Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Mobile equipment is a piece of hardware which is used to generate the signal, and process the data receiver
and to be transmitted.
It also contains a number known as the International Mobile Equipment Identity (IMEI). This is installed in the
phone at manufacture and "cannot" be changed.
It is accessed by the network during registration to check whether the equipment has been reported as stolen.
Type approval code (TAC). The TAC is issued by an authorized agency on successful testing for type approval.
Final assembly code (FAC). This uniquely identifies the manufacturer of the mobile equipment.
Serial number (SNR). Each mobile equipment is identified with a unique serial number within a TAC and FAC.
The remaining 1 digit/4 bits are not currently used and are a "spare."
The SIM or Subscriber Identity Module contains the information that provides the identity of the user to the
network.
All radio related functions are performed by BSS. It has (BSCs) and BTS
The BSC handles the management of the radio resource and monitor the BTS. It controls the following functions:
Network Subsystem
Network switching subsystem (NSS) (or GSM core network) is the component of a GSM system that carries out call out
and mobility management functions for mobile phones roaming on the network of base stations.
Main Switching Center (MSC)
It is responsible for the switching of calls between the mobile users and between mobile and fixed network
users.
It manages outgoing and incoming calls from various types of networks, such as PSTN, ISDN, and PDN.
It also handles the functionality required for the registration and authentication of a user
The VLR temporarily keeps the administrative data of the subscribers that are currently located in a given
geographical area under its control.
When roaming mobile enter MSC area MSC associated with VLR
The authentication center (AuC) is a protected database that contains a copy of the secret key stored in each
subscriber's SIM card, for authentication and encryption over the radio channel.
It provides the codes for both authentication and encryption to avoid undesired violations of the system by
third parties.
The equipment identity register (EIR) is a database that contains a list of all valid ME on the network, where
each MS is identified by its IMEI. An IMEI is marked as invalid if it has been reported stolen.
Frequency Reuse
Frequency reuse is the ability to reuse same radio channel frequency at another adjacent cell sites within the cellular
system
Multiple Access
A major requirement of cellular networks is to provide an efficient technique for multiple devices to access the
wireless system. These techniques include:
FDMA-frequency division multiple access in which every user device uses its own frequency channel.
TDMA-time division multiple access, in which a radio channel is divided in time slots, and use devices use their
allocated time slots.
CDMA-code division multiple access, in which orthogonal codes are used to differentiate user devices. CDMA is very
spectrum efficient, and was used by 3G standards.
Approach TDMA FDMA CDMA
Handoff
Handoff (or handover) is a control process initiated when a mobile moves from its current cell to its neighboring cell.
Cell splitting
Cell splitting is the process of subdividing a congested cell into smaller cells such that each smaller cell has its
own base station with reduced antenna height and reduced transmitter power.
Cell Sectoring
In this method, a cell has the same coverage space but instead of using a single omni‐directional antenna
that transmits in all directions, either 3 or 6 directional antennas are used such that each of these antennas
provides coverage to a sector of the hexagon.
Effects of Interference
Sources of Interference
Another mobile in the same cell.
A call in progress in the neighboring cell.
Other base stations operating on the same frequency.
Any non-cellular system which leaks energy into the cellular frequency band.
Co-channel interference
This type of interference is the due to frequency reuse, i.e. several cells use the same set of frequency.
These cells are called co-channel cells.
To reduce co-channel interference, co-channel cells must be physically separated by a minimum distance
Interference resulting from signals which are adjacent in frequency to the desired signal is called adjacent
channel interference.
Adjacent channel interference results from imperfect receiver filters which allow nearby frequencies to leak
into the pass band.
Adjacent channel interference can be minimized through careful filtering and channel assignments.
Types of Switching Techniques
1) Circuit Switching
2) Packet Switching
3) Message Switching
Circuit Switching
Circuit switching is a technique that directly connects the sender and the receiver in an unbroken path.
Telephone switching equipment, for example, establishes a path that connects the caller's telephone to the
receiver's telephone by making a physical connection.
Once a connection is established, a dedicated path exists between both ends until the connection is
terminated.
Routing decisions must be made when the circuit is first established
Packet Switching
There are two methods of packet switching: Datagram and virtual circuit.
In both packet switching methods, a message is broken into small parts, called packets.
Each packet is tagged with destination addresses.
Since packets have a strictly defined maximum length, they can be stored in main memory instead of
disk. Therefore access delay and cost are minimized.
Also the transmission speeds, between nodes, are optimized.
If the network becomes overloaded, packets are delayed or discarded (``dropped'').
Packet do not necessarily travel together. They don't even all travel via the same route.
But eventually they arrive at the right point and at their destination are reassembled into the correct
order, then converted to analog form
In the virtual circuit approach, a preplanned route is established before any data packets are sent.
A logical connection is established when a sender send a "call request packet" to the receiver and the
receiver send back an acknowledge packet "call accepted packet" to the sender if the receiver agrees on
conversational parameters.
The conversational parameters can be maximum packet sizes, path to be taken, and other variables
necessary to establish and maintain the conversation.
In virtual circuit, the route between stations does not mean that this is a dedicated path, as in circuit
switching.
Message Switching
In case of Message Switching it is not necessary to establish a dedicated path in between any two
communication devices.
Here each message is treated as an independent unit and includes its own destination source address by its
own.
Each complete message is then transmitted from one device to another through internetwork
Each intermediate device receive the message and store it until the nest device is ready to receive it and
then this message is forwarded to the next device.
The storing and Forwarding introduces the concept of delay.
Switching Advantages disadvantages
technique
Circuit The communication is dedicated Possible long wait to establish a connection,
Switching (10 seconds, more on long- distance or
international calls.) during which no data
can be transmitted.
More expensive than any other switching
techniques.
Inefficient use of the communication
channel, because the channel is not used
when the connected systems are not using
it.
Packet Packet switching is cost effective, Protocols for packet switching are typically
Switching because it do not need massive more complex.
amount of secondary storage. If packet is lost, sender needs to retransmit
Packet switching offers improved the data.
delay characteristics, because Packet-switched systems still can’t deliver
there are no long messages in the same quality as dedicated circuits in
the queue (maximum packet size applications requiring very little delay - like
is fixed). voice conversations or moving images.
Packet can be rerouted if there is
any problem, such as, busy or
disabled links.
Many network users can share
the same channel at the same
time.
Message Channel efficiency can be greater Not compatible for interactive applications
Switching compared to circuit-switched such as voice and video. This is due to
systems, because more devices longer message delivery time.
are sharing the channel. The method is costly as store and forward
Traffic congestion can be devices are expensive.
reduced, because messages may It can lead to security issues if hacked by
be temporarily stored in route. intruders.
As the system is complex, often people are
not aware whether the messages are
transferred successfully or not..
Signaling
In-Band Signaling
In-band signaling is the exchange of call control information within the same physical channel, or within the
same frequency band, that the telephone call itself is using.
An example is dual-tone multi-frequency signaling (DTMF), which is used on most telephone lines to
customer premises.
Dual-tone multi-frequency
DTMF is an in-band telecommunication signaling system using the voice-frequency band over telephone
lines between telephone equipment and other communications devices and switching centers.
The DTMF system uses a set of eight audio frequencies transmitted in pairs to represent 16 signals,
They can be transmitted through electrical repeaters and amplifiers, and over radio and microwave links,
thus eliminating the need for intermediate operators on long-distance circuits.
Out-of-band signaling
Out-of-band signaling is telecommunication signaling on a dedicated channel separate from that used for the
telephone call. Out-of-band signaling has been used in Signaling System No. 7 (SS7)
Channel-associated signaling (CAS)
Dedicated signaling channel is associated with each data channel
Signaling flows the same path as data
Can be controlled by non-digital or digital system
This information can be transmitted in the same band (in-band signaling) or a separate band (out-of-band
signaling)
Common-channel signaling (CCS)
Common-channel signaling (CCS) the transmission of signaling information (control information) on a
separate channel
The most common CCS signaling methods in use today are (ISDN) and (SS7).
Associated
Quasi-associated
Non-associated
Associated Signaling
In associated mode, both the signaling and the corresponding user traffic take the same route through the
network.
Networks that employ only associated mode are easier to design and maintain; however, they are less
economic, except in small-sized networks.
Associated mode requires every network switch to have signaling links to every other interconnected switch
(this is known as a fully meshed network design).
Quasi-Associated Signaling
In quasi-associated mode, signaling follows a different route than the switched traffic to which it refers,
requiring the signaling to traverse at least one intermediate node.
Quasi-associated networks tend to make better use of the signaling links; however, it also tends to create a
more complex network in which failures have more potential to be catastrophic.
Quasi-associated signaling can be the most economical way of signaling for lightly loaded routes because it
avoids the need for direct links.
The signaling is routed through one or more intermediate nodes. Signaling packets arrive in sequence using
quasi-associated signaling because the path is fixed for a given call (or database transaction) at the start of a
call (or transaction)
Non-Associated Signaling
Because the path is not fixed at a given point in time in non-associated mode, the signaling has many
possible routes through the network for a given call or transaction.
Therefore, the packets might arrive out of sequence because different routes might have been traversed.
SS7 does not run in non-associated mode because no procedures exist for reordering out-of-sequence
messages.
Associated and quasi-associated signaling modes assure sequential delivery, while non-associated signaling
does not.
Pre selection
Call completion
Conversation
Release
Telecommunication Network management
Telecommunications Network Management originated under the International Telecommunication Union –
Telecommunications (ITU-T) for managing open systems in a communications network
It allows elements from different manufacturers to be incorporated into a network under a single
management control.
Modern telecom networks offer automated management functions and are run by operations support
system (OSS) software.
These manage modern telecom networks and provide the data that is needed in the day-to-day running of a
telecom network.
OSS software is also responsible for issuing commands to the network infrastructure to activate new service
offerings, commence services for new customers, and detect and correct network faults.
Business management -Includes the functions related to business aspects, analyzes trends and quality issues, for
example, or to provide a basis for billing and other financial reports.
Service management -Handles services in the network: definition, administration and charging of services.
Network management -Distributes network resources, performs tasks of: configuration, control and supervision
of the network.
Element management -Handles individual network elements including alarm management, handling of
information, backup, logging, and maintenance of hardware and software.
Telecommunications requirements
Detection of a problem
Fault Isolation
Correction to normal operation
Uses Polling of managed objects to search for error conditions and/or report alarms/alerts,
Can also use event reporting
Illustrates the problem detected either as a graphic or in textual format
Optimization of managed
Identification of bottlenecks in network and implementation of corrective action
Divides into four main functions: Performance data collection, Data analysis, Problem Reporting, Display &
formatting
Network Topologies
Hierarchical Network
Star Network
Ring Network
Bus Network
Network Devices
Repeater
A repeater operates at the physical layer
Its job is to regenerate the signal over the same network before the signal becomes too weak or corrupted so
as to extend the length to which the signal can be transmitted over the same network.
An important point to be noted about repeaters is that they do not amplify the signal.
Hub
A hub is basically a multiport repeater.
Hubs cannot filter data, so data packets are sent to all connected devices. .
Also, they do not have intelligence to find out best path for data packets which leads to inefficiencies and
wastage.
Bridge
A bridge operates at data link layer.
A bridge is a repeater, with add on functionality of filtering content by reading the MAC addresses of source
and destination.
It is also used for interconnecting two LANs working on the same protocol.
Switch –
A switch is a multi-port bridge with a buffer and a design that can boost its efficiency and performance.
Switch is data link layer device.
Switch can perform error checking before forwarding data that makes it very efficient as it does not forward
packets that have errors and forward good packets selectively to correct port only.
Routers
A router is a device like a switch that routes data packets based on their IP addresses.
Router is mainly a Network Layer device.
Routers normally connect LANs and WANs together and have a dynamically updating routing table based on
which they make decisions on routing the data packets.
Plmn service areas