Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
GPMS Yr 2009
GPMS is an initiative under Project SHIKHAR
Performance Management System (PMS) is not only a HR tool but it is a
management tool for translating expectations of top management into tangible results.
The GPMS is an initiative under Project SHIKHAR of BSNL with the intent to have an
objective and transparent system for assessing performance of employees.
KPI Key Performance Indicators
BBSCBalanced Business Score Card Yr 2006
The GPMS scorecards for all the group types have been designed to consist of Key
Performance Indicators (KPIs) to measure the groups performance on financial,
customer / market and operational parameters
Every scorecard has a parameter to measure customer satisfaction
KRA Key Responsibility Area
GPMS is considered suitable for implementation in BSNL as:It is based on new organization structure of BSNL.
KRA/KPIs are identified and defined on the basis of new Business Unit structureof BSNL, in consultation
with top executives of the respective Business Units.
Number of KPIs have been kept lessor Minimum to have focused measurement of
KeyPerformance Areas.
It is an optimum combination of quantitative and qualitative measurement.
KPIs are defined as per functional activities of a group.
For implementation of GPMS in BSNL, all executives have been structured along 19 groups
Groupings in GPMS of BSNL Category of Groups - 4
1.Corporate Office 7 Groups, Group Type - 7
2.Territorial Circle- 26 Groups, Group Type - 1
3.Non- Territorial Circle 21 Groups, Group Type - 10
4.SSA 330 Groups, Group Type - 1
Total Groups 384, Group Type - 19
GPMS nodal designates in 7 groups
The correct approach of creating the GPMS is in a sequence that flows from top.(Corporate Office)
The total score against a KPIwould be calculated after multiplying the weightage of all parameter with
its performance score
Performance Levels Fair, Good and Excellant - 50, 75, 100, Score 60, 80, 100
Marks achieved for rating below Fair = 0.
Achievement between Fair and Good and between Good and Excellent would be linearly scaled
linear scaling= Score = Score (Lower) + 20 x { T (Achieved) T (Lower) }
T (Upper) T (Lower)
Where:
T (Achieved) = Achieved target
T (Lower) = Target Lower than the achieved target i.e. Fair or Good
T (Upper) = Target higher than the achieved target i.e. Good or Excellent
Score (lower) = The score for target slab lower than achieved target i.e. 60 or 80
The BBSCbalanced scorecard is a management system (not only a measurement system)
The BBSCbalanced scorecard suggests that we view the organization from four perspectives
e Customer Perspective
tive
learning and growth constitute the essential foundation for success of any knowledge-worker
organization
KSA Knowledge, Skill, Abilities
1- GSM 2G
GSM
BW
Uplink Freq.
Downlink
25 MHz
890-915 MHz
935-960 MHz
Modulation:
ASK, FSK- also Binary FSK-BFSK, PSK-Used for decode BFSK, CPFSK-Continuous Phase FSK
MSKMINIMUM SHIFT KEYING is a special form of binary CPFSK.
Two level FSK modulation, where transmission bit rate R is exactly four times the frequency shift
(between 1s and 0s) is called Minimum Shift Keying MSK
In BPSK each of the two phases convey an information equivalent to a single bit only
In QPSK each of the four phases of carrier representtwo bits of data
offset QPSK OQPSK
Gaussian MSK or GMSK
In GSM a B.T product of 0.3 is used with a channel data rate of 270.8 Kb/s
The most popular digital modulation schemes employed in cellular radio systems are four level phase
shift keying (QPSK) and its variants such as GMSK and / 4 shifted QPSK (OQPSK)
A group of cells is called a cluster.
No frequencies are reused in a cluster
Cells using the same channel set are called co-channel cells.
A PLMN is identified by the Mobile Country Code (MCC) and the Mobile Network Code (MNC)
PLMN - Public land mobile network
The distance between cells using the same channel set is always the same
valid cluster sizes that allow this are: 1, 3, 4, 7, 9 and 12.
K-Channel Reuse Factor If K increases, then performance increases
If K increases, then call capacity decreases per cell
VAD - Voice Activity Detection
Base Station Identification code (BSIC)
The SMS could be either in broadcast mode (via CBCH channel) or in a point-to-point mode (via either
SDCCH channel if mobile is in idle state, or SACCH if the mobile is in dedicated mode).
