically, the MS has then finished the handover, but it is furthermore important to release the resources at the old BSC and BTS and to signal the successful handover using the handover and clear complete messages as show in figure.

Future handover scenarios would include seamless handover between different systems, e.g. from GSM to DECT (digital enhanced cordless telecommunication) or satellite-based services without interruption.

Page 104: Chapter 4: Telecommunication Systems

SecurityGSM offers several security services using confidential information stored in the AuC and in the individual SIM.

As stated above, the SIM stores personal, secret data and is protected with a PIN (Personal identity number) against unauthorized use.

Page 105: Chapter 4: Telecommunication Systems

SecurityThe security services offered by GSM are explained in the following:

Access control and authentication:

The first step includes the authentication of a valid user for the SIM.

The user needs a secret PIN to access the SIM.

The next step is the subscriber authentication.

Page 106: Chapter 4: Telecommunication Systems

SecurityConfidentiality:

All user-related data is encrypted.

After authentication, BTS and MS apply encryption to voice, data and signaling.

This confidentiality exists only between MS and BTS, but it does not exist end-to-end or within the whole fixed GSM/telephone network.

Page 107: Chapter 4: Telecommunication Systems

SecurityAnonymity:

To provide user anonymity, all data is encrypted before transmission, and user identifiers which would reveal an identity are not used over the air.

Instead, GSM transmits a temporary identifier (TMSI-temporary mobile subscriber identity), which is newly assigned by the VLR after each location update.

Additionally, the VLR can change the TMSI at any time.

Page 108: Chapter 4: Telecommunication Systems

Authentication

The operation and maintenance subsystem of the GSM network has an AuC for authenticating an MS.

The AuC first authenticates the subscriber MS and only then does the MSC provide the switching service.

Authentication algorithms like A3,A5,A8 use a random number sent by the AuC during the connection setup and an authentication key which is already saved in the SIM.

Authentication algorithms used can differ for different mobile service providers.

Page 109: Chapter 4: Telecommunication Systems

AuthenticationFor authentication, the VLR sends the random value RAND to the SIM.

Both sides, network and subscriber module, perform the same operation with RAND and the key ki, called A3.

The MS sends back the SRES generated by the SIM, the VLR can now compare both values.

If they are the same, the VLR accepts the subscriber, otherwise the subscriber is rejected.

In the next slide show figure for subscriber authentication.

Page 110: Chapter 4: Telecommunication Systems

GSM - authentication

A3

RANDKi

128 bit 128 bit

SRES* 32 bit

A3

RAND Ki

128 bit 128 bit

SRES 32 bit

SRES* =? SRES SRES

RAND

SRES32 bit

mobile network SIM

AC

MSC

SIM

Ki: individual subscriber authentication key SRES: signed response

Page 111: Chapter 4: Telecommunication Systems

EncryptionThe BTS and the MS have to perform ciphering before call initiation or before connecting for receiving a call.

The MS uses a cipher (encryption key) for encryption.

The cipher is a result of performing mathematical operation on: (A) the cipher key saved in the SIM, and (B) the cipher number received from the BTS when the call setup is initiated.

Page 112: Chapter 4: Telecommunication Systems

EncryptionThe BTS transmits the cipher number before a call is set up or transmitted.

The encryption algorithm is identical for all mobile service providers.

The random numbers used in authentication and ciphering processes are also known as challenge to the mobile station to generate the results of the algorithms and only if these results are correct, do the BTS and other units grant access to the challenged MS.

Page 113: Chapter 4: Telecommunication Systems

EncryptionAfter authentication, MS and BSS can start using encryption by applying the cipher key Kc.

Kc is generated using the individual key ki and a random value by applying the algorithm A8.

MS and BTS can now encrypt and decrypt data using the algorithm A5 and the cipher key Kc.

Page 114: Chapter 4: Telecommunication Systems

GSM - key generation and encryption

A8

RANDKi

128 bit 128 bit

Kc

64 bit

A8

RAND Ki

128 bit 128 bit

SRES

RAND

encrypteddata

mobile network (BTS) MS with SIM

AC

BSS

SIM

A5

Kc

64 bit

A5

MSdata data

cipherkey

Page 115: Chapter 4: Telecommunication Systems

New data servicesThe GSM system provides data rates of TCH/13.4, TCH/HS11.4, TCH/12.8, TCH/F14.4, TCH/F4.8, TCH/F9.6.

