The document provides an overview of various mobile communication network standards and technologies:
[1] It defines key mobile network acronyms and standards including GSM, UMTS, AMPS, DECT, TETRA, ERMES, 802.11, Bluetooth, Inmarsat, and Teledesic.
[2] It describes the technological development of mobile networks from analog to digital cellular networks to GSM and UMTS. Key milestones and frequency ranges are outlined.
[3] Examples of mobile network providers in Germany including subscriber numbers for T-Mobile, Vodafone, and E-Plus are given for 2001-2003.
The document provides an overview of GSM networks including:
1. GSM was developed in the 1980s to standardize cellular networks in Europe and is now used globally.
2. The key components of a GSM network are the mobile station (phone), base station subsystem including base transceiver stations and base station controllers, and the network switching subsystem centered around mobile switching centers.
3. GSM uses TDMA and FDMA to allow multiple users to access the same radio channel simultaneously. It operates in the 900MHz and 1800MHz bands and supports data rates up to 9.6kbps along with services like SMS.
The document provides an overview of the GSM network including its history, architecture, technical specifications, and applications. It discusses the key components of GSM including the mobile station, base station subsystem, network switching subsystem, logical and physical channels, and security features. The architecture consists of the mobile station, base station subsystem with BTS and BSC, and the network switching subsystem including the MSC, HLR, VLR, and AUC. GSM uses TDMA and FDMA and operates in the 900/1800MHz spectrum. It provides voice and data services and allows international roaming.
GSM is a second generation cellular standard developed to provide voice services and data delivery using digital modulation. It was developed by Groupe Spécial Mobile in 1982 to replace incompatible analog cellular systems. GSM specifications were released in 1990 and it is now used in over 135 countries worldwide with over 1.3 billion subscribers. GSM services include teleservices like voice calls, data services like SMS and supplementary services like call waiting. The GSM network architecture consists of mobile stations, base station subsystems including BTS and BSC, and network switching subsystems including MSC, HLR, VLR and others. Future enhancements to GSM include HSCSD, GPRS and EDGE to provide higher data rates before
GSM is a 2G mobile communication system that provides voice and data services using radio frequency bands between 800-2000MHz. It has a three-part architecture including the radio subsystem with mobile stations, base stations and controllers; the network and switching subsystem with mobile switching centers and registers; and the operation subsystem for network management. Key protocols used in GSM include LAPDm for signaling, mobility management for registration and location updating, and call management for call establishment and control. GSM provides location tracking as users roam between different visitor location registers.
This presentation provides an overview of the Global System for Mobile (GSM) network. It discusses the history and development of GSM, the key components of GSM architecture including the mobile station, base station subsystem, and network switching subsystem. It also describes the technical specifications of GSM such as frequency spectrum, modulation, encryption, and authentication methods. Finally, it outlines the services provided by GSM like teleservices, bearer services, and supplementary services as well as current and future applications of GSM technology.
The document provides information on Global System for Mobile (GSM) network. It discusses that GSM is a second generation cellular standard developed to provide voice and data services using digital modulation. It details the history and development of GSM standards. The document describes the various GSM services including teleservices, bearer services, and supplementary services. It explains the GSM system architecture including components like mobile station, base station subsystem, network switching subsystem and their functions. It also covers GSM specifications, call routing process, advantages of GSM over analog systems, and the future of GSM network.
This document provides an overview of the Global System for Mobile Communications (GSM) cellular standard. It describes the key components of GSM including the mobile station, base station subsystem, network switching subsystem, and services. It outlines the technical specifications of GSM such as frequency bands, modulation, encryption, and data rates. It also discusses security measures, characteristics, applications, and the evolution of GSM to newer standards.
The document provides an overview of GSM networks including:
1. GSM was developed in the 1980s to standardize cellular networks in Europe and is now used globally.
2. The key components of a GSM network are the mobile station (phone), base station subsystem including base transceiver stations and base station controllers, and the network switching subsystem centered around mobile switching centers.
3. GSM uses TDMA and FDMA to allow multiple users to access the same radio channel simultaneously. It operates in the 900MHz and 1800MHz bands and supports data rates up to 9.6kbps along with services like SMS.
The document provides an overview of the GSM network including its history, architecture, technical specifications, and applications. It discusses the key components of GSM including the mobile station, base station subsystem, network switching subsystem, logical and physical channels, and security features. The architecture consists of the mobile station, base station subsystem with BTS and BSC, and the network switching subsystem including the MSC, HLR, VLR, and AUC. GSM uses TDMA and FDMA and operates in the 900/1800MHz spectrum. It provides voice and data services and allows international roaming.
GSM is a second generation cellular standard developed to provide voice services and data delivery using digital modulation. It was developed by Groupe Spécial Mobile in 1982 to replace incompatible analog cellular systems. GSM specifications were released in 1990 and it is now used in over 135 countries worldwide with over 1.3 billion subscribers. GSM services include teleservices like voice calls, data services like SMS and supplementary services like call waiting. The GSM network architecture consists of mobile stations, base station subsystems including BTS and BSC, and network switching subsystems including MSC, HLR, VLR and others. Future enhancements to GSM include HSCSD, GPRS and EDGE to provide higher data rates before
GSM is a 2G mobile communication system that provides voice and data services using radio frequency bands between 800-2000MHz. It has a three-part architecture including the radio subsystem with mobile stations, base stations and controllers; the network and switching subsystem with mobile switching centers and registers; and the operation subsystem for network management. Key protocols used in GSM include LAPDm for signaling, mobility management for registration and location updating, and call management for call establishment and control. GSM provides location tracking as users roam between different visitor location registers.
This presentation provides an overview of the Global System for Mobile (GSM) network. It discusses the history and development of GSM, the key components of GSM architecture including the mobile station, base station subsystem, and network switching subsystem. It also describes the technical specifications of GSM such as frequency spectrum, modulation, encryption, and authentication methods. Finally, it outlines the services provided by GSM like teleservices, bearer services, and supplementary services as well as current and future applications of GSM technology.
The document provides information on Global System for Mobile (GSM) network. It discusses that GSM is a second generation cellular standard developed to provide voice and data services using digital modulation. It details the history and development of GSM standards. The document describes the various GSM services including teleservices, bearer services, and supplementary services. It explains the GSM system architecture including components like mobile station, base station subsystem, network switching subsystem and their functions. It also covers GSM specifications, call routing process, advantages of GSM over analog systems, and the future of GSM network.
This document provides an overview of the Global System for Mobile Communications (GSM) cellular standard. It describes the key components of GSM including the mobile station, base station subsystem, network switching subsystem, and services. It outlines the technical specifications of GSM such as frequency bands, modulation, encryption, and data rates. It also discusses security measures, characteristics, applications, and the evolution of GSM to newer standards.
GSM. Global System for Mobile Communication.Student
This document provides an overview of Global System for Mobile Communication (GSM) technology. It discusses the history and evolution of GSM from 1G to future 5G networks. The key components of a GSM network are described, including the mobile equipment, subscriber identity module, base station system consisting of base transceiver stations and base station controllers, mobile switching center, home location register, visitor location register, and authentication center. Applications, advantages like worldwide connectivity, and disadvantages like limited range are highlighted. The presentation concludes with references and an acknowledgment.
This document provides an overview of GSM (Global System for Mobile Communications) including its key properties, structure, protocols, databases, security aspects, and extensions like HSCSD and GPRS. GSM is a digital cellular network that allows for roaming between networks and integration with fixed telephone networks. It uses TDMA and FDMA to allow multiple users to access the network simultaneously. Security features include subscriber identity modules (SIM cards), authentication of users, and encryption of communications. Extensions like HSCSD provide higher data rates and GPRS introduces packet switching to GSM networks.
GSM(Global system for mobile communication ) is a second generation cellular standard developed to cater voice services and data delivery using digital modulation.
The document provides an overview of GSM (Global System for Mobile Communication) technology. It describes how GSM was originally developed to provide roaming cellular voice services across Europe compatible with other networks. It now has over 5 billion subscribers worldwide. The document outlines the key components of GSM including the mobile station, base station, switching center, and databases. It also describes the radio subsystem using frequency division duplex and time division multiple access and the network switching subsystem responsible for mobility management and switching.
The document provides information about the Global System for Mobile Communications (GSM) cellular standard. It describes GSM as a digital cellular system using TDMA and FDMA. Key aspects of GSM discussed include its architecture, protocols, interfaces, services, and operation. The architecture includes the network switching subsystem (NSS) and base station subsystem (BSS). The NSS contains elements like the mobile switching center (MSC) and home location register (HLR). The BSS contains the base transceiver station (BTS) and base station controller (BSC). Interfaces like A, Abis, and GSM signaling are also covered.
Global System for Mobile Communications (GSM) is a digital cellular network developed to provide digital wireless voice and data services. It was designed to be a digital (wide area) wireless network driven by European Telecom manufacturers, operators, and standardization committees. GSM uses a combination of time division multiple access and frequency division multiple access and has become widely used around the world.
