The document summarizes the key components and protocol architecture of a UMTS network. It describes the domains and reference points that divide a UMTS system. The radio access network (UTRAN) consists of Radio Network Subsystems (RNSs) with Node Bs and Radio Network Controllers (RNCs). The interfaces between these components, such as Iu, Iur, Iub and Uu, have user, control and transport planes with various protocols to support communication and control functions. Key responsibilities are distributed between the RNC for radio resource control and the Node B for lower-level radio access functions.
WIRELESS NETWORKS _ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORKS PPT
POWER POINT PRESENTAION ON WIRELESS NETWORKS
BABU M
ASST PROFESSOR/ ELECTRONICS AND COMMUNICATION ENGINEERING,
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI, THIRUVALLUR DISTRICT
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPTbabuece
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
BABU M
ASST PROFESSOR
DEPARTMENT OD ELECTRONICS AND COMMUNICATION ENGINEERING
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI
THIRUVALLUR DISTRICT
The document discusses various protocols and approaches for improving the performance of TCP over wireless networks. It notes that wireless networks have higher bit error rates, lower bandwidth, and mobility issues compared to wired networks. Several protocols are described that aim to distinguish wireless losses from congestion losses to avoid unnecessary TCP reactions:
- Indirect TCP splits the connection and handles losses locally at the base station. Snoop caches packets at the base station for retransmission.
- Mobile TCP further splits the connection and has the base station defer acknowledgments. It can also inform the sender about handoffs versus interface switches.
- Multiple acknowledgments uses two types of ACKs to isolate the wireless and wired portions of the network.
-
The document discusses several mechanisms used in TCP for mobile computing. It describes:
1) TCP congestion control mechanisms like slow-start and fast retransmit/fast recovery which are designed to address packet loss. However, these can be inappropriate for wireless networks where packet loss is often due to errors rather than congestion.
2) Approaches like Indirect TCP, Snooping TCP, and Mobile TCP which modify TCP for mobile networks by splitting connections or having a supervisory host monitor the connection to enable local retransmissions and avoid unnecessary window reductions when the mobile host disconnects.
3) Other TCP optimizations for mobile like forced fast retransmit after handovers and transmission timeout freezing to avoid slow-start
This document discusses various approaches to improving TCP performance over mobile networks. It describes Indirect TCP, Snooping TCP, Mobile TCP, optimizations like fast retransmit/recovery and transmission freezing, and transaction-oriented TCP. Each approach is summarized in terms of its key mechanisms, advantages, and disadvantages. Overall, the document evaluates different ways TCP has been adapted to better support mobility and address challenges like frequent disconnections, packet losses during handovers, and high bit error rates over wireless links.
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPPLouis K. H. Kuo
The document provides an overview of elementary procedures for circuit-switched call control in 3GPP networks. It describes the background of related protocol layers and planes. Call control manages call establishment, clearing, information, and miscellaneous procedures. The main call types are mobile-originated, mobile-terminated, and network-initiated mobile-originated calls. Standard L3 messages follow specific formats and structures, and the call state is represented by state diagrams and message flow diagrams.
The document discusses various transport layer protocols for mobile computing environments:
- Traditional TCP faces problems with high error rates and mobility-induced packet losses in wireless networks. It can lead to severe performance degradation.
- Indirect TCP segments the TCP connection and uses a specialized TCP for the wireless link, isolating wireless errors. But it loses end-to-end semantics.
- Snooping TCP buffers packets near the mobile host and performs local retransmissions transparently. But wireless errors can still propagate to the server.
- Mobile TCP splits the connection and uses different mechanisms on each segment. It chokes the sender window during disconnections to avoid retransmissions and slow starts. This maintains throughput during
The document discusses Mobile IP, which allows mobile devices to change their point of connection to the internet without changing their IP address. It describes key concepts like the home agent, foreign agent, care-of address, and registration process. Mobile IP addresses issues like triangular routing and proposes optimizations like reverse tunneling to improve efficiency when a mobile node changes locations.
WIRELESS NETWORKS _ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORKS PPT
POWER POINT PRESENTAION ON WIRELESS NETWORKS
BABU M
ASST PROFESSOR/ ELECTRONICS AND COMMUNICATION ENGINEERING,
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI, THIRUVALLUR DISTRICT
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPTbabuece
WIRELESS NETWORKS EC6802 BABU unit 1 & 2 PPT
BABU M
ASST PROFESSOR
DEPARTMENT OD ELECTRONICS AND COMMUNICATION ENGINEERING
RMK COLLEGE OF ENGINEERING AND TECHNOLOGY
CHENNAI
THIRUVALLUR DISTRICT
The document discusses various protocols and approaches for improving the performance of TCP over wireless networks. It notes that wireless networks have higher bit error rates, lower bandwidth, and mobility issues compared to wired networks. Several protocols are described that aim to distinguish wireless losses from congestion losses to avoid unnecessary TCP reactions:
- Indirect TCP splits the connection and handles losses locally at the base station. Snoop caches packets at the base station for retransmission.
- Mobile TCP further splits the connection and has the base station defer acknowledgments. It can also inform the sender about handoffs versus interface switches.
- Multiple acknowledgments uses two types of ACKs to isolate the wireless and wired portions of the network.
-
The document discusses several mechanisms used in TCP for mobile computing. It describes:
1) TCP congestion control mechanisms like slow-start and fast retransmit/fast recovery which are designed to address packet loss. However, these can be inappropriate for wireless networks where packet loss is often due to errors rather than congestion.
2) Approaches like Indirect TCP, Snooping TCP, and Mobile TCP which modify TCP for mobile networks by splitting connections or having a supervisory host monitor the connection to enable local retransmissions and avoid unnecessary window reductions when the mobile host disconnects.
3) Other TCP optimizations for mobile like forced fast retransmit after handovers and transmission timeout freezing to avoid slow-start
This document discusses various approaches to improving TCP performance over mobile networks. It describes Indirect TCP, Snooping TCP, Mobile TCP, optimizations like fast retransmit/recovery and transmission freezing, and transaction-oriented TCP. Each approach is summarized in terms of its key mechanisms, advantages, and disadvantages. Overall, the document evaluates different ways TCP has been adapted to better support mobility and address challenges like frequent disconnections, packet losses during handovers, and high bit error rates over wireless links.
