throbber
airay PEINeracue
`
`Cenafor
`
`3G Networks
`IP, UMTS, EGPRS and ATM
`
`ERICSSON EXHIBIT 1026, Page 1
`
`ERICSSON EXHIBIT 1026, Page 1
`
`

`

`Convergence Technologies
`for 3G Networks
`IP, UMTS, EGPRS and ATM
`
`Jeffrey Bannister, Paul Mather and Sebastian Coope
`at Orbitage Consultants
`
`ERICSSON EXHIBIT 1026, Page 2
`
`

`

`ERICSSON EXHIBIT 1026, Page 3
`
`ERICSSON EXHIBIT 1026, Page 3
`
`

`

`Convergence Technologies
`for 3G Networks
`
`ERICSSON EXHIBIT 1026, Page 4
`
`

`

`ERICSSON EXHIBIT 1026, Page 5
`
`ERICSSON EXHIBIT 1026, Page 5
`
`

`

`Convergence Technologies
`for 3G Networks
`IP, UMTS, EGPRS and ATM
`
`Jeffrey Bannister, Paul Mather and Sebastian Coope
`at Orbitage Consultants
`
`ERICSSON EXHIBIT 1026, Page 6
`
`

`

`Copyright  2004
`
`John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester,
`West Sussex PO19 8SQ, England
`Telephone (+44) 1243 779777
`
`Email (for orders and customer service enquiries): cs-books@wiley.co.uk
`Visit our Home Page on www.wileyeurope.com or www.wiley.com
`
`All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or
`transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or
`otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of
`a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London W1T 4LP,
`UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed
`to the Permissions Department, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West
`Sussex PO19 8SQ, England, or emailed to permreq@wiley.co.uk, or faxed to (+44) 1243 770620.
`
`This publication is designed to provide accurate and authoritative information in regard to the subject
`matter covered. It is sold on the understanding that the Publisher is not engaged in rendering
`professional services. If professional advice or other expert assistance is required, the services of a
`competent professional should be sought.
`
`Other Wiley Editorial Offices
`
`John Wiley & Sons Inc., 111 River Street, Hoboken, NJ 07030, USA
`
`Jossey-Bass, 989 Market Street, San Francisco, CA 94103-1741, USA
`
`Wiley-VCH Verlag GmbH, Boschstr. 12, D-69469 Weinheim, Germany
`
`John Wiley & Sons Australia Ltd, 33 Park Road, Milton, Queensland 4064, Australia
`
`John Wiley & Sons (Asia) Pte Ltd, 2 Clementi Loop #02-01, Jin Xing Distripark, Singapore 129809
`
`John Wiley & Sons Canada Ltd, 22 Worcester Road, Etobicoke, Ontario, Canada M9W 1L1
`
`Wiley also publishes its books in a variety of electronic formats. Some content that appears
`in print may not be available in electronic books.
`
`British Library Cataloguing in Publication Data
`
`A catalogue record for this book is available from the British Library
`
`ISBN 0-470-86091-X
`
`Typeset in 10/12pt Times by Laserwords Private Limited, Chennai, India
`Printed and bound in Great Britain by TJ International, Padstow, Cornwall
`This book is printed on acid-free paper responsibly manufactured from sustainable forestry
`in which at least two trees are planted for each one used for paper production.
`
`ERICSSON EXHIBIT 1026, Page 7
`
`