These rates are good for transmission of voice-data but too low for high-speed data transfer.

Speed enhancement is required for a GSM system to be able to provide data services such as transfer of large files and internet access.

Page 116: Chapter 4: Telecommunication Systems

New data servicesNew data services such as General packet radio service (GPRS) and high-speed circuit switched data (HSCSD) use different coding and multiplexing techniques to provide high transfer speeds to GSM users.

The three major approaches to enhance transmission speed are as follows:

Combining several slots in a packet-switched network. GPRS is an example this type of speed enhancement.

Page 117: Chapter 4: Telecommunication Systems

New data servicesCombining several slots in a circuit-switched network. For example, HSCSD is an improvement on GSM as it combines several time-slots for high-speed transmission of circuit-switched data.

Use of other technology such as digital enhanced cordless telecommunication system (DECT) which is used for short range communication.

Page 118: Chapter 4: Telecommunication Systems

HSCSDHigh-speed Circuit Switched Data (HSCSD) is an innovation to use multiple time slots at the same time.

HSCSD is a 2.5G, GSM phase 2 standard defined by the ETSI- European telecommunications standards institute.

It is an enhancement of circuit-switched data (CSD), which is the original data transmission mechanism in GSM system.

Page 119: Chapter 4: Telecommunication Systems

HSCSDLarge parts of GSM transmission capacity were used up by error correction codes in the original CSD transmission.

HSCSD, however, offers various levels of error correction that can be used in accordance with the quality of the radio link.

As a result, so where CSD could transmit at only 9.6 kbps, the HSCSD data rates go up to 14.4 kbps.

HSCSD can also use multiple time-slots at the same time.

Page 120: Chapter 4: Telecommunication Systems

HSCSDSeveral GSM traffic channels can join to transmit data at high speed.In transmission of normal voice-data traffic, HSCSD given smaller latency to data as compared to GPRS.HSCSD offers better quality of service than GPRS due to the dedicated circuit-switched communication channels.However, HSCSD is less bandwidth efficient than GPRS.

Page 121: Chapter 4: Telecommunication Systems

What is GPRS? In early 2000, only a small portion of GSM

subscribers used data services, because existing GSM systems do not support easy access, high data rate and attractive prices.

GSM operators must offer better services to simulate the demand.

The solution is the General Packet Radio Service (GPRS).

GPRS reuses the existing GSM infrastructure to provide end-to-end packet-switched services.

Page 122: Chapter 4: Telecommunication Systems

What is GPRS? Existing GSM networks use circuit-switched

technology to transfer information between users.

However, GPRS uses packet switching which means there is no dedicated circuit assigned to the GPRS mobile phone.

Once the data has been sent, the resource can be re-allocated to other users for more efficient use of the network.

Page 123: Chapter 4: Telecommunication Systems

What is GPRS? By allowing information to be delivered more

quickly and efficiently GPRS is relatively inexpensive mobile data service compared to Sort Message Services (SMS) and Circuit-Switched Data.

Page 124: Chapter 4: Telecommunication Systems

Key Features of GPRS GPRS have service and network features that make

it an attractive mobile data communication service. Some of the key services features are as follows:

Bandwidth on demand for point-to-point transmission.

Negotiated quality of services (QOS). Point-to-point and point-to-multipoint service. Multicast and group call services.

Page 125: Chapter 4: Telecommunication Systems

Key Features of GPRS Value added services like broadcast information

service (e.g. traffic report, stock prices) Design for easy internet access and Web-

Browsing

Page 126: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces

GPRS technology brings many changes to the existing GSM network.

Most of the changes are improvements made by adding new blocks rather than by modifying existing resources.

A simplified view of this new hybrid network shows the elements introduced by GPRS.

In the next slide figure show a GPRS architecture and different types of interfaces used in that.

