throbber

`H DISK INCLUDED
`
`
`
`
`
`
`
`
`
`
`
`
`PLIllT
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`a Complete, start-to-finish GSM coverage
`
`e Architecture, interfaces, radio links, logical channels,
`coding, and more
`
`a Planning, design, traffic engineering, management,
`and security
`
`
`
`
`
`
`
`
`
`e Wireless data and low mobility enhancements
`
`e The future of GSM
`
`Prentice Hall Communications Engineering
`and Emerging Technologies Series
`
`‘CII‘
`
`4||.|.
`
`‘
`
`‘
`
`I
`
`i
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Vijay K. Garg
`Joseph E. Wilkes
`
`
`
`élfngYATEL EXHIBI
`
`
`
`
`
`2
`
`Page 1 of 8
`
`NOVATEL EXHIBIT 1031
`
`

`

`Library of Congress Cataloging-=in=Publication Data
`
`Garg, Vijay Kumar
`
`Principles and applications of GSM / Vijay K. Garg and Joseph E. Wilkes.
`p.cm. — (Prentice Hall communications engineering and emerging technologies
`series)
`
`Includes bibliographical references and index.
`ISBN O—13—949124—4
`
`Global system for mobile communications.I. Wilkes, Joseph E.II. Title.
`III. Series.
`TK5lO3.483.G37 1999
`
`621.382-dC2l
`
`98-36519
`CIP
`
`Editorial /production supervision: BooksCraft, Inc., Indianapolis, IN
`Cover design director: Jerry Votta
`-
`Cover design: Design Source
`Acquisition editor: Bernard M. Goodwin
`Manufacturing manager: Alan Fischer
`
`
`
`© 1999 by Prentice Hall PTR
`Prentice—Hall, Inc.
`A Simon & Schuster Company
`Upper Saddle River, NJ 07458
`
`The publisher offers discounts on this book when ordered in bulk quantities. For more information contact:
`
`Corporate Sales Department
`Phone: 800-382-3419 Fax: 201-236-7141
`
`E—mail: corpsa1es@prenha11.com
`Or write:
`Prentice Hall PTR
`
`Corp. Sales Dept.
`One Lake Street
`
`Upper Saddle River, NJ 07458
`
`All rights reserved. No part of this book may be reproduced, in any form or by any means, Without permis-
`sion in Writing from the publisher.
`
`All product names mentioned herein are the trademarks of their respective owners.
`
`Printed in the United States of America
`
`10 9 8 7 6 5 4 8 2 1
`
`ISBN 0-13-949124—4
`
`Prentice—Hall International (UK) Limited, London
`Prentice—Hall of Australia Pty. Limited, Sydney
`Prentice-Hall Canada Inc., Toronto
`
`Prentice—Hall Hispanoamericana, S.A., Mexico
`Prentice—Hall of India Private Limited, New Delhi
`Prentice—Hall of Japan, Inc., Tokyo
`Simon & Schuster Asia Pte. Ltd., Singapore
`Editora Prentice—Hall do Brasil, Ltda., Rio de Janeiro
`
`Page 2 of 8
`
`Page 2 of 8
`
`

`

`78
`
`GSM Architecture and Interfaces Chap. 5
`
`rent. This type of SIM card mobility is analogous to terminal mobility, but
`provides a personal-mobility-like service within the GSM mobile network
`(refer to chapter 11 for more details).
`An MS has a number of identities including the International Mobile
`Equipment Identity (IMEI), the International Mobile Subscriber Identity
`(IMSI), and the ISDN number. The IMSI is stored in the SIM. The SIM card
`contains all the subscriber-related information stored on the user’s side of the
`radio interface.
`
`@ IMSI. The IMSIiis assigned to an MS at subscription time. It uniquely
`identifies a given MS. The IMSI will be transmitted over the radio inter-
`face only if necessary. The IMSI contains 15 digits and includes
`‘
`
`X Mobile Country Code (MCC)——-3 digits (home country)
`
`X Mobile Network Code (MNC)—2 digits (home GSM PLMN)
`
`X Mobile Subscriber Identification (MSIN)
`
`X National Mobile Subscriber Identity (NMSI)
`
`@ Temporary Mobile Subscriber Identity (TMSI). The TMSI is
`assigned to an MS by the VLR. The TMSI uniquely identifies an MS
`within the area controlled by a given VLR. The maximum number of bits
`that can be used for the TMSI is 32.
`
`Q IMEI. The IMEI uniquely identifies the MS equipment. It is assigned by
`the equipment manufacturer. The IMEI contains 15 digits and carries
`X The Type Approval Code (TAC)—6 digits
`
`X The Final Assembly Code (FAC)——2 digits
`
`X The serial number (SN)— 6 digits
`
`X A Spare (SP)—1 digit
`
`Us SIM. The SIM carries the following information (see chapter 11 for more
`
`details):
`
`X IMSI
`
`Authentication Key (Ki)
`
`Subscriber information
`
`A Access control class
`
`Cipher Key (Kc)*
`TMSI*
`
`Additional GSM services*
`
`Location Area Identity (LAl)*
`
`Forbidden PLMN
`
`KKKXXXXX
`
`*Updated by the network.
`
`Page 3 of 8
`
`Page 3 of 8
`
`

