You are on page 1of 51

GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS (GSM)

1 Summer Internship Report

INTRODUCTION
Global system for mobile communication (GSM) is globally accepted standard for digital cellular communication. GSM is the name of standardization group established in 1982 to create a common European mobile telephone standard. At the beginning of the 1980s it was realized that the European countries were using many different, incompatible mobile phone systems. At the same time, the needs for telecommunication services were remarkably increased. Due to this, CEPT (Confrence Europenne des Posts et Telecommunications) founded a group to specify a common mobile system for Western Europe. This group was named Groupe Spciale Mobile and the system name GSM arose. This abbreviation has since been interpreted in other ways, but the most common expression nowadays is Global System for Mobile Communications.

HISTORY
1982: CEPT (Conference of European Posts and Telecommunications) establishes a GSM group in order to develop the standards for a Pan-European cellular mobile system. 1988: Validation of the GSM System. 1991: Commercial launch of the GSM service. 1992: Enlargement of the countries that signed the GSM-MoU> Coverage of

larger cities/airports. 1993: Coverage of main roads GSM services start outside Europe. 1995: Phase 2 of the GSM specifications Coverage of rural areas.

FEATURES
Low mobile and base stations costs Good subjective voice quality Compatibility with other systems such as ISDN (Integrated Services Digital Network) Open Network Architecture
2 Summer Internship Report

Speech Services Telephony(+Voice Mail) Short Message Service(SMS) SMS is similar to the paging service, but much more comprehensive, allowing bidirectional messages, store-and-forward delivery, and acknowledgement of a successful delivery.

GPRS (General Packet Radio Service)

GSM Standards
GSM-900 Standard The GSM-900 standard is a standard for digital voice transmission in the 900 MHz band. This so called primary band" includes two sub bands of 25 MHz. GSM-1800 Standard In GSM-1800, 1800 MHz band was allocated for digital mobile telephone services which have frequency of 75 MHz. This was three times the bandwidth allocated for GSM-900. GSM-1900 Standard GSM-1900 is the standard for the 1900MHz band. It includes the same network component as the GSM-900 or GSM-1800. The band width of this standard is 60 MHz.

3 Summer Internship Report

ARCHITECTURE

4 Summer Internship Report

Interfaces in GSM network

COMPONENTS OF GSM NETWORK


Whole network exist into three separate subsystems: Network Switching Subsystem (NSS) Base Station Subsystem (BSS) Network Management Subsystem (NMS)

Network Switching Subsystem (NSS) This consists of the Mobile services Switching Centre (MSC) and its associated system-control databases and processors together with the required interfaces. This is the part which provides for interconnection between the GSM network and the Public Switched Telephone Network (PSTN). It includes: Mobile Switching Center (MSC)
5 Summer Internship Report

Mobile services switching center (MSC) performs the switching functions for all mobile stations located in the geographical area covered by its assigned BSSs. Functions of the MSC include: Handling location registration and ensuring internetworking between mobile Call handling that copes with mobile nature of subscribers. Exchange of signaling information with other system entities.

station and VLR.

Home Location Register (HLR) The Home Location Register (HLR) contains the identities of mobile subscribers, their service parameters, and their location information. Functions of the HLR include: Identity of mobile subscriber Location information for call routing. ISDN directory number of mobile station.

Visitor Location Register (VLR) The Visitor Location Register (VLR) contains the subscriber parameters and location information for all mobile subscribers currently located in the geographical area controlled by that VLR. Functions of the VLR include: Identity of mobile subscriber. Any temporary mobile subscriber identity (TMSI) allocation. Location area where the mobile station is registered Copy of the subscriber data from the HLR. Authentication Center (AUC)
6 Summer Internship Report

Contains subscriber authentication data called authentication key (Ki). Generates security related parameters needed to authorize service using Ki. AUC generates unique data pattern called a cipher key (Kc) needed for encrypting user speech and data. Equipment Identity Register (EIR)

The Equipment Identity Register (EIR) is accessed during the equipment validation procedure when a mobile station accesses the system .It contains the identity of mobile station equipment which may be valid, suspect, or known to be fraudulent. Base Station Subsystem (BSC+BTS) Characteristics of the Base Station System (BSS) are: The BSS is responsible for communicating with mobile stations in cell areas. One BSC controls one or more BTSs and can perform inter-BTS and intra-BTS Handover. Each PLMN Should have at least one HLR One VLR is connected to several MSC ,but one MSC has one VLR o The BSS consists of three major hardware components: The Base Transceiver Station BTS The BTS contains the RF components that provide the air interface for a Particular cell .This is the part of the GSM network which communicates with the MS. The antenna is included as part of the BTS. The Base Station Controller BSC The BSC as its name implies provides the control for the BSS. The BSC communicates directly with the MSC. The BSC may control single or multiple BTSs. The Transcoder XCDR The Transcoder (XCDR) is required to convert the speech or data output from the MSC (64 kbit/s PCM), into the form specified by GSM specifications for transmission over the air interface, that is, between the BSS and MS (64 kbit/s to 16 kbit/s and vice versa)
7 Summer Internship Report

Network Management Subsystem (NMS) Network Management Subsystem is the third subsystem of the GSM network in addition to BSS and NSS.The function of NMS is to monitor various functions and elements of the network.It is a combination of number of workstations,servers and a router, which connects to the Data Communication Network(DCN)

8 Summer Internship Report

CALL SETUP IN GSM NETWORK

Handover Handover is the transfer of an existing voice connection to a new base station. The basic concept is simple: when the subscriber moves from the coverage area of one cell to another, a new connection with the target cell has to be set up and the connection with the old cell has to be released.