`

`1.3 WHY UMTS?
`
`3
`
`are now generating more traffic and revenue from non-voice services, the business case
`for 3G is present. These operators are no longer able to meet the subscriber demand for
`such applications, and have been a major impetus in 3G development, particularly NTT
`DoCoMo, arguably the most successful, and a pioneer in non-voice services. However,
`the situation in Japan and Korea is somewhat different to the rest of the world. There are
`a number of key factors that led to the growth of data services there:
`• low Internet penetration, due largely to language factors;
`• high existing mobile penetration (in Japan, the high cost and low efficiency of fixed-line
`services has partially fuelled this);
`• large urban conurbation with sizeable proportion of the working population commuting
`on public transport, often for a long duration;
`• low relative cost of mobile services.
`
`This is evident in Japan, where the first driving application of DoCoMo’s iMode service
`was provision of email.
`However, the current situation outside of these exceptions is that thus far, consumer
`demand for data services has been limited, even now when there is widespread availability
`of data-capable mobile devices. Cost of new services has been a significant factor in this
`poor uptake as bandwidth charges are unrealistically high when compared to fixed-line
`equivalents, particularly now with the widespread availability of economical consumer
`digital subscriber line (DSL) services.
`
`1.3 WHY UMTS?
`
`The 3G standard proposed by the European Telecommunications Standards Institute
`(ETSI) with much joint work with Japanese standardization bodies is referred to as
`the universal mobile telecommunications system (UMTS). UMTS is one of a number
`of standards ratified by the International Telecommunications Union–Telecommunication
`Standardization Sector (ITU-T) under the umbrella of International Mobile Telephony
`2000 (IMT2000), as discussed in the next section. It is currently the dominant standard,
`with the US CDMA2000 standard gaining ground, particularly with operators that have
`deployed cdmaOne as their 2G technology. At the time of writing, Japan is the most
`advanced in terms of 3G network deployment. The three incumbent operators there
`have implemented three different technologies: J-Phone is using UMTS, KDDI has a
`CDMA2000 network, and the largest operator NTT DoCoMo is using a system branded
`as FOMA (Freedom of Multimedia Access). FOMA is based around the original UMTS
`proposal, prior to its harmonization and standardization.
`The UMTS standard is specified as a migration from the 2G GSM standard to UMTS
`via the general packet radio service (GPRS) and enhanced data rates for global evolution
`(EDGE), as shown in Figure 1.1. This is a sound rationale since as of December 2002,
`there were over 780 million GSM subscribers worldwide,1 accounting for 71% of the
`
`1Source: GSM Association, www.gsmworld.com.
`
`ERICSSON EXHIBIT 1026, Page 8
`
`

`

`4
`
`INTRODUCTION
`
`GSM
`
`GPRS
`
`UMTS
`
`EDGE
`
`Figure 1.1 GSM evolution to UMTS
`
`global cellular subscriber figures. The emphasis is on enabling as much of the GSM
`network as possible to continue to operate with the new system.
`The goal of 3G is to provide a network infrastructure that can support a much broader
`range of services than existing systems so the changes to the network should reflect
`this. However, many of the mechanisms in the existing networks are equally applicable
`to supporting new service models, for example mobility management. For a successful
`migration, the manufacturers and suppliers of new 3G equipment understand that most
`licences granted for 3G network operation will be to existing 2G operators and thus
`the next step must be an evolution rather than a revolution. Operators in the main are
`expected to introduce GPRS functionality before taking the step to 3G. This will allow
`them to educate and develop the consumer market for these new services prior to major
`investment in new technology. This means that the Core Network will comprise the GSM
`circuit switched core and the GPRS packet switched core. The first release (Release 99)
`specification for UMTS networks is focused on changes to the Radio Access Network
`rather than the Core Network. This allows the Core Network to continue in functionality
`although changes will be made in areas of performance due to the higher data rates
`required by subscribers in the future networks. Maintaining this functionality allows the
`mobile network operators to continue using their existing infrastructure and progress to
`3G in steps. The handover between UMTS and GSM offering worldwide coverage has
`been one of the main design criteria for the 3G system.
`
`1.4 IMT2000 PROCESS
`
`The IMT2000 is a global process, coordinated by the ITU-T to develop next generation
`mobile networks, and covers both the technical specifications and the frequency alloca-
`tions. It was started in 1995 under the original heading of Future Plans for Land Mobile
`Telecommunications System (FPLMTS). IMT2000 is not a particular technology, but
`rather a system which should allow seamless, ubiquitous user access to services. The
`task is to develop a next generation network fulfilling criteria of ubiquitous support for
`broadband real-time and non-real-time services. The key criteria are
`• high transmission rates for both indoor and outdoor operational environments;
`• symmetric and asymmetric transmission of data;
`
`ERICSSON EXHIBIT 1026, Page 9
`
`

