Академический Документы
Профессиональный Документы
Культура Документы
NSS16/UMTS03
Wireless CCN Overview
Student Guide
Information is subject to change without notice. Nortel Networks reserves the right to make changes in design or components as
progress in engineering and manufacturing may warrant.
* Nortel Networks, the Nortel Networks logo, the Globemark HOW the WORLD SHARES IDEAS, and Unified Networks are
trademarks of Nortel Networks.
Trademarks are acknowledged with an asterisk (*) at their first appearance in the document.
ii Nortel Networks Confidential
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential iii
Publication history
May 2002
Issue 16.02 UMTS03
This standard issue contains information on the NSS16/UMTS03 version.
November 2002
Issue 16.01 UMTS03
This draft issue contains information on the NSS16/UMTS03 version.
July 2002
Issue 15.02 UMTS02
This standard issue contains information on the NSS15/UMTS02 version.
April 2002
Issue 15.01 UMTS02
This draft issue contains information on the NSS15/UMTS02 version.
February 2002
Issue 14.02 UMTS01
This standard issue contains information on the UMTS01 version. The
major changes included in this document are: the product version, and the
curriculum paths.
October 2001
Issue 01.01 UMTS01
This standard issue contains information on UMTS01 version.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential v
Objectives 0
Course Objectives
Describe the ISO model for communications and the CCS7 signaling
standard.
Discuss the UMTS implementation of CCS7 signaling and its role in the
UMTS interfaces.
Describe from a signaling perspective:
location update
authentication
ciphering
call setup and clear down
Describe the handover procedures.
Describe the supplementary services.
External : http://www.nortelnetworks.com/training
UM931 UM930
Wireless CCN Overview Wireless DMS Overview
"Confidential information -- may not be copied or disclosed without permission".
UM950
Wireless DMS Maintenance (1)
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential About this Course vii
UM931 UM930
Wireless CCN Overview Wireless DMS Overview
"Confidential information -- may not be copied or disclosed without permission".
UM950
Wireless DMS Maintenance (1)
UM951
Wireless DMS Maintenance (2)
Optional
UM955 UM957
Wireless SDM/FT Maintenance Wireless Supernode
and Administration Billing Application Overview
This curriculum path is designed for anyone involved as a team member into
the design of any DMS switch. This curriculum path begins with the DMS
Maintenance Beginner curriculum path, followed by:
DMS-CORE
ENET
XA-CORE
Patches
FTP
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential About this Course ix
UM 10
UMTS System Description
"Confidential information -- may not be copied or disclosed without permission".
UM931 UM930
Wireless CCN Overview Wireless DMS Overview
UM968
NSS16/UMTS03
Delta Release
The Core Circuit Specialist curriculum path begins with one of the following
course:
UM931 UM930
Wireless CCN Overview Wireless DMS Overview
"Confidential information -- may not be copied or disclosed without permission".
UM967
NSS15/UMTS02
Delta Release
UM970 UM974
Wireless DMS Wireless DMS CCS7
MSC/VLR Translations Operation and Datafill
UM972
Wireless DMS-HLR
Service Datafill
UM900
Wireless DMS IN
Operation and Datafill
The Core Circuit Datafill Specialist curriculum path begins with the
curriculum path of the Core Circuit Specialist curriculum path followed by
one of the two courses:
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential About this Course xi
UM931 UM930
Wireless CCN Overview Wireless DMS Overview
UM950
"Confidential information -- may not be copied or disclosed without permission".
UM957
Wireless SuperNode Billing Application
Overview
UM 68
UMTS OAM Introduction
UM937
Wireless OMC-S OAM
The Core Circuit Supervisor curriculum path begins with the DMS
Maintenance Beginner curriculum path, followed by one the the two
following courses:
Support Material
Other materials related to the course include:
411-2231-010 DMS-MSC Product Guide
411-2231-310 GSM Family CCS7 Family Application Guide
411-2231-451 DMS-MSC Customer Data Schema
411-2281-451 DMS-HLR Customer Data Schema
411-3001-451 Base Telecom Customer Data Schema
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential xiii
Contents 1
Lesson 1
GSM/UMTS History and Characteristics 1-1
Objectives 1-1
UMTS History and Characteristics 1-2
GSM 1-2
CDMA 1-3
D-AMPS 1-3
PDC 1-3
Third Generation Mobile Networks 1-4
Cellular System Architecture and Concepts 1-6
What is a Cell? 1-6
Cell Splitting 1-6
What is a Cellular Geographic Service Area? 1-7
UMTS Public Land Mobile Network Overview 1-7
Coverage Area of the UMTS PLMN 1-8
Routing Area (RA) 1-9
GSM versus UMTS 1-10
Review Questions 1-11
Lesson 2
UMTS Architecture and Components 2-1
Objectives 2-1
Evolving from GSM to UMTS 2-2
GSM Background 2-2
Evolving from a GSM to a GPRS Network 2-3
UMTS Architecture Overview 2-5
UMTS Network Components 2-7
User Equipment (UE) 2-8
Universal Subscriber Identity Module (USIM) 2-10
UMTS Terrestrial Radio Access Network (UTRAN) 2-13
Lesson 3
OAMP & Added Components 3-1
Objectives 3-1
Added Components 3-2
SuperNode Data Manager Fault/tolerant Cabinet 3-4
OMC-S Element Manager 3-5
OMC-S Element Manager Application 3-6
USP Graphical Interface 3-7
HLR-PS Application 3-9
Provisioning Interfaces 3-9
Call Intercept System 3-11
Call Monitoring 3-11
Call Intercept System Provisioning 3-12
SuperNode Billing Application 3-13
Voice Mail System 3-14
Intelligent Networks 3-16
Turnkey Services 3-18
CAMEL Ph3 and GSM16 3-20
Review Questions 3-21
Lesson 4
Introduction to CCS7 4-1
Objectives 4-1
Introduction to Common Channel Signaling System #7 4-2
Signaling 4-2
Per-Trunk Signaling (PTS) 4-3
Common Channel Signaling (CCS) 4-4
What is CCS7? 4-5
CCS7 Signaling Advantages 4-5
Transaction Services 4-6
Signaling Network Management 4-6
CCS7 Network 4-7
Signaling Point 4-7
Service Switching Point 4-8
Signaling Transfer Point 4-8
Service Control Point 4-8
Integrated Node 4-8
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential Contents xv
Lesson 5
CCS7 Protocol 5-1
Objectives 5-1
CCS7 Protocol 5-2
Standardization 5-2
OSI Model and CCS7 5-4
UMTS CCS7 Protocol 5-5
Message Transfer Part Layer (MTP) 5-7
Signaling Connection Control Part layer (SCCP) 5-8
Radio Access Network Application Part (RANAP) 5-9
Transaction Capabilities Application Part Layer (TCAP) 5-10
Mobile Application Part Layer (MAP) 5-10
User Part Layer 5-10
Application Entities 5-11
UMTS CCS7 Protocol Architecture 5-13
Review Questions 5-14
Lesson 6
UMTS CCN Interfaces 6-1
Objectives 6-1
UMTS Interfaces 6-2
Iu-CS Interface 6-3
B-interface 6-6
C-interface 6-7
D-interface 6-8
E-interface 6-9
F/G-interfaces 6-10
Review Questions 6-11
Lesson 7
UMTS Call Signaling 7-1
Objectives 7-1
UMTS Procedures 7-2
UE Location Update Procedures 7-2
SuperCharger 7-6
Authentication and Key Agreement 7-11
Background 7-11
Translation Between 2G and 3G Security Information 7-12
Authentication Procedure 7-12
UMTS Security Mode 7-15
Integrity 7-15
Ciphering 7-17
Security Mode Call Flow 7-18
Call Processing 7-20
Mobile Station Paging 7-20
Paging 7-20
PSTN to Mobile Terminating Call Setup 7-21
UE to PSTN (mobile originated) 7-23
Mobile-to-mobile (UE to UE) 7-25
UE to UE call termination 7-27
Review Questions 7-28
Lesson 8
UMTS Handover 8-1
Objectives 8-1
UMTS Handover Overview 8-2
UMTS Handover Types 8-3
SRNS relocation 8-5
UMTS CCN Handover 8-6
RANAP and BSSMAP Handover Message Equivalency 8-7
Intra UMTS MSC SRNS Relocation 8-8
Procedure for Intra-UMTS MSC SRNS Relocation 8-8
Inter UMTS MSC Handover 8-10
Basic inter-MSC Handover 8-10
Subsequent inter-MSC Handover 8-12
Subsequent Handback Handover 8-14
Inter System Handover 8-16
Intra MSC Handover Procedures 8-17
Basic inter-MSC Inter System Handover 8-18
Review Questions 8-21
Lesson 9
UMTS Supplementary Services 9-1
Objectives 9-1
DMS-MSC Supplementary Services 9-2
Call Independent Supplementary Services (CISSs) 9-7
Supplementary Services (SS) 9-8
IMSI Based SS 9-9
BSG Based SS 9-9
Number Identification Supplementary Services 9-9
Call Offering Supplementary Services 9-11
Call Forwarding Busy 9-12
Call Forwarding Not Reachable 9-13
Call Completion Supplementary Services 9-15
Multi-Party Supplementary Services 9-15
Closed User Group 9-15
Charging Supplementary Services 9-16
Explicit Call Transfer 9-17
Malicious Call Trace (MCT) 9-17
Call Restriction Supplementary Services 9-17
Proprietary Services 9-23
Class of Service 9-23
Hotline Routing 9-25
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential Contents xvii
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential 1-1
Lesson 1
GSM/UMTS History and Characteristics
Objectives 1
Objectives
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 1. GSM/UMTS History and Characteristics 1-2
Digital
"Confidential information -- may not be copied or disclosed without permission".
Worldwide
Analog Digital
not
IMT-2000
National Compatible
(ITU)
NMT GSM
TACS CDMA (IS-95)
AMPS D-AMPS
R2000 PDC
UMTS
CDMA 2000
1990 2000
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 1. GSM/UMTS History and Characteristics 1-3
In the early 1980s, the limitations of the existing analogue cellular systems
became obvious to European service providers.
The demand was increasing faster than the capacity of the existing
systems.
Incompatibility between the different systems did not allow mobile users
in the Total Access Communications Telephone Systems (TACS) to
access the Nordic Mobile Tlephone (NMT) networks. Likewise, the users
in the NMT networks could not access the TACS systems.
The redesign and implementation of a new system to overcome these
limitations would have been too costly for any single European market. The
solution seemed to lie in a new common design involving the cooperation of
several countries.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential GSM/UMTS History and Characteristics 1-3
CDMA
The origins of CDMA are in the military field and navigation systems.
During the 1950s, CDMA was used to counteract intentional jamming. It
may also have been used during World War II.
D-AMPS
Advanced Mobile Phone Service: an analogue cellular communications
system derived from ADC and used in the US, and which operates in the 800-
MHz band. AMPS covers the entire country, and is utilized by 80% of the US
mobile phone subscribers. It has been introduced into the UK and Japan in
slightly modified form as the TACS system.
PDC
Personal Digital Communication: a digital cellular standard used in Japan.
Digital mobile phones have been standardized under PDC. In the case of the
PDC standard, primarily six channel TDMA technology is applied. PDC is a
standard unique to Japan, which renders such phone units incompatible with
devices that adopt the more worldwide prevalent GSM standard.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential GSM/UMTS History and Characteristics 1-5
Standardization Bodies
UMTS
"Confidential information -- may not be copied or disclosed without permission".
3G *33
CDMA2000
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 1. GSM/UMTS History and Characteristics 1-4
UMTS uses a new radio technology called Wide Band Code Division
Multiple Access (W-CDMA) as opposed to the Time Division Multiple
Access (TDMA) radio technology used by GSM. The major difference being
that instead of using narrow radio channels which are time division
multiplexed, W-CDMA uses wide radio channels where each communication
channel is identified by a unique code. This allows greater flexibility in the
characteristics of the traffic channel that can be offered to the user. It also
enables easier radio planning, as there is no longer a requirement to ensure
that a buffer zone exists between transmitters using the same radio
frequencies.
