GSM is the globel system of organation . It consists of
M.S,BSC MSC ,OMC,FIXED Phone.Mobile station is carried by
the subscriber.and base station subsystem control the radio
link with mobile station . The main part of system is
mobile switching center perform switching of calls between
the mobile and fixed or mobile network use. and operational
and maintainence center oversees the proper operation and
set up of the network. The MS and BSC communicate across
the um link or air interface and BSC&MSC communicate across
A interface.
This third webinar discusses the fundamentals of LTE Carriers and how LTE mobiles communicate with the network including what factors affect performance.
It is a handbook of UMTS/LTE/EPC CSFB call flows.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
This slide for your understanding on LTE !
LTE, the wireless access protocol for 4G mobile network service, has evolved from GSM and WCDMA based on 3GPP!
The contents of this slide is below;
I. LTE Introduction
II. LTE Protocol Layer
III. SAE Architecture
IV. NAS(Non Access Stratum) Protocols
V. EPC Protocol Stacks
With my regards,
Guisun Han
This third webinar discusses the fundamentals of LTE Carriers and how LTE mobiles communicate with the network including what factors affect performance.
It is a handbook of UMTS/LTE/EPC CSFB call flows.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
This slide for your understanding on LTE !
LTE, the wireless access protocol for 4G mobile network service, has evolved from GSM and WCDMA based on 3GPP!
The contents of this slide is below;
I. LTE Introduction
II. LTE Protocol Layer
III. SAE Architecture
IV. NAS(Non Access Stratum) Protocols
V. EPC Protocol Stacks
With my regards,
Guisun Han
This second webinar discusses LTE Air Interface, the link between a mobile device and the network, and a fundamental driver of the quality of the network.
We are going to cover complete list of VoLTE IMS KPI and performance Indicators . This includes :-
VoLTE IMS Control Plane KPI
- RSR : Registration Success Ratio (%)
- CSSR : Call Setup Success Rate (%)
- CST : Call Setup Time (s)
- MHT/ACD : Average Call duration (s)
VoLTE IMS User Plane KPI
- Mute Rate (%)
- MOS Score (1-5)
- RTP Packet Loss (%)
- One Way Calls (%)
Packet Core 4G Network LTE KPI
- Volte Attach Success Rate (%)
- VoLTE QCI=5 Paging Success Rate (%)
- Dedicated Bearer Activation Success Rate (%)
- IMS IP POOL Utilization (%)
- Create Bearer Success Rate (%)
Radio VoLTE KPI
- Call Drop rate (%)
- SRVCC Success Rate (%)
- Handover SR (%)
Mobile Networks Architecture and Security (2G to 5G)
+ Mobile Networks History 2G/3G/4G/LTE/5G
+ CS/PS/EPC/5GC Core Network Elements Overview
+ Mobile Networks Basic Scenarios
+ Mobile Network Security
+ Authentication / Ciphering
• -How the channel concept is used on the radio interface
• -Different burst formats in the radio interface
• -The hierarchical frame structure
• -The content sent in different logical channels
• -The mapping of the logical channels
• -Superframe and Hyperframe
• -MOBILE STATIONS ISDN NUMBER (MSISDN)
• INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
• TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)
• LOCATION AREA IDENTITY (LAI)
• CELL GLOBAL IDENTITY (CGI)
• BASE STATION IDENTITY CODE (BSIC)
• PIN management
This second webinar discusses LTE Air Interface, the link between a mobile device and the network, and a fundamental driver of the quality of the network.
