GSM Architecture Nokia
GSM Architecture Nokia
Training Document
The information in this document is subject to change without notice and describes only the
product defined in the introduction of this documentation. This document is intended for the
use of Nokia Networks' customers only for the purposes of the agreement under which the
document is submitted, and no part of it may be reproduced or transmitted in any form or
means without the prior written permission of Nokia Networks. The document has been
prepared to be used by professional and properly trained personnel, and the customer
assumes full responsibility when using it. Nokia Networks welcomes customer comments as
part of the process of continuous development and improvement of the documentation.
The information or statements given in this document concerning the suitability, capacity, or
performance of the mentioned hardware or software products cannot be considered binding
but shall be defined in the agreement made between Nokia Networks and the customer.
However, Nokia Networks has made all reasonable efforts to ensure that the instructions
contained in the document are adequate and free of material errors and omissions. Nokia
Networks will, if necessary, explain issues which may not be covered by the document.
Nokia Networks' liability for any errors in the document is limited to the documentary
correction of errors. Nokia Networks WILL NOT BE RESPONSIBLE IN ANY EVENT FOR
ERRORS IN THIS DOCUMENT OR FOR ANY DAMAGES, INCIDENTAL OR
CONSEQUENTIAL (INCLUDING MONETARY LOSSES), that might arise from the use of this
document or the information in it.
This document and the product it describes are considered protected by copyright according
to the applicable laws.
NOKIA logo is a registered trademark of Nokia Corporation.
Other product names mentioned in this document may be trademarks of their respective
companies, and they are mentioned for identification purposes only.
Copyright © Nokia Networks Oy 2002. All rights reserved.
Contents
1 Introduction ............................................................................................4
1 Introduction
A connection between two people − a caller and the called person − is the basic
service of all telephone networks. To provide this service, the network must be
able to set up and maintain a call, which involves a number of tasks: identifying
the called person, determining the location, routing the call, and ensuring that
the connection is sustained as long as the conversation lasts. After the
transaction, the connection is terminated and (normally) the calling user is
charged for the service he has used.
In a fixed telephone network, providing and managing connections is a
relatively easy process, because telephones are connected by wires to the
network and their location is permanent from the networks’ point of view. In a
mobile network, however, the establishment of a call is a far more complex
task, as the wireless (radio) connection enables the users to move at their own
free will − providing they stay within the network's service area. In practice, the
network has to find solutions to three problems before it can even set up a call:
• Where is the
subscriber
• Who is the
subscriber
Information about
the subscriber
Air A
MS BSS NSS
O&M
NMS
The NMS is the operation and maintenance related part of the network and it is
needed for the control of the whole GSM network. The network operator
observes and maintains network quality and service offered through the NMS.
The three subsystems in a GSM network are linked by the air-, A-, and O&M
interfaces as shown in Figure 2.
From the user’s point of view, the SIM is certainly the best-known database
used in a GSM network. The SIM is a small memory device mounted on a card
and contains user-specific identification. The SIM card can be taken out of one
mobile equipment and inserted into another. In the GSM network, the SIM card
identifies the user − just like a traveller uses a passport to identify himself.
The SIM card contains the identification numbers of the user and a list of
available networks. The SIM card also contains tools needed for authentication
and ciphering. Depending on the type of the card, there is also storage space for
messages, such as phone numbers. A home operator issues a SIM card when the
user joins the network by making a service subscription. The home operator of
the subscriber can be anywhere in the world, but for practical reasons the
subscriber chooses one of the operators in the country where he/she spends
most of the time.
AC
EIR HLR
HLR
VLR VLR
GMSC MSC
Call control
This identifies the subscriber, establishes a call, and clears the connection after
the conversation is over.
Charging
This collects the charging information about a call (the numbers of the caller
and the called subscriber, the time and type of the transaction, etc.) and transfers
it to the Billing Centre.
Mobility management
This maintains information about the subscriber's location.
Signalling
This applies to interfaces with the BSS and PSTN.
The MSC is responsible for controlling calls in the mobile network. It identifies
the origin and destination of a call (mobile station or fixed telephone), as well as
the type of a call. An MSC acting as a bridge between a mobile network and a
fixed network is called a Gateway MSC.
The MSC is responsible for several important tasks, such as the following.
Call control
MSC identifies the type of call, the destination, and the origin of a call. It also
sets up, supervises, and clears connections.
Initiation of paging
Paging is the process of locating a particular mobile station in case of a mobile
terminated call (a call to a mobile station).
The VLR carries out location registrations and updates. It means that when a
mobile station comes to a new MSC/VLR serving area, it must register itself in
the VLR, in other words perform a location update. Please note that a mobile
subscriber must always be registered in a VLR in order to use the services of the
network. Also the mobile stations located in the own network is always
registered in a VLR.
The VLR database is temporary, in the sense that the data is held as long as the
subscriber is within its service area. It also contains the address to every
subscriber's Home Location Register, which is the next network element to be
discussed.
As for AC, the Equipment Identity Register is used for security reasons. But
while the AC provides information for verifying the SIM cards, the EIR is
responsible for IMEI checking (checking the validity of the mobile equipment).
When performed, the mobile station is requested to provide the International
Mobile Equipment Identity (IMEI) number. This number consists of type
approval code, final assembly code and serial number of the mobile station.
