Mwa 20060113
Mwa 20060113
Mwa 20060113
Architectures
Lecture notes of G. Q. Maguire Jr.
For use in conjunction with the text: Wireless and Mobile
Network Architectures, by Yi-Bing Lin and Imrich
Chlamtac, John Wiley & Sons, 2001, ISBN 0-471-39492-0.
Maguire 2 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Context of the course .............................................................................. 13
Chapters 1-4, and 22 ............................................................................... 14
Internet Architecture............................................................................... 15
More complete Architecture ................................................................... 16
Internetworking....................................................................................... 17
Personal Communication Systems (PCS)............................................... 18
High Tier and Low Tier Cellular, and Cordless ..................................... 19
Cellular Telephony ................................................................................. 20
Low Tier Cellular and Cordless Telephony........................................... 21
Mobile Data ............................................................................................ 22
Paging ..................................................................................................... 23
Specialized Mobile Radio (SMR)........................................................... 24
Satellite ................................................................................................... 25
Wideband systems .................................................................................. 26
Local Metropolitan Area Networks (LMDS) ......................................... 27
Point-to-Point Optical links .................................................................... 28
Wireless Local Area Networks (WLANs).............................................. 29
Maguire 3 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Short range radio..................................................................................... 30
Ultrawideband - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 30
Trend: Increasing Data Rates.................................................................. 31
GSM - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 31
High Speed Circuit Switched Data (HSCSD) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 31
GPRS - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 31
Wireless LAN - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 31
Basic Personal Communication System (PCS) network architecture .... 32
Example of a PCS Architecture.............................................................. 33
PCS network architecture supporting Mobility ...................................... 34
Mobility Management ............................................................................ 35
Mobility Management Protocols ............................................................ 36
Macro- vs. Micro-mobility ..................................................................... 37
Getting Service ....................................................................................... 38
Locating the user..................................................................................... 39
Handoff Management: Detection & Assignment ................................... 40
Handoff/Handover/Automatic Link Transfer ......................................... 41
Handoff Criteria...................................................................................... 42
Handoff Goals......................................................................................... 43
Maguire 4 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
When to make the decision? ................................................................... 44
Reality is more complex ......................................................................... 45
Who makes the handoff decision?.......................................................... 47
Inter-BS Handoff (aka inter-cell handoff) .............................................. 48
What happens if there are insufficient resources at new AP? ................ 49
Inter-system Handoff (aka inter-MSC handoff) ..................................... 50
What happens if the mobile moves gain? .............................................. 51
Fast Mobile IPv4 handoff via Simultaneous Bindings ........................... 52
Fast handover timeline............................................................................ 53
Roaming.................................................................................................. 54
User roaming ......................................................................................... 55
Roaming Management............................................................................ 56
Roaming example ................................................................................... 57
Of course it couldnt be this simple!....................................................... 58
Call delivery ........................................................................................... 59
CT2 ......................................................................................................... 60
Back to: Who makes the handoff decision? ........................................... 61
Maguire 5 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Network controlled handoff (NCHO)..................................................... 62
Mobile assisted handoff (MAHO) .......................................................... 63
Mobile controlled handoff (MCHO) ...................................................... 64
Handover Failures................................................................................... 66
Channel Assignment............................................................................... 67
Channel Assignment Process.................................................................. 68
Handoff Management: Radio Link Transfer .......................................... 69
Handoff frequency .................................................................................. 71
Soft handoff in multiple forms ............................................................... 72
Paging ..................................................................................................... 73
Pager ....................................................................................................... 74
Paging Architecture ................................................................................ 75
Paging Service area................................................................................. 76
Introduction of paging systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Alphanumeric paging systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Mobile telephone systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Mobile but not necessarily wireless. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Local mobility via wireless (or redirects) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Maguire 6 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Two-way paging and messaging systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Paging Interworking ............................................................................... 83
Paging - link level................................................................................... 84
Motorolas FLEX protocol ................................................................. 85
Sleeping for power savings..................................................................... 86
Mobile Telephone Systems Timeline (the first two generations: analog + digital)
87
References and Further Reading............................................................. 88
Course book - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 88
Further details concerning physical and link layer wireless communication - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 88
CDPD - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 89
LEO - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 89
Fixed Broadband wireless - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 90
User profiles - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 90
Mobile IP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 90
Fast handoff - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 91
Micromobility: Cellular IP, HAWAII, Hierarchical Mobile IP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 91
Comparison of IP Mobility protocols - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 91
TeleMIP- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 92
Intersystem Handoff- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 92
Maguire 8 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
PACS Intersystem Handoff .................................................................. 112
3 alternative inter-RPCU handoff methods
(Switch Loopback, Direct Connection, Three-way Calling Connection): 113
CDPD.................................................................................................... 114
Motivation for CDPD ........................................................................... 115
Goals- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 115
CDPD network architecture.................................................................. 116
CDPD Entities ...................................................................................... 117
other entities ......................................................................................... 118
Limits.................................................................................................... 119
Handoffs ............................................................................................... 120
Connectionless Network Services (CLNS) .......................................... 121
Roaming Management.......................................................................... 122
Multicast ............................................................................................... 123
CDPD usage ......................................................................................... 124
CDPD phaseout .................................................................................... 125
Ricochet ................................................................................................ 126
Maguire 9 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Ricochet System Architecture .............................................................. 127
Further reading...................................................................................... 128
TIA - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 128
TSB-51 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 128
Mobile*IP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 129
CDPD - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 130
Ricochet- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 131
Maguire 13 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Entering Short Messages ...................................................................... 201
SMS shorthand ..................................................................................... 202
External Application Interface (EAI) ................................................... 203
Voice Messaging System (VMS) ......................................................... 204
Voice Profile for Internet Mail (VPIM)................................................ 205
Enhanced Message Service (EMS)....................................................... 206
Multimedia Messaging Service (MMS) ............................................... 207
SMS over GPRS ................................................................................... 208
International Roaming .......................................................................... 209
Enhanced Data Rates for GSM Evolution (EDGE).............................. 210
GSM/EDGE Radio Access network (GERAN)- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 210
EGRPS.................................................................................................. 211
Operation/Administration/Maintenance ............................................... 212
Further reading...................................................................................... 213
GSM - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 213
GPRS - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 215
USSD - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 216
SMS and Multimedia Messaging Service (MMS) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 216
International Roaming - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 218
Operation/Administration/Maintenance- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 219
Maguire 14 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
4. Number portability, VoIP, Prepaid, Location Based Services
220
Lecture 4 ............................................................................................... 221
Database lookups .................................................................................. 222
Local Number Portability (LNP) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 222
Three kinds of Local Number Portability............................................. 223
Mobile Number Portability (MNP) ...................................................... 224
Non-geographic number portability (NGNP)....................................... 225
Call forwarding at donor end................................................................ 226
Drop back forwarding........................................................................... 227
Query on release (QoR) solutions......................................................... 228
Look up type solutions ......................................................................... 229
Two stage solutions .............................................................................. 230
All call/all network solutions................................................................ 231
Who knows the mappings?................................................................... 232
Nummerportabilitet i Sverige ............................................................... 233
EU Document 398L0061...................................................................... 234
Maguire 15 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Nortel Networks Universal NP Master (UNMP) ................................ 235
Lookup engines..................................................................................... 236
Voice over IP (VoIP) ............................................................................ 237
TIPHON................................................................................................ 238
Ericssons GSM on the Net .................................................................. 239
iGSM .................................................................................................... 240
Prepaid .................................................................................................. 241
GSM Prepaid ........................................................................................ 242
Difference between Mobile and Fixed Prepaid .................................... 243
Four alternatives for Mobile Prepaid.................................................... 244
Wireless Intelligent Network (WIN) .................................................... 245
Calling party pays vs. Called party pays .............................................. 246
WIN Call termination when called party pays ..................................... 247
Service Node......................................................................................... 248
Hot Billing ............................................................................................ 249
one-call exposure in depth ............................................................... 250
Handset-Based ...................................................................................... 251
Maguire 16 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Combined Handset-based + Hot Billing............................................... 253
Roaming and Prepaid............................................................................ 254
Revenue and new services .................................................................... 255
Location Based Services (LBS)............................................................ 256
Means of determining location ............................................................. 257
Geographic Location/Privacy (geopriv) ............................................... 258
Further reading...................................................................................... 259
Number portability - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 259
VoIP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 260
Prepaid - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 261
Location Based Services - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 261
Maguire 17 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Heterogeneous PCS .............................................................................. 271
Similar Radio technologies + Same Network technology (SRSN) ...... 272
Different Radio technologies + Same Network technology ................. 273
Different Radio technologies + Different Network technology ........... 274
Tier Handoff ......................................................................................... 275
Registration for SRSN & DRSN .......................................................... 276
Registration for DRDN......................................................................... 277
Call delivery ......................................................................................... 278
User identity (identities) and MSs ........................................................ 279
Major forces driving heterogeneous PCS ............................................. 280
Internetworking scenarios..................................................................... 281
Paradigm shifts ..................................................................................... 282
Third Generation Mobile (3G).............................................................. 283
3rd Generation Partnership Project (3GPP).......................................... 284
3G(PP) Architecture ............................................................................ 285
3.5G or super 3G................................................................................... 286
High Speed Downlink Packet Access (HSDPA) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 286
High Speed Uplink Packet Access (HSUPA) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 286
Maguire 18 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Third Generation Partnership Project 2 (3GPP2) ................................. 287
3GPP2 reference model ........................................................................ 288
3GPP2 abbreviations ............................................................................ 293
Mobile Station Application Execution Environment (MExE) ............. 295
MExE Classmark- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 295
Common Language Infrastructure for MExE devices: Classmark 4.... 296
Service discovery and management - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 296
CLI MExE Devices - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 297
3G Physical Layer................................................................................. 298
Gateway Location Register (GLR)....................................................... 299
3G QoS ................................................................................................. 300
UMTS Subscriber Identity Module (USIM)......................................... 301
Wireless Operating System for Handsets ............................................. 302
Mobile Virtual Network Operator (MVNO) ........................................ 303
IP Multimedia Subsystem (IMS) .......................................................... 304
Future IMS services.............................................................................. 305
IMS architecture ................................................................................... 306
G ......................................................................................................... 307
Maguire 19 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
4th generation?...................................................................................... 308
IEEE 802.21.......................................................................................... 309
4G in Asia ............................................................................................. 310
eMobility Platform ............................................................................... 311
Further reading...................................................................................... 312
WAP - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 312
Heterogeneous PCS - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 312
3G- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 313
Maguire 21 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Wire Equivalent Privacy (WEP) ....................................................... 346
Handoff ................................................................................................. 347
Inter-Access Point Protocol (IAPP)...................................................... 348
Fast Handoff ......................................................................................... 349
Point Coordination Function (PCF)...................................................... 350
Spacing ................................................................................................. 351
Timing and Power Management........................................................... 352
WLAN AP performance ....................................................................... 353
AAA...................................................................................................... 354
IEEE Extensible Authentication Protocol - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 354
Roaming................................................................................................ 355
Clearinghouse - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 355
Interconnect Provider - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 355
Proxies .................................................................................................. 357
Lightweight Access Point Protocol (LWAPP) ..................................... 358
HiperLAN2 ........................................................................................... 359
802.11a and 802.11h............................................................................. 360
IEEE 802.11k........................................................................................ 361
Maguire 22 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
IEEE 802.11p........................................................................................ 362
Multihop ............................................................................................... 363
QDMA (quad-division multiple access)............................................... 364
Wireless Internet Service Providers (WISPs)....................................... 365
Further reading...................................................................................... 368
WISPs - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 368
IEEE 802.11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 368
AAA - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 370
Maguire 24 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
For A to talk to B .................................................................................. 399
Service Discovery Protocol (SDP) ....................................................... 400
RFCOMM Protocol .............................................................................. 401
RFCOMM Frame Types....................................................................... 402
Telephony Control Signaling (TCS) Protocol ...................................... 403
Bluetooth Profiles ................................................................................. 404
Management ......................................................................................... 405
Low Power Modes................................................................................ 406
Bluetooth performance when faced with interference.......................... 407
Further reading...................................................................................... 408
9. Ultrawideband (UWB) .................................................. 409
Ultrawideband....................................................................................... 410
IEEE 802.15: Working Group for Wireless Personal Area Networks (WPAN)
411
Further reading...................................................................................... 412
UWB- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 412
Maguire 25 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
10. Broadband Wireless Access (BWA) .......................... 414
Broadband Wireless Access ................................................................. 415
IEEE 802.16.......................................................................................... 416
Data only? ........................................................................................... 417
IEEE 802.20 aka Mobile-Fi.................................................................. 418
All IP networks ..................................................................................... 419
Further reading...................................................................................... 420
BWA- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 420
Maguire 27 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Tiered architectures .............................................................................. 449
Localization .......................................................................................... 450
Mapping where sensors are .................................................................. 451
Synchronization ................................................................................... 452
Building upon localization and synchronization .................................. 453
Securing what you send ........................................................................ 454
Sensors.................................................................................................. 455
Smart dust: 1 cubic mm system ............................................................ 456
Berkeley Motes..................................................................................... 457
University of California, Berkeley - Motes .......................................... 458
Motes Routing ...................................................................................... 461
Millennial Net/...................................................................................... 462
vSpace................................................................................................... 463
Commercial sensor nodes ..................................................................... 464
Sensor nodes - low power VLSI design ............................................... 466
Rex Mins Myths .................................................................................. 467
SmartBadge .......................................................................................... 468
Maguire 28 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Power .................................................................................................... 469
Dilemma ............................................................................................... 470
Sensor Modeling Language (SensorML).............................................. 471
IEEE 802.15: Working Group for Wireless Personal Area Networks (WPAN)
472
Ultrawideband....................................................................................... 473
Active networks .................................................................................... 474
Methods used in this area ..................................................................... 475
Conferences and workshops ................................................................. 476
References and Further Reading........................................................... 477
12. Misc. topics................................................................... 484
Space Data Corporation........................................................................ 485
MITs AI Lab: Project Oxygen............................................................. 486
Intelligent/Smart Spaces ....................................................................... 487
If WLANs are widely available............................................................ 488
Unlicensed Mobile Access (UMA) ..................................................... 489
Maguire 29 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Near Field Communications ................................................................. 491
Future work........................................................................................... 492
Further reading...................................................................................... 494
Near Field Communications - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 494
Maguire 30 of 30
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
2G1330 Mobile and Wireless Network
Architectures
1. Introduction
Lecture notes of G. Q. Maguire Jr.
For use in conjunction with Wireless and Mobile Network
Architectures, by Yi-Bing Lin and Imrich Chlamtac, John
KTH Information and
Communication Technology
Wiley & Sons, 2001, ISBN 0-471-39492-0
There are discussions of future systems (which Theo Kanter calls G systems1).
There is even discussion of if there will be a 4th generation of cellular systems or
if we will see the end of generational architectures and systems.
R Token Ring
switch
switch
H R
R WAN
PAN
Cellular networks MH MH
switch IWU
PSTN
Ethernet LANs switch
R
R
IWU
Ad hoc
MH
BTS BSC MSC MH
HLR/VLR
PAN
Cellular networks MH
MH
Maguire High Tier and Low Tier Cellular, and Cordless Introduction 19 of 92
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Cellular Telephony
Different means of defining channels:
Frequency Division Multiple Access (FDMA)
Advanced Mobile Phone Service (AMPS)
Time Division Multiple Access (TDMA)
D-AMPS, Global System for Mobile Communications (GSM)
Code Division Multiple Access (CDMA)
IS-95 (developed by Qualcomm), cdma2000, W-CDMA,
See also:
3rd Generation Partnership Project (3GPP) http://www.3gpp.org/
based on evolved GSM core networks and the radio access technologies
Third Generation Partnership Project 2 (3GPP2) http://www.3gpp2.org/
ITUs "IMT-2000" initiative:
high speed, broadband, and Internet Protocol (IP)-based mobile systems
featuring network-to-network interconnection, feature/service transparency, global roam-
ing and seamless services independent of location.
includes cdma2000 enhancements
See also fixed Broadband Wireless Access (BWA) systems (i.e., Broadband
Wireless Access (BWA) on page 414)
Maguire Local Metropolitan Area Networks (LMDS) Introduction 27 of 92
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Point-to-Point Optical links
Free-Space Optics (FSO)
using laser light sources it is possible to achieve very high speeds
(typically OC-3 (155Mbps), OC-12 (622Mbps), or 1.25Gbps; but some
systems operate at 2Gbps and 10GBps) for point-to-point links
uses Terahertz (THz) spectrum range
short ranges - typically below 2km
See also: http://www.freespaceoptics.org/
Base Station
Base Station
PSTN
Mobility
Database
Mobile Station
PSTN
Cell
R
IWU
BS BSC MSC
HLR/VLR Cell
BS
MS
Cell
MS
Cell
Base Station Controller
VLR
Mobile Switching Center Database
Radio Network2
VLR
PSTN
Mobile Switching Center Database HLR
Radio Network1 Database
In micro-mobility entities outside of the current domain can not (and need not) see
any changes when the mobile moves within the domain, while with
macro-mobility others can see when a mobile moves, even within a domain.
glitchless handoff in this case the delays due to the handoff are hidden/eliminated from the data stream
smooth handoff buffering of traffic to the mobile when it is in the process of changing from one AP to another is
buffered and then delivered to the new APc
fast handoff only a short interruption time between disconnection at the old AP and connection to the new AP
vertical handoff when the new cell is larger than the current cell (i.e., microcell to macro cell)
horizontal handoff when the new cell is similar to the current cell (i.e., microcell to micro cell)
a. Generally I will refer to such devices as access points (APs), except when their being a Base Station is particularly important.
b. For seamless and glitchless handoffs see for example, work by R. Cceres and V.N. Padmanabhan.
c. See C. Perkins and K-Y. Wangs scheme for buffering with Mobile IP, requires per mobile buffering associated with the (former) access points.
Mobile
Signal
Strength start looking for a new AP
(dB) time to switch
minimum threshold to stay with AP1
call terminated if handoff is not completed
AP1 AP2
AP2
AP2 AP2 MN
AP2 MS
MN
MN MN
AP1
AP1 AP1
A D D
B
A E A
Mobile Switching Center D
Signaling
C C
User traffic MSC MSC
MSC
Figure 6: Steps in handoff within the control of one MSC (not showing the BSC)
1. Mobile (MN) is using AP1, all traffic is going via a channel (A) between MSC (via BSC) and AP1; MN signals via AP2,
its intention for upcoming handoff (via B)
2. MSC creates a bridge (C) and traffic is now sent via both channels (A) and (D)
3. MN signals (via E) that it is ready to use channel D
4. MSC eliminates bridge C and frees channel A, the MN now uses only channel D.
Maguire What happens if there are insufficient resources at new AP? Introduction 49 of 92
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Inter-system Handoff (aka inter-MSC handoff)
When the two cells are connected to different MSCs the situation is more complex.
MS
Cell
MS
Cell
Base Station Controller
MSC2
Trunk
Base Station Controller
MSC1
Before PSTN
After
Figure 7: Handoffs between two MSCs
MS
Cell
MS
Cell
Base Station Controller
VLR
Mobile Switching Center Database
PCS2
VLR
PSTN
Mobile Switching Center Database HLR
PCS1 Database
Figure 10: Mobile roams from PCS1 to PCS2 (Neither is the home PCS)
When the mobile moves to PCS2 the local VLR is updated, the HLR is updated, and the former VLR is also updated.
MS
1 3
VLR
Mobile Switching Center Database VLR
Mobile Switching Center Database
PCS1
PCS2
Gteborg 4 Stockholm
PSTN 2
HLR
Database Kiruna
Figure 11: Mobile roams from PCS1 to PCS2
1. When the user (and her MS) arrives in Stockholm, her MS has to register with the VLR for PCS2.
2. PCS2s VLR informs the users in Kiruna HLR of the users current location (i.e. that the HLR should point to the VLR
in PCS2). The HLR sends the users profile to PCS2s VLR.
3. PCS2s VLR informs the mobile (MS) that is has successfully registered.
4. HLR informs PCS1s VLR to remove their entry for the user.
In soft handoff, the network and perhaps the mobile have to figure out how to
combine the information from the multiple basestations (in the up and down links
respectively).
