Вы находитесь на странице: 1из 64

Internship Report

Internship done at Alcatel Lucent Supervised by: Serdar Arslan Start Date: 10.07.08 End Date: 05.09.08

mr Bali Faculty of Engineering and Natural Sciences September 25, 2008 9453

Table of Contents

1. Abstact . 3 2. Introduction .... 3 3. Company Background .. 4 4. Project Description and Analysis 5


4.1 Introduction 4.2. An Overview for the Second Generation Systems 4.3. 3G Standards 4.4. From 2G to 3G 4.5. 3G Mobile Systems 4.6. UMTS (Universal Mobile Telecommunication System) 4.7. UMTS Services and its implementation 4.8. UMTS Security Specialties

5. Conclusion .. 13 6. References .. 13 7. Appendix .. 14


Appendix A: UMTS System Arcitecture Appendix B: The Protocol Stack at the Radio Interface Appendix C: Data Transmission at the UMTS Radio Interface Appendix D: Third Generation Overview

1. Abstract
This project is assigned by Alcatel-Lucent Istanbul to give the people working in Alcatel Lucent and other intern students general information about 3G technology and UMTS standards. The slide stets i left there will be used for the education of the future interns of Alcatel Lucent. Interns will have the chance to find a complete introduction to the 3G technolog and its tandards. These slides and documents were used in my 12 presentation to other interns throughout my internship.

2. Introduction
This paper is focused on the researches that I did during my internship at Alcatel Lucent. My main topic was the third generation technology, 3G. And beside of that topic I also made researches about ATM technology, the relationships between 3G and ATM technology. Throughout my internship period I gave several presentations to both other interns and people who work in Alcatel Lucent. As you may find more information about my researches throughout my paper 3G is a new technology waiting in front of the door of the telecommunication world of Turkey. And ATM technology is a technology that has an important role in 2G systems and will have a role in 3G systems. ATM enables that base stations and RNCs have the ability to work together. My supervisor, Mr. Arslan, gave me the chance to enter the laboratory of Alcatel Lucent where the ATM nodes stand and work. As i mentioned, throughout my paper i give a strong overview of the 3G technology. I mentioned about its general concepts and its place in the todays world. As appendix i put several slide sets in my folder. In these slides that i prepared after my researches the most important protocol of 3G technology is examined more in detail, the UMTS.

3. Company Background
Alcatel-Lucent is one of the leaders among communications solution companies. In last years it comes first in stationary networks in the world, third in mobile networks, second in service and in Europe first in company communication solutions. Alcatel-Lucent operates in 130 different countries, has almost 80000 employees.

It is formed by a union of two distinct companies in 2006. Lucent Technologies was a spun off by AT&T Technologies on 1996 but its basic history goes back to 1860s. Later it was named Western Electric Manufacturing Company. Then by late 1880s the company became one of the biggest electrical manufacturing company in US. In 1881 American Bell made the company the developer and manufacturer for Bell telephone companies by purchasing an interest. Also in 1925 Bell Laboratories were created as you know this lab created some of the most useful discoveries like transistor, digital signal processor chip etc. Again that year International Western Electric Company subsidiary is sold to ITT. In 1989 AT&T Technologies included several business units that later would combine with Bell Laboratories to become Lucent Technologies. Alcatel also origins back to 1800s when a French engineer set up the company CGE (La Compagnie Gnrale d'Electricit). CGE succeeded not only in digital communications, electricity but also in high speed trains in France. In mid 1980s it became one of the leaders in digital communications and also bought the telecommunications part of ITT. In 1995 Alcatel refocused only on telecommunications. In 1988 the company is named as Alcatel under the supervision of CEO Serge Tchuruk. And finally in 2006 Alcatel announced plans to merge with Lucent Technologies. The company offers broadband access options including DSLAMs and satellite access, fixed and mobile applications, public and next-generation switching solutions, end-to-end solutions for CDMA, GSM, GPRS/EDGE, W-CDMA and WiMAX networks, integrated network management tools to improve network efficiency and enable superior QoS and a lot more. There are three different groups in the company: Carrier Business Group, Enterprise Business Group and Service Business Group. My internship takes place in the third one in the ATM department under the super vision of Mr. Serdar Arslan. The department basically deals with the problems that the clients face in their systems but there are two different types of problems. The ones my department deals with are the deepest ones, generally core software problems etc. The second problem is called as the tickets. The tickets are problems that occur in the ATM services and channels. In case that such a ticket occurs, a person from my department gets the problem to deal and tries to solve it. According to Mr. Arslan there

were cases which did last more than weeks until the ATM group finds out the problem. This group also gives courses to other telecommunication firms such as Ericsson.

4. Project Description and Analysis


4.1 Introduction: The destiny of mobile telecommunication systems has changed after the invention of wireless telegram (1897, Marconi). After that invention the ships were able to communicate with each other. Especially after the First World War the interest shown for the wireless communication has increased since the telegraph wires located underwater were damaged by the enemy attacks. Wireless voice transfer was first succeeded in 1915. In 1920s broadcasting institutes were able to transmit through the air. The Second World War played a great role at the development of radio communication. After recent works and developments, at the end of 1940s in United States and in 1950s in Europe; people began to use single cell analog mobile phones. As a next step, at the end of 1970s people were using 1G technology (first generation) cellular analog mobile phones. Since 1G technology could not compete with the need for increasing voice quality, capacity and inclusion field, scientists focused their attention on the development of the 2G (second generation) digital communication systems. People began to use 2G mobile phones in 1991 and became widespread in a very short time. The GSM (Global Systems for Mobile) technology that we use today is a second generation mobile communication system that is used in Europe. For the card GSM of European side, the USA has developed IS-95 (CDMA) and the Japan developed PDC (Personal Digital Communication) Today, GSM is also founded in USA but it works with a different frequency band (1900 MHz). GSM is the most widespread mobile communication standard. In Turkey the first GSM phone call was made in 1994 and the owners of this frequency band are Turkcell and Telsim. In 1992, DCS-1800 was defined. DCS-1800 is a type of GSM that works around 1800 MHz in a new frequency band. (The operator in Turkey is Avea and it started to give service in 21 March 2001). After the end of 1999 the overall number of GSM mobile phone users has reached to 250 million out of overall 450 million mobile phone users.