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPPLouis K. H. Kuo
The document provides an overview of elementary procedures for circuit-switched call control in 3GPP networks. It describes the background of related protocol layers and planes. Call control manages call establishment, clearing, information, and miscellaneous procedures. The main call types are mobile-originated, mobile-terminated, and network-initiated mobile-originated calls. Standard L3 messages follow specific formats and structures, and the call state is represented by state diagrams and message flow diagrams.
The document discusses various transport layer protocols for mobile computing environments:
- Traditional TCP faces problems with high error rates and mobility-induced packet losses in wireless networks. It can lead to severe performance degradation.
- Indirect TCP segments the TCP connection and uses a specialized TCP for the wireless link, isolating wireless errors. But it loses end-to-end semantics.
- Snooping TCP buffers packets near the mobile host and performs local retransmissions transparently. But wireless errors can still propagate to the server.
- Mobile TCP splits the connection and uses different mechanisms on each segment. It chokes the sender window during disconnections to avoid retransmissions and slow starts. This maintains throughput during
The document discusses Mobile IP, which allows mobile devices to change their point of connection to the internet without changing their IP address. It describes key concepts like the home agent, foreign agent, care-of address, and registration process. Mobile IP addresses issues like triangular routing and proposes optimizations like reverse tunneling to improve efficiency when a mobile node changes locations.
The document discusses Point-to-Point Protocol (PPP) and its roles in both wired and wireless internet access. PPP is used to establish and configure connections between two nodes and encapsulate network layer protocol packets for transmission over serial links. It consists of a Link Control Protocol (LCP) for link configuration and establishment and Network Control Protocols (NCPs) like IPCP for network layer configuration. The document examines how PPP is used for dial-up connections, WAP over CSD and GPRS, and using mobile phones as modems through PPP dial-in. Protocol analysis of an MMS transmission over HTTP, TCP, IP and PPP over CSD is also presented.
The document discusses LTE network architecture including nodes like the eNodeB, MME, SGW and PGW, and their functions. It also outlines the basic LTE call flows for initial call setup, detach procedures, idle-to-active transitions, and handovers. Key call flow steps include attach request, authentication, context setup, and establishment of bearers between the UE and PDN gateway.
The document discusses the components and characteristics of wireless local area networks (WLANs). It describes the basic components of a WLAN including access points, WLAN adapters, and software. It discusses characteristics such as typical ranges of access points, the number of users supported, and how multiple access points can be connected. It also covers topics such as roaming between access points, infrastructure versus ad-hoc network architectures, and standards like IEEE 802.11.
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
This document discusses how HARQ and ARQ work together in LTE to provide fast and reliable retransmissions. HARQ handles retransmissions quickly at the MAC layer, while ARQ provides more reliable feedback at the RLC layer. Together they satisfy the low error requirements of TCP. Situations where both are needed include residual HARQ errors and handovers. LTE improves on HSPA by having both protocols terminate in the same node for tighter integration.
The document discusses various approaches to improving TCP performance over mobile networks. Indirect TCP splits the TCP connection at the foreign agent to isolate the wireless link. Snooping TCP has the foreign agent buffer packets and retransmit lost packets locally. Mobile TCP uses a supervisory host to monitor connections and choke the sender window during disconnections. Other techniques discussed include fast retransmit/recovery after handovers, freezing TCP states during interruptions, selective retransmission of only lost packets, and transaction-oriented TCP to reduce overhead of short messages. Each approach has advantages but also disadvantages related to compatibility, transparency, and complexity.
Mobile Network Layer protocols and mechanisms allow nodes to change their point of attachment to different networks while maintaining ongoing communication. Key concepts include:
- Mobile IP adds mobility support to IP, allowing nodes to use the same IP address even when changing networks. It relies on home agents and care-of addresses.
- Registration allows mobile nodes to inform their home agent of their current location when visiting foreign networks. Tunneling and encapsulation techniques are used to forward packets to mobile nodes' current locations.
- Various routing protocols like DSDV have been developed for mobile ad hoc networks which have no fixed infrastructure and dynamic topologies.
Computer networks comparison of aodv and olsr in ad hoc networksAli Haider
This document compares the AODV and OLSR routing protocols for wireless ad hoc networks. AODV is a reactive protocol that establishes routes on demand, while OLSR is a proactive protocol that maintains routes through periodic table updates. Several studies are summarized that simulate and compare the performance of AODV and OLSR under different network conditions and metrics like end-to-end delay, throughput, and load. The studies generally find that AODV performs better for lower mobility or less dense networks, while OLSR is more suitable for higher mobility or dense networks. Neither protocol dominates in all scenarios, and a hybrid approach may provide the most benefits.
This document discusses WCDMA channels at different levels including logical channels, transport channels, and physical channels. It provides details on:
- Logical channels describe the type of information transferred and include control and traffic channels.
- Transport channels describe how logical channels are transferred over the interface and include dedicated and common channels.
- Physical channels provide the transmission medium and are defined by specific codes. They include channels like DPDCH, DPCCH, PDSCH, PRACH, and CPICH.
- The document also discusses the radio frame structure in WCDMA and details on different physical channel types and their characteristics.
The document discusses managing Cisco IOS images and configuring WAN connections. It covers topics such as copying flash images using TFTP, resolving hostnames, password recovery, and configuring encapsulation protocols like HDLC and PPP. Specific configuration examples are provided for setting the CHAP authentication protocol on serial interfaces between two routers.
The document discusses the challenges of troubleshooting problems that occur before any signaling messages are sent, using the example of a UE that gets stuck at "Searching Network...". It explains that to troubleshoot such issues, one needs in-depth knowledge of the physical layer procedures for initial access, including the Random Access Channel (RACH) process, as well as equipment that can monitor physical layer signaling. It then provides details on the RACH process for LTE, including when it occurs, the contention-based vs. contention-free approaches, preamble structure, and timing of preamble transmission and response.
1. The PBCH is a downlink physical channel that broadcasts essential initial access parameters like system bandwidth. It occupies 72 subcarriers in the first 4 OFDM symbols of the second slot of every 10ms radio frame. The PBCH carries a 14-bit MIB that is coded at a low rate and mapped to center subcarriers.
