Академический Документы
Профессиональный Документы
Культура Документы
Table of Contents
1. 3G Systems
2. UMTS Services
3. UMTS Architecture
4. Core Network
5. Radio Access
6. User Equipment
1. 3G Systems
3G Systems are intended to provide a global mobility with wide range of services
including telephony, paging, messaging, Internet and broadband data. International
Telecommunication Union (ITU) started the process of defining the standard for third
generation systems, referred to as International Mobile Telecommunications 2000
(IMT-2000). In Europe European Telecommunications Standards Institute (ETSI) was
responsible of UMTS standardization process. In 1998 Third Generation Partnership
Project (3GPP) was formed to continue the technical specification work. 3GPP has
five main UMTS standardization areas: Radio Access Network, Core Network,
Terminals, Services and System Aspects and GERAN.
Specifications for radio performance aspects from the system point of view
Messaging
Development of service capabilities and service architecture for cellular, fixed and
cordless applications.
Third Generation Partnership Project 2 (3GPP) was formed for technical development
of cdma2000 technology which is a member of IMT-2000 family.
In February 1992 World Radio Conference allocated frequencies for UMTS use.
Frequencies 1885 - 2025 and 2110 - 2200 MHz were identified for IMT-2000 use.
See the UMTS Frequency page for more details. All 3G standards are still under
constant development. In 1999 ETSI Standardization finished for UMTS Phase 1
(Release '99, version 3) and next release is due December 2001. UMTS History page
has a list of all major 3G and UMTS milestones. Most of the European countries and
some countries round the world have already issued UMTS licenses either by beauty
contest or auctions.
2. UMTS Services
UMTS offers teleservices (like speech or SMS) and bearer services, which provide
the capability for information transfer between access points. It is possible to
negotiate and renegotiate the characteristics of a bearer service at session or
connection establishment and during ongoing session or connection. Both connections
oriented and connectionless services are offered for Point-to-Point and Point-to-
Multipoint communication.
Bearer services have different QoS parameters for maximum transfer delay, delay
variation and bit error rate. Offered data rate targets are:
UMTS network services have different QoS classes for four types of traffic:
Conversational class (voice, video telephony, video gaming)
Streaming class (multimedia, video on demand, webcast)
UMTS will also have a Virtual Home Environment (VHE). It is a concept for
personal service environment portability across network boundaries and between
terminals. Personal service environment means that users are consistently presented
with the same personalized features, User Interface customization and services in
whatever network or terminal, wherever the user may be located. UMTS also has
improved network security and location based services.
3. UMTS Architecture
A UMTS network consist of three interacting domains; Core Network (CN), UMTS
Terrestrial Radio Access Network (UTRAN) and User Equipment (UE). The main
function of the core network is to provide switching, routing and transit for user
traffic. Core network also contains the databases and network management functions.
The basic Core Network architecture for UMTS is based on GSM network with
GPRS. All equipment has to be modified for UMTS operation and services. The
UTRAN provides the air interface access method for User Equipment. Base Station is
referred as Node-B and control equipment for Node-B's is called Radio Network
Controller (RNC). UMTS system page has an example, how UMTS network could be
build.
It is necessary for a network to know the approximate location in order to be able to
page user equipment. Here is the list of system areas from largest to smallest.
4. Core Network
The Core Network is divided in circuit switched and packet switched domains. Some
of the circuit switched elements are Mobile services Switching Centre (MSC), Visitor
location register (VLR) and Gateway MSC. Packet switched elements are Serving
GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN). Some
network elements, like EIR, HLR, VLR and AUC are shared by both domains.
The Asynchronous Transfer Mode (ATM) is defined for UMTS core transmission.
ATM Adaptation Layer type 2 (AAL2) handles circuit switched connection and
packet connection protocol AAL5 is designed for data delivery.
The architecture of the Core Network may change when new services and features are
introduced. Number Portability Database (NPDB) will be used to enable user to
change the network while keeping their old phone number. Gateway Location
Register (GLR) may be used to optimize the subscriber handling between network
boundaries. MSC, VLR and SGSN can merge to become a UMTS MSC.