At the time when the license of GSM 1800 was sold in Turkey, the license of 3G mobile telecommunication systems were selling in Europe. Works and researches about 3G mobile telecommunication systems began in 1985. In 2001, a firm named NTT Docomo gave the first 3G (third generation) service in the telecommunication history in Japan. In the European side, the 3G services could be offered by big telecommunication operators just in the middle of 2003 (Vodafone, Orange, T-Mobile, O2 and TIM). In Turkey the two big telecommunication firms, Turkcell and Telsim are in big preparation for 3G technology. Turkcell made agreement with Ericsson and Telsim made its agreement with Siemens/Motorola in order to let them build the 3G infrastructure. 4.2. An Overview for the Second Generation Systems The history of GSM began with the foundation of a common telecommunication system by the telecommunication firms of Scandinavian countries at a frequency of 900 MHz in 1982. In 1985 it is decided that GSM will be set up numerical and in 1987 that GSM will be based on the TDMA, Time Division Multiple Access. Whereas all these things happen in Europe, in USA, IS-95 systems based on CDMA (Code Division Multiple Access) techniques were being developed. CDMA is one of the wireless communication technologies that are used in different places of the world, like the GSM and TDMA. To make clear the difference between these two systems let us take a cocktail party as an example. In a cocktail party, people are supposed to talk to each other as groups of 2. And the aim is that another group should not hear nor understand what one group is telling. For such a problem, the solution given by GSM (TDMA) is that to give the groups that are talking different rooms. In that solution way, the salon may be very big but the number of rooms located in the salon will be limited and groups of people will be waiting in lines in front of the doors of the rooms. All that problems underline the biggest problem, the cost. The solution of CDMA is that to let groups talk to each other in different languages. Everyone will have his own language and only the ones who know the language will understand him. In that way the salon, in real life the frequency spectrum will be used more effective.

Comparing to TDMA technique, CDMA technique offers 4 to 5 times greater transmission capacity and offers longer bandwidth. 4.3. 3G Standards The standards for the telecommunication technology are developed by ITU, International Telecommunication Union) and all the standards for the third generation systems are called as IMT-2000 (International Mobile Telecommunication). Services of IMT-2000 must be universal. For that purpose great numbers of standard were recommended to the ITU. Works done in order to get the congruity between these standards and in the end 5 types of network were accepted. Two of these five network types, the most 2 preferred ones are: Universal Mobile Telecommunication System (UMTS) Code Division Multiple Access 2000 (CDMA)

UMTS networks are called as W-CDMA (Wideband Code Division Multiple Access). They are developed through the processes in order to support the GSM based networks. W-CDMA is based on the CDMA techniques just like in CDMA2000 technology. On the other hand CDMA2000 is the technology that is the point CDMA networks will reach in 3G. 4.4. From 2G to 3G 2G technologies that are used today are based on two main systems, TDMA and CDMA. Because of the differences between these two 2G technologies, their promotions to the next level, 3G, will be different, too. The promotion of CDMA-One based mobile networks in USA to 3G is different than the promotion of GSM based mobile networks. Through the promotion I mention a state will be reached where a more universal system will appear. And CDMA will become the core technology for the 3G systems. GSM is scalar and uses important radio access techniques. And all these characteristics of GSM are very important and bring important improvements. But in spite of all these characteristics it is not the last destination of the telecommunication technology development. It is defined as the stage to bring the telecommunication technology to more developed and global systems. In 1998, HSCSD, High Speed Circuit Switched Data, was developed. The aim of this development was to increase the data transfer. With that

development, GSM offered 57, 6 Kbit/s of data transfer was reached. With HSCSD, there is no need to update the software of the base station and no need for additional hardware. These characteristics of HSCSD make it an easy and low-costly technology. The most important improvement was the change to the GPRS, General Packet Radio Service. So circuit switching began to be used for voice transfer and packet switching began to be used for data transfer. Circuit switching technique is the process of assigning of one channel for data or voice transfer to the connection. On the other hand packet switching technique lets the data blocks reach to their destination addresses by using different and several channels. The most important feature of GPRS is that it can be obtained by east and short integration to GSM networks. It also supports another system, EDGE, Enhanced Data Rates for GSM Evolution. EDGE is the last step on the road to the 3G systems. It is developed both for the systems that are supporting 3G and for the systems that are not supporting 3G. EDGE does the modulation changes that will be made by UMTS, so it is the transition step for 3G. In Turkey Turkcell, a telecommunication firm of Turkey, became the owner of GSM 900 license and made its preparations for this technology. And in March 2005, after finishing its preparations, the firm offered its EDGE service to the public. 4.5. 3G Mobile Systems The most important factors of the effort for developing the third generation systems are the rapidly increasing demands for mobile cell telecommunication and for more speedy bit transfer. Beside of these, 3G systems help to bring the services of popular Internet technology to the mobile phones. And in that way, with the mobile terminals anyone could reach any information on any place on the world without dealing with a inclusion field problem. The most important characteristics of 3G technologies are as following: A global usage and free of problem circulation Support of Multimedia, especially Internet Support of packet switching and circuit switching

Effective usage of Frequency Spectrum Concordant to the old technologies Providing of the improvements to the wideband technologies with 2Mbit/s of data transfer speed