2. The PCFICH indicates the number of OFDM symbols used for the PDCCH. It occupies 16 resource elements in the first symbol of each 1ms subframe. The PCFICH carries the CFI value which is coded to use the full 32 bits.
3. The PDCCH carries downlink control information like resource allocations using QPSK.
This document discusses layer 2 switching and VLANs. It provides information on:
- How layer 2 switches break up large collision domains into smaller ones by creating separate collision domains for each switch port. This improves network performance over hub-based networks.
- The two main types of VLAN membership - static VLANs where ports are manually assigned to VLANs, and dynamic VLANs where VLAN assignments are determined automatically based on device MAC addresses.
- How VLANs simplify network management by allowing logical segmentation of broadcast domains independent of physical port locations, and improve network security by restricting communication between VLANs.
PPP and HDLC are point-to-point protocols used at the data link layer. PPP provides connection management, parameter negotiation, and supports multiple network layer protocols. It is commonly used for dial-up and broadband connections. HDLC also supports point-to-point and multi-point connections with frame formatting and error detection. Both protocols provide reliable data transfer through mechanisms like sequence numbers, acknowledgments, and error checking.
The document describes the protocol architecture of GSM, which is a digital cellular communications system that provides digital transmission, ISDN compatibility, and worldwide roaming. It discusses the nomenclature, protocol stack, and interfaces in GSM. The protocol stack consists of physical, data link, and networking layers. The physical layer handles radio transmission, while the data link layer provides error-free transmission using LAPD and LAPDm protocols. The networking layer implements mobility management, call control, and short message service using various signaling messages and protocols.
The document compares the AODV and OLSR routing protocols for mobile ad hoc networks. AODV is a reactive protocol that establishes routes on demand, while OLSR is a proactive protocol that maintains routes to all nodes. OLSR generally has lower latency than AODV but higher overhead. Both protocols elect multipoint relays to reduce flooding. AODV uses less bandwidth but requires route discovery, while OLSR maintains all routes continuously.
The document summarizes the IEEE 802.11 standard's layer management section. It discusses the MAC layer management entity (MLME) and physical layer management entity (PLME), which manage the MAC sublayer and PHY layer respectively. It then describes various management primitives and services accessed through the MLME service access point (SAP), including power management, scanning, synchronization, authentication, association, and disassociation.
The document describes the physical layer of WCDMA FDD mode, including:
1. An overview of the WCDMA physical layer specifications and documents.
2. Descriptions of transport channels (dedicated, common), physical channels, and the mapping between them.
3. Details on specific aspects of the physical layer such as spreading/modulation, multiplexing/channel coding, measurements, and procedures.
Digital communication uses digital signals that have discrete states (on/off) instead of continuous amplitudes like analog signals. This allows for higher quality transmission with less noise and distortion. SDH (Synchronous Digital Hierarchy) was developed to address limitations of earlier PDH (Plesiochronous Digital Hierarchy) transmission, which used almost synchronous clocks. SDH uses a master-slave clock technique and overhead bytes to provide synchronization across nodes, manage payloads, and enable features like automatic protection switching and performance monitoring. The basic SDH frame is STM-1, which has 9 rows and 270 columns for a total of 2430 bytes transmitted every 125 microseconds at 155 Mbps. Higher STM frames are formed by multiplying the
The document summarizes Profibus DP (distributed peripheral) and Profibus FMS (Fieldbus message specification). Profibus DP allows multiple masters that each assign slaves, while FMS allows peer-to-peer messaging between masters. Profibus DP uses EIA-485 physical layer and operates at speeds up to 12Mbps for high-speed sensor/actuator data transfer. It provides cyclic and acyclic data services between masters and slaves. Profibus FMS uses the same data link layer as DP and enables messaging between masters.
1) 3G networks use UMTS Terrestrial Radio Access Network (UTRAN) architecture with Radio Network Subsystems (RNS) consisting of Node B base stations and Radio Network Controllers (RNC).
2) The RNC controls radio resources and handles user data traffic between the UTRAN and core network (CN), while Node B terminates the radio channels.
3) The UTRAN is connected to the CN via the Iu interface, which has separate planes for radio network control, transport network control, and user data. The CN provides both circuit-switched and packet-switched domains.
1. The 3G network consists of the User Equipment (UE) or mobile phone and the UMTS Terrestrial Radio Access Network (UTRAN) which includes base stations and network intelligence.
2. The UE and UTRAN contain four main layers - physical, MAC, RLC, and RRC layers. The RRC layer handles functions like broadcasting information, establishing connections, and controlling quality of service.
3. Below the RRC layer is the RLC layer, which is focused on data transfer functions like segmentation and reassembly. The MAC layer handles logical channels and prioritization, while the physical layer handles radio functions.
The document discusses Point-to-Point Protocol (PPP) and its roles in both wired and wireless internet access. PPP is used to establish and configure connections between two nodes and encapsulate network layer protocol packets for transmission over serial links. It consists of a Link Control Protocol (LCP) for link configuration and establishment and Network Control Protocols (NCPs) like IPCP for network layer configuration. The document examines how PPP is used for dial-up connections, WAP over CSD and GPRS, and using mobile phones as modems through PPP dial-in. Protocol analysis of an MMS transmission over HTTP, TCP, IP and PPP over CSD is also presented.
The document discusses LTE network architecture including nodes like the eNodeB, MME, SGW and PGW, and their functions. It also outlines the basic LTE call flows for initial call setup, detach procedures, idle-to-active transitions, and handovers. Key call flow steps include attach request, authentication, context setup, and establishment of bearers between the UE and PDN gateway.
The document discusses the components and characteristics of wireless local area networks (WLANs). It describes the basic components of a WLAN including access points, WLAN adapters, and software. It discusses characteristics such as typical ranges of access points, the number of users supported, and how multiple access points can be connected. It also covers topics such as roaming between access points, infrastructure versus ad-hoc network architectures, and standards like IEEE 802.11.
MOBILE INTERNET PROTOCOL AND TRANSPORT LAYER
Overview of Mobile IP – Features of Mobile IP – Key Mechanism in Mobile IP – route Optimization. Overview of TCP/IP – Architecture of TCP/IP- Adaptation of TCP Window – Improvement in TCP Performance.