5. Radio Access
Wide band CDMA technology was selected to for UTRAN air interface. UMTS
WCDMA is a Direct Sequence CDMA system where user data is multiplied with
quasi-random bits derived from WCDMA Spreading codes. In UMTS, in addition to
channelization, Codes are used for synchronization and scrambling. WCDMA has two
basic modes of operation: Frequency Division Duplex (FDD) and Time Division
Duplex (TDD). UTRAN interfaces are shown on UMTS Network page.
6. User Equipment
the UMTS standard does not restrict the functionality of the User Equipment in any
way. Terminals work as an air interface counter part for Node-B and have many
different types of identities. Most of these UMTS identity types are taken directly
from GSM specifications.
UMTS IC card has same physical characteristics as GSM SIM card. It has several
functions:
• Support of one User Service Identity Module (USIM) application (optionally more
that one)
• Support of one or more user profile on the USIM
• Update USIM specific information over the air
• Security functions
• User authentication
• Optional inclusion of payment methods
• Optional secure downloading of new applications
NETWORKS LAYOUT
Picture below shows how UMTS 3G networks could be build.
WRC-2000 in Istanbul
• Identified the bands 1710 - 1885 and 2500 - 2690 MHz for IMT-2000
• Identified those parts of the band 806 - 960 MHz which are allocated to the mobile
service on a primary basis
• Admitted that High Altitude Platform Stations (HAPS) may use the WARC-92
frequency bands for terrestrial IMT-2000 on restrictive conditions
• Decided that the frequency bands 1525 - 1544, 1545 - 1559, 1610 - 1626.5, 1626.5
- 1645.5, 1646.5 - 1660.5 and 2483.5 - 2500 MHz may be used for the satellite
component of IMT-2000, as well as the bands 2500 - 2520 MHz and 2670- 2690
MHz, depending on market developments
• Decided that "the bands, or portions of the bands, 1710 - 1885 MHz and 2500 -
2690 MHz, are identified for use by administrations wishing to implement
International Mobile Telecommunications-2000 (IMT-2000). This identification does
not preclude the use of these bands by any application of the services to which they
are allocated and does not establish priority in the Radio Regulations".
WRC
WRC-2000 IMT-2000 Frequencies
TX-RX
TX frequency separation
UARFCN definition
UARFCN definition (Band II additional channels)
UMTS has several different time slot configuration depending on the used channel.
Here is an example of DPCH (Dedicated Physical Channel) downlink and uplink time
slot allocation.
TCP stands for Transmit Power Control, Feedback Information (FBI) ( ) is used for
closed loop transmission diversity. Transport Format Combination Indicator ((TFCI)
contains the information relating to data rates. Pilot bits are always the same and are
DPCH Time Slot Structure
Here are the theoretical maximum data speeds of 2G, 2.5G, 3G and beyond, and compared to LAN
data speeds.
Data Speed of Mobile Systems (top) and LANs (bottom)
The general structure of a Common Transport Channel frame between Node B and
RNC consists of a header and a payload.
There are two types of frames (indicated by the Frame Type field).
• Data frame.
• Control frame.
The general structure of frames
UTRA FDD radio interface has logical channels, which are mapped to transport
channels, which are again mapped to physical channels. Logical to Transport channel
conversion happens in Medium Access Control (MAC) layer, which is a lower
sublayer in Data Link Layer (Layer 2).
