LECTURE 06 EENG405 Mobile Telecommunications Lecture 7& 8 - Introduction To Wireless Access Technogies
LECTURE 06 EENG405 Mobile Telecommunications Lecture 7& 8 - Introduction To Wireless Access Technogies
LECTURE 06 EENG405 Mobile Telecommunications Lecture 7& 8 - Introduction To Wireless Access Technogies
BSC
MS HLR/AUC
BTS
PCU
S
BSC S
MS SMS system
7
BTS
GPRS Backbone Internet,
SGSN Intranet
GGSN
OMC CG BG
Other PLMN
BSS NSS
Mobile Station—MS
MS=ME+SIM
Identity (IMSI)
MS
◼ The Base Station
C
Controller – BSC
◼ The Base BS
Transceiver Station S TC/SM
– BTS
BSC
◼ The Trans-coder –
TC and Sub
BTS
multiplexer (SM)
Packet Control Unit-----PCU
MS
C
◼ Packet data
switching
◼ Bridge between BS
SGSN and BSC STC/SM GPRS
◼ Provide Pb and Gb Backbon
e
SGSN
interface BSC PCU
BTS
The Network Switching System
AUC
NSS HLR
OMC EIR
EC PSTN
MSC/VLR
◼ Interface management
Event/Alar Security
m Manageme
Manageme nt
nt MMI
OS DB
Fault Configuratio
Manageme n
nt Managemen
Performanc t
e
Manageme
nt
Service Area
Service Area
PLMN service area PLMN service area
PLMN service area
MSC service area... MSC service area...
CI: Cell Identity. This code uses two bytes hex code to
identify the cells within an LAI.
NCC BCC
BSIC
CC NDC SN
National (significant)
Mobile number
Mobile station international
ISDN number
IMEI
BSC
BTS HLR/AUC
PCU SCE
S
RNC S
7 SMS
NodeB SCP
GPRS
backbone Internet,
UMTS SGSN Intranet
GGSN
UTRAN
CG BG
Other PLMN’s
RAN CN GPRS network
R99 CN Feature
◼ Core Network is split into CS domain and PS domain.
❑ CS domain is in charge of call control and mobility
management of circuit service.
◼ Call control: ISUP/TUP
◼ Mobility management: enhanced MAP
◼ Physical node:MSC,GMSC,VLR
❑ PS domain is in charge of session management and
mobility management of Packet service.
◼ There are some change from GPRS: interfaces, flows, some
functions
◼ Physical node: SGSN,GGSN,CG
◼ Transcoders is placed in CN side
◼ TFO: Tandem Free Operation
◼ Supporting inter-system handover (UMTS/GSM)
UMTS R4 Network Architecture
IP/ATM Backbone
Other PLMN
M M PSTN,ISDN
GSM /GPRS BSS G G
W Server
VMSC GMSC Server
W
BSC
BTS HLR/AUC
PCU SCE
S
RNC S
7 SMS
NodeB SCP
GPRS
backbone Internet,
UMTS SGSN Intranet
GGSN
UTRAN
CG BG
Other PLMN’s
RAN CN GPRS network
R4 CN Feature
◼ CS domain
❑ Control is separated from bearer,MSC is
split into MSC server and MGW
TUP/ISUP
MSC TDM
MSC MSC TUP/ISUP/BICC MSC Server
ServerH.248 H.248
R9
R4
9
Notes: PS domain structure remain unchanged
Interfaces in R99 network
PSTN
MSC/VLR GMSC ISDN
GSM /GPRS BSS
A
BSC
BTS HLR/AUC
C/D/Gs
Iu-CS
PCU SCE
Gb S
RNC S
Gr/Gs/Gd/Ge
7 Gc SMS
NodeB Iu-PS
SCP
GPRS
backbone Internet,
UMTS SGSN Gi Intranet
GGSN
UTRAN Ga
CG BG
Gp
Other PLMN
RAN CN
Iu-CS Interface Protocol Stack
RNC MSC/VLR GMSC
I Iu-CS
PSTN
Node B u
b HLR/AuC
SS7 SCP
Control Plane User Plane
RANAP IuUP Iu-PS
SGSN GGSN
SCCP
GPRS
MTP3B backbone
SSCF-NNI
SSCOP CGF BG
AAL5 AAL2 Inter-PLMN
ATM
L1(PHY)
SS7 Interface Protocol Stack
RNC MSC/VLR GMSC
I
u PSTN