This document discusses how HARQ and ARQ work together in LTE to provide fast and reliable retransmissions. HARQ handles retransmissions quickly at the MAC layer, while ARQ provides more reliable feedback at the RLC layer. Together they satisfy the low error requirements of TCP. Situations where both are needed include residual HARQ errors and handovers. LTE improves on HSPA by having both protocols terminate in the same node for tighter integration.
The document discusses various approaches to improving TCP performance over mobile networks. Indirect TCP splits the TCP connection at the foreign agent to isolate the wireless link. Snooping TCP has the foreign agent buffer packets and retransmit lost packets locally. Mobile TCP uses a supervisory host to monitor connections and choke the sender window during disconnections. Other techniques discussed include fast retransmit/recovery after handovers, freezing TCP states during interruptions, selective retransmission of only lost packets, and transaction-oriented TCP to reduce overhead of short messages. Each approach has advantages but also disadvantages related to compatibility, transparency, and complexity.
Mobile Network Layer protocols and mechanisms allow nodes to change their point of attachment to different networks while maintaining ongoing communication. Key concepts include:
- Mobile IP adds mobility support to IP, allowing nodes to use the same IP address even when changing networks. It relies on home agents and care-of addresses.
- Registration allows mobile nodes to inform their home agent of their current location when visiting foreign networks. Tunneling and encapsulation techniques are used to forward packets to mobile nodes' current locations.
- Various routing protocols like DSDV have been developed for mobile ad hoc networks which have no fixed infrastructure and dynamic topologies.
Computer networks comparison of aodv and olsr in ad hoc networksAli Haider
This document compares the AODV and OLSR routing protocols for wireless ad hoc networks. AODV is a reactive protocol that establishes routes on demand, while OLSR is a proactive protocol that maintains routes through periodic table updates. Several studies are summarized that simulate and compare the performance of AODV and OLSR under different network conditions and metrics like end-to-end delay, throughput, and load. The studies generally find that AODV performs better for lower mobility or less dense networks, while OLSR is more suitable for higher mobility or dense networks. Neither protocol dominates in all scenarios, and a hybrid approach may provide the most benefits.
This document discusses WCDMA channels at different levels including logical channels, transport channels, and physical channels. It provides details on:
- Logical channels describe the type of information transferred and include control and traffic channels.
- Transport channels describe how logical channels are transferred over the interface and include dedicated and common channels.
- Physical channels provide the transmission medium and are defined by specific codes. They include channels like DPDCH, DPCCH, PDSCH, PRACH, and CPICH.
- The document also discusses the radio frame structure in WCDMA and details on different physical channel types and their characteristics.
The document discusses managing Cisco IOS images and configuring WAN connections. It covers topics such as copying flash images using TFTP, resolving hostnames, password recovery, and configuring encapsulation protocols like HDLC and PPP. Specific configuration examples are provided for setting the CHAP authentication protocol on serial interfaces between two routers.
The document discusses the challenges of troubleshooting problems that occur before any signaling messages are sent, using the example of a UE that gets stuck at "Searching Network...". It explains that to troubleshoot such issues, one needs in-depth knowledge of the physical layer procedures for initial access, including the Random Access Channel (RACH) process, as well as equipment that can monitor physical layer signaling. It then provides details on the RACH process for LTE, including when it occurs, the contention-based vs. contention-free approaches, preamble structure, and timing of preamble transmission and response.
1. The PBCH is a downlink physical channel that broadcasts essential initial access parameters like system bandwidth. It occupies 72 subcarriers in the first 4 OFDM symbols of the second slot of every 10ms radio frame. The PBCH carries a 14-bit MIB that is coded at a low rate and mapped to center subcarriers.
2. The PCFICH indicates the number of OFDM symbols used for the PDCCH. It occupies 16 resource elements in the first symbol of each 1ms subframe. The PCFICH carries the CFI value which is coded to use the full 32 bits.
3. The PDCCH carries downlink control information like resource allocations using QPSK.
This document discusses layer 2 switching and VLANs. It provides information on:
- How layer 2 switches break up large collision domains into smaller ones by creating separate collision domains for each switch port. This improves network performance over hub-based networks.
- The two main types of VLAN membership - static VLANs where ports are manually assigned to VLANs, and dynamic VLANs where VLAN assignments are determined automatically based on device MAC addresses.
- How VLANs simplify network management by allowing logical segmentation of broadcast domains independent of physical port locations, and improve network security by restricting communication between VLANs.
PPP and HDLC are point-to-point protocols used at the data link layer. PPP provides connection management, parameter negotiation, and supports multiple network layer protocols. It is commonly used for dial-up and broadband connections. HDLC also supports point-to-point and multi-point connections with frame formatting and error detection. Both protocols provide reliable data transfer through mechanisms like sequence numbers, acknowledgments, and error checking.
The document describes the protocol architecture of GSM, which is a digital cellular communications system that provides digital transmission, ISDN compatibility, and worldwide roaming. It discusses the nomenclature, protocol stack, and interfaces in GSM. The protocol stack consists of physical, data link, and networking layers. The physical layer handles radio transmission, while the data link layer provides error-free transmission using LAPD and LAPDm protocols. The networking layer implements mobility management, call control, and short message service using various signaling messages and protocols.
The document compares the AODV and OLSR routing protocols for mobile ad hoc networks. AODV is a reactive protocol that establishes routes on demand, while OLSR is a proactive protocol that maintains routes to all nodes. OLSR generally has lower latency than AODV but higher overhead. Both protocols elect multipoint relays to reduce flooding. AODV uses less bandwidth but requires route discovery, while OLSR maintains all routes continuously.
The document summarizes the IEEE 802.11 standard's layer management section. It discusses the MAC layer management entity (MLME) and physical layer management entity (PLME), which manage the MAC sublayer and PHY layer respectively. It then describes various management primitives and services accessed through the MLME service access point (SAP), including power management, scanning, synchronization, authentication, association, and disassociation.
The document describes the physical layer of WCDMA FDD mode, including:
1. An overview of the WCDMA physical layer specifications and documents.
2. Descriptions of transport channels (dedicated, common), physical channels, and the mapping between them.
3. Details on specific aspects of the physical layer such as spreading/modulation, multiplexing/channel coding, measurements, and procedures.