There are two reasons for performing a handover: Handover due to measurements occurs when the quality or the strength of the radio signal falls below certain parameters specified in the BSC. The deterioration of the signal is detected by the constant signal measurements carried out by both the mobile station and the BTS. As a consequence, the connection is handed over to a cell with a stronger signal.

9 Summer Internship Report

Handover due to traffic reasons occurs when the traffic capacity of a cell has reached its maximum or is approaching it. In such a case, the mobile stations near the edges of the cell may be handed over to neighboring cells with less traffic load. There are four different types of handover: Intra cell - Intra BSC handover Inter cell - Intra BSC handover Inter cell - Inter BSC handover Inter MSC handover

Generally, decision making for Hanover process is done by BSC. Location updates The subscriber does not stay in one place but keeps moving from one place to another. No matter how often or how quickly he moves, the network must be able to locate him continuously in case somebody wants to call him. The transaction that enables the network to keep track of the subscriber is called Location Update. The mobile phone constantly receives information sent by the network. This information includes identification (ID) of the VLR area in which the mobile is currently located. In order to keep track of its location, the mobile stores the ID of the area in which it is currently registered. Every time the network broadcasts the ID of the area, the mobile compares this information to the area ID stored in its memory. When the two IDs are no longer the same, the mobile sends the network a request, i.e. a registration inquiry to the area it has just entered. The network receives the request and registers the mobile in the new VLR area. Simultaneously, the subscribers HLR is informed about the new VLR location and the data concerning the subscriber is cleared from the previous VLR. These are the process comes under Location Update.

10 Summer Internship Report

TECHNOLOGY
GSM operates on four separate frequencies: we can find the 900MHz and 1,800MHz bands in Europe and Asia and the 850MHz and 1,900MHz (sometimes referred to as 1.9GHz) bands in North America and Latin America. GSM allows for eight Simultaneous calls on the same radio frequency and uses narrowband TDMA, the technology that enables digital transmissions between a mobile phone and a base station. With TDMA the frequency band is divided into multiple channels which are then stacked together into a single stream, hence the term narrowband. This technology allows several callers to share the same channel at the same time. The fundamental unit of time in this TDMA scheme is called a burst period and it lasts 15/26 ms (or approx. 0.577 ms). Therefore the eight time slots are actually burst periods, which are grouped into a TDMA frame, which subsequently form the basic unit for the definition of logical channels. One physical channel is one burst period per TDMA frame. TDMA (Time division Multiple Access) A channel gets the whole spectrum for a certain amount of time. In a TDMA system, data from each user is conveyed in time intervals called Time slots. Several slots make up a frame. Each slot is made up of a preamble plus information bits addressed to various stations .the functions of the preamble are to provide identification and incidental information and to allow synchronization of the slot at the intended receiver .Guard times are used between each users transmissions to minimize crosstalk between channels. Advantage of TDMA TDMA permits a flexible bit rate. TDMA offers the opportunity for frame-by-frame monitoring of the signal TDMA transmits each signal with sufficient guard time between time slots.

strength and bit error rates.

TRANSMISSION IN GSM
11 Summer Internship Report

GSM uses paired radio channels for transmission. One channel is used for uplink and another for downlink.

Transmission problems Whenever a mobile station is in contact with the GSM network, it is quite rare that there is a direct "line of sight" transmission between the mobile station and the base transceiver station. In the majority of cases, the signals arriving at the mobile station have been reflected from various surfaces. Two major factors affecting quality of transmission are: o o Distance between transmitter and receiver Reflections or obstructions

General Transmission problems affecting Transmission Quality: o Propagation delay o Shadowing


o

Multi path Propagation

12 Summer Internship Report

Solution The solution used to overcome this problem is called "adaptive frame alignment". The Base Transceiver Station measures the time delay from the received signal compared to the delay that would come from a mobile station that was transmitting at zero distance from the Base Transceiver Station. Based on this delay value, the Base Transceiver Station informs the mobile station to either advance or retard the time alignment by sending the burst slightly before the actual time slot. The base station also adopts this time alignment in the down link direction. Shadowing is generally a problem in the uplink direction, because a Base Transceiver Station transmits information at a much higher power compared to that from the mobile station. The solution adopted to overcome this problem is known as adaptive power control. Based on quality and strength of the received signal, the base station informs the mobile station to increase or decrease the power as required. This information is sent in the Slow Associated Control Channel (SACCH). A mobile station (and the base transceiver station) receives the same signal more than once. Depending on the distance that the reflected signals have travelled, they may affect the same information bit or corrupt successive bits. In the worst case an entire burst might get lost. There are a number of solutions that have been designed to overcome these problems: o Channel Coding o Frequency Hopping o Antenna Diversity

13 Summer Internship Report

CELL PLANNING

Initial information required for cell planning is: The likely geographical distribution of Mobile Units. The traffic behavior of subscribers. The required quality of service. The required geographical coverage.