BSC
TC
BTS BSC
TC
BTS
BTS
Some of the most important BSS tasks are listed in the following:
Synchronisation
The BSS uses hierarchical synchronisation, which means that the MSC
synchronises the BSC, and the BSC further synchronises the BTSs associated
with that particular BSC. Inside the BSS, synchronisation is controlled by the
BSC. Synchronisation is a critical issue in the GSM network due to the nature
of the information transferred. If the synchronisation chain is not working
correctly, calls may be cut or the call quality may not be the best possible.
Ultimately, it may even be impossible to establish a call.
Let us now have a closer look at each of the individual network elements (BSC,
BTS, and Transcoder.
The BSC is the central network element of the BSS and it controls the radio
network. It has several important tasks, some of which are presented in the
following:
Mobility management
The BSC is responsible for initiating the vast majority of all handovers, and it
makes the handover decision based on, among others, measurement reports sent
by the MS during a call.
The BTS is the network element responsible for maintaining the air interface
and minimising the transmission problems (the air interface is very sensitive for
disturbances). This task is accomplished with the help of some 120 parameters.
These parameters define exactly what kind of BTS is in question and how MSs
may "see" the network when moving in this BTS area.
The BTS parameters handle the following major items: what kind of handovers
(when and why), paging organisation, radio power level control, and BTS
identification. The BTS has several very important tasks, some of which are
presented in the following.
Ciphering
Both the BTS and the MS must be able to cipher and decipher information in
order to protect the transmitted speech and data in the air interface.
Speech processing
Speech processing refers to all the functions the BTS performs in order to
guarantee an error-free connection between the MS and the BTS. This includes
tasks like speech coding (digital to analogue in the downlink direction and vice
versa), channel coding (for error protection), interleaving (to enable a secure
transmission), and burst formatting (adding information to the coded speech /
data in order to achieve a well-organised and safe transmission).
The base station can contain several TRXs (Transceivers), each supporting one
pair of frequencies for transmitting and receiving information. The BTS also has
one or more antennas, which are capable of transmitting and receiving
information to/from one or more TRXs. The antennas are either omnidirectional
or sectorised. It also has control functions for Operation and Maintenance
(O&M), synchronisation and external alarms, etc.
In the air interface (between MS and BTS), the media carrying the traffic is a
radio frequency. To enable an efficient transmission of digital speech
information over the air interface, the digital speech signal is compressed. We
must however also be able to communicate with and through the fixed network,
where the speech compression format is different. Somewhere between the BTS
and the fixed network, we therefore have to convert from one speech
compression format to another, and this is where the Transcoder comes in.
For transmission over the air interface, the speech signal is compressed by the
mobile station to 13 Kbits/s (Full Rate and Enhanced Full Rate) or 5.6
Kbits/s (Half Rate). The compression algorithm for Full Rate is known as
"Regular Pulse Excitation with Long Term Prediction" (RPE-LTP). For
Enhanced Full Rate, speech coding is based on the algorithm "Algebraic Code
Excited Linear Prediction" (ACELP). "Vector Sum Excited Linear
Prediction" (VSELP) is used in the case of Half Rate. However, the standard
bit rate for speech in the PSTN is 64 Kbits/s. The modulation technique is
called "Pulse Code Modulation" (PCM).
Transcoder and
Submultiplexer (TCSM)
BSC
MSC
TC
TC
SM2M
TC
TC
A ter Interface
A ter’ Interface
A Interface
The Transcoder (TC) thus takes care of the change from one bit rate to another.
If the TC is located as close as possible to the MSC with standard PCM lines
connecting the network elements, we can, in theory, multiplex four traffic
channels in one PCM channel. This increases the efficiency of the PCM lines,
and thus lowers the costs for the operator. When we connect to the MSC, the
multiplexed lines have to be de-multiplexed. In this case the unit is called
Transcoder and Submultiplexer (TCSM).
Another task for the TC is to enable DTX (Discontinuous transmission), which
is used during a call when there is nothing to transmit (no conversation). It is
activated in order to reduce interference and to save MS battery.
In the Nokia solution, the submultiplexing and transcoding functions are
combined in one equipment called TCSM2E (European version) or TCSM2A
(American version).
N M S /2 0 0 0
BTS
D a ta C o m m u n ic a tio n s
N e tw o r k
DN2
BTS
BSC H LR
AC
E IR
MSC
VLR
BTS
BTS SMSC
Fault management
The purpose of fault management is to ensure the smooth operation of the
network and rapid correction of any kind of problems that are detected. Fault
management provides the network operator with information about the current
status of alarm events and maintains a history database of alarms.
The alarms are stored in the NMS database and this database can be searched
according to criteria specified by the network operator.
Configuration management
The purpose of configuration management is to maintain up-to-date information
about the operation and configuration status of network elements. Specific
configuration functions include the management of the radio network, software
and hardware management of the network elements, time synchronisation, and
security operations.
Performance management
In performance management, the NMS collects measurement data from
individual network elements and stores it in a database. On the basis of these
data, the network operator is able to compare the actual performance of the
network with the planned performance and detect both good and bad
performance areas within the network.
Data Communications
Digital Cross Server
Connect
PSTN/ISDN
Transcoder Mobile Switching Centre/
Submultiplexer Visitor Location Register
Voice
mail
Up until now, we have covered the history of GSM, the subsystems, and
interfaces. Step by step, we have also built a (virtual) GSM network by
describing the different network elements and their respective tasks. Now it is
finally time to start to use this network, in other words to make calls, receive
calls, and use the different services offered by the network. However, before it
is possible to use the network, we must tell the system that we are there and that
we are authorised users. These will be covered in the following modules.