Digital communication uses digital signals that have discrete states (on/off) instead of continuous amplitudes like analog signals. This allows for higher quality transmission with less noise and distortion. SDH (Synchronous Digital Hierarchy) was developed to address limitations of earlier PDH (Plesiochronous Digital Hierarchy) transmission, which used almost synchronous clocks. SDH uses a master-slave clock technique and overhead bytes to provide synchronization across nodes, manage payloads, and enable features like automatic protection switching and performance monitoring. The basic SDH frame is STM-1, which has 9 rows and 270 columns for a total of 2430 bytes transmitted every 125 microseconds at 155 Mbps. Higher STM frames are formed by multiplying the
The document summarizes Profibus DP (distributed peripheral) and Profibus FMS (Fieldbus message specification). Profibus DP allows multiple masters that each assign slaves, while FMS allows peer-to-peer messaging between masters. Profibus DP uses EIA-485 physical layer and operates at speeds up to 12Mbps for high-speed sensor/actuator data transfer. It provides cyclic and acyclic data services between masters and slaves. Profibus FMS uses the same data link layer as DP and enables messaging between masters.
1) 3G networks use UMTS Terrestrial Radio Access Network (UTRAN) architecture with Radio Network Subsystems (RNS) consisting of Node B base stations and Radio Network Controllers (RNC).
2) The RNC controls radio resources and handles user data traffic between the UTRAN and core network (CN), while Node B terminates the radio channels.
3) The UTRAN is connected to the CN via the Iu interface, which has separate planes for radio network control, transport network control, and user data. The CN provides both circuit-switched and packet-switched domains.
1. The 3G network consists of the User Equipment (UE) or mobile phone and the UMTS Terrestrial Radio Access Network (UTRAN) which includes base stations and network intelligence.
2. The UE and UTRAN contain four main layers - physical, MAC, RLC, and RRC layers. The RRC layer handles functions like broadcasting information, establishing connections, and controlling quality of service.
3. Below the RRC layer is the RLC layer, which is focused on data transfer functions like segmentation and reassembly. The MAC layer handles logical channels and prioritization, while the physical layer handles radio functions.
UMTS system architecture, protocols & processesMuxi ESL
This document provides an overview of UMTS system architecture and protocols. It discusses:
- The logical architecture of UTRAN including RNC and Node-B elements.
- Interfaces between network elements are clearly specified to allow interoperability between equipment from different manufacturers.
- The main functions of the RNC include radio resource management, call management, and connection to the core network.
- Protocols in UTRAN include RRC for radio resource control, RLC for radio link control, and MAC for medium access control.
The document discusses 3G network architecture, security, and handover between GSM and UMTS networks. It describes the key components of 3G network architecture including the user equipment and UTRAN consisting of layers like physical, MAC, RLC, and RRC layers. It explains the functions of the RRC layer including establishment of connections and allocation of resources. It also summarizes the functions of lower layers like RLC and MAC. Furthermore, it outlines the core network components including MSC, SGSN, GGSN and shared elements like HLR, EIR, and AuC. Finally, it briefly discusses the security mechanisms in 3G networks including network access, domain, and application layer security.
The document provides an overview of the UMTS Terrestrial Radio Access Network (UTRAN). UTRAN consists of radio network subsystems (RNS) which contain Node Bs and Radio Network Controllers (RNCs). The RNC is responsible for radio resource management and user data traffic handling. Node Bs handle radio transmission and reception within cells. The UTRAN uses various interfaces like Iu, Iur, and Iub which involve different protocol stacks in the control and user planes to enable communication between the UTRAN and core network and between network components.
The document describes the architecture of a radio access network (RAN). It discusses:
1. The main components are the user equipment (UE), radio access network (RAN), and core network (CN). The RAN handles all radio functionality and is connected to the CN, which switches and routes calls.
2. The RAN, called UTRAN in UMTS, consists of radio network controllers (RNCs) and Node B base stations. The RNC controls radio resources and connects to the CN, while Node B handles radio interface processing.
3. The protocol model has horizontal layers for the radio and transport networks, and vertical planes for control signaling and user data on each interface.
The document discusses the architecture of radio access networks (RANs) in 3GPP systems. It describes the key network elements, interfaces, and protocols. The main elements are the user equipment (UE), the UTRAN RAN which includes Node B base stations and radio network controllers (RNCs), and the core network (CN). The UTRAN architecture uses RNCs and Node Bs connected by Iub interfaces, with RNCs also connected to the CN via Iu interfaces. Protocols include radio resource control (RRC) between UE and UTRAN, and RAN application protocol (RANAP) on the Iu interface. The document provides an overview of the system architecture and interworking.
This presentation describes about UMTS major components Key features, NodeB, RNC, GGSN,MSC, SGSN,VLR,HLR, Charging function, UMTS base stations and info about UMTS number allocated for MS.
LTE is a cellular wireless system standard that uses OFDMA for downlink and SC-FDMA for uplink. Key LTE technologies include bandwidth flexibility, advanced antenna techniques like MIMO, link adaptation, inter-cell interference coordination, and a two-layered HARQ protocol to provide low latency and high reliability data transmission. LTE aims to improve spectral efficiency, reduce costs, support new services, and provide higher data rates and lower latencies compared to previous cellular standards.
The document describes the LTE protocol stack, which contains a user plane and control plane. It divides the protocol stack into layers for the radio network and transport network. The physical layer transfers data and performs error detection. The MAC sublayer maps transport channels to logical channels and handles scheduling. The RLC layer provides different reliability modes for data transfer. The PDCP layer performs header compression and ciphering. The RRC layer controls handovers, paging, and radio bearer setup. Transport protocols like IP, UDP, and GTP are used in the fixed network.
Umts network protocols and complete call flowssivakumar D
This document provides an overview of the network architecture and signalling protocols in UMTS networks. It describes the main network elements of UTRAN, UE and CN. It explains the interfaces between these elements and the protocols used for communication, including RRC for UE-RNC signalling, RANAP for RNC-CN signalling, and NAS protocols for non-access signalling between UE and CN. It also summarizes the protocol stacks used over the Iu interfaces between RNC and CN for circuit-switched and packet-switched domains.