Link transfers:
1 Intracell
2 Intercell or inter-BS
3 Inter-BSC
4 Intersystem or inter-MSC
5 Intersystem between two PCS networks
MS
Cell
Inter-BS (intercell)
Inter-MSC
Inter-BSC
Base Station Controller
Base Station Controller Mobile Switching Center
Intersystem
Mobile Switching Center
Cell
PSTN
Mobile Switching Center
PCS2
Figure 13: Handoffs, mobile moves within PCS1 and then on to PCS2
MN
AP1 AP1 AP1
AP1
MSC
BSC BS BS MSC MSC MSC
Figure 14: Soft handoffs
Some CDMA systems use very precise link level timing to enable the signals from
multiple BSs to arrive additively at the mobile - thus leading to a physically
stronger signal.
Soft handoffs between systems generally will require that the mobile be able to
receive multiple signals - which will use different codes, frequencies, .
Cap Code beep (one of ~4 tones) when the pagers address is received by the pager
Tone voice 1970s, allows the sender to record and send a short voice message
Digital display early 1980s, a callback number (or code) entered by the sender, which appears on the pagers display
Receiver
(Transmitter) Decoder Control Logic
I/O
Pager or
Pager
Paging terminal has database of customers, cap code, pager number, types of
messages, ; converts voice message to text (for alphanumeric pagers); store in
mailbox for pager; forward to other paging terminals; send to relevant Base
Station Controller(s)
Maguire Paging Architecture Introduction 75 of 92
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Paging Service area
Service areas: site, local area, region, national, international
If the user temporarily left the paging service area or if the signal could not reach
them, then they would miss it. Motorolas ReFLEX technology, a two-way paging
system, keeps transmitting a paging message until the users pager sends a
confirmation that it has been received.
Operator A Operator B
+cc eeee d123 +cc eeee d124 +cc ffff d123 +cc ffff d124
2. user moves to a phone User
1 pager
Upon a page (1), user moves to nearest phone (2), calls paging company (3),
company operator tells the user what telephone number to call - perhaps they
(also) convey a short message. The mobile user can be contacted and told by the
operator at the paging company to connect to the fixed telephone network. [i.e.,
make a temporary connection to the (voice) network.]
Maguire Paging Service area Introduction 77 of 92
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Alphanumeric paging systems
paging company Operator X
+cc xxxx exchange
+cc pppp
1. page
Operator A Operator B
+cc eeee d123 +cc eeee d124 +cc ffff d123 +cc ffff d124
message (perhaps with telephone# in it)
2. user moves to a phone
pager User1
Upon a page (1), user moves to nearest phone (2), calls a number based on the
content of the (page) message (3); or perhaps they just consume the short message
they received. The mobile user can be contacted and told by a message to connect
to a given number on the fixed telephone network.
Maguire Paging Service area Introduction 78 of 92
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Mobile telephone systems
Operator X
mobile telephone
+cc xxxx exchange company
SMR, NMT, GSM,
+cc mmmm
Operator A Operator B
+cc eeee d123 +cc eeee d124 +cc ffff d123 +cc ffff d124
mobile call
+cc mmmm d125
pager User1
The mobile user is directly reached by the call through the mobile telephone
network.
SMR (Specialized Mobile Radio) is a non-cellular radio system.
NMT (Nordic Mobile Telephone), GSM (Groupe System Mobile), and PCS are cellular radio systems.
Operator A Operator B
+cc eeee d123 +cc eeee d124 +cc ffff d127 +cc ffff d124
User1 +cc mmmm yyyy (a personal phone number, e.g., +1 700 xxx xxxx, )
The mobile user is indirectly reached through the fixed telephone network.
The connection can be via the mobile company (hiding the actual location of the user) or
via redirect directly to the current location of the user.
Thus the mobile operator turns +cc mmmm yyyy into +cc eeee d123
[dynamic address translation].
Maguire Paging Service area Introduction 80 of 92
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Local mobility via wireless (or redirects)
Operator A radio Operator B
wired
+cc eeee d123 cordless +cc ffff d123 +cc ffff d124
wireless (DECT, PCS, )
+cc eeee d123
+cc eeee d123 User1 +cc eeee d123
The mobile user is reached by local redirection (which may utilize local wireless
links) of the call coming from the fixed telephone network.
The local exchange is playing the role of the mobile company (hiding the actual location of the user).
There are multiple instruments (terminals) and user is currently associated with a list of them
Could involve a non-local redirect
To the external world the user looks like they are always at +cc eeee d123, which
the local PBX maps into a specific extension (at the time of the call).
Operator A Operator B
router
+cc eeee Exchange Exchange +cc ffff
... ...
1. As of February 2002, Motorola transferred all their paging subscriber device product lines to Multitone Electronics plc, Basingstoke, UK
http://www.multitone.com/ -- this page was based on information from: http://www.motorola.com/MIMS/MSPG/FLEX/protocol/solution.html this URL is no longer
valid
Maguire Mobile Telephone Systems Timeline (the first two generations: analog + digital) Introduction 87 of 92
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
References and Further Reading
Course book
[1] Yi-Bing Lin and Imrich Chlamtac, Wireless and Mobile Network
Architectures, John Wiley & Sons, 2001, ISBN 0-471-39492-0.
See the summary in section 2.5 (and in each chapter) for more pointers to additional
reading. Carefully note that some of the things which the authors have covered in ch. 2 are
simply their proposals and not (yet) implemented; but their ideas are worth understanding.
Further details concerning physical and link layer wireless communication
[7] Mark S. Taylor, William Waung, and Moshen Banan, Internetwork Mobility:
The CDPD Approach, Prentice-Hall, Upper Saddle River, NJ, 1997. ISBN
0-13-209693-5.
LEO
[9] IEEE 802.16c, Air Interface for Fixed Broadband Wireless Access
Systems - Detailed System Profiles for 10-66 GHz,
http://standards.ieee.org/announcements/80216capp.html
User profiles
[10] Sudeep Kumar Palat, Replication of User Mobility Profiles for Location
Management in Mobile Networks, Norwegian University of Science and
Technology, Dr. Ing. Dissertation, Dept. of Telematics, 12 Jan. 1998.
Mobile IP
[14] Karim El Malki (Editor), Low Latency Handoffs in Mobile IPv4, Internet
draft, draft-ietf-mobileip-lowlatency-handoffs-v4-08.txt, June 2004, work in
progress. http://www.ietf.org/internet-drafts/draft-ietf-mobileip-lowlatency-handoffs-v4-09.txt
Micromobility: Cellular IP, HAWAII, Hierarchical Mobile IP
[15] http://comet.ctr.columbia.edu/micromobility/
Maguire Network Signaling (Chapters 5-8) Network Signaling and CDPD 94 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Transaction Capabilities Application Part
(TCAP)
For exchanging information which is not circuit related.
More than 50 TCAP operations in IS-41 (just) for:
inter-MSC handoff
automatic roaming
operation, administration, and maintenance (OAM)
A TCAP message has two parts: transaction and component
Each TCAP transaction has a timeout associated with it and uses connectionless
transport.
Maguire Transaction Capabilities Application Part (TCAP) Network Signaling and CDPD 95 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
TCAP message flow for a MS registration
VLR1
MSC1 Database HLR VLR2
Database MSC2
Database
RegistrationNotification (INVOKE)
RegistrationNotification (INVOKE)
T2
RegistrationNotification (RETURN RESULT)
T1
T3 RegistrationCancellation (INVOKE)
RegistrationNotification (RETURN RESULT
RegistrationCancellation (RETURN RESULT)
RegistrationCancellation (INVOKE)
T4
RegistrationCancellation (RETURN RESULT)
QualificationRequest (INVOKE)
T5
QualificationRequest (RETURN RESULT)
ServiceProfileRequest (INVOKE)
T6
ServiceProfileRequest (RETURN RESULT)
Maguire Transaction Capabilities Application Part (TCAP) Network Signaling and CDPD 96 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Transaction 2 (T2) - additional details
Signal Transfer Point3 (STP3) does a table lookup, i.e., Global Title Translation
(GTT) of the MIN to identify the appropriate HLRs address, then the TCAP
message is forwarded from STP3 to STP2 where the HLR is.
GTT is needed because non-geographic numbering is assumed {we will return to
this later; See Number portability, VoIP, Prepaid, Location Based Services on
page 220.}.
Maguire Transaction 2 (T2) - additional details Network Signaling and CDPD 97 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Automatic Code Gapping (ACG)
Can use Automatic Code Gapping (ACG) to reduce the rate at which
a network entity such as a MSC sends service request messages to a
service control function.
ACG can be applied automatically when an overload occurs or applied
manually for system management.
ACG can be applied to query messages destined for a specific Point
Code and Subsystem Number or for an SCCP Global Title.
3rd Generation Partnership Project 2 (3GPP2), Automatic Code Gapping (Stage
1), 3GPP2 S.R0016, Version 1.0.0, Version Date: December 13, 1999
http://www.3gpp2.org/Public_html/specs/S.R0016_v1.pdf
Purpose: Without automatic code capping you might over run the network entitys capacity for processing
messages, otherwise messages might be lost - then due to the timeouts associated with each transaction,
lost messages would cause retries -- further increasing the number of messages!
Maguire Automatic Code Gapping (ACG) Network Signaling and CDPD 98 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
TIA TSB-51: Authentication, Signaling
Message Encryption, and Voice Privacy
supports authentication over multiple air interfaces (AMPS,TDMA, &
CDMA) -- GSM authentication is excluded, because the GSM
authentication process has been defined in the GSM standards
provides a method of pre-call validation of (MS) that does not require
user intervention
uses Global Challenge procedures at registration, call origination, call
termination, and at any time using Unique Challenge procedures
without-sharing (WS) scheme: shared secret data (SSD) known only
to Authentication Center (AuC) and MS
sharing (S) scheme: the SSD or some aspect of it is shared with visited
system
SSD based on Authentication Key (A-Key) - never transmitted over the
air
Also includes procedures for generation and distribution of SSD
Maguire TIA TSB-51: Authentication, Signaling Message Encryption, and Voice PrivacyNetwork Signaling and CDPD
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
MIN and ESN
Mobile Identification Number (MIN) - a North American Numbering Plan
(NANP) number which is the phone number of a mobile phone
Electronic Serial Number (ESN) - a 32 bit serial number programmed into the
phone at manufacture (top 8 bits identify the manufacturer)
In AMPS the MIN and ESP are transmitted in the clear over the air - so it is easy
to listen for them and then program another phone with the same values clone
This lead to hundreds of millions of dollars of fraud TSB-51
Maguire MIN and ESN Network Signaling and CDPD 100 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Without-Sharing Scheme
PCS2 LAn
PCS1
AuC HLR VLR2 BS MH
Database MSC2
Database Database
LA info
registration request
RAND
AUTHR, ESN, MIN, RANDC, COUNT
AuthenticationRequest (INVOKE)
AuthenticationRequest (INVOKE) RAND = a random number
AUTHR = Authentication Result
AuthenticationRequest (INVOKE) RANDC = top 8 bits of random number
AuC verifies
AUTHR & COUNT
COUNT+=1
Figure 16: Mobile moves into a new Location Area (LA) at PCS2
AuthenticationRequest (INVOKE)
AuthenticationRequest (INVOKE)
AuthenticationRequest (INVOKE)
AuC verifies AUTHR
generates VPMASK, SMEKEY
Because of shared secret data (SSD) the AuC can generate the same Voice
Privacy Mask (VPMASK) and Signaling Message Encryption Key (SMEKEY) as
the mobile and passes this information to the operator of PSC2
Maguire Without-Sharing Call Origination Network Signaling and CDPD 102 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Sharing Scheme
Old VLR PCS2 LAn
PCS1
AuC HLR VLR3 VLR2 MH
Database MSC2 BS
Database Database Database
LA info
registration request
RAND
AUTHR, ESN, MIN, RANDC, COUNT
AuthenticationRequest (INVOKE)
AuthenticationRequest (INVOKE)
AuthenticationRequest (INVOKE)
AuC verifies
AUTHR
CountRequest (INVOKE)
CountRequest (INVOKE)
CountRequest (RETURN RESULT)
CountRequest (RETURN RESULT)
AuC verifies
COUNT
Because the SSD was shared with the prior VLR3, we need its value of COUNT.
AuthenticationRequest (INVOKE)
Note that because the visited system shares the SSD, it no longer has to contact the
home PCSs AuC to generate the VPMASK and SMEKEY
Maguire Sharing Call Origination Network Signaling and CDPD 104 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
When should you use Without-Sharing vs.
Sharing
Use Without-Sharing when number of registration operations greater than the
number of call origination/termination.
Can use an adaptive algorithm:
based on statistics move between Without-Sharing and Sharing
schemes
once you make a call, then use Sharing scheme; but if you move
without making a call, then revert back to Without-Sharing scheme
Maguire When should you use Without-Sharing vs. Sharing Network Signaling and CDPD 105 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Cellular Authentication and Voice Encryption
(CAVE) Algorithm
IS-54B - TDMA standard - includes CAVE algorithm
Computes Authentication Result (AUTHR) using SSD, ESN, MIN, a random
number (RAND). RAND is typically updated in the system every 20 minutes and
SSD is updated for each mobile every 7 to 10 days [22].
3 of the 4 IS-54 algorithms have been broken:
David Wagner (then a University of California at Berkeley graduate student, now faculty
member) and Bruce Schneier1 & John Kelsey (both of Counterpane Systems) announced
that they had broken the Cellular Message Encryption Algorithm (CMEA)[24] which is
used to protect the control channel (for example, dialed digits, alphanumeric pages).
D. Wagner, L. Simpson, E. Dawson, J. Kelsey, W. Millan, and B. Schneier, Cryptanalysis of
ORYX[25] - shows that the stream cipher used to protect data is breakable with a plain text
attack.
voice privacy depends on a XOR against a generated string - which is generally rather easy
to break (as the string is not equal to the message length)
Maguire Cellular Authentication and Voice Encryption (CAVE) Algorithm Network Signaling and CDPD 106 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
PACS Network Signalling
Personal Access Communications Systems (PACS) supports:
basic call control
roaming
handoff management
Does not use MSCs or HLR/VLR, but uses Advanced Intelligent Network (AIN)
protocol with an Access Manager (AM), AIN switch, and AIN Service Control
Point (SCP).
Maguire PACS Network Signalling Network Signaling and CDPD 107 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
PACS Architecture
SCP = Service Control Point AIN SCP
STP = Signal Transfer Point AM
HLR
VLR
radio port control unit (RPCU) AIN
SS7 PSTN
AIN STP
AIN trunk
switch
ISDN
radio port (RP) AM
interface P
ISDN AM
interface A
MS
portable
fixed access unit
non-radio service control call control (managing the B channels), switching, routing
The RPCU has to deal with inter-RPCU handoff (similar to inter-BSC handoff)
and inter-radio port (inter-RP) handoff.
Note: an AM is also located in the AIN SCP; the two interact with the ISDN/AIN
Switch providing tunneling/de-tunneling (i.e., encapsulation) of the ISDN
REGISTER messages over AIN.
Pg. 125 notes that the RPCUs could be connected via an IP network to the VLR,
thus by passing the AIN/ISDN Switch (SSP) for all non-call associated (NCA)
signalling.
Maguire Access Manager (AM) Network Signaling and CDPD 109 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
AIN/ISDN Switch
Note: The textbook often refers to this as the AIN Service Switching Point (SSP).
Uses:
SS7 ISUP to set up trunk and for inter-system handoff
SS7 TCAP to support mobility management and transport AIN
messages between switch and SCP; the AIN messages are basically
remote procedure calls (RPC) calls to the SCP
ISDN for:
call control {standard ISDN},
automatic link transfer (ALT) {FACILITY message for handoff}, and
non-call associated (NCA) signalling {for example, communication between RPCU and VLR
for registration and authentication - REGISTER message - which is encapsulated in an AIN
NCA-Data message}
Also provides:
Automatic Code Gaping (for traffic load control)
Automatic Message Accounting (for access charging)
Maguire AIN Service Control Point (SCP) Network Signaling and CDPD 111 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
PACS Intersystem Handoff
PACS Intersystem Handoff/automatic link transfer (ALT) follows IS-41 anchor
switch approach.
Maguire PACS Intersystem Handoff Network Signaling and CDPD 112 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
3 alternative inter-RPCU handoff methods
(Switch Loopback, Direct Connection, Three-way Calling Connection):
a. Before ALT b. After ALT (Switch Loopback) c. After ALT (Direct Connect)
d.During ALT e. After ALT Note: (d) illustrates that the switch
(Three-Way Calling Connections) (Three-Way Calling Connections) is doing bridging, but the traffic is
not using any radio capacity in the
new cell - until the mobile arrives
Switch Switch
old new old new
RPCU RPCU RPCU RPCU
Maguire3 alternative inter-RPCU handoff methods (Switch Loopback, Direct Connection, Three-way Calling Connection): Net-
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
CDPD
In 1992, AT&T Wireless Services developed the cellular digital packet data
(CDPD) protocol, a data-only protocol that (re-)uses the AMPS or IS-136
network. Packets (typically ~1.5 kilobytes) use vacant cellular channels - either an
assigned channel or between calls.
CDPD does not communicate with the underlying network; but does utilize
knowledge of this networks channel assignment algorithms to predict when
channels will be available for CDPDs use.
Mobile Data Base Stations - do channel sniffing to find idle channels
It is essentially an implementation of Mobile*IP [28] .. [30].
Maguire Motivation for CDPD Network Signaling and CDPD 115 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
CDPD network architecture
Mobile End System (M-ES), Mobile Data Basestation (MDBS),
Mobile Data -Intermediate System (MD-IS)
Internet
MD-IS
MD-IS
PSDN
M-ES
MDBS
AMPS BS
AMPS PSTN
MSC
Maguire CDPD network architecture Network Signaling and CDPD 116 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
CDPD Entities
Mobile End System (M-ES)
Subscriber unit - interfaces with the radio at 19.2 kbps
Subscriber Identity Module (SIM) - used to identify subscriber
Mobile Application Subsystem - actually provides the functionality
(could be a PDA, Laptop, embedded processor, )
Mobile Data Base Station (MDBS)
controls the radio: radio channel allocation, channel usage,
one modem/transceiver per radio channel pair (up & down link)
generally co-located with the AMPS basestations (so they can share
antenna, site, )
Mobile Data-Intermediate System (MD-IS)
frame relay switch + packet router
buffers packets destined to M-ES it knows about (== with TEI assigned)
supports user mobility by a mobile location protocol
Maguire CDPD Entities Network Signaling and CDPD 117 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
other entities
Fixed End System (F-ES) - hosts
Internal F-ESs hosts within the boundaries of the CDPD network; they have access to additional internal
network data (usage accounting information, mobile location information, subscriber
authentication information,
Directory Server supports directory services within the CDPD network (could
support DNS and/or X.500)
Maguire Connectionless Network Services (CLNS) Network Signaling and CDPD 121 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Roaming Management
Each M-ES has a unique Network Equipment Identifier (NEI) which is
associated with a home MD-IS (Mobile Home serving Function (MHF)
{analogous to a Mobile IP Home Agent}.
Home MD-IS keeps location directory of the MD-IS currently serving each of its
mobiles (note that the routing is to the current MD-IS, not to the M-ES itself)
Each MD-IS keeps a registration directory listing currently visiting mobile
(Mobile Serving Function (MSF)) {analogous to a Mobile IP Foreign Agent}
When a M-ES moves, the home MD-IS explicitly cancels the registration at the
former MD-IS.
Packet routing is handled just as in Mobile IP.
Pole Top Radios Route packets over a wireless link towards or from the
(PT) nearest wired access point; routing is performed Internet
geographically, i.e., based on the latitude and longitude NS
Ethernet Radios Bridges between the wireless and wired portion of the
(ER) network
ER ER ER
Metricom Maps between IP addresses and Ricochet identifiers and
Gateway encapsulates packets within Metricom-specific headers
(MGW) and routes the packets to the correct ER. For packets PT
originating from a mobile, decapsulates and forwards the PT
packets on the wired IP network. PT
PT
Maguire Ricochet System Architecture Network Signaling and CDPD 127 of 131
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Further reading
TIA
[23] Yi-Bing Lin, Seshadri Mohan, Nelson Sollenberger, and Howard Sherry,
Adaptive Algorithms for Reducing PCS Network Authentication Traffic,
IEEE Transactions on Vehicular Technology, 46(3):588-596, 1997.
http://liny.csie.nctu.edu.tw/ieee-tvt94c.ps
[32] A. Salkintzis, Packet Data over Cellular Networks: The CDPD Approach,
IEEE Communication Magazine, vol. 37, no. 6, June 1999, pp. 152-159.