Node Bb
HLR/AuC
SS7
SCP
B
M C S SGSN GGSN
A A S I
P P T GPRS
A S
P+ U backbone
U
TCAP P P
SCCP
CGF BG
MTP3 Inter-PLMN
MTP2
MTP1
PS Domain Interface Protocol Stack
Iu-PS HLR/AuC
SS7
Control Plane User Plane SCP
RANAP GTP-U
SGSN GGSN
SCCP
GPRS
MTP3B backbone
PCU SCE
S
RNC S
7 SMS
NodeB SCP
GPRS Internet,
backbone
UMTS SGSN Intranet
GGSN
UTRAN
CG BG
Other PLMN
RAN CN
Interfaces in R4 CS Domain
BICC/ISUP/TUP
MTP3 MTP3B M3UA
MTP2 SSCF/SSCOP SCTP
MTP1 AAL5/ATM IP
MSC GMS
Serve Nc C
r Serve H.248
Mc Mc r
SCTP UDP
IP
MTP3B
SSCF/SSCOP/AAL5
Nb
MGW MGW
1G 2G 2.5G 3G 4G
The Multiple Access Problem
3 orthogonal Schemes:
• Frequency Division Multiple Access (FDMA)
• Time Division Multiple Access (TDMA)
• Code Division Multiple Access (CDMA)
2nd Generation(GSM)
10
Introduction
• Time is divided into slots and only one mobile terminal transmits
during each slot
– Like during the lecture, only one can talk, but others may take the
floor in turn
• Each user is given a specific slot. No competition in cellular network
– Unlike Carrier Sensing Multiple Access (CSMA) in WiFi
GSM Channels
Downlink
Channels
Uplink
26
Mobile Station (MS)
• Intracell/intra-BTS handoff
• Intercell/intra-BSC handoff
• Inter-BSC/intra-MSC handoff 80
• Inter-MSC handoff
83
Cont.
89
Format of MSRN
90
Layout, Planes, and Interfaces of GSM
• RR
• Physical
Functional planes in GSM
Authentication
– Authentication is done with the help of a fixed network that is
used to compare the IMSI (International Mobile Subscriber
Identity) of the MS reliably
95
GPRS
IS-95B
2.5G
HSCSD EDGE
Cdma2000-1xRTT W-CDMA
3G Cdma2000-1xEV,DV,DO EDGE
TD-SCDMA
Cdma2000-3xRTT
3GPP2 3GPP
Code Division Multiple Access
• Use of orthogonal codes to separate different transmissions
• Each symbol of bit is transmitted as a larger number of bits
using the user specific code – Spreading
– Bandwidth occupied by the signal is much larger than the information
transmission rate
– But all users use the same frequency band together
Broadband
3G-specific services take
in wide area
advantage of higher bandwidth
Video sharing
and/or real-time QoS
Video telephony
A number of mobile Real-time IP
Multitasking multimedia and games
services are bearer
WEB browsing Multicasting
independent in nature
Corporate data access
Streaming audio/video
MMS picture / video
xHTML browsing
Application downloading
E-mail
Voice & SMS Presence/location
Push-to-talk
Typical
average bit GSM GPRS EGPRS WCDMA HSDPA
rates (peak 9.6 171 473 2 1-10
rates
higher)
kbps kbps
CDMA
kbps Mbps Mbps
EVDO
EVDV
2000-
2000-
CDM
CDM
2000
A
1x
A
GSM Evolution to 3G
High Speed Circuit Switched Data
Dedicate up to 4 timeslots for data connection ~ 50 kbps
Good for real-time applications c.w. GPRS
Inefficient -> ties up resources, even when nothing sent
Not as popular as GPRS (many skipping HSCSD)
• UMTS Band
– 1900-2025 MHz and 2110-2200 MHz for 3G transmission
– In the US, 1710–1755 MHz and 2110–2155 MHz will be
used instead, as the 1900 MHz band was already used.
UMTS Architecture
Base Station
Network Subsystem
Mobile Station Subsystem Other Networks
MSC/ GMSC
BSC VLR PSTN
BTS
ME
SIM
RNS
GGSN
Node SGSN
RNC Internet
ME B
USIM
UTRAN
SD
UZ 131
Outline
• Measurement Methodology
• General Impact of Mobility
• Mobility Impact on Bandwidth Sharing
• Mobility Impact in Transitional Region
• Conclusion
132
Measurement Routes
UZ 133
Measurement Route
UZ 135
General Impact of Mobility
• A large spread of HSDPA bit rates and signal
quality
UZ 136
Context
◼ Common View: Mobility is irrelevant, if not
detrimental, to the fairness in HSPA bandwidth sharing
among users
UZ 137
Bandwidth Sharing among Users
• Mobility actually improves the fairness of
bandwidth sharing among users
UZ 138
Bandwidth Sharing among Users
• UE can hardly keep its dominancy under rapid
change of radio environment.
– Mobile nodes may see better signal quality at new
locations
• Cell to cell based scheduling algorithm prevent
unfairness from propagating
UZ 139
Context
Common View: Mobility affects all flows equally. And
TCP flows suffer more than UDP ones
UZ 140
Bandwidth Sharing among Traffic Flows
UZ 141
Bandwidth Sharing among Traffic Flows
UZ 142
Context
Common View: Handoffs are triggered in the
transitional region between cells and always result in a
better wireless connection
UZ 143
Mobility Impact in
Transitional Regions
• throughput often
drops sharply, and
sometimes, as high
as 90% during
handoff period.
UZ 144
Mobility Impact in
Transitional Regions
• Ec/Io of the new
base stations are
statistically better
than the original
base stations by
10dBm.
UZ 145
Conclusion
• Mobility is a double edged sword
– Degrades HSPA services, e.g. throughput
– Improves fairness in bandwidth allocation among
users and traffic flows
• Communication characteristics in HSPA
transitional regions are very complicated
UZ 146
Drive Test ( Simple Example)
Tools For Tuning/Optimization & Drive Test
Processing
• TEMS Investigation 13.0 (software)
• Mapinfo (software)
• Magnetic Mouse GPS
• Mobile with TEMS software
• Mobile Charger
• Mobile Car Charger
• Mobile Car Holder
• CIG LIGHTER Adapter
• CIG LIGHTER Cable
• Ear-Phone
• TEMS Lisance Dongle
• Laptop
• Car Laptop Charger
• TEMS Mobile Data Cable
• Digital Camera
• BAFO Cable
TOO
LS
DRIVE TEST OVER ALL
VIEW
COLOR CONFIGURATION
• 1 ) GREEN FOR EXCELLENT
• 2 ) BLUE FOR GOOD
• 3 ) YELLOW FOR AVERAGE
• 4 ) RED OR DARK RED FOR BAD
• In general, different variants are developed all over the world for SS7 where, North American version is called CCIS7,
while European version is called CCITT SS7, even though there is one version defined by ITU-T in its Q700 series.
• In SS7 network structure, the nodes are called signalling points, while the connection between those nodes is called
signalling links.
• In SS7 networks Signalling Transfer Points (STPs) are introduced to relay and route the messages between signalling
points. SS7 has point to point architecture with one to one physical correspondence between two signalling points.
• SS7 structure initially developed to have compatibility with OSI (Open Systems Interconnection) model as well.
• Message Transfer Part (MTP) 1 to 3 used in SS7 are similar to OSI first 3 layers, while SCCP (Signalling Connection Control
Protocol) in SS7 protocol provides the connectionless or connection oriented communication between signalling points.