This document provides an overview of the network architecture and signalling protocols used in UMTS networks. It describes the main components of a UMTS network including the UE, UTRAN, and core network. It then explains the network elements and interfaces that connect these components, such as the Iu, Iub, and Iur interfaces. Finally, it outlines the main functional protocols used for communication between the UE, UTRAN, and core network, including RRC, RANAP, NBAP, and others.
This document provides an overview of the network architecture and signalling protocols in UMTS networks. It describes the main network elements of UTRAN, UE and CN. It explains the interfaces between these elements and the protocols used for communication, including RRC for UE-RNC signalling, RANAP for RNC-CN signalling, and NAS protocols for non-access signalling between UE and CN. It also summarizes the protocol stacks used over the Iu interfaces between RNC and CN for circuit-switched and packet-switched domains.
The document provides an overview of the LTE radio layer 2, RRC and radio access network architecture. It summarizes the E-UTRAN architecture, user and control plane protocol stacks, connection management, RRC states, connected state mobility, and highlights interoperability with legacy systems and self-organizing networks. Key aspects covered include EPS bearer service architecture, PDCP, RLC, MAC, scheduling, DRX, security, and reliable transport using HARQ and ARQ.
The document provides an overview of the LTE radio layer 2, RRC and radio access network architecture. It summarizes the E-UTRAN architecture, user and control plane protocol stacks, connection management, RRC states, and connected state mobility procedures. It also highlights interoperability with legacy systems, self-organizing networks, UE positioning, multimedia broadcast, latency evaluations, and LTE-Advanced features.
1) The document discusses performance modeling and analysis of wireless sensor networks. It covers topics like MAC protocols, routing protocols, transport protocols, performance metrics, basic performance models, and network models.
2) It provides a case study on simple computation of system lifespan in a wireless sensor network and analyzes factors like node energy consumption and data rate.
3) Examples of performance evaluation of wireless sensor network routing protocols are discussed, including using simulators to evaluate protocols under conditions like node range, network size, and node deployment patterns. Metrics like latency, packet delivery ratio, and energy consumption are measured.
Introduction
Background
WSN Design Issues: MAC Protocols, Routing Protocols, Transport Protocols
Performance Modeling of WSNs: Performance Metrics, Basic Models, Network Models
Case Study: Simple Computation of the System Life Span
Practical Example.
Node B equipment in 3G networks were previously configured individually through the RNC. Using cloud computing, multiple Node B's can now be managed simultaneously through a common server. When one Node B is configured, all other Node B's connected to the same RNC via the cloud are also configured at the same time. This allows for faster and more efficient management of network equipment.
This document discusses PCB level shielding techniques used to provide electromagnetic compatibility (EMC) for printed circuit boards. It describes different types of shielding materials like stainless steel, copper, and tin. It also covers considerations for PCB shielding like circuit design, grounding, isolation, and material selection. Various PCB shielding techniques are outlined, including single and multi-layer boards, light-weight boards, conductive coatings deposited using magnetron sputtering, and mold-in-place gaskets.
Ethernet is a widely used local area network technology. It uses a bus topology with shared medium and uses CSMA/CD protocol for medium access. Ethernet frames have a minimum size of 64 bytes to allow for collision detection. Standard Ethernet implementations include 10Base5, 10Base2, 10Base-T and 10Base-F depending on the medium used. Bridges were introduced to increase bandwidth by dividing the network into collision domains while switches further improved performance by making the network full duplex.
Types of managers, mangerial roles and skills 18 19rajeshvbe
There are three types of managers: top managers who make organization-wide decisions, middle managers who oversee first-line managers, and first-line managers who directly manage non-managerial employees. Managerial roles include interpersonal roles like leadership, informational roles like monitoring, and decisional roles like resource allocation. Effective managers need technical skills for their specific job, human skills to work well with others, and conceptual skills to think strategically about complex organizational issues.
This document discusses various types of scattering losses that can occur in optical fibers during transmission. It describes linear scattering losses such as Rayleigh and Mie scattering which are due to micro variations in material density and composition within the fiber. It also discusses nonlinear scattering losses like stimulated Brillouin and Raman scattering which depend on optical power density. Specific fiber manufacturing techniques and their impact on different types of scattering losses are explained. The document also briefly outlines other types of losses such as bending, distortion and chromatic dispersion losses.
Engineering as social experimentation 17 18rajeshvbe
This document discusses professional ethics in engineering. It provides an overview of an engineering ethics course, including its objectives and outcomes. It then discusses key concepts like engineering as experimentation, codes of ethics, and the roles and responsibilities of engineers. Engineers are described as responsible experimenters who must consider safety, learn from past failures, and obtain informed consent. Codes of ethics provide guidance for engineers but have limitations. Engineering involves social experimentation, so engineers must have a comprehensive perspective and be accountable. A balanced approach is needed between rules, codes, and professional autonomy.
This document provides an overview of electromagnetic interference (EMI) test methods and instrumentation. It defines electromagnetic compatibility (EMC) and describes the electromagnetic environment. Common EMI sources and victims are identified. Key EMI test methods are outlined, including radiated emission (RE) testing, conducted emission (CE) testing, radiated susceptibility (RS) testing, and conducted susceptibility (CS) testing. Critical EMI testing facilities and instrumentation are discussed, such as anechoic chambers, shield rooms, open area test sites (OATS), EMI test receivers, spectrum analyzers, and EMI test signal generators. EMC regulations and standards around the world are also briefly summarized.
This document provides information about electromagnetic interference (EMI) and electromagnetic compatibility (EMC) testing. It describes typical EMC test facilities like semi-anechoic chambers and shield rooms. It also outlines various EMC tests including radiated emission testing, conducted emission testing, radiated susceptibility testing, conducted susceptibility testing, and electrostatic discharge testing. Standards and procedures for performing these tests are discussed. The goal of EMC testing is to ensure electronic systems do not interfere with other systems and continue operating correctly despite electromagnetic interference.
Bluetooth is a global, short-range wireless technology standard for exchanging data over short distances between devices like mobile phones, laptops, printers, headsets and other portable devices. It operates in the unlicensed 2.4 GHz radio frequency band and uses a frequency-hopping spread spectrum to avoid interference and jamming between other devices. The Bluetooth specification defines the communication protocols and standards for devices to connect and exchange information wirelessly within a range of 10 meters.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
5. Channel Structure in UMTS Terrestrial Radio Access Network
• The UMTS terrestrial radio access network (UTRAN) has an
• access stratum and
• Non-access stratum.
• The access stratum includes air interface and provides
functions related to OSI layer 1, layer 2, and the lower part of layer 3.
• The non-access stratum deals with communication between user
equipment (UE) and core network (CN) and includes OSI layer 3
(upper part) to layer 7.
6. • The radio interface, Uu, is the interface between UE and UTRAN.
• It consists of three protocol layers:
• physical layer,
• data link layer, and
• network layer
• The radio interface provides physical channels to carry data over the
radio path and logical channels to carry a particular type of data.
• There are two types of logical channels:
• signaling and control, and
• traffic channel.
The physical layer in UTRAN performs the following functions:
• Forward error correction, bit-interleaving, and rate matching
• Signal measurements
• Micro-diversity distribution/combining and soft handoff execution
• Multiplexing/mapping of services on dedicated physical codes
7. • Modulation, spreading, demodulation, despreading of physical channels
• Frequency and time (chip, bit, slot, frame) synchronization
• Fast closed-loop power control
• Power weighting and combining of physical channels
• Radio frequency (RF) processing.
The medium access control sublayer is responsible for
• efficiently transferring data for both real-time (CS) and non-real-time
(PS) services to the physical layer.
• MAC offers services to the radio link control (RLC) sublayer and higher
layers.
• The MAC layer provides data transfer services on logical channels.
MAC is responsible for
8. • Selection of appropriate transport format (basically bit rate) within a
predefined set, per information unit delivered to the physical layer
• Service multiplexing on random access channel (RACH), forward access
channel (FACH), and dedicated channel (DCH)
• Priority handling between data flow of a user as well as between data
flows from several users
• Access control on RACH and FACH
• Contention resolution on RACH
Radio link control (RLC) sets up a logical link over the radio interface and
is responsible for fulfilling QoS requirements. RLC responsibilities include:
• Segmentation and assembly of the packet data unit
• Transfer of user data
• Error correction through retransmission
• Sequence integrity
• Duplication information detection
• Flow control of data
9. • The radio resource control (RRC) layer
– broadcasts system information,
– handles radio resources (i.e., code allocation, handover, admission
control, and measurement/control report), and
– controls the requested QoS.
The RRC layer offers the following services to the core network:
• General control (GC) service used as an information broadcast service
• Notification (Nt) service used for paging and notification of a selected UE
• Dedicated control (DC) service used to establish/release a connections
and transfer messages
10. Overview of UMTS Terrestrial Radio Access Network
• The UTRAN consists of a set of radio network subsystems (RNSs)
• The RNS has two main logical elements:
• Node B and
• RNC
• The RNS is responsible for the radio resources and transmission/
reception in a set of cells.
• A cell (sector) is one coverage area served by a broadcast channel.
RNC
• An RNC is responsible for the use and allocation of all the radio
resources of the RNS to which it belongs.
• The RNC also handles the user voice and packet data traffic, performing
the actions on the user data streams that are necessary to access the radio
bearers.
11. The responsibilities of an RNC are:
• Intra UTRAN handover
• Macro diversity combining/splitting of Iub data streams
• Frame synchronization
• Radio resource management
• Outer loop power control
• Iu interface user plane setup
• Serving RNS (SRNS) relocation
• Radio resource allocation (allocation of codes, etc.)
• Frame selection/distribution function necessary for soft handover
(functions of UMTS radio interface physical layer)
• UMTS radio link control (RLC) sublayers function execution
• Termination of MAC, RLC, and RRC protocols for transport channels,
i.e., DCH, DSCH, RACH, FACH
• Iub’s user plane protocols termination
12. Node B and its duties
• A Node B is responsible for radio transmission and reception in one or
more cells to/from the user equipment (UE).
UTRAN logical Architecture
14. The following are the responsibilities of the Node B:
• Termination of Iub interface from RNC
• Termination of MAC protocol for transport channels RACH, FACH
• Termination of MAC, RLC, and RRC protocols for transport channels:
BCH, PCH
• Radio environment survey (BER estimate, receiving signal strength, etc.)
• Inner loop power control and Open loop power control
• Radio channel coding/decoding
• Macro diversity combining/splitting of data streams from its cells (sectors)
• Termination of Uu interface from UE
• Error detection on transport channels and indication to higher layers
• FEC encoding/decoding and interleaving/deinterleaving of transport
channels
• Multiplexing of transport channels and demultiplexing of coded composite
transport channels
• Power weighting and combining of physical channels
• Modulation and spreading/demodulation and despreading of physical
channels
• Frequency and time (chip, bit, slot, frame) synchronization
• RF processing
15. UTRAN Logical Interfaces
• In UTRAN protocol structure is designed so that layers and planes are
logically independent of each other and, parts of protocol structure can
be changed in the future without affecting other parts.
Protocol Model
• The protocol structure contains two main layers,
• radio network layer (RNL) and
• transport network layer (TNL)
• In the RNL, all UTRAN-related functions are visible, whereas the TNL
deals with transport technology selected to be used for UTRAN but
without any UTRAN-specific changes.
Planes:
• User Plane
• Control Plane
• Transport Plane
17. Control Plane
• The control plane is used for all UMTS-specific control signaling.
• It includes the application protocol (i.e., radio access network
application part (RANAP) in Iu,
– radio network subsystem application part (RNSAP) in Iur and
– node B application part (NBAP) in Iub.
– Application protocol is used for setting up bearers to the UE.
• In the three-plane structure the bearer parameters in the application
protocol are not directly related to the user plane technology, but rather
they are general bearer parameters.
User Plane
• User information is carried by the user plane. The user plane includes
data stream(s), and data bearer(s) for data stream(s).
• Each data stream is characterized by one or more frame protocols
specified for that interface.
18. transport network control plane
• The transport plane lies between the control plane and the user plane
• It carries all control signaling within the transport layer. It does not
include radio network layer information.
• It contains access link control application part (ALCAP) required to set
up the transport bearers (data bearers) for the user plane.
• It allows the application protocol to be totally independent of the
technology selected for the data bearer in the user plane.
