Basic Telecom Questions and Answers
Basic Telecom Questions and Answers
2) What is FDMA?
The uplink band of GSM is from 890MHz to 915MHz and the downlink band of
4) What is the bandgap between the uplink and downlink carrier in GSM?
45 MHz.
200KHz
6) How many carriers are present in the GSM band and how many channels
are there in each carrier?
Absolute Radio Frequency Channel Number. In GSM ARFCN 1 to 124 are used
9) What are the components of the GSM network? Draw a schematic diagram
of the GSM Network architecture?
The BTS is a part of the Base Station Sub system and is in contact with the
MS through the radio interface. The BTS is in charge of management of
transmission and reception on the radio interface.
11) Describe in brief the functionalities of the Base Station Controller (BSC)?
The BSC is connected on one side to one or several BTSs and on the other
side to the MSC. The main function of the BSC is allocation and release of
radio channels and the handover management.
The Home Location Register (HLR) together with the MSC, provide the
callrouting and roaming capabilities of GSM. The HLR contains all the
administrative information of each subscriber registered in the
corresponding GSM network, along with the current location of the mobile.
The Visitor Location Register contains roaming information. Once the visited
system detects the mobile, the VLR of that system enquires the HLR to make
sure you are a valid subscriber. It temporarily stores the last location area
visited by the MS, the power the mobile uses, the special services the MS is
subscribed to and so on.
The Equipment Identity Register (EIR) is a database that stores data related
to the mobile equipment. It contains a list of all valid mobile equipment on
the network,where each mobile station is identified by International Mobile
Equipment Identity (IMEI).This is useful when searching for stolen mobile
equipment or when monitoring misuse of mobile stations.
Authentication involves two functional entities, the SIM card in the mobile,
and the Authentication Center (AuC). Each subscriber is given a secret key
(Ki), one copy of which is stored in the SIM card and the other in the
Authentication Center. During authentication, the AuC generates a random
number (RAND) that it sends to the mobile. Both the mobile and the AuC
then use the random number, in conjunction with the subscriber’s secret key
and a ciphering algorithm called A3, to generate a number (SRES) that is
sent back to the AuC. If the number sent by the mobile is the same as the
one calculated by the AuC, the subscriber is authenticated.
The two types of logical channels are Traffic Channels (TCH) and Control
Channels
There are three types of control channels mainly broadcast Control Channels,
Common Control Channels and Dedicated Control Channels.
21) What are the various types of Broadcast Control Channels?
The three types of Common Control Channels are Access Grant Channel,
Paging Channel and Random Access Channel.
The three types of dedicated control channels are Slow Associated Control
Channel, Fast Associated Control Channel and Stand Alone Dedicated Control
Channel
The Broadcast Control Channel broadcasts general information about the cell
viz. neighbor cell information, MS maximum transmit power on CCHs and
local area identification.
The FACCH is used as a main signaling link for the transmission of data eg.
Handover commands. The FACCH is required for every call set up and
release. The FACCH is transmitted in the burst by pre-empting a portion of
the speech/user data information bits during active call.
The AGCH is used for sending access grant messages, which assign the MS
to an SDCCH or directly to a TCH in response to a request placed on RACH by
MS.
The PCH is used to page the MS during mobile terminated call setup. Paging
messages are sent to the area where the recipient MS is located.
31) What is the function of the SDCCH?
The SDCCH carries all signaling between the BTS and the MS when no TCH is
allocated. It is used for service requests (eg. SMS), location updates,
subscriber authentication, ciphering, initiation, equipment validation and
assignment to a TCH.
32) Draw and explain the protocol layer between the Mobile Station and the
BTS?
33) What are the functions of the Radio resource Management Layer in GSM?
34) What are the functions of the Mobility Management sub layer in GSM?
The mobility Management layer manages the location updating, handovers,
and registration procedures. The machines concerned with mobility
management are mainly the MS, the HLR and VLR. The security function is
performed by the AuC.
35) What are the functions of the Communications Management sub layer in
GSM?
A mobile is said to be in idle mode when it is active (powered on) but is not
allocated any traffic channel. In the idle mode the MS listens to broadcast
channels in order to intercept paging messages, monitor the radio
environment in order to evaluate its quality and choose the most suitable
base station.
The BSIC is a color code which the MSs use to be able to discriminate
between the cells transmitting their beacon channels on the same frequency.
Many cells bear the same BSIC and it is common for neighboring cells to
have the same BSIC.
When a MS station is switched off(or when the SIM is removed by the user),
call towards that MS station cannot be completed. Hence important
resources are consumed for nothing. To alleviate this load, the IMSI attach
and IMSI detach procedure is used. The subscribers record in the MSC/VLR
contains a binary information indicating whether or not it is useful to try to
complete the call toward the subscriber. The IMSI detach procedure will set
the binary bit to “ Not Useful To Try” whereas the IMSI attach procedure will
do the reverse.
3 Digits 2 Digits
Mobile Station ISDN Number This is the subscriber phone number. It is the
identity of the subscriber known by the external world. It is the number
dialed when someone needs to call the mobile subscriber. The MSISDN
consists of the Country Code (CC), National Destination Code (NDC) and
Subscriber Number.
The MSRN is used to identify a subscriber when routing the call from the
GMSC to the visited MSC for mobile terminating calls.. It is allocated by the
MSC/VLR currently serving the subscriber on a call basis (temporary
assignment)
Normal Burst
Synchronization Burst
Dummy Burst
Frequency Synchronization Burst.
49) Draw and Explain the Protocol architecture of the GSM Network?
MM sub Layer
Terminated at MSC
Terminates at MSC
BSSAP
Used to implement all procedures between the MSC and the BSS that require
interpretation and processing of information related to single calls and
resource management.
SCCP and MTP protocols are used to implement the data link layer and layer
3 transport functions for carrying the call control and mobility management
signaling message son the BSS_MSC link.
Planning Tool
Loading of digital map data of the city on the planning tool, Model tuning for
proper prediction on the tool ,Nominal cell planning for the coverage
,frequency planning and interference study.
Effective isotropic radiated power is the total o/p power of Base station
Frequency planning is to be done for the GSM network for a given operator
with A set of GSM frequency band.Frequency reuse pattern is used for
capacity planning. To minimize frequency interference problems.
6) What are all the patterns available? How is frequency planning done on
planning tool?
Model tuning is done for any planning tool to obtain proper prediction
expected from planning tool as there will be difference in actual and
predicted data for planning tool. One of the model is Okarama Hatta Hatta
Model is used which considers the signal propagation losses.
Link budget analysis is used for the path balance between both uplink
(Transmitter) Downlink (Receiver) part of the network.
14) How is site selection done for planning and site acquisition?
15) What is optimization? What are the tools used for optimization?
Proper antenna orientation and tilts and antenna types can be used for
optimizing network.
17) How do we handle poor C/I, C/A, handover problems and blocking?
Checking proper neighbor list, changing frequency planning and proper no of
radio channels availability.
System information is from BTS sent to Mobile for the idle mode and
dedicated mode of the call for call management.
This is the report obtained in OMC for the performce of all BTS about traffic .
This is process of handover done by mobile in idle mode from selected cell to
another cell.
This is the signal strength measured in idle mode for selecting best serving
channel.