What is a Cell?
The term cellular comes from the name given to the areas or cells into which
a coverage region is divided. Cells are represented as hexagonal in shape.
However, because of constraints imposed by natural terrain and man-made
structures, actual cells are not perfectly hexagonal in shape.
Cell Splitting
Splitting an area into smaller ones increases the number of served subscribers.
In this way:
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential GSM/UMTS History and Characteristics 1-7
24
23
"Confidential information -- may not be copied or disclosed without permission".
23
Town
22 Rural
40
Suburb
100 60 60 60
24 Highway
100
100
20
60 100
100
20
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 1. GSM/UMTS History and Characteristics 1-5
5
1 3 7 10 11 13 14 15 18
2 6 9 12
4 8 17 16
Location Area 1 Location Area 2 Location Area 3
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 1. GSM/UMTS History and Characteristics 1-6
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential GSM/UMTS History and Characteristics 1-9
3G SGSN
3G SGSN VLR
3G SGSN
VLR
"Confidential information -- may not be copied or disclosed without permission".
RA 5
RA 2
RA 4
RA 3
RA 1
LA 3
LA 2
LA 1
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 1. GSM/UMTS History and Characteristics 1-7
MSC provides combined support for UMTS (3G) and GSM (2G) subscribers
TSC
BTS 2G
UMSC
&LUFXLW &RUH
"Confidential information -- may not be copied or disclosed without permission".
RA2
RA1
RA1
LA1
Wireless ,QWHUQHW
GWY GGSN
RNC
3DFNHW &RUH
3G SGSN
RA1 Packet
SAC1 SAC2 ,QWUDQHWV
GwY
LA1
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 1. GSM/UMTS History and Characteristics 1-8
The CellId information is used when a call is accessed from a GSM radio
network.
CellId is used for both routing and services.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential GSM/UMTS History and Characteristics 1-11
Review Questions 1
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential 2-1
Lesson 2
UMTS Architecture and Components
Objectives 2
Objectives
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-2
NSS
BSS
MSC
"Confidential information -- may not be copied or disclosed without permission".
BSC TRAU
Um
A
Ater PSTN
Abis
B
MS
C
BTS
D VLR
HLR/
AuC
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-3
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-3
The NSS (Network and Switching Subsystem) includes the equipment and
functions related to end-to-end calls, management of subscribers, mobility,
and interfaces with the fixed network also called the PSTN (Public Switched
Telephone Network).
MSC
Um PSTN
PSTN
BSC TRAU
A
"Confidential information -- may not be copied or disclosed without permission".
MS BTS
D
HLR/
Agprs AuC
Gr
GGSN
Gb Gb Private
Frame Private
Frame IPIP
Relay
Relay Backbone Gn
Backbone Gn Backbone
Backbone
PCU
SGSN Gi
External
PacketExternal
PacketNetworks
Intranet, Networks
Intranet,Internet
Internet
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-4
GPRS (General Packet Radio Service) adds two new network entities, the
SGSN (Serving GPRS Support Node) and the GGSN (Gateway GPRS
Support Node). There is no hardware impact on the BTSs. GPRS represents a
software upgrade of the BSS, except for the introduction of PCUs to support
the packet-oriented nature of the Gb interface between the PCU and the
SGSN.
The architecture of the GPRS is designed so that signaling and high-level data
protocols are system independent. Only the low-level protocols in the radio
interface must be changed to be capable of operating the same service.
In addition to routing and data transfer functions, the SGSNs and GGSNs
collect charging statistics used as a basis for billing.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-5
Circuit Domain
Packet Domain
User Equipment
Network
NetworkManagement
Management
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-5
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-7
Uu 3G MSC
RNC PSTN
Iu TRAU PSTN
Iub (ATM) (CS & PS) Iu CS
"Confidential information -- may not be copied or disclosed without permission".
UE Node B B C
(BTS)
Iur
TRAU Circuit Domain
VLR D
SGSN HLR/
Uu AuC Internet
Internet
Iur Gr
Wireless GateWay
Iub (ATM)
Packet
Packet
Packet 3G
Backbone
Backbone Intranets
UE Node B Backbone GGSN Intranets
RNC
(BTS)
Iu PS Packet Domain
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-6
Card
The Smart Card to use
UMTS
Mobile
Equipment
Speech USIM Card
Subscriber IMEI
Data IMSI
MSISDNs Fax TMSI
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-7
The User Equipment provides generic radio and processing functions to access
the UMTS network through the radio interface. The basic mandatory features
of the MS are:
display of the called number
indication of the call progress signals
country/PLMN indication and country/PLMN selection
short message service
service indicator
emergency calls capabilities (possible without USIM card)
dual tone multi - frequency (DTMF)
support encryption
subscription identity management
error protecting
signal modulation.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-9
The User Equipment includes radio equipment to receive and send calls
through the air interface. A human machine interface allows the subscriber to
access the services provided by the UMTS provider including voice, short
message, E-mail, video.
User Equipment can offer either an interface to the human user as a phone, or
an interface to some other terminal equipment such as a PC or fax machine.
The UE has two main working states:
idle mode
It listens to the broadcast channels but has no channel of its own.
dedicated mode
A bi-directional channel is assigned to it for its communications needs.
The User Equipment consists of a handset into which a smart card called
Universal Subscriber Identity Module (USIM) is fitted.
USIM cards are plastic and contain a chip that houses subscriber information
such as the International Mobile Subscriber Identity (IMSI), the Mobile
Subscriber ISDN Number (MSISDN) and information used for security
functions. The following figure shows a USIM card.
USIM Card
USIM Card
USIM-CARD
"Confidential information -- may not be copied or disclosed without permission".
15 mm
25 mm
Because they provide access to the UMTS network, USIMs can be protected
by passwords similar in format to the Personal Identification Number (PIN)
used by most credit cards. One unique USIM feature allows users to
customize their passwords at any time.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-11
Once the USIM card is removed from the mobile, the UE cannot be used
except for emergency call.
IMSI
Nature
"Confidential information -- may not be copied or disclosed without permission".
Format MSIN
MCC MNC H1 H2 x x x ......... x x x
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-9
The MSISDN is the number dialled when a call is placed to a UMTS mobile
subscriber. It contains the subscriber country code, the national destination
code and the subscriber number. It is no longer than 15 digits.
MS - ISDN
Nature
"Confidential information -- may not be copied or disclosed without permission".
SN
Format CC NDC M1 M2 xx xx xx xx
1 to 3 2 to 4 total max 15
Nb. Digits
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-10
a. where CC = 1 = USA
b. NDC = 972 = Dallas, Tx area code or
c. SN = Subscriber Number
a. where CC = 49 = Germany
b. NDC = 171 = D1 operator
c. SN = Subscriber Number
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-13
UTRAN Architecture
Uu
RNC
"Confidential information -- may not be copied or disclosed without permission".
Iu
Iub (ATM) (CS & PS)
Circuit Domain
UE Node B
(BTS) Iur
Iu CS
Core
ATM
Backbone
Iu PS
Network
Iur
Uu
Packet Domain
Iu
Iub (ATM) (CS & PS)
UE RNC
Node B
(BTS)
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-11
Each RNC controls one or more UMTS Node B Base Transceiver Stations
(BTSs), which communicate with the User Equipment devices.
The core network uses the Iu interface to communicate with the RNCs,
including both Iu CS (Circuit Switched) and Iu PS (Packet Switched)
sessions.
The RNCs use the Iub interface to communicate with the radio towers.
AuC
AuC
DMS-HLR
DMS-HLR
"Confidential information -- may not be copied or disclosed without permission".
IuCS IWF
VLR
VLR VLR
VLR
Wireless Gateway Gateway
Other UMTS,
PSTN, or ISDN
Iu DMS-MSC
DMS-MSC
DMS-MSC DMS-MSC
Universal
Universal
Terrestrial
Terrestrial
Radio
RadioAccess
Access
Network EIR
Network
(UTRAN)
(UTRAN)
SMS-
SMS-SC
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-12
The two major products used to implement the UMTS CS domain are:
DMS-MSC with integrated VLR
DMS-HLR with integrated AuC.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-15
The MSC and the HLR are built on the DMS Supernode or Supernode SE
cabinet and also perform functions as a Signaling Transfer Point (STP).
Wireless Gateway 2
The Wireless Gateway (WG):
The WG is located between the RNC and the other Core Network nodes.
3G-SGSN
Signaling Gateway (SG)
Virtual Media Gateway (VMG)
Aggregation Node (AN).
TRAU
The Transcoder/Rate Adapter Unit (TRAU) is a device that takes UMTS
speech packets and converts them into standard ISDN 64 Kbit/s speech
packets.
the RNC through the ATM backbone (AAL2 layer used for UMTS)
the DMS-MSC Call Server with PCM links.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-17
HLR Univity
GSM HLR
SBA Core
Element
Mgr
SDM
"Confidential information -- may not be copied or disclosed without permission".
XA Core IPIP
FLPP
MS
ENET
OAU
USP
SS7
SS7
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-13
56 E1 HSL
56 IP HSL (SCTP/M2PA 10/100 Mbit/s)
each equivalent to up to 20 64Kbit/s links
The USP:
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-19
Transition module
18 card slots front and rear
19-inch & 23-inch mounting
"Confidential information -- may not be copied or disclosed without permission".
Mission card
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-14
The USP offers more signaling links and a greater number of point codes in
order to prepare future growth.
This feature is the in-service cutover Method Of Procedure (MOP) from LPP
(Link Peripheral Processor)/FLPP (Fiberized LPP) to USP. This covers both
point to point links as well as channelized links (E1/T1).
Card2 IP
"Confidential information -- may not be copied or disclosed without permission".
Card1 IP 47.135.238.33
47.135.238.32
USP
SS7 card SS7 card
SS7 Network
SS7 Network
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-15
The USP has an IP interface facing the XA-Core and a SS7 interface facing
the network. The SS7 interface supports a variety of link types including
ATM High Speed Links (HSL), E1/T1 channelized links and IP HSL.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-21
CEIR
CEIR
PLMN Equipment
Equipment Identity
Identity Register
Register
FTAM Security
Security equipment
equipment defined
defined by
by GSM
GSM MoU
MoU
and
and 33 GPP
GPP
"Confidential information -- may not be copied or disclosed without permission".
EIR Checks
Checks Mobile
Mobile IMEI
IMEI against
against three
three lists
lists
HLR
Central
Central EIR
EIR (CEIR)
(CEIR) per
per geographical
geographical region
region
MAP IMEI Check
MAP
IMEI Check Resp Operator
Operator Values
Values
(Black, Grey or
Block
Block use
use of
of unapproved
unapproved or or stolen
stolen Mobiles
Mobiles
MSC MSC White)
Mobile
Mobile inventory
inventory tracking
tracking
NORTEL
NORTEL EIR
EIR Solution
Solution
NORTEL
NORTEL has
has selected
selected the
the Teleguard
Teleguard EIR
EIR
product
product from
from Aldiscon
Aldiscon (Dublin,
(Dublin, Ireland)
Ireland)
EIR in a
Leader
Leader in
in EIR
EIR installations
installations -- European
European
UMTS Network Central
Central EIR
EIR (CEIR)
(CEIR) inin Dublin
Dublin
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-16
The EIR is a database that performs a screening function within the network.
The EIR tracks all valid and non-valid UEs by storing their International
Mobile Equipment Identities (IMEI). Each UE is inscribed with a registration
(serial) number when it is made as shown in the above figure.
The EIR maintains three lists of IMEIs which categorize UEs as being permitted
to use the network, barred from using the network or suspicious (that is,
delinquent on payments or faulty).
The three lists are:
white list - equipment OK
black list - equipment stolen or being used fraudulently
gray list - temporary equipment fault.
PLMN
HLR MAP
Integrated
Integrated Text
Text Messaging
Messaging
Capability
Capability on
on the
the Mobile
Mobile
MSC MSC
Stations
Stations
"Confidential information -- may not be copied or disclosed without permission".