`

`44
`
`GSM FUNDAMENTALS
`
`However, the popularity of GSM brought to bear the economies of scale and thus PDC
`is only evident in Japan. The success of GSM in Asia is not surprising as many of the
`original ideas in the design of a network that would transcend political borders are also
`relevant in Asia.
`Currently, at time of writing, GSM technology has over 70% global market share of
`second generation cellular systems. As networks evolve to 3G, GSM should not be seen
`as becoming redundant, but rather GSM is an integral part of the 3G UMTS network
`infrastructure as it also evolves to the GSM-EDGE radio access network (GERAN).
`
`3.1 GENERAL ARCHITECTURE
`
`Figure 3.1 shows the general architecture for a GSM network. The various functional
`blocks are explained in the following subsections.
`
`Mobile station (MS)
`The MS consists of the mobile equipment (ME; the actual device) and a smart card called
`the subscriber identity module (SIM). The SIM offers personal mobility since the user
`can remove the SIM card from one mobile device and place it in another device without
`informing the network operator. In contrast, most other 2G systems require a registration
`update to the operator. The SIM contains a globally unique identifier, the international
`mobile subscriber identity (IMSI), as well as a secret key used for authentication and other
`security procedures. The IMSI (or a variation of it for security purposes) is used throughout
`the network as the identifier for the subscriber. This system enables a subscriber to
`change the mobile equipment and still be able to make calls, receive calls and receive
`other subscriber information by simply transferring the SIM card to the new device.
`Any calls made will appear on a single user bill irrespective of changes in the mobile
`device. The mobile equipment is also uniquely identifiable by the international mobile
`equipment identity (IMEI). The IMEI and IMSI are independent, thus providing the user
`flexibility by separating the concept of subscriber from access device. Many operators still
`issue ‘locked’ mobile devices where the equipment is tied for use only on a particular
`operator’s network. A mobile device not equipped with a SIM must also still be able to
`
`Mobile
`Station
`SIM
`
`ME
`
`BSS
`
`NSS
`
`PSTN
`
`Air/Um
`
`Abis
`
`TRAU
`
`MSC/VLR
`
`GMSC
`
`BTS
`
`BSC
`
`Home-PLMN
`
`HLR
`
`AuC
`
`EIR
`
`Figure 3.1 GSM general architecture
`
`ERICSSON EXHIBIT 1026, Page 10
`
`

`

`3.1 GENERAL ARCHITECTURE
`
`45
`
`25mm
`
`IMEI number
`
`Figure 3.2 GSM IMEI and IMSI
`
`15mm
`
`make emergency calls. To protect the call from undesirable snooping or listening in, the
`IMSI will not always be transmitted over the cell to identify the subscriber. Instead a
`temporary IMSI (T-IMSI) identifier is used and changed at regular intervals. Note that
`for extra security the whole data stream is encrypted over the air interface. Figure 3.2
`shows the 15-digit IMEI number on the left and the SIM card, which incorporates the
`15-digit IMSI.
`
`Base station subsystem (BSS)
`The base station subsystem (BSS) is composed of three parts, the base transceiver station
`(BTS), the base station controller (BSC), which controls the BTSs, and the transcoding
`and rate adaption unit (TRAU).
`
`Base transceiver station (BTS)
`The BTS houses the radio transceivers (TRXs) that define a cell and handle the radio link
`with the mobile station. As was seen, each TRX can handle up to eight full-rate users
`simultaneously. If more than eight full-rate users request resources within the TRX then
`they will receive a busy tone, or a network busy message may be displayed on the mobile
`device. It is possible to increase the number of simultaneous users in a cell by increasing
`the number of TRXs, hence the number of frequencies used. When a mobile device moves
`from one cell to another the BTS may change. Within the GSM system a mobile device
`is connected to only one BTS at a given time. The first TRX in a cell can actually only
`handle a maximum of seven (possibly less) simultaneous users since one channel on the
`downlink is used for broadcasting general system information through what is known as
`the broadcast and control channel (BCCH). The BTS is also responsible for encrypting
`the radio link to the mobile device based on security information it receives from the
`core network.
`
`Base station controller (BSC)
`The BSC manages the radio resources for one or more BTSs. It handles the radio channel
`setup, frequency hopping and handover procedures when a user moves from one cell to
`another. When a handover occurs, the BSC may change; it is a design consideration that
`
`ERICSSON EXHIBIT 1026, Page 11
`
`

