Abstract
-
Upload
charu-mathur -
Category
Documents
-
view
23 -
download
2
description
Transcript of Abstract
1
ABSTRACTThe rapid pace at which mobile communication has grown is quite astonishing. Mobile
communication is now viewed as a necessity and is one of the fastest growing and most demanding
technologies. There were different generations in the development of a mobile system. The First
Generation (1G) was analog with limited network services and no roaming facility. The Second
Generation (2G) brought significant advancements to the mobile technology in terms of service
sophistication, capacity and quality as they made the communication system digital. GSM is a 2G
technology. The introduction of wireless access to the internet enhanced the 2G system to 2.5G.
GPRS, IN features, SMS are some of the features of 2.5G mobiles. There is a concept of Third
Generation systems as well (3G) which will allow communication, information and entertainment
services to be delivered via wireless terminals. An example of 3G system is Unified Mobile
Telephony System (UMTS).
The key advantage of GSM systems has been higher digital voice quality and low cost alternatives
to making calls such as text messaging. The advantage for network operators has been the ability to
deploy equipment from different, vendors because the open standard allows easy inter-operability.
Like other cellular standards GSM allows network operators to offer roaming services which mean
subscribers can use their phones all over the world.
In this report, we try to understand the basic concepts of GSM technology which is the most
extensively used and universally accepted technology till date across the world for mobile phone
communication. We will have a look at the GSM network implementation, network components,
basic scenarios while mobile station is active, idle or switched off, traffic channels and day to day
activities of the network engineers trying to keep the network up and running.
2
Chapter 1
INTRODUCTION TO IDEA CELLULAR LIMITED
Idea Cellular is a publicly listed company, having listed on the Bombay Stock Exchange (BSE) and
the National Stock Exchange (NSE) in March 2007.
As India’s leading GSM Mobile Services operator, Idea Cellular has licenses to operate in all 22
Service Areas. Presently, operations exist in 11 Service Areas covering Delhi, Maharashtra, Goa,
Gujarat, Andhra Pradesh, Madhya Pradesh, Chattisgarh, Uttaranchal, Haryana, UP-West, Himachal
Pradesh, UP-East, Rajasthan and Kerala. With a customer base of over 26 million, Idea Cellular’s
footprint currently covers approximately 60% of India’s telecom population.
Idea Cellular was incorporated as Birla Communications on March 14, 1995 and later on
rechristened and given the current name on May 1, 2002. The company is a part of Aditya Birla
Group which has a holding of around 98.3 percent share in the company. Mr Kumar Mangalam Birla
is the Chairman of the company whereas Mr Himanshu Kapania is the Managing Director.
A frontrunner in introducing revolutionary tariff plans, Idea Cellular has the distinction of offering
the most customer friendly and competitive Pre Paid offerings, for the first time in India in an
increasingly segmented market. Customer Service and Innovation are the drivers of this Cellular
Brand. A brand known for their many firsts, Idea is only operator to launch GPRS and EDGE in the
country. Idea has received international recognition for its path-breaking innovations when it won the
GSM Association Award for “Best Billing and Customer Care Solution” for 2 consecutive years.
3
Chapter 2
INTRODUCTION AND HISTORY OF MOBILE TELECOMMUNICATIONS
(GSM)During the early1980s, analog cellular telephone systems were experiencing rapid growth in
Europe, particularly in Scandinavia and the United Kingdom, but also in France and
Germany. Each country developed its own system, which was incompatible with everyone
else's in equipment and operation. This was an undesirable situation, because not only was
the mobile equipment limited to operation within national boundaries, which in a unified
Europe were increasingly unimportant, but there was a very limited market for each type of
equipment, so economies of scale , and the subsequent savings ,could not be realized. The
Europeans realized this early on, and in 1982 the Conference of European Posts and
Telegraphs(CEPT) formed a study group called the Groupe Spécial Mobile (GSM) to study
and develop a an European public land mobile system. The proposed system had to meet
certain criteria:
good subjective speech quality,
low terminal and service cost,
support for international roaming,
ability to support handheld terminals,
support for range of new services and facilities,
spectral efficiency, and
ISDN compatibility.
GSM P h as e s : In the late 1980s, the groups involved in developing the GSM standard realized that within
the given time-frame they could not complete the specifications for the entire range of GSM
services and features as originally planned. Because of this, it was decided that GSM would
released in phases with phase1 consisting of a limited set of services and features.
Phase 1 - Phase1 contains the most common services including:
Voice telephony
International roaming
4
Basic fax/data services(up to 9.6Kbits/s)
Call forwarding
Call barring
Short Message Service(SMS)
Phase 2
Advice of charge
Calling line identification
Call waiting
Call hold
Conference calling
Closed user groups
Additional data communications capabilities
Phase 2+
The standardization groups have already defined the next phase, 2+. This program covers
multiple subscriber numbers and a variety of business oriented features. Some of the
enhancements offered byPhase2+include:
Multiple service profiles
Private numbering plans
Access to Centrex services
Interworking with GSM 1800, GSM 1900 and the Digital Enhanced Cordless
Telecommunications (DECT) standard Priorities and time schedules for new features and
functions depend primarily on the interest shown by operating companies and
manufacturers and technical developments in related areas.
Phase 2 + +
Enhanced Data rates for Global Evolution (EDGE), a new modulation method which
increases capacity on the air interface.
Customized Application for Mobile Enhanced Logic (CAMEL), standard, governing IN
service access while roaming internationally.
High Speed Circuit Switched Data (HSCSD), a method of delivering higher data rates
per subscriber by allocating an increased number of time-slots per call.
6
Chapter 3
GSM NETWORK ARCHITECTUREThe various components of a GSM network are here. If we go from subscriber side, we have the MS
that is the handheld radio terminal, the Base transceiver station that communicated directly with the
MS on air. Then we have the base station controller that controls a group of BTSs the interface
between BTS and sBSC is called Abis and is largely proprietary. The BSC is connected to the
Mobile services switching center or simply the switch. The switch is connected to terrestrial
networks. There are databases for managing subscriber services and mobility, namely the Home
Location Register and Visitor Location Register. Most importantly we have the billing center
connected to the switch. There is also an OMC for monitoring all the components of the network.
SW ITCHING SYSTEM(SS ) COMPONENTS
M obile se r v i ce s S w i t c hing Cen t e r ( M SC ) : The MSC performs the telephony switching functions
for the Mobile network. It controls calls to and from other telephony and data systems, such as the
Public Switched Telephone Network (PSTN), Integrated Services Digital Network (ISDN),public
data networks, private networks and other mobile networks.
#Gateway Functionality:Gateway functionality enables an MSC to interrogate a network's HLR
in order to route a call to a Mobile Station (MS). Such an MSC is called a Gateway MSC (GMSC).
7
For example, if a person connected to the PSTN wants to make a call to a GSM mobile
subscriber ,then the PSTN exchange will access the GSM network by first connecting the call to a
GMSC. The same is true of a call from an MS to another MS.
Any MSC in the mobile network can function as a gateway by integration of the appropriate
software.
Home Loc a tion R e g i s ter( H LR): The HLR is a centralized network database that stores and
manages all mobile subscriptions belonging to a specific operator.It acts as a permanent store for a
person's subscription information until that subscription is canceled. The information stored
includes:
Subscriber identity
Subscriber supplementary services
Subscriber location information
Subscriber authentication information
The HLR can be implemented in the same network node as the MSC or as a stand-alone database. If
the capacity of the HLR is exceeded, additional HLRs may be added.
Vi s itor Lo c a tion R e g i s ter(VL R ) : The VLR database contains information about all the mobile
subscribers currently located in an MSC service area. Thus, there is one VLR for each MSC in a
network. The VLR temporarily stores subscription information so that the MSC can service all the
subscribers currently visiting that MSC service area. The VLR can be regarded as a distributed HLR
as it holds a copy of the HLR information stored about the subscriber. When a subscriber roams into
a new MSC service area, the VLR connected to that MSC requests information about the subscriber
from the subscriber's HLR. The HLR sends a copy of the information to the VLR and updates its
own location information. When the subscriber makes a call, the VLR will already have sthe
information required for callset-up.
A u t henti ca tion C e n t e r ( A UC ) : The main function of the AUC is to authenticate the subscribers
attempting to use a network. In this way, it is used to protect network operators against fraud. The
AUC is a database connected to the HLR which provides it with the authentication parameters and
ciphering keys used to ensure network security.
8
Equipm e nt I denti t y R e gi s ter (EIR ) : The EIR is a database containing mobile equipment identity
information which helps to block calls from stolen, unauthorized, or defective MSs. It should be
noted that due to subscriber-equipment separation in GSM, the barring of MS equipment does not
result in automatic barring of a subscriber.