Authentication Triplets.
At network side, authentication procedure requires authentication triplets. Authentication triplet
consists of:
Random number RAND (128 bits)
Signed response SRES (32 bits)
Ciphering key Kc (64 bits).
Fn 22 bit + Kc 64 bit = Encryption code 114 bit o/p of A5
While initiating authentication procedure, if network has no authentication triplet or all triplets have
been used, it requests AuC for the same.
The index of currently used triplet is known as CKSN. (Ciphering key sequence number).
IMSI Detach procedure.purpose of this procedure is to indicate the network that MS has switched off.
Different MM connections are identified by different protocol discriminator (PD) and transaction
identifier (TI) value
MIN
Customised Applications for Mobile networks Enhanced Logic,-- CAMEL
IN service switching functionality (SSF)
CAMEL Service Switching Functionality (gsmSSF)
all communication between SSF and SCF will be done through Intelligent Network Application Protocol
(INAP).
All communication between gsmSSF and gsmSCF is done through CAMEL Application Part (CAP) protocol
The SGSN supports both dynamic routing and static routing
SGSN supports IPsec in tunnel or transport mode or GRE tunnels
The SGSN supports Dual Access, that is, simultaneous GSM and WCDMA Systems radio access within
one SGSN. CS and PS services can be used either simultaneously or one at the time
Gn interface
Connects GPRS Support Nodes (GSNs) within the same Public Land Mobile
Network (PLMN) over a GPRS backbone network.
Gp interface
Gom interface
Gb interface
Connects the SGSN to Base Station Controllers (BSCs) in the GSM for payload
transport and signaling. Traffic over the Gb interface can also be transported over
Frame Relay, .
Iu-U interface
Designates the Iu user plane, connects the SGSN to Radio Network Controllers
(RNCs) in the WCDMA Radio Access Network (RAN) for payload transport.
Iu-C interface
Designates the Iu control plane, connects the SGSN to RNCs in the WCDMA RAN
for signaling. Signaling over the Iu-C interface can also be transported over
broadband SS7, .
Gr interface
Connects the SGSN to the Home Location Registers (HLRs). Signaling over the Gr
interface can also be transported over broadband and narrowband SS7,
Gs interface
Connects the SGSN to the Mobile Services Switching Center, Visitor Location
Register (MSC/VLR). Signaling over the Gs interface can also be transported over
broadband and narrowband SS7,
Gd interface
Connects the SGSN to both the Short Message Service Gateway Mobile services
Switching Center (SMS-GMSC) and the Short Message Service Interworking Mobile
services Switching Center (SMS-IWMSC). Signaling over the Gd interface can also
be transported over broadband and narrowband SS7, .
Ge interface
Connects the SGSN to the Service Control Point (SCP) with Customized
Applications for Mobile Network Enhanced Logic (CAMEL). Signaling over the Ge
interface can also be transported over broadband and narrowband SS7, .
Gf interface
Connects the SGSN to the Equipment Identity Register (EIR). Signaling over the Gf
interface can also be transported over broadband and narrowband SS7, .
Lg interface
Connects the SGSN to the Gateway Mobile Location Centre (GMLC), providing MS
location information from the PLMN. Signaling over the Lg interface can also be
transported over broadband and narrowband SS7, .