`

`46
`
`GSM FUNDAMENTALS
`
`this will not change with the same regularity as a BTS change. A BSC communicates
`with the BTS through time division multiplex (TDM) channels over what is referred to
`as the Abis interface, generally implemented using E1 or T1 lines. If the numerous BTSs
`and the corresponding BSC are in close proximity then this link may be a fibre optic
`or copper cable connection. In some cases, there are a large number of BTSs in close
`proximity but quite some distance away from the controlling BSC. In such cases it may
`be more efficient to relay the calls from each of the BTSs to a single BTS via microwave
`links. This type of link may be very cost effective since generally the running costs of
`a point-to-point microwave link may be free. Of course this has to be weighed against
`the cost of the purchasing and deployment of the equipment. The collector BTS can then
`connect to the BSC via another microwave link or via a landline cable. A problem with
`the above system is that if the collector BTS fails then calls from the other BTSs may
`also fail. To overcome this problem it is possible to have two collector BTSs both sending
`the calls to the BSC. This forms a redundant link and if one collector BTS fails then this
`does not present such a large problem, as is illustrated in Figure 3.3(b).
`
`Transcoding and rate adaption unit (TRAU)
`The central role of the second generation systems is to transfer speech calls and the
`system has been designed and optimized for voice traffic. The human voice is converted
`to binary in a rather complex process. GSM is now quite an old system and as such
`the original encoding method used (LPC-RPE1) is not as efficient as some of the more
`recently developed coding systems such as those used in other cellular systems. There
`have been many developments in digital signal processing (DSP) which have enabled
`good voice quality to be transmitted at lower data rates. Although the TRAU is actually
`
`BTS
`
`BTS
`
`Base
`Station
`Controller
`(BSC)
`
`BTS
`
`BTS
`
`Base
`Station
`Controller
`(BSC)
`
`BTS
`
`BTS
`
`BTS
`
`(a)
`
`BTS
`
`(b)
`
`Figure 3.3 Base station connectivity
`
`1Linear predictive coding with regular pulse excitation (LPC-RPE) provides a digital model of the
`vocal tract and vocal chords, excited by a signal which is air from the lungs.
`
`ERICSSON EXHIBIT 1026, Page 12
`
`