MAP
SMS-C Messages
Messages sent
sent or
or received
received while
while
Mobile
Mobile idle
idle or
or engaged
engaged in
in calls
calls
Guaranteed
Guaranteed delivery
delivery
Confirmed
Confirmed message
message delivery
delivery option
option
Operator
Operator and
and Subscriber
Subscriber Values
Values
Voice
Voice Mail
Mail Alert
Alert
Creation
Creation of
of innovative
innovative services
services
Key
Key differentiator
differentiator to
to build
build market
market
share
share
Mobile to
Mobile
Short
Messaging Meeting rescheduled
at 14h00, same place.
John
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-17
The SMS comprises the following components within the network: the SMS-
C where short message delivery or reception is handled and an SMS-Gateway
MSC (dedicated MSC with the capability to initiate transfer of short message
to the MSC where the subscriber is currently located) as shown in the figure
above.
When a mobile subscriber initiates a short message, the MSC will forward the
short message to the appropriate SMS-C for the designated mobile subscriber.
The SMS-C will then set a priority for the message to be sent and attempt to
send the short message (via the SMS-GMSC) towards the terminating mobile.
If the mobile is not available (detached) or delivery fails, the VLR of the
mobile subscriber will set a flag to indicate that a message is awaiting the
subscriber. The Gateway MSC will be informed of the delivery failure and
will notify the HLR to set a message waiting data indication against the
subscriber (SMS-C address).
The mobile on returning to the network will trigger the VLR to inform the
HLR (update location procedure). The HLR is tasked to alert the appropriate
SMS-C(s), at which point the SMS-C will resend the waiting message.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-23
PSTN
PSTN
DMS-MSC
DMS-MSC
"Confidential information -- may not be copied or disclosed without permission".
Modem
RNC
Copyright 1996 Northern Telecom
IP
IP
E1/T1 E1/T1
Conversion
Conversion
Local Console Remote Management Console
IWF
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-18
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-25
Up to Date Copy of
Complete
Copyrig ht 1996 Nor thern Telecom
Subscriber
Database
"Confidential information -- may not be copied or disclosed without permission".
HLR 1 HLR 2
Geographic
Redundancy
Service is
Maintained for DMS-MSC
Customers
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-19
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-27
Administration Diversion
Administration Diversion
Subscriber B
is Standby
Copyrig ht 1996 Nor thern Telecom
Subscriber B
is Active
The normal administration includes:
Response
Provisioning Server (HLR-PS)
Request
for B supports Mated Pair.
"Confidential information -- may not be copied or disclosed without permission".
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-20
Both HLRs have a copy of the data for all subscribers, however responsibility
for processing requests for subscribers is split between the nodes as shown in
the above figure.
The HLR acts as a backup for these subscribers. This HLR only provides
service to standby subscribers in the event of a disaster occurring to its mate
HLR.
Mated Pair Diversion Messages are optional. They result from the fact that
the Acting/Standby status is a relatively static arrangement which can only be
changed by the operator.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-29
Service Management
Service Accounting Service Provisioning
"Confidential information -- may not be copied or disclosed without permission".
Network Management
Network Management Platform Performance Management Trouble Ticketing Interface
Fault Management Charging Gateway Function OSS Interfaces
Network Element Configuration INA (DNS/DHCP) Management
Interfaces
M edia
O ther Server
W AP
G atew ay
Apps & Service Platforms Packet & Circuit Cores Radio Access
* Four domains are indicative of UMTS coverage.
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-21
The Nortel Networks offer addresses three key management needs of UMTS
service providers:
Network Management
managing the UMTS network (across the radio access, circuit core,
packet core and applications and services domains).
Service Management
managing the voice services, data services and high value applications
delivered on the network.
Customer Management
managing and empowering the customers who use these services.
Fault, Performance
Configuration, Performance
Processing
"Confidential information -- may not be copied or disclosed without permission".
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 2. UMTS Architecture and Components 2-22
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Architecture and Components 2-31
Review Questions 2
1. What are the major subsystems of the UMTS network?
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential 3-1
Lesson 3
OAMP & Added Components
Objectives 3
Objectives
Added Components 3
Added equipment consists of systems manufactured by companies other than
Nortel Networks that are integrated into the network to provide additional
functionality.
Added equipment can include some or all of the following components listed
hereafter.
Voice Mail System (VMS)
Short Message Serve Center (SMS-C)
customer care and billing system
network management center
equipment identification register.
OMC-S SCP
SMS
VMS EIR
CIS
"Confidential information -- may not be copied or disclosed without permission".
OMC-S
LAN
LAN VLR AuC
DMS-MSC
HLR-PS
SDM/FT DMS-HLR SDM/FT
IWF
B EC
SR Wireless
N CN Gateway
o C
d N
e o
B d PSTN
e PSTN
UTRAN B
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 3. OAMP and Added Components 3-3
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential OAMP & Added Components 3-3
Equipment vendors whose systems Nortel Networks uses to supply the added
equipment solutions are:
Hewlett Packard
Sun Microsystems
Comverse Technologies
Glenayre
Aldiscon
OSI
Motorola
Sema
SuperNode
HLR-Provisioning OMC-S Call Intercept
Billing
Server Element Manager System
Application
"Confidential information -- may not be copied or disclosed without permission".
TCP/IP
TCP/IP TCP/IP TCP/IP TCP/IP
LAN/WAN
LAN/WAN
TCP/IP
TCP/IP
HLR
SDM/FT
SDM/FT DMS-HLR SDM/FT
SDM/FT DMS-MSC
DMS-MSC
DMS-HLR
ANSI/ETSI ISUP
(PET7) ANSI/ETSI ISUP
(PET7)
PLMN
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 3. OAMP and Added Components 3-4
It provides:
high performance, fault tolerant computing
redundant I/O buses, mirrored disk storage, and redundant
communications ports
industry standard hardware interfaces
a wide selection of third-party software and software development tools
scalability and upgradability.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential OAMP & Added Components 3-5
OMC-S browser
"Confidential information -- may not be copied or disclosed without permission".
LAN/WAN
OMC-S
server
TCP/IP
TCP/IP
TCP/IP
DMS-MSC
DMS-MSC DMS-MSC
DMS-MSC
DMS-MSC
DMS-MSC
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 3. OAMP and Added Components 3-5
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential OAMP & Added Components 3-7
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 3. OAMP and Added Components 3-7
The folowing figure illustrates the possible launching of the MDM tool.
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 3. OAMP and Added Components 3-6
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential OAMP & Added Components 3-9
HLR-PS Application
HLR-PS General Architecture
HLR-
HLR-PS
X.25
Network Transfer Network PSTN
"Confidential information -- may not be copied or disclosed without permission".
LAN
TCP/IP
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 3. OAMP and Added Components 3-8
Provisioning Interfaces
The HLR-PS application is attached to a DMS-HLR as shown in the above
figure.
The AdC interface has been designed for interactive use for real-time
updates. For example, subscribers can telephone a customer care center to
request changes to their service subscription.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential OAMP & Added Components 3-11
LAN
TCP/IP
FTAM/X.25
TCP/IP Ethernet
TCP/IP-Ethernet
TCP/IP
DMS-
MSC
DMS- ANSI/
MSC ANSI/ SDM/FT
Call Contents ETSI-ISUP
ETSI-ISUP
Provisioning PET7
PET7
SDM/FT PLMN
CADR/NCADR &/or
Provisioning
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 3. OAMP and Added Components 3-9
The Call Intercept System (CIS) is attached to a DMS-MSC and performs the
following main functions as shown in the above figure.
Call Monitoring
Every voice call that either originates from or terminates at a targeted
subscriber, and every non-call mobility event, is intercepted at the DMS-MSC,
and routed to the monitoring center of the authorized agency. Both call contents
and the associated call data are intercepted and routed to the monitoring center.
call content of the intercepted call is sent using voice trunks
Call monitoring is undetected by the monitored target subscriber.
call associated data of the intercepted call is sent as Call Associated Data
Records (CADRs) over X.25 or Ethernet data lines
CADRs contain information about a particular event associated with the
monitored call.
Note: The release for CIPC is the last release before the new IAF
platform.
Call content, call associated data, and non-call associated data of voice calls
only are reported. Data communications and Type 1 emergency calls are
supported for call interception.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential OAMP & Added Components 3-13
UMTS record and file formats, using the Device Independent Recording
Package (DIRP)/DRM file format with additional auxiliary records.
Transmission Control Protocol (TCP) Base Interface allowing Near-Real
Time and Hot Billing
MSC Tape backup and restore capability at the XA-Core to handle long
SDM outages
Tape backup on the SBA
Cdrview supported in the SDM for UMTS billing
Inbound File Transfer Access and Management (FTAM) interface for
SDM.
UMTS SBA Interface Architecture
FTAM/802.3
DS 512
4 mm DAT Tape
Local
LocalArea
Area
SDM/FT
SDM/FT Network
Network
USBA
USBA (LAN)
(LAN)
FTP
Customer
CustomerDownstream
Downstream
Billing
BillingProcessor
Processor
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 3. OAMP and Added Components 3-10
VMS Alert
Benefits for Operators T1/E1 (SMS) Mobile
9 Increased Call Completion rate and Air time
9 Increased revenue SS7/ISUP
Msg
Retrieval
9 Rapid return on investment
9 Increased market penetration
Voice Mail System MSC
NORTEL VMS solution Call Answering generates increased revenue and
air time via Message Deposit and Retrieval
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 3. OAMP and Added Components 3-11
The Voice Mail System enables voice messages to be store. Incoming calls
can be forwarded into the subscribers voice mailbox when he/she is busy, is
out of the coverage area, is switched off, does not answer or activates
unconditional call forwarding into his/her mailbox. Some VMSs can also
provide an intelligent alert system. Repeated delivery calls can inform the
subscriber of a new message in his/her voice mailbox.
When the UMTS system contains an SMSC, delivery calls can be combined
with short messages. A short message is delivered to the customer subsequent
to receiving a message in his/her voice mailbox and delivery calls are only
activated if the short message was unsuccessfully delivered.
From an architectural point of view, the VMS is divided into message storage
units (winchesters) and call, message and alarm management units.
VMS Routing
Normal UMTS call forwarding will be used at the local MSC, where the UE
resides, to route calls to a VMS. The subscribers set call forwarding to the DN
of their mailbox on their VMS. When call forwarding occurs, normal network
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential OAMP & Added Components 3-15
routing functions will route the call to the VMS. The MSC is capable of
connecting to a VMS via standard PSTN protocols supported by the MSC.
This service provides the ability to transfer the existing call from the
VMS to a desired destination, provided that the call was terminated to the
VMS, not originated from the VMS.
Intelligent Networks 3
An Intelligent Network is an architecture that supports the provision of added
telecommunications services and facilitates the introduction and management
of those services.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential OAMP & Added Components 3-17
Nortel IN Architecture
Service Creation and
Management Environment
ServiceBuilderTM
Intelligent Network Internet
"Confidential information -- may not be copied or disclosed without permission".
HLR
SMS
SCP
SMS-C
Intranets
IP IN gives you:
Open Architecture
DMS-SSP DMS-100 Multivendor Interworking
SSP Global Roaming
Voice
Fixed-Mobile Convergence
signaling Ready
UMTS Network Service Breaking the Limits of
Management
Fixed Network
Service Offering
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 3. OAMP and Added Components 3-12
Turnkey Services
Nortel Networks ServiceBuilder solution provides the design and flexibility
to handle a wide range of services and applications.
sponsored cell/call
Allows a third party, as sponsor, to display an announcement at the
beginning of the call.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential OAMP & Added Components 3-19
PSTN 7
8 SCP
3 2
"Confidential information -- may not be copied or disclosed without permission".
DMS-MSC
6
1 4
VLR
UTRAN
5
5 IP
1- UE dials a specific IN number.
2- DMS-MSC suspends call processing and gives control to SCP.
3- SCP requests DMS-MSC to connect to IP.
UE 4- DMS-MSC establishes voice path (PRI link) to IP.
5- UE/IP interaction: announcement, digit collection, choice through menu.
6- IP sends successful report to SCP.
