BTS functions include modulation, channel coding, interleaving, encryption, frequency hopping, frame formatting, and signal strength measurements. The CGI uniquely identifies a cell using LAI and CI. The FCCH carries frequency synchronization information. The SCH carries timing synchronization and BSIC information. The BCCH broadcasts cell information like LAI and CI. The PCH pages mobiles for calls/SMS. The RACH is used by mobiles to request resources. The AGCH sends resource grants in response to RACH requests. The SDCCH is used for location updates, call setup, and SMS. The SACCH carries signal strength measurements and timing/power control information. The FACCH can replace bursts on the SDC
ell Allocation (CA) is the subset of the total frequency band that is available for one BTS. It can be viewed as the total transport resource available for traffic between the BTS and its attached MSs. One Radio Frequency CHannel (RFCH) of the CA is used to carry synchronization information and the Broadcast Control CHannel (BCCH). This can be any of the carriers in the cell and it is known as the BCCH carrier or the c
carrier. Strong efficiency and quality requirements have resulted in a
0
rather complex way of utilizing the frequency resource. This chapter describes the basic principles of how to use this resource from the physical resource itself to the information transport service offered by the BTS.
Carrier separation is 200 kHz, which provides: • 124 pairs of carriers in the GSM 900 band • 374 pairs of carriers in the GSM 1800 band • 299 pairs of carriers in the GSM 1900 band
Using Time Division Multiple Access (TDMA) each of these carriers is divided into eight Time Slots (TS). One TS on a TDMA frame is called a physical channel, i.e. on each duplex pair of carriers there are eight physical channels.
A variety of information is transmitted between the BTS and thMS. The information is grouped into different logical channelsEach logical channel is used for a specific purpose such as paging, call set-up and speech. For example, speech is sent on the logical channel Traffic CHannel (TCH). The logical channels are mapped onto the physical channels.
The information in this chapter does not include channels specific for GPRS (General Packet Radio Service). For basic information on GPRS see chapter 14 of this documentation.
• -How the channel concept is used on the radio interface
• -Different burst formats in the radio interface
• -The hierarchical frame structure
• -The content sent in different logical channels
• -The mapping of the logical channels
• -Superframe and Hyperframe
• -MOBILE STATIONS ISDN NUMBER (MSISDN)
• INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
• TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)
• LOCATION AREA IDENTITY (LAI)
• CELL GLOBAL IDENTITY (CGI)
• BASE STATION IDENTITY CODE (BSIC)
• PIN management
Hi.....
Add 4G parameters in tems window||
https://www.youtube.com/watch?v=FmKi0O9dWpQ&t=3s
Training of 2G+3G+4G ON TEMS
https://www.youtube.com/watch?v=F2Ly5n4S8Xs
Like subscribe and share
ell Allocation (CA) is the subset of the total frequency band that is available for one BTS. It can be viewed as the total transport resource available for traffic between the BTS and its attached MSs. One Radio Frequency CHannel (RFCH) of the CA is used to carry synchronization information and the Broadcast Control CHannel (BCCH). This can be any of the carriers in the cell and it is known as the BCCH carrier or the c
carrier. Strong efficiency and quality requirements have resulted in a
0
rather complex way of utilizing the frequency resource. This chapter describes the basic principles of how to use this resource from the physical resource itself to the information transport service offered by the BTS.
Carrier separation is 200 kHz, which provides: • 124 pairs of carriers in the GSM 900 band • 374 pairs of carriers in the GSM 1800 band • 299 pairs of carriers in the GSM 1900 band
Using Time Division Multiple Access (TDMA) each of these carriers is divided into eight Time Slots (TS). One TS on a TDMA frame is called a physical channel, i.e. on each duplex pair of carriers there are eight physical channels.
A variety of information is transmitted between the BTS and thMS. The information is grouped into different logical channelsEach logical channel is used for a specific purpose such as paging, call set-up and speech. For example, speech is sent on the logical channel Traffic CHannel (TCH). The logical channels are mapped onto the physical channels.
The information in this chapter does not include channels specific for GPRS (General Packet Radio Service). For basic information on GPRS see chapter 14 of this documentation.