As I already mentioned, 3G technologies are based on several standard. The most important two of these standards are: WCDMA (UMTS) and CDMA2000. At the end of 2004 there were 130 different licenses of 3G technology, 117 of these licenses were appointed to WCDMA standard, with other words to the UMTS standard. That underlines the importance of the UMTS standard. 4.6. UMTS (Universal Mobile Telecommunication System) UMTS is suitable to the IMT-2000 standards and it is accepted as the 3G technology in Europe. UMTS supports wideband multimedia services and high speed bit transfer processes. UMTS technology supports both the symmetric and asymmetric data transfer. It makes the sources to be used effectively and gives services both for circuit switching and packet switching. The operators that own the licenses of UMTS did build the UMTS networks over the present GSM network infrastructures. That means both the 3G and 2G systems might work in the same time together. CDMA is accepted as the multimedia access method of UMTS. That means days are near when scalar telecommunication through 2 Mbit/s of data transfer over wireless media will be possible and when people could exchange voice and vision (display) over their mobile phones. According to some guesses, in 2010 50% of the mobile phone users will be using 3G wireless systems and every 4 out of 7 mobile terminals will be using CDMA based technologies. The ultimate goal of UMTS is to bring the mobile-Internet concept into life. Altogether these two concepts help each other to grow with a high development rate. With the UMTS

technology, the importance of packet switching networks and Internet Protocol (IP) will become more obvious. With the concept of Mobile Internet, in the Far East countries a great increase of Internet users is expected. That is because mobile systems are the popular technologies in those countries. In the European countries it is the opposite. It is expected that the popular internet technology will increase the interest in mobile equipments. IPv6 is developed as a result of great researches made since 1994 about IP technology in order to meet the capacity that will increase with the new 3G technology. In the last months the studies for 3G-beyond technology are increased and the new developed HSDPA, High Speed Downlink Packet Access, technology will offer the last user a packet speed of 14Mbit/s. The operators show great interest in that WCDMA technology. The key feature of UMTS technology is that it offers service according to the demand. With UMTS we will get to know the wideband in mobile medium concept. Let give an example in order to see the effect of UMTS more clearly: Today we are able to download an mp3-file in mobile medium for almost 30 minutes. GPRS made this period decrease to 3 minutes. With EDGE it will be possible to download an mp3-file in 35 seconds and with UMTS you will need only 8 seconds to get an mp3 file. Wireless wideband technologies bring many improvements in games side, in video conference side and in the supply of videos side. In 2008 the number of operators who bought 3G license has reached in 91 countries to 211 and generally almost 179 million users. The leading operators in 3G world are Vodafone, TMobile, Telefonica, Sonera and TIM. In Turkey the operator firms are dropped behind comparing to the foreign big operator firms. But they are analyzing the transition of the bigger operator firms and learn a lesson from them.

4.7. UMTS Services and its implementation Examples: Informatics o Traveling through Web pages

o Interactive shopping o Access to news and written media products through internet o Simultaneous translation through internet o Upgraded scanning and filtering ability Education o Virtual school o Access to the scientific laboratory through internet o Access to the library through internet o Language education through internet o Different educations Fun o Optional music (as an alternative to the CD, cassette and radios) o Optional games o Video clips o Virtual scenic images Society services o Emergency services o Managerial procedures Job applications o Mobile office o Limited job television broadcast o Virtual work groups

Communication services o Telephone with display o Video conference o Voice answer voice call and recognition o Self-navigation

Commercial and financial services o Virtual bank o Paying bill opportunities through internet o Internationally valid SIM-card and credit card

Highway access tracking services o Telemedicine o Security camera service o Emergency call service

4.8. UMTS Security Specialties Major UMTS security specialties can be listed as below: Authentication a) Authentication of an object: This feature helps one object to authenticate and define another object. b) Authentication of the data sending source: This feature helps the receiver of the message to authenticate and define the data sending source. Confidentiality This feature ensures that the unauthorized people cannot access the real information. In other words, it prevents unauthorized people from accessing the real information. Anonymity

This feature ensures that a person or an object cannot be authenticated or defined by unauthorized people.

Access Control a) Access control to the device: This feature allows people to use only permitted devices. b) Service access control: This feature allows people to access only to the permitted services. c) Data access control: This feature allows people to access only to the permitted data. Integrity This feature protects the data from being changed by unauthorized people. In other words, the data is transmitted from the data sending source to the receiver without being altered by unauthorized people. Non-repudiation a) Non-repudiation of the sent data: This feature helps a person to verify the source of a received data. b) Non-repudiation of the received data

5. Conclusion
As a whole my internship period was very educational for my study. I had every chance to observe the life of a telecommunication engineer and what they do. I attended all of other interns presentations and other presentations that were given by the workers of Alcatel Lucent. I made both practical and theoretical studies throughout my internship. I made several experiments with the ATM nodes and the software that Alcatel Lucent uses. And I have read many handbooks of Alcatel Lucent about 3G, UMTS and ATM technologies.

6. References
Bernhard H. Walke, P. Seidenberg, M. P. Althoff (2002). UMTS: The Fundamentals. Wiley And other books that belong to Alcatel Lucent.

7. Appendix
Appendix A: UMTS System Arcitecture

UMTS System Architecture

mr Bali

UMTS SYSTEM ARCHTECTURE


UMTS -> Universal Mobile Telecommunication System
3 logical blocks Mobile Equipment (ME) UMTS Terrestrial Radio Access Network (UTRAN) Core Network (CN)

A sketch of UMTS trafic

Overview of the UMTS domains


Mobile Equipment (ME)
Protocol stack of the radio interface Operating elements for the user interface Usim is inserted here

Overview of the UMTS domains


UMTS Terrestrial Radio Access Network (UTRAN)
Allows connectivity between the UE (user equipment) and the core network. There are four interfaces connecting the UTRAN internally or externally to other functional entities:
Iu Uu Iub Iur.