Logical Channels:
Broadcast Control Channel (BCCH), Downlink (DL)
Paging Control Channel (PCCH), DL
Dedicated Control Channel (DCCH), UL/DL
Common Control Channel (CCCH), UL/DL
Dedicated Traffic Channel (DTCH), UL/DL
Common Traffic Channel (CTCH), Unidirectional (one to many)
Transport Channels:
Dedicated Transport Channel (DCH), UL/DL, mapped to DCCH and DTCH
Broadcast Channel (BCH), DL, mapped to BCCH
Forward Access Channel (FACH), DL, mapped to BCCH, CCCH, CTCH, DCCH and
DTCH
Paging Channel (PCH), DL, mapped to PCCH
Random Access Channel (RACH), UL, mapped to CCCH, DCCH and DTCH
Uplink Common Packet Channel (CPCH), UL, mapped to DCCH and DTCH
Downlink Shared Channel (DSCH), DL, mapped to DCCH and DTCH
Physical Channels:
Primary Common Control Physical Channel (PCCPCH), mapped to BCH
Secondary Common Control Physical Channel (SCCPCH), mapped to FACH, PCH
Physical Random Access Channel (PRACH), mapped to RACH
Dedicated Physical Data Channel (DPDCH), mapped to DCH
Dedicated Physical Control Channel (DPCCH), mapped to DCH
Physical Downlink Shared Channel (PDSCH), mapped to DSCH
Physical Common Packet Channel (PCPCH), mapped to CPCH
Synchronisation Channel (SCH)
Common Pilot Channel (CPICH)
Acquisition Indicator Channel (AICH)
Paging Indication Channel (PICH)
CPCH Status Indication Channel (CSICH)
Collision Detection/Channel Assignment Indication Channel (CD/CA-ICH)
UTRA Channels
The general protocol model for UTRAN Interfaces is shown below. The structure is
based on the principle that the layers and planes are logically independent of each
other. Therefore, as and when required, the standardisation body can easily alter
protocol stacks and planes to fit future requirements.
General Protocol Model for UTRAN Interfaces
Horizontal Layers
The Protocol Structure consists of two main layers, Radio Network Layer, and
Transport Network Layer. All UTRAN related issues are visible only in the Radio
Network Layer, and the Transport Network Layer represents standard transport
technology that is selected to be used for UTRAN, but without any UTRAN specific
requirements.
Vertical Planes
The Control Plane Includes the Application Protocol, i.e. RANAP, RNSAP or
NBAP, and the Signalling Bearer for transporting the Application Protocol messages.
Among other things, the Application Protocol is used for setting up bearers for (i.e.
Radio Access Bearer or Radio Link) in the Radio Network Layer.
The User Plane Includes the Data Stream(s) and the Data Bearer(s) for the Data
Stream(s). The Data Stream(s) is/are characterised by one or more frame protocols
specified for that interface.
The Transport Network Control Plane does not include any Radio Network Layer
information, and is completely in the Transport Layer. It includes the ALCAP
protocol(s) that is/are needed to set up the transport bearers (Data Bearer) for the User
Plane. It also includes the appropriate Signalling Bearer(s) needed for the ALCAP
protocol(s).
The Transport Network Control Plane is a plane that acts between the Control
Plane and the User Plane. The introduction of Transport Network Control Plane is
performed in a way that the Application Protocol in the Radio Network Control Plane
is kept completely independent of the technology selected for Data Bearer in the User
Plane. Indeed, the decision to actually use an ALCAP protocol is completely kept
within the Transport Network Layer.
Iur Interface Protocol Structure
Iur layers
Further Reading:
During the cell search, the UE searches for a cell and determines the downlink
scrambling code and frame synchronisation of that cell. The cell search is typically
carried out in three steps:
During the first step of the cell search procedure the UE uses the SCH's primary
synchronisation code to acquire slot synchronisation to a cell. This is typically done
with a single matched filter (or any similar device) matched to the primary
synchronisation code which is common to all cells. The slot timing of the cell can be
obtained by detecting peaks in the matched filter output.
During the second step of the cell search procedure, the UE uses the SCH's secondary
synchronisation code to find frame synchronisation and identify the code group of the
cell found in the first step. This is done by correlating the received signal with all
possible secondary synchronisation
ronisation code sequences, and identifying the maximum
correlation value. Since the cyclic shifts of the sequences are unique the code group as
well as the frame synchronisation is determined.