`

`10.5 GSM GPRS
`
`189
`
`reports, stock data, Weather alerts, and the like. The information service pro-
`vider that originates the information is called the cell broadcast entity. The
`information is transferred to the cell broadcast center which relays the infor-
`mation to one or more BSCs. The BSCs in turn forward the message to the
`base transceiver systems for transmission over the air. The transmissions con-
`sist of the data and the identity of the mobiles that are to receive the data. The
`interface between the cell broadcast center and the BSC is not defined in the
`
`GSM standards but is left to a matter of agreement between the operators of
`each network element.
`
`Messages to the MS are transmitted on the CBCH.
`The MS and the SIM card have limited amounts of memory. Thus it is
`possible that messages sent directly to the MS or directly from the MS could
`be limited in number or length. Therefore, the MS may have a terminal con-
`nected to it that is capable of storing and generating the messages [14]. The
`interface uses mobile termination type 2 (MT2) as described previously in this
`chapter.
`
`10.5
`
`GSM GPRS
`
`The GSM GPRS extends the packet capabilities of GSM to higher data rates
`and longer messages. The service supports sending point-to-point and point to
`multipoint messages. Two new nodes are added to the network to support
`, GPRS (Figure 10.12). The serving GPRS support node communicates with
`MSs within its service area. The gateway GPRS support node communicates
`with packet networks that are external to the GSM network.
`The protocol architecture of the GPRS system is shown in Figure 10.13.
`The application in the MS (or its data adjunct) communicates with the appli-
`cation in the distant packet terminal. The communication is through the
`higher layers and the network layers in the MS, where it is relayed through
`the BSS to the serving GPRS support node and on to the gateway GPRS node.
`From the gateway GPRS node, it is sent on to the packet switching network.
`As the data transverses the network, several protocols are used.
`
`GSM Network
`
`Packet Switch-
`
`ing Network
`
`Serving GPRS
`Support Node
`
`Gateway GPRS
`
`Support Node
`
`Fig. 10.12 GPRS Network Architecture
`
`Page 4 of 8
`
`Page 4 of 8
`
`

`

`
`
`190
`
`Data Services in GSN! Chap. 10
`
` Application
`
`
`
`Higher
`Layers
`NetworkJ
`layer
`
`SNDPC
`
`
`
`Application
`
`
`
`Network
`
`layer
`
`SNDPC
`
`
`
`
`
`
`
`_“*LLc
`ac
`
`RLC RLC -
`
`I
`
`
`RLC
`
`MAC
`
`Physical
`layer
`
`MAC
`
`Physical
`layer
`
`MS
`
`BSS
`
`Serving GSN
`
`Gateway GSN
`
`Fig. 10.13 Protocol Stack for GPRS
`
`In the MS and the BSS:
`
`The Sub-Network-Dependent Convergence Protocol (SNDCP) per-
`forms header compression on the headers of the network layer.
`The Logical Link Control (LLC) provides the link layer control
`between the MS and GPRS serving node. It is based on LAPD.
`
`The Radio Link Control (RLC) transmits data blocks across the air
`interface, performs error detection, and performs error correction via an
`automatic repeat request process.
`The Media Access Control (MAC) operates similar to a slotted V
`ALOHA channel.
`
`The physical link layer manages forward error correction, interleaving
`of frames, and radio channel congestion.
`
`The radio frequency layer manages the physical radio layer of the sys-
`tem, including frequency modulation.
`
`Between the BSS and the serving GPRS node:
`
`BSS G-PR8 Protocol (BSSGP). This new protocol provides routing and
`QOS management.
`
`Frame relay. This standard wireline protocol supports packet communi-
`cation between nodes.
`
`Physical layer. As needed between nodes (e.g., E1 link).
`
`Page 5 of 8
`
`Page 5 of 8
`
`

