Sei sulla pagina 1di 17

1.

GPMS Yr 2009
GPMS is an initiative under Project SHIKHAR
Performance Management System (PMS) is not only a HR tool but it is a
management tool for translating expectations of top management into tangible results.
The GPMS is an initiative under Project SHIKHAR of BSNL with the intent to have an
objective and transparent system for assessing performance of employees.
KPI Key Performance Indicators
BBSCBalanced Business Score Card Yr 2006
The GPMS scorecards for all the group types have been designed to consist of Key
Performance Indicators (KPIs) to measure the groups performance on financial,
customer / market and operational parameters
Every scorecard has a parameter to measure customer satisfaction
KRA Key Responsibility Area
GPMS is considered suitable for implementation in BSNL as:It is based on new organization structure of BSNL.
KRA/KPIs are identified and defined on the basis of new Business Unit structureof BSNL, in consultation
with top executives of the respective Business Units.
Number of KPIs have been kept lessor Minimum to have focused measurement of
KeyPerformance Areas.
It is an optimum combination of quantitative and qualitative measurement.
KPIs are defined as per functional activities of a group.
For implementation of GPMS in BSNL, all executives have been structured along 19 groups
Groupings in GPMS of BSNL Category of Groups - 4
1.Corporate Office 7 Groups, Group Type - 7
2.Territorial Circle- 26 Groups, Group Type - 1
3.Non- Territorial Circle 21 Groups, Group Type - 10
4.SSA 330 Groups, Group Type - 1
Total Groups 384, Group Type - 19
GPMS nodal designates in 7 groups
The correct approach of creating the GPMS is in a sequence that flows from top.(Corporate Office)
The total score against a KPIwould be calculated after multiplying the weightage of all parameter with
its performance score

final score will be sum total of scores for all parameters


Awards under FPMS is Swarna, RajatPadak, Kansyapadakin CMQtrly within Circle

Performance Levels Fair, Good and Excellant - 50, 75, 100, Score 60, 80, 100
Marks achieved for rating below Fair = 0.
Achievement between Fair and Good and between Good and Excellent would be linearly scaled
linear scaling= Score = Score (Lower) + 20 x { T (Achieved) T (Lower) }
T (Upper) T (Lower)
Where:
T (Achieved) = Achieved target
T (Lower) = Target Lower than the achieved target i.e. Fair or Good
T (Upper) = Target higher than the achieved target i.e. Good or Excellent
Score (lower) = The score for target slab lower than achieved target i.e. 60 or 80
The BBSCbalanced scorecard is a management system (not only a measurement system)
The BBSCbalanced scorecard suggests that we view the organization from four perspectives

e Customer Perspective
tive
learning and growth constitute the essential foundation for success of any knowledge-worker
organization
KSA Knowledge, Skill, Abilities

1- GSM 2G
GSM
BW

Uplink Freq.
Downlink
25 MHz

890-915 MHz
935-960 MHz

Modulation:
ASK, FSK- also Binary FSK-BFSK, PSK-Used for decode BFSK, CPFSK-Continuous Phase FSK
MSKMINIMUM SHIFT KEYING is a special form of binary CPFSK.
Two level FSK modulation, where transmission bit rate R is exactly four times the frequency shift
(between 1s and 0s) is called Minimum Shift Keying MSK
In BPSK each of the two phases convey an information equivalent to a single bit only
In QPSK each of the four phases of carrier representtwo bits of data
offset QPSK OQPSK
Gaussian MSK or GMSK
In GSM a B.T product of 0.3 is used with a channel data rate of 270.8 Kb/s
The most popular digital modulation schemes employed in cellular radio systems are four level phase
shift keying (QPSK) and its variants such as GMSK and / 4 shifted QPSK (OQPSK)
A group of cells is called a cluster.
No frequencies are reused in a cluster
Cells using the same channel set are called co-channel cells.
A PLMN is identified by the Mobile Country Code (MCC) and the Mobile Network Code (MNC)
PLMN - Public land mobile network
The distance between cells using the same channel set is always the same
valid cluster sizes that allow this are: 1, 3, 4, 7, 9 and 12.
K-Channel Reuse Factor If K increases, then performance increases
If K increases, then call capacity decreases per cell
VAD - Voice Activity Detection
Base Station Identification code (BSIC)