7- End of UE/IP interaction and return of final destination number.
8- Routing call to destination (PSTN number).
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 3. OAMP and Added Components 3-13
Services
Services &&Signaling
Signaling
CAMEL
CAMELPhase
Phase33Features
Features
CAP
CAP callp/messagingenhancements
callp/messaging enhancements CAMEL Ph3
SMS-CSI
"Confidential information -- may not be copied or disclosed without permission".
SMS-CSI
D-CSI
D-CSI
ETSI
ETSIISUP
ISUPversion
version33
CAMEL
CAMELPhase
Phase22wrap-up
wrap-up
Assisting
AssistingSSP
SSP
Resume
Resume callhandling
call handlingrest
restremoval
removal
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 3. OAMP and Added Components 3-14
The major change introduced in GSM16 supports the CAMEL Ph3 SMS-CSI
(Short Message Service - CAMEL Subscription Information) feature.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential OAMP & Added Components 3-21
Review Questions 3
1. List the OAMP components within the SDM/FT.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential 4-1
Lesson 4
Introduction to CCS7
Objectives 4
Objectives
Define signaling.
Describe several features and benefits of signaling that
are enabled or enhanced by CCS7 technology.
Describe the CCS7 network nodes.
Describe the CCS7 network architecture.
Signaling 4
For call processing components to interact with one another and to process
voice and data calls, signals must pass among the components. Signals are
used by telecommunication networks for addressing and routing purposes.
These two types of signaling support the following two components of a User
Equipment call:
The signaling component contains the supervisory and address signals
used to control the setting up, monitoring and taking down of the call.
The voice and data component contains the traffic between the
originator and the recipient of the call, regardless of whether it is a voice
or a data call.
Note: The terms voice, voice component, voice trunk, voice traffic and
voice path also include data information.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential Introduction to CCS7 4-3
PTS requires the voice component to be completely built, even if the call
cannot be completed. For instance, if the number being dialled was busy, a
voice facility that could be used for another call is wasted. This is especially
important for toll switches, as wasted voice facilities can mean loss of
income.
Trunks dedicated to
voice
Represents Voice
Represents signaling
CCS allows full use of interoffice trunk facilities for voice or data. CCS also
provides additional bandwidth for signaling on a common, separate trunk.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential Introduction to CCS7 4-5
What is CCS7? 4
CCS7, sometimes called Signaling System #7 (SS7), is a version of CCS
designed for digital networks. CCS7 technology enables CCS over dedicated
data links using packet switching techniques. Packet switching techniques
allow for more signaling information to be transferred between points in the
network.
CCS PTS
1. Large message repertoire
1. Small message repertoire
call messages
service messages
administrative messages
2. Speed64 kbps and steady 2. Speedslow and variable
3. signaling occurs during speech phase 3. signaling cannot occur during
speech phase
4. signaling for multiple voice circuits 4. signaling on a per-trunk basis
simultaneously
5. Error detection and correction
6. Intelligent
7. Securityall messaging has multiple
paths over which to travel
8. Capability to launch query and
response messages to databases
Nortel Networks uses CCS7, which is a version of CCS designed for digital
networks. CCS7 offers benefits to both subscribers and operating companies.
Transaction Services
The transaction services area provides benefits for the subscribers and may
include such services as
custom local area signaling service (CLASS) provides a group of custom
calling features aimed at residential and small business customers. Some
of these services include
ring back
caller ID
call barring
Automatic Calling Card Services (ACCS) allows toll calls that are
charged to a calling card number, which is verified using the CCS7
network database.
Virtual Private Network (VPN) allows private networks to be accessed
using public networks.
Advanced Intelligent Network (AIN) provides service information that
resides in a centralized location. As a result, offices can access it as
needed to provide routing, billing and other necessary call parameters.
Signaling Network Management
The signaling network management functions provide procedures to monitor
the CCS7 network status and maintain signaling service by rerouting or
controlling traffic when there is either congestion or failure in the CCS7
network.
CCS7 reduces equipment cost. While in-band trunk signaling requires that
each of the trunks have access to signaling equipment, this equipment need is
eliminated with CCS7 since all trunk signaling is performed over the
common CCS7 signaling link.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential Introduction to CCS7 4-7
CCS7 Network 4
A CCS7 network consists of several different hardware components called
nodes or signaling points.
The following node types are available in a Nortel Networks CCS7 network:
Signaling Point (SP)
Service Switching Point (SSP)
Signaling Transfer Point (STP)
Service Control Point (SCP)
INtegrated NODE (INODE)
The following figure shows the different CCS7 network nodes in a signaling
network.
SSP
SP
Signaling Point
A Signaling Point (SP) is a switching office that supports CCS7 voice trunk
capability (ISUP messaging). It provides an interface between subscriber
lines and the CCS7 network. An SP originates and terminates signaling
messages.
Regional and local are terms used to describe STP pairs. The term used
depends on the position of an STP pair relative to other types of CCS7 nodes.
A local pair is the primary transfer point for signaling traffic from a localized
group of SSPs. A regional pair is any STP pair that provides local STP pairs
access to regional resources such as SCPs.
Integrated Node
An INODE integrates the function of an SSP and STP within a single node.
Therefore, this node can generate query messages to the application databases
and also transfer messages to other nodes. This product is Nortel Networks
specific.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential Introduction to CCS7 4-9
Signaling Links 4
Direct communication between two adjacent signaling points occurs through
a signaling link. A link is the physical connection between two nodes.
Signaling links transfer signaling messages between two signaling points.
Link Types
Six types of link can be configured in a CCS7 network. The type configured
depends on the function of the nodes that the link connects.
The signaling links can be categorized into several types depending on the
functions being performed. However, regardless of the function, all signaling
links operate in the same manner and have the same technical requirements.
The following figure shows an example of a CCS7 network with its link
types.
STP
STP STP
STP DMS-HLR
DMS-MSC HLR
"Confidential information -- may not be copied or disclosed without permission".
A-link C-link
B/D-link A-link
C-link
INODE STP
STP
F-link DMS-MSC
E-link
Wireless Gateway
(transparent node)
Network Addressing 4
Point Codes
Each signaling point in the network has its own address. These addresses are
point codes. The point code is the standardized method of addressing a
particular node within the CCS7 signaling network.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential Introduction to CCS7 4-11
For example, they are all A-links or all D-links. Multiple-link linksets are
deployed for redundancy and traffic distribution.
Linkset Definition
Linkset Definition
PC=100 PC=200
"Confidential information -- may not be copied or disclosed without permission".
Link 1
Linkset AB:
OPC=100
FEPC=200
Routesets
Just as a linkset is a group of links, a routeset is a group of all routes going
from one node to another. Every destination in the network has at least one
routeset. Routesets may have from one to 6 routes (linksets).
The following two basic rules are used to determine whether a routeset needs
to be defined between two signaling points:
if a CCS7 node has trunks connecting to another CCS7 node, a routeset
must be defined to that node,
if a CCS7 node has a linkset to another node, a routeset must be defined
for the node.
Routeset Definition
Routeset
Routeset AB:
AB: Routeset
Routeset BA:
BA:
Linkset
Linkset AB
AB Linkset
Linkset BA
BA
Linkset
Linkset AC
AC Linkset
Linkset BC
BC
Linkset
Linkset AB:
AB:
OPC=100
OPC=100 PC=200 OPC=200
OPC=200
PC=100 DPC=200
DPC=200 OPC=100
OPC=100 DPC=100
DPC=100
FEPC=200
FEPC=200 Linkset BA
"Confidential information -- may not be copied or disclosed without permission".
MSC B
MSC A
Linkset
Linkset AC:
AC: Linkset BC
PC=300
OPC=100
OPC=100
FEPC=300
FEPC=300
MSC C Linkset CB
Linkset CA
A routeset:
Is a signaling path between two nodes. MSC C must be an STP.
Is made of linksets.
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 4. Introduction to CCS7 4-7
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential Introduction to CCS7 4-13
A signaling route is the path between nodes over which signals travel.
A route cannot be touched.
It is a description of one way to travel from an origination point through
the network to a destination point.
In associated mode:
a route uses one linkset between
origination and destination nodes.
DMS-MSC DMS-MSC
"Confidential information -- may not be copied or disclosed without permission".
Signaling Link
STP
STP In the quasi-associated mode:
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential Introduction to CCS7 4-15
Connection-Oriented Signaling
Connection-oriented signaling, also referred to as trunk signaling, sets up,
monitors and clears down a CCS7 call. The connection-oriented signaling
configuration is shown in the following figure. An example of connection-
oriented signaling is when the RNC sends a message to a DMS-MSC
regarding call setup.
Connection-Oriented Signaling
Connection-Oriented Signaling
Voice Trunks
"Confidential information -- may not be copied or disclosed without permission".
RNC DMS-MSC
signaling Link
Connectionless Signaling
Connectionless signaling is not directly involved with digit translations
during the setup and clear down of a UMTS mobile-station-related call; the
signal must go through an STP before reaching its final destination.
Connectionless Signaling
Connectionless Signaling
STP
signaling Link
"Confidential information -- may not be copied or disclosed without permission".
DMS-MSC DMS-HLR
signaling Link
STP
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential Introduction to CCS7 4-17
Review Questions 4
1. Name three advantages of the CCS7versus per-trunk signaling.
5. What is a linkset?
6. What is a routeset?
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential 5-1
Lesson 5
CCS7 Protocol
Objectives 5
Objectives
"Confidential information -- may not be copied or disclosed without permission".
CCS7 Protocol 5
The CCS7 network is driven by a protocol. A protocol is a set of rules or
standards governing a communications exchange. All software functions and
hardware implementation are determined by the rules of the protocol.
The CCS7 protocol uses a standard set of information elements for reliable
exchange of signaling information in a multivendor environment. Use of the
protocol ensures that everyone in the network communicates in the same
language no matter which vendor equipment is used.
Standardization
Standardization is the result of several international groups that have
recognized the need for uniformity in the implementation of CCS7.
At the top of the hierarchy, shown in the following figure, is the International
Telecommunications Union (ITU).
The ITU is part of the United Nations. Under the ITU is the Consultative
Committee for International Telephone and Telegraph (CCITT).
CCITT issued the preliminary specifications for the digital CCS7 system
in 1980. The original system was called CCITT#7 signaling system.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential CCS7 Protocol 5-3
Standard Organizations
Standard Organizations
International
International Bell
Bell
Telecommunications
Telecommunications Core
Core
Union
Union
(ITU)
(ITU)
Open
Open Systems
Systems
Interconnection
Interconnection
(OSI)
(OSI)
"Confidential information -- may not be copied or disclosed without permission".
Reference
ReferenceModel
Model American
American
National
National
Standards
Standards
Consultative
Consultative Institute
Institute
Committee
Committee on on (ANSI)
(ANSI)
International
International
Telephone
Telephoneand and
Telegraph
Telegraph
(CCITT)
(CCITT) 7 Layers
Application 7
Presentation 6
5 T1X1
T1X1
Session
Transport 4
Network 3
International
International Link 2
Standards
Standards 1
Physical
Organization
Organization
(ISO)
(ISO) CCS7
CCS7
Model
Model
The CCS7 protocol has four levels that correspond to the functionality of the
seven layers of the OSI reference model:
user functions
signaling network
signaling link
signaling data link.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential CCS7 Protocol 5-5
With each message, the CCS7 protocol carries the enhanced routing
information needed to deliver advanced network services.
This routing data enables the following three significant network capabilities:
CCS7 trunk signaling
Permits feature transparency for services, such as an ISDN, to be
extended beyond the reach of a single central office.
network management
Allows control of the CCS7 network.
4 Mobile
Mobile
Application
Application
Part
Part
(MAP)
(MAP)
Radio
Radio Access
Access Network
Network User
User
Application
Application Part
Part Part
Part
"Confidential information -- may not be copied or disclosed without permission".