`

`3.1 GENERAL ARCHITECTURE
`
`47
`
`seen as being logically part of the BSS, it usually resides close to the MSC since this
`has significant impact on reducing the transmission costs. The voice data is sent in a
`16 kbps channel through to the TRAU from the mobile device via the BTS and BSC.
`The TRAU will convert this speech to the standard 64 kbps for transfer over the PSTN
`or ISDN network. This process is illustrated in Figure 3.4, where over the air interface,
`speech uses 13 kbps (full-rate) and data 9.6 or 14.4 kbps, with each of these requiring a
`16 kbps link through the BSS.
`As has been mentioned, digital voice data is robust in the face of errors, and can han-
`dle substantial bit error rates before the user begins to notice signal degradation. This
`is in stark contrast to data such as IP packets, which is extremely error intolerant and
`a checksum is generally used to drop a packet which contains an error. Table 3.1 lists
`the adaptive multirate (AMR) speech CODECS which are implemented in UMTS. Also
`indicated on the diagram are the enhanced full-rate (EFR) bit rates for the second gener-
`ation GSM, TDMA and PDC systems for comparison. The GSM EFR uses the algebraic
`code excited linear prediction (ACELP) algorithm and gives better quality speech than
`full-rate (FR) using 12.2 kbps. A half-rate (HR) method of speech coding has also been
`introduced in to the standards, which is known as code excited linear prediction-vector
`sum excited linear prediction (CELP-VSELP). This method will enable two subscribers
`to share a single time slot.
`
`Network switching subsystem (NSS)
`The NSS comprises the circuit switched core network part of the GSM system. The main
`element is the mobile switching centre (MSC) switch and a number of databases referred
`
`BSS
`
`Mobile
`Station
`
`SIM
`
`ME
`
`9.6, 13,
`14.4 kbps
`
`NSS
`
`16kbps
`
`16kbps
`
`64kbps
`
`64kbps
`
`PSTN
`
`BTS
`
`BSC
`
`TRAU
`
`MSC/VLR
`
`Figure 3.4 Transcoding
`
`Table 3.1 CODEC bit rates
`
`CODEC
`
`AMR 12.20
`AMR 10.20
`AMR 7.95
`AMR 7.40
`AMR 6.70
`AMR 5.90
`AMR 5.15
`AMR 4.75
`
`Bit rate (kbps)
`
`12.2 (GSM EFR)
`10.2
`7.95
`7.4 (TDMA EFR)
`6.7 (PDC EFR)
`5.9
`5.15
`4.75
`
`ERICSSON EXHIBIT 1026, Page 13
`
`

`

`48
`
`GSM FUNDAMENTALS
`
`to as the visitor location register (VLR) and home location register (HLR). The HLR is
`always in the home network for roaming subscribers and thus any data exchange may
`have to cross international boundaries. The MSC and VLR are usually combined and are
`located in the visited network.
`
`Mobile switching centre (MSC)
`This acts like a normal switching node for a PSTN or ISDN network. It also takes care
`of all the additional functionality required to support a mobile subscriber. It therefore has
`the dual role of both switching and management. When a mobile device is switched on
`and requests a connection to a mobile network, it is principally the MSC that processes
`this request, with the BSS merely providing the access to facilitate this request. If the
`request is successful then the MSC registers the mobile device within its associated VLR
`(see below; most manufacturers tend to combine the VLR functionality with the MSC).
`The VLR will update the HLR with the location of this mobile device, and the HLR
`may be either in the same network, or a different network in the case of a roaming user.
`The MSC deals with registration, authentication (the MSC requests information from the
`authentication centre but it is the MSC which actually does the authentication), mobile
`device location updating and routing of calls to and from a mobile user. An MSC which
`provides the connectivity from the mobile network to the fixed network, e.g. ISDN or
`PSTN, is known as a gateway-MSC (G-MSC).
`
`Home location register (HLR)
`When a subscriber registers with an operator, they enter into what is known as a service
`level agreement (SLA). This operator’s mobile network is known as the home network or
`home public land mobile network (H-PLMN). The HLR is a huge database located within
`this home network which stores administrative information about the mobile subscriber.
`The information stored for a user in the HLR will include their IMSI, service subscription
`information, service restrictions and supplementary services. The HLR is also expected
`to know the location of its mobile users. It actually knows their location only to the VLR
`with which the mobile device is registered. The HLR also only knows the location of
`a mobile device which is switched on and has registered with some mobile operator’s
`network. This is the case even if the mobile is in a different country connected to another
`mobile operator’s network, as long as a roaming agreement exists between the two mobile
`operators. The GSM system provides all the technical capabilities to support roaming;
`however, this roaming agreement is also required so that both operators can settle billing
`issues arising from calls made by visiting mobile subscribers.
`
`Visitor location register (VLR)
`The VLR is another database of users and is commonly integrated with an MSC. Unlike
`the HLR, where most information is of a permanent nature, the VLR only holds temporary
`information on subscribers currently registered within its vicinity. This vicinity covers the
`subscribers in the serving area of its associated MSC. When a mobile device enters a new
`area, the mobile device may wish to connect to this network and if so informs the MSC of
`its arrival. Once the MSC checks are complete, the MSC will update the VLR. A message
`
`ERICSSON EXHIBIT 1026, Page 14
`
`

`

`3.2 MOBILITY MANAGEMENT
`
`49
`
`is sent to the HLR informing it of the VLR which contains the location of the mobile.
`If the mobile device is making or has recently made a call, then the VLR will know the
`location of the mobile device down to a single cell. If the mobile device has requested
`and been granted attachment to a mobile network, but not made any calls recently, then
`the location of the mobile device will be known by the VLR to a location area, i.e. a
`group of cells and not a single cell. A mobile device that is attached to a mobile network
`where a roaming agreement is in force, i.e. is not in its H-PLMN, is said to be in a visited
`PLMN (V-PLMN).
`
`Equipment identity register (EIR)
`The EIR is a list of all valid mobiles on the network. If a terminal has been reported
`stolen or the equipment is not type approved then it may not be allowed to operate in the
`network. The terminals are identified by their unique IMEI identifier.
`
`Authentication centre (AuC)
`The AuC is a database containing a copy of the secret key present in each of the users’
`SIM cards. This is used to enable authentication and encryption over the radio link. The
`AuC uses a challenge–response mechanism, where it will send a random number to the
`mobile station; the mobile station encrypts this and returns it. The AuC will now decrypt
`the received number and if it is successfully decrypted to the number originally sent, then
`the mobile station is authenticated and admitted to the network.
`
`3.2 MOBILITY MANAGEMENT
`
`To make and receive calls, the location of the mobile device has to be known by the
`network. It would be extremely inefficient if a user needed to be paged across an entire
`network, and almost impossible to support roaming to other networks. Each cell broad-
`casts its globally unique identity on its broadcast channel, which is used by the mobile
`device for location purposes. Mobility management is the mechanism that the network
`uses for keeping a dynamic record of the location of all of the mobile devices currently
`active in the network. In this context, location does not refer specifically to the geo-
`graphical location of the mobile device, but rather its location with respect to a cell in
`which it is currently located. However, for the development of cellular towards third
`generation, geographical location becomes important as an enabler for location-based
`services (LBS).
`The major benefit of the cellular telephone over a fixed landline is the mobility that it
`presents to the subscriber. Initially, this mobility was merely allowing the user to move
`around and be tracked within a certain area; however, now mobility extends to cover the
`concept of roaming. Unfortunately, the provision of mobility makes the network much
`more complex to design and operate. As a subscriber moves from one location to another,
`the strength of the signal it receives from the base station to which it is currently listening
`will fluctuate, and, conversely, the signal received by the base station from the mobile
`device will also vary. Both the network and the mobile device must constantly monitor
`
`ERICSSON EXHIBIT 1026, Page 15
`
`

`

`3.3 GSM AIR INTERFACE
`
`55
`
`890.2Mhz
`
`0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0
`
`1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
`
`TDM frame
`
`Mobile Station Transmission
`
`TDM frame
`
`935.2Mhz
`
`5 6 7 0 1 2 3 4
`
`5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4
`
`Base Station Transmission
`
`Figure 3.9 TDM channels in GSM
`
`T/slot 0
`T/slot 1
`Broadcast Voice Call
`
`T/slot 2
`Free
`
`T/slot 3
`Voice Call
`
`T/slot 4
`Free
`
`T/slot 5
`Voice Call
`
`T/slot 6
`Voice Call
`
`T/slot 7
`GPRS Call
`
`SMS
`
`Location
`Update
`
`Broadcast
`
`Voice Call
`
`Free
`
`Voice Call
`
`Voice Call
`
`Free
`
`Free
`
`Free
`
`Voice Call
`
`Figure 3.10 Example use of time slots
`
`to make telephone calls (voice or data). The duration of these obviously depends on the
`call itself.
`The network selects which band to use, whether there is an option, for example
`900 MHz or 1800 MHz, the frequency, if there is more than one available in this cell,
`and the time slot the subscriber will use. This selection is completely transparent to the
`subscriber; in fact, the frequency and time slot will normally change throughout the call,
`with the user perhaps noticing a small amount of interference or possibly nothing at all.
`The ability to change the frequency of a subscriber is required when a subscriber roams
`from one cell into another since adjacent cells cannot use the same frequency.
`Within a cell, most GSM systems implement frequency hopping, where the BTS and
`mobile unit transmit consecutive frames on different carrier frequencies across the radio
`channels. Frequency hopping is a key part of the GSM system and is used to alleviate
`some of the inherent problems with radio links such as multipath fading by avoiding
`prolonged use of one frequency. The BCCH channel is not part of the frequency-hopping
`scheme since it needs to be located by mobile devices wishing to connect to the cell.
`Figure 3.11 below shows a simplified example of the frequency hopping process. In a
`practical situation each individual time slot can hop independently to the TDMA frame.
`
`3.3.1 GSM multiframes
`
`The above eight time slot framing structure as shown in Figure 3.9 is part of a much
`larger multiframe. There are two types of multiframe: the traffic channel and control
`
`ERICSSON EXHIBIT 1026, Page 16
`
`