Mobile Subscriber ISDN Number (MSISDN)


international mobile subscribe identity (IMSI)is the primary function of the subscriber within
the mobile network and is permanently assigned to him
The GSM system can also assign a Temporary Mobile Subscriber Identity (TMSI) to identity a mobile
Transcoder/Rate Adapter Unit (TRAU)
The interface between BSC and BTS is designed as an A-bis interface
interface between the MSC and the BSS is a standardized SS7 interface (A-interface)
In the authentication procedure, the key Ki is never transmitted to the mobile over the air path, only a
random number is sent. In order to gain access to the system, the mobile must provide the correct
Signed Response (SRES) in answer to a random number (RAND) generated by AUC.
EIR- EQUIPMENT IDENTIFY REGISTER
THE STANDARD EC ECHO CANCELER CANCELS ABOUT 70 MS OF DELAY
Slow Associated Control Channel (SACCH)

Traffic channels (TCH)


Broadcast channels (BCH)
The Broadcast Control Channel (BCCH), The Synchronization Channel (SCH), The Frequency-Correction
Channel (FCCH),
Common Control Channels (CCCH)
The Paging Channel (PCH). It is used to alert the mobile station of an incoming cal
The Random Access Channel (RACH), which is used by the mobile station to request access to
the network
The Access Grant Channel (AGCH). It is used, by the base station, to inform the mobile station
about which channel it should use. This channel is the answer of a base station to a RACH from
the mobile station
Dedicated Control Channels (DCCH)
The Standalone Dedicated Control Channel (SDCCH), which is used in order to exchange signaling
information in the downlink and uplink directions
The Slow Associated Control Channel (SACCH). It is used for channel maintenance and channel control
Associated Control Channels
The Fast Associated Control Channels (FACCH) - urgent signaling information
The FACCH channels carry the same information as the SDCCH channels.
The interleaver for control channels is called a block rectangular interleaver
the interleaving depth of the GSM interleaving for control channels is four and a new data block starts
every four bursts.
The interleaving depth of the GSM interleaving for speech channels is then eight.
A new data block also starts every four bursts.
The interleaver for speech channels is called a block diagonal interleaver.
Interleaving for the GSM data TCH channels
A particular interleaving scheme, with an interleaving depth equal to 22
a ciphering key is computed using the algorithm A8 stored on the SIM card, the subscriber key and a
random number delivered by the network
DISCONTINUOUS TRANSMISSION (DTX)
The Voice Activity Detection (VAD
An equalizer is in charge of extracting the right signal from the received signal
SMS 160 Chars, SMS ( up-to 140 bytes)
SMS-CB(Cell Broadcast) 93 Chars
called mobile is busy (CFB)- Call Forw on Busy
CF on unreachable (CFNRc)
CF on no reply (CFNRy)
Call forwarding unconditionally (CFU)
Barring of All Outgoing Calls, BAOC (E1).
Barring of Outgoing International Calls, BOIC (E1).
Barring of Outgoing International Calls except those directed toward the Home PLMN Country, BOICexHC (E1).
Barring of All Incoming Calls, BAIC (E1)
Barring of incoming calls when roaming (A).
Call Waiting, CW (E2)
Advice of Charge, AoC (E2)
Multiparty service (E2) Possibility of establishing a multiparty conversation.
Closed User Group, CUG (A).

Calling Line Identification Presentation, CLIP (A).


Calling Line Identification Restriction, CLIR (A)
Connected Line identification Presentation, CoLP (A).
Connected Line identification Restriction, CoLR (A).
USSD:Unstructured service supplementary data
7 times faster than conventional SMS !
A message of a maximum of 182 characters
USSD has a dialogue concept but no store & forward
Benefits of USSD:No clogging inbox since there is no storing mechanism
Activation Code *456*xx#
GSM Protocols
interface control information (ICI)
Service Access Points (SAP
In GSM, three types of layer 2 protocol are used LAPDM (link access protocol for signaling channel) on
the air interface, LAPD on A-bis interface, and the MTP-2 (message transfer part-CCITT recommended
On the DCCH both unacknowledged and acknowledged operations are used
whereas on the CCCHs only unacknowledged operation is applied
DCCHs (SDCCH, SACCH and FACCH)
CCCHs (BCCH, PCH and AGCH)
The main distinction between LAPD and LAPDm is the absence of address and control fields. Thus, the
protocol is only used for the unacknowledged mode of operation, which applies to BCCHs and CCCHs
only.
Both FCCH and SCH under BCCH do not require unacknowledged.
No acknowledgement is needed for PCH and AGCH.
The LAPD frame is used internal to BSS, namely, between BTS and BSC.
MTP 1 & MTP 2 are used for msg transfer
MTP 3 is used for msg transfer and O & M
SCCP messages can be either be connection oriented or connectionless.
This is contrary to MTP, which only use the connections service.
The channel request message on RACH consists of eight bits
among those eight bits, five are randomly allocated by the MS and serve as discrimination between
potentially colliding random accesses.
The three remaining bits define the kind of channel required
BSSAP is divided into two functions Direct Transfer Application Part (DTAP) and BSSMAP.
A DTAP message also contains a data Link Connection Identification (DLIC).
in the OSI model MAP resides above the TCAP protocol.
MAP only uses the connectionless class of SCCP protocol.
The protocol is designed to interact with MSC, VLR / HLR, AUC, and GMSC so that they can communicate
with each other.
MAP contains a number of functional blocks known an Application System Element (ASE),
In 26 frame traffic multi-frame 13th frame (frame no .12) is used for SACCH.SACCH is used only for nonurgent procedures.
FACCH (Fast Associated Control Channel).-is required during conversation phase
operator determined barring (ODB)
while waiting for paging response, a defensive timer called, Early ACM timer is run at MSC to avoid
network timeouts