We are going to cover complete list of VoLTE IMS KPI and performance Indicators . This includes :-
VoLTE IMS Control Plane KPI
- RSR : Registration Success Ratio (%)
- CSSR : Call Setup Success Rate (%)
- CST : Call Setup Time (s)
- MHT/ACD : Average Call duration (s)
VoLTE IMS User Plane KPI
- Mute Rate (%)
- MOS Score (1-5)
- RTP Packet Loss (%)
- One Way Calls (%)
Packet Core 4G Network LTE KPI
- Volte Attach Success Rate (%)
- VoLTE QCI=5 Paging Success Rate (%)
- Dedicated Bearer Activation Success Rate (%)
- IMS IP POOL Utilization (%)
- Create Bearer Success Rate (%)
Radio VoLTE KPI
- Call Drop rate (%)
- SRVCC Success Rate (%)
- Handover SR (%)
Mobile Networks Architecture and Security (2G to 5G)
+ Mobile Networks History 2G/3G/4G/LTE/5G
+ CS/PS/EPC/5GC Core Network Elements Overview
+ Mobile Networks Basic Scenarios
+ Mobile Network Security
+ Authentication / Ciphering
• -How the channel concept is used on the radio interface
• -Different burst formats in the radio interface
• -The hierarchical frame structure
• -The content sent in different logical channels
• -The mapping of the logical channels
• -Superframe and Hyperframe
• -MOBILE STATIONS ISDN NUMBER (MSISDN)
• INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
• TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)
• LOCATION AREA IDENTITY (LAI)
• CELL GLOBAL IDENTITY (CGI)
• BASE STATION IDENTITY CODE (BSIC)
• PIN management
This slide gives an introduction to the need of multiplexing . The two basic types of multiplexing are Frequency division multiplexing and time division multiplexing. These slide provides with the basics of both . How these techniques work and what is the difference between them
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
1. Internal
OMA000001
GSM Fundamentals
ISSUE 4.0 www.huawei.com
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
2. Upon completion of this course, you will be able to:
Grasp basic idea of GSM system such as
frequency spectrum, frequency reuse etc.
Grasp the structure of the GSM system and the
protocol used.
Grasp certain numbers that refer to BSS
Grasp the 4 kinds of channel combination and
understand the idea of multi-frame.
Know some radio techniques
Get the idea of EDGE
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 2
3. References
BSS Feature Description
BSS Signaling Analysis Manual
BSC Technical Manual
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 3
4. Chapter 1 GSM System Overview
Chapter 2 GSM Network Structure
Chapter 3 Service Area and Number Planning
Chapter 4 Channels on the Wireless Interface
Chapter 5 Radio Techniques
Chapter 6 GPRS & EDGE Introduction
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 4
5. GSM system overview
The GSM system is a frequency- and time-division cellular system,
each physical channel is characterized by a carrier frequency and a
time slot number
Cellular systems are designed to operate with groups of low-power
radios spread out over the geographical service area. Each group of
radios serve MSs presently located near them. The area served by
each group of radios is called a CELL
Uplink and downlink signals for one user are assigned different
frequencies, this kind of technique is called Frequency Division Duplex
(FDD)
Data for different users is conveyed in time intervals called slots ,
several slots make up a frame. This kind of technique is called Time
Division Multiple Access (TDMA)
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 5
6. GSM Development
1989 Standard Protocol for GSM take effect
1991 GSM system began to provide service in Europe(2G)
1992 System was named as Global System for
Mobile Communication
1994 Provide services for the whole world
1996 Micro Cell Technique is used in GSM system
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 6
7. Cell Technique
Macro Cell and Micro Cell
A certain radio coverage area formed by a set of transceivers that
connected to a set of antennas is called a CELL.
Macro Cell
In the beginning , High-Power BTSs are adopted to provide services.
The BTS covers a wider area , but its frequency utilization is not
efficient. So , it can only provide a few channels for subscribers.
Micro Cell
Later the Low-Power BTS joins the system for getting a better service
area with high capacity . At the same time it adopts the frequency reuse
technique to improve the efficiency of the frequency utilization and also
the whole capacity of the network.
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 7
8. Multiple Access Technique
Multiple Access Technique allows many subscribers to use the
same communication medium.
There are three kinds of basic Multiple Access Technique :
FDMA , TDMA and CDMA.
GSM system adopt FDD-TDMA (FDMA and TDMA together).
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 8
9. FDMA
FDMA uses different frequency
channels to accomplish
Frequency communication.
The whole frequency spectrum
available is divided into many
individual channels (for
transmitting and
receiving) , every channel can
support the traffic for one
subscriber or some control
Time information.
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 9
10. TDMA
TDMA accomplishes the
communication in different
Frequency
timeslot.
A carrier is divided into
channels based on time.
Different signals occupy
different timeslots in certain
sequence , that is , many
signals are transmitted on
the same frequency in
Time different time.
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 10
11. CDMA
CDMA accomplishes the
Frequency communication in different
code sequences.
Special coding is adopted
before transmission, then
different information will
lose nothing after being
mixed and transmitted
together on the same
frequency and at the
same time.
