SlideShare a Scribd company logo
Network Design and Technologies(Unit-III)
Dr.M.Rajendiran
Dept. of Computer Science and Engineering
Panimalar Engineering College
Contents
GSM-Mobility Management and Call Control
GRPS-Network elements
Radio Resource Management
Mobility Management and Session Management
Small Screen Web Browsing over GPRS and EDGE
MMS over GRPS
UMTS-Channel Structure on the Air Interface
UTRAN-Core and Radio Network Mobility Management
UMTS Security
2
GSM - Mobility Management and Call Control
Mobility management is one of the major functions of a GSM or a UMTS
network that allows mobile phones to work.
The aim of mobility management is to track where the subscribers are,
allowing calls, SMS and other mobile phone services to be delivered to
them.
3
Mobility Management and Call Control
1.Call Reselection and Location Area Update
2.The Mobile-Terminated Call
3.Handover Scenarios
4
Mobility Management and Call Control-Call Reselection and Location Area Update
The network able to forward an incoming call, the subscriber’s
location must be known.
The mobile device is switched on, its first action is to register with
the network.
Therefore, the network becomes aware of the current location of
the user.
If the user roams into the area of a new cell, it need to inform the
network.
To reduce the signaling load in the radio network, several cells are
grouped into a location area.
The network informs the mobile device via the BCCH(Broadcast
Control Channel).
5
Mobility Management and Call Control-Call Reselection and Location Area Update
 Grouping several cells into location
areas, the power consumption of the
mobile.
 A disadvantage of this method is that
the network operator is only aware of
the current location area of the
subscriber.
 The network has to search for the
mobile device in all cells of a location
area for an incoming call or SMS, called
paging.
 The size of a location area can be set
by the operator.
 Usually 20 to 30 cells are grouped into a
location area (Figure 1.40).
6
Mobility Management and Call Control-Call Reselection and Location Area Update
 Figure 1.41 shows how a location
area update procedure is performed.
 *
7
Mobility Management and Call Control-Call Reselection and Location Area Update
 The mobile measures the signal strengths of the
serving cell and of the neighboring cells.
 Neighboring cells can be found based on their
transmission frequency is announced on the
Broadcast Control CHannel (BCCH).
 A signal is received with −100 dBm (decibel-
milliwatts) - it is very far away from the base
station, −60 dBm, is very close to the base
station.
 It referred to as the Received Signal Strength
Indication (RSSI).
 The signal of a neighboring cell becomes
stronger than the signal of the current cell by a
value that can be set by the network operator.
 If the LAC(Location Area Code) is different from
previous cell a location update procedure is
started.
 The mobile device sends a location update
request message, after a signaling connection
has been established.
 *
8
Mobility Management and Call Control-Call Reselection and Location Area Update
 The mobile device needs to authenticate and
ciphering is activated.(Fig:1.15)
 Once the connection is secured, the mobile
device is usually assigned a new
TMSI(Temporary Mobile Subscriber Identity)
by the network.
 Once TMSI reallocation has been performed,
the location area update message is sent to
the network.
 If the old and new location areas are under
the administration of two different MSC(Mobile
Switching Center's) / VLRs(Visitor Location
Register), a number of additional steps are
necessary.
 The new MSC/VLR has to inform the
HLR(Home Location Register) that the
subscriber has roamed.
 The HLR then deletes the record of the
subscriber in the old MSC/VLR.
 This procedure is called an inter-MSC location
update.
 *
9
Mobility Management and Call Control-Call Reselection and Location Area Update
*
10
Mobility Management and Call Control- The Mobile-Terminated Call
 Incoming call for a mobile subscriber is called
a mobile-terminated call.
 The difference between a mobile network and
a fixed-line network is telephone number of
the subscriber does not hold any information.
 In the mobile network, it is necessary to query
the HLR for the current location of the
subscriber before the call can be forwarded.
 Figure 1.42 shows the first part of the
message flow for a mobile-terminated call
initiated from a fixed-line subscriber.
 The Gateway-Mobile Switching Center (G-
MSC) receives the telephone number
(MSISDN) of the called party via an ISUP IAM
message from the fixed-line network.
 The subsequent message flow on this
interface is as shown in Figure 1.6.
 The fixed-line network does not have to be
aware that the called party is a mobile
subscriber.
 *
11
Mobility Management and Call Control- The Mobile-Terminated Call
 Incoming call for a mobile subscriber is called
a mobile-terminated call.
 The difference between a mobile network and
a fixed-line network is telephone number of
the subscriber does not hold any information.
 In the mobile network, it is necessary to query
the HLR for the current location of the
subscriber before the call can be forwarded.
 Figure 1.42 shows the first part of the
message flow for a mobile-terminated call
initiated from a fixed-line subscriber.
 The Gateway-Mobile Switching Center (G-
MSC) receives the telephone number
(MSISDN) of the called party via an ISUP IAM
message from the fixed-line network.
 The subsequent message flow on this
interface is as shown in Figure 1.6.
 The fixed-line network does not have to be
aware that the called party is a mobile
subscriber.
 *
12
Mobility Management and Call Control- The Mobile-Terminated Call
 The G-MSC is a normal MSC(Mobile Switching
Centre) with additional connections to other
networks.
 When the G-MSC receives the IAM (Initial Address
Message) message, it sends a Send Routing
Information (SRI) message to the HLR(Home
Location Register) to locate the subscriber in the
network.
 The MSC currently responsible for the subscriber
is also called subscriber’s Visited Mobile Switching
Center (V-MSC).
 The HLR then determines the subscriber’s
IMSI(International Mobile Subscriber Identity) by
using the MSISDN(Mobile Station International
Subscriber Directory Number) to search through its
database.
 Thus, is able to locate the subscriber’s current V-
MSC.
 The HLR then sends a Provide Roaming Number
(PRN) message to the V-MSC/VLR to inform the
switching center of the incoming call.
 *
13
Mobility Management and Call Control- The Mobile-Terminated Call
 In the V-MSC/VLR, the IMSI of the subscriber,
which is part of the PRN message, is
associated with a temporary Mobile Station
Roaming Number (MSRN) which is returned
to the HLR.
 The HLR then transparently returns the MSRN
to the G-MSC.
 The G-MSC uses the MSRN to forward the
call to the V-MSC.
 This is possible as the MSRN is uniquely
identifies the V-MSC to external switches.
 The call forward from the G-MSC to the V-
MSC, an IAM message is used.
 There are transit switching centers between
the G-MSC and V-MSC.
 The MSRN is internationally unique instead of
only in the subscriber’s home network.
 In the V-MSC/VLR, the MSRN is used to find
the subscriber’s IMSI and thus the complete
subscriber record in the VLR.
 *
14
Mobility Management and Call Control- The Mobile-Terminated Call
The V-MSC continues the process and searches for the
subscriber in the last reported location area, which was saved in
the VLR record of the subscriber.
The MSC then sends a paging message to the responsible BSC.
 The BSC in turn sends a paging message via each cell of the
location area on the PCH.
15
Mobility Management and Call Control- The Mobile-Terminated Call
*
16
Mobility Management and Call Control-Call Reselection and Location Area Update
*
17
Mobility Management and Call Control-Call Reselection and Location Area Update
*
18
Mobility Management and Call Control-Call Reselection and Location Area Update
*
19
Mobility Management and Call Control-Call Reselection and Location Area Update
*
20
Mobility Management and Call Control- The Mobile-Terminated Call
 If the mobile device confirms the
incoming call with a call confirmed
message, the MSC requests the
establishment of a TCH for the voice
path from the BSC (see Figure 1.43).
 After successful establishment of the
speech path, the mobile device
returns an alerting message and thus
informs the MSC that the subscriber
is informed about the incoming call
(the phone starts ringing).
 The V-MSC then forwards this
information via the ACM to the G-
MSC.
 The G-MSC then forwards the
alerting indication to the fixed-
line switch via its own ACM
message.
 Once the mobile subscriber
accepts the call by pressing the
answer button, the mobile
device returns an Answer
Message to the V-MSC.
 An ISUP answer (ANM)
message is generated and
returned to the G-MSC.
 The G-MSC forwards this
information again via an ANM
message back to the fixed-line
switching center.
21
Mobility Management and Call Control- Handover Scenarios
one of the following handover scenarios is
used to ensure that the connection
remains established:
1.Intra-BSC handover:
 In this scenario, the current cell and the
new cell are connected to the same BSC.
2.Inter-BSC handover:
 If a handover has to be performed to a
cell which is connected to a second BSC,
the current BSC is not able to control the
handover itself as no direct signaling
connection exists between the BSCs of a
network.
 Thus, the current BSC requests the MSC
to initiate a handover to the other cell by
sending a handover request message.
 Important parameters of the message are
the cell ID and the LAC of the new cell.
Fig:Types of handover in GSM
22
Mobility Management and Call Control- Handover Scenarios
 As the MSC administers a list of all LACs
and cells under its control.
 It can find the correct BSC and request the
establishment of a TCH for the handover in
a subsequent step.
 Once the new BSC has prepared the
speech channel (TCH) in the new cell, the
MSC returns a handover command to the
mobile device.
 Once the new cell and BSC have detected
the successful handover, the MSC can
switch over the speech path and inform the
old BSC that the TCH for this connection
can be released.
3. Inter-MSC handover:
 If the current and new cells for a handover
procedure are not connected to the same
MSC, then handover procedure is more
complicated.
Fig:Types of handover in GSM
23
Mobility Management and Call Control- Handover Scenarios
 The BSC detects that the new cell is not in
its area of responsibility and forwards the
handover request to the MSC.
 The MSC also detects that the LAC of the
new cell is not part of its coverage area.
 Therefore, the MSC looks into another
table that lists all LACs of the neighboring
MSCs.
 The following terminology is introduced to
unambiguously identify the two MSCs:
 The MSC which has assigned an MSRN
at the beginning of the call is called the
Anchor-Mobile Switching Center (A-MSC)
of the connection.
 The MSC that receives the call during a
handover is called the Relay-Mobile
Switching Center (R-MSC) (Figure 1.44).
 *
24
Mobility Management and Call Control- Handover Scenarios
 The A-MSC sends an MAP handover
message to the R-MSC to perform a
handover.
 The R-MSC then asks the responsible
BSC to establish a TCH in the requested
cell and reports back to the A-MSC.
 The A-MSC then instructs the mobile
device via the still existing connection
over the current cell to perform the
handover.
 Once the handover has been performed
successfully, the R-MSC reports the
successful handover to the A-MSC.
 The A-MSC can then switch the voice
path toward the R-MSC, then the
resources in the old BSC and cell are
released.
 If the subscriber yet again changes to
another cell during the call, which is
controlled by yet another MSC, a
subsequent inter-MSC handover has
to be performed as shown in Figure
1.45.
25
Mobility Management and Call Control- Handover Scenarios
 This scenario shows that the current
relay-MSC (R-MSC 1) reports to the A-
MSC that a subsequent inter- MSC
handover to R-MSC 2 is required to
maintain the call.
 The A-MSC then instructs R-MSC 2 to
establish a channel in the requested cell.
 Once the speech channel is ready in the
new cell, the A-MSC sends the handover
command message via R-MSC 1.
 The mobile device then performs the
handover to R-MSC 2 and reports the
successful execution to the A-MSC.
 The A-MSC can then redirect the speech
path to R-MSC 2 and instruct R-MSC 1
to release the resources.
 Tandem switches might be necessary
to route the call through the network
or to a roaming network.
 However, these switches purely
forward the call and are thus
transparent in this procedure.
26
GPRS Network Elements
27
General Packet Radio Service is a packet oriented mobile data standard
on the 2G and 3G cellular communication network's global system for
mobile communications.
GPRS was established by European Telecommunications Standards
Institute
GPRS Network Elements
GPRS works in a very different way compared to the circuit-
switched GSM network.
Three new network components were introduced into the mobile
network and software updates.
 Figure 2.16 gives an overview of the components of a GPRS
network.
1.The Packet Control Unit (PCU)
2.The Serving GPRS Support Node (SGSN)
3.The Gateway GPRS Support Node (GGSN)
28
GPRS Network Elements - 1.The Packet Control Unit (PCU)
 The BSC has been designed to switch 16
kbit/s circuit-switched channels between the
MSC and the subscribers.
 It is also responsible for the handover
decisions for those calls.
 GPRS subscribers no longer have a dedicated
connection to the network.
 The BSC and its switching matrix are not
suited to handle packet-switched GPRS traffic.
 Therefore, this task has been assigned to a
new network component, the PCU.
The PCU is the packet-switched counterpart
of the BSC and fulfills the following tasks:
1. Assignment of timeslots to subscribers in the
uplink direction when requested for by the
mobile device via the RACH or Physical
Random Access Channel(PRACH).
2. Assignment of timeslots to subscribers in the
downlink direction for data arriving from the
core network.
3. Flow control of data in the uplink and
downlink directions and prioritization of
traffic.
4. Error checking and retransmission of lost
or faulty frames.
5. Subscriber paging
6. Supervising entity for subscriber timing
advance during data transmission.
29
GPRS Network Elements - 1.The Packet Control Unit (PCU)
 In order for the PCU to control the GPRS
traffic, the BSC turns over control for some of
the timeslots to the PCU.
 Redirecting timeslots in the BSC switching
matrix away from the MSC and TRAU toward
the PCU.
 The BSC simply forwards all data to and from
the PCU without any processing.
 GPRS uses GSM signaling channels like the
RACH, PCH and AGCH to establish the initial
communication and a control connection.
 When the mobile device requests for GPRS
resources from the network, the BSC receives
a channel request message for packet
access.
 The BSC forwards such packet access
request messages straight to the PCU without
further processing.
 PCU’s task to assign uplink blocks on a
PDTCH.
 The BSC forwards this return message
from the PCU to the BTS.
30
GPRS Network Elements - 1.The Packet Control Unit (PCU)
Monitoring GSM and GPRS Signaling
Messages
 In GSM, it is easy to use a network tracer to
monitor all signaling messages being
exchanged between the BSC, BTS and
Mobile Devices.
 All messages use the same logical Link
Access Procedure on the D-channel (LAPD)
channel that is dedicated LAPD timeslots on
the Abis interface.
 The traffic channels used for the voice data
are transmitted on different timeslots.
 LAPD timeslots are necessary for monitor the
signaling messages.
 Monitoring GPRS signaling messages is
more complex and sent over any GPRS
timeslot
 It is also necessary to trace user data and empty
packets on the Abis interface, which requires
more processing power and memory.
*
31
GPRS Network Elements - 1.The Packet Control Unit (PCU)
PCU Positioning
 The GSM allow for a number of different
positions of the PCU in the network.
 The most common implementation is to
have the PCU behind the BSC as shown in
Figure 2.16.
 On the basis of PCU design, some network
suppliers deliver it as one or more cards
that can be plugged into the BSC.
 Others have chosen to base the PCU on a
more powerful computing architecture.
 The PCU is implemented in a cabinet
physically independent from the BSC.
 Several BSCs are then connected to a
single PCU.
 The interface between the PCU and BSC
has not been standardized.
*
32
GPRS Network Elements – 2.The Serving GPRS Support Node (SGSN)
 The SGSN can be seen as the packet-
switched counterpart to the MSC in the circuit-
switched core network.
 Figure 2.17 shows, SGSN lies between the
radio access network and the core network.
 It is responsible for
(1) User Plane Management
(2) Signaling Plane Management.
1. User Plane Management
 The user plane combines all protocols and
procedures for the transmission of user
data frames between the subscriber and
external networks.
 All frames that arrive for a subscriber at the
SGSN are forwarded to the PCU.
 In the reverse direction the PCU delivers
data frames of a subscriber to the SGSN,
which is called the Gateway GPRS
support node (GGSN).
 IP is used as the transport protocol in
the GPRS core network between the
SGSN and GGSN.
 This is big advantage that on lower
layers a great number of different
transmission technologies can be
used.(Figure 2.17)
33
GPRS Network Elements – 2.The Serving GPRS Support Node (SGSN)
 Short distances between the network
elements, 100 Mbit/s Ethernet twisted pair
links can be used.
 Longer distances optical links are more likely
to be used.
 The capacity of the core network can be
flexibly by using IP.
 The frame relay protocol was selected to
connect the SGSN with PCU.
 The data frames between SGSN and PCU are
usually transported using E-1 links.
 Frame relay, with its similarities to ATM, was
well suited for transmitting packet data over 2
Mbit/s E-1 channels.
 The disadvantage of using frame relay, is that
the resulting complicated network
architecture.
 The SGSN has to extract the user data frames
from the frame relay protocol and forward
them via IP to the GGSN.
 ATM and IP have more common in GPRS
and UMTS radio network.
 The 3GPP GPRS standards were also
enhanced with IP and any kind of
transmission technology below on the Gb
interface.
 Ciphering for circuit-switched traffic is
terminated in the BTS.
 Ciphering for packet-switched traffic is
terminated in the SGSN as shown in Figure
2.18.
34
GPRS Network Elements – 2.The Serving GPRS Support Node (SGSN)
Advantages.
The mobile device and not the network has
control over cell changes during data
transfers.
 The network would first have to supply the
ciphering information to the new BTS before
the data transfer.
Drawback
 The processing power necessary for ciphering
is not distributed over many BTS.
 Some SGSN suppliers offer not only ciphering
in software but also hardware-assisted
ciphering.
 Some networks GPRS ciphering is not
enabled as operators can save money by
using the processing power they save for
additional user data traffic.
 *
35
GPRS Network Elements – 2.The Serving GPRS Support Node (SGSN)
2.Signaling Plane Management
 The SGSN is also responsible for the
management of all subscribers in its area.
 All protocols and procedures for user
management are handled on the signaling
plane.
 It is necessary to establish a data session with
the GPRS network to exchange data with the
Internet,
 This procedure is called Packet Data
Protocol (PDP) context activation and is
session management (SM) tasks of the
SGSN.
 Subscribers can change their location in a
mobile network frequently.
 When change their location the SGSN needs
to change its routing of packets to the radio
network accordingly.
 This task is done by the GPRS Mobility
Management (GMM) sublayer.
 When a subscriber leaves the area of
the current SGSN, GMM also contains
procedures to change the routing for a
subscriber in the core network to the
new SGSN.
 This procedure is called inter-SGSN
routing area update (IRAU).
 Charging Data Records (CDRs) is
defined as charge the subscriber for
usage of GPRS network, the SGSN
and the GGSN.
 These are forwarded to the billing
server, which collects all CDRs and
generates an invoice for each
subscriber once a month.
 The CDRs of the SGSN are
important for subscribers that roam in
a foreign network.
36
GPRS Network Elements – 3.The Gateway GPRS Support Node (GGSN)
 The SGSN routes user data packets
between the radio access network and
the core network.
 The GGSN connects the GPRS network
to the external data network.
 The GGSN is also involved in setting up
a Packet Data Protocol (PDP) context.
 GGSN that is responsible for assigning a
dynamic or static IP address to the user.
 The user keeps this IP address while the
PDP context is established.
 Figure 2.19 shown, the GGSN is the
anchor point for a PDP context and hides
the mobility of the user to the Internet.
 When a subscriber moves to a new
location, a new SGSN might become
responsible and data packets are sent to
the new SGSN (IRAU).
 The GGSN has to update its routing table
accordingly as shown in Figure 2.19. .
37
GPRS Radio Resource Management
38
Radio resource management is the system level management of co-
channel interference, radio resources, and radio transmission
characteristics in wireless communication systems.
Ex: cellular networks, wireless local area networks, wireless sensor
systems radio broadcasting networks.
GPRS Radio Resource Management
 GPRS timeslot can be assigned to several users at the same time.
 It is possible to assign several timeslots to a single subscriber to
increase his data transmission speed.
 The smallest transmission unit that can be assigned to a user is one
block.
 A block is also called a GPRS RLC/MAC (Radio Link Control/Medium
Access Control) frame.
1.Temporary Block Flows (TBF) in the Uplink Direction
2.Temporary Block Flows in the Downlink Direction
3.Timing Advance Control
4.The Continuous Timing Advance Update Procedure
39
GRPS Radio Resource Management- 1.Temporary Block Flows (TBF) in the Uplink Direction
 Every RLC/MAC frame on the Packet Data
Traffic Channel (PDTCH) or Packet
Associated Control Channel (PACCH)
consists of an RLC/MAC header and a user
data field.
 When mobile device wants send data on the
uplink by sending a packet channel request
message via the RACH (Random Access
Channel) or the PRACH.
 The Packet Control Unit(PCU) answers an
immediate packet assignment message on
the AGCH.
 The message contains information such as
timeslots and mobile device.
 A mechanism is necessary to a mobile device
when it is allowed to send on the timeslot.
 Therefore, the uplink assignment message
contains a parameter called the Uplink State
Flag (USF).
 A different USF value is assigned to every
subscriber.
 The USF is linked to the so-called
Temporary Flow Identity (TFI) of a
Temporary Block Flow (TBF).
40
GRPS Radio Resource Management- 1.Temporary Block Flows (TBF) in the Uplink Direction
 A TBF identifies data to or from a user for
the time of the data transfer.
 Once the data transfer, the TFI is reused
for another subscriber.
 The mobile device has to listen to all the
timeslots for assigned in uplink or downlink
direction.
 Every block that is sent in the downlink to a
subscriber contains a USF in its header as
shown in Figure 2.20.
 It indicates who is allowed to send in the
next uplink block.
 USF in each downlink block, the PCU can
dynamically schedule who is allowed to
send in the uplink.
 Therefore, this procedure is also referred
to as ‘dynamic allocation’.
 Mobile devices that support high multislot
classes are not able to listen in downlink
direction.
 In such cases the ‘Extended Dynamic
Allocation’ scheme is used.
41
GRPS Radio Resource Management- 1.Temporary Block Flows (TBF) in the Uplink Direction
 The USF information and data portion of a
downlink block is usually not intended for
the same user.
 The assignments of up and downlink
resources are independent.
 Uplink TBF established for mobile devices,
the network needs to send control
information from time to time.
 This is the receipt of uplink radio blocks.
 The logical PACCH that can be sent in a
radio block, is used to send control
information.
 The mobile device recognizes its own
downlink PACCH blocks because the
header of the block contains its TFI value.
 The PCU will continue to assign uplink
blocks until the mobile device indicates no
blocks in the uplink direction.
 This is done with the so-called
‘countdown procedure’.
 Every block header in the uplink direction
contains a four-bit countdown value.
42
GRPS Radio Resource Management- 2. Temporary Block Flows in the Downlink Direction
 If the PCU receives data for a subscriber
from the SGSN, it will send a packet
downlink assignment message to the
mobile device (Figure 2.21) in the AGCH or
the Packet Access Grant Channel
(PAGCH) .
 The message contains a TFI of a TBF and
the timeslots the mobile device.
 The device will start monitoring the
timeslots.
 It will check if the TFI included in the
header equals the TFI assigned to it in the
packet downlink assignment message as
shown in Figure 2.22.
 If they are equal, it will process the data
contained in the data portion of the block.
 If they are not equal, the mobile device
discards the received block.
 The PCU has sent all data for the
subscriber currently in its queue, it will set
the ‘final block indicator’ bit in the last
block it sends to the mobile device.
43
GRPS Radio Resource Management- 2. Temporary Block Flows in the Downlink Direction
 The mobile device stops listening on the
assigned timeslots and the TFI can be
reused for another subscriber.
 The mobile device has to send
acknowledge blocks like control information
via the logical PACCH.
 It is not necessary to assign an uplink TBF
for sending control information to the
network.
 *
44
GRPS Radio Resource Management- 3. Timing Advance Control
 The mobile device is away from a
BTS, it has to start sending its data
bursts to the network at the correct
time.
 It is necessary for the network to
constantly monitor how far the user is
away from the serving base station.
 If the user moves closer to the BTS,
the network has to inform the mobile
device to delay sending its data
compared to the current timing.
 If the user moves farther away, it has
to start sending its bursts earlier. This
process is called Timing Advance
Control.
 When downloading a large web
page, it downlink TBF is assigned,
no uplink TBF.
 It is necessary from time to time to
send layer 2 acknowledgment
messages to the network for the
data has been received.
 There are number of methods have
been standardized to measure and
update the timing advance value.
45
GRPS Radio Resource Management- 4. The Continuous Timing Advance Update Procedure
 In GPRS 52-multiframe, frames 12 and
38 are dedicated to the logical Packet
Timing-Advance Control Channel
(PTCCH) uplink and downlink.
 The PTCCH is further divided into 16 sub
channels.
 When the PCU assigns a TBF to a
mobile device, the assignment message
also contains an information that
instructs the mobile device to send
access bursts on one of the 16 sub
channels in the uplink with a timing
advance 0.
 The BTS monitors frames 12 and 38 for
access bursts and calculates the timing
advance value for every sub channel.
 The result of the calculation is sent
on the PTCCH
 As the PTCCH is divided into 16
subchannels,
 The mobile device sends an access
burst on the PTCCH and receives an
updated value every 1.92 seconds
46
GPRS Mobility Management and Session
Management (GMM/SM)
47
GPRS Mobility Management and Session Management (GMM/SM)
 The GPRS network is responsible for the mobility management of the
subscribers and the session management to control the individual
connections between subscribers and the Internet.
 Signalling messages and signalling flows have been defined that part
of the GPRS Mobility Management and Session Management
(GMM/SM) protocol for this purpose.
1.Mobility Management Tasks
2.GPRS Session Management
48
GPRS Mobility Management and Session Management (GMM/SM)
 The user has to first connect to the
network, before a connection to the
Internet.
 It is similar to the circuit-switched
network.
 When a subscriber wants to attach, the
network usually starts an authentication
procedure.
 If successful, the Service GPRS
Support Node(SGSN) sends a
location update message to the HLR
to update network’s database.
 The HLR acknowledges by sending
an ‘insert subscriber data’ message
back to the SGSN.
 The name of the message suggests,
the location update and returns the
subscription information of the user.
 The SGSN, will send an attach
accept message to the subscriber.
 Figure 2.28 shows the message
flow for this procedure.
 If the subscriber was attached to a
different SGSN, the procedure is
somewhat complex.
 Once the subscriber has
authenticated successfully, the
SGSN will send the location
update message as above to the
HLR.
 It send a cancel location message to
the old SGSN if the subscriber was
previously attached to a different
SGSN,.
 It later ‘insert subscriber data’
message to the new SGSN.
49
GPRS Mobility Management and Session Management (GMM/SM)
 It is possible to do a combined GSM/GPRS
attach procedure in case the Gs interface is
available.
 The network broadcasts the GPRS network
operation mode on the BCCH about mobile
device.
 The new MSC will then send an update
location to the HLR for the circuit-switched
part of the network.
 The HLR will then cancel the location in the old
MSC and send an “insert subscriber data” back
to the new MSC.
 Once all operations have been performed, the
new MSC sends back a location update
accept to the SGSN.
 It allows the mobile device to attach to both
circuit and packet-switched network.
 This speeds up the process for the mobile
device and reduces the signalling load in the
radio network.
 In the circuit-switched part of the network,
the user can now go ahead and establish
a voice call by dialling a number.
 In the GPRS packet-switched part of the
network, the mobile device can now go
ahead and establish a data session.
 This so-called PDP(Packet Data Protocol)
context activation procedure.
50
GPRS Mobility Management and Session Management (GMM/SM)
 Figure 2.29 shows an example of a GPRS
attach message that was traced on the Gb
interface.
 Some interesting parameters are
highlighted in bold.
 We can be seen in the message such as
multislot capabilities, frequencies bands