All Cell Planning begins by making a Nominal Cell Plan.

This is a proposed layout of cells which meet the given: Quality Coverage Capacity requirements.

The traffic calculations are done with a unit called Erlangs. Needs Optimum spectrum usage More capacity High quality of service
14 Summer Internship Report

Low cost

Sectorization of cell The problem with employing omni-directional cells (Radiate waves to 360 degrees) is that as the number of MSs increases in the same geographical region, we have to increase the number of cells to meet the demand. To gain a further increase in capacity within the geographic area we can employ a technique called sectorization. A sectorization split a single site into a number of cells, each cell has transmit and receive antennas and behaves as an independent cell.

Advantages:

Can concentrate all the energy from the cell in a smaller area 60, 120, 180 degrees instead of 360 degrees, we can get a much stronger signal, which is beneficial in locations such as in-building coverage. Can use the same frequencies in a much closer re-use pattern, thus allowing more cells in our geographic region which allows us to support more MSs.

15 Summer Internship Report

16 Summer Internship Report

GLOSSARY
Abbreviations A A3 A5 A8 AB AC BCC BS BSC BSIC BSS BSSAP BTS CC CCS7, CCS#7 An interface that GSM recommendations define between Network Switching Subsystem and Base Station Subsystem Authentication algorithm Encryption Algorithm Authentication Algorithm Access Burst Authentication Centre Base Station Colour Code Base Station Base Station Controller Base Transceiver Station Identity Code Base Station System Base Station Subsystem Application Part Base Transceiver Station Country Code, Call Control Common Channel Signalling System no. 7

17 Summer Internship Report

Different parameters of GSM network IMEI International Mobile Equipment Identifier The IMEI is an internationally-unique serial number allocated to the MS hardware at the time of manufacture. It is registered by the network operator and (optionally) stored in the AuC for validation purposes. IMSI International Mobile Subscriber Identifier When a subscriber registers with a network operator, a unique subscriber IMSI identifier is issued and stored in the SIM of the MS. An MS can only function fully if it is operated with a valid SIM inserted into an <MS with a valid IMEI. TMSI Temporary Mobile Subscriber Identity A TMSI is used to protect the true identity (IMSI) of a subscriber. It is issued by and stored within a VLR (not in the HLR) when an IMSI attach takes place or a Location Area (LA) update takes place. At the MS it is stored in the MSs SIM. The issued TMSI only has validity within a specific LA. MSISDN Mobile Subscriber ISDN number The MSISDN represents the true or dialed number associated with the subscriber. It is assigned to the subscriber by the network operator at registration and is stored in the SIM. It is possible for an MS to hold multiple MSISDNs, each associated with a different service. MSRN Mobile Station Roaming Number The MSRN is a temporary, location-dependant ISDN number issued by the parent VLR to all MSs within its area of responsibility. It is stored in the VLR and associated HLR but not in the MS. The MSRN is used by the VLR associated MSC for call routing within the MSC/VLR service area. LAI Location Area Identity

18 Summer Internship Report

Each Location Area within the PLMN has an associated internationally unique identifier (LAI). The LAI is broadcast regularly by BTSs on the Broadcast Control Channel (BCCH), thus uniquely identifying each cell with an associated LA. The purpose of LAs is covered later in this course. CI Cell Identifier The CI an identifier assigned to each cell within a network. However, the CI is only unique within a specific Location Area. When combined with the internationally unique LAI for its associated LA, the Global Cell Identity (GCI) is produced which is also internationally unique.

BSIC Base Station Identity Code Each BTS is issued with a unique identity, the BSIC and is used to distinguish neighboring BTSs.

19 Summer Internship Report

INTELLIGENT NETWORK (IN)

20 Summer Internship Report

INTRODUCTION
In general, the Intelligent Network (IN) can be considered as an additional (network) layer on top of any bearer network, such as Public Switched Telephone Network (PSTN), Integrated Services Digital Network (ISDN), Broadband-ISDN (B-ISDN), Public Land Mobile Networks (PLMNs) and recently the Internet. In this respect the IN provides a service-oriented network architecture, which separates in principle service control functions from service switching functions, with typically both types of functions being implemented in different physical equipment. This is supported by a clear definition of the relationships between these functions, thus providing for network and vendor independence. Due to this separation of functions it is possible to introduce new services rapidly without having to change the functionality of the switches. This means the IN architecture allows operators to deploy and provide new services more quickly than in traditional switch-based service implementations, which is essential in a liberalizing telecommunications market of ever increasing competition. However, another major target of IN is service independence. During the development of many advanced telecommunication services it became clear, that all of these services contain similar functionality, i.e. are based on a set of "service components". Hence the idea was to identify generic sets of reusable service components, which could be (re)used for the construction of a new service. Examples for such service components are authentication, screen, user interaction, number translation, charge, etc. In this context there is often the notion of an IN programming interface which can be used for easy service creation. What is meant is that a service designer can make use of these service components, by combining them in order to "implement" a new service. These service components are referred to as "Service Independent Building Blocks (SIBs)". The resulting "service (logic) program" could be loaded into the network, i.e. into one or more Service Control Point (SCPs), and the new service is instantly available. Putting these aspects together it can be recognized, that the IN is more than just a new network architecture, since the IN aims to support both service and network independence.