Ai
N
M
Q
MSC/SSP to PSTN
HLR to AUC
or
MC to MC
MSC/SSP to MC
HLR to MC
A3
Authentication Algorithm
A5
Ciphering Algorithm
A8
Kc Generation Algorithm
LAI
Location Area Identity
LAI = MCC+MNC+LAC (LAC < FFFF)
21 = 3 +2 + 16 Bits
1 Burst =
0.577 ms
1 TDMA Frame =
8 * 0.577 = 4.616
1 Burst (No. Of Bits) = 156.25 Bits
FCCH Burst
=
142 Fixed bits + (3+3) Tail bits + 8.25 GP
Normal Burst =
57+57 Infn Bits + 26 Training Seq + (3+3) Tail Bits + (1+1) Flag
Maximum of 65536 LA can be defined in one GSM PLMN
FCCH prsent in time slot T0 and fixed pattern of 142 bits of 0s
After tuning to FCCH the MS synchronises in time with SCH
The occurrence of SCH is 8 Burst period later than FCCH
After Sync the MS will read TDMA Frame No. and BSIC (Base Station Identity Code)
BSIC (6 Bits) = PLMN Color Code (3 Bits) + BS Color Code (3 Bits)
MS measures the signal strength of BCCH Signal atleast once every 6Sec (Super Frame Duration)
MS stores atleast 6 strogest BCCH and their cell identification in SIM
What is an Erlang
One Erlang is defined as the amount of traffic intensity carrier by a channel that is completely occupied
Therefore,
1 Erlang = 1 call with a duration of 1 hour over a channel every hour
= 2 calls with a duration of 0.5 hours over the channel every hour
= 30 calls with a duration of 4 minutes over the channel every 2 hours (120 minutes)
A channel that carries 2 calls of duration 5 minutes each per hour carries (2*5 min/60 min = 1/6 Erlangs)
Grade of Service (GOS)
The grade of service (GOS) is related to the ability of a mobile phone to access the trunked mobile
phone system during the busiest hour.
To meet a specific GOS, the maximum required capacity of the system must be estimated and
the proper number of channels must be allocated for the system
GOS is a measure of the congestion of the system which is specified as the probability of a call
being blocked (Erlang B system) or the probability of a call being delayed beyond a certain
amount of time (Erlang C system).
System Capacity = C=k.MN
K Group of channels allotted for each cell and k<s
M Cluster N is replicated M times
N Cluster Size
s - No. Of Duplex Channels available
s = kN
hence Cellular Capacity C = Ms
Freq. Reuse Factor,
f = 1/N
The time period for which a particular call is maintained/sustained in a cellular region is known as
Dwell Time.
In umbrella pattern , cells having low traffic is called micro cell and cells having more traffic is called
macro cell
CCI Co Channel Interferrance
ACI Adjacent Channel Interferrance
Directional Antennas Cell sectoring
120 Degree 3 sectors , 60 Degree 6 sectors in hexagonal cells
ARFCN Absolute RF carrier Number (1 and 124 th are not used in GSM)
Practicall only 122 chls available
ARFCN(n) =
Freq. Uplink (n)
= 890.2+0.2*(n-1) MHz
Freq. Downlink (n)
= 935.2+0.2*(n-1) MHz
Speech sampled every 20 ms at a bit rate of 260 bits/sec
Channel coding converts the 260 bits/s to 456 b/s coded signal
Interleaving sends the 456 bits int 8 blocks of 57 bit each in every burst
C
I
Will be greater than some given amount for smallas well as large cell sizes when all signals are
transmitted at the same power level.
The frequency reuse distance is also known as separation distance. is also known as the signal-to-noise
ratio.
The ratio D/R needs to be large enough in order for the base station to be able to cope with the
interference
200 kHz
Modulation type
GMSK
Data handling
Packet data
9.05
13.4
15.6
21.4
Logical channels
Broadcast channels:
Packet Broadcast Central Channel (PBCCH): This is a downlink only channel that is used to
broadcast information to mobiles and informs them of incoming calls etc. It is very similar in
operation to the BCCH used for GSM. In fact the BCCH is still required in the initial to provide a
time slot number for the PBCCH. In operation the PBCCH broadcasts general information such as
power control parameters, access methods and operational modes, network parameters, etc,
required to set up calls.
Common control channels:
Packet Paging Channel (PPCH): This is a downlink only channel and is used to alert the mobile
to an incoming call and to alert it to be ready to receive data. It is used for control signalling
prior to the call set up. Once the call is in progress a dedicated channel referred to as the PACCH
takes over.
Packet Access Grant Channel (PAGCH): This is also a downlink channel and it sends information
telling the mobile which traffic channel has been assigned to it. It occurs after the PPCH has
informed the mobile that there is an incoming call.
Packet Notification Channel (PNCH): This is another downlink only channel that is used to alert
mobiles that there is broadcast traffic intended for a large number of mobiles. It is typically used
in what is termed point-to-point multicasting.