SHORT MESSAGE SERVICE CENTRE(SMSC): SMS is a service that allows a mobile to
exchange text messages with other entities. Messages can be upto 160 characters. SMSC serves to
store and relay the messages from different entities to MS. SMSC communicates with MSC on
MAP for relaying messages.
VOICE MAIL SERVICE CENTRE (VMSC): Voice mail service is like an answering machine
service offered to mobile subscribers. VMS contains the subscription data for all voice mail
subscribers. VMS also stores voice messages for subscribers. VMS is connected to the MSC. VMS
service is used by operators to increase the call completion rate and to raise additional revenue from
calls that could otherwise have not completed. Each subscriber is provided with a certain memory
corresponding to minutes of speech. Calls can be diverted to the voice mail on busy, usually an SMS
alert is sent to the subscriber when a message has been deposited in the box.
B A SEST A T I ON SYS T E M( B SS) C O M PO N E NT S
Ba s e S t a tion Con t rol le r (BSC): The BSC manages all the radio-related functions of a GSM
network.It is a high capacity switch that provides functions such as MS handover, radio channel
assignment and the collection of cell configuration data. A number of BSCs maybe controlled by
each MSC.
Ba s e T r a ns c e i v e r S tation ( B TS ) : The BTS controls the radio interface to the MS. The BTS
comprises the radio equipment such as transceivers and antennas which are needed to serve each cell
in the network. A group of BTSs are controlled by a BSC.
NETWORK M ON I T OR I NG CENTERS
9
Op e r a tion and Ma int e nan c eC e n t e r(OM C ) : An OMC is a computerized monitoring center which
is connected to other network components such as MSCs and BSCs viaX.25 data network links.In
the OMC, staff are presented with information about the status of the network and can monitor and
control a variety of system parameters. There maybe one or several OMCs within a network
depending on the network size.
Ne t w ork Man a ge m e n t Cen t e r (N M C): Centralized control of a network is done at a Network
Management Center (NMC).Only one NMC is required for a network and this controls the . The
advantage of this hierarchical approach is that staff at the NMC can concentrate on long term
system-wide issues, whereas local personnel at each OMC can concentrate on short term, regional
issues.OMC and NMC functionality can be combined in the same physical network node or
implemented at different locations.
M O B I L E S T A T I ON ( M S)
An MS is used by a mobile subscriber to communicate with the mobile network. Several types of
MSs exist, each allowing the subscriber to make and receive calls. Manufacturers of MSs offer a
variety of designs and features to meet the needs of different markets. The range or coverage area of
an MS depends on the output power of the MS. Different types of MSs have different output power
capabilities and consequently different ranges. For example, hand-held MSs have a lower output
power and shorter range than car-installed MSs with a roof mounted antenna.
GSM MSs consist of:
MOBILE TERMINAL
The ME consists of radio processing functions and an interface to the user and other terminal
equipment.
SIM – SUBSCRIBER IDENTITY MODULE
SIM card as defined by GSM is a removable module which can be inserted inside the Mobile Phone
when the user wants to use the MS. It is available in two sizes the Credit Card size; known as ISO
SIM or the stamp size; known as Pug in SIM. SIM card has a unique information on it which is its
identity the IMSI. This identity is unique to each SIM used in any of the GSM Networks. This
identity is used by the Network to accomplish Signaling with the MS and also to do signaling with
other GSM networks for information transfer related to a particular connection.
10
SIM also has a two level protection to prevent misuse. SIM can be optionally by the user be set for a
PIN code. Whenever the MS is turned ON or the SIM is inserted, the Mobile will ask the user to
enter the PIN code. If three false entries PIN are entered then the SIM is blocked. Then the user
needs to enter a Pin Unblocking Key (PUK). Ten false entries of PUK will permanently disable the
SIM card permanently.
Memory in the SIM :
ROM ( 6 – 16 kbytes) : Contains the OS and Security algorithms A3 and A8
RAM (128-256 bytes) : Buffer and for execution of algorithms
EEPROM (2-8 kbytes) : IMSI, Ki, Short Messages, Abbreviated dialing
SIM brings the advantages of security and portability for subscribers. For example, subscriberA's
mobile terminal may have been stolen. However, subscriber A's own SIM can be used in another
person's mobile terminal and the calls will be charged to subscribers A.
GSM INTERFACES
Abis A E B
Air F E
GsGf
MS
BTS BSC MSC MSC
VLR GMSC
EIR
SGSN
GGSN
11
Gr
Gn
Packet switched Circuit (voice)interfaces Switched(data ) Interfaces
GSM GEOGR APHI C AL NETWORK STRUCT URE
HLR
12
GSM network architecture
Every telephone network needs a specific structure to route incoming calls to the correct
exchange and then on to the subscriber. In a mobile network, this structure is very
important because the subscribers are mobile. As subscribers move through the network,
these structures are used to monitor their location.
CELL: A cell is the basic unit of a cellular system and is defined as the area of radio
coverage given by one BS antenna system. Each cell is assigned a unique number called
Cell Global Identity(CGI).Ina complete network covering an entire country, the number of
cells can be quite high.
13
LO C A TION A R E A (L A ) : A Location Area(LA)is defined as a group of cells. Within the
network a subscriber‟s location is linked to the LA in which they are currently located. The
identity of the current LA is stored in the VLR. When an MS crosses the boundary between
two cells belonging to different LA‟s, it must report its new Location Area to the network.
If it crosses a cell boundary within a LA, it does not report its new cell location to the
network. When there is a call for an MS, a paging message is broadcast within all the cells
belonging to the relevant LA.
M SC S E RVICE A R E A :An MSC service area is made up of a number of LAs and
represents the geographical part of the network controlled by one MSC. Inorder to be able
to route a call to an MS, the subscriber's MSC service area is also recorded and monitored.
The subscriber's MSC service area is stored in the HLR.
PL M N S E RVICE A R E A : A Public Land Mobile Network(PLMN) service area is the
entire set of cells served by one network operator and is defined as the area in which an
operator offers radio cover age and access to its network. In any one country there may
be several PLMN service areas, one for each mobile operator's network.
G S M S ER V ICE A R E A : The GSM service area is the entire geographical area in which
a subscriber can gain access to a GSM network. The GSM service area increases as more
operators sign contracts agreeing to work together. Currently, the GSM service area spans
dozens of countries across the world from Ireland to Australia, South Africa and the
14
Americas. International roaming is the term applied when an MS moves from one PLMN
to another when abroad.
15
Chapter 4GSM IDENTITIES
To switch a call to a mobile subscriber, the right identifying codes must be used.
A mobile subscriber can make, receive or forward calls from any location within
the GSM Public Land Mobile Network (PLMN) with a high degree of security.
The GSM network uses more than one addressing and numbering plan to identify
different networks. The identities used in a GSM PLMN network are described
in the text that follows next.
MOBILE STATION ISDN NUMBER (MSISDN)
The MSISDN is a number that uniquely identifies a mobile telephone subscription
within the Public Switched Telephony Network (PSTN) numbering plan.
In CME 20 the MSISDN is composed of:
MSISDN = CC + NDC + SN
• CC = Country Code
• NDC = National Destination Code
• SN = Subscriber Number
INTERNATIONAL MOBILE SUBSCRIBER IDENTITY (IMSI)
The IMSI is a unique identifying code allocated to each subscriber allowing
correct identification over the radio path and through the GSM PLMN network.
It is used for all identification signalling in the PLMN and all network related
subscriber information is connected to it. The IMSI is stored in the Subscriber
Identity Module (SIM), as well as in the HLR and the VLR. It consists of three
different parts:
IMSI = MCC + MNC + MSIN
• MCC = Mobile Country Code
• MNC = Mobile Network Code
• MSIN = Mobile Subscriber Identification Number
According to the GSM specifications, IMSI can have a
maximum length of 15 digits.
16
TEMPORARY MOBILE SUBSCRIBER IDENTITY (TMSI)
The TMSI can be used to keep subscriber information confidential on the air interface. It
also increases the paging capacity as the length of the TMSI is shorter than the length of the
IMSI.The TMSI is relevant on the local MSC/VLR level only and is changed at certain
events or time intervals. Each local operator can define their own TMSI structure. The
TMSI should not consist of more than four octets when used within a Location Area (LA),
for example, for paging.
When a cell within a new Location Area (LA) is entered, the Location Area Identity (LAI)
must be added to the four octets toper form a location update.
MOBILE STATION ROAMING NUMBER (MSRN)
When a mobile terminating call is to be set up, the HLR of the called subscriber requests
the current MSC/VLR to allocate a MSRN to the called subscriber. This MSRN is returned
via the HLR to the GMSC. The GMSC routes the call to the MSC/VLR exchange where
the called subscriber is currently registered. The routing is done using the MSRN. When
the routing is completed, the MSRN is released. The interrogation call routing function
(request for MSRN) is part of MAP.
All data exchanged between GMSC-HLR-MSC/VLR for the purpose of interrogation is
sent over S7 signaling. The MSRN is built up like an MSISDN.