21 Summer Internship Report

THE EVOLUTION OF NETWORKS


The stages of the network evolution are chronologically listed below and briefed in short using bulleted points:

Plain Old Telephone Service


Before mid-1960s, the service logic was hardwired in switching systems. Network operators met with switch vendors, discussed the types of services that customers required, negotiated the switching the services, and finally agreed upon a generic release date for feature availability. After this the network operator planned for the deployment of the generic feature/services in the switching network fabric.

Figure 1: Plain Old Telephone Service

Shortcomings This process was compounded for the network operator with switching systems from multiple vendors. So, services were not offered ubiquitously in an operators service area.

22 Summer Internship Report

A customer in one end of a city, country, or state may not have had the same service offerings as a person in another part of area.

Once services were implemented, they were not easily modified to meet individual customers requirements. It took years to plan and implement services.

Stored Program Control (SPC)


In the mid-1960s stored program control (SPC) switching systems were introduced. SPC was a major step forward because now service logic was programmable where, in the past, the service logic was hardwired. It was now easier to introduce new service. Shortcomings This service logic was not modular. It became increasingly more complicated to add new services because of the dependency between the service and the service-specific logic. Service logic that was used for one service could not be used for another service. As a result, if customers were not served by a SPC switching system, new services were not available to them.

Common Channel Signaling Network (CCSN)


All of the earlier processes seized the trunks in all of the switching systems involved. Hence, if the terminating end was busy, all of the trunks were set up unnecessarily. To avoid this in mid 1970s the CCSN or SS7 network for short. Signaling system number 7 is the protocol that runs over CCSN was developed. The SS7 network consists of packet data links and packet data switching systems called signaling transfer points (STPs).

23 Summer Internship Report

The SS7 network separates the call set up information and talks from common trunk that runs between switching systems. The call set up information travels outside the common path over SS7 network type of information transferred included permission for the call setup and whether or not the called party was busy.

Figure 2: Common Channel Signaling Network (CCSN)

Common Channel Signaling


SS7 technology frees up trunk circuits between switching systems for the actual calls. The SS7 Network enabled the introduction of new services, such as caller ID. The network was designed before the IN concept was introduced.

Intelligent Network (IN)

24 Summer Internship Report

During the mid-1980s, regional Bell operating companies (RBOCs) began requesting features that met the following objectives: Rapid deployment of services in the network Vendor independence and standard interfaces Opportunities for non-RBOCs to offer services for increased network usage

Telcordia Technologies responded to this request and developed the concept of Intelligent Network.

Figure 3:Intelligent Network1 (IN/1)

For the first time ever, after the IN/1 was introduced, the service logic got external to the

switching systems and got located in the database called Service Control Points (SCPs). Two services evolved that required IN/1 service logic, viz., the 800 (or Freephone)

service and Calling-Card verification (or Alternate Billing Service [ABS]).

25 Summer Internship Report

Because of the service specific nature of the technology, these services required two

separate SCPs. To communicate with the associated service logic, software was deployed in the

switching systems. This switching system software enabled the switching system to recognize when it was necessary to communicate with an SCP via the SS7 network. Service Control Point (SCP) The Service Control Point (SCP) is typically an on-line, fault-tolerant, transactionprocessing data base which provides call handling information as response to Service Switching Point queries. Service Control Points are high-capacity systems handling several hundred transactions per second or more than 100.000 calls an hour. It is a high capacity system with a response time requirement of less than half a second, and an availability of less than three-minutes-per-year downtime for a mated Service Control Point pair. Service Control Points are designed to support multi-service operation.

With the introduction of SCP concept, new operations and management systems became necessary to support service creation, testing, and provisioning. In the above figure, note the term service-specific management systems under the box labeled service management system. This means that the software- defined hooks or triggers are specific to the associated service. E.g. an 800 service has an 800-type trigger at the switching system, an 800-service database at the SCP, and an 800-service management system, to support the 800 SCP. In this service-specific environment, the 800-service set of capabilities cannot be used for the services (e.g., 900 Service). Although the service logic is external to the switching system, it is still service specific.

26 Summer Internship Report

At the first glance, Figure4 looks similar to Figure3. However there is one fundamental difference. Notice the wording Service-Independent Management Systems under the box labeled Service Management System. Now, following the IN/1800 service-specific example, the AIN service-independent software has a three-digit trigger capability that can be used to provide a range of three-digit services (800, 900, XXX, etc.) as opposed to 800 service-specific logic. Likewise, the SCP service logic and the Service Management System are serviceindependent, not service specific. AIN is a service-independent network capability.

Benefits of Intelligent Networks


The main benefit of intelligent networks is the ability to improve existing services and develop new sources of revenue. To meet these objectives, providers require the ability to accomplish the following: Introduce new services rapidly- IN provides the capability to provision new services or modify existing services throughout the network with physical intervention. Provide service customization- Service providers require the ability to change the service logic rapidly and efficiently. Customers are also demanding control of their own services to meet their individual needs. Establish vendor independence- A major criterion for service providers is that the software must be developed quickly and inexpensively. To accomplish this, suppliers must integrate commercially available software to create the applications required by service providers. Create open interfaces- Open interfaces allow service providers to introduce network elements quickly for individual customer services. The software must interface with other vendors products while still maintaining stringent network operation standards. Service providers are no longer relying on one or two vendors to provide equipment and software to meet customer requirements.

