LECTURE 06 EENG405 Mobile Telecommunications Lecture 7& 8 - Introduction To Wireless Access Technogies

Download as pdf or txt
Download as pdf or txt
You are on page 1of 268

Lecture 1

Mobile Core Network Overview,


Convergence& All-IP architecture

EENG405 Mobile Telecommunications

Eng. M. Ndoora , 2023


Mobile Core Network Overview
GSM system overview
◼ The GSM system is a frequency- and time-division cellular system,
each physical channel is characterized by a carrier frequency and a
time slot number
◼ Cellular systems are designed to operate with groups of low-power
radios spread out over the geographical service area. Each group of
radios serve MSs presently located near them. The area served by
each group of radios is called a CELL
◼ Uplink and downlink signals for one user are assigned different
frequencies, this kind of technique is called Frequency Division Duplex
(FDD)
◼ Data for different users is conveyed in time intervals called slots ,
several slots make up a frame. This kind of technique is called Time
Division Multiple Access (TDMA)
GSM Development
1989 Standard Protocol for GSM take effect

1991 GSM system began to provide service in Europe(2G)

1992 System was named as Global System for


Mobile Communication

1994 Provide services for the whole world

1996 Micro Cell Technique is used in GSM system


GSM-GPRS Network Component
PSTN
MSC/VLR GMSC ISDN
GSM /GPRS BSS

BSC
MS HLR/AUC
BTS

PCU
S
BSC S
MS SMS system
7
BTS
GPRS Backbone Internet,
SGSN Intranet
GGSN

OMC CG BG

Other PLMN
BSS NSS
Mobile Station—MS
MS=ME+SIM

International Mobile Equipment Identity


(IMEI)
– Mobile Equipment

International Mobile Subscriber Identity (IMSI)


– Subscriber Identity Module
Subscriber Identity Module – SIM
◼ International Mobile Subscriber

Identity (IMSI)

◼ Temporary Mobile Subscriber Identity


SIM
(TMSI)

◼ Location Area Identity (LAI)

◼ Subscriber Authentication Key (Ki)


Base Station Subsystem – BSS

MS
◼ The Base Station
C
Controller – BSC
◼ The Base BS
Transceiver Station S TC/SM
– BTS
BSC
◼ The Trans-coder –
TC and Sub
BTS
multiplexer (SM)
Packet Control Unit-----PCU
MS
C
◼ Packet data
switching
◼ Bridge between BS
SGSN and BSC STC/SM GPRS
◼ Provide Pb and Gb Backbon
e
SGSN
interface BSC PCU

BTS
The Network Switching System

AUC
NSS HLR
OMC EIR
EC PSTN

MSC/VLR

Mobile-service Switching Center – MSC


Home Location Register – HLR
Visitor Location Register – VLR
Equipment Identity Register – EIR
Authentication Center – AUC BSS
Echo Cancellor – EC
Mobile-Service Switching Center – MSC
◼ Call Processing

◼ Operations and Maintenance Support

◼ Interface management

◼ Inter-network & Inter-working


Inter-network: communication between GSM network
and other network
Inter-working : communication between different
entities inside the GSM network
◼ Billing
Home Location Register – HLR

◼ Subscriber ID (IMSI and MSISDN)

◼ Current subscriber VLR (current location)

◼ Supplementary service information

◼ Subscriber status (registered/deregistered)

◼ Authentication key and AuC functionality


Visitor Location Register – VLR
◼ Mobile Status (IMSI attached / detached /
busy / idle etc.)

◼ Location Area Identity (LAI)

◼ Temporary Mobile Subscriber Identity (TMSI)

◼ Allocating the Roaming Number


Equipment Identity Register –
EIR
◼ White List
◼ Black List IMEI is Checked In White List
◼ Grey List
If NOT found
EIR focus on the
equipment , not the
subscriber!! IMEI is Checked in Black/Grey List
OMC Functional Architecture

Event/Alar Security
m Manageme
Manageme nt
nt MMI
OS DB
Fault Configuratio
Manageme n
nt Managemen
Performanc t
e
Manageme
nt
Service Area
Service Area
PLMN service area PLMN service area
PLMN service area
MSC service area... MSC service area...

Location area... Location area...


......
cell cell
LAI

MCC MNC LAC

Location Area Identification

The LAI is the international code for a location area.

MCC: Mobile Country Code,It consists of 3 digits .


For example: The MCC of Tanzania is “640"
MNC: Mobile Network Code,It consists of 2 digits .
For example: The MNC of Vodacom is "03"
LAC: Location Area Code,It is a two bytes hex code.
The value 0000 and FFFF is invalid.
For example: 640-03-0011
CGI
CGI: Cell Global Identification

The CGI is a unique international identification for a


cell
The format is LAI+CI

LAI: Location Area Identification

CI: Cell Identity. This code uses two bytes hex code to
identify the cells within an LAI.

For example : 640-03-0011-0001


BSIC
BSIC(Base Station Identification Color Code)

NCC BCC

BSIC

NCC: PLMN network color code. It comprises 3 bit. It


allows various neighboring PLMNs to be
distinguished.
BCC: BTS color code. It comprises 3 bit, used to
distinguish different cells assigned the same
frequency!
MSISDN

CC NDC SN
National (significant)
Mobile number
Mobile station international
ISDN number

CC: Country Code. For example: The CC of Tanzania is “255".


NDC: National Destination Code. For example: The NDC of
vodacomis 75 and 76.
SN: Subscriber Number. Format:H0 H1 H2 H3 ABCD
Example: 255-75-0666234
IMSI
Not more than 15 digits
3 digits 2 digits

MCC MNC MSIN


NMSI
IMSI

MCC: Mobile Country Code,It consists of 3 digits .


For example: The MCC of Tanzania is "640"。
MNC: Mobile Network Code,It consists of 2 digits .
For example: The MNC of Vodacom is "03"。
MSIN: Mobile Subscriber Identification Number. H1H2H3 S
ABCDEF
For example: 75-0666234
NMSI: National Mobile Subscriber Identification,MNC and MSIN
form it together.
For Example of IMSI : 640-03-75-0777001
TMSI
TMSI: Temporary Mobile Subscriber Identification)

◼ The TMSI is assigned only after successful


subscriber authentication.
◼ The VLR controls the allocation of new TMSI
numbers and notifies them to the HLR.
◼ TMSI is used to ensure that the identity of
the mobile subscriber on the air interface is
kept secret.
◼ The TMSI consists of 4 bytes( 8 HEX
numbers) and determined by the operator.
IMEI
IMEI: International Mobile Station Equipment Identification

TAC FAC SNR SP

IMEI

TAC: Type Approval Code, 6 bit, determined by the type


approval
center
FAC: Final Assembly Code, 2 bit, It is determined by the
manufacturer.
SNR: Serial number, 6 bits, It is issued by the manufacturer of the
MS. SP: 1 bit , Not used.
Check the IMEI in your MS : *#06#
UMTS R99 Network Architecture
Other PLMN
MSC/VLR GMSC PSTN,ISDN
GSM /GPRS BSS

BSC
BTS HLR/AUC

PCU SCE
S
RNC S
7 SMS
NodeB SCP
GPRS
backbone Internet,
UMTS SGSN Intranet
GGSN
UTRAN

CG BG

Other PLMN’s
RAN CN GPRS network
R99 CN Feature
◼ Core Network is split into CS domain and PS domain.
❑ CS domain is in charge of call control and mobility
management of circuit service.
◼ Call control: ISUP/TUP
◼ Mobility management: enhanced MAP
◼ Physical node:MSC,GMSC,VLR
❑ PS domain is in charge of session management and
mobility management of Packet service.
◼ There are some change from GPRS: interfaces, flows, some
functions
◼ Physical node: SGSN,GGSN,CG
◼ Transcoders is placed in CN side
◼ TFO: Tandem Free Operation
◼ Supporting inter-system handover (UMTS/GSM)
UMTS R4 Network Architecture
IP/ATM Backbone
Other PLMN
M M PSTN,ISDN
GSM /GPRS BSS G G
W Server
VMSC GMSC Server
W
BSC
BTS HLR/AUC

PCU SCE
S
RNC S
7 SMS
NodeB SCP
GPRS
backbone Internet,
UMTS SGSN Intranet
GGSN
UTRAN

CG BG

Other PLMN’s
RAN CN GPRS network
R4 CN Feature
◼ CS domain
❑ Control is separated from bearer,MSC is
split into MSC server and MGW

❑ Traffic bearer can be IP , ATM or TDM

❑ Signaling bearer can be IP or TDM

❑ TrFO: Transcoder Free Operation


Difference Between R99 and R4
CS domain evolution

SCP HLR SCP HLR


CAP Over TDM MAP Over TDM CAP Over TDM/IP MAP Over TDM/IP

TUP/ISUP
MSC TDM
MSC MSC TUP/ISUP/BICC MSC Server
ServerH.248 H.248

CS-MGW TDM/ATM/IP CS-MGW

RAN RAN RAN RAN RAN RAN

R9
R4
9
Notes: PS domain structure remain unchanged
Interfaces in R99 network

PSTN
MSC/VLR GMSC ISDN
GSM /GPRS BSS
A
BSC
BTS HLR/AUC
C/D/Gs
Iu-CS
PCU SCE
Gb S
RNC S
Gr/Gs/Gd/Ge
7 Gc SMS
NodeB Iu-PS
SCP
GPRS
backbone Internet,
UMTS SGSN Gi Intranet
GGSN
UTRAN Ga
CG BG
Gp
Other PLMN
RAN CN
Iu-CS Interface Protocol Stack
RNC MSC/VLR GMSC
I Iu-CS
PSTN
Node B u
b HLR/AuC

SS7 SCP
Control Plane User Plane
RANAP IuUP Iu-PS
SGSN GGSN
SCCP
GPRS
MTP3B backbone
SSCF-NNI
SSCOP CGF BG
AAL5 AAL2 Inter-PLMN
ATM

L1(PHY)
SS7 Interface Protocol Stack
RNC MSC/VLR GMSC
I
u PSTN
Node Bb
HLR/AuC
SS7
SCP
B
M C S SGSN GGSN
A A S I
P P T GPRS
A S
P+ U backbone
U
TCAP P P

SCCP
CGF BG
MTP3 Inter-PLMN

MTP2

MTP1
PS Domain Interface Protocol Stack

RNC MSC/VLR GMSC


I
u PSTN
Node Bb

Iu-PS HLR/AuC
SS7
Control Plane User Plane SCP
RANAP GTP-U
SGSN GGSN
SCCP
GPRS
MTP3B backbone

SSCF-NNI UDP Gn/Gp/Ga


SSCOP IP CGF BG
AAL5 AAL5 Inter-PLMN
G
T
P
(
G
T
P'
)
ATM
U
D
P
L1(PHY) I
P
L
2
(
M
A
C)
L
1
(
P
H
Y)
New Interfaces in R4
IP/ATM Backbone PSTN
M Nb M ISDN
GSM /GPRS BSS G Mc G
W Server GMSC Server
VMSC W
BSC
BTS Nc HLR/AUC

PCU SCE
S
RNC S
7 SMS
NodeB SCP
GPRS Internet,
backbone
UMTS SGSN Intranet
GGSN
UTRAN

CG BG

Other PLMN
RAN CN
Interfaces in R4 CS Domain
BICC/ISUP/TUP
MTP3 MTP3B M3UA
MTP2 SSCF/SSCOP SCTP
MTP1 AAL5/ATM IP

MSC GMS
Serve Nc C
r Serve H.248
Mc Mc r
SCTP UDP
IP
MTP3B
SSCF/SSCOP/AAL5

Nb
MGW MGW

RTP AAL2 Voice


UDP/IP ATM PCM
Wireless Intelligent Network (WIN)
Concept of Wireless Intelligent Network
◼ Wireless Intelligent Network (WIN) is a network in which the
functional entities of the Intelligent Network (IN) are introduced to
the mobile network to realize the intelligent control to mobile
calls.
◼ It is the combination of the current mobile network and the
intelligent network.
◼ The introduction of the mobile service switching point into the
mobile network has enabled the connection of the mobile network
at the lower layer with the intelligent network at the higher layer,
thus forming the wireless intelligent network.
◼ As a high layer service network of the mobile network, WIN can
create and realize all kinds of new mobile services rapidly,
conveniently, flexibly, economically and efficiently, facilitating the
customers to get the required information.
◼ The major characteristic of WIN is that it separates the switching
function from the control function of the network.
◼ It processes the intelligent call with the support of Signaling
System No.7 (SS7) network and large centralized database,
while the original exchange only performs the basic connection
functions.
Features of Wireless Intelligent Network
◼ Extensively using information processing technology
◼ Effectively using network resources
◼ Modularizing the network functions that can be used
repeatedly
◼ Using the reusable modular network function to generate and
implement a new service
◼ Network functions being flexibly distributed in physical
entities
◼ Portable network functions in a physical entity
◼ Providing standard communications between network
functions through the service-independent interfaces
◼ Service subscribers being able to control the service
properties defined by themselves
◼ Service users being able to control the service properties
defined by themselves
◼ Standardized management of service logic
Target of Wireless Intelligent Network
◼ WIN is aimed at providing the existing mobile network
with some additional abilities that facilitates the carriers to
provide new services.
◼ It is required that the newly-provided service should be
independent from the network, i.e., the service is
irrelevant to the equipment running in the mobile network
and does not care about who provides the equipment.
◼ The independent implementation of a service enables a
service provider to define his own service without relying
on the specific service products of the equipment vendor.
◼ The independent implementation of the network enables
a network operator to allocate the functions and
resources within his network and manage his network
effectively without relying on the specific network
implementation mode of an equipment vendor.
Intelligent Network Layer
Evolution and Development of Wireless
Intelligent Network
◼ The study on WIN was started as early as 1995.
◼ At first, there was no concrete standard protocol, and
different companies laid down their own standards and
have carried out a good deal of studies on such basis.
◼ In January, 1998, European Telecommunications
Standards Institute (ETSI) introduced Customised
Application for Mobile network Enhanced Logic (CAMEL)
in GSM Phase 2+. The version at that time is Phase 1.
◼ With the accomplishment of CAMEL Phase 1 in GSM
Phase 2+, the development of WIN has entered a new
phase.
◼ Thanks to the open interface provided by CAMEL Phase
1, the equipment from different manufacturers can
interconnect with each other.
Architecture of Wireless Intelligent Network
WIN is composed of