• -How the channel concept is used on the radio interface
• -Different burst formats in the radio interface
• -The hierarchical frame structure
• -The content sent in different logical channels
• -The mapping of the logical channels
• -Superframe and Hyperframe
• -MOBILE STATIONS ISDN NUMBER (MSISDN)
• INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
• TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)
• LOCATION AREA IDENTITY (LAI)
• CELL GLOBAL IDENTITY (CGI)
• BASE STATION IDENTITY CODE (BSIC)
• PIN management
Hi.....
Add 4G parameters in tems window||
https://www.youtube.com/watch?v=FmKi0O9dWpQ&t=3s
Training of 2G+3G+4G ON TEMS
https://www.youtube.com/watch?v=F2Ly5n4S8Xs
Like subscribe and share
Creative commons, an alternative solution to copyright restrictionsalbamunyoz
This report provides an analysis and exhaustive explanation of Copyright restrictions in order to encourage creators to choose Creative Commons licenses. The purpose is not only to give a clear understanding of why authors should chose Creative Commons licenses, but also to raise awareness of the harmful consequences of Copyright for the whole society or the public domain.
Business Pan for my previous startup Intellex Marketing, a retail media and marketing analytics firm, which delivers targeted promotions and marketing messages in a modern trade store at the POS in the form of printed coupons. Each promotion is customized based on the basket contents. Our solution is a great tool for brand marketers and merchandisers to reach their target segment thereby reducing marketing spillage and influencing shopper behavior.
Los lamentables 32 días de estadía de mi madre en la Residencia para Adultos...Sandra G. C. Cabrera
Comparto con ustedes un escrito personal sobre una muy dolorosa y triste situación que me (nos) tocó vivir durante los últimos días de vida de mi madre.
Creative commons, an alternative solution to copyright restrictionsalbamunyoz
This report provides an analysis and exhaustive explanation of Copyright restrictions in order to encourage creators to choose Creative Commons licenses. The purpose is not only to give a clear understanding of why authors should chose Creative Commons licenses, but also to raise awareness of the harmful consequences of Copyright for the whole society or the public domain.
My presentation on need for resiliency and how to achieve using Netflix Hystrix. This was received well across the team and uploading for the sake of others
This presentation discusses about the WCDMA air Interface used in 3G i.e. UMTS. This Radio Interface has great capability on which Third Generation of Mobile Communication is built, with backward compatibility.
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
Distributed contention based mac protocol for cognitive radioIffat Anjum
Introduction
System Model
DC-MAC Design
Network Initialization
DC-MAC Working
Data Transfer on Home Channel
Data Transfer on a Foreign Channel
Performance Analysis
Conclusion
References
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Monitoring Java Application Security with JDK Tools and JFR Events
New rough
1. BTS function
Modulation/De-modulation
Channel Coding/Decoding
Interleaving
Encryption/Ciphering
Frequency Hopping
TRAU Frame Formatting
BCCH management
Signal Strength Measurement for active connections
Idle Channel Measurements on free channels
To identify a cell uniquely across PLMNs, an identity called the Cell Global
Identity (CGI) is defined. CGI is obtained by the concatenation of LAI and the
CI.
Frequency Correction Channel: FCCH
One way channel operating in forward direction and using frequency correction
burst format
Bears information for Frequency Synchronization
142 all 0 bits in this burst causes GMSK modulator to deliver an unmodulated
carrier for the entire duration of the timeslot
Upon detecting this sine wave the MS can adjust its frequency reference
appropriately
Synchronization Channel (SCH)
Uses the synchronization burst format
Raw Data information for SCH is of 89 bits
64 bits are same for each cell and helps them to achieve timing synchronization.
6 bits are for the identification of BTS and mapped on Base Station Identity
Code (BSIC) = NCC (3 bit) + BCC (3 bit)
BSIC avoids ambiguity or interference which can arise when a MS can receive SCH
from two cells using the same BCCH frequency.
Network Colour Code (NCC)
Used to identity the BTS for which measurement is made.