27 Summer Internship Report

Advance Intelligent Network (AIN)


AIN technology uses embedded base of stored program-controlled switching systems and SS7 network. It allows for the separation of service-specific functions and data from other network

resources. This feature reduces the dependency on switching system vendors for software

development and delivery schedules. Service providers have more freedom to create and customize services. The SCP contains programmable service-independent capabilities (or service logic) that is under the control of service providers. The SCP also contains service-specific data that allows service providers and their customers to customize services. With the IN, there are no such things as one size fits all- service is customized to meet individual needs.

28 Summer Internship Report

Benefit of AIN
Because service logic is under the service providers control, it is easier to create services in a cost-effective manner. Network providers can offer market-focused service trials by loading service logic in an SCP and triggering capabilities in one or more switching systems.

29 Summer Internship Report

INTELLIGENT NETWORK (IN)


Intelligent Network (IN) is a telephone network architecture originated by Bell Communications Research (Bellcore) in which the service logic for a call is located separately from the switching facilities, allowing services to be added or changed without having to redesign switching equipment. According to Bell Atlantic, IN is a "service-specific" architecture. That is, a certain portion of a dialed phone number, such as 800 or 900, triggers a request for a specific service. A later version of IN called Advanced Intelligent Network (AIN) introduces the idea of a "service-independent" architecture in which a given part of a telephone number can interpreted differently by different services depending on factors such as time of day, caller identity and type of call. AIN makes it easy to add new services without having to install new phone equipment. An Intelligent Network is a service independent telecommunications network. That is, intelligence is taken out from switches and placed into different computer nodes that are distributed throughout network. This provides network operator with means to develop and control services easily and efficiently. New capabilities can be added in the network very easily. This network uses SS7 protocol which Examples of IN services: Televoting Call screening Telephone number portability Toll free calls / Freephone Prepaid calling Account card calling Virtual private networks (eg : Family group calling)

30 Summer Internship Report

Centrex service (Virtual PBX) Private-number plans (with numbers remaining unpublished in directories) Universal Personal Telecommunication service (a universal personal telephone number) Mass-calling service Prefix free dialing from cellphones abroad Seamless MMS message access from abroad Reverse charging Home Area Discount Premium Rate calls Call distribution based on various criteria associated with the call Location Based Routing Time based routing Proportional call distribution (e.g. between two or more call centers or offices). Call Queuing

31 Summer Internship Report

IN Architecture
The main concepts (functional view) surrounding IN services or architecture are connected with SS7 architecture: Service Switching Function (SSF) or Service Switching Point (SSP): This is colocated with the telephone exchange itself, and acts as the trigger point for further services to be invoked during a call. The SSP implements the Basic Call State Machine (BCSM) which is a Finite state machine that represents an abstract view of a call from beginning to end (off hook, dialing, answer, no answer, busy, hang up, etc.). As each state is traversed, the exchange encounters Detection Points (DPs) at which the SSP may invoke a query to the SCP to wait for further instructions on how to proceed. This query is usually called a trigger. Trigger criteria are defined by the operator and might include the subscriber calling number or the dialed number. The SSF is responsible for entertaining calls requiring value added services. Service Control Function (SCF) or Service Control Point (SCP): This is a separate set of platforms that receive queries from the SSP. The SCP contains service logic which implements the behavior desired by the operator, i.e., the services. During service logic processing, additional data required to process the call may be obtained from the SDF. The logic on the SCP is created using the SCE. Service Data Function (SDF) or Service Data Point (SDP): This is a database that contains additional subscriber data, or other data required to process a call. For example, the subscribers prepaid credit which is remaining may be an item stored in the SDF to be queried in real time during the call. The SDF may be a separate platform, or is sometimes co-located with the SCP. Service Creation Environment (SCE): This is the development environment used to create the services present on the SCP. Although the standards permit any type of environment, it is fairly rare to see low level languages like C used. Instead, proprietary graphical languages have been used to enable telecom engineers to create services
32 Summer Internship Report

directly. The languages usually belong to 4G languages, the user can use Graphical Interface to manipulate between different functions to formulate a service. Specialized Resource Function (SRF) or Intelligent Peripheral (IP): This is a node which can connect to both the SSP and the SCP and delivers additional special resources into the call, mostly related to voice data, for example play voice announcements or collect DTMF tones from the user.

33 Summer Internship Report

IDEA IN Architecture

DRS

SPACE

C P1

CP2

CP3

CP4

OSP

SCM/ MOC

SCM/ MOC

FEP1

FEP2

FEP3

FEP4

FEP1

FEP2

FEP3

FEP4

MSC1
Summer Internship Report

MSC2
34

Mobile connects to BTS which then connects to BSC, which finally connects to MSC, when MSC sends signaling to IN. To handle the overload and/or breakdown situation there are all MSCs connected to two sets of FEPs (each set having four FEPs) through SS7 links. This connection follows SS7 protocol. Each set of the FEPs is connected to a SCM. The SCM is connected to the CPs. This server has four call processors and is also connected with DRS, SPACE and OSP. All the layers above FEP follow IP (internet protocol). SPACE: for activating call process record (CPR), and for viewing customer record DRS: for viewing CDRs (call data record) OSP: It is third party interface which are connected with different ports with SCP. CP: it is a control point. Where customers updated information exists. MOC/SCM: it is used for alarm monitoring and SS7 configuration. FEP: it is used to connect physical SS7 links to MSCs
Call arrives at the Server, when it takes the customer profile from the NODE. After it processes the call and sends the updated the same subscriber profile into the all connected nodes and also records its service specific CDRs into DRS.