Common Channel Signaling System No.7(SS7)
• Emerging new technologies in communication that have been built on total IP networks have shown an increased
requirement for access control mechanisms more than ever due to security concerns. Therefore, Diameter protocol was
developed as a framework for future AAA services with enhancements to existing RADIUS protocol. Diameter protocol
was designed as peer to peer architecture even though, it looks like a server client protocol in the implementation. As
per the Diameter protocol there is a node called diameter agent, which does either message relay, proxy, redirecting or
translate function. Since Diameter protocol uses synchronous message exchange format, there are specific responses
for each request message. It uses Attribute Value-Pairs (AVPs) to transfer these messages between nodes. Diameter uses
IP networks as its medium, and runs on top of TCP (Transport Control Protocol) or SCTP (Signalling Control Transport
Protocol), where it can have more reliable communication.
• Diameter vs SS7
telecommunication systems.
with PSTN and GSM networks for digital signaling between different nodes
• Diameter protocol run over the IP network, while SS7 can be used in digital
directly.
Signaling Security in Telecom SS7/SIGTRAN/Diameter/5G
• Diameter vs SS7
• While SS7 was the foundation for signaling in
2G/3G circuit switch networks, Diameter has
• Diameter and SS7 are signalling protocols generally used in
been introduced for 4G LTE and VoLTE packet telecommunication systems.
networks and IP Multimedia Subsystem (IMS) • Diameter is highly used in 3GPP latest releases for AAA services
based systems, and is key to enabling new (Authentication, Authorization and Accounting), while SS7 was initially used
with PSTN and GSM networks for digital signaling between different nodes
revenue-generating IP services.
for call management and other services management.
• Diameter protocol run over the IP network, while SS7 can be used in digital
directly.
SIGTRAN (Signaling Transport Working Group)
• SIGTRAN (Signaling Transport Working Group) is a group that pertains to the IETF (Internet Engineering Task Force) and is
dedicated to studying signaling information transport over IP networks. It has developed a family of protocols that provide a
more reliable service for SS7, being actually an extension of the SS7 family of protocols.
• SIGTRAN handles the same applications and call management functions performed by the SS7. However, SIGTRAN uses the IP
(Internet Protocol) and SCTP (Stream Control Transmission Protocol) transport, instead of TCP or UDP, mainly due to security
issues.
• SCTP is responsible for carrying the PSTN signaling information over the IP and for the reliable transfer of messages between
its users.
• The way SIGTRAN works is that it essentially refers to an entity called media gateway.
• The media gateway works as an interface between different media formats across public and data networks, and it also
connects the public analog network to a network of data packets.
Considerations on Diameter
Ultra-large connection
Ultra-low latency
5G Highlights
• In the World Radio Communication Conference 2015 hold in Geneva,
Switzerland, ITU-R officially approved three resolutions to facilitate
the future 5G research process and formally determined the name
of 5G is "IMT-2020“.
• With the launch and implementation of the ITU 5G plan, the world
has accelerated its pace of 5G network development.
5G core(5GC) /Next Generation Core(NGC)
architecture
The primary Network Functions (NFs) of 5G core and their capabilities as they are defined in the standards
process today are as below:
Authentication Server Function (AUSF): This acts as an authentication server. It contains mainly the EAP
authentication server functionality and acts as storage for keys and provides keying material to the requester
NF.
It carries out termination of NAS signaling, NAS ciphering & integrity protection, registration management,
connection management, mobility management, access authentication and authorization, security context
management. The AMF also includes the Network Slice Selection Function (NSSF) and acts as the termination
point for RAN CP interfaces (N2).
It carries out session management (session establishment, modification and release), UE IP address allocation
& management, DHCP functions, termination of NAS signaling related to session management, DL data
notification and traffic steering configuration for UPF for proper traffic routing.
User Plane Function (UPF)
It carries out packet routing & forwarding, packet inspection, QoS handling, acts as external PDU session point
of interconnect to Data Network (DN), and is an anchor point for intra- & inter-RAT mobility.
Network Exposure Function (NEF)
It supports exposure of capabilities and events, secure provision of information from external application to
3GPP network and translation of internal/external information. It acts as an API gateway that allows external
users, such as enterprises or partner operators, the ability to monitor, provision and enforce application
policy, for users inside the operator network. Thus, it
a. Provides security when services or Application Functions (AF) access 5G Core nodes
b. Acts as a proxy, or API aggregation point, or translator into the Core Network
It stores subscriber data and profiles and carries out generation of Authentication and Key Agreement
(AKA) credentials, user identification handling, access authorization, subscription management.