GSM is a 2G mobile communication system that provides voice and data services. It uses TDMA and FDMA to allow multiple users to access the network simultaneously. The key components of a GSM network are the radio subsystem including the BTS, BSC and MS; the network and switching subsystem including the MSC, HLR, VLR; and the operation subsystem including the OMC, AuC and EIR. GSM provides services like telephony, SMS, and data transmission using bearer channels while ensuring security, anonymity and authentication of users.
The document provides an overview of mobile handset cellular networks, including the evolution from 2G to 4G networks. It describes key aspects of 2G GSM networks such as architecture, channels, protocols and short message service. It also summarizes the development of 3G UMTS networks and 4G LTE networks, outlining their technical improvements over previous generations including increased data rates and new multiple access technologies.
This document provides an overview of the Global System for Mobile (GSM) network. It discusses the history and development of GSM from 1982 to the present, outlines the key specifications and components of GSM including frequency bands used, cellular generations, and network architecture. The architecture includes the mobile station (MS), base station subsystem (BSS) consisting of base transceiver stations (BTS) and base station controllers (BSC), and the network switching subsystem (NSS) containing the mobile switching center (MSC), home location register (HLR), visitor location register (VLR), and authentication center (AUC).
This document provides an overview of a project on wireless sensor networks. The aims of the project are to design, build, and test a wireless sensor network circuit using an embedded system and microcontroller programming. The objectives are to study wireless sensor networks using transmitter and receiver modules and design a circuit using an 8051 or AVR microcontroller. The document outlines the modules to be used including RF, GSM, Bluetooth, Zigbee, and GPS. It provides details on the RF module, encoder/decoder circuits, and amplitude shift keying. It also includes sections on GSM technology, its history and standards, services, and architecture including frequency division multiple access, time division multiple access, and code division multiple access access mechanisms.
The document provides an overview of the Global System for Mobile communications (GSM) including its history, architecture, key components, and technical aspects. It describes GSM concepts such as cellular structure and multiple access techniques. It also outlines the roles of core network elements like the HLR, VLR, MSC, BSC, BTS, and identifies interfaces between them. Finally, it covers topics like channel structure, encryption, and mobility management in GSM.
This document provides an overview and summary of a training course on Agenda, GSM & MPA. The course agenda covers definitions and history of GSM, GSM services, system architecture including components like the HLR, VLR, BTS, BSC and MSC. It also discusses the GSM functional model including call management, mobility management and radio resource management. The document then summarizes the GSM radio interface, protocols like DTAP and interfaces like A-bis and A. It provides high-level descriptions of GSM standards and evolution over time.
The document discusses cellular network basics and generations, including:
1) Cellular networks use radio waves to allow cell phones to operate within certain frequency bands and connect to nearby base stations.
2) Cellular networks have evolved through generations from early analog mobile phones to current digital networks that support high-speed data and multimedia services.
3) Cellular networks face the problem of allowing multiple mobile users to access the network simultaneously, which they address through multiple access schemes like FDMA, TDMA, and CDMA that divide available airlink resources.
GSM (Global System for Mobile communications) is a digital cellular network developed in the 1980s to provide voice and data services. It uses TDMA technology to allow multiple users to access radio channels simultaneously over the same radio frequency. The GSM network architecture consists of mobile stations, base station subsystems, and network switching subsystems. GSM has evolved over time to support higher data speeds and now provides up to 2Mbps data rates. It is an open, digital standard used by over 4 billion people across more than 212 countries and territories.
This presentation is all about GSM (Global System for mobile Communication). All components, entities ,architecture ,advantages of GSM, future of GSM was the main focus.
Call routing for incoming and outgoing call is also included in the presentation.
GSM (Global System for Mobile communication) is a second generation cellular standard developed to provide voice and data services using digital modulation. It was developed in 1982 by the Groupe Special Mobile to replace incompatible analog cellular systems. GSM specifications include TDMA/FDMA access methods, GMSK modulation, and frequency bands of 900MHz and 1800MHz. The GSM system architecture consists of mobile stations, base station subsystem including BTS and BSC, network switching subsystem including MSC, HLR, VLR, and supplementary registers. GSM provides telecommunication services, bearer services like SMS, and supplementary services like call forwarding. Security is provided through authentication, encryption, and SIM cards. GSM has enabled international ro
Mobile communication has evolved from 1G to 4G networks over time. 1G networks used analog technologies while newer generations like 2G, 3G and 4G use digital technologies. 2G networks like GSM use TDMA to allow multiple users to access the network simultaneously. The GSM network architecture consists of mobile stations, base station subsystem and network subsystem. The base station subsystem comprises of base transceiver stations and base station controllers. The network subsystem includes switching centers, databases and registers that control connectivity and mobility. GSM ensures security using authentication and encryption algorithms.
Code division multiple access (CDMA) allows all terminals to send signals simultaneously over the same frequency by assigning each terminal a unique spreading code. The receiver can isolate a particular sender's signal by correlating the received signal with the known spreading code. CDMA offers advantages like higher capacity and integration of encryption due to the use of spreading codes, though receivers are more complex.
GSM is a second generation cellular technology developed to provide digital voice and data services using TDMA and FDMA. It initially provided circuit switched services but later added packet switched capabilities with GPRS. The key components of GSM are the mobile station, base station subsystem including base transceiver stations and base station controllers, and the network switching subsystem centered around mobile switching centers and databases like HLR, VLR, EIR and AUC. GSM supports various voice and data services as well as supplementary services and saw continual upgrades over time to improve data capabilities.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
GSM. Global System for Mobile Communication.Student
This document provides an overview of Global System for Mobile Communication (GSM) technology. It discusses the history and evolution of GSM from 1G to future 5G networks. The key components of a GSM network are described, including the mobile equipment, subscriber identity module, base station system consisting of base transceiver stations and base station controllers, mobile switching center, home location register, visitor location register, and authentication center. Applications, advantages like worldwide connectivity, and disadvantages like limited range are highlighted. The presentation concludes with references and an acknowledgment.
This document provides an overview of GSM (Global System for Mobile Communications) including its key properties, structure, protocols, databases, security aspects, and extensions like HSCSD and GPRS. GSM is a digital cellular network that allows for roaming between networks and integration with fixed telephone networks. It uses TDMA and FDMA to allow multiple users to access the network simultaneously. Security features include subscriber identity modules (SIM cards), authentication of users, and encryption of communications. Extensions like HSCSD provide higher data rates and GPRS introduces packet switching to GSM networks.
GSM(Global system for mobile communication ) is a second generation cellular standard developed to cater voice services and data delivery using digital modulation.
The document provides an overview of GSM (Global System for Mobile Communication) technology. It describes how GSM was originally developed to provide roaming cellular voice services across Europe compatible with other networks. It now has over 5 billion subscribers worldwide. The document outlines the key components of GSM including the mobile station, base station, switching center, and databases. It also describes the radio subsystem using frequency division duplex and time division multiple access and the network switching subsystem responsible for mobility management and switching.
The document provides information about the Global System for Mobile Communications (GSM) cellular standard. It describes GSM as a digital cellular system using TDMA and FDMA. Key aspects of GSM discussed include its architecture, protocols, interfaces, services, and operation. The architecture includes the network switching subsystem (NSS) and base station subsystem (BSS). The NSS contains elements like the mobile switching center (MSC) and home location register (HLR). The BSS contains the base transceiver station (BTS) and base station controller (BSC). Interfaces like A, Abis, and GSM signaling are also covered.
Global System for Mobile Communications (GSM) is a digital cellular network developed to provide digital wireless voice and data services. It was designed to be a digital (wide area) wireless network driven by European Telecom manufacturers, operators, and standardization committees. GSM uses a combination of time division multiple access and frequency division multiple access and has become widely used around the world.
GSM is a 2G mobile communication system that provides voice and data services. It uses TDMA and FDMA to allow multiple users to access the network simultaneously. The key components of a GSM network are the radio subsystem including the BTS, BSC and MS; the network and switching subsystem including the MSC, HLR, VLR; and the operation subsystem including the OMC, AuC and EIR. GSM provides services like telephony, SMS, and data transmission using bearer channels while ensuring security, anonymity and authentication of users.
The document provides an overview of mobile handset cellular networks, including the evolution from 2G to 4G networks. It describes key aspects of 2G GSM networks such as architecture, channels, protocols and short message service. It also summarizes the development of 3G UMTS networks and 4G LTE networks, outlining their technical improvements over previous generations including increased data rates and new multiple access technologies.
This document provides an overview of the Global System for Mobile (GSM) network. It discusses the history and development of GSM from 1982 to the present, outlines the key specifications and components of GSM including frequency bands used, cellular generations, and network architecture. The architecture includes the mobile station (MS), base station subsystem (BSS) consisting of base transceiver stations (BTS) and base station controllers (BSC), and the network switching subsystem (NSS) containing the mobile switching center (MSC), home location register (HLR), visitor location register (VLR), and authentication center (AUC).
This document provides an overview of a project on wireless sensor networks. The aims of the project are to design, build, and test a wireless sensor network circuit using an embedded system and microcontroller programming. The objectives are to study wireless sensor networks using transmitter and receiver modules and design a circuit using an 8051 or AVR microcontroller. The document outlines the modules to be used including RF, GSM, Bluetooth, Zigbee, and GPS. It provides details on the RF module, encoder/decoder circuits, and amplitude shift keying. It also includes sections on GSM technology, its history and standards, services, and architecture including frequency division multiple access, time division multiple access, and code division multiple access access mechanisms.