The SMS could be either in broadcast mode (via CBCH channel) or in a point-to-point mode (via either
SDCCH channel if mobile is in idle state, or SACCH if the mobile is in dedicated mode).
Authentication Triplets.
At network side, authentication procedure requires authentication triplets. Authentication triplet
consists of:
Random number RAND (128 bits)
Signed response SRES (32 bits)
Ciphering key Kc (64 bits).
Fn 22 bit + Kc 64 bit = Encryption code 114 bit o/p of A5
While initiating authentication procedure, if network has no authentication triplet or all triplets have
been used, it requests AuC for the same.
The index of currently used triplet is known as CKSN. (Ciphering key sequence number).
IMSI Detach procedure.purpose of this procedure is to indicate the network that MS has switched off.
Different MM connections are identified by different protocol discriminator (PD) and transaction
identifier (TI) value
MIN
Customised Applications for Mobile networks Enhanced Logic,-- CAMEL
IN service switching functionality (SSF)
CAMEL Service Switching Functionality (gsmSSF)
all communication between SSF and SCF will be done through Intelligent Network Application Protocol
(INAP).
All communication between gsmSSF and gsmSCF is done through CAMEL Application Part (CAP) protocol
The SGSN supports both dynamic routing and static routing
SGSN supports IPsec in tunnel or transport mode or GRE tunnels
The SGSN supports Dual Access, that is, simultaneous GSM and WCDMA Systems radio access within
one SGSN. CS and PS services can be used either simultaneously or one at the time
Gn interface
Connects GPRS Support Nodes (GSNs) within the same Public Land Mobile
Network (PLMN) over a GPRS backbone network.
Gp interface

Connects the SGSN to GGSNs and SGSNs located in other PLMNs.

Gom interface

Connects Operation & Maintenance (O&M) equipment to the SGSN, making it


possible for an operator to communicate with the SGSN. In addition, it can be used
to connect the SGSN with billing systems and service nodes residing within its own
PLMN. The Gom interface is an Ericsson product. It is not defined in the Third
Generation Partnership Project (3GPP) standards, but is based on standard
Internet Engineering Task Force (IETF) protocols.

Gb interface

Connects the SGSN to Base Station Controllers (BSCs) in the GSM for payload
transport and signaling. Traffic over the Gb interface can also be transported over
Frame Relay, .

Iu-U interface

Designates the Iu user plane, connects the SGSN to Radio Network Controllers
(RNCs) in the WCDMA Radio Access Network (RAN) for payload transport.

Iu-C interface

Designates the Iu control plane, connects the SGSN to RNCs in the WCDMA RAN

for signaling. Signaling over the Iu-C interface can also be transported over
broadband SS7, .
Gr interface

Connects the SGSN to the Home Location Registers (HLRs). Signaling over the Gr
interface can also be transported over broadband and narrowband SS7,

Gs interface

Connects the SGSN to the Mobile Services Switching Center, Visitor Location
Register (MSC/VLR). Signaling over the Gs interface can also be transported over
broadband and narrowband SS7,

Gd interface

Connects the SGSN to both the Short Message Service Gateway Mobile services
Switching Center (SMS-GMSC) and the Short Message Service Interworking Mobile
services Switching Center (SMS-IWMSC). Signaling over the Gd interface can also
be transported over broadband and narrowband SS7, .

Ge interface

Connects the SGSN to the Service Control Point (SCP) with Customized
Applications for Mobile Network Enhanced Logic (CAMEL). Signaling over the Ge
interface can also be transported over broadband and narrowband SS7, .

Gf interface

Connects the SGSN to the Equipment Identity Register (EIR). Signaling over the Gf
interface can also be transported over broadband and narrowband SS7, .

Lg interface

Connects the SGSN to the Gateway Mobile Location Centre (GMLC), providing MS
location information from the PLMN. Signaling over the Lg interface can also be
transported over broadband and narrowband SS7, .