[35] Elan Amir and Hari Balakrishnan, An Evaluation of the Metricom Ricochet
Wireless Network, CS 294-7 Class Project,
http://www.lariat.org/Berkeley/node2.html
[36] Elan Amir and Hari Balakrishnan, Performance of the Metricom Ricochet
Wireless Network, Summer 1996 Daedalus Retreat, June 1996,
http://web.archive.org/web/20040723111756/http://daedalus.cs.berkeley.edu/talks/retreat.6.96/Metricom.pdf
Maguire Lecture 3 GSM, GPRS, SMS, International Roaming, OAM 133 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Global System for Mobile Communications
(GSM)
designed to be a digital (wide area) wireless network
driven by european telecom manufacturers, operators, and
standardization committees
very widely used around the world
Maguire Global System for Mobile Communications (GSM) GSM, GPRS, SMS, International Roaming,
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
GSM Requirements
Service portability
mobile should be able to be used in any of the participating countries with international
roaming and standardized numbering & dialing (but possibly at different rates!)
usable for both wireline services and for mobile service
usable when: walking, driving, boating, (upto 250 km/h)
Quality of service and Security
quality at least as good a previous analog systems
capable of offering encryption (in some countries this is off by default)
Good radio frequency utilization
high spectrum efficiency
co-existence with earlier systems in the same bands
Modern network
follows ITU recommendations - to allow efficient interoperation with ISDN networks
supports voice and low rate data
standardized mobility and switching support
standardized interfaces between the subsystems - to allow a mix-and-match system
System optimized to limit cost of mobiles (and to a lesser extent to limit
the cost of the whole system)
GSM required higher complexity mobiles than earlier analog systems
subscriber cost is less than or equal to the then existing analog systems
Maguire GSM RequirementsGSM, GPRS, SMS, International Roaming, OAM 135 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
GSM Architecture
Radio Link
BSS
X.25 PSDN PSTN
Um Abis
OMC
MS BTS SS7/ISUP
ME X.25
Gateway MSC
SIM
A IWF (GMSC)
EIR
NSS
BSC MSC MSC MSC
TE E E F Database
B B C
VLR VLR HLR AuC
Database
G Database D Database
H Database
MS Mobile Station
Maguire GSM ArchitectureGSM, GPRS, SMS, International Roaming, OAM 136 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Foundation
Hybrid frequency-division/time-division multiple access
FDMA - division by frequency of the (maximum) 25 MHz allocated bandwidth into
124 carrier frequencies spaced 200 kHz apart.
One or more carrier frequencies assigned to each base station
Each carrier frequency divided in time, using TDMA
Fundamental unit of time in this TDMA scheme is a burst period approx. 0.577 ms long
Eight burst periods are grouped into a TDMA frame (approx. 4.615 ms) = basic unit for the
definition of logical channels
A physical channel is one burst period per TDMA frame
Slow frequency hopping at upto 217 times per second
hopping algorithm is broadcast on the broadcast control channel
helps alleviate multipath fading
co-channel interference is effectively randomized
Note: broadcast and common control channels are not subject to frequency hopping and
are always transmitted on the same frequency
Infrastructure based on Signalling System 7 (SS7)
Maguire Foundation GSM, GPRS, SMS, International Roaming, OAM 137 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
GSM contributions
Location-based mobility management
Mobile assisted handover
Temporary Mobile Subscriber ID (TMSI)
Maguire GSM contributionsGSM, GPRS, SMS, International Roaming, OAM 138 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Distinctive features of GSM
Cooperative development by many actors from many countries
preserved open interfaces between the subsystems (especially
between infrastructure elements -- particularly between base stations
and switches lead to an open market for these subsystems)
specified a large number of interfaces!
Phased release - since they could not make all the innovations in time
for their targeted 1991 introduction
Phase 1 GSM spec. - 100 sections and 5,320 pages!
telephony (full rate speech) - with some added features
emergency calls
data transmission at 2.4/4.8/9.6 kbps (transparent {the error correction done by a for-
ward error correction (FEC) mechanism}/non-transparent {information is repeated when
it has not been correctly received})
short message service (SMS)
Phase 2
non-voice services (Advice of charge, Calling line identification, Call waiting, Call hold,
Conference calling, Closed user groups) and enriched telephony (half-rate speech)
High-speed circuit-switched data (HSCSD)
Maguire Distinctive features of GSMGSM, GPRS, SMS, International Roaming, OAM 139 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Phase 2+
Multiple service profiles
Private numbering plans
Access to Centrex services
Internetworking with GSM 1800, GSM 1900, Digital Enhanced Cordless Telecom (DECT)
Phase 2.5
GPRS: Global packet radio system
Enhanced data rates for GSM (EDGE)
Maguire Distinctive features of GSMGSM, GPRS, SMS, International Roaming, OAM 140 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Mobile Station (MS)
Subscriber Identity Module (SIM)
Mobile Equipment (ME)
Mobile Terminal (MT)
Maguire Mobile Station (MS)GSM, GPRS, SMS, International Roaming, OAM 141 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Subscriber Identity Module (SIM)
small form factor - which can be removable and can be moved from one
terminal to another (latest card connectors: >5,000 cycles)
smart card (generally too large for handsets!)
plug-in SIM (the processor and contact from a smart card)
user authenticated via a Personal Identity Number (PIN)
if PIN entered incorrectly, N times, then phone is locked for all but
emergency calls, until you enter a PIN unblocking key (PUK)
contains subscriber information:
some which is fixed by operator (may include preferred network provider(s))
some which is changeable by the user (list of short numbers, phone list, SMS messages, )
can be updated via:
keyboard or attached terminal equipment or over the air (OTA) via SMS message sent by
operator/application/ built using SIM Toolkit
often the SIM is owned by the operator
profiles - operator/subscription info; SIMs are required to be able to
hold at least two profiles
contains International Mobile Subscriber Identity (IMSI)
Maguire Subscriber Identity Module (SIM)GSM, GPRS, SMS, International Roaming, OAM 142
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
SIM card
Figure 22: SIM card showing contacts on the left and the IMSI on the right
Maguire SIM card GSM, GPRS, SMS, International Roaming, OAM 143 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Phone with and without SIM
Figure 23:
Maguire Phone with and without SIMGSM, GPRS, SMS, International Roaming, OAM 144 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Mobile Equipment (ME)
the phone itself - radio and radio interface, display, keyboard, etc.
performs: radio transmission and reception, authentication, handover, encoding &
channel encoding. note: ME without SIM can only make emergency (112) calls
Radios operate in one or more of the following bands:
System Uplink Downlink Comments
(mobile station to (base station to
base station) (MHz) mobile station) (MHz)
GSM450 450.4 .. 457.6 460.4 .. 467.6 For migration of NMT 450 operators
GSM480 478.8 .. 486 488.8 .. 496
GSM850 824 .. 849 869 .. 894 Cellular (800 MHz / 850 MHz) frequency
band in Americas
GSM900 890 .. 915 935 .. 960 the original frequency band
GSM1800 1710 .. 1785 1805 .. 1880 also known as DCS1800
GSM1900 1850 .. 1910 1930 .. 1990 also known as PCS 900
Maguire Mobile Equipment (ME) GSM, GPRS, SMS, International Roaming, OAM 146 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Classmark
3 5W
4 2 Wb
5 0.8 W
a. 1W average if using a single time slot per frame
b. 250mW average if using a single time slot per frame
Maguire Mobile Equipment (ME) GSM, GPRS, SMS, International Roaming, OAM 147 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
User ID Device ID
IMEI International Mobile Equipment Identity 15 hexadecimal digits
IMSI International Mobile Subscriber Identity 15 decimal digits
TMSI Temporary Mobile Subscriber Identity 32 bits
1. As of April 1st 2004, the FAC field was eliminated and the previous 6 digit TAC field was expanded to 8 hexadecimal digits
Maguire User ID Device IDGSM, GPRS, SMS, International Roaming, OAM 148 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
IMSI consists of:
mobile country code (MCC) - 3 digits [66]
mobile network code (MNC) - maximum of 3 digitsa }Home Network Identifier (HNI)
Mobile Station Identification Number (MSIN)
a. Note: GSM originally specified 2 digits; 3 digit MNCs are only allocated in North America; difficulties in transition from 2 to 3 digits [68], [69]
Maguire User ID Device IDGSM, GPRS, SMS, International Roaming, OAM 149 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Mobile Terminal (MT)
Generally a PDA, PC,
Interface: serial (DTE-DCE) cable, PCMCIA, IrDA, Bluetooth,
Part of the extended Hayes AT command set:
AT Command Description AT Command Description
Maguire Mobile Terminal (MT) GSM, GPRS, SMS, International Roaming, OAM 150 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Base Station System (BSS)
one or more base transceiver station (BTS) and
base station controller (BSC)
Maguire Base Station System (BSS)GSM, GPRS, SMS, International Roaming, OAM 151 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Base transceiver station (BTS)
Performs: channel coding/decoding and encryption/decryption
BTS includes: radio transmitters and receivers, antennas, the interface to the PCM
facility (i.e., backhaul for the voice and control to the BSC),
About 1/2 the processing is associated with transcoding PCM encoded speech
channel to/from GSM coding
Maguire Base transceiver station (BTS) GSM, GPRS, SMS, International Roaming, OAM 152
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Base station controller (BSC)
BTSs are connected to a BSC which manages the radio resources
call maintenance using the received signal strength sent by mobile
stations normally every 480 ms
initiate handovers to other cells,
change BTS transmitter power,
Task breakdown:
call activities ~20-25%
paging and SMS ~10-15%
mobility management ~20-25%
hardware checking/network triggered events ~15-20%
BSCs engineered for about 80% utilization, if overloaded, shed load by:
(1) rejecting location updates, (2) rejecting MS originating calls, and
(3) ignoring handoffs
Maguire Base station controller (BSC) GSM, GPRS, SMS, International Roaming, OAM 153
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Network and Switching Subsystem (NSS)
MSCs
Gateway MSC (GMSC) has interconnections to other networks
Databases
Gateways
Maguire Network and Switching Subsystem (NSS) GSM, GPRS, SMS, International Roaming,
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Databases
Home Location database for management of mobile subscribers, stores the international mobile subscriber
Register (HLR) identity (IMSI), mobile station ISDN number (MSISDN) and current visitor location register
(VLR) address
keeps track of the services associated with each MS
an HLR may be used by multiple MSCs
Visitor Location caches some information from the HLR as necessary for call control and service
Register (VLR) provisioning for each mobile currently located in the geographical area controlled by this
VLR
connected to one MSC and is often integrated into the MSC
Authentication a protected database which has a copy of the secret key stored in each subscribers SIM card
Center (AuC)
this secret is used for authentication and encryption over the radio channel
normally located close to HLR
Equipment Identity contains a list of all valid mobile station equipment within the network, where each mobile
Register (EIR) station is identified by its international mobile equipment identity (IMEI) - split into 3
databases:
White list: all known, good IMEIs
Black list: bad or stolen handsets
Grey list: handsets/IMEIs that are uncertain
Maguire Databases GSM, GPRS, SMS, International Roaming, OAM 155 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Equipment Identity Register (EIR)
Optional in a GSM network, i.e., not required
EIR block (bars) calls from a particular MS, not from a subscriber.
Sometimes the AuC and EIR are combined.
Maguire Equipment Identity Register (EIR) GSM, GPRS, SMS, International Roaming, OAM
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Operation Sub-System (OSS)
Operation and Maintenance Center
Service management
subscription management for registering new subscriptions, modifying and removing
subscriptions, as well as billing information
billing
fraud detection
Maguire Operation Sub-System (OSS) GSM, GPRS, SMS, International Roaming, OAM 157
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Operation and Maintenance Center (OMC)
Manages the GSM functional blocks: MSC, BSC (and indirectly the BTSs)
Task: to maintain satisfactory operation of the GSM network
Based on observing system load, blocking rates, handovers,
Activities:
Network Management System (NMS)
modify network configuration
equipment maintenance aiming at detecting, locating, and correcting
faults
Maguire Operation and Maintenance Center (OMC) GSM, GPRS, SMS, International Roaming,
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
GSM Interfaces (just some of them!)
Radio Link
BSS
X.25 PSDN PSTN
Um Abis
OMC
MS BTS SS7/ISUP
ME X.25
Gateway MSC
SIM
A IWF (GMSC)
EIR
NSS
BSC MSC MSC MSC
TE E E F Database
B B C
VLR VLR HLR AuC
Database
G Database D Database
H Database
Maguire GSM Interfaces (just some of them!) GSM, GPRS, SMS, International Roaming, OAM
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Layer
BSS MAP
TUP
ISUP
INAP
MAP
3 CM CM TUP,
(04.08) (04.08) ISUP,
INAP,
MAP
MM MM
(04.08) (04.08)
RR RR BSSAP DTAP
(04.08) (08.06)
RR BTSM BTSM BSSAP TACP TACP
(04.08) (08.58) (08.58) (08.06)
Maguire GSM Layers GSM, GPRS, SMS, International Roaming, OAM 161 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
GSM Air interface
Layer 1 (GSM Rec. 04.04): Um interface
Layer 2 (GSM Rec. 04.05/06): LAP-Dm protocol (similar to ISDN
LAP-D):
connectionless transfer of point-to-point and point-to-multipoint signaling channels
Setup and tear-down of layer 2 connections of point-to-point signaling channels
connection-oriented transfer with in order delivery, error detection and error correction
Layer 3 (GSM Rec. 04.07/08) with sublayers for control signaling
channel functions (BCH, CCCH and DCCH):
Radio resource management (RR): to establish and release stable connection between
mobile stations (MS) and an MSC for the duration of a call and to maintain connection
despite user movements - functions of MSC:
cell selection
handover
allocation and tear-down of point-to-point channels
monitoring and forwarding of radio connections
enabling encryption
change transmission mode
Mobility management (MM) handles the control functions required for mobility:
authentication
assignment of TMSI,
Maguire GSM Air interfaceGSM, GPRS, SMS, International Roaming, OAM 162 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
management of subscriber location
Connection management (CM) - set up, maintain and tear down calls connections:
Call control (CC): Manages call connections,
Supplementary service support (SS): Handles special services,
Short message service support (SMS): Transfers brief text messages
Neither the BTS nor the BSC interpret CM and MM messages, these messages are
exchanged between the MSC or the MS using the direct transfer application part
(DTAP) protocol on the A interface.
Radio Resource Management (RR) messages are mapped to or from the base
station system application part (BSSAP) for exchange with the MSC:
Transmission mode (change) management SACCH procedures
Cipher mode management radio transmission control (power & timing, downlink),
Discontinuous transmission mode management (measurements, uplink)
Handover execution general information
Call re-establishment Frequency redefinition
RR-session release General information broadcasting (BCCH)
Load management cell selection information
information for idle mode functions
information needed for access
cell identity
Maguire GSM Air interfaceGSM, GPRS, SMS, International Roaming, OAM 163 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Abis interface
Dividing line between the BSC function and the BTS
BSC and BTS can be connected using leased lines, radio links, metropolitan area
networks (MANs), LANs {see UC Berkeleys ICEBERG},
Two channel types exist between the BSC and BTS:
Traffic channels (TCH): configured in 8, 16 and 64 kbps formats - for
transporting user data
Signaling channels: configured in 16, 32, 56 and 64 kbps formats - for
signaling purposes between the BTS and BSC
Each transceiver (transmitter + receiver) generally requires a signaling channel on
the Abis interface, data is sent as Transcoder Rate Adapter Unit (TRAU)1 frames
(for a 16 kbps traffic channel (TCH), 13.6 kbps are used for user data and 2.4 kbps
for inband signaling, timing, and synchronization)
1. It is not defined where TRAU is placed, i.e., it could be part of BTS, BSC, or MSC.
Maguire Abis interface GSM, GPRS, SMS, International Roaming, OAM 164 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Abis protocols
Layer 1 (GSM Rec. 08.54)
2.048 Mbps (ITU-T: E1) or 1.544 Mbps (ANSI: T1) PCM facility
with 64/32/16 kbps signaling channels and 16 kbps traffic channels (4 per timeslot)
Layer 2 (GSM Rec. 08.56)
LAP-D protocol used for data messaging between the BTS and BSC
Service Access Point Identifier (SAPI) refers to the link identifier transmitted in the LAPD
protocol (inherited from ISDN)
Layer 3 (GSM Rec. 08.58/04.08)
BTS management (BTSM) via three logical signaling connections identified by Service
Access Point Identifier (SAPI):
SAPI 0 is used by all messages coming from or going to the radio interface
SAPI 62 provides O&M message transport between the BTS and BSC
SAPI 63 is used for dynamic management of TEIs as well as for layer 2 management
functions.
Maguire Abis protocols GSM, GPRS, SMS, International Roaming, OAM 165 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
A Interface
Defines interface between the BSC and MSC
TCHs are converted from 64 kbps to 16 kbps in the transcoder equipment, two
cases based on where the transcoder equipment (TCE, i.e., TRAU) is located:
at BSC or BTS traffic channel (TCH) occupies a complete 64 kbps timeslot in the 2 Mbps or 1.544 Mbps PCM
link (layer 1, GSM Rec. 08.04)
At least 2 time slots on the PCM link are needed for control and signaling
purposes.
Maguire A Interface GSM, GPRS, SMS, International Roaming, OAM 166 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
A interface protocols
Signaling protocol (layer 2+3) between BSC and MSC based on the SS7 standard
and is transmitted along with the user data within the PCM facility. Normally
timeslot 16 (TS16) of the 64 kbps frame is used.
The following protocols are employed:
Layer 1 (GSM Rec. 08.04) either 2.048 Mbps (ITU-T: E1) or
1.544 Mbps (ANSI: T1) PCM link
Layer 2 (GSM Rec. 08.06) SS7-based protocols
Message transfer part (MTP) protocol - transmission security between the BCS and MSC
Signaling connection control part (SCCP) protocol
SCCP connection can be initiated by a mobile station (MS) or an MSC
An SCCP connection can involve the following protocols:
From the MS:
MM: CM service request
RR: Paging response
MM: Location updating request
MM: CM re-establishment request
From the MSC:
Initiation of an external handover (BSSMAP: handover request).
MSC manages the SCCP connections
Maguire A interface protocols GSM, GPRS, SMS, International Roaming, OAM 167 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Layer 3 (GSM Rec. 08.08)
Base station system application part (BSSAP) protocol
On MSC end:
Base station management application part (BSSMAP) protocol - counterpart to the RR
protocol on the air interface
Direct transfer application part (DTAP) protocol transmits CC and MM messages trans-
mitted transparently through the BTS and BSC
Maguire A interface protocols GSM, GPRS, SMS, International Roaming, OAM 168 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
GSM Audio
Speech coding - 20ms (i.e., 160) samples (8kHz @13 bits) are buffered then coded
Error protection (codec specific)
Error detection (CRC)
Muting and Bad Frame Handling (substitution) - GSM 06.91
Comfort Noise Generation (CNG) - GSM 06.92
Voice Activity Detection (VAD) - GSM 06.94
Discontinuous Transmission (DTX) - GSM 06.93)
Manufacturer specific audio features:
noise cancelling
spectrum equalization
echo cancellation
CODECs
Full rate (FR) 13 kbps , Regular pulse excitation - long term prediction (RPE-LTP)
Half rate (HR) 5.65 kbps VSELP
Enhanced full rate (EFR) 12.2 kbps Algebraic Code Excited Linear Prediction (ACELP)
Adaptive Multi Rate (AMR) ACELP; eight bit rates ranging from 4.75 kbps .. 12.2 kbps - see [46]
Adaptive Multi Rate (AMR) codes 16 bit linear PCM at 16 kHz; 9 data rates (6.6 .. 23.85 kbps)
wideband - ITU G.722.2 C callable interface for encoder/decoder
and 3GPPs
GSM-AMR WB
Maguire GSM Audio GSM, GPRS, SMS, International Roaming, OAM 169 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
MSC interfaces and protocols
ISUP
H C E
AuC HLR MSC MSC Digital
F Newtorks
D INAP
IN
EIR B B
G POTS
VLR VLR TUP
Maguire MSC interfaces and protocols GSM, GPRS, SMS, International Roaming, OAM 170
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
GSM Logical Channels
Traffic channels Full-rate (TCH/F) @ 22.8 kbps Two way
Half-rate (TCH/H) @ 11.4 kbps
Paging (PCH)
Signaling Common control channels
channels Access Grant (AGCH)
Maguire GSM Logical Channels GSM, GPRS, SMS, International Roaming, OAM 171 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Traffic channel (TCH)
Multiframe - group of 26 TDMA frames (120 ms long)
24 are used for traffic (voice or user data)
1 is used for the slow associated control channel (SACCH)
1 is currently unused
TCHs for the uplink and downlink are separated in time by 3 burst periods
mobile station does not have to transmit and receive simultaneously
simplifies the electronic circuitry; avoids antenna duplex filters
reducing complexity helps to cut power consumption
Maguire Traffic channel (TCH) GSM, GPRS, SMS, International Roaming, OAM 172 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Broadcast channels (BCH)
Carry only downlink information - mainly for synchronization and frequency
correction.