◼ Service Switching Point (SSP)

◼ Service Control Point (SCP)

◼ Intelligent Peripheral (IP)

◼ Service Management System (SMS)

◼ Service Creation Environment (SCE)


Service Switching Point (SSP)
◼ SSP connects the mobile network to IN, providing IN access
function (IN call detection).
◼ SSP contains the capability to detect requests for IN services
and communicate with SCP. It responds to the requirements
from SCP and enables SCP to affect the call flow with the
service logic.
◼ SSP contains Call Control Function (CCF) and Service
Switching Function (SSF). If there is no independent IP
established, SSP should also has part of Specialized Resource
Function (SRF).
◼ CCF is responsible for basic connection functions such as
receiving user calls, performing call setup and call holding etc.
SSF can receive and identify the intelligent service call and
report to SCP, meanwhile it will accept the instruction from
SCP as well.
◼ SSP is generally based on Mobile Switching Center (MSC) and
provided with the necessary software and hardware, as well as
signaling No.7 network interface.
Service Control Point (SCP)
◼ SCP is the core component of the intelligent network,
SCP stores user data and service logic.
◼ SCP is responsible for receiving the querying information
from SSP, querying the database, and encoding the
information in various ways.
◼ SCP initiates different service logic according to call
events reported from SSP, and sends call control
instructions to the corresponding SSP according to
service logic, that is the implementation of various IN
calls.
◼ All the service control functions provided by WIN are
concentrated in SCP.
◼ The communication between SCP and SSP is carried out
based on the standard interface protocols of WIN.
◼ SCP, which must be highly reliable, comprises
minicomputers and large real-time high-speed databases.
Intelligent Peripherals
◼ IP is the special resource to consist the intelligent
service.
◼ Usually it contains various voice manipulation
functions, like combining voice, playing recorded
announcements, receiving numbers sent in DTMF
(Dual Tone Multi-Frequency), performing voice
identification, and so on.
◼ As the standalone equipment or part of SSP, IP can
receive the control of SCP and perform the operation
specified by SCP service logic.
◼ If IP is set individually in the network, it can be shared
by other switches, which is a cost cutting solution.
◼ Meanwhile it is convenient for the uniform management
of voice resource and helpful for the deployment of
services whose voices are changed frequently.
Service Management System (SMS)
◼ SMS is the manager of WIN.
◼ It has the following functions: service logic
management, service data management,
user data management, system data
management and the management of daily
operation and maintenance.
◼ A new service logic created in SCE is
transferred to SMS, then loaded to SCP by
SMS to run the new service over the mobile
network.
Service Creation Environment (SCE)
◼ SCE has the function of creating new service logic
according to the requirement from users.
◼ SCE provides the service designer with the friendly
graphical editing interface.
◼ Customer use the various standard graphical
elements to design the new service logic and define
the relevant data.
◼ After the designing, the service should first pass the
strict verification and simulation, which is to ensure
that the new service will not bring any negative
influence to the existing services.
◼ After that, SCE will transfer the service logic to
SMS which will load it to SCP for running.
Creating and Loading a New Service
The procedures are described as follows:
◼ Design a new service.

◼ Transfer the designed service to SMS.

◼ Load the logic program of the new service to SCP according to


the instruction of system administrator.
◼ The customer begins to use the new service.
Mobile Cellular Network
Cellular Network Basics

• Cellular network is a radio-based technology; radio waves are


electromagnetic waves that antennas propagate
• Most signals are in the 850 MHz, 900 MHz, 1800 MHz, and 1900
MHz frequency bands

Cell phones operate in this frequency


range (note the logarithmic scale)
Cellular Network

• Base stations transmit to and receive from mobiles at the


assigned spectrum
– Multiple base stations use the same spectrum (spectral reuse)
• The service area of each base station is called a cell
• Each mobile terminal is typically served by the ‘closest’ base
stations
– Handoff when terminals move
Cellular Network Generations
• It is useful to think of cellular Network/telephony in
terms of generations:
– 0G: Briefcase-size mobile radio telephones
– 1G: Analog cellular telephony
– 2G: Digital cellular telephony
– 3G: High-speed digital cellular telephony (including video
telephony)
– 4G: IP-based “anytime, anywhere” voice, data, and
multimedia telephony at faster data rates than 3G
Evolution of Cellular Networks

1G 2G 2.5G 3G 4G
The Multiple Access Problem

• The base stations need to serve many mobile


terminals at the same time (both downlink
and uplink)
• All mobiles in the cell need to transmit to the
base station
• Interference among different senders and
receivers
• So we need multiple access scheme
Multiple Access Schemes

3 orthogonal Schemes:
• Frequency Division Multiple Access (FDMA)
• Time Division Multiple Access (TDMA)
• Code Division Multiple Access (CDMA)
2nd Generation(GSM)

10
Introduction

• Global System for Mobile communication or Groupe


Speciale Mobile (GSM) communication
– Initiated by European Commission
– Second-generation mobile cellular system
» Aimes at developing a Europe-wide
56 digital cellular system
– Created in 1982 to have a common European mobile
telephone standard that would formulate specifications for a
pan-European mobile cellular radio system operating at 900
MHz
– The main objective of GSM is to remove any incompatibility
among the systems by allowing the roaming phenomenon for
any cell phone
Introduction

– It also supports speed transmissions between MSs,


emergency calls, and digital data transmission
• Specific functions of different constituents are as
follows
– Base Station Controller (BSC): 57

– Mobile Switching Center (MSC):


– Authentication Center (AC):
– Equipment Identity Register (EIR):
– Home Location Register
GSM Services

• Voice, 3.1 kHz


• Short Message Service (SMS)
– 1985 GSM standard that allows messages of at most 160 chars. (incl.
spaces) to be sent between handsets and other stations
– Over 2.4 billion people use it; multi-billion $ industry
• General Packet Radio Service (GPRS)
– GSM upgrade that provides IP-based packet data transmission up to
270 kbps (for EDGE)
– Users can “simultaneously” make calls and send data
– GPRS provides “always on” Internet access and the Multimedia
Messaging Service (MMS) whereby users can send rich text, audio,
video messages to each other
– Performance degrades as number of users increase
– GPRS is an example of 2.5G telephony – 2G service similar to 3G
Time Division Multiple Access

Guard time – signal transmitted by mobile


terminals at different locations do no arrive
at the base station at the same time

• Time is divided into slots and only one mobile terminal transmits
during each slot
– Like during the lecture, only one can talk, but others may take the
floor in turn
• Each user is given a specific slot. No competition in cellular network
– Unlike Carrier Sensing Multiple Access (CSMA) in WiFi
GSM Channels
Downlink
Channels
Uplink

• Physical Channel: Each timeslot on a carrier is referred to as a


physical channel
• Logical Channel: Variety of information is transmitted
between the MS and BTS. Different types of logical channels:
– Traffic channel
– Control Channel
GSM Frequencies
• Originally designed on 900MHz range, now also
available on 800MHz, 1800MHz and 1900 MHz
ranges.
• Separate Uplink and Downlink frequencies
– One example channel on the 1800 MHz frequency band,
where RF carriers are space every 200 MHz
UPLINK FREQUENCIES DOWNLINK FREQUENCIES

1710 MHz 1785 MHz 1805 MHz 1880 MHz

UPLINK AND DOWNLINK FREQUENCY SEPARATED BY 95MHZ


Frequency Bands and Channels

– GSM has been allocated an operational frequency


from 890 MHz and 960 MHz
• MSs employ 890 MHz to 915 MHz
• BS operates in 935 MHz and 960 62MHz
– GSM follows FDMA and allows up to 124 MSs to
be serviced at the same time
• The frequency band of 25 MHz is divided into 124
frequency division multiplexing (FDM) channels, each
of 200 kHz (Fig. 10.9)
• A guard frame of 8.25 bits is used between any two
frames transmitted either by the BS or the MS
Frequency band used by GSM
GSM uses a variety of multiplexing techniques

– GSM uses a variety of multiplexing techniques to


create a collection of logical channels
– Three control channels are used for broadcasting
some information to all MSs 64
• Broadcast control channel (BCCH)
• Frequency correction channel (FCCH)
• Synchronization channel (SCH)
Channel in GSM
Cont.