Access Dial-In UserService (RADIUS) servers


The GGSN R5 product is based on the Juniper M20 Router
GGSN provides an interface between the SGSN (towards the MSs) and Packet Data Networks(PDNs),
ServiceAwareChargingandControl(SACC)
MSC gets all data required for call request processing from three databases, VLR, HLR and AUC.
Visitor Location Register (VLR) is a dynamic user database
Home Location Register (HLR) is a static database
OMC-S is responsible for the maintenance on the MSS side (swg)
while OMC-R is responsible for the maintenance on the BSS side.(Radio)
wireless intelligent network (WIN)
transfer bills to the billing center through the FTAM protocol
ZXC10-MSC/VLR provides a variety of configuration methods, and can meet the requirements of up to
600, 000 subscribers.
Um
MS to BTS
Abis
BTS to BSC
A
BSC to MSC/SSP
B
MSC/SSP to VLR
C
MSC/SSP to HLR
D
VLR to HLR
E
MSC/SSP to MSC

Ai
N
M
Q

MSC/SSP to PSTN
HLR to AUC
or
MC to MC
MSC/SSP to MC

HLR to MC

A3
Authentication Algorithm
A5
Ciphering Algorithm
A8
Kc Generation Algorithm
LAI
Location Area Identity
LAI = MCC+MNC+LAC (LAC < FFFF)
21 = 3 +2 + 16 Bits
1 Burst =
0.577 ms
1 TDMA Frame =
8 * 0.577 = 4.616
1 Burst (No. Of Bits) = 156.25 Bits
FCCH Burst
=
142 Fixed bits + (3+3) Tail bits + 8.25 GP
Normal Burst =
57+57 Infn Bits + 26 Training Seq + (3+3) Tail Bits + (1+1) Flag
Maximum of 65536 LA can be defined in one GSM PLMN
FCCH prsent in time slot T0 and fixed pattern of 142 bits of 0s
After tuning to FCCH the MS synchronises in time with SCH
The occurrence of SCH is 8 Burst period later than FCCH
After Sync the MS will read TDMA Frame No. and BSIC (Base Station Identity Code)
BSIC (6 Bits) = PLMN Color Code (3 Bits) + BS Color Code (3 Bits)
MS measures the signal strength of BCCH Signal atleast once every 6Sec (Super Frame Duration)
MS stores atleast 6 strogest BCCH and their cell identification in SIM
What is an Erlang
One Erlang is defined as the amount of traffic intensity carrier by a channel that is completely occupied
Therefore,
1 Erlang = 1 call with a duration of 1 hour over a channel every hour
= 2 calls with a duration of 0.5 hours over the channel every hour
= 30 calls with a duration of 4 minutes over the channel every 2 hours (120 minutes)
A channel that carries 2 calls of duration 5 minutes each per hour carries (2*5 min/60 min = 1/6 Erlangs)
Grade of Service (GOS)
The grade of service (GOS) is related to the ability of a mobile phone to access the trunked mobile
phone system during the busiest hour.
To meet a specific GOS, the maximum required capacity of the system must be estimated and
the proper number of channels must be allocated for the system
GOS is a measure of the congestion of the system which is specified as the probability of a call
being blocked (Erlang B system) or the probability of a call being delayed beyond a certain
amount of time (Erlang C system).
System Capacity = C=k.MN
K Group of channels allotted for each cell and k<s
M Cluster N is replicated M times
N Cluster Size
s - No. Of Duplex Channels available
s = kN
hence Cellular Capacity C = Ms
Freq. Reuse Factor,

f = 1/N

The time period for which a particular call is maintained/sustained in a cellular region is known as
Dwell Time.
In umbrella pattern , cells having low traffic is called micro cell and cells having more traffic is called
macro cell
CCI Co Channel Interferrance
ACI Adjacent Channel Interferrance
Directional Antennas Cell sectoring
120 Degree 3 sectors , 60 Degree 6 sectors in hexagonal cells
ARFCN Absolute RF carrier Number (1 and 124 th are not used in GSM)
Practicall only 122 chls available
ARFCN(n) =
Freq. Uplink (n)
= 890.2+0.2*(n-1) MHz
Freq. Downlink (n)
= 935.2+0.2*(n-1) MHz
Speech sampled every 20 ms at a bit rate of 260 bits/sec
Channel coding converts the 260 bits/s to 456 b/s coded signal
Interleaving sends the 456 bits int 8 blocks of 57 bit each in every burst

As long as the ratio


Frequency reuse distance =D
Cell radius

Is greater than some specified value, the ratio


Received radio carrier power
=
Received interferer radio carrier power

C
I

Will be greater than some given amount for smallas well as large cell sizes when all signals are
transmitted at the same power level.
The frequency reuse distance is also known as separation distance. is also known as the signal-to-noise
ratio.
The ratio D/R needs to be large enough in order for the base station to be able to cope with the
interference

RACH (Random Access CHannel)


The RACH is used in the uplink direction by the mobile stations for requesting a channel for a
connection. It is an access channel that uses theslotted Aloha access scheme.
FACCH (Fast Associated Control CHannel)
The FACCH is used as a main signaling link for the transmission of signaling data (for example
handover commands). It is also required for every call set-up and release. During the call the
FACCH data is transmitted over the allocated TCH instead of traffic data; this is marked by a flag
called a stealing flag. The process of stealing a TCH for FACCH data is called pre-emption.
The net SDCCH bit rate is about 0.8 kbit/s.
For normal service, the mobile station has to camp on a suitable call, tune to that cells control channel.
The choice of such a suitable cell for the purpose of normal service is referred to as normal camping
The CCCH is a channel that carries both the PCH and the AGCH on the downlink, and the RACH on the
uplink.
The interleaver for control channels is called a block rectangular interleaver. The interleaving
depth of the GSM interleaving for control channels is four.
The interleaver for speech channels is called a block diagonal interleaver. The interleaving depth
of the GSM interleaving for speech channels is then eight.
Interleaving for the GSM data TCH channels, The data blocks are said to be interleaved
diagonally , with an interleaving depth equal to 22.
DISCONTINUOUS RECEPTIONis a method used to conserve the mobile station's power
Speech 8 Kz sampling rate and 13 bits per sample hence 104 kb/s bit rate or 2080 bits per block
of 20 ms is sent to voice coder.
Voice coder RPE-LTP compresses the 2080 bits to 260 bits per 20 ms or 13 kb/s
After chl coding 260b becomes 456 bits
The IMEI
consists of 15 digits (60 bits). There is a 6 digit type approval code TAC, a 2 digit Final
Assembly Code FAC, 6 digit serial number SNR and a 4 bit space SP
The Personal Identification Number PIN
- The Pin Unblocking Key PUK
- The SIM-Service Table
The Abis interface between BTS and BSC is typical ISDN. It is built by a PCM 30-interface,
i.e. there are 30 channels with a speed of 64 kbit/sec. A full rate GSM data channel is
compressed to16 kbit/sec. Thus 4 GSM channels fit into a 64 kbit/sec ISDN-channel. Layer 1and
Layer 2 are the same as in ISDN-channels.
MTP1 is known as the Signalling Data Link (Bit Layer).
MTP2 defines the principle frame structure known from the Link Access Protocol used in the
ISDN D-Channel (LAPD).
We will deal only with MTP3 which describes the signalling message handling dependent onthe
served user (e.g. ISDN =>ISDN Served User Part ISUP).
A field strength of less than around -102 dB is unusable for aGSM-connection

GPRS & EDGE


Channel Bandwidth

200 kHz

Modulation type

GMSK

Data handling

Packet data

Max data rate


172 kbps
The main new network architecture entities that are needed are:
SGSN: GPRS Support Node - this forms a gateway to the services within the network.
GGSN: Gateway GPRS Support Node which forms the gateway to the outside world.
PCU: Packet Control Unit which differentiates whether data is to be routed to the packet
switched or circuit switched networks.
There are a total of 29 speed classes.
Class one mobiles are able to send and receive in one slot in either direction, i.e. uplink and
downlink, and
class 29 mobiles are able to send and receive in all eight slots. The classes within these two
limits are able to support sending and receiving in different combinations of uplink and downlink
slots.
The GPRS slot may also be used by the base station to judge the time delay using a logical
channel known as the Packet Timing Advance Control Channel (PTCCT).
Coding Scheme (4 Nos)
CODING SCHEME
CS-1
CS-2
CS-3
CS-4
Date rate per slot
(kbps)

9.05

13.4

15.6

21.4

Max data rate with 8 slots


72.4
107.2
124.8
171.2
(kbps)
Three layers,
Layer 1 (Physical Layer) - Radio Link Control (RLC) and the Medium Access Control (MAC) layers
There is also the Logical Link Layer (LLC) that formats the data frames and is used to link the elements of
the core network to the mobile
Channels
GPRS uses only one physical channel (PDCH) for the sending of data
There are three MAC modes that are used to control the transmissions. These are named fixed
allocation, dynamic allocation, and extended dynamic allocation.
The fixed allocation mode is required when a mobile requires a data to be sent at a consistent data rate.
To achieve this, a set of PDCHs are allocated for a given amount of time. When this mode is used there is
no requirement to monitor for availability, and the mobile can send and receive data freely. This mode is
used for applications such as video conferencing.
When using the dynamic allocation mode, the network allocates time slots as they are required. A
mobile is allowed to transmit in the uplink when it sees an identifier flag known as the Uplink Status Flag
(USF) that matches its own. The mobile then transmits its data in the allocated slot. This is required
because up to eight mobiles can have potential access to a slot, but obviously only one can transmit at
any given time.
A further form of allocation known as extended dynamic allocation is also available. Use of this mode
allows much higher data rates to be achieved because it enables mobiles to transmit in more than one
slot. When the USF indicates that a mobile can use this mode, it can transmit in the number allowed,
thereby increasing the rate at which it can send data.

Logical channels
Broadcast channels:
Packet Broadcast Central Channel (PBCCH): This is a downlink only channel that is used to
broadcast information to mobiles and informs them of incoming calls etc. It is very similar in
operation to the BCCH used for GSM. In fact the BCCH is still required in the initial to provide a
time slot number for the PBCCH. In operation the PBCCH broadcasts general information such as
power control parameters, access methods and operational modes, network parameters, etc,
required to set up calls.
Common control channels:
Packet Paging Channel (PPCH): This is a downlink only channel and is used to alert the mobile
to an incoming call and to alert it to be ready to receive data. It is used for control signalling
prior to the call set up. Once the call is in progress a dedicated channel referred to as the PACCH
takes over.
Packet Access Grant Channel (PAGCH): This is also a downlink channel and it sends information
telling the mobile which traffic channel has been assigned to it. It occurs after the PPCH has
informed the mobile that there is an incoming call.
Packet Notification Channel (PNCH): This is another downlink only channel that is used to alert
mobiles that there is broadcast traffic intended for a large number of mobiles. It is typically used
in what is termed point-to-point multicasting.
Packet Random Access Channel (PRACH): This is an uplink channel that enables the mobile to
initiate a burst of data in the uplink. There are two types of PRACH burst, one is an 8 bit
standard burst, and a second one using an 11 bit burst has added data to allow for priority
setting. Both types of burst allow for timing advance setting.
Dedicated control channels:
Packet Associated Control Channel (PACCH): : This channel is present in both uplink and
downlink directions and it is used for control signalling while a call is in progress. It takes over
from the PPCH once the call is set up and it carries information such as channel assignments,
power control messages and acknowledgements of received data.
Packet Timing Advance Common Control Channel (PTCCH): This channel, which is present in
both the uplink and downlink directions is used to adjust the timing advance. This is required to
ensure that messages arrive at the correct time at the base station regardless of the distance of
the mobile from the base station. As timing is critical in a TDMA system and signals take a small
but finite time to travel this aspect is very important if long guard bands are not to be left.
Dedicated traffic channel:
Packet Data Traffic Channel (PDTCH): This channel is used to send the traffic and it is present
in both the uplink and downlink directions. Up to eight PDTCHs can be allocated to a mobile to
provide high speed data.
EDGE:
overall EDGE modulation scheme is a mixture of GMSK and 8PSK
Most of the data being sent over an EDGE link will consist of TCP/IP packets.
These packets are longer than a single EDGE packet payload and therefore it is necessary to split
the TCP/IP packets into smaller section and these are known as "chunks".
These chunks have defined sizes and may consist of one of 22, 28, 34, or 37 bytes or "octets".
The 37 octet chunk may be made directly of data to be transmitted, or it may be a 34 octet chunk which
is then padded by adding three dummy octets.
There are nine different Modulation and Coding Schemes (MCS) that can be used with EDGE. Each one is
designated a number in the region MCS1 to MCS9
The different coding schemes are grouped into three classes or families which are referred to by letters,
as classes A, B and C
MCS 1 to 4 uses GMSK hence compatible with GPRS, MCS 5 to 9 uses 8PSK

WCDMA

Uplink 1920-1980 MHz


Downlink 2110-2170 MHz
Spreading diff varies between 4 and 512
Chip rate = 3.84 Mcps
BW = 5 MHz
SNDCP SubNetworkDependent Convergence Protocol
PDP stands for Packet Data Protocol. The PDP addresses are network layer addresses (Open
Standards Interconnect [OSI] model Layer 3). GPRS systems support both X.25 and IP network
layer protocols. Therefore, PDP addresses can be X.25, IP, or both.
Each PDP address is anchored at a Gateway GPRS Support Node (GGSN), as shown in figure
below. All packet data traffic sent from the public packet data network for the PDP address goes
through the gateway (GGSN).

The public packet data network is only concerned that the address belongs to a specific GGSN.
The GGSN hides the mobility of the station from the rest of the packet data network and from
computers connected to the public packet data network.
Statically assigned PDP addresses are usually anchored at a GGSN in the subscriber's home
network. Conversely, dynamically assigned PDP addresses can be anchored either in the
subscriber's home network or the network that the user is visiting.
When a MS is already attached to a SGSN and it is about to transfer data, it must activate a PDP
address. Activating a PDP address establishes an association between the current SGSN of mobile
device and the GGSN that anchors the PDP address.

The record kept by the SGSN and the GGSN regarding this association is called the PDP
context.
It is important to understand the difference between a MS attaching to a SGSN and a MS activating
a PDP address. A single MS attaches to only one SGSN, however, it may have multiple PDP
addresses that are all active at the same time.
Each of the addresses may be anchored to a different GGSN. If packets arrive from the public
packet data network at a GGSN for a specific PDP address and the GGSN does not have an active
PDP context corresponding to that address, it may simply discard the packets. Conversely, the
GGSN may attempt to activate a PDP context with a MS if the address is statically assigned to a
particular mobile device.

The GPRS access modes specify whether or not the GGSN requests user authentication at
the access point to a Public Data Network (PDN). The available options are:

Transparent - No security authorization/authentication is requested by the GGSN.

Non-transparent - In this case, GGSN acts as a proxy for authenticating.


The GPRS transparent and non-transparent modes relate only to PDP type IPv4.

TRANSPATENT MODE
Transparent access pertains to a GPRS PLMN that is not involved in subscriber access
authorization and authentication. Access to PDN-related security procedures are transparent to
GSNs.
In transparent access mode, the MS is given an address belonging to the operator or any
other addressing space of domain. The address is given either at subscription as a static address
or at PDP context activation, as a dynamic address. The dynamic address is allocated from a
Dynamic Host Configuration Protocol (DHCP) server in the GPRS network. Any user authentication
is done within the GPRS network. No RADIUS authentication is performed; only IMSI-based
authentication (from the subscriber identity module in the handset) is done.

NON TRANSPATENT MODE


Non-transparent access to an intranet/ISP means that the PLMN plays a role in the
intranet/ISP authentication of the MS. Non-transparent access uses the Password Authentication

Protocol (PAP) or Challenge Handshake Authentication Protocol (CHAP) message issued by the
mobile terminal and piggybacked in the GTP PDP context activation message. This message is
used to build a RADIUS request toward the RADIUS server associated with the access point name
(APN).

GPRS ACCESS POINT NAME


The GPRS standards define a network identity called an Access Point Name (APN). An
APN identifies a PDN that is accessible from a GGSN node in a GPRS network. In GPRS, only the
APN is used to select the target network. To configure an APN, the operator configures three
elements on the GSN node:

Access point - Defines an APN and its associated access characteristics, including security
(RADIUS), dynamic address allocation (DHCP), and DNS services.

Access point list - Defines a logical interface that is associated with the virtual template.

Access group - Defines whether access is permitted between the PDN and the MS

GPRS - Network Processes


This chapter gives a brief description of the basic processes used in GPRS networks:

Attach process - Process by which the MS attaches (i.e., connects) to the SGSN in a GPRS network.

Authentication process - Process by which the SGSN authenticates the mobile subscriber.

PDP activation process - Process by which a user session is established between the MS and the
destination network.

Detach process - Process by which the MS detaches (i.e., disconnects) from the SGSN in the GPRS
network.

Network-initiated PDP request for static IP address - Process by which a call from the packet data
network reaches the MS using a static IP address.

Network-initiated PDP request for dynamic IP address - Process by which a call from the packet data
network reaches the MS using a dynamic IP address.

P-TMSI i.e Packet TMSI is used to derive the Temp. Logical Link Identity (TLLI)
Idle Downlink chls are used for timing advance signals
Idle Uplink chls are used for PACH signals
GPRAS Datagram size 8060 bits
GSM - Channel Equalisation Selective freq. Distortion
To avoid co-ChlInterfer min pwr level 12 db for bts

3G UMTS:
UTRAN UMTS Terrestrial Radio Access N/W.
CN Core N/W
Macro diversity (FDD only) is fully handled in the UTRAN.
Mobility for RRC connection is fully controlled by the UTRAN.
NAS Non Access Stratum -Contrl Protocol bw UE and CN

A Node B is connected to the RNC through the Iub interface


A Node B can support FDD mode, TDD mode or dual-mode operation.
There are two chip-rate options in the TDD mode: 3.84 Mcps TDD and 1.28 Mcps TDD.
Each TDD cell supports either of these options.
A Node B which supports TDD cells can support one chip-rate option only, or both options.
A RNC which supports TDD cells can support one chip-rate option only, or both options.
The RNC is responsible for the Handover decisions that require signalling to the UE.
A RNC may include a combining/splitting function to support combination/splitting of
information streams .
Inside the UTRAN, the RNCs of the Radio Network Subsystems can be interconnected
together through the Iur.
Iu(s) and Iur are logical interfaces.
Iur can be conveyed over directphysical connection between RNCs or virtual networks
using any suitable transport network.
The RNC may be connected to BSS supporting GERAN(GPRS Enabled RAN)Iu mode via
the Iur-g interface
Regarding the UE positioning method, the RNC may have full internal support for
this function and/or may be connected to one SAS via theIupc interface.
Each RNS is responsible for the resources of its set of cells.
For each connection between User Equipment and the UTRAN, One RNS is the Serving
RNS. When required, Drift RNSs support the Serving RNS by providing radio resources
The role of an RNS (Serving or Drift) is on a per connection basis betweena UE and the
UTRAN.
To support UE mobility between UTRAN and GERAN Iu mode, the Serving RNS may be
connected to the DBSS and vice versa
The role of an RNSor BSS (Serving or Drift) is on a per connection basis between an UE
and theUTRAN/GERAN Iu mode.
The UTRAN is layered into a Radio Network Layer and a Transport Network Layer
The UTRAN logical nodes and interfaces between them, are defined as part of the Radio Network Layer
The transport network layer provides services for user plane transport, signalling transport and transport of
implementation specific O&M
The Service Area Identifier (SAI)

The Cell identifier (C-Id) is used to uniquely identify a cell within an RNS/BSS.
The Cell-Id together with the identifier of the controlling RNC/BSS (CRNC-Id) constitutes the UTRAN/GERAN Cell
Identity (UC-Id) and is used to identify the cell uniquely within UTRAN/GERAN Iu mode.
UC-Id or C-Id is used to identify a cell in UTRAN Iub and Iur interfaces or Iur-g interface
UC-Id = CRNC-Id + C-Id
The C-Id is defined by the operator, and set in theRNC/BSS via O&M.
The C-Id is set in a Node B by its C-RNC or in the GERAN Iu mode cell.
Local Cell Identifier : The Local Cell identifier is used to uniquely identify the set of
resources within a Node B required to support a cell (as identified by a C-Id)
UE Identifiers: Radio Network Temporary Identities(RNTI) are used as UE identifiers within UTRAN/GERAN Iu
mode and in signalling messages between UE and UTRAN/GERAN Iu mode.
Six types of RNTI exist:
1) Serving RNC/BSS RNTI (s-RNTI);
2) Drift RNC/BSS RNTI (d-RNTI);
3) Cell RNTI (c-RNTI);
4) UTRAN/GERAN RNTI (u-RNTI);
5) [TDD - DSCH RNTI (DSCH-RNTI)];
- HS-DSCH RNTI (HS-DSCH RNTI);
6) [FDD - E-DCH RNTI (E-RNTI);]
Each RNC has a unique identifier within the UTRAN part of the PLMN, denoted by RNC identifier (RNC-ID).
This identifier is used to route UTRAN interface messages to correct RNC.
RNC-ID of the serving RNC together with the s-RNTI is a unique identifier of the UE
in the UTRAN part of the PLMN
u-RNTI is used as a UE identifier for the first cell access (at cell change) when a RRC connection exists for
this UE and for UTRAN originated paging including associated response messages.
RNC-ID is used by Controlling RNC/BSS to route the received uplink messages towards the Serving RNC/BSS.
For the initial access a unique core network UE identifier is used.
c-RNTI is used as a UE identifier in all other DCCH/DTCH common channel messages on air interface
Each RNC has a unique identifier within the UTRAN part of the PLMN, denoted by RNCidentifier (RNC-ID).
This identifier is used to route UTRAN interface messages to correct RNC.
RNC-ID of the serving RNC together with the s-RNTI is a unique identifier of the UE in the UTRAN part of the PLMN.
Basic AP level identifiers in each reference point Object Identifier Abbreviation Valid for
Radio Access Bearer Radio Access Bearer ID- RAB-ID- Valid for - Iu
Dedicated Transport channel - DCH-ID - Valid for - Iur, Iub
[TDD Downlink Shared Channel] - DSCH-ID - Valid for - Iur, Iub
[TDD Uplink Shared Channel] USCH-ID - Valid for - Iur, Iub

Potrebbero piacerti anche