Page 127: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces

MS BSS GGSNSGSN

MSC

Um

EIR

HLR/GR

VLR

PDN

Gb Gn Gi

SGSN

Gn

PCU

Page 128: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces

Gateway GPRS support node (GGSN): It is similar to the GSM gateway mobile

switching center (GMSC) and provides a gateway between the GPRS network and the public packet data network (PDN) or other GPRS networks.

The GGSN provides authentication and location management functions, connects to the home location register (HLR) by means of the Gc interface and counts the number of packets transmitted for accurate subscriber billing.

Page 129: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces

Serving GPRS support node (SGSN): It is like the GSM mobile switching center and

visitor location register (MSC/VLR), controls the connection between the network and the mobile station (MS).

The SGSN provides session management and GPRS mobility management functions such as handovers and paging.

It attaches to the HLR via the Gr.

Page 130: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces

Packet Control Unit (PCU): Which include converting packet data into a

format that can be transferred over the air interface, managing radio resources and implementing quality of Service (QoS) measurements.

The signaling links between the GPRS nodes is defined by the GPRS specifications.

Page 131: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces

New physical interfaces include the Gb interface, which connects the SGSN to the PCU and is usually located in the base station subsystem (BSS).

The Gn interface which connects the GGSN and SGSN, and Gc, Gr and Gs interfaces, which carry SS7 base protocols.

Page 132: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces: GPRS mobile phone operation states

Mobile phones go through different states of communication.

For example, when a GSM phone comes onto a network, the phone enters an idle state in which it uses very few network resources.

When the user makes a call request or receives a call, however, the phone goes into the dedicated state in which it is assigned a continuous resource until the connection is terminated.

Page 133: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces: GPRS mobile phone operation states

GPRS mobile phones will also have defined states, which are described bellow:

GPRS Idle: it is the state in which the mobile phone comes onto the GSM network.

The phone receives circuit switched paging and behaves as a GSM phone.

Although it does not interact with the GPRS network in this state, it still possesses GPRS functionality.

Page 134: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces: GPRS mobile phone operation states

GPRS Ready: it is the state achieved when the GPRS mobile attached itself to the network.

In this state the mobile phone can activate a packet data protocol (PDP) context, which allows the phone to establish a packet transfer session with external data networks to transmit and receive data packets.

Once a PDP context is activated resource block are assigned to the session until data transfer causes for a specified period and the mobile phone moves into the standby state.

Page 135: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces: GPRS mobile phone operation states

GPRS Standby: it is a state in which the mobile is state in which the mobile is connected to the GPRS network, but no data transmission occurs.

If a data packet for the mobile arrives, the network will page the mobile, which in turn activates a PDP context session to the bring the mobile back to the ready state.

Page 136: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces: GPRS/GSM Mobile Classes

European telecommunications standards institute (ETSI) define three different classes of mobiles for the hybrid GPRS/GSM network:

Class A : Class A mobiles can attach to the GPRS and

GSM network simultaneously. They can receive GSM voice/data/SMS calls

and GPRS data calls.

Page 137: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces: GPRS/GSM Mobile Classes

For this to happen the mobiles must monitor both the GSM and GPRS networks for incoming calls.

Class A mobiles also can make and receive GPRS and GSM call simultaneously.

Operational requirements of this class include an additional receiver in the mobile phone for neighbor cell measurements.

Page 138: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces: GPRS/GSM Mobile Classes

Class B: This class is similar to class A with the

exception that class B mobile phones will not support simultaneous traffic.

If a GPRS call is ON, the phone cannot receive GSM calls and vice versa.

Page 139: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces: GPRS/GSM Mobile Classes

Class C: This class of mobile phones will have both GSM

and GPRS functionality but will attach to only one network at a time.

Thus, if the phone is attached to the GPRS network, it will be remove form the GSM network and will not be able to make or receive GSM calls.

Conversely, if it is attached to the GSM network, it will not be able to make or receive GPRS calls.

Today most manufacturers are building Class B phones.

Page 140: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces: The GPRS Attach Procedure

A GPRS attach is a GPRS mobility management (GMM) process that is always initiated by the mobile phone.

Depending on the settings of the mobile phone, the GPRS attach may be performed every time the phone is powered on or it may be initiated manually by the user.

This request for a GPRS attach is made to the SGSN in a process that is transparent to the BSS.