Time
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 11
12. The Frequency Spectrum
GSM 900
Uplink Downlink
890 915 935 960MHz
Duplex Separation: 45MHz
Channel Bandwidth: 200KHz
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 12
13. The Frequency Spectrum
DCS 1800
Base Station Receive Base Station Transmit
1710 1785 1805 1880MHz
Duplex Separation: 95MHz
Channel Bandwidth: 200KHz
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 13
14. The Frequency Spectrum
Frequency
Frequency Range Downlink
Uplink Frequency Point
Spectrum (MHz) Frequency
Available
450.4~457.6 Fu(n)=450.6+0.2(n-
GSM 450 259<=n<=293 Fd(n)=Fu(n)+10
460.4~467.6 259)
478.8~486
GSM 480 Fu(n)=479+0.2(n-306) 306<=n<=340 Fd(n)=Fu(n)+10
488.8~496
824~849 Fu(n)=824.2+0.2(n-
GSM 850 128<=n<=251 Fd(n)=Fu(n)+45
869~894 128)
0<=n<=124
E-GSM 880~915 Fu(n)=890+0.2n
975<=n<=102 Fd(n)=Fu(n)+45
900 925~960 Fu(n)=890+0.2(n-1024)
3
0<=n<=124
R-GSM 876~915 Fu(n)=890+0.2n
955<=n<=102 Fd(n)=Fu(n)+45
900 921~960 Fu(n)=890+0.2(n-1024)
3
1850~1910 Fu(n)=1850.2+0.2(n-
PCS 1900 512<=n<=810 Fd(n)=Fu(n)+80
HUAW I T CH
E E NOL
1930~1990 L D.
OGIE CO., T
S
512) reserved
All rights
Page 14
15. Frequency Reuse
The frequency resource of mobile system is very limited.
The different Subscribers can use the same frequency in
different places.
The quality of communication must be ensured.
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 15
17. Frequency Reuse
5 7
1 3
9 11
6 8
2 4
10 12
R
4 site X 3 cells reuse
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 17
18. Cell Types
Omni
Omni-directional Cell
1
1
120
120 Degree Cell degree 2
3
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 18
19. Chapter 1 GSM System Overview
Chapter 2 GSM Network Structure
Chapter 3 Service Area and Number Planning
Chapter 4 Channels on the Wireless Interface
Chapter 5 Radio Techniques
Chapter 6 GPRS & EDGE Introduction
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 19
20. GSM-GPRS Network Component
PSTN
MSC/VLR GMSC ISDN
GSM /GPRS BSS
BSC
MS HLR/AUC
BTS
PCU
SS7
BSC SMS system
MS
BTS
GPRS Backbone Internet,
SGSN Intranet
GGSN
OMC CG BG
Other PLMN
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 20
21. Interface Between Different Entities
PSTN
MSC/VLR GMSC ISDN
GSM /GPRS BSS
A
Abis BSC
MS HLR/AUC
BTS C/D/Gs
PCU
SS7
BSC Gb SMS system
MS Um Gr/Gs/Gd/Ge Gc
BTS
GPRS backbone Internet,
SGSN Gi Intranet
Ga GGSN
OMC CG BG
Gp Other PLMN
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 21
22. Mobile Station—MS
MS=ME+SIM
International Mobile Equipment Identity (IMEI)
– Mobile Equipment
International Mobile Subscriber Identity (IMSI)
– Subscriber Identity Module
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 22
23. Subscriber Identity Module – SIM
International Mobile Subscriber Identity
(IMSI)
SIM
Temporary Mobile Subscriber Identity
(TMSI)
Location Area Identity (LAI)
Subscriber Authentication Key (Ki)
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 23
24. Base Station Subsystem – BSS
MSC
The Base Station Controller –
BSC BSS
The Base Transceiver Station
TC/SM
TC/SM
– BTS
The Trans-coder – TC and
BSC
BSC
Sub multiplexer (SM)
BTS
BTS
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 24
25. Packet Control Unit-----PCU
MSC
Packet data
switching
Bridge between
SGSN and BSC BSS
Provide Pb and TC/SM
TC/SM GPRS
Backbone
Gb interface
BSC
BSC PCU
PCU SGSN
SGSN
BTS
BTS
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 25
26. The Network Switching System
NSS AUC
AUC
HLR
HLR
OMC EIR
EIR
EC
EC PSTN
MSC/VLR
MSC/VLR
Mobile-service Switching Center – MSC
Home Location Register – HLR
Visitor Location Register – VLR
Equipment Identity Register – EIR
Authentication Center – AUC BSS
Echo Cancellor – EC
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 26
27. Mobile-service Switching Center – MSC
Call Processing
Operations and Maintenance Support
Interface management
Inter-network & Inter-working
Billing
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 27
28. Home Location Register – HLR
Subscriber ID (IMSI and MSISDN)
Current subscriber VLR (current location)
Supplementary service information
Subscriber status (registered/deregistered)
Authentication key and AuC functionality
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 28
29. Visitor Location Register – VLR
Mobile Status (IMSI attached / detached / busy / idle etc.)