In GSM, the MSRN is composed of the following:
MSRN = CC + NDC + SN
• CC = Country Code
• NDC = National Destination Code
• SN = Subscriber Number
In some particular markets the MSRN is composed of the
following:
MSRN = CC + NPA + SN
• CC = Country Code
• NPA = Number Planning Area
• SN = Subscriber Number
17
INTERNATIONAL MOBILE EQUIPMENT IDENTITY (IMEI)
The IMEI uniquely identifies a Mobile Station (MS) as a piece or assembly of equipment. If a stolen or not type-approved IMEI is used, mobiles causing severe malfunctions can be barred. TheIMEI consists of 15 digits. The IMEI consists of the following:IMEI = TAC + FAC + SNR + sp• TAC = Type Approval CodeDetermined by a central WCDMA/UMTS body andidentifies the type of equipment.• FAC = Final Assembly CodeThe FAC identifies the manufacturer of the equipment• SNR = serial no.The SNR is an individual serial number of six digits which uniquely identifies all equipment within each TAC and FAC.• sp = spare part for future use; this digit should always be zero when it is transmitted by the UEThe IMEI has a total length of 15 digits.
LOCATION AREA IDENTITY (LAI)The LAI, used for paging, indicates to the MSC in which location area the MS is operating. It is also used for location updating of mobile subscribers.The LAI contains the following :LAI = MCC + MNC + LAC• MCC = Mobile Country CodeIdentical to IMSI MCC• MNC = Mobile Network Code
18
CELL GLOBAL IDENTITY (CGI)The CGI is used for cell identification within a location area.The CGI contains the same information as the LAI and also includes a Cell Identity (CI). The CI has a maximum length of16 bits.CGI consists of:CGI = MCC + MNC + LAC + CI
ADDRESSING THE SWITCHING SYSTEM ENTITIES
GLOBAL TITLE (GT)
A Global Title (GT) is an identifying code, such as dialed digits ,which does not explicitly contain information that allows routing in the signaling network. This requires the Signaling Connection Control Part (SCCP) translation function.The GT is used for addressing signaling information.Different numbering plans are used to distinguish different networks.• E.164 is the numbering plan for PSTN/ISDN• E.212 is the numbering plan for GSM PLMNEach network entity is identified by its international PSTN/ISDN number, that is, its own command defined address which has the following structure:
19
Example: E.164: CC + NDC(or NPA) + SNThe CC, NDC, and SN identify the node within the whole GSM, as well as the entity. Entities include the HLR, MSC, VLR, EIR and AUC.See the SCCP chapter for more information.During an incoming call to a mobile subscriber, the GMSC analyzes the MSISDN to locate the appropriate HLR. The digit sin the Subscriber Number (MSISDN) are used for the signal routing to the HLR.
MOBILE GLOBAL TITLE (MGT)
When an MS is powered on in a PLMN, the VLR must communicate with the MS’s HLR to perform location updating.
The only data available in the MSC/VLR for the SCCP addressing of the HLR is the IMSI number. However, for signaling in the international PSTN/ISDN network, IMSI cannot be used. Thus, it is necessary to convert the IMSI number in the MSC/VLR into a Global Title (GT), which enables routing of the S7 signaling to the proper HLR.
Structure of MGT
20
CHAPTER 5GSM FREQUENCY BANDS AND PROTOCOLS
As GSM has grown worldwide, it has expanded to operate at four main frequency bands:
900, 1800,1900 and 800.
GSM 900:The original frequency band specified for GSM was 900 MHz. Most GSM
networks worldwide use this band .In some countries and extended version of GSM 900
can be used, which provides extra network capacity. This extended version of GSM is
called E- GSM, while the primary version is called P-GSM.
GSM 1800: In 1990, in order to increase competition between operators, the United
Kingdom requested the start of a new version of GSM adapted to the 1800 MHz
frequency band. Licenses have been issued in several countries and networks are in
full operation.
By granting licenses for GSM 1800 in addition to GSM 900, a country can increase the
number of operators. In this way, due to increased competition, the service to
subscribers is improved.
GSM 1900:In 1995, the Personal Communications Services (PCS) concept was specified
in the United States. The basic idea is to enable"person-to-person"communication rather
than "station-to station". PCS does not require that such services be implemented using
cellular technology, but this has proven to be the most effective method. The frequencies
available for PCS area round1900 MHz. As GSM 900 could not be used in North
America due to prior allocation of the 900 MHz frequencies, GSM 1900MHzis seen as an
opportunity to bridge this gap. The main difference between the American GSM 1900
standard and GSM 900 is that it supports ANSI signaling.
21
GSM 800:The multiband support in Ericsson‟s GSM system is now enhanced to include
support for the GSM 800MHzband, thus increasing capacity for operators with a licence
for this frequency. This frequency band was traditionally usedby TDMA in USA.
The following figure shows the various GSM frequency bands:
The GSM networks use a certain protocol for signaling. This protocol can be the tried and
tested SS7 or Signaling System 7 or the upcoming SIGTRAN or the new technologies like
MGW, MSS, etc. Here we will give an introduction to SS7 and take up SIGTRAN in a little
bit of detail. This is because SS& is used widely today in GSM networks so we will talk
about it in detail later on.
SS7 : SS7 is a signaling method in which a signaling channel conveys, by means of labeled
messages, signaling information relating to call setup, control, network management, and network
maintenance. Common Channel Signaling System No. 7 (i.e., SS7 or C7) is a global standard for
telecommunications defined by ITU-T. The standard defines the procedures and protocol by which
network elements in PSTN exchange information over a digital signaling network to cellular and
wire line call setup, routing and control. The ITU definition of SS7 allows for national variants
such as ANSI and Bellcore standards used in North America and ETSI standard used in Europe.
The SS7 network and protocol are used for:
Basic call setup, management, and tear down,
Wireless services such as personal communications services (PCS), wireless
roaming, and mobile subscriber authentication,
Local number portability (LNP),
Toll-free (800/888) and toll (900) wire line services,
Enhanced call features such as call forwarding, calling party name/number display,
and three-way calling,
Efficient and secure worldwide telecommunications.
SIGTRAN
SS7 over IP is the general term to describe how SS7 based application protocols can send
their message over an IP based transport network. SS7 over IP is specified by IETF
(Internet Engineering Task Force). The responsible group within the IETF is called
22
SIGTRAN (Signaling Transport). The initial problem triggering the creation of SIGTRAN
was to enable classical SCN (Switched Circuit Networks) networks to be connected to IP
networks for voice transport. To enable voice transmission over general transport systems a
new network design approach is necessary. This new concept is generally described by
separation of concern. This term means, that the network is divided into levels dealing
with a very restricted task. Three levels are typically required:
• Transport Network Plane : The transport network plane deals with the transport of bits
only. Special tasks of the transport plane are to handle access related things. The transport
network can be homogeneous (one transport technology) or heterogeneous (multiple
transport technologies).
• Network Control Plane : The network control plane has the responsibility to control the
transport network. In other words the network control plane shall handle the logical set up
of transport bearer services within the transport network plane for circuit switched calls or
packet sessions. The classical call control and session management is implemented here.
The control of the transport network should be done in a bearer independent fashion, to
enable easy exchange of the transport technologies.
• Application & Service Plane : The services offered by the network control plane
together with the transport network plane are very basic (call/session). To enable
sophisticated user services possibly with user specific components or provider specific
features additional functionality is needed. This is what the application & service plane
gives us. These functionalities shall be combined here. Examples for entities in this plane
are SCP (Service Control Point) for intelligent network IN, CSE (CAMEL Service
Environment) for mobile IN, HLR (Home Location Register) for GSM/UMTS subscriber
data.
In this architecture there is signaling between the planes and within the planes. SIGTRAN
especially deals with the signaling exchanged within the network control plane and
between network control and transport network plane.
24
The functional model of SIGTRAN reflects the network model described above, but considers
network control and transport network plane only. The functional model is composed out of
three basic elements:
• Signaling Gateway (SG) : The signaling gateway has the task to terminate one signaling
system and to relay the higher layer signaling message to another signaling system. In case of
SIGTRAN a SG will typically terminate either classical or broadband SS7 and map it to SS7
over IP. The signaling can be forwarded from a SG either towards other SGs or to a MGC
(Media Gateway Controller).
• Media Gateway (MG) : A MG is a pure transport network entity. It usually has three tasks.
First a MG can relay from one transport technology to another (for example from PCM to
ATM or IP, etc.). Second a MG can make a media format conversion. This can be for
instance a codec conversion (e.g. from A-law codec to AMR codec of UMTS/GSM). Third a
MG performs switching/routing functionality. MGs next to pure routers and switches form the
transport network plane.
