Telecom Technology Overview
Telecom Technology Overview
Any system which provides communication consists of the three important and basic
parts as shown in the following figure.
The Sender is the person who sends a message. It could be a transmitting station
from where the signal is transmitted.
The Channel is the medium through which the message signals travel to reach
the destination.
The Receiver is the person who receives the message. It could be a receiving
station where the signal transmitted is received.
What is a Signal?
A continuous time varying signal, which represents a time varying quantity can
be termed as an Analog Signal.
The communication based on analog signals and analog values is called as
Analog Communication.
Digital Signal
The binary digit which has only 1s and 0s are mostly termed as digital values.
Hence, the signals which represent 1s and 0s are also called as digital signals.
The communication based on digital signals and digital values is called as
Digital Communication.
1. Radio waves:
EM wave frequencies ranging from 3KHz to 1GHz
Use omnidirectional antennas.
The radio wave band is under government regulation.
Used for multicast communications, such as radio & television, & paging
systems.
They can penetrate through walls.
2. Micro Waves:
EM waves between 1 & 300GHz
Microwaves are unidirectional; propagation is line of sight.
Use directional antennas ¡V Point to point line of sight communications.
The parabolic dish antenna & the horn antenna are used for transmission &
reception of microwaves.
Used for unicast communication such as cellular telephones, satellite networks,
& wireless LANs.
Higher frequency ranges cannot penetrate walls.
3. Infrared Waves: IR
Infrared Waves => 300 GHz to 400 THz
For short-range communications such as b/n a PC & a peripheral device.
Small distance, typically no more than 10m.
Line of sight (or reflection) propagation, Blocked by walls
e.g. TV remote control, IRD port
FDMA is the basic technology for advanced mobile phone services. The features of
FDMA are as follows.
In the cases where continuous transmission is not required, there TDMA is used instead
of FDMA. The features of TDMA include the following.
TDMA shares a single carrier frequency with several users where each user
makes use of non-overlapping time slots.
Data transmission in TDMA is not continuous, but occurs in bursts. Hence a
hand off process is simpler.
TDMA uses different time slots for transmission and reception thus duplexers
are not required.
TDMA has an advantage that is possible to allocate different numbers of time
slots per frame to different users.
Bandwidth can be supplied on demand to different users by concatenating or
reassigning time slot based on priority.
Channels in different time are allocated to different users
E.g. GSM、DAMPS
Code division multiple access technique is an example of multiple access where several
transmitters use a single channel to send information simultaneously. Its features are as
follows.
In CDMA every user uses the full available spectrum instead of getting allotted
by separate frequency.
CDMA is much recommended for voice and data communications.
While multiple codes occupy the same channel in CDMA, the users having same
code can communicate with each other.
CDMA offers more air-space capacity than TDMA.
The hands-off between base stations is very well handled by CDMA.
Users distinguished by scramble code
E.g. CDMA
Space division multiple access or spatial division multiple access is a technique which is
MIMO (multiple-input multiple-output) architecture and used mostly in wireless and
satellite communication. It has the following features.
All users can communicate at the same time using the same channel.
SDMA is completely free from interference.
A single satellite can communicate with more satellites receivers of the same
frequency.
The directional spot-beam antennas are used and hence the base station in
SDMA, can track a moving user.
Controls the radiated energy for each user in space.
The first commercial mobile telephone system was launched by BELL in St. Louis, USA,
in 1946. Few lucky customers got the services. Early mobile systems used single high
power transmitters with analog Frequency Modulation techniques to give coverage up
to about 50 miles and hence only limited customers could get the service due to this
severe constraint of bandwidth.
Cellular Era: -
Disadvantages of 1G systems
It is digital cellular.
E.g. GSM
What is GSM?
GSM stands for Global System for Mobile Communication. It is a digital cellular
technology used for transmitting mobile voice and data services.
GSM is a circuit-switched system that divides each 200 kHz channel into eight 25
kHz time-slots.
GSM operates on the mobile communication bands 900 MHz and 1800 MHz in
most parts of the world. In the US, GSM operates in the bands 850 MHz and 1900
MHz.
GSM owns a market share of more than 70 percent of the world's digital cellular
subscribers.