Overview of GPRS

The existing GSM networks are based on circuit switching techniques. For data services that are based on Internet Protocol (IP) such as e-mail and web browsing, GSM circuit switching is inefficient.

35 Summer Internship Report

Circuit switched & packet switched connections

Circuit switched connections

Standard GSM uses circuit switched (CS) connections. Each time a connection is required between two points, a link is established between them, and network resources are reserved and dedicated for a subscriber's use for the entire duration of the call. Circuit switched connections have relatively low delay in the network and have traditionally been used in fixed and mobile networks for speech and data.
Packet switched connections

Data networks, such as the Internet, Frame Relay and X.25 use packet switched (PS) connections. With packet switching, the data is divided up into packets, each packet having an identifier or address that is used by routers in the network to pass the packet to its intended destination. GPRS brings packet switching techniques to GSM networks.

Bandwidth in a packet switched (PS) network is not reserved continuously, as is the case with circuit switching. Instead, network bandwidth is allocated when required and released when not needed. 36 Summer Internship Report

In a PS network, we can also simulate the way of working of a circuit switched (CS) network. We could create the impression to the user that there is a permanent connection between the two ends of the connection; but in practice, the connection is only there when data is being transmitted. This is referred to as a virtual connection. Data packets from different users are statistically multiplexed by the first router onto a single transmission path. With a GPRS mobile connection, the packets from different mobile stations can be multiplexed in a statistical way over the air interface that provides very efficient use of the radio channels. Each radio channel is only occupied by the user when there are data packets to transmit or receive. Details of this operation are provided in the Air Interface module. Statistical multiplexing means that the user data may have variable delay in the network. Therefore, a particular Quality of Service (QoS) must be negotiated between the data user and the network to provide an appropriate level of service for various data applications.

GPRS and GSM


The General Packet Radio Service (GPRS) upgrades GSM data services by providing packet switched connections from the mobile station (MS) to data networks such as corporate local area networks (LANs) and the Internet. GPRS transmits data packets directly from the MS, and techniques are employed to enable the radio resources at the air interface to be used only when there is data to be sent or received. Therefore, GPRS is well adapted to the "bursty" nature of data applications. While the current GSM system was originally designed with an emphasis on voice applications, the main objective of GPRS is to offer access to standard data networks using protocols such as TCP/IP (Transmission Control Protocol/Internet Protocol) and X.25. These external data networks consider GPRS to be just another sub-network. A gateway in the GPRS network behaves as a router and hides the specific features of GPRS from these external data networks.

37 Summer Internship Report

The concept of merging GSM and GPRS networks is shown in Error: Reference source not found.

MSC

PSTN

BTS

BSC

GPRS Core SGSN GPRS Backbone IP Network GGSN

Internet

GPRS offers link-by-link transmission of packets across the network in distinct phases. For example, once a data packet has been transmitted across the air interface, radio resources can be released for other subscribers. The data packet travels on to its destination through the GPRS backbone network and then into a data network such as the Internet. Using transmission links in this way makes very efficient use of the network and air interface bandwidth and also allows operators to offer cheaper services, since charging can be based on the amount of data sent or received. GPRS offers a very flexible range of data rates, from less than 100 bit/s to over 100 kbit/s (according to the standards). With any high-speed mobile data network, there is a trade-off between data rate and coverage area. New, faster data services have emerged with a more relaxed requirement for coverage area and error rate. The GSM standard now includes a 14.4 kbits/s data service. This is achieved by reducing the error protection mechanism and is therefore only suitable over a moderate coverage area. By using several TDMA timeslots for data transmission, GPRS can increase the total data rate to more than 100 kbit/s. Applications

38 Summer Internship Report

that need less than one TDMA timeslot for data transmission can share that time-slot with other users. Transactions such as credit card checks and a variety of telemetric applications benefit from the fast session set-up in GPRS. For example, integrated GPRS mobiles in cars could be used for security purposes and all kinds of remote control and surveillance applications. The high bit rates provided by GPRS allow short response times even if there is a large amount of data to be transmitted.

The need for data services


Service differentiation
Mobile data services make it possible to offer innovative, segmented services to different user groups, and attract new subscribers. The data users may also be the highest speech users, so capturing their business can also increase speech revenues for an operator. When thinking about benefits and services, we could have a look at the different views of GPRS according to the different parties implied. These are shown in the following pictures:

Conceptual view on GPRS


The three important links or networks in a GPRS connection are:

GSM radio part or BSS which provides the radio access GPRS core representing the core GPRS network Access to an external network through an access point.

GPRS core has to perform a translation between the GSM protocols and the IP based protocols.