Location Area Identity(LAI)
Temporary Mobile Subscriber Identity(TMSI)
Allocating the Roaming Number
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 29
30. Equipment Identity Register – EIR
White List
Black List IMEI is Checked In White List
Grey List
If NOT found
EIR focus on the
IMEI is Checked in Black/Grey List
equipment , not the
subscriber!!
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 30
31. OMC Functional Architecture
Event/Alarm Security
Management Management
MMI
OS DB
Fault Configuration
Management Management
Performance
Management
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 31
32. Chapter 1 GSM System Overview
Chapter 2 GSM Network Structure
Chapter 3 Service Area and Number Planning
Chapter 4 Channels on the Wireless Interface
Chapter 5 Radio Techniques
Chapter 6 GPRS & EDGE Introduction
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 32
33. Service Area
Service Area
PLMN service area
PLMN service area PLMN service area
MSC service area... MSC service area...
Location area... Location area...
......
cell cell
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 33
34. LAI
MCC MNC LAC
Location Area Identification
The LAI is the international code for a location area.
MCC: Mobile Country Code , It consists of 3 digits .
For example: The MCC of China is "460"
MNC: Mobile Network Code , It consists of 2 digits .
For example: The MNC of China Mobile is "00"
LAC: Location Area Code , It is a two bytes hex code.
The value 0000 and FFFF is invalid.
For example: 460-00-0011
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 34
35. CGI
CGI: Cell Global Identification
The CGI is a unique international identification for a cell
The format is LAI+CI
LAI: Location Area Identification
CI: Cell Identity. This code uses two bytes hex code to
identify the cells within an LAI.
For example : 460-00-0011-0001
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 35
36. BSIC
BSIC ( Base Station Identification Color Code)
NCC BCC
BSIC
NCC: PLMN network color code. It comprises 3 bit. It
allows various neighboring PLMNs to be
distinguished.
BCC: BTS color code. It comprises 3 bit, used to
distinguish different cells assigned the same
frequency!
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 36
37. MSISDN
CC NDC SN
National (significant)
Mobile number
Mobile station international
ISDN number
CC: Country Code. For example: The CC of China is "86".
NDC: National Destination Code. For example: The NDC of
China Telecom is 139, 138, 137, 136, 135.
SN: Subscriber Number. Format:H0 H1 H2 H3 ABCD
Example: 86-139-0666-1234
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 37
38. IMSI
Not more than 15 digits
3 digits 2 digits
MCC MNC MSIN
NMSI
IMSI
MCC: Mobile Country Code , It consists of 3 digits .
For example: The MCC of China is "460" 。
MNC: Mobile Network Code , It consists of 2 digits .
For example: The MNC of China Telecom is "00" 。
MSIN: Mobile Subscriber Identification Number. H1H2H3 S ABCDEF
For example: 666-9777001
NMSI: National Mobile Subscriber Identification , MNC and MSIN
form it together.
For Example of IMSI : 460-00-666-9777001
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 38
39. TMSI
TMSI: Temporary Mobile Subscriber Identification)
The TMSI is assigned only after successful subscriber
authentication.
The VLR controls the allocation of new TMSI numbers and notifies
them to the HLR.
TMSI is used to ensure that the identity of the mobile subscriber
on the air interface is kept secret.
The TMSI consists of 4 bytes( 8 HEX numbers) and determined by
the operator.
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 39
40. IMEI
IMEI: International Mobile Station Equipment Identification
TAC FAC SNR SP
IMEI
TAC: Type approval code, 6 bit, determined by the type approval center
TAC: Type approval code, 6 bit, determined by the type approval center
FAC: Final assembly code, 2 bit, It is determined by the manufacturer.
FAC: Final assembly code, 2 bit, It is determined by the manufacturer.
SNR: Serial number, 6 bits, It is issued by the manufacturer of the MS.
SNR: Serial number, 6 bits, It is issued by the manufacturer of the MS.
SP: 1 bit ,, Not used.
SP: 1 bit Not used.