`

`
`
`10.5 GSM GPRS
`
`191
`
`Between GPRS Nodes:
`
`Q GPRS tunnel protocol. This new protocol routes protocol data units
`through the network by adding packet routing information.
`
`@ Transmission Control Protocol/User Datagram Protocol (TCP/
`UDP) and lnternet Protocol (lP). These are the two standard proto-
`cols for the Internet.
`
`@ Layer 2 (L2) and physical layer. As needed between nodes. Some
`examples are ethernet, ISDN, and ATM.
`
`On the radio channel, three new channels are added. These channels are
`similar to those used for circuit-switched connections.
`
`@ Packet Broadcast CCH (PBCCH). This channel transmits system
`information to all packet MSS in the area of a cell.
`
`@ Packet Common CCH (PCCCH). This channel has four subchannels.
`The Packet PCH (PPCH) is used to page MSS. The Packet Random
`Access Channel (PRACH) is used for MSS to access the network to ini-
`tiate transmissions or respond to pages. The Packet Access Grant Chan-
`nel (PAGCH) is used to send resource assignments to an MS. The Packet
`Notification Channel (PNCH) is used to send multicast information to
`MSS.
`
`@ Packet TCl-l (PTCE-l). This uplink and downlink channel is used to
`transmit data packets between the MS and the BS over the Packet Data
`TCH (PDTCH). The channel is also used to send control information to/
`from lV.[Ss using the Packet Associated CCH (PACCH).
`
`When each user has a steady flow of information to transmit (for exam-
`ple, a data file transfer or a fax transmission), fixed-assignment access meth-
`ods are useful as they make an efficient use of communication resources.
`However, when the information to be transmitted is bursty in nature, fixed-
`assignment access methods result in wasting communication resources. Fur-
`thermore, in a cellular system where subscribers are charged based on a chan-
`hel connection time, fixed-assignment access methods may be too expensive
`for transmitting short messages. Random-access protocols provide flexible and
`efficient methods for managing a channel access to transmit short messages.
`Random-access methods give freedom for each user to gain access to the net-
`work whenever the user has information to send. Because of this freedom,
`these schemes can result in contention among users accessing the network.
`Contention may cause collisions and may require retransmission of the infor-
`mation. The commonly used random-access protocols are pure ALOHA, slotted
`ALOHA, and CSMA/CD. GPRS is a packet radio system; therefore its charac-
`teristics are similar to ALOHA systems.
`In the pure ALOHA scheme, each user transmits information whenever
`the user has information to send. A user sends information in packets. After
`
`Page 6 of 8
`
`Page 6 of 8
`
`