GSM makes use of narrowband Time Division Multiple Access (TDMA)
technique for transmitting signals.
GSM was developed using digital technology. It has an ability to carry 64 kbps to
120 Mbps of data rates.
Presently GSM supports more than one billion mobile subscribers in more than
210 countries throughout the world.
GSM provides basic to advanced voice and data services including roaming
service. Roaming is the ability to use your GSM phone number in another GSM
network.
Advantages of 2G
o Improved spectrum efficiency
o International roaming
o Low-cost mobile sets and base stations (BSs)
o High-quality speech
o Compatibility with Integrated Services Digital Network (ISDN) and other
The MS consists of the physical equipment, such as the radio transceiver, display and
digital signal processors, and the SIM card. It provides the air interface to the user in
GSM networks. As such, other services are also provided, which include:
Voice teleservices
Data bearer services
The features' supplementary services
MS =phone + SIM
The BTS and the BSC communicate across the specified Abis interface,
enablingoperations between components that are made by different suppliers
The radio components of a BSS may consist of four to seven or nine cells.
A BSS may have one or more base stations.
The BSS uses the Abis interface between the BTS and the BSC.
A separate high-speed line (T1 or E1) is then connected from the BSS to the
MobileMSC.
The BTS houses the radio transceivers that define a cell and handles the radio link
protocols with the MS.
In a large urban area, a large number of BTSs may be deployed.
The BSC manages the radio resources for one or more BTSs.
It handles radio channel setup, frequency hopping, and handovers.
The BSC is the connection between the mobile and the MSC.
The BSC also translates the 13 Kbps voice channel used over the radio link to the
standard 64 Kbps channel used by the Public Switched Telephone Network
(PSDN)or ISDN.
It assigns and releases frequencies and time slots for the MS.
The BSC also handles intercell handover.
It controls the power transmission of the BSS and MS in its area.
The function of the BSC is to allocate the necessary time slots between the BTS
andthe MSC. It is a switching device that handles the radio resources.
Additional functions include:
The Network switching system (NSS), the main part of which is the Mobile
Switching Center (MSC),
o Performs the switching of calls between the mobile and other fixed or
mobile network users, as well as the management of mobile services such
as authentication.
Functions of MSC
Call handling that copes with the mobile nature of subscribers considering
Location Registration, Authentication of subscribers and equipment, Handover
and Prepaid service.
Management of required logical radio link channel during calls.
Management of MSC-BSS signaling protocol.
Handling location registration and ensuring interworking between mobile
station and VLR.
Controls inter-BSS and inter-MSC hand overs.
Acting as a gateway MSC to interrogate HLR. The MSC which is connected to
the PSTN/ISDN network is called as GMSC. This is the only MSC in the
network connected to the HLR.
Standard functions of a switch like charging.
The VLR is a database that contains temporary information about subscribers that
is needed by the MSC in order to service visiting subscribers.
The VLR is always integrated with the MSC.
When a mobile station roams into a new MSC area, the VLR connected to that
MSC will request data about the mobile station from the HLR. Later, if the mobile
station makes a call, the VLR will have the information needed for call setup
without having to interrogate the HLR each time.
The Authentication Center is a protected database that stores a copy of the secret
key stored in each subscriber's SIM card, which is used for authentication and
ciphering of the radio channel.
The AUC protects network operators from different types of fraud found in
today's cellular world.
The Equipment Identity Register (EIR) is a database that contains a list of all
valid mobile equipment on the network, where its International Mobile
Equipment Identity (IMEI) identifies each MS.
An IMEI is marked as invalid if it has been reported stolen or is not type
approved.
The operations and maintenance center (OMC) is connected to all equipment in the
switching system and to the BSC.
The implementation of OMC is called the operation and support system (OSS).
Following is the figure, which shows how OMC system covers all the GSM elements.
The OSS is the functional entity from which the network operator monitors and
controls the system.
The purpose of OSS is to offer the customer cost-effective support for centralized,
regional and local operational and maintenance activities that are required for a
GSM network.
An important function of OSS is to provide a network overview and support the
maintenance activities of different operation and maintenance organizations.
Telecom technology overview Page 20
GPRS is a hardware and software upgrade to the existing GSM system.
• Two new network nodes are added:
Serving GPRS support node (SGSN)
Gateway GPRS support node (GGSN)
SGSN is responsible for the delivery of packets from/to mobile stations within
itsservice area.
Its main tasks are
Mobility management:
o Location management
o Attachment/detachment
Packet routing
Logical link management
Authentication
UMTS/WCDMA
The Universal Mobile Telecommunications System (UMTS) is a third
generationmobile cellular system for networks based on the GSM standard.
It is designed for multimedia communications.
It supports wideband services like high speed Internet access, video & high
qualityimage Tx & video conferencing.
Why 3G?
3G Architecture
LTE supports scalable carrier bandwidth, from 1.4MHz to 20 MHz & supports
bothFDD & TDM.
The IP-based network architecture, called the Evolved Packet Core (EPC)
&designed to replace the GPRS Core Network,
Supports seamless handovers for both voice & data to cell towers with
olderNetwork technology such as GSM, UMTS & CDMA2000.
The simpler architecture results in lower operating costs
LTE Architecture
ddd
EPC is the IP-based core network defined by 3GPP in Rel-8 for use by LTE & other
access technologies.
The EPC consists of several functional entities
Mobility management entity (MME)
Serving gateway (GW)
Packet data network (PDN) gateway
Policy and charging rules function (PCRF)
MME
In charge of all the control plane functions related to subscriber and
session management
Security procedures
Terminal-to-network session handling
Idle terminal location management
Tracking Area list management, P-GW & S-GW selection
MME selection for handovers with MME change
The MME is connected to the home subscriber server (HSS) through an interface
known as S6.
HSS is the concatenation of the home location register (HLR) and the
authentication center (AuC).
HSS supports the database containing all subscription information.
Serving GW
o Termination point of packet data interface towards E-UTRAN
o Serves as local mobility anchor when UEs move across eNodeBs
Packets are routed through this point for intra E-UTRAN mobility and
mobility with other 3GPP technologies such as 2G GSM and 3G UMTS.
PDN GW
Termination point of packet data interface towards PDN.
Anchor point for sessions towards the PDN.
Supports policy enforcement features (which apply operator defined rules for
resource allocation and usage)
Packet filtering (like deep packet inspection for virus signature detection)
Evolved charging support (like per URL charging)
URL is an address of a web page on the World Wide Web (WWW).
BURST:
The frequency-correction burst is used on the FCCH. It has the same length
as the normal burst but a different structure.
The synchronization burst is used on the SCH. It has the same length as the
normal burst but a different structure.
The random access burst is used on the RACH and is shorter than the
normal burst.
The normal burst is used to carry speech or data information. It lasts
approximately 0.577 ms and has a length of 156.25 bits.
BCH Characteristics
Responsible for roaming, handovers, encryption, etc. The DCCHs include the
following channels;
Like Traffic Channels they are bidirectional.
Same format and function in both the forward and reverse links.
DCCHs may exist in any time slot and any ARFCN except TS 0 of the BCH
ARFCN.
There are three types of Dedicated Control Channels in GSM.
1. Stand-alone Dedicated Control Channel (SDCCH)
2. Slow Associated Control Channel (SACCH)
3. Fast Associated Control Channel (FACCH)
The SACCH is always associated with a TCH or a SDCCH and maps onto the
same physical channel.
Each ARFCN systematically carries SACCH data for all of its current users.
On the downlink, SACCH sends slow but regularly changing control
information to the mobile station.
o Transmit power level instruction.
o And specific timing advance instruction.
On reverse channel SACCH sends
o Received signal strength (form Serving BTS).
o Quality of the TCH.
o BCH measurement results (from neighboring cells)
The SACCH is transmitted during the 13th frame of every speech dedicated
control channel
FACCH carries urgent messages, and contains essentially the same type of
information as the SDCCH.
A FACCH is assigned whenever a SDCCH has not been dedicated for a particular
user and there is an urgent message (e.g. handoff request).
The FACCH gains access to a time slot by “stealing” frames from the traffic
channel to which it is assigned
Handoff (also called Handover) is the mechanism that transfers an ongoing call
from one cell to another cell as a user moves through the coverage area of a
wireless cellular system.
The main objective of handover is to maintain the ongoing calls. Many times it is
initiated by crossing a cell boundary or by deterioration in quality of the signal in
the current channel.
Handovers are used to prevent an ongoing call to be disconnected.
TYPES OF HANDOFF:
Handoffs are broadly classified into two categories
1. Hard handoff and
2. Soft handoffs.
They are also characterized by “make before break” and “break before make”.
In the soft handoff, during the handoff process, both existing and new
resources are used but
In hard handoff, current resources are released before new sources are
used.
HARD HANDOFF
Hard handoff is essentially a “break before make “connection.
In hard handoff, the link to the prior base station is terminated before or as the
user is transferred to the new cell’s base station,
This means that the mobile station is linked to no more than one base
station at a given time.
Initiation of the handoff may begin when the signal strength at the mobile received
from base station 2 is greater than that of base station 1.
A major problem with this approach to handoff decision is that the received signals
of both base stations often fluctuate.
Hard handoff is primarily used in FDMA (frequency division multiple access) and
TDMA (time division multiple access), in which different frequency ranges are
used in adjacent channels in order to minimize channel interference.
o So it becomes impossible to communicate with both BSs when the MS moves
from one BS to another BS (since different frequencies are used).
SOFT HANDOFF:
Soft handoff (or handover) is a mobile cellular network technology commonly used
in systems that enables the overlapping of the repeater coverage zones, so that
every mobile station is always well within range of at least one of the base stations.
A Soft handoff mechanism works by first switching and establishing connection
with another base station before disconnecting from the existing base station in the
network, so it is also sometimes referred to as “Make-before-Break” Handoff.
1. Call Waiting
Description
Call Waiting is a feature that informs you, while you are on a call that another
party is trying to reach you. The party trying to reach you hears ringing, and
you hear the call-waiting tone (beep tone).
You will not miss important calls while you are handling other calls.
Description
This is a service that allows you to forward your incoming calls to another
phone.
You can activate and deactivate the feature using your telephone.
Call forwarding (or call diversion) can be made by a user under the following
condition:
o If busy
o If out of reach
o If not answered
o For all calls
3. Call Barring
Description
Enables you to restrict or bar certain or all types of calls to and from your mobile
phone, i.e. outgoing calls, outgoing international calls, incoming calls.
Description
Conference call is a service that enables ethio mobile users to make a group call
being at different locations. Conference call service can be made with a maximum
of five people.
Benefits
YOU CAN:
Description
SMS text messages are perfect when you are too busy to call, or if you just want
to send a small piece of information - where to meet, what time, somebody's
phone number, and so on..
Ethio SMS service helps you to send and receive messages of up to 160
characters.
6. Voice Mail
Description
Voice Mail is a service which will answer your calls automatically and allow
callers to leave a voice messages under the following conditions:
You will receive a short message (SMS) notification whenever you receive a new
message in your mail box.
Important callers never receive “no answer”, “switched off”, “out of network
coverage” or “busy” signals;
Allows a business to run more efficiently contributing to overall productivity;
and
It ensures that you don’t miss your important calls.
7. CLIP
Description
The "Calling Line Identity Presentation (CLIP)" service enables you to see the
phone number of the calling person as well as the date and time of the call on the
screen of the subscriber terminal equipment (telephone, fax machine and other
devices).
It is activated by default to all mobile subscribers.
Customer can see the number and name of the caller on the screen
Voice SMS service enables you to record and send voice messages like a short
text message. The receiver can listen the voice message by dialing the number
code received through text message.
Benefits of Voice Short Message
You can record and send your voice SMS in your preferred language.
It is less time consuming to send voice message.
Enable customers to express their emotions in voice message.
Easy to send voice messages on the move.
All handset types can support the service
Listening to new messages is free of charge.
You can directly listen the message by dialing the number you received with
the notification text message.
Description
Call me back service enables all prepaid mobile subscribers to ask another mobile
subscriber (both prepaid and postpaid mobile subscribers) to call back.
It enables you to get connected 24/7 even when the credit balance is zero.