`H DISK INCLUDED
`
`
`
`
`
`
`
`
`
`
`
`
`PLIllT
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a Complete, start-to-finish GSM coverage
`
`e Architecture, interfaces, radio links, logical channels,
`coding, and more
`
`a Planning, design, traffic engineering, management,
`and security
`
`
`
`
`
`
`
`
`
`e Wireless data and low mobility enhancements
`
`e The future of GSM
`
`Prentice Hall Communications Engineering
`and Emerging Technologies Series
`
`‘CII‘
`
`4||.|.
`
`‘
`
`‘
`
`I
`
`i
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Vijay K. Garg
`Joseph E. Wilkes
`
`
`
`élfngYATEL EXHIBI
`
`
`
`
`
`2
`
`Page 1 of 8
`
`NOVATEL EXHIBIT 1031
`
`
`
`Library of Congress Cataloging-=in=Publication Data
`
`Garg, Vijay Kumar
`
`Principles and applications of GSM / Vijay K. Garg and Joseph E. Wilkes.
`p.cm. — (Prentice Hall communications engineering and emerging technologies
`series)
`
`Includes bibliographical references and index.
`ISBN O—13—949124—4
`
`Global system for mobile communications.I. Wilkes, Joseph E.II. Title.
`III. Series.
`TK5lO3.483.G37 1999
`
`621.382-dC2l
`
`98-36519
`CIP
`
`Editorial /production supervision: BooksCraft, Inc., Indianapolis, IN
`Cover design director: Jerry Votta
`-
`Cover design: Design Source
`Acquisition editor: Bernard M. Goodwin
`Manufacturing manager: Alan Fischer
`
`
`
`© 1999 by Prentice Hall PTR
`Prentice—Hall, Inc.
`A Simon & Schuster Company
`Upper Saddle River, NJ 07458
`
`The publisher offers discounts on this book when ordered in bulk quantities. For more information contact:
`
`Corporate Sales Department
`Phone: 800-382-3419 Fax: 201-236-7141
`
`E—mail: corpsa1es@prenha11.com
`Or write:
`Prentice Hall PTR
`
`Corp. Sales Dept.
`One Lake Street
`
`Upper Saddle River, NJ 07458
`
`All rights reserved. No part of this book may be reproduced, in any form or by any means, Without permis-
`sion in Writing from the publisher.
`
`All product names mentioned herein are the trademarks of their respective owners.
`
`Printed in the United States of America
`
`10 9 8 7 6 5 4 8 2 1
`
`ISBN 0-13-949124—4
`
`Prentice—Hall International (UK) Limited, London
`Prentice—Hall of Australia Pty. Limited, Sydney
`Prentice-Hall Canada Inc., Toronto
`
`Prentice—Hall Hispanoamericana, S.A., Mexico
`Prentice—Hall of India Private Limited, New Delhi
`Prentice—Hall of Japan, Inc., Tokyo
`Simon & Schuster Asia Pte. Ltd., Singapore
`Editora Prentice—Hall do Brasil, Ltda., Rio de Janeiro
`
`Page 2 of 8
`
`Page 2 of 8
`
`
`
`78
`
`GSM Architecture and Interfaces Chap. 5
`
`rent. This type of SIM card mobility is analogous to terminal mobility, but
`provides a personal-mobility-like service within the GSM mobile network
`(refer to chapter 11 for more details).
`An MS has a number of identities including the International Mobile
`Equipment Identity (IMEI), the International Mobile Subscriber Identity
`(IMSI), and the ISDN number. The IMSI is stored in the SIM. The SIM card
`contains all the subscriber-related information stored on the user’s side of the
`radio interface.
`
`@ IMSI. The IMSIiis assigned to an MS at subscription time. It uniquely
`identifies a given MS. The IMSI will be transmitted over the radio inter-
`face only if necessary. The IMSI contains 15 digits and includes
`‘
`
`X Mobile Country Code (MCC)——-3 digits (home country)
`
`X Mobile Network Code (MNC)—2 digits (home GSM PLMN)
`
`X Mobile Subscriber Identification (MSIN)
`
`X National Mobile Subscriber Identity (NMSI)
`
`@ Temporary Mobile Subscriber Identity (TMSI). The TMSI is
`assigned to an MS by the VLR. The TMSI uniquely identifies an MS
`within the area controlled by a given VLR. The maximum number of bits
`that can be used for the TMSI is 32.
`
`Q IMEI. The IMEI uniquely identifies the MS equipment. It is assigned by
`the equipment manufacturer. The IMEI contains 15 digits and carries
`X The Type Approval Code (TAC)—6 digits
`
`X The Final Assembly Code (FAC)——2 digits
`
`X The serial number (SN)— 6 digits
`
`X A Spare (SP)—1 digit
`
`Us SIM. The SIM carries the following information (see chapter 11 for more
`
`details):
`
`X IMSI
`
`Authentication Key (Ki)
`
`Subscriber information
`
`A Access control class
`
`Cipher Key (Kc)*
`TMSI*
`
`Additional GSM services*
`
`Location Area Identity (LAl)*
`
`Forbidden PLMN
`
`KKKXXXXX
`
`*Updated by the network.
`
`Page 3 of 8
`
`Page 3 of 8
`
`
`
`10.5 GSM GPRS
`
`189
`
`reports, stock data, Weather alerts, and the like. The information service pro-
`vider that originates the information is called the cell broadcast entity. The
`information is transferred to the cell broadcast center which relays the infor-
`mation to one or more BSCs. The BSCs in turn forward the message to the
`base transceiver systems for transmission over the air. The transmissions con-
`sist of the data and the identity of the mobiles that are to receive the data. The
`interface between the cell broadcast center and the BSC is not defined in the
`
`GSM standards but is left to a matter of agreement between the operators of
`each network element.
`
`Messages to the MS are transmitted on the CBCH.
`The MS and the SIM card have limited amounts of memory. Thus it is
`possible that messages sent directly to the MS or directly from the MS could
`be limited in number or length. Therefore, the MS may have a terminal con-
`nected to it that is capable of storing and generating the messages [14]. The
`interface uses mobile termination type 2 (MT2) as described previously in this
`chapter.
`
`10.5
`
`GSM GPRS
`
`The GSM GPRS extends the packet capabilities of GSM to higher data rates
`and longer messages. The service supports sending point-to-point and point to
`multipoint messages. Two new nodes are added to the network to support
`, GPRS (Figure 10.12). The serving GPRS support node communicates with
`MSs within its service area. The gateway GPRS support node communicates
`with packet networks that are external to the GSM network.
`The protocol architecture of the GPRS system is shown in Figure 10.13.
`The application in the MS (or its data adjunct) communicates with the appli-
`cation in the distant packet terminal. The communication is through the
`higher layers and the network layers in the MS, where it is relayed through
`the BSS to the serving GPRS support node and on to the gateway GPRS node.
`From the gateway GPRS node, it is sent on to the packet switching network.
`As the data transverses the network, several protocols are used.
`
`GSM Network
`
`Packet Switch-
`
`ing Network
`
`Serving GPRS
`Support Node
`
`Gateway GPRS
`
`Support Node
`
`Fig. 10.12 GPRS Network Architecture
`
`Page 4 of 8
`
`Page 4 of 8
`
`
`
`
`
`190
`
`Data Services in GSN! Chap. 10
`
` Application
`
`
`
`Higher
`Layers
`NetworkJ
`layer
`
`SNDPC
`
`
`
`Application
`
`
`
`Network
`
`layer
`
`SNDPC
`
`
`
`
`
`
`
`_“*LLc
`ac
`
`RLC RLC -
`
`I
`
`
`RLC
`
`MAC
`
`Physical
`layer
`
`MAC
`
`Physical
`layer
`
`MS
`
`BSS
`
`Serving GSN
`
`Gateway GSN
`
`Fig. 10.13 Protocol Stack for GPRS
`
`In the MS and the BSS:
`
`The Sub-Network-Dependent Convergence Protocol (SNDCP) per-
`forms header compression on the headers of the network layer.
`The Logical Link Control (LLC) provides the link layer control
`between the MS and GPRS serving node. It is based on LAPD.
`
`The Radio Link Control (RLC) transmits data blocks across the air
`interface, performs error detection, and performs error correction via an
`automatic repeat request process.
`The Media Access Control (MAC) operates similar to a slotted V
`ALOHA channel.
`
`The physical link layer manages forward error correction, interleaving
`of frames, and radio channel congestion.
`
`The radio frequency layer manages the physical radio layer of the sys-
`tem, including frequency modulation.
`
`Between the BSS and the serving GPRS node:
`
`BSS G-PR8 Protocol (BSSGP). This new protocol provides routing and
`QOS management.
`
`Frame relay. This standard wireline protocol supports packet communi-
`cation between nodes.
`
`Physical layer. As needed between nodes (e.g., E1 link).
`
`Page 5 of 8
`
`Page 5 of 8
`
`
`
`
`
`10.5 GSM GPRS
`
`191
`
`Between GPRS Nodes:
`
`Q GPRS tunnel protocol. This new protocol routes protocol data units
`through the network by adding packet routing information.
`
`@ Transmission Control Protocol/User Datagram Protocol (TCP/
`UDP) and lnternet Protocol (lP). These are the two standard proto-
`cols for the Internet.
`
`@ Layer 2 (L2) and physical layer. As needed between nodes. Some
`examples are ethernet, ISDN, and ATM.
`
`On the radio channel, three new channels are added. These channels are
`similar to those used for circuit-switched connections.
`
`@ Packet Broadcast CCH (PBCCH). This channel transmits system
`information to all packet MSS in the area of a cell.
`
`@ Packet Common CCH (PCCCH). This channel has four subchannels.
`The Packet PCH (PPCH) is used to page MSS. The Packet Random
`Access Channel (PRACH) is used for MSS to access the network to ini-
`tiate transmissions or respond to pages. The Packet Access Grant Chan-
`nel (PAGCH) is used to send resource assignments to an MS. The Packet
`Notification Channel (PNCH) is used to send multicast information to
`MSS.
`
`@ Packet TCl-l (PTCE-l). This uplink and downlink channel is used to
`transmit data packets between the MS and the BS over the Packet Data
`TCH (PDTCH). The channel is also used to send control information to/
`from lV.[Ss using the Packet Associated CCH (PACCH).
`
`When each user has a steady flow of information to transmit (for exam-
`ple, a data file transfer or a fax transmission), fixed-assignment access meth-
`ods are useful as they make an efficient use of communication resources.
`However, when the information to be transmitted is bursty in nature, fixed-
`assignment access methods result in wasting communication resources. Fur-
`thermore, in a cellular system where subscribers are charged based on a chan-
`hel connection time, fixed-assignment access methods may be too expensive
`for transmitting short messages. Random-access protocols provide flexible and
`efficient methods for managing a channel access to transmit short messages.
`Random-access methods give freedom for each user to gain access to the net-
`work whenever the user has information to send. Because of this freedom,
`these schemes can result in contention among users accessing the network.
`Contention may cause collisions and may require retransmission of the infor-
`mation. The commonly used random-access protocols are pure ALOHA, slotted
`ALOHA, and CSMA/CD. GPRS is a packet radio system; therefore its charac-
`teristics are similar to ALOHA systems.
`In the pure ALOHA scheme, each user transmits information whenever
`the user has information to send. A user sends information in packets. After
`
`Page 6 of 8
`
`Page 6 of 8
`
`
`
`192
`
`Data Services in GSM Chap. 10
`
`sending a packet, the user waits a length of time equal to the round-trip delay
`for an acknowledgment (ACK) of the packet from the receiver. If no ACK is
`received, the packet is assumed to be lost in a collision and it is retransmitted
`with a randomly selected delay to avoid repeated collisions. The normalized
`throughput 8' (average packet arrival rate divided by the maximum through-
`put) of the pure ALOHA protocol is given as
`
`—2G
`
`S = Ge
`
`(10.1)
`
`where G = normalized offered traffic load.
`
`From Eq. (10.1) it should belnoted that the maximum throughput occurs at
`traffic load G = 50 percent and is S = 1/2e. This is about 0.184. Thus, the best
`channel utilization with the pure ALOHA protocol is only 18.4 percent.
`In the slotted ALOHA system, the transmission time is divided into time
`slots. Each time slot is made exactly equal to packet transmission time. Users
`are synchronized to the time slots so that, whenever a user has a packet to
`send, the packet is held and transmitted in the next time slot. With the syn-
`chronized time slots scheme, the interval of a possible collision for any packet
`is reduced to one packet time from two packet times, as in the pure ALOHA
`scheme. The normalized throughput S for the slotted ALOHA protocol is given
`as
`I
`
`Where G = normalized offered traffic load.
`
`s = Ge‘G
`
`(10.2)
`
`The maximum throughput for the slotted ALOHA occurs at G = 1.0 (Eq.
`[10.2]), and it is equal to 1/e or about 0.368. This implies that, at the maximum
`throughput, 36.8 percent of the time slots carry the successfully transmitted
`packets, whereas the other 63.2 percent of the time slots remain empty.
`GPRS has the characteristics of a slotted ALOHA system but uses
`queued requests and channel reservation techniques to grow the traffic to the
`maximum throughput and hold at the maximum.
`
`Cai and Goodman simulated the performance of the GPRS system [19]
`and found these results:
`
`@ pWhen a single time slot is reserved for both control and traffic, the maxi-
`mum throughput is about 4 kbps per slot.
`
`Q When 8 time slots are used, the maximum throughput is about 5 kbps
`per slot or 40 kbps maximum.
`
`@ Since calls are gated into the system by queuing them, the blocking rate
`on a single user’s packets is low (about 0.1 percent or less).
`
`@ When only one slot is available, blocking will increase to the order of 5
`percent.
`
`Page 7 of 8
`
`Page 7 of 8
`
`
`
`10.6 SUMMARY
`
`193
`
`Cai and Goodman’s work was on a draft version of the GPRS standard and
`
`therefor does not completely characterize the final GPRS system. It does how-
`ever give an indication of its operation under load. We can see from the results
`that GPRS is a low-data-rate service.
`
`106
`
`SUMMARY
`
`In this chapter we examined data transmission over a GSM network. GSM
`offers a rich set of data features that enable MSs and their adjuncts to send
`and receive data with a variety of wireless and wireline data networks. We
`examined circuit-switched and packet-switched data. Like the ISDN services
`that GSM emulates, a variety of channels can be used to send data. The user
`can send data over the CCH, over a TCH as a data call, or on either the CCH
`or the TCH using user~to-user information. A new service GPRS defines a
`packet channel for transmission of data.
`Data services range from low-speed circuit-switched data to group 3 fax.
`For more details on data services, consult the references.
`
`103
`
`REFERENCES
`
`1. GSM Specification Series 02.63, “Digital Cellular Telecommunications System
`(Phase 2+): Packet Data on Signalling Channels Service (PDS)—Stage 1.”
`
`2. GSM Specification Series 02.87, “Digital Cellular Telecommunications System
`(Phase 2+): User-to-User Signalling (UUS) Service Description—Stage 1.”
`
`3. GSM Specification Series 03.40, “Digital Cellular Telecommunications System
`(Phase 2+): Technical Realization of the Short Message Service (SMS) Point-to-
`Point (PP).”
`
`4. GSM Specification Series 03.41, “Digital Cellular Telecommunications System
`(Phase 2+): Technical Realization of Short Message Service Cell Broadcast
`(SMSCB).”
`‘
`
`5. GSM Specification Series 03.46, “Digital Cellular Telecommunications System:
`Technical Realization of Facsimile Group 3 Nontransparent.”
`
`6. GSM Specification Series 03.63, “Digital Cellular Telecommunications System
`(Phase 2+): Packet Data on Signalling Channels Service (PDS) Service Descrip-
`tion———Stage 2.”
`
`'7. GSM Specification Series 04.11, “Digital Cellular Telecommunications System
`(Phase 2+): Point~to-Point (PP) Short Message Service (SMS) Support on Mobile
`Radio Interface.”
`
`8. GSM Specification Series 04.12, “Digital Cellular Telecommunications System
`(Phase 2+): Short Message Service Cell Broadcast (SMSCB) Support on the
`Mobile Radio Interface.”
`
`9. GSM Specification Series 04.22, “Digital Cellular Telecommunications System
`(Phase 2+): Radio Link Protocol (RLP) for Data and Telematic Services on the
`
`Page 8 of 8
`
`Page 8 of 8
`
`