Page 141: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces: The GPRS Attach Procedure

First the mobile notifies the SGSN of its identity as an International Mobile subscriber Identity (IMSI) or packet temporary mobile subscriber identity (P-TMSI).

Then it sends its old routing area identification (RAI), class mark, and desired attach type.

The latter indicates to the SGSN whether the mobile wants to attach as a GPRS device, a GSM device, or both.

The SGSN will attach the mobile and inform the HLR if there has been a change in the RAI.

Page 142: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces: The GPRS Attach Procedure

If the desired attach type is both GPRS and GSM, the SGSN will also update the location with the VLR, provided that the Gs interface exists.

For this to occur, the mobile has a activate a communication session using PDP context.

Page 143: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces: PDP Context Activation

Packet Data Protocol context activates a packet communication session with the SGSN.

During the activation procedure, the mobile phone either provide a static IP address or requests a temporary one from the network.

It also specifies the access point name (APN) with which, it wants to communicate- for example, an Inter net address or an Internet service provider.

Page 144: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces: PDP Context Activation

The mobile request a desired quality of service (QoS) and a network service access point identifier (NSAPI).

Because a GPRS mobile can establish multiple PDP context session for different application, the NSAPI is used to identity the data packets for a specific application.

Upon receiving information from the mobile, the SGSN determines which GGSN is connected to the APN and forwards the request.

The SGSN also provides a negotiated QoS based on the user’s subscription information and the availability of services.

Page 145: Chapter 4: Telecommunication Systems

GPRS architecture and interfaces: PDP Context Activation

If the mobile phone has a static IP address, the GGSN directly connects the mobile to the desired access point.

Otherwise, it obtains a temporary IP address from the APN.

The GGSN also provides some transaction identifiers for data communication between GGSN and SGSN.

Once the communication and activation procedure at the GGSN is successful, the appropriate data transfer information is forwarded to the mobile.

Page 146: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture The GPRS data and signaling transmission

plane consists of standard protocols such as IP and some new, GPRS-specific protocols.

There are different types of protocols under Gn, Gb, Um interfaces.

Next slide figure show a GPRS transmission plane protocol reference model.

Page 147: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture

apps.

IP/X.25

LLC

GTP

MAC

radio

MAC

radioFR

RLC BSSGP

IP/X.25

FR

Um Gb Gn

L1/L2 L1/L2

MS BSS SGSN GGSN

UDP/TCP

Gi

SNDCP

RLC BSSGP IP IP

LLC UDP/TCP

SNDCP GTP

Page 148: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Gn interface Protocols

GPRS tunneling Protocols (GTP): GTP receives IP datagram packets from the external

network and tunnels them across the GPRS support nodes.

Because there will be multiple GGSN and SGSN interfaces, the GTP provides for every packet a tunnel identifier (TID) that identifies the destination and transaction to which the packet/datagram belongs.

Transactions are identified using logical identifiers as well as the International Mobile subscriber Identity (IMSI).

Page 149: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Gn interface Protocols

TCP/UDP: It is consists of the transmission control

protocol (TCP), which is used to transfer PDUs (protocol data units) across the Gn interface with reliability.

The user datagram protocol (UDP) is used across the Gn interface to carry the GTP-PDUs for all signaling information and user data that do not require reliability.

Page 150: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Gn interface Protocols

Internet protocol (IP): It is used to route user data and signaling

information across the Gn interface. The IP datagram size will be limited to the

physical layer-maximum transmission unit (MTU) capabilities.

An IP datagram can be as large as 65,535 octets, but if the physical layer MTU is less than this, fragmentation must be done.

Page 151: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Gn interface Protocols

The source gateway support node (GGSN or SGSN) has to first decide the MTU size and then carry out the fragmentation.

The IP addressing used will route the data across the Gn interface, including any intermediate GSNs (Gateway support nodes), to the GSN address at the final destination.

Page 152: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Gb interface Protocols

Sub network dependent Convergence protocol (SNDCP):

It is used between the SGSN and the mobile phone.

This protocol converts the network layer PDUs on the Gn interface into a format suitable for the underlying GPRS network architecture.