Packet Random Access Channel (PRACH): This is an uplink channel that enables the mobile to
initiate a burst of data in the uplink. There are two types of PRACH burst, one is an 8 bit
standard burst, and a second one using an 11 bit burst has added data to allow for priority
setting. Both types of burst allow for timing advance setting.
Dedicated control channels:
Packet Associated Control Channel (PACCH): : This channel is present in both uplink and
downlink directions and it is used for control signalling while a call is in progress. It takes over
from the PPCH once the call is set up and it carries information such as channel assignments,
power control messages and acknowledgements of received data.
Packet Timing Advance Common Control Channel (PTCCH): This channel, which is present in
both the uplink and downlink directions is used to adjust the timing advance. This is required to
ensure that messages arrive at the correct time at the base station regardless of the distance of
the mobile from the base station. As timing is critical in a TDMA system and signals take a small
but finite time to travel this aspect is very important if long guard bands are not to be left.
Dedicated traffic channel:
Packet Data Traffic Channel (PDTCH): This channel is used to send the traffic and it is present
in both the uplink and downlink directions. Up to eight PDTCHs can be allocated to a mobile to
provide high speed data.
EDGE:
overall EDGE modulation scheme is a mixture of GMSK and 8PSK
Most of the data being sent over an EDGE link will consist of TCP/IP packets.
These packets are longer than a single EDGE packet payload and therefore it is necessary to split
the TCP/IP packets into smaller section and these are known as "chunks".
These chunks have defined sizes and may consist of one of 22, 28, 34, or 37 bytes or "octets".
The 37 octet chunk may be made directly of data to be transmitted, or it may be a 34 octet chunk which
is then padded by adding three dummy octets.
There are nine different Modulation and Coding Schemes (MCS) that can be used with EDGE. Each one is
designated a number in the region MCS1 to MCS9
The different coding schemes are grouped into three classes or families which are referred to by letters,
as classes A, B and C
MCS 1 to 4 uses GMSK hence compatible with GPRS, MCS 5 to 9 uses 8PSK
WCDMA
The public packet data network is only concerned that the address belongs to a specific GGSN.
The GGSN hides the mobility of the station from the rest of the packet data network and from
computers connected to the public packet data network.
Statically assigned PDP addresses are usually anchored at a GGSN in the subscriber's home
network. Conversely, dynamically assigned PDP addresses can be anchored either in the
subscriber's home network or the network that the user is visiting.
When a MS is already attached to a SGSN and it is about to transfer data, it must activate a PDP
address. Activating a PDP address establishes an association between the current SGSN of mobile
device and the GGSN that anchors the PDP address.
The record kept by the SGSN and the GGSN regarding this association is called the PDP
context.
It is important to understand the difference between a MS attaching to a SGSN and a MS activating
a PDP address. A single MS attaches to only one SGSN, however, it may have multiple PDP
addresses that are all active at the same time.
Each of the addresses may be anchored to a different GGSN. If packets arrive from the public
packet data network at a GGSN for a specific PDP address and the GGSN does not have an active
PDP context corresponding to that address, it may simply discard the packets. Conversely, the
GGSN may attempt to activate a PDP context with a MS if the address is statically assigned to a
particular mobile device.
The GPRS access modes specify whether or not the GGSN requests user authentication at
the access point to a Public Data Network (PDN). The available options are:
TRANSPATENT MODE
Transparent access pertains to a GPRS PLMN that is not involved in subscriber access
authorization and authentication. Access to PDN-related security procedures are transparent to
GSNs.
In transparent access mode, the MS is given an address belonging to the operator or any
other addressing space of domain. The address is given either at subscription as a static address
or at PDP context activation, as a dynamic address. The dynamic address is allocated from a
Dynamic Host Configuration Protocol (DHCP) server in the GPRS network. Any user authentication
is done within the GPRS network. No RADIUS authentication is performed; only IMSI-based
authentication (from the subscriber identity module in the handset) is done.
Protocol (PAP) or Challenge Handshake Authentication Protocol (CHAP) message issued by the
mobile terminal and piggybacked in the GTP PDP context activation message. This message is
used to build a RADIUS request toward the RADIUS server associated with the access point name
(APN).
Access point - Defines an APN and its associated access characteristics, including security
(RADIUS), dynamic address allocation (DHCP), and DNS services.
Access point list - Defines a logical interface that is associated with the virtual template.
Access group - Defines whether access is permitted between the PDN and the MS
Attach process - Process by which the MS attaches (i.e., connects) to the SGSN in a GPRS network.
Authentication process - Process by which the SGSN authenticates the mobile subscriber.
PDP activation process - Process by which a user session is established between the MS and the
destination network.
Detach process - Process by which the MS detaches (i.e., disconnects) from the SGSN in the GPRS
network.
Network-initiated PDP request for static IP address - Process by which a call from the packet data
network reaches the MS using a static IP address.
Network-initiated PDP request for dynamic IP address - Process by which a call from the packet data
network reaches the MS using a dynamic IP address.
P-TMSI i.e Packet TMSI is used to derive the Temp. Logical Link Identity (TLLI)
Idle Downlink chls are used for timing advance signals
Idle Uplink chls are used for PACH signals
GPRAS Datagram size 8060 bits
GSM - Channel Equalisation Selective freq. Distortion
To avoid co-ChlInterfer min pwr level 12 db for bts
3G UMTS:
UTRAN UMTS Terrestrial Radio Access N/W.
CN Core N/W
Macro diversity (FDD only) is fully handled in the UTRAN.
Mobility for RRC connection is fully controlled by the UTRAN.
NAS Non Access Stratum -Contrl Protocol bw UE and CN
The Cell identifier (C-Id) is used to uniquely identify a cell within an RNS/BSS.
The Cell-Id together with the identifier of the controlling RNC/BSS (CRNC-Id) constitutes the UTRAN/GERAN Cell
Identity (UC-Id) and is used to identify the cell uniquely within UTRAN/GERAN Iu mode.
UC-Id or C-Id is used to identify a cell in UTRAN Iub and Iur interfaces or Iur-g interface
UC-Id = CRNC-Id + C-Id
The C-Id is defined by the operator, and set in theRNC/BSS via O&M.
The C-Id is set in a Node B by its C-RNC or in the GERAN Iu mode cell.
Local Cell Identifier : The Local Cell identifier is used to uniquely identify the set of
resources within a Node B required to support a cell (as identified by a C-Id)
UE Identifiers: Radio Network Temporary Identities(RNTI) are used as UE identifiers within UTRAN/GERAN Iu
mode and in signalling messages between UE and UTRAN/GERAN Iu mode.
Six types of RNTI exist:
1) Serving RNC/BSS RNTI (s-RNTI);
2) Drift RNC/BSS RNTI (d-RNTI);
3) Cell RNTI (c-RNTI);
4) UTRAN/GERAN RNTI (u-RNTI);
5) [TDD - DSCH RNTI (DSCH-RNTI)];
- HS-DSCH RNTI (HS-DSCH RNTI);
6) [FDD - E-DCH RNTI (E-RNTI);]
Each RNC has a unique identifier within the UTRAN part of the PLMN, denoted by RNC identifier (RNC-ID).
This identifier is used to route UTRAN interface messages to correct RNC.
RNC-ID of the serving RNC together with the s-RNTI is a unique identifier of the UE
in the UTRAN part of the PLMN
u-RNTI is used as a UE identifier for the first cell access (at cell change) when a RRC connection exists for
this UE and for UTRAN originated paging including associated response messages.
RNC-ID is used by Controlling RNC/BSS to route the received uplink messages towards the Serving RNC/BSS.
For the initial access a unique core network UE identifier is used.
c-RNTI is used as a UE identifier in all other DCCH/DTCH common channel messages on air interface
Each RNC has a unique identifier within the UTRAN part of the PLMN, denoted by RNCidentifier (RNC-ID).
This identifier is used to route UTRAN interface messages to correct RNC.
RNC-ID of the serving RNC together with the s-RNTI is a unique identifier of the UE in the UTRAN part of the PLMN.
Basic AP level identifiers in each reference point Object Identifier Abbreviation Valid for
Radio Access Bearer Radio Access Bearer ID- RAB-ID- Valid for - Iu
Dedicated Transport channel - DCH-ID - Valid for - Iur, Iub
[TDD Downlink Shared Channel] - DSCH-ID - Valid for - Iur, Iub
[TDD Uplink Shared Channel] USCH-ID - Valid for - Iur, Iub