(RANAP)
(RANAP)
Transaction
Transaction
Capabilities
Capabilities
Application
ApplicationPart
Part
(TCAP)
(TCAP)
Signaling
Signaling Connection
Connection and
and Control
Control Part
Part (SCCP)
(SCCP)
3 Network
Message
Message
2 Link Transfer
Transfer Part
Part
(MTP)
(MTP)
1 Physical
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential CCS7 Protocol 5-7
The following three levels comprise the MTP, which make up the first three
layers of the UMTS CCS7 protocol:
The physical level (MTP 1) defines the physical, electrical and
procedural characteristics of the signaling data link. The bit rate of this
digital interface is 64 Kbit/s or 56 Kbit/s. The link speed depends on the
physical medium used and is not part of the MTP specification.
The data link functions level (MTP 2) ensures a secure signaling link
between pairs of signaling points. This layer provides signaling unit
alignment, error detection and correction, signaling link alignment,
signaling link error monitoring, and flow control. The function of MTP 2
is to transfer each message to the other end of the signaling link correctly
and in sequence.
The network functions level (MTP 3) provides signaling transfer, even
when signaling links or signaling points fail. This layer performs two
major sub-functions:
Signaling message handling: ensures that a message reaches its right
destination.
Signaling network management: provides reconfiguration of the
signaling network in case of failure and controlling traffic in case of
congestion.
The MTP provides the basic transport system for all CCS7 signaling
messages.
The three layers of the MTP have the following two basic responsibilities:
signaling network management
signaling message handling.
The MTP signaling message handling ensures that signaling messages travel
between UMTS CCS7 network nodes in correct sequence and without loss or
duplication.
To implement these functions, the SCCP has the following four control
functions:
routing control
connectionless control
connection-oriented control
management control.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential CCS7 Protocol 5-9
RANAP Procedures
DMS-MSC
"Confidential information -- may not be copied or disclosed without permission".
Iu Interface
Wireless
Gateway
To do this, the Layer 3 messages from the WG to the LIU7 are contained in
the user data field of the exchanged SCCP frames. There is an intermediate
layer of protocol between SCCP and Layer 3 referred to as the distribution
sublayer. The protocol for this sublayer includes the management of a 1-byte
DDU (Data Distribution Unit). The low order bit of the DDU is currently
used to determine whether the message is transparent (i.e. DTAP) or not
transparent (i.e. BSSMAP).
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential CCS7 Protocol 5-11
Application Entities
In a UMTS network, each component of the CCN has been designated as an
AE.
Each AE provides certain services to other AEs in the CCN subsystem. For
example, an MSC (an AE) would request an HLR (another AE) for routing
information regarding a particular mobile subscriber.
Similarly, the HLR uses the SRI service provider ASE to respond.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential CCS7 Protocol 5-13
UP UP UP
PSTN PSTN
"Confidential information -- may not be copied or disclosed without permission".
ATM ATM
Wireless
UE RNC Gateway DMS-MSC/VLR DMS-GMSC/VLR DMS-HLR PSTN
Review Questions 5
1. What organisation is at the top of the CCS7 standard hierarchy?
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential 6-1
Lesson 6
UMTS CCN Interfaces
Objectives 6
Objectives
"Confidential information -- may not be copied or disclosed without permission".
UMTS Interfaces 6
The interfaces connecting components of a UMTS network are specified in
the UMTS recommendations. In the UMTS network, interfaces, not signaling
links, connect the nodes. The following figure shows the Nortel Networks
implementation of the UMTS network components, the network signaling
points (SPs) and the UMTS interfaces. The interfaces used with the UMTS
signaling points are listed in the following table.
G-Interface
HLR
C-Interface
"Confidential information -- may not be copied or disclosed without permission".
face
ace
SMS-SC
rf
r
B-Inte
B-Inte
rface
C -Inte
E-Interface
EIR
F-Interface
E-Interface
DMS-MSC DMS-GMSC
Iu-CS
Network
Interface
RNC Wireless
Iu Gateway PSTN
(CS+PS) PSTN
Voice Trunk
Signaling Link
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS CCN Interfaces 6-3
Iu-CS Interface
The Iu interface is between RNC and either the SGSN (for the packet
domain) or the MSC (for the circuit domain).
Circuit Switched
Iu-CS C-Plane
Network layer RANAP
Transport layer SCCP
MTP
T
A
"Confidential information -- may not be copied or disclosed without permission".
P MM Mobility Management
RANAP
Connection Management
The Connection Management (CM) sublayer includes the Call Control (CC),
the Short Message Service (SMS), and the Supplementary Service (SS)
functions. The CM sublayer of the CS supports the following functionalities:
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS CCN Interfaces 6-5
Mobility Management
The main function of the Mobility Management (MM) sublayer is to provide
procedures to handle the mobility aspects of the subscriber. Mobility
Management procedures are divided into three categories:
MM-Common Procedures:
MM-Common procedures can be initiated while there is a radio
connection between the UE and the network.
MMSpecific Procedures:
MM-Specific procedures can be initiated only if the UE is IDLE
MM-Connection Management Procedures:
MM-Connection Management procedures are internal to the CS
MM-Common Procedures
MM-Common procedures are defined as follows:
RAB Assignment
Iu release Command
Relocation Request
Relocation Command
Relocation Failure
Relocation Detection
B-interface
The B-interface handles signaling messages between the DMS-MSC and its
VLR.
Examples
D HLR D
"Confidential information -- may not be copied or disclosed without permission".
B
C C B
EIR
F F
RNC RNC
Iu-CS E Iu-CS
DMS-MSC DMS-MSC
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS CCN Interfaces 6-7
C-interface
The C-interface supports communication between the DMS-GMSC and the
HLR.
D HLR D
"Confidential information -- may not be copied or disclosed without permission".
B
C C B
EIR
F F
RNC RNC
Iu-CS E Iu-CS
DMS-MSC DMS-MSC
PSTN
PSTN
Alert Service Center
Register Charging Information
Send Routing Information
Send Routing Information Ack
Set Message Waiting Data
D-interface
The D-interface is used to exchange location information and subsets of
subscriber data between the DMS-HLR and the VLR.
The main service provided to the mobile subscriber is the capability to set up
or receive calls within the entire service area.
D HLR D
"Confidential information -- may not be copied or disclosed without permission".
B
C C B
EIR
F F
RNC RNC
Iu-CS E Iu-CS
DMS-MSC DMS-MSC
Activate SS
Cancel Location PSTN
PSTN
Deactivate SS
Deactivate Trace Mode
Delete Subscriber Data
Send Authentication Info
Provide Roaming Number
Register Password
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 6. UMTS CCN Interfaces 6-7
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS CCN Interfaces 6-9
E-interface
The E-interface connects DMS-MSCs. The E-interface also connects the
SMS-SC to the GMSC.
D HLR D
"Confidential information -- may not be copied or disclosed without permission".
B
C C B
EIR
F F
RNC RNC
Iu-CS E Iu-CS
DMS-MSC DMS-MSC
F/G-interfaces
The F-interface connects the DMS-MSC to the EIR. The G-interface connects
VLRs.
D HLR D
"Confidential information -- may not be copied or disclosed without permission".
B
C C B
EIR
F F
RNC RNC
Iu-CS E Iu-CS
DMS-MSC DMS-MSC
PSTN
PSTN
G interface:
F interface: Send Identification
Check IMEI
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS CCN Interfaces 6-11
Review Questions 6
1. List UMTS CCN interfaces.
4. Give at least one Application Service Element for each UMTS CCN
interface.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential 7-1
Lesson 7
UMTS Call Signaling
Objectives 7
Objectives
UMTS Procedures 7
This lesson introduces the CCS7 signaling procedures for call progression.
In the UMTS network, the location of the UE is stored in the DMS-HLR and
the DMS-MSC/VLR in which the subscriber resides.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Call Signaling 7-3
No [TMSI]
Is the IMSI or No [TMSI]
"Confidential information -- may not be copied or disclosed without permission".
TMSI in the
New VLR?
Get IMSI from UE
1. ISD
4. CL 5. CL Ack 2. ISD Ack
VLR:
Updates Database Old VLR New VLR
Sends ULAccept back to UE 3. LU Ack
Before responding, the VLR can consult the HLR to determine if a HLR
update is necessary. If this is the case, the VLR must first identify which HLR
contains the subscriber data. This is accomplished by analyzing the
International Mobile Subscriber Identity (IMSI).
This number is provided to the VLR through one of the following possible
ways:
If the HLR information is incorrect (for example, if the UE is turned off while
roaming across location areas), the VLR updates the HLR through the
location update procedure. If no HLR update is needed or the necessary HLR
update is completed, the VLR may perform the authentication and ciphering
procedures described later in this module. The last step in the UE to VLR
location update procedure occurs when the VLR responds with the MM
location update accept or the MM location update reject message.
SRNS HLR
3G-MSC
1. RRC connection
establishment
"Confidential information -- may not be copied or disclosed without permission".
9. Iu Release
9. RRC Connection Release
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Call Signaling 7-5
The following example of location update message flow illustrates the use of
the TMSI.
1. RRC connection
establishment
1. MM LA Update Request (old LAI, old TMSI)
"Confidential information -- may not be copied or disclosed without permission".
10. Iu Release
10. RRC Connection Release
SuperCharger
SuperCharger is a function provided for the DMS-HLR and the DMS-VLR.
SuperCharger increases HLR capacity for handling active subscribers, and
reduces signaling throughout the UMTS network.
Thus, when a subscriber roams to a VLR which already has that subscriber
data, the HLR will always send imbedded ISD messages as part of the Inter
VLR Update Location (UL) request, if that subscriber data has changed.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Call Signaling 7-7
ISD CL
ISD Ack HLR
UL
"Confidential information -- may not be copied or disclosed without permission".
UL Request
RNC 2
RNC 1
LAC 2
LAC 1
Comment:
1. No ISD is sent from HLR to MSC 1 if subscriber info has not changed.
2. No cancel location is sent from HLR to MSC 2.
VLR
Before GSM and UMTS, cellular networks lost revenue and radio resources
from efforts involved in attempting to place a call to an UE that had been
turned off. The IMSI attach and detach procedures in UMTS offer a solution
to this dilemma.
The above figure illustrates the IMSI attach and detach procedures.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Call Signaling 7-9
TMSI is used by the mobile to identify itself within the radio interface
signaling procedures. The TMSI has only local significance within a VLR.
Outside the VLR it has to be combined with the Location Area Identifier
(LAI) to provide an unambiguous identity.
UE
UE RNC
RNC MSC
MSC VLR
VLR
3. TMSI _REALLOCATION_COMMAND
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Call Signaling 7-11
Background
For GSM subscribers:
GSM AKA shall always be used. The security context depends on
whether the access is via GSM BSS or UTRAN.
In case of a GSM BSS, GSM ciphering is applied. When the GSM
subscriber is in the UTRAN, UMTS ciphering and integrity keys CK
and IK are derived from GSM ciphering key Kc and UMTS ciphering
is applied. (UMTS01).
For UMTS subscribers in a mixed network:
Authentication and key agreement shall be performed depending on
whether it is attached to a UTRAN or BSS and whether the user has R99+
or R98- UE.
The following figure shows the different scenarios that can occur with UMTS
subscribers.
Quintets Triplets
CK, IK Kc Kc
Kc
R99 + UE
R99 + UE capable of UMTS AKA UE
or R98-UE
CK, IK Kc Kc Kc
c1 RAND[GSM] = RAND
Authentication Procedure
A secret key is shared between the user and the network. It is available only to
the USIM and the authentication center. This method provides a maximum
compatibility with the current GSM security architecture. It uses a challenge/
response protocol identical to the GSM subscriber authentication and key
establishment protocol.
Each time authentication procedure runs, a new ciphering key and a new
integrity key (CK, IK) are produced. AUTN (Authentication Token) is used
by the mobile to identify and recognize the network.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Call Signaling 7-13
Authentication
Subscriber Specific vectors
"Confidential information -- may not be copied or disclosed without permission".
Inputs
Authentication Algorithm Encryption engine
RAND, XRES, CK, IK, AUTN
SQN, AMF, RAND, K
Flavour information
2. It selects the next authentication vector from the array and sends the
parameters RAND and AUTN to the user.