`

`56
`
`GSM FUNDAMENTALS
`
`Subscriber
`timeslots
`
`BCCH remains
`
`on t/slot 0
`
`BCCH
`
`time
`
`BCCH
`
`BCCH
`
`TDMA
`block 1
`
`TDMA
`block 2
`
`TDMA
`block 3
`
`BCCH
`
`TRX3
`
`TRX2
`
`TRX1
`
`frequency
`
`Figure 3.11 Frequency hopping in GSM
`
`channel multiframes. The traffic channel multiframe consists of 26 groups of 8 TDM
`frames whereas the control multiframe consists of 51 groups of frames.
`
`3.3.2 Traffic channel multiframe
`
`Although this is a designated traffic channel consisting of 26 frames, at most only 24 of
`these are used for TCH user data such as voice. The frame is also used to carry two logical
`control channels, the slow associated control channel (SACCH) and the fast associated
`control channel (FACCH). Time slots 12 and 25 are specifically used for SACCH. In fact,
`the SACCH may actually alternate between these on different multiframes and so there is
`only one SACCH channel transmitted per multiframe. During the frame that the mobile
`device is not transmitting or receiving on its dedicated TCH, it is constantly monitoring
`the strength of the received signals from the cell it is attached to as well as other cells
`in the area. The mobile station can actually monitor up to six surrounding cells. The
`SACCH is then used for sending these measurement results to the network. A SACCH
`message is 456 bits long (4 bursts × 114 bits per burst); it therefore has a time interval
`of 480 ms before repeating itself. This information can be used to increase or decrease
`the transmitted power levels of both the mobile device and the network every 480 ms, or
`just a little over twice a second. The mobile device uses this information it receives but
`actually alters its power in steps every 60 ms. Enhanced circuit switched data (ECSD)
`can also use a fast power (FP) method which is sent within the data stream every 20 ms.
`Figure 3.12 illustrates the SACCH power control mechanisms: both the mobile device
`and the BTS send measurement reports to the BSC, which makes the decision to increase
`or decrease power.
`The SACCH may also be used for sending SMS messages to and from the mobile
`device while a call is in progress. User data frames 0–11 and 13–24 also carry control
`information in the form of the FACCH channel, as described below. A single user voice
`
`ERICSSON EXHIBIT 1026, Page 17
`
`