19. Iu Interface
(Reference point b/w access and serving n/w domain)
• The UMTS Iu interface is the open logical interface that interconnects one
UTRAN to the UMTS core network (UCN).
• On the UTRAN side the Iu interface is terminated at the RNC, and at the
UCN side it is terminated at U-MSC.
The Iu interface has three different protocol planes
– radio network control plane (RNCP)
– transport network control plane (TNCP)
– user plane (UP).
control plane :
• In the core network, the control plane serves two service domains,
– packet-switched (PS) domain
– circuit-switched (CS) domain
20. CS domain
• The CS domain supports circuit-switched services. Some examples of CS
services are voice and fax.
• he CS domain can also provide intelligent services such as voice mail and
free phone.
• The CS domain connects to PSTN/ISDN networks.
• The CS domain is expected to evolve from the existing 2G GSM PLMN
PS domain
• The PS domain deals with PS services. Some examples of PS services are
Internet access and multimedia services.
21. • PS protocol architecture on lu interface.
Fig. PS protocol architecture on lu interface.
23. • The protocol stack of control plane consists of RANAP on the top of
signaling system 7 (SS7) protocols.
• The protocol layers are
– signaling connection control part (SCCP),
– message transfer part (MTP3-B),
– Signaling asynchronous transfer mode (ATM)
– adaptation layer for network-to-network interface (SAAL-NNI).
SAAL-NNI
• The SAAL-NNI is divided into
– service-specific coordination function (SSCF),
– service-specific connection-oriented protocol (SSCOP)
Note:
• AAL5 is used for segmenting the data to ATM cells.
• The SSCF and SSCOP layers are specifically designed for signaling
transport in ATM networks
24. RNCP (control Plane)
The RNCP performs the following functions:
• It carries information for the general control of UTRAN radio network
operations.
• It carries information for control of UTRAN in each specific call.
• It carries user call control (CC) and mobility management (MM)
signaling messages.
Transport Network Control Plane (TNCP):
• The TNCP carries information for the control of transport network used
within UCN.
25. user plane (UP)
• The user plane (UP) carries user voice and packet data information.
• AAL2 is used for the following services:
– narrowband speech (e.g., EFR, AMR);
– Unrestricted digital information service (ISDN-B)
– any low to average bit rate CS service (modem).
• AAL5 is used for the following services:
– non-real-time PS data service
– real-time PS data.
26. Iur Interface
• Iur interface is the connection between two RNCs
– serving RNC (SRNC) and
– drift RNC (DRNC)).
• It is used in soft handoff scenarios when different macro diversity streams
of one communication are supported by Node B’s that belong to different
RNCs.
• Communication between one RNC and one Node B of two different
RNCs are realized through the Iur interface.
protocol planes
Three different protocol planes are defined for it:
– Radio network control plane (RNCP)
– Transport network control plane (TNCP)
– User plane (UP)
27. The Iur interface services:
• Information for the control of radio resources in the context of specific
service request of one mobile on RNCP
• Information for the control of the transport network used within UTRAN
on TNCP
• User voice and packet data information on UP
The protocols used on this interface are:
• Radio access network application part (RANAP)
• DCH frame protocol (DCHFP)
• RACH frame protocol (RACHFP)
• FACH frame protocol (FACHFP)
• Access link control application part (ALCAP)
• Signaling connection control part (SCCP)
• Message transfer part 3-B (MTP3-B)
• Signaling ATM adaptation layer for network-to-network interface
(SAALNNI)
28. Iur provides the following four functions:
1. Basic inter-RNC mobility support
– Support of SRNC relocation
– Support of inter-RNC cell and UTRAN registration area update
– Support of inter-RNC packet paging
– Reporting of protocol errors
2. Dedicated channel traffic support
– Establishment, modification, and release of a dedicated channel in the
DRNC due to hard and soft handoff in the dedicated channel state
– Setup and release of dedicated transport connections across the Iur
interface
– Transfer of DCH transport blocks between SRNC and DRNC
– Management of radio links in the DRNS via dedicated measurement
report procedures and power setting procedures
29. 3. Common channel traffic support
– Setup and release of the transport connection across the Iur for
common channel data streams
– Splitting of the MAC layer between the SRNC (MAC-d) and DRNC
(MAC-c and MAC-sh); the scheduling for downlink data transmission
is performed in the DRNC
– Flow control between the MAC-d and MAC-c/MAC-sh
4. Global resource management support
– Transfer of cell measurements between two RNCs
– Transfer of Node B timing between two RNCs
31. lub Interface
• Iub interface is the connection between the RNC and Node B.
• There is one Iub interface for each Node B.
• The Iub interface is used for all of the communications between Node B
and the RNC of the same RNS.
Three different protocol planes are defined for it.
– Radio network control plane (RNCP)
– Transport network control plane (TNCP)
– User plane (UP)
The Iub interface services:
• Information for the general control of Node B for radio network operation
on RNCP
• Information for the control of radio resources in the context of specific
service request of one mobile on RNCP
32. • Information for the control of a transport network used within UTRAN on
TCNP
• User call control (CC) and mobility management (MM) signaling
message on RNCP
• User voice and packet data information on UP
The protocols used on this interface include:
• Node B application part protocol (NBAP)
• DCH frame protocol (DCHFP)
• RACH frame protocol (RACHFP)
• FACH frame protocol (FACHFP)
• Access link control application part (ALCAP)
• SSCP or TCP and IP
• MTP3-B
• SAAL-UNI (SSCF-UNI, SSCOP, and AAL5)
34. Uu Interface
• The UMTS Uu interface is the radio interface between a Node B and one
of its UE.
• The Uu is the interface through which UE accesses the fixed part of the
system.
35. Distribution of UTRAN Functions
UTRAN functions are distributed and located in RNC and in Node B
Located in the RNC
• Radio resource control (L3 Function)
• Radio link control (RLC)
• Macro diversity combining
• Active cell set modification
• Assign transport format combination set (centralized data base function)
• Multiplexing/demultiplexing of higher layer PDUs
• Priority handling between data flows of one user
Located in Node B
• Scheduling of broadcast, paging, and notification messages;
• Collision resolution on RACH (in Node B - to reduce non constructive
traffic over Iub interface and reduce round trip delay)
• Multiplexing/demultiplexing of higher layer PDUs