Check the IMEI in your MS :: *#06#
Check the IMEI in your MS *#06#
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 40
41. Chapter 1 GSM System Overview
Chapter 2 GSM Network Structure
Chapter 3 Service Area and Number Planning
Chapter 4 Channels on the Wireless Interface
Chapter 5 Radio Techniques
Chapter 6 GPRS & EDGE Introduction
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 41
42. Physical Channel and Logical Channel
The physical channel is the medium over which the
information is carried: 200KHz and 0.577ms
The logical channel consists of the information carried
over the physical channels
0 1 2 3 4 5 6 7 0 1 2 3
Timeslot The information carried in one time
The information carried in one time
slot is called a “burst”
slot is called a “burst”
TDMA FRAME TDMA FRAME
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 42
43. Two types of Logical Channel
Traffic Channel (TCH) :
Transmits traffic information, include data
and speech.
Control Channel (CCH) :
Or Signaling Channel, transmits all kinds of
control information.
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 43
44. Traffic Channel (TCH)
TCH
Traffic Channels
Speech Data
TCH/FS TCH/HS
TCH/9.6 TCH/2.4
TCH Traffic Channel
TCH/FS Full rate Speech Channel
TCH/HS Half rate Speech Channel
TCH/9.6 Data Channel 9.6kb/s
TCH/4.8 Data Channel 4.8kb/s TCH/4.8
TCH/2.4 Data Channel 2.4Kb/s
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 44
45. Control Channel (CCH)
CCH (Control Channels)
DCCH BCH
SDCCH ACCH
BCCH Synch. CH.
FACCH SACCH CCCH
SCH FCCH
Broadcast Control Channel – BCCH RACH CBCH
Common Control Channel – CCCH
Dedicated Control Channel – DCCH
Associated Control Channel – ACCH PCH/AGCH
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 45
46. Broadcast Control Channel – BCCH
CCH
The information carried on the BCCH
is monitored by the MS
BCH
periodically when it is in idle mode
BCCH: Broadcast Control Channel
FCCH: Frequency Correction Channel Synch.
BCCH Channels
SCH: Synchronization Channel
SCH FCCH
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 46
47. Common Control Channel – CCCH
The CCCH is responsible for CCH
transferring control information
between all mobiles and the
network.
CCCH
RACH: Random Access Channel
PCH: Paging Channel
RACH CBCH
AGCH: Access Granted Channel uplink downlink
CBCH: Cell Broadcast Channel
PCH/AGCH
downlink
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 47
48. Dedicated Control Channel – DCCH
CCH
DCCH is assigned to a single
wireless connection for
measurement and handover
purpose. DCCH
SDCCH: Stand-alone Dedicated
Control Channel
ACCH: Associated Control Channel
SACCH: Slow Associated SDCCH ACCH
Control Channel
FACCH: Fast Associated Control
Channel
FACCH SACCH
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 48
49. Uplink Logical channel
CCH
RACH CCCH
SDCCH
SACCH DCCH DCH
FACCH
TCH/F
TCH
TCH/H
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 49
50. Downlink Logical channel
FCCH
BCCH SCH
CCH BCCH
PCH
CCCH
AGCH
SDCCH
DCCH SACCH
DCH FACCH
TCH/F
TCH
TCH/H
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 50
51. How to use these channels?
Power-off
Search for frequency correction burst FCCH
Search for synchronous burst SCH
Extract system information BCCH
Idle mode
Monitor paging message
PCH
Send access burst
RACH
Allocate signaling channel
Dedicated mode
AGCH
Set up the call SDCCH
Allocate voice channel SDCCH
Conversation TCH
Release the call FACCH
Idle mode
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 51
52. Packet logic channel
Packet data channel (PDCH) TCH
Comprising packet service channel and packet control channel
TCH
Packet service channel (PDTCH)
Combined into the single-directional service channel
BCCH
Packet control channel
CCCH
SACCH
Broadcast control channel: PBCCH
Public control channel: PPCH, PRACH, PAGCH
Private control channel: PACCH, PTCCH
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 52
53. GSM Logical Channel Combination
Main BCCH combination – FCCH + SCH + BCCH + CCCH
SDCCH combination – SDCCH/8 + SACCH/8
Combined BCCH – BCCH + CCCH +SDCCH/4 + SACCH/4
TCH/FR combination – TCH/F + FACCH/F + SACCH/F
TCH/HR combination – TCH/H + FACCH/H + SACCH/H
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 53
54. Combination of packet logic channel
Packet logic channels (PDCH) can be combined via the following three modes
Mode 1: PBCCH+PCCCH+PDTCH+PACCH+PTCCH;
Mode 2: PCCCH+PDTCH+PACCH+PTCCH;
Mode 3: PDTCH+PACCH+PTCCH
In case of small GPRS traffic, GPRS and circuit services use the same BCCH
and CCCH in the cell. In this case, only combination mode 3 is needed in the cell
With the increase of traffic, the packet public channel should be configured in the
cell. Channel combination mode 1 and mode 2 should be adopted
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 54
55. GSM Multi-frames
TDMA Frames
0 1
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0 1 2 3 4 46 47 48 49 50
51 – Frame Multi-frames
CONTROL
CHANNELS
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 55
56. GSM Multi-frames
TDMA Frames
0 1
0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
0 1 2 3 4 21 22 23 24 25
26 – Frame Multi-frames
TRAFFIC
CHANNELS
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 56
57. Chapter 1 GSM System Overview
Chapter 2 GSM Network Structure
Chapter 3 Service Area and Number Planning
Chapter 4 Channels on the Wireless Interface
Chapter 5 Radio Techniques
Chapter 6 GPRS & EDGE Introduction
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 57
58. Power Control
Both Uplink and Downlink
power settings can be
controlled independently
5W
and individually.
0.8W
Saves battery power
Reduces co-channel and
adjacent channel interference
8W
BCCH -------
Does not attend Power control
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 58
59. DTX and VAD
Discontinuous Transmission – DTX
Voice Activity Detection – VAD
Battery Saving
Interference reduction
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 59
60. Timing Advance (TA)
The mobile phone should
send the signal in advance!
TA
Transmission delay t
Transmission delay t
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 60
61. Multi-path Fading
Diversity
Frequency Hopping
Time Dispersion
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 61
62. Diversity – What’s Diversity?
Receive diversity provides an effective technique for both
overcoming the impact of fading across the radio channel and
increasing the received signal to interference ratio.
The former is achieved by ensuring “uncorrelated” (i.e. low enough
correlated) fading between antenna branches i.e. not all antennas
experience fades at the same time.
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 62
63. Kinds of Diversity t
Time diversity
Coding, interleaving
Frequency diversity
f
Frequency hopping
Space diversity
Multiple antennas
Polarization diversity
Dual-polarized antennas
Multi-path diversity
Equalizer
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 63
64. Frequency Hopping
Frequency
f0
f1
f2
f3
f4
Frame
Time
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 64
65. Chapter 1 GSM System Overview
Chapter 2 GSM Network Structure
Chapter 3 Service Area and Number Planning
Chapter 4 Channels on the Wireless Interface
Chapter 5 Radio Techniques
Chapter 6 GPRS & EDGE Introduction
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 65
66. GSM Development Evolution
3G
2Mbps
2.5G IMT-2000
384kbps
EDGE
2G 115 kbps
57.6 kbps GPRS
9.6 kbps HSCSD
GSM
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 66
67. Data rate of EDGE and GPRS
Kbps 59.2
60.0
54.4
50.0 GPRS 44.8
EGPRS
40.0
29.6
30.0
21.4 22.4
20.0 17.6
15.6 14.8
13.4
11.2
9.0 8.8
10.0
0.0
CS-1 CS-2 CS-3 CS-4 MCS-1 MCS-2 MCS-3 MCS-4 MCS-5 MCS-6 MCS-7 MCS-8 MCS-9
GMSK 8PSK
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 67
68. Huawei EDGE Test Result
Downlink, 4 TS, MCS-9 :
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 68
69. The basic idea of GSM
Summary
The frequency spectrum used in GSM
The structure of GSM
Certain service area and numbers
Some radio techniques used in GSM
Evolution of GSM
HUAW I T CH
E E NOL OGIE CO., L D.
S T All rights reserved
Page 69
When the MS is in idle mode, the time sequence within the MS can be adjusted via the SCH channel. However, the mobile station does not know how far it is away from the base station. If the distance between the MS and the base station is 30km, the time sequence of the MS will be 100μs slower than that of the base station. When the mobile phone sends its first RACH signal, it is already 100μs later. For there is still another 100μs of transmission delay, when the signal reaches the base station, the total delay is 200μs . It is very possible that the signal collides with the pulse of the adjacent timeslot around the base station. Therefore, RACH and some other channel access pulses will be shorter than other pulses. Only after receiving the time sequence adjustment signal (TA) from the base station, MS can send pulses of normal length. In this case, the MS needs to send signals by 200μs in advance.