The document provides an overview of the Global System for Mobile communications (GSM) including its history, architecture, key components, and technical aspects. It describes GSM concepts such as cellular structure and multiple access techniques. It also outlines the roles of core network elements like the HLR, VLR, MSC, BSC, BTS, and identifies interfaces between them. Finally, it covers topics like channel structure, encryption, and mobility management in GSM.
This document provides an overview and summary of a training course on Agenda, GSM & MPA. The course agenda covers definitions and history of GSM, GSM services, system architecture including components like the HLR, VLR, BTS, BSC and MSC. It also discusses the GSM functional model including call management, mobility management and radio resource management. The document then summarizes the GSM radio interface, protocols like DTAP and interfaces like A-bis and A. It provides high-level descriptions of GSM standards and evolution over time.
The document discusses cellular network basics and generations, including:
1) Cellular networks use radio waves to allow cell phones to operate within certain frequency bands and connect to nearby base stations.
2) Cellular networks have evolved through generations from early analog mobile phones to current digital networks that support high-speed data and multimedia services.
3) Cellular networks face the problem of allowing multiple mobile users to access the network simultaneously, which they address through multiple access schemes like FDMA, TDMA, and CDMA that divide available airlink resources.
GSM (Global System for Mobile communications) is a digital cellular network developed in the 1980s to provide voice and data services. It uses TDMA technology to allow multiple users to access radio channels simultaneously over the same radio frequency. The GSM network architecture consists of mobile stations, base station subsystems, and network switching subsystems. GSM has evolved over time to support higher data speeds and now provides up to 2Mbps data rates. It is an open, digital standard used by over 4 billion people across more than 212 countries and territories.
This presentation is all about GSM (Global System for mobile Communication). All components, entities ,architecture ,advantages of GSM, future of GSM was the main focus.
Call routing for incoming and outgoing call is also included in the presentation.
GSM (Global System for Mobile communication) is a second generation cellular standard developed to provide voice and data services using digital modulation. It was developed in 1982 by the Groupe Special Mobile to replace incompatible analog cellular systems. GSM specifications include TDMA/FDMA access methods, GMSK modulation, and frequency bands of 900MHz and 1800MHz. The GSM system architecture consists of mobile stations, base station subsystem including BTS and BSC, network switching subsystem including MSC, HLR, VLR, and supplementary registers. GSM provides telecommunication services, bearer services like SMS, and supplementary services like call forwarding. Security is provided through authentication, encryption, and SIM cards. GSM has enabled international ro
Mobile communication has evolved from 1G to 4G networks over time. 1G networks used analog technologies while newer generations like 2G, 3G and 4G use digital technologies. 2G networks like GSM use TDMA to allow multiple users to access the network simultaneously. The GSM network architecture consists of mobile stations, base station subsystem and network subsystem. The base station subsystem comprises of base transceiver stations and base station controllers. The network subsystem includes switching centers, databases and registers that control connectivity and mobility. GSM ensures security using authentication and encryption algorithms.
Code division multiple access (CDMA) allows all terminals to send signals simultaneously over the same frequency by assigning each terminal a unique spreading code. The receiver can isolate a particular sender's signal by correlating the received signal with the known spreading code. CDMA offers advantages like higher capacity and integration of encryption due to the use of spreading codes, though receivers are more complex.
GSM is a second generation cellular technology developed to provide digital voice and data services using TDMA and FDMA. It initially provided circuit switched services but later added packet switched capabilities with GPRS. The key components of GSM are the mobile station, base station subsystem including base transceiver stations and base station controllers, and the network switching subsystem centered around mobile switching centers and databases like HLR, VLR, EIR and AUC. GSM supports various voice and data services as well as supplementary services and saw continual upgrades over time to improve data capabilities.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
1. GSM (Global System for Mobile Communications): worldwide standard for
digital, cellular Mobile Radio Networks
UMTS (Universal Mobile Telecommunications System): European Standard
for future digital Mobile Radio Networks
AMPS (Advanced Mobile Phone System): analog Mobile Radio Networks in
USA
DECT (Digital Enhanced Cordless Telecommunications): European standard
for cordless phones
TETRA (Terrestrial Trunked Radio): European standard for circuit switched
radio networks
ERMES (European Radio Message System): European standard for radio
paging systems (Pager)
802.11: International standard for Wireless Local Networks
Bluetooth: wireless networking in close/local area
Inmarsat: geostationary satellite systems
Teledesic: planned satellite system on a non-geostationary orbit
Mobile Communication Networks: Examples
1
2. Used Acronyms
CT2: Cordless Telephone 2. Generation
HSCSD: High Speed Circuit Switched Data
GPRS: General Packet Radio Service
EDGE: Enhanced Data Rates for GSM Evolution
IMT2000: International Mobile Telecommunications by the year 2000
MBS: Mobile Broadband System
2
4. General technological development
in mobile telephony
before 1970 1970 1980 2000 2005
Analog
Networks...150Mhz
1990
Anal. cellular
Networks...450 Mhz
Anal. cellular
Networks...900 Mhz
Digital cellular
Networks...900 Mhz
Digital cellular
Networks...1800 Mhz
GSM Phase II+
UMTS
Satellite Systems (LEO)
Prognoses
Development of Mobile Radio
4
8. GSM: Properties
• cellular radio network (2nd Generation)
• digital transmission, data communication up to 9600 Bit/s
• Roaming (mobility between different net operators, international)
• good transmission quality (error detection and -correction)
• scalable (large number of participants possible)
• Security mechanisms (authentication, authorization, encryption)
• good resource use (frequency and time division multiplexing)
• integration within ISDN and fixed network
• standard (ETSI, European Telecommunications Standards Institute)
8
9. Providers in Germany (1)
• D1 T-Mobile
– subscribers: 24,6 Mio (Stand 2003)
• Vodafone D2
– old name: Mannesmann Mobilfunk D2
– subscribers: 22,7 Mio (Stand 2003)
• E-plus
• O2
– old name: VIAG Interkom
9
11. AuC Authentication Centre
BSS Base Station Subsystem
BSC Base Station Controller
BTS Base Transceiver Station
EIR Equipment Identity Register
HLR Home Location Register
MS Mobile Station
(G)MSC (Gateway) Mobile Switching Centre
OMC Operation and Maintenance Centre
PSTN Public Switched Telephone Network
VLR Visitor Location Register
ISDN Integrated Services Digital Network
Fixed network Switching Subsystems
VLR
Radio Subsystems
HLR AuC EIR
(G)MSC
OMC
BTS
BTS
BSC
BSS
MS
MS
Network Management
Call Management
Data
networks
PSTN/
ISDN
MS
GSM: structure
12. GSM: Structure
Operation and Maintenance Centre (OMC)
• logical, central structure with HLR, AuC und EIR
Authentication Centre (AuC)
• authentication, storage of symmetrical keys, generation of encryption
keys
Equipment Identity Register (EIR)
• storage of device attributes of allowed, faulty and jammed devices
(white, grey, black list)
Mobile Switching Centre (MSC)
• arrangement centre, partial as gateways to other nets, assigned to
one VLR each
Base Station Subsystem (BSS): technical radio centre
• Base Station Controller (BSC): control centre
• Base Transceiver Station (BTS): radio tower / antenna
13. 1 TDMA-Frame, 144 Bit in 4,615 ms
8 TDMA-channels, together 271 kBit/s inclusive
error protection information
124 radio frequency channels (carrier), each 200 kHz
2 frequency wavebands, for each 25 MHz, divided into radio cells
890
935
915 MHz
960 MHz
downlink
uplink
Radio technical structure
• One or several carrier frequencies per BSC
• Physical channels defined by number and position of time slots
14. GSM: protocols, incoming call
VLR
BSS
BSS MSC GMSC
HLR
BSS
BSS
(4)
(2)
(4)
(5)
(3)
(10)
(6)
(11)
(7)
(8)
(8)
(9)
(12)
(8)
(1)
(12)
(9)
(8)
PSTN/
ISDN
(1) Call from fixed network was switched via GMSC
(2) GMSC finds out HLR from phone number and transmits need of conversation
(3) HLR checks whether participant for a corresponding service is authorized and
asks for MSRN at the responsible VLR
(4) MSRN will be returned to GMSC, can now contact responsible MSC
15. GSM: protocols, incoming call
VLR
BSS
BSS MSC GMSC
HLR
BSS
BSS
(4)
(2)
(4)
(5)
(3)
(10)
(6)
(11)
(7)
(8)
(8)
(9)
(12)
(8)
(1)
(12)
(9)
(8)
PSTN/
ISDN
(5) GMSC transmits call to current MSC
(6) ask for the state of the mobile station
(7) Information whether end terminal is active
(8) Call to all cells of the Location Area (LA)
(9) Answer from end terminal
(10 - 12) security check and connection construction
16. GSM: protocols, outgoing call
VLR
BSS
BSS MSC GMSC
HLR
BSS
(5)
(3)
(4)
(2)
(1)
(1) Demand on connection
(2) Transfer by BSS
(3-4) Control for authorization
(5) Switching of the call demand to fixed net
17. GSM: channel strucure
Traffic Channel
• speech- / data channel (13 kbit/s brutto; differential encoding)
• units of 26 TDMA - Frames
• Half-rate traffic channel: for more efficient speech encoding with 7
kbit/s
Control Channel
• Signal information
• Monitoring of the BSCs for reconnaissance of Handover
Broadcast Control Channel
• BSC to MS (identity, frequency order etc.)