However, it is the only channel capable of point-to-multipoint communications in
which short messages are simultaneously transmitted to several mobiles.
Broadcast control channel (BCCH)
General information, cell-specific; e.g. local area code (LAC), network operator, access
parameters, list of neighboring cells, etc. A MS receives signals via the BCCH from many
BTSs within the same network and/or different networks
tells MS what their initial power level should be
Frequency correction channel (FCCH)
correction of MS frequencies
transmission of frequency standard to MS
also used for synchronization of an acquisition by providing the boundaries between
timeslots and position of the first time slot of a TDMA frame
Synchronization channel (SCH)
frame synchronization (TDMA frame number) and identification of base station
reception of one SCH burst provides a MS with all the information needed to synchronize
with a given BTS
Maguire Broadcast channels (BCH)GSM, GPRS, SMS, International Roaming, OAM 173 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Common control channels (CCCH)
Uplink and downlink channels between the MS card and the BTS.
Convey information from the network to MSs and provide access to the network.
Paging channel (PCH)
Downlink only
MS is informed (by the BTS) of incoming calls via the PCH.
Access grant channel (AGCH)
Downlink only
BTS allocates a TCH or SDCCH to the MS, thus allowing the MS access to the network.
Random access channel (RACH)
Uplink only
allows MS to request an Stand-alone dedicated control channel (SDCCH) in response to a
page or due to a call
MS chooses a random time to send on this channel (note: potential collisions with RACH
transmissions from other MSs)
PCH and AGCH are transmitted in one channel called the paging and access grant
channel (PAGCH) - they are separated in time.
Maguire Common control channels (CCCH) GSM, GPRS, SMS, International Roaming, OAM
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Dedicated control channels (DCCH)
Responsible for roaming, handovers, encryption, etc.
Stand-alone dedicated control channel (SDCCH)
communications channel between MS and the BTS
signaling during call setup -- before a traffic channel (TCH) is allocated
It takes ~480ms to transmit a message via SDDCH
Slow associated control channel (SACCH)
always allocated to a TCH or SDCCH
used for non-urgent procedures: radio measurement data (e.g. field strengths) {information
is used for handover decisions}, power control (downlink only), timing advance1,
260bps channel - enough for reporting on the current cell and upto 6 neighbors about twice
per second (if there is no other traffic for this channel)
note that the MS is told what frequencies to monitor (BTSs have a color code assigned to
them so the that the MS can report on multiple BTSs which are using the same frequency)
Fast associated control channel (FACCH)
similar to the SDCCH, but used in parallel to operation of the TCH
if the data rate of the FACCH is insufficient, borrowing mode is used (i.e., additional
bandwidth borrowed from the TCH), this happens for messages associated with call
establishment authentication of the subscriber, handover decisions,
It takes ~40ms to transmit a message via FACCH
1. Transmission and reception of bursts at the base station must be synchronized, thus the MS must compensate for the propagation delays by advancing its
transmission 0 .. 233 ms which is enough to handle cells of radius up to 35 km.
Maguire Dedicated control channels (DCCH) GSM, GPRS, SMS, International Roaming, OAM
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
GSM Timing
A very elaborate timing structure ranging from 1/4 of a bit (900ns) to an
encryption hyperframe (3 hours 28 minutes and 53.76s)!
Unit Time
bit 3.69us
traffic multiframe 26 frames (120 ms) or control multiframe 51 frames (235.4 ms)
Maguire GSM Timing GSM, GPRS, SMS, International Roaming, OAM 176 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Incoming Call
1. incoming call is passed from the fixed network
to the gateway MSC (GMSC)
2. based on the IMSI numbers of the called party,
HLR is determined
Radio Link 3. HLR checks for the existence of the called
8 number, then the relevant VLR is requested to
9 provide a mobile station roaming number
8
12 BTS 11
(MSRN)
10
ME 7 4. reply transmitted back to the GMSC
VLR
SIM 8 Database 5. connection is switched through to the
8 8 6 4 responsible MSC
MS BSC MSC
BTS 6. VLR is queried for the location range and reach
9
12 8 ability status of the mobile subscriber
8
7. if the MS is marked reachable, then a radio call
8 5 is enabled
BTS GMSC
8. radio call is executed in all radio zones assigned
8 2 3 to the VLR
8 BSC PSTN 9. reply from the MS in its current radio cell
BTS HLR
Database
8 10.when mobile subscriber telephone responds to
8 1 the page, then complete all necessary security
BTS
procedures
11.if this is successful, the VLR indicates to the
MSC that call can be completed
12.call can be completed
Figure 25: Call from fixed network to MS - we dont know which cell the mobile is in, only its rough location
Maguire Incoming Call GSM, GPRS, SMS, International Roaming, OAM 177 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Mobility Management (MM)
GSM network keeps track of which mobile telephones are powered on and active
in the network.
The network keeps track of the last known location of the MS in the VLR and
HLR.
Radio sites connected to the MSC are divided into location areas (LAs), thus
when a call comes for an MS, the network looks for the MS in the last known
location area.
Each BTS is assigned (by the operator) a 40 bit ID - called a location area identity
(LAI), with three parts:
mobile country code (MCC) - 3 (hex) digits [67]
http://en.wikipedia.org/wiki/Mobile_country_codes
mobile network code (MNC) - originally 2, later 3 (hex) digits
location area code (LAC) - originally 5, later 4 hex digits (= 2 bytes = 65K values)
Within each location area - each cell has a Cell ID (CID)
Cell Global Identity (CGI) = CID, MCC, MNC, and LAC
Maguire Mobility Management (MM)GSM, GPRS, SMS, International Roaming, OAM 178 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Security
Use of TMSI rather than IMSI - reduces the need to send IMSI over the air (thus
simply listening to the radio link it is harder to identify a given user); there is a
pool of TMSIs for each LAC.
Two major aspects of security: Authentication and Encryption
A3 Authentication algorithm
A5 Ciphering algorithm
A8 Ciphering key computation
Ki secret encryption key - operator determines length, but it can be upto 128 bits
Kc cypher key, computed based on Ki
Maguire Security GSM, GPRS, SMS, International Roaming, OAM 179 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Authentication
User authentication normally takes place when the MS is turned on (user must key
in a PIN code on the handset in order to activate the hardware before this automatic
procedure can start).
Authentication occurs with each incoming call and outgoing call. This is based on
checking that Ki (secret encryption key) stored in the AuC matches the Ki
stored in SIM card of the MS.
Maguire Authentication GSM, GPRS, SMS, International Roaming, OAM 180 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Authentication and Encryption
MS Home System
RAND
Ki Ki
reject
A8 A3 No
A3 A8
Authentication Authentication
=
SRES Yes
SRES Kc
accept
Encryption Encryption
visited system
Kc frame number Kc
Maguire Authentication and Encryption GSM, GPRS, SMS, International Roaming, OAM 181
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
GSM data rates
The following table of data rates is from page 39 of [41]
TCH/F9.6 T 330 ms
TCH/F4.8 T 330 ms
TCH/F2.4 T 200 ms
TCH/H4.8 T 600 ms
TCH/H2.4 T 600 ms
a. T = Transparent, NT = Non-transparent
Maguire GSM data rates GSM, GPRS, SMS, International Roaming, OAM 182 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
System engineering
The operator must choose how many of each element (MSC, BSC, BTS, ) to
order, what capacity each must have, where to install them, . However, since
traffic does not remain constant installing enough capacity for long term traffic is
not cost effective system engineering is an on-going activity
Note: goal of cellular planning is to choose the cell sites and cell parameters
(frequency allocation, capacity, power, etc.) to provide economically continuous
coverage and support the required traffic density (not an easy task)
Table of parameters, from page 101 of [41]
Area Parameters
Cell planning frequencies handover parameters
beacon frequencies cell selection parameters
hopping sequences Base Station Identity Code (BSIC)
power control parameters
Dimensioning # of common channels location areas
# of traffic channels periodic location updating
Load control overload control parameters
Maguire System engineering GSM, GPRS, SMS, International Roaming, OAM 183 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
GSM Network Optimization
Based on network performance & utilization, subscriber behavior, and (QoS)
Test methods:
Traffic analysis: the signaling channels in the PCM frame are
monitored and analyzed on the Abis and A interfaces
Bit error ratio test (BERT): bit error measurement at the PCM level
and the GSM-specific level (TRAU frame)
PCM bit error ratio (BER) is used to verify the quality of lines leased from fixed network
operators
By evaluating the control bits in the TRAU, a bit error probability can be determined (uplink)
during actual communications (in-service) {No easy measurement of the downlink BER}
More accurate radio link BER measurement (out-of-service) measurement in which the 260
data bits in the TRAU frame are checked using a pseudo-random bit sequence (PRBS)
Alarm monitoring - checking PCM links for layer 1 alarms
Network quality test: lots of measurements - including:
island problems, detection of coverage holes, interference, network load regarding signaling
and traffic, handover failures, Receive level (RXLEV) surveillance, bit error ratio of a BTS
(RXQUAL), multipath interference and propagation delays, frequency interference (due to
nearby frequency reuse), call completion/disconnect rate, indications of system overload.
Maguire GSM Network OptimizationGSM, GPRS, SMS, International Roaming, OAM 184 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Optimal Cell Planning
Some of the parameters which have to be decided [44]:
Selecting Site location
Antenna parameters
Tilt, Azimuth, Height, Antenna type
Site parameters
Transmitter power/Dedicated channel power level/Common channel power level
Service parameters
Power per service
Enable/disable handover per service
Network parameters
Handover
Neighbor lists/Hysteresis/Timers
Power control policy
Resource management
Note: first two are sets of parameters are fixed ( a physical change in the site),
while the others can be changed under software control.
Maguire Optimal Cell Planning GSM, GPRS, SMS, International Roaming, OAM 185 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Features
Call Waiting (CW) {network-based feature} users with a call in progress receive an audible beep to alert them
that there is an incoming call for their MS
The incoming call can be:
accepted {the original call is put on hold},
sent to voice mail, or
rejected {in this case the caller will receive a busy signal}
Call Hold (CH) allows the MS to park an in progress call, to make additional calls or to receive
incoming calls
Call Forwarding {network-based feature} allows calls to be sent to other numbers under conditions defined
(CF) by the user
Conditions can be either unconditional or dependent on certain criteria (no answer, busy, not
reachable)
Calling Line ID callers network to delivers the calling line ID (telephone no.) to the GSM network; GSM
telephone displays the originating telephone number
Maguire Features GSM, GPRS, SMS, International Roaming, OAM 186 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
GSM Phase 2+
High Speed Circuit Switched Data (HSCSD)
General Packet Radio Service (GPRS)
Maguire GSM Phase 2+ GSM, GPRS, SMS, International Roaming, OAM 187 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
High Speed Circuit Switched Data (HSCSD)
Idea is simple use several time slots out of each TDMA frame for one data connection
In the basic GSM model transmit/receive (TX/RX) activities, the terminal can be
implemented using one frequency synthesizer (even though it takes some time for
the synthesizer to change from one frequency to another) - because of the offset of
3 slots between transmit and receiver.
If you only use 2 slots, you just need a synthesizer that changes faster, but at 3 slots
you potentially need to transmit and receive at the same time.
At eight time slots (i.e., continuous transmission):
monitoring neighboring base stations would require an independent receiver
the terminal will be more expensive than one slot terminals
power consumption will be much higher
Multi-slot systems have required changes in: ciphering, frequency hopping, and
generally radio resource management functions.
Maguire High Speed Circuit Switched Data (HSCSD) GSM, GPRS, SMS, International Roaming,
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
HSCSD depends on:
Terminal Adaptation Function (TAF)
Interworking Functions (IWF)
enhanced RLP to handle multilink (aka multiple time slot) operation
Radio Link Protocol (RLP)
BSS
Abis
X.25 PSDN PSTN
Um OMC
BTS SS7/ISUP
X.25
ME
SIM MS Gateway MSC
A IWF
(GMSC)
EIR
NSS
TAF BSC MSC MSC MSC
E E F Database
B B C
TE
VLR VLR HLR AuC
Database
G Database D Database
H Database
Nokias Card Phone 2.0: HSCSD at upto 43.2 kbps (without data compression)
Maguire High Speed Circuit Switched Data (HSCSD) GSM, GPRS, SMS, International Roaming,
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
General Packet Radio Service (GPRS)
GPRS features:
True packet radio system - sharing network and air interface resources
Volume based charging
TCP/IP (Internet & Intranet) interworking, SMS over GPRS, (and X.25
interworking)
Peak data rate from 9.05 kbps .. 171.2 kbps
bandwidth may be asymmetric, for example: 2 up/4 downlink channels
Protocols designed for evolution of radio
Enhanced Data rates for Global Evolution (EDGE) - a new 3G GSM modulation scheme
Migration into 3rd Generation
Maguire General Packet Radio Service (GPRS) GSM, GPRS, SMS, International Roaming, OAM
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
GPRS nodes
GPRS introduces new network elements
Serving GPRS Support Node (SGSN)
authentication & authorization, GTP tunneling to GGSN, ciphering & compression, mobility
management, session management, interaction with HLR,MSC/VLR, charging & statistics,
as well as NMS interfaces.
Gateway GPRS Support Node (GGSN)
interfacing to external data networks (basically it is a network router)
encapsulating data packets in GTP and forwarding them to right SGSN,
routing mobile originated packets to right destination, filtering end user
traffic, as well as collecting charging and statistical information of data
network usage
GPRS is the result of committees trying to adapt Mobile IP to GSM systems.
Maguire GPRS nodes GSM, GPRS, SMS, International Roaming, OAM 191 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
GSM/GPRS Architecture and Interfaces
Radio Link (with radio media access protocol) VLR AuC
Database Database
BSS
BTS
BTS
BSC MSC HLR
Database
ME
Internet
SIM Gc
TAF
MS Gs EIR
Database
BTS
BTS
BSC Gf Gr
TE Gb
BTS Gi
GPRS
BSC SGSN GGSN
PLMN BTS Gn Backbone Gn
Gp Ga Ga
GGSN CGF Billing system
Ga Charging data collection interface between a CDR Gi reference point between GPRS and an external packet
transmitting unit (e.g. a SGSN or a GGSN) data network (Gi = internet)
Gb between a SGSN and a BSS (Gb = base interface) Gn between two GSNs within the same PLMN (Gn = node)
Gc between a GGSN and a HLR (Gc = context) Gp between two GSNs in different PLMNs (Gp interface
allows support of GPRS network services across areas
served by the co-operating GPRS PLMNs.) (Gp = PLMN)
Gd between a SMS-GMSC and a SGSN, and between Gr between an SGSN and a HLR (Gr = roaming)
a SMS-IWMSC and a SGSN (not shown)
Gf between an SGSN and a EIR (Gf = fraud) Gs between a SGSN and a MSC/VLR
Maguire GSM/GPRS Architecture and InterfacesGSM, GPRS, SMS, International Roaming, OAM
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
GPRS Coding Schemes
Four coding schemes (but only CS1 and CS2 are in early systems)
User Data Rate 9.05 kbps 13.4 kbps 15.6 kbps 21.4 kbps
40 bytes (320 bits) of payload 1956 bits 1132 bits 1018 bits 625 bits
see [48], pg. 33
1500 bytes (12000 bits) 55787 bits 32490 bits 27218 bits 19345 bits
a. For comparison with GSM the worst-case link budget is 142.5 dB.
The real problem is that GPRS uses interleaving to spread the effect of burst errors
- but this means that the delay is always high!
Maguire GPRS Coding Schemes GSM, GPRS, SMS, International Roaming, OAM 193 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Unstructured Supplementary Service Data
(USSD)
When MS can not recognize text - it simply passes it to the network as USSD.
USSD supports all digits, asterisk (*), and punt/pound (#) keys. In the form:
(* | #) command_code (2-3 digits) {*parameter}* #
total length up to 200 ASCII characters
A USSD server (or gateway) is connected to the users HLR via MAP and to
servers (which actually provide a specific service) via TCP/IP. USSD is thought
to be ~7x faster than SMS for two-way transactions (this is because USSD is
session oriented as opposed to SMSs store-and-forward behavior).
BSS
SS7/MAP USSD Internet
ME BTS
BSC MSC HLR
Gateway
SIM
MS BTS Database
TCP/IP
TE
VLR
Database
Application Application
Server Server
Maguire Unstructured Supplementary Service Data (USSD) GSM, GPRS, SMS, International Roaming,
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
USSD continued
Examples:
set-up or cancel of services like call forwarding
Swisscoms SIm Card Application Platform (SICAP) prepaid roaming
platform1: users dial in a USSD string that includes the telephone
number they want to call (e.g., *101*NUMBER#) this is sent to the
SICAP platform at their (home) operator, who then connects them to
the desired number by dialling them back!
In addition to passing the USSD message to the external application, the USSD
Gateway passes:
originating subscribers MSISDN
number of the HLR which handled the USSD
originating subscribers IMSI (optional)
VLR Number (optional)
Disadvantage: USSD and SMS both use the same control channel
Maguire USSD continued GSM, GPRS, SMS, International Roaming, OAM 195 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Short Message Service (SMS)
Short Message Service (SMS) offers connectionless (message) delivery (similar
to two-way-paging)
If the GSM telephone is not turned on, the message is held for later delivery. To
Ensure that each time a message is delivered to an MS, the network expects to
receive an acknowledgement from the MS that the message was correctly
received.
SMS supports messages up to 140 octets (160 characters of GSM
default Alphabet - see GSM 03.38) in length.
SMS concatenation - combines several messages
SMS compression - defined standard for compression of content
With international roaming these messages can be delivered by any GSM network
around the world to where the MS currently is.
Two types of messages: cell broadcast and point-to-point service
Maguire Short Message Service (SMS) GSM, GPRS, SMS, International Roaming, OAM 196
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
SMS message types
User-specific message is to be display to the user
ME-specific message is targeted at the mobile terminal itself
playing a ring tone
displaying a business card
changing the default icon
SIM-specific message is targeted at the SIM card
change the balance in a pre-paid card
Maguire SMS message types GSM, GPRS, SMS, International Roaming, OAM 197 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Short Message Service Architecture
SMSC Short Message Service Centre
SMS GMSC SMS Gateway MSC
IWMSC Interworking MSC
ESME External Short Message Entities
BSS
SMSC
SMS EAI
ME
BTS
SGSN Database PSDN
SIM
MS Gd
BTS BSC ESME
TE
SMS GMSC
IWMSC
Gateway MSC
(GMSC) E
IWF
MSC EIR
E MSC E MSC F Database C
B B C
VLR VLR HLR AuC
Database
G Database D Database
H Database
Maguire Short Message Service Architecture GSM, GPRS, SMS, International Roaming, OAM
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
SMSCs
High reliability
High availability
Logicas Picasso SMS Centre allows new hardware can be added within 60 seconds, with
no service outage
High performance
HPs (formerly Compaqs) AlphaServer ES45,over 8,000 SMS deliveries per second with
CMG Wireless Data Solutions (formerly CMG Telecommunications) SMSC software [54];
note that they have merged with Logica plc forming: LogicaCMG
Logicas Picasso SMS Centre supports 1 to 128 nodes with automatic load sharing
existing SMSCs talk TCP/IP as well as other protocols
SMS brokers: buy SMS capacity in bulk, they receive your messages
and then transfer them to operators that they have agreements with.
As each SMS is charged for the resulting CDR volumes can be very
high, e.g., Mannesmann has peak CDR rates as high as 2,500-3,000
CDRs per second ([57], pg. 13).
For a performace study of SMS and MMS centers see [64].