UTRAN has 2 Elements:


Base Stations (Node Bs) Control Nodes (Radio Network Controller, RNC)

Overview of the UMTS domains


Core Network (CN)
Long- range network Transports users data to its respective destination 6 main functions
Aggregation Authentication Call Control/Switching Charging Service Invocation Gateways

Type of Switching
Two possibilities for exchanging information
Circuit Switching (CS)
A channel is set up at the beginning of the communication The channel remains operational Selection of channels is enough for unique identification of the receiver Disadvantages:
Circuits may be blocked when they are not used Reduction of the capacityavailable to other users

Mainly for voice transmission e.g Voice Telephony

Type of Switching
Packet Switching (PS)
Data stream is subdivided into small data packets Each data stream has its own destination information It has robustness in the event of a failure Survives node break downs Disadvantage:
Jams occur often on the path if there too many data streams arebeing routed at the same time in a section

Mainly used for data transmission e.g nternet

Architecture of the access plane


UMTS supports both types of switching, both CS and PS For every type of switching there are special nodes in CN For CS:
Mobile Services Switching Centre (MSC) Home Location Register (HLR) Visitor Location Register (VLR) Gateway Mobile Servicess Switching Centre (GMSC)

For PS:
Serving GPRS Support Node (SGSN) Gateway GPRS Support Node (GGSN) GPRS Register (GR)
(we will discuss about these special nodes in the further slides)

Architecture of the access plane


Both parts of the CN use the same Radio Access Network (RAN = UTRAN) RAN consists of:
RNC Node Bs

The interface between RNC and Node B is called Iub Interface The Interface between UE and Node B is called Uu Interface

Architecture of the access plane

A sketch of the architecture of the access plane

Nodes in Core Network


Mobile Services Switching Centre (MSC)
Responsible for handling voice calls and sms Sets up and releases the end-to-end connection Authentication and encryption of user data Mobility Handover Responsible for storing the current location of the user

Nodes in Core Network


Home Location Register (HLR)
Central database Responsible for storing details of each authorized mobile phone subscriber Stores a referance that indicates in which part of the mobile radio network a user is

Gateway Mobile Services Switching Centre (GMSC)


Determines which visited MSC the subscriber is located The subscriber is the one who is being called

Nodes in Core Network


Visitor Location Register
Another database-part of the GSM Similar to HLR Stores a local copy of the data of HLR The data in VLR is dynamic
As soon as a user changes location area, the information in VLR is updated

Stores information about all the mobiles that are currently under jurisdiction of the MSC Most inportant information is LAI that identifies under which BSC the MS is currently present

Nodes in Core Networks


Serving GPRS Support Node (SGSN)
Current position of a user is stored Incoming packets are routed according to the stored information Responsible for the delivery of data packets Packet routing Packet transfer Mobility Authentication Logical link management

Nodes in Core Networks


Gateway GPRS Support Node (GGSN)
Network node Acts as a gateway between GPRS and other networks Such as Internet Mobility

Nodes in Core Networks


GPRS (GR)
Responsible for storing information Database Part of HLR

The Utran Part


Radio Network Controller (RNC)
Central node in UTRAN Assumes the management of the resources in all attached cells Implementation of many protocols between UE and UTRAN Is responsible for every task that is related with data transmission over radio interface

The Utran Part


Radio Network Controller (RNC)
Call admission control Radio resource management Radio bearer set-up and release Code allocation Power control Packet scheduling Handover SRNS relocation Encryption ATM switching Protocol conversion

The Utran Part


Base Transceiver Station (BTS) or Node Bs
Supplies one or more cells Includes a CDMA receiver Conversion of signals of the radio interface Preparation of incoming data for transport Three types of Node Bs Carry out measurements of the connection quality and interference levels Transmit the result to the RNC

User Equipment (UE) Part


Contains the Usim Counterpart to Node B, RNC and CN Like Node B:
Processing of the radio signal Error correction, spreading, signal modulation Radio processing,power amplifier Like RNC: Signalling for connection set-up and release Transport of measured received field strength of neighbouring cells Encryption and decryption of communication
Negotiation over quality service required for a particular service Reciprocal authentication between CN and EU

Handover in UMTS
For the user mobility Relates to services that are operated on a circuit-switched basis Three different types of Handover
Hard Handover Soft Handover Softer Handover

Hard Handover
The Connection is switched hard at a particular time The changeover to the new cell occurs from one frame to the next one To engage the channel in the target cell, the channel in the source cell should be released Also known as break-before-make
The connection to the source is broken before the connection to the target is made

Are intended to be instantaneous in order to minimize the disruption to the call

Soft Handover - continues


No fixed switchover point Instead a soft connection The new base station:
Initially only contributes very little to the transmission But the further UE, the more responsible the new base station Finally, the connection to the old station is terminated The mobile station leaves the soft handover state.

This technique is called macro-diversity

Soft Handover - continues


Macro-diversity Advantages:
The connection becomes more resistant to shadowing It offers the option of transmitting data over the second Node B and thus maintaining the connection It offers the possibility of reducing the near-far effect

Softer Handover
Special version of soft handover Transmission can also run in parallel over different sectors of the same Node B All the advantages mentioned for soft handover apply for softer handover, too

Location Management
Aim:
To transfer incoming calls and data packets to users

Problem:
The network must know the exact location area of the user

Method:
The location area is stored in various network nodes and updated as needed by the mobile station

Location Management - continues


Location Area Index (LAI)
All base station beam a specific number Whenever this number changes the EU is aware that an update of the database is necessary

Periodic Location Update


Is another method to manage the location EU is instructed to report its current location are periodically

Whenever the network wants to set-up a connection to a mobile station:


Pages the mobile station in all cells belonging to the stored locaion are As soon as mobile station makes contact in a cell, the communication only still needs to be carried out over this Node B

Location Management - continues


Problem:
What should be the optimal size for a location are

Extremas:
Very large location area ensures that users only seldom move beyond the boundry On the other hand, the number of cells in which users are paged during connection set-up is high

The choice is important

Location Management - continues


The Routing Area (RA) Concept
Packet-switched data transmission The principle is the same Whenever mobile station leaves the area of Routing Area, it executes a Routing Area Update with SGSN That makes SGSN able to locate a mobile station

Circuit-switching and Packet Switching


A call set-up example for CS:
A user in the fixed network picks up the receiver and dials a UMTS telephone number. What are the dialing codes?
For example following dailing codes are provided for UMTS in Germany:
+49 151 DeTeMobile Deutsche Telekom MobilNet GmbH +49 152 Vodofone Germany +49 155 E-Plus +49 159 O2 Germany