Random Access Channel
• Steering of channel entry with Aloha-procedure
Paging Channel
• signalize incoming calls
18. Databases
Home Location Register (HLR), stores data of participants, which are
reported in an HLR-area
– Semi-permanent data:
• Call number (Mobile Subscriber International ISDN Number) - MSISDN, e.g.
+49/171/333 4444 (country, net, call number)
• identity (International Mobile Subscriber Identity) - IMSI: MCC = Mobile
Country Code (262 for .de) + MNC = Mobile Network Code (01-D1, 02-
Vodafone-D2, 03-eplus, 07-O2) + MSIN = Mobile Subscriber Identification
Number
• Personal data (name, address, mode of payment)
• Service profile ( call transfer, Roaming-limits etc.)
– Temporary data:
• MSRN (Mobile Subscriber Roaming Number) (country, net, MSC)
• VLR-address, MSC-address
• Authentication Sets of AuC (RAND (128 Bit), SRES (128 Bit), KC (64Bit))
• charge data
18
19. Databases
Visitor Location Register (VLR)
• local database of each MSC with following data:
– IMSI, MSISDN
– service profile
– accounting information
– TMSI (Temporary Mobile Subscriber Identity) - pseudonym for data
security
– MSRN
– LAI (Location Area Identity)
– MSC-address, HLR-address
19
22. LA 5
LA 3
LA 2
LA 3
VLR 10 VLR 9
IMSI LA 2
HLR 26
32311 VLR 9 IMSI
participant call number
in HLR
country code number
net-entry code
Provider
+49 0177-26 32311
0x62F220 01E5
z.B.
Localization at GSM
22
23. Data transmission
• each GSM-channel configurable as a data channel; similar structure like ISDN-B and
-D-channels
• data rates up to 9600 bit/s now
• delay approximately 200 ms
• speech channels have as a rule higher priority as data channels
• kinds of channels:
– transparent (without error correction; however FEC; fixed data rate; error rate 10-3 up to
10-4)
– non-transparent (repeat of faulty data frames; very low error rate, but also less
throughput)
• Short-Message-Service (SMS)
– connectionless transmission (up to 160 Byte) on signal channel
• Cell Broadcast (CB)
– connectionless transmission (up to 80 Byte) on signal channel to all participants, e.g. one
cell
23
25. Chip-card (Smart Cart) to personalize a mobile subscriber
(MS):
• IMSI (International Mobile Subscriber Identity)
• participant special symmetric key Ki, stored also at AuC
• algorithm “A3” for Challenge-Response-Authentication
• algorithm “A8” for key generation of Kc for content data
• PIN (Personal Identification Number) for entry control
Temporary data:
• TMSI (Temporary Mobile Subscriber Identity)
• LAI (Location Area Identification)
• Encryption key Kc
Security aspects: Subscriber Identity
Module (SIM)
25
26. Security in GSM-networks
SIM
• Entry control and cryptographic algorithms
Single-sided authentication (participant against network)
• Challenge-Response-method (cryptographic algorithm: A3)
Pseudonyms of participants at the Radio interface
• Temporary Mobile Subscriber Identity (TMSI)
Connection encoding on the Radio interface
• Key generation: A8
• Encryption: A5
26
27. Security aspects: Authentication
MSC, VLR, AuC
MS
Authentication Request
RAND (128 Bit)
Random number
generator
i
K
A3
SRES
SRES (32 Bit)
A3
i
K
Authentication Response
=
• Location Registration
• Location Update with VLR-change
• Call setup (in both directions)
• SMS (Short Message Service)
max. 128 Bit
27
28. Security aspects: Session Key
Netz
MS
Authentication Request
RAND (128 Bit)
Random number
generator
i
K
A8
A8
i
K
c
K 64 Bit
c
K
• Key generation: Algorithm A8
– Stored on SIM and in AuC
– with Ki parametric one way function
– no (Europe, world wide) standard
– can be determined by net operator
– Interfaces are standardized
– combination A3/A8 known as COMP128
28
29. Security aspects: encryption at the Radio
interface
Net
MS
Ciphering Mode Command
A5
A5
• Data encryption through algorithm A5:
– stored in the Mobile Station
– standardized in Europe and world wide
– weaker algorithm A5* or A5/2 for specific countries
c
K
c
K
TDMA-frame-
number
TDMA-frame-
number
Key block
+
Plain text block
+
Plain text block
Ciphering Mode Complete
Encrypted Text
114 Bit
29
30. GSM-Security: assessment
• cryptographic methods secret, so they are not „well
examined“
• symmetric procedure
– consequence: storage of user special secret keys with net
operators required
• low key length Ki with max. 128 Bit (could be hacked by using
Brute Force Attack in 8-12 hours)
• no mutual authentication intended
– consequence: Attacker can pretend a GSM-Net
• no end-to-end encryption
• no end-to-end authentication
• Key generation and -administration not controlled by the
participants
30
32. Properties
• Packet switching service (end- to- end)
• Data rates up to 171,2 kbit/s (theoretical)
• Effective and flexible administration of the radio interface
• adaptive channel encoding
• Internetworking with IP- and X.25 nets standardized
• dynamic sharing of resources with „classical“ GSM speech
services
• Advantage: Billing and Accounting according to data volume
• Disadvantage: cost intensive additional net hardware
necessary
32
33. Properties
– point-to-point-Packet transfer service
• PTP-CONS (PTP Connection oriented Network Service)
– connection oriented, similar to X.25
• PTP- CLNS (PTP Connectionless Network Service)
– connectionless, similar to IP
– point- to- multipoint
- group communication
33
34. MSC
BSC
BTS
Internet
GPRS: Structure
HLR
GSM
GPRS Backbone
Frame Relay / ATM
GGSN
GGSN
SGSN
Border
Gateway
GPRS Nets
other operators
other packet
switching
networks
SGSN - Serving GPRS Support Node
GGSN - Gateway GPRS Support Node
signalization data
user data 34
35. GMSC
Circuit switched traffic
HLR/AuC
GPRS register
MAP
MAP
A
GGSN
GPRS: Changes
Abis
Gb
Gn
Gi
other packet
switching
networks
public
remote fixed nets
Packet arranged
traffic
Gs
Um
n time slots (TCH) per
TDMA frame
(theoretically max. 8)
per packet!
modified network components
new components or extensively modified components
Existing components
PCU - Packet Control Unit
SGSN
MSC
BSC
BTS
PCU
35
37. Tasks of the SGSN
• Packet delivery
• mobility management
– apply/ sign off of terminals
– localization
• LLC (Logical Link Control) management
• authentication
• billing
37
38. Tasks of the GGSN
• mediator between GPRS backbone and
external data networks (Internet, X-25 etc.)
• converts GPRS packets, data Protocol (PDP)
into the corresponding structure
• also converts PDP addresses of incoming
packets into GSM address of the receiver
• saves current data for the SGSN address of the
participant as well as their profile and data for
authentication and invoice
38
39. Radio Link Control (RLC)
• Segmentation of the LLC-Frames in RLC blocks
• Block size dependent on short-term channel conditions
• Backward error correction and data flow control by
Automatic Repeat Request (ARQ) protocol
– repeating not repairable RLC blocks selectively
Medium Access Control ( MAC)
• Channel reservation contains:
- one/several time slots (Packet Data Channels PDCH) of
one
frequency
– one uplink status flag (USF) per Packet Data Channel (PDCH),
channel partition of up to 8 ms
GPRS: air interface
39
40. Medium Access Control ( MAC)
• Reservation in the uplink (MS to BSS):
• MS sends reservation request on a Random Access
Channel (Slotted ALOHA)
– BTS allocates a (split) channel and sends packet assignment
– MS sends data depending on the current priority (USF flag)
• Reservation in the Downlink (BSS to MS):
– BTS displays transmitting request and informs about the reserved channel
– MS supervises the reserved channel and receives
GPRS: air interface
40
41. Physical Link Control
• adaptive forward error correction (FEC) dependent on short-term
channel conditions
• temporal scrambling (Interleaving) of the bursts and Mapping on
reserved PDCH (Packet Data Channel)
• procedure to recognize overbooking situations on the physical
channel
GPRS: air interface
GPRS Channel Encoding
Scheme Code
Rate
Payload BCS Pre-
coded
USF
Tail bits Coded
bits
Punctured
bits
Data
rate
(kbit/s)
CS-1 1/2 181 40 3 4 456 0 9.05
CS-2 ~ 2/3 268 16 6 4 588 132 13.4
CS-3 ~ 3/4 312 16 6 4 676 220 15.6
CS-4 1 428 16 12 0 456 0 21.4
41
42. Quality of Service
• QoS profile agrees service parameters inside the whole network
• Agreed for the duration of one PDP (Packet Data Protocol) context
(session, end terminal is obtainable for the duration of the context,
e.g. obtainable over Internet ) :
– temporary address (IP) for mobile station
– tunneling information, among others GGSN, which is used for access to
corresponding packet arranged network
– type of the connection
– QoS profile
• QoS profile commits:
– precedence class, priority against other services (high, normal, low)
– packet delay class, times are valid for traffic inside the GPRS- network
– reliability class
– peak throughput class
– mean throughput class
42
43. Quality of Service
Size 128 octets 1024 octets
Class Mean Delay 95% Delay Mean Delay 95% Delay
1 (predictive) < 0,5 s < 1,5 s < 2 s < 7 s
2 (predictive) < 5 s < 25 s < 15 s < 75 s
3 (predictive) < 50 s < 250 s < 75 s < 375 s
4 (best effort) Best effort
Probability for
Class Lost packet
Duplicated
packet
Out of
Sequence
packet
Corrupted
packet
1 10
-9
10
-9
10
-9
10
-9
2 10
-4
10
-5
10
-5
10
-6
3 10
-2
10
-5
10
-5
10
-2
Packet delay classes
Security classes
43
44. Quality of Service
GPRS- using data rates
Coding # of timeslots
Scheme 1 2 3 4 5 6 7 8
CS-1 9,05 18,1 27,15 36,2 45,25 54,3 63,35 72,4
CS-2 13,4 26,8 40,2 53,6 67 80,4 93,8 107,2
CS-3 15,6 31,2 46,8 62,4 78 93,6 109,2 124,8
CS-4 21,4 42,8 64,2 85,6 107 128,4 149,8 171,2
• CS 3 and CS 4 are only reasonable in the second phase of GPRS
introduction
• They will be used adaptively at corresponding good quality of radio
connection
• CS 4 does not comprise error correction, code rate = 1!