William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta, "Exploiting Open
Functionality in SMS Capable Cellular Networks" [65], describes a distributed denial of
service via SMS
Maguire SMSCs GSM, GPRS, SMS, International Roaming, OAM 199 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Three kinds of SMSs
User-specific display to a user
ME-specific ME processes the message when it is received
Nokia has special function to play ring tone, display a business card, modify the default icon,
Maguire Three kinds of SMSs GSM, GPRS, SMS, International Roaming, OAM 200 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Entering Short Messages
To improve the speed of entering SMSs (and other text)
Full keyboards (such as Ericssons Chat Board)
Onscreen keyboard (such as Palms on-screen keyboard)
Fitaly keyboard - arranges letters based on their frequency and
probability transitions in English (see page 43 of [53])
Predictive text input algorithms
Tegic T9 - utilizes numeric keypad and probability to work out probably string
(see page 45 of [53])
e-acutes Octave keyboard (see pages 46-47 of [36])
Handwriting recognition
Word recognition, such as Psions CalliGrapher (see pages 47-48 of [36])
Character recognition, such as Palms Graffiti (see pages 48-49 of [36]) and
CJKOS - an OS extension for Palm for Chinese, Japanese, and Korean (see page 49 of [36])
Speech recognition
Maguire Entering Short Messages GSM, GPRS, SMS, International Roaming, OAM 201 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
SMS shorthand
From Get 2 grips with SMS-speak b4 its 2 L8 ! some examples:
afasik as far as I know <g> grin sc stay cool
asap as soon as possible gr8 great sol sooner or later
atw at the weekend gsoh good sense of humour t+ think positive
awhfy are we having fun yet? h2cus hope to see you soon t2ul talk to you later
b4 before hak hug and kisses tuvm thank you very much
bbfn bye bye for now ic I see w4u waiting for you!
bcnu be see in you idk I dont know wuwh wish you were here
brb be right back idts I dont think so! X! Typical woman!
btw by the way iow in other words Y! Typical man!
cm call me j4f just for fun
cu see you kc keep cool
cul8ter see you later khuf know how you feel
dk dont know l8r later
dur? do you remember m8 mate
e2eg ear to ear grin mtfbwu may the force be with you
eod end of discussion nc no comment
F? Friends? nwo no way out
F2F Face to Face o4u only for you
fya for your amusement O!ic Oh, I see!
fyi for your information ruok are you okay?
Maguire SMS shorthand GSM, GPRS, SMS, International Roaming, OAM 202 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
External Application Interface (EAI)
In order to enable non-mobile External Short Message Entities (ESME) to
interface with an SMSC one of the following protocols (which all run over
TCP/IP) is generally used:
Note:
this avoids the earlier problem of the interface to the SMSC being closed;
more and more operators seem to be converging on using SMPP.
Maguire External Application Interface (EAI) GSM, GPRS, SMS, International Roaming, OAM
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Voice Messaging System (VMS)
A value-added service which redirects incoming calls (i.e., forwards them) to a
voice mailbox when MS is turned off, low on battery, left unattended (after ringing
for xx seconds) or temporarily out of coverage.
A Voice Message Alert (VMA) can be send (via SMS) to the MS to let the user
know there is a waiting voice message.
Note that you can use SMSs replace message facility - to over-write last VMA
- thus there will only be one message with the latest status voice messages (for
example saying: You have N voice messages waiting).
Maguire Voice Messaging System (VMS)GSM, GPRS, SMS, International Roaming, OAM 204
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Voice Profile for Internet Mail (VPIM)
Voice Profile for Internet Mail (VPIM) Version 2 is currently a Proposed Standard
(RFC 2421) Applicability Statement, it is an application of Internet Mail originally
intended for sending voice messages between voice messaging systems
http://www.ema.org/vpim
http://www.ietf.org/html.charters/vpim-charter.html
Maguire Voice Profile for Internet Mail (VPIM) GSM, GPRS, SMS, International Roaming, OAM
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Enhanced Message Service (EMS)
Allows basic graphics, icons, and sounds to be incorporated in SMS messages.
Based on concatenating (i.e., linking together a chain of) several SMS messages
Maguire Enhanced Message Service (EMS) GSM, GPRS, SMS, International Roaming, OAM
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Multimedia Messaging Service (MMS)
MMS Centre (MMSC) - a logical extension of an SMS Centre, but must cope with
a larger variety of message types; in addition, it can convert message formats to
suit the capabilities of the receiving terminal
Four key functional elements:
MMS Relay - engine which transcodes and delivers messages to
mobile subscribers
MMS Server - provides the store in the store-and-forward architecture
MMS User Databases - user profiles, subscription data,
MMS User Agent - an application server which enables users to view,
create, send, edit, delete, and manage their multimedia messages
An MMS presentation can utilize a synchronization language (e.g. Synchronized
Multimedia Integration Language (SMIL)[107]) for synchronized presentation.
In addition to store and forward, MMS also supports store and retrieve (via e-mail
and web), but it was primarily designed as a person-to-person service.
Maguire Multimedia Messaging Service (MMS) GSM, GPRS, SMS, International Roaming, OAM
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
SMS over GPRS
Can send SMS over GPRS - thus avoiding the problem of SMS utilizing the GSM
control channel
However, if users send their messages directly via an messaging application or via
e-mail -- this could take a lot of revenue away from the operators (as SMS and
MMS have a high premium over the cost of simply transferring the bits).
Maguire SMS over GPRS GSM, GPRS, SMS, International Roaming, OAM 208 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
International Roaming
GSMs roaming feature allows a user to make and receive calls in any GSM
network and to use the same user-specific services worldwide, but this requires a
roaming agreement between the individual operators.
Good news With worldwide roaming the MS is accessible via the same phone number everywhere!
Bad news It could be very expensive - much more expensive than you think!
The basic problem is that when you roam to another network (for example, in
another country) - your Mobile Station ISDN number (MSISDN) still looks like it
is in your home network.
Worse: If you are in the same (non-home) network as the person you are calling,
this results in two international calls! This is due to tromboning. For four solutions
see section 13.2 of [66], pages 242-249.
Maguire International Roaming GSM, GPRS, SMS, International Roaming, OAM 209 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Enhanced Data Rates for GSM Evolution
(EDGE)
enhanced modulation technique designed to increase network capacity
and data rates in GSM networks
provide data rates up to 384 Kbps.
EDGE lets operators without a 3G license compete with 3G networks
(since the data rates are comparable in the wide area)
GSM/EDGE Radio Access network (GERAN)
The radio interface used in Enhanced Data Rates for GSM Evolution (EDGE)
Maguire Enhanced Data Rates for GSM Evolution (EDGE) GSM, GPRS, SMS, International Roaming,
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
EGRPS
EGPRS = EDGE -- an extension/enhancement of GPRS including 4 new Data
Packet Traffic Channels using 8-PSK modulation and a incremental redundancy
mechanism extended to the GMSK based data packet traffic channels.
Support for simultaneous, multiple radio access bearers with different QoS profiles.
New bearer classes:
Conversational Class Voice & video conferencing where small delay is required
Background Class Delay insensitive but requires few errors (may require multiple
re-transmissions to hide errors)
Maguire EGRPS GSM, GPRS, SMS, International Roaming, OAM 211 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Operation/Administration/Maintenance
Operation/Administration/Maintenance (OA&M) follows ITU-Ts
Telecommunications Management Network (TMN) model, which has several
components:
Operations system (OS) OS uses Operating System Function (OSF) to provide overall
management, billing, account, management of mobile equipment, HLR
measurement,
Network Element Functions provides monitoring and control of Network Elements (NEs): HLR,
(NEFs) VLR, AuC, EIR, MSC, BSC, and BTS
Data Communication OS, NEs, and other TMN elements via Data Communication Function
Network (DCF)
Workstation (WS) OA&M personnel interact with OS via Workstation functions (WSFs)
I personally find this ITU-T speak! But you have to talk the talk to walk the walk!
[37] M. Mouly and MB Paulet, The GSM System for Mobile Communications,
Mouly and Paulet, 1992
[38] M. Mouly and MB Paulet, Current evolution of the GSM systems, IEEE
Personal Communications, vol. 2, no. 5, pp. 9-19, 1995.
[39] David J. Goodman, Wireless Personal Communications Systems, Chapter 7,
GSM: Pan-European Digital Cellular System, Addison-Wesley, 1997,
ISBN 0-201-63470-8
[40] Marc Kahabka, GSM Pocket Guide revised version Vol. 2, Acterna Eningen
GmbH, 72795 Eningen u. A., Germany
[41] Petri Jarske, The GSM System, Principles of Digital Mobile Communication
Systems, 2001 edition, Technical University Tampere, Finland
http://www.cs.tut.fi/kurssit/83150/DigiCom2001.PDF
Maguire Further reading GSM, GPRS, SMS, International Roaming, OAM 213 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
[42] Sudeep Kumar Palat, Replication of User Mobility Profiles for Location
Management in Mobile Networks, Dr. Ing. dissertation, Norwegian
University of Science and Technology, Dept. of Telematics, 12 Jan. 1998.
[43] GSM security
http://www.isaac.cs.berkeley.edu/isaac/gsm.html
[45] Mobile Application Part (MAP) ETSI R10 ETSI 08/96, CAA 201 45 - was
at http://www.ericsson.com/signaling/cards/map_etsi.shtml
[46] 3GPP GSM-AMR standards:
3GPP TS 26.071 V4.0.0 AMR Speech Codec; General Description
3GPP TS 26.090 V4.0.0 AMR Speech Codec; Transcoding functions
3GPP TS 26.091 V4.0.0 AMR Speech Codec; Error concealment of lost frames
3GPP TS 26.092 V4.0.0 AMR Speech Codec; Comfort noise aspects
3GPP TS 26.093 V4.0.0 AMR Speech Codec; Source controlled rate operation
3GPP TS 26.094 V4.0.0 AMR Speech Codec; Voice activity detector
3GPP TS 26.071 V4.0.0 ANSI-C code for AMR speech codec (Code Version 7.5.0)
Maguire Further reading GSM, GPRS, SMS, International Roaming, OAM 214 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
3GPP TS 26.074 V4.0.0 AMR Speech Codec; Test sequences
GPRS
[47] Jari Hmlinen, Design of GSM High Speed Data Services, Dr. Tech.
dissertation ,Tampere University of Technology, Department of Information
Technology, 4 October 1996.
[48] Jouni Mikkonen, Quality of Services in Radio Access Networks, Dr. Tech.
dissertation,Tampere University of Technology, Department of Information
Technology, 19 May 1999.
[49] Don Zelmer, GPRS, EDGE, & GERAN: Improving the performance of
GSM & TDMA Wireless by Packet Capabilities, Cingular Wireless LLC,
SUPERCOMM 2001, Atlanta, Georgia, Wednesday, June 6, 2001
http://www.atis.org/atis/Pictures/Supercomm01/Presentationfolder/T1P1zelmer3Gtemplate2.PDF
[53] Jochen Burkhardt, Dr. Horst Henn, Stefan Hepper, Klaus Rintdoff, and
Thomas Schck, Pervasive Computing: Technology and Architecture of
Mobile Internet Applications, Addison-Wesley, 2002, ISBN 0-201-72215-1
[54] CMG ANNOUNCES THIRD-GENERATION HIGH-PERFORMANCE
SMS CENTRE: AlphaServer-based SMSC clocks unrivalled 8,000
sustained deliveries per second, Nieuwegein, the Netherlands, Feb. 19th 200,
http://h18000.www1.hp.com/products/software/in7/art4.html
Maguire Further reading GSM, GPRS, SMS, International Roaming, OAM 216 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Centres (SMSCs) Uncovered: More Than Just Text!, Lehman Brothers,
November 2000, Pub Codes: 01/07/43/2035,
http://www.airslide.com/pdf/lehman.pdf
[59] Short Message Service Centre (SMSC) External Machine Interface (EMI)
Description, Version 4.1, September 2003
http://www.vodafone.de/downloadarea/UCP-Protokoll_Emi4_1.pdf
[63] http://www.3gpp.org/ftp/specs/2002-03/Rel-4/23_series/23140-460.zip
[64] Adrian Mahdavi, Value Added Services and Content Platforms, M. Sc.
Thesis, KTH/IMIT, 25 June 2003.
ftp://ftp.it.kth.se/Reports/DEGREE-PROJECT-REPORTS/030627-Adrian_Mahdavi.pdf
[65] William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta,
Exploiting Open Functionality in SMS Capable Cellular Networks, 12th
ACM Conference on Computer and Communications Security
(CCS05),November 7-11, 2005, Alexandria, VA, USA
http://smsanalysis.org/
http://www.smsanalysis.org/smsanalysis.pdf preprint: September 2, 2005
International Roaming
[66] Yi-Bing Lin and Imrich Chlamtac, Wireless and Mobile Network
Architectures, Chapter 13, psages 239-250 in [1].
[67] The international identification plan for mobile terminals and mobile
Maguire Further reading GSM, GPRS, SMS, International Roaming, OAM 218 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
users, ITU E.212, revised May 2004
http://www.itu.int/rec/recommendation.asp?type=items&lang=e&parent=
T-REC-E.212-200405-I {note that ITU charges for access to the document}
[69] ECTRA Decision on Mobile Network Codes 2013 Change from 2-digits to
3-digits, GSM Europe, Paris, France, 1st September 2000
http://www.gsmworld.com/gsmeurope/documents/positions/2000/ectra_we
b.pdf
Operation/Administration/Maintenance
[70] Yi-Bing Lin and Imrich Chlamtac, Wireless and Mobile Network
Architectures, Chapter 14, pp. 252-263 in [1].
Maguire Further reading GSM, GPRS, SMS, International Roaming, OAM 219 of 219
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
2G1330 Mobile and Wireless Network
Architectures
Maguire Lecture 4 Number portability, VoIP, Prepaid, Location Based Services 221
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Database lookups
Local Number Portability (LNP)
Maguire Three kinds of Local Number PortabilityNumber portability, VoIP, Prepaid, Location Based
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Mobile Number Portability (MNP)
requirement that any mobile (e.g., GSM) subscriber be able to move to a new
operator or service provider and keep the same number (MSISDN)
Maguire Mobile Number Portability (MNP) Number portability, VoIP, Prepaid, Location Based
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Non-geographic number portability (NGNP)
numbers (typically) associated with a service rather than a geographic destination,
e.g., freephone, low rate calling numbers, premium rate numbers; requires that the
service provider can be changed without a change of number; these all require DB
lookup
Maguire Non-geographic number portability (NGNP) Number portability, VoIP, Prepaid, Location
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Call forwarding at donor end
Donor = service provider whom the number is initially associate with
Database
Originating network
Donor network
Transit network
Recipient network
Maguire Call forwarding at donor endNumber portability, VoIP, Prepaid, Location Based Ser-
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Drop back forwarding
Database
Originating network
Donor network
redirect
Transit network
Recipient network
transit network gets a redirect from the donor network, it may be able
to pass this all the way back to the originating network (i.e., dropping
back through each of the networks to the originating network)
makes better use of transmission capacity and can handle multiple
portings
the donor network continues to control first and subsequent portings.
Maguire Drop back forwarding Number portability, VoIP, Prepaid, Location Based Servic-
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Query on release (QoR) solutions
Database
Originating network
Donor network
release
Transit network
Recipient network
Database
Donor network realizes the number has been ported out and sends an
ISUP release or it might not know anything about this number (i.e., not
it its DB any longer) releases the call
Release causes an intermediate point to query a portability database
and to redirect the call.
If the forward signalling indicates that preceding networks have QoR
capability, then the release goes all the way to the originating network,
which does the DB lookup and reroutes the call to recipient network.
Maguire Query on release (QoR) solutions Number portability, VoIP, Prepaid, Location Based
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Look up type solutions
Originating network
Donor network
Transit network
Recipient network
Database
portability database is checked for all calls, if the number has been
ported, the new number is obtained and the call rerouted (done at first
first exchange in a network that can access a portability database)
solution is often implemented in North America via modified Signalling
Transfer Points (STPs) which can check and translate ported numbers
by modifying call setup information
the donor network now has no role, multiple portings easy; but requires
lookup of all numbers
Maguire Look up type solutionsNumber portability, VoIP, Prepaid, Location Based Servic-
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Two stage solutions
Originating network
Database
returns
full number
returns recipient
network number
Transit network
Database Recipient network
Maguire Two stage solutionsNumber portability, VoIP, Prepaid, Location Based Services
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
All call/all network solutions
Recipient network
each network does a lookup, but simply learns the next networks
number
final recipient network does a second lookup to determine where to
deliver the call within their network
increases the privacy -- since all networks along the path only learn
about the next network
Who knows the mappings?
Maguire All call/all network solutions Number portability, VoIP, Prepaid, Location Based Ser-
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Who knows the mappings?
For North America the Number Portability Administration Center (NPAC) has
all the mappings and passes then to the operators Local Service Management
System (LSMS).
See also Neustar Number Pool Administration http://www.nationalpooling.com/
Swedish Number Portability Administrative Centre AB (SNPAC) officially
appointed as the single operator of the Swedish Central Reference Database
[75]; interaction follows ITS standard SS 63 63 91 [76].
see also regional numbering plan administrators:
North American Numbering Plan (NANP) http://www.nanpa.com/ (also
performed by NeuStar Inc.)
Maguire Who knows the mappings? Number portability, VoIP, Prepaid, Location Based Ser-
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Nummerportabilitet i Sverige
Europaparlamentets och rdets direktiv 98/61/EG om
nummerportabilitet
Sverige ndringar i telelagen (1993:597) 1 juli 1999
Post- och telestyrelsen (PTS) om nummerportabilitet (PTSFS 1999:3
och PTSFS 2000:6).
PTS beslut 15 augusti 2001 (rende nr. 01-19102):
Swedish Number Portability Administrative Centre AB (SNPAC)
Peter Myndes Backe 12
118 46 Stockholm
(organisationsnr. 556595-2925)
http://www.pts.se/Archive/Documents/SE/Beslut for SNPAC.pdf
PTS recommended All Call Query (ACQ) as the preferred routing method for
Swedish telecommunications networks [74]
Maguire EU Document 398L0061 Number portability, VoIP, Prepaid, Location Based Ser-
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Nortel Networks Universal NP Master (UNMP)
A complete end-to-end number portability (NP) solution provides:
Number Portability Database (NPDB) and Number Portability
Global Title Translation (NPGTT) functionality as a single network
element
Local Service Management System (LSMS) for the management of
the ported subscriber records
support: AIN/IN and IS41 protocols for wireline and wireless porting
services
up to 11-digit GTTs for wireless number porting
up to five million ported number records.
Ported number service support includes Calling Name, CLASS,
Inter-switch Voice Messaging, Line Information Database, Short
Message Service, and PCS Call Delivery services.
5,000 queries per second, with planned expansion to 20,000 queries
per second.
Maguire Nortel Networks Universal NP Master (UNMP) Number portability, VoIP, Prepaid, Location
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Lookup engines
Aeroflex UTMC LNP-Engine (cPCI or PCI board) [no longer UTMC]:
Stores up to 160 million 16-digit phone number pairs
Supports 100k lookups/sec. and 10K updates/second
Based upon two Content Addressable Memory Engines:
custom 100 MHz chip
lookup in as little as 100 nanoseconds
partitions memory into upto 8,192 tables, from 256 to 30 million records
programmable key widths (per table): from 1 to 32 bytes
programmable association widths (per table) up to 8 megabytes
performs exact matches, as well hierarchal, longest-prefix, and
proximity matches
pipelined operation with separate I/O FIFOs
bulk table load, unload, and count functions
handles table overflows
Maguire Lookup engines Number portability, VoIP, Prepaid, Location Based Services
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Voice over IP (VoIP)
Integrating VoIP with mobile telephony - see also the course 2G1325/2G5564:
Practical Voice Over IP (VoIP): SIP and related protocols
http://www.imit.kth.se/courses/2G1325/
Maguire Voice over IP (VoIP)Number portability, VoIP, Prepaid, Location Based Services
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
TIPHON
ETSIs Telecom. and Internet Protocol Harmonization over Network (TIPHON)
(VLR)
Mediation
Radio Link BSS Gatekeeper BSC/BTS
IP
SIM
MS
BTS BSC GMSC VLR
TE Database
Maguire TIPHON Number portability, VoIP, Prepaid, Location Based Services 238
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Ericssons GSM on the Net
Olle Granberg, GSM on the Net, Ericsson Review No. 04, 19981
Access
Radio Link BSS Node BSC/BTS
IP
Intranet
BTS Gateway Service
ME Node
SIM
MS
BTS BSC GMSC VLR
TE Database
1. http://www.ericsson.com/about/publications/review/1998_04/files/1998046.pdf
Maguire Ericssons GSM on the Net Number portability, VoIP, Prepaid, Location Based Ser-
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
iGSM
Proposed by Yi-Bing Lin and Imrich Chlamtac in section 16.2([1], pp. 290-293).