Base-Station Colour Code (BCC)
Each 8 BCC value maps to a different Training Sequence.
Different training sequences allow for a better transmission in case of
interference
19 bits represent the TDMA frame number (reduced frame number)
Broadcast control channel (BCCH)
One way channel operating in the forward direction and using the normal burst
format
BCCH Occur in timeslot 0 of some specific carriers known as BCCH carriers
After locking on to the frequency and frame structure in the cell, MS needs some
more general information broadcast on the BCCH for call setup purposes
Cell Identity (CI)
Network Identity (LAI)
Control Channel structure
BCCH Frequencies of neighboring cells
GPRS Supported or not.
Paging Channel: PCH
One way channel operating in the forward direction and using the normal burst
format
Mobile subscribers are paged this channel for incoming calls or short messages
Every MS in a cell periodically listen to this channel
Uses same coding scheme as used for BCCH
Random Access Channel: RACH
One way channel operating in the reverse direction and using the access burst
format
When MS wants to initiate dialogue with network, this channel is used to send
request to network for a dedicated resource
The actual communication between the MS and the network will takes place later
on the dedicated channel.
If the request is not granted within a specific time period, the MS repeats the
2. request on RACH
Access Grant Channel: AGCH
AGCH is a one way channel operating in forward direction and using the normal
burst format
In response to requests from different MS on RACH, the network allocates a
specific dedicated signaling channel (SDCCH) against each request for further
communication.
The response to the request is sent on AGCH.
Uses same coding scheme as used for BCCH
Stand-alone Dedicated Control Channel: SDCCH
Two way channel using normal burst format
As per the allocation conveyed over the AGCH, both the MS & the BTS switch over
to the assigned SDCCH for a further communication
The Following tasks require the use of SDCCH
Location Updates
Call Setup
SMS
Uses the same coding scheme as used by BCCH
Slow Associated Control Channel: SACCH
Two way channel using normal burst format
SACCH is always associated with TCH or SDCCH
When associated with a TCH, the SACCH occurs in 12 or 25 frame of each 26-frame
multi frame
Each message comprises of 456 bits so 4 multi frames are required to transmit a
message
Since a 26-frame multiframe requires 120ms, a SAACH message over 4 multi-frame
requires 480ms.
Thus, power control that is linked to SAACH exchanges is hindered by the low
rates of SAACH exchange. (But then, SAACH was meant to be slow!)
Used to convey the periodic carrier-signal strength measurements to the network
While an MS is busy on a call over a traffic channel (TCH) or in communication
with MSC on the SDCCH, MS takes periodic carrier-signal strength measurements on
own base station & neighboring base stations.
Based on the analysis of measurements taken by BTS & the MS, the BSC conveys
information on timing advance & MS transmitter power control
Uses the same coding scheme as used by BCCH
Fast Associated Control Channel: FACCH
FACCH is a two way channel using normal burst format
FACCH can be associated with SDCCH or TCH
FACCH works on the principle of stealing
The burst of speech is replaced by FACCH signaling
FACCH is used to convey
Handover information
Uses the same coding scheme as used by BCCH
Full Rate Traffic Channel
This channel carries information at rate of 22.8 Kbps
Half Rate Traffic Channel
This channel carries information at rate of 11.4 Kbps
Enhanced Full Rate Speech
GMSK Adaptive Multi Rate (Half Rate and Full Rate)
Circuit Switched Data (Transparent): 600/1200, 2400, 4800, 9600, 14400.
Circuit Switched Data (Non-transparent): 9600, 14400.
Group 3 Fax: 2400, 4800, 9600, 14400.
CS 1 to 4
MCS 1 to 9
High-Speed Circuit Switched Data (HSCSD) for 9.6/14.4 kbps
Enhanced Circuit Switched Data 28.8/32.0/43.2 Kbps per TS
Generally two configurations are mainly used
Separate SDCCH: FCCH + SCH + BCCH + CCCH
Addresses a channel configuration in which no SDCCH are available on TS 0.
