The document discusses signaling fundamentals in a base station subsystem (BSS). It describes the A, Abis, and Um interfaces between the BSS components. The A interface uses SS7 protocol layers including the physical layer, MTP, SCCP and BSSAP. The BSSAP layer supports BSSMAP messages for connectionless and connection-oriented signaling between the BSS and MSC.
This document provides an overview of Global System for Mobile Communications (GSM) including its key objectives, services offered, network architecture and components, operations, signaling, and other aspects. The main points are:
GSM aims to provide improved spectrum efficiency, international roaming, low-cost devices, high-quality voice calls, and support for new data services. The core network consists of mobile stations, base station subsystems, network switching subsystems, and operation support subsystems. GSM uses TDMA/FDMA to allow multiple users to access the network simultaneously and efficiently. Signaling in GSM networks allows for call establishment, management, and control between different network elements.
The document discusses key concepts and components of GSM and WCDMA mobile networks. It describes the Home Location Register (HLR) and Visitor Location Register (VLR) which store subscriber information and location data. It also mentions the Authentication Center (AUC), Equipment Identity Register (EIR), and Base Station System (BSS). For WCDMA, it outlines the interfaces between network elements like Iu, Uu, Iub, and Iur and discusses radio access bearers, spreading factors, and the use of channel elements for network sizing.
Global system for mobile communication Introduction, GSM architecture, GSM interfaces, Signal processing in GSM,
Frame structure of GSM, Channels used in GSM
The document provides an overview of GSM, GPRS, UMTS, HSDPA and HSUPA protocols and call flows. It describes the architecture, interfaces and protocols of each generation at the physical, data link and network layers. Key protocols discussed include LAPD, RR, MM, CM, SNDCP, GTP, RLC, MAC, RRC. Call flows for basic call origination, authentication, data transfer and detach procedures are illustrated for each network. The document also introduces HSDPA and HSUPA enhancements to UMTS such as new channels, scheduling functionality and H-ARQ protocol.
Umts Radio Interface System Planning And OptimizationDavid Rottmayer
The document discusses planning and optimizing UMTS radio networks. It begins with an overview of UMTS network architecture and the differences between UMTS and GSM radio system planning. Key aspects of UMTS planning include coverage and capacity planning occurring simultaneously, as capacity requirements influence coverage. The document then covers WCDMA air interface specifications, propagation environments, and the UMTS radio system planning process. It discusses challenges such as varying traffic levels and distributions. The document provides a typical link budget example and explains transmitter, receiver, and channel parameters considered in UMTS coverage planning.
This document provides an overview of UMTS W-CDMA (Universal Mobile Telecommunications System Wideband Code Division Multiple Access). It describes the basic architecture and channel structures of a 3G W-CDMA system. Key points include that W-CDMA uses CDMA technology with a chip rate of 3.84 Mcps and channel bandwidth of 4.4-5 MHz. It also discusses the various physical channels in the uplink and downlink, including dedicated channels, common channels, and how they are structured over timeslots and frames.
This presentation covers:
How evolution has happened from First Generation Mobile Communication Systems to present day 3G/UMTS/WCMDA systems
Brief introduction of each Generation: GSM - 2G, 2.5 G - GPRS, 2.75G - EDGE, 3G and then LTE/4G
The document provides an agenda on GSM and GPRS theory that includes:
- An overview of GSM definition, history, services, system architecture, functional model, and interfaces
- Descriptions of the radio interface, A-bis, A-interface, signaling protocols, and inter-MSC signaling
- A brief history of GPRS and definitions of its new network elements and air and A-bis interfaces
This document provides an overview of Global System for Mobile Communications (GSM) including its key objectives, services offered, network architecture and components, operations, signaling, and other aspects. The main points are:
GSM aims to provide improved spectrum efficiency, international roaming, low-cost devices, high-quality voice calls, and support for new data services. The core network consists of mobile stations, base station subsystems, network switching subsystems, and operation support subsystems. GSM uses TDMA/FDMA to allow multiple users to access the network simultaneously and efficiently. Signaling in GSM networks allows for call establishment, management, and control between different network elements.
The document discusses key concepts and components of GSM and WCDMA mobile networks. It describes the Home Location Register (HLR) and Visitor Location Register (VLR) which store subscriber information and location data. It also mentions the Authentication Center (AUC), Equipment Identity Register (EIR), and Base Station System (BSS). For WCDMA, it outlines the interfaces between network elements like Iu, Uu, Iub, and Iur and discusses radio access bearers, spreading factors, and the use of channel elements for network sizing.
Global system for mobile communication Introduction, GSM architecture, GSM interfaces, Signal processing in GSM,
Frame structure of GSM, Channels used in GSM
The document provides an overview of GSM, GPRS, UMTS, HSDPA and HSUPA protocols and call flows. It describes the architecture, interfaces and protocols of each generation at the physical, data link and network layers. Key protocols discussed include LAPD, RR, MM, CM, SNDCP, GTP, RLC, MAC, RRC. Call flows for basic call origination, authentication, data transfer and detach procedures are illustrated for each network. The document also introduces HSDPA and HSUPA enhancements to UMTS such as new channels, scheduling functionality and H-ARQ protocol.
Umts Radio Interface System Planning And OptimizationDavid Rottmayer
The document discusses planning and optimizing UMTS radio networks. It begins with an overview of UMTS network architecture and the differences between UMTS and GSM radio system planning. Key aspects of UMTS planning include coverage and capacity planning occurring simultaneously, as capacity requirements influence coverage. The document then covers WCDMA air interface specifications, propagation environments, and the UMTS radio system planning process. It discusses challenges such as varying traffic levels and distributions. The document provides a typical link budget example and explains transmitter, receiver, and channel parameters considered in UMTS coverage planning.
This document provides an overview of UMTS W-CDMA (Universal Mobile Telecommunications System Wideband Code Division Multiple Access). It describes the basic architecture and channel structures of a 3G W-CDMA system. Key points include that W-CDMA uses CDMA technology with a chip rate of 3.84 Mcps and channel bandwidth of 4.4-5 MHz. It also discusses the various physical channels in the uplink and downlink, including dedicated channels, common channels, and how they are structured over timeslots and frames.
This presentation covers:
How evolution has happened from First Generation Mobile Communication Systems to present day 3G/UMTS/WCMDA systems
Brief introduction of each Generation: GSM - 2G, 2.5 G - GPRS, 2.75G - EDGE, 3G and then LTE/4G
The document provides an agenda on GSM and GPRS theory that includes:
- An overview of GSM definition, history, services, system architecture, functional model, and interfaces
- Descriptions of the radio interface, A-bis, A-interface, signaling protocols, and inter-MSC signaling
- A brief history of GPRS and definitions of its new network elements and air and A-bis interfaces
The document discusses GSM signaling and mobile signaling. GSM signaling defines communications between the mobile and network using different protocols across interfaces. Mobile signaling involves the mobile searching for frequencies, synchronizing, downloading information, selecting a network, and signaling to the network by sending a service request when a call is made.
This document summarizes the key protocols in GSM signaling. It describes the functions of protocols including session establishment, data exchange, error checking, and resource utilization. It then explains the layered GSM signaling protocol model including the physical layer for radio transmission, data link layer using LAPDm, and network layer consisting of radio resource management, mobility management, and connection management sublayers. Key functions of each sublayer like channel assignment, location updating, and call control are outlined.
UMTS system architecture, protocols & processesMuxi ESL
This document provides an overview of UMTS system architecture and protocols. It discusses:
- The logical architecture of UTRAN including RNC and Node-B elements.
- Interfaces between network elements are clearly specified to allow interoperability between equipment from different manufacturers.
- The main functions of the RNC include radio resource management, call management, and connection to the core network.
- Protocols in UTRAN include RRC for radio resource control, RLC for radio link control, and MAC for medium access control.
This document provides an overview of the network architecture and signalling protocols in UMTS networks. It describes the main network elements of UTRAN, UE and CN. It explains the interfaces between these elements and the protocols used for communication, including RRC for UE-RNC signalling, RANAP for RNC-CN signalling, and NAS protocols for non-access signalling between UE and CN. It also summarizes the protocol stacks used over the Iu interfaces between RNC and CN for circuit-switched and packet-switched domains.
The document discusses the history and development of 3G mobile communication technology, specifically UMTS. It provides details on:
- The evolution from 1G to 2G mobile networks and the need for 3G to support higher data rates and multimedia services.
- The standardization of UMTS through ETSI and ITU, focusing on the two selected radio transmission technologies - UTRA FDD and TDD.
- The architecture of 3G UMTS networks, including frequency reuse techniques used to maximize capacity within limited spectrum availability.
The document provides an introduction to 2G/3G and 4G core mobile networks. It discusses key network elements like BTS, BSC, RNC, SGSN, GGSN, eNodeB, MME, S-GW and P-GW. It provides an overview of the differences between circuit switching and packet switching. It also summarizes simplified call flows for 2G/3G packet data and 4G, highlighting the core network elements involved and interfaces between them.
This document provides an overview of the key principles and components of a GSM network, including:
- The mobile station consists of the mobile equipment and subscriber identity module.
- The base station subsystem comprises the base transceiver station, which provides radio access, and the base station controller, which manages radio resources.
- The network switching subsystem includes the mobile switching center, home location register, visitor location register, and equipment identity register.
- The network uses several interfaces to connect the different components and allow mobility across the network.
This document provides an overview of the Global System for Mobile Communications (GSM). It discusses how GSM uses a combination of Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA) to maximize channel usage. It also describes the key components of GSM including the mobile station, base station subsystem, network switching subsystem, and operation and support subsystem. Additionally, it covers functions like frequency reuse, handovers, short message service, speech coding, and call routing in GSM networks.
The document provides an overview of 2G and 3G mobile phone networks. It describes the basic network architecture including the BSS (Base Station Subsystem consisting of the BTS and BSC), the NSS core network (including the MSC, HLR, VLR, SGSN, GGSN), and their basic functions. It also defines common abbreviations like MS, BTS, BSC, MSC, SGSN, GGSN.
This presentation covers:
What is a Radio Resource Unit ?
Why do we need RRM ?
Need of RRM in WCDMA ?
RRM algorithms Objectives
Different RRM functions : Handover, Power control, Admission Control, Code Management
The document discusses various channels used in GSM networks. It describes physical channels that transfer bits between network elements and logical channels distinguished by the nature of carried information. It provides details on different types of logical channels including traffic, broadcast, common control and dedicated control channels. It also explains concepts like bursts, frames, multiframe structures and how they are used to organize speech and data on traffic channels.
Gsm architecture, gsm network identities, network cases, cell planning, and c...Zorays Solar Pakistan
This document discusses GSM network architecture and components. It describes the key elements like the MSC, HLR, VLR and their functions. It explains cell planning and frequency reuse. It also covers network identities, attaching and roaming processes, call setup, and charging systems like triggered charging for calls and SMS. Compound charging processes for originating calls, voucher refills through IVR are summarized.