The call is then routed through the public telephone network to a switching node of the UMTS network, the GMSC Based on the telephone number the switching node determines the database (HLR) where the user datas are stored

Circuit-switching and Packet Switching


HLR knows which area of the network the customer is located in HLR sends a query for a roaming number to the responsible VLR VLR responds with the appropriate number that is then supplied by HLR indicating the destination switching node within the UMTS network responsible, to the GMSC So the cell is routed to the destination switching node, MSC Through the attached VLR the MSC knows the RNC responsible for the current location area The MSC requests that this RNC sets up a channel to the mobile station. The RNC pages the mobile station in its last known location area The RNC sets-up a connection to the mobile station over the Node B As soon as the transmission link is established at the Uu-interface, end-to-end signalling takes plave and telephone rings

Circuit-switching and Packet Switching


Packet Data Service
The user wants to exchange data with a computer on the internet Packet Data Protocol (PDP) must be activated before the mobile station can access the Internet
Packet Data Protocol (PDP) : range of settings that defines which packet data networks a user may use for exchanging data

To activate the PDP content, a mobile station establishes a connection over the RNC to the SGSN Mobile station sends a message that the user would like to access the Internet The SGSN forwards the query to the responsible GGSN Inbetween a query to the HLR checks whether the user is authorized for access to the external data network

Circuit-switching and Packet Switching


The GGSN activates the context and informs the mobile station accordingly The mobile station is allocated a temporary IP address that allows it to be reached from outside the UMTS network The activation of the context creates an IP tunnel Incoming data packets from the Internet are sent to the tunnel by the GGSN and over the SGSN to the RNC The RNC unpacks the packets and forwards them over a second tunnel to the mobile station

Appendix B: The Protocol Stack at the Radio Interface

THE PROTOCOL STACK AT THE RADIO INTERFACE

ISO - OSI

The ISO/OSI Referance Model


ISO (International Organization for Standardization),
Divides the functions of protocols into categories These categories are called layers Designed the OSI model

OSI (Open System Interconnection)


OSI is designed in order to facilitate the understanding of complex digital protocols With this system each layer takes on special, largely defined tasks in order to provide a service to the layer above it To perform such services it uses the layer directly below it

The ISO/OSI Referance Model

The seven layers of ISO

The Seven Layers of ISO


The seven layers have different tasks that are briefly:
The physical layer:
Responsible for direct communication over a common physical layer between two partners Ethernet

The data link:


Is divided into two sublayers: Medium Access Control (MAC) and Logical Link Control (LLC). The MAC is responsible for coordinating access to a common medium
addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multipoint network

The LLC handles error correction


Multiplexing protocols transmitted over the MAC layer (when transmitting) and demultiplexing them (when receiving). Providing flow and error control An LLC header tells the Data Link layer what to do with a packet once a frame is received ATM, Frame Relay

MAC - detailed
Addressing
The MAC layer adressing mechanism is called physical address or MAC adress. This is a unique serial number assigned to each network adapter Making it possible to deliver data packets to a destination within a subnetwork Subnetwork?
a physical network consisting of one or several network segments interconnected by repeaters, hubs, bridges and switches An example of a physical network is an Ethernet network

MAC - detailed
Channel access control mechanism
provided by the MAC layer are also known as a multiple access protocol This makes it possible for several stations connected to the same physical medium to share it
Examples of shared physical media are bus networks, ring networks and hub networks

The Working Principle of LLC


An LLC header tells the Data Link layer what to do with a packet once a frame is received. It works like this:
A host will receive a frame and look in the LLC header to find out where the packet is destined for
for example, the IP protocol at the Network layer or IPX

The Seven Layers of ISO


The network layer:
Responsible for transmitting messages over several intermediate stations End-to-end (source to destination) packet delivery including any routing through intermediate hosts To accomplish this, the network layer defines logical addressing so that any endpoint can be identified Example:
IP, IPX (Internetwork Packet Exchange)

The transport layer:


Guarantees a secure end-to-end connection Reordering of the incoming data stream when packets arrive out of order is included Multiplexing of incoming data for different flows to applications on the same host Example: TCP (transmission control protocol)

The Seven Layers of ISO


The session layer:
Responsible for opening and terminating communication How to start, control and end conversations between end-user application processes Example: RPC (remote procedure call)

The presentation layer:


Conversion of information being transmitted so that the remote station can understand the presentation

It responds to service requests from the Application Layer and issues service requests to the Session Layer Responsible for the delivery and formatting of information to the application layer for further processing or display.
Example: MPEG

The Seven Layers of ISO


The application layer:
This layer has a representative role for the interface to the user Provides semantic conversion between associated application processes
Examples of common application services of general interest include the virtual file, virtual terminal and job transfer and manipulation protocols.

Examples:
HTTP = Hipertext transfer protocol
a request/response standard between a client and a server.

FTP = File Transfer Protocol


to transfer data from one computer to another through a network

Example
Take the Uu-interface It is the interface between UE and Utran Which of seven layer does this interface comprise?
It comprises the first three layers:
Physical layer, Data link and Network layer

A standart Uu-interface example

The UTRA Protocol Stack


The physical layer:
Provides transport channels at the interface to the MAC layer above it Operates down at the bottom

The MAC layer


Converts the data transferred over logical channels from above In order to ensure that it can be transmitted over the transport channels

The RLC layer:


It is above the MAC layer Is responsible for error correction

The UTRA Protocol Stack


Radio Bearers:
Are available at the upper edge of the RLC sublayer Channels through which data is transported through the access stratum

The two sublayers, Packet Data Convergence Protocol (PDCP) and Broadcast and Multicast Control (BMC) can stack on the RLC sublayer In layer 3 there is the RRC (Radio resource control)
Responsible for the configuration of all other sublayers within the UTRA protocol stack

Duplication Avoidance Layer:


Responsible for ensuring that data is correctly transmitted in the case of an SRNS relocation way at the top

Radio Bearer and Radio Access Bearer

Sublayers
The Physical Layer:
Implemented in Node B within the RAN Responsible almost for everything that is related to the transmission of data over radio Providing the transport channels (at the upper edge) Works directly at the actual radio unit Functions necessary for soft handovers and softer handovers are implemented Synchronisation and fast power control All tasks that are directly related to radio interface are located here

The MAC Layer


Belongs to the Data Link
Coordinates access to the physical medium over which data is transmitted Contains queues in which different data streams being transmitted are placed Supplies the current state to the RRC sublayer Receives configuration information from RRC sublayer If there is transparent RLC mode then the mac layer becomes responsible for the encryption

Logical Channels
Describes which type of data should be transmitted.

The RLC layer uses logical channels to deliver data to the MAC layer.

The Data Link - MAC Layer


The MAC layer maps the logical channels to the transport channels that represent the interface to the physical layer Responsible for the multiplexing of several parallel data streams from the logical channeks to the transport channel

The Data Link RLC Layer


Is responsible for protecting the different data streams from errors For that purpose RLC has three different modes:
Acknowledged Mode Unacknowledged Mode Transparent Mode

In all that three modes the RLC can segment data packets delivered by higher layers so that the MAC sublayer receives data packets of the right size over the logical channels

The Data Link RLC Layer


Acknowledged Mode:
RLC sends a new request for data blocks detected to have errors This delays the delivery of data received unitl missing data packets are redelivered This procedure is not suitable for error-tolerant video or audio But suitable for data transmissin Through this method the data is delivered error-free only once and in the right sequence

The Data Link RLC Layer


Unacknowledged Mode:
RLC layer Provides no error correction The data packets that are detected as having errors are selected or They are selected as being defective before they are delivered In that mode the uniqueness of the transmitted data is ensured

Transparent Mode:
The RLC layer does not add a separate header to the data Instead it simply forwards the data to the MAC layer

The Data Link RLC Layer


Other than these different mode definitions, RLC is also responsible for the encryption of the data The RLC is responsible for transmitting data from the higher layers Selects the appropriate mode for a connection at the time of connection set-up and configures the necssary parametres in the RLC layer

The BMC and PDCP Layer


BMC = Broadcast and Multicast Control
Cell broadcast for point-to-multipoint Manages the information that is to be broadcast in the individual cells

The PDCP Layer = The Packet Data Convergence Protocol


Responsible for the transmission of IP data.
For this protocol the PDCP layer carries out a compression of the header information The compression reduces the length of the header to a small number of bytes Contributes towards increased efficiency and a higher data rate

The RRC Layer


RRC = Radio Resource Control
Control plane Contains all necessary algorithms for the configuration and operation of the UTRA protocol stack On the RAN side:
Configuration of the broadcast channels On request setting up the radio bearers Chance to exchange data between UE and RAN

Configuration of RLC, MAC and physical layers Mobility Management

Transport Channels
Data is transmitted over transport channels at the interface between MAC layer and physical layer There are 5 different alternative transport channels
In Random Access Channels (RACH)
Small amount of user data can be transmitted over this channel simultaneously Messages are not scheduled The RACH exist only on the uplink There is no certainty, that only a single device makes a connection attempt at one time, and collisions can result.

The Paging Channel (PCH)


To reach a mobile station that is not currently maintaining an RRC connection with the RAN

The Broadcast Channel


To transmit system information

Transport Channels
The information is forwarded on the downlink over the logical channel Broadcast Control Channel (BCCH) to the MAC layer And from there over the BCH to the physical layer Data is broadcast over the BCH to the physical channels

Shared Channels
Used by several stations including mobile stations The Radio Network Temporary Identifier (RNTI) is included in the transmission The aim beyond that is to clarify who the recipient is of the traffic being transmitted over these channels Dedicated Channel (DCH) The normal transmission of user and signalling data takes place over DCH Can be set up on the uplink as well as on the downlink.

Transport Formats
Between the MAC and PHY layers there is not just one channel but many.
The two layers are connected via three DCH connections. DCH1 transmits voice data DCH2 transmits related video data DCH3 transmits signalling data

Transport Blocks:
Data packets that are exchanged over transport channels A transport block comprises a certain quantity of data The group of several transport blocks are called as Transport Block Set (TBS) A TBS is described by a Transport Format (TF)

Transport Formats
The TF specifies the size of the individual blocks of a set and how many blocks are contained in a set TF is also responsible in error-correction in the physical layer TF specifies what should happen with the TBS in the physical layer For each TBS the MAC layer can select a transport format from a group that is allocated to the transport channel This group is called Transport Format Set (TFS) TFS specifies in which domain the physical parameters of a connection are permitted to change Transfer Formats can not be combined in any combination

Logical Channels
Transport Channel = how data is to be transmitted Logical Channel = the content is the important point User data is transmitted over the Dedicated Traffic Channel (DTCH) Control data is transmitted over the signalling channel Dedicated Control Channel (DCCH)

Logical Channels
There are several transport channels in UMTS Over these transport channels the user data channel DTCH and the signalling channel Dedicated Control Channel (DCCH) can be transmitted:
Over a dedicated transport channel Dedicated Channel (DCH) Small data packets can be transmitted over the Random Access Channel (RACH) on the uplink and the Forward Access Channel (FACH) on the downlink Over jointly used channels (DSCH) on the downlink and (USCH) or CPCH on the uplink

CCCH (Common Control Channel) is used for signalling outside an existing connection and is transmitted over the transport channels RACH and FACH

Appendix C: Data Transmission at the UMTS Radio Interface

DATA TRANSMISSION AT THE UMTS RADIO INTERFACE

Introduction
The slides are about the fundamentals of wireless data transmission in UMTS Begin with:
The two duplex techniques used in UMTS

Follow with:
Overview of the multiple access techniques used in mobile radio communication

Most importantly:
CDMA (Code Division Multiple Access)

The UTRA Radio Interface


The radio interface:
Interpreted as the interface between the mobile station and the base station The communication is wireless and it is over radio

UTRA (UMTS Terrestrial Radio Access) is located between the radio access network, UTRAN (Terrestrial Radio Access Network) and the MS (Mobile Station)

Duplex Procedures
Separates the transmit and receive signals of a station that is able to transmit as well as receive
That prevents a situation in which a station receives its own transmitted signal and in some circumstances is not able to separate it from the required receive signal This is very important since this would make communication impossible

Transmit signal is much stronger than the receive signal


That reinforces the need for a seperation of uplink and downlink

The Frequency-division duplex technique


FDD = Frequency-division duplex
With this technique stations transmit and receive in separate frequency bands
The transmitting band of one station then becomes the receiving band of the other station and vice versa In cellular mobile radio the higher frequencies are selected as transmitting band for base stations Lower frequencies as transmitting band for mobile stations

FDD is suited to mapping *symmetric services *Paired frequency band is required for the impletation of an FDD system GSM is typical representative of FDD systems

*Symmetric Services Paired Frequency


Definition of Symmetric Services:
Services that transmit about the same amount of data at the same data speed in both direction

Examples:
The speech service Video telephony

Definition of Paired Frequency


For each frequency block in the transmitting band a frequency block of the same size exist in the receiving band That has often the same bandwidth

TDD vs. FDD

The Time-Division Duplex


TDD = Time-Division Duplex
Another duplex technique The mobile and base stations take turns transmitting and receiving Transmitting and receiving times do periodically alternate TDD separates the transmit and receive signals in the time domain

Switching Point:
The point at which the switch is made from transmitting to receiving within a period

TDD is suitable for the efficient mapping of asymmetric data traffic


That is through the possibility of varying the distribution of transmission capacity between uplink and downlink

The Time-Division Duplex


In contrast to the FDD technique, all that is needed in the frequency spectrum is a frequency block It is easier to find individual frequency blocks in a spectrum than paired ones
Remember that we mentioned about the need of paired frequency for FDD technique !

Multiple-Access Procedures
Multiple-Acces Precedures do distribute the available transmission bandwidth among the individual users or connections These precedures define the physical channels
Physical channels are characterized by different physical parameters Two stations communicate over a physical channel The definition of physical channels are very important
So that various connections do not cause mutual interference The multiple-acces technique should implement an efficient, flexible and equitable distribution among many users

Multiple-Access Procedures
Multiple-Acces technique only divides up the available transmission capacity among physical channels The total capacity wont change There are three different Multiple-Access techniques:
FDMA: Frequency division multiple access TDMA: Time division multiple access CDMA: Code division multiple access

Multiple-Access Procedures

FDMA: Frequency division multiple access TDMA: Time division multiple access CDMA: Code division multiple access

Multiple-Access Procedures
FDMA = Frequency Division Multiple Access
Separate the user signals in a frequency range Divides the frequency spectrum into frequency channels A user can transmit and receive within a channel

TDMA = Time Division Multiple Access


Separate the user signal Transmits simultaneously in the same frequency range for transmitting and receiving Users use the entire frequency bandwidth of the system Transmission speed is high If there are to many users then the effective transmission rate of a user is less than that of the overall transmission speed

Multiple-Access Procedures
Important:
Mathematically, a multiple access technique is always based on the use of orthogonal carrier functions What are orthogonal carrier functions?
The signal of the individual participants is multiplied in order to orthogonalise the user signal Separate them from one another In FDMA:
These carrier functions are sine or cosine waves of different frequencies

In TDMA:
These carrier functions are window functions that activate and deactivate the transmitter

Orthogonal Carrier Functions


An example is:

An Orthogonal Carrier Function example

Orthogonal Carrier Functions

Three kinds of Window Functions

Multiple-Access Procedures
CDMA = Code Division Multiple Access
Uses two-valued carrier functions to separate user signals The carrier functions are bipolar sequences
The carrier functions are called Code Sequences
These code sequences should be orthogonal to each other
The integral through the products of two sequences over a period of time should be zero

If such carrier functions are used:


The individual user signals can be multiplied by these sequences The individual user signals can be transmitted in the same frequency range simultaneously

CDMA works

How CDMA works

Direct-Sequence CDMA - (DS)-CDMA


Direct-Sequence CDMA - (DS)-CDMA
Used in UMTS for the implementation of code-division multiple access The bipolar user data bit stream is multiplied by a user-specific bipolar code sequence
The elements of the code sequence are called Chips to differentiate them semantically from the bits of the user data stream
Chips are basically nothing other than bits

The multiplication of the bit stream by the chip stream generates another bipolar data stream The rate of the chip stream is a multiple of the rate of the bit stream
The generated data stream is made through in-phase multiplication
Therefore it has the rate of the chip stream

Direct-Sequence CDMA - (DS)-CDMA

A DS-CDMA Signal

Direct-Sequence CDMA - (DS)-CDMA


If the generated chip stream is transmitted:
A bandwidth is required that is larger than the bandwidth that would be necessary to transmit the user data bit stream

This is a procedure mabe by all of the users


In order to leave the stamp of a fingerprint on their user data with the user specific code That allows the transmitted signal to be reconstructed from the aggregate of received signals

Users in CDMA system transmit simultaneously n the same frequency band

Direct-Sequence CDMA - (DS)-CDMA


The Technique:
A user would like to transmit the two bits 1 and 0 The code sequence 10110100
Has eight times the transmission rate of the bit stream

The length of the code sequence is exactly the same as a duration of a bit Each bit is multiplied in-phase by the code sequence to generate the chip stream 1011010001001011
That can be transmitted over the mobile channel through an appropriate digital mobility

The bits of a data stream can be recovered in the receiver from the chip sequence received through a repetition of the multiplication procedure.

Spectral Characteristics of CDMA signals

Spectral Characteristics of CDMA signals

Spectral Characteristics of CDMA signals


All the following can be established when one considers the power density spectra of signals
The bit stream has the rate Rb that characterises the width of the power density spectrum

The multiplication by the chip sequence again produces a chip sequence of the rate Rc
It is a multiple of the bit rate

The power density spectrum of the generated chip stream has the same form as that of the bit stream
Except that it is wider by the same factor as the chip rate is higher than the bit rate

The UTRA Radio Interface


The radio interface:
Interpreted as the interface between the mobile station and the base station The communication is wireless and it is over radio

UTRA (UMTS Terrestrial Radio Access) is located between the radio access network, UTRAN (Terrestrial Radio Access Network) and the MS (Mobile Station)

Spectral Characteristics of CDMA signals


All the following can be established when one considers the power density spectra of signals
The bit stream has the rate Rb that characterises the width of the power density spectrum

The multiplication by the chip sequence again produces a chip sequence of the rate Rc
It is a multiple of the bit rate

The power density spectrum of the generated chip stream has the same form as that of the bit stream
Except that it is wider by the same factor as the chip rate is higher than the bit rate

The UTRA Radio Interface


The radio interface:
Interpreted as the interface between the mobile station and the base station The communication is wireless and it is over radio

UTRA (UMTS Terrestrial Radio Access) is located between the radio access network, UTRAN (Terrestrial Radio Access Network) and the MS (Mobile Station)

Spectral Characteristics of CDMA signals


Spread Spectrum Technique
One talks about the power density spectrum of the signal being spread
The spectrum spreads through multiplication by the bit sequence against the spectrum without multiplication

Spreading Factor
The factor by which the spectrum spreads It is calculated from the ratio of the bandwidths or the transmission rates of the bit and created chip stream A bit is multiplied by the number N of chips The chip rate is larger than the bit rate by exactly the factor N The number of chips per bit therefore exactly corresponds to the spreading factor

The code sequence that is multiplied by each bit called a spreading code

Appendix D: Third Generation Overview

3G THIRD GENERATION OVERVIEW

Giri
3. Nesil GSM Hizmetleri (3G ya da 3K) nc nesil kablosuz telefon teknolojisilerine verilen genel addr Ayn 1G ve 2G gibi, hcresel bir a sistemi kullanr 3G teknolojilerine rnek olarak Universal Mobile Telecommunications System (yani Evrensel Mobil letiim Sistemi) anlamna gelen UMTS verilebilir Bunun yannda Kuzey Amerika'da kullanlan CDMA2000 ve Japonya'da Freedom of Mobile Multimedia Access (Mobil oklu Ortam Eriimine zgrlk) anlamna gelen FOMA standardlar da bir 3G teknolojisidir

Giri
3G'nin 2Gye gre getirmi olduu en byk yenilik taban olarak alnan verinin ses deil saysal veri olmasdr. Buna ek olarak, 3G sisteminde cihazlar bant geniliini sadece veri alverii srasnda igal ederler. lk rnekleri Japonya'da 1998 ylnda kullanma alan bu teknoloji, 2003'ten itibaren Avrupaya da gelmitir.

Avantajlar
3G teknolojisinin sunduu birok yenilikten bir ka:
Mesajlama, internet eriimi ve yksek hzda oklu ortam haberleme destei Gelimi hizmet kalitesi Gelimi pil mr Konumlandrma hizmetlerinin salanmas Btn katma deerli ses hizmetlerinin salanabilmesi letim ve bakm kolayl Mevcut ebekelerle birlikte alabilirlik, 2Gye dolam salayabilme

Avantajlar
Mevcut ebekelere geriye doru uyum salayabilme, dk kurulum maliyeti Gelimi gvenlik yntemleri sayesinde mobil ticarete ortam salayabilme Goruntulu konusmayida salar Medya habercilii asnda ekilen video grntlerinin en hzl bir ekilde haber merkezine yetitirilmesi

Sorunlar
3G, her ne kadar bant geniliini verimli kullanmak ve "tkanma"nn nne gemek iin tasarlanm olsa da radyo emisyonu iin ok gelitirilmemi algoritmalar kullanmaktadr. Bunun sonucu olarak 3G cihazlar gidilen hz ve ortam koullarna gre veri transfer hzn deitirirler:
0 ile 40 km/saat arasnda, 3G'nin teorik hz saniyede 2 mbit civarndadr. 40 ile 120 km/saat arasnda, 3G'nin veri alveri hz saniyede 386 kbit'e geriler. Yaklak 360 km/saat hzn tesine klnca, 3G verinin aktarlmasnda ciddi sorunlar yaamaya balayabilir!

Sorunlar
Kullanlan modlasyon teknii cep telefonlarnda dorusall yksek RF g ykseltelerinin kullanilmasini zorunlu klmtr. Bu da genelde telefonun en ok akm eken ve verimliliinin pil mrne direkt etkisi olan g ykseltelerinin dk verimle kullanlmasna ve zellikle ilk nesil telefonlarn pil mrlerininin ksa olmasna neden olmutur. Buna ek olarak, 3G ile birlikte kullanlan frekans band 2100 / 2400 Mhz civarlarna ekilmitir. Eer 900 Mhz GSM standardna gre karlatrrsak, bu deiiklik kapsama alannn dokuz kata kadar klmesi anlamna gelmektedir! Dolaysyla ehirlerde binalar, ak alanlarda ise alann bykl yznden 3G kapsama alan dar kalmaktadr.

Sorunlarn zm

4G

4Gye Doru

Gelitirmeler
lk tasarmlarda ilemci hz gerekliliini dk tutmak adna kullanlan basit algoritmalar yznden hz dk kalmakta ve daha da kts gidilen hza gre deiebilmektedir.
Bu soruna zm olmas asndan HSDPA (ngilizce High Speed Downlink Packet Access, yani Yksek Hzl Veri Pakedi ndirme mkan) ve HSUPA (ngilizce High Speed Uplink Packet Access, yani Yksek Hzl Veri Pakedi Ykleme mkan) teknolojileri yaratlmtr. Bu teknolojiler sayesinde ortalama transfer hz gidilen hzdan bamsz olarak indirme ve yklemede saniyede 1 mbit civarlarnda olmaktadr. Ayn ilk nesil 3G'de olduu gibi, HSDPA da ilk Japonya'da kullanma almt

Вам также может понравиться