• Media Gateway Controller (MGC) : The MG alone will of course not know which type of
transport service is needed for a certain application. To configure the media stream bearer
service in the MG is the task of the MGC. The MGC is in the network control plane and can be
considered as the logical part of a switch, MSC or SGSN. In UMTS Release 4 also the name
MSC Server and SGSN Server is applied for the MGC. So the MGC performs call control and
session management. To map the logical control into physical bearer services there is signaling
between MGC and MG, but also between MGC and MGC. If the all/session signaling is
initially coming from a SCN network, the signaling for call control/session management is also
coming or going to the SG.
SIGTRAN Protocol Architecture
25
SIGTRAN is the name of the IETF Workgroup responsible for SS7 over IP. The SIGTRAN
protocol architecture is designed for maximal variability and extensibility. The basic
architecture is formed by three general layers:
• Transport Layer: The transport layer shall be a standard transport protocol that is used in
unmodified way. The requirements are very low level. To be exact, what standard IP offers is
enough. So the transport layer must provide an unreliable datagram service, no sequence
control and no reliability is requested.
• Common Signaling Transport Layer: The common signaling transport layer uses the raw
transport layer services and enhances it with reliability and sequence order control. In principle
TCP could fulfill this, but when multiple signaling links between the same
endpoints are required TCP is not sufficient any more. Instead SIGTRAN defines a new
reliable transport protocols named SCTP (Stream Control Transmission Protocol). SCTP
serves signaling protocols with transmission capabilities in a very general way.
• SCN Adaptation Module: The users of SS7 over IP are the classical SS7 MTP user
protocols like ISUP, SCCP, BICC, etc. Of course nobody wants to make a complete redesign
of these protocols because of the modified transport technology. Therefore user adaptation
layers are placed on top of SCTP. These adaptation modules will offer to the higher layer an
emulated interface of a basic transmission protocol. In the figure shown are two of them.
M3UA (MTP level 3 User Adaptation) emulates MTP level 3 for MTP users. In contrast to that
SUA( SCCP User Adaptation) offers the interface of SCCP to SCCP subsystems. In this way
one could implement emulations for arbitrary transport protocols.
On top of the SIGTRAN protocol stack the user protocols shall have the feeling to be in a
classical SS7 environment.
SS7 Protocol
Signaling System #7 (SS7) has become one of the most important assets within any carrier‟s
network. Already deemed important for interconnecting calls from one network to the next,
SS7 has also become a network rich in user data. SS7 is really a control protocol, used to
provide instructions to the various elements within a telephony network. These instructions
may be how to route a call through the network, what features a caller has subscribed to, or, in
the case of number portability, which carrier will be used to handle the call. In order to provide
26
this level of instruction, a great deal of information must be sent from one element to another.
Everything from the caller‟s telephone number to his or her calling card number, as well as
other pertinent data, is sent through the network to the various network elements involved in
connecting the caller to his or her destination. If there were a means of trapping all this
information and storing it for analysis (which, of course, there is), carriers would find a rich
resource for identifying the users of their network.
The data can be used for determining new marketing campaigns, the success of new feature
offerings, and much more. In fact, I often refer to this data as the “three W‟s:” who is using the
network, when they are using the network, and why they are using the network. This data is
crucial to the success of any business to ensure they are meeting the needs of their customers.
Many carriers are just now realizing the benefits of mining the data traversing the SS7 network
and are utilizing this data to maintain revenue assurance in all aspects of the business. SS7 has
even become an important revenue source for carriers who have learned to tap its links and
interface to back- office billing systems.
What was once an obscure, little-known technology has become one of the industry‟s most
prized possessions. However, SS7 will not live forever. Particular aspects of SS7 will continue
to thrive throughout the signaling networks, but already the lower layers of the SS7 protocols
are being replaced by protocols based on the Transmission Control Protocol/Internet Protocol
(TCP/IP). Although the applications (circuit connection and database access) will not change,
the transport mechanism is already changing. Still, SS7 is a long way from obsolescence and is
extremely important to understand if one plans on making a career out of telecommunications.
To fully understand how and why SS7 is used, one first must understand the basics of
telephony as well as basic signaling.
The SS7 network and protocol are used for:
Basic call setup, management, and tear down
Wireless services such as personal communications services (PCS), wireless roaming,
and mobile subscriber authentication
Local number portability (LNP)
Toll-free (800/888) and toll (900) wire line services
Enhanced call features such as call forwarding, calling party name/number display, and
three-way calling
Efficient and secure worldwide telecommunications
27
Signaling Points
Each signaling point in the SS7 network is uniquely identified by a numeric point code. Point
codes are carried in signaling messages exchanged between signaling points to identify the
source and destination of each message. Each signaling point uses a routing table to select the
appropriate signaling path for each message.
There are three kinds of signaling points in the SS7 network (Fig. 1):
SSP (Service Switching Point)
STP (Signal Transfer Point)
SCP (Service Control Point)
SS7 Signaling Points
SSPs are switches that originate, terminate, or tandem calls. An SSP sends signaling messages
to other SSPs to setup, manage, and release voice circuits required to complete a call. An SSP
may also send a query message to a centralized database (an SCP) to determine how to route a
call (e.g., a toll-free 1-800/888 call in North America). An SCP sends a response to the
originating SSP containing the routing number(s) associated with the dialed number. An
alternate routing number may be used by the SSP if the primary number is busy or the call is
unanswered within a specified time. Actual call features vary from network to network and
from service to service.
Network traffic between signaling points may be routed via a packet switch called an STP. An
STP routes each incoming message to an outgoing signaling link based on routing information
contained in the SS7 message. Because it acts as a network hub, an STP provides improved
utilization of the SS7 network by eliminating the need for direct links between signaling points.
An STP may perform global title translation, a procedure by which the destination signaling
28
point is determined from digits present in the signaling message (e.g., the dialed 800 number,
calling card number, or mobile subscriber identification number). An STP can also act as a
"firewall" to screen SS7 messages exchanged with other networks.
Because the SS7 network is critical to call processing, SCPs and STPs are usually deployed in
mated pair configurations in separate physical locations to ensure network-wide service in the
event of an isolated failure. Links between signaling points are also provisioned in pairs.
Traffic is shared across all links in the linkset. If one of the links fails, the signaling traffic is
rerouted over another link in the linkset. The SS7 protocol provides both error correction and
retransmission capabilities to allow continued service in the event of signaling point or link
failures.
SS7 Signaling Link Types
A Link: An "A" (access) link connects a signaling end point (e.g., an SCP or SSP) to
an STP. Only messages originating from or destined to the signaling end point are
transmitted on an "A" link.
B Link: A "B" (bridge) link connects an STP to another STP. Typically, a quad of "B"
links interconnect peer (or primary) STPs (e.g., the STPs from one network to the STPs
of another network). The distinction between a "B" link and a "D" link is rather
arbitrary. For this reason, such links may be referred to as "B/D" links.
29
C Link: A "C" (cross) link connects STPs performing identical functions into a mated
pair. A "C" link is used only when an STP has no other route available to a destination
signaling point due to link failure(s). Note that SCPs may also be deployed in pairs to
improve reliability; unlike STPs, however, mated SCPs are not interconnected by
signaling links.
D Link: A "D" (diagonal) link connects a secondary (e.g., local or regional) STP pair to
a primary (e.g., inter-network gateway) STP pair in a quad-link configuration.
Secondary STPs within the same network are connected via a quad of "D" links. The
distinction between a "B" link and a "D" link is rather arbitrary. For this reason, such
links may be referred to as "B/D" links.
E Link: An "E" (extended) link connects an SSP to an alternate STP. "E" links provide
an alternate signaling path if an SSP's "home" STP cannot be reached via an "A" link.
"E" links are not usually provisioned unless the benefit of a marginally higher degree of
reliability justifies the added expense.
F Link: An "F" (fully associated) link connects two signaling end points (i.e., SSPs and
SCPs). "F" links are not usually used in networks with STPs. In networks without
STPs, "F" links directly connect signaling points.
ACCESS SIGNALING
There are many types of access signaling, for example, PSTN analog subscriber line signaling,
ISDN Digital Subscriber Signaling System (DSS1), and signaling between the MS and the
network in the GSM system.
Signaling on the analog subscriber line between a telephony subscriber and the Local
Exchange (LE) is performed by means of on/off hook signals, dialed digits, information tones
(dial tone, busy tone, etc.), recorded announcements, and ringing signals.
The dialed digits can be sent in two different ways: as decadic pulses (used for old-type rotary-
dial telephones), or as a combination of two tones (used for modern pushbutton
telephones). The latter system is known as the Dual Tone Multi Frequency (DTMF).
The information tones (dial tone, ringing tone, busy tone, etc.) are audio signals used to keep
the calling party (the A-subscriber) informed about what is going on in the network during the
setup of a call.
Digital Subscriber Signaling System No. 1 (DSS1) is the standard access signaling system used
in ISDN. It is also called a D-channel signalling.