44
45. Assessment of GPRS
+ An up to 4 times higher data rate in comparison to ordinary GSM- data
services
+ better resource management through packet arranged service
+ „always on” data service (email, etc.)
+ GPRS is a more suitable carrier for services like WAP
- IP-derivate, no true guaranties (QoS)
- development of the network infrastructure is relatively expensive,
particularly regarding introduction to UMTS (return of investment)
- GPRS doesn’t give such data rates like advertising has sometimes
promised
45
46. 9.6 kbit/s
Data
rate
26.4 kbit/s
13.2 kbit/s
HSCSD
Channel
packing,
NT
39.6 kbit/s
CS 1
GPRS
Packet
arranged
9 kbit/s
18.1 kbit/s
27.2 kbit/s
13.4 kbit/s
26.8 kbit/s
40.2 kbit/s
CS 2
Development of the GSM-data services
flow
46
47. Enhanced Services - EMS (enhanced message
service)
• Uses widespread existing infrastructure (SMS)
• new Mobile telephones necessary
• allows sending and receiving of messages with formatted texts, melodies,
graphics (32 x 32 Pixel) and animations (16 x 16 Pixel) – e.g. NOKIA
• new applications like Mobile Ticketing
• tickets will be transferred to mobile phone like a bar code and checked at
the admission
• EMS enables transition to MMS (multimedia messaging service), which
allows transmission of multimedia enriched messages over UMTS-
Network (photos, parts of videos)
• MMS requires new network elements in the Infrastructure of the
operators
47
48. MMS - architecture
. . .
MMS
Relay
MMS User
Agent
MMS User
Databases
MMS Server
(e.g. E-Mail)
MMS Server
(other service)
alien MMS
Relay
SMTP
LDAP GSM-MAP or IS-
41-MAP or TCP/IP
SMTP, HTTP,
POP3, IMAPv4
WAP or MExE
(e.g. Java and TCP/IP)
HLR
MMS Server
(e.g. Fax)
Based on materials from 3GPP, http://www.3gpp.org
48
49. 49
IMT-2000
• IMT-2000 stands for
IMT: International Mobile Communications
2000: the frequency range of 2000 MHz and the year 2000
• In total, 17 proposals for different IMT-2000 standards were submitted by
regional SDOs to ITU in 1998. 11 proposals for terrestrial systems and 6 for
mobile satellite systems (MSSs).
• All 3G standards have been developed by regional standard developing
organizations (SDOs).
• Evaluation of the proposals was completed in 1998, and negotiations to build
a consensus among different views were completed in mid 1999. All 17
proposals have been accepted by ITU as IMT-2000 standards. The specification
for the Radio Transmission Technology (RTT) was released at the end of 1999.
50. 50
IMT-2000
• The (IMT-2000), consists of 3 operating modes based on Code
Division Multiple Access (CDMA) technology.
• 3G CDMA modes are most commonly known as:
– CDMA2000,
– WCDMA (called UMTS) and
– TD-SCDMA
(Time Division-Synchronous Code Division Multiple Access)
51. 51
High-Speed Packet Data Services
• 2 Mbps in fixed or in-building environments (very
short distances, in the order of metres)
• 384 kbps in pedestrian or urban environments
• 144 kbps in wide area mobile environments
• Variable data rates in large geographic area systems
(satellite)
53. 53
Network Elements from UMTS
UMTS differs from GSM Phase 2+ (GSM +GPRS) mostly in the new principles for
the air interface transmission
WCDMA instead of TDMA/FDMA
Therefore a new RAN (Radio Access Network) called:
UTRAN (UMTS Terrestrial Radio Access Network) must be
introduced with UMTS
Only minor modifications are needed in the CN (Core Network) to
accommodate the change
54. 54
UTRA: UMTS Terrestrial Radio Access
The most significant change in REL. ´99 was the “UTRAN”, a W-CDMA radio interface
for land-based communications.
UTRAN supports time (TDD) and frequency division duplex (FDD).
The TDD mode is optimized for public micro and pico cells and unlicensed cordless
applications.
The FDD mode is optimized for wide-area coverage, i.e. public macro and micro cells.
Both modes offer flexible and dynamic data rates up to 2 Mbps.
56. GSM Evolution to 3G
GSM
9.6kbps (one timeslot)
GSM Data
Also called CSD
GSM
General Packet Radio Services
Data rates up to ~ 115 kbps
Max: 8 timeslots used as any one time
Packet switched; resources not tied up all the time
Contention based. Efficient, but variable delays
GSM / GPRS core network re-used by WCDMA
(3G)
GPRS
HSCSD
High Speed Circuit Switched Data
Dedicate up to 4 timeslots for data connection ~ 50
kbps
Good for real-time applications c.w. GPRS
Inefficient -> ties up resources, even when nothing
sent
Not as popular as GPRS (many skipping HSCSD)
EDGE
Enhanced Data Rates for Global Evolution
Uses 8PSK modulation
3x improvement in data rate on short distances
Can fall back to GMSK for greater distances
Combine with GPRS (EGPRS) ~ 384 kbps
Can also be combined with HSCSD
WCDMA
57. UMTS
• Universal Mobile Telecommunications System
(UMTS)
• UMTS is an upgrade from GSM via GPRS or EDGE
• The standardization work for UMTS is carried out
by Third Generation Partnership Project (3GPP)
• Data rates of UMTS are:
– 144 kbps for rural
– 384 kbps for urban outdoor
– 2048 kbps for indoor and low range outdoor
• Virtual Home Environment (VHE)
58. UMTS Frequency Spectrum
• UMTS Band
– 1900-2025 MHz and 2110-2200 MHz for 3G
transmission
– In the US, 1710–1755 MHz and 2110–2155 MHz will
be used instead, as the 1900 MHz band was already
used.
59. UMTS Architecture
SD
Mobile Station
MSC/
VLR
Base Station
Subsystem
GMSC
Network Subsystem
AUC
EIR HLR
Other Networks
Note: Interfaces have been omitted for clarity purposes.
GGSN
SGSN
BTS
BSC
Node
B
RNC
RNS
UTRAN
SIM
ME
USIM
ME
+
PSTN
PLMN
Internet
60. UMTS Network Architecture
• UMTS network architecture consists of three
domains
– Core Network (CN): Provide switching, routing and
transit for user traffic
– UMTS Terrestrial Radio Access Network (UTRAN):
Provides the air interface access method for user
equipment.
– User Equipment (UE): Terminals work as air interface
counterpart for base stations. The various identities
are: IMSI, TMSI, P-TMSI, TLLI, MSISDN, IMEI, IMEISV
61. UTRAN
• Wide band CDMA technology is selected for UTRAN air
interface
– WCDMA
– TD-SCDMA
• Base stations are referred to as Node-B and control
equipment for Node-B is called as Radio Network Controller
(RNC).
– Functions of Node-B are
• Air Interface Tx/Rx
• Modulation/Demodulation
– Functions of RNC are:
• Radio Resource Control
• Channel Allocation
• Power Control Settings
• Handover Control
• Ciphering
• Segmentation and reassembly
62. 62
UTRAN
Two new network elements
are introduced in UTRAN
• RNC
• Node B
UTRAN is subdivided into
individual radio network
systems (RNSs), where
each RNS is controlled by
an RNC.
The RNC is connected to
a set of Node B elements,
each of which can serve
one or several cells.
63. UTRAN architecture
UTRAN comprises several RNSs
Node B can support FDD or TDD or
both
RNC is responsible for handover
decisions requiring signaling to the
UE
Cell offers FDD or TDD
RNC: Radio Network Controller
RNS: Radio Network Subsystem
Node B
Node B
RNC
Iub
Node B
UE1
RNS
CN
Node B
Node B
RNC
Iub
Node B
RNS
Iur
Node B
UE2
UE3
Iu
64. 64
UTRAN functions
• Admission control
• Congestion control
• Radio channel encryption
• Handover
• Radio network configuration
• Channel quality measurements
• Radio resource control
• Data transmission over the radio interface
• Outer loop power control (FDD and TDD)
• Channel coding
65. Core network
BTS
Node B
BSC
Abis
BTS
BSS
MSC
Node B
Node B
RNC
Iub
Node B
RNS
Node B
SGSN GGSN
GMSC
HLR
VLR
IuPS
IuCS
Iu
CN
EIR
Gn
Gi
PSTN
AuC
GR
The Core Network (CN) and the Interface Iu, are separated into two logical domains:
Circuit Switched Domain (CSD)
• Circuit switched service incl. signaling
• Resource reservation at connection setup
• GSM components (MSC, GMSC, VLR)
• IuCS
Packet Switched Domain (PSD)
• GPRS components (SGSN, GGSN)
• IuPS
66. Access method CDMA
•CDMA (Code Division Multiple Access)
– all terminals send on the same frequency probably at
the same time and can use the whole bandwidth of
the transmission channel
– each sender has a unique random number, the sender
XORs the signal with this pseudo random number
– the receiver can “tune” into this signal if it knows the
pseudo random number, tuning is done via a
correlation function
67. GSM/GPRS network architecture
GSM/GPRS core network
Radio access network
BSS
database
IP Backbone
Internet
PSTN,
ISDN
BTS
BTS
BSC
MSC
VLR
SGSN
GMSC
HLR
AuC
EIR
GGSN
MS
PCU
68. 3GPP Rel.’99 network architecture
Core network (GSM/GPRS-based)
Radio access network
UTRAN
UE
Iu CS
Iur
Iub
Uu
Gn
Iu PS
database
IP Backbone
Internet
PSTN
BS
BS
RNC
RNC
MSC
VLR
SGSN
GMSC
HLR
AuC
EIR
GGSN
Iub
69. 3GPP Rel.’99 network architecture
Radio access network
UTRAN
UE Iur
Iub
Uu
BS
BS
RNC
RNC
Iub
2G => 3G MS => UE (User
Equipment), often also called (user)
terminal
New air (radio) interface based on
WCDMA access technology
New RAN architecture
(Iur interface is available for soft
handover,
BSC => RNC)
70. 3GPP Rel.’99 network architecture
Core network (GSM/GPRS-based)
Iu CS
Gn
Iu PS
IP Backbone
Internet
PSTN
MSC
VLR
SGSN
GMSC
HLR
AuC
EIR
GGSN
Changes in the core
network:
MSC is upgraded to 3G MSC
SGSN is upgraded to 3G
SGSN
GMSC and GGSN remain the
same
AuC is upgraded (more
security features in 3G)
71. 3GPP Rel.4 network architecture
Circuit Switched (CS) core
network
UTRAN
(UMTS Terrestrial Radio
Access Network)
PSTN
MSC
Server
New option in Rel.4:
GERAN
(GSM and EDGE Radio
Access Network)
PS core as in Rel.’99
GMSC
Server
SGW
MGW
SGW
MGW
72. 3GPP Rel.4 network architecture
Circuit Switched (CS) core
network
PSTN
MSC
Server
PS core as in Rel.’99
GMSC
Server
SGW
MGW
SGW
MGW
MSC Server takes care of call
control signalling
The user connections are set up
via MGW (Media GateWay)
“Lower layer” protocol
conversion in SGW (Signalling
GateWay)
RANAP / ISUP
SS7 MTP IP Sigtran
73. 3GPP Rel.5 network architecture
CS core
PSTN
SGSN GGSN
MGW
Internet
HSS
IMS (IP
Multimedia
System)
PS core
UTRAN
(UMTS Terrestrial Radio
Access Network)
GERAN
(GSM and EDGE Radio
Access Network)
New core
network part:
74. 3GPP Rel.5 network architecture
CS core
PSTN
SGSN GGSN
Internet
/
other
IMS
HSS
PS core
The IMS can establish
multimedia sessions (using IP
transport) via PS core between
UE and Internet (or another
IMS)
Call/session control using SIP
(Session Initiating Protocol)
Interworking with the PSTN
may be required for some time
...
IMS (IP
Multimedia
System)
MGW
75. UMTS protocol stacks (user plane)
apps. &
protocols
MAC
radio
MAC
radio
RLC SAR
Uu
IuCS
UE UTRAN 3G
MSC
RLC
AAL2
ATM
AAL2
ATM
SAR
apps. &
protocols
MAC
radio
MAC
radio
PDCP GTP
Uu IuPS
UE UTRAN 3G
SGSN
RLC
AAL5
ATM
AAL5
ATM
UDP/IP
PDCP
RLC UDP/IP UDP/IP
Gn
GTP GTP
L2
L1
UDP/IP
L2
L1
GTP
3G
GGSN
IP, PPP,
…
IP, PPP,
…
IP tunnel
Circuit
switched
Packet
switched
76. Evolution : From 2G to 3G
76
• Fully specified and world-widely valid,
Major interfaces should be standardized and open.
• Supports multimedia and all of its components.
• Wideband radio access.
• Services must be independent from radio access technology
and is not limited by the network infrastructure.
Primary Requirements of a 3G Network
77. Standardization of WCDMA / UMTS
Multiple Access Method DS-CDMA
Duplexing Method FDD/TDD
Base Station Synchronization Asychronous Operation
Channel Separation 5MHz
Chip Rate 3.84 Mcps
Frame Length 10 ms
Service Multiplexing Multiple Services with different QoS
Requirements Multiplexed on one
Connection
Multirate Concept Variable Spreading Factor and
Multicode
Detection Coherent, using Pilot Symbols or
Common Pilot
Multiuser Detection, Smart
Antennas
Supported by Standard, Optional in
Implementation
77
WCDMA Air Interface, Main Parameters
79. 79
UMTS QoS Classes
Traffic class Conversational
class
Streaming
class
Interactive
class
Background
Fundamental
characteristics
Preserve time
relation between
information
entities of the
stream
Conversational
pattern (stringent
and low delay)
Preserve time
relation
between
information
entities of the
stream
Request
response
pattern
Preserve data
integrity
Destination is
not expecting
the data within
a certain time
Preserve data
integrity
Example of the
application
Voice,
videotelephony,
video games
Streaming
multimedia
Web browsing,
network games
Background
download of
emails
80. Codes in WCDMA
• Channelization Codes (=short code)
– Used for
• channel separation from the single source in downlink
• separation of data and control channels from each other in the uplink
– Same channelization codes in every cell / mobiles and therefore the additional
scrambling code is needed
• Scrambling codes (=long code)
– Very long (38400 chips = 10 ms =1 radio frame), many codes available
– Does not spread the signal
– Uplink: to separate different mobiles
– Downlink: to separate different cells
– The correlation between two codes (two mobiles/Node Bs) is low
• Not fully orthogonal
81. 81
UTRAN UE UTRAN CN
Node B
Node B
RNC
Node B
Node B
RNC
Iub
Iur
UTRAN
RNS
RNS
Two Distinct Elements :
Base Stations (Node B)
Radio Network Controllers (RNC)
1 RNC and 1+ Node Bs are group together
to form a Radio Network Sub-system (RNS)
Handles all Radio-Related Functionality
Soft Handover
Radio Resources Management Algorithms
Maximization of the commonalities of the
PS and CS data handling
UMTS Terrestrial Radio Access Network, Overview
82. 82
UTRAN UE UTRAN CN
Node B
Node B
RNC
Logical Roles of the RNC
Controlling RNC (CRNC)
Responsible for the load and
congestion control of its own cells
CRNC
Node B
Node B
SRNC
Serving RNC (SRNC)
Terminates : Iu link of user data,
Radio Resource Control Signalling
Performs : L2 processing of data
to/from the radio interface, RRM
operations (Handover, Outer Loop
Power Control)
Drift RNC (DRNC)
Performs : Macrodiversity
Combining and splitting
Node B
Node B
DRNC
Node B
Node B
SRNC
Node B
Node B
DRNC
UE
UE
Iu
Iu
Iu
Iu
Iur
Iur
83. 83
Core Network UE UTRAN CN
MSC/
VLR
GMSC
SGSN GGSN
HLR
External
Networks
Iu-cs
Core Network, Release ‘99
CS Domain :
Mobile Switching Centre (MSC)
Switching CS transactions
Visitor Location Register (VLR)
Holds a copy of the visiting user’s
service profile, and the precise info
of the UE’s location
Gateway MSC (GMSC)
The switch that connects to
external networks
PS Domain :
Serving GPRS Support Node (SGSN)
Similar function as MSC/VLR
Gateway GPRS Support Node (GGSN)
Similar function as GMSC
Register :
Home Location Register (HLR)
Stores master copies of
users service profiles
Stores UE location on the
level of MSC/VLR/SGSN
Iu-ps
84. Radio Resources Management
84
• Network Based Functions
– Admission Control (AC)
• Handles all new incoming traffic. Check whether new connection can be admitted to the system and
generates parameters for it.