5G key technologies:
• High rate: Large bandwidth, massive MIMO (multiplexing), high-order modulation, and
LDPC code
• High spectral efficiency: F-OFDM, flexible frame structure
• Coverage enhancement: SUL (uplink and downlink decoupling) and Massive MIMO
(beamforming)
• Low latency: CUDU separation and self-contained timeslot
Low-Density Parity Check (LDPC) codes represent a class of error correcting codes that may be
employed for providing error correction of transmission errors in communication systems. Using
LDPC codes, channel capacities that are close to the theoretical Shannon Limit can be achieved
03
5G TECHNICAL DEPLOYMENT
2G to 5G DEPLOYMENT
Deployment Strategy
5G NSA( Non StandAlone)
• eMBB is supported.
• LTE is the anchor point, and the 4G core
network is reused to quickly introduce 5G
NR.
• The 5G is overlaid on the 4G network
without providing continuous coverage.
5G SA ( StandAlone)
• Supports eMBB/uRLLC/mMTC and network
slicing.
• 5G core needs to be build.
• High requirements for continuous
coverage of 5G
Full 5G capabilities are realised on 5G SA deployment, with 5G NSA the deployment is quicker and cost effective
5G Core Network Structure
5G network consists of the following
components:
• Wireless network: NR (New RAN)
• Core network: NGC (Next Generation Core
WHY 5G
Technical Pros
5G network architecture
• Networking mode: NSA (non standalone networking) and SA
(standalone networking)
• Features of the core network architecture: CUPS (separation of the
control plane and user plane), native cloud, service-oriented
architecture, and network slicing
• Wireless network: DRAN –> CRAN –> Cloud RAN evolution
Bearer network: L3 sink
Key
Fill
Partially
ed
Filled
Vac
ant
5G Wireless Deployment Stages
5G Spectrum-Sub 6G & mm Wave
6G
•The next generation telecom technology (6G) is said
to be 50 times faster than 5G and is expected to be
commercially launched between 2028-2030.
• 6G (sixth-generation wireless) is the successor to 5G cellular technology.
The wide applications of ICT, such as IoT, AI, blockchain technology, XR (Extended Reality)
and VR (Virtual Reality), has created the emergence of 6G technology.
On the basis of 5G technique, 6G will put profound impact over ubiquitous connectivity,
holographic connectivity, deep connectivity and intelligent
connectivity.
Notably, research fraternity should focus on challenges and issues of 6G. They need to
explore various alternatives to meet desired parameters of 6G. Thus, there are many
potential challenges to be envisioned.
5G vs 6G
6G Technology
04
WHY 6G
Significance:
•More facilitation:
• The 6G technology market is expected to facilitate large improvements in imaging, presence technology
and location awareness.
• 6G's higher frequencies will enable much faster sampling rates, in addition to providing significantly better
throughput and higher data rates.
•Advancement in Wireless sensing technology:
• The combination of sub-mm waves (e.g., wavelengths smaller than one millimeter) and frequency
selectivity to determine relative electromagnetic absorption rates could potentially lead to significant
advances in wireless sensing technology.
•Emergence of Digital Capabilities:
• It will see the emergence of simple, easy-to-wear-and-carry devices with a huge set of digital capabilities.
• This will help the paramedics, educators and agro-technicians to jumpstart the village ecosystems with
little or limited need for on-site presence of doctors, professors and agro-experts.
•Optimising mass public transportation:
• Such an enabling set of technologies will bring manifold utilisation of scarce rail, air and road networks
and make mass transportation far more efficient; Artificial Intelligence (AI) and massively parallel
computing architectures will help solve transportation and scheduling operations research problems.
Challenges:
Maintaining Protection Mechanisms:
The key technical challenges are energy efficiency, avoiding signal attenuation due to obstructions and water droplets in the
air, and, of course, maintaining end-to-end trust through robust cyber security and data protection mechanisms.
Availability of Semiconductor:
We don't have semiconducting materials that can use multi-THz frequencies. Getting any kind of range out of those
frequencies may require enormous arrays of extremely tiny antennas.