– Three common control channels are used for


establishing links between the MS and the BS
• Random access channel (RACH):
– Used by the MS to transmit information
66
regarding the
requested dedicated channel from GSM
• Paging channel:
– Used by the BS to communicate with individual MSs in the cell
• Access grant channel:
– Used by the BS to send information about timing and
synchronization
Cont.

– Three dedicated control channels are used


• Slow associated control channel (SACCH):
• Stand-alone dedicated control channel (SDCCH):
• Fast associated control channel (FACCH):
67
Frames in GSM

– GSM system uses the TDMA scheme with a


4.615 – ms long frame
• Dividing into eight time slots each of 0.557 ms
• Each frame measured in terms of time is 156.25 bits
long, of which 8.25 period bits are
68
guard bits for
protection
• The 148 bits are used to transmit the information
• The frame contains 26 training bits allow the receiver to
synchronize itself
• Many such frames are combined to constitute
multiframes, superframes, and hyperframes
Frame structure of TDMA
GSM Architecture
GSM infrastructure

26
Mobile Station (MS)

• MS is the user’s handset and has two parts


• Mobile Equipment
– Radio equipment
– User interface
– Processing capability and memory required for various
tasks
• Call signalling
• Encryption
• SMS
– Equipment IMEI number
• Subscriber Identity Module
Subscriber Identity Module

• A small smart card


• Encryption codes needed to identify the subscriber
• Subscriber IMSI number
• Subscriber’s own information (telephone directory)
• Third party applications (banking etc.)
• Can also be used in other systems besides GSM, e.g., some
WLAN access points accept SIM based user authentication
Base Station Subsystem
• Transcoding Rate and Adaptation Unit (TRAU)
– Performs coding between the 64kbps PCM coding used in the
backbone network and the 16 kbps coding used for the Mobile Station
(MS)

• Base Station Controller (BSC)


– Controls the channel (time slot) allocation implemented by the BTSes
– Manages the handovers within BSS area
– Knows which mobile stations are within the cell and informs the
MSC/VLR about this

• Base Transceiver System (BTS)


– Controls several transmitters
– Each transmitter has 8 time slots, some used for signaling, on a
specific frequency
Network and Switching Subsystem
• The backbone of a GSM network is a telephone network with
additional cellular network capabilities
• Mobile Switching Center (MSC)
– An typical telephony exchange (ISDN exchange) which supports mobile
communications
– Visitor Location Register (VLR)
• A database, part of the MSC
• Contains the location of the active Mobile Stations
• Gateway Mobile Switching Center (GMSC)
– Links the system to PSTN and other operators
• Home Location Register (HLR)
– Contain subscriber information, including authentication information
in Authentication Center (AuC)
• Equipment Identity Register (EIR)
– International Mobile Station Equipment Identity (IMEI) codes for e.g.,
blacklisting stolen phones
Home Location Register

• One database per operator


• Contains all the permanent subscriber information
– MSISDN (Mobile Subscriber ISDN number) is the telephone
number of the subscriber
– International Mobile Subscriber Identity (IMSI) is a 15 digit code
used to identify the subscriber
• It incorporates a country code and operator code
– IMSI code is used to link the MSISDN number to the subscriber’s
SIM (Subscriber Identity Module)
– Charging information
– Services available to the customer
• Also the subscriber’s present Location Area Code, which
refers to the MSC, which can connect to the MS.
Other Systems

• Operations Support System


– The management network for the whole GSM network
– Usually vendor dependent
– Very loosely specified in the GSM standards
• Value added services
– Voice mail
– Call forwarding
– Group calls
• Short Message Service Center
– Stores and forwards the SMS messages
– Like an E-mail server
– Required to operate the SMS services
Location Updates

• The cells overlap and usually a mobile station


can ‘see’ several transceivers (BTSes)
• The MS monitors the identifier for the BSC
controlling the cells
• When the mobile station reaches a new BSC’s
area, it requests an location update
• The update is forwarded to the MSC, entered
into the VLR, the old BSC is notified and an
acknowledgement is passed back
Handoff (Handover)

• When a call is in process, the changes in location


need special processing
• Within a BSS, the BSC, which knows the current
radio link configuration (including feedbacks from
the MS), prepares an available channel in the new
BTS
• The MS is told to switch over to the new BTS
• This is called a hard handoff
– In a soft handoff, the MS is connected to two BTSes
simultaneously
Handoff in GSM

• Intracell/intra-BTS handoff
• Intercell/intra-BSC handoff
• Inter-BSC/intra-MSC handoff 80

• Inter-MSC handoff

Yschen, CSIE, CCU


Inter-MSC handoff

Yschen, CSIE, CCU


Roaming

• When a MS enters another operators network, it


can be allowed to use the services of this
operator
– Operator to operator agreements and contracts
– Higher billing
• The MS is identified by the information in the SIM
card and the identification request is forwarded
to the home operator
– The home HLR is updated to reflect the MS’s current
location
Format of IMSI

• International Mobile Subscriber Identity (IMSI)

83
Cont.

• Subscriber Identify Module (SIM)


• Every time the MS has to communicate with a BS, it
must correctly identify itself.
• A MS does this by storing the phone number, personal
84
identification number for the station, authentication
parameters, and so on in the SIM card
• Smart SIM cards have a flash memory
• The main advantage of SIM is that is supports roaming
with or without a cell phone, also called SIM roaming
• Mobile System ISDN (MSISDN)

Yschen, CSIE, CCU


Format of MSISDN

Yschen, CSIE, CCU


Cont.

– Location Area Identify (LAI)


• The GSM service area is usually divided into a
hierarchical structure that facilitates the system to
access any MS quickly
• Each PLMN is divided into many MSCs 86

• Each MSC typically contains a VLR to tell the system if a


particular cell phone is roaming
• If it is roaming, the VLR of the MSC in which the cell
phone is reflects the fact
• Each MSC is divided into many location areas (LAs)
• A location area is a cell or a group of cells and is useful
when the MS is roaming in a different cell but the same
LA
Yschen, CSIE, CCU
Cont.

• Since any LA has to be identified as the part of the


hierarchical structure
• The identifier should contain the country code, mobile
network code, and LA code
87

Yschen, CSIE, CCU


GSM layout

Yschen, CSIE, CCU


Format of IMSEI

– International MS Equipment Identity (IMSEI)

89
Format of MSRN

– MS Roaming Number (MSRN)

90
Layout, Planes, and Interfaces of GSM

Yschen, CSIE, CCU


Interface of GSM
Cont.
– The GSM system can be divided into five planes
• OAM
• CM
• MM 93

• RR
• Physical
Functional planes in GSM
Authentication
– Authentication is done with the help of a fixed network that is
used to compare the IMSI (International Mobile Subscriber
Identity) of the MS reliably

95

Yschen, CSIE, CCU


Authentication process in GSM

Yschen, CSIE, CCU


GSM BSS KPIs
GSM BSS KPIs

❑ Paging Success Rate


❑ SDCCH Availability
❑ SDCCH Congestion Rate
❑ Immediate Assignment Success Rate
❑ SDCCH Call Drop Rate
❑ TCH Availability 98
❑ TCH Congestion Rate
❑ TCH Assignment Success Rate
❑ TCH Call Drop Rate
❑ Handover Success Rate
❑ Success Rate of Call Setup
❑ Call Setup Delay
❑ Call Complete Success Rate
PAGING
SDCCH AVAILABILITY
SDCCH CONGESTION RATE
SDCCH CONGESTION RATE
SDCCH CONGESTION RATE
SDCCH CONGESTION RATE
SDCCH CONGESTION RATE
IMMEDIATE ASS SUCC RATE
IMMEDIATE ASS SUCC RATE
IMMEDIATE ASS SUCC RATE
IMMEDIATE ASS
IMMEDIATE ASS SUCC
SUCC RATE
RATE
IMMEDIATE ASS SUCC RATE
IMMEDIATE ASS SUCC RATE
IMMEDIATE ASS SUCC RATE
IMMEDIATE ASS SUCC RATE
IMMEDIATE
IMMEDIATE
ASS
ASS SUCC
SUCC RATE
RATE
IMMEDIATE ASS SUCC RATE
IMMEDIATE ASS SUCC RATE
3G /UMTS
3G Overview
• 3G is created by ITU-T and is called IMT-2000
Evolution from 2G
2G IS-95 GSM- IS-136 & PDC

GPRS
IS-95B
2.5G
HSCSD EDGE

Cdma2000-1xRTT W-CDMA
3G Cdma2000-1xEV,DV,DO EDGE
TD-SCDMA
Cdma2000-3xRTT
3GPP2 3GPP
Code Division Multiple Access
• Use of orthogonal codes to separate different transmissions
• Each symbol of bit is transmitted as a larger number of bits
using the user specific code – Spreading
– Bandwidth occupied by the signal is much larger than the information
transmission rate
– But all users use the same frequency band together

Orthogonal among users


Service Roadmap
Improved performance, decreasing cost of delivery

Broadband
3G-specific services take
in wide area
advantage of higher bandwidth
Video sharing
and/or real-time QoS
Video telephony
A number of mobile Real-time IP
Multitasking multimedia and games
services are bearer
WEB browsing Multicasting
independent in nature
Corporate data access
Streaming audio/video
MMS picture / video
xHTML browsing
Application downloading
E-mail
Voice & SMS Presence/location
Push-to-talk
Typical
average bit GSM GPRS EGPRS WCDMA HSDPA
rates (peak 9.6 171 473 2 1-10
rates
higher)
kbps kbps
CDMA
kbps Mbps Mbps

EVDO

EVDV
2000-
2000-
CDM

CDM
2000

A
1x

A
GSM Evolution to 3G
High Speed Circuit Switched Data
Dedicate up to 4 timeslots for data connection ~ 50 kbps
Good for real-time applications c.w. GPRS
Inefficient -> ties up resources, even when nothing sent
Not as popular as GPRS (many skipping HSCSD)

Enhanced Data Rates for Global Evolution


GSM
HSCSD Uses 8PSK modulation
9.6kbps (one timeslot) 3x improvement in data rate on short distances
GSM Data Can fall back to GMSK for greater distances
Also called CSD Combine with GPRS (EGPRS) ~ 384 kbps
Can also be combined with HSCSD
GSM GPRS
WCDMA
General Packet Radio Services
Data rates up to ~ 115 kbps EDGE
Max: 8 timeslots used as any one time
Packet switched; resources not tied up all the time
Contention based. Efficient, but variable delays
GSM / GPRS core network re-used by WCDMA (3G)
UMTS

• Universal Mobile Telecommunications System


(UMTS)
• UMTS is an upgrade from GSM via GPRS or EDGE
• The standardization work for UMTS is carried out
by Third Generation Partnership Project (3GPP)
• Data rates of UMTS are:
– 144 kbps for rural
– 384 kbps for urban outdoor
– 2048 kbps for indoor and low range outdoor
• Virtual Home Environment (VHE)
UMTS Frequency Spectrum

• UMTS Band
– 1900-2025 MHz and 2110-2200 MHz for 3G transmission
– In the US, 1710–1755 MHz and 2110–2155 MHz will be
used instead, as the 1900 MHz band was already used.
UMTS Architecture
Base Station
Network Subsystem
Mobile Station Subsystem Other Networks

MSC/ GMSC
BSC VLR PSTN
BTS
ME
SIM

EIR HLR AUC PLMN

RNS
GGSN
Node SGSN
RNC Internet
ME B
USIM

UTRAN
SD

Note: Interfaces have been omitted for clarity


purposes.
UMTS Network Architecture
• UMTS network architecture consists of three
domains
– Core Network (CN): Provide switching, routing and
transit for user traffic
– UMTS Terrestrial Radio Access Network (UTRAN):
Provides the air interface access method for user
equipment.
– User Equipment (UE): Terminals work as air interface
counterpart for base stations. The various identities
are: IMSI, TMSI, P-TMSI, TLLI, MSISDN, IMEI, IMEISV
UTRAN
• Wide band CDMA technology is selected for UTRAN air
interface
– WCDMA
– TD-SCDMA
• Base stations are referred to as Node-B and control
equipment for Node-B is called as Radio Network Controller
(RNC).
– Functions of Node-B are
• Air Interface Tx/Rx
• Modulation/Demodulation
– Functions of RNC are:
• Radio Resource Control
• Channel Allocation
• Power Control Settings
• Handover Control
• Ciphering
• Segmentation and reassembly
3.5G (HSPA)
High Speed Packet Access (HSPA) is an amalgamation of two mobile telephony
protocols, High Speed Downlink Packet Access (HSDPA) and High Speed Uplink
Packet Access (HSUPA), that extends and improves the performance of existing
WCDMA protocols
5.G introduces many new features that will enhance the UMTS technology in
future. 1xEV-DV already supports most of the features that will be provided in
3.5G. These include:
- Adaptive Modulation and Coding
- Fast Scheduling
- Backward compatibility with 3G
- Enhanced Air Interface
HSPA
ANALYSIS
(Challenges)

UZ 131
Outline
• Measurement Methodology
• General Impact of Mobility
• Mobility Impact on Bandwidth Sharing
• Mobility Impact in Transitional Region
• Conclusion

132
Measurement Routes

Type Average Highest Characteristics


Speed Speed

Trains 40 kmh 100 kmh Surface ground

Subways 30 kmh 80 kmh Underground

Self- 50 & 30 80 kmh Surface ground


driving kmh
Vehicles &
Buses
Ferries 80 kmh 90 kmh Sea, Surface ground

UZ 133
Measurement Route

Over 100 km in 3 months


UZ 134
Measurement Setup
• Two Servers:
– Lab & Data Center
• Three types of
evaluations:
– download only;
upload only;
simultaneous
download & upload.

UZ 135
General Impact of Mobility
• A large spread of HSDPA bit rates and signal
quality

UZ 136
Context
◼ Common View: Mobility is irrelevant, if not
detrimental, to the fairness in HSPA bandwidth sharing
among users

◼ Observation: The bandwidth sharing practice


in stationary HSPA environments is unfair. In
contrast, mobility surprisingly improves
fairness of bandwidth sharing (fairer).

UZ 137
Bandwidth Sharing among Users
• Mobility actually improves the fairness of
bandwidth sharing among users

UZ 138
Bandwidth Sharing among Users
• UE can hardly keep its dominancy under rapid
change of radio environment.
– Mobile nodes may see better signal quality at new
locations
• Cell to cell based scheduling algorithm prevent
unfairness from propagating

UZ 139
Context
Common View: Mobility affects all flows equally. And
TCP flows suffer more than UDP ones

Observation: TCP flows unexpectedly see much


better performance during mobility than UDP
flows.

UZ 140
Bandwidth Sharing among Traffic Flows

• TCP flows see better performance during


mobility

UZ 141
Bandwidth Sharing among Traffic Flows

• TCP traffic is much constrained and adaptive


to the channel condition, while UDP traffic
keeps pumping almost the same amount of
data regardless of the channel condition

UZ 142
Context
Common View: Handoffs are triggered in the
transitional region between cells and always result in a
better wireless connection

Observation: Nearly 30% of all handoffs, selection


of a base station with poorer signal quality can be
witnessed

UZ 143
Mobility Impact in
Transitional Regions
• throughput often
drops sharply, and
sometimes, as high
as 90% during
handoff period.

UZ 144
Mobility Impact in
Transitional Regions
• Ec/Io of the new
base stations are
statistically better
than the original
base stations by
10dBm.

• But almost 30% of


all the handoffs do
not end up with a
better base stations

UZ 145
Conclusion
• Mobility is a double edged sword
– Degrades HSPA services, e.g. throughput
– Improves fairness in bandwidth allocation among
users and traffic flows
• Communication characteristics in HSPA
transitional regions are very complicated

UZ 146
Drive Test ( Simple Example)
Tools For Tuning/Optimization & Drive Test
Processing
• TEMS Investigation 13.0 (software)
• Mapinfo (software)
• Magnetic Mouse GPS
• Mobile with TEMS software
• Mobile Charger
• Mobile Car Charger
• Mobile Car Holder
• CIG LIGHTER Adapter
• CIG LIGHTER Cable
• Ear-Phone
• TEMS Lisance Dongle
• Laptop
• Car Laptop Charger
• TEMS Mobile Data Cable
• Digital Camera
• BAFO Cable
TOO
LS
DRIVE TEST OVER ALL
VIEW
COLOR CONFIGURATION
• 1 ) GREEN FOR EXCELLENT
• 2 ) BLUE FOR GOOD
• 3 ) YELLOW FOR AVERAGE
• 4 ) RED OR DARK RED FOR BAD

• NOTE:- ONLY IN CASE OF RANGES


DRIVE TEST 2G (GSM)
• RX LEVEL SUB
• RX QUALITY SUB
• RX QUALITY FULL
• BCCH ARFCN
RX LEVEL SUB
(2G)
RX QUALITY SUB
(2G)
RX QUALITY FULL
(2G)
BCCH ARFCN
(2G)
DRIVE TEST 3G
• SAN CPICH RSCP_1
• AS CPICH RSCP_1
• SAN CPICH EC/NO_1
• AS CPICH EC/NO_1
• SAN SC_1
• AS SC_1
SAN CPICH RSCP_1
(3G)
AS CPICH RSCP_1
(3G)
SAN CPICH EC/NO_1
(3G)
AS CPICH EC/NO_1
(3G)
SAN SC_1
(3G)
AS SC_1
(3G)
4G (LTE) Overview
4G (LTE)
• LTE stands for Long Term Evolution
• Next Generation mobile broadband
technology
• Optimized for All-IP traffic
Advantages of
LTE
Comparison of LTE
Speed
Major LTE Radio Technogies
• Uses Orthogonal Frequency Division
Multiplexing (OFDM) for downlink
• Uses Single Carrier Frequency Division
Multiple Access (SC-FDMA) for uplink
• Uses Multi-input Multi-output(MIMO) for
enhanced throughput
• Reduced power consumption
• Higher RF power amplifier efficiency (less
battery power used by handsets)
LTE
Architecture
LTE vs UMTS
• Functional changes compared to the current
UMTS architecture
GSM/UMTS/LTE Inter-working Solution

Initial Phase deployment (backwards compatibility)


➢Data service only;
➢ Keep service continuity via GSM/UMTS network ;
➢ Avoid the impact on the GSM/UMTS network stability;

Expanding/Maturity phase Deployment


➢Voice service introduced;
➢ Load based mobility management;
➢ Service based mobility management;
GSM/UMTS/LTE Inter-working Solution –CSFB or SRVCC
CS Fallback IMS/SR-VCC Others
(Single Radio Voice Call Continuity):

➢LTE UE’s voice


➢ Some industry
service will be pushed ➢ LTE UE uses voice over IMS when
players are
back to 2G/3G CS being under LTE coverage;
investigating other
domain; ➢ Handover from LTE to 2G/3G CS
choices (e.g. P2P VoIP,
Sol ➢A handover procedure domain is triggered when UE is
VoLGA Forum);
utio from LTE to 2G/3G is leaving the LTE coverage (SR-VCC
n however there is no
performed in order to mechanism);
guarantee that it will be
allow the UE for ➢ Voice calls continue over 2G/3G
standardized by 3GPP
handling over 2G/3G CS domain;
network;
2G/3G/4G Parameters
Signaling
SS7
• SS7 (Signalling System No. 7) was developed to call management and service signalling requirements of the digital
networks based on the full duplex channels.

• In general, different variants are developed all over the world for SS7 where, North American version is called CCIS7,
while European version is called CCITT SS7, even though there is one version defined by ITU-T in its Q700 series.

• In SS7 network structure, the nodes are called signalling points, while the connection between those nodes is called
signalling links.

• In SS7 networks Signalling Transfer Points (STPs) are introduced to relay and route the messages between signalling
points. SS7 has point to point architecture with one to one physical correspondence between two signalling points.

• SS7 structure initially developed to have compatibility with OSI (Open Systems Interconnection) model as well.

• Message Transfer Part (MTP) 1 to 3 used in SS7 are similar to OSI first 3 layers, while SCCP (Signalling Connection Control
Protocol) in SS7 protocol provides the connectionless or connection oriented communication between signalling points.
Common Channel Signaling System No.7(SS7)

The SS7 network and protocol are used for:


• Basic call setup, management, and tear down
• Wireless services such as personal
communications services (PCS), wireless
roaming, and mobile subscriber authentication
• Local number portability (LNP)
• Toll-free (800/888) and toll (900) wireline
services
• Enhanced call features such as call forwarding,
calling party name/number display, and three-
way calling
• Efficient and secure worldwide
telecommunications
• SMS (Short Message Service)
SS7 Signaling between Exchange
SS7 Architecture
Signaling Point (SP)
SS7 and SIGTRAN
Types of SS7 Links
SS7 Protocol Stack compared with the OSI model
Diameter
• Diameter protocol was derived from RADIUS (Remote Authentication Dial In User Service) protocol with a number of
improvements. This protocol is used widely in 3GPP Release 5 onwards, where there is a need for AAA services.

• Emerging new technologies in communication that have been built on total IP networks have shown an increased
requirement for access control mechanisms more than ever due to security concerns. Therefore, Diameter protocol was
developed as a framework for future AAA services with enhancements to existing RADIUS protocol. Diameter protocol
was designed as peer to peer architecture even though, it looks like a server client protocol in the implementation. As
per the Diameter protocol there is a node called diameter agent, which does either message relay, proxy, redirecting or
translate function. Since Diameter protocol uses synchronous message exchange format, there are specific responses
for each request message. It uses Attribute Value-Pairs (AVPs) to transfer these messages between nodes. Diameter uses
IP networks as its medium, and runs on top of TCP (Transport Control Protocol) or SCTP (Signalling Control Transport
Protocol), where it can have more reliable communication.
• Diameter vs SS7

• Diameter and SS7 are signalling protocols generally used in

telecommunication systems.

• Diameter is highly used in 3GPP latest releases for AAA services

(Authentication, Authorization and Accounting), while SS7 was initially used

with PSTN and GSM networks for digital signaling between different nodes

for call management and other services management.

• Diameter protocol run over the IP network, while SS7 can be used in digital

channels such as on E1 based TDM (Time Division Multiplexing) networks

directly.
Signaling Security in Telecom SS7/SIGTRAN/Diameter/5G
• Diameter vs SS7
• While SS7 was the foundation for signaling in
2G/3G circuit switch networks, Diameter has
• Diameter and SS7 are signalling protocols generally used in
been introduced for 4G LTE and VoLTE packet telecommunication systems.

networks and IP Multimedia Subsystem (IMS) • Diameter is highly used in 3GPP latest releases for AAA services

based systems, and is key to enabling new (Authentication, Authorization and Accounting), while SS7 was initially used

with PSTN and GSM networks for digital signaling between different nodes
revenue-generating IP services.
for call management and other services management.

• Diameter protocol run over the IP network, while SS7 can be used in digital

channels such as on E1 based TDM (Time Division Multiplexing) networks

directly.
SIGTRAN (Signaling Transport Working Group)

• SIGTRAN (Signaling Transport Working Group) is a group that pertains to the IETF (Internet Engineering Task Force) and is
dedicated to studying signaling information transport over IP networks. It has developed a family of protocols that provide a
more reliable service for SS7, being actually an extension of the SS7 family of protocols.

• SIGTRAN handles the same applications and call management functions performed by the SS7. However, SIGTRAN uses the IP
(Internet Protocol) and SCTP (Stream Control Transmission Protocol) transport, instead of TCP or UDP, mainly due to security
issues.

• SCTP is responsible for carrying the PSTN signaling information over the IP and for the reliable transfer of messages between
its users.

• The way SIGTRAN works is that it essentially refers to an entity called media gateway.

• The media gateway works as an interface between different media formats across public and data networks, and it also
connects the public analog network to a network of data packets.
Considerations on Diameter

• Diameter is derived from RADIUS (Remote


Authentication Dial-In User Service) and provides
an authentication, authorization, and accounting
protocol for computer networks
• It is a purely IP based protocol
5G Core NGN
Challenges
Ultra high throughput

Ultra-large connection

Ultra-low latency
5G Highlights
• In the World Radio Communication Conference 2015 hold in Geneva,
Switzerland, ITU-R officially approved three resolutions to facilitate
the future 5G research process and formally determined the name
of 5G is "IMT-2020“.
• With the launch and implementation of the ITU 5G plan, the world
has accelerated its pace of 5G network development.
5G core(5GC) /Next Generation Core(NGC)
architecture
The primary Network Functions (NFs) of 5G core and their capabilities as they are defined in the standards
process today are as below:

Authentication Server Function (AUSF): This acts as an authentication server. It contains mainly the EAP
authentication server functionality and acts as storage for keys and provides keying material to the requester
NF.

Access and Mobility Management Function (AMF)

It carries out termination of NAS signaling, NAS ciphering & integrity protection, registration management,
connection management, mobility management, access authentication and authorization, security context
management. The AMF also includes the Network Slice Selection Function (NSSF) and acts as the termination
point for RAN CP interfaces (N2).

Session Management Function (SMF)

It carries out session management (session establishment, modification and release), UE IP address allocation
& management, DHCP functions, termination of NAS signaling related to session management, DL data
notification and traffic steering configuration for UPF for proper traffic routing.
User Plane Function (UPF)
It carries out packet routing & forwarding, packet inspection, QoS handling, acts as external PDU session point
of interconnect to Data Network (DN), and is an anchor point for intra- & inter-RAT mobility.
Network Exposure Function (NEF)

It supports exposure of capabilities and events, secure provision of information from external application to
3GPP network and translation of internal/external information. It acts as an API gateway that allows external
users, such as enterprises or partner operators, the ability to monitor, provision and enforce application
policy, for users inside the operator network. Thus, it
a. Provides security when services or Application Functions (AF) access 5G Core nodes
b. Acts as a proxy, or API aggregation point, or translator into the Core Network

vNF Repository Function (NRF)


The network repository function (NRF) discovers network function instances. When it receives an NF discovery
request from a NF instance, it provides the discovered NF instances. It is not present in 4G. It
maintains/supports a. Profiles of Network Function (NF) instances and their supported services
within the network
b. Service-Based Interfaces, Management & Maintenance

Policy Control Function (PCF)


It carries out unified policy framework, providing policy rules to CP functions, access subscription information
for policy decisions in UDR. This provides a policy framework incorporating network slicing, roaming and
mobility management. It has similarities with the existing Policy and Charging Rules Function - PCRF of 4G.
Unified Data Management (UDM)

It stores subscriber data and profiles and carries out generation of Authentication and Key Agreement
(AKA) credentials, user identification handling, access authorization, subscription management.

Application Functions (AF)


The application function (AF) resembles an application server that can interact with the other control-
plane NFs. AFs can exist for different application services, and can be owned by the network operator or
by trusted third parties. For instance, the AF of an over-the-top application provider can influence routing,
steering its traffic towards its external edge servers. For services considered to be trusted by the operator,
the AF can access Network Functions directly whereas untrusted or third-party AFs would access the
Network Functions through the NEF.

Data Network (DN)


This refers to the external data network through which operator services, 3rd party services etc. can be
accessed.
5G Networking Scenario
Applications and the Network requirements in
Emerging Vertical Industries
5GC(5G Next Generation Core) vs EPC (Evolved Packet Core)
Design Principles of 5G Core
• Service Based Architecture (SBA),
• network slicing,
• mobile edge computing (MEC),
• cloud native architecture,
• support for AI/ML that bring flexibility,
• easy integration with third party software,
• easy provision of services belonging to different verticals,
• improved QOS.
Service Oriented Core Network Architecture
Why Network Slicing is Required in 5G?
Through Slicing to Meet Diversified Business Requirements
CUPS Improves User Experience and Network Efficiency
MEC (Mobile Edge Computing)
H/W: Microwave link Design Process
describe using the process flowchart diagram below the steps involved in a digital microwave radio Link design
process
Key Technologies

5G key technologies:
• High rate: Large bandwidth, massive MIMO (multiplexing), high-order modulation, and
LDPC code
• High spectral efficiency: F-OFDM, flexible frame structure
• Coverage enhancement: SUL (uplink and downlink decoupling) and Massive MIMO
(beamforming)
• Low latency: CUDU separation and self-contained timeslot

Low-Density Parity Check (LDPC) codes represent a class of error correcting codes that may be
employed for providing error correction of transmission errors in communication systems. Using
LDPC codes, channel capacities that are close to the theoretical Shannon Limit can be achieved
03

5G TECHNICAL DEPLOYMENT
2G to 5G DEPLOYMENT
Deployment Strategy
5G NSA( Non StandAlone)
• eMBB is supported.
• LTE is the anchor point, and the 4G core
network is reused to quickly introduce 5G
NR.
• The 5G is overlaid on the 4G network
without providing continuous coverage.
5G SA ( StandAlone)
• Supports eMBB/uRLLC/mMTC and network
slicing.
• 5G core needs to be build.
• High requirements for continuous
coverage of 5G

Full 5G capabilities are realised on 5G SA deployment, with 5G NSA the deployment is quicker and cost effective
5G Core Network Structure
5G network consists of the following
components:
• Wireless network: NR (New RAN)
• Core network: NGC (Next Generation Core

5G wireless network interfaces include:


• Xn
• NG-C (control panel)
• NG-U (user plane)
• Uu (radio air interface
04

WHY 5G
Technical Pros

5G network architecture
• Networking mode: NSA (non standalone networking) and SA
(standalone networking)
• Features of the core network architecture: CUPS (separation of the
control plane and user plane), native cloud, service-oriented
architecture, and network slicing
• Wireless network: DRAN –> CRAN –> Cloud RAN evolution
Bearer network: L3 sink

Key

Fill
Partially
ed
Filled
Vac
ant
5G Wireless Deployment Stages
5G Spectrum-Sub 6G & mm Wave

5G Frequency Range (FR)


defined in 3GPP:
• FR1: Sub6G Hz, include: sub
3G Hz and C-band
• FR2: mm Wave, 5G
extended spectrum
resources
Filtered OFDM for Low Latency Wireless Communications
• The fifth generation new radio (5G-NR) system design is aimed to have ultra-large transmission rate,
massive capacity, massive device connectivity, enhanced mobile broadband (eMBB) services, and ultra-
reliable low communication latency (URLLC) services.
• To support the various challenges and specifications, new wireless communication technologies including
new notorious waveforms, forward error correction codes (FEC), non-orthogonal waveforms as well as
massive multiple input multiple output (MIMO) antenna schemes have been introduced to aid the progress
of pliable 5G air interface system design.
• Cyclic prefix based orthogonal frequency division multiplexing (CP-OFDM) has been broadly selected in
4G-OFDM based long term evaluation(LTE), Wi-Fi, and other mobile communications due to the benefit of
high spectral efficiency, ease of development and easy to integrate with MIMO systems, etc. However, the
conventional CP-OFDM technology has some drawbacks, such as high out of band (OOB) emission leakage,
an exact requirement of synchronization, and a limited number of CP lengths.
• Filtered OFDM (FOFDM) is a flexible foundational waveform by applying sub-band filtering on existing
CP-OFDM which can support the needs of the waveform for 5G air interface.
• a spectrally efficient waveform called polar coded filtered OFDM (PC-FOFDM) is proposed to fulfil these
requirements for high data rate ultra-reliable low latency communications. Several papers are there that
investigate the bit error rate (BER) performance of PC-FOFDM scheme over additive white Gaussian noise
(AWGN) channel and compares the results with PC-OFDM.
• The simulation results show that the PC-FOFDM scheme outperforms PC-OFDM in terms of spectrum
efficiency, BER performance, and error vector magnitude (EVM).
06

6G
•The next generation telecom technology (6G) is said
to be 50 times faster than 5G and is expected to be
commercially launched between 2028-2030.
• 6G (sixth-generation wireless) is the successor to 5G cellular technology.

• It will be able to use higher frequencies than 5G networks and provide


substantially higher capacity and much lower latency (delay).

• One of the goals of 6G internet will be to support one microsecond-latency


communication (delay of one-microsecond in communication).
• This is 1,000 times faster - or 1/1000th the latency - than one millisecond
throughput.
• It seeks to utilize the terahertz band of frequency which is currently unutilized.

• Terahertz waves fall between infrared waves and microwaves on the


electromagnetic spectrum.
• These waves are extremely tiny and fragile, but there's a huge amount of
free spectrum up there that would allow for spectacular data rates.
At this stage, every detail of 6G is still in its early stage and several key technologies will
mark 6G.

The wide applications of ICT, such as IoT, AI, blockchain technology, XR (Extended Reality)
and VR (Virtual Reality), has created the emergence of 6G technology.

On the basis of 5G technique, 6G will put profound impact over ubiquitous connectivity,
holographic connectivity, deep connectivity and intelligent
connectivity.

Notably, research fraternity should focus on challenges and issues of 6G. They need to
explore various alternatives to meet desired parameters of 6G. Thus, there are many
potential challenges to be envisioned.
5G vs 6G
6G Technology
04

WHY 6G
Significance:
•More facilitation:

• The 6G technology market is expected to facilitate large improvements in imaging, presence technology
and location awareness.
• 6G's higher frequencies will enable much faster sampling rates, in addition to providing significantly better
throughput and higher data rates.
•Advancement in Wireless sensing technology:

• The combination of sub-mm waves (e.g., wavelengths smaller than one millimeter) and frequency
selectivity to determine relative electromagnetic absorption rates could potentially lead to significant
advances in wireless sensing technology.
•Emergence of Digital Capabilities:
• It will see the emergence of simple, easy-to-wear-and-carry devices with a huge set of digital capabilities.
• This will help the paramedics, educators and agro-technicians to jumpstart the village ecosystems with
little or limited need for on-site presence of doctors, professors and agro-experts.
•Optimising mass public transportation:

• Such an enabling set of technologies will bring manifold utilisation of scarce rail, air and road networks
and make mass transportation far more efficient; Artificial Intelligence (AI) and massively parallel
computing architectures will help solve transportation and scheduling operations research problems.
Challenges:
Maintaining Protection Mechanisms:
The key technical challenges are energy efficiency, avoiding signal attenuation due to obstructions and water droplets in the
air, and, of course, maintaining end-to-end trust through robust cyber security and data protection mechanisms.

Adoption of New Models:


Need innovations in antenna design, miniaturisation, edge cloud and distributed AI models. In addition, we need to ensure
end-to-end security and privacy by design, instead of as an afterthought.

Availability of Semiconductor:
We don't have semiconducting materials that can use multi-THz frequencies. Getting any kind of range out of those
frequencies may require enormous arrays of extremely tiny antennas.

Complex Design for Carrier Wave:


Water vapor in the atmosphere blocks and reflects THz waves, so mathematicians will have to design models that allow
data to take very complex routes to its destination.

You might also like