it supports (900, 1800, 1900 MHz).
 Mobile device developers implement a
subset of functionality at the beginning
software versions.
 This flexibility possible if networks and
mobile devices are able to exchange
information about their capabilities.
Example is the multislot capability.
 Early GPRS mobile devices were able to
aggregate only two downlink timeslots
and use only a single one in the uplink.
 *
51
GPRS Mobility Management and Session Management (GMM/SM)
 Current mobile devices support up to
five timeslots in the downlink and three
in the uplink (multislot class 32).
 The network has to keep track of the
location of the mobile device.
 When a mobile device in idle mode
changes to a cell in a different location
area, it has to do a so-called location
update (LU).
 The network will be able to find the
subscriber for incoming calls or SMS
messages.
 If a mobile device in ready or standby
state crosses a routing area border, it
reports to the SGSN.
 This procedure is called routing area
update (RAU).
 *
52
GPRS Mobility Management and Session Management (GMM/SM)
 If the new routing area is administered by
a new SGSN the process is called Inter-
SGSN Routing Area Update (IRAU).
 There is no difference between a RAU
and IRAU from the mobile device point of
view, but quite a difference from the
network point of view.
 This is because the new SGSN does not
yet know the subscriber.
 The new SGSN is to get the subscriber’s
authentication and subscription data.
 This procedure also prompts the previous
SGSN to forward all incoming data
packets to the new SGSN.
 the GGSN is informed about the new
location of the subscriber.
 Finally, the HLR is also informed about
the new location of the subscriber and
this information is deleted in the old
SGSN.
 *
53
GPRS Mobility Management and Session Management (GMM/SM)
2.GPRS Session Management
 PDP context has to be requested for the
attach procedure to communicate with the
Internet.
 Getting an IP address from the network for
an end user. This procedure is similar to
establishing a voice call.
 It also referred to as ‘establishing a
packet call’.
 There are some similarities between a
circuit-switched call and a packet-switched
call.
 Circuit-switched voice or data call the
network reserves resources on all
interfaces.
 A timeslot is reserved for this connection on
the air interface, in the radio network and
also in the core network.
 *
54
GPRS Mobility Management and Session Management (GMM/SM)
 These timeslots cannot be used by anyone
while the call is established.
 When a GPRS packet call is established
there are no resources dedicated to the
PDP context.
 Resources on the various interfaces are
used only during the time that data is
transmitted.
 Once the transmission is complete the
resources are used for other subscribers.
 Therefore, the PDP context represents only
a logical connection with the Internet.
 It remains active even if no data is
transferred for a prolonged length of time.
 This is also sometimes referred to as
‘always on’.
 Figure 2.30 shows the PDP context
activation procedure.
 Initially, the subscriber sends a PDP
context activation request message to the
SGSN.
 The most important parameter of the
message is the APN.
 The APN is the reference that GGSN uses
as a gateway to an external network.
55
GPRS Mobility Management and Session Management (GMM/SM)
 The network operator could have one APN
to connect to the Internet transparently.
 The SGSN compares the requested APN
with the list of allowed APNs for the
subscriber that has been received from the
HLR during the attach procedure.
 The APN is a fully qualified domain name
like ‘internet.t-mobile.com’ or simply
‘Internet’ or ‘wap’.
 The names of the APN can be chosen
freely by the GPRS network operator.
 In a second step, the SGSN uses the APN
to locate the IP address of the GGSN that
will be used as a gateway.
 The SGSN performs a domain name
service (DNS) lookup with the APN as the
domain name to be queried.
 The DNS lookup is identical to a DNS
lookup that a web browser has to perform
to get the IP address of a web server.
 Therefore, a standard DNS server can be
used for this purpose in the GPRS
network.
56
GPRS Mobility Management and Session Management (GMM/SM)
 To get an internationally unique qualified
domain name, the SGSN adds the MCC
and MNC to the APN, which is deduced
from the subscriber’s IMSI.
 As a top level domain, ‘.gprs’ is added to
form the complete domain name.
Example:
‘internet.t-mobile.com.026.350.gprs’.
 The foreign SGSN will always receive the
IP address of the home GGSN from the
DNS server.
 All packets will be routed to and from the
home GGSN and from there to the external
network.
 It is also possible to use a GGSN in the
visited network.
 After the DNS server has returned the
GGSN’s IP address, the SGSN can then
forward the request to the correct GGSN.
 The APN and the user’s IMSI are included
in the message as mandatory
parameters.
 To tunnel the user data packets through
the GPRS network later on, the SGSN
assigns a so-called tunnel identifier (TID)
for this virtual connection.
57
GPRS Mobility Management and Session Management (GMM/SM)
 The TID consists of the user’s IMSI and a
two-digit network service access point
identifier (NSAPI).
 Single active PDP context at a time.
 If the GGSN grants access to the external
network (e.g. the Internet) it will assign an
IP address for the subscriber.
 It is also possible to assign a fixed IP
address for a subscriber.
 Subsequently, the GGSN responds to the
SGSN with a PDP context activation
response message.
 The GGSN will store the TID and the
subscriber’s IP address in its PDP context
database.
 Once the SGSN receives the PDP context
activation response message from the
GGSN, it also stores the context
information in its database.
 *
58
GPRS Mobility Management and Session Management (GMM/SM)
 Different IDs are used for packets of a
certain user on each network interface due
to the different nature of the protocols and
due to the different packet sizes.
 On the GPRS air interface, with its small
data frames of only 456 bits or 57 B, which
even includes the overhead for error
detection and correction.
 The radio network the P-TMSI/TLLI is used
to identify the packets of a user.
 The core network, the GPRS TID is used
as identification.
 Figure 2.31 shows the different interfaces
and IDs used on them at a glance.
 ****
59
Small Screen Web Browsing over GPRS and EDGE
60
Small Screen Web Browsing over GPRS and EDGE
 GPRS is a bearer for IP packets, it has some properties that distinguish
it from fixedline connections.
 These include longer latency, varying latency if used in moving
environments, even loss of service and user moves outside the
coverage area of the network.
 Many devices that use GPRS, have limited abilities such as small
screens and low processing power.
 Number of applications for which the fixed-line Internet is widely used
have been adapted for mobile environments.
 Web browsing is certainly the most popular Internet application.
 Fast connection and depends on the reliability of the bearer.
 Modern web browsers are also designed to make use of big displays
and processing power of notebooks / desktop workstations.
61
Small Screen Web Browsing over GPRS and EDGE
 Today Enhanced Data Rates for GSM Evolution(EDGE) offers sufficient
bandwidth for web browsing.
 If the user wants to access information on a small mobile device, a
number of different approaches such as slow data transmission, the small
screens, the limited processing power, etc.
1.WAP 1.1 Used in Early GPRS Devices
2.WAP 2.0
3.Small Screen Web Browsing with Network Side Compression
4.Small Screen Web Browsing – Quality of Experience
62
Small Screen Web Browsing over GPRS and EDGE
1.WAP 1.1 Used in Early GPRS Devices
 The Wireless Application Protocol
(WAP) standard was created by the
Wap Forum, which was later
consolidated into the Open Mobile
Alliance (OMA) forum.
 The standard adopted the concepts
of HyperText Transfer Protocol
(HTTP), hypertext markup language
(HTML) and use in a mobile
environment.
 iMode was a rivaling standard to
WAP.
 The initial WAP 1.1 standard was
designed for web browsing but
today’s point of view, which are not
widely used anymore.
Special attention was given to the
following limitations:
1.Very limited bandwidth of the
connection, which has an impact on
the speed a page can be downloaded.
2.Very limited processing power of the
mobile device, which has an impact
on how quickly pages can be rendered
on the screen.
3.Reliability of the connection. Pages
should be loaded as quickly as possible
to reduce the effects of transmission
interruptions and lost network
coverage.
Today HTML and XHTML are used to
describe how web pages are to be
rendered in a PC.
63
Small Screen Web Browsing over GPRS and EDGE
 The text and layout of a page are
directly embedded in the document,
pictures and other elements are usually
referenced and requested for separately.
 These languages are quite complex
and cannot be used in mobile devices.
 WAP 1.1 defined its own page
description language, which is called
the Wireless Markup Language (WML).
 Using a WAP browser on a mobile
device was sometimes also called
WAP browsing.
 Figure 2.35 shows a simple WML
description to how a text on the display.
 The main difference was the use of so-
called ‘cards’ inside a single page.
 WAP 1.1 only supported black and
white images in the Wireless
Application Bitmap Protocol (WBMP)
format.
 Like HTML, WML also supported
‘forms’ elements to enable users to
type in text.
64
Small Screen Web Browsing over GPRS and EDGE
 The Wireless Session Protocol (WSP)
was created to transfer WML pages.
 A gateway was necessary that acted
as a translator between the WSP and
the HTTP world.
 The concept of the WAP gateway,
which was sometimes also referred to
as WAP proxy, is shown in Figure 2.36.
The differences between WSP and
HTTP as follows:
 As HTTP uses the session-oriented
TCP on layer 4 of the protocol stack.
 WSP used UDP and the Wireless
Transaction Protocol (WTP) to
compensate for some of the functionality
of TCP that cannot be found in UDP.
 WAP 1.1 avoided the three-way TCP
handshake for the session establishment,
which saved a lot of time in wireless
environments.
 No data is lost during the download of
a WAP page, WTP included a packet
number in each packet.
 The receiver could reassemble the
arriving UDP/WTP packets in the correct
order.
65
Small Screen Web Browsing over GPRS and EDGE
 Every time an ordinary web browser
requests for a web page. This takes a
lot of space and increases the overall
transaction time for every request.
 WSP used at the beginning of a WAP
session, the WAP client registered with
the WAP gateway and informed the
gateway.
 This reduced the size of the page
request from over 1000 B, which are
typically needed for a HTTP request, to
about 100B for a WSP request.
 *
66
Small Screen Web Browsing over GPRS and EDGE
WAP 2.0
 The mobile device processing power
has increased, which allows fast data
downloads by aggregating several
GPRS timeslots.
 Mobile device manufacturers have
also moved to colour displays, size
and resolution have increased
compared to WAP phones.
 WAP 2.0 based browsers are still used
but usually only in low-end phones.
 WAP 2.0 makes use of a subset of
XHTML called XHTML Mobile Profile.
 As XHTML is backward compatible to
HTML.
 It adapt standard web pages for the
smaller screens of mobile devices.
 An Opera mobile device web
browser support the complete
XHTML syntax.
 WAP 2.0 browsers support additional
graphics formats such as Graphics
Interchange Format (GIF).
 The protocol stack between the
mobile device and the WAP gateway
has changed with WAP 2.0.
 Today’s networks offer higher
bandwidths it was decided to use
TCP and HTTP instead of WSP and
WTP.
 WAP gateway was preserved so that
operators can continue to charge for
WAP usage.
 The WAP 2.0 gateway acts as a
simple HTTP proxy.
67
Small Screen Web Browsing over GPRS and EDGE
 TCP port 8080 has been standardized
for this use.
 Most mobile devices allow skipping of
the gateway settings.
 If no gateway is configured, the WAP
browser directly communicates with
the server in the Internet.
 If the gateway entry cannot be
removed, another option to save money
is to set the IP address of the gateway.
 One disadvantage in WAP1.1 is
changing the gateway.
 The HTTP proxy concept requires
sending the capability information in
every request.
 HTTP requests with capability
information easily use more than
1000B.
 The data volume consumed during a
WAP session increases significantly.
 There is only a small impact to the
enhanced transmission speeds of
GPRS and EDGE.
68
Small Screen Web Browsing over GPRS and EDGE
 3.Small Screen Web Browsing with
Network Side Compression
 Many high-end mobile devices have
built-in web browsers that can
download and display standard web
pages.
 The bigger the screen, the better a
web page can be displayed.
 The two downsides of this approach
are:
(1) The time it takes to download a
standard web page over GPRS and
EDGE.
This approach results in a much
degraded user experience for many
web pages.
(2 ) Light-weight WAP 2.0 browsers
that use a network side compression
server and only download
compressed content to the mobile
device.
 Opera Mini used this web browser
 Figure 2.37 shows what web
browsing looks like, this approach.
 Compressing standard web
pages on a network based server
before they are downloaded to the
mobile device.
 Text and pictures are
automatically adapted to the
screen size with a mechanism
referred to as ‘reflow’.
 There is no horizontal scrolling is
necessary.
69
Small Screen Web Browsing over GPRS and EDGE
 only a small amount of data is
transmitted, web pages are displayed
only a few seconds.
 If used over GPRS or EDGE, the
experience is often better than using a
standard web browser on a small device.
 The quality of experience while
moving, in trains or cars, is excellent
as standard web pages are
downloaded very quickly.
70
Small Screen Web Browsing over GPRS and EDGE
4.Small Screen Web Browsing – Quality
of Experience
 The quality of experience of a small
screen web-browsing session from the
user’s point of view mainly consists of
short page load times and a high click
success rate.
 The click success rate is defined in this
context as the percentage of pages
within a certain amount of time.
 Maximum value for this reaction time is
7 seconds.
 A reaction time of not more than 3 to 4
seconds and can be reached with the
network side compression.
 The transmission speed on the air
interface is one factor that is user’s
quality of experience.
 There are a number of other factors
that optimized in the network and
handset to increase the user’s
quality of experience:
1. Screen size: Today a very small
phones may included web browsers,
user experience is limited by small
displays.
 A good approach for a page design
optimized for mobile devices is to find
a compromise that suits both big
and small mobile device displays.
2. A fast processor can render pages a
lot faster than a slower.
 A processor architecture that offers
high processing power, a good
power-saving mode.
 Processor speed also has how fast
pages can be scrolled up and down.71
Small Screen Web Browsing over GPRS and EDGE
3. Good integration of the web browser
into the mobile device operating
system and wireless stack.
Different companies produce different
parts of the software of a mobile
device.
The web browser is one of the most
visible parts of the mobile device
software.
The browser should be integrated
very tightly with the phone’s operating
system and GPRS stack.
4. Sufficient capacity in the radio
network during busy hours, resources
are scarce as voice calls usually take
precedence over GPRS traffic.
Reduces the available bandwidth
that has to be shared by all GPRS
users of a cell and increases the
page load times.
5.Good network coverage is
essential for a good web-
browsing, if the mobile device is
used in cars, trains, buses or the
subway.
6.To minimize the impact of a cell
change, the network and mobile
device should implement the
network-assisted cell, change
functionality to decrease the time the
data transfer is interrupted.
7.Sufficient capacity on the WAP
gateway.
72
Small Screen Web Browsing over GPRS and EDGE
8.Sufficient capacity on the operator’s content platform to be able
to quickly process the large number of simultaneous requests
during busy hours.
9.Sufficient capacity on the Gi and Gp interfaces of the GPRS
network as these points of interconnection with other networks
can quickly.
10 The size of the web or WAP page also has an influence on the
quality of experience.
73
Multimedia is content that uses a combination of different content
forms such as text, audio, images, animations, video and interactive
content.
74
The Multimedia Messaging Service (MMS) over GPRS
The Multimedia Messaging Service (MMS) over GPRS
 Popular mobile data application is the multimedia messaging service or
MMS.
 MMS is advertised by mobile network operators as the successor of
the text-based short messaging service (SMS).
 The architectures of SMS and MMS, are fundamentally different.
 The SMS service is based on the Signaling System 7 (SS7) signalling
channels of the network and integrated with GSM.
 MMS is based on IP and has many similarities with the e-mail system.
 Figure 2.38 shows that the MMS system uses the GPRS network as a
transparent IP network.
 It does not rely on GPRS and wireless IP network technology such as
UMTS or CDMA.
 If a mobile device wants to send an MMS message, it establishes an
IP connection to the MMS server via the GPRS network.
75
The Multimedia Messaging Service (MMS) over GPRS
 The Packet Data Protocol(PDP) is
required to get an IP address.
 The MMS service usually requires its
own Access Point Name (APN).
 The operator to charge separately for
the MMS traffic.
 Figure 2.38 shown, the system makes
use of the WAP gateway, somewhat
strange at first.
 The Wireless Application Protocol
(WAP) gateway was initially developed
to optimize the transfer of WAP pages
through a bandwidth-limited wireless
network.
 Place the WAP gateway between the
mobile device and the MMS server, the
MMS service also benefits from this
functionality.
 Two different protocol stacks seen in
the figure.
 In WAP 2.0, the protocol stacks on
the two sides of the WAP gateway
have been harmonized, and new
mobile devices use HTTP and TCP for
the MMS service.
76
The Multimedia Messaging Service (MMS) over GPRS
 If MMS is exchanged between two
subscribers of the same network, the
mobile phone number (MSISDN) is
used.
 Once the MMS has been sent to the
MMS server it needs to notify the
recipient, new MMS message is waiting.
 This is done by sending an SMS
message to the recipient’s mobile
device.
 If the recipient has a non-MMS-
capable mobile device the SMS contains
a text message.
 If the recipient has registered his
handset with the MMS server to be
MMS capable, the SMS is formatted
differently.
 Depending on the mobile device
settings, the MMS message either
retrieved automatically or will inform the
user.
77
The Multimedia Messaging Service (MMS) over GPRS
 If the mobile device is allowed to
download the MMS automatically, then
user is only notified, MMS message has
been fully retrieved.
 If the recipient is different network, the
MMS server has to forward the message
to the MMS server of the home network.
 The MMS allows, MMS delivery to e-mail
addresses.
 It is quite similar to an e-mail.
 Mobile device has range of setting send
and receive MMS message
 MMS is an IP-based service.
 The mobile device has to be configured
with the MMS server address.
 Table 2.5 shows the MMS settings for
one of the mobile operators in the United
Kingdom.
*
 The user can decide during the creation of
an MMS in which order, at which position ,
how long pictures and texts are shown on
the display.
 The MMS server has adapting the
multimedia elements to the capabilities of
the recipient’s mobile device.
 The MMS software in the mobile device
converts the user’s design of the
message into a text-based layout is called
synchronized multimedia integration
language (SMIL, pronounced ‘Smile’).
78
The Multimedia Messaging Service (MMS) over GPRS
 SMIL was standardized by the World Wide
Web Consortium (http://www.w3c.org)
 Figure 2.39 shows a sample SMIL
description of an MMS.
 The general framework of all describes the
layout, number of pages and the
presentation flow.
 The content of each page such as texts,
pictures, sounds and video is not part of
the SMIL description.
 These are referenced via ‘src = ’ tags and
are included in the message after the SMIL
description.
 MMS including the SMIL description, texts,
and pictures are not sent independent of
each other.
 The MMS of the Multipurpose Internet Mail
Extension (MIME) protocol.
*
79
The Multimedia Messaging Service (MMS) over GPRS
 Figure 2.40 the MIME header contains a
general description of the information.
 The SMIL description of the MMS and
content of the message such as texts and
pictures are attached to form, the
complete body of the message.
The following formats have been specified
for MMS messages in 3GPP TS 26.140:
1.Pictures: JPEG, GIF, WBMP. The
maximum guaranteed image size is 160 ×
120 pixels.
This corresponds to the display resolution
of small mobile devices.
If pictures are sent with a higher resolution
they might have to be downsized in the
receiving mobile device or by the MMS
server.
It include pictures with a higher resolution
in the MMS as the user might later on
transfer the picture to a PC via Bluetooth.
*
 *
80
The Multimedia Messaging Service (MMS) over GPRS
2.Text: ASCII 8-bit, UTF-8 or UTF-16.
3.Audio: AMR (Adaptive Multirate).
4.Video: 3GPP MPEG-4 format. Many PC audio/video
players offer plugins for this format so that received videos
can be transferred to PCs for playback as well.
 The header includes address of the receiver and the subject
line to send an MMS.
 MMS uses a standard e-mail header.
 Each parameter name (e.g. To: or Subject:) was given a
binary representation.
 They are all named X-MMS . . . and some of them are shown
in Figure 2.41.
81
The Multimedia Messaging Service (MMS) over GPRS
*  *
82
The Multimedia Messaging Service (MMS) over GPRS
 The From: field of the header does not contain
the sender’s identification.
 The MMS server has to query the GPRS
network for the identification of the user.
 There are many similarities between MMS and
e-mail.
 E-mail uses the Simple Mail Transfer Protocol
(SMTP).
 MMS advantage: It has no handshake
procedure is necessary on the application layer.
 The MMS sever uses an SMS message to
notify the receiver of a waiting message.
 The message contains a URL that identifies the
stored MMS.
 To save time to retrieve the MMS via the HTTP
GET protocol.
 HTTP GET was initially designed to allow web
browsers to request for web pages from a
server.
 MMS server is more sophisticated for
HTML format.
 MMS messages could also be used for
messaging purposes between PCs in
the Internet.
 In Europe, MMS is used in both GSM and
UMTS networks.
 The use of IP and open standards allows
using the MMS system with mobile
networks that use different network.
83
UMTS Channel Structure on the Air Interface
(Universal Mobile Telecommunications Service)
84
The Universal Mobile Telecommunications System (UMTS), based on
the GSM standards.
It is a mobile cellular system of third generation maintained by 3GPP
(3rd Generation Partnership Project).
The complete network system and the technology described in it is
popularly referred as Freedom of Mobile Multimedia Access (FOMA).
UMTS Channel Structure on the Air Interface
1.User Plane and Control Plane
2.Common and Dedicated Channels
3.Logical, Transport and Physical Channels
4.Example: Network Search
5.Example: Initial Network Access Procedure
85
UMTS Channel Structure on the Air Interface
1.User Plane and Control Plane
 The radio protocol architecture can be
separated into control plane architecture
and user plane architecture as shown in
figure.
 User plane side, the application creates
data packets that are processed by
protocols such as TCP, UDP and IP.
 Control plane, the Radio Resource
Control (RRC) protocol writes the
signalling messages that are exchanged
between the base station and the mobile.
 In both cases, the information is
processed by the Packet Data
Convergence Protocol (PDCP), the
Radio Link Control (RLC) protocol and
the Medium Access Control (MAC)
protocol, before being passed to the
physical layer for transmission.
 *
86
UMTS Channel Structure on the Air Interface - 1.User Plane and Control Plane
 GSM, UMTS and other fixed and wireless
communication systems differentiate
between two kinds of data flows.
 In UMTS, these are referred to as two
different planes.
 Data flowing in the user plane is data
which is directly and transparently
exchanged between the users of a
connection like voice data or IP packets.
 The control plane is responsible for all
signalling data that is exchanged
between the users and the network.
 The control plane is used for signalling data
to exchange messages for call establishment
or messages.
 Figure 3.12 shows the separation of user
and control planes as well as some
examples for protocols that are used in the
different planes.
 *
87
UMTS Channel Structure on the Air Interface – 2. Common and Dedicated Channels
 Both user plane data and control plane data is transferred over the UMTS air
interface in so-called ‘Channels’.
Three different kinds of channels exist:
1.Dedicated channels:
 These channels transfer data for a single user.
 A dedicated channel is used for a voice connection.
2.Common channels:
 The counterpart to a dedicated channel is a common channel.
 Data transferred in common channels is destined for all users of a cell.
Ex:
1.The broadcast channel, which transmits general information about the network to all
users of a cell in order to inform them.
2.Common channels can also be used by several devices for the transfer of user data.
3.Each device filters out its packets from the stream broadcast over the common
channel and only forwards these to higher layers of the protocol stack.
3.Shared channels:
 Very similar to common channels are shared channels.
 These channels are not monitored by all devices.
Ex:
High-Speed Downlink Shared Channel (HS-DSCH) of HSDPA
88
UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels
 To separate the physical properties of the air interface from the logical data
transmission, the UMTS design introduces three different channel layers.
 Figure 3.13 shows the channels on different layers in downlink direction while
Figure 3.14 does the same for uplink channels.
89
BCCH-Broadcast Control
CHannel
PCCH-Paging Control Channel
CTCH-Common traffic channel
CCCH-Common Control Channel
DCCH-Dedicated Control
Channel
DTCH-Dedicated Traffic
Channel(DTCH)
BCH-Broadcast channel
PCH-Paging Channel
FACH-Forward Access Channel
DCH-Dedicated Transport
Channel
DSCH-Downlink Shared Channel
P-CCPCH-Primary Common
Control Physical Channel
S-CCPCH-Secondary Common
Control Physical Channel
DPDCH-Dedicated Physical Data
Channel
DPCCH-Dedicated Physical
Control Channel
PDSCH-Physical Downlink
Shared Channel
RACH-Random Access Channel
PRACH-Physical Random Access
Channel
UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels
Logical Channels
 The topmost channel layer is formed by the
logical channels.
 Logical channels are used to separate
different kinds of data flows that have to
be transferred over the air interface.
The UMTS standards define the following
logical channels:
The BCCH (Broadcast Control Channel):
 This channel is monitored by all mobile
devices in idle state to receive general
system information from the network.
Ex: Information distributed via this channel such
as how network can be accessed, which
codes are used, the Location Area
Code(LAC), the Cell-ID and many other
parameters.
 The parameters are further grouped
into System Information Block (SIB)
messages.
The PCCH (Paging Control Channel):
 This channel is used to inform users of
incoming calls or SMS messages.
 Paging messages are also used for
packet-switched calls if new data
arrives from the network.
 If the mobile device receives a paging
message it has to first report its
current serving cell to the network.
 The network will re-establish a
logical Radio Resource Control
(RRC) connection with the mobile
device and the data delivered to the
mobile device.
90
UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels
The CCCH (Common Control Channel):
 This channel is used for all messages
from and to individual mobile devices
(bidirectional) that want to establish a new
connection with the network.
Ex: If a user wants to make a phone call, send
an SMS or to establish a channel for packet-
switched data transmission.
The DCCH (Dedicated Control Channel):
 DCCH only transports data for a single
subscriber.
 DCCH is used :
(1) to transport messages for the Mobility
Management(MM) and Call Control(CC)
protocols for circuit-switched services
(2)Packet Mobility Management (PMM) and
SM messages for packet-switched services
from and to the MSC and SGSN.
The DTCH (Dedicated Traffic Channel):
 This channel is used for user data
transfer between the network and a
single user.
 User data can be a digitized voice
signal or IP packets of a packet-
switched connection.
 If a dedicated logical channel carries a
traditional voice call, the channel is
mapped to a dedicated physical
channel.
91
UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels
If the dedicated logical channel carries packet-switched data, it
is map the dedicated logical connection to a common or
shared physical channel as shown in Figure 3.13.
A packet-switched connection is mapped to a common
channel after some time of inactivity.
The shared channel was replaced with the High Speed
Downlink Shared Channels (HS-DSCH).
The CTCH (Common Traffic Channel):
This channel is used for cell broadcast information.
In GSM, the same mechanism is used by some network
operators to inform subscribers of fixedline phone network
area codes.
92
UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels
Transport Channels
 Transport channels prepare downlink data frames for transmission over the
air interface by splitting them up into smaller parts.
 These are encapsulated into RLC/MAC-frames that are more suitable for
transmission over the air interface.
The RLC/MAC header that is placed in front of each frame contains the
following information:
1.Length of the frame (10, 20, 40 or 80 milliseconds);
2.Type of integrity checking mechanism (CRC checksum);
3.Channel coding format for error detection and correction;
4.Rate matching in case the speed of the physical channel and the layers
above do not match.
5.Control information for detection of discontinuous transmission (DTX) in
case the other end has no data to send at a particular time.
93
UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels
 This is very important as channel coding includes the addition of error detection and
correction bits to the data stream.
 Logical channels are mapped to the following transport channels:
1.The BCH (Broadcast Channel): Transport channel variant of the logical BCCH.
2.The DCH (Dedicated Channel): This transport channel combines data from the
logical DTCH and the logical DCCH.
 The channel exists in both uplink and downlink directions as data is exchanged in
both directions.
3.The PCH (Paging Channel): Transport channel variant of the logical PCCH.
4.The RACH (Random Access Channel):
 The bidirectional logical CCCH is called RACH on the transport layer in uplink
direction.
 This channel is used by mobile devices to send RRC Connection Request messages
to the network.
 The channel is used by mobile devices to send user packet data if no dedicated
channel exists between the mobile device and the network.
94
UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels
5.The FACH (Forward Access Channel):
 This channel is used by the network to send RRC Connection Setup messages
to mobile devices.
 The the network. message contains information for the mobile device on how to
access
 If the network has assigned a dedicated channel, the message contains,
information on which spreading codes will be used in uplink and downlink
directions.
 The FACH can also be used by the network to send user data to a mobile device
in case no dedicated channel has been allocated for a data transfer.
95
UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels
Physical Channels
 Physical channels are responsible for offering a physical transmission medium
for one or more transport channels.
 Physical channels are responsible for channel coding, i.e. the addition of
redundancy and error detection bits to the data stream.
 The intermediate products between transport channels and physical channels
are called Composite
Coded Composite Transport Channel (CCTrCH)
 It is not only possible to map several transport channels onto a single physical
channel (e.g. the PCH and FACH on the S-CCPCH)
The following physical channels are used in a cell:
1. The P-CCPCH (Primary Common Control Physical Channel):
This channel is used for distributing broadcast information in a cell.
2. The S-CCPCH (Secondary Common Control Physical Channel):
This channel is used to broadcast the PCH and the FACH.
96
UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels
3. The PRACH (Physical Random Access Channel):
The physical implementation of the RACH.
4. The AICH (Acquisition Indication Channel):
 This channel is not shown in the channel overview figures.
 There is no mapping of this channel to a transport channel.
 The channel is used exclusively together with the PRACH during the connection
establishment of a mobile device with the network.
5.The DPDCH (Dedicated Physical Data Channel):
 This channel is the physical counterpart of a dedicated channel to a single
mobile device.
 The channel combines user data and signalling messages from (Packet) MM,
CC and SM.
97
UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels
6. The DPCCH (Dedicated Physical Control Channel):
 This channel is used in addition to a DPDCH in both uplink and downlink directions.
 It contains layer 1 information like Transmit Power Control (TPC) bits for adjusting
the transmission power.
 The channel is also used to transmit the so-called pilot bits.
 These bits always have the same value and can thus be used by the receiver to
generate a channel estimation, which is used to decode the remaining bits.
 The UMTS concept of logical, transport, physical channels and the mappings
between them is somewhat difficult to understand at first.
98
UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels
The following list summarizes the different kinds of channels and their main tasks:
1. Logical Channels:
 These channels describe different flows of information like user data and
signalling data.
 Logical channels contain no information about the characteristics of the
transmission channel.
2.Transport Channels:
 These channels prepare data packets that are received from logical channels
for transmission over the air interface.
 This layer defines which channel coding schemes (e.g. error correction
methods) are to be applied on the physical layer.
3.Physical Channels:
 These channels describe how data from transport channels is sent over the air
interface and apply channel coding and decoding to the incoming data streams.
99
UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels
The next section gives an idea of the way the channels are used for
two different procedures.
1.Example: Network Search (Refer Reference book)
2.Example: Initial Network Access Procedure
(Refer Reference book)
100
The UMTS Terrestrial Radio Access Network
(UTRAN)-Core Network Mobility Management
101
UTRAN - Core Network Mobility Management
The mobile device can be in any of the MM or PMM states
described below from the point of view of the MSC and the SGSN.
The MSC knows the following MM states:
1. MM Detached:
The mobile device is switched off and the current location of the
subscriber is unknown.
Incoming calls for the subscriber cannot be forwarded to the
subscriber and are either rejected or forwarded to another
destination if the Call Forward Unreachable (CFU) supplementary
service is activated.
2.MM Idle:
The mobile device is powered on and has successfully attached to
the MSC.
102
UTRAN - Core Network Mobility Management
The subscriber can at any time start an outgoing call. For incoming
calls, the mobile device is paged in its current Location Area.
3. MM Connected:
The mobile device and MSC have an active signaling and
communication connection.
The connection is used for a voice or a video call.
The subscriber is in the Cell-DCH RRC state as this is the only
bearer that supports circuit-switched connections.
The SGSN implements the following PMM states:
PMM Detached:
The mobile device is switched off and the location of the subscriber
is unknown to the SGSN.
The mobile device cannot have an active PDP context, that is, no
IP address is currently assigned to the subscriber.
103
UTRAN - Core Network Mobility Management
PMM Connected:
The mobile device and the SGSN have an active signaling and
communication connection.
The PMM connected state is only maintained while the subscriber
has an active PDP context, which effectively means that the GGSN
has assigned an IP address for the connection.
The SGSN simply forwards all incoming data packets to the
Serving RNC (S-RNC).
The UMTS SGSN is aware only of the S-RNC for the subscriber
and not of the current cell.
This is due to the desired separation of radio network and core
network functionality and also due to the soft handover mechanism
104
UTRAN - Core Network Mobility Management
Depending on the QoS profile, the network load, the current data
transfer activity and the required bandwidth, the mobile device can
be either in Cell-DCH, Cell-FACH, Cell-PCH or URA-PCH state.
PMM Idle:
The mobile device is attached to the network but no logical
signaling connection is established with the SGSN.
This can be the case, if no PDP context is active for the subscriber.
The RNC has the possibility to modify the RRC state of a
connection at any time.
RNC can decide after a period of inactivity of the connection to set
the mobile device into the RRC Idle state.
RNC no longer controls the mobility of the subscriber, it requests
the SGSN to set the connection into PMM Idle State as well.
105
UTRAN - Core Network Mobility Management
The subscriber no longer has a logical connection to either the
RNC or the SGSN.
The PDP context remains active and the subscriber can keep the
assigned IP address.
If new data arrives for the subscriber from the GGSN, a new
signaling and user data connection has to be established before
the data can be forwarded to the mobile device.
106
UTRAN - Radio Network Mobility Management
Depending on the MM state of the core network, the radio network
can be in a number of different RRC states.
How the mobility management is handled in the radio network
depends on the respective state.
Table 3.5 gives an overview of the MM and PMM states in the core
network and the corresponding RRC states in the radio network.
107
UTRAN - Radio Network Mobility Management
1.Mobility Management in the Cell-DCH State
2.Mobility Management in Idle State
3.Mobility Management in Other States
108
UTRAN - Radio Network Mobility Management
1.Mobility Management in the Cell-DCH State
The important services like voice or video communication that little
or no interruption of the data stream occurs during a cell change.
Only the Cell-DCH state can be used.
In this state, the network constantly controls the quality of the
connection and is able to redirect the connection to other cells if the
subscriber is moving.
This procedure is called handover or handoff.
A handover is controlled by the Radio Network Controller and
triggered based on measurement values of the quality of the uplink
signal measured by the base station and measurement reports on
downlink quality sent by the mobile device.
Measurement reports can be periodic or event triggered.
109
UTRAN - Radio Network Mobility Management
Different radio network vendors use different strategies for
measurement reporting.
UMTS needs additional criteria as neighboring base stations
transmit on the same frequency.
In UMTS, the following values are used:
1.RSSI:
It is describe the total signal power received in milliwatts.
The value is usually expressed in dBm (logarithmic scale) and
typical values are −100dBm for a low signal level to −60 dBm for a
very strong signal level.
2.RSCP (Received Signal Code Power):
The power the pilot channel of a base station is received with.
The RSCP can be used, to detect UMTS cell edge scenarios where
no neighboring UMTS cell is available to maintain the connection.
110
UTRAN - Radio Network Mobility Management
The network takes action when the RSCP level falls below a
network-operator-defined threshold.
3.EcNo:
The received energy per chip (Ec) of the pilot channel divided by
the total noise power density (No).
The EcNo is the RSCP divided by the RSSI.
The better this value the better the signal can be distinguished from
the noise.
The EcNo is usually expressed in decibels as it is a relative value.
The value is negative as a logarithmic scale is used and the RSCP
is smaller than the total received power.
In UMTS a number of different handover variants have been defined.
Hard Handover
Soft Handover
111
UTRAN - Radio Network Mobility Management – Hard Handover
 This is as shown in Figure 3.26.
This kind of handover is very similar
to the GSM handover.
 The mobile device of the active
connection shows that
measurement results of the signal
strength of the broadcast channel of
the neighboring cells, the RNC is
able to recognize if a neighboring
cell is more suitable for the
connection.
 To redirect the call into the new cell,
a number of preparatory measures
have to be performed in the network
before the handover is executed.
 The reservation of resources on
the Iub interface and this
procedure is similar to the
resource reservation of a new
connection.
112
UTRAN - Radio Network Mobility Management – Hard Handover
 Once the new connection is in
place, the mobile device receives a
command over the current
connection to change into the new
cell.
 The handover command contains,
frequency of the new cell, new
channelization and scrambling code
to be used.
 The interruption of the data stream
during this operation is usually quite
short i.e. 100 milliseconds.
 Once the mobile device is
connected to the new cell the user
data traffic can resume immediately.
This kind of handover is
called UMTS hard
handover.
113
UTRAN - Radio Network Mobility Management – Soft Handover
 A voice call is not interrupted at any
time during the procedure for this
kind of handover.
 On the basis of signal quality
measurements of the current and
neighboring cells, the RNC can
decide to set the mobile device into
soft handover state.
 All data from and to the mobile
device will then be sent and received
not only over a single cell but also
over two or even more cells
simultaneously.
 All cells that are part of the
communication are called Active Set
of the connection.
Figure 3.27 Connections to a mobile device
during a soft handover procedure with three
cells.
 If a radio connection of a cell in the
Active Set deteriorates, it is removed
from the connection.
 Thus it is ensured that despite the
cell change, the mobile device never
losses contact with the network.
114
UTRAN - Radio Network Mobility Management – Soft Handover
 The Active Set can contain up to
six cells at the same time, but
operational networks no more than
two or three cells are used at a
time.
 Figure 3.27 shows a soft handover
situation with three cells.
 The soft handover procedure has a
number of advantages over the
hard handover.
 No interruption of the user data
traffic occurs during the soft
handover procedure.
Figure 3.27 Connections to a mobile device
during a soft handover procedure with
three cells.
 The soft handover procedure can
be initiated while the signal quality
of the current cell is still acceptable
the possibility of a sudden loss of
the connection is reduced.
115
UTRAN - Radio Network Mobility Management – Soft Handover
 The transmission power and hence
the energy consumption of the
mobile device can be reduced in
some situations as shown in Figure
3.28.
 In this scenario, the subscriber first
roams into an area in which it has a
good coverage by cell 1.
 As the subscriber moves, there are
times when buildings or other
obstacles are in the way of the
optimal transmission path to cell 1.
 As a consequence, the mobile
device needs to increase its
transmission power.
Figure 3.28 Soft handover reduces the energy
consumption of the mobile due to lower
transmission power.
 If the mobile device is in soft handover
state however, cell 2 still receives a good
signal from the mobile device and can
thus compensate for the deterioration of
the transmission path to cell 1.
 As a consequence, the mobile device is
not instructed to increase the transmission
power.
116
UTRAN - Radio Network Mobility Management – Soft Handover
 The RNC has to make a decision for
every connection in handover state
every 10, 20, 40 or 80 milliseconds,
depending on the size of the radio
frame.
 In the downlink direction, the mobile
device receives identical frames from
cell 1 and cell 2.
 As the cells use different
channelization and scrambling codes
the mobile device is able to separate
the two data streams on the physical
layer (see Figure 3.29).
 The mobile device has to decode the
data stream twice, which of course
slightly increases the power
consumption as more processing
power is required.
Figure 3.29 Use of scrambling codes while a
mobile device is in soft handover state.
 The soft handover procedure has an
advantage because the mobile device
uses less transmission power compared
to a single cell scenario in order to reach
at least one of the cells in the Active Set
 This increases the capacity of the overall
system, which in turn increases the
number of subscribers that can be
handled by a cell.
117
UTRAN - Radio Network Mobility Management – Soft Handover
 Figure 3.30 shows a scenario that
includes an S-RNC and D-RNC.
 If a foreign cell needs to be included in
the Active Set, the S-RNC has to
establish a link to the D-RNC via the Iur
interface.
 The D-RNC then reserves the necessary
resources to its cell on the Iub interface
and acknowledges the request.
 The S-RNC in turn informs the mobile
device to include the new cell in its Active
Set via an ‘Update Active Set’ message.
 At this point onward, all data arriving at
the S-RNC from the core network will be
forwarded via the Iub interface to the
cells that are directly connected to the S-
RNC and also via the Iur interface to all
D-RNCs.
 These in turn forward the data
packets to the cells under their
control.
 In the reverse direction, the S-RNC is
the point of concentration for all
uplink packets as the D-RNCs
forward all incoming data packets for
the connection to the S-RNC.
118
UTRAN - Radio Network Mobility Management – Soft Handover
 Softer handover is defined, which is
used when two or more cells of the same
Node-B are part of the Active Set.
 In UMTS controlling the timing advance
is not possible because mobile device is
in soft handover state.
 If a subscriber continues to move away
from the cell in which the radio bearer
was initially established, there will be a
point at which not a single Node-B of the
S-RNC is part of the transmission chain
anymore.(Figure 3.31).
 As this state is a waste of radio network
resources, the S-RNC can request a
routing change from the MSC and the
SGSN on the Iu(cs)/Iu(ps) interface.
 This procedure is called a Serving
Radio Network Subsystem (SRNS)
Relocation Request.
 If the core network components
agree to perform the change, the
D-RNC becomes the new S-RNC
and the resources on the Iur
Interface can be released.
119
UTRAN - Radio Network Mobility Management – Soft Handover
 An SRNS relocation is also necessary if
a handover needs to be performed due
to degrading radio conditions and no Iur
connection is available between two
RNCs.
 When the first GSM networks were built
at the beginning of the 1990s, the
number of users was very small.
 When the first UMTS networks became
operational, the situation had changed
completely.
 The design of UMTS mobile devices had
to incorporate GSM and GPRS.
 If the user roams into an area that is only
covered by a 2G network, the mobile
device automatically switches over to
GSM and GPRS network.
 No interrupt ongoing voice or data calls.
 The UMTS standards also include
procedures to handover an active
connection to a 2G network.
 This handover procedure is called
intersystem handover (Figure
3.32).
120
UTRAN - Radio Network Mobility Management – Soft Handover
 In UMTS there are a number of different
possibilities to perform an intersystem
handover.
 The first intersystem handover method is
the blind intersystem handover.
 The RNC is aware of GSM neighboring
cells for certain UMTS cells.
 In the event of severe signal quality
degradation, the RNC reports to the
MSC or SGSN that a handover into a 2G
cell is necessary. The procedure is called
a ‘blind handover’.
 The advantage of this procedure is the
simple implementation in the network
and in the mobile devices.
There are a number of downsides as
well:
1. The network does not know if the GSM
cell can be found by the mobile device.
Figure 3.33 A UMTS cell with several
GSM neighboring cells presents a
problem for blind intersystem
handovers.
2.The mobile device and the target
GSM cell are not synchronized.
121
UTRAN - Radio Network Mobility Management – Soft Handover
 This considerably increases the time it
takes for the mobile device to contact the
new cell once the handover command
has been issued by the network.
 During a voice call he might notice a
short interruption of the voice path.
3. If a UMTS cell has several GSM
neighboring cells, as shown in
Figure 3.33, the RNC has no means to
distinguish which would be the best one
for the handover.
Figure 3.33 A UMTS cell with several
GSM neighboring cells presents a
problem for blind intersystem
handovers.
122
UTRAN - Radio Network Mobility Management – Soft Handover
 While network vendors can choose which of the options described below
they want to implement, the support of all options is required in the mobile
device:
1. Reduction of the spreading factor:
 The spreading factor is reduced for some frames. More data can be
transmitted during these periods.
 This allows the insertion of short transmission gaps for interfrequency
measurement purposes.
2. Puncturing:
 After the channel coder has added error correction and error detection
bits to the
 original data stream, some of them are removed again to have time for
interfrequency measurements.
3. Reduction of the number of user data bits per frame:
 Fewer bits are sent per frame, the transmission power does not have to be
increased.
123
UTRAN - Radio Network Mobility Management – Soft Handover
Figure 3.34 shows how an intersystem handover from UMTS to
GSM is performed.
The procedure starts on the UTRAN side like a normal inter-
MSC handover by the RNC sending an SRNS relocation
request.
Thus, for the 2G MSC, the handover looks like a normal GSM
to GSM handover. and is treated accordingly.
124
UTRAN - Radio Network Mobility Management – Soft Handover
 *
125
UTRAN - Radio Network Mobility Management – Soft Handover
2.Mobility Management in Idle State
 The mobile device is passive, i.e., no
data is sent or received.
 There are a number of tasks that have to
be performed periodically by the mobile
device.
 To be able to respond to incoming voice
calls, short messages, MMS messages,
etc.,
 If a paging message is received then
mobile device establishes a connection
with the network.
 The monitoring of the paging channel
consumes some power.
 Paging messages for a subscriber of
each group are then broadcast at certain
intervals.
 Mobile device does not have to listen for
incoming paging messages all the time.
 The disadvantage of this approach is,
the paging procedure takes a little bit
longer.
 In Idle state, the mobile device is
responsible for mobility management,
that is, changing to a more suitable
cell when the user is moving.
 As the network is not involved in the
decision-making process, the
procedure is called cell reselection.
 No physical or logical connection
exists between the radio network and
the mobile device.
 It is necessary to reestablish a
physical connection over the air
interface if data needs to be
transported again.
 RRC Idle state implies that no voice
connection is established.
126
UTRAN - Radio Network Mobility Management – Soft Handover
3.Mobility Management in Other States
 In Cell-FACH, Cell-PCH or URA-PCH
state, the mobile device is responsible
for mobility management and cell
changes.
 The big difference between these states
and the Idle state is that a logical
connection exists between the mobile
device and the radio network when a
packet session is active.
 The mobile device has to perform certain
tasks after a cell change depending on
the state.
 In Cell-FACH state the mobile device can
exchange data with the network at any
time.
 If the mobile device performs a cell
change it has to inform the network
straight away via a cell update message.
Figure 3.35 Cell change in PMM
connected state to a cell that cannot
communicate with the S-RNC.
 If the new cell is connected to a different
RNC, the cell update message will be
forwarded to the
S-RNC of the subscriber via the Iur interface.
 The mobile device has a logical connection
to the network, no Location or Routing Area
Update is necessary.
127
UTRAN - Radio Network Mobility Management – Soft Handover
3.Mobility Management in Other States
 If the new serving cell is connected to an
RNC that does not have an Iur interface
to the S-RNC of the subscriber, the cell
update will fail.
 As the new RNC cannot inform the
S-RNC of the new location of the
subscriber, it will reset the connection
and the mobile device automatically
defaults to Idle state.
 To resume data transmission, the mobile
device then performs a location update
with the MSC and SGSN as shown in
Figure 3.35.
 As the SGSN detects during the location
and routing area update that there is still
a logical connection to a different RNC.
Figure 3.35 Cell change in PMM connected
state to a cell that cannot communicate with
the S-RNC.
 Thus, it is ensured that all resources that are no
longer needed to maintain the connection are
released.
 The Cell-PCH is almost identical to the Cell-
FACH state from the MM point of view.
 The only difference is that no data can be
transmitted to the mobile device in Cell-PCH
state.
128
UTRAN - Radio Network Mobility Management – Soft Handover
3.Mobility Management in Other States
 There is the URA-PCH state, which only
requires cell update message to be sent
to the network if the subscriber roams
into a new URA.
 The URA is a new concept that has been
introduced with UMTS. It refines a
location area as shown in Figure 3.36.
 The core network is not aware of UTRAN
Registration Areas. Even single cells
have been abstracted into so-called
Service Areas.
 This is in contrast to a GSM/GPRS
network, where the MSC and SGSN are
aware of the location area and even the
cell-ID in which the mobile device is
located during an active connection.
 In UMTS, the location area contain one
or more service areas.
Figure 3.36 Location concepts of
radio- and core network.
129
UTRAN - Radio Network Mobility Management – Soft Handover
3.Mobility Management in Other States
 Figure 3.36 Location concepts of radio-
and core network.
 It is possible to assign only a single cell
to a service area to be able to better
pinpoint the location of a mobile device in
the core network.
 It was clearly separate the location
principles of the core network, which is
aware of Location Areas, Routing Areas ,
Services Areas and the radio network
that deals with UTRAN registration areas
and single cells.
 Core network and radio network are thus
logically decoupled.
 The mapping between the location
principles of core and radio network is
done at the interface between the two
networks, the RNC.
Figure 3.36 Location concepts of
radio- and core network.
130
UMTS Security
131
UMTS Security
UMTS has strong security measures to prevent unauthorized use
and eavesdropping on user data traffic and conversations.
UMTS also includes enhancements to overcome a number of
weaknesses.
The following are the main weaknesses:
1. The GSM circuit-switched part does not protect the link between
the base station and the BSC.
In many cases microwave links are used, which are vulnerable to
third party monitoring.
2. GSM allows man-in-the-middle attacks with equipment that
masquerades as a GSM base station.
3. The CK length used in GSM is 64 bits. Although secure when GSM
was first developed in the early 1990s, the length is considered
insufficient today.
132
UMTS Security
4. A number of weaknesses with the A5/1 stream cipher have been
detected, which allow decryption of a voice conversation with the
appropriate equipment.
UMTS addresses these weaknesses in a number of ways.
one-pass authentication and key agreement (AKA) procedure is
used with immediate activation of ciphering after successful
authentication.
When a mobile device attaches to the network after power-up, it
tries to register with the network by initiating location and routing
area update procedures.
At the beginning of the message exchange the mobile device
transmits its identity (IMSI or TMSI and PTMSI), which it retrieved
from the SIM.
133
UMTS Security
If the subscriber is not known by the MSC/VLR and/or the SGSN,
authentication information has to be requested from the
authentication center, which is part of the HLR.
The random number (RAND), the expected response (XRES) and
the CK, which are also used in GSM.
These are the integrity key (IK) and the authentication token
(AUTN).
These five values form an authentication vector.
The AUTN serves two purposes.
1. The AuC generates the AUTN from a random number and the
secret key of the subscriber.
It is then forwarded together with the random number to the mobile
device in an MM authentication request message.
134
UMTS Security
2.The mobile device then uses the AUTN to verify that the
authentication procedure was initiated by an authorized network.
The authentication token additionally includes a sequence number,
which is increased in both the network and the mobile device after
every successful authentication.
This prevents attackers from using intercepted authentication
vectors for fake authentications later on.
UMTS device has to generate a response value that it returns to
the network in the MM authentication response message.
The MSC/VLR or SGSN then compares the response value to the
XRES value, which they received as part of the authentication
vector from the HLR/AuC.
If both values match, the subscriber is authenticated.
135
UMTS Security
Ciphering between the mobile device and the network is activated
when the network sends a RANAP Security Mode Command
message to the RNC.
This message contains the 128-bit CK. UMTS calls are ciphered by
the RNC.
This prevents eavesdropping on the Iub interface between the RNC
and the base station.
 An RRC security mode command message informs the mobile
device that ciphering is to be activated.
Security mode command messages activate not only ciphering but
also integrity checking for signaling messages.
It is mandatory for integrity checking to be activated after
authentication.
136
UMTS Security
Integrity checking is performed for RRC, CC, SM, MM and GMM
messages between the mobile device and the network
The most important parameters for the RNC to calculate the stamp
are the content of the signaling message and the IK, which is part
of the authentication vector.
Integrity checking is done for both uplink and downlink signaling
messages.
The calculation of the key is performed by the SIM card, using the
secret key and the random number.
The IK is also never exchanged between the mobile device and the
network.
Keys for ciphering and integrity checking have a limited lifetime to
prevent attempts to break the cipher or integrity protection by brute
force during long duration monitoring attacks.
137
UMTS Security
Authentication, ciphering and integrity checking are performed
independently for circuit-switched and packet-switched
connections.
This is because the MSC handles circuit-switched calls while the
SGSN is responsible for packet sessions.
UMTS also introduces new algorithms to calculate the different
parameters used for authentication, ciphering and integrity
checking.
All actions that require the secret key are performed on the SIM
card, to protect the secret key.
When the mobile device detects an old GSM SIM card it informs
the network during connection establishment that a GSM-
backward-compatible authentication procedure is required.
138
UMTS Security
The UMTS ciphering and IKs are then computed by the mobile
device based on the GSM CK that is returned by the SIM card.
139
Reference:
Martin Sauter, "From GSM TO LTE, An Introduction to Mobile
Networks and Mobile Broadway", Wiley 2014.
140

More Related Content

What's hot

Introduction to communication system lecture4
Introduction to communication system lecture4Introduction to communication system lecture4
Introduction to communication system lecture4
Jumaan Ally Mohamed
 
CS8601 MOBILE COMPUTING
CS8601	MOBILE COMPUTING CS8601	MOBILE COMPUTING
CS8601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
Digital cellular networks GSM
Digital cellular networks GSMDigital cellular networks GSM
Digital cellular networks GSM
RAVIKIRAN ANANDE
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
Kathirvel Ayyaswamy
 
01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamentalEricsson Saudi
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
bsnlpandian
 
Mobile data networks
Mobile data networksMobile data networks
Mobile data networks
RAVIKIRAN ANANDE
 
Digital network lecturer1
Digital network  lecturer1Digital network  lecturer1
Digital network lecturer1
Jumaan Ally Mohamed
 
Digital network lecturer5
Digital network  lecturer5Digital network  lecturer5
Digital network lecturer5
Jumaan Ally Mohamed
 
Slide 11516
Slide 11516Slide 11516
Slide 11516
Virak Sou
 
Mobile Data Networks
Mobile Data NetworksMobile Data Networks
Mobile Data Networks
HimaBindu Valiveti
 
On the performance of non-orthogonal multiple access (NOMA) using FPGA
On the performance of non-orthogonal multiple access (NOMA) using FPGAOn the performance of non-orthogonal multiple access (NOMA) using FPGA
On the performance of non-orthogonal multiple access (NOMA) using FPGA
IJECEIAES
 
01 principles of the wcdma system
01 principles of the wcdma system01 principles of the wcdma system
01 principles of the wcdma systemkhurrambilal01
 
It2402 mobile communication unit3
It2402 mobile communication unit3It2402 mobile communication unit3
It2402 mobile communication unit3
RMK ENGINEERING COLLEGE, CHENNAI
 
Thesis sdh
Thesis sdhThesis sdh
Thesis sdh
Mesbah-Ul Islam
 
Wcdma umts wireless networks
Wcdma umts wireless networksWcdma umts wireless networks
Wcdma umts wireless networks
Dee Lima
 
3 g training by luca
3 g training by luca3 g training by luca
3 g training by luca
Md Kamruzzaman
 
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd Iaetsd
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
wcdma wireless principle
wcdma wireless principlewcdma wireless principle
wcdma wireless principle
daucuhanh
 

What's hot (20)

Introduction to communication system lecture4
Introduction to communication system lecture4Introduction to communication system lecture4
Introduction to communication system lecture4
 
CS8601 MOBILE COMPUTING
CS8601	MOBILE COMPUTING CS8601	MOBILE COMPUTING
CS8601 MOBILE COMPUTING
 
Digital cellular networks GSM
Digital cellular networks GSMDigital cellular networks GSM
Digital cellular networks GSM
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamental
 
Cdma presentation
Cdma presentationCdma presentation
Cdma presentation
 
Mobile data networks
Mobile data networksMobile data networks
Mobile data networks
 
Digital network lecturer1
Digital network  lecturer1Digital network  lecturer1
Digital network lecturer1
 
Digital network lecturer5
Digital network  lecturer5Digital network  lecturer5
Digital network lecturer5
 
Slide 11516
Slide 11516Slide 11516
Slide 11516
 
Mobile Data Networks
Mobile Data NetworksMobile Data Networks
Mobile Data Networks
 
On the performance of non-orthogonal multiple access (NOMA) using FPGA
On the performance of non-orthogonal multiple access (NOMA) using FPGAOn the performance of non-orthogonal multiple access (NOMA) using FPGA
On the performance of non-orthogonal multiple access (NOMA) using FPGA
 
01 principles of the wcdma system
01 principles of the wcdma system01 principles of the wcdma system
01 principles of the wcdma system
 
It2402 mobile communication unit3
It2402 mobile communication unit3It2402 mobile communication unit3
It2402 mobile communication unit3
 
Thesis sdh
Thesis sdhThesis sdh
Thesis sdh
 
Wcdma umts wireless networks
Wcdma umts wireless networksWcdma umts wireless networks
Wcdma umts wireless networks
 
3 g training by luca
3 g training by luca3 g training by luca
3 g training by luca
 
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
wcdma wireless principle
wcdma wireless principlewcdma wireless principle
wcdma wireless principle
 

Similar to Cellular Networks

gsm operation
gsm operationgsm operation
gsm operation
keyvan storer
 
DYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORK
DYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORKDYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORK
DYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORK
cscpconf
 
WCDMA Principles
WCDMA PrinciplesWCDMA Principles
WCDMA Principles
Ali Ibrahim
 
HUAWEI MASS & ROAMING TROUBLSHOUTING.pptx
HUAWEI MASS & ROAMING TROUBLSHOUTING.pptxHUAWEI MASS & ROAMING TROUBLSHOUTING.pptx
HUAWEI MASS & ROAMING TROUBLSHOUTING.pptx
youssef827458
 
GSM_SANAT_Ppt
GSM_SANAT_PptGSM_SANAT_Ppt
GSM_SANAT_Ppt
Sanat Varasada
 
Module1 part2
Module1 part2Module1 part2
Module1 part2
raksharao
 
Gsm
GsmGsm
Global system for mobile
Global system for mobileGlobal system for mobile
Global system for mobile
Partha Bhunia
 
Calling Procedure and Channel Mapping in GSM Network
Calling Procedure and Channel Mapping in GSM Network Calling Procedure and Channel Mapping in GSM Network
Calling Procedure and Channel Mapping in GSM Network
Noor Nabi
 
CELLULAR MOBILE RADIO SYSTEMS
CELLULAR MOBILE RADIO SYSTEMSCELLULAR MOBILE RADIO SYSTEMS
CELLULAR MOBILE RADIO SYSTEMS
VenkataSatya Manchikalapati
 
Call flow
Call flowCall flow
Call flow in gsm
Call flow in gsmCall flow in gsm
Call flow in gsm
vish0110
 
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
satishnittana1
 
20121129 lte basic procedures (2)
20121129 lte basic procedures (2)20121129 lte basic procedures (2)
20121129 lte basic procedures (2)Debasish Sahoo
 
Sms
Sms Sms
GSM Traffic Cases
GSM Traffic CasesGSM Traffic Cases
GSM Traffic Cases
Er. Ashish Pandey
 
Mobile communication - GSM/CDMA/WIMAX Technologies
Mobile communication - GSM/CDMA/WIMAX TechnologiesMobile communication - GSM/CDMA/WIMAX Technologies
Mobile communication - GSM/CDMA/WIMAX Technologies
Aman Abhishek
 

Similar to Cellular Networks (20)

gsm operation
gsm operationgsm operation
gsm operation
 
five
fivefive
five
 
DYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORK
DYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORKDYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORK
DYNAMIC CHANNEL ALLOCATION SCHEME TO HANDLE HANDOFF IN WIRELESS MOBILE NETWORK
 
Gsm
GsmGsm
Gsm
 
WCDMA Principles
WCDMA PrinciplesWCDMA Principles
WCDMA Principles
 
HUAWEI MASS & ROAMING TROUBLSHOUTING.pptx
HUAWEI MASS & ROAMING TROUBLSHOUTING.pptxHUAWEI MASS & ROAMING TROUBLSHOUTING.pptx
HUAWEI MASS & ROAMING TROUBLSHOUTING.pptx
 
GSM_SANAT_Ppt
GSM_SANAT_PptGSM_SANAT_Ppt
GSM_SANAT_Ppt
 
Module1 part2
Module1 part2Module1 part2
Module1 part2
 
Gsm
GsmGsm
Gsm
 
Global system for mobile
Global system for mobileGlobal system for mobile
Global system for mobile
 
Calling Procedure and Channel Mapping in GSM Network
Calling Procedure and Channel Mapping in GSM Network Calling Procedure and Channel Mapping in GSM Network
Calling Procedure and Channel Mapping in GSM Network
 
CELLULAR MOBILE RADIO SYSTEMS
CELLULAR MOBILE RADIO SYSTEMSCELLULAR MOBILE RADIO SYSTEMS
CELLULAR MOBILE RADIO SYSTEMS
 
Gsm architecture
Gsm architecture Gsm architecture
Gsm architecture
 
Call flow
Call flowCall flow
Call flow
 
Call flow in gsm
Call flow in gsmCall flow in gsm
Call flow in gsm
 
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
MOBILE రేపు మా ఊరి పండుగ కాబట్టి అందరూ తప్పక రావాలి.ఇది నా అభ్యర్థన, నేను ఇక్...
 
20121129 lte basic procedures (2)
20121129 lte basic procedures (2)20121129 lte basic procedures (2)
20121129 lte basic procedures (2)
 
Sms
Sms Sms
Sms
 
GSM Traffic Cases
GSM Traffic CasesGSM Traffic Cases
GSM Traffic Cases
 
Mobile communication - GSM/CDMA/WIMAX Technologies
Mobile communication - GSM/CDMA/WIMAX TechnologiesMobile communication - GSM/CDMA/WIMAX Technologies
Mobile communication - GSM/CDMA/WIMAX Technologies
 

Recently uploaded

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

Cellular Networks

  • 1. Network Design and Technologies(Unit-III) Dr.M.Rajendiran Dept. of Computer Science and Engineering Panimalar Engineering College
  • 2. Contents GSM-Mobility Management and Call Control GRPS-Network elements Radio Resource Management Mobility Management and Session Management Small Screen Web Browsing over GPRS and EDGE MMS over GRPS UMTS-Channel Structure on the Air Interface UTRAN-Core and Radio Network Mobility Management UMTS Security 2
  • 3. GSM - Mobility Management and Call Control Mobility management is one of the major functions of a GSM or a UMTS network that allows mobile phones to work. The aim of mobility management is to track where the subscribers are, allowing calls, SMS and other mobile phone services to be delivered to them. 3
  • 4. Mobility Management and Call Control 1.Call Reselection and Location Area Update 2.The Mobile-Terminated Call 3.Handover Scenarios 4
  • 5. Mobility Management and Call Control-Call Reselection and Location Area Update The network able to forward an incoming call, the subscriber’s location must be known. The mobile device is switched on, its first action is to register with the network. Therefore, the network becomes aware of the current location of the user. If the user roams into the area of a new cell, it need to inform the network. To reduce the signaling load in the radio network, several cells are grouped into a location area. The network informs the mobile device via the BCCH(Broadcast Control Channel). 5
  • 6. Mobility Management and Call Control-Call Reselection and Location Area Update  Grouping several cells into location areas, the power consumption of the mobile.  A disadvantage of this method is that the network operator is only aware of the current location area of the subscriber.  The network has to search for the mobile device in all cells of a location area for an incoming call or SMS, called paging.  The size of a location area can be set by the operator.  Usually 20 to 30 cells are grouped into a location area (Figure 1.40). 6
  • 7. Mobility Management and Call Control-Call Reselection and Location Area Update  Figure 1.41 shows how a location area update procedure is performed.  * 7
  • 8. Mobility Management and Call Control-Call Reselection and Location Area Update  The mobile measures the signal strengths of the serving cell and of the neighboring cells.  Neighboring cells can be found based on their transmission frequency is announced on the Broadcast Control CHannel (BCCH).  A signal is received with −100 dBm (decibel- milliwatts) - it is very far away from the base station, −60 dBm, is very close to the base station.  It referred to as the Received Signal Strength Indication (RSSI).  The signal of a neighboring cell becomes stronger than the signal of the current cell by a value that can be set by the network operator.  If the LAC(Location Area Code) is different from previous cell a location update procedure is started.  The mobile device sends a location update request message, after a signaling connection has been established.  * 8
  • 9. Mobility Management and Call Control-Call Reselection and Location Area Update  The mobile device needs to authenticate and ciphering is activated.(Fig:1.15)  Once the connection is secured, the mobile device is usually assigned a new TMSI(Temporary Mobile Subscriber Identity) by the network.  Once TMSI reallocation has been performed, the location area update message is sent to the network.  If the old and new location areas are under the administration of two different MSC(Mobile Switching Center's) / VLRs(Visitor Location Register), a number of additional steps are necessary.  The new MSC/VLR has to inform the HLR(Home Location Register) that the subscriber has roamed.  The HLR then deletes the record of the subscriber in the old MSC/VLR.  This procedure is called an inter-MSC location update.  * 9
  • 10. Mobility Management and Call Control-Call Reselection and Location Area Update * 10
  • 11. Mobility Management and Call Control- The Mobile-Terminated Call  Incoming call for a mobile subscriber is called a mobile-terminated call.  The difference between a mobile network and a fixed-line network is telephone number of the subscriber does not hold any information.  In the mobile network, it is necessary to query the HLR for the current location of the subscriber before the call can be forwarded.  Figure 1.42 shows the first part of the message flow for a mobile-terminated call initiated from a fixed-line subscriber.  The Gateway-Mobile Switching Center (G- MSC) receives the telephone number (MSISDN) of the called party via an ISUP IAM message from the fixed-line network.  The subsequent message flow on this interface is as shown in Figure 1.6.  The fixed-line network does not have to be aware that the called party is a mobile subscriber.  * 11
  • 12. Mobility Management and Call Control- The Mobile-Terminated Call  Incoming call for a mobile subscriber is called a mobile-terminated call.  The difference between a mobile network and a fixed-line network is telephone number of the subscriber does not hold any information.  In the mobile network, it is necessary to query the HLR for the current location of the subscriber before the call can be forwarded.  Figure 1.42 shows the first part of the message flow for a mobile-terminated call initiated from a fixed-line subscriber.  The Gateway-Mobile Switching Center (G- MSC) receives the telephone number (MSISDN) of the called party via an ISUP IAM message from the fixed-line network.  The subsequent message flow on this interface is as shown in Figure 1.6.  The fixed-line network does not have to be aware that the called party is a mobile subscriber.  * 12
  • 13. Mobility Management and Call Control- The Mobile-Terminated Call  The G-MSC is a normal MSC(Mobile Switching Centre) with additional connections to other networks.  When the G-MSC receives the IAM (Initial Address Message) message, it sends a Send Routing Information (SRI) message to the HLR(Home Location Register) to locate the subscriber in the network.  The MSC currently responsible for the subscriber is also called subscriber’s Visited Mobile Switching Center (V-MSC).  The HLR then determines the subscriber’s IMSI(International Mobile Subscriber Identity) by using the MSISDN(Mobile Station International Subscriber Directory Number) to search through its database.  Thus, is able to locate the subscriber’s current V- MSC.  The HLR then sends a Provide Roaming Number (PRN) message to the V-MSC/VLR to inform the switching center of the incoming call.  * 13
  • 14. Mobility Management and Call Control- The Mobile-Terminated Call  In the V-MSC/VLR, the IMSI of the subscriber, which is part of the PRN message, is associated with a temporary Mobile Station Roaming Number (MSRN) which is returned to the HLR.  The HLR then transparently returns the MSRN to the G-MSC.  The G-MSC uses the MSRN to forward the call to the V-MSC.  This is possible as the MSRN is uniquely identifies the V-MSC to external switches.  The call forward from the G-MSC to the V- MSC, an IAM message is used.  There are transit switching centers between the G-MSC and V-MSC.  The MSRN is internationally unique instead of only in the subscriber’s home network.  In the V-MSC/VLR, the MSRN is used to find the subscriber’s IMSI and thus the complete subscriber record in the VLR.  * 14
  • 15. Mobility Management and Call Control- The Mobile-Terminated Call The V-MSC continues the process and searches for the subscriber in the last reported location area, which was saved in the VLR record of the subscriber. The MSC then sends a paging message to the responsible BSC.  The BSC in turn sends a paging message via each cell of the location area on the PCH. 15
  • 16. Mobility Management and Call Control- The Mobile-Terminated Call * 16
  • 17. Mobility Management and Call Control-Call Reselection and Location Area Update * 17
  • 18. Mobility Management and Call Control-Call Reselection and Location Area Update * 18
  • 19. Mobility Management and Call Control-Call Reselection and Location Area Update * 19
  • 20. Mobility Management and Call Control-Call Reselection and Location Area Update * 20
  • 21. Mobility Management and Call Control- The Mobile-Terminated Call  If the mobile device confirms the incoming call with a call confirmed message, the MSC requests the establishment of a TCH for the voice path from the BSC (see Figure 1.43).  After successful establishment of the speech path, the mobile device returns an alerting message and thus informs the MSC that the subscriber is informed about the incoming call (the phone starts ringing).  The V-MSC then forwards this information via the ACM to the G- MSC.  The G-MSC then forwards the alerting indication to the fixed- line switch via its own ACM message.  Once the mobile subscriber accepts the call by pressing the answer button, the mobile device returns an Answer Message to the V-MSC.  An ISUP answer (ANM) message is generated and returned to the G-MSC.  The G-MSC forwards this information again via an ANM message back to the fixed-line switching center. 21
  • 22. Mobility Management and Call Control- Handover Scenarios one of the following handover scenarios is used to ensure that the connection remains established: 1.Intra-BSC handover:  In this scenario, the current cell and the new cell are connected to the same BSC. 2.Inter-BSC handover:  If a handover has to be performed to a cell which is connected to a second BSC, the current BSC is not able to control the handover itself as no direct signaling connection exists between the BSCs of a network.  Thus, the current BSC requests the MSC to initiate a handover to the other cell by sending a handover request message.  Important parameters of the message are the cell ID and the LAC of the new cell. Fig:Types of handover in GSM 22
  • 23. Mobility Management and Call Control- Handover Scenarios  As the MSC administers a list of all LACs and cells under its control.  It can find the correct BSC and request the establishment of a TCH for the handover in a subsequent step.  Once the new BSC has prepared the speech channel (TCH) in the new cell, the MSC returns a handover command to the mobile device.  Once the new cell and BSC have detected the successful handover, the MSC can switch over the speech path and inform the old BSC that the TCH for this connection can be released. 3. Inter-MSC handover:  If the current and new cells for a handover procedure are not connected to the same MSC, then handover procedure is more complicated. Fig:Types of handover in GSM 23
  • 24. Mobility Management and Call Control- Handover Scenarios  The BSC detects that the new cell is not in its area of responsibility and forwards the handover request to the MSC.  The MSC also detects that the LAC of the new cell is not part of its coverage area.  Therefore, the MSC looks into another table that lists all LACs of the neighboring MSCs.  The following terminology is introduced to unambiguously identify the two MSCs:  The MSC which has assigned an MSRN at the beginning of the call is called the Anchor-Mobile Switching Center (A-MSC) of the connection.  The MSC that receives the call during a handover is called the Relay-Mobile Switching Center (R-MSC) (Figure 1.44).  * 24
  • 25. Mobility Management and Call Control- Handover Scenarios  The A-MSC sends an MAP handover message to the R-MSC to perform a handover.  The R-MSC then asks the responsible BSC to establish a TCH in the requested cell and reports back to the A-MSC.  The A-MSC then instructs the mobile device via the still existing connection over the current cell to perform the handover.  Once the handover has been performed successfully, the R-MSC reports the successful handover to the A-MSC.  The A-MSC can then switch the voice path toward the R-MSC, then the resources in the old BSC and cell are released.  If the subscriber yet again changes to another cell during the call, which is controlled by yet another MSC, a subsequent inter-MSC handover has to be performed as shown in Figure 1.45. 25
  • 26. Mobility Management and Call Control- Handover Scenarios  This scenario shows that the current relay-MSC (R-MSC 1) reports to the A- MSC that a subsequent inter- MSC handover to R-MSC 2 is required to maintain the call.  The A-MSC then instructs R-MSC 2 to establish a channel in the requested cell.  Once the speech channel is ready in the new cell, the A-MSC sends the handover command message via R-MSC 1.  The mobile device then performs the handover to R-MSC 2 and reports the successful execution to the A-MSC.  The A-MSC can then redirect the speech path to R-MSC 2 and instruct R-MSC 1 to release the resources.  Tandem switches might be necessary to route the call through the network or to a roaming network.  However, these switches purely forward the call and are thus transparent in this procedure. 26
  • 27. GPRS Network Elements 27 General Packet Radio Service is a packet oriented mobile data standard on the 2G and 3G cellular communication network's global system for mobile communications. GPRS was established by European Telecommunications Standards Institute
  • 28. GPRS Network Elements GPRS works in a very different way compared to the circuit- switched GSM network. Three new network components were introduced into the mobile network and software updates.  Figure 2.16 gives an overview of the components of a GPRS network. 1.The Packet Control Unit (PCU) 2.The Serving GPRS Support Node (SGSN) 3.The Gateway GPRS Support Node (GGSN) 28
  • 29. GPRS Network Elements - 1.The Packet Control Unit (PCU)  The BSC has been designed to switch 16 kbit/s circuit-switched channels between the MSC and the subscribers.  It is also responsible for the handover decisions for those calls.  GPRS subscribers no longer have a dedicated connection to the network.  The BSC and its switching matrix are not suited to handle packet-switched GPRS traffic.  Therefore, this task has been assigned to a new network component, the PCU. The PCU is the packet-switched counterpart of the BSC and fulfills the following tasks: 1. Assignment of timeslots to subscribers in the uplink direction when requested for by the mobile device via the RACH or Physical Random Access Channel(PRACH). 2. Assignment of timeslots to subscribers in the downlink direction for data arriving from the core network. 3. Flow control of data in the uplink and downlink directions and prioritization of traffic. 4. Error checking and retransmission of lost or faulty frames. 5. Subscriber paging 6. Supervising entity for subscriber timing advance during data transmission. 29
  • 30. GPRS Network Elements - 1.The Packet Control Unit (PCU)  In order for the PCU to control the GPRS traffic, the BSC turns over control for some of the timeslots to the PCU.  Redirecting timeslots in the BSC switching matrix away from the MSC and TRAU toward the PCU.  The BSC simply forwards all data to and from the PCU without any processing.  GPRS uses GSM signaling channels like the RACH, PCH and AGCH to establish the initial communication and a control connection.  When the mobile device requests for GPRS resources from the network, the BSC receives a channel request message for packet access.  The BSC forwards such packet access request messages straight to the PCU without further processing.  PCU’s task to assign uplink blocks on a PDTCH.  The BSC forwards this return message from the PCU to the BTS. 30
  • 31. GPRS Network Elements - 1.The Packet Control Unit (PCU) Monitoring GSM and GPRS Signaling Messages  In GSM, it is easy to use a network tracer to monitor all signaling messages being exchanged between the BSC, BTS and Mobile Devices.  All messages use the same logical Link Access Procedure on the D-channel (LAPD) channel that is dedicated LAPD timeslots on the Abis interface.  The traffic channels used for the voice data are transmitted on different timeslots.  LAPD timeslots are necessary for monitor the signaling messages.  Monitoring GPRS signaling messages is more complex and sent over any GPRS timeslot  It is also necessary to trace user data and empty packets on the Abis interface, which requires more processing power and memory. * 31
  • 32. GPRS Network Elements - 1.The Packet Control Unit (PCU) PCU Positioning  The GSM allow for a number of different positions of the PCU in the network.  The most common implementation is to have the PCU behind the BSC as shown in Figure 2.16.  On the basis of PCU design, some network suppliers deliver it as one or more cards that can be plugged into the BSC.  Others have chosen to base the PCU on a more powerful computing architecture.  The PCU is implemented in a cabinet physically independent from the BSC.  Several BSCs are then connected to a single PCU.  The interface between the PCU and BSC has not been standardized. * 32
  • 33. GPRS Network Elements – 2.The Serving GPRS Support Node (SGSN)  The SGSN can be seen as the packet- switched counterpart to the MSC in the circuit- switched core network.  Figure 2.17 shows, SGSN lies between the radio access network and the core network.  It is responsible for (1) User Plane Management (2) Signaling Plane Management. 1. User Plane Management  The user plane combines all protocols and procedures for the transmission of user data frames between the subscriber and external networks.  All frames that arrive for a subscriber at the SGSN are forwarded to the PCU.  In the reverse direction the PCU delivers data frames of a subscriber to the SGSN, which is called the Gateway GPRS support node (GGSN).  IP is used as the transport protocol in the GPRS core network between the SGSN and GGSN.  This is big advantage that on lower layers a great number of different transmission technologies can be used.(Figure 2.17) 33
  • 34. GPRS Network Elements – 2.The Serving GPRS Support Node (SGSN)  Short distances between the network elements, 100 Mbit/s Ethernet twisted pair links can be used.  Longer distances optical links are more likely to be used.  The capacity of the core network can be flexibly by using IP.  The frame relay protocol was selected to connect the SGSN with PCU.  The data frames between SGSN and PCU are usually transported using E-1 links.  Frame relay, with its similarities to ATM, was well suited for transmitting packet data over 2 Mbit/s E-1 channels.  The disadvantage of using frame relay, is that the resulting complicated network architecture.  The SGSN has to extract the user data frames from the frame relay protocol and forward them via IP to the GGSN.  ATM and IP have more common in GPRS and UMTS radio network.  The 3GPP GPRS standards were also enhanced with IP and any kind of transmission technology below on the Gb interface.  Ciphering for circuit-switched traffic is terminated in the BTS.  Ciphering for packet-switched traffic is terminated in the SGSN as shown in Figure 2.18. 34
  • 35. GPRS Network Elements – 2.The Serving GPRS Support Node (SGSN) Advantages. The mobile device and not the network has control over cell changes during data transfers.  The network would first have to supply the ciphering information to the new BTS before the data transfer. Drawback  The processing power necessary for ciphering is not distributed over many BTS.  Some SGSN suppliers offer not only ciphering in software but also hardware-assisted ciphering.  Some networks GPRS ciphering is not enabled as operators can save money by using the processing power they save for additional user data traffic.  * 35
  • 36. GPRS Network Elements – 2.The Serving GPRS Support Node (SGSN) 2.Signaling Plane Management  The SGSN is also responsible for the management of all subscribers in its area.  All protocols and procedures for user management are handled on the signaling plane.  It is necessary to establish a data session with the GPRS network to exchange data with the Internet,  This procedure is called Packet Data Protocol (PDP) context activation and is session management (SM) tasks of the SGSN.  Subscribers can change their location in a mobile network frequently.  When change their location the SGSN needs to change its routing of packets to the radio network accordingly.  This task is done by the GPRS Mobility Management (GMM) sublayer.  When a subscriber leaves the area of the current SGSN, GMM also contains procedures to change the routing for a subscriber in the core network to the new SGSN.  This procedure is called inter-SGSN routing area update (IRAU).  Charging Data Records (CDRs) is defined as charge the subscriber for usage of GPRS network, the SGSN and the GGSN.  These are forwarded to the billing server, which collects all CDRs and generates an invoice for each subscriber once a month.  The CDRs of the SGSN are important for subscribers that roam in a foreign network. 36
  • 37. GPRS Network Elements – 3.The Gateway GPRS Support Node (GGSN)  The SGSN routes user data packets between the radio access network and the core network.  The GGSN connects the GPRS network to the external data network.  The GGSN is also involved in setting up a Packet Data Protocol (PDP) context.  GGSN that is responsible for assigning a dynamic or static IP address to the user.  The user keeps this IP address while the PDP context is established.  Figure 2.19 shown, the GGSN is the anchor point for a PDP context and hides the mobility of the user to the Internet.  When a subscriber moves to a new location, a new SGSN might become responsible and data packets are sent to the new SGSN (IRAU).  The GGSN has to update its routing table accordingly as shown in Figure 2.19. . 37
  • 38. GPRS Radio Resource Management 38 Radio resource management is the system level management of co- channel interference, radio resources, and radio transmission characteristics in wireless communication systems. Ex: cellular networks, wireless local area networks, wireless sensor systems radio broadcasting networks.
  • 39. GPRS Radio Resource Management  GPRS timeslot can be assigned to several users at the same time.  It is possible to assign several timeslots to a single subscriber to increase his data transmission speed.  The smallest transmission unit that can be assigned to a user is one block.  A block is also called a GPRS RLC/MAC (Radio Link Control/Medium Access Control) frame. 1.Temporary Block Flows (TBF) in the Uplink Direction 2.Temporary Block Flows in the Downlink Direction 3.Timing Advance Control 4.The Continuous Timing Advance Update Procedure 39
  • 40. GRPS Radio Resource Management- 1.Temporary Block Flows (TBF) in the Uplink Direction  Every RLC/MAC frame on the Packet Data Traffic Channel (PDTCH) or Packet Associated Control Channel (PACCH) consists of an RLC/MAC header and a user data field.  When mobile device wants send data on the uplink by sending a packet channel request message via the RACH (Random Access Channel) or the PRACH.  The Packet Control Unit(PCU) answers an immediate packet assignment message on the AGCH.  The message contains information such as timeslots and mobile device.  A mechanism is necessary to a mobile device when it is allowed to send on the timeslot.  Therefore, the uplink assignment message contains a parameter called the Uplink State Flag (USF).  A different USF value is assigned to every subscriber.  The USF is linked to the so-called Temporary Flow Identity (TFI) of a Temporary Block Flow (TBF). 40
  • 41. GRPS Radio Resource Management- 1.Temporary Block Flows (TBF) in the Uplink Direction  A TBF identifies data to or from a user for the time of the data transfer.  Once the data transfer, the TFI is reused for another subscriber.  The mobile device has to listen to all the timeslots for assigned in uplink or downlink direction.  Every block that is sent in the downlink to a subscriber contains a USF in its header as shown in Figure 2.20.  It indicates who is allowed to send in the next uplink block.  USF in each downlink block, the PCU can dynamically schedule who is allowed to send in the uplink.  Therefore, this procedure is also referred to as ‘dynamic allocation’.  Mobile devices that support high multislot classes are not able to listen in downlink direction.  In such cases the ‘Extended Dynamic Allocation’ scheme is used. 41
  • 42. GRPS Radio Resource Management- 1.Temporary Block Flows (TBF) in the Uplink Direction  The USF information and data portion of a downlink block is usually not intended for the same user.  The assignments of up and downlink resources are independent.  Uplink TBF established for mobile devices, the network needs to send control information from time to time.  This is the receipt of uplink radio blocks.  The logical PACCH that can be sent in a radio block, is used to send control information.  The mobile device recognizes its own downlink PACCH blocks because the header of the block contains its TFI value.  The PCU will continue to assign uplink blocks until the mobile device indicates no blocks in the uplink direction.  This is done with the so-called ‘countdown procedure’.  Every block header in the uplink direction contains a four-bit countdown value. 42
  • 43. GRPS Radio Resource Management- 2. Temporary Block Flows in the Downlink Direction  If the PCU receives data for a subscriber from the SGSN, it will send a packet downlink assignment message to the mobile device (Figure 2.21) in the AGCH or the Packet Access Grant Channel (PAGCH) .  The message contains a TFI of a TBF and the timeslots the mobile device.  The device will start monitoring the timeslots.  It will check if the TFI included in the header equals the TFI assigned to it in the packet downlink assignment message as shown in Figure 2.22.  If they are equal, it will process the data contained in the data portion of the block.  If they are not equal, the mobile device discards the received block.  The PCU has sent all data for the subscriber currently in its queue, it will set the ‘final block indicator’ bit in the last block it sends to the mobile device. 43
  • 44. GRPS Radio Resource Management- 2. Temporary Block Flows in the Downlink Direction  The mobile device stops listening on the assigned timeslots and the TFI can be reused for another subscriber.  The mobile device has to send acknowledge blocks like control information via the logical PACCH.  It is not necessary to assign an uplink TBF for sending control information to the network.  * 44
  • 45. GRPS Radio Resource Management- 3. Timing Advance Control  The mobile device is away from a BTS, it has to start sending its data bursts to the network at the correct time.  It is necessary for the network to constantly monitor how far the user is away from the serving base station.  If the user moves closer to the BTS, the network has to inform the mobile device to delay sending its data compared to the current timing.  If the user moves farther away, it has to start sending its bursts earlier. This process is called Timing Advance Control.  When downloading a large web page, it downlink TBF is assigned, no uplink TBF.  It is necessary from time to time to send layer 2 acknowledgment messages to the network for the data has been received.  There are number of methods have been standardized to measure and update the timing advance value. 45
  • 46. GRPS Radio Resource Management- 4. The Continuous Timing Advance Update Procedure  In GPRS 52-multiframe, frames 12 and 38 are dedicated to the logical Packet Timing-Advance Control Channel (PTCCH) uplink and downlink.  The PTCCH is further divided into 16 sub channels.  When the PCU assigns a TBF to a mobile device, the assignment message also contains an information that instructs the mobile device to send access bursts on one of the 16 sub channels in the uplink with a timing advance 0.  The BTS monitors frames 12 and 38 for access bursts and calculates the timing advance value for every sub channel.  The result of the calculation is sent on the PTCCH  As the PTCCH is divided into 16 subchannels,  The mobile device sends an access burst on the PTCCH and receives an updated value every 1.92 seconds 46
  • 47. GPRS Mobility Management and Session Management (GMM/SM) 47
  • 48. GPRS Mobility Management and Session Management (GMM/SM)  The GPRS network is responsible for the mobility management of the subscribers and the session management to control the individual connections between subscribers and the Internet.  Signalling messages and signalling flows have been defined that part of the GPRS Mobility Management and Session Management (GMM/SM) protocol for this purpose. 1.Mobility Management Tasks 2.GPRS Session Management 48
  • 49. GPRS Mobility Management and Session Management (GMM/SM)  The user has to first connect to the network, before a connection to the Internet.  It is similar to the circuit-switched network.  When a subscriber wants to attach, the network usually starts an authentication procedure.  If successful, the Service GPRS Support Node(SGSN) sends a location update message to the HLR to update network’s database.  The HLR acknowledges by sending an ‘insert subscriber data’ message back to the SGSN.  The name of the message suggests, the location update and returns the subscription information of the user.  The SGSN, will send an attach accept message to the subscriber.  Figure 2.28 shows the message flow for this procedure.  If the subscriber was attached to a different SGSN, the procedure is somewhat complex.  Once the subscriber has authenticated successfully, the SGSN will send the location update message as above to the HLR.  It send a cancel location message to the old SGSN if the subscriber was previously attached to a different SGSN,.  It later ‘insert subscriber data’ message to the new SGSN. 49
  • 50. GPRS Mobility Management and Session Management (GMM/SM)  It is possible to do a combined GSM/GPRS attach procedure in case the Gs interface is available.  The network broadcasts the GPRS network operation mode on the BCCH about mobile device.  The new MSC will then send an update location to the HLR for the circuit-switched part of the network.  The HLR will then cancel the location in the old MSC and send an “insert subscriber data” back to the new MSC.  Once all operations have been performed, the new MSC sends back a location update accept to the SGSN.  It allows the mobile device to attach to both circuit and packet-switched network.  This speeds up the process for the mobile device and reduces the signalling load in the radio network.  In the circuit-switched part of the network, the user can now go ahead and establish a voice call by dialling a number.  In the GPRS packet-switched part of the network, the mobile device can now go ahead and establish a data session.  This so-called PDP(Packet Data Protocol) context activation procedure. 50
  • 51. GPRS Mobility Management and Session Management (GMM/SM)  Figure 2.29 shows an example of a GPRS attach message that was traced on the Gb interface.  Some interesting parameters are highlighted in bold.  We can be seen in the message such as multislot capabilities, frequencies bands it supports (900, 1800, 1900 MHz).  Mobile device developers implement a subset of functionality at the beginning software versions.  This flexibility possible if networks and mobile devices are able to exchange information about their capabilities. Example is the multislot capability.  Early GPRS mobile devices were able to aggregate only two downlink timeslots and use only a single one in the uplink.  * 51
  • 52. GPRS Mobility Management and Session Management (GMM/SM)  Current mobile devices support up to five timeslots in the downlink and three in the uplink (multislot class 32).  The network has to keep track of the location of the mobile device.  When a mobile device in idle mode changes to a cell in a different location area, it has to do a so-called location update (LU).  The network will be able to find the subscriber for incoming calls or SMS messages.  If a mobile device in ready or standby state crosses a routing area border, it reports to the SGSN.  This procedure is called routing area update (RAU).  * 52
  • 53. GPRS Mobility Management and Session Management (GMM/SM)  If the new routing area is administered by a new SGSN the process is called Inter- SGSN Routing Area Update (IRAU).  There is no difference between a RAU and IRAU from the mobile device point of view, but quite a difference from the network point of view.  This is because the new SGSN does not yet know the subscriber.  The new SGSN is to get the subscriber’s authentication and subscription data.  This procedure also prompts the previous SGSN to forward all incoming data packets to the new SGSN.  the GGSN is informed about the new location of the subscriber.  Finally, the HLR is also informed about the new location of the subscriber and this information is deleted in the old SGSN.  * 53
  • 54. GPRS Mobility Management and Session Management (GMM/SM) 2.GPRS Session Management  PDP context has to be requested for the attach procedure to communicate with the Internet.  Getting an IP address from the network for an end user. This procedure is similar to establishing a voice call.  It also referred to as ‘establishing a packet call’.  There are some similarities between a circuit-switched call and a packet-switched call.  Circuit-switched voice or data call the network reserves resources on all interfaces.  A timeslot is reserved for this connection on the air interface, in the radio network and also in the core network.  * 54
  • 55. GPRS Mobility Management and Session Management (GMM/SM)  These timeslots cannot be used by anyone while the call is established.  When a GPRS packet call is established there are no resources dedicated to the PDP context.  Resources on the various interfaces are used only during the time that data is transmitted.  Once the transmission is complete the resources are used for other subscribers.  Therefore, the PDP context represents only a logical connection with the Internet.  It remains active even if no data is transferred for a prolonged length of time.  This is also sometimes referred to as ‘always on’.  Figure 2.30 shows the PDP context activation procedure.  Initially, the subscriber sends a PDP context activation request message to the SGSN.  The most important parameter of the message is the APN.  The APN is the reference that GGSN uses as a gateway to an external network. 55
  • 56. GPRS Mobility Management and Session Management (GMM/SM)  The network operator could have one APN to connect to the Internet transparently.  The SGSN compares the requested APN with the list of allowed APNs for the subscriber that has been received from the HLR during the attach procedure.  The APN is a fully qualified domain name like ‘internet.t-mobile.com’ or simply ‘Internet’ or ‘wap’.  The names of the APN can be chosen freely by the GPRS network operator.  In a second step, the SGSN uses the APN to locate the IP address of the GGSN that will be used as a gateway.  The SGSN performs a domain name service (DNS) lookup with the APN as the domain name to be queried.  The DNS lookup is identical to a DNS lookup that a web browser has to perform to get the IP address of a web server.  Therefore, a standard DNS server can be used for this purpose in the GPRS network. 56
  • 57. GPRS Mobility Management and Session Management (GMM/SM)  To get an internationally unique qualified domain name, the SGSN adds the MCC and MNC to the APN, which is deduced from the subscriber’s IMSI.  As a top level domain, ‘.gprs’ is added to form the complete domain name. Example: ‘internet.t-mobile.com.026.350.gprs’.  The foreign SGSN will always receive the IP address of the home GGSN from the DNS server.  All packets will be routed to and from the home GGSN and from there to the external network.  It is also possible to use a GGSN in the visited network.  After the DNS server has returned the GGSN’s IP address, the SGSN can then forward the request to the correct GGSN.  The APN and the user’s IMSI are included in the message as mandatory parameters.  To tunnel the user data packets through the GPRS network later on, the SGSN assigns a so-called tunnel identifier (TID) for this virtual connection. 57
  • 58. GPRS Mobility Management and Session Management (GMM/SM)  The TID consists of the user’s IMSI and a two-digit network service access point identifier (NSAPI).  Single active PDP context at a time.  If the GGSN grants access to the external network (e.g. the Internet) it will assign an IP address for the subscriber.  It is also possible to assign a fixed IP address for a subscriber.  Subsequently, the GGSN responds to the SGSN with a PDP context activation response message.  The GGSN will store the TID and the subscriber’s IP address in its PDP context database.  Once the SGSN receives the PDP context activation response message from the GGSN, it also stores the context information in its database.  * 58
  • 59. GPRS Mobility Management and Session Management (GMM/SM)  Different IDs are used for packets of a certain user on each network interface due to the different nature of the protocols and due to the different packet sizes.  On the GPRS air interface, with its small data frames of only 456 bits or 57 B, which even includes the overhead for error detection and correction.  The radio network the P-TMSI/TLLI is used to identify the packets of a user.  The core network, the GPRS TID is used as identification.  Figure 2.31 shows the different interfaces and IDs used on them at a glance.  **** 59
  • 60. Small Screen Web Browsing over GPRS and EDGE 60
  • 61. Small Screen Web Browsing over GPRS and EDGE  GPRS is a bearer for IP packets, it has some properties that distinguish it from fixedline connections.  These include longer latency, varying latency if used in moving environments, even loss of service and user moves outside the coverage area of the network.  Many devices that use GPRS, have limited abilities such as small screens and low processing power.  Number of applications for which the fixed-line Internet is widely used have been adapted for mobile environments.  Web browsing is certainly the most popular Internet application.  Fast connection and depends on the reliability of the bearer.  Modern web browsers are also designed to make use of big displays and processing power of notebooks / desktop workstations. 61
  • 62. Small Screen Web Browsing over GPRS and EDGE  Today Enhanced Data Rates for GSM Evolution(EDGE) offers sufficient bandwidth for web browsing.  If the user wants to access information on a small mobile device, a number of different approaches such as slow data transmission, the small screens, the limited processing power, etc. 1.WAP 1.1 Used in Early GPRS Devices 2.WAP 2.0 3.Small Screen Web Browsing with Network Side Compression 4.Small Screen Web Browsing – Quality of Experience 62
  • 63. Small Screen Web Browsing over GPRS and EDGE 1.WAP 1.1 Used in Early GPRS Devices  The Wireless Application Protocol (WAP) standard was created by the Wap Forum, which was later consolidated into the Open Mobile Alliance (OMA) forum.  The standard adopted the concepts of HyperText Transfer Protocol (HTTP), hypertext markup language (HTML) and use in a mobile environment.  iMode was a rivaling standard to WAP.  The initial WAP 1.1 standard was designed for web browsing but today’s point of view, which are not widely used anymore. Special attention was given to the following limitations: 1.Very limited bandwidth of the connection, which has an impact on the speed a page can be downloaded. 2.Very limited processing power of the mobile device, which has an impact on how quickly pages can be rendered on the screen. 3.Reliability of the connection. Pages should be loaded as quickly as possible to reduce the effects of transmission interruptions and lost network coverage. Today HTML and XHTML are used to describe how web pages are to be rendered in a PC. 63
  • 64. Small Screen Web Browsing over GPRS and EDGE  The text and layout of a page are directly embedded in the document, pictures and other elements are usually referenced and requested for separately.  These languages are quite complex and cannot be used in mobile devices.  WAP 1.1 defined its own page description language, which is called the Wireless Markup Language (WML).  Using a WAP browser on a mobile device was sometimes also called WAP browsing.  Figure 2.35 shows a simple WML description to how a text on the display.  The main difference was the use of so- called ‘cards’ inside a single page.  WAP 1.1 only supported black and white images in the Wireless Application Bitmap Protocol (WBMP) format.  Like HTML, WML also supported ‘forms’ elements to enable users to type in text. 64
  • 65. Small Screen Web Browsing over GPRS and EDGE  The Wireless Session Protocol (WSP) was created to transfer WML pages.  A gateway was necessary that acted as a translator between the WSP and the HTTP world.  The concept of the WAP gateway, which was sometimes also referred to as WAP proxy, is shown in Figure 2.36. The differences between WSP and HTTP as follows:  As HTTP uses the session-oriented TCP on layer 4 of the protocol stack.  WSP used UDP and the Wireless Transaction Protocol (WTP) to compensate for some of the functionality of TCP that cannot be found in UDP.  WAP 1.1 avoided the three-way TCP handshake for the session establishment, which saved a lot of time in wireless environments.  No data is lost during the download of a WAP page, WTP included a packet number in each packet.  The receiver could reassemble the arriving UDP/WTP packets in the correct order. 65
  • 66. Small Screen Web Browsing over GPRS and EDGE  Every time an ordinary web browser requests for a web page. This takes a lot of space and increases the overall transaction time for every request.  WSP used at the beginning of a WAP session, the WAP client registered with the WAP gateway and informed the gateway.  This reduced the size of the page request from over 1000 B, which are typically needed for a HTTP request, to about 100B for a WSP request.  * 66
  • 67. Small Screen Web Browsing over GPRS and EDGE WAP 2.0  The mobile device processing power has increased, which allows fast data downloads by aggregating several GPRS timeslots.  Mobile device manufacturers have also moved to colour displays, size and resolution have increased compared to WAP phones.  WAP 2.0 based browsers are still used but usually only in low-end phones.  WAP 2.0 makes use of a subset of XHTML called XHTML Mobile Profile.  As XHTML is backward compatible to HTML.  It adapt standard web pages for the smaller screens of mobile devices.  An Opera mobile device web browser support the complete XHTML syntax.  WAP 2.0 browsers support additional graphics formats such as Graphics Interchange Format (GIF).  The protocol stack between the mobile device and the WAP gateway has changed with WAP 2.0.  Today’s networks offer higher bandwidths it was decided to use TCP and HTTP instead of WSP and WTP.  WAP gateway was preserved so that operators can continue to charge for WAP usage.  The WAP 2.0 gateway acts as a simple HTTP proxy. 67
  • 68. Small Screen Web Browsing over GPRS and EDGE  TCP port 8080 has been standardized for this use.  Most mobile devices allow skipping of the gateway settings.  If no gateway is configured, the WAP browser directly communicates with the server in the Internet.  If the gateway entry cannot be removed, another option to save money is to set the IP address of the gateway.  One disadvantage in WAP1.1 is changing the gateway.  The HTTP proxy concept requires sending the capability information in every request.  HTTP requests with capability information easily use more than 1000B.  The data volume consumed during a WAP session increases significantly.  There is only a small impact to the enhanced transmission speeds of GPRS and EDGE. 68
  • 69. Small Screen Web Browsing over GPRS and EDGE  3.Small Screen Web Browsing with Network Side Compression  Many high-end mobile devices have built-in web browsers that can download and display standard web pages.  The bigger the screen, the better a web page can be displayed.  The two downsides of this approach are: (1) The time it takes to download a standard web page over GPRS and EDGE. This approach results in a much degraded user experience for many web pages. (2 ) Light-weight WAP 2.0 browsers that use a network side compression server and only download compressed content to the mobile device.  Opera Mini used this web browser  Figure 2.37 shows what web browsing looks like, this approach.  Compressing standard web pages on a network based server before they are downloaded to the mobile device.  Text and pictures are automatically adapted to the screen size with a mechanism referred to as ‘reflow’.  There is no horizontal scrolling is necessary. 69
  • 70. Small Screen Web Browsing over GPRS and EDGE  only a small amount of data is transmitted, web pages are displayed only a few seconds.  If used over GPRS or EDGE, the experience is often better than using a standard web browser on a small device.  The quality of experience while moving, in trains or cars, is excellent as standard web pages are downloaded very quickly. 70
  • 71. Small Screen Web Browsing over GPRS and EDGE 4.Small Screen Web Browsing – Quality of Experience  The quality of experience of a small screen web-browsing session from the user’s point of view mainly consists of short page load times and a high click success rate.  The click success rate is defined in this context as the percentage of pages within a certain amount of time.  Maximum value for this reaction time is 7 seconds.  A reaction time of not more than 3 to 4 seconds and can be reached with the network side compression.  The transmission speed on the air interface is one factor that is user’s quality of experience.  There are a number of other factors that optimized in the network and handset to increase the user’s quality of experience: 1. Screen size: Today a very small phones may included web browsers, user experience is limited by small displays.  A good approach for a page design optimized for mobile devices is to find a compromise that suits both big and small mobile device displays. 2. A fast processor can render pages a lot faster than a slower.  A processor architecture that offers high processing power, a good power-saving mode.  Processor speed also has how fast pages can be scrolled up and down.71
  • 72. Small Screen Web Browsing over GPRS and EDGE 3. Good integration of the web browser into the mobile device operating system and wireless stack. Different companies produce different parts of the software of a mobile device. The web browser is one of the most visible parts of the mobile device software. The browser should be integrated very tightly with the phone’s operating system and GPRS stack. 4. Sufficient capacity in the radio network during busy hours, resources are scarce as voice calls usually take precedence over GPRS traffic. Reduces the available bandwidth that has to be shared by all GPRS users of a cell and increases the page load times. 5.Good network coverage is essential for a good web- browsing, if the mobile device is used in cars, trains, buses or the subway. 6.To minimize the impact of a cell change, the network and mobile device should implement the network-assisted cell, change functionality to decrease the time the data transfer is interrupted. 7.Sufficient capacity on the WAP gateway. 72
  • 73. Small Screen Web Browsing over GPRS and EDGE 8.Sufficient capacity on the operator’s content platform to be able to quickly process the large number of simultaneous requests during busy hours. 9.Sufficient capacity on the Gi and Gp interfaces of the GPRS network as these points of interconnection with other networks can quickly. 10 The size of the web or WAP page also has an influence on the quality of experience. 73
  • 74. Multimedia is content that uses a combination of different content forms such as text, audio, images, animations, video and interactive content. 74 The Multimedia Messaging Service (MMS) over GPRS
  • 75. The Multimedia Messaging Service (MMS) over GPRS  Popular mobile data application is the multimedia messaging service or MMS.  MMS is advertised by mobile network operators as the successor of the text-based short messaging service (SMS).  The architectures of SMS and MMS, are fundamentally different.  The SMS service is based on the Signaling System 7 (SS7) signalling channels of the network and integrated with GSM.  MMS is based on IP and has many similarities with the e-mail system.  Figure 2.38 shows that the MMS system uses the GPRS network as a transparent IP network.  It does not rely on GPRS and wireless IP network technology such as UMTS or CDMA.  If a mobile device wants to send an MMS message, it establishes an IP connection to the MMS server via the GPRS network. 75
  • 76. The Multimedia Messaging Service (MMS) over GPRS  The Packet Data Protocol(PDP) is required to get an IP address.  The MMS service usually requires its own Access Point Name (APN).  The operator to charge separately for the MMS traffic.  Figure 2.38 shown, the system makes use of the WAP gateway, somewhat strange at first.  The Wireless Application Protocol (WAP) gateway was initially developed to optimize the transfer of WAP pages through a bandwidth-limited wireless network.  Place the WAP gateway between the mobile device and the MMS server, the MMS service also benefits from this functionality.  Two different protocol stacks seen in the figure.  In WAP 2.0, the protocol stacks on the two sides of the WAP gateway have been harmonized, and new mobile devices use HTTP and TCP for the MMS service. 76
  • 77. The Multimedia Messaging Service (MMS) over GPRS  If MMS is exchanged between two subscribers of the same network, the mobile phone number (MSISDN) is used.  Once the MMS has been sent to the MMS server it needs to notify the recipient, new MMS message is waiting.  This is done by sending an SMS message to the recipient’s mobile device.  If the recipient has a non-MMS- capable mobile device the SMS contains a text message.  If the recipient has registered his handset with the MMS server to be MMS capable, the SMS is formatted differently.  Depending on the mobile device settings, the MMS message either retrieved automatically or will inform the user. 77
  • 78. The Multimedia Messaging Service (MMS) over GPRS  If the mobile device is allowed to download the MMS automatically, then user is only notified, MMS message has been fully retrieved.  If the recipient is different network, the MMS server has to forward the message to the MMS server of the home network.  The MMS allows, MMS delivery to e-mail addresses.  It is quite similar to an e-mail.  Mobile device has range of setting send and receive MMS message  MMS is an IP-based service.  The mobile device has to be configured with the MMS server address.  Table 2.5 shows the MMS settings for one of the mobile operators in the United Kingdom. *  The user can decide during the creation of an MMS in which order, at which position , how long pictures and texts are shown on the display.  The MMS server has adapting the multimedia elements to the capabilities of the recipient’s mobile device.  The MMS software in the mobile device converts the user’s design of the message into a text-based layout is called synchronized multimedia integration language (SMIL, pronounced ‘Smile’). 78
  • 79. The Multimedia Messaging Service (MMS) over GPRS  SMIL was standardized by the World Wide Web Consortium (http://www.w3c.org)  Figure 2.39 shows a sample SMIL description of an MMS.  The general framework of all describes the layout, number of pages and the presentation flow.  The content of each page such as texts, pictures, sounds and video is not part of the SMIL description.  These are referenced via ‘src = ’ tags and are included in the message after the SMIL description.  MMS including the SMIL description, texts, and pictures are not sent independent of each other.  The MMS of the Multipurpose Internet Mail Extension (MIME) protocol. * 79
  • 80. The Multimedia Messaging Service (MMS) over GPRS  Figure 2.40 the MIME header contains a general description of the information.  The SMIL description of the MMS and content of the message such as texts and pictures are attached to form, the complete body of the message. The following formats have been specified for MMS messages in 3GPP TS 26.140: 1.Pictures: JPEG, GIF, WBMP. The maximum guaranteed image size is 160 × 120 pixels. This corresponds to the display resolution of small mobile devices. If pictures are sent with a higher resolution they might have to be downsized in the receiving mobile device or by the MMS server. It include pictures with a higher resolution in the MMS as the user might later on transfer the picture to a PC via Bluetooth. *  * 80
  • 81. The Multimedia Messaging Service (MMS) over GPRS 2.Text: ASCII 8-bit, UTF-8 or UTF-16. 3.Audio: AMR (Adaptive Multirate). 4.Video: 3GPP MPEG-4 format. Many PC audio/video players offer plugins for this format so that received videos can be transferred to PCs for playback as well.  The header includes address of the receiver and the subject line to send an MMS.  MMS uses a standard e-mail header.  Each parameter name (e.g. To: or Subject:) was given a binary representation.  They are all named X-MMS . . . and some of them are shown in Figure 2.41. 81
  • 82. The Multimedia Messaging Service (MMS) over GPRS *  * 82
  • 83. The Multimedia Messaging Service (MMS) over GPRS  The From: field of the header does not contain the sender’s identification.  The MMS server has to query the GPRS network for the identification of the user.  There are many similarities between MMS and e-mail.  E-mail uses the Simple Mail Transfer Protocol (SMTP).  MMS advantage: It has no handshake procedure is necessary on the application layer.  The MMS sever uses an SMS message to notify the receiver of a waiting message.  The message contains a URL that identifies the stored MMS.  To save time to retrieve the MMS via the HTTP GET protocol.  HTTP GET was initially designed to allow web browsers to request for web pages from a server.  MMS server is more sophisticated for HTML format.  MMS messages could also be used for messaging purposes between PCs in the Internet.  In Europe, MMS is used in both GSM and UMTS networks.  The use of IP and open standards allows using the MMS system with mobile networks that use different network. 83
  • 84. UMTS Channel Structure on the Air Interface (Universal Mobile Telecommunications Service) 84 The Universal Mobile Telecommunications System (UMTS), based on the GSM standards. It is a mobile cellular system of third generation maintained by 3GPP (3rd Generation Partnership Project). The complete network system and the technology described in it is popularly referred as Freedom of Mobile Multimedia Access (FOMA).
  • 85. UMTS Channel Structure on the Air Interface 1.User Plane and Control Plane 2.Common and Dedicated Channels 3.Logical, Transport and Physical Channels 4.Example: Network Search 5.Example: Initial Network Access Procedure 85
  • 86. UMTS Channel Structure on the Air Interface 1.User Plane and Control Plane  The radio protocol architecture can be separated into control plane architecture and user plane architecture as shown in figure.  User plane side, the application creates data packets that are processed by protocols such as TCP, UDP and IP.  Control plane, the Radio Resource Control (RRC) protocol writes the signalling messages that are exchanged between the base station and the mobile.  In both cases, the information is processed by the Packet Data Convergence Protocol (PDCP), the Radio Link Control (RLC) protocol and the Medium Access Control (MAC) protocol, before being passed to the physical layer for transmission.  * 86
  • 87. UMTS Channel Structure on the Air Interface - 1.User Plane and Control Plane  GSM, UMTS and other fixed and wireless communication systems differentiate between two kinds of data flows.  In UMTS, these are referred to as two different planes.  Data flowing in the user plane is data which is directly and transparently exchanged between the users of a connection like voice data or IP packets.  The control plane is responsible for all signalling data that is exchanged between the users and the network.  The control plane is used for signalling data to exchange messages for call establishment or messages.  Figure 3.12 shows the separation of user and control planes as well as some examples for protocols that are used in the different planes.  * 87
  • 88. UMTS Channel Structure on the Air Interface – 2. Common and Dedicated Channels  Both user plane data and control plane data is transferred over the UMTS air interface in so-called ‘Channels’. Three different kinds of channels exist: 1.Dedicated channels:  These channels transfer data for a single user.  A dedicated channel is used for a voice connection. 2.Common channels:  The counterpart to a dedicated channel is a common channel.  Data transferred in common channels is destined for all users of a cell. Ex: 1.The broadcast channel, which transmits general information about the network to all users of a cell in order to inform them. 2.Common channels can also be used by several devices for the transfer of user data. 3.Each device filters out its packets from the stream broadcast over the common channel and only forwards these to higher layers of the protocol stack. 3.Shared channels:  Very similar to common channels are shared channels.  These channels are not monitored by all devices. Ex: High-Speed Downlink Shared Channel (HS-DSCH) of HSDPA 88
  • 89. UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels  To separate the physical properties of the air interface from the logical data transmission, the UMTS design introduces three different channel layers.  Figure 3.13 shows the channels on different layers in downlink direction while Figure 3.14 does the same for uplink channels. 89 BCCH-Broadcast Control CHannel PCCH-Paging Control Channel CTCH-Common traffic channel CCCH-Common Control Channel DCCH-Dedicated Control Channel DTCH-Dedicated Traffic Channel(DTCH) BCH-Broadcast channel PCH-Paging Channel FACH-Forward Access Channel DCH-Dedicated Transport Channel DSCH-Downlink Shared Channel P-CCPCH-Primary Common Control Physical Channel S-CCPCH-Secondary Common Control Physical Channel DPDCH-Dedicated Physical Data Channel DPCCH-Dedicated Physical Control Channel PDSCH-Physical Downlink Shared Channel RACH-Random Access Channel PRACH-Physical Random Access Channel
  • 90. UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels Logical Channels  The topmost channel layer is formed by the logical channels.  Logical channels are used to separate different kinds of data flows that have to be transferred over the air interface. The UMTS standards define the following logical channels: The BCCH (Broadcast Control Channel):  This channel is monitored by all mobile devices in idle state to receive general system information from the network. Ex: Information distributed via this channel such as how network can be accessed, which codes are used, the Location Area Code(LAC), the Cell-ID and many other parameters.  The parameters are further grouped into System Information Block (SIB) messages. The PCCH (Paging Control Channel):  This channel is used to inform users of incoming calls or SMS messages.  Paging messages are also used for packet-switched calls if new data arrives from the network.  If the mobile device receives a paging message it has to first report its current serving cell to the network.  The network will re-establish a logical Radio Resource Control (RRC) connection with the mobile device and the data delivered to the mobile device. 90
  • 91. UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels The CCCH (Common Control Channel):  This channel is used for all messages from and to individual mobile devices (bidirectional) that want to establish a new connection with the network. Ex: If a user wants to make a phone call, send an SMS or to establish a channel for packet- switched data transmission. The DCCH (Dedicated Control Channel):  DCCH only transports data for a single subscriber.  DCCH is used : (1) to transport messages for the Mobility Management(MM) and Call Control(CC) protocols for circuit-switched services (2)Packet Mobility Management (PMM) and SM messages for packet-switched services from and to the MSC and SGSN. The DTCH (Dedicated Traffic Channel):  This channel is used for user data transfer between the network and a single user.  User data can be a digitized voice signal or IP packets of a packet- switched connection.  If a dedicated logical channel carries a traditional voice call, the channel is mapped to a dedicated physical channel. 91
  • 92. UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels If the dedicated logical channel carries packet-switched data, it is map the dedicated logical connection to a common or shared physical channel as shown in Figure 3.13. A packet-switched connection is mapped to a common channel after some time of inactivity. The shared channel was replaced with the High Speed Downlink Shared Channels (HS-DSCH). The CTCH (Common Traffic Channel): This channel is used for cell broadcast information. In GSM, the same mechanism is used by some network operators to inform subscribers of fixedline phone network area codes. 92
  • 93. UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels Transport Channels  Transport channels prepare downlink data frames for transmission over the air interface by splitting them up into smaller parts.  These are encapsulated into RLC/MAC-frames that are more suitable for transmission over the air interface. The RLC/MAC header that is placed in front of each frame contains the following information: 1.Length of the frame (10, 20, 40 or 80 milliseconds); 2.Type of integrity checking mechanism (CRC checksum); 3.Channel coding format for error detection and correction; 4.Rate matching in case the speed of the physical channel and the layers above do not match. 5.Control information for detection of discontinuous transmission (DTX) in case the other end has no data to send at a particular time. 93
  • 94. UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels  This is very important as channel coding includes the addition of error detection and correction bits to the data stream.  Logical channels are mapped to the following transport channels: 1.The BCH (Broadcast Channel): Transport channel variant of the logical BCCH. 2.The DCH (Dedicated Channel): This transport channel combines data from the logical DTCH and the logical DCCH.  The channel exists in both uplink and downlink directions as data is exchanged in both directions. 3.The PCH (Paging Channel): Transport channel variant of the logical PCCH. 4.The RACH (Random Access Channel):  The bidirectional logical CCCH is called RACH on the transport layer in uplink direction.  This channel is used by mobile devices to send RRC Connection Request messages to the network.  The channel is used by mobile devices to send user packet data if no dedicated channel exists between the mobile device and the network. 94
  • 95. UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels 5.The FACH (Forward Access Channel):  This channel is used by the network to send RRC Connection Setup messages to mobile devices.  The the network. message contains information for the mobile device on how to access  If the network has assigned a dedicated channel, the message contains, information on which spreading codes will be used in uplink and downlink directions.  The FACH can also be used by the network to send user data to a mobile device in case no dedicated channel has been allocated for a data transfer. 95
  • 96. UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels Physical Channels  Physical channels are responsible for offering a physical transmission medium for one or more transport channels.  Physical channels are responsible for channel coding, i.e. the addition of redundancy and error detection bits to the data stream.  The intermediate products between transport channels and physical channels are called Composite Coded Composite Transport Channel (CCTrCH)  It is not only possible to map several transport channels onto a single physical channel (e.g. the PCH and FACH on the S-CCPCH) The following physical channels are used in a cell: 1. The P-CCPCH (Primary Common Control Physical Channel): This channel is used for distributing broadcast information in a cell. 2. The S-CCPCH (Secondary Common Control Physical Channel): This channel is used to broadcast the PCH and the FACH. 96
  • 97. UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels 3. The PRACH (Physical Random Access Channel): The physical implementation of the RACH. 4. The AICH (Acquisition Indication Channel):  This channel is not shown in the channel overview figures.  There is no mapping of this channel to a transport channel.  The channel is used exclusively together with the PRACH during the connection establishment of a mobile device with the network. 5.The DPDCH (Dedicated Physical Data Channel):  This channel is the physical counterpart of a dedicated channel to a single mobile device.  The channel combines user data and signalling messages from (Packet) MM, CC and SM. 97
  • 98. UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels 6. The DPCCH (Dedicated Physical Control Channel):  This channel is used in addition to a DPDCH in both uplink and downlink directions.  It contains layer 1 information like Transmit Power Control (TPC) bits for adjusting the transmission power.  The channel is also used to transmit the so-called pilot bits.  These bits always have the same value and can thus be used by the receiver to generate a channel estimation, which is used to decode the remaining bits.  The UMTS concept of logical, transport, physical channels and the mappings between them is somewhat difficult to understand at first. 98
  • 99. UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels The following list summarizes the different kinds of channels and their main tasks: 1. Logical Channels:  These channels describe different flows of information like user data and signalling data.  Logical channels contain no information about the characteristics of the transmission channel. 2.Transport Channels:  These channels prepare data packets that are received from logical channels for transmission over the air interface.  This layer defines which channel coding schemes (e.g. error correction methods) are to be applied on the physical layer. 3.Physical Channels:  These channels describe how data from transport channels is sent over the air interface and apply channel coding and decoding to the incoming data streams. 99
  • 100. UMTS Channel Structure on the Air Interface – 3.Logical, Transport and Physical Channels The next section gives an idea of the way the channels are used for two different procedures. 1.Example: Network Search (Refer Reference book) 2.Example: Initial Network Access Procedure (Refer Reference book) 100
  • 101. The UMTS Terrestrial Radio Access Network (UTRAN)-Core Network Mobility Management 101
  • 102. UTRAN - Core Network Mobility Management The mobile device can be in any of the MM or PMM states described below from the point of view of the MSC and the SGSN. The MSC knows the following MM states: 1. MM Detached: The mobile device is switched off and the current location of the subscriber is unknown. Incoming calls for the subscriber cannot be forwarded to the subscriber and are either rejected or forwarded to another destination if the Call Forward Unreachable (CFU) supplementary service is activated. 2.MM Idle: The mobile device is powered on and has successfully attached to the MSC. 102
  • 103. UTRAN - Core Network Mobility Management The subscriber can at any time start an outgoing call. For incoming calls, the mobile device is paged in its current Location Area. 3. MM Connected: The mobile device and MSC have an active signaling and communication connection. The connection is used for a voice or a video call. The subscriber is in the Cell-DCH RRC state as this is the only bearer that supports circuit-switched connections. The SGSN implements the following PMM states: PMM Detached: The mobile device is switched off and the location of the subscriber is unknown to the SGSN. The mobile device cannot have an active PDP context, that is, no IP address is currently assigned to the subscriber. 103
  • 104. UTRAN - Core Network Mobility Management PMM Connected: The mobile device and the SGSN have an active signaling and communication connection. The PMM connected state is only maintained while the subscriber has an active PDP context, which effectively means that the GGSN has assigned an IP address for the connection. The SGSN simply forwards all incoming data packets to the Serving RNC (S-RNC). The UMTS SGSN is aware only of the S-RNC for the subscriber and not of the current cell. This is due to the desired separation of radio network and core network functionality and also due to the soft handover mechanism 104
  • 105. UTRAN - Core Network Mobility Management Depending on the QoS profile, the network load, the current data transfer activity and the required bandwidth, the mobile device can be either in Cell-DCH, Cell-FACH, Cell-PCH or URA-PCH state. PMM Idle: The mobile device is attached to the network but no logical signaling connection is established with the SGSN. This can be the case, if no PDP context is active for the subscriber. The RNC has the possibility to modify the RRC state of a connection at any time. RNC can decide after a period of inactivity of the connection to set the mobile device into the RRC Idle state. RNC no longer controls the mobility of the subscriber, it requests the SGSN to set the connection into PMM Idle State as well. 105
  • 106. UTRAN - Core Network Mobility Management The subscriber no longer has a logical connection to either the RNC or the SGSN. The PDP context remains active and the subscriber can keep the assigned IP address. If new data arrives for the subscriber from the GGSN, a new signaling and user data connection has to be established before the data can be forwarded to the mobile device. 106
  • 107. UTRAN - Radio Network Mobility Management Depending on the MM state of the core network, the radio network can be in a number of different RRC states. How the mobility management is handled in the radio network depends on the respective state. Table 3.5 gives an overview of the MM and PMM states in the core network and the corresponding RRC states in the radio network. 107
  • 108. UTRAN - Radio Network Mobility Management 1.Mobility Management in the Cell-DCH State 2.Mobility Management in Idle State 3.Mobility Management in Other States 108
  • 109. UTRAN - Radio Network Mobility Management 1.Mobility Management in the Cell-DCH State The important services like voice or video communication that little or no interruption of the data stream occurs during a cell change. Only the Cell-DCH state can be used. In this state, the network constantly controls the quality of the connection and is able to redirect the connection to other cells if the subscriber is moving. This procedure is called handover or handoff. A handover is controlled by the Radio Network Controller and triggered based on measurement values of the quality of the uplink signal measured by the base station and measurement reports on downlink quality sent by the mobile device. Measurement reports can be periodic or event triggered. 109
  • 110. UTRAN - Radio Network Mobility Management Different radio network vendors use different strategies for measurement reporting. UMTS needs additional criteria as neighboring base stations transmit on the same frequency. In UMTS, the following values are used: 1.RSSI: It is describe the total signal power received in milliwatts. The value is usually expressed in dBm (logarithmic scale) and typical values are −100dBm for a low signal level to −60 dBm for a very strong signal level. 2.RSCP (Received Signal Code Power): The power the pilot channel of a base station is received with. The RSCP can be used, to detect UMTS cell edge scenarios where no neighboring UMTS cell is available to maintain the connection. 110
  • 111. UTRAN - Radio Network Mobility Management The network takes action when the RSCP level falls below a network-operator-defined threshold. 3.EcNo: The received energy per chip (Ec) of the pilot channel divided by the total noise power density (No). The EcNo is the RSCP divided by the RSSI. The better this value the better the signal can be distinguished from the noise. The EcNo is usually expressed in decibels as it is a relative value. The value is negative as a logarithmic scale is used and the RSCP is smaller than the total received power. In UMTS a number of different handover variants have been defined. Hard Handover Soft Handover 111
  • 112. UTRAN - Radio Network Mobility Management – Hard Handover  This is as shown in Figure 3.26. This kind of handover is very similar to the GSM handover.  The mobile device of the active connection shows that measurement results of the signal strength of the broadcast channel of the neighboring cells, the RNC is able to recognize if a neighboring cell is more suitable for the connection.  To redirect the call into the new cell, a number of preparatory measures have to be performed in the network before the handover is executed.  The reservation of resources on the Iub interface and this procedure is similar to the resource reservation of a new connection. 112
  • 113. UTRAN - Radio Network Mobility Management – Hard Handover  Once the new connection is in place, the mobile device receives a command over the current connection to change into the new cell.  The handover command contains, frequency of the new cell, new channelization and scrambling code to be used.  The interruption of the data stream during this operation is usually quite short i.e. 100 milliseconds.  Once the mobile device is connected to the new cell the user data traffic can resume immediately. This kind of handover is called UMTS hard handover. 113
  • 114. UTRAN - Radio Network Mobility Management – Soft Handover  A voice call is not interrupted at any time during the procedure for this kind of handover.  On the basis of signal quality measurements of the current and neighboring cells, the RNC can decide to set the mobile device into soft handover state.  All data from and to the mobile device will then be sent and received not only over a single cell but also over two or even more cells simultaneously.  All cells that are part of the communication are called Active Set of the connection. Figure 3.27 Connections to a mobile device during a soft handover procedure with three cells.  If a radio connection of a cell in the Active Set deteriorates, it is removed from the connection.  Thus it is ensured that despite the cell change, the mobile device never losses contact with the network. 114
  • 115. UTRAN - Radio Network Mobility Management – Soft Handover  The Active Set can contain up to six cells at the same time, but operational networks no more than two or three cells are used at a time.  Figure 3.27 shows a soft handover situation with three cells.  The soft handover procedure has a number of advantages over the hard handover.  No interruption of the user data traffic occurs during the soft handover procedure. Figure 3.27 Connections to a mobile device during a soft handover procedure with three cells.  The soft handover procedure can be initiated while the signal quality of the current cell is still acceptable the possibility of a sudden loss of the connection is reduced. 115
  • 116. UTRAN - Radio Network Mobility Management – Soft Handover  The transmission power and hence the energy consumption of the mobile device can be reduced in some situations as shown in Figure 3.28.  In this scenario, the subscriber first roams into an area in which it has a good coverage by cell 1.  As the subscriber moves, there are times when buildings or other obstacles are in the way of the optimal transmission path to cell 1.  As a consequence, the mobile device needs to increase its transmission power. Figure 3.28 Soft handover reduces the energy consumption of the mobile due to lower transmission power.  If the mobile device is in soft handover state however, cell 2 still receives a good signal from the mobile device and can thus compensate for the deterioration of the transmission path to cell 1.  As a consequence, the mobile device is not instructed to increase the transmission power. 116
  • 117. UTRAN - Radio Network Mobility Management – Soft Handover  The RNC has to make a decision for every connection in handover state every 10, 20, 40 or 80 milliseconds, depending on the size of the radio frame.  In the downlink direction, the mobile device receives identical frames from cell 1 and cell 2.  As the cells use different channelization and scrambling codes the mobile device is able to separate the two data streams on the physical layer (see Figure 3.29).  The mobile device has to decode the data stream twice, which of course slightly increases the power consumption as more processing power is required. Figure 3.29 Use of scrambling codes while a mobile device is in soft handover state.  The soft handover procedure has an advantage because the mobile device uses less transmission power compared to a single cell scenario in order to reach at least one of the cells in the Active Set  This increases the capacity of the overall system, which in turn increases the number of subscribers that can be handled by a cell. 117
  • 118. UTRAN - Radio Network Mobility Management – Soft Handover  Figure 3.30 shows a scenario that includes an S-RNC and D-RNC.  If a foreign cell needs to be included in the Active Set, the S-RNC has to establish a link to the D-RNC via the Iur interface.  The D-RNC then reserves the necessary resources to its cell on the Iub interface and acknowledges the request.  The S-RNC in turn informs the mobile device to include the new cell in its Active Set via an ‘Update Active Set’ message.  At this point onward, all data arriving at the S-RNC from the core network will be forwarded via the Iub interface to the cells that are directly connected to the S- RNC and also via the Iur interface to all D-RNCs.  These in turn forward the data packets to the cells under their control.  In the reverse direction, the S-RNC is the point of concentration for all uplink packets as the D-RNCs forward all incoming data packets for the connection to the S-RNC. 118
  • 119. UTRAN - Radio Network Mobility Management – Soft Handover  Softer handover is defined, which is used when two or more cells of the same Node-B are part of the Active Set.  In UMTS controlling the timing advance is not possible because mobile device is in soft handover state.  If a subscriber continues to move away from the cell in which the radio bearer was initially established, there will be a point at which not a single Node-B of the S-RNC is part of the transmission chain anymore.(Figure 3.31).  As this state is a waste of radio network resources, the S-RNC can request a routing change from the MSC and the SGSN on the Iu(cs)/Iu(ps) interface.  This procedure is called a Serving Radio Network Subsystem (SRNS) Relocation Request.  If the core network components agree to perform the change, the D-RNC becomes the new S-RNC and the resources on the Iur Interface can be released. 119
  • 120. UTRAN - Radio Network Mobility Management – Soft Handover  An SRNS relocation is also necessary if a handover needs to be performed due to degrading radio conditions and no Iur connection is available between two RNCs.  When the first GSM networks were built at the beginning of the 1990s, the number of users was very small.  When the first UMTS networks became operational, the situation had changed completely.  The design of UMTS mobile devices had to incorporate GSM and GPRS.  If the user roams into an area that is only covered by a 2G network, the mobile device automatically switches over to GSM and GPRS network.  No interrupt ongoing voice or data calls.  The UMTS standards also include procedures to handover an active connection to a 2G network.  This handover procedure is called intersystem handover (Figure 3.32). 120
  • 121. UTRAN - Radio Network Mobility Management – Soft Handover  In UMTS there are a number of different possibilities to perform an intersystem handover.  The first intersystem handover method is the blind intersystem handover.  The RNC is aware of GSM neighboring cells for certain UMTS cells.  In the event of severe signal quality degradation, the RNC reports to the MSC or SGSN that a handover into a 2G cell is necessary. The procedure is called a ‘blind handover’.  The advantage of this procedure is the simple implementation in the network and in the mobile devices. There are a number of downsides as well: 1. The network does not know if the GSM cell can be found by the mobile device. Figure 3.33 A UMTS cell with several GSM neighboring cells presents a problem for blind intersystem handovers. 2.The mobile device and the target GSM cell are not synchronized. 121
  • 122. UTRAN - Radio Network Mobility Management – Soft Handover  This considerably increases the time it takes for the mobile device to contact the new cell once the handover command has been issued by the network.  During a voice call he might notice a short interruption of the voice path. 3. If a UMTS cell has several GSM neighboring cells, as shown in Figure 3.33, the RNC has no means to distinguish which would be the best one for the handover. Figure 3.33 A UMTS cell with several GSM neighboring cells presents a problem for blind intersystem handovers. 122
  • 123. UTRAN - Radio Network Mobility Management – Soft Handover  While network vendors can choose which of the options described below they want to implement, the support of all options is required in the mobile device: 1. Reduction of the spreading factor:  The spreading factor is reduced for some frames. More data can be transmitted during these periods.  This allows the insertion of short transmission gaps for interfrequency measurement purposes. 2. Puncturing:  After the channel coder has added error correction and error detection bits to the  original data stream, some of them are removed again to have time for interfrequency measurements. 3. Reduction of the number of user data bits per frame:  Fewer bits are sent per frame, the transmission power does not have to be increased. 123
  • 124. UTRAN - Radio Network Mobility Management – Soft Handover Figure 3.34 shows how an intersystem handover from UMTS to GSM is performed. The procedure starts on the UTRAN side like a normal inter- MSC handover by the RNC sending an SRNS relocation request. Thus, for the 2G MSC, the handover looks like a normal GSM to GSM handover. and is treated accordingly. 124
  • 125. UTRAN - Radio Network Mobility Management – Soft Handover  * 125
  • 126. UTRAN - Radio Network Mobility Management – Soft Handover 2.Mobility Management in Idle State  The mobile device is passive, i.e., no data is sent or received.  There are a number of tasks that have to be performed periodically by the mobile device.  To be able to respond to incoming voice calls, short messages, MMS messages, etc.,  If a paging message is received then mobile device establishes a connection with the network.  The monitoring of the paging channel consumes some power.  Paging messages for a subscriber of each group are then broadcast at certain intervals.  Mobile device does not have to listen for incoming paging messages all the time.  The disadvantage of this approach is, the paging procedure takes a little bit longer.  In Idle state, the mobile device is responsible for mobility management, that is, changing to a more suitable cell when the user is moving.  As the network is not involved in the decision-making process, the procedure is called cell reselection.  No physical or logical connection exists between the radio network and the mobile device.  It is necessary to reestablish a physical connection over the air interface if data needs to be transported again.  RRC Idle state implies that no voice connection is established. 126
  • 127. UTRAN - Radio Network Mobility Management – Soft Handover 3.Mobility Management in Other States  In Cell-FACH, Cell-PCH or URA-PCH state, the mobile device is responsible for mobility management and cell changes.  The big difference between these states and the Idle state is that a logical connection exists between the mobile device and the radio network when a packet session is active.  The mobile device has to perform certain tasks after a cell change depending on the state.  In Cell-FACH state the mobile device can exchange data with the network at any time.  If the mobile device performs a cell change it has to inform the network straight away via a cell update message. Figure 3.35 Cell change in PMM connected state to a cell that cannot communicate with the S-RNC.  If the new cell is connected to a different RNC, the cell update message will be forwarded to the S-RNC of the subscriber via the Iur interface.  The mobile device has a logical connection to the network, no Location or Routing Area Update is necessary. 127
  • 128. UTRAN - Radio Network Mobility Management – Soft Handover 3.Mobility Management in Other States  If the new serving cell is connected to an RNC that does not have an Iur interface to the S-RNC of the subscriber, the cell update will fail.  As the new RNC cannot inform the S-RNC of the new location of the subscriber, it will reset the connection and the mobile device automatically defaults to Idle state.  To resume data transmission, the mobile device then performs a location update with the MSC and SGSN as shown in Figure 3.35.  As the SGSN detects during the location and routing area update that there is still a logical connection to a different RNC. Figure 3.35 Cell change in PMM connected state to a cell that cannot communicate with the S-RNC.  Thus, it is ensured that all resources that are no longer needed to maintain the connection are released.  The Cell-PCH is almost identical to the Cell- FACH state from the MM point of view.  The only difference is that no data can be transmitted to the mobile device in Cell-PCH state. 128
  • 129. UTRAN - Radio Network Mobility Management – Soft Handover 3.Mobility Management in Other States  There is the URA-PCH state, which only requires cell update message to be sent to the network if the subscriber roams into a new URA.  The URA is a new concept that has been introduced with UMTS. It refines a location area as shown in Figure 3.36.  The core network is not aware of UTRAN Registration Areas. Even single cells have been abstracted into so-called Service Areas.  This is in contrast to a GSM/GPRS network, where the MSC and SGSN are aware of the location area and even the cell-ID in which the mobile device is located during an active connection.  In UMTS, the location area contain one or more service areas. Figure 3.36 Location concepts of radio- and core network. 129
  • 130. UTRAN - Radio Network Mobility Management – Soft Handover 3.Mobility Management in Other States  Figure 3.36 Location concepts of radio- and core network.  It is possible to assign only a single cell to a service area to be able to better pinpoint the location of a mobile device in the core network.  It was clearly separate the location principles of the core network, which is aware of Location Areas, Routing Areas , Services Areas and the radio network that deals with UTRAN registration areas and single cells.  Core network and radio network are thus logically decoupled.  The mapping between the location principles of core and radio network is done at the interface between the two networks, the RNC. Figure 3.36 Location concepts of radio- and core network. 130
  • 132. UMTS Security UMTS has strong security measures to prevent unauthorized use and eavesdropping on user data traffic and conversations. UMTS also includes enhancements to overcome a number of weaknesses. The following are the main weaknesses: 1. The GSM circuit-switched part does not protect the link between the base station and the BSC. In many cases microwave links are used, which are vulnerable to third party monitoring. 2. GSM allows man-in-the-middle attacks with equipment that masquerades as a GSM base station. 3. The CK length used in GSM is 64 bits. Although secure when GSM was first developed in the early 1990s, the length is considered insufficient today. 132
  • 133. UMTS Security 4. A number of weaknesses with the A5/1 stream cipher have been detected, which allow decryption of a voice conversation with the appropriate equipment. UMTS addresses these weaknesses in a number of ways. one-pass authentication and key agreement (AKA) procedure is used with immediate activation of ciphering after successful authentication. When a mobile device attaches to the network after power-up, it tries to register with the network by initiating location and routing area update procedures. At the beginning of the message exchange the mobile device transmits its identity (IMSI or TMSI and PTMSI), which it retrieved from the SIM. 133
  • 134. UMTS Security If the subscriber is not known by the MSC/VLR and/or the SGSN, authentication information has to be requested from the authentication center, which is part of the HLR. The random number (RAND), the expected response (XRES) and the CK, which are also used in GSM. These are the integrity key (IK) and the authentication token (AUTN). These five values form an authentication vector. The AUTN serves two purposes. 1. The AuC generates the AUTN from a random number and the secret key of the subscriber. It is then forwarded together with the random number to the mobile device in an MM authentication request message. 134
  • 135. UMTS Security 2.The mobile device then uses the AUTN to verify that the authentication procedure was initiated by an authorized network. The authentication token additionally includes a sequence number, which is increased in both the network and the mobile device after every successful authentication. This prevents attackers from using intercepted authentication vectors for fake authentications later on. UMTS device has to generate a response value that it returns to the network in the MM authentication response message. The MSC/VLR or SGSN then compares the response value to the XRES value, which they received as part of the authentication vector from the HLR/AuC. If both values match, the subscriber is authenticated. 135
  • 136. UMTS Security Ciphering between the mobile device and the network is activated when the network sends a RANAP Security Mode Command message to the RNC. This message contains the 128-bit CK. UMTS calls are ciphered by the RNC. This prevents eavesdropping on the Iub interface between the RNC and the base station.  An RRC security mode command message informs the mobile device that ciphering is to be activated. Security mode command messages activate not only ciphering but also integrity checking for signaling messages. It is mandatory for integrity checking to be activated after authentication. 136
  • 137. UMTS Security Integrity checking is performed for RRC, CC, SM, MM and GMM messages between the mobile device and the network The most important parameters for the RNC to calculate the stamp are the content of the signaling message and the IK, which is part of the authentication vector. Integrity checking is done for both uplink and downlink signaling messages. The calculation of the key is performed by the SIM card, using the secret key and the random number. The IK is also never exchanged between the mobile device and the network. Keys for ciphering and integrity checking have a limited lifetime to prevent attempts to break the cipher or integrity protection by brute force during long duration monitoring attacks. 137
  • 138. UMTS Security Authentication, ciphering and integrity checking are performed independently for circuit-switched and packet-switched connections. This is because the MSC handles circuit-switched calls while the SGSN is responsible for packet sessions. UMTS also introduces new algorithms to calculate the different parameters used for authentication, ciphering and integrity checking. All actions that require the secret key are performed on the SIM card, to protect the secret key. When the mobile device detects an old GSM SIM card it informs the network during connection establishment that a GSM- backward-compatible authentication procedure is required. 138
  • 139. UMTS Security The UMTS ciphering and IKs are then computed by the mobile device based on the GSM CK that is returned by the SIM card. 139
  • 140. Reference: Martin Sauter, "From GSM TO LTE, An Introduction to Mobile Networks and Mobile Broadway", Wiley 2014. 140