VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...Vikas Shokeen
Complete End to End Tutorial on Fundamentals & Basics of VoLTE , IMS Technology & VoLTE Overview ( Voice Over LTE )
- What is VoLTE
- Network Evolution to VoLTE
- How to Enable VoLTE in handset
- Differences between VoLTE & CSFB Call
- Voice call in LTE & VoLTE Networks
- Evolution of Voice Call
- VoLTE - Benefits for Users
- VoLTE - Benefits for Operators
- VoLTE Challenges
- Congestion handling for VoLTE Traffic
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...Vikas Shokeen
Complete End to End Tutorial on Fundamentals & Basics of VoLTE , IMS Technology & VoLTE Overview ( Voice Over LTE )
- What is VoLTE
- Network Evolution to VoLTE
- How to Enable VoLTE in handset
- Differences between VoLTE & CSFB Call
- Voice call in LTE & VoLTE Networks
- Evolution of Voice Call
- VoLTE - Benefits for Users
- VoLTE - Benefits for Operators
- VoLTE Challenges
- Congestion handling for VoLTE Traffic
Global system for mobile communication(GSM)Jay Nagar
~Introduction
~GSM Architecture
~GSM Entities
~SMS Service In GSM
~Call Routing In GSM
~PLMN Interfaces
~GSM Addresses and Identifiers
~Network aspects in GSM
~Handover
~Mobility Management
~GSM Frequency Allocation
~Authentication and Security In GSM
GSM(Global system for mobile communication ) is a second generation cellular standard developed to cater voice services and data delivery using digital modulation.
Global system for mobile communication(GSM)Jay Nagar
~Introduction
~GSM Architecture
~GSM Entities
~SMS Service In GSM
~Call Routing In GSM
~PLMN Interfaces
~GSM Addresses and Identifiers
~Network aspects in GSM
~Handover
~Mobility Management
~GSM Frequency Allocation
~Authentication and Security In GSM
GSM(Global system for mobile communication ) is a second generation cellular standard developed to cater voice services and data delivery using digital modulation.
• There are many types of cellular services; before delving into details, focus on basics (helps navigate the “acronym soup”)
• Cellular network/telephony is a radio-based technology; radio waves are electromagnetic waves that antennas propagate
• Most signals are in the 850 MHz, 900 MHz, 1800 MHz, and 1900 MHz frequency bands
IT2255 Web Essentials - Unit II Web Designingpkaviya
HTML - Form Elements - Input types and Media elements - HTML 5 - CSS3 - Selectors, Box Model, Backgrounds and Borders, Text Effects, Animations, Multiple Column Layout, User Interface.
IT2255 Web Essentials - Unit I Website Basicspkaviya
Internet Overview – Fundamental computer network concepts – Web Protocols – URL – Domain Name – Web Browsers and Web Servers – Working principle of a Website – Creating a Website – Client-side and server-side scripting.
BT2252 - ETBT - UNIT 3 - Enzyme Immobilization.pdfpkaviya
Enzymes are catalysts that perform all vital biological reactions within an organism’s body. Their distinguishing characteristic is that they endure the reaction unchanged.
Therefore, they can be utilised repeatedly. However, soluble enzymes are limited by their separation from the product and substrate.
The majority of Enzymes in a living organism are either connected to the cell membrane or encapsulated within the cells.
This result led to the hypothesis that pure separated enzymes may work better when immobilised on a solid substrate.
The phrase immobilised enzyme refers to “catalytically active enzymes that are physically limited or localised in a specific region of space and can be used again and continuously.”
The benefit of immobilisation is that it promotes work-up product isolation. Listed below are some potential advantages and disadvantages of immobility.
Soluble Enzyme + Substrate———– Product (single time usage of enzyme)
Immobilized Enzyme + Substrate———Product (Repeated usage of enzyme)
A number of essential considerations must be made when immobilising an enzyme.
The enzyme’s biological activity should be maintained.
The enzyme ought to be more stable than its soluble equivalent.
The price of immobilisation shouldn’t be excessively high.
The relationship between humans and enzymes has evolved over time. Even during historical times, where there was no concept of enzymes, ancient Egypt people produced beer and wine by enzymatic fermentation. After several thousand years, enzymatic studies have significantly progressed. Enzymes are proteins that accelerate many biochemical and chemical reactions. They are natural catalysts and are ubiquitous, in plants, animals, and microorganisms, where they catalyze processes that are vital to living organisms. The growing knowledge and technique improvement about protein extraction and purification lead to the production of many enzymes at an analytical grade purity for research and biotechnological applications. Enzymes are intimately involved in a wide variety of traditional food processes, such as cheese making, beer brewing, and wine industry. Recent advances in biotechnology, particularly in protein engineering, have provided the basis for the efficient development of enzymes with improved properties. This has led to establishment of novel, tailor-made enzymes for completely new applications, where enzymes were not previously used. The technology of immobilized enzymes is still going through a phase of evolution and maturation. Evolution is reflected in the ever-broadening range of applications of immobilized enzymes. Maturation is mirrored in the development of the theory of how immobilized enzymes function and how the technique of immobilization is related to their primary structure through the formation and configuration of their three dimensional structure. There still remains much room for the development of useful processes and materials based on this hard-won understanding.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
3. Global System for Mobile
Communications (GSM)
• It provides data services in addition to voice services. (2G
Technology)
• GSM networks radio operate in four different frequencies.
• Most GSM networks operate either in the 900MHz or in the
1800MHz frequency bands.
• Some countries in the American continent (especially USA and
Canada) use the 850MHz and 1900MHz.
• The relatively rarely used 400MHz and 450MHz frequency bands
are assigned in some countries, notably Scandinavia.
• In the 900MHz band, the uplink frequency band is 890-915MHz,
and the downlink frequency band is 935-960MHz.
4. GSM Services
• GSM provides three main categories of services. These
are:
• Bearer services
• Teleservices
• Supplementary services
5. GSM Services – Bearer services
• Subscribers can send and receive data to/from remote computers
or mobile phones at 300 - 9600bps.
• These services also enable the transparent transmission of data
between GSM and other networks like PSTN, ISDN, etc.
• They are implemented on lower-three layers of OSI reference
model.
• It provides email, voice mailbox, internet access.
• It is also called as GSM data services.
• It permits either transparent (or) non-transparent, synchronous
(or) asynchronous data transmission.
6. GSM Services – Bearer services
• Transparent bearer services
• Uses functions of physical layer.
• Constant delay and throughput if no transmission errors occur.
• FEC (Forward Error Correction) is used to increase the quality
of data transmission.
• Non-transparent bearer services
• Uses protocols from layer II and III to implement Error
correction and Flow control
• Radio Link Protocol (RLP) is used to provide high level data link
control.
7. GSM Services – Teleservices
• Telephony
• High quality digital voice transmission of bandwidth 3.1 kHz.
• Special codecs are also used for voice transmission.
• Emergency number
• Even when out of coverage area, subscriber can call some emergency numbers.
• The same number is used throughout an area..
• This service is free of cost and mandatorily provided by all service providers.
• This connection will automatically be set up with the closest emergency centre.
• Short Messaging Service
• Using signaling channels, full duplex SMS can be sent and received of size 160
characters.
• Fax
• Analogue fax data can be converted to digital data using MODEM and transmitted
over analog telephone network.
8. GSM Services – Supplementary
services• User identification, call redirect, call forward, etc.
• Standard ISDN features such as ‘close user group’ and
‘multiparty’ communication are available. (conference
calls)
9. System Architecture of GSM
• A GSM system consists of three main subsystems:
• Radio Subsystem (RSS)
• Networking and Switching Subsystem (NSS)
• Operation Subsystem (OSS)
12. Radio Subsystem
• It contains all the Radio transmitting systems.
• It consists of MS, BTS, BSS and BSC.
• Mobile Station (MS)
• A Mobile Station (MS) is also called as Cellular Phone
• It contains two main parts: SIM and Mobile Device
• SIM card
• It is made up of microcontroller to store data.
• It has ROM for contacts storage, etc
• It has PIN (Personal Identification Number)
• Mobile Device
• It has a unique IMEI number (International Mobile Equipment Identity)
• Transceiver (Transmitter + Receiver)
• It has other features such as display, keyboard, facilities such as
Bluetooth, USB, headset, etc.
13. Radio Subsystem (RSS)
• Base Station Subsystem(BSS)
• A GSM network has many BSS.
• Each BSS consists of one BSC and many BTS.
• BSS is responsible for maintaining all radio connections to an MS,
coding/decoding of voice.
• Base Transmitter Station(BTS)
• BTS consists of all radio equipment such as antenna, signal processors and
amplifiers for radio transmission.
• It encodes the received signal, modulates it on a carrier wave, and gives RF
signals to the antenna.
• It communicates with both MS and BSC.
• Base Station Controller(BSC)
• BSC assigns frequency and timeslots for all MS in its area.
• It manages handoff from one BTS to another within BSS.
• It performs multiplexing of radio signals onto fixed network connection to
the MSC.
14. Network and Switching
Subsystem (NSS)• It is the heart of GSM.
• It connects wireless networks to standard public networks.
• It performs amount charging for usage, accounting, roaming.
• It consists of MSC, GMSC, HLR and VLR.
• Mobile Switching Centre(MSC)
• It is the heart of the GSM network.
• It sets up connection to other MSC, and other Public Data Networks (PDN).
• It is responsible for connection setup, connection release, and call handoff to
other MSCs.
• Gateway Mobile Switching Centre(GMSC)
• It performs gateway functions when customers roam to other networks.
• It also provides supplementary services such as call forwarding, conference
calls, etc.
15. Network and Switching
Subsystem (NSS)• Home Location register (HLR)
• It is a database to store important information of each subscriber.
• It contains IMSI, prepaid(or)post paid, current location, etc.
• Visitor Location Register(VLR)
• It is a temporary database to store information about a new MS when it
enters the coverage area (roaming).
• It gets information about MS from HLR.
• It reduces the number of queries to HLR and make the user feel as if he
were in his home network.
16. Operation Subsystem (OSS)
• It is needed for all network operations and maintenance.
• It contains OMC, AuC and EIR.
• Operation and Maintenance Center
• It checks all other network entities
• It checks traffic, subscribers, security management, customer care,
accounting and billing.
• Authentication Centre(AuC)
• It protects the network against intruders and attackers.
• It has information about user authentication and encryption.
• It is related to HLR
• Equipment Identity Register(EIR)
• It is a database to track handsets using IMEI number.
• It helps to block calls from stolen, unauthorized, or defective mobiles.
17. GSM Security
• Security in GSM is broadly supported at three levels: operator’s level,
customer’s level, and system level.
• These three levels help oversee aspects such as correct billing to the
customer, avoiding fraud, protecting services, and ensuring anonymity.
• Authentication
• Protects the mobile network from hackers.
• GSM network operator verifies identity of subscribers.
• It can be achieved by using a password such as Personal Identification Number
(PIN).
• This method is not very secure in GSM networks.
• Confidentiality
• GSM protects voice, data and other information (dialed digits) against
eavesdropping on the radio path.
• Encryption techniques are used between the Mobile Equipment (ME) and the BTS
which protects user traffic and sensitive signaling data against eavesdropping.
18. GSM Security
• Anonymity
• Anonymous means unknown.
• GSM network makes the following information anonymous: location,
outgoing and incoming calls, etc.
• Thus it is difficult to track the sensitive information.
19. GSM Advantages
• Crisper, cleaner quieter calls.
• Security against fraud and eavesdropping.
• International roaming capability in over 100 countries.
• Improved battery life.
• Efficient network design for less expensive system expansion.
• Efficient use of spectrum.
• Advanced features such as short messaging and caller ID.
• A wide variety of handsets and accessories.
• High stability mobile fax and data at up to 9600 baud.
• Ease of use with over the air activation, and all account
information is held in a smart card which can be moved from
handset to handset.
21. GSM Protocol Architecture
• Physical Layer: performs all radio specific functions.
• Transfers data in form of burst creates frame keeping the
following:
• Multiplexing of Burst (FDMA/TDMA)
• Syn with BTS
• Detection of Idle channels
• Modulation / Demodulation
• Measurement of channel quality
• Providing encryption / decryption not end to end (between BTS / MS)
• Always different RTT between MS and BTS so it have to maintain syn.
• Employs FEC – Forward error correction scheme
• VAD – Voice Activity Detection – Tx-its only if there is voice signal. If
there silence transmits some comfort noise signal is generated.
22. GSM Protocol Architecture
• Signaling b/w GSM entities require higher layers so we
employ LAPDm – defined at Um interface for layer two.
• LAPPM – Link Access procedure for D Channel same as HDLC
(bit Oriented Protocol) light weight LAPD – LAPDM. Some
function are reduced in LAPDM.
• Performs segmentation & reassembly of data
• RR – Radio resource mgmt. Setup, maintain and release
radio channel. The functions of RR are supported by BSC
via BTSM
• BTSM - BTS mgmt (base tx-er system)
• BSSAP - Base station service application part
23. GSM Protocol Architecture
• MM- Mobility Management
• Registration, authentication, identification of location, changing IMSI
by TMSI
• Call Management (CM)
• Call Control - CC
• Short Message Service - SMS
• Supplementary Service - SS
• DTMF-Dual Tone Multiple frequency
• Mobile banking received at rx-er without distortion eg. sending pin
no.
• SS7 - used for signaling b/w MSC and BSC.
• Transfers all mgmt info b/w MSC, HLR, VLR, AuC, EIR, OMC
• MSC control BSS via BSSAP – BSS Application part
25. Call gets connected in Mobile
Phones
• There are many systems operating in the background for
connecting a call, maintenance and conclusion of calls.
• Two types of calls TO and FROM the mobile phone.
• The call to a mobile unit from another mobile unit (or) a fixed
landline is called as MTC.
• Call initiated by a Mobile Station to another mobile station or a
fixed landline is called as MOC.
27. MTC – Mobile Terminated Call -
Series of events1. User dials GSM number
2. PSTN identifies that number and forwards the call to GMSC
3. GMSC identifies HLR of the caller and makes call setup
4. HLR checks if the number exist or not, and requests MSRN from current VLR
5. VLR sends MSRN to HLR
6. HLR finds the suitable MSC for completing the call and forwards the information
to GMSC
7. GMSC forwards the call setup request to MSC
8. MSC asks VLR about current status of MS
9. VLR replies MSC about current status of MS
10. If MS is available, MSC initiates paging in all cells
11. BTS broadcasts paging information to all BSS
12. MS answers for paging information to BSS
13. BSS forwards paging information to MSC
28. MTC – Mobile Terminated Call -
Series of events
14. MSC forwards paging information to VLR for security check
15. VLR tells MSC to complete the call connection to MS
16. MSC tells BSS to complete the call connection to MS
17. BSS connects call to MS
•Mobile user does not know all these 17 events happening.
•Now the call is cleared for setup.
•Channel access is done through Random Access Channel
•Now the connection is changed to encrypted mode
•User is alerted by Ring tone.
•If user accepts the call, connection is continued.
•After call is disconnected, channel and the connection is released.
30. MOC - Mobile Originated Call -
Series of Events
1. MS sends request to BSS for a new call connection
2. BSS forwards request to MSC
3. MSC asks VLR about callee status
4. VLR replies the status
5. GMSC asks PSTN for availability of callee.
6. Verification is done at PSTN
7. PSTN replies the verification information to GMSC
8. GMSC tells MSC that callee is available
9. MSC sets a connection with BSS
10. BSS sets a connection with MS.
31. MOC - Mobile Originated Call -
Series of Events
• Mobile user does not know all these 10 events happening.
• Now the call is cleared for setup.
• Channel access is done through Random Access Channel
• Now the connection is changed to encrypted mode
• User is alerted by Ring tone.
• If user accepts the call, connection is continued.
• Paging is not needed in MOC
• After call is disconnected, channel and the connection is released.
32. GSM Handover
• The mobile (MS) moves out of one cell to another it must be possible
to retain the connection. The process by which this occurs is known
as handover or handoff.
• When MS moves away from BTS, Signal Strength increase, error rate
decrease quality of radio cell diminishes.
• Load balancing – more MS are there it is overloaded so it moves some
MS to another Radio cell. Handover should not result in cell cut off /
cell drop.
• Intra cell handover - changes the carrier frequency since the
narrowband interference makes transmission impossible at certain
range.
• Inter cell, intra BSC Handover - moves b/w cell but stays within
the same BSC.
• Inter BSC, intra MSC - moves from one BSC to another but stays
within the same MSC.
• Inter MSC Handover - moves from one MSC to another.
35. General Packet Radio Service
(GPRS)
• It is combined with GSM for improving internet access.
• Transfers data packets from GSM mobiles to packet data networks (PDN).
• Packets can be directly routed from GPRS mobiles to packet-switched
networks, therefore easy to connect to internet.
• In GSM, it is charged for duration of connection, but in GPRS, it is charged
for amount of data packets transmitted.
• GSM is for voice communication (2G).
• But then, there was a need for data communication.
• 9.6 kbps speed of GSM was not sufficient for data communication
• Therefore GPRS has evolved.
• File upload and download, web browsing and email exchanging are some
of the features of GPRS.
36. GPRS Services
• GPRS offers end-to-end packet-switched data transfer
services which can be categorized into the following types:
• Point-to-Point (PTP) service
• The PTP service is between two users and can either be
connectionless or connection-oriented.
• Point-to-Multipoint (PTM) service
• The PTM is a data service from one user to multiple users.
• There are two types of PTM services.
• Multicast PTM – The data packets are broadcast in a certain area.
• Group call PTM – The data packets are addressed to a group of
users.
37. GPRS Architecture
• It is the extension of GSM architecture.
• In GPRS, data is transmitted in packets.
• It is flexible and more powerful.
• It works on packet switching, not circuit switching.
• It gives better QoS (Quality of Service).
• It allows broadband broadcast, multicast and unicast.
• Additional hardware and software is required.
• Data transfer rate up to 150 kbps.
41. GPRS Architecture
• SGSN and GGSN are the newly introduced elements.
• SGSN – Servicing GRPS Support Node
• GGSN – Gateway GPRS Support Node
• SGSN acts like a router. All SGSN are connected to a standard GSM
architecture
• GGSN is the internetworking unit between the GPRS network and PDN.
• GGSN contains routing information for GPRS users, performs address
connection and securely tunnels data to a user through encapsulation.
• GGSN is connected to an external network and it transfers packets to SGSN
through IP-based GPRS backbone network.
• SGSN helps support MS. It is connected to BSC through frame relay. It is at the
same hierarchy level as the MSC.
• The GPRS Register (GR) is a part of HLR which stores all relevant GPRS data.
• Data packets are transmitted to the BSS and finally to MS through GGSN and
SGSN
42. GPRS Advantages and
Limitations• Advantages
• Machine-to-machine data communication
• lower service charges
• Compatible with E-mail, broadcast services, and web browsing
• Web-based services, e-Commerce, and advertising is also supported (High
speed packet-switched communication supported by GPRS)
• Limitations
• Reduced cell capacity
• Transmission delay
• No storage mechanism
44. GPRS Protocol Architecture
• GTP – GPRS Tunneling Protocol: All the data within GPRS
backbone transferred using GTP.
• GTP can use two different protocols (TCP-reliable / UDP-unreliable).
• SNDCP – Subnetwork Dependent Convergence Protocol: To
adapt to the different characteristics of the underlying networks.
Used between an SGSN and the MS.
• BSSGP - Base Station Subsystem GPRS Protocol: Conveys
routing information & QoS related information between BSS and
SGSN.
• FR – Frame Relay: performs error correction.
• LLC – Logical Link Protocol: To achieve a high reliability of packet
transfer between SGSN and MS. Uses ARQ and FEC mechanisms for
PTP & PTM services.
• RLC - Radio Link Protocol: Provides reliable link.
• MAC: Controls access with signaling procedure.
46. Universal Mobile
Telecommunications System
(UMTS)• CDMA2000 & UMTS are the 3G standards approved by ITU. It is developed in Europe.
• In these networks, coverage is provided by a combination of various cell sizes, ranging
from “in building” pico cells to global cells provided by satellites, giving service to the
remote regions of the world.
• Countries with GSM (2G) can only use UMTS (3G). GSM networks will be upgraded to
UMTS networks. It is also called as 3G cellular networks.
• Advantage: It gives significantly enhanced capacities to operators.
• UTRA - Radio Transmission Technology is used.
• UMTS systems are compatible with GSM networks. UMTS networks can easily work with
any existing GSM/GPRS network.
• The UMTS systems use different frequency bands, so that BTSs do not interfere with
each other.
• Minimum data rate of 144kbps – rural outdoor access at a speed of 500kmph.
• Minimum data rate of 384kbps – suburban outdoor access at a speed of 120 kmph.
• Maximum data rate of 2Mbps – urban indoor use at a speed of 10kmph.
47. Universal Mobile
Telecommunications System
(UMTS)• The UMTS network is different from the 2G networks in the
following respects:
• Higher speech quality: In addition to speech traffic, it supports
advanced data and information service – true multimedia
network
• Higher data rate: The UMTS supports 2 Mbps data rate much
higher than 2G
• Virtual home environment (VHE): A user roaming from his
network to other UMTS network will not feel any discontinuity or
service difference – giving the feeling of being in the home
network. In 2G a user registered to a visitor location and is also
charged a roaming overheads.
48. UMTS Network Architecture
• The UMTS network architecture is divided into three main elements
• User Equipment (UE),
• Radio Network Subsystem(RAN)
• Core Network
49. UMTS Network Architecture
• User Equipment (UE)
• Mobile phone or cellular phone.
• It contains USIM(Universal SIM), Battery, RF circuitry.
• UE incorporates greater functionality and it is compared to a cell
phone.
• It can be thought of as both a mobile phone used for talking and a
data terminal attached to a computer with no voce capability.
• Radio Network Subsystem (RNS)
• UMTS Radio Access Network(UTRAN).
• It is like BSS in GSM.
• It provides and manages the wireless interface for overall network.
• Core Network
• It provides CPU for the system.
• It is like Network Switching Subsystem(NSS) in GSM.
• It contains MSC, GMSC, SGSN, GGSN, EIR, AuC.