39 Summer Internship Report

GSM Voice

Access Point BTS BTS BSC BSC GPRS Core GPRS Core Internet Internet Corporate Intranet Corporate Intranet

Shared GSM and GPRS Infrastructure

GPRS Infrastructure

IP World

User's view on GPRS (Client-Server Model)


The user's view of GPRS consists of two things:

User Terminal Service Provider.

There is a large cloud that exists between the two, and the user is not interested in the details of this cloud. The user has also got used to the quality of service offered by data networks over fixed lines and will expect similar quality over the GPRS network.

Me "I just want to reach the service. I am not interested in dirty details." Network

Service

40 Summer Internship Report

Implementor's view on GPRS

Subscriber Voice Radio Network BSC MSC/VLR HLR CCB Traditional GSM Operator Infrastructure

CG SGSN NMS

Billing Systems Integration ???

IT Infrastructure Internal DNS Border Gateway GPRS Roaming LIG Inter-Operator GPRS Backbone Network IP Access Routers Firewalls Addressing Authentication Security Billing DNS

GGSN Help Desk NMS

Internet Access Corporate Access

External Services, WAP and others...

The implementers view looks at the practical aspects needed to get the network working. The architecture of the GPRS network will be covered later

GPRS brings benefits to the end-users


The Internet has become a part of our everyday life. GPRS gives a direct link between the worlds of the Internet and mobile communications.

41 Summer Internship Report

GPRS is different from current GSM data services. Firstly, it allows users to access data as they would in their office LAN. The mobile users do not have to connect to the network each time they want to transfer data they can stay connected all day. GPRS enables instant, always connected applications. Secondly, GPRS allows charging users for the actual amount of data they transfer. This makes a whole new area of mobile data applications possible. With the higher transmission speeds provided by GPRS, end-users will find that file downloads are faster, new applications become possible, and data services overall are more attractive. All this means that, for example, a user browsing web pages will be able to download pages faster and also will not have to pay for the time between each page download when they are reading the last page.

The main advantages for operators


More revenue
Data services offer possibility for an operator to gain revenue by providing more than a mobile connection. Data services provide additional revenue from the type of content accessed and the amount of content transferred during that connection.

Huge potential market for data services


With close to 400 million GSM mobile phone users and over 150 million Internet users worldwide, mass mobile communications and universal access to information are two of the major trends of our age. In many countries, there are now more people with a mobile phone than without one, and within the next decade, there will be more mobile phone users worldwide than fixed telephone users. On the Internet side, many fixed network operators now carry more data traffic than voice traffic. The Internet has evolved into an interactive and multimedia medium that millions of people are incorporating more and more into their everyday lives both at work and at home. Separately the mobile phone and the Internet are powerful forces in their own rights. But together they 42 Summer Internship Report

promise to be yet more powerful Short Message Service (SMS) is a good DOCUMENTTYPE example of how hungry users are for data services. Even with a difficult user interface and relatively high tariffs, SMS traffic is booming! TypeUnitOrDepartmentHere
TypeYourNameHere TypeDateHere

GPRS uses excess voice capacity for data


A significant amount of excess capacity already exists in the network and that can be used by GPRS even during the busy hour! For example, a two-TRX cell can carry up to 15 Erlangs of speech traffic. At 2% blocking probability, it can only actually support eight Erlangs of speech traffic. Therefore, 40% of the potential capacity is unused. GPRS can use some of this excess capacity. This idea is shown in Figure 4. The green area is the capacity used for circuit switched calls. The rest of the available capacity could be used for GPRS.

GPRS packets can be transmitted in 16 the short free periods between busy hour calls 14 2TRX = 14 Speech TS 2% blocking means 8 Erlang speech traffic On average 6 TS free !
16 14 12 10 TC 8 H 6 4 2 0 03:00 06:00 09:00 12:00 15:00 18:00 21:00 00:00

12 10 TCH 8 6 4 2 0 1:00 PM 1:15 PM 1:30 PM 1:45 PM

Figure 4.

Free capacity in GSM

Usage patterns for data services may also be different to speech services and with additional off-peak tariffing incentives, the operator can use data services to capitalise on the excess off-peak capacity in the network.

43 Summer Internship Report

Smooth path to 3G services


Remember that although re-use of existing infrastructure is obviously desirable when moving to UMTS, the biggest investment made is in the customer base and service provision capabilities. This must be the major focus when moving to UMTS. Evolution from 2G to 3G is dealt with in detail in the last module.

44 Summer Internship Report

Services, users and operators


GPRS applications
In addition to the traditional access selling business, as in the case of GSM, a GPRS operator can now choose to enter the business of selling ISP and/or value-added services (VAS) to customers. This would mean new sources of revenue from the following:

Basic ISP functions (Internet access, WWW homepages, newsgroups, etc.) Value-added services Hosting value-added service providers Brokering wireless access (WAP or non-WAP) to value-added service providers

Providing business users access to their office LANs will probably make up a major part of the revenue, at least in the beginning of GPRS. In the long run, with increased GPRS penetration and cheaper GPRS mobile stations, one should not forget such possibilities in the private user sector as, for example, on-line gaming and chatting.