`

`192
`
`Data Services in GSM Chap. 10
`
`sending a packet, the user waits a length of time equal to the round-trip delay
`for an acknowledgment (ACK) of the packet from the receiver. If no ACK is
`received, the packet is assumed to be lost in a collision and it is retransmitted
`with a randomly selected delay to avoid repeated collisions. The normalized
`throughput 8' (average packet arrival rate divided by the maximum through-
`put) of the pure ALOHA protocol is given as
`
`—2G
`
`S = Ge
`
`(10.1)
`
`where G = normalized offered traffic load.
`
`From Eq. (10.1) it should belnoted that the maximum throughput occurs at
`traffic load G = 50 percent and is S = 1/2e. This is about 0.184. Thus, the best
`channel utilization with the pure ALOHA protocol is only 18.4 percent.
`In the slotted ALOHA system, the transmission time is divided into time
`slots. Each time slot is made exactly equal to packet transmission time. Users
`are synchronized to the time slots so that, whenever a user has a packet to
`send, the packet is held and transmitted in the next time slot. With the syn-
`chronized time slots scheme, the interval of a possible collision for any packet
`is reduced to one packet time from two packet times, as in the pure ALOHA
`scheme. The normalized throughput S for the slotted ALOHA protocol is given
`as
`I
`
`Where G = normalized offered traffic load.
`
`s = Ge‘G
`
`(10.2)
`
`The maximum throughput for the slotted ALOHA occurs at G = 1.0 (Eq.
`[10.2]), and it is equal to 1/e or about 0.368. This implies that, at the maximum
`throughput, 36.8 percent of the time slots carry the successfully transmitted
`packets, whereas the other 63.2 percent of the time slots remain empty.
`GPRS has the characteristics of a slotted ALOHA system but uses
`queued requests and channel reservation techniques to grow the traffic to the
`maximum throughput and hold at the maximum.
`
`Cai and Goodman simulated the performance of the GPRS system [19]
`and found these results:
`
`@ pWhen a single time slot is reserved for both control and traffic, the maxi-
`mum throughput is about 4 kbps per slot.
`
`Q When 8 time slots are used, the maximum throughput is about 5 kbps
`per slot or 40 kbps maximum.
`
`@ Since calls are gated into the system by queuing them, the blocking rate
`on a single user’s packets is low (about 0.1 percent or less).
`
`@ When only one slot is available, blocking will increase to the order of 5
`percent.
`
`Page 7 of 8
`
`Page 7 of 8
`
`

`

`10.6 SUMMARY
`
`193
`
`Cai and Goodman’s work was on a draft version of the GPRS standard and
`
`therefor does not completely characterize the final GPRS system. It does how-
`ever give an indication of its operation under load. We can see from the results
`that GPRS is a low-data-rate service.
`
`106
`
`SUMMARY
`
`In this chapter we examined data transmission over a GSM network. GSM
`offers a rich set of data features that enable MSs and their adjuncts to send
`and receive data with a variety of wireless and wireline data networks. We
`examined circuit-switched and packet-switched data. Like the ISDN services
`that GSM emulates, a variety of channels can be used to send data. The user
`can send data over the CCH, over a TCH as a data call, or on either the CCH
`or the TCH using user~to-user information. A new service GPRS defines a
`packet channel for transmission of data.
`Data services range from low-speed circuit-switched data to group 3 fax.
`For more details on data services, consult the references.
`
`103
`
`REFERENCES
`
`1. GSM Specification Series 02.63, “Digital Cellular Telecommunications System
`(Phase 2+): Packet Data on Signalling Channels Service (PDS)—Stage 1.”
`
`2. GSM Specification Series 02.87, “Digital Cellular Telecommunications System
`(Phase 2+): User-to-User Signalling (UUS) Service Description—Stage 1.”
`
`3. GSM Specification Series 03.40, “Digital Cellular Telecommunications System
`(Phase 2+): Technical Realization of the Short Message Service (SMS) Point-to-
`Point (PP).”
`
`4. GSM Specification Series 03.41, “Digital Cellular Telecommunications System
`(Phase 2+): Technical Realization of Short Message Service Cell Broadcast
`(SMSCB).”
`‘
`
`5. GSM Specification Series 03.46, “Digital Cellular Telecommunications System:
`Technical Realization of Facsimile Group 3 Nontransparent.”
`
`6. GSM Specification Series 03.63, “Digital Cellular Telecommunications System
`(Phase 2+): Packet Data on Signalling Channels Service (PDS) Service Descrip-
`tion———Stage 2.”
`
`'7. GSM Specification Series 04.11, “Digital Cellular Telecommunications System
`(Phase 2+): Point~to-Point (PP) Short Message Service (SMS) Support on Mobile
`Radio Interface.”
`
`8. GSM Specification Series 04.12, “Digital Cellular Telecommunications System
`(Phase 2+): Short Message Service Cell Broadcast (SMSCB) Support on the
`Mobile Radio Interface.”
`
`9. GSM Specification Series 04.22, “Digital Cellular Telecommunications System
`(Phase 2+): Radio Link Protocol (RLP) for Data and Telematic Services on the
`
`Page 8 of 8
`
`Page 8 of 8
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket