SlideShare a Scribd company logo
1 of 442
Section 1 – GSM Architecture Overview




GSM Architecture Overview
Section 1 – GSM Architecture Overview




                       Introduction

It provides an overview of the GSM network architecture. This
   includes a brief explanation of the different network subsystems
   and a description of the functionality of the elements within
   each of the subsystems. Topics include:
• General architecture overview
• The Mobile Station (MS) Subsystem and Elements
• The Base Station Subsystem (BSS) and Elements
• The Network Subsystem (NSS) and Elements
• Introduction to network interfaces
Section 1 – GSM Architecture Overview
Section 1 – GSM Architecture Overview




A GSM network is made up of three subsystems:
• The Mobile Station (MS)
• The Base Station Sub-system (BSS) – comprising a BSC and
   several BTSs
• The Network and Switching Sub-system (NSS) – comprising an
   MSC and associated registers


The interfaces defined between each of these sub systems include:
• 'A' interface between NSS and BSS
• 'Abis' interface between BSC and BTS (within the BSS)
• 'Um' air interface between the BSS and the MS
Section 1 – GSM Architecture Overview




Abbreviations:
MSC – Mobile Switching Center
BSS – Base Station Sub-system
BSC – Base Station Controller
HLR – Home Location Register
BTS – Base Transceiver Station
VLR – Visitor Location Register
TRX – Transceiver
AuC – Authentication Center
MS – Mobile Station
EIR – Equipment Identity Register
OMC – Operations and Maintenance Center
PSTN – Public Switched Telephone Network
Section 1 – GSM Architecture Overview




                      Mobile Station
The Mobile Station (MS) consists of the physical equipment used by a
  PLMN subscriber to connect to the network. It comprises the Mobile
  Equipment (ME) and the Subscriber Identity Module (SIM). The ME
  forms part of the Mobile Termination (MT) which, depending on the
  application and services, may also include various types of Terminal
  Equipment (TE) and associated Terminal Adapter (TA).
Section 1 – GSM Architecture Overview
Section 1 – GSM Architecture Overview




• The IMSI identifies the subscriber within the GSM network while
  the MS ISDN is the actual telephone number a caller (possibly in
  another network) uses to reach that person.


• Security is provided by the use of an authentication key and by
  the transmission of a temporary subscriber identity (TMSI)
  across the radio interface where possible to avoid using the
  permanent IMSI identity.


• The IMEI may be used to block certain types of equipment from
  accessing the network if they are unsuitable and also to check
  for stolen equipment.
Section 1 – GSM Architecture Overview


MS and SIM
Section 1 – GSM Architecture Overview



The mobile station consists of :
  • mobile equipment (ME)
  • subscriber identity module (SIM)


The SIM stores permanent and temporary data about the mobile,
  the subscriber and the network, including :
  • The International Mobile Subscribers Identity (IMSI)
  • MS ISDN number of subscriber
  • Authentication key (Ki) and algorithms for authentication check


The mobile equipment has a unique International Mobile
  Equipment Identity (IMEI), which is used by the EIR
Section 1 – GSM Architecture Overview




Base Station Subsystem (BSS)
Section 1 – GSM Architecture Overview




The BSS comprises:
• Base Station Controller (BSC)
• One or more Base Transceiver Stations (BTSs)


The purpose of the BTS is to:
• provide radio access to the mobile stations
• manage the radio access aspects of the system


BTS contains:
• Radio Transmitter/Receiver (TRX)
• Signal processing and control equipment
• Antennas and feeder cables
Section 1 – GSM Architecture Overview




The BSC:
• allocates a channel for the duration of a call
• maintains the call:
       monitors quality
       controls the power transmitted by the BTS or MS
       generates a handover to another cell when required
Section 1 – GSM Architecture Overview




       Network Switching System (NSS)


The NSS combines the call routing switches (MSCs and GMSC)
  with database registers required to keep track of subscribers’
  movements and use of the system. Call routing between MSCs is
  taken via existing PSTN or ISDN networks. Signaling between
  the registers uses Signaling System No. 7 protocol.
Section 1 – GSM Architecture Overview




Functions of the MSC:


• Switching calls, controlling calls and logging calls
• Interface with PSTN, ISDN, PSPDN
• Mobility management over the radio network and other networks
• Radio Resource management - handovers between BSCs
• Billing Information
Section 1 – GSM Architecture Overview



     Interfaces


Um


                                     VLR
     Abis
                  A
            BSC             MSC
                                                 ISDN,
                                                 TUP
Section 1 – GSM Architecture Overview



                        Exercise


Q1. Name the interfaces used between
            Mobile and BTS
            BTS and BSC
            BSC and MSC
Section 2 – Access
                            Network




Access Network
Section 2 – Access
                                                                     Network




                          Objective


The Trainee will be able to understand:


• Different BTS configuration commonly used in the network
• Advantages of the configuration and optimal use of the trunks
• Abis mapping
Section 2 – Access
                                                                   Network



                      Introduction

Access network is a connection between MS and NSS, comprise of
  BTSs & BSCs. It is responsible for radio management.


BSC looks towards MSC through single A-interface as being the
  entity responsible for communicating with Mobile Stations in a
  certain area. The radio equipment of a BSS may support one or
  more cells.


A BSS may consist of one or more base stations, where an A-bis-
  interface is implemented.
Section 2 – Access
                                               Network



                BSS Configuration

• Collocated BTS
• Remote BTS
• Daisy Chain BTS
• Star Configuration
• Loop Configuration
Section 2 – Access
                                                                       Network



Collocated BTS: BTS is situated along with BSC or the MSC and no
                 additional E1 link is required.




                                      BTS



                                BSC
Section 2 – Access
                                                                          Network




Remote BTS : BTS is situated in a stand alone position and additional E1
               links are required to connect to BSC.




                                           BSC
                BTS
Section 2 – Access
                                          Network

         Daisy Chain




         BTS 3

 BTS 1                 BTS 4




             BSC
BTS 2
                                MSC
Section 2 – Access
                                               Network

         Star Configuration




                  BTS 3

 BTS 1


                  BSC
                                          BTS 4




BTS 2
                              MSC
Section 2 – Access
                                            Network



         Loop Configuration




            BTS 3

 BTS 1




                              BTS 4




                BSC

BTS 2                             MSC
Section 2 – Access
                                                                         Network


        Comparison of Different Configurations


• Daisy Chain: Easy to implement, effective utilization of
  transmission links but if one of the link fails, all the BTSs
  connected in the chain will went off.
• Star Configuration: Easy to implement but poor utilization of
  links. Each BTS require one E1 to connect to BSC. But if link
  goes down only individual BTS will be affected.
• Loop Configuration: Slightly difficult to implement but
  effective utilization of E1 links. Even if one link goes off BTS will
  continue to communicate with the network from the other side.
Section 2 – Access
                                                                     Network



                    BSS Interfaces

• Air Interface: Radio Interface between the BTS and
              Mobile the supports frequency hopping and
              diversity.


• A Interface: Interface carried by a 2-Mb link between
               NSS and BSS. At this interface level,
               transcoding takes place.


• OMC Interface: X25 Link.
Section 2 – Access
           Network
Section 2 – Access
                                                                    Network



               Abis Interface (BTS - BSC)


If the BTS and BSC are not combined, A-bis interface will be used.
    Otherwise, BS interface will be used. Several frame unit
    channels are multiplexed on the same PCM support and BSC
    and BTS can be remote from each other. Its main functions are:
• Conversion of 260 – bit encoded blocks (corresponding to 160x8
    – bit samples for 20ms)
•   Encoded block synchronization
•   Vocal activity detection
•   Alarm dispatch to BSC via PCM
•   Test loop back operation
Section 2 – Access
            Network




TRX 1

TRX 2
Section 2 – Access
                                                                    Network


                           Exercise

Q1. In How many ways BTSs can be connected and which
  configuration gives the optimal solution?


Q2. What is a difference between BS interface and Abis interface?


Q3. How many time slots are occupied by 1TRX on a PCM frame?
Section 3 – NSS Topology




NSS Topology
Section 3 – NSS Topology



                            Objective


The Trainee will be able to understand:


•   Terminology used in Network Sub System
•   Protocols and Interfaces inside NSS
•   Call routing and circuit groups
•   Switching modules
•   Stand alone and integrated HLR
•   Echo canceller and TRAU location
•   Authentication, Ciphering, OMC, Billing center
•   Transit Switch
Section 3 – NSS Topology



                         Introduction

Network Sub System can be considered as a heart of the GSM
  Network. All the major activities like switching of calls, routing,
  security functions, call handling, charging, operation &
  maintenance, handover decisions, takes place within the
  entities of NSS.


Various kinds of interfaces are used to communicate between the
  different entities. Different methods are used to optimize and
  provide the quality network with the minimum operating cost.
Section 3 – NSS Topology




            Network Switching System (NSS)

Key elements of the NSS:
•   Mobile Switching Center (MSC)
•   Visitor Location Register (VLR)
•   Home Location Register (HLR)
•   Authentication Center (AuC)
•   Equipment Identity Register (EIR)
•   Gateway MSC (GMSC)


These elements are interconnected by
  means of an SS7 network
Section 3 – NSS Topology




                      NSS Identifier
IMEI – International Mobile Equipment Identifier.


The IMEI is an internationally-unique serial number allocated to the
  MS hardware at the time of manufacture. It is registered by the
  network operator and (optionally) stored in the AuC for validation
  purposes.
      IMEI = TAC + FAC + SNR +sp
  TAC = Type Approval Code by central GSM body
  FAC = Final Assembly Code, identifies the manufacturer
  SNR = Serial Number, unique six digit number
  sp = spare for future use
Section 3 – NSS Topology




IMSI – International Mobile Subscriber Identifier


When a subscriber registers with a network operator, a unique
 subscriber IMSI identifier is issued and stored in the SIM of the
 MS as well as in the HLR . An MS can only function fully if it is
 operated with a valid SIM inserted into an MS with a valid IMEI.
 IMSI consist of three parts:
             IMSI = MCC + MNC + MSIN
   MCC = Mobile Country Code
   MNC = Mobile Network Code
   MSIN = Mobile Station Identification Number
Section 3 – NSS Topology




TMSI –Temporary Mobile Subscriber Identity


A TMSI is used to protect the true identity (IMSI) of a subscriber. It
  is issued by and stored within a VLR (not in the HLR) when an
  IMSI attach takes place or a Location Area (LA) update takes
  place. At the MS it is stored in the MS’s SIM. The issued TMSI
  only has validity within a specific LA.


Since TMSI has local significance, the structure may be chosen by
  the administration. It should not be more than four octets.
Section 3 – NSS Topology




MSISDN – Mobile Station ISDN Number


The MSISDN represents the ‘true’ or ‘dialled’ number associated
  with the subscriber. It is assigned to the subscriber by the
  network operator at registration and is stored in the SIM.


According to the CCITT recommendations, it is composed in the
  following way:
             MSISDN = CC + NDC + SN
   CC = Country Code
   NDC = National Destination Code
   SN = Subscriber Number
Section 3 – NSS Topology




MSRN – Mobile Station Roaming Number


The MSRN is a temporary, location-dependant ISDN number
  issued by the parent VLR to all MSs within its area of
  responsibility. It is stored in the VLR and associated HLR but not
  in the MS. The MSRN is used by the VLR associated MSC for
  call routing within the MSC/VLR service area.
Section 3 – NSS Topology




LAI – Location Area Identity


Each Location Area within the PLMN has an associated
  internationally unique identifier (LAI). The LAI is broadcast
  regularly by BTSs on the Broadcast Control channel (BCCH),
  thus uniquely identifying each cell with
   an associated LA.
             LAI = MCC + MNC + LAC
  MCC = Mobile Country Code, same as in IMSI
  MNC = Mobile Network Code, same as in IMSI
  LAC = Location Area Code, identifies a location area within a
  GSM PLMN network. Maximum length of LAC is 16 bits.
Section 3 – NSS Topology




       Mobile Switching Center (MSC)

The Mobile services Switching Center (MSC) performs the
  telephony switching functions of the system. It also controls calls
  to and from other telephony and data systems, such as the
  Public Switched Telephone Network (PSTN) and Public Land
  Mobile Network (PLMN).


Difference between a MSC and an exchange in a fixed network is -
   MSC has to take into account the impact of the allocation of
   radio resources and the mobile nature of the subscribers and
   has to perform in addition, at least the following procedures:
Section 3 – NSS Topology




• required for location registration
• procedures required for handover

An MSC can be connected to only one VLR. Therefore, all mobile
  stations that move around under base stations connected to the
  MSC are always managed by the same VLR.


An MSC would communicate typically with one EIR. While it is
  possible for an MSC to communicate to multiple EIRs, this is
  highly unlikely since the EIR provides a centralized and
  geographic independent function.
Section 3 – NSS Topology



The MSC consults an HLR to determine how a call should be
  routed to a given mobile station:
• For incoming calls to a mobile station, the MSC would typically
  consult one HLR.
• For mobile-to-mobile calls in larger networks, a MSC could
  consult HLRs of other systems to help minimize the trunk paths
  to the other mobile station.




A given MSC can be interconnected to other MSCs to support
  inter-MSC handovers
Section 3 – NSS Topology




The following are typical MSC functions in a cellular system:


•   Provide switched connections with PSTN
•   Provide switched connections between mobile subscribers
•   Provide coordination over signaling with mobiles
•   Coordinate the location and handover process
•   Provide custom services to mobile users
•   Collect billing data
Section 3 – NSS Topology




                     Protocols

MSC/BSC         MSC/HLR    OMC/MSC   MSC/Fixed Network
                MSC/VLR    OMC/HLR
                 MSC/EIR   OMC/VLR      MSC/Voice
                                        messaging
                MSC/GMSC   OMC/BSS
                 VLR/VLR
                VLR/HLR
                MSC/MSC
BSSMAP          TCAP+MAP    X.225      R2, ISUP other
                                         Signaling
 SCCP            SCCP       X.224

 MTP              MTP        X.25          MTP


          SS7                              SS7
Section 3 – NSS Topology



                 Switching In MSC


Signaling network is separated from the speech network and
  consists of


• signaling Links (SL)
• signaling Point (SP)
• signaling Transfer Part (STP).
Section 3 – NSS Topology




Telephony system contains:


• Group Switch to switch the calls,
• ST to perform signaling in accordance with SS7
• Trunk interfaces for interfacing the PCM.

Group switch provides a semi permanent connection between time
  slot (PCM) and ST.
Section 3 – NSS Topology




                 Signaling Point (SP)

SP provides the functions of signaling and transmit and receive
  messages to and from different nodes. Each SP in the network will
  have an identification code termed as signaling Point Code (SPC).
Section 3 – NSS Topology



         Signaling Transfer Point (STP)
Signaling Transfer Part is signaling point that only transfers messages
  from one signaling point (SP) to another.




                              STP




                 SP                          SP
               (SPC)          STP          (SPC)
Section 3 – NSS Topology




                  Signaling Link (SL)


Signaling Link is the 64kbps link interconnecting two signaling Points
  and provides the functions of message error control and message
  sequencing. Each signaling Link has an SLC (signaling Link Code),
  which identifies the signaling Link with in the signaling Link Set.
Section 3 – NSS Topology



        Service Switching Point (SSP)


The MSC contains:
• The Service Switching Point
• One or more radio control point

SSP handles the usual switching function and can be connected
  via 2Mbps PCM link with:
• Other exchanges of fixed PSTN or mobile PLMN,
• Points on the SS7 signaling network,
• X.25 network

Continued…..
Section 3 – NSS Topology




• The OA&M network,
• The Intelligent network,
• PSTN via user data channels and signaling channels using ISUP
  and R2 protocols,
• Other elements of the GSM
Section 3 – NSS Topology




Switching Function of SSP:

•   Main control,
•   Switching matrix,
•   PCM multiplex connection,
•   Service circuits
•   Operation and maintenance
•   Establishing and releasing section of the links from and to
    mobiles,
• Finding circuits to the BSS; special circuit groups are created.
    SSP selects an incoming and outgoing circuit.
Section 3 – NSS Topology




                         Call Routing

• If a number received is a national or international number, the
  address information is passed to the SSP.

• If the number received is an HPLMN (Home PLMN), the RCP asks
  the HLR for a roaming number (MSRN). This MSRN is passed to the
  SSP for routing.

• If the number received is an emergency service number, the
  originating geographic area is attached to it and the combined
  information passed to the SSP.



Continued…..
Section 3 – NSS Topology




In the SSP the number received from RCP follow the standard
   translation process:


• Preliminary analysis: Selection of a translator (national,
  international),
• Translation: Determination of a routing depend on the first digits
  dialled,
• Routing: Determination of an outing circuit group.
Section 3 – NSS Topology



                    Circuit Groups


Call routes from the MSC through circuit groups. Different circuit
  groups are created inside it:


•   Group for the PSTN (according to the exchange)
•   Group for the BSCs
•   Group for the Supplementary services
•   Group for the IWF
Section 3 – NSS Topology




      CG1   BSC1

      CG2   BSC2




      CGn   BSCn

MSC   CGa   PSTN1




      CGx   PSTNx

      CG    Supplementary
               Services

      CG    IWF
Section 3 – NSS Topology




Interfaces
Section 3 – NSS Topology




              A-Interface (MSC – BSC)


The interface between the MSC and its BSS is specified in the 08-series
  of GSM Technical Specifications. The BSS-MSC interface is used to
  carry information concerning:


• BSS management;
• call handling;
• mobility management.
Section 3 – NSS Topology




             B-Interface (MSC – VLR)

The VLR is the location and management data base for the mobile
  subscribers roaming in the area controlled by the associated
  MSC(s). Whenever the MSC needs data related to a given mobile
  station currently located in its area, it interrogates the VLR. When
  a mobile station initiates a location updating procedure with an
  MSC, the MSC informs its VLR which stores the relevant
  information. This procedure occurs whenever an MS roams to
  another location area. Also, when a subscriber activates a specific
  supplementary service or modifies some data attached to a
  service, the MSC informs (via the VLR) the HLR which stores
  these modifications and updates the VLR if required.
Section 3 – NSS Topology




               C-Interface (HLR - MSC)
The Gateway MSC must interrogate the HLR of the required subscriber
  to obtain routing information for a call or a short message directed to
  that subscriber.
Section 3 – NSS Topology




                D-Interface (HLR - VLR)

This interface is used to exchange the data related to the location of the
  mobile station and to the management of the subscriber. The main
  service provided to the mobile subscriber is the capability to set up or
  to receive calls within the whole service area. To support this, the
  location registers have to exchange data. The VLR informs the HLR of
  the location of a mobile station managed by the latter and provides it
  (either at location updating or at call set-up) with the roaming
  number of that station.