Service examples
Already there are a number of value-added services via SMS. The same kind of applications could be implemented using GPRS. The mobile subscriber would then be able to enjoy the same services, only faster. Some typical VAS examples today

Bus, train and airline information: arrivals, departures, delays, all buses passing the nearest street corner, etc. Locating restaurants with a specific menu item Weather information, news, sports headlines and scores Buying products from Vending Machines using hand-held terminals Lottery results sent to a user as soon they are known Banking account balance and transactions, etc Jokes, horoscope, and other entertainment information in the locality Stock information

45 Summer Internship Report

The real limitation is the imagination of the developers. Strategic alliances with value-added service providers might be an idea for many operators. Most of the services that may become popular in the future have not yet been invented.

GPRS users
GPRS offers a new set of data services, which means new possibilities in the market, that is, new types of subscribers and new types of operators. GPRS users can be classified into three types and these are discussed next.

Private users
Private users' demand will be primarily for value-added services. They want access to the Internet, personal messaging (e-mail) through a mobile hand-held all-in-one communicator such as a WAP terminal or mobile enabled PDA.

MMM (Mobile Media Mode) allows regular web browsing in an all-in-one communicator for mobile delivery of information. Content owners are very interested in this medium.

Business users
The second and most important category of users is the business user who will want secure access to corporate intranet IP networks for email, intranet and Internet browsing, database lookup and entry, etc. It is expected that most of the income will be from this category of users as was the case in the early days of GSM. Business users usually have a laptop and hence will not need an all in one communicator.

GPRS can also be used as a Mobile ISP for small enterprises whose staff are mobile and need access to data services while on the move. A mobile operator can provide complete ISP service package. Package pricing (bundling) of e-mail, web services, and mobile voice can help to attract and retain mobile users. GPRS can simply provide transparent access to the

46 Summer Internship Report

customers ISP. With these options, the idea of a remote-office becomes a reality

Industrial applications
The third category of users is industrial applications such as delay insensitive data measurements from remote location, telematics, vending machines, transmission of images from cab drivers to central locations, monitoring the performance of sickly patients, and highspeed trains and trucks.

As with most technology available today, the fourth category of GPRS users are applications which have not yet been invented, for which packet switched wireless data transmission through GPRS may be the only choice. One example is computer games played by users in a virtual reality and mobile environment

Mobile access operator

Internet

WWW
ISP or content provider

Mobile access operator

In the mobile access operator model, an operator would act as a 'transparent bit-pipe', not adding one's own value-added services or acting as an ISP. The operator simply sells the service of moving data 47 Summer Internship Report

packets between the subscriber and an ISP or other external data networks. In this model, the operator has very limited possibilities for differentiation when it comes to, for example, price, bit rate and availability, and is very much in the hands of the ISP. In addition, the ISPs control the end-customers through actual services and content access. Choosing this path involves small risks for the operator the investment cost is lower, but the opportunities for revenue are limited.

Key points
GPRS uses a packet-based switching technique which will enhance GSM data services significantly, especially for bursty Internet/intranet traffic. Some application examples:

Bus, train, airline real-time information

Locating restaurants and other entertainment venues based on current location Lottery E-commerce Banking E-mail Web browsing

The main advantages of GPRS for users:


Instant access to data as if connected to an office LAN

Charging based on amount of data transferred (not the time connected) Higher transmission speeds

The main advantages for operators:


Fast network roll-out with minimum investment Excess voice capacity used for GPRS data Smooth path to 3G services
48

Summer Internship Report

In circuit switching, each time a connection is required between two points, a link between the two points is established and the needed resources are reserved for the use of that single call for the complete duration of the call. In packet switching, the data to be transferred is divided up into packets, which are then sent through the network and re-assembled at the receiving end.

49 Summer Internship Report

Glossary
ATM BSC BSS BTS CONS CLNS EDGE ETSI GGSN GPRS GSM GSN HLR IP ITU ITU-T LAN ME MM MoU MS MSC MT NSS OMC Asynchronous Transfer Mode Base Station Controller Base Station Subsystem Base Transceiver Station Connection-Oriented Network Service Connection-Less Network Service Enhanced Data Rates for GSM Evolution European Telecommunications Standards Institute Gateway GPRS Support Node General Packet Radio Service Global System for Mobile Communications GPRS Support Node Home Location Register Internet Protocol International Telecommunication Union Telecommunication standardisation sector of ITU Local Area Network Mobile Equipment Mobility Management Memorandum of Understanding Mobile Station Mobile (services) Switching Centre Mobile Termination Network and Switching Subsystem Operations and Maintenance Centre 50 Summer Internship Report

PDN PDP PLMN PPP PSPDN PSTN PTM DRS SPACE CP OSP SCM FEP MSC DRS SPACE CP OSP SCM FEP MS

Packet Data Network Packet Data Protocol Public Land Mobile Network Point to Point Protocol Packet-Switched Public Data Network Public-Switched Telephone Network Point-To-Multipoint Data Repository System Subscriber Provisioning and Creation Environment Call Processors Open Service Platform SS7 Configuration Manager Frontend Processor Mobile Switching Service Control Data Repository System Subscriber Provisioning and Creation Environment Call Processors Open Service Platform SS7 Configuration Manager Frontend Processor Mobile Switching Service Control

51 Summer Internship Report

You might also like