This architecture is really a joining of H.323 with a gateway to GSM.
Maguire GSM Prepaid Number portability, VoIP, Prepaid, Location Based Services
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Difference between Mobile and Fixed Prepaid
Mobile servers needs:
more complex billing system due to more complex tariffs (which can
be location dependant!)
more complex billing system due to more complex taxation (which can
be location dependant!)
real-time usage metering - which has to cut off service when balance is
zero (there is a trade off between accuracy and cost of implementation
- if the operator is willing to take some loss, the implementation can
relax the real-time constraints)
increased complexity of customer care: warning customer to refill in a
timely fashion (maintaining a credit balance - maintains cash at the
operator!)
Maguire Difference between Mobile and Fixed Prepaid Number portability, VoIP, Prepaid, Location
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Four alternatives for Mobile Prepaid
Wireless Intelligent Network (WIN)
Service Node
Hot Billing
Handset-Based
Maguire Four alternatives for Mobile Prepaid Number portability, VoIP, Prepaid, Location Based
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Wireless Intelligent Network (WIN)
signaling 4
Intelligent P-SCP
voice trunk Peripheral
3 8
6
1 3 2
7 5
BSC MSC 5 SSP
BTS 1 1
ME +xx xxx xxxxxx
SIM
MS
Figure 30: WIN Prepaid call origination
1. Prepaid mobile customer calls +xx xxx xxxxxx
2. MSC gets WIN call setup trigger, call setup suspended, message sent to Prepaid Service Control Point (P-SCP)
3. P-SCP instructs MSC to set up ISDN (voice) link to intelligent peripheral
4. P-SCP instructs intelligent peripheral to provide account status notification (balance, charging rate, ) for this call
5. P-SCP starts countdown timer & instructs MSC to resume call processing -- which connects the call
6. Call terminates: either (a) countdown timer expires (P-SCP instructs MSC to terminate call) or (b) call completes
7. MSC gets WIN call release trigger, sends disconnect message to P-SCP indicating duration of call
8. P-SCP rates the call (computes charges) and debits the prepaid balance, sends current balance and cost of call to MSC
Maguire Wireless Intelligent Network (WIN) Number portability, VoIP, Prepaid, Location Based
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Calling party pays vs. Called party pays
Calling party pays style billing - Europe, Taiwan
Called party pays style billing - US (where mobile subscriber pays for both
incoming and outgoing calls)
Maguire Calling party pays vs. Called party pays Number portability, VoIP, Prepaid, Location
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
WIN Call termination when called party pays
signaling
P-SCP
voice trunk
4
6
5 3
2 1
BSC SSP
BTS 5 5 MSC 5 GMSC
ME +xx xxx xxxxxx
SIM
MS +xx yyy yyyyyy
Figure 31: WIN Prepaid call termination
1. Caller dials prepaid mobile customer +xx yyy yyyyyy
2. Call forwarded to gateway GMSC
3. GMSC get a WIN call setup trigger, suspends call processing, sends message to P-SCP
4. P-SCP determines if mobile is allowed to receive this call, if so instructs GMSC to resume call setup procedure
5. GMSC connects the call
6. P-SCP monitors called partys balance and can terminate the call if there is no credit (just as per call origination case)
Maguire WIN Call termination when called party pays Number portability, VoIP, Prepaid, Location
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Service Node
signaling 3
Service PBP
voice trunk Node
4
1 2
4 SSP
4
BSC MSC
BTS 1 1
ME +xx xxx xxxxxx
SIM
MS
Figure 32: Service Node Prepaid call origination
1. Prepaid mobile dials called party (+xx xxx xxxxxx)
2. MSC detects this is a prepaid customer and sets up trunk to service node
3. Service node consults Prepared Billing Platform (PBP) to determine if the call should be allowed
4. If so, then a 2nd trunk is setup from the service node via the MSC to the called party
Note: at the cost of the 2nd trunk (and two ports of MSC), this is a very easy
service to build - since the MSC does not actually know about the prepaid service
- only that it is to connect calls from these customers to the service node.
Maguire Service Node Number portability, VoIP, Prepaid, Location Based Services
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Hot Billing
signaling 5
HLR/AuC PSC
voice trunk Database
1 2 4
3 SSP
3
BSC MSC
BTS 1 1
ME +xx xxx xxxxxx
SIM
MS
Figure 33: Hotbilling Prepaid call origination
1. Prepaid mobile dials called party (+xx xxx xxxxxx) and sends their own IMSI
2. Based on IMSI, MSC asks HLR/AuC if this is a valid service request
3. If verified, HLR/AuC sends customer data and a prepaid tag to MSC, MSC connects call
4. When call terminates, a Call Detail Record (CDR) is sent to the Prepaid Service Center (PSC)
5. PSC debits the account, if the account is out of funds it notified the HLR/AuC to suspend service!
With hot billing the operator is taking a risk (of the cost of the call exceeding the
balance), but it is a one-call exposure and reduces the complexity of the system.
Maguire Hot BillingNumber portability, VoIP, Prepaid, Location Based Services 249
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
one-call exposure in depth
Since the operator may have no idea of who this customer is, they have no way of
collecting on the bad debt, thus they try to avoid it:
Use large values for the initial payment and refill/top-up - thus the
account has quite a ways to go before it is depleted (i.e., no low value
prepayments)
prohibit call forwarding to prepaid accounts (since otherwise you could
simultaneously forward lots of calls through a given prepaid account at
one time and one-call suddenly becomes N-calls!)
increase the interval at which CDRs are sent for processing {but this
costs in increased load on the PSC} -- in fact the trend is towards the
opposite, send bunches of CDRs are one time rather than in real-time
as calls end {this decreases load on PSC, but increases bad debt
exposure} -- in the end it is a business decision of risk/reward
Maguire one-call exposure in depthNumber portability, VoIP, Prepaid, Location Based Ser-
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Handset-Based
Uses GSM Phase 2, Advice of Charge (AoC):
Advice of Charge Charging (AoCC) this is how you debit the balance in the SIM card
Advice of Charge Information (AoCI)
Builds upon sever SIM data fields:
accumulated call meter (ACM)
accumulated call meter maximum (ACM*)
price per unit and currency table (PUCT)
Prepaid service center (PSC) uses SMS messages to execute program in the
handset, these applications are controlled by the SIM Toolkit.
Different sized SIM cards may be needed if large tariff rate tables or
complex rating schemes are to be used.
ACM and ACM* are generally user accessible (via PIN2), but for
prepaid cards this access is disabled (either at time of manufacture or
via an SMS message when users subscribes to prepaid service).
1
2 1 1 3 3
3 BTS 2 BSC 2 MSC SSP
ME 3 3 +xx xxx xxxxxx
SIM 4
MS
Figure 34: Handset-Based Prepaid call origination
1. Prepaid mobile dials called party (+xx xxx xxxxxx)
2. Based on rate plan (+ destination, time/date), MSC sends AoC e-parameters (including ACM and ACM*) to mobile
3. If mobile support AoCC, it acks receipt of e-parameters; if MSC gets this ack, call is connected, otherwise call is denied
4. During call MS uses AoC e-parameters for tariff info; locally decrements credit by incrementing ACM. When ACM
reaches ACM*, MS terminates call and informs MSC of call release
Maguire Combined Handset-based + Hot BillingNumber portability, VoIP, Prepaid, Location Based
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Roaming and Prepaid
Lots of problems:
cant easily use special MSISDN numbers as this would:
prevent operator number portability
service portability is not allowed, since you could not change to post paid without changing
MSISDN
could use IMSI, but this might require software change at visited system
prepaid charging might not be performed at visited system (because it
uses a different prepaid scheme than home system)
therefore route the call via the home system - letting it implement the prepaid debiting
but this requires a trunk to the home system ( higher charge for a specific prepaid call than
a postpaid call) -- this may be too expensive for international roaming
scalability problems with service node approach (since you use up two
MSC ports per call)
AoC traffic is not encrypted - so the handset can just tamper with or
ignore debit commands! manufactures working on SIM encryption
handset-based approach may lock operator to a SIM supplier
some of the schemes have a high setup cost
Maguire Roaming and Prepaid Number portability, VoIP, Prepaid, Location Based Servic-
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Revenue and new services
Carriers generally think in terms of Average Revenues Per User (ARPU).
ARPU is defined (by Telia) as total sales during the period, divided by the average
number of subscribers, divided by the number of months in that period.
For example, TeliaSonera Q4 2003 ARPU and MoU figures from [81]:
Customers ARPU Minutes of Use (MoU)
Prepaid Post-paid Avg. Prepaid Post-paid Avg.
Sweden 3,838,000 94 SEK 452 SEK 268 SEKa 56 209 129
With time and competition ARPU generally decreases, hence the pressure to
introduce new services which have a higher margin.
Maguire Revenue and new services Number portability, VoIP, Prepaid, Location Based Ser-
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Location Based Services (LBS)
As we have seen it is possible to locate where a user is to within a cell, but it is
also possible to refine this positioning via the infrastructure or via other means
such as GPS. Popular uses of LBS include:
Navigation applications
Location based information
Enabling services such as - Where is the nearest X? where X can be gas station, hospital,
restaurant, different responses depending on where you are when you ask for the
information
Location sensitive billing
see for example Virtual enterprise networks on page 326
Emergency services
US FCCs Wireless E911 Phase II Automatic Location Identification - requires wireless
carriers, to provide more precise location information to PSAPs, specifically, the latitude and
longitude of the caller to an accuracy of 50-300 meters (depending on the type of
technology used).
Tracking
fleet vehicles (such as taxis, service trucks, )
For an introduction to LBS see [89].
Maguire Location Based Services (LBS) Number portability, VoIP, Prepaid, Location Based
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Means of determining location
Passive
Cell identity
especially useful if you have a table of where the cells are
completely passive - you just listen to the broadcast of the Cell ID, etc.
Based on satellite navigation systems: Global Positioning System (GPS), GLOSNASS,
Galileo,
must listen for sufficient data from multiple satellites
Active
Based on timing
Timing Advance (distance from basestation estimated by the timing advance value)
Based on timing and triangulation
Time of Arrival (TOA)
Time Difference of Arrival (TDOA)
Enhanced Observed Time Difference (EOTD)
Angle of Arrival (AOA)
Mixed
Assisted GPS (A-GPS), assisted-x
Maguire Means of determining location Number portability, VoIP, Prepaid, Location Based
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Geographic Location/Privacy (geopriv)
IETF RFC 3693: Geopriv requirements, sets out a number of requirements
necessary preserve geopgraphic location privacy[83].
The RFC details authorization, security and privacy1 requirements for the Geopriv
Location Object (LO) and for the protocols that use this Location Object. The LO
is used to securely transfer location data.
Additional working drafts:
Dynamic Host Configuration Protocol Option for Coordinate-based
Location Configuration Information [84]
DHCP Option for Civil Addresses [85]
Geopriv Policy [86]
A Presence-based GEOPRIV Location Object Format
A Presence Architecture for the Distribution of Geopriv Location
Common Policy [88]
1. The protection of privacy is based on Privacy Rules set by the "user/owner of the Target".
Maguire Further reading Number portability, VoIP, Prepaid, Location Based Services
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
[75] Swedish Number Portability Administrative Centre AB
http://www.snpac.se/
[78] G. Q. Maguire Jr., Practical Voice Over IP (VoIP): SIP and related
protocols, Lecture notes, Period 4, 2005
http://www.it.kth.se/courses/2G1325/VoIP-Coursepage-Spring-2005.html
Maguire Further reading Number portability, VoIP, Prepaid, Location Based Services
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Prepaid
[79] Gemplus, Smart Card in Wireless Services, {perhaps a bit biased since
they are one of the leading vendors of smart cards}
[80] Chris Pearson and Erasmo Rojas, Wireless Trends in the Americas: The
Proliferation of GSM 850 MHz and EDGE, A press release from
3G Americas, November 2003
http://www.3gamericas.org/PDFs/EDGE-GSM850_Nov03_English.pdf
[81] TeliaSonera, Year-End Report 2003: Appendic for the telephone conference,
February 11, 2004.
http://www.telia.net/Koncernwebb/Attachment/20040211/Q42003BackupSlidesExternal.ppt
Maguire Further reading Number portability, VoIP, Prepaid, Location Based Services
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
[84] .J. Polk, J. Schnizlein, and M. Linsner, Dynamic Host Configuration
Protocol Option for Coordinate-based Location Configuration Information,
RFC 3825, July 2004. http://www.ietf.org/rfc/rfc3825.txt
[85] H. Schulzrinne, DHCP Option for Civil Addresses, Internet draft,
February 19, 2004, Expires: August 19, 2004
http://www.ietf.org/internet-drafts/draft-ietf-geopriv-dhcp-civil-05.txt
Maguire Further reading Number portability, VoIP, Prepaid, Location Based Services
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Expires: May 29, 2005 http://www.ietf.org/internet-drafts/draft-ietf-geopriv-policy-05.txt
[89] Johan Hjelm, Creating Location Services for the Wireless Web, John Wiley
& Sons, 2002, ISBN: 0471402613
Maguire Further reading Number portability, VoIP, Prepaid, Location Based Services
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
2G1330 Mobile and Wireless Network
Architectures
Maguire Wireless Application Protocol (WAP) WAP, Heterogeneous PCS, 3G 266 of 318
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
WAP Model
Now called the WAP Proxy Model - since WAP gateway acts as a proxy:
GSM Network
Request
Encoded Request
WAP WML
Encoded WML gateway
WML origin
WML HTML server
microbrowser filter
User Agent Profile provides a mechanism for describing the capabilities of clients and the preferences of
(UAProf) users to an application server, based on the Composite Capabilities / Preference Profiles
(CC/PP) work of the W3C Wireless Telephony Application (WTA)
External Functionality specifies the interface between WAE and components or entities with embedded
Interface (EFI) applications that execute outside of the defined WAE capabilities (i.e., basically allowing
plug-in modules) - thus allowing access to external devices (e.g. smart cards, GPS,
digital cameras, sensors, )
Persistent Storage a standard set of storage services and interface for organizing, accessing, storing and
Interface retrieving data on the wireless device or other connected memory device.
Data Synchronization adopts SyncML language for the data synchronization (see www.syncml.org)
Provisioning provides clients with information needed to operate on wireless networks; permits
network operator to manage the devices on its network using a common set of tools
Pictogram tiny images, that can be used to quickly convey concepts in a small amount of space
Maguire WAP 2.0 new & enhanced services WAP, Heterogeneous PCS, 3G 270 of 318
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Heterogeneous PCS
Utilize multiple types of radios to get the advantages of each to:
increase capacity and/or
increase coverage area and/or
decrease power consumption and/or
increase bandwidth and/or
decrease delay,
band2
Maguire Similar Radio technologies + Same Network technology (SRSN) WAP, Heterogeneous PCS, 3G 272
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Different Radio technologies +
Same Network technology
Both using IS-41 as network protocol:
IS-136 + AMPS
IS-95 +AMPS
Maguire Different Radio technologies + Same Network technology WAP, Heterogeneous PCS, 3G 273 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Different Radio technologies +
Different Network technology
Generally high-tier PCS with low-tier PCS
Examples:
AMPS +PACS or GSM +PACS
GSM + DECT
Maguire Different Radio technologies + Different Network technology WAP, Heterogeneous PCS, 3G 274 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Tier Handoff
Tier Handoff performs handoffs from one system to another.
For the case of SRSN - different power levels, the macro and microcells use the
same air interface and the handoffs is as usual.
For the case of SRSN - different bands, just a little harder than usual (because the
handset might not be able to listen to more than one frequency at a time).
For the case of DRSN it is harder yet generally requires modification in the
handoff of each system, in some cases the handoff might only work in one
direction
For the case of DRDN the easiest is to simply set up a new call (perhaps via
automatic redial) in the new network.
Maguire Registration for SRSN & DRSN WAP, Heterogeneous PCS, 3G 276 of 318
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Registration for DRDN
Since the different systems use different registration & authentication and
different data may be store in their different HLRs (and VLRs) define a new
multitier HLR to integrate the two.
Implemented via tier manager
Single (SR) vs. Multiple registrations (MR) - the former is simpler, the later
reduces the registration traffic and decreases the time required for tier handoffs.
Maguire User identity (identities) and MSs WAP, Heterogeneous PCS, 3G 279 of 318
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Major forces driving heterogeneous PCS
consolidation/mergers&acquisitions/bankruptcy/ new owner may end up
owning several different types of systems, examples:
AT&T acquisition of McCaws cellular system
Bell Atlantic merger with NYNEX
Merger of Vodaphone with AirTouch
DeutscheTelekoms (T-Mobile) Voicestream Wireless Corp. acquistion
of WLAN operations of MobileStar
Maguire Major forces driving heterogeneous PCS WAP, Heterogeneous PCS, 3G 280 of 318
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Internetworking scenarios
There are several alternatives for how tightly the different systems might be
coupled[92]:
Open coupling
No real integration between the systems, except perhaps for sharing a billing system
Separate authentication for each system
Loose coupling
sharing a single subscriber database
allows centralized billing
allows interworking, but has two separate IP address spaces and does not support vertical
handoffs (so connections are dropped when the use moves from one network to another)
Tight coupling
an Interworking Unit (IWU)/Radio Network Controller (RNC) interconnects the radio access
neworks to the SGSNs
might require a new set of interfaces Iu (RNC-SGSN) and Iub (RAN-RNC) {RAN = Radio
Access Network}
Very tight coupling
an Interworking Unit (IWU) connects the Radio Access Network to the RNC
for example, using an interface Iu(RNC-WLAN) to connect WLAN as a cell of the RNC
Maguire Third Generation Mobile (3G) WAP, Heterogeneous PCS, 3G 283 of 318
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
3rd Generation Partnership Project (3GPP)
Original scope was to produce globally applicable Technical Specifications and
Technical Reports for a 3rd Generation Mobile System based on evolved GSM
core networks and the radio access technologies that they support Universal
Terrestrial Radio Access (UTRA)1, W-CDMA, UMTS (in Europe) and FOMA (in
Japan)
Amended to include the maintenance and development of the Global System for
Mobile communication (GSM) Technical Specifications and Technical Reports
including evolved radio access technologies (e.g. General Packet Radio Service
(GPRS) and Enhanced Data rates for GSM Evolution (EDGE)).
See: http://www.3gpp.org/
1. Both Frequency Division Duplex (FDD) and Time Division Duplex (TDD) modes.
Maguire 3rd Generation Partnership Project (3GPP) WAP, Heterogeneous PCS, 3G 284 of 318
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
3G(PP) Architecture
Radio Link
UTRAN CS-
MGW
Nb CS-
MGW
CN
Iub External networks
Mc Mc
Uu Node B Iu-CS
MSC Nc GMSC
MS server
UE RNC server EIR PSTN
UIM B SS7 C
Iur HLR AuC
VLR Database Database
Database
Figure 35: 3G(PP) Architecture; CN = Core network; RNC = Radio Network Controller;
IMS=IP Multimedia Subsystem; HSS=Home Subscriber Server; CS-MWG=Circuit Switch Media Gateaway
The division into a circuit switched domain and a packet switched domain - will
disappear as the architecture evolves to an All-IP network
Maguire Third Generation Partnership Project 2 (3GPP2) WAP, Heterogeneous PCS, 3G 287 of 318
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
3GPP2 reference model
Radio Link
Um
MS
ME
MT0 MT1 MT2
Sm
TE1 TAm
Ui or Ur Rm Rm
TE2 TE2 Uv
UIM Vehicle
Maguire Mobile Station Application Execution Environment (MExE) WAP, Heterogeneous PCS, 3G 295 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Common Language Infrastructure for MExE
devices: Classmark 4
Service discovery and management
Maguire Common Language Infrastructure for MExE devices: Classmark 4 WAP, Heterogeneous PCS, 3G 296
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
CLI MExE Devices
SMExE Classmark 4 devices based on CLI Compact Profile spec.: defines runtime
environment and APIs available to a CLI based MExE device such that services
(specified in the form of language independent classes and interfaces) can control
such a device in a standardized way.
CLI Compact Profile Namespaces Application management features for a Classmark 4 application
System Discovery
System.Collections Download
System.Globalization Verification
System.IO Installation
System.Text Execution Start
System.Threading Execution Pause
System.Runtime.CompilerServices Execution Resume
System.Reflection Execution Stop
System.Net Execution Terminate
System.Xml Uninstall
Maguire Common Language Infrastructure for MExE devices: Classmark 4 WAP, Heterogeneous PCS, 3G 297
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
3G Physical Layer
There has been great fighting over what is the best physical and link layer for
3G, due to political, economic, reasons.
Indications are that there will be several 3G CDMA modes (at least 5 different
choices), but there might be some hope for harmonization at the network level
(with at least 3 choices: ANSI-41, GSM MAP, and IP)!
Maguire Gateway Location Register (GLR) WAP, Heterogeneous PCS, 3G 299 of 318
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
3G QoS
Four QoS classes:
background for delay-insensitive traffic such as FTP, background bulk transfer of e-mail,
Maguire UMTS Subscriber Identity Module (USIM) WAP, Heterogeneous PCS, 3G 301 of 318
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Wireless Operating System for Handsets
There has been a battle brewing for who will define and dominate the OS market
for 3G handsets - which given the expected handset volume could be a very large
market.
Candidates:
Microsoft - WinCE (and its successors)
Symbians EPOC OS - built upon Psions OS - Symbian formed by
Nokia, Ericsson, Motorola)
3Coms PalmOS
linux
Maguire Wireless Operating System for Handsets WAP, Heterogeneous PCS, 3G 302 of 318
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Mobile Virtual Network Operator (MVNO)
A virtual operator who uses the physical infrastructure of other operators.
Pyramid Research projects a greater than 3x Return on Investment (ROI) for MVNOs vs. facilities-based
UMTS network operator1.
was http://www.pyramidresearch.com/info/rpts/mvno.asp
Richard Bransons Virgin Mobile signed up 700k customers in their first year!2
Freed from a large subscriber base that is necessary to cover network deployment
costs, an MVNO can target a more finely segmented market.3
Mobile Virtual Network Operators: Oftel inquiry into what MVNOs could offer
consumers - was
http://www.oftel.gov.uk/publications/1999/competition/mvno0699.htm
Maguire Mobile Virtual Network Operator (MVNO) WAP, Heterogeneous PCS, 3G 303 of 318
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
IP Multimedia Subsystem (IMS)
One of the major driving forces for 3G telephony (as envisoned by many vendors
and operators) is Multimedia. 3GPP has defined an IP Multimedia Subsystem
(IMS) and 3GPP2 intorduced the MultiMedia Domain (MMD) for third
generation Code Division Multiple Access 2000 (CDMA2000) networks - the two
were subsequently harmonized.
The first new services include:
Instant Messaging
Presence
Push to Talk over Cellular (PoC) (walkie-talkie like services)
one of the major features of such services is group communication - i.e., the audio segment
can easily be delivered to many users
All of these services are easily added as they are not too demanding of the
underlying radio access network[106], hence they can be offered via existing 2G
and 2.5G networks, as well as via WLANs and even to an ISPs xDSL and cable
customers.
Maguire IP Multimedia Subsystem (IMS) WAP, Heterogeneous PCS, 3G 304 of 318
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Future IMS services
person-to-person real-time IP-based multimedia communications (e.g.
voice, videotelephony, )
person-to-machine communications (e.g. gaming).
integrated real-time with non-real-time multimedia communications
(e.g. live streaming with a chat group)
services combining use of presence and instant messaging; other
combinations of services, e.g., surveillance - where a remote camera
begins streaming video because of a presence detection event)
multiple services in a single session or multiple simultaneous
synchronized sessions (think of Synchronized Multimedia Integration
Language (SMIL)[107])
should include transitioning from a two party voice call to a multi-party audio and video
conference no need for special predefined conference services
S-CSCF
HSS I-CSCF
P-CSCF
GGSN
GERAN/UTRAN
[90] WAP Forum, Wireless Application Protocol (WAP) 2.0 Technical White
Paper, www.wapforum.org, January 2002.
Heterogeneous PCS
Maguire Lecture 6Wireless Local Loop (WLL) and Enterprise Networks 320 of 332
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Wireless Local Loop (WLL)
Providing wireless connections to stationary or near stationary stations within a
small service area
Generally targeted at the last mile or from a point in the neighborhood to the user
Advantages of Wireless local loop:
ease of installation
reducing digging, reduce poles, ducts/conduits,
quick installation of new links (i.e., rapid provisioning)
largely distance insensitive pricing - at least up to some limit
concentration of resources (especially at the multiplexer to the high
bandwidth backbone)
IS-54 architectural reference model for WLL:
WANU = Wireless
Access Network Unit
UWLL
WASU = Wireless WASU WANU AWLL Switch Trunk
PSTN
Access Subscriber Unit
transceiver Function
AM WLL
HLR controller
Maguire Wireless Local Loop (WLL) Wireless Local Loop (WLL) and Enterprise Networks
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Deployment issues
Spectrum
licensed - limited interference, but requires licensing
unlicensed - more interference, but no licensing - generally limited in (maximum and
average) power
Service Quality
Users expect it is going to be the same as wireline service
high reliability
low risk of fraud (due to others hijacking the link)
Network planning
should support very high penetration levels (for example >90%)
exploits the fact that users are not moving (or rarely move)
antenna height, etc. is generally derived from user density
Very popular in the former East block of Europe - since there was no need to
install a local loop cable to bring users to the local exchange of the PSTN; enabled
very rapid provisioning to very large numbers of subscribers.
Maguire Deployment issuesWireless Local Loop (WLL) and Enterprise Networks 322 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
WLL Technologies
Satellite
a great chance for the satellite operators (Hughes Network Systems, Inmarsat International
Circular Orbit (ICO), Iridium, Globestar, Odyssey, American Mobile Satellite Corporation
(AMSC), Asia Cellular Satellite (ACeS), Thuraya, )
note that some of these operators (such as Hughes) used terrestrial versions of their system
Cellular-based
used in rural and sparse urban settings
Low Tier PCS or Microcellular based systems
PACS, PHS, DECT,
Fixed Wireless Access (FWA)
some times proprietary point-to-point links
increasingly LMDS
Maguire WLL TechnologiesWireless Local Loop (WLL) and Enterprise Networks 323 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Enterprise Networks
Networking within an organization - often campus networking. Traditional voice
enterprise networks were based on a PBX, today this often extended by cordless
telephony, wired LANs, and WLAN systems.
Enterprise based location systems (such as Ericsson DECT mobility server, which
enabled redirecting a DECT call to any Ericsson site from the users home site).
Olivetti& Oracle Research Labs (now AT&T Research Labs) in Cambridge
developed an active badge system which used IR emitting badges (called active
badges) to locate users with in the building. This enabled delivering a phone call
to the nearest fixed line phone, logging who visited who, finding people and
equipment, . Their recent project uses ultrasound for location: active bats.
Theo Kanter and colleagues at Ellemtel showed a system in the mid-1990s which
utilized SmartBadges (developed at KTH, HP, and Univ. of Wollongong) to locate
users and by providing voice gateways the could direct a users calls to computers,
cordless, or mobile phones as appropriate.
Maguire Enterprise NetworksWireless Local Loop (WLL) and Enterprise Networks 324 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Cordless PBXs
For example, Ericssons MD110 Communication System (aka Consono) --
which is a DECT based system - simply attaches DECT base stations to their PBX.
See http://www.ericsson.com/enterprise/products/md110.shtml/index.shtml
Telia provides packages where the user can pay:
per line/month - fixed
per line/month - DECT (with local mobility support)
per line/month - DECT (with mobility support over several exchanges)
per line - DECT (with local or multiple site mobility) - but only
outgoing/incoming trunk costs/month
Maguire Cordless PBXs Wireless Local Loop (WLL) and Enterprise Networks 325 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Virtual enterprise networks
By utilizing location based billing, it is possible to offer an enterprise a virtual
cellular PBX (ala the Centrex systems for fixed telephony). In such a system the
operators negotiates a price for providing coverage to a campus or set of coverage
areas - typically for a fixed price for a year (or more).
The operator likes this as they know they have a given amount of income and they
know what their fixed costs for installing a base station to cover the relevant areas
is. As a side effect they may also be able to handle calls for other users -- and not
have to pay for renting antenna and other space!
Maguire Virtual enterprise networks Wireless Local Loop (WLL) and Enterprise Networks
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Remoting the office to where the user is
A rapidly growing area of business utilizes Virtual Private Network technology to
extend the corporate network (voice, fax, data, file system, etc.) to where the user
is and via what ever communications interconnect that is available.
(See for example: Ericssons Virtual Office (EVO))
Maguire Remoting the office to where the user is Wireless Local Loop (WLL) and Enterprise Net-
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
corDECT
A version of DECT developed by Midas Communication Technologies
(http://www.midascomm.com/) and the Indian Institute of Technology, Madras
((http://www.tenet.res.in), in association with Analog Devices Inc., USA.
Provides toll-quality voice together with 35 or 70 kbps Internet service.
Utilizes the DECT air interface, but at the DECT Interface Unit (DIU) it separates
the voice (which it forwards to a telephone exchange over an E1 line) and data
which it passes on to an ISP. The data is sent using PPP.
For details see: Midas Communication Technologies, "corDECT Wireless Access
System", December 2000 http://www.tenet.res.in/Papers/cordect.pdf
Maguire corDECTWireless Local Loop (WLL) and Enterprise Networks 328 of 332
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Personal Handyphone (PHS)
Personal Handyphone System (PHS) standard [122] is a TDD-TDMA based
microcellular wireless communications technology operating in the 1880 to 1930
MHz band.
It is used in public PHS networks, Wireless Local Loop (WLL) and Fixed
Wireless Access (FWA) networks, corporate (cordless PBX), and in homes. Like
DECT it uses dynamic channel allocation and provides 32kbps bearer capability
on each of the 24 TDMA frame slots. Multiple time slots can be utilized by one
user, thus providing up to 128kbps.
Maguire Personal Handyphone (PHS) Wireless Local Loop (WLL) and Enterprise Networks
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
PAS in China
PAS is a personal network access system that delivers wireless voice and data,
based on the Personal Handyphone System (PHS) protocol. It provides both fixed
and low mobility services.
PHS was enhanced by UTStar.com :
features: Caller ID, call forwarding, voice mail
city-wide and intercity handover and roaming services
32 Kbps mobile internet access
small handsets with >800 hours of standby and ~6.5 h of talk time
Following the breakup of China Telecom, used by the wireline operators to get
around the duopoly (only China Mobile and China Unicom can offer cellular
services). Ministry of Information Industry (MII) in an internal notice (June 2000)
will continue to allowed PAS in county-level cities and counties. In large and
medium-sized cities, it may only be used where there is a high concentration of
population, such as campuses, commercial buildings and special development
zones. While new city-wide PAS deployments will only be allowed in cities of
fewer than two million people. [123]
Maguire PAS in China Wireless Local Loop (WLL) and Enterprise Networks 330 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Unified Communications
Integrated messaging
Cellular, cordless, fixed lines - are share the same voice mailbox, potentially with interface to
e-mail,
Synchronizing calendars, phone books,
Synchronizing services across many devices (which may be using
different networks)
Ericssons Always Best Connected (ABC) - to use the best
technology for the current setting
Maguire Unified CommunicationsWireless Local Loop (WLL) and Enterprise Networks 331
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
References
[122]Personal Handiphone MoU http://www.phsmou.or.jp/
[123]Joseph Tang and Florence Cheung, The Threat of PAS in China:Impact on
China Mobile and China Unicom, SUN HUNG KAI Research Ltd., 3 April
2001
http://www.shkresearch.com/English/ResearchProducts/DailyProducts/s
ector/prc/english/20010403sector.pdf
Maguire ReferencesWireless Local Loop (WLL) and Enterprise Networks 332 of 332
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
2G1330 Mobile and Wireless Network
Architectures
IEEE 802.11g enable data transmission speeds of up to 54 Mbps, with backwards compatibility to 802.11b
infrastructure; operates in 2.4GHz band
IEEE 802.11a using OFDM (Orthogonal Frequency Division Multiplexing) achieves upto 54 Mbps - currently
not approved for use in Sweden; operates in 5 GHz band
IEEE 802.11h designed to adapt 802.11a to the european HiperLAN/2 requirements; operates in 5 GHz band
Maguire Wireless Local Area Networks (WLANs) Wireless LAN (WLAN) 334 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Two possible network configurations
Independent Mobile stations communicate directly to each other with no access point (base station)
configuration support, i.e., peer-to-peer (ad hoc) networking
Maguire Two possible network configurations Wireless LAN (WLAN) 335 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Terms
Basic Service Set (BSS) - a group of stations that are under the direct control of a
single coordination function (PCF or DCF)
Independent BSS (IBSS) - also known as an ad hoc network, defined as a BSS
which exist without an access point (AP)
Infrastructure network - a network of wireless stations along with APs, which
enables stations in one BSS to communicate with stations in another BSS
Distribution System (DS) - a backbone network between the two or more access
points
Extended Service Set (ESS) a series of overlapping BSSs (each with its own AP)
connected together by means of a Distribution System (DS)
Hidden node - a node is said to be hidden when its transmissions cannot be heard
by some other node in the network (although it can be heard be one or more other
nodes)
Busy
Medium Next Packet
Slot time
Defer Access
IFS Inter Frame spacing - during this time the medium is idle
SIFS Short IFS - transmission after SIFS is reserved for ACKs, Clear To Send frame, or to send a
fragmented MAC protocol data unit (MPDU)
DIFS if after DCF-IFS (DIFS) a station finds the media free it can transmit a pending packet;
otherwise it sets a backoff timer after selecting a random backoff value (BV) {selected from a
uniform distribution over [0 .. CW-1], where CW is the width of the contention window in slots}
if medium become busy before time goes off, then the value is frozen until the next DIFS interval,
where upon it continues the count down
CW is doubled after collisions and reset to CWmin after a successful transmission
EIFS Extended IFS - used when the receiver cant correct the received packet
Maguire IEEE 802.11 Basic Access Method Wireless LAN (WLAN) 337 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Distribution Coordinating Function (DCF)
Distribution Coordinating Function (DCF) is based on carrier sense multiple
access with collision avoidance (CSMA/CA)
Receivers send an ACK if they successfully receive a packet, otherwise the
transmitter re-sends.
Maguire Distribution Coordinating Function (DCF) Wireless LAN (WLAN) 338 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
CSMA/CA with ACK in infrastructure network
DIFS
Data
SIFS
ACK
Mobile AP
Maguire Distribution Coordinating Function (DCF) Wireless LAN (WLAN) 339 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
IEEE 802.11 RTS/CTS mechanism
DIFS
RTS
SIFS
CTS
SIFS
Data
SIFS
ACK
Source Destination
Maguire Distribution Coordinating Function (DCF) Wireless LAN (WLAN) 340 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
IEEE 802.11 Frame Format
Frame Control 2 bytes
Duration/ID 2 bytes
Address 1 6 bytes
Address 2 6 bytes
Address 3 6 bytes
Address 4 6 bytes
CRC 4 bytes
Maguire IEEE 802.11 Frame Format Wireless LAN (WLAN) 341 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
IEEE 802.11 Frame Control
B0 B1 B2 B3 B4 B5 B6 B7 B8 B9 B10 B11 B12 B13 B14 B15
Protocol Type Subtype To DS From
DS
More
Frag
Retry PwrMgt More
data
WEP RSVD
Version
2 2 4 1 1 1 1 1 1 1 1
More date 1 if there are more packets to the terminal in power-save mode
Maguire IEEE 802.11 Frame Control Wireless LAN (WLAN) 342 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Startup, then Join a network
Turn on & discovery phase
determine AP or other stations exist
get SSID and other parameters
Negotiate for connection
Authentication & Association
Maguire Startup, then Join a network Wireless LAN (WLAN) 343 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Discovery Phase
Enter scanning mode: Passive / Active scanning mode
Passive
Listen for a Beacon for ChannelTime period
From Beacon get the SSID & parameters
Active
Transmit a probe frame (including the SSID that you wish to join)
Wait for a period for responds by AP or other stations
Authenticator
Authentication Frame: Algorithm=Shared Key, Sequence Number =2,
Challenge Text
Initiator
AP2
7
3 Path of mobile
1 4 6
AP1 2
5
AP3
r resp once
n d ove
Ha
Maguire Inter-Access Point Protocol (IAPP) Wireless LAN (WLAN) 348 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Fast Handoff
802.11 being used in PDAs, WLAN phones, lots of new devices
(especially for multimedia)
Multimedia applications sensitive to connectivity loss (when the loss of data exceeds that
which the playout buffers can cover up)
TCP sensitive to multiple losses
Loss of an entire window causes connection to go into slow-start
basic handoff is fast and simple, but insecure
Authentication occurs prior to reassociation so pre-authentication is possible
Management frames are not authenticated, thus no cryptographic operations in critical path
If APs involved in the handover use the same WEP key, no inter-AP communication is
required
Unfortunately 802.1x complicates 802.11 handoff
now STAs have dynamic per-session keys
authentication occurs after reassociation, not before
If re-authentication is required, then STAs need to complete authentication before
recovering connectivity
Authentication and key management methods requiring public key operations (e.g.
EAP-TLS) -- this can take several seconds to complete
Using a TLS continuation can decrease the number of round-trips (from 3.5 to 2.5)
if authentication server is far away, then disconnection time can be large
for further information see [133]
Maguire Point Coordination Function (PCF) Wireless LAN (WLAN) 350 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Spacing
DIFS
PIFS
SIFS
Data
time
Maguire Timing and Power Management Wireless LAN (WLAN) 352 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
WLAN AP performance
A lot of work has been done to try to understand the details of APs, both their
throughput and how they behave during a handoff. For details see:
Enrico Pellettas M.Sc. thesis for AP throughput measurements and
J-O Vatns technical report [130] for handoff/handover details
His detailed measurements present some new aspects which others had not seen
Sren Nyckelgrd, Telias Golden Gate and its Interconnect Provider Role, Telia
Golden Gate - Technical Overview, was available January 23, 2002 at
http://www.telia.se/filer/cmc_upload/0/000/030/185/ResearchGoldenGateTec1Overv2.doc
and
Maguire Lightweight Access Point Protocol (LWAPP) Wireless LAN (WLAN) 358 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
HiperLAN2
Developed by the European Telecommunications Standard Institute (ETSI)
Broadband Radio Access Networks (BRAN)
Dedicated spectrum (in Europe) at 5 GHz
uses Orthogonal Frequency Division Multiplexing (OFDM) with 52
subchannels, 48 subchannels for data, and 4 subchannels for pilot
symbols
TDMA/TDD frames with fixed duration of 2ms
Maximum gross data rate of 54 Mb/s
MAC protocol was designed to support multimedia services
For more information see HiperLAN2 Global Forum and ETSI standards
documents.
Maguire QDMA (quad-division multiple access) Wireless LAN (WLAN) 364 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Wireless Internet Service Providers (WISPs)
Location specific WISP - exploiting high value sites (airports, hotels,
coffee shops, )
example: Surf n Sip, MobileStar, and Wirelessbolaget
Advantages: often have exclusive offering
Disadvantages: users may also want access in other locations -- hence roaming
agreements will be important
Single site or campus WISP - a subset of the location specific WISP
category (e.g., university or corporate campus, a single conference
center/exhibition hall)
example: KTH and SUs IT-University campus, CMUs campus,
Advantages: they know the site very well, generally they have exclusive offering, users are
trapped - so they will have to pay and pay and pay or it is part of the tele/datacom offering
Disadvantages: for some sites the users are only there for a short period (hours to days),
very high turn over in users (so low administrative costs are very important); in university
and corporate campus settings very high demands/expectations
Maguire Wireless Internet Service Providers (WISPs) Wireless LAN (WLAN) 365 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Mobile carrier WISP - mobile (WWAN) operator also offering WLAN
examples: Telia HomeRun (Sweden), Sonera wGate (Finland), and VoiceStream (Germany
/ US) {due to their acquisition of MobileStar in the US - what happens if they bring this
technology back to Europe?}
Advantages: they know where their users spend time (from their existing traffic and location
data) so they can easily build out hotspots; retain customers with whom they already have a
billing relationship
Disadvantages: offering WLAN might reduce their income (as they might have been able to
charge (a lot) for the traffic via the WWAN in these same spots)
ISP WISP - existing ISP that extends their network via WLAN access
points
example: Swedens PowerNet
Advantages: pretty straight forward extension of their existing network, by shipping dual
xDSL/cable/ + AP devices1; retain customers with whom they already have a billing
relationship
Disadvantages: offering WLAN might reduce their income since neighbors can share rather
than installing their own service
WISP - a pure wireless internet service provider
example: Sweden: Wirelessbolaget, DefaultCity, U.S.: Wayport
Advantages: this is their business
Disadvantages: this is their business but they depend on an ISP for back haul
1. Actiontec Electronics
Maguire Wireless Internet Service Providers (WISPs) Wireless LAN (WLAN) 366 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Operator Neutral WISP - an Internet eXchange (IX) to which several
independent ISPs (or WISPs) are connected
example: StockholmOpen.net
Advantages: enable multiple operators
Disadvantages:
Franchising WISP -
example:
Advantages: they simply sell the idea, starter kit, supply backup support,
Disadvantages: dependant on getting a cut from the franchise
Virtual WISP - no actual network, - but rather they simply rent/buy
capacity for their users; thus their major role is to support and bill users
example: Boingo
Advantages: very low to near zero costs for infrastructure
Disadvantages: they must provide either high service level and/or low prices to retain their
customers
Community/Grassroots WISP - altruistic providers
example: NYC Wireless
Advantages: people making their WLAN available to others because it is the right thing to
do
Disadvantages: Support way or many not exist
Herslow, Navarro, and Scholander classify the WISPs based on whether they are for fee or for free and coverage area:
hotspot vs. wide area.
Maguire Wireless Internet Service Providers (WISPs) Wireless LAN (WLAN) 367 of 371
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Further reading
WISPs
[133]Tim Moore and Bernard Aboba Authenticated Fast Handoff, IEEE 802.11
Task group i, November 2001, doc. IEEE 802.11 submission
http://www.drizzle.com/~aboba/IEEE/11-01-TBD-I-Authenticated-FastHandoff.ppt
AT Commands
Middleware
TCS SDP
protocols
OBEX WAP
Control path
Audio path
RFCOMM
Baseband/Link Controller
Radio
Maguire Bluetooth protocol stack Bluetooth: Piconets, Scatternets 375 of 408
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Physical Layer
Uses 2.4 GHz unlicensed Industrial, Scientific, and Medical (ISM) band
(globally portions of this band are available)
many other systems using the same spectrum
interference to other systems
interference from other systems
2.400-2.4835 GHz, i.e., 83.5 MHz divided into 79 channels with carrier frequencies
f = 2402 +k MHz, k = 0, , 78; Channel spacing is 1 MHz
Gaussian Frequency Shift Keying (GFSK) modulation with one bit per symbol
uses fast (1600 hops/s) frequency hopping spread spectrum (FHSS)
625 microsecond long time slots
one hop per packet, but a packet can be 1 slot, 3 slots, or 5 slots long
Maguire Time Division Multiplexing (TDM) Bluetooth: Piconets, Scatternets 380 of 408
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Network Topology
Piconet subnet of Bluetooth devices, synchronized to the timing and hopping sequence of a master
slaves only communicate with the master
maximum of 7 slaves in a piconet (as there are only 3 address bits!)
Scatternet multiple Bluetooth piconets joined together by devices that are in more than one piconet
Routing of packets between piconets is not defined)
Scatternet
class 2
slave class 3
master
class 3
slave
piconet1 piconet2
(bit count) 68 or 72
POLL/NULL AC BB_Header
68 or 72 54 (1/3 FEC)a
BaseBand header 3 4 3 8
Note: 34 bits BCH parity word exhibits very high auto-correlation and very low
co-correlation properties, therefore a correlator can be used to obtain a match
between the received and expected (reference) synch word
Maguire Link Control Protocol (LCP) Bluetooth: Piconets, Scatternets 389 of 408
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Link Control states
State Description
Inquiry device tries to discover all Bluetooth enabled devices in the close vicinity; uses a special fast
hopping sequence; FHS packets with device information, such as clock, frequency hop
sequence, and BD ADDR, received from available devices; a list of all available devices
Inquiry Scan devices periodically enter the inquiry scan state to make themselves available to inquiring
devices; a special slow hopping sequence used
Page master enters page state and transmits paging messages to slave using access code and timing
information which it learned earlier
Page Scan device periodically enters page state to allow paging devices to establish connections
Connection-Active Slave synchronizes to masters frequency hop and timing sequence. Master transmits a POLL
packet to verify link, Slave sends NULL packet in reply
Connection-Hold device ceases to support ACL traffic for a period of time, keeps Active Member address
(AM_ADDR)
Connection-Park device listens for traffic only occasionally, gives up its AM address
Maguire Host Controller Interface (HCI) Bluetooth: Piconets, Scatternets 392 of 408
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
HCI Transport Layer
Three different transport interfaces are defined to transfer HCI packets from the
host to the Bluetooth module:
UART Universal Asynchronous Receiver Transmitter, a serial interface without error correction
Maguire Logical Link Control and Adaptation Protocol (L2CAP) Bluetooth: Piconets, Scatternets 394 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
L2CAP Signalling
labels packets with channel numbers
L2CAP entities communicate with each other using control channels with a
special channel number (used for connecting, configuring, and disconnecting
L2CAP connections)
packet contains a length field (2 bytes), a channel identifier (2 bytes), and a data
field (0 .. 65535 bytes)
1. A piconet master may explicitly page devices to join its piconet; if it knows their BD_ADDR it can skip the inquiry process and directly paging the device
Maguire Service Discovery Protocol (SDP) Bluetooth: Piconets, Scatternets 400 of 408
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
RFCOMM Protocol
provides a serial interface over the packet-based transport layers
emulates the signals on the nine wires of an RS-232 cable
based on the ETSI 07.10 standard (also used by GSM terminals),
allows multiplexing (via L2CAP) several serial ports over a single
transport
supports flow control on individual channels
has a reserved Protocol and Service Multiplexer (PSM) value used by L2CAP to identify
RFCOMM traffic
no error control
enables legacy applications -- written to operate over serial cables -- to
run without modification
TCS-BIN (BIN stands for the binary encoding of information), that runs directly on top of L2CAP;
supports normal telephony control functions such as placing and terminating a call, sensing
ringing tones, accepting incoming calls, etc.
Maguire Telephony Control Signaling (TCS) Protocol Bluetooth: Piconets, Scatternets 403 of 408
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Bluetooth Profiles
specifications for building interoperable applications
All profiles depend on the Generic Access Profile (GAP) -- defines the
basic rules and conditions for connecting devices with each other and
establishing Bluetooth links and L2CAP channels.
Profile Description
serial port profile defines how RFCOMM runs on top of the Bluetooth transport protocols
generic object defines how objects can be exchanged using the OBEX protocol running on top of
exchange profile RFCOMM
hold mode a device (in a piconet) agrees to remain silent (in that particular piconet) for a given amount
of time; note: keeps its temporary address, AM_ADDR
park mode a slave device agrees with its master to park until further notice; relinquishes its active
member address, AM_ADDR, periodically listens to beacon transmissions from the master
device can either be invited back (by the master) to active
communications using a broadcast transmission during a beacon or
if the slave wants to be unparked, it sends a message to the master
in the slots following the beacon
Although the radio is often the biggest power drain on a Bluetooth device, the
voltage controlled oscillator (for the Bluetooth clock) also consumer power and
can be shut off -- instead you can use a less accurate lower power oscillator when
the accuracy of the normal oscillator is not needed (for example when sleeping)
Maguire Bluetooth performance when faced with interference Bluetooth: Piconets, Scatternets 407 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Further reading
The lecture notes are based on material from:
[137]Bluetooth: Part 1: Overview, Kjell Jrgen Hole <Kjell.Hole@ii.uib.no>,
NTNU, UiB, http://www.kjhole.com/Standards/BT/BTdownloads.html
which is in turn based on Ch. 1, 2, and 3 of:
[138]Bluetooth 1.1: Connect Without Cables by Jennifer Bray and Charles F.
Sturman
[139]C. Bisdikian, An overview of the Bluetooth Wireless Technology, IEEE
Communications Magazine, pp. 86-94, Dec. 2001.
[140]Bluetooth specification, http://www.bluetooth.com
[141]Magnus Karlsson, Modelling and Evaluation of a Bluetooth Data Logger in
the Presence of Interference Sources, M. Sc. Thesis, IMIT, KTH, April
2005.
9. Ultrawideband (UWB)
Lecture notes of G. Q. Maguire Jr.
For use in conjunction with Wireless and Mobile Network
Architectures, by Yi-Bing Lin and Imrich Chlamtac, John
KTH Information and
Communication Technology
Wiley & Sons, 2001, ISBN 0-471-39492-0
1. For the underlying theory for why short pulses should be used see [143] and [144]. For and introduction to impulse radio see [142].
IEEE 802.15.1 Mb/s WPAN/Bluetooth v1.x derivative work (cooperative effort with Bluetooth SIG, Inc.
http://www.bluetooth.com/)
IEEE 802.15.2 Recommended Practice for Coexistence in Unlicensed Bands
IEEE 802.15.3 20+ Mb/s High Rate WPAN for Multimedia and Digital Imaging
IEEE 802.15.3a 110+ Mb/s Higher Rate Alternative PHY for 802.15.3
Uses pulse position modulation (PPM)
IEEE 802.14 200 kb/s max for interactive toys, sensor and automation needs
Maguire IEEE 802.15: Working Group for Wireless Personal Area Networks (WPAN) Ultrawideband (UWB) 411 of
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Further reading
UWB
[142]Moe Z. Win and Robert A. Scholtz, Impulse radio: how it works, IEEE
Communications Letters, vol. 2, no. 2, pp. 36-38, Feb. 1998
http://citeseer.ist.psu.edu/win98impulse.html
[144]Emre Telatar and David Tse, Capacity and mutual information of wideband
multipath fading channels, IEEE Transactions on Information Theory,
46(4):1384-1400, 2000. (preprint -
http://citeseer.ist.psu.edu/telatar99capacity.html )
Maguire Broadband Wireless Access Broadband Wireless Access (BWA) 415 of 421
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
IEEE 802.16
Initial IEEE 802.16 [152] specification was only for Line-of-Sign environments in
the 10 to 66 GHz range
Several variants:
IEEE 802.16a Slotted TDMA (scheduled by base station) in a point-to-multipoint topology (mesh topologies are an option)
low latency
connection oriented
Features: ARQ, 3DES encryption, automatic power control
amendment to 802.16 - for 2GHz to 11GHz
Several physical (PHY) layers:
Single Carrier PHY
256 point FFT OFDM PHY (common to WiMAX and ETSI HyperMAN)
2048 point FFT OFDMA PHY
802.16b Concerns Quality of Service (QoS)
802.16c/d Introduces system profiles and specifies combinations of options - goal: increased interoperability
Maguire IEEE 802.20 aka Mobile-Fi Broadband Wireless Access (BWA) 418 of 421
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
All IP networks
Numerous efforts have shifted from simply using IP (rather than ATM) in the
backbone and have been moving to an all IP network (i.e., IP directly to/from MS
and in the infrastructure).
Airvana Inc. (www.airvananet.com): all-IP architecture for radio access
network equipment for 3G using CDMA2000 1x Evolution-Data Only
(1xEV-DO) wireless technology, data rates up to 2.4 Megabits per
second (Mbps) under ideal circumstances, with average sustained
rates expected to be 300 to 600 kbps
Some view "4G" as the Fourth Generation IP-based wireless network.
Eliminates SS7 (Signaling System 7) telecommunications protocol
Flarion http://www.flarion.com/ RadioRouter base stations used to build
all-IP network
[152]IEEE802.16WorkingGrouponBroadbandWirelessAccess
Standards - http://grouper.ieee.org/groups/802/16/
A B A B
One-to-One One-to-One
A B A B
C C
D D
One-to-Many Many-to-One
Figure 38: Basic Patterns of (Direct) Communication
A B C A B C
A B C A B C
D D
E E
Multicast Routing (Unicast) Routing
Figure 39: Basic Patterns of (Indirect) Communication
d F(d) d F(d)
A B C A B C
G(e) e
A B C A B C
D D
Distribution E Aggregation E
C C C
A B C A B C C
D D
D D
D D
F F
E E
Routing E E
Ad Hoc Routing
Figure 41: Routing
B/F/ acts as an intermediary between A and x
B (or F) routes based on the address - this routing choice can be
time varying (especially if the nodes are moving)
Maguire Routing Sensor Networks 428 of 483
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Ad hoc routing
Ad hoc routing supports self-configuration in the presence of wireless links and
node mobility. Lots of alternatives:
direct transmission,
minimum transmission energy,
geographic routing,
multi-hop routing, and
clustering
Proactive and Reactive routing schemes:
Proactive routing attempts to maintain routes to all destinations at all
times, regardless of whether they are needed or not
Reactive routing computes routes only when they are needed
Tradeoffs between routing traffic (and energy consumption) vs. delay.
Prof. D. Estrin and her WINS group offer a hypothesis that Internet technologies
+ ad hoc routing is sufficient to design sensor network applications [154].
Maguire Ad hoc routing Sensor Networks 429 of 483
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Patterns of Communication in time
A emits data B collects data
A B
A B
Request
data
time
time Response
Stream of transactions
switch IWU
PSTN
Ethernet LANs switch
R
R
IWU Ad hoc
MH
MH
BTS BSC MSC
HLR/VLR
PAN
MH
MH
Cellular networks
Maguire DARPA/IPTO: BAA #99-16: Sensor Information Technology Sensor Networks 433 of 483
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
ideal scenario, queries emanating from one point are automatically
routed to the most appropriate sensor nodes, and the replies are
collected and fused en route to the designated reporting point(s).
Distributed sensor networks easily installed with little or no
pre-planning, of being self-organizing, and of being capable of
supporting sophisticated processing in the field. Sensors will be
tightly integrated with a general purpose CPU, wireless
communications, and memory; multiple sensors can be associated
with one node. Short-range communication among 10 to 10,000
sensor/computer nodes deployed in an irregular pattern will be
supported.
{Emphasis and bold added by Maguire}
Maguire DARPA/IPTO: BAA #99-16: Sensor Information Technology Sensor Networks 434 of 483
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Self-organizing sensor networks
Built from sensor nodes that:
spontaneously create an ad hoc network vs. a traditionally engineered
system structure
nodes may simply be scattered (throw at random, shell dispursed, cloud, )
assemble the network themselves
large to very large numbers (103 .. 1023) of sensors
dynamically adapt to device failure and degradation
individual failure is going to occur - with large numbers of nodes you can be certain that
there will be failed nodes
manage movement of sensor nodes, and
react to changes in task and network requirements
due to their physical size and large number it is simply not possible to
visit/configure/fix/... individual nodes
frequent changes in: position, reachability, power availability, tasking,
Maguire Low Energy Adaptive Clustering Hierarchy (LEACH) Sensor Networks 437 of 483
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Protocols to disseminate information
Sensor Protocols for Information via Negotiation (SPIN) [175]
a family of protocols used to efficiently disseminate information in a
wireless sensor network
flooding and gossiping waste valuable communication and energy
resources sending redundant information throughout the network --
while not being resource-aware or resource-adaptive
use data negotiation and resource-adaptive algorithms
nodes assign a high-level name to their data, called meta-data, and
perform meta-data negotiations before any data is transmitted
avoids redundant data being sent throughout the network
utilize current energy level of the node to adapt the protocol based on
how much energy remains
Simulation shows that SPIN is both more energy-efficient than flooding
or gossiping while distributing data at the same rate or faster than
either of these protocols.
Maguire Sensor fusion en route (a form of in-net processing) Sensor Networks 440 of 483
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Data Aggregation
At each node receive data, use it in conjunction with local data, transmit new
aggregated data
Typical operations
scalar operations (such as sum, average, median, )
vector operations (such as logical operations)
Data aggregation reduces the volume of data that must be transmitted - this is very
important to avoid hotspots in the network (i.e., lots of traffic all headed for the
same places and competing to get there) and reduce the energy required to send
meaningful data
Hotspot
Figure 42: Hotspot
Maguire How did the sensor know it was an elephant? Sensor Networks 444 of 483
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Caching of data
Intermediate nodes may keep local caches and satisfy requests from these caches
reduces energy over having to propagate the requests all the way to the source and propagating the answer back
increases scalability
increases robustness
may result in stale data
Caching prevents loops, since if the received data message matches a data cache
entry, then there is no need to pass the message farther.
If the cache also retains information about the sink it can do downconverting of
sample rates - so if one source only wants the data at half the rate of another source
and these sources lie on different gradients the node can send data messages at the
appropriate rate for the particular gradient[195].
Data caching and For robust data delivery in the face of node failure
aggregation
For coordinated sensing and data reduction
Maguire Metrics for evaluating directed diffusion Sensor Networks 447 of 483
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Congestion
Either operate network far from congestion or
reduce congestion: downconversion, aggregation with data quality
reduction,
Maguire Building upon localization and synchronization Sensor Networks 453 of 483
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Securing what you send
Asymmetric digital signatures for the authentication are impractical:
long signatures high communication overhead (50-1000 bytes per
packet)
very high computational (and energy) overhead to create and verify the
signature
Gennaro and Rohatgi
>1 Kbyte of authentication information per packet, and
Rohatgis improved k-time signature scheme: > 300 bytes per packet
Authenticated streaming broadcast protocol (TESLA) [158]
uses too much communication and memory TESLA[157]
If the sensor is sending a stream of data, then Secure RTP (SRTP) can
be used [227]
Maguire Sensor nodes - low power VLSI design Sensor Networks 466 of 483
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Rex Mins Myths
MYTH#5. Abstraction gets in the way of energy savings
Instead: Create a power aware API - explictly define and expose tradeoffs:
set_max_energy(Joules), set_max_latency(ms), set_min_reliability(float probability),
set_range(int nearest nodes, Note[] who, float meters)
MYTH #4. Energy-quality scalability doesnt work for wireless
Create an API which gives you explicit control over energy vs. quality.
MYTH #3. Derivatives of 802.11 will drive emerging low-power nets
Microsensors arrays with large numbers of sensors each with 2J to 2KJ of energy and
1 to 54kbps data rate vs. 20KJ to 20MJ for 802.11b at 1 to 54Mbps!
MYTH#2. Communication energy scales
d = distance between the nodes, = static power, digital signal processing,
= power amplifier, receiver sensitivity
Radio Maximum dn
2.4 KHz OOK (RFM TR1000 @ 916 MHz) 14 J 3.1 J
n 115.2 KHz ASK (RFM TR1000 @ 916 MHz) 372 nJ 65 nJ
E bit = + d 11 Mbps Custom (MIT AMPS-1 @ 2.4 GHz) 570 nJ 740 nJ
11 Mbps 802.11b (Cisco Aironet 350 @ 2.4GHz) 236 nJ 91 nJ
54 Mbps 802.11a (Atheros, ISSCC2002) 14.8 nJ 11 nJ
adaptive duty cycle (based on needs of the neighborhood and applications, and
the rate with which events are likely to happen) -- applies at multiple levels in the
system
contact: mike.botts@nsstc.uah.edu.
See http://www.opengis.org/
IEEE 802.15.1 Mb/s WPAN/Bluetooth v1.x derivative work (cooperative effort with Bluetooth SIG, Inc.
http://www.bluetooth.com/)
IEEE 802.15.2 Recommended Practice for Coexistence in Unlicensed Bands
IEEE 802.15.3 20+ Mb/s High Rate WPAN for Multimedia and Digital Imaging [223], [224]
IEEE 802.15.3a 110+ Mb/s Higher Rate Alternative PHY for 802.15.3
Uses pulse position modulation (PPM) [222]
IEEE 802.14 200 kb/s max for interactive toys, sensor and automation needs
Maguire IEEE 802.15: Working Group for Wireless Personal Area Networks (WPAN) Sensor Networks 472 of 483
maguire@it.kth.se 2006.01.13 Mobile and Wireless Network Architectures
Ultrawideband
"[a]n intentional radiator that, at any point in time, has a fractional
equal to or greater than 0.20 or has a UWB bandwidth equal to or
greater than 500MHz, regardless of the fractional bandwidth."
- US FCC
1. For the underlying theory for why short pulses should be used see [220] and [221]. For and introduction to impulse radio see [219].
F(
m
d) Data: F(d) or F(G,d) E
d)
E E
Multicast F(d)
[172] Pennsylvania State University, Reactive Sensor Networks (RSN) project: http://strange.arl.psu.edu/RSN/
IP Access nework
UNC
Core Mobile Network
Handoff
MS
BTS Private Network BSC
Unlicensed Mobile Network Controller (UNC) plays a role similar to the BSC in
3GPP, but also must deal with Authentication and Autorization. MS must be at
least dual mode. See: http://www.umatechnology.org/
Gb
SGSN
This link connects via the AP and Wm D/Gr
some network carrying IP UNC AAA Proxy
packets. Its specification is SGW Server HLR
outside of the UMA functional
architecture.
Wd