`

`3.3 GSM AIR INTERFACE
`
`57
`
`SACCH every 480ms
`
`Base Station Subsystem
`
`Power Control and measurement reporting
`Power Control Decision
`
`Mobile
`Station
`
`SIM
`
`ME
`
`Abis
`
`Power Control and
`measurement reporting
`
`BTS
`
`Power Control
`Decision
`
`BSC
`
`Figure 3.12 SACCH power control
`
`call will be transmitted in frame 0 of the multiframe for a particular amount of time,
`followed by a particular amount of time in frame 1 etc. Eight such calls can be made on
`this carrier frequency. A traffic channel is only assigned when the mobile device is in
`dedicated mode, whereas in idle mode the mobile device does not have a traffic channel
`assigned to it. Figure 3.13 shows the relationship of the TDM frame within a traffic
`channel multiframe.
`Each of the eight time slots in the TDM frame consists of 148 bits lasting 547 µs and
`has the structure shown in Figure 3.14.
`
`0
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`8
`
`Multi-frame 32,500 bits in120msec
`16
`15
`14
`13
`12
`11
`10
`9
`18
`17
`
`19
`
`20
`
`21
`
`22
`
`23
`
`24
`
`25
`
`Control
`Frame
`
`Control
`Frame
`
`0 1 2 3 4 5 6 7
`TDM frame
`
`1250 bits in 4.615msec
`
`Figure 3.13 GSM multiframe
`
`0
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`7
`
`000
`
`Information
`
`F1
`
`Training
`
`F1
`
`Information
`
`000
`
`8.25 bit guard band
`
`3 bits
`
`57 bits
`
`1 bit
`
`26 bits
`
`1 bit
`
`57 bits
`
`3 bits
`
`148 bit data frame sent in 547us
`
`Figure 3.14 GSM data burst
`
`ERICSSON EXHIBIT 1026, Page 18
`
`

`

`4.2 GENERAL ARCHITECTURE
`
`81
`
`load of the network. Enhanced GPRS (EGPRS) is an enhancement to the system, which
`allows higher bit rates through the use of different modulation techniques and coding
`schemes (see Section 4.11.12).
`The concept of a GPRS handover is referred to as a cell reselection procedure and
`is normally performed by the mobile device. The handover timing for GPRS is not so
`critical when compared to GSM since the traffic is not real time, and can thus be buffered.
`In this cell reselection procedure, the mobile device makes measurement reports, as with
`GSM; however the mobile station (MS) is more involved in the decision process, and can
`even initiate the procedure for handover. It is, nevertheless, still the responsibility of the
`network the serving GPRS support node (SGSN) to allow the handover to occur.
`Security functions are essentially quite similar to those for GSM services. The SGSN
`is responsible for authenticating the subscriber as well as encrypting/decrypting of data
`towards the mobile device (regular GSM encryption is only between the mobile device
`and the base station). The SGSN and mobile device can also compress data to make more
`efficient use of the Gb and air interface. A mobile device containing a standard GSM
`SIM can connect to the GPRS network and use the services, depending on the specifics
`of the operator network settings.
`
`4.2 GENERAL ARCHITECTURE
`
`Figure 4.2 shows the general architecture of a GPRS network and its interface to other
`IP-based networks such as the Internet. The GPRS network makes use of much of the
`existing GSM infrastructure. The HLR, AuC and EIR may require minor modifications to
`support GPRS, generally in the form of a software upgrade. In the diagram, the different
`equipment within the GPRS backbone network is connected together using an Ethernet
`switch. Within the GPRS standard, there is no stipulation as to what Layer 2 technology
`
`BSS
`
`Abis
`
`Mobile
`Station
`
`BTS
`
`BSC
`
`NSS
`
`PSTN
`
`MSC/VLR
`
`GMSC
`
`HLR
`
`AuC
`
`EIR
`
`switch
`
`SGSN
`
`GGSN
`
`External
`Network e.g.
`Internet
`
`GPRS IP
`Backbone
`
`CG
`
`LIG
`
`DNS
`
`Figure 4.2 GPRS General Architecture
`
`ERICSSON EXHIBIT 1026, Page 19
`
`

`

`82
`
`GENERAL PACKET RADIO SERVICE
`
`infrastructure should be used to interconnect the IP backbone, since to support roaming,
`the SGSN and GGSN will be connected through an internetwork. Most current networks
`are using an Ethernet network to implement this local backbone, as it is a cost-effective
`architecture choice. This Ethernet switch can be a weak link as it is a single point of
`failure in the network, so usually it will contain a great deal of redundancy to ensure
`reliability.
`
`4.3 GPRS NETWORK ELEMENTS
`
`To enable GPRS over an existing second generation network such as GSM, a number
`of additional network elements are required in the GPRS backbone network. These are
`described in the

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket