Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
2. Overview of UMTS
The Universal Mobile Telecommunication Systems (UMTS) which, is part of the ITUs (International Telecommunication Union) International Mobile Telephone Standard 2000 (IMT2000) vision of a global family of 3Gmobile communications systems, has finally arrived [2]. A UMTS network consist of three interacting domains; Core Network (CN), UMTS Terrestrial Radio Access Network (UTRAN) and User Equipment (UE) [fig 1]. Differentiated Service (DS)-based transport IP services can be provided between the GGSN and the 3G-SGSN in the UMTS core network [2]. DS provide network layer service differentiation in IP networks. UMTS Release 6 with the legacy Circuit Switched (CS) Networks, such as Public Switch Telephone Network (PS) / Integrated Service Digital Network (ISDN) and GSM [4].UMTS combines the W-CDMA, TD-CDMA, or TD-SCDMA air interfaces, GSM's Mobile Application Part (MAP) core, and the GSM family of speech codes [2]. UMTS-TDD (Time Division Duplex) Radio Interface is towards a direct interconnection with IPv6 [1, 2]. UMTS-TDD implement the IPv6-based radio resource management for heterogeneous multiple radio-access technology wireless networks, smart-antenna technology, resource allocation and scheduling and Quality of Service management (QoS). UMTS network services have different QoS classes for four types of traffic: Conversational class (voice, video), Streaming class (multimedia, web cast), Interactive class (web browsing, database access), Background class (email, downloading) [2].UMTS has been designed for services to be maintained when the user moves from UMTS to GSM/GPRS/EDGE [1]. Radio mobility is allowed to dual-mode terminal may move seamlessly between the UMTS and GSM networks. Most UMTS terminals are in fact dual mode GSM/UMTS devices capable of operating in three or more frequency bands. UMTS security design was to improve on the security of GSM [3]. These improvements can take through the correcting real and perceived weaknesses. UTMS performance may not be sufficient to meet needs of future high-performance applications like multi-media, full-motion video, wireless teleconferencing. We need an improved network technology that extends UMTS capacity. There are multiple standards for UMTS making it difficult to roam. So, we need global mobility and service portability. UMTS is based on primarily a wide-area concept. We need hybrid networks that utilize both wireless LAN concept and base-station wide area network design & wider bandwidth. We need all digital packet networks that based on IP with converged voice and data capability.
1. Introduction
When technology is rapidly developing there is always issue about mobile communication performance. Todays, cellular phone & CDMA communication is an important communication networks in today world. These types of mobile communication networks are based on UTMS technology. Therefore UMTS is an important topic. The Universal Mobile Telecommunications System (UMTS) is one of the new third generation (3G) mobile communication systems being developed within the framework defined by the ITU known as IMT-2000[2]. Through the research, 3GPP is introducing UMTS in phases and annual releases. The first release (UMTS Rel. 99), introduced in December of 1999, and defines enhancements and transitions for existing GSM networks. The second phase (UMTS Rel. 00), defines enhancements and transitions for IS95 (with CDMA2000) and TDMA (with TDCDMA and EDGE) [2]. The technology is optimized to allow state of the art, very highspeed multimedia services such videoconferencing, full motion video, and Internet access [2]. UMTS builds on the capability of todays mobile technologies by providing increased capacity, data capability and greater range of services using a new radio interface standard called UMTS Terrestrial Radio Access (UTRA) and also 3G broadband, packet-based transmission of text [2, 5]. In the next sections describe very broad overview of the UMTS. That section includes UMTS Capabilities, UMTS Architecture, Data Throughput and UMTS Security features Latency and UMTS Application.
UMTS uses the same fundamental architecture for voice and data services as GSM/GPRS/EDGE. UMTS is divided into the 2 Networks (fig 1). They are, UMTS Terrestrial Radio Access Network (UTRAN) and the UMTS core network [1]. UMTS system uses the same core network as the GPRS and uses entirely new radio interface. The UTRAN is connected to the core network (CN) of GPRS via Iu interface. The Iu is the UTRAN interface between the Radio network controller RNC and CN [1]. The mobile terminal in UMTS is called User Equipment (UE). The UE is connected to Node-B over high speed Uu (up to 2 Mbps) interface (fig1). The Node-B is the equivalent of BTS in GSM and typically serves a cell site. Several Node-Bs are controlled by a single RNCs over the Iub interface. The RNCs are connected to CN through Iu interface (fig 1). The packet switched data is transmitted through Iu-PS interface and circuit switched data is transferred over Iu-CS interface. One of the new interfaces in UTRAN is Iur interface which connects two RNCs and has no equivalent in GSM system (fig1). The Iur interface facilitates handling of 100 percent of RRM (Radio Resource Management) and eliminates the burden from CN. Operators can use the same core network (consisting of the mobile switching centers and packet data nodes) for both the GSM/GPRS/EDGE radio access network and the UTRAN. Wireless is using the same mobile switching centers for both GSM and UMTS, but separate packet data infrastructure. This separate packet data infrastructure includes the Serving GPRS Support Node and Gateway GPRS Support Node.
security-related data that the subscriber needs to make or receive a call. Subscriber authentication: the serving network corroborates the identity of the subscriber. Network authentication: the subscriber corroborates that he is connected to a serving network that is authorized by the subscribers home network. Encryption of data communications between the mobile station and the SGSN. GSM the cipher key is transported as a 64 bit structure. That is top 10 bits of the cipher key are set to zero to reduce the effective key length to 54 bits. GSM key is much more complex .UMTS required a new ciphering mechanism. UMTS use UMTS Encryption Algorithm1 (UEA1) [4], which is based on a mode of operation of a block cipher called Kasumi. This algorithm employs a 128 bit key. Protection of the UMTS network infrastructure against intruders through use of private networks and firewalls. Compatibility with VPN technology. So customers can secure data sessions on an end-to-end basis. Optional Personal Identification Number (PIN) protection of the user device. In order to achieve efficient and secure roaming between the different networks, UMTS security supports mechanisms with additional features, as compared the previous mobile systems (GSM, DECT).The encryption algorithms are stronger. UMTS specifications define enhanced security architecture, including mutual authentication of mobile station and network.
2.6 Security
The UMTS security mechanisms are similar to those used in the GPRS/EDGE network and new mechanisms also introduced [2, 4].These mechanisms include: Entity authentication UMTS provides mutual authentication between the UMTS subscriber, which is USIM (Universal Subscriber Identity Module). The SIM contains all the identification and
expecting capacity will come from the evolution of UMTS. This expected rates offered by Bluetooth and Broadband Radio Access Networks (BRANs) in155Mb/s (with mobility) and HiPerLAN is 5 GB/s in UMTS.
3.2.1 Bluetooth
Bluetooth uses short data packets and also flexible packet types. So Bluetooth throughput is optimized during periods of interference. Frequency changes are very quick, i.e., at 1600 hops per second [5]. Performance rates of Bluetooth can be maintained in noisy environments. The second generation of Bluetooth will aim for a 2Mbps data rate. Bluetooths blocking probability is expected to be lower than UMTS. Additionally, dual mode data terminals may operate on both Bluetooth and conventional urban UMTS. Through above technology, Bluetooth should return live video based interactive news reports from fixed urban locations.
3.2.3 Newsgathering
The merger of GSM, DECT, UMTS, Bluetooth, BRAN, and HiPerLan will provide big technical challenges before the one handset concept can be realized. But in new systems offer the higher bit rates. This evaluated UMTS coupled with trends in compression bode. That is well for the future of live video based news interviews. From a newsgathering stance, the plethora of new radio based services will offer new opportunities for live reporting.
would not be able to obtain radio resources temporarily in periods of high load. This bandwidth oscillation can effect to significant throughput degradation. That is affected by some factors such as spurious TCP retransmissions. RRM functions can significantly affect TCP performance. RRM functionalities impact on TCP behavior. That is the load control mechanism. Bandwidth for TCP traffic could be reduced momentarily. That happened when most radio resources are assigned to real-time traffic.
Results show that, The lower the load threshold is, the better the behavior of voice packets error ratio is since less data traffic is served in the DSCH channels. So, network operators should use a proper value for the network load threshold in order to satisfy QoS requirements for conversational traffic. Notice that a neta of threshold =100% means that no load restrictions are applied on DSCH channels. On the other hand, for interactive traffic, if neta of threshold is below 70% the performance of TCP traffic significantly decreases due to an excessive packet loss. This packet loss is due to buffer overflows since the available bandwidth for DSCH is drastically reduced. This situation also leads to reduced TCP throughput values. However, if the network load threshold ranges between 70-90% the TCP packet loss is kept at a minimum value (1%) and TCP throughput almost reaches its maximum allowed value (achieved when no load restrictions are applied)[3]. Therefore, using network load threshold values above 90% has no advantage at all since TCP traffic throughput does not improve and voice quality is even further degraded, especially in very high traffic load conditions (600 www users). The delay values difference above 90% is not significant. These delays refer to an IP packet, which is the Service Data Unit (SDU) delivered to the RLC layer. This effect also indicates that there is an optimum margin for the network load threshold value that enables to offer a certain QoS level for voice users while handling TCP traffic as if no load limitations were applied. Through the above result, we can conclude a realistic and highly loaded UMTS network (voice users are prioritized over TCP users), TCP performance could be maintained if proper network load threshold values are selected and also if the networks load threshold value is around 80% then, a good TCP throughput is obtained and a good trade-off between packet loss ratio for voice users.
5. UMTS Evolution
Here I mentioned some of the forthcoming capabilities of UMTS, such as High Speed Downlink Packet Access (HSDPA).Technology experts worldwide are continuing to improve UMTS, empowering it with new capabilities that operators can phase in over time. New version of UMTS has deployed UMTS Release 99, the first deployable version of UMTS. Release 99 contains additional features such as video conferencing over circuitswitched connections that old version of UMTS has not yet implemented. After Release 99, version numbers are by release version rather than by year, and currently include Releases 4, 5, and 6.These successive versions add features such as: High Speed Uplink Packet Access (HSUPA) Comprehensive multimedia capabilities through a subsystem called IP-based Multimedia Services (IMS) Handling of voice functions in the packet domain (voice over IP) Integrated support for access networks based on WLAN Common radio resource management between GSM, GPRS, EDGE, and UMTS
Reference:
[1] Antonis Alexiou , Christos Bouras , Vaggelis Igglesis, Performance Evaluation of TCP over UMTS Transport Channels, Research Academic Computer Technology Institute, Greece [2] DevCentral White Paper (April 2004), UMTS Capabilities, Technology, and Applications [3] Juan Rendon, Ramon Ferrus, Anna Sfairopoulou, and Ferran Casadevall(June 2006.), Impact of UMTS load control mechanisms on TCP, IST Mobile and Wireless Communications, Mykonos, Greece, [4] K. Boman, G. Horn, P. Howard, and V. Niemi (October 2002), UMTS Security, IEE Electronics & Communication Engineering Journal [5] Neale J.D, 1 Jones E.V, and Zubrzycki J.T, Implications of UMTS on Digital Broadcasting an Newsgathering,, EMSTechnologies Canada, University of Essex, UK and BBC Research and Development, UK.
8. Discussion
UMTS allow very high-speed multimedia services such videoconferencing, full motion video, and Internet access and builds on the capability of todays mobile technologies by providing increased capacity, data capability. TCP could not perform efficiently in wireless environments because TCP over UMTS has a much high bit error rate. A variety of protocols are employed to carry IP packets through the UMTS infrastructure. however, a realistic and highly loaded UMTS network (voice users are prioritized over TCP users), TCP performance could be maintained if proper network load threshold values are selected and also if the networks load threshold value is around 80% then, a good TCP throughput is obtained and a good trade-off between packet loss ratio for voice users. Beyond UMTS new high data rate services offer high quality live video news interviews, broadcasting, communications and computing merging. Bluetooth, Broadband Radio Access Networks (BRAN) and HiPerLan are new high data rate services to beyond UMTS.
9. Acknowledgements
I wish to acknowledge my Supervisor Miss.GU Ganegoda for supporting the independent study and also to Faculty of Information Technology, University of Moratuwa for helping to find the resource. .