Page 153: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Gb interface Protocols

SNDCP performs a number of functions: Multiplexing of N-PDUs from one or several

network layer entities onto the appropriate LLC (Logical link control) connection.

Buffering of N-PDUs from the acknowledged service.

Compression and decompression of the protocol information and user data

Negotiation of the control parameters between SNDCP entities.

Page 154: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Gb interface Protocols

Logical link control (LLC): This protocols provides a highly reliable,

ciphered logical link between the SGSN and the mobile phone.

The LLC uses both acknowledged and unacknowledged modes of frame transmission depending buffering and information length based on the negotiated QoS delay class.

Page 155: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Gb interface Protocols

Base station system GPRS protocol (BSSGP): It routes information between the SGSN and the

BSS. This protocol conveys QoS information but

does not carry out any form of error correction. Its primary function is to provide radio-related

information for use by the radio link control (RLC) and medium access control (MAC) function on the air interface.

Page 156: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Gb interface Protocols

The LLC layer uses the services of the BSSGP from transfer.

The relay function at the BSS transfers LLC frames between the RLC/MAC layer and the BSSGP layer.

The BSSGP sends information to the network services layers to determine the transfer destination:

BSSGP virtual connection identifier (BVCI): it is sent to the network services layer for routing

signaling and data information to the correct peer function entities.

Each BVCI between two peer entities is unique.

Page 157: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Gb interface Protocols

Link selection parameter (LSP): It is used in conjunction with the BVCI to aid

in selecting a physical link for the load-sharing process.

Network service entity identifier (NSEI): Used at the BSS and the SGSN provides the

network management functionality required for operation of the Gb interface.

The NSEI together with the BVCI uniquely identifies a BSSGP virtual connection.

Page 158: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Gb interface Protocols

Network Service (NS): This layer uses frame relay across the Gb

interface and could be a point-to-point connection between the SGSN and the BSS or a frame relay network.

The NS layer uses a DLCI (data link connection identifier) look-up table to indicate the routing path between the SGSN and the BSS.

Page 159: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Gb interface Protocols

The initial value of the DLCI field is derived from the BVCI, NSEI and LSP supplied by the BSSGP layer.

This value changes as the frame passes through the frame relay network and reaches its final destination.

Page 160: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Um interface Protocols

Radio link control (RLC): It is responsible for a number of functions:

Transferring LLC-PDUs between the LLC layer and the MAC function

Segmentation of LLC-PDUs into RLC data blocks and re-assembly of RLC data blocks to fit into TDMA frame blocks

Segmentation and re-assembly of RLC/MAC control messages into RLC/MAC control block

Page 161: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Um interface Protocols

Backward error correction for selective transmission of RLC data blocks.

The RLC segmentation function is a process of taking one or more LLC-PDUs and dividing them into smaller RLC blocks.

The LLC-PDUs are known collectively as a temporary block flow (TBF) and are allocated the resources of one or more packet data channels (PDCH).

Page 162: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Um interface Protocols

The TBF is temporary and is maintained only for the duration of data transfer.

Each TBF is assigned a temporary flow identity (TFI) by the network.

The RLC data blocks consist of an RLC header, an RLC data unit and spare bits.

The RLC data block along with a MAC header may be encoded using one of four defined coding schemes.

The coding scheme is critical in deciding the segmentation process.

Page 163: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Um interface Protocols

Medium access control (MAC): It controls the access signaling across the air

interface, including the management of shared transmission resources.

MAC achieves these functionalities by placing a header in front of the RLC header in the RLC/MAC data and control blocks.

The MAC header contains several elements some of which are direction-specific referring to the downlink or uplink.

Page 164: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Um interface Protocols

The key parameters of MAC header are: Uplink status flag (USF) is sent in all downlink

RLC/MAC blocks and indicates owner or use of the next uplink radio block on the same timeslot.

Relative reserved block period (RRBP) identifiers a single uplink block in which the mobile phone will transmit control information.

Page 165: Chapter 4: Telecommunication Systems

GPRS protocol layer architecture :Um interface Protocols

Payload type (PT) the type of data contained in the remainder of the RLC/MAC block.

Countdown value (CV) is sent by the mobile to allow the network to calculate the number of RLC data blocks remaining in the current uplink TBF.