30
TRUNK SIGNALING The Inter-exchange Signaling information is usually transported on
of the time slots in a PCM link, either in association with the speech channel or independently.
There are two commonly used methods for Inter Exchange Signaling:
CHANNEL ASSOCIATED SIGNALING (CAS)
Channel Associated Signaling (CAS) means that the signaling is always sent on the same
connection (PCM link) as the traffic.
•Line Signals
Line Signals are used during the whole duration of a call to monitor the status of the
connection and traffic circuit.
Example: Seizure, Answer signals.
•Register Signals
The Register Signals are used during the set-up phase of a
call to transfer address and category information. Example:
dialed B-number.
COMMON CHANNEL SIGNALING (CCS)
In CCS, signaling messages (or data packets) are transmitted over time slots in a PCM link
reserved for the purpose of signaling, instead of Line Signals and Register Signals (which do
not exist in CCS).
OPEN SYSTEM INTERCONNECT(OSI)
The hardware and software functions of the SS7 protocol are divided into functional
abstractions called "levels". These levels map loosely to the Open Systems Interconnect
(OSI) 7-layer model.
For each layer in the Reference Model the standardization is split
into two main parts:
•Service definition defines the functions that each layer should contain and with which
services the layer should provide the user or the layer closest above.
•Protocol definition specifies how the functions within a layer in one system co-operate with
the corresponding functions in another system.
31
The advantages of this well-structured model are that a protocol within one layer can be
exchanged without affecting the other layers and the implementation of the functions within a
layer is free.
COMMUNICATION PROCESS
Each layer has its own specified functions and provides specific services for the layers above.
It is important to define the interfaces between different layers and the functions within each
layer. The way a function is realized within a layer is not predicted. Logically, the
communication between functions always takes place on the same level according to the
protocols for that level.
Only functions on the same level can “talk to each other”. In the transmitting system, the
protocol for each layer adds information to the data received from the layer above. The
addition usually consists of a header and/or a trailer.
In the receiving system, the additions are used, for example, to identify bits or data fields
carrying information for that specific layer only. These fields are decoded by layer
functionality and are removed when delivering the message to the applications or layers
above. When the data reaches the application layer on the receiving side, it consists of only the
data that originated in the application layer of the sending system.
Logically, each layer communicates with the corresponding layer in the other system. This
communication is called Peer-to-Peer communication and is controlled by the layer’s protocol.
32
DESCRIPTION OF LAYERS
APPLICATION LAYER
This layer provides services for support of the user’s applicationprocess and for control of all
communication between applications.
Examples of layer 7 functions are file transfer, message handling,directory services, and
operation and maintenance.
PRESENTATION LAYER
This layer defines how data is to be represented, that is, the syntax.
The presentation layer transforms the syntax used in the applicationinto the common syntax
needed for the communication between applications. Layer 6 contains data compression.
SESSION LAYER
This layer establishes connections between presentation layers in different systems. It also
controls the connection, the synchronization and the disconnection of the dialog. It allows the
presentation layer to determine checkpoints, from which the retransmission will start when the
data transmission has been interrupted.
TRANSPORT LAYER
This layer guarantees that the bearer service has the quality required by the application in
question. Examples of functions are error detection and correction (end-to-end), and flow
control. The transport layer optimizes the data communication, for example by
multiplexing or splitting data streams before they reach the network.
NETWORK LAYER
The basic network layer service is to provide a transparent channel. This means that the
application requesting a channel ignores network problems and the related signal exchange
because that is the task of the lower levels. It just requires an open channel, transparent for the
transmission of data, between transport layers in different systems. The Network Layer
establishes, maintains, and releases connections between the nodes in the network and handles
addressing and routing of circuits.
DATA LINK LAYER
This layer provides an essentially error-free point-to-point circuit between network layers. The
layer contains resources for error detection, error correction, flow control, and retransmission.
PHYSICAL LAYER
This layer provides mechanical, electrical, functional, and procedural resources for activating,
maintaining, and blocking physical circuits for the transmission of bits between data link
33
layers. The physical layer contains functions for converting data into signals compatible with
the transmission medium. For the communication between only two exchanges, layers 1 and
2 are sufficient. For the communication between all exchanges in the network, layer 3 must be
added because it provides addressing.
Characteristics of SS7
A major characteristic of the signaling system is that its structure ensures flexibility and
modularity for different applications.
Other characteristics of SS No.7 include these features:
High flexibility
Many different types of telecommunication services can use SS7. It is used to set up
and release connections in traditional telephony and data communication, in mobile
telephony and
data communication, for the provision of ISDN services, and many other applications.
SS7 is also used for the interchange of data between databases (for example,
VLR↔HLR in GSM
network).
High capacity
A single signaling link can support several thousand traffic circuits.
High speed
Setting up a call through a number of exchanges takes less than a second.
High reliability
34
The system contains powerful functions for elimination of disturbances in the signaling
network. One example is the possibility of choosing alternative links for signaling.
Economical
The fact that a wide range of telecommunication services and connections can use one and the
same signaling system is an important economical aspect. Besides, SS7 is much simpler and
requires much less hardware than older signaling systems. SS7 can handle both so-called
circuit related signaling and noncircuit related signaling. The term circuit in this context
means traffic channel. Thus, circuit related signaling means signals sent to support a call
establishment or release procedure.
35
Chapter - 6MESSAGE TRANSFER PART (MTP)
The Message Transfer Part (MTP) is divided into three levels.
MTP Level 1, is equivalent to the OSI Physical Layer. MTP Level 1 defines the physical,
electrical, and functional characteristics of the digital signaling link. Physical interfaces defined
include E-1 (2048 kb/s; 32 64 kb/s channels), DS-1 (1544 kb/s; 2464kb/s channels), V.35 (64
kb/s), DS-0 (64 kb/s), and DS-0A (56 kb/s).
MTP Level 2 ensures accurate end-to-end transmission of a message across a signaling link.
Level 2 implements flow control, message sequence validation, and error checking. When an
error occurs on a signaling link, the message (or set of messages) is retransmitted. MTP Level
2 is equivalent to the OSI Data Link Layer.
MTP Level 3 provides message routing between signaling points in the SS7 network. MTP
Level 3 re-routes traffic away from failed links and signaling points and controls traffic when
congestion occurs. MTP Level 3 is equivalent to the OSI Network Layer.
36
ISDN User Part (ISUP)
The ISDN User Part (ISUP) defines the protocol used to set-up, manage, and release trunk
circuits that carry voice and data between terminating line exchanges (e.g., between a calling
party and a called party). ISUP is used for both ISDN and non- ISDN calls. However, calls that
originate and terminate at the same switch do not use ISUP signaling.
General overview of ISUP
Telephone User Part (TUP)
In some parts of the world (e.g., China, Brazil), the Telephone User Part (TUP) is used to
support basic call setup and tear-down. TUP handles analog circuits only. In many countries,
ISUP has replaced TUP for call management.
Signaling Connection Control Part (SCCP)
SCCP provides connectionless and connection-oriented network services and global title
translation (GTT) capabilities above MTP Level 3. A global title is an address which is
translated by SCCP into a destination point code and subsystem number. SCCP is used as the
transport layer for TCAP-based services.
37
Transaction Capabilities Applications Part (TCAP)
TCAP supports the exchange of non-circuit related data between applications across the SS7
network using the SCCP connectionless service. Queries and responses sent between SSPs and
SCPs are carried in TCAP messages. For example, an SSP sends a TCAP query to determine
the routing number associated with a dialed 800/888 number and to to check the personal
identification number (PIN) of a calling card user. In mobile networks (IS-41 and GSM),
TCAP carries Mobile Application Part (MAP) messages sent between mobile switches and
databases to support user authentication, equipment identification, and roaming.
TCAP in GSM
Operations, Maintenance and Administration Part (OMAP) and ASE
OMAP and ASE are areas for future definition. Presently, OMAP services may be used to
verify network routing databases and to diagnose link problems.
Other Applications of SS7 in GSM Networks
In GSM networks, signaling is not as simple as in the PSTN. There are extra signaling
requirements in GSM due to the different architecture of the network which requires a large
amount of non-call-related signaling. In the first instance the subscriber is mobile, unlike the
PSTN telephone which is always in one place. Therefore, a continuous tracking of the mobile
station is required which results in what is known as the Location Update procedure. This
procedure is an example of non-call-related signaling, where the mobile phone and the network
38
are communicating but no call is taking place. This requires additional sets of standard
messages to fulfill the signaling requirements of GSM networks.
These additional protocol layers are
Base Station Subsystem Application Part (BSSAP): The first of these additional protocol
layers, which are specific to GSM networks, is the Base Station Subsystem Application Part
(BSSAP). This layer is used when an MSC communicates with the BSC and the mobile station.
Since the mobile station and MSC have to communicate via the BSC, there must be a virtual
connection, therefore the service of SCCP is also needed. The authentication verification
procedure and assigning a new TMSI all take place with the standard sets of messages of
BSSAP.
Communication between MSC and BSC also uses the BSSAP protocol layer. Therefore,
BSSAP serves two purposes:
MSC-BSC signaling
MSC-MS signaling.
Mobile Application Part (MAP): The example of a location update procedure mentioned
previously is not confined only to the MSC-BSC section, it spans multiple PLMNs. In case of a
first time location update by an international roaming subscriber (where he is not in his home
network), the VLR has to get the data from the subscriber‟s HLR via the gateway MSC of the
subscriber‟s home network. While a mobile terminated call is being handled, the MSRN has
to be requested from the HLR without routing the call to HLR. Therefore, for these cases another
protocol layer was added to the SS7 called Mobile Application Part (MAP). MAP is used for
signaling communication between NSS elements.
Structure of MAP
39
Chapter 7
SIGNALING LINK
When you lift the receiver alight at the exchange starts to glow which is an
Indication that you need service.
The lady asks you who you want to talk with and you tell her the person‟s name.
indication that service will be provided with a further request for address, which is
provided.
She makes the connection to the called party and the phone starts ringing. Connection
of the speech path is completed and the called party is alerted.
The called party answers, and you are connected. Answer and conversation.
The lady at the exchange monitors your call during the conversation. Supervision.
When you hangup, a light glows to indicate this and she pulls out the plugs. An
indication of disconnection and clearing of thecall.
The signaling data link and the signaling link functions together constitute the whole Signaling
Link (SL) that is used for reliable transmission of signaling messages between two signaling
points. In AXE 10, signaling link functions are implemented in the signaling terminal (ST).
The main requirements of the SL functions are error-free transfer of signaling messages,
correct sequence, and no loss or duplication. These requirements imply different link functions
on level 2.
Different types of link control information must be interchanged on level 2 between two
adjacent SPs. Level 2 adds this control information for outgoing signal units and interprets it
40
for incoming signal units. The information is transferred as predefined parameter fields in each
signal unit. Furthermore, different types of link control information must be interchanged
on level 2 between two signaling terminals.
In addition, level 2 handles the link management functions required to provide continuous
monitoring and supervision under both normal and abnormal transfer conditions, for
example when disturbances or faults affect the performance of a
signaling link or a link set.
A signaling message, delivered by the higher levels, is transferred over the signaling link by
means of a variable length signal unit.
SIGNAL UNITS
Each frame must contain all information to reach the destination point and to invoke the
desired reaction, which is theactual reason for sending the signaling message. A signal unit
consists of several fields. Each field contains a certain number of bits representing specific
information. The user signalling message is carried in a data field called the Signaling
Information Field (SIF) within the signal unit frame.All information that must be transferred is
transmitted using oneof the signaling message formats engaging the abilities of MTP.
Signal Unit Types
There are three types of signal units:
41
FISU Fill-In Signal Unit (FISU) is used for error supervision of the link and to keep
the link running when there are no MSUs to be sent.
LSSU The LSSU is sent in response to each status change on the SL informing the
remote side about this new status, for example, for starting up a signaling link. A Status
Field (SF) contains one
or two octets and is generated by the signalling terminal.
MSU The Message Signal Unit (MSU) is used to carry the signal information (or data
units) between user parts. The MSU is retransmitted when an error is detected. In
addition, there are
MSUs that are used for signalling network management and signalling network testing and
maintenance. However, these are not sent to a user part, but stay in the MTP level 3.
Fields in Signal Units
Flag - Each signal unit is enclosed between two flags, an opening flag
and a closing flag. The closing flag of the signaling unit is
normally the opening flag of the next signal unit. Both are coded
as “01111110”.To ensure that the bit pattern cannot be imitated elsewhere in the
signal unit, bit stuffing is used. Bit stuffing means adding an extra zero after five consecutive
ones in the message.
Check Bits- The error detection function is performed by means of 16 check
42
bits (CK), provided at the end of each signal unit. The checksum (check bits) is generated by
the transmitting signalling terminal by means of a specified algorithm. On the
receiving signalling terminal the same algorithm is used to calculate the checksum. This
checksum is then compared with the received checksum.
Error correction fields - The error correction field contains 16 bits. It consists of the
following:
Backward Sequence Number (BSN) 7 bits reserved for sequence numbers from 0 to 127.
These are used to acknowledge the correct transmission of a signal unit.
Backward Indicator Bit (BIB)The BIB (1 bit) marks the signal unit as:
Positive acknowledged if the logical value of the BIB bit is the same as that received in the
latest signal unit. Negative acknowledged if the value of BIB is not equal to the value in the
latest received signal unit.
Forward Sequence Number (FSN) FSN is the 7-bit field for sequence numbers from 0 to
127.
The FSN is used to recognize the signal units, which have been received “out of sequence”.
Forward Indicator Bit (FIB) If the logical value of the FIB is equal to the one in the
previous signal unit, the receiver is informed that the signal unit is sent for the first time. If the
logical value of FIB is not equal to the one in the previous signal unit, the receiver
is informed that it is a repetition of a previously sent signal unit.
Length Indicator: The Length Indicator (LI) indicates the number of octets in the
fields between the LI field and the CK field. This makes it possible to differentiate between the
three types of signal units. The following shows the LI of the different signal units.
LI>2 MSU
LI=1 or LI=2 LSSU
LI=0 FISU
For Message Signal Units, in which Signalling Information Field
has 62 or more octets, LI is set to 63.
CHAPTER - 8
43
IN PROTOCOLS
The Intelligent Network (IN) is a set of resources that facilitates the speedy introduction of
customized, competitive, advanced telecom services by operators without significant additional
investment in the existing telephony infrastructure. IN resources include hardware and
software. IN enables telecom operators to implement new services in reaction to and
anticipation of competing services from other providers. IN separates the physical network
from the systems used to delivevalue-added services. Note that IN services were first designed
for, and introduced in fixed telephony networks.
IN SERVICES
A few examples of IN services are very briefly described below:
Account Card Calling (ACC)
This service allows the user to use public telephones for making his/her calls, and instead of
using coins or phone cards, the call will automatically be charged to the account card.
Freephone (FPH)
Freephone was the first type of IN service offered to users. It is used by companies that want to
advertise their services by offering their customers the convenience of calling free of charge.
In other words, freephone means that call charges are reversed and paid by the receiving
company.
Premium Rate (PRM)
Premium Rate means that calls are charged at a rate that is higher than that of regular calls.
Premium Rate is normally used in connection with information and entertainment services
offered by service providers.
Universal Access Number (UAN)
A company with operating units in several places can use a Universal Access Number
throughout its organization. Customers who dial the Universal Access Number are
automatically routed to the nearest open office or to an office with free lines.
Televoting (VOT)
The televoting service can be used during a radio or television program where listeners or
viewers are asked to call in and register their opinion on an issue, answering for
example “Yes” or “No”.
Virtual Private Network (VPN) and Mobile VPN
44
With the Virtual Private Network product a company's fixed and mobile phones are integrated
in one network with one numbering plan.
Personal Number (PN)
Call handling is simplified by the possibility of having only one telephone number for all
incoming calls. The calls will be sent in accordance to the personal choice of destination,
which could be one or many phones, including mobile, fixed, or pager. The service supports
advanced functionality, such as routing profiles including both sequential and parallel alert
options.
Information and Business (I&B)
This is a multi-purpose service with a flexible and modular design. The flexible structure
allows the service provider to choose which features to include in a subscription in order to
satisfy the service subscriber best. The Information & Business service can be customized to
operate as a Freephone, Premium Rate, or Universal Access Number service.
Prepaid Service (PPS)
“Prepaid” implies pre-payment of subscriptions that is, payment for a set amount of services in
advance. Users can refill their “account” using scratch cards.
Prepaid Service Light (PPL)
This is similar to PPS, but functionalities are limited and the service platform is less complex.
The discussion of the service details and implementation is beyond the scope of this book. This
chapter will focus on signaling used in the mobile IN environment.
In general, two groups of IN services can be distinguished:
Terminating
The IN functionalities are triggered for the terminating part of the call. In GSM this will be
detected in the HLR when there is an interrogation from the GMSC. Personal Number is an
example of a service belonging to this group.
45
Originating - The IN functionalities are triggered when the subscriber originates a call, as
special handling may be required for all or some of the calls. In GSM, this is detected by the
MSC/VLR serving the subscriber. Virtual Private Network is an example of a service from this
group.
IN NETWORK STRUCTURE
Generally, the network architecture constitutes three levels:
Switching layer
This layer consists of the network elements responsible for routing and switching calls,
including the capability to route IN calls.
Intelligent layer
This layer consists of nodes with subscriber and service data responsible for handling the IN
calls.
Management layer
The service management environment function is, in Ericsson implementations, implemented
on a UNIX platform with Service Management Application System (SMAS) software. There
are SMAS interfaces to all mobile IN nodes performing either the Service Control Function
(SCF) or the Service Data Function (SDF).
The IN-specific nodes are briefly described below:
SSF or gsm SSF (Service Switching Function)
This function may “trigger” IN call control in the SCF by an initial operation sent to the SCF.
The SSF executes operations requested by the SCF. The SSF also contains
capabilities to communicate with other entities containing an SCF function and to respond to
instructions from the SCF. The operations mainly operate on the basic call process. The
46
SSF also provides users with access to the network and performs any necessary switching
functionalities.
SCF or gsm SCF (Service Control Function)
The SCF keeps and executes the IN service logic and data.The execution results in operations
that should be performed by other functional entities.
SRF or gsm SRF (Service Resource Function)
The SRF provides the specialized resources required for the execution of IN provided services,
for example, Dual Tone Multi-Frequency (DTMF) receivers, announcements. The SRF is
either part of the SSF or is contained in a stand-alone node called the Intelligent Peripheral
(IP).
SDF (Service Data Function)
This function executes operations requested by the SCF. The operations mainly operate on a
database, which holds data that can be used by Service Logic Programs in the SCF to
provide individualized services. This functional entity maybe a commercial database
containing credit card numbers, etc. If the functional entity is a stand-alone node, it is called a
point, for example, the Service Switching Point (SSP) is a stand-alone node performing
Service Switching Functions (SSF), the Service Control Point (SCP) is a stand-alone node
performing Service Control Functions (SCF). If both SSP and SCP are integrated in a stand-
alone node, it is called Service Switching and Control Point (SSCP).
Connect the Call
The SSF serves as a “slave” to the SCF, performing the “orders” received from the SCF,
reporting events, and sending notifications to the SCF.
Chapter 9
GENERAL CALL FLOW
47
MOBILE ORGINATING AND MOBILE TERMINATING
A simple call in a GSM network can be very confusing and complex to understand. But to
understand the processes that are necessary to establish a complete connection in a GSM
network we take an example to describes a call from a fixed network subscriber to a mobile
subscriber in a GSM network:
1. The incoming call is passed from the fixed network to the gateway
MSC (GMSC).
2. Then, based on the IMSI numbers of the called party, its HLR is determined.
3.The HLR checks for the existence of the called number. Then the relevant VLR is requested
to provide a mobile station roaming number (MSRN).
4. This is transmitted back to the GMSC.
5. Then the connection is switched through to the responsible MSC.
6.Now the VLR is queried for the location range and reachability status of the mobile subscriber.
7. If the MS is marked reachable, a radio call is enabled
8. And executed in all radio zones assigned to the VLR.
9.When the mobile subscriber telephone responds to the page request from the current radio cell,
10. All necessary security procedures are executed.
11. If this is successful, the VLR indicates to the MSC
12. that the call can be completed.
This is a simple example but an actual call is a complex one to understand. It consist of a
MOC(Mobile Originating Call) and MTC(Mobile Terminating Call).
MOBILE-TERMINATED SMS
48
The mobile-terminated SMS has the capability to transfer a short message from the SC to a MS/UE. In addition, it provides information about the delivery of the message through a delivery report, which confirms the delivery of the short message, or through a failure report, which informs the originator that the short message has not been delivered and the reason why. If the short message is not delivered, a specific procedure for later delivery is used. The mobile-terminated short message can be input to the SC from a variety of sources, for example, speech, internet, facsimile, or other MS/UEs.MSC/VLR
1. A terminating short message to a mobile subscriber is always routed from the SC to the SMS-GMSC. This is carried out using the Forward Mobile Terminating Short Message.2. The SMS-GMSC requests routing information from the HLR through the signal Send Routing Information For Short Message. The MSISDN, received from the SC, is used toaddress the HLR. The message contains the called subscriber’s MSISDN, the priority, and the SC address3. The HLR checks subscriber data related to the received MSISDN number. In the case of an error, the error code is sent back to the SMS-GMSC. The error checks are performed in thefollowing order:– Unknown subscriber (if the MSISDN is not allocated)– Teleservices not provisioned (if SMS transfer is not provisioned for the mobile subscriber)– Call barred (if status of the service ‘barring of incoming calls” is active)– Absent subscriber (if location is unknown for the mobile subscriber)
49
If none of the above errors occurs, the following routing\ information is sent back:MSC-identity (a signaling address, not a roaming number)
IMSI MWD-set (optional)
MWD-set is a parameter that indicates whether or not the SC address has previously been stored in the Message Waiting Data (MWD) list. The SC is included in the MWD list in thefollowing cases:
Location is unknown or restricted. Location information is available, but the MWD list already contains
another SC address, and the priority of this message is low.Up to eight SC addresses may be stored per MS/UE.4. The MS/UE address, received from the HLR, is used for addressing the signal Forward Short Message to the MSC where the MS/UE is currently located. In the MSC/VLR, the identity of the mobile subscriber is derived from the IMSI received in this message.
The mobile subscriber is paged using the Temporary Mobile Subscriber Identity (TMSI) or the IMSI, if the TMSI is unavailable. After the mobile subscriber has responded to the paging, the procedure for security-related functions, such as authentication, cipher mode setting, and IMEI check, is invoked, if carried out in the network. If the SC has more than one SMS for the same subscriber, it is noted in the MAP message. Thus the MAP dialogue is kept open saving the paging and authentication procedure in the MSC for the following SMS. Signaling towards the HLR is not needed for the subsequent SMS. The short message is transferred to the MS/UE on a signalling channel.
50
5. If a short message is successfully delivered, a result message is sent to the SMS-GMSC. In the case of failure, an error message is returned .6. The delivery report is sent to the SC
MOBILE-ORIGINATED SMS
The mobile-originated SMS provides the means to transfer a short message from a mobile to an SC. This can be carried out either when the mobile is idle, or when a connection (such asspeech or fax) already exists. For both successful and unsuccessful deliveries, the mobile receives a delivery report.1. The MS/UE sends a Connection Management request to the MSC/VLR to set up a signaling connection.2. In the case where the MS/UE is idle, the MSC assigns a signaling channel and may start authentication and ciphering. Otherwise, parallel transaction is performed.An equipment identity check may be performed.For short message sending, two protocols are used:
Connection Management Protocol for the air interface Relay Protocol for the relaying of short messages
The principle structure of Relay Protocol messages is: Destination address Originating address User information or reason code
3. Once the connection is set up, the SMS data is sent from the MS/UE to the MSC. The MSC sends back to the MS/UE an “Acknowledge” message when it has received the completeSMS data.4. The short message is transferred from the MSC/VLR to the SMS-IWMSC.
51
5. From there, the message Forward Mobile Originated Short Message is forwarded to the SC.6. A delivery report is sent back to the SMS-IWMSC.7. This delivery report is forwarded back to the current MSC/VLR.8. The MS/UE is informed and releases the connection by sending a “CP-Ack” message to the MSC/VLR. If the MS/UE has several SMS to send, instead of sending the final “CP-Ack”message, the MS/UE sends a new “CM-Service-Request” message. When it is received by the MSC, the Iu interface is ordered to maintain open and the authentication procedure is avoided for the subsequent SMS transactions. However the MAP dialogue is released for every MO-SMS in the multiple transactions.
Chapter 10
MONOLITHIC AND SPLIT ARCHITECTURE
Many of the nodes within the pre R10 release GSM/GPRS/EDGE architecture perform the
roles of connection control and bearer control. For example, the Mobile Switching Center
(MSC) performs call control functions such as B-number analysis and IMSI analysis to
determine user plane and control plane routing, as well as bearer control, comprising tasks
such as physically switching user plane connections and managing bearer (route) resources. A
similar example may be made of the SGSN for GPRS. This is fundamentally incompatible
with the horizontally integrated network model specified for 3G networks. As a consequence,
there is a need to split nodes into their respective functions. For Circuit Mode services,
Ericsson has chosen to “split” the MSC as a two-step process. Firstly, the MSC internal
software structure will be modified such that call-control and bearer-control are logically
separated within the same node. This will happen in Ericsson implementation CN1.5 (see
52
Error! Reference source not found.). The second step allows physical separation into server
and MGW as illustrated by This will happen in Ericsson implementation CN2.0 onwards. For
packet mode services, Ericsson had planned to split the SGSN in release CN4.0, however,
3GPP (the UMTS standardization body) have removed the SGSN architecture split as a
requirement, such that it is unlikely to happen.
Monolithic v/s split architecture
MONOLITHIC ARCHITECTURE
One concrete way of offering a smooth migration to layered architecture is the support of
server functionality in MSC/VLR and MSC/MGW. The solution makes it possible to use a
monolithic node, MSC/VLR or MSC/MGw, to additionally act as a MSC server.The benefit
with this solution is increased flexibility in how the network is migrated to the Layered
Architecture at the same time As the existing monolithic infrastructure is re-used. The need for
HW investments is thus reduced. Existing over capacity or capacity freed up in the monolithic
node processors when traffic is moved to the layered architecture, could be re-used for the
server function in the same node. To make this migration solution possible, a migration feature
in the MSC has been developed. It decides for each new call if the MSC should act as a
monolithic node or a server node. Decision criteria for a mobile originated call could be which
RNC or BSC the call is originating from or which type of access that is used, WCDMA or
GSM. It is also possible to use a statistical factor that could direct a certain percentage of the
traffic to the M-MGW, allowing for a stepwise migration to the layered architecture.
A WCDMA network is added to an existing GSM network.The RNCs and BSCs are connected
to both the monolithic MS Cand the M-MGW. The M-MGW is controlled by the existing
monolithic MSC that is acting as a MSC Server as well. By having both the WCDMA and the
GSM networks connected to both the monolithic MSC as well as the M-MGW, handover
between the systems can be achieved. This feature can be used in a number of other
configurations, including pure GSM networks.
53
Server feature in monolithic MSC
SPLIT ARCHITECTURE
The split architecture is where the MSC server and the M-MGW’s are separated.
Chapter 11
ERICSSON HARDWARE
AXE PLATFORM
The access network connects users, for instance telephone subscribers, to a unit, switch. When two subscribers connected to for example different exchanges, speak to each other the speech has to be transmitted between them. This transmission is done in digital form and that means that the analog signal from a subscriber has to be converted to a digital one. The conversionFrom analog to digital or the opposite can be done in different ways using different methods.
54
Switching means that incoming digital information is forwarded to a specific outgoing connection. Different subsystems in AXE can perform switching. The Group switch Subsystem, GSS, performs for example switching between access network and trunk network. The main switching function in a local exchange is to interconnect timeslots to and from the subscriber access network and the trunk (transport) network. AXE 810 performs switching according to T-S method, compared to previous AXE versions that use T-S-T method. The structure of the new GS890 in AXE 810 and the new clocksCL890 are described and the new sub racks required by AXE810 are mentioned. When different exchanges will cooperate it is necessary to synchronize them.The procedure to update GS from previous AXE versions toGS890 is presented.
Access to AXE :The connections to an AXE local exchange can either be directfrom the individual subscriber or through some intermediate equipment. The direct connections to the AXE local exchange from an ordinary PSTN subscriber is normally on an analogue subscriber line.
Another connection from a subscriber could be on a 2B+D digital subscriber connection for ISDN Basic Access. This access gives the subscriber two 64 kbps channels (Bchannels) and one 16 kbps channel (D-channel). They can beused simultaneously from the subscribers network access point. The two B-channels can be used for telephony, fax, datacommunication etc. The D-channel is used for signaling or forpacket switched services.
55
Switching functions in AXE
The switching functions in AXE are performed by the following subsystems :· Group Switching Subsystem (GSS)· Subscriber Switching Subsystem (SSS)· Extended Switching Subsystem (ESS)
GSS functions are used for selecting, connecting anddisconnecting paths through the group switch.SSS functions are used in the access network to connectsubscribers to the local exchangeESS functions are used for announcement of recorded messagesand for simultaneous connection of more than two subscribers.
Digital switching
The two principles of digital switching are:· Time switching· Space switchingTime switching is based on time division multiplexing (TDM)systems for example pulse code modulation (PCM).A PCM link can be shared in time by a number of speechchannels. Each channel's share of this time is known as a timeslot, and each time slot carries a speech sample.
56
Basic time switch operation
A simple time switch is made up of:· A speech store for temporary storage of the speech samples· A control store which controls the reading out from thespeech store
Space switching is used to switch timeslots from an incoming PCM system to an outgoing PCM system.The space switch is composed of a matrix of cross points(electronic gates). To connect a timeslot in an incoming PCM system to a timeslot in an outgoing PCM system an appropriate across point of the space switch is operated for a defined period(an internal timeslot).
GROUP SWITCH (APT) :In all AXE systems that connect two or more subscribers to oneanother, the Group Switch is the dominant feature, and is generally seen as the core around which the system is built. The Group Switching Subsystem, GSS, has the following basic functions:· Selection, connection and disconnection of speech or signal paths passing through the Group Switch.· Supervision of hardware in the subsystem by continuous, periodic and traffic-dependent supervision, for example through-connection tests.· Supervision of DL, Digital Link, interfaces connected to the switch.AXE Survey· To maintain a stable and accurate clock frequency for network synchronization purposes.
57
Different versions of Group Switch are available dependent on the hardware in use. The older version of Group Switch is based on BYB202 hardware, still available in many places around the world. In BYB501 structure, the hardware was minimized and it was possible to put more functions in one board. As it was named in he previous chapter the APT is used to describe hardware and software related to telephony.The first version of BYB501 hardware was used for APT 1.3 and1.4The latest version of BYB501 is used with APT1.5 in AXE 810.
APT/APZ
At, System Level 2, the AXE system is divided into two parts:· APT, which is the switching part. For example, APT provides the switching functions needed to implement a PSTN local exchange or node.· APZ, which is the control part. APZ is the computer system that runs the software programs controlling the operation of the switching part.APT and APZ are in turn divided into subsystems, each of which has a specific function. The name of each subsystem reflects its function. For example, the group switching subsystem (GSS) is the central switching part of the AXE system.APT and APZ are implemented Switch Distributed Board (XDB) AXE hierarchical structure
58
I/O SYSTEM
RP bus
RP – regional processor
CP – every device is controlled by it, hence, we always redundancy, i.e., CP-A and CP-
B.
#one CP can support 32 RP buses
#one RP bus is of 10mbps serial
#one RP contains 32 RPs
#hence, one CP supports 1024 RPs
#in one RPBIS , there are 4 ports for connection to GS and 2 for cross connection to
redundant RPHM
Since, there should not be much cabling in the CP, an interface ,namely, RPHM (regional
processor handler magazine) is introduced.
#each RPHM has 8 RPBIS posts
#one RPBIS post can handle 4RP buses
** group switch also have redundancy , i.e. , GS A and GS B ; but they are independent to each
other.
CP
RP RP RP
devices devices devices devices devices devices
Group Switch
59
Chapter 12
GENERIC ERICSSON MAGAZINE ( GEM )
Another far-reaching improvement is the GEM, a high-capacity, flexible, and scalablemagazine (sub rack) that anticipates future developments (Figure 6). GEM-based nodeswill be smaller, dissipate less power, and have greater maximum capacity. Their implementation will dramatically improve the cost of ownership and cut time-to-customer
for AXE. In previous versions of AXE, each function was located in a separate magazine, and advances in technology to modify the architecture rather than merely shrink the hardware. One advantage of this change is that considerably fewer magazine and board types are needed in each node. A second ad-vantage is that many internal AXE interfaces have been moved to the GEM back-plane, reducing the need for cables.
60
A GEM can house two SCB-RPs, providing an Ethernet switch, control function, maintenance
support, and power distribution; two switch boards (XDB), providing a 16 K plane duplicated group switch; up to 22 device boards with 15 mm spac- ing, such as ET155, ECP, or TRA; pairs of DLEBs, providing multiplexing functionality for DL3 cable
interfaces, placed in device slots; and CL890 clock modules placed in deviceslots. The GEM, which has been developed for use in the BYB 501 equipment
practice, provides several infrastructure functions via the backplane for the boards
housed in the magazine: duplicated power distribution; duplicated group switch connection; duplicated serial RP bus; maintenance bus for hardware inventory and fault indication; duplicated Ethernet, 10 or 100 Mbit/s; extremely robust backplane connectors.
TRA - transcoder and rate adaptor ( only in BSC) ECP - echo cancellor and pool (only in monolithic MSC)
61
ET1551 – common in all nodes SCB-RP – support correcting board RP 1 GEM capacity = 16k 1 AXE 810 = 32 GEM magazines RP–regional processor interface
62
Chapter 12
CONCLUSION
GSM technology which is the most extensively used and universally accepted technology till
date across the world for mobile phone communication. We looked at the GSM network
implementation, network components, and basic scenarios while mobile station is active, idle or
switched off, traffic channels and day to day activities of the network engineers trying to keep
the network up and running.
As is evident from the chapters in the books, the complex world of telecommunications is and
will continue to be full of challenges. We will very likely have a large number of different
networks in GSM operation for a long time to come - networks that are positioned to be able
to provide a many-faceted range of user-friendly services, be it individually or in cooperation
between networks.
The variety of possible diagrams showing GSM architecture and its details of working are
described in the report which gives the clear description of its working and its protocols.
The knowledge of hardware of Ericsson is helpful in understanding the general structure of
the hardware of the telecommunication industries and their vendors. It gives us the overview
in terms of installation of hardware , economical and technological.