– Load Control (LC)
• Manages situation when system load exceeds the threshold and some counter measures have to be
taken to get system back to a feasible load.
– Packet Scheduler (PS)
• Handles all non real time traffic, (packet data users). It decides when a packet transmission is initiated
and the bit rate to be used.
• Connection Based Functions
– Handover Control (HC)
• Handles and makes the handover decisions.
• Controls the active set of Base Stations of MS.
– Power Control (PC)
• Maintains radio link quality.
• Minimize and control the power used in radio interface, thus maximizing the call capacity.
Source : Lecture Notes of S-72.238 Wideband CDMA systems, Communications Laboratory, Helsinki University of Technology
85. 85
Connection Based Function
Power Control
Prevent Excessive Interference and
Near-far Effect
Open-Loop Power Control
Rough estimation of path loss from
receiving signal
Initial power setting, or when no
feedback channel is exist
Fast Close-Loop Power Control
Feedback loop with 1.5kHz cycle to
adjust uplink / downlink power to its
minimum
Even faster than the speed of
Rayleigh fading for moderate mobile
speeds
Outer Loop Power Control
Adjust the target SIR setpoint in base
station according to the target BER
Commanded by RNC
Fast Power Control
If SIR < SIRTARGET, send
“power up” command to
MS
Outer Loop Power Control
If quality < target, increases
SIRTARGET
86. 86
Connection Based Function
Handover
Softer Handover
A MS is in the overlapping coverage
of 2 sectors of a base station
Concurrent communication via 2 air
interface channels
2 channels are maximally combined
with rake receiver
Soft Handover
A MS is in the overlapping coverage
of 2 different base stations
Concurrent communication via 2 air
interface channels
Downlink: Maximal combining with
rake receiver
Uplink: Routed to RNC for selection
combining, according to a frame
reliability indicator by the base station
A Kind of Macrodiversity
87. UMTS bearer service architecture
TE MT UTRAN CN Iu
edge node
TE
CN
gateway
End-to-end service
UMTS bearer service
Radio access bearer service CN b.s.
Local b.s. Ext. b.s.
Radio b.s. Iu b.s. Backbone
Radio Access Bearer
Radio Bearer
UE Core network
88. What is a bearer?
Bearer: a bearer capability of defined capacity, delay and bit error rate, etc. (as
defined in 3GPP specs.)
Bearer is a flexible concept designating some kind of ”bit pipe”
at a certain network level (see previous slide)
between certain network entities
with certain QoS attributes, capacity, and traffic
flow characteristics
Four UMTS QoS Classes
conversational, streaming, interactive, background
89. UMTS QoS (service) classes
Conversational Streaming Interactive Background
low delay
low delay variation
video
telephony/
conferencing
speech
video streaming
audio streaming
low round-trip delay
www applications
delay is not critical
store-and- forward
applications
(e-mail, SMS)
file transfer
reasonably low
delay
basic applications
basic QoS requirements
90. Four UMTS QoS (service) classes
Conversational Streaming Interactive Background
• speech (using AMR = Adaptive Multi-Rate speech coding)
• video telephony / conferencing:
ITU-T Rec. H.324 (over circuit switched connections)
ITU-T Rec. H.323 or IETF SIP (over packet switched connections)
• low delay (< 400 ms) and low delay variation
• BER requirements not so stringent
• in the radio network => real-time (RT) connections
91. Adaptive Multi-Rate coding
kbit/s
12.2 (= GSM EFR)
10.2
7.95
7.40 (= US TDMA)
6.70 (= PDC EFR)
5.90
5.15
4.75
Adaptive
<=>
During the call, the
AMR bit rate can be
changed, using the
values at the right
EFR = Enhanced Full
Rate
Codec negotiation between
transcoders
<=>
92. Transcoding
UE MSC GMSC User B
TC
Transcoder (AMR/PCM) should be located as far as possible to the right
(transmission capacity savings)
TC
Transcoding should be avoided altogether (better signal quality)
TFO = Tandem Free Operation (2G)
TrFO = Transcoder Free Operation (3G)
(possible only if same coding is used at both ends of
connection)
(e.g. in PSTN)
93. Four UMTS QoS (service) classes
Conversational Streaming Interactive Background
• video streaming
• audio streaming
• reasonably low delay and delay variation
• BER requirements quite stringent
• traffic management important (variable bit rate)
• in the radio network => real-time (RT) connections
UE Source
video or audio information is buffered in the UE,
large delay => buffer is running out of content!
Buffer
94. Four UMTS QoS (service) classes
Conversational Streaming Interactive Background
• web browsing
• interactive games
• location-based services (LCS)
• low round-trip delay (< seconds)
• delay variation is not important
• BER requirements stringent
• in the radio network => non-real-time (NRT) connections
95. Four UMTS QoS (service) classes
Conversational Streaming Interactive Background
• SMS (Short Message Service) and other more advanced
messaging services (EMS, MMS)
• e-mail notification, e-mail download
• file transfer
• delay / delay variation is not an important issue
• BER requirements stringent
• in the radio network => non-real-time (NRT) connections
96. UMTS protocols
Different protocol stacks for user and control plane
User plane (for transport of user data):
Circuit switched domain: data within ”bit pipes”
Packet switched domain: protocols for implementing various QoS or traffic
engineering mechanisms
Control plane (for signalling):
Circuit switched domain: SS7 based (in core network)
Packet switched domain: IP based (in core network)
Radio access network: UTRAN protocols
97. Data streams
RLC
MAC
Phys.
UE UTRAN 3G MSC GMSC
Uu Iu Gn
User plane protocol stacks (CS domain)
RLC
MAC
Phys.
WCDMA
TDM
Frame Protocol (FP)
AAL2
ATM
Phys.
AAL2
ATM
Phys.
TDM
98. User plane protocol stacks (PS domain)
PDCP
RLC
GTP
UDP
IP
GTP
UDP
IP
IP IP
GTP
UDP
PDCP
RLC
MAC
Phys.
MAC
Phys.
AAL5
ATM
Phys.
AAL5
ATM
Phys.
IP
L2
L1
GTP
UDP
IP
L2
L1
UE UTRAN SGSN GGSN
Uu Iu Gn
WCDMA
99. Uu (air, radio) interface protocols
PHY
MAC
RLC
RRC
Signalling
radio bearers
(User plane)
radio bearers
e.g. MM, CC, SM
transparent to UTRAN
Logical channels
Transport channels
PDCP
L3
L2
L1
100. Main tasks of Uu interface protocols
MAC (Medium Access Control):
Mapping between logical and transport channels
Segmentation of data into transport blocks
RLC (Radio Link Control):
Segmentation and reassembly
Link control (flow & error control)
RLC is often a transparent layer
PDCP (Packet Data Convergence Protocol):
IP packet header compression (user plane only)
101. Main tasks of RRC protocol
Over the air interface, Radio Resource Control (RRC) messages carry all the
relevant information required for setting up a Signalling Radio Bearer (during
the lifetime of the RRC Connection) and setting up, modifying, and releasing
Radio Bearers between UE and UTRAN (all being part of the RRC Connection).
RRC also participates in the co-ordination of other Radio Resource
Management (RRM) operations, such as measurements and handovers.
In addition, RRC messages may carry in their payload higher layer signalling
information (MM, CC or SM) that is not related to the air interface or UTRAN.
102. General protocol model for UTRAN
Radio
Network
Layer
Transport
Network
Layer
Control Plane User Plane
Transport Netw.
Control Plane
Application
Protocol
Data Stream(s)
Signalling
Bearer(s)
Protocol
Data Bearer(s)
Transport Netw.
User Plane
Transport Netw.
User Plane
Signalling
Bearer(s)
Physical Layer
103. Control Plane (Iub, Iur and Iu interfaces)
Radio Network Layer: application protocols (NBAP, RNSAP and RANAP) are
used for the actual signalling between base stations, RNC and core network.
Transport Network Layer: signalling bearer for the transport of application
protocol messages is set up by O&M actions (i.e. on a permanent basis).
Transport Network Control Plane
A signalling bearer (set up by O&M actions) carries a protocol which is used
only for the task of setting up data bearers (e.g. AAL 2 connections).
104. User Plane (Iub, Iur and Iu interfaces)
The User Plane is employed for transport of
user information (speech, video, IP packets ...)
RRC signalling messages (Iub, Iur)
higher-layer protocol information at Iu interface
(if not carried by RANAP).
User plane data is carried by data bearers which use AAL 5 in case of Iu PS
and AAL 2 in all other cases.
User data streams are packed in frame protocols (FP) which are used for
framing, error & flow control, and carrying of parallel data flows that form
the user data signal (e.g. AMR encoded speech).
105. Protocol structure at Iub interface
Radio
Network
Layer
Transport
Network
Layer
Control Plane
Transport Netw.
Control Plane
NBAP
Transport Netw.
User Plane
Transport Netw.
User Plane
Q.2630.1
Convergence
Protocols
AAL 5
Conv. Pr.