GPRS is a packet-based mobile data service on GSM networks. It provides higher speed data transmission than previous GSM data services. The GPRS architecture introduces two new network nodes - SGSN and GGSN. SGSN handles mobility management and packet transmission between MS and GGSN, while GGSN connects the GPRS network to external packet networks like the Internet. GPRS enhances the GSM network by allowing dynamic allocation of bandwidth and intermittent data transmission, making it suitable for bursty, low-volume data applications.
The document discusses key concepts in GSM cellular networks including:
1. An overview of GSM including its definition, phases, specifications, system architecture, network areas, and advantages over analog systems.
2. Cell planning principles such as types of cells, the planning process, and cell clusters.
3. Frequency reuse which allows frequencies to be reused in different cells to improve capacity, with an example shown.
This document provides an overview of Global System for Mobile Communications (GSM) technology. It discusses the history and development of GSM standards, the cellular network structure involving base stations, base station controllers, mobile switching centers and other components. It also describes key concepts such as frequency division multiple access, time division multiple access, mobility management, call management, and identifies used in GSM networks including IMSI, TMSI, IMEI. The document outlines the protocol architecture and functions of various nodes in the GSM network.
This presentation covers:
1. Evolution of UMTS core network
2. Different 3GPP releases up gradation to UMTS architecture
3. UMTS Core network elements
4. Protocols used in UMTS core networks
5. MSC server and MGW
6. IMS architecture
- GSM is a standard for 2G digital cellular networks that uses narrowband TDMA. It describes protocols for features like GPRS, EDGE, authentication, encryption, and more.
- The GSM architecture consists of mobile equipment (handsets), a base station subsystem for radio network management, a network switching subsystem for call routing, and a network management subsystem.
- Key aspects include the SIM card for user identification, base transceiver stations for radio signals, transcoding between speech formats, home and visitor location registers for subscriber data, and authentication centers for security.
Topics covered in this presentation:
What is a Base Transceiver Station ?
Components of any BTS
BTS transceiver, BTS O&M module, clock module
BTS Transmitter and Receiver Characteristics
BTS configurations
BTS functions and Protocols on Um and Abis Interface
BTS security aspects
The document discusses the transition from GSM networks to 3G networks using UMTS (Universal Mobile Telecommunications System) and W-CDMA (Wideband Code Division Multiple Access) technology. It provides an overview of the 3 steps to transition: from current GSM networks to 2.5G networks with GPRS added, to 3G networks using UMTS and W-CDMA. Key aspects of W-CDMA such as its frequencies, multiple access techniques, and spreading codes used are summarized.
This document provides an overview of the architecture and interfaces of the GSM mobile network. It discusses the key components and their functions:
The Base Station Subsystem (BSS) manages radio transmissions between mobile stations and the core network. The Network and Switching Subsystem (NSS) manages communications and connects mobile stations to other networks. The Operational Support System (OSS) provides control and management of the network. [/SUMMARY]
Transmission management in BSS is a feature used in managing the Base Station Subsystem transmission system functions such as supervision, alarms, statistics
and settings. The network element mainly responsible for transmission management in BSS is the Base Station Controller (BSC).
Transmission management functionalities make it possible for the operators to manage the transmission equipment remotely from the BSC or from Nokia
NetAct integrated network management system, which simplifies network maintenance and operation. Supervision functions help minimise the time spent in maintenance, and statistics collection helps the operators analyse and optimise
the use of their transmission equipment. Moreover, new software can be downloaded in a way that does not interfere with the traffic.
Hardware and software requirements BSS transmission network elements
BSS transmission management functionalities Transmission parameters Transmission alarms
Transmission measurements
2.Hardware and software requirements
There are no specific hardware or software requirements for the transmission management functionalities. However, the type of the BTS poses certain
limitations.
The BTS type specific functionalities are listed in the table below.
More details about the functionalities can be found in BSS transmission management functionalities .
Polling list sending with priority is a functionality used in positioning. To ensure accurate positioning calculations, the LMU unit must supply Radio Interface Timing System (RIT) information to the network faster than the normal Q1 polling is able to do. Faster LMU polling is achieved by defining a Q1 polling
priority for each Q1 device, with the LMU having the highest priority. For more information see Location Services .
3.BSS transmission network elements
The base Station Subsystem (BSS) consists of at least one Base Station Controller (BSC) and its Base Transceiver Stations (BTS). The Transcoder Submultiplexer
(TCSM) is also part of the BSS although it is actually located in the MSC site. The three basic configurations (topologies) for transmission between the BSC and
the BTSs are: point-to-point connection
multidrop chain multidrop loop
In point-to-point configuration each BTS is connected directly to the BSC. In the multidrop chain, BTSs form a chain and the first BTS in the network is connected directly to the BSC. In the loop connection, the BTSs form a loop where the first and the last BTS in the loop are connected directly to the BSC via a crossconnecting node. The topology used depends on a number of factors such as the distance between the BSC and the BTS, the number of transceivers (TRXs) used at a particular BTS site and the signalling channel rate between the BSC and the\ BTS. Usually the topology used is a mixture of the three basic topologies. Formore information on the topologies, refer to Nokia BSS Transmission\Configuration .
The document discusses GSM signaling and mobile signaling. GSM signaling defines communications between the mobile and network using different protocols across interfaces. Mobile signaling involves the mobile searching for frequencies, synchronizing, downloading information, selecting a network, and signaling to the network by sending a service request when a call is made.
This document summarizes the key protocols in GSM signaling. It describes the functions of protocols including session establishment, data exchange, error checking, and resource utilization. It then explains the layered GSM signaling protocol model including the physical layer for radio transmission, data link layer using LAPDm, and network layer consisting of radio resource management, mobility management, and connection management sublayers. Key functions of each sublayer like channel assignment, location updating, and call control are outlined.
UMTS system architecture, protocols & processesMuxi ESL
This document provides an overview of UMTS system architecture and protocols. It discusses:
- The logical architecture of UTRAN including RNC and Node-B elements.
- Interfaces between network elements are clearly specified to allow interoperability between equipment from different manufacturers.
- The main functions of the RNC include radio resource management, call management, and connection to the core network.
- Protocols in UTRAN include RRC for radio resource control, RLC for radio link control, and MAC for medium access control.
This document provides an overview of the network architecture and signalling protocols in UMTS networks. It describes the main network elements of UTRAN, UE and CN. It explains the interfaces between these elements and the protocols used for communication, including RRC for UE-RNC signalling, RANAP for RNC-CN signalling, and NAS protocols for non-access signalling between UE and CN. It also summarizes the protocol stacks used over the Iu interfaces between RNC and CN for circuit-switched and packet-switched domains.
The document discusses the history and development of 3G mobile communication technology, specifically UMTS. It provides details on:
- The evolution from 1G to 2G mobile networks and the need for 3G to support higher data rates and multimedia services.
- The standardization of UMTS through ETSI and ITU, focusing on the two selected radio transmission technologies - UTRA FDD and TDD.
- The architecture of 3G UMTS networks, including frequency reuse techniques used to maximize capacity within limited spectrum availability.
The document provides an introduction to 2G/3G and 4G core mobile networks. It discusses key network elements like BTS, BSC, RNC, SGSN, GGSN, eNodeB, MME, S-GW and P-GW. It provides an overview of the differences between circuit switching and packet switching. It also summarizes simplified call flows for 2G/3G packet data and 4G, highlighting the core network elements involved and interfaces between them.
This document provides an overview of the key principles and components of a GSM network, including:
- The mobile station consists of the mobile equipment and subscriber identity module.
- The base station subsystem comprises the base transceiver station, which provides radio access, and the base station controller, which manages radio resources.
- The network switching subsystem includes the mobile switching center, home location register, visitor location register, and equipment identity register.
- The network uses several interfaces to connect the different components and allow mobility across the network.
This document provides an overview of the Global System for Mobile Communications (GSM). It discusses how GSM uses a combination of Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA) to maximize channel usage. It also describes the key components of GSM including the mobile station, base station subsystem, network switching subsystem, and operation and support subsystem. Additionally, it covers functions like frequency reuse, handovers, short message service, speech coding, and call routing in GSM networks.
The document provides an overview of 2G and 3G mobile phone networks. It describes the basic network architecture including the BSS (Base Station Subsystem consisting of the BTS and BSC), the NSS core network (including the MSC, HLR, VLR, SGSN, GGSN), and their basic functions. It also defines common abbreviations like MS, BTS, BSC, MSC, SGSN, GGSN.
This presentation covers:
What is a Radio Resource Unit ?
Why do we need RRM ?
Need of RRM in WCDMA ?
RRM algorithms Objectives
Different RRM functions : Handover, Power control, Admission Control, Code Management
The document discusses various channels used in GSM networks. It describes physical channels that transfer bits between network elements and logical channels distinguished by the nature of carried information. It provides details on different types of logical channels including traffic, broadcast, common control and dedicated control channels. It also explains concepts like bursts, frames, multiframe structures and how they are used to organize speech and data on traffic channels.
Gsm architecture, gsm network identities, network cases, cell planning, and c...Zorays Solar Pakistan
This document discusses GSM network architecture and components. It describes the key elements like the MSC, HLR, VLR and their functions. It explains cell planning and frequency reuse. It also covers network identities, attaching and roaming processes, call setup, and charging systems like triggered charging for calls and SMS. Compound charging processes for originating calls, voucher refills through IVR are summarized.
GPRS is a packet-based mobile data service on GSM networks. It provides higher speed data transmission than previous GSM data services. The GPRS architecture introduces two new network nodes - SGSN and GGSN. SGSN handles mobility management and packet transmission between MS and GGSN, while GGSN connects the GPRS network to external packet networks like the Internet. GPRS enhances the GSM network by allowing dynamic allocation of bandwidth and intermittent data transmission, making it suitable for bursty, low-volume data applications.
The document discusses key concepts in GSM cellular networks including:
1. An overview of GSM including its definition, phases, specifications, system architecture, network areas, and advantages over analog systems.
2. Cell planning principles such as types of cells, the planning process, and cell clusters.
3. Frequency reuse which allows frequencies to be reused in different cells to improve capacity, with an example shown.
This document provides an overview of Global System for Mobile Communications (GSM) technology. It discusses the history and development of GSM standards, the cellular network structure involving base stations, base station controllers, mobile switching centers and other components. It also describes key concepts such as frequency division multiple access, time division multiple access, mobility management, call management, and identifies used in GSM networks including IMSI, TMSI, IMEI. The document outlines the protocol architecture and functions of various nodes in the GSM network.
This presentation covers:
1. Evolution of UMTS core network
2. Different 3GPP releases up gradation to UMTS architecture
3. UMTS Core network elements
4. Protocols used in UMTS core networks
5. MSC server and MGW
6. IMS architecture
- GSM is a standard for 2G digital cellular networks that uses narrowband TDMA. It describes protocols for features like GPRS, EDGE, authentication, encryption, and more.
- The GSM architecture consists of mobile equipment (handsets), a base station subsystem for radio network management, a network switching subsystem for call routing, and a network management subsystem.
- Key aspects include the SIM card for user identification, base transceiver stations for radio signals, transcoding between speech formats, home and visitor location registers for subscriber data, and authentication centers for security.
Topics covered in this presentation:
What is a Base Transceiver Station ?
Components of any BTS
BTS transceiver, BTS O&M module, clock module
BTS Transmitter and Receiver Characteristics
BTS configurations
BTS functions and Protocols on Um and Abis Interface
BTS security aspects
The document discusses the transition from GSM networks to 3G networks using UMTS (Universal Mobile Telecommunications System) and W-CDMA (Wideband Code Division Multiple Access) technology. It provides an overview of the 3 steps to transition: from current GSM networks to 2.5G networks with GPRS added, to 3G networks using UMTS and W-CDMA. Key aspects of W-CDMA such as its frequencies, multiple access techniques, and spreading codes used are summarized.
This document provides an overview of the architecture and interfaces of the GSM mobile network. It discusses the key components and their functions:
The Base Station Subsystem (BSS) manages radio transmissions between mobile stations and the core network. The Network and Switching Subsystem (NSS) manages communications and connects mobile stations to other networks. The Operational Support System (OSS) provides control and management of the network. [/SUMMARY]
Transmission management in BSS is a feature used in managing the Base Station Subsystem transmission system functions such as supervision, alarms, statistics
and settings. The network element mainly responsible for transmission management in BSS is the Base Station Controller (BSC).
Transmission management functionalities make it possible for the operators to manage the transmission equipment remotely from the BSC or from Nokia
NetAct integrated network management system, which simplifies network maintenance and operation. Supervision functions help minimise the time spent in maintenance, and statistics collection helps the operators analyse and optimise
the use of their transmission equipment. Moreover, new software can be downloaded in a way that does not interfere with the traffic.
Hardware and software requirements BSS transmission network elements
BSS transmission management functionalities Transmission parameters Transmission alarms
Transmission measurements
2.Hardware and software requirements
There are no specific hardware or software requirements for the transmission management functionalities. However, the type of the BTS poses certain
limitations.
The BTS type specific functionalities are listed in the table below.
More details about the functionalities can be found in BSS transmission management functionalities .
Polling list sending with priority is a functionality used in positioning. To ensure accurate positioning calculations, the LMU unit must supply Radio Interface Timing System (RIT) information to the network faster than the normal Q1 polling is able to do. Faster LMU polling is achieved by defining a Q1 polling
priority for each Q1 device, with the LMU having the highest priority. For more information see Location Services .
3.BSS transmission network elements
The base Station Subsystem (BSS) consists of at least one Base Station Controller (BSC) and its Base Transceiver Stations (BTS). The Transcoder Submultiplexer
(TCSM) is also part of the BSS although it is actually located in the MSC site. The three basic configurations (topologies) for transmission between the BSC and
the BTSs are: point-to-point connection
multidrop chain multidrop loop
In point-to-point configuration each BTS is connected directly to the BSC. In the multidrop chain, BTSs form a chain and the first BTS in the network is connected directly to the BSC. In the loop connection, the BTSs form a loop where the first and the last BTS in the loop are connected directly to the BSC via a crossconnecting node. The topology used depends on a number of factors such as the distance between the BSC and the BTS, the number of transceivers (TRXs) used at a particular BTS site and the signalling channel rate between the BSC and the\ BTS. Usually the topology used is a mixture of the three basic topologies. Formore information on the topologies, refer to Nokia BSS Transmission\Configuration .
This document is the confidential property of NORTEL MATRA CELLULAR and provides engineering guidelines for dimensioning the Abis interface between BTS and BSC in a GSM network. It includes guidelines for dimensioning signaling links, transmission channels, and redundancy requirements. The document has undergone several revisions to incorporate comments and modifications.
The document discusses Huawei's UMTS end-to-end solution, including their New Generation Node B, Distributed Node B Solution, HSDPA and Hybrid IP Transmission, GPRS/UMTS Unified PS Core Solution, Network Planning and Optimization Toolkit, and IMS Solution. It highlights key features such as integrated digital power amplifiers, multi-carrier TRX, full HSDPA performance, TCO savings, future orientation, and ease of operation.
This document provides an overview of Huawei's UMTS O&M system and guidance on planning and configuring the O&M network. It introduces the key components of the UMTS network and O&M system, including the M2000 platform, CN-PS devices like SGSN9810, CN-CS devices such as MSOFTX3000, and RAN devices including BTS3812. It also covers establishing the O&M network through various IP bearer modes, applying security solutions, and following best practices for O&M network planning.
Overview Of Gsm Cellular Network & OperationsDeepak Sharma
The document provides an overview of the GSM cellular network and its operations. It describes the main components including the mobile switching center (MSC), home location register (HLR), visitor location register (VLR), and authentication center (AUC). It also discusses the mobile handset, radio interface, network architecture, and how capacity is increased through frequency reuse, cell splitting, and sectoring.
1. This document describes the call setup process for a GSM originating call made from a mobile user to a landline subscriber.
2. It involves establishing a radio resource connection between the mobile station and base station, authenticating and ciphering the connection, and setting up the voice channel and call.
3. The key steps are radio channel allocation, call signaling transmission to the mobile switching center, routing the call to the public switched telephone network, alerting and connecting the called party, and releasing the call resources on completion.
E nodeb commissioning guide(v100r005c00 04)(pdf)-enVugar Ali
This document provides instructions for commissioning an eNodeB using different commissioning modes, including remote commissioning via an M2000 management system and local commissioning directly on the eNodeB or via a USB flash drive. It describes the commissioning procedures and preparation steps for various scenarios depending on whether a security gateway is deployed. The document contains details on tasks such as downloading software, configuring the antenna system, testing basic services, and setting the eNodeB to normal operating mode after commissioning completion.
Bts3900 Site Maintenance Guide(V200 01)Atif Mahmood
This document provides a summary of safety guidelines and maintenance procedures for the BTS3900 site. It outlines important safety precautions regarding electricity, batteries, radiation, working at heights, and mechanical safety. The document also describes routine hardware maintenance items for the NodeB equipment room, power system, and BTS3900 cabinet. Procedures for powering on and off the BTS3900, as well as replacing components like the BBU3900 case, boards, DCDU-01, FAN modules, PMU/PSU, SLPU, and WRFU are presented.
This document provides guidance on commissioning the BTS3900 GSM base station. It describes starting the site maintenance terminal, checking software versions and network connectivity, commissioning the antenna system, verifying system operation and services, monitoring environmental conditions, and addressing frequently asked questions. Safety precautions and requirements for commissioning resources are also covered.
The document discusses procedures for configuring NodeB data in a wireless network. It describes configuring physical equipment such as boards, subracks, and peripheral devices. It then covers configuring transport links over ATM, including adding physical links like UNI links, IMA groups, and IMA links to establish connectivity between the NodeB and RNC. The overall goal is to master the procedure for NodeB data configuration using the CME tool to initially configure or modify radio network data.
The document provides an overview of Huawei's WCDMA RAN10.0, which features enhancements to HSDPA, HSUPA, MBMS, and the RAN architecture. Key highlights include increased peak data rates of up to 14.4Mbps for HSDPA and 5.76Mbps for HSUPA, improved multimedia broadcast services, and features for improving network capacity and transmission efficiency such as CCPIC and IP routing. The RAN10.0 release aims to enable new broadband applications and services for operators.
1. The document describes the structure and components of the HUAWEI BTS3036 mobile communication system. It includes a baseband unit (BBU) cabinet, double radio filter unit (DRFU), direct current distribution unit (DCDU), and fan box.
2. The BBU cabinet houses the main boards, including the baseband board, environment interface board, GSM transmission board, and E1/T1 protection board. It also includes interface modules and power/fan modules.
3. The document provides detailed information on the ports, LED indicators, and functions of each component board within the BBU cabinet, including the baseband board, power board, environment interface board, and G
The document outlines basic call flows for location updates, mobile originating calls (MOC), mobile terminating calls (MTC), and IP calls. It describes the key steps as:
1) Location update involves identity response, authentication between the SIM and MSC, update location requests, and ciphering.
2) For MOC, the mobile station sends a setup message with the dialed number, the MSC sends a send routing information message to the HLR, and the HLR responds with routing instructions allowing the call to be connected.
3) For MTC, the MSC requests a roaming number from the HLR, the HLR provides a number and the MSC pages the mobile station to alert
The document discusses Huawei's fourth generation NodeB and its evolution. It provides details on Huawei's customer-oriented innovation and focus on meeting customer requirements. It then outlines Huawei's product portfolio evolution and the key features and benefits of its fourth generation NodeB, including high integration, capacity, performance, reliability and smooth evolution capabilities.
Physical channels carry information over the air interface between the mobile station and base transceiver station. Logical channels map user data and signaling information onto physical channels. There are two main types of logical channels - traffic channels which carry call data, and control channels which communicate service information. Control channels include broadcast channels which transmit cell-wide information, common channels used for paging and access procedures, and dedicated channels for signaling during calls or when not on a call. Logical channels are mapped onto physical channels to effectively transmit information wirelessly between network components in a GSM system.
This document provides instructions for installing BTS equipment both indoors and outdoors. It discusses installing indoor cable trays and grounding bars, as well as outdoor equipment like antennas, feeder cables, and jumpers. Key steps include properly grounding all equipment, routing cables to avoid sharp bends, taking safety precautions during installation, and ensuring tight connections between components. The goal is to setup the BTS site according to specifications while grounding and weatherproofing equipment for optimal performance and protection.
The document provides information on 3G IP architecture including definitions of network nodes in GSM, UMTS, and 3G, as well as schematics of the GSM, GPRS, and 3G network architectures. It also includes sections on network vendors, telecommunication companies, and sample careers including a job posting for a Network Engineer role at Ericsson.
This document provides an overview of CDMA and WiMAX technologies as well as the components that make up a BSS (Base Station Subsystem) in a CDMA network, including the BSC (Base Station Controller) and BTS (Base Transceiver Station). It describes the functions of the BSC and BTS, their interfaces, and configurations including components like the CIPS (Common Interface Processing Subrack) in the BSC and modules in the DBS3900 distributed antenna system.
The document provides an overview of the GSM network architecture, including its three main subsystems: the Mobile Station subsystem, the Base Station Subsystem, and the Network Switching Subsystem. It describes the key elements and interfaces within each subsystem, such as the Mobile Station, Base Transceiver Station, Base Station Controller, Mobile Switching Center, Home Location Register, and Visitor Location Register. The interfaces that connect these elements, such as the A, Abis, and Um interfaces, are also introduced.
1) The document presents an overview of relay technologies used in IEEE 802.16j and 3GPP LTE-Advanced standards.
2) It discusses different relay types (Type-I non-transparent and Type-II transparent), transmission schemes (Amplify and Forward, Selective Decode and Forward, Demodulation and Forward), and relay path selection methods (Centralized and Distributed pairing schemes).
3) MATLAB simulations show that using a simple relay transmission method can significantly reduce the required transmission power level compared to direct transmission, especially when the mobile station is moving away from the base station.
This document contains questions and answers related to mobile computing and wireless communication standards and technologies. It covers topics such as characteristics of communication devices, cellular systems, GSM, Bluetooth, wireless LAN standards, and more. There are a total of 31 questions provided along with their answers in point form.
The document discusses the functions of base station systems in cellular networks. It describes the roles of the Base Station Controller (BSC) and Base Transceiver Station (BTS). The BSC manages radio resources and controls the BTSs. It handles radio channel allocation and handovers between cells. The BTS provides the radio interface to mobile stations in its cell. It transmits and receives radio signals and manages lower level radio functions under control of the BSC.
The document describes a simulation model for IEEE 802.16j Mobile Multi-Hop Relay (MMR) WiMAX networks using the NCTUns network simulator. Key aspects of the simulation model include:
1) It models the core components of NCTUns including the GUI, simulation engine, dispatcher, and kernel modifications to enable IEEE 802.16j MMR network simulations.
2) IEEE 802.16j supports two relay station modes - transparent and non-transparent - which differ in scheduling and number of hops supported.
3) The simulation model accounts for handover processes, which involve network scanning, cell reselection, and coordination between the mobile station and base stations.
1. Bharat Sanchar Nigam Limited (BSNL) is an Indian state-owned telecommunications company that provides telecom services across India.
2. BSNL provides various telecom services including wireless, broadband, internet, and landline services using technologies like GSM, CDMA, MPLS, VSAT, and VOIP.
3. When a subscriber makes a call, the request first goes to the nearest telephone exchange. The exchange processes the numbers and sets up the call either within its switching network or by transferring the call to other exchanges as needed.
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
This paper reviews medium access control
(MAC) in wireless sensor network (WSN),and different
management methods to save energy.MAC protocol
controls how sensors access a shared radio channel to
communicate with neighbours.
Computer Communication Networks-Wireless LANKrishna Nanda
Wireless LANs allow hosts to connect to a network without being physically connected via cables. They use radio waves to transmit data through the air. Some key differences between wired and wireless LANs include the mobility of hosts in wireless LANs and the use of access points to connect wireless LANs to wired networks. Wireless LANs also face challenges from signal attenuation, interference, and multipath propagation that wired LANs do not. The IEEE 802.11 standard defines the specifications for wireless LANs, including using basic service sets and extended service sets to connect multiple wireless networks, and employing carrier sense multiple access with collision avoidance for medium access control.
In wireless sensor network energy cutback is considered as a principle intensive challenge which is studied largely in the Wireless Sensor Networks (WSN) literature. Wireless Sensor Networks (WSNs) are pertinent in numerous arenas where WSNs may be used for sensing, ciphering, and communication elements that give a user or administrator the ability to instrument, observe, and retort to events and phenomena in a specific environment. But sensor devices are resource curbed, positioned in an open and unattended environment, different types of attacks and conventional techniques against these attacks are not desirable due to the resource constrained nature of these kinds of networks. An energy-balanced routing method based on forward-aware factor (FAF-EBRM) in which the next-hop node is elected according to the awareness of link weight and forward energy density. FAF-EBRM is compared with Ladder Diffusion Algorithm, which balances the energy utilization, sustain the function era and guarantees high QoS of WSN. The FAF-EBRM is proposed with Secure Routing Layer (SRL) Protocol which ensures that the secure data transmission is achieved without releasing private sensor readings and without introducing significant overhead on the battery-limited sensors.
The document summarizes Ericsson's MSC-S Blade Cluster, which substantially increases the capacity and availability of the Mobile Switching Center Server (MSC-S). The Blade Cluster uses a cluster of generic processor blades to implement the MSC-S functionality, providing high scalability through the addition of blades without impacting network operations. It offers zero downtime redundancy and the ability to service over 500,000 subscribers on a single cluster.
The document discusses wireless network evolution and solutions for extending the lifetime of deployed equipment. It describes the architecture and interface requirements of 2G GSM networks using E1 TDM links. It then covers 3G UMTS networks which introduced IP/ATM on the Iub interface, allowing more efficient bandwidth usage. The document proposes colocating 2G and 3G base stations, and reusing existing infrastructure, to reduce costs for operators deploying LTE networks while fulfilling demands for next generation services.
This white paper discusses solutions for wireless base station evolution and the colocation of 2G and 3G networks to reduce costs. It describes:
1. Existing 2G and 3G base station interface architectures, including GSM, UMTS Release 99, Release 5-7 standards.
2. How pseudowire and aggregation techniques can be used to colocate multiple low-density base stations on a common backhaul to reduce transmission costs.
3. How wireless and wireline networks can be colocated by sharing the same access transport, leveraging the widespread deployment of DSL interfaces.
The document focuses on the protocol and interface requirements for 2G and 3G base station transport cards and
Wirleless communicatrion notes for 8th sem EC -unit 2SURESHA V
This document discusses common components of cellular networks. It describes the main components as the mobile station (MS), base station system (BSS) including the radio base station (RBS) and base station controller (BSC), and the network switching system (NSS) including the mobile switching center (MSC). The BSS handles radio interface functions and connectivity to the MSC. The MSC is responsible for call routing and mobility management. Other components discussed include the visitor location register (VLR), home location register (HLR), transcoder controller (TRC) and signaling system 7 (SS7).
The document provides an overview of SONET (Synchronous Optical Network) standards:
1) SONET was developed to address the lack of interoperability between proprietary fiber optic transmission equipment from different manufacturers.
2) SONET defines optical carrier interfaces and rates to allow transmission of lower-rate signals at a common synchronous rate. This allows equipment from multiple vendors to interconnect.
3) SONET uses a layered approach, with section, line, and path overhead to monitor performance and isolate faults between network elements.
The document provides information on the evolution of wireless networks from 1G to 3G. It discusses the key components and architecture of cellular systems including base stations, mobile switching centers and their connection to the public switched telephone network. It also compares the differences between wireless and wired networks, and describes some of the limitations of early wireless networking. Finally, it covers topics like traffic routing, circuit switching, packet switching and the X.25 protocol.
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
The document discusses telecommunication standards from 1G to 4G including GSM, CDMA, WiMAX and LTE networks. It specifically focuses on the GSM network architecture, characteristics and interfaces. The GSM network uses a cellular structure with Base Transceiver Stations communicating with Mobile Stations through the air interface. It also describes the components of a Mobile Station including the Mobile Equipment and Subscriber Identity Module.
This document analyzes the effect of different velocities on handover delay in WiMAX systems. It studies location management area based multimedia and multicast/broadcast handover. The study compares the number of cells and size of location areas using a simulation to see how these parameters are affected by different mobile WiMAX velocities. It presents an analytical model and discusses numerical results analyzing handover delay with modifications to reduce delay by focusing on different mobile WiMAX mobility velocities and comparing to the convergence area size of location management areas.
This document analyzes the effect of different velocities on handover delay in WiMAX systems. It studies location management area based multimedia and multicast/broadcast handover and compares how modifying mobile WiMAX velocity levels and the size of location areas affect handover delay. The study finds that as mobile velocity increases, the rate of cell and location area boundary crossings increases, leading to more handovers and higher handover delay. Parameters like location area size, user distribution, and session popularity also impact average service disruption time during handovers.
The document discusses signaling fundamentals in a BSS, including:
1. The A, Abis, and Um interfaces - standards-based interfaces between the BSS and other network elements.
2. Details of the A interface protocol model, including the physical, MTP, SCCP, and BSSAP layers. The MTP layer provides reliable message transfer, while SCCP provides connection-oriented and connectionless services. BSSAP describes BSSMAP and DTAP messages.
3. Specifics of the physical, MTP, and SCCP layers on the A interface, such as the 2 Mbps transmission rate and MTP functions like error detection and correction.
The document describes speech channel assignment and channel mode modification procedures in 3 G mobile networks. It discusses (1) how the BSC assigns TCH channels to an MS based on a service request, (2) the internal BSC signaling for channel assignment, and (3) how the BSC modifies the channel mode based on an assignment request from the MSC.
The document discusses TMSI reallocation, which provides identity confidentiality by protecting users from being identified or located by intruders. It usually occurs during location updates or call establishment. The procedure involves the network sending a TMSI reallocation command to the MS with a new TMSI and LAI. The MS stores this and responds with a complete message. Abnormal cases include connection failure, where the network may page using IMSI or restart reallocation, and timer expiry, where the network releases the connection.
The document discusses ciphering procedures used in mobile networks. It describes:
1) Ciphering is used to secure signaling and subscriber information exchanged between the mobile station (MS) and base transceiver station (BTS).
2) The ciphering procedure is initiated by the network and performed in the BTS. The ciphering key is generated by the authentication center and sent to the BTS before ciphering begins.
3) The mobile switching center (MSC) sends ciphering commands to the BTS to start or change the ciphering mode via the base station controller (BSC).
This document provides details on the network topology of Axiata (Bangladesh) Limited's IN network. It includes diagrams and IP addressing of different nodes across five physical sites (SDP01, SDP02, SDP03, SDP04, SDP05). The core nodes consist of switches and routers connecting the sites. Various nodes host applications and databases for services like SMSC, HLR, and OAM. Security is maintained through firewalls and link aggregation between nodes.
Call flow oma000003 gsm communication flowEricsson Saudi
The document summarizes several key GSM procedures including authentication and ciphering sequence, location update sequence, basic call sequences, and equipment identification. It provides detailed signaling diagrams to illustrate the message flows between different nodes in the network for these procedures.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
1. HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide 1 BSS Signaling Fundamental
1 BSS Signaling Fundamental
About This Chapter
The external BSS interfaces, which are the Um interface between the BSS and the MS, and the
A interface between the BSS and the MSC, are standard interfaces. The Abis interface between
the BSC and the BTS is an internal interface.
1.1 A Interface
This topic describes the A interface protocol model that consists of the physical layer, MTP
layer, SCCP layer, and BSSAP layer.
1.2 Abis Interface
The Abis interface lies between the BTS and the BSC. It complies with GSM Rec.08.5X series.
The Abis interface is an internal interface of the BSS. The interworking between the BSC and
BTS equipment from different manufactures is not available. The terrestrial traffic channels on
the Abis interface map the radio traffic channels on the Um interface.
1.3 Um Interface
The Um interface lies between an MS and the BTS. It is used for the interworking between the
MS and the fixed part of the GSM system. The links on the Um interface are radio links. The
Um interface transmits the information about radio resource management, mobility
management, and connection management.
Issue 01 (2007-09-05) Huawei Technologies Proprietary 1-1
2. HUAWEI BSC6000 Base Station Subsystem
1 BSS Signaling Fundamental Signaling Analysis Guide
1.1 A Interface
This topic describes the A interface protocol model that consists of the physical layer, MTP
layer, SCCP layer, and BSSAP layer.
1.1.1 A Interface Protocol Model
The A interface is defined as a standard communication interface between the NSS and the BSS.
1.1.2 Physical Layer on the A Interface
The physical layer on the A interface is a 2 Mbit/s 75-ohm coaxial cable or 120-ohm twisted
pair.
1.1.3 MTP Layer on the A Interface
The MTP layer on the A interface provides reliable signaling message transfer in the signaling
network. In case of system failure and signaling network failure, it takes measures to avoid or
reduce the message loss, repetition, and out of sequence.
1.1.4 SCCP Layer on the A Interface
The network layer services provided by the SCCP are classified into connectionless service and
connection-oriented service.
1.1.5 BSSAP Layer on the A Interface
The BSSAP protocol, which serves as the A interface specification, describes two types of
messages, BSSMAP messages and DTAP messages.
1.1.1 A Interface Protocol Model
The A interface is defined as a standard communication interface between the NSS and the BSS.
It is between the BSC and the MSC. The physical links on the A interface are standard 2.048
Mbit/s Pulse Code Modulation (PCM) digital links. The A interface transmits the information
about MS management, mobility management, connection management, and service flow
control.
The A interface connects the BSC and the MSC from different manufactures. The GSM system
uses the SS7 on the A interface.
Physically, the A interface is the trunk circuit interface between the BSC and the MSC. Figure
1-1 shows the A interface signaling protocol model.
1-2 Huawei Technologies Proprietary Issue 01 (2007-09-05)
3. HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide 1 BSS Signaling Fundamental
Figure 1-1 A interface signaling protocol model
BSS MSC
BSSAP BSSAP
DTAP BSSMAP DTAP BSSMAP
Distribution function Distribution function
SCCP SCCP
MTP MTP
Physical layer
A
DTAP: Direct Transfer Application MTP: Message Transfer Part SCCP: Signaling Connection
Part Control Part
BSSAP: Base Station Subsystem BSSMAP: Base Station Subsystem
Application Part Management Application Part
1.1.2 Physical Layer on the A Interface
The physical layer on the A interface is a 2 Mbit/s 75-ohm coaxial cable or 120-ohm twisted
pair.
The features of the physical layer on the A interface are as follows:
l The 2 Mbit/s transmission rate complies with the G.703.
l The frame structure, synchronization, and timing comply with the G.705.
l The fault management complies with the G.732.
l CRC4 complies with the G.704.
1.1.3 MTP Layer on the A Interface
The MTP layer on the A interface provides reliable signaling message transfer in the signaling
network. In case of system failure and signaling network failure, it takes measures to avoid or
reduce the message loss, repetition, and out of sequence.
The MTP protocols are defined in ITU-T Q.701–Q.710 recommendations. The MTP layer
comprises three sublayers, the signaling data link sublayer, signaling link sublayer, and signaling
network sublayer.
Signaling Data Link Sublayer
The signaling data link function layer (L1) defines the physical, electrical, and functional features
of signal data. It specifies the way to connect with data links. A signaling data link transmits
signaling in both directions. It comprises two data paths of 64 kbit/s and of opposite directions.
Generally, a signaling data link occupies timeslot 16 of a trunk. The specific timeslot is
Issue 01 (2007-09-05) Huawei Technologies Proprietary 1-3
4. HUAWEI BSC6000 Base Station Subsystem
1 BSS Signaling Fundamental Signaling Analysis Guide
determined through the negotiation between the BSC and the MSC. The timeslot can be used to
establish a semi-permanent connection.
A signaling data link serves as an information bearer of SS7. One of the important features of
the signaling data link is that the information transferred on the link is transparent, that is, the
data transferred on the link cannot be changed. Therefore, equipment such as echo canceler,
digital attenuator, and A/u rate converter, cannot be connected to this link.
Signaling Link Function Layer
Signaling link function layer (L2) specifies the functions and procedures for sending signaling
to data links. Together with L1, it provides reliable signaling message transfer between two
directly connected signaling points.
Due to long-distance transmissions, a certain rate of bit errors may be caused on the data link
between adjacent signaling points. However, no error is allowed in CCS7 signaling message
codes. L2 guarantees error-free transmission of message codes when there are bit errors on L1.
L2 performs signaling unit delimitation, signaling unit alignment, error detection, error
correction, initial alignment, processor fault detection, flow control, and signaling link error rate
monitoring.
Signaling Network Function Layer
By controlling the route and performance of the signaling network, signaling network function
layer (L3) guarantees reliable transmission of signaling information to the user part, no matter
whether the signaling network is functional or not. The signaling network is functionally
classified into the signaling message processing part and the signaling network management
part.
l Signaling message processing part
The signaling message processing part sends signaling messages from the user part of a
signaling point to the target signaling links or user parts. The user part in the BSS refers to
the SCCP only. The signaling message processing part comprises three smaller parts:
message routing (MRT), message discrimination (MDC), and message distribution (MDT),
as shown in Figure 1-2.
1-4 Huawei Technologies Proprietary Issue 01 (2007-09-05)
5. HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide 1 BSS Signaling Fundamental
Figure 1-2 L3 signaling message processing procedure
MTP user part
Message
distribution
Messages to the local
signaling point
Messages to the other
signaling points
Message
Message routing
discrimination
MTP2 signaling link
– Message Routing (MRT)
The MRT selects message routes. By using the information contained in the route mark,
destination signaling point code (DPC), and signaling link selection code (SLS), the
MRT selects a signaling link that transfers the signaling messages to a destination
signaling point.
– Message Discrimination (MDC)
The MDC receives the messages from L2 to ascertain whether the destination of the
messages is the local signaling point. If the destination is the local signaling point, the
MDC sends the messages to the MDT. If the destination is not the local signaling point,
the MDC sends the messages to the MRT.
– Message Distribution (MDT)
The MDT allocates the messages from the MDC to the user part, the signaling network
management part, and the test & maintenance part.
l Signaling network management part
The signaling network management part reconstructs the signaling network, and keeps and
recovers the normal transmission of signaling units when the signaling network fails. It
consists of three smaller parts: signaling traffic management (STM), signaling link
management (SLM), and signaling route management (SRM).
– Signaling Traffic Management (STM)
The STM part transmits the signaling data from one link or route to another or to multiple
available links or routes when the signaling network fails. It also temporarily reduces
signaling traffic in case of congestion at a signaling point.
– Signaling Link Management (SLM)
The SLM part recovers, enables, or disconnects the signaling links in the signaling
network. It ensures the provisioning of certain pre-determined link groups. The
connections between signaling data links and signaling terminals are normally
established through man-machine commands. The operations in the signaling system
Issue 01 (2007-09-05) Huawei Technologies Proprietary 1-5
6. HUAWEI BSC6000 Base Station Subsystem
1 BSS Signaling Fundamental Signaling Analysis Guide
cannot automatically change the previous connection relations. The SLM comprises
link test, link prohibition and unprohibion, link switchover and switchback, as well as
link activation and deactivation.
– Signaling Route Management (SRM)
The SRM ensures reliable exchange of signaling route availability information between
signaling points so that signaling routes can be blocked or unblocked. It comprises
prohibited transfer, allowed transfer, controlled transfer, and restricted transfer, as well
as signaling route group test and signaling route group congestion test.
1.1.4 SCCP Layer on the A Interface
The network layer services provided by the SCCP are classified into connectionless service and
connection-oriented service.
The SCCP, with the help of MTP L3, provides complete network layer functions and reliable
services for information exchange in any form.
The network layer services provided by the SCCP are classified into connectionless service and
connection-oriented service. The connectionless service indicates that an MS does not establish
a signaling or connection in advance, but uses the routing function of the SCCP and of the MTP
to directly transmit data in the signaling network. The connectionless service is applicable to the
transmission of a small quantity of data. The connection-oriented service indicates that an MS
establishes a signaling connection in advance and directly transfers data on the signaling
connection, instead of using the route selection function of the SCCP. The connection-oriented
service is applicable to the transmission of a large quantity of data, and effectively shortens the
delay of batch data transmission.
The SCCP also performs routing and network management functions. It performs addressing
based on the address information such as the DPC, subsystem number (SSN), and global title
(GT). The DPC is the destination singling point code used by the MTP. The SSN is the subsystem
number. The DPC and the SSN are used to identify different SCCP users, such as the ISUP users,
MAP users, TCAP users, and BSSAP users in the same node. They help to compensate the
insufficiency of MTP users and to enlarge the addressing scope. The BSS does not use the GT
addressing mode, which is not described here.
The SCCP performs signaling point state and subsystem state management, active/standby
subsystem switchover, status information broadcast, and subsystem state test. The SCCP
management (SCMG) maintains the network functions by reselecting a route or adjusting the
traffic volume in case of network failure or congestion.
The SCCP protocols are defined in ITU-T Q.711–Q.716 recommendations.
1.1.5 BSSAP Layer on the A Interface
The BSSAP protocol, which serves as the A interface specification, describes two types of
messages, BSSMAP messages and DTAP messages.
Overview of the BSSAP Protocol
The BSSAP protocol, which serves as the A interface specification, describes two types of
messages, BSSMAP messages and DTAP messages. For DTAP messages, the A interface is
merely equivalent to a transport channel. On the BSS side, DTAP messages are directly
transmitted to radio channels. On the NSS side, DTAP messages are transmitted to the specific
functional processing units.
1-6 Huawei Technologies Proprietary Issue 01 (2007-09-05)
7. HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide 1 BSS Signaling Fundamental
The BSSAP protocol is defined in GSM Rec. 08.08 and 04.08.
Typical Messages
The BSSAP protocol, which serves as the A interface specification, describes two types of
messages, BSSMAP messages and DTAP messages.
l DTAP messages
Based on the functional units that process DTAP messages on the NSS side, the DTAP
messages are classified into Mobile Management (MM) messages and Call Control (CC)
messages.
– The MM messages include messages related to authentication, Configuration
Management (CM) service request, identification request, IMSI detach, location update,
MM state, and TMSI reallocation.
– The CC messages include messages related to alerting, call proceeding, connection,
establishment, modification, release, disconnection, notification, state query, and
DTMF startup.
l BSSMAP messages
The BSSMAP messages are classified into connectionless messages and connection-
oriented messages.
– Connectionless messages
The connectionless messages include block, unblock, handover, resource, reset, and
paging messages.
The block and unblock messages consist of block, block acknowledge, unblock, and
unblock acknowledge messages.
The group block and unblock messages consist of group block, block acknowledge,
unblock, and unblock acknowledge messages. The handover messages include
handover candidate request messages and handover candidate response messages.
The resource messages include resource request messages and resource indication
messages. The reset messages include reset and reset acknowledge messages.
– Connection-oriented messages
The connection-oriented messages include messages related to assignment, handover,
clear, and ciphering.
The Assignment messages include the assignment request message, assignment
complete message, and assignment failure message.
The handover messages include the Handover Request, Handover Request
Ackowledge, Handover Command, Handover Complete, and Handover Failure
messages.
The clear messages include the Clear Request and Clear Complete messages.
The ciphering messages include the Cipher Mode Command and the Cipher Mode
Complete messages.
BSSAP Protocol Functionality
The BSSAP protocol functions in connection-oriented mode or connectionless mode. When an
MS needs to exchange service-related messages with the NSS on radio channels and there is no
MS-related SCCP connection between the BSS and the NSS, a new connection must be
established.
Issue 01 (2007-09-05) Huawei Technologies Proprietary 1-7
8. HUAWEI BSC6000 Base Station Subsystem
1 BSS Signaling Fundamental Signaling Analysis Guide
l When an MS sends an Access Request message on the RACH, the BSS assigns a dedicated
channel (SDCCH or TCH) to the MS. After an L2 connection is established on the assigned
SDCCH or FACCH, the BSS starts a connection establishment.
l When the MSC decides to perform an external handover (the target BSS might be the
serving BSS), it must reserve a new DCCH or TCH from the target BSS. Then the MSC
starts a connection establishment.
Using the connection and connectionless messages, the BSSAP protocol implements the
functionalality described in Table 1-1.
Table 1-1 BSSAP protocol functionality
Number Function Description
1 Assignment Assignment ensures that dedicated radio
resources are properly allocated or re-
allocated to an MS. The BSS automatically
processes the initial random access and
immediate assignment of an MS to a DCCH,
without the control of the MSC.
2 Block / Unblock Circuit During an assignment procedure, the MSC
needs to select available terrestrial circuits.
If the BSS considers that some terrestrial
circuits become unavailable or available, it
notifies the MSC by initiating a Block/
Unblock procedure.
3 Resource Indication Resource indication serves to notify the
MSC of the following:
l Number of radio resources that can be
used as TCHs in the BSS
l Number of available and allocated radio
resources
l The MSC does not easily obtain the
previous information directly from the
MSC-controlled services. The MSC must
take the information into consideration
when the it decides to perform an external
handover.
4 Reset The purpose of reset is to initialize the BSS
or the MSC. For example, if the BSS is
faulty and loses all the reference messages
about processing, it sends a Reset message
to the MSC. Upon receiving the Reset
message, the MSC releases the affected
calls, deletes the affected reference
messages, and sets all the circuits related to
the BSS to idle.
If the MSC or BSS is only partially faulty,
the affected parts can be cleared through the
Clear procedure.
1-8 Huawei Technologies Proprietary Issue 01 (2007-09-05)
9. HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide 1 BSS Signaling Fundamental
Number Function Description
5 Handover Required The BSS may send the MSC a Handover
Required message, requesting the MSC to
hand over an MS that are allocated dedicated
resources. The handover reasons as are as
follows:
The BSS detects a radio cause for a
handover.
The MSC starts a handover candidate
enquiry procedure, and the MS is waiting for
a handover.
Due to congestion, the serving cell must be
changed during call establishment, for
example, during directed retry.
The Handover Required message is resent at
a certain interval till one of the following
situations occurs:
l A Handover Command message is
received from the MSC.
l A Reset message is received.
l All the communications with MSs are
disrupted and the processing is stopped.
l The processing is complete, for example,
the call is cleared.
6 Handover Resource Through handover resource allocation, the
Allocation MSC requests resources from the target BSS
based on the handover request, and the target
BSS reserves resources and waits for an MS
to access the reserved resources (channel).
7 Handover Procedure Handover procedure is a procedure in which
the MSC instructs an MS to access the radio
resources in a target cell. When handover is
performed, the original dedicated radio
resources and terrestrial resources are
maintained until the MSC sends a Clear
Command message or until the resources are
reset.
Issue 01 (2007-09-05) Huawei Technologies Proprietary 1-9
10. HUAWEI BSC6000 Base Station Subsystem
1 BSS Signaling Fundamental Signaling Analysis Guide
Number Function Description
8 Radio and Terresterial When a processing is complete, the MSC
Resource Release sends the BSS a Clear Command message,
requesting the BSS to release radio
resources. Upon receiving the Clear
Command message, the BSS starts a clear
procedure on the Um interface, sets the
configured terrestrial circuits to idle, and
responds the MSC with a Clear Complete
message. Upon receiving the Clear
Complete message, the MSC releases the
terrestrial resources.
If the BSS needs to release resources, it
sends the MSC a Clear Request message.
Then the MSC initiates a release procedure
to release the specific terrestrial and radio
resources.
9 Paging The paging to an MS is transmitted through
the SCCP connectionless service over the
BSSMAP. When the BSS receives a Paging
Response message on the Um interface, it
establishes an SCCP connection to the MSC.
The paging response message, which is
carried in the Complete L3 Information, is
transmitted to the MSC through this SCCP
connection.
10 Flow Control Flow control ensures stable working state of
an entity by preventing the entity from
receiving too much traffic. Flow control on
the A interface is performed through traffic
control at the traffic source. It comprises five
levels. It is performed based on subscriber
classes.
11 Classmark Update Classmark update serves to notify a
receiving entity of the classmark messages
from an MS. Generally, the BSS notifies the
MSC upon receiving the classmark
messages from an MS. When a handover is
complete, the MSC sends the new BSS the
classmark messages from the relevant MS
on the A interface.
12 Cipher Mode Control The cipher mode control procedure allows
the MSC to send the Cipher Mode Control
message to the BSS and to start the
subscriber equipment and the signaling
cipher equipment using a correct ciphering
key (Kc).
1-10 Huawei Technologies Proprietary Issue 01 (2007-09-05)
11. HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide 1 BSS Signaling Fundamental
Number Function Description
13 Queue Indication The queue indication procedure serves to
notify the MSC that the BSS will delay the
allocation of some radio resources. The
procedure takes effect only when the
queuing function is used for traffic channel
assignment and traffic channel handover in
the BSS.
14 Load Indication Load indication serves to notify all neighbor
BSSs of the traffic state of a cell so that the
handover services in an MSC can be
controlled as a whole. In a certain period, the
neighbor BSSs take the traffic states of
neighbor cells into account during a
handover.
1.2 Abis Interface
The Abis interface lies between the BTS and the BSC. It complies with GSM Rec.08.5X series.
The Abis interface is an internal interface of the BSS. The interworking between the BSC and
BTS equipment from different manufactures is not available. The terrestrial traffic channels on
the Abis interface map the radio traffic channels on the Um interface.
1.2.1 Abis Interface Protocol Model
This topic describes the Abis interface protocol model.
1.2.2 Abis Interface Structure
The Abis interface supports three types of internal BTS configurations.
1.2.3 Physical Layer on the Abis Interface
The physical layer on the Abis interface are 2 Mbit/s PCM links. It provides thirty-two 64 kbit/
s channels.
1.2.4 LAPD Layer on the Abis Interface
This topic describes the functions of the LAPD layer on the Abis interface.
1.2.5 L3 Traffic Management Messages on the Abis Interface
L3 traffic management messages on the Abis interface enables the MS to exchange information
with the BSS or NSS on the Um interface and to perform some radio resource management
functions under the control of the BSC.
1.2.6 L3 OM Messages on the Abis Interface
This topic describes the L3 OM messages on the Abis interface.
1.2.1 Abis Interface Protocol Model
This topic describes the Abis interface protocol model.
Figure 1-3 shows the Abis interface protocol model.
Issue 01 (2007-09-05) Huawei Technologies Proprietary 1-11
12. HUAWEI BSC6000 Base Station Subsystem
1 BSS Signaling Fundamental Signaling Analysis Guide
Figure 1-3 Abis interface protocol model
BTS BSC
RR BSSAP
BTSM
RR BTSM SCCP
LAPDm LAPD LAPD
Sign. MTP
Layer 1 Layer1
Layer 1
Abis interface
BTSM: BTS Management BSSAP: Base Station Subsystem Application Part
SCCP: Signaling Connection Control Part LAPD: Link Access Procedure on the D Channel
LAPD: Link Access Procedure on the Dm Channel RR: Radio Resource Management
MTP: Message Transfer Part
The following describes the Abis interface protocol model:
l Layer 1 on the Abis interface is a bottom-layer driver based on the hardware. It transfers
data to the physical link.
l The layer 2 protocol on the Abis interface is based on the LAPD. The LAPD addresses a
Transceiver (TRX) or Base Control Function (BCF) through the Terminal Equipment
Identifier (TEI). The LAPD uses different logical links for message transmissions. Radio
signaling links (RSL) transmit service management messages. Operation and maintenance
links (OML) transmit network management messages. Layer 2 management links (L2ML)
transmit L2 management messages.
l RR messages are mapped onto the BSSAP by the BSC. Most RR messages are transparently
transmitted by the BTS, except for some messages that must be interpreted and executed.
For example, ciphering, random access, paging, and assignment messages are processed
by the BTS Management (BTSM) entities in the BSC and in the BTS.
l Neither the BSC nor the BTS interprets Connection Management (CM) messages and
Mobility Management (MM) messages. These messages are transmitted on the A interface
by the Direct Transfer Application Part (DTAP). On the Abis interface, DTAP messages
are transmitted as transparent messages.
1.2.2 Abis Interface Structure
The Abis interface supports three types of internal BTS configurations.
Figure 1-4 shows the Abis interface structure. The three types BTS configurations on the Abis
interface are as follows:
l A single TRX
l Multiple TRXs connected with the BSC through one physical link
l Multiple TRXs connected with the BSC through different physical links
1-12 Huawei Technologies Proprietary Issue 01 (2007-09-05)
13. HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide 1 BSS Signaling Fundamental
Figure 1-4 Abis interface structure
BSS
Abis
TRX
BTS1
BCF
TRX
TRX BTS2
A Abis
MSC TRX
BSC
BCF
Abis
TRX
TRX BTS3
TRX
TRX
BCF
l Transceiver (TRX) is a functional entity defined in the Public Land Mobile Network
(PLMN). It supports eight physical channels of one TDMA frame.
l The Base Control Function (BCF) is a functional entity that performs common control
functions including BTS initialization, software loading, channel configuration, and
operation and maintenance.
The following two types of channels are on the Abis interface:
l Traffic channels of 8 kbit/s, 16 kbit/s, and 64 kbit/s, which carry speech or data from radio
channels
l Signaling channels of 16 kbit/s, 32 kbit/s, and 64 kbit/s, which carry signaling between the
BSC and an MS, and between the BSC and the BTS
A TEI is assigned to obtain the unique address of a TRX. Each BCF has a unique TEI. Three
different logical links are defined with a TEI, as shown in Figure 1-5.
l RSL: used to support traffic management procedures, one for each TRX
l OML: used to support network management procedures, one for each BCF
l L2ML: used to transmit L2 management messages
Issue 01 (2007-09-05) Huawei Technologies Proprietary 1-13
14. HUAWEI BSC6000 Base Station Subsystem
1 BSS Signaling Fundamental Signaling Analysis Guide
Figure 1-5 Logical links on the Abis interface
BSC BTS
RSL SAP1=0
TRX
OML SAP1=62
TEI1
L2ML SAP1=63
BCF
RSL SAP1=0
LAYER 2
OML SAP1=62 TRX
L2ML SAP1=63 TEI2
TEI
BCF
RSL SAP1=0
OML SAP1=62
TRX
MANA L2ML SAP1=63 TEI3
GEMENT
BCF
OML SAP1=62
L2ML SAP1=63 BCF TEI4
BCF
1.2.3 Physical Layer on the Abis Interface
The physical layer on the Abis interface are 2 Mbit/s PCM links. It provides thirty-two 64 kbit/
s channels.
The electrical parameters of the physical layer conform to the ITU-T G.703 recommendations.
The BSS is the connection point between radio channels and terrestrial channels. The coding
schemes and rates of the two types of channels are different. The coding rate of the radio channels
in the BSS is 16 kbit/s, and the rate of the channels on the Abis interface is 64 kbit/s. To save
the transmission cost, different multiplexing modes, for example, 10:1, 12:1, and 15:1, are used
on the Abis interface.
1.2.4 LAPD Layer on the Abis Interface
This topic describes the functions of the LAPD layer on the Abis interface.
Overview
The data link layer (L2) on the Abis interface uses the LAPD protocol. It receives data from the
physical layer (L1) and provides connection-oriented or connectionless services for L3. The
Service Access Point (SAP) of L2 is the connection point for providing services for L3. It is
identified by an SAPI. A data link connection endpoint is identified by a data link connection
endpoint identifier or a data link connection identifier (DLCI) from the perspective of L2 or L2,
respectively.
1-14 Huawei Technologies Proprietary Issue 01 (2007-09-05)
15. HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide 1 BSS Signaling Fundamental
For the information exchange between two or more L3 entities, data links must be established
between L3 entities.
The co-operation between L2 entities is controlled by the protocol of the peer layer. The message
units at L2 are transmitted between L2 entities through L1. Inter-layer service requests are
processed through service primitives.
Functions
The LAPD reliably transfers end-to-end information between L3 entities through the D channel.
Specifically, the LAPD supports:
l Multiple terminal devices between MSs and physical interfaces
l Multiple L3 entities
The functions of the LAPD layer on the Abis interface are as follows:
l Providing one or multiple data links on the D channel
l Delimiting, locating, and transparently transmitting frames so that a string of bits
transmitted in the form of frames on the D channel can be identified
l Controlling and keeping the sequence of frames
l Checking for transmission errors, format errors, and operation errors on data link
connections
l Making recoveries based on the detected transmission errors, format errors, and operation
errors
l Notifying the management layer entities of unrecoverable errors
l Performing flow control
The LAPD layer on the Abis interface provides the means for information transfer between
multiple combinations of data link connection points. The information may be transferred
through point-to-point data link connections or broadcast data link connections.
1.2.5 L3 Traffic Management Messages on the Abis Interface
L3 traffic management messages on the Abis interface enables the MS to exchange information
with the BSS or NSS on the Um interface and to perform some radio resource management
functions under the control of the BSC.
In terms of processing, traffic management messages are classified into transparent and non-
transparent messages.
l The transparent messages refer to the messages directly forwarded without interpretation
or processing by the BTS.
l The non-transparent messages refer to the messages that are transmitted between the BSC
and the BTS and that must be processed and structured by the BTS.
In terms of functions, traffic management messages are classified into the following:
l Radio link layer management messages that are used to manage the data link layer on radio
channels
l Dedicated channel management messages that used to manage dedicated channels such as
the SDCCH and TCH
l Common control channel management messages that are used to manage common control
channels
Issue 01 (2007-09-05) Huawei Technologies Proprietary 1-15
16. HUAWEI BSC6000 Base Station Subsystem
1 BSS Signaling Fundamental Signaling Analysis Guide
l TRX management messages that are used to manage TRXs
NOTE
The transparency and group of traffic management messages are determined by the message discriminator
at the header of the messages.
l Radio link management procedures
Radio link management procedures consist of the following:
– Link establishment indication procedure: used by the BTS to indicate to the BSC that
an MS-originated multi-frame-mode link establishment is successful. Upon receiving
the indication from the BTS, the BSC establishes an SCCP link to the MSC.
– Link establishment request procedure: used by the BSC to request the establishment of
a multi-frame link on a radio channel.
– Link release indication procedure: used by the BTS to indicate to the BSC that an MS-
initiated radio link release is complete.
– Link release request procedure: used by the BSC to request the release of a radio link.
– Transmission of transparent L3 messages on the Um interface in acknowledged mode:
used by the BSC to request the transmission of transparent L3 messages to an MS on
the Um interface in acknowledged mode
– Reception of transparent L3 messages on the Um interface in acknowledged mode: used
by the BTS to notify the BSC that transparent L3 messages are received on the Um
interface in acknowledged mode
– Transmission of transparent RIL3 messages on the Um interface in unacknowledged
mode: used by the BSC to request the transmission of transparent L3 messages to an
MS on the Um interface in unacknowledged mode
– Reception of transparent RIL3 messages on the Um interface in unacknowledged mode:
used by the BTS to notify the BSC that transparent L3 messages are received on the
Um interface in unacknowledged mode
– Link error indication procedure: used by the BTS to notify the BSC in case of errors at
the radio link layer
l Dedicated channel management procedures
The dedicated channel management procedures consist of the following:
– Channel activation procedure: used by the BSC to request the BTS to activate a
dedicated channel for an MS. Then the BSC assigns the activated channel to the MS
through an Immediate Assignment, Assignment Command, Additional Assignment, or
Handover Command message.
– Channel mode modification procedure: used by the BSC to request the BTS to change
the mode of an activated channel.
– Handover detection procedure: used between the target BTS and the target BSC to detect
the access of an MS being handed over.
– Ciphering mode command procedure: used to start the ciphering procedure defined in
GSM Rec. 04.08.
– Measurement report procedure: consists of the mandatory basic measurement report
procedure and optional measurement report preprocessing procedure. The BTS reports
all the parameters related to handover decisions to the BSC through this procedure.
– SACCH deactivation procedure: used by the BSC to deactivate the SACCH related to
a TRX according to the Channel Release procedure defined in GSM Rec. 04.08.
1-16 Huawei Technologies Proprietary Issue 01 (2007-09-05)
17. HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide 1 BSS Signaling Fundamental
– Radio channel release procedure: used by the BSC to release a radio channel that is no
longer needed.
– MS power control procedure: used by the BSS to control the transmit power of an MS
for which a channel is already activated. The power control decision must be performed
in the BSC. It can also be performed in the BTS.
– BTS transmit power control procedure: used by the BSS to control the transmit power
of a TRX with an activated channel. The BTS transmit power control decision must be
performed in the BSC. It can also be performed in the BTS.
– Connection failure procedure: used by the BTS to notify the BSC that an activated
dedicated channel is unavailable.
– Physical context request procedure: used by the BSC to obtain the information about
the physical context of a radio channel prior to a channel change. It is an optional
procedure.
– SACCH information modification procedure: used by the BSC to request the BTS to
change the filling system information on a specific SACCH.
l Common channel management procedures
The common channel management procedures consist of the following:
– MS-initiated channel request procedure: triggered when a TRX detects a Channel
Request message from an MS
– Paging procedure: used to page an MS on a specific paging sub-channel This procedure
is used in an MS terminating call establishment procedure. It is initiated by the MSC
through the BSC. Based on the IMSI of the called MS, the BSC determines the paging
group to be used. Then it sends to the BTS the paging group number together with the
identity of the MS.
– Immediate assignment procedure: used by the BSC to immediately assign a dedicated
channel to an MS when the MS accesses the BTS.
– Delete indication procedure: used by the BTS to notify the BSC that an Immediate
Assign Command message is deleted due to AGCH overload.
– CCCH load indication procedure: used by the BTS to notify the BSC of the load on a
specified CCCH if the load exceeds the preset threshold on the OMC. The indication
period is also set on the OMC.
– Broadcast information modification procedure: used by the BSC to notify the BTS of
the new system information to be broadcast on the BCCH.
– Short message service cell broadcast procedure: used by the BSC to request short
message service cell broadcast messages from the BTS.
l TRX management procedures
The TRX management procedures consist of the following:
– SACCH filling information modify procedure: used by the BSC to notify the BTS of
the new system information to be used as filling information on all downlink SACCHs
– Radio resource indication procedure: used by the BTS to notify the BSC of the
interference levels on the idle channels of a TRX
– Flow control procedure: used by the Frame Unit Controller (FUC) in a TRX to notify
the BSC of the TRX overload due to CCCH overload, AGCH overload, or TRX
processor overload
– Error reporting procedure: used by the BTS to notify the BSC of the detected downlink
message errors, which cannot be reported through any other procedure
Issue 01 (2007-09-05) Huawei Technologies Proprietary 1-17
18. HUAWEI BSC6000 Base Station Subsystem
1 BSS Signaling Fundamental Signaling Analysis Guide
1.2.6 L3 OM Messages on the Abis Interface
This topic describes the L3 OM messages on the Abis interface.
OM Information Model
The OM information model consists of the following:
l Management objects
The management objects are site, cell, carrier (TRX), and channel. Figure 1-6 shows the
management objects.
Figure 1-6 Management objects
SITE
CELL 0 CELL 1 … CELL n
TRX0 TRX1 … TRXm
BTS TRX
Chann Chann Chanel
…
el 0 el 1 7
l Addressing of management objects
Network management messages are addressed through the classes and instances of the
management objects. Each object instance in the BTS has a complete L2 connection
description. The first established connection is assigned a semi-permanent or permanent
default TEI. The subsequent connections are assigned the TEIs provided during the
establishment of TEI procedures. Object instances can also use L3 addresses. The mixed
use of L2 addressing and L3 addressing enables one site to have one or multiple physical
links.
l Management object state
A management object can be in three states, the administrative state, operational state, and
availability state. For details, see Table 1-2, Table 1-3, and Table 1-4. The available state
further describes the operational state, and only the BSC controls the administrative state.
Table 1-2 Administrative State
Status Description
Locked The BSC has disconnected all the calls passing this
management object, and no new services can be
connected to this object.
1-18 Huawei Technologies Proprietary Issue 01 (2007-09-05)
19. HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide 1 BSS Signaling Fundamental
Status Description
Shut Down No new services can be connected to this management
object, and ongoing calls are maintained.
Unlocked New services can be connected to this management
object.
Table 1-3 Operational State
Status Description
Disabled Resources are totally inoperable and can no longer
provide services for MSs.
Enabled Resources are partially or fully operable.
Table 1-4 Available State
Status Description
In Test The resource is undergoing a test procedure. The
operational state is disabled.
Failed The resource has an internal fault that prevents it from
operating. The operational state is disabled.
Power Off The resource requires power and is not powered on. The
operational state is disabled.
Off Line The resource requires automatic or manual operations to
make it available for use. The operational state is
disabled.
Dependency The resource cannot operate because some other
resources on which it depends are unavailable. The
operational state is disabled.
Degraded The service is degraded due to some reasons such as
speed or capacity. The operational state is enabled.
Not Installed The hardware or software of the management object is
not installed. The operational state is disabled.
Basic Procedures
All procedures are based on formatted OM messages. Most formatted OM messages initiated
by the BSC or the BTS require the peer L3 to respond with formatted OM messages. This pair
of formatted OM messages or a formatted OM message that does not require a response is called
a basic procedure.
All formatted OM messages are sent on L2 in the form of I frames. A group of messages, also
called structured procedures, are based on the combination of some basic procedures.
For a specific object instance, if a certain basic procedure is not complete, the system does not
start the subsequent basic procedures. When there is no response to a formatted OM message
Issue 01 (2007-09-05) Huawei Technologies Proprietary 1-19
20. HUAWEI BSC6000 Base Station Subsystem
1 BSS Signaling Fundamental Signaling Analysis Guide
from the peer L3 upon L3 timer expiry, the basic procedure is considered as not "completed."
When there is no response (ACK or NACK) in the previous basic procedure upon L3 timeout,
no subsequent basic procedure is sent to this object instance. The default value for L3 timeout
is 10 seconds. If part of an original message is not understood or supported, the entire message
is discarded. An ACK message from an object instance indicates an affirm response. It is used
to notify the sender that the command is executed or will be executed. An NACK message from
an object instance indicates a disaffirm response. It is used to notify the sender of the unsuccessful
execution of the command and of the failure cause.
The basic procedures are classified into the following:
l Software loading management procedure
l Abis interface management procedure
l Transmission management procedure
l Abis interface management procedure
l Test management procedure
l State management and event report procedure
l Equipment state management procedure
l Other procedures
1.3 Um Interface
The Um interface lies between an MS and the BTS. It is used for the interworking between the
MS and the fixed part of the GSM system. The links on the Um interface are radio links. The
Um interface transmits the information about radio resource management, mobility
management, and connection management.
1.3.1 Physical Layer on the Um Interface
The physical layer (L1) is the bottom layer on the Um interface. It defines the radio access
capabilities of the GSM and provides basic radio channels for information transfer at higher
layers.
1.3.2 LAPD Layer on the Um Interface
The data link layer (L2) is the middle layer on the Um interface. It uses the LAPDm protocol.
It defines various data transmission structures for controlling data transmission.
1.3.3 L3 Entity on the Um Interface
The L3 entity consists of many functional program blocks. These program blocks transfer
message units between all L3 entities and between L3 and its adjacent layers.
1.3.1 Physical Layer on the Um Interface
The physical layer (L1) is the bottom layer on the Um interface. It defines the radio access
capabilities of the GSM and provides basic radio channels for information transfer at higher
layers.
L1 is the bottom layer on the Um interface. It provides physical links for transmitting bit streams.
It also provides higher layers with various logical channels, including traffic channels and
signaling channels. Each logical channel has its own logical access point.
Figure 1-7 shows the interfaces between L1 and the data link layer, the radio resource
management sublayer (RR) of L3, and other functional units.
1-20 Huawei Technologies Proprietary Issue 01 (2007-09-05)
21. HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide 1 BSS Signaling Fundamental
Figure 1-7 Interfaces of L1 on the Um interface
Radio resource
management (3)
Data link layer Other functional units
MPH primitive PH primitive TCH
Physical layer
L1 provides the following services:
l Access capability
L1 provides a series of limited logical channels for transmission service. Logical channels
are multiplexed on physical channels. Each TRX has eight physical channels. Through data
configuration, logical channels are mapped to physical channels.
l Bit error detection
L1 provides error protection transmission, including error detection and correction.
l Cyphering
Based on a selected ciphering algorithm, the BSS ciphers the bit sequence.
1.3.2 LAPD Layer on the Um Interface
The data link layer (L2) is the middle layer on the Um interface. It uses the LAPDm protocol.
It defines various data transmission structures for controlling data transmission.
L2 provides reliable dedicated data links between an MS and the BTS. It uses the LAPDm
protocol that evolves from the LAPD protocol. The SAP of L2 is the connection point for
providing services for L3. An SAP is identified by an SAPI. Each SAP is associated with one
or multiple DLCEPs. Currently, two SAPI values, 0 (main signaling) and 3 (short messages),
are defined in the LAPDm protocol.
Functions
LAPDm transfers information between L3 entities through the Dm channel on the Um interface.
LAPDm supports multiple L3 entities, L1 entities, and signaling on BCCH, PCH, AGCH, and
DCCH.
NOTE
The Dm channel is a generic term for all the signaling channels on the Um interface in the GSM system.
For example, the Dm channel can be PCH or BCCH.
LAPDm performs the following functions:
l Providing one or more data link connections (DLCs) on the Dm channel. Each DLC is
identified by a data link connection identifier (DLCI).
l Allowing frame type identification
l Allowing L3 message units to be transparently transmitted between L3 entities
l Performing sequence control to maintain the order of the frames transmitted through a DLC
l Detecting format errors and operation errors on data links
l Performing flow control
Issue 01 (2007-09-05) Huawei Technologies Proprietary 1-21
22. HUAWEI BSC6000 Base Station Subsystem
1 BSS Signaling Fundamental Signaling Analysis Guide
l Establishing a contention resolution on a data link after an access request is detected on the
RACH
Operation Type
L2 transmits L3 information in unacknowledged and acknowledged modes. One Dm channel
can be in both modes at the same time.
l Unacknowledged mode
In unacknowledged mode, L3 information is transferred in Unnumbered Information (UI)
frames. L2 does not acknowledge the UI frames or perform flow control or error correction.
The unacknowledged mode is applicable to different types of control channels except the
RACH.
l Acknowledged mode
In acknowledged mode, L3 information is transferred in numbered Information (I) frames.
L2 acknowledges the I frames. It performs error correction by resending unacknowledged
frames. When L2 fails to correct errors, it informs the specific L3 entity of the correction
failure. Flow control procedures are also defined. The acknowledged mode is applicable
to the DCCH.
Information Transfer Mode
Information is transferred in different modes on different channels.
l Information transfer on the BCCH: The BCCH transfers the broadcast messages from the
BTS to the MS. Only the acknowledged mode can be used on the BCCH.
l Information transfer on the PCH+AGCH: These channels transfer messages from the BTS
to the MS. Only the unacknowledged mode is applicable to the PCH+AGCH.
l Information transfer on the DCCH: Either the acknowledged or the unacknowledged mode
can be used. The transfer mode is determined by L3.
Data Link Release
L2 release is initiated by L3. The data links in frame mode are released in the following modes:
l Normal release
The BTS and the MS exchange DISC frames and UA frames or DM frames.
l Local release
No frames are exchanged. Generally used in abnormal cases.
1.3.3 L3 Entity on the Um Interface
The L3 entity consists of many functional program blocks. These program blocks transfer
message units between all L3 entities and between L3 and its adjacent layers.
Overview
The L3 entity consists of many functional program blocks. These program blocks transfer
message units between all L3 entities and between L3 and its adjacent layers.
L3 performs the following functions:
l Establishing, operating, and releasing dedicated radio channels (RR)
l Performing location update, authentication, and TMSI reallocation (MM)
1-22 Huawei Technologies Proprietary Issue 01 (2007-09-05)
23. HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide 1 BSS Signaling Fundamental
l Establishing, maintaining, and terminating circuit-switched calls (CC)
l Supporting supplementary services (SS)
l Supporting short messages service (SMS)
L3 uses L3 signaling protocols between the MS and the network. Here the functions of different
entities in the BSS are not taken into consideration. L3 and its supported lower layers, therefore,
provide the Mobile Network Signaling (MNS) service to the upper layers.
The service interfaces between L3 and higher layers and the interactions between the adjacent
sublayers in L3 are described in primitives and parameters. The three sublayers in L3 perform
information exchange between peer entities.
Structure and Functions
L3 consists of three sublayers. The CM sub-layer (the highest sub-layer) consists of three
functional entities: Call Control (CC), Short Message Service (SMS), and Supplementary
Service (SS). In total, L3 on the Um interface has five functional entities. The five functional
entities perform the following functions:
l Radio Resource Management (RR)
Establishing, maintaining, and releasing physical channels and logical channels, as well as
performing cross-cell connection upon the request from the CM sublayer
l Mobility Management (MM)
Performing MS-specific functions and notifying the network when an MS is activated and
deactivated, or when the location area of an MS changes. It is also responsible for the
security of activated radio channels.
l Call Control (CC)
Performing all necessary functions to establish or release CS connections
l Supplementary Service (SS)
Performing all necessary functions to support GSM supplementary services
l Short Messages Service (SMS)
Performing all necessary functions to support point-to-point GSM short message services
In addition to the previous functions, L3 performs functions related to the transmission of
messages, for example, multiplexing and splitting. These functions are defined in the Radio
Resource Management and Mobility Management. They route messages according to the
protocol discriminator (PD) and transaction identifier (TI), which are part of the message header.
The routing function of the MM enables the MM to route the messages of the CM entities and
the messages of the MM entity to the RR service access point (RR-SAP), and multiplexes the
messages in case of concurrent transactions. The routing function of the RR distributes the to-
be-sent messages according to their PD and the actual channel configuration.
The messages provided at different service access points of layer 2 are split by the RR routing
function according to the PD. If a message belongs to the RR sublayer, this message is transmitted
to the RR entity based on the TI. The other messages are sent to the MM sublayer through the
RR-SAP. If a message belongs to the MM sublayer, the message is transmitted to the MM entity
based on the TI. The other messages are sent to the CM sublayer through the MM-SAPs, and
then to the CM entities.
Figure 1-8 shows the L3 signaling protocol model on the Um interface.
Issue 01 (2007-09-05) Huawei Technologies Proprietary 1-23
24. HUAWEI BSC6000 Base Station Subsystem
1 BSS Signaling Fundamental Signaling Analysis Guide
Figure 1-8 L3 signaling message processing procedure
Mobile
network
services MNCC-SAP MNSS-SAP MNSMS-SAP
S SM
CC
S S
MMSS-SAP
MMCC-SAP
MMSMS-SAP
MMREG -SAP
MM MM CC SS SMS
signaling
Layer 3
RR-SAP
RR RR
PD
RR
SAPI 0 SAPI 3
BCCH
AGCH+PCH
SDCCH
SDCCH
SACCH
RACCH
SACCH
FACCH
The RR sublayer at the bottom receives the services from L2 through various service access
points (that is, various types of channels) of L2, and provides services to the MM sublayer
through RR-SAP. The MM sublayer provides services to different entities through different
SAPs: to the CC through MMCC-SAP, to the SS through MMSS-SAP, to the SMS through
MMSMS-SAP, and to the high layer through MMREG-SAP. The three independent entities
(CC, SS, and SMS) of the CM sublayer provide services to higher layers through MNCC-SAP,
MNSS-SAP, and MNSMS-SAP respectively.
Service Feature
L3 on the MS side provides the following services:
l Registration services, that is, IMSI attach and detach
l Call control services, including normal establishment of MS originating calls, emergency
establishment of MS originating calls, call hold, call termination, and support for call-
related supplementary services
l Support for call independent supplementary services
l Support for short messages service
L3 on the network side provides the following services:
1-24 Huawei Technologies Proprietary Issue 01 (2007-09-05)
25. HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide 1 BSS Signaling Fundamental
l Call control services, including call establishment, call hold, call termination, and support
for call-related supplementary services
l Support for call independent supplementary services
l Support for short messages service
L3 provides the following services between the MS and the network:
l For the services provided by the RR, see Figure 1-9. These services are provided to the
MM through RR-SAP. They are used to set up control channel connections and traffic
channel connection, indicate ciphering mode, release control channel connections, and
transmit control data.
l For the services provided by the MM, see Figure 1-10. These services are used to manage
the three entities (CC, SS, and SMS) of the CM sublayer.
Figure 1-9 Services provided by the RR sublayer
MS side Network side
Mobile
management
sublayer
RR-
primitive
RR
SAP
Protocol of the peer layer of
the RR sublayer
Radio resource
management sublayer
Figure 1-10 Services provided by the MM sublayer
MS side Network side
CC SS SMS CC SS SMS
Protocol of the peer layer
Mobile of the MM sublayer Mobile
management management
sublayer sublayer
Issue 01 (2007-09-05) Huawei Technologies Proprietary 1-25