The HLR sends to the VLR all the data needed to support the service to
  the mobile subscriber. The HLR then instructs the previous VLR to
  cancel the location registration of this subscriber. Exchanges of data
  may occur when the mobile subscriber requires a particular service,
  when he wants to change some data attached to his subscription or
  when some parameters of the subscription are modified by
  administrative means
Section 3 – NSS Topology




              E-Interface (MSC - MSC)
When a mobile station moves from one MSC area to another
 during a call, a handover procedure has to be performed in
 order to continue the communication. For that purpose the
 MSCs have to exchange data to initiate and then to realize the
 operation. After the handover operation has been completed, the
 MSCs will exchange information to transfer A-interface
 signaling as necessary. When a short message is to be
 transferred between a Mobile Station and Short Message Service
 Centre (SC), in either direction, this interface is used to transfer
 the message between the MSC serving the Mobile Station and
 the MSC which acts as the interface to the SC.
Section 3 – NSS Topology




                F-Interface (MSC - EIR)

This interface is used between MSC and EIR to exchange data, in order
  that the EIR can verify the status of the IMEI retrieved from the Mobile
  Station.
Section 3 – NSS Topology




              G-Interface (VLR - VLR)

When a mobile subscriber moves from a VLR area to another Location
 Registration procedure will happen. This procedure may include the
 retrieval of the IMSI and authentication parameters from the old VLR.
Section 3 – NSS Topology




              H-Interface (HLR - AUC)

When an HLR receives a request for authentication and ciphering data
 for a Mobile Subscriber and it does not hold the requested data, the
 HLR requests the data from the AuC. The protocol used to transfer
 the data over this interface is not standardized.
Section 3 – NSS Topology




                   Switch Modules
Switch has three major types of equipment modules:
• Switching module (SM)
• Communication module (CM)
• Administrative module (AM)
Section 3 – NSS Topology




Switching Module (SM):
All external lines, trunks, and special services circuits are
   terminated at the switching module. The analog and digital
   signals are converted to the digital format used inside the switch.
   The SM performs almost 95% of the call processing and
   maintenance functions including:


•   Line and trunk scanning
•   Tone generation
•   Announcements
•   Call progress supervision
•   Routine maintenance and self-maintenance.
Section 3 – NSS Topology




The SM also provides subscriber calling features including:
— call waiting
— abbreviated dialing
— call diversion
— conference calls.


SM further has two components:


9. Control units - Control all activities within the SM, such as call
     processing and maintenance functions.
2.   Peripheral units - Perform testing functions and provide
     customers and other exchanges access to the switch.
Section 3 – NSS Topology




Communication Module (CM):
The CM serves as the hub (focal point) for all inter module
    communication in a switch. The CM has four main functions:


4. Call switching - The CM interconnects the paths between
     modules to complete telephone calls and to relay data.


2.   Message switching - The CM provides paths to send
     information between processors to process calls, maintain
     records, and perform system tasks.

Continued…..
Section 3 – NSS Topology




3. Network timing - The CM provides accurate timing and
  synchronization for the switch.


4. Fast pump - The CM provides resources to quickly download (pump)
  an SM’s software if needed.
Section 3 – NSS Topology




Administrative Module (AM):
The AM controls the CM and communicates with all the SMs
  (through the CM). The AM monitors itself and the CM for
  malfunctions. If there are any problems, they are reported to
  maintenance personnel.


The AM performs resource allocation and processing functions that
  are done more efficiently on a centralized basis such as:
• Call routing for inter module and intra module calls
• Administrative data processing/billing data
Continued…..
Section 3 – NSS Topology




•   Traffic measurement reports/system performance reports
•   Memory management
•   System maintenance
•   Maintaining file records of changes to the system Software Release.
•   Personnel interface/system monitoring
•   Allocating trunks for call processing.
Section 3 – NSS Topology



                                      Switch



             SM                        AM                       CM



Control      Peripheral                               MSGS              TMS
 Unit           Unit




          Control            I/O       Disk    Tape    MCC
           Unit           Processor    Unit    Unit
Section 3 – NSS Topology




             Home Location Register

HLR is a database that stores subscription and set of functions
  needed to manage subscriber data in one PLMN area. Any
  administrative action by the service provider or changes made
  by subscriber is first carried out on the HLR and then update the
  VLR. Following are the subscriber data which frequently
  changes:
   - Identification number MSISDN & IMSI
   - Service restriction
   - Teleservices
   - Bearer services
   - Supplementary services
Section 3 – NSS Topology



Beside the permanent data it also include dynamic data of home
     subscriber including VLR address, call forward number and call
     barring numbers.


Triplets are also stored in the HLR for the authentication purpose.


The HLR communicates with other nodes: VLR, AUC, GMSC & SMS – SC
     via MAP (Mobile Access Protocol). To support this communication
     HLR needs MTP and SCCP
Section 3 – NSS Topology
Section 3 – NSS Topology




        MAP (Mobile Application Protocol)


The only way via which HLR communicates with other GSM nodes
  is Mobile Access Protocol. Number of functional blocks exist to
  support different MAP operations eg HLCAP is used for location
  cancellation or HLUAP is required for location updating. Other
  functions defined on the MAP are:
   - Inter MSC Handover and subsequent handover
   - Update HLR and VLR
   - Fault Recovery
   - Management and handling of supplementary services.

Continued…..
Section 3 – NSS Topology




  - Support of Short Message Services.
  - Call establishment / delivery
  - Security related data.
  - Retrieval of subscriber data during call setup.


HLR also needs to communicate with GMSC, VLR, AUC and SMS-SC, for
  which MTP and SCCP is essential.
Section 3 – NSS Topology




      SCCP (Signaling Connection Control Point)


All MAP messaging use SCCP to analyze the GT (Global Title) of
   incoming information. If GT belongs to anther node, then SCCP
   will use the services of MTP (Message Transfer Part) to reroute
   the message.


SCCP must have the GT analysis to terminate and route MAP
   messages from all nodes it communicates with.


To find out the DPC, SCCP looks in a routing case translation
   table. The information about the DPC is then sent to MTP which
  sends the message to the appropriate SP.
Section 3 – NSS Topology




         MTP (Message Transfer Part)

MTP must be defined to allow the nodes to communicate with each
 other.


The MTP provides the means for reliable transport and delivery of
  UP (User Part) information across the No. 7 network eg ISDN
  User part (ISUP), the Telephone User Part (TUP), Signaling
  Connection Control Part (SCCP), Interworking function User Part
  (IWUP) and Data User Part (DUP)

Continued…..
Section 3 – NSS Topology




MTP has the ability to react to system and network failure that
    affect the user information.


MTP further has three functional levels:
4.   MTP Level 1 – Signaling data link
5.   MTP Level 2 – Signaling link
6.   MTP Level 3 – Signaling network
Section 3 – NSS Topology




HLR connects with MSC via C interface, VLR via D interface
Section 3 – NSS Topology




HLR can be configured in two ways:
2.   Integrated with MSC
Section 3 – NSS Topology


•   Hs




•   Stand Alone HLR (External Database)
Section 3 – NSS Topology




        Integrated Vs Stand Alone HLR

The Integrated HLR is accessed by other MSC’s/ VLR’s via MAP, and
  the switch can use MAP to query other off switch HLRs. The main
  advantages with an integrated HLR solution at this early stage are:
• Efficient use of HW and lower HW investments
• Fewer physical connections required due to fewer physical nodes
• Less capacity required in No. 7 network as major part of HLR
  signaling is internal within MSC/VLR/HLR
Section 3 – NSS Topology




• A single fault will affect a smaller number of subscribers than if
  standalone HLR is used


Major drawbacks are:
• Less processing capacity available for MSC/VLR.
  Additional Switching capacity will be required earlier
• Migration to standalone HLR (which is to be preferred in a mature
  larger network) will induce major changes in the network
• Administration of subscriptions
• Operation and maintenance for HLR geographically distributed
Section 3 – NSS Topology




In Stand Alone HLR, call processing activities are not performed by the
   switch. Only HLR queries are handled via the GSM standard MAP
   messages coming over signaling links from other Mobile Switching
   Centers (MSCs) in the wireless network.
Section 3 – NSS Topology




Benefits:


• All HLR data is centralized, thus simplifying its ongoing
  maintenance and operation
• High HLR Capacity
• High processing capacity
• On going enhancement

There are some drawbacks with standalone HLR
• A fault in a HLR will affect many subscribers
• A fault in a HLR will increase the signaling substantially in
the whole signaling network
Section 3 – NSS Topology


    HLR is responsible for:




• Connection of mobile subscribers and definition of
    corresponding subscriber data.
•   Subscription to basic services.
•   Registration/deletion of supplementary services.
•   Activation/deactivation of supplementary services.
•   Interrogation of supplementary services status.

Continued…..
Section 3 – NSS Topology




• Functions for analysis of mobile subscriber numbers
   (MSISDN, IMSI, additional MSISDN) and other types of
    addresses.
• Statistical functions for collecting data regarding the
   performance of the system.
• Functions for communication with GMSC and VLR using
   the No. 7 signaling system and MAP
• Handling of authentication and ciphering data for mobile
  subscribers including communication with an authentication
  center.

Continue…..
Section 3 – NSS Topology




•   Get Password/Register Password
•   Alert Service Center
•   Provide Roaming Number
•   Send Routing Information for SMS
•   Send Routing Information for GMSC
•   Set Message Waiting Data
Section 3 – NSS Topology



             Visitor Location Register
It is a subscriber database containing the information about all the MS
    currently located in the MSC service area. VLR can be considered as
    a distributed HLR in the case of a roaming subscriber. If MS moves
    into a new service area (MSC), VLR requests the HLR to provide the
    relevant data and store it, for making the calls for that MS.


VLR is always integrated with MSC to avoid the signaling load on the
  system.


It can also be viewed as a subset of a HLR.
Section 3 – NSS Topology




VLR connects with MSC via B interface, HLR via D interface and with
  another VLR via G interface.




                           G
Section 3 – NSS Topology



VLR is responsible for


• Setting up and controlling calls along with supplementary
services.

• Continuity of speech (Handover)

• Location updating and registration
• Updating the mobile subscriber data.

• Maintain the security of the subscriber by allocating TMSI
Continued…..
Section 3 – NSS Topology




• Receiving and delivering short messages

• Handling signaling to and from
   - BSC and MSs using BSSMAP
   - other networks eg PSTN, ISDN using TUP
• IMEI check


• Retrieve data from HLR like authentication data, IMSI,


ciphering key


Continued…..
Section 3 – NSS Topology




• Retrieve information for incoming calls.


• Retrieve information for outgoing calls.


•Attach/Detach IMSI


• Search for mobile subscriber, paging and complete the call.
Section 3 – NSS Topology



                  Security Feature


Both the users and the network operator must be protected against
     undesirable intrusion of third party. As a consequence, a
     security feature is implemented in the telecommunication
     services. The following parts of the system have been
     reinforced and provide the various security features:
2.   Access to the network      authentication
3.   Radio part                 ciphering
4.   Mobile equipment           equipment identification
5.   IMSI                       temporary identity
Section 3 – NSS Topology




          Authentication Center (AUC)


AUC is always integrated with HLR for the purpose of the
    authentication. At subscription time, the Subscriber
    Authentication Key (Ki) is allocated to the subscriber, together
    with the IMSI. The Ki is stored in the AUC and used to
    provide the triplets, same Ki is also stored in the SIM.


AUC stores the following information for each subscriber
4.   The IMSI number,
5.   The individual authentication key Ki,
6.   A version of A3 and A8 algorithm.

Continued…..
Section 3 – NSS Topology




Authentication is required at each registration, at each call setup
  attempt (mobile originated or terminated), at the time of location
  updating, before supplementary service activation, de-
  activation , registration.


HLR uses the IMSI to communicate with AUC, triplets are
  requested in sets of five.




Continued…..
Section 3 – NSS Topology




In AUC following steps are used to produce one triplet:


4.   A non- predictable random number, RAND, is produced
5.   RAND & Ki are used to calculate the Signed Response
     (SRES) and the Ciphering Key (Kc)
6.   RAND, SRES and Kc are delivered together to HLR as one
     triplet.


HLR delivers these triplets to MSC/VLR on request in such a way
    that VLR always has at least one triplet.
Section 3 – NSS Topology




Authentication Procedure:

The MSC/VLR transmits the RAND (128 bits) to the mobile. The MS
  computes the SRES (32 bits) using RAND, subscriber authentication
  key Ki (128 bits) and algorithm A3. MS sends back this SERS to AUC
  and is tested for validity.
Section 3 – NSS Topology




 SIM Card                RAND                                              A4
IMSI
Ki             SERS                                         A4
                          =?
A3                                                                    IMSI
                                                       RAND           Ki
A8                                                             Ki

                         Kc          Triplets
                                                        A3 A8
                                                        Triplets
 Kc                                             A2     Generation



 Ciphering   Ciphering                          RAND
 Function    Function                           SERS
    A5          A5                               Kc


     MS        BTS             MSC/VLR      HLR           AUC            OMC
Section 3 – NSS Topology



                             Ciphering

The user data and signaling data passes over the radio interface are ciphered to
  prevent intrusion. The ciphered key (Kc) previously computed by the AUC is
  sent from the VLR to the BSS after the mobile has been authenticated. The
  Kc is also computed in the MS and in the way both ends of the radio link (MS
  and BSS) possess the same key.
Section 3 – NSS Topology




Procedure:


For the authentication procedure, when SRES is being calculated, the
  Ciphering Key (Kc), is calculating too, using the algorithm A8.



The Kc is used by the MS and the BTS in order to cipher and decipher the
  bit stream that is sent on the radio path.
Section 3 – NSS Topology




   SIM                                                                        AUC
                                                     Choice of random no
                                                     RAND (128 bits)

   Ki                                  RAND                                    Ki



   A3                A3                                     A3                  A3

                                       SERS
                          SERS
                                                       =?

             A8                                             OK      A8         A8
  A8                             Ciphering Command


                 Kc (64                                            Kc
                                                                        Speech, data,sig
Speech, data,sig bits)
                                     Ciphered Data                  A5
             A5
                                                          Ciphering/Deciphering
Section 3 – NSS Topology



               Subscriber Confidentiality


The subscriber identity (IMSI), since is considered sensitive
  information, is not normally transmitted on the radio channel. A
  local, temporary identity is used for all interchanges. The identity
  (TMSI) is assigned after each change of authenticated location.
  For other cases:
• Call set-up
• Use of supplementary services
• Use of SMS

Continued…..
Section 3 – NSS Topology




A TMSI is allocated when the one supplied by the MS is considered out of
  date or when the MS does not provide the TMSI.


Transmission of the TMSI over the traffic channel is ciphered.
Section 3 – NSS Topology




    Equipment Identification Register (EIR)



Purpose of this feature is to make sure that no stolen or unauthorized
  mobile equipment is used in the network.


EIR is a database that stores a unique International Mobile Equipment
  Identity (IMEI) number for each item of mobile equipment.
Section 3 – NSS Topology




Procedure:
• The MSC/VLR requests the IMEI from the MS and sends it to a
  EIR.
• On request of IMEI, the EIR makes use of three possible defined
  lists:
  - A white list: containing all number of all equipment identities
  that have been allocated in the different participating countries.
  - A black list: containing all equipment identities that are
  considered to be barred.
  - A grey list: containing (operator’s decision) faulty or non-
  approved mobile equipment.
• Result is sent to MSC/VLR and influences the decision about
  access to the system.
Section 3 – NSS Topology




           EIR               MSC/VLR              MS
 Storage of all number                        Storage of the
series mobile equipment                         equipment
that have been allocated                      identity IMEI
  in the different GSM
        -countries
                                               Call Setup
Storage of all grey/black
– listed mobile equipment    IMEI Request

                                               Sends IMEI

                            Check IMEI
                            Continues/Stops
                              call setup
 Access/ barring info         procedure
Section 3 – NSS Topology



                     Echo Canceller


In order to eliminate echo effects (noticeable by the mobile
   subscribers while in conversation with PSTN subscribers)
   caused by the time delay due to coding and decoding of signal
   processing, group of echo cancellers are installed even for local
   calls.


This is rarely a problem when communicating between two MSs.
  However, when connecting to a PSTN telephone, the signal
  must pass through a 4-wire to 2-wire hybrid transformer.

Continued…..
Section 3 – NSS Topology




The function of this transformer is - some of the energy at the 4-
  wire receive side from the mobile is coupled back to the 4-wire
  transmit side and thus speech is retransmitted back to the
  mobile.


As a result, all calls on to the PSTN must pass through an echo
  canceller to remove what would otherwise be a noticeable and
  annoying echo.




Continued…..
Section 3 – NSS Topology




The process of canceling echo involves two steps:


• First, as the call is set up, the echo canceller employs a digital
  adaptive filter to set up a model or characterization of the voice
  signal and echo passing through the echo canceller. As a voice
  path passes back through the cancellation system, the echo
  canceller compares the signal and the model to dynamically
  cancel existing echo. It removes more than 80 to 90 percent of
  the echo across the network.
• The second process utilizes a non-linear processor (NLP) to
  eliminate the remaining residual echo by attenuating the signal
  below the noise floor.
Section 3 – NSS Topology




  Transcoder and Rate Adaptor Unit (TRAU)



The primary function of the TRAU is to convert 16kps (inc
  signaling) GSM speech channels to 64kbps PCM channels in
  the uplink direction and the reverse in the downlink direction.
  The reason this process is necessary is because MSCs only
  switch at the 64kbps channel level.
Section 3 – NSS Topology




                       TRAU Locations

TRAU can be physically located in the BTS, BSC or MSC and hence leads
  to a variety of installation configurations.
Section 3 – NSS Topology




           Advantages of Different Configurations



Case 1, TRAU at BTS: If the TRAU is installed at the BTS, each
  16kbps GSM channel would need to be mapped to its own
  64kbps PCM channel. This results in 75% of the transmission
  bandwidth being wasted across both the Abis (BTS-BSC) and A
  (BSC-MSC) interface.


Case 2, TRAU at BSC: If the TRAU is installed at the BSC, 16kbps
  GSM channel mapped to 64kbps at the A (BSC-MSC) interface,
  which increases the requirement of the Transmission trunks.
Section 3 – NSS Topology




Case 3, TRAU at MSC: If the TRAU is placed at the MSC, as is generally
  the case in current networks, a multiplexer can be placed at the BTS
  which enables 4 x 16kbps GSM channels to be multiplexed onto one
  64kbps PCM channel, using 4 x 16kbps ISDN D-channels. In this
  configuration, only at arrival at the MSC is the 16-64kbps channel
  conversion necessary, thereby maximizing the efficient usage of the
  transmission medium by increasing the GSM channel throughput per
  PCM 2048 bearer from 30 to 120 channels.
Section 3 – NSS Topology




   Operation And Maintenance Center (OMC)

The OMC centralizes all operations and maintenance activities for the MSCs and
  BSSs using remote software control. It provides remote testing, operations,
  and maintenance capabilities for the entire system from one central location.
  Each BSS, MSC, HLR, VLR, EIR, and AUC can be monitored and controlled
  from the OMC.
Section 3 – NSS Topology




   OMC Functional Architecture


        Event/ Alarm
        Management              Security
                               Management
                       MMI


                   Operating   Database
   Fault            System            Configuration
Management                             Management
             Communications
                Handler

                 Performance
                 Management
Section 3 – NSS Topology




The OMC supports the following network management functions:


• Event Management - General functions of the OMC include
  operator input and output messages, application input
  commands, and application output reports.


• Fault Management - The OMC provides fault management such
  as diagnostics and alarms for the MSC and BSS. It provides the
  means to isolate and minimize the effects of faults in the network
  thereby enabling the network to operate in efficient manner.

Continued…..
Section 3 – NSS Topology




• Security Management – It provides an extensive range of features to
  ensure that access to the OMC functions is restricted to relevant
  personnel.
  The security features are as follows:
 Password Authentication of OMC operator
 Logging of OMC access attempt
 Configurable user access restrictions
 Automatic logoff
Section 3 – NSS Topology




• Configuration Management - Configuration management for the
  BSS consists of generic download, non-volatile memory
  download, database administration, and translations download.
  For the MSC, software release updates, database administration
  (route analysis, IMSI analysis table), and subscriber
  administration (connect/disconnect) are supported.


• Performance Management - Performance management supports
  data collection (such as traffic data, handovers, statistics, plant
  measurements, and volume data) and basic reporting.
Section 3 – NSS Topology




                           Billing Center

Charging analysis is the process of analysing the Charging Case and then
  ultimately generating the TT (Toll Ticketing) record so that an itemised bill can
  be produced and then sent on to the customer.


The tariff structure consists of two parts:
• The network access component
• The network utilization component
Section 3 – NSS Topology




The network utilization component is registered on a per call basis.
  Charging starts at the moment the subscriber answers, or on connection
  to an answering machine internally in the network.


The main elements are:
•   Use of GSM PLMNs
•   Use of national / international PSTNs
•   Use of connection between different networks
•   Use of the signaling system no.7
Section 3 – NSS Topology




Depending on the type of call, one or more call tickets can be generated:


• Outgoing call to fixed network: a call tickets is generated by the
   originating MSC.
• Incoming call from the fixed network: two call tickets are created: one in
   the GMSC and another in the destination MSC. If a call forwarding
   supplementary service is in operation, other call tickets are generated in
   the MSC and the GMSC.

Continued…..
Section 3 – NSS Topology




•    Outgoing call from a mobile subscriber to another mobile
     subscriber belonging to same PLMN: three call tickets are
     created: one in the originating MSC, one in the GMSC (which
     is in this case is the originating MSC) and another in the
     destination MSC.


Call tickets mainly register the following information:
4.   IMSI
5.   Identity (MSISDN) and type (MSC or GMSC)
6.   Mobile subscriber location identity
Section 3 – NSS Topology




1.   Other party’s identity
2.   Call type (incoming, outgoing, forwarded etc)
3.   Call status
4.   Teleservices and bearer service
5.   Date and time
6.   Call duration
Section 3 – NSS Topology



                 Call Detail Record (CDRs)


• Each call within the PLMN creates one or more call records
• These records is generated by the MSC/GMSC originating the
  call
• The records are known as a ‘Call Detail Records’ (CDRs)
• CDRs contain the following information:
         - Subscriber Identity
         - Number called
         - Call Length
         - Route of call
• Often referred to as ‘Toll Tickets’
Section 3 – NSS Topology



                       Call Charge Procedure


• Network supplies originating MS with CAI details
• MS calculates AOC record using CAI details
• This record acts as a ‘toll ticket’ which tracks the call on its route
    through various networks
•   Each call component can generate a separate CDR
•   The record passes along the backbone to the home network
•   Billing computer generates bills based on cumulative CDRs
•   HPLMN collects the charges
•   HPLM reimburses VPLMN using TAPs in accordance with
    roaming agreement
Section 3 – NSS Topology
Section 3 – NSS Topology




The Transferred Account Procedure (TAP) is the mechanism by which
  operators exchange roaming billing information. This is how roaming
  partners are able to bill each other for the use of networks and services
  through a standard process.
Section 3 – NSS Topology



               Gateway MSC (GMSC)


Gateway MSC (GMSC) connects the PLMN with other networks and the
  entry point for the mobile subscriber calls having the interrogation
  facility. It has the function to obtain the information from the HLR
  about the subscriber’s current location and reroute the calls
  accordingly.


In case of the network having only on MSC, the same MSC work as the
   GMSC, while in the case having more than one MSC, one dedicated
   MSC works as GMSC.
Section 3 – NSS Topology
Section 3 – NSS Topology




                       Roaming Number

A MSRN is used during the call setup phase for mobile terminating calls. Each
  mobile terminating call enters the GMSC in the PLMN. The call is then re-
  routed by the GMSC, to the MSC where the called mobile subscriber is
  located. For this purpose, a unique number (MSRN) is allocated by the MSC
  and provided to the GMSC.
Section 3 – NSS Topology




Call Setup
Section 3 – NSS Topology




1.   GMSC receives a signaling message "Initial Address
     Message" for the incoming call (MSISDN).
2.   GMSC sends a signaling message to the HLR where the
     subscriber data is stored (MSISDN).
3.   The VLR address that corresponds to the subscriber location
     and the IMSI are retrieved. HLR sends a signaling message
     using the VLR address as the destination (IMSI).
4.   VLR having received the message, requests MSC to seize an
     idle MSRN and to associate it with the IMSI received. VLR
     sends back the result to the HLR (MSRN).
Section 3 – NSS Topology




1.   HLR sends back the result to the GMSC (MSRN).
2.   GMSC uses MSRN to re-route the call to the MSC. MSC performs
     digit analysis on the received MSRN and find the association with
     IMSI. The MSRN is released and the IMSI is used for the final
     establishment of the call.
Section 3 – NSS Topology




                           Transit Switch

When planning the trunk network architecture, it is important to
 take into consideration the future expansion of the network.
Some factors that influence the trunk network configuration are:
•   Number of MSCs
•   Transmission costs
•   Traffic distribution
•   Traffic volume
•   PSTN tariffs
Section 3 – NSS Topology




In case of a medium networks (having 5 - 10 MSCs), some of the
   MSCs are used as transits for the others and the number of
   direct links between the MSCs are restricted.


In case of large networks (having more than 10 MSCs), separate
   transit exchanges are used. These are connected to all MSCs
   and are working with load sharing.


Transit functionality is used for passing on calls to another node.
  This provides a hierarchical structured network.
Section 3 – NSS Topology




High Usage trunk
Section 3 – NSS Topology




Traffic between MSCs and from MSCs to other networks is routed over two
   MSCs in a similar way as is used for the small network. The TGMSCs
   are used as interconnecting exchanges, since they have trunks to all
   MSCs in the operators PLMN.


MSCs located in the same city area or in close cities are likely to be
  interconnected by high usage routes, while traffic between distant MSCs
  is likely more economically routed over the TMSCs.
Section 3 – NSS Topology




            ADVANTAGES OF USING TRANSIT EXCHANGES



The use of transit exchanges implies a more stable network structure and some
  of the most important benefits are:
•   increased flexibility
•   enhanced reliability
•   easily expandable network
•   platform for functional development
•   lower handling costs
•   improved signaling network
Section 3 – NSS Topology



                     Value Added Services


Value Added Services includes the following:
•   Point-to-Point Short Message Services
•   Cell Broadcast Short Message Service
•   Voice/Fax Mail
•   Pre-Paid SIM


The products associated with each of these services as well as the required
  interfaces into the core network elements are defined as:
Section 3 – NSS Topology
Section 3 – NSS Topology




         Short Message Services (SMS)

The Point-to-Point and Cell Broadcast Short Message Services are implemented
  using the Short Message Service Center (SMSC) and Cell Broadcast Center
  (CBC).


SMSC is built around proven Open Systems Platforms from the UNIX based
  computer platform to the MSC/HLR/VLR interfaces utilizing SS7.
Section 3 – NSS Topology




Following are the services and functions for which SMSC is
  capable of:
• Alerting services to indicate call or message waiting
• Paging interfaces providing full industry standard TAP
  interworking
• Information services - subscription to financial, weather, traffic,
  etc. services
• DTMF message entry via interactive voice prompts
• E-mail
• Network administration including bill reminders, statements on
  demand, network
• service information and handset reprogramming.
Section 3 – NSS Topology




The CBC product is based on the same Open Systems Platforms with an
  X.25 interface to BSC components. It offers a wide range of
  applications, which include advertising, general and specialist
  information distribution services along with other non-mobile terminal
  applications. The services and functionality that the CBC can provide
  includes:
•   Customer care information
•   Weather and traffic reports
•   Free advertising
•   Variable re-transmission rates
•   Distributed network interface units to handle varying network loads
•   Local and remote message submission facility.
Section 3 – NSS Topology




SMS Network Components
Section 3 – NSS Topology




Callers which cannot reach the MS are given the option (by the VMS) to
  leave either a short message or a voice mail message. Message
  waiting notification will be delivered to the MS when the MS is
  reachable. The VMS (voice mail system) communicates with the SMS
  SC via TCP/IP or X.25.


The VMS has a trunk and signaling interface to the PSTN (e.g., R2, ISUP
  signaling). The VMS has a trunk and signaling interface to the MSC for
  mobile subscriber to access his/her voice mail.
Section 3 – NSS Topology




                      SMS Applications

• SMS up to 160 alphanumeric characters.
• Alert services (MT-SMS)
  — Voice Message Alert
  — FAX/Telex Message Alert
  — E-mail System Alert
  — Paging Bureau Emulation Services.
• Information Services
  — Financial Services (stock market queries and alerts)
  — Weather or traffic information (e.g., from TV/radio station data
  feeds)
Section 3 – NSS Topology




• Network Administration
  — Bill reminders (MT-SMS), bill payment
  — Statements on demand (MO and MT-SMS)
  — Handset re-programming and much more.
Section 3 – NSS Topology


                                 VMS

It supports a wide range of innovative applications including:
•   Call answering
•   Voice and fax bulletin boards
•   Information on demand
•   One number services
•   Voice and fax messaging
•   Interactive voice response
•   Prepaid calling cards
•   Voice activated dialing
Section 3 – NSS Topology




                       Pre Paid SIM

The functionality of the Pre-Paid SIM feature includes:
• Provision of pre-defined limits based on air time or talk time
• Service provisioning including various provisioning options (point
  of sale, service providers, etc.) and definitions of pre-paid
  categories (throw away, top up, etc.)
• Service execution for air and talk time credit usage
• GSM MAP services, teleservice, bearer services and
  supplementary services will all be available to the Pre-Paid SIM
  subscriber, with possible limitations, as required by the network
  operator.
Section 3 – NSS Topology


               Supplementary Services

Wide range available in GSM standard and Operators can also define their own


In GSM it is possible for the subscribers to check and modify
the parameters and status of their Supplementary Services
Section 3 – NSS Topology




Some of the Supplementary Services are:


•   Calling Line Identification/Restriction
•   Connected Line Identification/Restriction
•   Call Forwarding
•   Call Waiting
•   Call Hold
•   Conference Calling
•   Conference Calling
•   Advice of charge
•   Call barring
Section 3 – NSS Topology


                             Exercise


Q1. Write a full form of following : IMEI, TMSI, MSRN, LAI, ST,
  STP, SSP


Q2. How many circuit groups are required for 3 BSCs and 10
  PSTN?


Q3. List down the three functions of each HLR & VLR.


Q4. Fill in the following:
    E interface is used between ------
    H interface is used between-------
Section 3 – NSS Topology



   Algorithm A8 is used for ----------
   Algorithm A3 is used for ----------
   Transit exchanges are used to reduce the ---------


Q5. List down the different locations of TRAU and explain the best
  position.


Q6. What information is contained in the CDRs?


Q7. 2 advantages of transit switch.


Q8. Name some of supplementary services.
Section 4 – GSM Signaling




GSM Signaling
Section 4 – GSM Signaling



                         Objective

The Trainee will be able to understand:


•   signaling between MSC/VLR and BSS
•   Concept of DTAP
•   Concept of BSSMAP
•   signaling between BSC and BTS
•   Functions of LAPDm
•   Functions of LAPD
•   Frame structure of LAPDm And LAPD
Section 4 – GSM Signaling




                        Introduction

There are two different types of communication channels:
• Traffic channel at 64 Kbps, carrying speech or data for radio
  channels.
• signaling channels at 64Kbps, carrying signaling information.

In PCM one time slot is reserved for signaling and remaining are
   used for transmitting speech or data. As the entire siganlling is
   done on 64Kbps , there should be special function converting
   the information to 64Kbps format and back at the receiving end.
Section 4 – GSM Signaling




        Protocols in GSM Networks


                             VLR     AUC
                           MAP            MAP
ISDN          ISUP           VLR     HLR                EIR
GMSC        ISUP             MAP    MAP
                                                MAP
        MAP                        MSC
MSC
            TUP
PSTN                                                    Switching System
                                          BSSAP


                                          BSC                     Base
                                            LAPD                  Station
                                                                  System
       MS          LAPDm                  BTS
Section 4 – GSM Signaling




                     GSM Signaling Matrix
                                                                   Database


DTAP
                                    BSSMAP                           MAP
                                                           BSS
                                                   DTAP
 RR                                                        MAP
        RIL3     RSM        RSM
                                                                    TCAP
                                    BSSAP          BSSAP
RIL3


                                                                       ISUP


                                                          SCCP
                                         SCCP



                                         MTP2 &3           MTP2 & 3
LAPDm
        LAPDm        LAPD   LAPD          MTP1              MTP1
 MS            BTS                 BSC                       MSC
Section 4 – GSM Signaling




• MSC uses ISUP/TUP protocols for PSTN signaling.
• MAP siganlling for database applications like HLR, VLR, EIR,
  AUC, SMS-SC, GMSC.
• GSM specific protocol as BSSAP, which comprises of DTAP and
  BSSMAP.
• The BSC on layer 2 uses LAPD protocol, which is an ISDN.
• BTS has LAPDm as layer 2 protocol.
• Mobile has DTAP for MSC and RR for Radio Resource
  signaling.
Section 4 – GSM Signaling



               MAP (Mobile Application Part)

MAP is a protocol specially designed for GSM requirement. It is installed
 in MSC, VLR, HLR, EIR and communicates in case of:


•   Location registration
•   Location cancellation
•   Handling/management/ retrieval of subscriber data.
•   Handover
•   Transfer of security/ authentication data.
Section 4 – GSM Signaling




            BSS Application Part (BSSAP)


BSSAP is used for signaling between MSC/VLR and BSS. Three groups of
    signals belong to BSSAP


3.   DTAP
4.   BSSMAP
5.   Initial MS messages
Section 4 – GSM Signaling



                             Transparent to BSS




M   DTAP
                                             M
    Initial MS Message
S   BSSMAP                      LAPDm
                                             S
C
                   BSC/BTS
Section 4 – GSM Signaling




    Direct Transfer Application Part (DTAP)


DTAP is a messages between the MSC and MS, passes through the BSS
  transparently. These are call control and mobility management
  messages directed towards a specific mobile.
3 main type of DTAP messages are:
• Messages for mobility management like location update, authentication,
  identity request
• Messages for circuit mode connections call control
• Messages for supplementary services
Section 4 – GSM Signaling




                             BSSMAP


BSS management messages (BSSMAP) between MSC and BSS (BSC/ BTS),
  which are necessary for resource management, handover control, paging
  order etc. The BSSMAP messages can either be connection less or
  connection oriented.
Section 4 – GSM Signaling




                    Initial MS Messages

These messages are passed unchanged through BSS, but BSS
  analyses part of the messages and is not transparent like DTAP
  messages.
Between BSS and MSC, the initial MS message is transferred in the
  layer 3 information in the BSSMAP.


The Initial MS messages are:
• CM Request
• Location update request
• Paging response
Section 4 – GSM Signaling




                         LAPDm

Link Access Procedures on the Dm channel (LAPDm) is the layer 2
   protocol used to convey signaling information between layer 3
   entities across the radio interface. Dm channel refers to the
   control channels, independent of the type including broadcast,
   common or dedicated control channels.


LAPDm is based on the ISDN protocol LAPD, used on the Abis
  interface. Due to the radio environment, the LAPD protocol can
  not be used in its original form. Therefore, LAPDm segments the
  message into a number of shorter messages.
Section 4 – GSM Signaling



Data exchanged between the data link layer and the physical layer
  is 23 octets for BCCH, CCCH, SDCCH and FACCH. For SACCH
  only, 21octets are sent from layer 2 to layer 1.


LAPDm functions include:
• LAPDm provides one or more data link connections on a
  Dm channel. Data Link Connection Identifier (DLCI) is used for
  discriminating between data link connections.
• It allows layer 3 message units be delivered transparently
  between layer 3 entities.
• It provides sequence control to maintain the sequential order of
  frames across the data link connections.
Section 4 – GSM Signaling



              LAPDm Frame Structure

       info              length   command            address




N(R)   P/F    N(S)   0            0   0   1   SAPI     CR      1
Section 4 – GSM Signaling


Sequence Number: N(S) send sequence number of the
  transmitted frame. N(R) is receive sequence number.


P/F : All frames contain the Poll/Final bit. In command frames, the
  P/F bit is referred to as the P bit. In response frames, the P/F bit
  is referred to as the F bit.


Service Access Point Identifier: Service Access Points (SAPs) of a
  layer are defined as gates through which services are offered to
  an adjacent higher layer.SAP is identified with the Service
  Access Point Identifier (SAPI).
       SAPI = 0 for normal signaling of DTAP & RR
       SAPI = 3 for short message services
Section 4 – GSM Signaling




LAPDm has no error detection and correction. It is used in two modes:
• Acknowledge &
• Unacknowledged

and having a different structure for both.
Section 4 – GSM Signaling




                                LAPD

All signaling messages on the Abis interface use the Link Access
   Procedures on the D-channel. (LAPD protocol). LAPD provides two
   kinds of signaling:
• unacknowledged information
• acknowledged information

LAPD link handling is a basic function to provide data links on the 64 kbps
  physical connections between BSC and BTS.
Section 4 – GSM Signaling




Links are provided for operation and maintenance (O&M) of the
   links, for O&M of the BTS equipment and for transmission of
   layer 3 Abis messages.


Each physical connection can support a number of data links
(logical connections). On each physical connection each data
link is identified by a unique TEI/SAPI
Section 4 – GSM Signaling




LAPD has three sub signaling channels


3.   RSL (Radio signaling Link), deals with traffic management,
     TRX signaling.
4.   OML (Operation & Maintenance Link), serves for
     maintenance related info and transmission of traffic statistics.
5.   L2M (Layer 2 Management), used for management of the
     different signaling on the same time slot.
Section 4 – GSM Signaling



               LAPD Frame Structure

Flag      FCS         info       length     command      address          Flag




       N(R )    P/F   N(S)   0            TEI   1     SAPI      CR       0
Section 4 – GSM Signaling




LAPD Frame structure is made up of:
Flag: Indicates the beginning and end of each frame unit. Flag has
  a pattern of 01111110.


FCS: Frame Check Sequence, provides the error checking for the
  frame. If error is found frame will be retransmitted.


Command: It has two types of structure, in acknowledge mode it
  has N(S) and N(R ). N(S) is a sequence number of frame sent
  and N(R ) is the sequence number of the frame expected to
  receive next.
Section 4 – GSM Signaling




C/R: This bit indicates whether it is command or response.


P/F: In command frames, the P/F bit is referred to as the P bit and
  the other end transmits the response by setting this bit to F.


TEI: Terminal Endpoint Identifier, is a unique identification of each
  physical entity on either side like each TRX within a BTS have a
  unique TEI.
Section 4 – GSM Signaling




SAPI: Service Access Point Identifier, used to identify the type of link.


       SAPI = 0 for RSL
       SAPI = 62 for OML
       SAPI = 63 for L2ML


Each LAPD link is identify by SAPI/TEI pair.
Section 4 – GSM Signaling




                              Exercise

Q1. Name the protocol which is transparent to BSS and what information is
  used to transfer on this protocol?


Q2. Name the protocols used between
              Mobile and BTS
              BTS and BSC
              BSC to MSC
              MSC to PSTN
Section 5 – Call Handling




Call Handling
Section 5 – Call Handling




                               Objective

The Trainee will be able to understand:


•   Basic call concepts
•   Location Area concepts
•   Call setup in different scenarios
•   SMS routing
•   Intra and Inter MSC handovers
Section 5 – Call Handling




                          Introduction

Call setup is required to establish communication between a Mobile Station
  and Network Subsystem (NSS). The NSS is responsible for establishing
  a connection with the corresponded. Different types of calls require
  different teleservices.


For the optimum utilization of the network, different location areas will be
  defined to reduce the paging load on the system.
Section 5 – Call Handling




                Basic Types of Calls


There are three basic types of call:


3.   Mobility Management calls: Such as Location update. These
     are used to collect information about the MS and only
     signaling channels are used.
4.   Service calls: Such as SMS. These calls passes very small
     information, therefore signaling channels are used.
5.   User traffic calls: Such as speech or data. Large amount of
     data is exchanged hence traffic channels are used.
Section 5 – Call Handling




Basic Call Setup
Section 5 – Call Handling




Subscriber on switch A places a call to a Subscriber on switch B:


3.   Switch A analyzes the dialed digits and determines that it needs
     to send the call to switch B.
4.   Switch A selects an idle trunk between itself and switch B
     and formulate IAM
6.   STP W receives a message, inspects its routing label, and
     determines that it is to be routed to switch B.
7.   Switch B receives the message. On analyzing the message, it
     determines that it serves the called number and that the called
     number is idle.
8.   Switch B formulates an address complete message (ACM),
     which indicates that the IAM has reached its proper destination.
Section 5 – Call Handling




2.   Switch B picks one of its links and transmits the ACM over the
     link for routing to switch A.
3.   STP X receives the message, inspects its routing label, and
     determines that it is to be routed to switch A.
4.    On receiving the ACM, switch A connects the calling
     subscriber
5.   When and/or if the called subscriber picks up the phone,
     switch B formulates an answer message (ANM),
6.   Switch B selects the same link it used to transmit the ACM
7.   STP X recognizes that the ANM is addressed to switch A and
     forwards it over link
Section 5 – Call Handling




2.   Switch A ensures that the calling subscriber is connected and
     conversation can take place.
3.   If the calling subscriber hangs up first switch A will generate a
     release message (REL) addressed to switch B.
4.   STP W receives the REL
5.   Switch B receives the REL, disconnects the trunk from the
     subscriber line, returns the trunk to idle status.
6.   STP X receives the RLC, determines that it is addressed to
     switch A.
7.   On receiving the RLC, switch A idles the identified trunk.
Section 5 – Call Handling




                Location Registration

When the mobile is turned on first time in the network, it has no indications
  in its data about an old Location Area Identity. MS immediately inform
  the network and request for the Location Update to the MSC/ VLR.
  After registration MSC/ VLR will consider the MS as active and marked
  the MS as “attached”.
Section 5 – Call Handling




                       Location Update


When the MS moves from one LA to another, it has to register. This
 registration is performed when the MS detects another LAI than the
 one stored. This is called location updating. This function provides
 mobile subscribers with uninterrupted service throughout the GSM
 coverage area so that they can:
• Be called on a permanent directory number irrespective of their
  location at the time of call.
• Access the network whatever their position
Section 5 – Call Handling




There are four different types of location updating:


• Normal
• IMSI detach
• IMSI attach
• Periodic registration
Section 5 – Call Handling



                        Normal Update


• The Base Transceiver Station (BTS) of every cell continually
  transmits the Location Area Identity (LAI) on BCCH.
• If MS detects LAI is different from the one stored in the SIM-
  card, it is forced to do a location update.
• If the mobile subscriber is unknown in the MSC/VLR (new
  subscriber) then the new MSC/VLR must be updated, from the
  HLR, with subscriber information.
• It also consider the case of the location update timer runs out.
Section 5 – Call Handling
Section 5 – Call Handling




2.   The MS requests a location update to be carried out in the new
     MSC/VLR. The IMSI is used to identify the MS.
3.   In the new MSC/VLR, an analysis of the IMSI number is carried out.
     The result of this analysis is a modification of the IMSI to a Mobile
     Global Title (MGT)
4.   The new MSC/VLR requests the subscriber information for the MS
     from the HLR.
5.   The HLR stores the address of the new MSC/VLR and sends the
     subscriber data to the new MSC/VLR.
Section 5 – Call Handling




5.   The HLR also orders the old serving MSC/VLR to cancel all
     information about the subscriber since the MS is now served by
     another MSC/VLR.
2.   When the new MSC/VLR receives the information from the HLR, it
     will send a location updating confirmation message to the MS.
Section 5 – Call Handling




                           IMSI Detach

The MS must inform the network when it is entering an
inactive state (detach).
3.   At power off or when the SIM card is taken out, the MS asks
     for a signaling channel
4.   The MS uses this signaling channel to send the IMSI detach
     message to the MSC/VLR.
5.   In the VLR, an IMSI detach flag is set for the subscriber which
     is used to reject incoming calls to the MS.


The detach will not be acknowledged.
Section 5 – Call Handling


Only the VLR is updated with the “detached” information.
Section 5 – Call Handling




                        IMSI Attach

The attach procedure is performed only when the MS is turned on
     and is in the same LA as it was when it sent the detach
     message. If the MS changes location area while being
     switched off, it is forced to do a normal location update. The
     procedure is as follows


3.   The MS requesting a signaling channel.
4.   The MSC/VLR receives the IMSI attach message from the
     MS.
5.   The MSC/VLR sets the IMSI attach in the VLR, that is, the
     mobile is ready for normal call handling.
6.   The VLR returns an acknowledgment to the MS.
Section 5 – Call Handling
Section 5 – Call Handling




            Periodic Location Update

To avoid unnecessary paging of the MS in case the MSC never got
  the IMSI detach message, there is another type of location
  updating called periodic registration.


The procedure is controlled by timers both in the MS and in the
  MSC.


If the MS does not register within the determined interval plus a
    guard time, then the scanning function in the MSC detects this
    and the MS will be marked detached.
Section 5 – Call Handling




                            Paging


A call to MS is routed to the MSC/ VLR and send a paging message to
  the MS. This message is broadcast all over the Location Area (LA),
  which means that all BTSs with in the LA will send a paging message
  to the mobile. The MS, moving in the LA and listening to the CCCH
  information, will hear the paging message and answer it immediately.
Section 5 – Call Handling



                      Paging Capacity


Paging capacity is the number of
   mobiles that can be paged per
   second
This depends on:
   • CCCH configuration
   • AGCH blocks reservation
   • Type of paging message used
• Paging message takes 4 bursts
   (1 CCCH block)
• This can page up to 4 mobiles
   depending on the message type
   used
Section 5 – Call Handling



                    Paging Message Types

Type 1: can address up to two mobiles using either IMSI or      TMSI


Type 2: can address up to 3 mobiles, one by IMSI and other                2
  by TMSI.


Type 3: can address up to 4 mobiles using the TMSI only.


If the network does not use TMSI then only type 1 is used in the
    network.
Section 5 – Call Handling



             Calculation Of Paging Capacity




X = number of mobiles paged per paging message (1 to 4)
Y = number of possible paging messages per multiframe
Duration of channel multiframe = 0.235 seconds (235 ms)
• X depends on paging message type
• Y depends on CCCH configuration in the multiframe (e.g.
3 or 9) and the number of AGCH blocks reserved
Section 5 – Call Handling



                        PCH Dimensioning

Paging channel requirement in blocks per multiframe is given by:




Calls = Number of calls predicted for the location area during
busy hour
MT = Fraction of calls which are mobile terminated
PF = Paging Factor = number of pages required per call
M = safety margin
PMF = Paging Message Factor = number of pages per
message
Number of control channel multiframes per second = 4.25
Section 5 – Call Handling



                                 Example


A particular location area contains 50 000 subscribers. It is predicted that
   30% of these will receive a call during the busy hour. On average 2
   pages are needed per call and only type 3 paging messages (TMSI) are
   used.




                                  This gives the following data:
                                  Calls = 50 000
                                  MT = 0.3
                                  PF = 2
                                  PMF = 4
Section 5 – Call Handling




A typical safety margin for peak variations in number of calls is 1.2




          • 1 PCH block per multiframe will be adequate
Section 5 – Call Handling




                       Paging Control

The MSC has to initiate the paging procedure, as it holds the information
  on the last MS location update.


MSC sends a paging message to BSC and sets a timer for response from
  the MS, which is send as a part of service request message. The paging
  message from the MSC contains a cell list identifier, identifying the cells
  in which paging message is to be transmitted.
Section 5 – Call Handling




       Call From MS (Mobile to PSTN)
cb




                          PLMN
                    VLR


     Exch     MSC
     PSTN
Section 5 – Call Handling



                     Call From MS Overview


• Mobile is active and idle, wants to set up a call
• User dial the number and press send, at first moment it sends on
  RACH
• MSC/VLR assigns a dedicated channel
• If the calling MS is allowed to make a call MSC/VLR
  acknowledges the access request
• Depending on whether a fixed or a mobile subscriber is called,
  number is analyzed directly in the MSC/VLR.
• Call setup message is acknowledged as soon as the link is
  ready.
• MS is also assigned to move to a dedicated traffic channel TCH.
Section 5 – Call Handling




                  Signaling Interfaces

ISDN/      PLMN
PSTN
                                                LAPDm


                    VLR
                          BSSMAP
                                         LAPD
              MSC                  BSC

                                         DTAP
ISUP/TUP
Section 5 – Call Handling




            Point Of Interconnect (POI) Location


In case of long distance mobile to PSTN call, circuits define to route a call in the
   switch should be such that, call can travel maximum distance on the airtime
   and minimum on the land line to enhance the revenue.


Call should handover to the POI as near as possible to the subscriber location.
Section 5 – Call Handling




          Call to MS (PSTN to Mobile)


              MSISDN
                                              PSTN




                                        GSM/PLMN


Link is setup from local
exchange to the GMSC               GMSC
Section 5 – Call Handling




                                         PSTN




                                           GSM/PLMN




signaling No.7: Interrogation   GMSC
function used by GMSC
                                 MSISDN +
                                MSRN request
                                                    HLR
Section 5 – Call Handling




                                            PSTN




                                               GSM/PLMN




      VLR                            GMSC
            signaling No7: Request
            for MSRN to VLR
MSC

                                                        HLR
                      IMSI
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE
GSM ARCHITECTURE

More Related Content

What's hot (20)

Cdma
CdmaCdma
Cdma
 
Gsm signalling protocol
Gsm signalling protocolGsm signalling protocol
Gsm signalling protocol
 
Gsm interview question
Gsm interview questionGsm interview question
Gsm interview question
 
Handover
HandoverHandover
Handover
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Gsm network
Gsm networkGsm network
Gsm network
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 
GSM: Handovers
GSM: HandoversGSM: Handovers
GSM: Handovers
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Umts(3g)
Umts(3g)Umts(3g)
Umts(3g)
 
GSM Location area update
GSM Location area updateGSM Location area update
GSM Location area update
 
Summary 2G y 3G
Summary 2G y 3GSummary 2G y 3G
Summary 2G y 3G
 
GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.
 
BTS NOKIA EBENEZA.pptx
BTS NOKIA EBENEZA.pptxBTS NOKIA EBENEZA.pptx
BTS NOKIA EBENEZA.pptx
 
Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces Telebeans
 
GSM and Basics of 3G
GSM and Basics of 3GGSM and Basics of 3G
GSM and Basics of 3G
 
Satellite Link Design: Basic Transmission Theory & Noise Temperature
Satellite Link Design: Basic Transmission Theory & Noise TemperatureSatellite Link Design: Basic Transmission Theory & Noise Temperature
Satellite Link Design: Basic Transmission Theory & Noise Temperature
 

Viewers also liked

My PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkMy PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkARVIND SARDAR
 
Small scale fading
Small scale fadingSmall scale fading
Small scale fadingAJAL A J
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemMonaco Motors
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetsirojiddin
 
Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Brijesh Kaushik
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechtureHina Saxena
 
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS MYGPRSEXPRESS
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 ProtocolMiles Kevin Galario
 
Introduction To Wireless Fading Channels
Introduction To Wireless Fading ChannelsIntroduction To Wireless Fading Channels
Introduction To Wireless Fading ChannelsNitin Jain
 

Viewers also liked (18)

My PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkMy PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
 
Small scale fading
Small scale fadingSmall scale fading
Small scale fading
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication System
 
Do s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanetDo s attacks in vanet presentation in vanet
Do s attacks in vanet presentation in vanet
 
Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)Presentation on GSM(2G & GPRS)
Presentation on GSM(2G & GPRS)
 
ppt on GSM architechture
ppt on GSM architechtureppt on GSM architechture
ppt on GSM architechture
 
Mobile IP 1
Mobile IP 1Mobile IP 1
Mobile IP 1
 
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
GPRS PINOY DEALER PACKAGE PRESENTATION by GPRS GLOBAL PINOY REMITTANCE SERVIC...
 
Packet Switching and X.25 Protocol
Packet Switching and X.25 ProtocolPacket Switching and X.25 Protocol
Packet Switching and X.25 Protocol
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
VANET, Security and Trust
VANET, Security and TrustVANET, Security and Trust
VANET, Security and Trust
 
Gprs ppt
Gprs pptGprs ppt
Gprs ppt
 
Introduction To Wireless Fading Channels
Introduction To Wireless Fading ChannelsIntroduction To Wireless Fading Channels
Introduction To Wireless Fading Channels
 
GPRS
GPRSGPRS
GPRS
 
Fading Seminar
Fading SeminarFading Seminar
Fading Seminar
 
Gsm architecture
Gsm architecture Gsm architecture
Gsm architecture
 

Similar to GSM ARCHITECTURE

Base Station System
Base Station SystemBase Station System
Base Station SystemSokunth Che
 
01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamentalEricsson Saudi
 
01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamentalEricsson Saudi
 
Bhrat sanchar nigam limited Industrial Training PPT
Bhrat sanchar nigam limited Industrial Training PPTBhrat sanchar nigam limited Industrial Training PPT
Bhrat sanchar nigam limited Industrial Training PPTShivam Gupta
 
BSS training 2012 - for students
BSS training 2012 - for studentsBSS training 2012 - for students
BSS training 2012 - for studentszhiar ahmad
 
Gsm review note by zemaryali
Gsm review note by zemaryaliGsm review note by zemaryali
Gsm review note by zemaryaliZaryal Social
 
Mc7503 -mc-2marks
Mc7503 -mc-2marksMc7503 -mc-2marks
Mc7503 -mc-2marksDinesh K
 
Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2SURESHA V
 
Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANKrishna Nanda
 
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdfWireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdfDr. Shivashankar
 
gsm-archtecture.ppt mobile computing ppt
gsm-archtecture.ppt mobile computing pptgsm-archtecture.ppt mobile computing ppt
gsm-archtecture.ppt mobile computing pptkavitamittal18
 
Alcate lucent bts Installation and Commissioning
Alcate lucent bts Installation and CommissioningAlcate lucent bts Installation and Commissioning
Alcate lucent bts Installation and Commissioningengramjadislam78
 
1 bss-overview
1 bss-overview1 bss-overview
1 bss-overviewTelesom
 
Wireless module 2 notes vtu 18ec81 GSM Module
Wireless module 2 notes vtu 18ec81 GSM ModuleWireless module 2 notes vtu 18ec81 GSM Module
Wireless module 2 notes vtu 18ec81 GSM ModuleChetan Naik
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECEajitece
 
System Introduction
System IntroductionSystem Introduction
System IntroductionSokunth Che
 
Bsnl Industrial training report
Bsnl Industrial training reportBsnl Industrial training report
Bsnl Industrial training reportShivam Gupta
 

Similar to GSM ARCHITECTURE (20)

Base Station System
Base Station SystemBase Station System
Base Station System
 
01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamental
 
01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamental
 
GSM_SANAT_Ppt
GSM_SANAT_PptGSM_SANAT_Ppt
GSM_SANAT_Ppt
 
Bhrat sanchar nigam limited Industrial Training PPT
Bhrat sanchar nigam limited Industrial Training PPTBhrat sanchar nigam limited Industrial Training PPT
Bhrat sanchar nigam limited Industrial Training PPT
 
BSS training 2012 - for students
BSS training 2012 - for studentsBSS training 2012 - for students
BSS training 2012 - for students
 
Gsm review note by zemaryali
Gsm review note by zemaryaliGsm review note by zemaryali
Gsm review note by zemaryali
 
Mc7503 -mc-2marks
Mc7503 -mc-2marksMc7503 -mc-2marks
Mc7503 -mc-2marks
 
Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2Wirleless communicatrion notes for 8th sem EC -unit 2
Wirleless communicatrion notes for 8th sem EC -unit 2
 
Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LAN
 
GSM TECH.pptx
GSM TECH.pptxGSM TECH.pptx
GSM TECH.pptx
 
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdfWireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
Wireless Cellular Communication_Mudule2_Dr.Shivashankar.pdf
 
gsm-archtecture.ppt mobile computing ppt
gsm-archtecture.ppt mobile computing pptgsm-archtecture.ppt mobile computing ppt
gsm-archtecture.ppt mobile computing ppt
 
Gsm
GsmGsm
Gsm
 
Alcate lucent bts Installation and Commissioning
Alcate lucent bts Installation and CommissioningAlcate lucent bts Installation and Commissioning
Alcate lucent bts Installation and Commissioning
 
1 bss-overview
1 bss-overview1 bss-overview
1 bss-overview
 
Wireless module 2 notes vtu 18ec81 GSM Module
Wireless module 2 notes vtu 18ec81 GSM ModuleWireless module 2 notes vtu 18ec81 GSM Module
Wireless module 2 notes vtu 18ec81 GSM Module
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
System Introduction
System IntroductionSystem Introduction
System Introduction
 
Bsnl Industrial training report
Bsnl Industrial training reportBsnl Industrial training report
Bsnl Industrial training report
 

Recently uploaded

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

GSM ARCHITECTURE

  • 1. Section 1 – GSM Architecture Overview GSM Architecture Overview
  • 2. Section 1 – GSM Architecture Overview Introduction It provides an overview of the GSM network architecture. This includes a brief explanation of the different network subsystems and a description of the functionality of the elements within each of the subsystems. Topics include: • General architecture overview • The Mobile Station (MS) Subsystem and Elements • The Base Station Subsystem (BSS) and Elements • The Network Subsystem (NSS) and Elements • Introduction to network interfaces
  • 3. Section 1 – GSM Architecture Overview
  • 4. Section 1 – GSM Architecture Overview A GSM network is made up of three subsystems: • The Mobile Station (MS) • The Base Station Sub-system (BSS) – comprising a BSC and several BTSs • The Network and Switching Sub-system (NSS) – comprising an MSC and associated registers The interfaces defined between each of these sub systems include: • 'A' interface between NSS and BSS • 'Abis' interface between BSC and BTS (within the BSS) • 'Um' air interface between the BSS and the MS
  • 5. Section 1 – GSM Architecture Overview Abbreviations: MSC – Mobile Switching Center BSS – Base Station Sub-system BSC – Base Station Controller HLR – Home Location Register BTS – Base Transceiver Station VLR – Visitor Location Register TRX – Transceiver AuC – Authentication Center MS – Mobile Station EIR – Equipment Identity Register OMC – Operations and Maintenance Center PSTN – Public Switched Telephone Network
  • 6. Section 1 – GSM Architecture Overview Mobile Station The Mobile Station (MS) consists of the physical equipment used by a PLMN subscriber to connect to the network. It comprises the Mobile Equipment (ME) and the Subscriber Identity Module (SIM). The ME forms part of the Mobile Termination (MT) which, depending on the application and services, may also include various types of Terminal Equipment (TE) and associated Terminal Adapter (TA).
  • 7. Section 1 – GSM Architecture Overview
  • 8. Section 1 – GSM Architecture Overview • The IMSI identifies the subscriber within the GSM network while the MS ISDN is the actual telephone number a caller (possibly in another network) uses to reach that person. • Security is provided by the use of an authentication key and by the transmission of a temporary subscriber identity (TMSI) across the radio interface where possible to avoid using the permanent IMSI identity. • The IMEI may be used to block certain types of equipment from accessing the network if they are unsuitable and also to check for stolen equipment.
  • 9. Section 1 – GSM Architecture Overview MS and SIM
  • 10. Section 1 – GSM Architecture Overview The mobile station consists of : • mobile equipment (ME) • subscriber identity module (SIM) The SIM stores permanent and temporary data about the mobile, the subscriber and the network, including : • The International Mobile Subscribers Identity (IMSI) • MS ISDN number of subscriber • Authentication key (Ki) and algorithms for authentication check The mobile equipment has a unique International Mobile Equipment Identity (IMEI), which is used by the EIR
  • 11. Section 1 – GSM Architecture Overview Base Station Subsystem (BSS)
  • 12. Section 1 – GSM Architecture Overview The BSS comprises: • Base Station Controller (BSC) • One or more Base Transceiver Stations (BTSs) The purpose of the BTS is to: • provide radio access to the mobile stations • manage the radio access aspects of the system BTS contains: • Radio Transmitter/Receiver (TRX) • Signal processing and control equipment • Antennas and feeder cables
  • 13. Section 1 – GSM Architecture Overview The BSC: • allocates a channel for the duration of a call • maintains the call: monitors quality controls the power transmitted by the BTS or MS generates a handover to another cell when required
  • 14. Section 1 – GSM Architecture Overview Network Switching System (NSS) The NSS combines the call routing switches (MSCs and GMSC) with database registers required to keep track of subscribers’ movements and use of the system. Call routing between MSCs is taken via existing PSTN or ISDN networks. Signaling between the registers uses Signaling System No. 7 protocol.
  • 15. Section 1 – GSM Architecture Overview Functions of the MSC: • Switching calls, controlling calls and logging calls • Interface with PSTN, ISDN, PSPDN • Mobility management over the radio network and other networks • Radio Resource management - handovers between BSCs • Billing Information
  • 16. Section 1 – GSM Architecture Overview Interfaces Um VLR Abis A BSC MSC ISDN, TUP
  • 17. Section 1 – GSM Architecture Overview Exercise Q1. Name the interfaces used between Mobile and BTS BTS and BSC BSC and MSC
  • 18. Section 2 – Access Network Access Network
  • 19. Section 2 – Access Network Objective The Trainee will be able to understand: • Different BTS configuration commonly used in the network • Advantages of the configuration and optimal use of the trunks • Abis mapping
  • 20. Section 2 – Access Network Introduction Access network is a connection between MS and NSS, comprise of BTSs & BSCs. It is responsible for radio management. BSC looks towards MSC through single A-interface as being the entity responsible for communicating with Mobile Stations in a certain area. The radio equipment of a BSS may support one or more cells. A BSS may consist of one or more base stations, where an A-bis- interface is implemented.
  • 21. Section 2 – Access Network BSS Configuration • Collocated BTS • Remote BTS • Daisy Chain BTS • Star Configuration • Loop Configuration
  • 22. Section 2 – Access Network Collocated BTS: BTS is situated along with BSC or the MSC and no additional E1 link is required. BTS BSC
  • 23. Section 2 – Access Network Remote BTS : BTS is situated in a stand alone position and additional E1 links are required to connect to BSC. BSC BTS
  • 24. Section 2 – Access Network Daisy Chain BTS 3 BTS 1 BTS 4 BSC BTS 2 MSC
  • 25. Section 2 – Access Network Star Configuration BTS 3 BTS 1 BSC BTS 4 BTS 2 MSC
  • 26. Section 2 – Access Network Loop Configuration BTS 3 BTS 1 BTS 4 BSC BTS 2 MSC
  • 27. Section 2 – Access Network Comparison of Different Configurations • Daisy Chain: Easy to implement, effective utilization of transmission links but if one of the link fails, all the BTSs connected in the chain will went off. • Star Configuration: Easy to implement but poor utilization of links. Each BTS require one E1 to connect to BSC. But if link goes down only individual BTS will be affected. • Loop Configuration: Slightly difficult to implement but effective utilization of E1 links. Even if one link goes off BTS will continue to communicate with the network from the other side.
  • 28. Section 2 – Access Network BSS Interfaces • Air Interface: Radio Interface between the BTS and Mobile the supports frequency hopping and diversity. • A Interface: Interface carried by a 2-Mb link between NSS and BSS. At this interface level, transcoding takes place. • OMC Interface: X25 Link.
  • 29. Section 2 – Access Network
  • 30. Section 2 – Access Network Abis Interface (BTS - BSC) If the BTS and BSC are not combined, A-bis interface will be used. Otherwise, BS interface will be used. Several frame unit channels are multiplexed on the same PCM support and BSC and BTS can be remote from each other. Its main functions are: • Conversion of 260 – bit encoded blocks (corresponding to 160x8 – bit samples for 20ms) • Encoded block synchronization • Vocal activity detection • Alarm dispatch to BSC via PCM • Test loop back operation
  • 31. Section 2 – Access Network TRX 1 TRX 2
  • 32. Section 2 – Access Network Exercise Q1. In How many ways BTSs can be connected and which configuration gives the optimal solution? Q2. What is a difference between BS interface and Abis interface? Q3. How many time slots are occupied by 1TRX on a PCM frame?
  • 33. Section 3 – NSS Topology NSS Topology
  • 34. Section 3 – NSS Topology Objective The Trainee will be able to understand: • Terminology used in Network Sub System • Protocols and Interfaces inside NSS • Call routing and circuit groups • Switching modules • Stand alone and integrated HLR • Echo canceller and TRAU location • Authentication, Ciphering, OMC, Billing center • Transit Switch
  • 35. Section 3 – NSS Topology Introduction Network Sub System can be considered as a heart of the GSM Network. All the major activities like switching of calls, routing, security functions, call handling, charging, operation & maintenance, handover decisions, takes place within the entities of NSS. Various kinds of interfaces are used to communicate between the different entities. Different methods are used to optimize and provide the quality network with the minimum operating cost.
  • 36. Section 3 – NSS Topology Network Switching System (NSS) Key elements of the NSS: • Mobile Switching Center (MSC) • Visitor Location Register (VLR) • Home Location Register (HLR) • Authentication Center (AuC) • Equipment Identity Register (EIR) • Gateway MSC (GMSC) These elements are interconnected by means of an SS7 network
  • 37. Section 3 – NSS Topology NSS Identifier IMEI – International Mobile Equipment Identifier. The IMEI is an internationally-unique serial number allocated to the MS hardware at the time of manufacture. It is registered by the network operator and (optionally) stored in the AuC for validation purposes. IMEI = TAC + FAC + SNR +sp TAC = Type Approval Code by central GSM body FAC = Final Assembly Code, identifies the manufacturer SNR = Serial Number, unique six digit number sp = spare for future use
  • 38. Section 3 – NSS Topology IMSI – International Mobile Subscriber Identifier When a subscriber registers with a network operator, a unique subscriber IMSI identifier is issued and stored in the SIM of the MS as well as in the HLR . An MS can only function fully if it is operated with a valid SIM inserted into an MS with a valid IMEI. IMSI consist of three parts: IMSI = MCC + MNC + MSIN MCC = Mobile Country Code MNC = Mobile Network Code MSIN = Mobile Station Identification Number
  • 39. Section 3 – NSS Topology TMSI –Temporary Mobile Subscriber Identity A TMSI is used to protect the true identity (IMSI) of a subscriber. It is issued by and stored within a VLR (not in the HLR) when an IMSI attach takes place or a Location Area (LA) update takes place. At the MS it is stored in the MS’s SIM. The issued TMSI only has validity within a specific LA. Since TMSI has local significance, the structure may be chosen by the administration. It should not be more than four octets.
  • 40. Section 3 – NSS Topology MSISDN – Mobile Station ISDN Number The MSISDN represents the ‘true’ or ‘dialled’ number associated with the subscriber. It is assigned to the subscriber by the network operator at registration and is stored in the SIM. According to the CCITT recommendations, it is composed in the following way: MSISDN = CC + NDC + SN CC = Country Code NDC = National Destination Code SN = Subscriber Number
  • 41. Section 3 – NSS Topology MSRN – Mobile Station Roaming Number The MSRN is a temporary, location-dependant ISDN number issued by the parent VLR to all MSs within its area of responsibility. It is stored in the VLR and associated HLR but not in the MS. The MSRN is used by the VLR associated MSC for call routing within the MSC/VLR service area.
  • 42. Section 3 – NSS Topology LAI – Location Area Identity Each Location Area within the PLMN has an associated internationally unique identifier (LAI). The LAI is broadcast regularly by BTSs on the Broadcast Control channel (BCCH), thus uniquely identifying each cell with an associated LA. LAI = MCC + MNC + LAC MCC = Mobile Country Code, same as in IMSI MNC = Mobile Network Code, same as in IMSI LAC = Location Area Code, identifies a location area within a GSM PLMN network. Maximum length of LAC is 16 bits.
  • 43. Section 3 – NSS Topology Mobile Switching Center (MSC) The Mobile services Switching Center (MSC) performs the telephony switching functions of the system. It also controls calls to and from other telephony and data systems, such as the Public Switched Telephone Network (PSTN) and Public Land Mobile Network (PLMN). Difference between a MSC and an exchange in a fixed network is - MSC has to take into account the impact of the allocation of radio resources and the mobile nature of the subscribers and has to perform in addition, at least the following procedures:
  • 44. Section 3 – NSS Topology • required for location registration • procedures required for handover An MSC can be connected to only one VLR. Therefore, all mobile stations that move around under base stations connected to the MSC are always managed by the same VLR. An MSC would communicate typically with one EIR. While it is possible for an MSC to communicate to multiple EIRs, this is highly unlikely since the EIR provides a centralized and geographic independent function.
  • 45. Section 3 – NSS Topology The MSC consults an HLR to determine how a call should be routed to a given mobile station: • For incoming calls to a mobile station, the MSC would typically consult one HLR. • For mobile-to-mobile calls in larger networks, a MSC could consult HLRs of other systems to help minimize the trunk paths to the other mobile station. A given MSC can be interconnected to other MSCs to support inter-MSC handovers
  • 46. Section 3 – NSS Topology The following are typical MSC functions in a cellular system: • Provide switched connections with PSTN • Provide switched connections between mobile subscribers • Provide coordination over signaling with mobiles • Coordinate the location and handover process • Provide custom services to mobile users • Collect billing data
  • 47. Section 3 – NSS Topology Protocols MSC/BSC MSC/HLR OMC/MSC MSC/Fixed Network MSC/VLR OMC/HLR MSC/EIR OMC/VLR MSC/Voice messaging MSC/GMSC OMC/BSS VLR/VLR VLR/HLR MSC/MSC BSSMAP TCAP+MAP X.225 R2, ISUP other Signaling SCCP SCCP X.224 MTP MTP X.25 MTP SS7 SS7
  • 48. Section 3 – NSS Topology Switching In MSC Signaling network is separated from the speech network and consists of • signaling Links (SL) • signaling Point (SP) • signaling Transfer Part (STP).
  • 49. Section 3 – NSS Topology Telephony system contains: • Group Switch to switch the calls, • ST to perform signaling in accordance with SS7 • Trunk interfaces for interfacing the PCM. Group switch provides a semi permanent connection between time slot (PCM) and ST.
  • 50. Section 3 – NSS Topology Signaling Point (SP) SP provides the functions of signaling and transmit and receive messages to and from different nodes. Each SP in the network will have an identification code termed as signaling Point Code (SPC).
  • 51. Section 3 – NSS Topology Signaling Transfer Point (STP) Signaling Transfer Part is signaling point that only transfers messages from one signaling point (SP) to another. STP SP SP (SPC) STP (SPC)
  • 52. Section 3 – NSS Topology Signaling Link (SL) Signaling Link is the 64kbps link interconnecting two signaling Points and provides the functions of message error control and message sequencing. Each signaling Link has an SLC (signaling Link Code), which identifies the signaling Link with in the signaling Link Set.
  • 53. Section 3 – NSS Topology Service Switching Point (SSP) The MSC contains: • The Service Switching Point • One or more radio control point SSP handles the usual switching function and can be connected via 2Mbps PCM link with: • Other exchanges of fixed PSTN or mobile PLMN, • Points on the SS7 signaling network, • X.25 network Continued…..
  • 54. Section 3 – NSS Topology • The OA&M network, • The Intelligent network, • PSTN via user data channels and signaling channels using ISUP and R2 protocols, • Other elements of the GSM
  • 55. Section 3 – NSS Topology Switching Function of SSP: • Main control, • Switching matrix, • PCM multiplex connection, • Service circuits • Operation and maintenance • Establishing and releasing section of the links from and to mobiles, • Finding circuits to the BSS; special circuit groups are created. SSP selects an incoming and outgoing circuit.
  • 56. Section 3 – NSS Topology Call Routing • If a number received is a national or international number, the address information is passed to the SSP. • If the number received is an HPLMN (Home PLMN), the RCP asks the HLR for a roaming number (MSRN). This MSRN is passed to the SSP for routing. • If the number received is an emergency service number, the originating geographic area is attached to it and the combined information passed to the SSP. Continued…..
  • 57. Section 3 – NSS Topology In the SSP the number received from RCP follow the standard translation process: • Preliminary analysis: Selection of a translator (national, international), • Translation: Determination of a routing depend on the first digits dialled, • Routing: Determination of an outing circuit group.
  • 58. Section 3 – NSS Topology Circuit Groups Call routes from the MSC through circuit groups. Different circuit groups are created inside it: • Group for the PSTN (according to the exchange) • Group for the BSCs • Group for the Supplementary services • Group for the IWF
  • 59. Section 3 – NSS Topology CG1 BSC1 CG2 BSC2 CGn BSCn MSC CGa PSTN1 CGx PSTNx CG Supplementary Services CG IWF
  • 60. Section 3 – NSS Topology Interfaces
  • 61. Section 3 – NSS Topology A-Interface (MSC – BSC) The interface between the MSC and its BSS is specified in the 08-series of GSM Technical Specifications. The BSS-MSC interface is used to carry information concerning: • BSS management; • call handling; • mobility management.
  • 62. Section 3 – NSS Topology B-Interface (MSC – VLR) The VLR is the location and management data base for the mobile subscribers roaming in the area controlled by the associated MSC(s). Whenever the MSC needs data related to a given mobile station currently located in its area, it interrogates the VLR. When a mobile station initiates a location updating procedure with an MSC, the MSC informs its VLR which stores the relevant information. This procedure occurs whenever an MS roams to another location area. Also, when a subscriber activates a specific supplementary service or modifies some data attached to a service, the MSC informs (via the VLR) the HLR which stores these modifications and updates the VLR if required.
  • 63. Section 3 – NSS Topology C-Interface (HLR - MSC) The Gateway MSC must interrogate the HLR of the required subscriber to obtain routing information for a call or a short message directed to that subscriber.
  • 64. Section 3 – NSS Topology D-Interface (HLR - VLR) This interface is used to exchange the data related to the location of the mobile station and to the management of the subscriber. The main service provided to the mobile subscriber is the capability to set up or to receive calls within the whole service area. To support this, the location registers have to exchange data. The VLR informs the HLR of the location of a mobile station managed by the latter and provides it (either at location updating or at call set-up) with the roaming number of that station. The HLR sends to the VLR all the data needed to support the service to the mobile subscriber. The HLR then instructs the previous VLR to cancel the location registration of this subscriber. Exchanges of data may occur when the mobile subscriber requires a particular service, when he wants to change some data attached to his subscription or when some parameters of the subscription are modified by administrative means
  • 65. Section 3 – NSS Topology E-Interface (MSC - MSC) When a mobile station moves from one MSC area to another during a call, a handover procedure has to be performed in order to continue the communication. For that purpose the MSCs have to exchange data to initiate and then to realize the operation. After the handover operation has been completed, the MSCs will exchange information to transfer A-interface signaling as necessary. When a short message is to be transferred between a Mobile Station and Short Message Service Centre (SC), in either direction, this interface is used to transfer the message between the MSC serving the Mobile Station and the MSC which acts as the interface to the SC.
  • 66. Section 3 – NSS Topology F-Interface (MSC - EIR) This interface is used between MSC and EIR to exchange data, in order that the EIR can verify the status of the IMEI retrieved from the Mobile Station.
  • 67. Section 3 – NSS Topology G-Interface (VLR - VLR) When a mobile subscriber moves from a VLR area to another Location Registration procedure will happen. This procedure may include the retrieval of the IMSI and authentication parameters from the old VLR.
  • 68. Section 3 – NSS Topology H-Interface (HLR - AUC) When an HLR receives a request for authentication and ciphering data for a Mobile Subscriber and it does not hold the requested data, the HLR requests the data from the AuC. The protocol used to transfer the data over this interface is not standardized.
  • 69. Section 3 – NSS Topology Switch Modules Switch has three major types of equipment modules: • Switching module (SM) • Communication module (CM) • Administrative module (AM)
  • 70. Section 3 – NSS Topology Switching Module (SM): All external lines, trunks, and special services circuits are terminated at the switching module. The analog and digital signals are converted to the digital format used inside the switch. The SM performs almost 95% of the call processing and maintenance functions including: • Line and trunk scanning • Tone generation • Announcements • Call progress supervision • Routine maintenance and self-maintenance.
  • 71. Section 3 – NSS Topology The SM also provides subscriber calling features including: — call waiting — abbreviated dialing — call diversion — conference calls. SM further has two components: 9. Control units - Control all activities within the SM, such as call processing and maintenance functions. 2. Peripheral units - Perform testing functions and provide customers and other exchanges access to the switch.
  • 72. Section 3 – NSS Topology Communication Module (CM): The CM serves as the hub (focal point) for all inter module communication in a switch. The CM has four main functions: 4. Call switching - The CM interconnects the paths between modules to complete telephone calls and to relay data. 2. Message switching - The CM provides paths to send information between processors to process calls, maintain records, and perform system tasks. Continued…..
  • 73. Section 3 – NSS Topology 3. Network timing - The CM provides accurate timing and synchronization for the switch. 4. Fast pump - The CM provides resources to quickly download (pump) an SM’s software if needed.
  • 74. Section 3 – NSS Topology Administrative Module (AM): The AM controls the CM and communicates with all the SMs (through the CM). The AM monitors itself and the CM for malfunctions. If there are any problems, they are reported to maintenance personnel. The AM performs resource allocation and processing functions that are done more efficiently on a centralized basis such as: • Call routing for inter module and intra module calls • Administrative data processing/billing data Continued…..
  • 75. Section 3 – NSS Topology • Traffic measurement reports/system performance reports • Memory management • System maintenance • Maintaining file records of changes to the system Software Release. • Personnel interface/system monitoring • Allocating trunks for call processing.
  • 76. Section 3 – NSS Topology Switch SM AM CM Control Peripheral MSGS TMS Unit Unit Control I/O Disk Tape MCC Unit Processor Unit Unit
  • 77. Section 3 – NSS Topology Home Location Register HLR is a database that stores subscription and set of functions needed to manage subscriber data in one PLMN area. Any administrative action by the service provider or changes made by subscriber is first carried out on the HLR and then update the VLR. Following are the subscriber data which frequently changes: - Identification number MSISDN & IMSI - Service restriction - Teleservices - Bearer services - Supplementary services
  • 78. Section 3 – NSS Topology Beside the permanent data it also include dynamic data of home subscriber including VLR address, call forward number and call barring numbers. Triplets are also stored in the HLR for the authentication purpose. The HLR communicates with other nodes: VLR, AUC, GMSC & SMS – SC via MAP (Mobile Access Protocol). To support this communication HLR needs MTP and SCCP
  • 79. Section 3 – NSS Topology
  • 80. Section 3 – NSS Topology MAP (Mobile Application Protocol) The only way via which HLR communicates with other GSM nodes is Mobile Access Protocol. Number of functional blocks exist to support different MAP operations eg HLCAP is used for location cancellation or HLUAP is required for location updating. Other functions defined on the MAP are: - Inter MSC Handover and subsequent handover - Update HLR and VLR - Fault Recovery - Management and handling of supplementary services. Continued…..
  • 81. Section 3 – NSS Topology - Support of Short Message Services. - Call establishment / delivery - Security related data. - Retrieval of subscriber data during call setup. HLR also needs to communicate with GMSC, VLR, AUC and SMS-SC, for which MTP and SCCP is essential.
  • 82. Section 3 – NSS Topology SCCP (Signaling Connection Control Point) All MAP messaging use SCCP to analyze the GT (Global Title) of incoming information. If GT belongs to anther node, then SCCP will use the services of MTP (Message Transfer Part) to reroute the message. SCCP must have the GT analysis to terminate and route MAP messages from all nodes it communicates with. To find out the DPC, SCCP looks in a routing case translation table. The information about the DPC is then sent to MTP which sends the message to the appropriate SP.
  • 83. Section 3 – NSS Topology MTP (Message Transfer Part) MTP must be defined to allow the nodes to communicate with each other. The MTP provides the means for reliable transport and delivery of UP (User Part) information across the No. 7 network eg ISDN User part (ISUP), the Telephone User Part (TUP), Signaling Connection Control Part (SCCP), Interworking function User Part (IWUP) and Data User Part (DUP) Continued…..
  • 84. Section 3 – NSS Topology MTP has the ability to react to system and network failure that affect the user information. MTP further has three functional levels: 4. MTP Level 1 – Signaling data link 5. MTP Level 2 – Signaling link 6. MTP Level 3 – Signaling network
  • 85. Section 3 – NSS Topology HLR connects with MSC via C interface, VLR via D interface
  • 86. Section 3 – NSS Topology HLR can be configured in two ways: 2. Integrated with MSC
  • 87. Section 3 – NSS Topology • Hs • Stand Alone HLR (External Database)
  • 88. Section 3 – NSS Topology Integrated Vs Stand Alone HLR The Integrated HLR is accessed by other MSC’s/ VLR’s via MAP, and the switch can use MAP to query other off switch HLRs. The main advantages with an integrated HLR solution at this early stage are: • Efficient use of HW and lower HW investments • Fewer physical connections required due to fewer physical nodes • Less capacity required in No. 7 network as major part of HLR signaling is internal within MSC/VLR/HLR
  • 89. Section 3 – NSS Topology • A single fault will affect a smaller number of subscribers than if standalone HLR is used Major drawbacks are: • Less processing capacity available for MSC/VLR. Additional Switching capacity will be required earlier • Migration to standalone HLR (which is to be preferred in a mature larger network) will induce major changes in the network • Administration of subscriptions • Operation and maintenance for HLR geographically distributed
  • 90. Section 3 – NSS Topology In Stand Alone HLR, call processing activities are not performed by the switch. Only HLR queries are handled via the GSM standard MAP messages coming over signaling links from other Mobile Switching Centers (MSCs) in the wireless network.
  • 91. Section 3 – NSS Topology Benefits: • All HLR data is centralized, thus simplifying its ongoing maintenance and operation • High HLR Capacity • High processing capacity • On going enhancement There are some drawbacks with standalone HLR • A fault in a HLR will affect many subscribers • A fault in a HLR will increase the signaling substantially in the whole signaling network
  • 92. Section 3 – NSS Topology HLR is responsible for: • Connection of mobile subscribers and definition of corresponding subscriber data. • Subscription to basic services. • Registration/deletion of supplementary services. • Activation/deactivation of supplementary services. • Interrogation of supplementary services status. Continued…..
  • 93. Section 3 – NSS Topology • Functions for analysis of mobile subscriber numbers (MSISDN, IMSI, additional MSISDN) and other types of addresses. • Statistical functions for collecting data regarding the performance of the system. • Functions for communication with GMSC and VLR using the No. 7 signaling system and MAP • Handling of authentication and ciphering data for mobile subscribers including communication with an authentication center. Continue…..
  • 94. Section 3 – NSS Topology • Get Password/Register Password • Alert Service Center • Provide Roaming Number • Send Routing Information for SMS • Send Routing Information for GMSC • Set Message Waiting Data
  • 95. Section 3 – NSS Topology Visitor Location Register It is a subscriber database containing the information about all the MS currently located in the MSC service area. VLR can be considered as a distributed HLR in the case of a roaming subscriber. If MS moves into a new service area (MSC), VLR requests the HLR to provide the relevant data and store it, for making the calls for that MS. VLR is always integrated with MSC to avoid the signaling load on the system. It can also be viewed as a subset of a HLR.
  • 96. Section 3 – NSS Topology VLR connects with MSC via B interface, HLR via D interface and with another VLR via G interface. G
  • 97. Section 3 – NSS Topology VLR is responsible for • Setting up and controlling calls along with supplementary services. • Continuity of speech (Handover) • Location updating and registration • Updating the mobile subscriber data. • Maintain the security of the subscriber by allocating TMSI Continued…..
  • 98. Section 3 – NSS Topology • Receiving and delivering short messages • Handling signaling to and from - BSC and MSs using BSSMAP - other networks eg PSTN, ISDN using TUP • IMEI check • Retrieve data from HLR like authentication data, IMSI, ciphering key Continued…..
  • 99. Section 3 – NSS Topology • Retrieve information for incoming calls. • Retrieve information for outgoing calls. •Attach/Detach IMSI • Search for mobile subscriber, paging and complete the call.
  • 100. Section 3 – NSS Topology Security Feature Both the users and the network operator must be protected against undesirable intrusion of third party. As a consequence, a security feature is implemented in the telecommunication services. The following parts of the system have been reinforced and provide the various security features: 2. Access to the network authentication 3. Radio part ciphering 4. Mobile equipment equipment identification 5. IMSI temporary identity
  • 101. Section 3 – NSS Topology Authentication Center (AUC) AUC is always integrated with HLR for the purpose of the authentication. At subscription time, the Subscriber Authentication Key (Ki) is allocated to the subscriber, together with the IMSI. The Ki is stored in the AUC and used to provide the triplets, same Ki is also stored in the SIM. AUC stores the following information for each subscriber 4. The IMSI number, 5. The individual authentication key Ki, 6. A version of A3 and A8 algorithm. Continued…..
  • 102. Section 3 – NSS Topology Authentication is required at each registration, at each call setup attempt (mobile originated or terminated), at the time of location updating, before supplementary service activation, de- activation , registration. HLR uses the IMSI to communicate with AUC, triplets are requested in sets of five. Continued…..
  • 103. Section 3 – NSS Topology In AUC following steps are used to produce one triplet: 4. A non- predictable random number, RAND, is produced 5. RAND & Ki are used to calculate the Signed Response (SRES) and the Ciphering Key (Kc) 6. RAND, SRES and Kc are delivered together to HLR as one triplet. HLR delivers these triplets to MSC/VLR on request in such a way that VLR always has at least one triplet.
  • 104. Section 3 – NSS Topology Authentication Procedure: The MSC/VLR transmits the RAND (128 bits) to the mobile. The MS computes the SRES (32 bits) using RAND, subscriber authentication key Ki (128 bits) and algorithm A3. MS sends back this SERS to AUC and is tested for validity.
  • 105. Section 3 – NSS Topology SIM Card RAND A4 IMSI Ki SERS A4 =? A3 IMSI RAND Ki A8 Ki Kc Triplets A3 A8 Triplets Kc A2 Generation Ciphering Ciphering RAND Function Function SERS A5 A5 Kc MS BTS MSC/VLR HLR AUC OMC
  • 106. Section 3 – NSS Topology Ciphering The user data and signaling data passes over the radio interface are ciphered to prevent intrusion. The ciphered key (Kc) previously computed by the AUC is sent from the VLR to the BSS after the mobile has been authenticated. The Kc is also computed in the MS and in the way both ends of the radio link (MS and BSS) possess the same key.
  • 107. Section 3 – NSS Topology Procedure: For the authentication procedure, when SRES is being calculated, the Ciphering Key (Kc), is calculating too, using the algorithm A8. The Kc is used by the MS and the BTS in order to cipher and decipher the bit stream that is sent on the radio path.
  • 108. Section 3 – NSS Topology SIM AUC Choice of random no RAND (128 bits) Ki RAND Ki A3 A3 A3 A3 SERS SERS =? A8 OK A8 A8 A8 Ciphering Command Kc (64 Kc Speech, data,sig Speech, data,sig bits) Ciphered Data A5 A5 Ciphering/Deciphering
  • 109. Section 3 – NSS Topology Subscriber Confidentiality The subscriber identity (IMSI), since is considered sensitive information, is not normally transmitted on the radio channel. A local, temporary identity is used for all interchanges. The identity (TMSI) is assigned after each change of authenticated location. For other cases: • Call set-up • Use of supplementary services • Use of SMS Continued…..
  • 110. Section 3 – NSS Topology A TMSI is allocated when the one supplied by the MS is considered out of date or when the MS does not provide the TMSI. Transmission of the TMSI over the traffic channel is ciphered.
  • 111. Section 3 – NSS Topology Equipment Identification Register (EIR) Purpose of this feature is to make sure that no stolen or unauthorized mobile equipment is used in the network. EIR is a database that stores a unique International Mobile Equipment Identity (IMEI) number for each item of mobile equipment.
  • 112. Section 3 – NSS Topology Procedure: • The MSC/VLR requests the IMEI from the MS and sends it to a EIR. • On request of IMEI, the EIR makes use of three possible defined lists: - A white list: containing all number of all equipment identities that have been allocated in the different participating countries. - A black list: containing all equipment identities that are considered to be barred. - A grey list: containing (operator’s decision) faulty or non- approved mobile equipment. • Result is sent to MSC/VLR and influences the decision about access to the system.
  • 113. Section 3 – NSS Topology EIR MSC/VLR MS Storage of all number Storage of the series mobile equipment equipment that have been allocated identity IMEI in the different GSM -countries Call Setup Storage of all grey/black – listed mobile equipment IMEI Request Sends IMEI Check IMEI Continues/Stops call setup Access/ barring info procedure
  • 114. Section 3 – NSS Topology Echo Canceller In order to eliminate echo effects (noticeable by the mobile subscribers while in conversation with PSTN subscribers) caused by the time delay due to coding and decoding of signal processing, group of echo cancellers are installed even for local calls. This is rarely a problem when communicating between two MSs. However, when connecting to a PSTN telephone, the signal must pass through a 4-wire to 2-wire hybrid transformer. Continued…..
  • 115. Section 3 – NSS Topology The function of this transformer is - some of the energy at the 4- wire receive side from the mobile is coupled back to the 4-wire transmit side and thus speech is retransmitted back to the mobile. As a result, all calls on to the PSTN must pass through an echo canceller to remove what would otherwise be a noticeable and annoying echo. Continued…..
  • 116. Section 3 – NSS Topology The process of canceling echo involves two steps: • First, as the call is set up, the echo canceller employs a digital adaptive filter to set up a model or characterization of the voice signal and echo passing through the echo canceller. As a voice path passes back through the cancellation system, the echo canceller compares the signal and the model to dynamically cancel existing echo. It removes more than 80 to 90 percent of the echo across the network. • The second process utilizes a non-linear processor (NLP) to eliminate the remaining residual echo by attenuating the signal below the noise floor.
  • 117. Section 3 – NSS Topology Transcoder and Rate Adaptor Unit (TRAU) The primary function of the TRAU is to convert 16kps (inc signaling) GSM speech channels to 64kbps PCM channels in the uplink direction and the reverse in the downlink direction. The reason this process is necessary is because MSCs only switch at the 64kbps channel level.
  • 118. Section 3 – NSS Topology TRAU Locations TRAU can be physically located in the BTS, BSC or MSC and hence leads to a variety of installation configurations.
  • 119. Section 3 – NSS Topology Advantages of Different Configurations Case 1, TRAU at BTS: If the TRAU is installed at the BTS, each 16kbps GSM channel would need to be mapped to its own 64kbps PCM channel. This results in 75% of the transmission bandwidth being wasted across both the Abis (BTS-BSC) and A (BSC-MSC) interface. Case 2, TRAU at BSC: If the TRAU is installed at the BSC, 16kbps GSM channel mapped to 64kbps at the A (BSC-MSC) interface, which increases the requirement of the Transmission trunks.
  • 120. Section 3 – NSS Topology Case 3, TRAU at MSC: If the TRAU is placed at the MSC, as is generally the case in current networks, a multiplexer can be placed at the BTS which enables 4 x 16kbps GSM channels to be multiplexed onto one 64kbps PCM channel, using 4 x 16kbps ISDN D-channels. In this configuration, only at arrival at the MSC is the 16-64kbps channel conversion necessary, thereby maximizing the efficient usage of the transmission medium by increasing the GSM channel throughput per PCM 2048 bearer from 30 to 120 channels.
  • 121. Section 3 – NSS Topology Operation And Maintenance Center (OMC) The OMC centralizes all operations and maintenance activities for the MSCs and BSSs using remote software control. It provides remote testing, operations, and maintenance capabilities for the entire system from one central location. Each BSS, MSC, HLR, VLR, EIR, and AUC can be monitored and controlled from the OMC.
  • 122. Section 3 – NSS Topology OMC Functional Architecture Event/ Alarm Management Security Management MMI Operating Database Fault System Configuration Management Management Communications Handler Performance Management
  • 123. Section 3 – NSS Topology The OMC supports the following network management functions: • Event Management - General functions of the OMC include operator input and output messages, application input commands, and application output reports. • Fault Management - The OMC provides fault management such as diagnostics and alarms for the MSC and BSS. It provides the means to isolate and minimize the effects of faults in the network thereby enabling the network to operate in efficient manner. Continued…..
  • 124. Section 3 – NSS Topology • Security Management – It provides an extensive range of features to ensure that access to the OMC functions is restricted to relevant personnel. The security features are as follows:  Password Authentication of OMC operator  Logging of OMC access attempt  Configurable user access restrictions  Automatic logoff
  • 125. Section 3 – NSS Topology • Configuration Management - Configuration management for the BSS consists of generic download, non-volatile memory download, database administration, and translations download. For the MSC, software release updates, database administration (route analysis, IMSI analysis table), and subscriber administration (connect/disconnect) are supported. • Performance Management - Performance management supports data collection (such as traffic data, handovers, statistics, plant measurements, and volume data) and basic reporting.
  • 126. Section 3 – NSS Topology Billing Center Charging analysis is the process of analysing the Charging Case and then ultimately generating the TT (Toll Ticketing) record so that an itemised bill can be produced and then sent on to the customer. The tariff structure consists of two parts: • The network access component • The network utilization component
  • 127. Section 3 – NSS Topology The network utilization component is registered on a per call basis. Charging starts at the moment the subscriber answers, or on connection to an answering machine internally in the network. The main elements are: • Use of GSM PLMNs • Use of national / international PSTNs • Use of connection between different networks • Use of the signaling system no.7
  • 128. Section 3 – NSS Topology Depending on the type of call, one or more call tickets can be generated: • Outgoing call to fixed network: a call tickets is generated by the originating MSC. • Incoming call from the fixed network: two call tickets are created: one in the GMSC and another in the destination MSC. If a call forwarding supplementary service is in operation, other call tickets are generated in the MSC and the GMSC. Continued…..
  • 129. Section 3 – NSS Topology • Outgoing call from a mobile subscriber to another mobile subscriber belonging to same PLMN: three call tickets are created: one in the originating MSC, one in the GMSC (which is in this case is the originating MSC) and another in the destination MSC. Call tickets mainly register the following information: 4. IMSI 5. Identity (MSISDN) and type (MSC or GMSC) 6. Mobile subscriber location identity
  • 130. Section 3 – NSS Topology 1. Other party’s identity 2. Call type (incoming, outgoing, forwarded etc) 3. Call status 4. Teleservices and bearer service 5. Date and time 6. Call duration
  • 131. Section 3 – NSS Topology Call Detail Record (CDRs) • Each call within the PLMN creates one or more call records • These records is generated by the MSC/GMSC originating the call • The records are known as a ‘Call Detail Records’ (CDRs) • CDRs contain the following information: - Subscriber Identity - Number called - Call Length - Route of call • Often referred to as ‘Toll Tickets’
  • 132. Section 3 – NSS Topology Call Charge Procedure • Network supplies originating MS with CAI details • MS calculates AOC record using CAI details • This record acts as a ‘toll ticket’ which tracks the call on its route through various networks • Each call component can generate a separate CDR • The record passes along the backbone to the home network • Billing computer generates bills based on cumulative CDRs • HPLMN collects the charges • HPLM reimburses VPLMN using TAPs in accordance with roaming agreement
  • 133. Section 3 – NSS Topology
  • 134. Section 3 – NSS Topology The Transferred Account Procedure (TAP) is the mechanism by which operators exchange roaming billing information. This is how roaming partners are able to bill each other for the use of networks and services through a standard process.
  • 135. Section 3 – NSS Topology Gateway MSC (GMSC) Gateway MSC (GMSC) connects the PLMN with other networks and the entry point for the mobile subscriber calls having the interrogation facility. It has the function to obtain the information from the HLR about the subscriber’s current location and reroute the calls accordingly. In case of the network having only on MSC, the same MSC work as the GMSC, while in the case having more than one MSC, one dedicated MSC works as GMSC.
  • 136. Section 3 – NSS Topology
  • 137. Section 3 – NSS Topology Roaming Number A MSRN is used during the call setup phase for mobile terminating calls. Each mobile terminating call enters the GMSC in the PLMN. The call is then re- routed by the GMSC, to the MSC where the called mobile subscriber is located. For this purpose, a unique number (MSRN) is allocated by the MSC and provided to the GMSC.
  • 138. Section 3 – NSS Topology Call Setup
  • 139. Section 3 – NSS Topology 1. GMSC receives a signaling message "Initial Address Message" for the incoming call (MSISDN). 2. GMSC sends a signaling message to the HLR where the subscriber data is stored (MSISDN). 3. The VLR address that corresponds to the subscriber location and the IMSI are retrieved. HLR sends a signaling message using the VLR address as the destination (IMSI). 4. VLR having received the message, requests MSC to seize an idle MSRN and to associate it with the IMSI received. VLR sends back the result to the HLR (MSRN).
  • 140. Section 3 – NSS Topology 1. HLR sends back the result to the GMSC (MSRN). 2. GMSC uses MSRN to re-route the call to the MSC. MSC performs digit analysis on the received MSRN and find the association with IMSI. The MSRN is released and the IMSI is used for the final establishment of the call.
  • 141. Section 3 – NSS Topology Transit Switch When planning the trunk network architecture, it is important to take into consideration the future expansion of the network. Some factors that influence the trunk network configuration are: • Number of MSCs • Transmission costs • Traffic distribution • Traffic volume • PSTN tariffs
  • 142. Section 3 – NSS Topology In case of a medium networks (having 5 - 10 MSCs), some of the MSCs are used as transits for the others and the number of direct links between the MSCs are restricted. In case of large networks (having more than 10 MSCs), separate transit exchanges are used. These are connected to all MSCs and are working with load sharing. Transit functionality is used for passing on calls to another node. This provides a hierarchical structured network.
  • 143. Section 3 – NSS Topology High Usage trunk
  • 144. Section 3 – NSS Topology Traffic between MSCs and from MSCs to other networks is routed over two MSCs in a similar way as is used for the small network. The TGMSCs are used as interconnecting exchanges, since they have trunks to all MSCs in the operators PLMN. MSCs located in the same city area or in close cities are likely to be interconnected by high usage routes, while traffic between distant MSCs is likely more economically routed over the TMSCs.
  • 145. Section 3 – NSS Topology ADVANTAGES OF USING TRANSIT EXCHANGES The use of transit exchanges implies a more stable network structure and some of the most important benefits are: • increased flexibility • enhanced reliability • easily expandable network • platform for functional development • lower handling costs • improved signaling network
  • 146. Section 3 – NSS Topology Value Added Services Value Added Services includes the following: • Point-to-Point Short Message Services • Cell Broadcast Short Message Service • Voice/Fax Mail • Pre-Paid SIM The products associated with each of these services as well as the required interfaces into the core network elements are defined as:
  • 147. Section 3 – NSS Topology
  • 148. Section 3 – NSS Topology Short Message Services (SMS) The Point-to-Point and Cell Broadcast Short Message Services are implemented using the Short Message Service Center (SMSC) and Cell Broadcast Center (CBC). SMSC is built around proven Open Systems Platforms from the UNIX based computer platform to the MSC/HLR/VLR interfaces utilizing SS7.
  • 149. Section 3 – NSS Topology Following are the services and functions for which SMSC is capable of: • Alerting services to indicate call or message waiting • Paging interfaces providing full industry standard TAP interworking • Information services - subscription to financial, weather, traffic, etc. services • DTMF message entry via interactive voice prompts • E-mail • Network administration including bill reminders, statements on demand, network • service information and handset reprogramming.
  • 150. Section 3 – NSS Topology The CBC product is based on the same Open Systems Platforms with an X.25 interface to BSC components. It offers a wide range of applications, which include advertising, general and specialist information distribution services along with other non-mobile terminal applications. The services and functionality that the CBC can provide includes: • Customer care information • Weather and traffic reports • Free advertising • Variable re-transmission rates • Distributed network interface units to handle varying network loads • Local and remote message submission facility.
  • 151. Section 3 – NSS Topology SMS Network Components
  • 152. Section 3 – NSS Topology Callers which cannot reach the MS are given the option (by the VMS) to leave either a short message or a voice mail message. Message waiting notification will be delivered to the MS when the MS is reachable. The VMS (voice mail system) communicates with the SMS SC via TCP/IP or X.25. The VMS has a trunk and signaling interface to the PSTN (e.g., R2, ISUP signaling). The VMS has a trunk and signaling interface to the MSC for mobile subscriber to access his/her voice mail.
  • 153. Section 3 – NSS Topology SMS Applications • SMS up to 160 alphanumeric characters. • Alert services (MT-SMS) — Voice Message Alert — FAX/Telex Message Alert — E-mail System Alert — Paging Bureau Emulation Services. • Information Services — Financial Services (stock market queries and alerts) — Weather or traffic information (e.g., from TV/radio station data feeds)
  • 154. Section 3 – NSS Topology • Network Administration — Bill reminders (MT-SMS), bill payment — Statements on demand (MO and MT-SMS) — Handset re-programming and much more.
  • 155. Section 3 – NSS Topology VMS It supports a wide range of innovative applications including: • Call answering • Voice and fax bulletin boards • Information on demand • One number services • Voice and fax messaging • Interactive voice response • Prepaid calling cards • Voice activated dialing
  • 156. Section 3 – NSS Topology Pre Paid SIM The functionality of the Pre-Paid SIM feature includes: • Provision of pre-defined limits based on air time or talk time • Service provisioning including various provisioning options (point of sale, service providers, etc.) and definitions of pre-paid categories (throw away, top up, etc.) • Service execution for air and talk time credit usage • GSM MAP services, teleservice, bearer services and supplementary services will all be available to the Pre-Paid SIM subscriber, with possible limitations, as required by the network operator.
  • 157. Section 3 – NSS Topology Supplementary Services Wide range available in GSM standard and Operators can also define their own In GSM it is possible for the subscribers to check and modify the parameters and status of their Supplementary Services
  • 158. Section 3 – NSS Topology Some of the Supplementary Services are: • Calling Line Identification/Restriction • Connected Line Identification/Restriction • Call Forwarding • Call Waiting • Call Hold • Conference Calling • Conference Calling • Advice of charge • Call barring
  • 159. Section 3 – NSS Topology Exercise Q1. Write a full form of following : IMEI, TMSI, MSRN, LAI, ST, STP, SSP Q2. How many circuit groups are required for 3 BSCs and 10 PSTN? Q3. List down the three functions of each HLR & VLR. Q4. Fill in the following: E interface is used between ------ H interface is used between-------
  • 160. Section 3 – NSS Topology Algorithm A8 is used for ---------- Algorithm A3 is used for ---------- Transit exchanges are used to reduce the --------- Q5. List down the different locations of TRAU and explain the best position. Q6. What information is contained in the CDRs? Q7. 2 advantages of transit switch. Q8. Name some of supplementary services.
  • 161. Section 4 – GSM Signaling GSM Signaling
  • 162. Section 4 – GSM Signaling Objective The Trainee will be able to understand: • signaling between MSC/VLR and BSS • Concept of DTAP • Concept of BSSMAP • signaling between BSC and BTS • Functions of LAPDm • Functions of LAPD • Frame structure of LAPDm And LAPD
  • 163. Section 4 – GSM Signaling Introduction There are two different types of communication channels: • Traffic channel at 64 Kbps, carrying speech or data for radio channels. • signaling channels at 64Kbps, carrying signaling information. In PCM one time slot is reserved for signaling and remaining are used for transmitting speech or data. As the entire siganlling is done on 64Kbps , there should be special function converting the information to 64Kbps format and back at the receiving end.
  • 164. Section 4 – GSM Signaling Protocols in GSM Networks VLR AUC MAP MAP ISDN ISUP VLR HLR EIR GMSC ISUP MAP MAP MAP MAP MSC MSC TUP PSTN Switching System BSSAP BSC Base LAPD Station System MS LAPDm BTS
  • 165. Section 4 – GSM Signaling GSM Signaling Matrix Database DTAP BSSMAP MAP BSS DTAP RR MAP RIL3 RSM RSM TCAP BSSAP BSSAP RIL3 ISUP SCCP SCCP MTP2 &3 MTP2 & 3 LAPDm LAPDm LAPD LAPD MTP1 MTP1 MS BTS BSC MSC
  • 166. Section 4 – GSM Signaling • MSC uses ISUP/TUP protocols for PSTN signaling. • MAP siganlling for database applications like HLR, VLR, EIR, AUC, SMS-SC, GMSC. • GSM specific protocol as BSSAP, which comprises of DTAP and BSSMAP. • The BSC on layer 2 uses LAPD protocol, which is an ISDN. • BTS has LAPDm as layer 2 protocol. • Mobile has DTAP for MSC and RR for Radio Resource signaling.
  • 167. Section 4 – GSM Signaling MAP (Mobile Application Part) MAP is a protocol specially designed for GSM requirement. It is installed in MSC, VLR, HLR, EIR and communicates in case of: • Location registration • Location cancellation • Handling/management/ retrieval of subscriber data. • Handover • Transfer of security/ authentication data.
  • 168. Section 4 – GSM Signaling BSS Application Part (BSSAP) BSSAP is used for signaling between MSC/VLR and BSS. Three groups of signals belong to BSSAP 3. DTAP 4. BSSMAP 5. Initial MS messages
  • 169. Section 4 – GSM Signaling Transparent to BSS M DTAP M Initial MS Message S BSSMAP LAPDm S C BSC/BTS
  • 170. Section 4 – GSM Signaling Direct Transfer Application Part (DTAP) DTAP is a messages between the MSC and MS, passes through the BSS transparently. These are call control and mobility management messages directed towards a specific mobile. 3 main type of DTAP messages are: • Messages for mobility management like location update, authentication, identity request • Messages for circuit mode connections call control • Messages for supplementary services
  • 171. Section 4 – GSM Signaling BSSMAP BSS management messages (BSSMAP) between MSC and BSS (BSC/ BTS), which are necessary for resource management, handover control, paging order etc. The BSSMAP messages can either be connection less or connection oriented.
  • 172. Section 4 – GSM Signaling Initial MS Messages These messages are passed unchanged through BSS, but BSS analyses part of the messages and is not transparent like DTAP messages. Between BSS and MSC, the initial MS message is transferred in the layer 3 information in the BSSMAP. The Initial MS messages are: • CM Request • Location update request • Paging response
  • 173. Section 4 – GSM Signaling LAPDm Link Access Procedures on the Dm channel (LAPDm) is the layer 2 protocol used to convey signaling information between layer 3 entities across the radio interface. Dm channel refers to the control channels, independent of the type including broadcast, common or dedicated control channels. LAPDm is based on the ISDN protocol LAPD, used on the Abis interface. Due to the radio environment, the LAPD protocol can not be used in its original form. Therefore, LAPDm segments the message into a number of shorter messages.
  • 174. Section 4 – GSM Signaling Data exchanged between the data link layer and the physical layer is 23 octets for BCCH, CCCH, SDCCH and FACCH. For SACCH only, 21octets are sent from layer 2 to layer 1. LAPDm functions include: • LAPDm provides one or more data link connections on a Dm channel. Data Link Connection Identifier (DLCI) is used for discriminating between data link connections. • It allows layer 3 message units be delivered transparently between layer 3 entities. • It provides sequence control to maintain the sequential order of frames across the data link connections.
  • 175. Section 4 – GSM Signaling LAPDm Frame Structure info length command address N(R) P/F N(S) 0 0 0 1 SAPI CR 1
  • 176. Section 4 – GSM Signaling Sequence Number: N(S) send sequence number of the transmitted frame. N(R) is receive sequence number. P/F : All frames contain the Poll/Final bit. In command frames, the P/F bit is referred to as the P bit. In response frames, the P/F bit is referred to as the F bit. Service Access Point Identifier: Service Access Points (SAPs) of a layer are defined as gates through which services are offered to an adjacent higher layer.SAP is identified with the Service Access Point Identifier (SAPI). SAPI = 0 for normal signaling of DTAP & RR SAPI = 3 for short message services
  • 177. Section 4 – GSM Signaling LAPDm has no error detection and correction. It is used in two modes: • Acknowledge & • Unacknowledged and having a different structure for both.
  • 178. Section 4 – GSM Signaling LAPD All signaling messages on the Abis interface use the Link Access Procedures on the D-channel. (LAPD protocol). LAPD provides two kinds of signaling: • unacknowledged information • acknowledged information LAPD link handling is a basic function to provide data links on the 64 kbps physical connections between BSC and BTS.
  • 179. Section 4 – GSM Signaling Links are provided for operation and maintenance (O&M) of the links, for O&M of the BTS equipment and for transmission of layer 3 Abis messages. Each physical connection can support a number of data links (logical connections). On each physical connection each data link is identified by a unique TEI/SAPI
  • 180. Section 4 – GSM Signaling LAPD has three sub signaling channels 3. RSL (Radio signaling Link), deals with traffic management, TRX signaling. 4. OML (Operation & Maintenance Link), serves for maintenance related info and transmission of traffic statistics. 5. L2M (Layer 2 Management), used for management of the different signaling on the same time slot.
  • 181. Section 4 – GSM Signaling LAPD Frame Structure Flag FCS info length command address Flag N(R ) P/F N(S) 0 TEI 1 SAPI CR 0
  • 182. Section 4 – GSM Signaling LAPD Frame structure is made up of: Flag: Indicates the beginning and end of each frame unit. Flag has a pattern of 01111110. FCS: Frame Check Sequence, provides the error checking for the frame. If error is found frame will be retransmitted. Command: It has two types of structure, in acknowledge mode it has N(S) and N(R ). N(S) is a sequence number of frame sent and N(R ) is the sequence number of the frame expected to receive next.
  • 183. Section 4 – GSM Signaling C/R: This bit indicates whether it is command or response. P/F: In command frames, the P/F bit is referred to as the P bit and the other end transmits the response by setting this bit to F. TEI: Terminal Endpoint Identifier, is a unique identification of each physical entity on either side like each TRX within a BTS have a unique TEI.
  • 184. Section 4 – GSM Signaling SAPI: Service Access Point Identifier, used to identify the type of link. SAPI = 0 for RSL SAPI = 62 for OML SAPI = 63 for L2ML Each LAPD link is identify by SAPI/TEI pair.
  • 185. Section 4 – GSM Signaling Exercise Q1. Name the protocol which is transparent to BSS and what information is used to transfer on this protocol? Q2. Name the protocols used between Mobile and BTS BTS and BSC BSC to MSC MSC to PSTN
  • 186. Section 5 – Call Handling Call Handling
  • 187. Section 5 – Call Handling Objective The Trainee will be able to understand: • Basic call concepts • Location Area concepts • Call setup in different scenarios • SMS routing • Intra and Inter MSC handovers
  • 188. Section 5 – Call Handling Introduction Call setup is required to establish communication between a Mobile Station and Network Subsystem (NSS). The NSS is responsible for establishing a connection with the corresponded. Different types of calls require different teleservices. For the optimum utilization of the network, different location areas will be defined to reduce the paging load on the system.
  • 189. Section 5 – Call Handling Basic Types of Calls There are three basic types of call: 3. Mobility Management calls: Such as Location update. These are used to collect information about the MS and only signaling channels are used. 4. Service calls: Such as SMS. These calls passes very small information, therefore signaling channels are used. 5. User traffic calls: Such as speech or data. Large amount of data is exchanged hence traffic channels are used.
  • 190. Section 5 – Call Handling Basic Call Setup
  • 191. Section 5 – Call Handling Subscriber on switch A places a call to a Subscriber on switch B: 3. Switch A analyzes the dialed digits and determines that it needs to send the call to switch B. 4. Switch A selects an idle trunk between itself and switch B and formulate IAM 6. STP W receives a message, inspects its routing label, and determines that it is to be routed to switch B. 7. Switch B receives the message. On analyzing the message, it determines that it serves the called number and that the called number is idle. 8. Switch B formulates an address complete message (ACM), which indicates that the IAM has reached its proper destination.
  • 192. Section 5 – Call Handling 2. Switch B picks one of its links and transmits the ACM over the link for routing to switch A. 3. STP X receives the message, inspects its routing label, and determines that it is to be routed to switch A. 4. On receiving the ACM, switch A connects the calling subscriber 5. When and/or if the called subscriber picks up the phone, switch B formulates an answer message (ANM), 6. Switch B selects the same link it used to transmit the ACM 7. STP X recognizes that the ANM is addressed to switch A and forwards it over link
  • 193. Section 5 – Call Handling 2. Switch A ensures that the calling subscriber is connected and conversation can take place. 3. If the calling subscriber hangs up first switch A will generate a release message (REL) addressed to switch B. 4. STP W receives the REL 5. Switch B receives the REL, disconnects the trunk from the subscriber line, returns the trunk to idle status. 6. STP X receives the RLC, determines that it is addressed to switch A. 7. On receiving the RLC, switch A idles the identified trunk.
  • 194. Section 5 – Call Handling Location Registration When the mobile is turned on first time in the network, it has no indications in its data about an old Location Area Identity. MS immediately inform the network and request for the Location Update to the MSC/ VLR. After registration MSC/ VLR will consider the MS as active and marked the MS as “attached”.
  • 195. Section 5 – Call Handling Location Update When the MS moves from one LA to another, it has to register. This registration is performed when the MS detects another LAI than the one stored. This is called location updating. This function provides mobile subscribers with uninterrupted service throughout the GSM coverage area so that they can: • Be called on a permanent directory number irrespective of their location at the time of call. • Access the network whatever their position
  • 196. Section 5 – Call Handling There are four different types of location updating: • Normal • IMSI detach • IMSI attach • Periodic registration
  • 197. Section 5 – Call Handling Normal Update • The Base Transceiver Station (BTS) of every cell continually transmits the Location Area Identity (LAI) on BCCH. • If MS detects LAI is different from the one stored in the SIM- card, it is forced to do a location update. • If the mobile subscriber is unknown in the MSC/VLR (new subscriber) then the new MSC/VLR must be updated, from the HLR, with subscriber information. • It also consider the case of the location update timer runs out.
  • 198. Section 5 – Call Handling
  • 199. Section 5 – Call Handling 2. The MS requests a location update to be carried out in the new MSC/VLR. The IMSI is used to identify the MS. 3. In the new MSC/VLR, an analysis of the IMSI number is carried out. The result of this analysis is a modification of the IMSI to a Mobile Global Title (MGT) 4. The new MSC/VLR requests the subscriber information for the MS from the HLR. 5. The HLR stores the address of the new MSC/VLR and sends the subscriber data to the new MSC/VLR.
  • 200. Section 5 – Call Handling 5. The HLR also orders the old serving MSC/VLR to cancel all information about the subscriber since the MS is now served by another MSC/VLR. 2. When the new MSC/VLR receives the information from the HLR, it will send a location updating confirmation message to the MS.
  • 201. Section 5 – Call Handling IMSI Detach The MS must inform the network when it is entering an inactive state (detach). 3. At power off or when the SIM card is taken out, the MS asks for a signaling channel 4. The MS uses this signaling channel to send the IMSI detach message to the MSC/VLR. 5. In the VLR, an IMSI detach flag is set for the subscriber which is used to reject incoming calls to the MS. The detach will not be acknowledged.
  • 202. Section 5 – Call Handling Only the VLR is updated with the “detached” information.
  • 203. Section 5 – Call Handling IMSI Attach The attach procedure is performed only when the MS is turned on and is in the same LA as it was when it sent the detach message. If the MS changes location area while being switched off, it is forced to do a normal location update. The procedure is as follows 3. The MS requesting a signaling channel. 4. The MSC/VLR receives the IMSI attach message from the MS. 5. The MSC/VLR sets the IMSI attach in the VLR, that is, the mobile is ready for normal call handling. 6. The VLR returns an acknowledgment to the MS.
  • 204. Section 5 – Call Handling
  • 205. Section 5 – Call Handling Periodic Location Update To avoid unnecessary paging of the MS in case the MSC never got the IMSI detach message, there is another type of location updating called periodic registration. The procedure is controlled by timers both in the MS and in the MSC. If the MS does not register within the determined interval plus a guard time, then the scanning function in the MSC detects this and the MS will be marked detached.
  • 206. Section 5 – Call Handling Paging A call to MS is routed to the MSC/ VLR and send a paging message to the MS. This message is broadcast all over the Location Area (LA), which means that all BTSs with in the LA will send a paging message to the mobile. The MS, moving in the LA and listening to the CCCH information, will hear the paging message and answer it immediately.
  • 207. Section 5 – Call Handling Paging Capacity Paging capacity is the number of mobiles that can be paged per second This depends on: • CCCH configuration • AGCH blocks reservation • Type of paging message used • Paging message takes 4 bursts (1 CCCH block) • This can page up to 4 mobiles depending on the message type used
  • 208. Section 5 – Call Handling Paging Message Types Type 1: can address up to two mobiles using either IMSI or TMSI Type 2: can address up to 3 mobiles, one by IMSI and other 2 by TMSI. Type 3: can address up to 4 mobiles using the TMSI only. If the network does not use TMSI then only type 1 is used in the network.
  • 209. Section 5 – Call Handling Calculation Of Paging Capacity X = number of mobiles paged per paging message (1 to 4) Y = number of possible paging messages per multiframe Duration of channel multiframe = 0.235 seconds (235 ms) • X depends on paging message type • Y depends on CCCH configuration in the multiframe (e.g. 3 or 9) and the number of AGCH blocks reserved
  • 210. Section 5 – Call Handling PCH Dimensioning Paging channel requirement in blocks per multiframe is given by: Calls = Number of calls predicted for the location area during busy hour MT = Fraction of calls which are mobile terminated PF = Paging Factor = number of pages required per call M = safety margin PMF = Paging Message Factor = number of pages per message Number of control channel multiframes per second = 4.25
  • 211. Section 5 – Call Handling Example A particular location area contains 50 000 subscribers. It is predicted that 30% of these will receive a call during the busy hour. On average 2 pages are needed per call and only type 3 paging messages (TMSI) are used. This gives the following data: Calls = 50 000 MT = 0.3 PF = 2 PMF = 4
  • 212. Section 5 – Call Handling A typical safety margin for peak variations in number of calls is 1.2 • 1 PCH block per multiframe will be adequate
  • 213. Section 5 – Call Handling Paging Control The MSC has to initiate the paging procedure, as it holds the information on the last MS location update. MSC sends a paging message to BSC and sets a timer for response from the MS, which is send as a part of service request message. The paging message from the MSC contains a cell list identifier, identifying the cells in which paging message is to be transmitted.
  • 214. Section 5 – Call Handling Call From MS (Mobile to PSTN) cb PLMN VLR Exch MSC PSTN
  • 215. Section 5 – Call Handling Call From MS Overview • Mobile is active and idle, wants to set up a call • User dial the number and press send, at first moment it sends on RACH • MSC/VLR assigns a dedicated channel • If the calling MS is allowed to make a call MSC/VLR acknowledges the access request • Depending on whether a fixed or a mobile subscriber is called, number is analyzed directly in the MSC/VLR. • Call setup message is acknowledged as soon as the link is ready. • MS is also assigned to move to a dedicated traffic channel TCH.
  • 216. Section 5 – Call Handling Signaling Interfaces ISDN/ PLMN PSTN LAPDm VLR BSSMAP LAPD MSC BSC DTAP ISUP/TUP
  • 217. Section 5 – Call Handling Point Of Interconnect (POI) Location In case of long distance mobile to PSTN call, circuits define to route a call in the switch should be such that, call can travel maximum distance on the airtime and minimum on the land line to enhance the revenue. Call should handover to the POI as near as possible to the subscriber location.
  • 218. Section 5 – Call Handling Call to MS (PSTN to Mobile) MSISDN PSTN GSM/PLMN Link is setup from local exchange to the GMSC GMSC
  • 219. Section 5 – Call Handling PSTN GSM/PLMN signaling No.7: Interrogation GMSC function used by GMSC MSISDN + MSRN request HLR
  • 220. Section 5 – Call Handling PSTN GSM/PLMN VLR GMSC signaling No7: Request for MSRN to VLR MSC HLR IMSI

Editor's Notes

  1. According to the GSM recommendation, the IMSI will have the length of maximum 15 digits. MCC = 3 digit MNC = 2 digit MSIN = 11 digit IMSI is also stored in the VLR for temporary registration.
  2. In order to provide a temporary number to be used for routing, the HLR requests the current MSC/VLR to allocate a MSRN to the called subscriber and to return it. The interrogation call routing function (request for an MSRN) is part of the MAP. All data exchanged between the GMSC – HLR – MSC/VLR for the purpose of interrogation is sent over the SS7 signaling network.
  3. The directory numbers assigned to mobile (MSISDN) as defined in Recommendation GSM 03.03 are part of the general numbering plan defined in ITU-T Recommendation E.164 Consequently, a mobile subscriber can dial a number up to 15 digits (excluding any prefix) to call: A national PSTN subscriber A Subscriber of any foreign PSTN A subscriber of one or more national PLMNs A subscriber of any foreign PLMN The MSC can accept called subscriber number with up to 18 digits from the PSTN.
  4. Group is a bunch of PCMs through which call routing takes place. Call routes through PCMs from the MSC, different number of PCMs are allocated for different services, depending upon the traffic.
  5. The four major functions of the CM are performed by these four hardware subunits: MSGS — MSCU (message switch control unit) — MSPU (message switch peripheral unit). TMS — CMCU (communications module control unit) — TMSU (time multiplexed switch unit).
  6. In the case of Integrated switch, off switch means MSC without HLR. In Stand alone, again switch refer to MSC+HLR hence mentioned that call processing activity can not take place.
  7. 1)the HLR sends the Get Password operation to the VLR and the VLR sends the Register Password to the HLR . 2) the HLR sends this MAP operation to all MSCs, with service centers waiting to send short messages, to inform the service center that the MS is now present in the network. 3) the HLR sends this MAP operation to the VLR to terminate a call to an MS, and the VLR returns the roaming number for the given MS. The HLR uses the roaming number to provide routing information to the GMSC. 4) the SMS Gateway MSC sends this MAP operation to the HLR. The HLR checks if the MS is absent, allowed to terminate, has a full message waiting list, etc 5) the GMSC sends this MAP operation to the HLR to get routing information for all terminations to MSs. If calls are allowed to terminate to this MS, the HLR sends the Provide Roaming Number to the VLR. The HLR returns the routing information to the GMSC; the call can then be routed from the GMSC to the VLR. 6) the HLR receives this MAP operation from the SMS GMSC. The HLR saves the Service Center Address in the message waiting data for the given MS.
  8. Following are the functions which are supported on the VLR using MAP protocol.
  9. These information are internal with MSC on the B interface.
  10. The EIR contains one or several databases which store(s) the IMEIs used in the GSM system. The mobile equipment may be classified as "white listed", "grey listed" and "black listed" and therefore may be stored in three separate lists. An IMEI may also be unknown to the EIR. The EIR contains, as a minimum, a "white list" (Equipment classified as "white listed"). There is an optional implementation that may be used by the operator to control access to the network by certain types of equipment or to monitor lost or stolen handsets.
  11. Therefore, when making a MS-to-MS call, the originating channel has to be converted from 16kbps to 64kbps, switched by the MSC and then converted back to 16kbps for onward transmission to the destination MS. Technically, the TRAU can be physically located in the BTS, BSC or MSC and hence leads to a variety of installation configurations. NOTE: PCM from PSTN is always independent of the TRAU location as it always transmitted on 64 kbps.
  12. Operation and Maintenance system supports the day to day management of a cellular network as well as providing a database for long term network engineering and planning. It also provides the hierarchical regionalised network management of a complete GSM sysytem. Equipment manufacturer have their own OMCs which are not compatible in every aspect with those of other manufacturers. This is particularly the case between Radio Base Station equipment suppliers, where in some cases the OMC is a separate item and Digital Switching equipment suppliers, where the OMC is an integral part, but functionally separate, part of hardware.
  13. Fault management has two main functions: To inform the operator about problems in the operation of devices at each of the network elements. To provide the operator with facilities to change the state of network element devices (ie in or out of service) and to run test diagnostics on network elements, devices to determine their capability to function correctly. This also provides the operator to allow network devices to be manually or automatically removed from or restored to service. The maintenance functions allow control of the traffic load placed on the network by forcing calls to be rejected at the BSS when necessary.
  14. Configuration Management allows the operator to adopt the network to the changing traffic requirements. The introduction of new features and network upgrading is also controlled by the configuration management.
  15. The network access component covers the cost of making a service available, and represents the cost of the service which is not dependent on the actual use. It is generally known as "network connection charges". The network utilization component covers the costs associated with network use.
  16. CAI = Charge Advice Information AOC = Advice of charge
  17. IAM : initial address message. It identifies the initiating switch (switch A), the destination switch (switch B), the trunk selected, the calling and called numbers,
  18. Location Update Sequence: A location update is initiated by the mobile when it detects that it has entered a new location area. The location area is transmitted on the BCCH as the LAI. The mobile will be assigned an SDCCH by the BSS, the location updating procedure will be carried out using this channel. Once the SDCCH has been assigned the mobile transmits a “Location Update Request” message. This message is received by the MSC which then sends the new LAI and the current mobile TMSI number to the VLR. The information will also be sent to the HLR if the mobile has not previously been updated on the network. Authentication and ciphering may now take place if required. The VLR will now assign a new TMSI for the mobile, this number will be sent to the MSC using the “Forward New TMSI” message. The VLR will now initiate the “Location Update Accept” message which will transmit the new TMSI and LAI to the mobile. Once the mobile has stored both the TMSI and the LAI on its SIM card it will send the “TMSI Reallocate Complete” message to the MSC. The MSC will then send the “TMSI Ack” message to the VLR to confirm that the location update has been completed. The SDCCH will then be released by the mobile.
  19. If the MS sends an “IMSI detach” to the system, and the radio link quality is too bad, the system might not be able to decode the information. Since no acknowledge sent to the MS, no further attempt is made. This means that the system still will regard is the MS as attached.
  20. The subscriber pressing the “ send ” key initiates a “Channel Request” message from the MS to BSS. This followed by the assignment of the dedicated channel and establishing the signaling link between MS and BSS. “ Request for Service” message is passed to the MSC/VLR which carry out the authentication process if the MS has been previously registered on this VLR. If not then VLR will have to obtain authentication parameters from HLR. The message “Set UP” is sent by the MS to the MSC accompanied by the call information. The MSC may initiate the MS IMEI check. This check may also occur later in the message sequence. In response to the message “Set Up” the VLR sends the message “Complete Call” to the MSC which notifies the MS with “Call proceeding” MSC assigns a traffic channel to the BSS “Assignment Command” which in turn assigns an air interface traffic channel, MS responds to the BSS with “Assignment Complete”. An “Initial and Final Address Message (IFAM)” is sent to the PSTN. Ring tone is applied at the MS in response to “Alerting” which the MSC sends to the MS when the PSTN responds with an “Address Complete Message (ACM)”. When answered “ANS” from the PSTN the message “Connect” is forwarded to the MS by the MSC, stopping the MS ring tone. The MSC then connects the GSM traffic channel to the PSTN circuit thus completing the end – end traffic connection. conversation takes place for the duration of the call.
  21. Call setup from a fixed PSTN subscriber to a GSM/PLMN subscriber. The X-subscriber dials the National Destination Code in order to reach the GSM/PLMN area: Connection is setup from his local exchange to the Gateway MSC (GMSC) of the PLMN network.
  22. The X-subscriber dials the Y- Subscriber number, and the number is analyzed at the GMSC. Using the interrogation function, the GMSC sends the MSISDN, with a request for a Mobile Station Roaming Number (MSRN), to a HLR.
  23. HLR translates the dialled mobile subscriber number into a GSM/PLMN subscriber identity: MSISDN to IMSI The HLR points out the Service Area for the called subscriber and sends the IMSI of the called subscriber to the VLR of the Service Area with the request for a MSRN.
  24. The VLR temporarily allocates a roaming number, MSRN, to the called subscriber and sends it back to the HLR. The HLR sends it to the GMSC.
  25. The GMSC, having the correct MSRN, can now set up the incoming call to the MSC/VLR Service Area where Y-subscriber is currently located. Connection between GMSC and the MSC/VLR can be set up through the PSTN or by the direct link.
  26. The VLR indicates the Location Area Identity (LAI) for the called subscriber, IMSI to LAI. At this stage the network wants the paging message for the called subscriber to be broadcast over the radio coverage of all the cells belonging to the Location Area. Therefore the MSC/VLR sends the paging message to all the BTS within the LA.
  27. The BTS, receive the paging message, will send it over the radio path on the Paging Channel (PCH). The MS, in idle state and listening to the PCH of one of the cells belonging to the LA,receives the paging message, recognizes the identity (IMSI) and sends the response to the paging message.
  28. rn: random number fn: frame number TA: Timing advance cm: class mark UA: unnumbered Acknowledge The MS continues to transmit channel request messages until it receives a response. If no response is received before the MS has transmitted a predefined number of retries, the MS: Displays a network error message for all calls except location updates. Perform automatic reselection for location update calls. Channel request sends by the BTS to BSC along with random number and timing advance. BSC Checks the message and if an SDCCH is available, it allocates an SDCCH channel. BSC sends the channel activation message to the BTS and sets a timer to wait for an acknowledgement from the BTS. The BSC builds and sends an immediate assign command message reiterating the information given in the channel activation message.
  29. Set Asynchronous Balance Mode : The first layer 2 frame sent on the SDCCH is a standard LAPDm type frame, known as the SABM. On the air interface, it is used to establish the LAPDm connection with the BTS. This frame can also contain the layer 3 message. Contention Resolution : The MS Starts its LADm connection and sends a layer 3 message in its first frame. This message is used by the BTS for contention resolution. The BTS sends an acknowledgement to the MS containing the same layer 3 message. Therefore, only the MS that sent the message can accept the acknowledgement from the BTS and consider itself connected.
  30. Once communication with the called party is establish (but before the call is answered), the MSC sends an alerting message to the MS. The MS generates a ring tone. When the called party answers, the MSC sends a connect message to the MS. The MS responds with a connect acknowledgement message. The call is establish.
  31. A call from the NSS to an MS can either a call routed through the NSS from a calling party, or it can be initiated by the NSS for the Mobility management. A mobile terminated call set up follows the same basic procedures as a mobile originated call. This section describes only those procedures which are different.
  32. The MS is in conversation state and is continuously compiling measurements both of the current transmission and the broadcast control channels of up to sixteen surrounding cells. The measurements from the six best cells are reported back to the BSS, every 480ms. When a handover is required, due to low receive signal strength or poor quality the existing “originating” BSS notifies the MSC “Handover Request”. The target or new BSS is related with the message “Handover Request” tagged with TMSI. The new BSS allocates a Handover Reference Number which is used to determine whether the correct mobile gains access to the air interface channel which is allocates, and acknowledges the MSC’s request with “Handover Channel Request Ack”. This is tagged with the HO Reference Number. The new BSS assigns a traffic channel. The MSC via the old BSS orders the MS to change to the new channel with the message “Handover Command” There is an information interchange between new BSS and MS. This uses the FACCH. Once all necessary information has been transferred the message “Handover Complete” is sent to the MSC. The MSC then sends a “Clear Command” to the old BSS, this frees the radio resources.
  33. All the BTSs are connected to the BSC through DMR and in many cases the BSC’s are connected to the MSC through DMR. The selection of DMR for this application due to its faster deployment, efficient traffic utilization, and low cost.
  34. Standard value of K is taken to be 4/3. K > 4/3 in warm temperature areas and < 4/3 in cold temperature areas.
  35. Receiver of microwave radio accepts signals from two or more antennas Antennas are vertically spaced apart by many wavelengths Signals then received from both antennas are combined It provide the improvement of 3db in SNR
  36. Same information is transmitted and received on two different frequency. They are coupled to a waveguide, which waves to the antenna, and then transmitted by the same antenna .
  37. Under normal frequency planning the same frequency in the same direction is used in every alternative hop. Thus the possibility of overreach interference exists. As a precaution against over reach interference, the adjacent hops are never located in the same line and a minimum angle of 7 degree is maintained in order to obtain additional discrimination due to antenna.
  38. Any lose in the No. 7 signaling will cause a loss in switched traffic and thus revenue loss. Due to the high capacity of a single link, the traffic loss could be substantial. No. 7 networks are therefore always dimensioned with high redundancy. A single fault, i.e. loss of a link set or if a STP falls out, should not be allowed.
  39. The signaling volumes will increase in the future. Higher subscriber and traffic density lead to smaller cell and exchange areas and thus an increased mobility related signaling. Introduction of new services and an increased need for charging information and advice of charge also add to the signaling load.
  40. Based on the input parameters, mean frequencies for major events causing No. 7 signaling are calculated. Signaling volumes are then derived by simply multiplying the mean frequencies with the average MSU lengths related to each event.
  41. The signaling volumes may differ quite substantially depending on traffic and mobility model. For a heavy model with high mobility and high traffic, both switched traffic and short message traffic, signaling volumes could easily be twice as large as for a network with modest mobility and little traffic per subscriber.
  42. major part of the signaling MSC-HLR (up to 50% or more) is related to mobility, i.e. constitutes of Location Updates and Location Cancellations. Fetching of authentication triplets is often the second largest part of the signaling volume, approximately 25-35%. Of the remaining 15-25% almost all signaling is related to HLR interrogations for incoming calls and MT short messages.
  43. The 1st and 2 nd priorities for routing is shown for nodes A and B. If the 1 st choice fails then use the second choice. In this case B will also inform C, by sending a transfer prohibited message, that C no longer can send messages to A via B.
  44. A uses B and C as STPs to send signaling messages to D. When the link set between B and D fails a changeover procedure will take place, A will not be informed since B still can send messages to D. In this case B will also inform C, by sending a transfer prohibited message, that C no longer can send messages to D via B.
  45. Variable quality of service is provided to different types of services which dependents upon the coding schemes.