3. The USIM checks whether AUTN can be accepted and, if so, produces a
response RES which is sent back to the VLR.
4. The USIM also computes CK and IK.
5. The VLR compares the received RES with XRES.
If they match the VLR considers the authentication and key agreement
exchange to be successfully completed. The established keys CK and IK
then are transferred by the USIM and the VLR to the entities which
perform ciphering and integrity functions.
HLR
HLR
VLR
Authentication Data Request
Authentication and
Verify AUTN(i) key establishment
Compute RES(i)
User authentication response RES(i)
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Call Signaling 7-15
Integrity
Integrity protection verifies that signaling data has not been modified in an
unauthorized way since it has been sent by the sending entity (SuperNode or
UE) and that the origin of the signaling data received is the one claimed.
This procedure:
The receiver computes XMAC-I on the message received in the same way as
the sender computed MAC-I on the message sent. It verifies the data integrity
of the message by comparing it with the received MAC-I.
In this way the user is sure that no COUNT-I value is reused (by the network)
with the same integrity key.
UMTS Integrity
FRESH
MESSAGE COUNT-I
MESSAGE
UMTS Integrity UMTS Integrity
Algorithm (UIA) Algorithm (UIA)
IK
XMAC-I
MAC-I
MESSAGE MAC-I
OK
+ - MAC-I =
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Call Signaling 7-17
Ciphering
User data and some signaling information elements are considered sensitive
and must be protected.
Ciphering
BEARER
BEARER LENGTH LENGTH
"Confidential information -- may not be copied or disclosed without permission".
COUNT-C COUNT-C
DIRECTION DIRECTION
CK
UMTS Encryption
Algorithm (UEA) UMTS Encryption CK
Algorithm (UEA)
Length n
+ +
VLR
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Call Signaling 7-19
Call Processing 7
Call processing involves the series of events necessary for call setup and call
control. Call processing functions can be viewed as a flow of messages
between two or more network elements that send and receive call processing
events. Call processing agents are the network elements, such as the DMS-
MSC, the VLR, and the DMS-HLR.
Paging
Paging
"Confidential information -- may not be copied or disclosed without permission".
1. Paging Command
2. IMSI or TMSI
DMS/MSC
DMS/MSC 3. LAC and Cell ID 3. LAC and Cell ID
4. Voice Path
5. Traffic Channel Allocation
UE
UTRAN
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Call Signaling 7-21
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Call Signaling 7-23
5) Authentication procedure
VLR
6) Security procedure
7) TMSI Allocation
GMSC ORIGINATING
"Confidential information -- may not be copied or disclosed without permission".
5) Authentication procedure
6) Security procedure
8) Call Setup
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Call Signaling 7-25
UE to UE Call Setup
UE to UE Call Setup
TERMINATING
15) Provide Roam Num.
VLR 16) Result Roam Num.
RNC
BSS 18) Send Info. I/C Call setup 4) Process Access HLR
19) Page MS Command 5) Authentication procedure
23) Process Acc. Req.
6) Security procedure
24) Authentication procedure
ORIGINATING
25) Security mode 9) Send Info. O/G Call
"Confidential information -- may not be copied or disclosed without permission".
5), 6), 7)
28) Call Setup Request
8) Setup Request
29) Call Confirmed
11) Call Proceeding
32) Alerting
33) Alerting
34) Connect
35) Connect
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Call Signaling 7-27
UE to UE call termination
As illustrated in the following figure, the steps describe a UE to UE call
termination:
1. The terminating UE sends a disconnect message through the RNC to the
GMSC.
2. The GMSC sends a release message to the terminating UE.
3. The GMSC sends a disconnect message through the RNC to the
originating UE.
4. The terminating UE sends a release complete message to the GMSC.
5. The GMSC sends an Iu Release command to the RNC.
6. The originating UE sends a release message through the RNC to the
GMSC.
7. The GMSC sends a release complete message through the RNC to the
originating UE.
8. The GMSC sends an Iu Release command to the RNC.
9. The RNC sends an Iu Release complete message to the GMSC.
10. The RNC sends a Iu release complete message to the GMSC.
UE to UE Call Termination
UE to UE Call Termination
ORIGINATING
TERMINATING
UE
UE
GMSC
GMSC
GMSC
RNC
BSS
RNC RNC
BSS
RNC
"Confidential information -- may not be copied or disclosed without permission".
1) Disconnect
2) Release
3) Disconnect
4) Release Complete
5) Iu Release Command
6) Release
7) Release Complete
8) Iu Release Command
9) Iu Release Complete
Review Questions 7
1. When is the location update procedure triggered?
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential 8-1
Lesson 8
UMTS Handover
Objectives 8
Objectives
UMTS has a new radio interface to the mobile. The mobile is connected to the
Core Network by an RNS (Radio Network System). The RNS is equivalent to
the BSS in GSM and an RNC (Radio Network Controller) is equivalent to a
BSC in GSM.
UMTS Handover
UMTS handover over Iu interface is
called Relocation RNC
Node B
Iu interface
MSC
MSC A
A
RNS Iur
"Confidential information -- may not be copied or disclosed without permission".
Node B RNC
Iu interface
BSC
BSC
MSC
MSC C
C
BSS
A interface
The interface between the RNC and the MSC is called the Iu-interface
(equivalent to A-interface in GSM). The messages that go over the interface
are known as RANAP (Radio Access Network Application Part) messages.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Handover 8-3
Softer Handover - If an UE hands over from one cell to another and both
cells belong to the same Node B, the channel on the Iub interface does not
change : this is called a softer handover.
Hard HO - may be also performed within UTRAN, or the Core Network
may be involved if the Iur interface between RNSs does not exist.
In UMTS, Hard HO is similar to GSM HO. In order to maintain the
communication with the UE, establishment of a new radio connection is
necessary.
If the two RNCs have an Iur interface, this handover can occur without
CN involvement.
Intra RNC Inter RNC, Intra MSC Inter MSC, Intra PLMN
Soft This combination is This combination is This combination is not
HO applicable, but there applicable and there is applicable/possible.
is no impact to CN. impact to CN if there is
SRNS Relocation. The UE
is not involved in this type
of handover.
Hard This combination is This combination is This combination is
HO applicable, but there applicable, however, there applicable, however, there
is no impact to CN. is no impact to CN if IUR is no impact to CN if IUR is
interface is used. CN is used. CN is impacted if
impacted if there is SRNS there is SRNS Relocation
Relocation or if there is no or if there is no IUR
IUR interface. The UE is interface. The UE is
involved in this type of involved in this type of
handover. handover.
Handovers in UMTS
Inter RNC
Soft Handover
RNS SRNC
Node B
Core
CoreNetwork
Network
Iub
Iur
Node B
DRNC
"Confidential information -- may not be copied or disclosed without permission".
Iub
RNS
Iub Core
Node B Core
Network
SRNC Network
RNS
UMTS
UMTSRNC
RNC
GSM
GSMBSS
BSS
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Handover 8-5
SRNS relocation
SRNS Relocation is defined as a reconfiguration of the network route while
the radio link to the UE remains constant.
Before SRNS relocation, soft handover is performed via the Iur interface.
After SRNS relocation, the data path is optimized.
SRNS Relocation
SRNC
Iub Iu
3G_MSC
3G_MSC A
A
Node B
"Confidential information -- may not be copied or disclosed without permission".
Iur
DRNC
Node B
If Iur interface exists between two (or more) RNCs and Relocation
Required is sent to the CN because of SRNS Relocation procedure, the UE is
not involved in the relocation. This relocation procedure is entirely located
and executed by RNC and the CN.
Node B SRNC
UMSC
UMSC A
A
Iub
"Confidential information -- may not be copied or disclosed without permission".
BSS MSC
MSC B
B
SRNC
BSS
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Handover 8-7
RNC-A RNC-B
3G_MSC
3G_MSC A
A
Relocation-Required
"Confidential information -- may not be copied or disclosed without permission".
Relocation-Request
Service/Target RNC ID
RAB parameters
1 Relocation Relocation 2
preparation Allocation
Relocation-Request-Ack
Relocation Command
Relocation-detect
Relocation 3
Relocation-Complete completion
Release-Command
Release-Complete
relocation preparation
relocation allocation
relocation completion
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Handover 8-9
RNC-A RNC-B
3G_MSC
3G_MSC A
A
Relocation-Required
"Confidential information -- may not be copied or disclosed without permission".
Relocation-Request
Relocation-Request-Ack
Relocation Command
Relocation-detect
HO-Complete
Relocation-Complete
Release-Command
Release-Complete
3G_MSC
3G_MSC A
A
3G_MSC
3G_MSC B
B
"Confidential information -- may not be copied or disclosed without permission".
RNC A
RNC B
LAC 1
LAC 2
For intra-MSC handover, the DMS-MSC may not be notified that a handover
has taken place. However, for inter-MSC handovers, the DMS-MSC is
notified because the DMS-MSC must find the next DMS-MSC where to
complete the call handover.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Handover 8-11
3G_MSC A 3G_MSC B
RNS-A RNS-B
Reloc-Required
Prep. HO req. Allocation of Handover
Number = HON within
(Target RNC Id + LAC)
"Confidential information -- may not be copied or disclosed without permission".
VLRB
Reloc. Request
Answer
Release
End of call Send-End-Signal resp.
Release Complete
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 8. UMTS Handover 8-12
3G-MSC
3G-MSC A
A 3G-MSC
3G-MSC B
B
3G-MSC
3G-MSC C
C
"Confidential information -- may not be copied or disclosed without permission".
RNS A
RNS B
RNS C
LAC 1
LAC 2 LAC 3
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Handover 8-13
RNS C RNSB
Reloc. Required
Prepare Subs HO Req
Prepare HO Request
Allocation of HON
"Confidential information -- may not be copied or disclosed without permission".
Reloc. Request
Reloc. Complete
SES
ANS
Release
SES
Release Command
Release Complete
3G_MSC
3G_MSC A
A 2, 3
5 3G_MSC
3G_MSC B
B
6
"Confidential information -- may not be copied or disclosed without permission".
1
RNS A
RNS B
LAC 1
LAC 2
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Handover 8-15
3G_MSC A 3G_MSC B
RNS B RNS A
Relocation Request
Prep-Sub-HO req.
Relocation Request
"Confidential information -- may not be copied or disclosed without permission".
Relocation Command
Relocation Detect
Relocation Complete
Send-End-Signal req. Release Command
Release Complete
Release
Send-End-Signal resp.
Release Complete
In both cases, the 3G-MSC has the responsability to translate the messages
and parameters received from the radio interface from (or given to) BSSAP to
RANAP and from RANAP to BSSMAP.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Handover 8-17
BTS target
Handover Required
Relocation Request
Start T101 timer
Relocation Request Ack.
Stop T101 timer
Handover Command
The anchor point is the UMTS MSC. Classmark and ciphering information is
sent to the 2G side. The 3G_MSC does the conversion from RANAP to
BSSMAP so the message sent over the E-interface is a MAP message with
BSSMAP encapsulated.
3G_MSC A MSC B
UE/RNS A BSS B/MS/UE
Relocation Required
Prep-HO req.
HO Request
"Confidential information -- may not be copied or disclosed without permission".
HO-Request-Ack
Prep. -HO resp.
IAM
ACM
Relocation Command
Process-Access-Sig req. HO Detect
Answer
Release
Release Complete
Iu interface A interface
PE/TRD/CN/UM931 16.02/EN May, 2003 Lesson 8. UMTS Handover 8-19
The 3G_MSC also computes the GSM Kc from UMTS ciphering and
integrity information.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Handover 8-19
The target UMTS RNC uses 14.4k for all handovers from source GSM
BSS.
This information is set in the MSC, replacing the original negotiated rate
i.e All subsequent handovers starts with 14.4k.
MSC A 3G_MSC B
UE/BSS A RNS B/UE
HO Required
Prep-HO req.
Relocation Request
"Confidential information -- may not be copied or disclosed without permission".
Relocation-Request-Ack
Prep. -HO resp.
IAM
ACM
HO Command
Process-Access-Sig req. Relocation Detect
Answer
Release
End of call
Send-End-Signal resp.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Handover 8-21
Review Questions 8
1. List the three types of UMTS handover.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential 9-1
Lesson 9
UMTS Supplementary Services
Objectives 9
Objectives
The supplementary services handling process takes place in the following three
stages:
Provisioning enrolls the User Equipment (UE) with various services, such
as call forwarding. Registration of subscription options and the entry of
supplementary services parameters may be performed at this stage.
Supplementary services are assigned in the subscriber DMS-HLR.
The UE, VLR, and DMS-HLR are involved in retrieving subscription
options, registration parameters and activation parameters from the DMS-
HLR database.
The final stage of the supplementary services handling process occurs
during the use of supplementary services features as the call progresses
and as these features are turned on and off.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-3
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-5
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-7
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-9
IMSI Based SS 9
SS that are registered and activated against an IMSI
they become active upon provisioning
the presence of these SS denotes a fully active service
if deactivated then the service is withdrawn (no longer provisioned)
NOT activated/deactivated by the subscriber
Examples: AOCC, AOCI, CLIP, CLIR, HOLD, MPTY, LCO, COLP, COLR,
HOTBILL, ACC, CNAM, MCT AND ECT
BSG Based SS 9
SS that are registered and activated against a specific BSG (Basic
Services Group = Teleservices = Bearer Services)
provision does not result in activation
they are registered and activated per BSG
deactivation leaves the service provisioned
deprovision must be done explicitly
may be activated or deativated by the subscriber
In addition to or instead of the calling line ID, the subscriber may be given the
following information:
Presentation Indicator (PI) indicating
presentation allowed
presentation restricted
number not available due to interworking
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-11
Gateway MSC
5. IAM
2. SRI HLR
[FTN]
[MSISDN]
DMS-MSC DMS-HLR
"Confidential information -- may not be copied or disclosed without permission".
PSTN
4. SRI-ACK
[FTN]
1. Setup 3. SS info:
[MSISDN] CFU [FTN]
CFU allows the called subscriber to have the network divert all incoming
calls addressed to the called UE's directory number (DN) or those associated
with a basic service group, to another DN. Once CFU is activated, all
incoming calls are forwarded despite the condition of the termination. The
ability of the subscriber to originate calls is not affected by this feature.
CFU overrides all other types of call forwarding. Registration of CFU can
take place either by the service provider or with a control procedure by the
subscriber as shown in the above figure.
Gateway MSC
10. IAM
DMS-MSC 7. SIIC
6. IAM
[MSRN] 3. PRN
[IM SI]
8. SS info
Sub Stat = busy
Gateway MSC
4. PRN-ACK
HLR
2. SRI [MSRN]
DMS-MSC [MSISDN]
DMS-HLR
5. SRI-ACK
[MSRN]
1. Setup
[MSISDN]
CFB allows the called UE to have the network divert all incoming calls
addressed to the called UE DN or those associated with a basic service group.
These calls are diverted to another DN when they encounter a UE busy state.
Only incoming calls that meet conditions are forwarded as shown in the
above figure.
The CFB service can be further divided into the following types:
The served UE is identified as being in the busy state before paging the
mobile.
The served mobile may send a call confirm message with busy indicator
after the serving DMS-MSC sends a setup message to the mobile.
When responding to a setup request message, the served mobile sends a
release complete message with busy indicator to the DMS-MSC. In all
three cases, the VLR is notified by a busy error message. This instructs
the VLR to message the serving DMS-MSC, which then forwards the
call.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-13
HLR
DMS-HLR 3. PRN
2. SRI
"Confidential information -- may not be copied or disclosed without permission".
4. PRN-Ack
5. SRI-Ack
1. IAM VLR 8. Paging Unsuccessful
[MSISDN] TIMEOUT
6. IAM [MSRN] SS- info=CFNRc
DMS-MSC DMS-MSC
PSTN
9. IAM [FTN]
9. IAM [FTN]
Gateway MSC
7. Paging
CFNRc allows the called mobile subscriber to have the network divert all
incoming calls, or those associated with a basic service group. These calls are
diverted to another DN when they are addressed to the called UE DN which is
either not reachable or to which no response is received.
The ability of the subscriber to originate calls is principally not affected, but
practically it is affected if the UE is deregistered, if there is radio congestion
or if the UE is out of radio coverage. Once CFNRc is activated incoming calls
that meet CFNRc conditions are forwarded as shown in the above figure.
3. PRN
5. SS Info
CFNRc 4. PRN-Ack
[absent subscriber]
VLR
IMSI Detach
DMS-MSC
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-15
Call Hold/retrieve
The call hold service allows a served UE, who is provisioned with this
supplementary service, to interrupt communication on an existing active call
and subsequently reestablish communication. The traffic channel remains
assigned to the UE after the communication is interrupted to allow the
origination or possible termination of other calls.
CUG members can have additional capabilities that allow them to originate
calls outside the group (outgoing access), and/or to receive calls from outside
the group (incoming access). CUG members can also have additional
restrictions that prevent them from originating calls to other members of the
CUG (outgoing call barring within the CUG), or from receiving calls from
other members of the CUG (incoming call barring within the CUG).
AoC is comprised of the following two services, of which only one of these
services may be subscribed to at a time:
AoCI (Advice of Charge Information)
AoCC (Advice of Charge Charging)
AoCI is for user information only. It allows an UE to display the cost of a call.
However, AoCC is for the charging of an UE in real-time. AoCC applies to
applications where the user is generally not the subscriber.AoCC applies
where the user pays the subscriber for calls placed, rather than the service
provider. An example of this is a phone in a rental car.
Hot Billing
Hot billing is stored in the HLR and is provisioned per IMSI. Billing records
generated by a subscriber are marked and are segregated from other billing
records by being redirected to a hot billing stream.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-17
MCT stores the calling party number and other call related information at the
DMS-MSC for subscribers provisioned with MCT. This information is
continually updated with the information of the last incoming call received by
the subscriber.
1. SETUP
4. RELEASE [dialed digits: 00 34 728 922 312]
[error barring]
BOIC provides the subscriber with the ability to deny outgoing call setup
which are International calls from the current location. Outgoing call setup
possibilities exist only to subscribers of the PLMN(s) and the fixed
network(s) of the country where the mobile subscriber is presently located.
As a result, the present PLMN may be the home PLMN or a visited PLMN,
while the fixed network may be that of the home PLMN country or that of a
visited PLMN country as shown in the above figure.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-19
2. SRI
[MSISDN]
DMS-MSC
HLR
"Confidential information -- may not be copied or disclosed without permission".
4. SRI-Ack
[error: Call Barred]
DMS-HLR
1. SETUP
5. RELEASE
[MSISDN] 3. IMSI
SS info = BAIC
BAIC allows the subscriber to deny incoming call setup. This service does
not affect the ability of the subscriber to make outgoing calls. Almost all the
functions concerned with BAIC are located at the HLR as shown in the above
figure.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-21
when registered in the HPLMN, operator specific barring (Type 1,2,3 and
4) are network defined barring types. These are an extension of premium
rate calls as the barring is performed on the dialled digits.
and/or
2. Modify SS
DMS-MSC HLR
4. SS Management Barred
"Confidential information -- may not be copied or disclosed without permission".
DMS-HLR
5. Reject
Modify SS
1. Modify SS
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-23
Proprietary Services 9
Proprietary services that require subscriber data stored in the HLR and
downloaded and or stored in the VLR indicate a proprietary change to the
UMTS MAP protocol. The strategy for transferring proprietary information
via UMTS MAP is to use a set of RESERVED values of the SS-code
parameter to indicate the proprietary supplementary service. There must be
mutual agreement between the HLR and serving MSCs on these proprietary
SS codes.
Class of Service
COS allows association of an UE with a CUSTGRP or an NCOS. A
CUSTGRP is given to a subscriber community to logically relate and
uniquely identify each member of a group and to provide them with uniform
and group-specific services. An NCOS overrides the CUSTGRP attribute list.
The COS information is optionally assignable to the subscriber and is stored
in the HLR. It is downloaded and stored in the VLR at location update time,
along with the rest of the subscriber data, as well as insert subscriber data
(ISD) transactions, which impacts the UMTS MAP.
3. SS info: COS-PNP
PNP Normalization:
4859 01 39 44 4859
5. IAM 2. SIOC
[01 39 44 4859] [4859]
"Confidential information -- may not be copied or disclosed without permission".
VLR
PSTN DMS-MSC
DMS-MSC 4. COMPLETE CALL
[01 39 44 4859]
1. SETUP
[4859]
The private numbering plan service allows UEs to communicate across one or
more networks by defining, managing and using digit sequences that have
different structures and meanings than provided by the public numbering
plan. A PNP, is a separate and additional numbering plan to the UMTS
supported ISDN/E.164 public network as shown in the above figure.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-25
Hotline Routing
The hotline routing service facilitates the routing of calls, irrespective of what
the originator dials, to predefined destinations such as operators and
attendants. It is the responsibility of the DMS-HLR to provision and activate
this service for all applicable users, including new users with minimum to no
subscription or provisioning information.
Call Interception
Call interception allows security agencies to transparently monitor designated
subscribers calls. Any basic service of the subscriber can be monitored.
With ALS, a mobile user is allowed to make and receive speech or telephony
calls on either line as desired and is billed separately for calls on each line.
Each line is associated with a separate directory number (MSISDN) and
separate subscription profile.
When subscribers roam outside the HPLMN area and originate a call, the
local target area of the visiting MSC is checked to determine whether the call
is local. If the terminating number is present, the call continues. Otherwise, it
is deemed not local and the call is barred.
x - Supported interactions
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-27
Extension Service 9
Extension service combines the services known as Flexible Alerting
(simultaneous alerting) and Mobile Access Hunting (sequential alerting) into
a single service.
RNS
UE busy
"Confidential information -- may not be copied or disclosed without permission".
DMS-MSC
DMS-MSC 2
3 RNS
1
4 UE busy
PSTN
4 Third group member is a landline (possibly a voice mail) and the call is connected.
The terminals, (or members) in the extension service list can consist of a
single DN or group of DNs (called a subgroup). There are a maximum of
three members in the extension service group.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-29
RNS
3 Call not Connected
"Confidential information -- may not be copied or disclosed without permission".
2
DMS-MSC
DMS-MSC
RNS
2 3
Call not Connected
1. SETUP 2
PSTN
SPEAKING
3
Location Services
y Criminal tracking
y Roadside assistance y E-Yellow Pages
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-31
LMU Ls MAP
Type A A Lh Lc
Uu
Lg
Iur
RNC Gateway
Node B
2WKHU 3/01
(LMU Type B)
MLC
Iub
LMUs are fixed measuring points that are used to measure the time of arrival
of signals from several BTSs in unsynchronized networks.
The SMLC:
Contains functionality to support LCS.
Manages the overall coordination and scheduling of resources required to
perform positioning of a mobile.
Calculates the final location estimate and accuracy.
Is located in RNC for UMTS network and, in BSS for GSM network.
UMTS network does not support the NSS-based SMLC architecture.
The GMLC:
Is the first node that an external LCS client accesses in a GSM PLMN to
obtain the location information of a particular subscriber.
Performs registration authorization.
For MT-LR (Mobile Terminating Location Request) requests, the
GMLC queries the HLR (SRI for LCS operation) to determine the
VMSC the subscriber is located in and then sends the Provide
Subscriber Location (PSL) to the corresponding MSC.
For MO-LR (Mobile Originating Location Request) requests, after the
MSC receives the geographical location of the subscriber from the
RNC/SMLC, it sends it to the GMLC associated with the LCS client
using the MAP Subscriber Location Report (SLR) operation.The
GMLC then sends it to the appropriate LCS client.
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-33
MNP
SRF 3
M . SR
ap I
v3 ac
M kR
"Confidential information -- may not be copied or disclosed without permission".
SI
2.
SD N
SR
N
IM
1. I
SIS
AM
Calling Party A - MS
DN
ISD
N
,
Subscription Network SI SDN
+M
RN
M OA=x
4. I A N
DMS-GMSC/UMSC
Visited
GMSC Visitednetwork
network
GMSC oror
4. IAM (RN+MSISDN) Visited Switch
Visited Switch
"Confidential information -- may not be copied or disclosed without permission".
2. InitialDP(MSISDN)
Originating
Originating
network
network
1. IAM (RN+MSISDN)
NPDB
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential UMTS Supplementary Services 9-35
Pa
IA
ck
Originating (M
Originating SR
network
network N
)
PRN
4. SRI
HLR
PRN_Ack
MNP-SRF
NPDB
3
Number Range Holder (non-ported)/
Subscriber Network (ported-in)
Review Questions 9
1. What are the supplementary services?
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential A-1
List of terms A
Numerics
3GPP
3rd Generation Partnership Project 1-4
A
ACCS
Automatic calling card services 4-6
ACM
Address Complete Message 7-21
Administration Centre (AdC) 3-9
AIN
Advanced Intelligent Network 4-6
A-links
Access links 4-9
ALS
Alternate Line Service 9-23, 9-25
ALS
Alternate line service 9-5
AMR
Adaptive Multi Rate 2-16
AN
Aggregation Node 2-16
ANM
ANswer Message 7-21
ANSI
American National Standards Institute 2-19, 5-2
AOC
Advice of charge 9-5
AoCC
Advice of Charge Charging 9-16
AoCI
Advice of Charge Information 9-16
ASE
Application Service Elements 5-11
AuC
Authentication Center 2-3, 2-20
B
BAIC
Barring of all incoming calls 9-4
BAOC
Barring of all outgoing calls 9-4
B-links
Bridge links 4-9
BOIC
Barring of outgoing international calls 9-4
BSC
Base Station Controller 2-2
BSP
Bulk Service Provisioning 3-10
BSS
Base Station Subsystem 2-2
BSSMAP
Base Station Subsystem Managment Application Part 5-9
BTS
Base Transceiver Station 2-2
C
CADR
Call Associated Data Records 3-11
CAM
Communication Application Module 2-19
CC
Call Control 6-4
CCITT
Consultative Committee for International Telephone and Telegraph 5-2
CCN
Circuit Core Network vi, 2-14, 5-9
CCS7 3-17
CCS7
Common Channel Signaling system 7 4-2
CCS
Common Channel Signaling 4-2
CDA
Circuit Data Asynchronous 9-26
CDR
Call Detail Records 9-16
CDS
Circuit Data Synchronous 9-26
CEM
Core Element Manager 3-6
CEPT
European Post and Telecommunications Conference 1-3
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential List of terms A-3
CFB
Call forwarding busy 9-3
CFNRc
Call forwarding not reachable 9-3
CFNRy
Call forwarding no reply 9-3
CFU
Call Forwarding Unconditional 9-3
CGSA
Cellular Geographic Service Area 1-7
CIS
Call Intercept System 3-11
CISS
Call Independent Supplementary Services 9-7
CL
Cancel Location 7-6
C-links
Cross links 4-9
CLIP
Calling line identification presentation 9-6
CLIR
Calling line identification restriction 9-6
CM
Configuration Management 3-6
CM
Connection Management 6-4
CNAM
Calling name delivery 9-10
CN
Core Network 2-5, 7-18, 9-31
COS
Class Of Service 9-23
CS
Call Server 2-14
CS
Circuit Switched 2-5, 2-14, 2-16
CSD
Circuit Switch Data 8-6
CUG
Closed User Group 9-15
CW
Call waiting 9-5
D
DDU
(Data Distribution Unit 5-9
DIRP
Device Independent Recording Package 3-13
D-links
Diagonal links 4-9
DPN
Data Packet Network 3-6
E
ECT
Explicit Call Transfer 9-17
EIR
Equipment Identification Register 2-21
EIR
Equipment Identity Register 2-9
E-links
Extended links 4-9
ETSI
European Telecommunications Standards Institute 1-3
F
F-links
Fully-associated links 4-9
FLPPiberized LPP 2-19
FM
Fault Management 3-6
FP
File Processor 3-13
FSL
Flexible Service Logic 3-17
FTAMFile Transfer Access and Management 3-13
G
GGSN
Gateway GPRS Support Node 2-3
GMLC
Gateway Mobile Location Center 9-32
GMSC
Gateway MSC 7-21
GPP
GSM Passport 2-24
GPRS
General Packet Radio Service 2-3
GSM
Groupe Spcial Mobile 1-3
GTP
GPRS Tunnelling Protocol 2-6
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential List of terms A-5
GUI
Graphical User Interface 2-30, 3-6, 3-7
H
HFN
HyperFrame Number 7-15
HIOP
High Performance Input Output Processor 2-20
HLR
Home Location Register 2-3
HSL
High Speed Link 2-20
I
IAM
Initial Address Message 7-21
IK
Integrity Key 7-15
IMEI
International Mobile Equipment Identities 2-21
IMEI
International Mobile Equipment Identity 2-9
IMSI
International Mobile Subscriber Identity 2-10, 7-3
IMT-2000
International Mobile Telecommunications 1-4
INODE
INtegrated NODE 4-7
IOM
Input/output Module vii
IP
Intelligent Peripherals 3-17
ISD
Insert Subscriber Data 7-6
ISDN
Integrated Services Digital Network 2-5
ISM
Integrated Service Module vii
ISO
International Standards Organization 5-4
ISUP
Integrated Service Digital Network User Part 5-11
ITU
International Telecommunication Union 1-4, 2-19
IWF
InterWorking Function 2-15, 2-24
K
KSI
Key Set Identifier 7-18
KSS
Key Stream Segment 7-17
L
LAC
Location Area Codes 1-8
LAI
Location Area Identifier 7-9
LCO
Local Call Only 9-23, 9-25
LCO
Local calls only 9-5
LCS
LoCation Services 9-30
LIU7
Link Interface Unit for SS7 networks 2-19
LPP
Link Peripheral Processor 2-19
M
MAC-I
Message Authentication Code for data Integrity 7-15
MAC-I
Message Authentication Code for Integrity 7-19
MAP
Maintenance and Administration Position 3-6
MAP
Mobile Application Part 5-5
MAP
Mobile Application Part Layer 5-10
MCT
Malicious Call Trace 9-17
MDM
Multi-service Data Manager 3-6
MM
Mobility Management 6-5, 7-3
MNP
Mobile Number Portability 9-33
MOI
Managed Object Instance 3-6
MO-LR
Mobile Originating Location Request 9-32
MOP
Method Of Procedure 2-19
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential List of terms A-7
MSC
Mobile services Switching Center 2-3
MSISDN
Mobile Subscriber ISDN Number 2-10
MS
Mobile Station 2-2
MSP
Mobile Subscriber Provisioning 3-9
MSRN
Mobile Station Roaming Number 7-21
MT-LR
Mobile Terminating Location Request 9-32
MT
Mobile Termination 2-5
MTP
Message Transfer Part 5-5
MTP
Message Transfer Part Layer 5-7
MWI
Message Waiting Indication 3-15
N
NCADR
Non-Call Associated Data Records 3-12
NMT
Nordic Mobile Tlephone 1-2
NOA
Nature Of Address 9-35
NSS
Network and Switching Subsystem 2-2, 2-3
O
ODB
Operator Determined Barring 9-20
ODB
Operator-determined barring 9-5
OM
Operational Measurements 3-6
OSI
Open System Interconnection 5-2
P
PIN
Personal Identification Number 2-10
PI
Presentation Indicator 9-9
PLMN
Public Land Mobile Network 1-7, 9-32
PM
Performance Management 3-6
PMs
Peripheral Module vi
PPD
Partial Packet Discard 3-20
PSL
Provide Subscriber Location 9-32
PS
Packet Switched 2-6, 2-16
PSTN
Public Switched Telephone Network 2-3, 2-5
PSTN
Public Switching Telephone Network 7-20
PTS
Per-Trunk Signaling 4-2
PWI
Public Windows Interface 2-30
Q
QoS
(Quality of Service 2-6
R
RAB
Radio Access Bearer 7-21
RANAP
Radio Access Network Application Part 5-9, 8-2
RA
Routing Area 1-9
RNC
Radio Network Controller 2-13, 8-2
RNS
Radio Network Subsystems 2-13
RNS
Radio Network System 8-2
RRC
Radio Ressource Control 7-15
S
SCCP
Signaling Connection Control Part 5-5
SCCP
Signalling Connection Control Part 8-17
SCE
Service Creation Environment 3-17
SCF
Service Control Function 3-17
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential List of terms A-9
SCP
Service Control Point 3-17, 4-7, 4-8
SDM/FT
SuperNode Data Manager Fault tolerant viii
SDM/FT
SuperNode Data Manager/Fault Tolerent 3-4
SG
Signalling Gateway 2-16
SGSN
Serving GPRS Support Node 2-3
SIR
Send Identification Request 7-5
SLR
Subscriber Location Report 9-32
SMLC
Serving Mobile Location Center 9-32
SMS-C
Short Message Serve Center 3-2
SMS-C
Short Message Service Center 2-22
SMS-CSI
Short Message Service - CAMEL Subscription Information 3-20
SMS
Service Management System 3-17
SMS
Short Message Service 6-4
SP
Signaling Point 4-7
SRI
Send Routing Information 5-11, 7-21
SRNS
Serving Radio Network System 8-2
SS7
Signaling System 7 4-5
SSP
Service Switching Point 4-7, 4-8
SS
Supplementary Service 6-4
SS
Supplementary Services 9-8
STP
Signaling Transfer Point 2-15, 4-7, 4-8
T
TACS
Total Access Communications Telephone Systems 1-2
TAF
Terminal Adaptation Function 2-5
TCAP
Transaction Capabilities Application Part 5-5
TCH
Traffic Channel 8-6
TCP
Transmission Control Protocol 3-13
TCU
TransCoder Unit 2-2
TDMA
Time Division Multiple Access 1-5
TDM
Time Division Multiplexed 2-5
TE
Terminal Equipment 2-5
TMN
Telecommunication Management Network 3-6
TRAU
Transcoder/ Rate Adapter Unit 2-16
TRAU
Transcoder/Rate Adaptation Unit 2-2
TUP
Telephone User Part 5-11
U
UEA
UMTS Encryption Algorithm 7-17, 7-18
UE
User Equipment 2-5, 7-2
UIA
UMTS Integrity Algorithm 7-15, 7-18
UL
Update Location 7-6
UP
User Part 5-5
USIM
Universal Subscriber Identity Module 2-9
USP
Universal Signaling Point 2-18
USP
Universal Signalling Point 3-7
UTRAN
UMTS Terrestrial Radio Access Network 2-5
Course UM931 Standard 16.02 May 2003 For training purposes only
Nortel Networks Confidential List of terms A-11
V
VLR
Visitor Location Register 2-3
VMCDB
Voice Mail Call Drop Back 3-15
VMG
Virtual Media Gateway 2-16
VMS
Voice Mail System 3-2, 3-14
VPN
Virtual Private Network 3-20, 4-6
W
W-CDMA
Wide Band - Code Division Multiple Access 1-5
WCDMA
Wide Band Code Division Multiple Access 2-5
WG
Wireless Gateway 2-16
X
XA-Core
eXtended Architure Core 2-15
XA-Core
eXtended Architure Core 2-15
Course UM931 Standard 16.02 May 2003 For training purposes only
test
Family Product Manual Contacts Copyright Confidentiality Legal
NSS16/UMTS03
Wireless CCN Overview
Student Guide
To order documentation from Nortel Networks Global Customer Care Services Training and Documentation Services, call
(1) (877) 662-5669
Information is subject to change without notice. Nortel Networks reserves the right to make changes in design or components as
progress in engineering and manufacturing may warrant.
* Nortel Networks, the Nortel Networks logo, the Globemark HOW the WORLD SHARES IDEAS, and Unified Networks are
trademarks of Nortel Networks.
Trademarks are acknowledged with an asterisk (*) at their first appearance in the document.
Document number: Course UM931
Product release: NSS16/UMTS03
Document version: Standard 16.02
Date: May 2003
Printed in France