Step 3: Scrambling-code
code identification
The Synchronisation Channel (SCH) is a downlink signal used for cell search. The
channels, the Primary and Secondary SCH. The 10 ms radio
SCH consists of two sub channels
frames of the Primary and Secondary SCH are divided into 15 slots, each of length
2560 chips. Picture above illustrates the
t structure of the SCH radio frame.
The Primary SCH consists of a modulated code of length 256 chips, the primary
synchronization code (PSC) is transmitted once every slot. The PSC is the same for
every cell in the system.
Synchronisation
Channel Note
acquired
Primary Chip, Slot, Symbol 256 chips
SCH Synchronisation The same in all cells
Frame 15-code sequence of secondary
Secondary Synchronisation, synchronisation codes.
SCH Code Group (one of There are 16 secondary synchronisation
64) codes.
There are 64 S-SCH
SCH sequences corresponding
to the 64 scrambling code groups
256 chips, different for different cells and slot
intervals
Common Scrambling code To find the primary scrambling code from
Pilot CH (one of 8) common pilot CH
Super Frame Fixed 30 kbps channel
PCCPCH *) Synchronisation, 27 kbps rate
BCCH info spreading factor 256
Carries FACH and PCH channels
SCCPCH **)
Variable bit rate
Random Access
The Random Access Channel (RACH) is an uplink transport channel. The RACH is
always received from the entire cell. The RACH is characterized by a collision risk
and by being transmitted using open
op loop power control.
The 10 ms RACH message part radio frame is split into 15 slots, each of length Tslot
parts a data part to which the RACH transport
= 2560 chips. Each slot consists of two parts,
channel is mapped and a control part that carries Layer 1 control information. The
parallel A 10 ms message part consists of
data and control parts are transmitted in parallel.
one message part radio frame,
frame while a 20 ms message part consists of two consecutive
frames. The data part consists of 10*2k bits, where
10 ms message part radio frames
k=0,1,2,3. This corresponds to a spreading factor of 256, 128, 64, and 32 respectively
for the message data part.
Uplink Common Packet channel (CPCH) is an extension to the RACH channel for
packet-based user data.
PCPCH Access Example:
Call Setup
Basic Mobile Originating Call Diagram
Open loop power control is the ability of the UE transmitter to sets its output power
to a specific value. It is used for setting initial uplink and downlink transmission
powers when a UE is accessing the network. The open loop power control tolerance is
± 9 dB (normal conditions) or ± 12 dB (extreme conditions)
Inner loop power control (also called fast closed loop power control) in the uplink
is the ability of the UE transmitter to adjust its output power in accordance with one
or more Transmit Power Control (TPC) commands
commands received in the downlink, in order
to keep the received uplink Signal-to-Interference
Signal Interference Ratio (SIR) at a given SIR target.
The UE transmitter is capable of changing the output power with a step size of 1, 2
and 3 dB, in the slot immediately after the TPC_cmd
TPC_cmd can be derived. Inner loop
power control frequency is 1500Hz.
1500
The serving cells estimate SIR of the received uplink DPCH, generate TPC
commands (TPC_cmd) and transmit the commands once per slot according to the
following rule: if SIRest > SIRtarget then the TPC command to transmit is "0",, while if
SIRest < SIRtarget then the TPC command to transmit is "1". Upon reception of one or
more TPC commands in a slot, the UE derives a single TPC command for each slot,
combining multiple TPC commands if more than than one is received in a slot. Two
algorithms are supported by the UE for deriving a TPC_cmd. Which of these two
algorithms is used, is determined by a UE UE-specific higher-layer parameter,
"PowerControlAlgorithm".
Algorithm 1:
• The power control step is the change in the UE transmitter output power in
response to a single TPC command
Algorithm 2:
• If all five estimated TPC command are "down" the transmit power is reduced by 1
dB
• If all five estimated TPC command are "up" the transmit power is increased by 1
dB
• Otherwise the transmit power is not changed
The transmit power of the downlink channels is determined by the network. The
values 0.5, 1, 1.5 or 2 dB. It is mandatory for
power control step size can take four values:
UTRAN to support step size of 1 dB, while support of other step sizes is optional. The
UE generates TPC commands to control the network transmit power and send them in
the TPC field of the uplink DPCCH. Upon receiving the TPC TPC commands UTRAN
adjusts its downlink DPCCH/DPDCH power accordingly.
Outer loop power control is used to maintain the quality of communication at the
level of bearer service quality requirement, while using as low power as possible. The
uplink outer loop power control is responsible for setting a target SIR in the Node B
for each individual uplink inner loop power control. This target SIR is updated for
each UE according to the estimated uplink quality (BLock Error Ration, Bit Error
Ratio) for each Radio Resource Control connection. The downlink outer loop power
control is the ability of the UE receiver to converge to required link quality (BLER)
set by the network (RNC) in downlink.
Power control of the downlink common channels are determined by the network.
In general the ratio of the transmit power between different downlink channels is not
specified in 3GPP specifications and may change with time, even dynamically.
Paging
The Paging Channel (PCH) is a downlink transport channel. The PCH is always
transmitted over the entire cell. The transmission of the PCH is associated with the
transmission of physical-layer generated Paging Indicators, to support efficient sleep-
mode procedures.
In case that more than a single PCH and associated PICH are defined in SIB 5, the UE
shall perform a selection according to the following rule:
• The UE shall select a SCCPCH from the ones listed in SIB 5 based on IMSI as
follows:
where K is equal to the number of listed SCCPCHs which carry a PCH (i.e.
SCCPCHs carrying FACH only shall not be counted). These SCCPCHs shall be
indexed in the order of their occurrence in SIB 5 from 0 to K-1.
"Index of selected SCCPCH" identifies the selected SCCPCH with the PCH and the
uniquely associated PICH to be used by the UE. If the UE has no IMSI, for instance
when making an emergency call without USIM, the UE shall use as default number
IMSI = 0.
The UE may use Discontinuous Reception (DRX) in idle mode in order to reduce
power consumption. When DRX is used the UE needs only to monitor one Page
Indicator, PI, in one Paging Occasion per DRX cycle.
The Paging Indicator Channel (PICH) is a fixed rate (SF=256) physical channel
used to carry the paging indicators. The PICH is always associated with an S-CCPCH
to which a PCH transport channel is mapped. Picture below illustrates the frame
structure of the PICH. One PICH radio frame of length 10 ms consists of 300 bits. Of
these, 288 bits are used to carry paging indicators. The remaining 12 bits are not
formally part of the PICH and shall not be transmitted (DTX). The part of the frame
with no transmission is reserved for possible future use.
Paging procedure is used to transmit paging information to selected UEs in idle mode,
mode
CELL_PCH or URA_PCH state using the paging control channel (PCCH). Upper
layers in the network may request paging, to e.g. establish a signalling connection.
UTRAN may initiate paging forfor UEs in CELL_PCH or URA_PCH state to trigger a
cell update procedure. In addition, UTRAN may initiate paging for UEs in idle mode,
CELL_PCH and URA_PCH state to trigger reading of updated system information.
transmitting a PAGING TYPE 1 message
UTRAN initiates the paging procedure by transmi
on an appropriate paging occasion on the PCCH.
PICH / S-CCPCH
CCPCH timing relation
Picture below illustrates the timing between a PICH frame and its associated single S-
S
CCPCH frame, i.e. the S-CCPCH
CCPCH frame that carries the paging information related to
the paging indicators in the PICH frame. A paging
paging indicator set in a PICH frame
means that the paging message is transmitted on the PCH in the S S-CCPCH
CCPCH frame
starting tPICH chips after the transmitted PICH frame.
Timing relation between PICH frame and associated S
S-CCPCH
CCPCH frame
Paging Block Periodicity (PBP): Period of the occurrence of Paging Blocks. (For FDD, PBP = 1).
Paging occasion: (FDD) The SFN of the PICH frame where the UE monitors its paging indicator (i.e.
the SFN of the PCCPCH frame in which the PICH frame begins).
Hard handover means that all the old radio links in the UE are removed before the
new radio links are established. Hard handover can be seamless or non-seamless.
non seamless.
Seamless hard handover means that the handover is not perceptible to the user. In
practice a handover that requires
requir a change of the carrier frequency (inter-frequency
frequency
handover) is always performed as hard handover.
• Soft Handover
Soft handover means that the radio links are added and removed in a way that the UE
always keeps at least one radio link to the UTRAN. Soft handover is performed by
means of macro diversity, which refers to the condition that several radio links are
active at the same time. Normally soft handover can be used when cells operated on
the same frequency are changed.
• Softer handover
Softerr handover is a special case of soft handover where the radio links that are added
and removed belong to the same Node B (i.e. the site of co co-located
located base stations from
which several sector-cells
cells are served. In softer handover, macro diversity with
maximum ratio combining can be performed in the Node B, whereas generally in soft
handover on the downlink, macro diversity with selection combining is applied.
The most obvious cause for performing a handover is that due to its movement a user
can be served in another cell more efficiently (like less power emission, less
interference). It may however also be performed for other reasons such as system load
control.
HSDPA in W-CDMA
Link budget planning is part of the network planning process, which helps to
dimension the required coverage, capacity and quality of service requirement in the
network. UMTS WCDMA macro cell coverage is uplink limited, because mobiles
power level is limited to (voice terminal 125mW). Downlink direction limits the
available capacity of the cell, as BTS transmission power (typically 20-40W) has to
be divided to all users. In a network environment both coverage and capacity are
interlinked by interference. So by improving one side of the equation would decrease
the other side. System is loosely balanced by design. The object of the link budget
design is to calculate maximum cell size under given criteria:
and to match all of those to the required system coverage, capacity and quality needs
with each area and service.
In an urban area, capacity will be the limiting factor, so inner city cells will be
dimensioned by required Erlangs/km² for voice and data. Even using 25dB as
inbuilding penetration loss into the building core area, link budget would typically
allow about 300m cell range, which is a way too much for a capacity purposes. In a
rural area uplink power budget will determine the maximum cell range, when
typically cells are less congested. A typical cell range in rural areas will be several
kilometers depending on a terrain.
Below is an example of how WCDMA voice call link budget can be done. Some of
the values can be debated, including the propagation model, but it gives an idea of the
calculation methods.
Network Services are considered end-to-end, this means from a Terminal Equipment
(TE) to another TE. An End-to-End Service may have a certain Quality of Service
(QoS) which is provided for the user of a network service. It is the user that decides
whether he is satisfied with the provided QoS or not.
To realise a certain network QoS a Bearer Service with clearly defined characteristics
and functionality is to be set up from the source to the destination of a service.
A bearer service includes all aspects to enable the provision of a contracted QoS.
These aspects are among others the control signalling, user plane transport and QoS
management functionality. A UMTS bearer service layered architecture is depicted
below, each bearer service on a specific layer offers it's individual services using
services provided by the layers below.
QoS Architecture
Real Time
Real Time Best Effort Best Effort
Co-location, Isolations
Spurious emissions are emissions, which are caused by unwanted transmitter effects
such as harmonics emission, parasitic emission, intermodulation products and
frequency conversion products, but exclude out of band emissions. This is measured
at the base station RF output port.
The table above corresponds to -80 dBm / 3.84MHz spurious emission requirements
from UMTS DL to UMTS UL.
EXAMPLE
Spurious emission DL to
- 80 dBm See above
UL
Max sensitivity - 121 BS reference
degradation dBm sensitivity
Min required isolation 41 dB
EXAMPLE
Max Node B power 43 dBm = 20W
Blocking level - 40 dBm 3GPP 25104 7.5.1
Min required isolation 83 dB
Solution considerations
• Equipment specifications
• Horisontal antenna separation
• Vertical antenna separation
• Additional filtering
• Antenna beamwidth
• Antenna bearing
• Frequency coordination with other carriers
• Smart designs for common antenna systems
WCDMA Spreading
TDD WCDMA uses spreading factors 4 - 512 to spread the base band data over
~5MHz band. Spreading factor in dBs indicates the process gain. Spreading factor
128 = 21 dB process gain). Interference margin is calculated from that:
UMTS networks will support location service features, to allow new and innovative
location based services to be developed. It will be possible to identify and report in a
standard format (e.g. geographical co-ordinates) the current location of the user's
terminal and to make the information available to the user, ME, network operator,
service provider, value added service providers and for PLMN internal operations.
The location is provided to identify the likely location of specific MEs. This is meant
to be used for charging, location-based services, lawful interception, emergency calls,
etc., as well as the positioning services.
3GPP specification also describes location based service reliability, priority, security,
privacy and other related aspects.
Location-
Most existing cellular services, stock prices, sports reports
independent
PLMN or
Services that are restricted to one country or one PLMN
country
Regional
Weather reports, localized weather warnings, traffic information (pre-trip)
(up to 200km)
District
Local news, traffic reports
(up to 20km)
Up to 1 km Vehicle asset management, targeted congestion avoidance advice
Rural and suburban emergency services, manpower planning, information
500m to 1km
services (where are?)
100m (67%) U.S. FCC mandate (99-245) for wireless emergency calls using network based
300m (95%) positioning methods
Urban SOS, localized advertising, home zone pricing, network maintenance,
75m-125m network demand monitoring, asset tracking, information services (where is the
nearest?)
50m (67%) U.S. FCC mandate (99-245) for wireless emergency calls using handset based
150m (95%) positioning methods
10m-50m Asset Location, route guidance, navigation
The table below lists the attributes of specific location based services as determined
by the GSM Alliance Services Working Group. It is possible for the network operator
or service provider to define additional, non-standardised service types.
A LCS Client is a logical functional entity that makes a request to the PLMN LCS
server for the location information of one or more than one target UEs. A LCS server
consists of a number of location service components and bearers needed to serve the
LCS clients. The LCS server shall provide a platform which will enable the support of
location based services in parallel to other telecommunication services such as speech,
data, messaging, other teleservices, user applications and supplementary services.
Using the Location Service Request, an LCS client communicates with the LCS
server to request the location information for one or more target UEs within a
specified set of quality of service parameters. As shown in below, a location service
may be specified as immediate or deferred.
Request Number of
Response Time
Type Responses
Immediate Immediate Single
Delayed (event
Deferred One or More
driven)
The LCS Server will provide, on request, the current or most recent Location
Information (if available) of the Target UE or, if positioning fails, an error indication
plus optional reason for the failure.
The specification Release '99 specifies the following LCS positioning methods:
• Cell coverage based positioning method
• Observed Time Difference Of Arrival (OTDOA) method with network
configurable idle periods
• Network assisted GPS methods
UMTS Security
The security functions of UMTS are based on what was implemented in GSM. Some
of the security functions have been added and some existing have been improved.
Encryption algorithm is stronger and included in base station (NODE-B) to radio
network controller (RNC) interface , the application of authentication algorithms is
stricter and subscriber confidentially is tighter.
Core network traffic between RNCs, MSCs and other networks is not ciphered and
operators can to implement protections for their core network transmission links, but
that is unlike to happen. MSCs will have by design a lawful interception capabilities
and access to Call Data Records (SDR), so all switches will have to have security
measures against unlawful access.
UMTS specification has five security feature groups:
• Network access security: the set of security features that provide users with secure
access to 3G services, and which in particular protect against attacks on the (radio)
access link;
• Network domain security: the set of security features that enable nodes in the
provider domain to securely exchange signalling data, and protect against attacks on
the wireline network;
• User domain security: the set of security features that secure access to mobile
stations
• Application domain security: the set of security features that enable applications
in the user and in the provider domain to securely exchange messages.
• Visibility and configurability of security: the set of features that enables the user
to inform himself whether a security feature is in operation or not and whether the use
and provision of services should depend on the security feature.
UMTS specification has the following user identity confidentiality security features:
• User identity confidentiality: the property that the permanent user identity (IMSI)
of a user to whom a services is delivered cannot be eavesdropped on the radio access
link;
• User location confidentiality: the property that the presence or the arrival of a user
in a certain area cannot be determined by eavesdropping on the radio access link;
• User untraceability: the property that an intruder cannot deduce whether different
services are delivered to the same user by eavesdropping on the radio access link.
Virtual Home Environment (VHE) is a concept for Personal Service Environment (PSE)
portability across network boundaries and between terminals. The concept of VHE is such
that users are consistently presented with the same personalised features, User Interface
customisation and services in whatever network and whatever terminal (within the
capabilities of the terminal and the network), wherever the user may be located. For Release
5, CAMEL, MExE, OSA and USAT are considered the mechanisms supporting the VHE
concept.
A user's VHE is enabled by user profiles as logically depicted in a picture below. The home
environment shall:
• enable the user to manage one or more user profiles (e.g. activate, modify, deactivate
etc.)
• enable the home environment and HE-VASP to manage one or more user profiles (e.g.
activate, modify, deactivate etc.)
• enable the identification of a user's personalised data and services information directly or
indirectly from the user's profile(s)
• enable VASPs controlled and limited access to the user's profile(s) (e.g. for general user
preferences and subscribed services information).
The home environment's view of the Virtual Home Environment concept is logically depicted
in a picture below. The home environment shall:
• be able to provide and control services to the user in a consistent manner also if the user
is roaming
• provide the necessary means to create and maintain a set of user profiles
• Support the execution of services – through its Service Toolkits in the network, the USIM
and in the ME
• uniquely identify the user in the telecommunication networks supported by the Home
Environment.
Logical VHE Role Model (Operator's Home Environment's View)
• Applications: e.g. VPN, conferencing, location based applications. These applications are
implemented in one or more Application Servers;
• Framework: providing applications with basic mechanisms that enable them to make use
of the service capabilities in the network. Examples of framework functions are
Authentication and Discovery. The discovery function enables the application to find out
which network service capability features are provided by the Service Capability Servers.
• Service Capability Servers: providing the applications with service capability features,
which are abstractions from underlying network functionality. Examples of service capability
features offered by the Service Capability Servers are Call Control and User Location.
Compressed Mode
During inter-frequency handover the UE’s must be given time to make the necessary
measurements on the different WCDMA carrier frequency. 1 to 7 slots per frame can
be allocated for the UE to perform this intra frequency (hard handover). These slots
can either be in the middle of the single frame or spread over two frames.
In compressed frames, Transmission Gap Length slots from Nfirst to Nlast are not
used for transmission of data. As illustrated below, the instantaneous transmit power
is increased in the compressed frame in order to keep the quality (BER, FER, etc.)
unaffected by the reduced processing gain. The amount of power increase depends on
the transmission time reduction method. What frames are compressed, are decided by
the network. When in compressed mode, compressed frames can occur periodically,
or requested on demand. The rate and type of compressed frames is variable and
depends on the environment and the measurement requirements.
The frame structure for uplink compressed frames is illustrated below.
There are two different types of frame structures defined for downlink compressed
frames. Type A maximises the transmission gap length and type B is optimised for
power control. The frame structure type A or B is set by higher layers independent
from the downlink slot format type A or B.
• With frame structure of type A, the pilot field of the last slot in the transmission gap
is transmitted. Transmission is turned off during the rest of the transmission gap
(below).
• With frame structure of type B, the TPC field of the first slot in the transmission
gap and the pilot field of the last slot in the transmission gap is transmitted.
Transmission is turned off during the rest of the transmission gap (below).