In this case SDCCH sub channels are defined on TS 1
Rest of the TS are used by Traffic channels
Combined SDCCH: FCCH + SCH + BCCH + CCCH + SDCCH/4
3. Addresses a channel configuration in which all control channels are assigned to
TS 0
In this case TS1 is also available for Traffic channels
The downlink direction of TS 0 of the BCCH-TRX is used by various channels.
FCCH
SCH
BCCH
Four SDCCH sub channels (optional);
CCCH
This use is possible because the logical channels can time-share TS 0 in
different TDMA frames of 51 frame Multi frame
Multiplexing of FCCH + SCH + BCCH + CCCH on TS 0 of radio frequency C0 (51 Frame
Multiframe)
Cycle of 51 TDMA frame (0-50), The structure is repeated after IDLE frame
It contains one block of 4 frames for BCCH and 9 Blocks of 4 frames for CCCH
(AGCH/PCH)
Referred to as OMUSIG channel
There is one OMUSIG channel per BTS (typically 16 to 64Kbps).
BSC controls operations of the whole BTS through this channel.
There is O&M SW running on BTS that handles all command on O&M channel.
OMUSIG uses LAPD as link layer protocol.
Typical operations include:
Initialization
Configuration
SW Download
Alarm handling and Fault reporting
Block and Reset
Loop Test and other test operations
Referred to as TRXSIG channel
There is one TRXSIG channel per TRX (typically 16 Kbps).
All mobile signalling (including RR signalling) is carried over TRXSIG channel.
There is RR SW running on each TRX that handles all command on TRX signaling
channel.
TRXSIG uses LAPD as link layer protocol.
Typical operations is explained in subsequent slides.
Apart from the OMUSIG and TRXSIG channels, there are traffic channels for each
Timeslot of a TRX.
Thus, if there are N TRX, then there are 8N traffic channels, each of 16Kbps
link speed.
A host of traffic types can be carried, each with different channel coding. The
following are some of the basic traffic channel types:
Full Rate
Half Rate Speech
The traffic channels are carried over either TRAU frame format or GPRS Layer 1
frame format.
These frame formats define how BTS and BSC exchange stream of information at
layer 1.
For example, while 13Kbps is required for carrying user traffic on Abis, the
TRAU frame is allocated 3Kbps. Thus, there is bandwidth for signaling traffic.
Note: There is no LAPD for traffic channels. LAPD provides reliable delivery and
is not feasible for user traffic.
PAGE119
At L3, Abis Interface defines a set of sub-procedures (48.058)
At L2, the LAPD protocol is followed based on Q.931(48.056)
At L1, the E1 PCM structure is followed
The TRXSIG Layer 3 Signaling has four basic set of procedures:
Common Channel Management
Dedicated Channel Management
4. Radio Link Management
TRX Management
Refer 3GPP 48.058 for details
Common Channel Management includes procedures for enabling mobile to obtain
dedicated channels (I.e. SDCCH and TCH) for communication. Till such state is
reached, the communication takes place through RACH and AGCH.
The procedures belonging to this category include:
System Information Broadcast (over BCCH)
Paging (over PCH)
Initial Channel Request (via RACH)
Immediate Assignment (over AGCH)
Note: The logical channels shown in brackets do not apply for Abis. It
only indicates for example that Paging message received over Abis is sent over
PCH channel or random access received over RACH is relayed over Abis.
Dedicated Channel Management includes procedures for managing the state of
dedicated channels (I.e. SDCCH and TCH).
The procedures belonging to this category include:
Channel Activation/release
Handover support
Mode modify
Power Control
Measurement Reporting
Ciphering Control
Radio Link Management procedures relay the actions on air interface to BSC over
Abis or receive instructions from BSC to trigger actions over air interface.
The procedures belonging to this category include:
Request/Indication for Link Establishment
Request/Indication for Link Release
Transparent data transfer from MS to BSC
Transparent data transfer from BSC to MS
TRX Management procedures include few other procedures related to measurement
handling.
The procedures belonging to this category include:
Interference on idle channels
Note: Measurement of interference on idle channels is different from
measurements for dedicated channels. The latter form part of dedicated channel
handling procedures.
Some form of flow control
Error control
LAPD frame format is specified by ITU Q.920 and Q.921.
3GPP TS 48.056 adapts this to provide signaling on Abis interface.
LAPD provides reliable data link layer for information transfer.
Option is available to send relatively less important messages in un-
acknowledged mode.
The mobile sees various protocol layers:
Layer 1: GSM Physical layer with BTS (already covered)
Layer 2: LAPDm layer with BTS
Layer 3a: RR layer with BSC
Layer 3b: MM/CC layer with MSC
Based on LAPD protocol, but adapted for mobile environment.
That is why it is referred to as modified LAPD or simply LAPDm.
The modifications from LAPD are as follows:
There is no Frame Check
This functionality is provided by channel coding/interleaving
There is no start and end flag
Frame delineation is done by use of burst
The first set of messages (I.e. SABME) can carry layer 3 data to save air
interface resources.
LAPDm carries ‘maximum‘ message size of 18 to 23bytes.
LAPDm is defined in 3GPP TS 04.05 and 04.06
There are different types of LAPDm format:
A-format: A frame in the A-format generally can be sent on any DCCH in both
5. directions, uplink and downlink. The A-format frame is sent as a fill frame when
no payload is available on an active connection.
B-format: The B-format is used on the Air-interface to transport the actual
signaling data; hence, every DCCH and every ACCH use this format. If the
information to be transmitted requires less space, this space has to be filled
with fill-in octets.
Bbis format: Most simple one is the Bbis in which there is no header/trailer
(just the information field). This is used for BCCH, PCH, and AGCH. For this,
addressing is not necessary, since these are CCCHs, in which addressing is not
required. In contrast to the DCCH, the CCCH transports only point-to-multipoint
messages.
Note: For CCCH, the LAPDm is effectively short-circuited (I.e. no LAPDm).
Note: For traffic channels, there is no LAPDm.
Important LAPDm parameters:
SAPI:
0 for RR, MM and CC
3 for SMS and SS
Um Protocols: L3 protocol
At L3, the protocols residing on Um interface are:
Radio Resource Protocol
Mobility Management Protocol
Call Control
Supplementary Service
Short Message Service
The message type is identified by the Protocol Discriminator.
L3 Um Protocols: Radio Resource Management
The RR protocol is specified in 04.18
The messages are processed in the BSS or even in the MSC.
The RR protocol is required for managing physical and logical channels of GSM
Air interface
Important procedures are:
Channel Request Procedures
System Information Broadcast Procedures
Paging Procedures
Cipher mode Handling
Handover Related Procedures
Measurement Reports
Some of these procedures are explained in Procedure section.
L3 Um Protocols: Mobility Management
The MM protocol is specified in 24.008
The MM messages are processed between MS and MSC/VLR.
The MM protocol is required for managing terminal mobility, temporary identity
management, authentication, etc.
Important procedures are:
IMSI Attach/Location Updated
IMSI Detach
Authentication Request/Response
Identity Request
TMSI Re-allocation
Service Request
L3 Um Protocols: Call Control
The CC protocol is specified in 24.008
The CC messages are processed between MS and MSC/VLR.
The CC protocol is required for managing calls.
Important procedures are:
Setup
Call Proceeding
Alerting
Connect
Release
6. Release Complete
L3 Um Protocols: SS and SMS
The SS and SMS related L3 protocol is specified in 24.010/011
These messages are processed between MS and MSC/VLR.
Important procedures are:
Register/Facility for SS procedure
Similarly, there are procedures for sending/receiving SMS
A Interface Protocol: BSSAP
Used between MSC and BSS
The BSS Application Part (BSSAP) is split into two sub application parts, these
are:
BSS Management Application Part (BSSMAP)
Supports the procedures between MSC and BSS for call handling and resource
management.
For e.g. Paging, Reset, etc.
Direct Transfer Application Part (DTAP).
This includes the MM and CC messages as discussed earlier.
These messages are transparent to the BSS
Defined in 3GPP TS 08.08
A Interface Protocol: BSSmAP
Used between MSC and BSS
Defined in 3GPP TS 08.08
Important procedures include
Assignment
Handover
Reset
Cipher Mode
Others