AAL 5 AAL 2
ATM
Physical Layer
RRC Data
RLC
MAC
Frame Protocol
106. Control Plane
Transport Netw.
Control Plane
RNSAP
Transport Netw.
User Plane
Transport Netw.
User Plane
Q.2630.1
Convergence
Protocols
AAL 5
Conv. Pr.
AAL 5 AAL 2
ATM
Physical Layer
Protocol structure at Iur interface
Radio
Network
Layer
Transport
Network
Layer
RRC Data
RLC
MAC
Frame Protocol
107. Radio
Network
Layer
Transport
Network
Layer
Control Plane User Plane
Transport Netw.
Control Plane
RANAP
Transport Netw.
User Plane
Transport Netw.
User Plane
Q.2630.1
Convergence
Protocols
AAL 5
Conv. Pr.
AAL 5
CS Channel
Iu UP
AAL 2
ATM
Physical Layer
Protocol structure at Iu CS interface
108. Radio
Network
Layer
Transport
Network
Layer
Control Plane User Plane
Transport Netw.
Control Plane
RANAP
Transport Netw.
User Plane
Convergence
Protocols
AAL 5
IP Application
Protocol structure at Iu PS interface
GTP
UDP
IP
AAL 5
ATM
Physical Layer
Iu UP
109. Application protocols in UTRAN
Iub interface (between RNC and base station)
NBAP (Node B Application Part)
Iur interface (between Serving RNC and Drift RNC)
RNSAP (Radio Network Subsystem Application Part)
- Link management for inter-RNC soft handover
Iu interface (between RNC and core network)
RANAP (Radio Access Network Application Part)
- Radio Access Bearer (RAB) management
- SRNS Relocation
- Transfer of higher-level signalling messages
110. Serving RNC and Drift RNC in UTRAN
Core network
Iu
Iur
Iub
Iub
DRNC
SRNC
UE
BS
BS
RNC
RNC
Concept needed for:
Soft handover between base stations belonging to different RNCs
111. Serving RNS (SRNS) Relocation
RNS = Radio Network Sub-system =
RNC + all base stations controlled by this RNC
SRNS Relocation means that the Serving RNC functionality is
transferred from one RNC (the “old” SRNC) to another (the “new”
SRNC, previously a DRNC) without changing the radio resources and
without interrupting the user data flow.
RANAP provides the signalling facilities over the two Iu interfaces
involved (Iu interfaces to “old” and “new” SNRC) for performing SRNC
Relocation in a co-ordinated manner.
112. SRNS Relocation (cont.)
Core network
Iu
Iur
Iub
Iub
DRNC
SRNC
UE
BS
BS
RNC
RNC Iu
SRNC
SRNC provides: 1) connection to core network
2) macrodiversity combining point
114. Micro- / macrodiversity combining
Iu
Iur
Iub
Iub
DRNC
SRNC
UE
BS
BS
RNC
RNC
Macrodiversity combining
point in SRNC
Core network
Rake receiver
Multipath
propagation
Microdiversity combining point in base station
(uplink)
115. Micro- / macrodiversity combining
Microdiversity combining: multipath signal components are processed
in Rake “fingers” and combined (= summed) using MRC
(MRC = Maximum Ratio Combining)
Macrodiversity combining: the same bit sequences (with different bit
error positions) are combined at the SRNC (usually: selection
combining).
Hard handover: slow (a lot of signalling)
Soft handover: fast selection in SRNC
(uplink)
116. Radio Access Bearer (RAB) establishment
RAB assignment request
RAB assignment complete
RAB is configured to be used over
existing Radio Link(s)
(RANAP signaling)
UE BS RNC
(RRC signaling)
Core network
117. Signalling between UE and core network
UE BS RNC MSC or
SGSN
RRC RANAP
NAS signalling messages (NAS = Non Access Stratum = “not related to
UTRAN”) are sent transparently through UTRAN in the payload of
RRC/RANAP protocol messages
118. Security in UMTS
GSM UMTS
SIM authentication
(PIN code)
User authentication
Ciphering (air interface)
Signalling data integrity
IP security (e.g. IPSEC)
User authentication
Network authentication
USIM authentication (PIN code)
Ciphering (air interface)
KASUMI algorithm (known)
UMTS: larger key lengths than
in GSM
119. Security in digital networks: terminology
Authentication:
SIM authentication (PIN code)
user authentication (GSM, UMTS, DECT, TETRA)
network authentication (UMTS, TETRA)
Integrity:
signalling data integrity (UMTS)
Confidentiality ( privacy):
ciphering of signals over radio interface
hiding of user identifiers over radio interface
end-to-end encryption (offered by service provider)
120. Authentication
Authentication: Procedure of verifying the authenticity of an entity (user,
terminal, network, network element). In other words, is the entity the one it
claims to be?
SIM authentication is local (network is not involved)
In GSM, only user is authenticated
In UMTS, both user and network are authenticated
User/network is authenticated at the beginning of each user-network
transaction (e.g. location updating or connection set-up) and always
before ciphering starts.
See Security in GSM for
more details
121. Integrity
Data integrity: The property that data has not been altered in an
unauthorised manner.
“Man-in-the-middle” security attack, e.g. false BS
Data integrity checking is not done in GSM
In UMTS, signalling messages are appended with a 32 bit security field
(MAC-I) at the terminal or RNC before transmission and checked at the
receiving end
In UMTS, also volume of user data (not the user data itself) is integrity
protected
122. Signalling integrity protection in UMTS
Signalling message
Algorithm f 9
MAC-I
Integrity Key (IK) and
other keys/parameters
UE RNC
MAC-I generation MAC-I checking
MAC-I generation
MAC-I checking
Both in
terminal and
RNC
123. Confidentiality
Confidentiality: The property that information is not made available to
unauthorised individuals, entities or processes.
Example 1: Ciphering (encryption) over the air interface
Example 2: Preventing unencrypted transmission of user ID information such
as IMSI number over the air interface
=> Temporary Mobile Subscriber Identity (TMSI) is generated (at the end of
each MM or CM transaction) and is used at the beginning of the next
transaction instead of IMSI.
124. Example 1: ciphering (encryption)
BS
MS
UE
BTS BSC
RNC
SGSN
Core Network
Air interface
GPRS
UMTS
MS BTS BSC Core Network
GSM
Both CS and PS information
Signalling integrity protection
125. Network domain security
Circuit switched network => quite good
IP-based network (Internet) => rather poor at present
(security mechanisms are developed by IETF, 3GPP...)
Some security threats in IP-based network:
Sniffing (electronic eavesdropping)
Spoofing, session hijacking
Denial of service (DoS), ”spamming”
Confidentiality
Integrity
126. Spreading in WCDMA
Channel data
Channelization
code
Scrambling code
Channel bit
rate
Chip rate Chip rate
Usage of code Uplink Downlink
Channelization code
Scrambling code
User separation
User separation Cell separation
(always 3.84 million chips/s)
127. User data rate vs. channel bit rate
Channel bit rate (kb/s)
User data rate (kb/s)
Channel coding
Interleaving
Bit rate matching
Interesting for
user
Important for
system
128. CAMEL (Customised Applications for Mobile network Enhanced Logic) is a
set of “IN” type functions and procedures that make operator-specific IN
services available to subscribers who roam outside their home network.
CAMEL = IN technology + global mobility
CAMEL Service Environment (CSE) is a logical entity in the subscriber’s home
network which processes IN related procedures
CSE SCP in home network
CAMEL (2G & 3G)
129. Virtual Home Environment (VHE)
Same subscriber profile & charging/numbering information can be utilised in any
UMTS network
Home PLMN Visited PLMN
UE
Certain subscriber profile Same subscriber profile
130. Supporting technologies and services
Positioning
SMS
USSD
MMS
LCS
SAT USAT
MExE
WAP
Location
UE
Transport
&
Content
i-Mode
- many are already possible in 2G
- will (perhaps) be extensively used in 3G
131. Location (based) services (LCS)
- may or may not use UE positioning techniques
- general LCS architecture in UMTS:
UE
PSTN
Internet
BS
LMU
RNC &
SMLC
MSC
GMLC
SGSN GGSN
HLR/AuC/EIR
GMSC
LCS External
Client
132. Location (based) services (cont.)
GMLC = Gateway Mobile Location Center
receives service requests from external LCS clients (or UE) and
manages the location information
SMLC = Serving Mobile Location Center
assists in positioning of the UE (e.g. performs calculations based on
measurement results), is usually integrated with RNC
LCS client = typically any server requesting location
information (to be able to provide the relevant location service to the
user), may also be the UE
133. Positioning methods
BS
BS
BS
UE
LMU
Cell ID based location information
- no expensive positioning solutions required
- inexpensive (and will
therefore be widely used)
E-OTD (2G), OTDOA (3G)
- differential delays measured
from which the position
is calculated (in SMLC)
Assisted GPS
- greatest precision, GPS receiver in UE
- network must “assist” in indoor environment
SMLC
134. Support of mobility:
macro diversity
• Multicasting of data via
several physical channels
– Enables soft handover
– FDD mode only
• Uplink
– simultaneous reception of
UE data at several Node
Bs
• Downlink
– Simultaneous
transmission of data via
different cells
CN
Node B RNC
Node B
UE